Sunteți pe pagina 1din 1613

ENCYCLOPEDIA OF

Social Media and Politics


ENCYCLOPEDIA OF

Social Media and Politics


Volume 1

Kerric Harvey
George Washington University
editor
FOR INFORMATION: Copyright © 2014 by SAGE Publications, Inc.
SAGE Publications, Inc.
2455 Teller Road
All rights reserved. No part of this book may be
Thousand Oaks, California 91320
reproduced or utilized in any form or by any means,
E-mail: order@sagepub.com
electronic or mechanical, including photocopying,
SAGE Publications India Pvt. Ltd. recording, or by any information storage and retrieval
B 1/I 1 Mohan Cooperative Industrial Area system, without permission in writing from the publisher.
Mathura Road, New Delhi 110 044
India
A catalog record of this book is available from the
SAGE Publications Ltd. Library of Congress.
1 Oliver’s Yard
55 City Road
London EC1Y 1SP
United Kingdom ISBN 978-1-4522-4471-6 (cloth)

SAGE Publications Asia-Pacific Pte. Ltd.


3 Church Street
#10-04 Samsung Hub
Singapore 049483

Senior Editor: Jim Brace-Thompson


Cover Designer: Bryan Fishman
Reference Systems Manager: Leticia Gutierrez
Reference Systems Coordinators: Laura Notton
Anna Villasenor
Marketing Manager: Carmel Schrire

Golson Media
President and Editor: J. Geoffrey Golson
Director, Author Management: Lisbeth Rogers
Production Director: Mary Jo Scibetta
Layout Editor: Oona Patrick
Copyeditor: Mary Le Rouge
Production Editor: TLK Editing Services
Proofreaders: Rebecca Kuzins, Mary Le Rouge
Indexer: Jayne Ste Marie 14 15 16 17 18 10 9 8 7 6 5 4 3 2 1
Contents
Volume 1
List of Articles vii
Reader’s Guide xv
About the General Editor xxiii
List of Contributors xxv
Introduction xxxiii
Chronology xxxix
Articles
A 1 D 343
B 99 E 423
C 151

Volume 2
List of Articles vii
Articles
F 489 L 755
G 565 M 787
H 611 N 871
I 651 O 899
J 745 P 939
K 751

Volume 3
List of Articles vii
Articles
Q 1047 V 1317
R 1051 W 1359
S 1091 Y 1407
T 1227 Z 1419
U 1293

Glossary 1423
Resource Guide 1433
Appendix 1439
Index 1473
Photo Credits 1556
List of Articles

A Asia
AARP Association of Internet Researchers
Activists and Activism, Digital Astroturfing
Actors and Social Media in Politics Attention Crash
Adbusters Media Foundation Audience Fragmentation/Segmentation
Addiction, Social Media Avaaz
Advertising and Marketing Avatars
Advocacy Groups, Political
Branding of B
Africa, North Bachmann, Michele
Africa, Sub-Saharan Backchannel
Age Bahrain
Aggregation Bambuser.com
Al Gore’s Penguin Army Berkman Center
Al Jazeera Effect Big Data
Algorithmic Authority BlackPlanet.com
A-List Bloggers. See Alpha Blogger Blog for America
Alpha Blogger Blog Storm
American Debt Crisis and Twitter Blog Syndication
American Enterprise Institute Blogger Rights and Responsibilities
Amplification Blogosphere
Annette Strauss Institute for Civic Life Blogs
Anonoblog Blogs, Role in Politics
Anonymous Blood Sport Campaigns
Antibullying Campaigns Boehner, John
Antislavery Campaign and Social Media Bookmarking
Antiwar Protesting Born This Way Foundation
Apple v. Does Bottom-Up Campaigns
Arab Spring Bounce Back
Artists and Social Media in Politics Bounce Back Effect

vii
viii List of Articles

Brave New Films Clickable Calls to Action


Buzz Creation Click-Through Rate
Clicktivism
C Clinton, Hillary
Campaign Strategy Cloud Computing
Campaigns, Congressional (2000) Cloud Computing and Citizen Privacy
Campaigns, Congressional (2002) Cloud Protesting
Campaigns, Congressional (2004) Cloud Tiger Media
Campaigns, Congressional (2006) CNN Effect
Campaigns, Congressional (2008) Coattail Effect
Campaigns, Congressional (2010) Coburn, Tom
Campaigns, Digital CODEPINK
Campaigns, E-Mail Cognitive Surplus
Campaigns, Grassroots Colbert Report, The
Campaigns, Organizing ColorofChange.org
Campaigns, Presidential (2000) Committee to Protect Journalists
Campaigns, Presidential (2004) Communication
Campaigns, Presidential (2008) Conflict Resolution, Social Media and
Campaigns, 2012 Constituencies, Social Media Influence on
Campaigns, Virtual Content Communities
Canada ContractfromAmerica.org
Candidate Image Cornyn, John
Candidates, Political Branding of Corporate Social Responsibility
CAN-SPAM Act (2003) Countries Banning Social Media for
Cantor, Eric Political Reasons
Carnivore Crowdfunding
Catholic Church and Social Media Crowdsourcing
Cato Institute Cultivation
Cause-Marketing Campaigns Cyberculture
Center for Communication and Cyber-Jihad
Civic Engagement Cyber-Vigilantism
Center for Democracy and Technology Cyclical Message Strategies
Center for Information Technology Cynicism, Political
and Society
Center for Innovative Media D
Center for International Media Assistance Daily Show, The
Center for Internet Studies DailyCaller.com
Center for Responsive Politics (OpenSecrets.org) Daniel Pearl Freedom of the Press Act
Center for Social Media Data Mining
Center on Public Diplomacy Data.gov
Chaffetz, Jason Debate
Change.gov Deception in Political Social Media
Change.org Decoy Campaign Web Sites
Chartered Institute of Public Relations Deep Packet Inspection
Social Media Guidelines Delicious.com
Chat Rooms Demand Progress
China DeMint, Jim
Christian Right Democracy Now!
Citizen Journalism DemocracyforAmerica.com
Civil Rights Demonstrations, Organizing
List of Articles ix

Department of Homeland Security F


Social Media Monitoring Initiative Facebook
Developing Nations Facial Recognition Technology
Diaspora/Migration FactCheck.org
Digerati Faith-Based Social Change
Digg Fan Page
Digital Citizen Fax Machines and Tiananmen Square Crisis
Digital Cultures Research Center Feb 17 voices
Digital Diplomacy Federal Privacy Act
Digital Due Process Coalition Federal Shield Law, Bloggers and
Digital Government FightTheSmears.com
Digital Media Law Project Findability
Digital Revolution FinFisher
DipNote Firewalling
Disaster Relief Fiscal Cliff Crisis
Documentaries, Social Media, and Flaming
Social Change Flash Mobs as a Political Tactic
Domestic Surveillance and Social Media Fleming, John
Dooced Flickr
Downstream Liability, Political Flog
Implications of Focus Groups
Dragonfly Effect, The Folksonomy
Drudge Report Forbes, J. Randy
Durbin, Richard J. Forecasting Elections
Foreign Policy
E Foursquare
Earned Media Framing Theory, Social Media and
ECHELON Franken, Al
Echo Chamber Phenomenon Freedom of the Press and National Security
Economic and Social Justice FreeRepublic.com
E-Democracy Friendster
EdgeRank Friend-to-Friend Strategies
Education, Issues in Functionality
Egypt Fundly
18DaysinEgypt.com Fund-Raising
Election Monitoring
Electronic Frontier Foundation G
Electronic Privacy Information Center Gate Keeping Theory and Social Media
Electronic Voting Gender
Ellison, Keith Geo-Locational Enabling
Ellmers, Renee Geotagging
Embedding Get Out the Vote Drives
Engagement Advertising GetUp.org.au
Engagement Features Ghost Blogging
Environmental Issues Gillibrand, Kirsten
Estrada, Joseph Glee
Ethics of Social Media in Politics Global Center for Journalism and Democracy
Europe Global Voices
Evolution of Social Media Global Warming and Climate Change
E-Voter Institute Going Viral
x List of Articles

Google AdWords/AdSense in Institute for Public Diplomacy and


Campaign Strategy Global Communication
Googlearchy and Politics Institution for Social and Policy Studies
Google+ Institutional Cabling
Grassley, Chuck Interactive Advertising Bureau
Great Firewall of China Interactive Documentary
Gun Control International Examples of Political Parties
Gutiérrez, Luis V. and Social Media
International Intervention
H International Online Communities
Hacktivism International Social Media and Politics
Hagan, Kay International Unrest and Revolution
Hard Place Theater Internet Forums
Hashtag Internet Gathering
Hatch, Orrin Internet Society, The
Hate Speech, Online and Social Media Iran
HeadCount.org Islam, Nation of
Health Care Islam and Social Media
Homophily Israeli–Palestinian Conflict
Honeycomb Framework Issa, Darrell
HootSuite.com
HopeLab J
Hoyer, Steny James K. Batten Award
Huffington Post John Aubuchon Press Freedom Award
Human Rights Judaism and Social Media

I K
I Am Gonna Be Your Friend Campaign Keystroke Logging
I Am Second Movement Klout Score
Identity Politics
Idlenomore.ca L
I-Docs.org Latin America
Immersive Journalism Legacy Media/Old Media
Immigration Lesbian, Gay, Bisexual, and
Independent Media Center Transgender Rights
Indexoncensorship.org Liberation Technology
India Libya
Indonesia Lieberman, Joe
Inferring Sentiment LinkedIn
Influence on Elections Lobbyists
Infographic London School of Economics Public
Information Abundance Policy Group
Information Aggregation Long-Tail Nano-Targeting
Informationalized Nations Versus Luddite
Industrialized Nations
Innocence of Muslims, The M
Innovation and Technology Mamfakinch
Inouye, Dan Mashable
Instagram McCarthy, Kevin
Instant Messengers, IRC and ICQ McCaskill, Claire
List of Articles xi

McConnell, Mitch O
McCotter, Thaddeus Obama for America iPhone Application
Media and Communication Policy Occupy Movement
Media Research Center Office of Government Information Services
Medicare OhmyNews
Meetup.com ONE Campaign
Membership Communications Project 140ELECT.com
Meme Mapping 100Reporters Whistleblower Alley
Menendez, Robert Onion, The
Microblogging Online Smear Campaigns
Microfinance Initiatives Open Data
Microtargeting Open Society Foundations
Middle East Open Source Governance
Military-Industrial Complex Open Source Politics
Minimal Effects Theory OpenCongress.org
MIT Center for Civic Media Open.Dems
MIT Media Lab OpenGovernment.org
Mobile Apps OpenLeaks
Mobile Connectivity, Trends in OpenTunisia.org
Politics and Opinion Leader Theory
Mobile Media User Data Collection Opposition Videographer
and Privacy Protection Outparty Innovation Incentives
Mobile/Smartphone Messaging Oxford Internet Institute
Moblogging
Moblog.net P
MOMocrats Palin Phenomenon
MomsRising.org Participatory Politics Foundation
Monarchies, Social Media, and Politics Peer to Peer
Morozov Principle Pelosi, Nancy
Mosireen.org Pence, Mike
MoveOn Effect, The Pentagon Digital Engagement Team
MoveOn.org Personal Democracy Media
Multiple Leveraging Personalization
Musicians and Social Media Persuasion Niche and Political Messaging
in Politics Petraeus, David
Myspace Pew Internet and American Life Project
Myth of Digital Democracy Phishing, Political
Picasa
N Piccadilly Riots, London
Nation of Islam Movement Pinterest
National Center for Digital Government Pioneers in Social Media and Politics
National Freedom of Information Coalition Platform
National Press Club Podcasts
Near-Me Tabs and Political Protests Polarization, Political
Negative Campaigning Polis, Jared
Network Influentials Political Base
Networks, Political Political Economy
News Media Political Information Opportunity Structures
Nongovernmental Organizations Political Parties
Nonprofit Organizations Politico
xii List of Articles

PolitiFact.com Search and Scrape Capability


Polling Search and Seizure Law and Policy
Pornography, Revenge Search Engine Bias/“Google Bias”
Portman, Rob Search Engine Data (Use in Social Media
Poverty Campaigning)
Predictive Analytics Search Engine Optimization
Presidential Policy Directive 20 Seattle 1999 WTO Protests
Press Freedom and Online/Social Media Security Second Life
Pretty Good Privacy Secondhand Political Engagement
Price, Tom Selective Exposure
Primacy Effect Sentiment Analysis
Privacy Sexting
Pro-Choice and Pro-Life Shadow Site. See Flog
Professional Bloggers Shirky Principle, The
Project Vote Smart Shot@Life Campaign
Proxy Measurements Siri
Psychographics Skype
Public Affairs Council Sleeper Effect
Public Intellectual Snopes.com
Push Polling Snowball Effect
Social Authority
Q Social Bookmarking
Quebec, Canada, 2012 Student Protests Social Capital
Social Computing and Social Information
R Processing
Race/Ethnicity and Social Media Social Good Summit
Radical Decentralization Social Issues Advocacy, Netroots Driven
Real-Time Communication Nodes Social Issues and Augmented Reality
Recency Effect Social Listening
Recombinant Media. See Remix, Political Social Media, Adoption of
Redalert.com Social Media, Alternatives to Commercial
Reddit Social Media, Definition and Classes of
Remix, Political Social Media and Freedom of
Reporters Committee for Freedom of the Press Information Act
Reporters Without Borders Social Media Career Wreckers
Return on Investment Social Media Noise
Rich Media Ad Social Media Optimization
RightOnline.com Social Media Political Gaming
Robin Hood Foundation Social Media Research Foundation
Rock the Vote Social Media Sharing, P2P, Bit Torrent
RSS Feeds Social Media Strategies and Tactics
Rumors Social Media Week
Russia Social Network Analysis
Ryan, Paul Social Networking Web Sites
Social Security
S Social Worlds
Sanders, Bernie Sockpuppets
Saturday Night Live Spanish 15M Movement
Schools4All Speak2Tweet
Schumer, Charles Special Interest Campaigns
List of Articles xiii

Spending and Debt, Government U


Spiral of Silence Ubicomp
Splogs Udall, Mark
Sponsored Listings Underbloggers. See Ghost Blogging
Stanford Center for Internet and Society Unemployment
Streaming Media United Nations Global Pulse Initiative and
Streisand Effect Big Data
Strong-Tie Social Connections Versus United States
Weak-Tie Social Connections U.S. Pentagon Social Media in Strategic
StumbleUpon Communications Program
Sunlight Foundation USAID Impact Blog
Superconnected User-Generated Content
Survey Monkey Ushahidi
Syria
V
T Value
Take the Pledge Video Privacy Protection Act
Taxes Viral Marketing
Tea Party Movement Viral Seed/Viral Lift
Technological Determinism Virtual Environment Technology, Immersive
Technological Relativism Virtual Private Networks
Technology Diffusion Paradigm Vitter, David
Television and Social Media Vlogging
Television Personalities and Social Media Vote Different
in Politics VoteBuilder.com
Terrorism Voter Apathy
Third Palestinian Intifada Voter Demographics
38Degrees.org.uk Voter Identification
Thune, John Voter Privacy
Topology of Social Networks Voter Turnout
Tor VoterVault.com
Townhall.com Voting, Global Electronic
Traffic Analysis
Transparency W
Trending Topic Warner, Mark
Trendrr Water.org
Truth Team We the People
Truthout Web Mapping and Online Politics
Truthy Research Project Web Metrics
Tumblr Web 2.0
TuniLeaks.org Weibo
Tunisia Weiner, Anthony
Tweet Insurance West, Allen
Twestival West Wing Week
Twindex WhoIs
Twitter WikiLeaks
Twitter Archiving Project, WikiLeaks/Arab Spring
Library of Congress Wikipedia Misuse
Twitter Diplomacy Wikis and Collaborative Project
TwitVid.com Web Sites
xiv List of Articles

WikiScanner and Political Y


Spin Doctoring Youth Engagement
World Can’t Wait YouTube
World Internet Project YouTube Politics Channel
World Press Freedom Index YouTube War
World Wide Web, History of the
World Without Oil Z
Writers and Social Media in Politics Zuckerberg, Mark
Reader’s Guide

Celebrities and Pioneers in Social Media Forbes, J. Randy


and Politics Franken, Al
Actors and Social Media in Politics Gillibrand, Kirsten
Antibullying Campaigns Grassley, Chuck
Antislavery Campaign and Social Media Gutiérrez, Luis V.
Artists and Social Media in Politics Hagan, Kay
Born This Way Foundation Hatch, Orrin
Musicians and Social Media in Politics Hoyer, Steny
Pioneers in Social Media and Politics Inouye, Dan
Television Personalities and Social Media Issa, Darrell
in Politics Lieberman, Joe
Water.org McCarthy, Kevin
Writers and Social Media in Politics McCaskill, Claire
Zuckerberg, Mark McConnell, Mitch
McCotter, Thaddeus
Congressional Social Media Usage Menendez, Robert
(Most Active Members) Pelosi, Nancy
Bachmann, Michele Pence, Mike
Boehner, John Polis, Jared
Cantor, Eric Portman, Rob
Chaffetz, Jason Price, Tom
Clinton, Hillary Ryan, Paul
Coburn, Tom Sanders, Bernie
Cornyn, John Schumer, Charles
DeMint, Jim Thune, John
Durbin, Richard J. Udall, Mark
Ellison, Keith Vitter, David
Ellmers, Renee Warner, Mark
Fleming, John West, Allen

xv
xvi Reader’s Guide

Measuring Social Media’s Political Impact Push Polling


Amplification Rumors
Clickable Calls to Action Social Media Career Wreckers
Click-Through Rate Sockpuppets
CNN Effect Truthy Research Project
Dragonfly Effect, The Vote Different
Fiscal Cliff Crisis Wikipedia Misuse
Geo-Locational Enabling
Googlearchy and Politics Social Media, Candidates, and Campaigns
Inferring Sentiment Blog for America
Influence on Elections Brave New Films
Innocence of Muslims, The Campaign Strategy
Klout Score Campaigns, Congressional (2000)
Long-Tail Nano-Targeting Campaigns, Congressional (2002)
Meme Mapping Campaigns, Congressional (2004)
Microtargeting Campaigns, Congressional (2006)
MoveOn Effect, The Campaigns, Congressional (2008)
Myth of Digital Democracy Campaigns, Congressional (2010)
Network Influentials Campaigns, Digital
Pew Internet and American Life Project Campaigns, E-Mail
Polarization, Political Campaigns, Grassroots
Polling Campaigns, Organizing
Predictive Analytics Campaigns, Presidential (2000)
Proxy Measurements Campaigns, Presidential (2004)
Psychographics Campaigns, Presidential (2008)
Return on Investment Campaigns, 2012
Search Engine Bias/“Google Bias” Campaigns, Virtual
Search Engine Optimization Candidate Image
Sentiment Analysis Candidates, Political Branding of
Snowball Effect Coattail Effect
Social Authority ContractfromAmerica.org
Social Media Optimization Debate
Social Media Political Gaming DemocracyforAmerica.com
Trending Topic Election Monitoring
Voter Demographics FightTheSmears.com
Voter Turnout Forecasting Elections
Fundly
Misuse of Social Media in the Political Arena: Fund-Raising
Issues and Ethics Long-Tail Nano-Targeting
Al Gore’s Penguin Army Negative Campaigning
Astroturfing Obama for America iPhone Application
Cyber-Vigilantism 140ELECT.com
Decoy Campaign Web Sites Palin Phenomenon
Ethics of Social Media in Politics Political Base
Flaming Political Information Opportunity Structures
Hacktivism Political Parties
Hate Speech, Online and Social Media Social Media Strategies and Tactics
Online Smear Campaigns Sponsored Listings
Phishing, Political Truth Team
Pornography, Revenge VoteBuilder.com
Reader’s Guide xvii

Voter Identification Judaism and Social Media


VoterVault.com Latin America
We the People Lesbian, Gay, Bisexual, and
YouTube Politics Channel Transgender Rights
Middle East
Social Media, Politics, and Culture MIT Media Lab
Addiction, Social Media Mobile Connectivity, Trends in Politics and
Advocacy Groups, Political Branding of Monarchies, Social Media, and Politics
Alpha Blogger Networks, Political
Blogs, Role in Politics News Media
Born This Way Foundation Nonprofit Organizations
Canada 100Reporters Whistleblower Alley
Catholic Church and Social Media Onion, The
Cato Institute Open Society Foundations
Center for Democracy and Technology Open.Dems
Colbert Report, The OpenLeaks
Daily Show, The Participatory Politics Foundation
Data.gov Personal Democracy Media
Democracy Now! Petraeus, David
Diaspora/Migration Political Economy
Digerati Politico
Digital Citizen PolitiFact.com
Digital Government Professional Bloggers
DipNote Race/Ethnicity and Social Media
Domestic Surveillance and Social Media Radical Decentralization
Drudge Report Saturday Night Live
E-Democracy Secondhand Political Engagement
Electronic Voting Social Capital
Europe Social Media Week
Evolution of Social Media Sunlight Foundation
FactCheck.org Television and Social Media
Faith-Based Social Change 38Degrees.org.uk
Focus Groups Truthout
FreeRepublic.com Twindex
Gender Twitter Archiving Project, Library of Congress
Glee Twitter Diplomacy
Global Voices Ubicomp
Hard Place Theater United Nations Global Pulse Initiative
Huffington Post and Big Data
Human Rights USAID Impact Blog
I Am Gonna Be Your Friend Campaign Voter Privacy
i-Docs.org Voting, Global Electronic
Immigration Water.org
Information Abundance Weiner, Anthony
Instagram West Wing Week
International Examples of Political Parties Youth Engagement
and Social Media
International Online Communities Social Media and Networking Web Sites
International Social Media and Politics AARP
Islam and Social Media Avaaz
xviii Reader’s Guide

Bambuser.com Developing Nations


BlackPlanet.com Egypt
Cloud Tiger Media 18DaysinEgypt.com
DailyCaller.com Estrada, Joseph
Delicious.com Fax Machines and Tiananmen Square Crisis
Digg Flash Mobs as a Political Tactic
EdgeRank GetUp.org.au
Facebook Great Firewall of China
Flickr Human Rights
Foursquare Idlenomore.ca
Friendster India
Google+ Indonesia
HeadCount.org International Unrest and Revolution
HootSuite.com Internet Gathering
Infographic Iran
LinkedIn Islam and Social Media
Mashable Israeli–Palestinian Conflict
Meetup.com Libya
Moblog.net Mamfakinch
MOMocrats Mosireen.org
MomsRising.org Near-Me Tabs and Political Protests
Myspace Occupy Movement
OpenCongress.org OhmyNews
OpenGovernment.org OpenTunisia.org
Pinterest Piccadilly Riots, London
Reddit Quebec, Canada, 2012 Student Protests
RightOnline.com Russia
Second Life Seattle 1999 WTO Protests
Snopes.com Speak2Tweet
Social Networking Web Sites Syria
StumbleUpon Tea Party Movement
Survey Monkey Terrorism
Townhall.com Third Palestinian Intifada
Trendrr TuniLeaks.org
Tumblr Tunisia
Twitter United States
TwitVid.com Voter Apathy
Weibo Wikileaks/Arab Spring
Wikis and Collaborative Project Web Sites WikiScanner and Political Spin Doctoring
YouTube YouTube War

Social Media and Political Unrest Social Media and Social Issues,
Arab Spring Activism, and Movements
Asia Activists and Activism, Digital
Bahrain Africa, North
China Africa, Sub-Saharan
Civil Rights American Debt Crisis and Twitter
Cyber-Jihad Anonymous
Cynicism, Political Antibullying Campaigns
Demonstrations, Organizing Antislavery Campaign and Social Media
Reader’s Guide xix

Antiwar Protesting Membership Communications Project


Blood Sport Campaigns Microfinance Initiatives
Bottom-Up Campaigns Military–Industrial Complex
Catholic Church and Social Media MIT Center for Civic Media
Cause-Marketing Campaigns MoveOn.org
Christian Right Nation of Islam Movement
Citizen Journalism National Center for Digital Government
Clicktivism National Freedom of Information Coalition
CODEPINK National Press Club
ColorofChange.org ONE Campaign
Committee to Protect Journalists Open Source Politics
Conflict Resolution, Social Media and Poverty
Corporate Social Responsibility Pro-Choice and Pro-Life
Crowdfunding Project Vote Smart
Digital Diplomacy Public Affairs Council
Digital Due Process Coalition Reporters Committee for Freedom of the Press
Digital Media Law Project Reporters Without Borders
Disaster Relief Robin Hood Foundation
Documentaries, Social Media, Rock the Vote
and Social Change Schools4All
Economic and Social Justice Shot@Life Campaign
Education, Issues in Social Issues Advocacy, Netroots Driven
Electronic Frontier Foundation Social Issues and Augmented Reality
Environmental Issues Social Media Research Foundation
Faith-Based Social Change Social Security
Feb 17 voices Spanish 15M Movement
Flash Mobs as a Political Tactic Special Interest Campaigns
Foreign Policy Spending and Debt, Government
Gender Stanford Center for Internet and Society
Get Out the Vote Drives Take the Pledge
Global Center for Journalism and Democracy Taxes
Global Warming and Climate Change Twestival
Gun Control Unemployment
Health Care Web Mapping and Online Politics
Homophily WikiLeaks
HopeLab World Can’t Wait
I Am Second Movement World Internet Project
Immersive Journalism World Press Freedom Index
Immigration World Without Oil
Indexoncensorship.org
Interactive Advertising Bureau Social Media Concepts and Theories
International Intervention Al Jazeera Effect
Internet Society, The Algorithmic Authority
Islam, Nation of Attention Crash
Judaism and Social Media Audience Fragmentation/Segmentation
Lesbian, Gay, Bisexual, and Transgender Rights Avatars
Liberation Technology Backchannel
London School of Economics Public Policy Group Blog Storm
Media Research Center Blogosphere
Medicare Bounce Back
xx Reader’s Guide

Bounce Back Effect Social Media Noise


Buzz Creation Social Network Analysis
Cognitive Surplus Spiral of Silence
Communication Streisand Effect
Constituencies, Social Media Influence on Strong-Tie Social Connections Versus
Cultivation Weak-Tie Social Connections
Cyberculture Superconnected
Cyclical Message Strategy Technological Determinism
Demand Progress Technological Relativism
Downstream Liability, Political Technology Diffusion Paradigm
Implications of Topology of Social Networks
Earned Media Tweet Insurance
Echo Chamber Phenomenon Value
Findability Viral Marketing
Folksomony Viral Seed/Viral Lift
Framing Theory, Social Media and Virtual Private Networks
Friend-to-Friend Strategies
Gate Keeping Theory and Social Media Social Media Regulation, Public Policy,
Going Viral and Actual Practice
Honeycomb Framework Adbusters Media Foundation
Identity Politics Advertising and Marketing
Legacy Media/Old Media Advocacy Groups, Political Branding of
Luddite Age
Microblogging Amplification
Microtargeting Annette Strauss Institute for Civic Life
Minimal Effects Theory Apple v. Does
Morozov Principle Berkman Center
Multiple Leveraging Blogger Rights and Responsibilities
Myth of Digital Democracy Bookmarking
Opinion Leader Theory CAN-SPAM Act 2003
Opposition Videographer Carnivore
Outparty Innovation Incentives Center for Innovative Media
Persuasion Niche and Political Messaging Center for Internet Studies
Pornography, Revenge Center for International Media Assistance
Primacy Effect Center for Responsive Politics
Real-Time Communication Nodes Center on Public Diplomacy
Recency Effect Change.gov
Remix, Political Change.org
Return on Investment Chartered Institute of Public Relations
Rich Media Ad Social Media Guidelines
Search Engine Data (Use in Social Media Daniel Pearl Freedom of the Press Act
Campaigning) Deep Packet Inspection
Selective Exposure Department of Homeland Security Media
Sexting Monitoring Initiative
Shirky Principle, The Digital Cultures Research Center
Sleeper Effect Dooced
Social Listening ECHELON
Social Media, Adoption of Electronic Privacy Information Center
Social Media, Alternatives to Commercial Estrada, Joseph
Social Media, Definition and Classes of E-Voter Institute
Reader’s Guide xxi

Facial Recognition Technology Center for Social Media


Federal Privacy Act Chat Rooms
Federal Shield Law, Bloggers and Cloud Computing
FinFisher Cloud Protesting
Firewalling Content Communities
Freedom of the Press and National Security Crowdsourcing
Functionality Data Mining
Informationalized Nations Versus Digital Revolution
Industrialized Nations Embedding
Institute for Public Diplomacy and Engagement Advertising
Global Communication Engagement Features
Keystroke Logging Fan Page
Lobbyists Flog
Media and Communication Policy Geotagging
Mobile Media User Data Collection Ghost Blogging
and Privacy Protection Google AdWords/AdSense in Campaign Strategy
Nongovernmental Organizations Hashtag
Office of Government Information Services Information Aggregation
Open Source Governance Innovation and Technology
Oxford Internet Institute Instant Messengers, IRC and ICQ
Pentagon Digital Engagement Team Institutional Cabling
Presidential Policy Directive 20 Interactive Documentary
Press Freedom and Online/Social Media Security Internet Forums
Privacy James K. Batten Award
Public Intellectual John Aubuchon Press Freedom Award
Redalert.com Meme Mapping
Search and Scrape Capability Mobile Apps
Search and Seizure Law and Policy Mobile/Smartphone Messaging
Siri Moblogging
Social Good Summit Open Data
Social Media and Freedom of Information Act Peer to Peer
Transparency Personalization
U.S. Pentagon Social Media in Strategic Picasa
Communications Program Platform
Video Privacy Protection Act Podcasts
WhoIs Predictive Analytics
Pretty Good Privacy
Social Media Types, Innovation, RSS Feeds
and Technology Skype
Aggregation Social Bookmarking
American Enterprise Institute Social Computing and Social
Annette Strauss Institute for Civic Life Information Processing
Anonoblog Social Media Research Foundation
Association of Internet Researchers Social Media Sharing, P2P, Bit Torrent
Big Data Social Worlds
Blog Syndication Splogs
Blogs Streaming Media
Center for Communication and Tor
Civic Engagement Traffic Analysis
Center for Information Technology and Society User-Generated Content
xxii Reader’s Guide

Virtual Environment Technology, Immersive Web 2.0


Vlogging World Wide Web, History of the
Web Metrics
About the Editor

A tenured associate professor and the books to juried academic articles, and
Associate Director of the Center for by her many international academic
Innovative Media in the School of presentations including recent talks
Media and Public Affairs at George at the Oxford Internet Institute and
Washington University, Dr. Ker- at the British Museum.
ric Harvey is also a working play- An award-winning teacher, she
wright and multimedia producer who has been on the George Washington
explores intercultural conflict in a University faculty for just over 20
wide variety of periods and places, years. Harvey worked as a reporter
including real-world, online, and in Native American print journalism;
social media landscapes. She also in research, script development, and
writes about the media arts and cultural arche- production for educational film; in production
types in the public imagination, the anthropologi- and operations in public access television; and
cal effects of new media technologies, digital sto- with the International Documentary unit of the
rytelling, and the relationship between new media Seattle public television affiliate station. Harvey
narratives and political identity. balances her academic career with international
In 1995 she was appointed as one of 33 partici- theater, multimedia, and documentary produc-
pants who constituted a National Science Foun- tions in both physical and virtual spaces. She has
dation task force charged by the Clinton White had her original dramatic work produced profes-
House with setting a 21st-century national research sionally in Scotland; Ireland; New York; Penn-
agenda for Internet issues from the anthropologi- sylvania; Vancouver, Canada; and Washington,
cal perspective. Her research and policy devel- D.C.; as well as having original radio drama aired
opment work during the formative stages of the on Canadian public radio in Halifax, Nova Sco-
Internet era continued with a two-year stint on the tia, and on RTE-One, Ireland’s premiere public
Smithsonian Institution’s Curriculum Initiative radio station, which broadcast her 2001 Driving
Program National Advisory Board. in Ireland as a Play of the Week. She is a member
Her work in new technologies and society con- of the University Film and Video Association, the
tinues through her appointment as a 2012 visit- Irish Film Institute, and the Dramatists Guild of
ing scholar at the University of Oxford’s Bodleian America, as well as a Fellow of the Royal Anthro-
Library, by a host of publications ranging from pological Institute.

xxiii
List of Contributors

Natalia Abuin Vences Lázaro M. Bacallao-Pino


Universidad Complutense CH-CIALC, National Autonomous
Tony E. Adams University of Mexico
Northeastern Illinois University Ingrid Bachmann
Jason Michael Adams Pontifical Catholic University
Grand Valley State University of Chile
Alisa Agozzino Credence Baker
Ohio Northern University Tarleton State University
Sadiya Akram Stijn Bannier
University of Canberra Maastricht University
Gordon Alley-Young Soumia Bardhan
Kingsborough Community College St. Cloud State University
Ines Amaral Boris Barkanov
Instituto Superior Miguel Torga Harvard University
Reynaldo Anderson Michael J. Beatty
Harris-Stowe University University of Miami
R. Bruce Anderson Ralph Beliveau
Florida Southern College University of Oklahoma
LaKesha Anderson Carole V. Bell
Indiana State University Northeastern University
Janelle Applequist Anat Ben-David
Pennsylvania State University University of Amsterdam
Catherine Aquilina Josh Bendickson
Florida Southern College Louisiana State University
Judith Aston Roy Bendor
University of the West of England Simon Fraser University
Robert K. Avery Magdalena Bielenia-Grajewska
University of Utah University of Gdansk, Poland and SISSA, Italy
Hakan Aydogan Rebecca Bishop
Rutgers, The State University of New Jersey Independent Scholar

xxv
xxvi List of Contributors

Rena Bivens Sujin Choi


Carleton University Kookmin University
Jason Edward Black Chandra D. Clark
University of Alabama Florida State University
David Bobbitt Amanda Clarke
Wesleyan College University of Oxford
Samuel Boerboom David E. Clementson
Montana State University–Billings University of Miami
Dieter Bögenhold Joshua Cohen
Alpen-Adria-University Klagenfurt Stanford University
Grant David Bollmer Deborah Elizabeth Cohen
University of Sydney Sogang University
Bradley J. Bond Yosem Companys
University of San Diego Stanford University
Helen Bond Richard S. Conley
Howard University School of University of Florida
Education Earl Conteh-Morgan
Stephanie E. Bor University of South Florida
University of Utah Gary Copeland
Sarah Boslaugh University of Oklahoma
Keenesaw State University Tina Cota-Robles
Johannes Botes Florida Southern College
University of Baltimore Brett J. Craig
Melanie Bourdaa Nazarbayev University
Université Bordeaux 3 Shirley M. Crawley
Ryan Branson Western Connecticut State University
Harris-Stowe State University Andrew Jared Critchfield
Swati Jaywant Rao Bute Communication and Culture Consulting
Institute for Defence Studies and Analyses, Francis Dalisay
New Dehli University of Hawai‘i at Manoa
Francisco Sierra Caballero Emirhan Darcan
University of Seville Rutgers, The State University of New Jersey
Romina Cachia Amber Davisson
Universidad de Sevilla DePaul University
Steven J. Campbell Emiliana De Blasio
University of South Carolina, Lancaster CMCS Luiss
Gordon S. Carlson Antonio de Velasco
Fort Hays State University University of Memphis
Pilar Carrera Carla De Ycaza
Universidad Carlos III de Madrid New York University
Catherine Cassara David DeIuliis
Bowling Green State University Duquesne University
Pablo Castagno Jeffrey Delbert
Universidad Nacional de La Matanza Lenoir-Rhyne University
Jeanette Castillo Wendy Dent
Ball State University University of Southern California
Leslie Caughell Benjamin W. L. Derhy Kurtz
Virginia Wesleyan College University of East Anglia
Jacquelyn Chinn Tiffany Derville Gallicano
Texas A&M University University of Oregon
List of Contributors xxvii

Philip Di Salvo Mike Friedrichsen


Università della Svizzera italiana Stuttgart Media University
Larry Diamond Janie Fritz
Stanford University Duquesne University
Michael Dick MacKenzie Gailey
University of Toronto Florida Southern College
Dimitra Dimitrakopoulou Deborah Gambs
Aristotle University of Thessaloniki Borough of Manhattan Community College,
John Dolan City University of New York
Pennsylvania State University Bradley A. Gangnon
Aziz Douai Arts Institutes International
University of Ontario Alberto Garcia Garcia
Sarah A. Downey Complutense University of Madrid
Independent Scholar Dustin Garlitz
Delia Dumitrica University of South Florida
University of Calgary Charlotte Lucy Garraway
Catherine Easton Texas A&M University
Lancaster University Carolyn Garrity
Justin Eckstein Birmingham-Southern College
University of Denver Sherice Gearhart
Jennifer Edwards University of Nebraska at Omaha
Tarleton State University Matthew Geras
Anthony C. Edwards Florida Southern College
Tarleton State University Paolo Gerbaudo
el-Sayed el-Aswad King’s College London
United Arab Emirates University Hannah Gifford
Jennifer Epley Florida Southern College
Texas A&M University–Corpus Christi Homero Gil de Zúñiga
Ben Epstein University of Texas at Austin
DePaul University Mark J. Glantz
Daniel C. Faltesek St. Norbert College
Oregon State University Debra Glassco
Paul Falzone Rutgers, The State University of
Independent Scholar New Jersey
Anna Feigenbaum Simon Gottschalk
Bournemouth University University of Nevada, Las Vegas
Eran Fisher Tommaso Gravante
Open University University of Seville
Katherine R. Fleck Matthew J. Gritter
Ohio Northern University Angelo State University
Courtney V. (Vail) Fletcher Tracy Groenewegen
University of Portland University of British Columbia
Jaime R. S. Fonseca Anastasiia Grynko
Technical University of Lisbon National University of Kyiv–Mohyla
Sean D. Foreman Academy
Barry University Darin Gully
Lisa Foster Ithaca College
University of Oklahoma Chao Guo
Lucas G. Freire Indiana University Purdue University–
University of Exeter Indianapolis
xxviii List of Contributors

Justin D. Hackett Susan Jacobson


California University of Pennsylvania Florida International University
Alem Hailu Isidro Maya Jariego
Howard University College of Arts University of Seville
and Sciences J. Jacob Jenkins
Ernest A. Hakanen California State University Channel Islands
Drexel University Manel Jiménez-Morales
Michael Hammer Universitat Pompeu Fabra
University of Georgia Janet Johnson
Kyle A. Hammock University of Texas at Dallas
Knox College Wilson R. Kaiser
Josh Hanan Jacksonville University
Univeristy of Denver David A. Karpf
Jason Hannan George Washington University
Northwestern University Kelly Kaufhold
Summer Harlow Texas Tech University
University of Texas at Austin Anandam Kavoori
Kandace Harris University of Georgia
Clark-Atlanta University Ahmet Kaya
Dominique Harrison Rutgers, The State University of New Jersey
Howard University Chun-Sik Kim
William Hart Hankuk University of Foreign Studies
Norfolk State University Spencer H. Kimball
Val Hartouni Emerson College
University of California, San Diego Jeremy Kleidosty
Jason A. Helfer University of St. Andrews
Knox College Jon Klos
Marion Jeanette Herbert Florida Southern College
Independent Scholar Randolph Kluver
Brian Heslop Texas A&M University
University of Memphis Anna Klyueva
John Hickman University of Oregon
Berry College La Loria Konata
Arne Hintz Georgia State University
Cardiff University Piotr Konieczny
R. Lance Holbert University of Pittsburgh
Ohio State University Tetiana Kostiuchenko
Daniel Holgado National University of Kyiv-Mohyla Academy
Departamento de Psicología Social Bill Kte’pi
Universidad de Sevilla Independent Scholar
Mohammed Ibahrine Joanna Kulesza
American University of Sharjah University of Lodz
Brandon M. Inabinet Chenjerai Kumanyika
Furman University Pennsylvania State University
Ece Inan Matthew J. Kushin
Girne American University Shepherd University
Chris Ingraham Jennifer L. Lambe
University of Colorado Boulder University of Delaware
Daniel Jackson Patricia G. Lange
Bournemouth University California College of the Arts
List of Contributors xxix

Karla Lant Tamara Martsenyuk


Northern Arizona University National University of Kyiv-Mohyla
Mark C. Lashley Academy
University of Georgia Ryan McGrady
Regina Lawrence North Carolina State University
University of Texas–Austin Kelly A. McHugh
Danielle Lawson Florida Southern College
Edinboro University Heather McIntosh
J. Roselyn Lee Boston College
Ohio State University Stefania Milan
Megan A. Lee Tilburg University
Knox College William J. Miller
Jooyeon Lee Flagler College
University of Leeds Diane M. Monahan
Lara Lengel Saint Leo University
Bowling Green State University Aaron J. Moore
Cathy Leogrande Rider University
Le Moyne University Mel Moore
Christopher Leslie University of Northern Colorado
Polytechnic Institute of New York Jessica L. Moore
University Butler University
Koen Leurs Marco Morini
Utrecht University Macquarie University
Jenifer L. Lewis Yvonne Mulhern
Nazarbayev University Tarleton State University
Eric Liguori Paul Murschetz
California State University, Fresno University of Salzburg
Darren G. Lilleker Siho Nam
Bournemouth University University of North Florida
Min Liu Heather Nance
Southern Illinois University, Texas Tech University
Edwardsville Sorin Nastasia
Kim Lorber Southern Illinois University Edwardsville
Ramapo College of New Jersey Meredith Neville-Shepard
Sarah Maben University of Kansas
Tarleton State University Ryan Neville-Shepard
Kristen L. Majocha Indiana University–Purdue University
University of Pittsburgh at Johnstown Columbus
Steven Malcic Joyce Neys
University of California, Santa Barbara Erasmus University Rotterdam
Rick Malleus Konrad Ng
Seattle University Smithsonian Institution
Jimmie Manning Gage Nicholas
Northern Illinois University Florida Southern College
Francisco Paulo Jamil Almeida Marques Gwendelyn S. Nisbett
Federal University of Ceará University of North Texas
Terry Marsh Safiya Umoja Noble
Norfolk State University University of Illinois at Urbana-Champaign
Marcienne Martin José-Manuel Noguera-Vivo
Université de La Réunion Catholic University of San Antonio
xxx List of Contributors

Alison N. Novak Jennifer J. Richardson


Drexel University Southern Vermont College
Eric J. Novotny LaChrystal Ricke
American University Sam Houston State University
Patricia Núñez Jason Roberts
Complutense University Quincy College
Pamela C. O’Brien Michelle Rodino-Colocino
Bowie State University Pennsylvania State University
Timothy J. O’Neill Leocadia Díaz Romero
Southwestern University Independent Scholar
Jonathan A. Obar Devan Rosen
University of Toronto Ithaca College
Magdalena Olszanowski Nathaniel T. Rosenberg
Concordia University Knox College
Sule Yüksel Özmen Rafal Rybak
Karadeniz Technical University Northeastern Illinois University
Jeremy Packer Magdalena Saldana
North Carolina State University University of Texas–Austin
Yong Jin Park Sergei Samoilenko
Howard University George Mason University
Han Woo Park Eric C. Sands
Yeungnam University Berry College
Sung Gwan Park Kim Sawchuk
Seoul National University Concordia University
Justin Paulette Lisa Saye
Independent Scholar Independent Scholar
Shayne Pepper Dan Schill
Northeastern Illinois University Southern Methodist University
Kaitlyn Pettet Hans C. Schmidt
Berry College Pennsylvania State University–Brandywine
Alexander E. Pichugin Jason Schmitt
Rutgers, The State University of New Jersey Green Mountain College
Georgia Piggot Stephen T. Schroth
University of British Columbia Knox College
Mihaela Popescu Gilson Schwartz
California State University, San Bernardino University of São Paulo
Colin Porlezza Sónia Pedro Sebastião
Università della Svizzera italiana ISCSP, Technical University of Lisbon
Narissra Maria Punyanunt-Carter Marc-David L. Seidel
Texas Tech University University of British Columbia
Mark A. Rademacher Donatella Selva
Butler University Luiss University of Rome
Veena V. Raman Emily Shaw
Pennsylvania State University Thomas College
Leslie Regan Shade Fei Shen
University of Toronto City University of Hong Kong
Marie-Eve Reny Tamara Shepherd
University of Chicago Ryerson University
Leslie Reynard Kaia N. Shivers
Washburn University Rutgers, The State University of New Jersey
List of Contributors xxxi

Carlos Nunes Silva David B. Tindall


University of Lisbon University of British Columbia
Maria Anne Simone Catalina L. Toma
Rowan University University of Wisconsin–Madison
Aram Sinnreich Chiara Valentini
Rutgers, The State University of New Jersey Aarhus University, Business and
Jörgen Skågeby Social Sciences
University of Stockholm Sebastián Valenzuela
Alexandra Nutter Smith Pontificia Universidad Católica de Chile
University of Washington–Tacoma Damien Van Puyvelde
Melissa M. Smith University of Texas at El Paso
Mississippi University for Women Karrin Vasby Anderson
Latisha Smith Colorado State University
Harris-Stowe State University Andreas Veglis
Christina M. Smith Aristotle University of Thessaloniki
California State University, Channel Islands Anastasia Veneti
Nicole E. Snell University of Athens
Bentley University Daniela Vicherat-Mattar
Meghan R. Sobel Leiden University College, The Hague
University of North Carolina at Raquel Vinader Segura
Chapel Hill Complutense University of Madrid
Hanna Söderbaum Cindy S. Vincent
Uppsala Universitet University of Oklahoma
David Spiegel Beth M. Waggenspack
Institute for Advanced Study Virginia Tech
Ralf Spiller Don J. Waisanen
Macromedia University for Media Baruch College, City University
and Communication of New York
Carmen Stavrositu Camille Walfall
University of Colorado at Colorado Springs Howard University
Keri K. Stephens Jefferson Walker
University of Texas at Austin University of Alabama
Maria G. Stover Kevin Wang
Washburn University Butler University
Ingrid Sturgis Jennifer Ware
Howard University North Carolina State University
Jennifer Summary Ann Warmuth
Southeast Missouri State University Independent Scholar
Chit Cheung Matthew Sung Christine Rose Warne
Lancaster University Florida Southern College
Molly Swiger Yael Warshel
Baldwin-Wallace University University of California, Los Angeles
Saman Talib Andrew J. Waskey
Humber College Dalton State College
Rhon Teruelle Brian E. Weeks
University of Toronto Ohio State University
Doug Tewksbury Adele Weiner
Niagara University Metropolitan College of New York
Neal Thomas Jeremy Weinstein
University of North Carolina–Chapel Hill Stanford University
xxxii List of Contributors

David Weiss Jina Yoo


University of New Mexico University of Missouri, St. Louis
Jennifer Whitmer Jillian C. York
University of Nevada, Las Vegas Independent Scholar
Terry Winograd William Lafi Youmans
Stanford University George Washington University
Tony E. Wohlers Dzmitry Yuran
Cameron University University of Tennessee
John R. Wood Yuliya Zabyelina
Rose State College Masaryk University
Todd Woodlan Lorenzo Zamponi
University of California, San Diego European University Institute
Rhonda Louise Wrzenski Jason Zenor
Indiana University, Southeast State University of New York, Oswego
Shuang Iris Xia Weiwu Zhang
Texas Tech University Texas Tech University
Masahiro Yamamoto Pei Zheng
University of Wisconsin–La Crosse University of Texas at Austin
Qingjiang Yao
Fort Hays State University
Introduction

“Politics,” it has been said, “is a practical art.” In increasingly ubiquitous; and (3) we do not know
the early years of the 21st century, it is also a tech- nearly as much about it as we would like.
nological one. The explosion of “social media” But in the short time since the Internet opened
into the American political process began with to commercial exploitation, the modifier industrial-
the Internet’s entrance on the voting scene around ized itself has lessened in relevance as a useful crite-
2004, when Facebook debuted on American cam- rion for sorting nation-states into their traditional
puses as a kind of “cruising and schmoozing” net- First, Second, and Third World categories. This
work, and Howard Dean ramped up his earlier taxonomy depends, increasingly, on what I call a
success at Internet fund-raising to a fever pitch. nation’s relative degree of “informationalization”
Now, in late 2013, social media of many types instead—the ability to collect, generate, store,
are exploding across the political landscape, with transmit, interpret, share, and/or hoard data per
unforeseen and, to some extent, still unknown se. A second important signature trait, as a signi-
eventual effects. Their impact on the political pro- fier of First World status, is the capability to build,
cess has eclipsed even that of the Internet, if one acquire, maintain, and deploy the technology that is
measures in terms of the sheer volume of messag- required to manage, mine, and maximize informa-
ing they carry, and they have achieved this promi- tion, including but not limited to “Big Data” sets.
nence in a much shorter time than the 30 years it In the era of “Big Data” and the information indus-
took the Internet itself to rise to its current status tries, it makes much more sense to divide the world
as a taken-for-granted tool in mainstream politics. into “informationalized,” “emerging,” “hybrid
Electronic voting, Internet campaigning, prolif- industrial/informational societies,” and “noninfor-
erating political use of tweeting and texting, blog- mationalized” sectors instead of relying exclusively
ging and vlogging, online polling and Facebook on the old standards related to manufacturing and
“friends” all hawking their favorite candidate, industrialization. The changes implicit in this para-
issue, or policy point: For better and for worse, elec- digm shift are indicative of just how profound a
tronica has infiltrated the American political pro- societal transformation has resulted from the com-
cess in a way that, some argue, actually re-shapes bined effects of social media and contiguous digi-
it. This is the case despite three bedrock realities tal, mobile, and online technologies.
about the political use of social media, which are This new way of thinking about “data” as a
that (1) it gets more sophisticated, nuanced, and harvestable crop has profound implications for all
potentially invasive almost constantly; (2) it is aspects of collective life, even if they are not the

xxxiii
xxxiv Introduction

implications one might expect or predict. It could regional distinctions can complicate any simple
be argued that the most significant anthropologi- answer. “True” social media success depends on
cal paradigm shift of the late 20th and early 21st who and how many people retrieve what one
centuries is the changing relationship between sends out, not on pre-identifying at whom one
human beings and the electronic devices designed aims a particular message. “Aims” in the techni-
to serve them. This is especially true of communi- cal, not the functional, sense of that word: Twit-
cations and media electronica, beginning with the ter users may not actually address their messages
Internet’s transition to a public entity in 1996 and to specific receivers, but they do go to enormous
continuing through to the near ubiquitous pres- lengths and great pains to craft the kind of regular
ence of today’s mobile personal communications tweet stream content and Twitter profile that will
like cell phones, BlackBerries, and tablets, and the draw the attention of the kind of person they want
social media they both spawn and support. New to reach. In this way, some of the social media rep-
media pioneer Nicholas Negroponte, famous as licate the audience attraction model employed by
one of the founding members of MIT’s 1980s broadcast television and radio, while they actually
Media Lab, captured the enormity of this para- invert the “known caller” principle of person-to-
digm shift when he wrote: “Computers are not person technologies like the telephone.
about computing any more. They are about life.” Once we start digging, it becomes easy to see
In much the same way, “personal” media are why there is a lot of debate about what actually
not about personal life any more. They are about constitutes the social media. Does e-mail count?
the tensions between cultural, social, and eco- How about reposting modalities, which do not
nomic change and stability, stretching all the way add anything new to the actual content but which
from the small crises and triumphs of suburban enjoy an aura of personal endorsement by the
households to the mammoth ambitions of collec- simple fact that someone found it worthy of send-
tive governance. They are about people and insti- ing forward to his or her followers? How about
tutions connecting with each other in virtual ways, sites like Reddit, that connect candidates and vot-
with the side effect of dodging each other in the ers in a kind of large-scale electronic conversa-
flesh. They are about reinventing the workplace, tion? Or Tumblr, or Pinterest, and other similar
redefining journalism, revolutionizing commerce, “pastiche platforms,” which can provide a highly
education, medicine, and consumer identity. They textured portrait of a public figure’s preferences
challenge conventional ways of teaching, learn- in music, art, theater, food, literature, current fads
ing, parenting, dating, filing taxes, staying well, and fashions, as well as his or her informal com-
planning travel, finding a plumber, understand- mentary on assorted political topics of the day?
ing the world, governing the country. They have What about YouTube? Texting? Even blogging,
changed, and continue to change, the practice, a new media format that has already seen heavy
the process, the philosophy, and perhaps the very action as a vehicle for political expression, explo-
nature of politics. This encyclopedia is an attempt ration, and opinion-sharing?
to capture, describe, and contextualize the elu-
sive leading edge of this phenomenon, which has Signature Traits of the Social Media
already demonstrated its ability to generate very Given the challenges involved with defining social
concrete effects on 21st century self-governance. media according to their technical design and/or
Some of the challenges it faces in achieving that functionality, it might be useful to approach the
goal reflect the unique nature of the social media question from the other direction, and to describe
themselves. the social media in terms of their characteristics as
experienced by users within the new media mix,
Defining “Social Media” in the Political Sphere especially as those user impressions might relate
Defining the “social media” is not nearly as cut- to political activity. I would like to suggest that
and-dried as may first appear, and depends, in part, social media, per se, exhibit the following specific
on cultural geography. Europeans approach sev- characteristics, in varying degrees and with differ-
eral of these issues very differently than do North ent applications, depending on the use context in
Americans, and even within this continent alone, which they are situated.
Introduction xxxv

• Social media are technologically organized computer industries, opening the door to the bar-
as one-to-many transmissions but are rage of social media inventions and applications
experienced as one-to-one, peer-to-peer that followed.
communications. Turning points in this journey include 1991,
• Social media feel personal, even if they when the Internet expanded into the World Wide
are not. Web as a free public resource; the 1992 Clinton-
• Social media proliferate organically Gore and the 1996 Bob Dole campaigns’ use of
according to their salience for social net- the Internet as voter outreach tools; the 1999
work users and their perceived relevance decision by the Federal Elections Commission
to topics of the day. enabling online credit card donations to qualify for
• Social media proliferation can also be the federal matching funds; John MCain’s and How-
result of institutional (and sometime indi- ard Dean’s early successes at online fund-raising
vidual) manipulation via the use of social in 2000 and 2003 to 2004, respectively; Barack
media optimization tools, search engine Obama’s now-legendary 2008 and his more recent
optimization strategies, and wikis. 2012 presidential victories, both watershed events
• Social media messages are short, to the for using social media as ways to enhance—and
point, usually personal, and often extremist. in some cases, reinvent—virtually every aspect of
• Social media encourage a communication running for office; and the crucial role played by
context in which the usual rules do not social media in establishing the Tea Party, as it
apply. morphed from a loosely connected group of disaf-
• Social media appear to level the political fected voters into a serious political entity capable
playing field, even if they do not. of challenging the Republican Party for the loy-
• Social media content travels. alty of a coalition of unhappy conservative voters,
• Social media create a sense of community. as well as some disaffected “independents” and a
• Social media are instantaneous, and thus smattering of restless Democrats.
seemingly spontaneous, expressions of The 2012 race for the White House saw social
belief, opinion, observation or experience. media grandmaster Barack Obama and Repub-
• Social media are fun. lican challenger Mitt Romney both capitalizing
• Social media can be dangerous. on every type of social media outlet, channel,
venue, and platform available, from Pinterest to
Social Media and Candidate Politics: YouTube to brand new virtual campaign applica-
Game-Changers and Go-Getters tions that gave them access to the full spectrum of
In the days when the Internet was a fairly recent voters’ online behaviors and preferences, allow-
post-Advanced Research Projects Agency (ARPA) ing political strategists to microtarget potential
phenomenon, the idea of using it for any type supporters with the same efficiency—and privacy
of buying or selling was faintly heretical; it was intrusion—as, say, commercial interests such as
perceived as a way for scholars and researchers Amazon.com or Walmart.
to collaborate across time and space rather than
as any sort of “public highway” or shared social Measuring Social Media Political Impact
space. Only during the halcyon days following the A unique and ubiquitous aspect of the social
passage of the Telecommunications Act of 1996, media/politics relationship is the degree to which
which in its own right represented a radical rever- theory is vastly outstripped by practice. There is
sal of the notion of telecommunications, per se, as not complete academic consensus about social
a public resource more than a private enterprise, media’s impact in the political sphere and the
did the privatization of the Internet and its com- best ways of measuring it—but by the time this
panion activities really take off. encyclopedia hits the bookshelves (or the spec-
In the online land rush that followed, spectrum trum), there might be. Trying to get a clear look
space and technical resources were obtained and at social media’s “real” impact on the sociocul-
positioned by private interests such as cell phone tural infrastructure is like trying to nail down
service providers and the emerging personal water—as impossible to achieve as it is frustrating
xxxvi Introduction

to attempt. And yet, attempt it we must, if for no as long as the context surrounding it remains sta-
other reason than to get traction on its palpable ble, but a “good question,” to paraphrase the tag-
effect on the permanent gears of social machin- line of the diamond industry, is forever.
ery—like voting, for instance. We must find ways This, then, is a kind of “20 questions” laundry
to see it clearly, even if the ability to capture it in list of some main questions and concerns, debates
accurate numbers and meaningful measurements and discussions about the political role, nature,
might elude us. Although it is a natural candidate impact, and future of social media in the current
for ethnography, quantitative material about the American political environment:
social media is more highly prized because it is the
most immediately useful for those who study and 1. Do the social media really level the political
who deploy them in the political arena, for the playing field?
simple reason that the stakes involved in social 2. Do social media favor incumbents or
media political deployment always come bundled challengers? How does this play out in
in quantitative form, like what something costs particularly close elections?
in terms of dollars and what it might yield in the 3. Will the social media replace, augment, or
number of added votes it might garner. operate independently of traditional media
On a slightly different note, the modern-day in the political process?
Tea Party, a splinter group within the Republican 4. How do we know which of the social media
Party which erupted onto the national political are a passing fad and which are here to stay?
landscape in 2008 and moved into mainstream 5. Will the social media literally transform the
status with the 2010 midterm election, relied very political process?
heavily on Twitter, Facebook, and related social 6. What demographics most accurately
media as they deliberately distanced themselves characterize different social media
from traditional conservatives and formed their constituencies, and to what degree do
own political agenda and developed the party these correspond to conventional political
organization to promote it effectively. constituencies?
Measuring social media’s political impact, 7. How can social media impact be measured
then, is clearly just as much of an art as it may in the political arena?
be a science, whether that “measurement” comes 8. Do people actually trust social media as a
couched as actual numbers, or is assessed in terms source of political information?
of the likely result of specific political dynamics in 9. To what degree, if any, will social media
which the social media may have figured. Pursu- replace face-to-face political discourse,
ing and refining accurate and usable social media dialogue, and action?
measurement techniques will no doubt rank high 10. What privacy issues are involved with
on the “to-do list” of political managers and the harvesting and mining of personal
activists in the days, and in the elections, and in information when using social media for
the public debates yet to come. campaigns or in social issues initiatives?
11. How do the social media compare with
Contemporary Issues: Social Media legacy media in affecting public opinion?
in a Political Context 12. Whose voice(s) dominate the social media
In light of everything we have discussed about the landscape, why is that so, and what does it
mercurial and elusive nature of the social media mean?
throughout this essay, it seems fitting to frame the 13. Are the social media capable of actually
issues surrounding their current incarnation as creating new political relationships and
points of salient inquiry rather than as statements attitudes, or do they merely reinforce and/
of permanent fact. If there is one constant attri- or reconfigure existing ones?
bute shared by all of them, it is the penchant for 14. Do the social media contribute to political
change, a feature that suggests the issues surround- polarization?
ing their deployment in the political atmosphere 15. Do different types of people respond to
will change as well. A “good answer” is only valid and/or use, create, and deploy social media
Introduction xxxvii

political content in different ways and for to vote . . . and 34 percent [of social media users]
different purposes? have used the tools to post their own thoughts or
16. Do the social media really empower comments on political and social issues.”
grassroots organizations and political “Smart phone users now spend as much time
entities, and, if so, what are the most using social networking apps such as Twitter and
effective strategies for capitalizing on that? Facebook as they do playing games,” Pring also
17. What codes of best practices should reports, a use change that will factor heavily in
and/or could be developed for social upcoming American politics if another social
media campaigning, outreach, and voter media expert, Tomi Ahonen, is right in his pre-
education, and who should be liable when diction about the mobile industry becoming the
breaches occur? dominant player on the global scene.
18. How are the social media changing the At first glance this seems like an extreme and
fund-raising process in political action and somewhat exaggerated bit of technological crys-
candidate politics? tal ball gazing, until one realizes the base num-
19. Do the social media make possible some bers from which Ahonen’s prediction is made.
forms of political action, expression, Almost 6 billion active mobile phone accounts
organization and public influence that already exist worldwide, although once they are
simply could not otherwise exist? parsed for people with more than one account,
20. Is that a good thing across the board, that figure reduces to something like 4 billion
or should the social media be somehow unique mobile phone users, still a stunning num-
licensed and/or regulated, as was the case ber when one considers that the world’s 2013
with earlier forms of electronic media, and, population is only around 7 billion. As has been
if so, who should do this? the case historically, the world’s population
keeps increasing, but what is new on the histori-
Looking Forward cal scene is that the proportion of that popula-
In October 2012, the much-respected Pew tion that is hooked to social media keeps increas-
Research Center’s Internet and American Life ing as well.
Project reported that 60 percent of adult Ameri- Social media’s continuing trajectory into the
cans use at least one type of social media, and heart of American politics is not just about mobile
that of that 60 percent, approximately 66 percent telephony. A November 2012 Pew report revealed
have widened their everyday use to include politi- that “55 percent of registered voters have watched
cal activity, ranging from low-investment action political videos online this election season, and
like using social media as a platform for sharing 52 percent have had others recommend political
their own political opinions and listening to oth- videos for them to watch online” (November 2,
ers, all the way to forming groups and organiza- 2012), and that around 10 percent of people who
tions that take civic action in the physical world, donated money to the 2012 presidential candidates
an expression of the kind of deep commitment to did so via a text message or cell phone “app.”
political matters that was debated so hotly in the The people who run campaigns are not wait-
Malcolm Gladwell–Clay Shirky discussions. ing for the academy to make up its mind about
These statistics about increased public use the efficacy of social media in getting their can-
of social media as a political resource become didates into office. They are just going out there
even more significant when they are contextual- and doing it, and they are doing it at warp speed.
ized within the escalating use of social media, in Certainly, they dial into academic research on the
general. Social media alpha-blogger Cara Pring topic, and often commission their own studies on
noted in February 2012 that “Social network- preferred ways and means, but they are willing to
ing is still the fastest-growing active social media leap into a kind of raging torrent of best guesses
behavior online,” an observation made politically about the best practices for using the social media
important by the Pew Internet and American Life to win political contests at all levels of gover-
(2012) finding that “35 percent of social media nance. And that means that this encyclopedia and
users have the tools to encourage [other] people other reference works like it are best understood
xxxviii Introduction

as compasses rather than as maps in the social collection now numbering in the billions, which is
media journey. not surprising since, according to TechCrunch, in
Inspired by CQ Researcher (www.cqresearcher 2013 “we see a billion tweets every 2.5 days.” In
.com), another product in the SAGE family of acquiring the entire public Twitter record since the
publications, we even undertook our own research medium’s inception, the library has in one bold
for the table of 2013 Congressional Social Media stroke rewritten the seriousness with which resi-
Use. The table, which contains material that is dents of today’s digital era will perceive this most
unavailable anywhere else because we actually notoriously trivial social media modality.
generated it, illustrates the particulars of how Of course, Twitter was moving toward acquir-
our national leaders use different types of social ing an impressive amount of political gravitas
media as part of their work on Capitol Hill. anyway, as it became more and more of a central
In 1995, I had the very great honor and the sin- presence in sequential rounds of national elec-
gular experience of being part of a National Science tions. But to have a world-class institution like
Foundation Task Force convened by the Clinton the Library of Congress acclaim a medium named
White House. We were handed the Herculean task after “inconsequential chatter” as a “unique
of developing an anthropological research agenda record of our time,” as Bill Lefurgy, the library’s
on Internet issues for the next 100 years. That was digital initiatives program manager, told the Fed-
our mandate, almost verbatim, and we took it very eral News Radio Network, sends a signal that is
seriously, especially since we only had three days in cultural as much as it is political.
which to do it. After being locked in the basement The message is simple, and stunning, and it
of the St. James, a Washington “grand dame,” we pushes social media per se into a new class of cul-
eventually consumed enough coffee and donuts to tural significance from which it will now never
come up with an agenda for, at least, kicking off retreat. The message is this: Even the most light-
that mammoth undertaking. (There is, of course, footed of today’s social media modalities carries
both a federal report and a scholarly publication enough political clout and contains enough social
attesting to this.) But we thought the tidal wave and cultural value to take its place in the Ameri-
of cultural change we saw coming was all about can archive of record, a public resource of global
the Internet, and that was engulfing enough. No as well as national excellence, which has at its
one had a clue that something even more totalizing core the personal library of U.S. political icon and
was just around the virtual corner . . . and not a former president Thomas Jefferson. Because it is
one of us would have predicted how very quickly Jefferson’s own collection that formed the nucleus
that technological torrent would froth over into all of the Library of Congress, when he willed his
aspects of American life. beloved cache of personal books to the fledgling
In the course of my own research on new nation as a lasting legacy. And now that cache
technology, culture, and the political process, it will share digital shelf space with Twitter.
has recently come to my attention that the U.S. One cannot help but wonder what Thomas
Library of Congress now archives Twitter. The Jefferson would have to say about that. Could
rationale behind this is that Twitter represents a he express it adequately in only 140 characters?
one-of-a-kind cultural resource. The library press But it is still a good question, the kind of question
release announcing the project explained the that might elicit brief enough answers that they
thinking behind this seemingly quixotic decision: could eventually find their way into the American
“The Twitter digital archive has extraordinary Twitter archive at the Library of Congress. Even
potential for research into our contemporary way better yet, the question itself might be provocative
of life,” said Librarian of Congress James H. Bil- enough, intriguing enough, quixotic enough, and
lington. “This information provides detailed evi- most of all, short enough . . . to go viral.
dence about how technology based social networks And what, I wonder, would Thomas Jefferson
form and evolve over time. The collection also doc- make of that?
uments a remarkable range of social trends.”
Every public tweet since Twitter’s launch in Kerric Harvey
March 2006 has been carefully preserved in a digital Editor
Chronology

1945: In his essay “As We May Think,” published 1969: The ARPANET, a forerunner of the Inter-
in the Atlantic Monthly, Vannevar Bush argues for net, transmits a message from computers at Bolt
creation of a collective memory, which he called Beranek Newman in Massachusetts to computers
the memex, to facilitate and augment the pow- at Stanford University and the University of Cali-
ers of human thought by storing and organizing fornia, Los Angeles (UCLA), in California.
information; this essay is often cited as the first
to suggest the properties later realized through 1969: CompuServe becomes the first major com-
hypertext. mercial Internet service provider in the United
States, using dial-up technology; it remains a
1946: AT&T establishes the first mobile tele- dominant player in the field through the 1980s.
phone network, making mobile telephone calls
possible, although the equipment required was so 1971: Ray Tomlinson develops the first network
cumbersome that it was only practical if installed e-mail program, and specifies the “@” symbol to
in a vehicle (a truck driver placed the first mobile indicate the Web address.
phone call on June 17, 1946).
1972: Two information services, Dialog (Lock-
1962: J. C. R. Licklider articulates the basic con- heed) and the Don Jones-Bunker Ramos News
cepts behind the Internet in a memo in which Retrieval Service, go online.
he discusses the possibilities of what he calls the
“Intergalactic Computer Network.” 1973: The ARPANET establishes connections with
computers in the United Kingdom and Norway.
1965: AT&T launches an improved mobile phone
system, transmitting signals over radio channels. 1973: Motorola produces a prototype handheld
Demand for the service far exceeds the capacity of mobile phone; previous mobile systems were so
the channels to carry signals. large they had to be used in vehicles.

1967: Jef Raskin coins the term QuickDraw in 1973: The Xerox Alto, a computer intended for
his Penn State University doctoral thesis on the personal use, is developed at the Xerox Palo Alto
GUI (graphical user interface). Research Center; among its innovations are the

xxxix
xl Chronology

graphical user interface (GUI) and the computer the use of familiar extensions such as .com, .org,
mouse. .edu, and .mil.

1974: The first chat room is created at the Univer- 1983: The DynaTAC mobile phone, created
sity of Illinois by Doug Brown and David Roolley. by Ameritech, becomes available in the United
States. The first world’s first commercial portable
1974: In a conference paper, Vinton Cerf and Rob- handset cell phone, the device was developed by
ert Kuhn become the first to use the term Internet. the now-defunct Ameritech and sold by Motorola
for $3,995 per phone.
1974: Theodore George Paraskevakos, a Greek
immigrant to the United States, is granted a patent 1983: The ARPANET divides into two networks:
for an “apparatus for generating and transmitting MILNET (to serve military purposes) and ARPA-
digital information,” laying the groundwork for NET (to serve research purposes).
the smartphone.
1984: The AT&T Bell telephone system, a gov-
1976: Before there was even an Internet, Queen ernment sanctioned monopoly since 1913, is
Elizabeth II of Britain sent her first e-mail as part broken up into seven regional holding compa-
of a network technology demonstration put on nies (Baby Bells), in accordance with the 1982
by the British military and research community. It U.S. District Court decision in the antitrust case
was sent over ARPANET. She is reputedly the first United States v. AT&T.
head of state to use the medium.
1984: The Prodigy online service begins operation;
1976: Presidential hopeful Jimmy Carter and his by 1990 it becomes the second-largest U.S. Inter-
potential vice president, Walter Mondale, use net service provider, second only to CompuServe.
e-mail to coordinate campaign event planning.
1985: Quantum Computer Services launches
1978: The Advanced Mobile Phone System, an Q-Link, an online service; the company renames
analog cellular system, is introduced in the United itself America Online (AOL) in 1991.
States.
1985: The WELL (the Whole Earth ’Lectronic
1978: In February, Ward Christensen and Randy Link), an early virtual Internet community, is cre-
Suess create the first public bulletin board system ated by Stewart Brand and Larry Brilliant.
(BBS), allowing users to make online postings.
1985: Lloyd Bentsen coins the term astroturfing
1978: The first virtual world, Multi-User Dun- to refer to organized political campaigns that
geon (MUD1), is created at Essex University in attempt to hide the sources of their funding and
the United Kingdom. present themselves as grassroots efforts.

1979: In Tokyo, Japan, the first commercial auto- 1987: Apple Computer includes HyperCard,
mated cell telephone network begins operation. originally called WildCard, an early hypermedia
system, on all new Macintosh computers.
1980: The Usenet begins operation; it allows users
to post messages to online newsgroups organized 1988: An Internet “worm” created by Robert
around different topics. Tappan Morris infects an estimated 10 percent
of Internet hosts; Morris became the first person
1981: The IBM PC (personal computer) is convicted under the 1986 Computer Fraud and
introduced. Abuse Act.

1983: The domain name system (DNS) is devel- 1989: Tim Berners-Lee, working at CERN (the
oped at the University of Wisconsin, including European Organization for Nuclear Research),
Chronology xli

proposes the protocol for distributing information Web,” but the title is later changed to Yahoo!; by
that is eventually used in the World Wide Web. the fall of 1994, it receives over 1 million hits on
a single day.
1989: Quantum Computing Services, later Amer-
ica Online (AOL), launches the first instant mes- 1994: A forerunner to the smartphone, the IBM
saging service, also introducing the familiar greet- Simon Personal Communicator is introduced
ing “You’ve got mail!” to the U.S. market. It includes a mobile phone,
touchscreen (used by tapping with a stylus), and
1990: Tim Berners-Lee, along with Robert Cail- features such as a calculator, address book, and
liau, present the protocol for distributing informa- calendar; can send e-mails, faxes, and text mes-
tion eventually used to create the World Wide Web sages, as well as phone calls; and carries a retail
in a paper. price of approximately $899.

1990: The first Web page was “served.” 1994: America Online (AOL) begins selling adver-
tisements and grows to 1 million members.
1991: The space shuttle Atlantis sends the first
e-mail message from space. 1994: GeoCities, a virtual community that allows
users to create their own Web site, and which was
1991: The first users outside of CERN (the Euro- organized around the concept of “cities” based
pean Organization for Nuclear Research) joined on common interests, is launched in California as
the network. BHI (Beverly Hills Internet).

1992: Delphi becomes the first commercial pro- 1994: The world’s first blog is created by Justin
vider of Internet access service. Hall, a college student; he continues publishing
“Justin’s Links From the Underground” for 11
1993: CERN (the European Organization for years.
Nuclear Research) announces that the World
Wide Web would be freely available for anyone 1995: Clifford Stoll publishes an article in News-
to use. week with the headline “The Internet? Bah!” and
the subhead “Hype Alert: Why Cyberspace Isn’t,
1993: Over 3 million Americans subscribe to and Will Never Be, Nirvana.”
online services.
1996: America Online (AOL) grows to 5 million
1993: Mosaic, the first graphical browser, is members.
developed at the University of Illinois, facilitating
the development of Web pages. 1996: The search engine Ask.com lets users type
in queries using natural language rather than key
1993: Howard Rheingold publishes The Virtual words.
Community: Homesteading on the Electronic
Frontier, a book about virtual communities, 1996: Stanford University students Larry Page
including the early online virtual community The and Sergey Brin create a search engine known
WELL. as BackRub, with the goal of organizing the
huge amount of information available on the
1993–94: The White House first goes online and World Wide Web; they later rename this project
uses the Internet. Google.

1994: In February, Jerry Yang and David Filo 1997: The term Weblog is coined by Jorn Barger.
begin developing an index to keep track of their
personal interests on the Internet; it is originally 1997: One million sites exist on the World Wide
called “Jerry and David’s Guide to the World Wide Web.
xlii Chronology

1997: America Online (AOL) introduces the Systems, arguing that current interfaces are inef-
stand-alone software Instant Messenger, allowing ficient and make it difficult for people to use com-
users to chat over the Internet. puters effectively.

1997: Matt Drudge founds the Drudge Report 2000: Senator John McCain raises over $6 mil-
online; the site becomes famous when, in Janu- lion online over the course of his presidential
ary 1998, Drudge publishes information about an campaign.
alleged affair between President Bill Clinton and
Monica Lewinsky on his Web site DrudgeReport 2000: The policy advocacy group MoveOn.org
.com. launches an Internet discussion forum.

1998: Open Diary, an online community that 2000: AOL acquires MapQuest and merges with
allows users to create online journals without Time Warner.
needing to know HTML (hypertext markup lan-
guage), begins operation. 2000: Jimmy Wales and Larry Sanger launch
Nupedia, the prescurser to Wikipedia, as a forum
1999: The BlackBerry 850, a two-way pager (not to publish articles by experts in their field as free
a telephone), is introduced. content.

1999: Blogger and LiveJournal begin operation; 2000: Josh Marshall founds the political Web site
like Open Diary, they allow individuals without talkingpointsmemo.com.
technical expertise to create online journals or
blogs. 2000: The dot.com bubble bursts.

1999: Jon Stewart becomes host of The Daily 2000: In December, the Pew Research Center
Show, a satirical television program on Comedy announces results from a study showing that one-
Central that becomes famous for criticizing the third of Americans who were online got news about
mainstream news media as well as politicians, the campaign online, for a total of 18 percent of
and becomes an important source of news for Americans getting news about the election online
many young adult viewers. (as compared to 4 percent in the 1996 election).

1999: The Federal Election Commission rules that 2001: In January, Filipinos take part in a mass
online credit card contributions to candidates in demonstration against Philippine President Joseph
the presidential election are eligible for federal Estrada, organized in large part by forwarded
matching funds. text messages; a large crowd gathers within a few
hours, and grows to over a million in a few days.
2000: Seventy million computers are connected to
the Internet. 2001: Wikipedia, the first online, user-created,
open source encyclopedia, begins as a side proj-
2000: Google introduces AdWords, an online ect of Nupedia. The domain name is registered
advertising program whose revenues will reach in January, and over 20,000 entries are created in
$28 billion by 2010. the first year alone.

2000: Advertising for the Swedish company 2001: Meetup.com, a Web site that helps people
Ericsson refers to its R380 mobile phone, a flip arrange in-person group meetings based around
phone using the Symbian operating system, as a common interests, begins operation.
smartphone.
2001: StumbleUpon, a Web site that allows users
2000: Jef Raskin publishes The Humane Inter- to vote on content they find compelling, begins
face: New Directions for Designing Interactive operation.
Chronology xliii

2001: Google buys Deja.com’s Usenet Discussion 2003: Myspace, a social networking site, begins
Service, including about 500 million archived operation; over 1 million people join in the first
Usenet discussions; the service is improved and month.
relaunched as Google Groups.
2004: Almost one-third of Americans (over 60
2002: Markos Moulitsas founds the political blog million people) reported seeing a political docu-
Daily Kos. mentary in 2004, according to a study released
in January 2005 by the Pew Research Center; in
2002: AOL has 34 million members. contrast, only 7 percent said they attended a cam-
paign rally, and 16 percent said they read a book
2002: The social network site Friendster begins about politics in 2004.
operation and later becomes the first social net-
working site to attract over 1 million users. 2004: Democratic presidential candidate How-
ard Dean demonstrates that it is possible to raise
2002: LinkedIn, a professional social networking large amounts of money for a political campaign
site, begins operation. over the Internet, raising more than $25 million
by September.
2003: The Controlling the Assault of Non-Solicited
Pornography and Marketing (CAN-SPAM) Act 2004: Digg, an Internet social news-sharing site,
creates national standards for commercial e-mail begins operation.
but is viewed as largely ineffective in terms of actu-
ally controlling unsolicited commercial e-mail. 2004: Gawker Media founds Wonkette, a satiri-
cal online political magazine.
2002: In December, Trent Lott, then Majority
Leader of the U.S. Senate, makes racially charged 2004: Google reports that its index includes 6 bil-
remarks at the 100th birthday celebration of Sen- lion items, including 880 million images and 4.28
ator Strom Thurmond; the remarks are not cov- billion Web pages.
ered by the mainstream media until after they are
published online by several bloggers, and attract 2004: Harvard college student Mark Zuckerberg
sufficient attention that Lott resigned his post, an launches TheFacebook.com, a social networking
event often cited as an early demonstration of the site originally restricted to students from a few
political power then held by bloggers. elite colleges.

2003: In January, a survey by the Pew Research 2004: In October, a study released by the Pew
Center shows that about 10 percent of online Research Center found that the Internet was a
Americans used the Internet as a principal source minor player in terms of political advertising dur-
of campaign news; the Internet remains a rela- ing the presidential campaign, with $330 million
tively minor player, however, as half of those sur- spent on television ads versus $2.66 million on
veyed listed television as their principal source for Internet ads between January and August 2004.
campaign news.
2004: Flickr, an Internet photo hosting and shar-
2003: Google introduces site-targeted advertising, ing site, begins operation.
where ads are placed on Web sites based on matches
on keywords, domain names, and so forth. 2004: Marc Andreessen and Gina Bianchini
found Ning, which grows by 2012 to become the
2003: Wordpress, a free, open source content world’s largest platform for creating social media
management system, begins operation. Web sites.

2003: Linden Lab creates Second Life, an Internet 2005: Myspace is purchased by News Corpora-
virtual world. tion, Rupert Murdoch’s global media company.
xliv Chronology

2005: In February, Google announces that it has 2006: Spotify, a music streaming and playlist-
over 1 billion images indexed in Image Search. sharing tool, begins operation.

2005: In March, the Pew Research Center releases 2006: In December, the Pew Research Center
a report stating that 61 percent of Americans who releases a study showing that 64 percent of reg-
use the Internet (37 percent of the adult popula- istered voters reported having received robo-calls
tion) used the Internet in connection with politics; (recorded telephone messages) during the 2006
specific instances of use include contributing to midterm election campaign; in contrast, only
candidates, volunteering for a political campaign, 24 percent reported receiving campaign phone
discussing candidates and issues through e-mail, calls from live callers and 18 percent reported
and getting news and information about politics. receiving home visitations in connection with the
campaign.
2005: In May, Google releases Blogger Mobile, a
service that allows bloggers to post and send pho- 2007: In January, the Pew Research Center
tos to their blogs from mobile phones. releases a study showing that 15 percent of Amer-
ican adults used the Internet to get most of their
2005: Arianna Huffington founds the Huffington information about the 2006 midterm election; of
Post, a news aggregation Web site and blog; the those who used the Internet for political purposes,
site is sold to AOL in 2010. 23 percent report creating or forwarding political
commentary or videos.
2005: YouTube, an Internet video-sharing plat-
form, created by Chad Hurley, Steve Chen, and 2007: In February, presidential candidate Barack
Jawed Karim, begins operation. Obama meets with Marc Andreessen to discuss
using social media as part of his presidential
2006: In April, Michelle Malkin founds the politi- campaign.
cal Web site HotAir.com.
2007: Facebook begins the Beacon advertising
2006: In August, a video of Senator George Allen system, using information about user purchases
(R-VA) referring to a young man of Indian descent to post targeted advertisements to users; the Bea-
as “macaca” is widely distributed and damages con system is abandoned in 2009, in part due to
Allen’s re-election bid. objections that it violated user privacy.

2006: Google announces it has indexed over 25 2007: Brave New Films, founded by Robert Gre-
billion Web pages and 1.3 billion images and enwald, releases its first films, The Real Rudy
receives 400 million queries per day. (about Rudy Giuliani) and Fox Attacks (about
the Fox News Channel).
2006: In September, the Pew Research Center
releases a report stating that 19 percent of adult 2007: The social networking, photo-sharing, and
Internet users (about 26 million Americans) used short-form blogging site Tumblr begins operation.
the Internet to get information or news about pol-
itics and the upcoming midterm elections. 2007: In June, Apple releases the iPhone, which
features a touch screen and allows the user to
2006: In September, Facebook allows anyone 13 make phone calls, browse the Internet, and take
and older to register (i.e., a *.edu e-mail address digital photographs.
is no longer required).
2007: In July, Facebook announces it has 30 mil-
2006: In November, Google purchases YouTube. lion users.

2006: Twitter begins operation, allowing users to 2007: The political Web site Change.org begins
send messages of 140 characters or less. operation; it attracts 20 million users by 2012.
Chronology xlv

2008: In January, the Pew Research Center pledge money to support other people’s projects,
releases a report stating that 42 percent of Ameri- in a manner similar to pledge drives conducted by
cans age 18 to 29, and 24 percent of adult Ameri- public radio.
cans overall, say they use the Internet to find
political information. 2009: In April, the Pew Research Center releases a
study showing that over half (55 percent) of adult
2008: Nate Silver founds FiveThirtyEight.com, a Americans used the Internet in 2008 to get infor-
blog specializing in statistical analysis of political mation about the election or to become involved
topics (the name refers to the number of members in politics, and about one-third used the Internet
in the electoral college); the blog became an online to share political content.
feature of the New York Times in 2010, and
became famous in 2012 by combining and weight- 2009: In June, the death of Iranian protester
ing polling data to correctly predict the outcome Neda Agha-Soltan is captured on a cell phone;
of the presidential election in 49 of 50 states. this video (and links to it) rapidly spreads around
the world on social media, including Twitter,
2008: Apple introduces the App Store, a distri- YouTube, and Facebook, circumventing Iranian
bution platform for applications for the iPhone censorship.
and iPad; by 2012, the App Store offered over
700,000 mobile applications, and over 25 billion 2009: Facebook becomes the world’s largest
apps have been downloaded. social network, with over 200 million users.

2008: Clay Shirky publishes Here Comes Every- 2009: Captain Chesley B. “Sully” Sullenberger is
body: The Power of Organizing Without Organi- forced to land a commercial flight in the Hudson
zations, a book that argues that social media tools River in New York City after the aircraft struck
allow individuals to organize themselves and act a flock of geese. The first notice of this event is
collectively in ways formerly only possible within posted on Twitter by a user who saw the event
organizations. from a ferry.

2008: Google is the most visited Web site in both 2010: Crowdrise, a Web site founded by actor
the United States and the United Kingdom. Edward Norton, film producer Shauna Rob-
ertson, and online retailers Robert and Jeffrey
2009: Foursquare, a location-based social net- Wolfe, begins operation; it allows users to create
working site, begins operation. fund-raising pages for free and provides prizes
to be distributed among those who contribute to
2008: In October, Google introduces the Android charitable causes.
operating system and it quickly becomes the dom-
inant operating system for mobile phones. 2010: Apple introduces the iPad, and it becomes
the dominant tablet computer.
2009: GeoCities, a California-based Web site that
facilitated creation of Web pages by nontechni- 2010: The term app (as in “mobile application”)
cal users, ceases operation except in Japan; it had is chosen as “word of the year” by the American
38 million Web pages at the time it ceased U.S. Dialect Society.
operations.
2010: Clay Shirky publishes Cognitive Surplus:
2009: In April, activists in Moldova use social Creativity and Generosity in a Connected Age, a
media, including Twitter, Facebook, and LiveJour- book in which he posits that online tools allow
nal, to organize protests against their government. people to use their leisure time more creatively
and productively than was true in the past.
2009: In April, the Internet fund-raising platform
Kickstarter begins operation; it allows people to 2010: Facebook has over 400 million users.
xlvi Chronology

2010: The Democratic National Committee hires 2011: In January, President Barack Obama
a manager to oversee President Barack Obama’s becomes the first speaker in the YouTube World
social media accounts. View speaker series; after his State of the Union
address, the president answers questions from
2010: An estimated 1.97 billion people world- citizens.
wide use the Internet, amounting to almost 30
percent of the world’s population. 2011: In January, the Pew Research Center
releases a study showing that 73 percent of
2010: The Pew Internet and American Life Proj- American adults who use the Internet got news
ect announces that more Americans get news on or information online about the 2010 midterm
the Internet than from newspapers. elections and 22 percent used Twitter or social
networking sites to connect to a campaign or to
2010: Pinterest, an Internet social scrapbooking the election.
site, begins operation, and acquires 10 million users
faster than any other stand-alone site in history. 2011: The professional social networking site
LinkedIn reports that it has 100 million users.
2010: Dan Savage and Terry Miller found the It
Gets Better Project to encourage gay and lesbian 2011: The Pew Research Center releases a report
young people. Savage and Miller posted a video stating that adults who use the Internet are also
on YouTube discussing their early lives and how more likely to be involved in offline group activi-
their adult lives were much better than they could ties, contradicting the stereotype of Internet users
have imagined when they were being bullied and as isolated loners.
harassed as children, and encouraged others to do
the same; the project grew so large that it now 2011: Lady Gaga and her mother Cynthia Ger-
has its own Web site, www.itgetsbetter.org, which manotta found the Born This Way Foundation
included over 50,000 videos (as of November to work with the Berkman Foundation at Har-
2012) and had been viewed over 50 million times. vard University to promote social tolerance, fight
against bullying, and encourage young people to
2010: In December, a study released by the Pew build strong communities.
Research Center indicates that 26 percent of
American adults used their cell phone in connec- 2011: Android becomes the predominant operat-
tion with the 2010 midterm elections, either to ing system for smartphones, surpassing Symbian.
get information or to participate in some other
way, for instance to tell people they had voted (14 2011: In May, U.S. Representative Anthony
percent) or to pass along information about con- Weiner (D-NY) sends a sexually suggestive pho-
ditions at their local polling place on election day tograph of himself over Twitter; he resigns in June
(6 percent). as a result of the outcry from this incident.

2010: In December, video of Tunisian protester 2011: In July, Ning claims that it is the world’s
Mohammed Bouazizi setting fire to himself is largest social media Web site, with over 90,000
captured by amateur videographers and posted customers in 223 countries, and 65 million unique
on YouTube, inciting protests that eventually lead monthly visitors.
to the January 14, 2011, abdication of Tunisian
president Zine al-Abidine Ben Ali. 2012: In March, KONY 2012, a short film about
Uganda warlord Joseph Kony, is released; it
2010–11: Social media plays a key role in a popu- spreads rapidly over the Internet, attracting over
lar uprising in north Africa and the Middle East 93 million viewers on YouTube alone.
known as the “Arab Spring,” although experts
debate whether social media acted as an instiga- 2012: In May, Facebook announces that it has
tor or merely facilitated the uprisings. 901 million users worldwide; at this point, if
Chronology xlvii

Facebook were a country, it would be the third- on November 7 (election day) alone, making it
largest in the world in terms of population. the most tweeted about event in history.

2012: In June, the Federal Election Commission 2012: In November, the Pew Research Center
rules that political campaigns may accept contri- releases a study indicating that over half (55 per-
butions by way of text messages. cent) of registered voters had watched at least one
political video online in the period leading up to
2012: In September, the Pew Research Center the election; video news reports were the most
releases a study revealing that one-quarter or more common type of video reported (48 percent),
of those who use social networking sites say they followed by recorded speeches, conferences, or
are important for political activities—for instance, debates (40 percent), and issue-oriented informa-
36 percent say social networking sites are an tional videos (39 percent).
important way they keep up with political news,
26 percent say they are important in recruiting 2013: On January 11, Internet activist Aaron
people to political causes, and 25 percent say they Swartz committed suicide. Swartz, who was
are an important way to discuss political issues. active in developing the social Web site Reddit,
the organization Creative Commons, and the
2012: In September, a randomized controlled Web feed format RSS, was facing charges under
study published in Nature and based on the mid- the Computer Fraud and Abuse Act due to his
term elections in November 2010 indicates that use of an MIT computer in 2011 to download
messages delivered to Facebook users on election large numbers of journal articles from the digital
day resulted in a small but measurable increase in library JSTOR.
voter turnout.
2013: On July 23, the Web site thedirty.com
2012: In October, the Pew Research Center releases pictures and sexting messages sent by
releases a study indicating that 60 percent of New York City mayoral candidate Anthony
American adults use social networking sites and Weiner under the alias “Carlos Danger”; although
that two-thirds of those have used social media Weiner remains in the campaign, his candidacy is
for political or civic activities. severely damaged by the scandal, and he came in
fifth place in the vote.
2012: In October, the Pew Research Center
releases a study indicating that 10 percent of 2013: On August 20, The Qatar-based Al Jazeera
those who contributed to one of the candidates in Media Network launches a new television chan-
the presidential campaign did so via a cell phone nel, Al Jazeera America, with headquarters in
app or by text message. New York City and 12 bureaus located through-
out the United States.
2012: In November, a picture of President Barack
Obama embracing his wife Michelle became the 2013: On September 16, the Pew Internet &
most retweeted and most-liked post in history; American Life Project reports that a majority of
posted early in the morning of November 7, when the American public owns a smartphone, that
it became clear that Obama had the state of Ohio 63 percent of adult cell phone owners use their
and thus had won re-election, it was retweeted phone to get online, and that 21 percent of all
almost 700,000 times on that day alone, and a adult cell phone owners do most of their online
posting on Facebook received over 3.23 million browsing from their phone, not a computer or
“likes” and over 400,000 shares. other device.

2012: In November, over 31 million tweets Sarah Boslaugh


related to the U.S. presidential election are sent Kennesaw State University
A
AARP such as health, home, and auto insurance. There
are AARP credit cards and retirement planning
AARP (formerly known as the American Asso- options. These discounts and optional benefits are
ciation of Retired Persons, and now known solely for the members of AARP.
simply as AARP) is a nongovernmental pub- AARP helps organize volunteering in commu-
lic interest organization that assists communi- nities across the United States. One of their out-
ties and older people with health care benefits, lets is Create the Good. This organization has
employment security, and retirement planning. over 2,000 volunteer options. Create the Good
Dr. Ethel Percy Andrus founded AARP in 1958 allows volunteers to do simple tasks around the
as an extension to her previous organization, the community, such as collecting school supplies, as
National Retired Teachers Association (NRTA). well as help health professionals, assist in class-
NRTA assisted retired teachers who were in need rooms, and read at local libraries. Depending on
of health insurance. AARP is also a powerful specific locations of members, options for volun-
lobbying group. teering are vast.
There are two AARP organizations: AARP
Services and AARP Foundation. AARP Services Branding and Promotion
offers supplemental insurance and discounts on In order for AARP to promote its name and
travel and consumer goods, while the AARP brands, it has created commercials, magazines,
Foundation operates like a charity. They both and Web sites. AARP also has several different
focus on providing better income and housing types of commercials on television. These range
and alleviating hunger for senior citizens. The from promoting health insurance and life insur-
goals behind the creation of AARP were (1) to ance to advocating for older persons’ benefits.
promote independence, dignity, and purpose for By promoting their various options for members
older persons; (2) to enhance the quality of life for through different commercials, people looking
older persons; and (3) to encourage older people for diverse facets of AARP will be reached. By
“To serve, not be served.” using television as a source of recruitment, AARP
AARP Services provides members with dis- reaches a broader scope of older persons than it
counts on goods and services such as groceries, does through its use of Facebook and Twitter.
dining out, electronics, rental cars, hotels, and On its Web site, AARP lays out the key compo-
airline tickets. It also offers insurance benefits, nents that older persons are looking for once they

1
2 Activists and Activism, Digital

have retired or are looking for what comes next benefits, and volunteer ideas, it is widely recog-
in the steps to retirement. There are links to spot- nized as a good option. It is also widely talked
light stories relevant to topics chosen via links at about among several age groups.
the top of the page. Each link offers support in
areas of member benefits, health, work and retire- Narissra Maria Punyanunt-Carter
ment, money, home and family, and other issues Heather Nance
relevant to the typical AARP member. The site is Texas Tech University
relatively easy for members to navigate and under-
stand. Another interesting link on the AARP Web See Also: Age; Campaigns, Grassroots; Health
site is their game link. These games seem simple Care; Medicare; Social Security; Special Interest
enough to the everyday Internet user, but are cho- Campaigns.
sen to help stimulate the brain. Games such as
mahjong, bridge, and solitaire are available to be Further Readings
played online. There are also crosswords, black- AARP. “AARP History.” http://www.aarp.org/about-
jack, and even disco bowling. aarp/info-2009/History.html (Accessed
April 2013).
Social Media Berkman, Barbara and Sarah D’Ambruoso.
Recently, AARP completed a study examining Handbook of Social Work in Health and Aging.
how adults over age 50 use technology and social New York: Oxford University Press, 2006.
media. After gaining a sample of 1,360 adults Create the Good. http://createthegood.org (Accessed
over age 50, GtK Custom Research analyzed the April 2013).
findings. Results showed that 40 percent of the Kolb, Robert W. Encyclopedia of Business Ethics and
sample felt at ease using the Internet and many Society. Thousand Oaks, CA: Sage, 2008.
accessed the Internet from their desktop comput- Lipson, Benjamin and J. K. Lasser. Choosing the
ers. About 27 percent used Facebook for social Right Long-Term Care Insurance. Hoboken, NJ:
networking. John Wiley & Sons, 2002.
One of the best ways of getting the AARP name
out into the social media world is through Face-
book and Twitter. These two sites are a quick
and easy way for people to locate information
and collaborate with others in their same situa- Activists and Activism,
tion. On Facebook, members can get information
via their state’s specific pages, the national page, Digital
and a link to the AARP Web site. This is also a
great way for AARP to promote events, volunteer Activism is engagement in activities designed to
opportunities, and specials on memberships. The foster social change or, alternatively, to resist it.
micro­blogging site Twitter is also a quick way to Usually, there is a great deal of conceptual over-
communicate with members of AARP. Though lap between activism and participation in a social
Twitter has been dominated by a younger demo- movement, though social movements, by defini-
graphic, AARP has numerous state and national tion, involve participation by collectivities of
Twitter accounts. individuals and organizations. Activism, in some
rare instances, may be initiated by individuals or
Conclusion small groups.
Since 1958, AARP has helped popularize the idea Conventional wisdom argues that people
of older persons continuing to live very active participate in collective action and social move-
lives. With the Internet and commercials on tele- ments because they have strongly held beliefs or
vision, radio, billboards, and in magazines, AARP are highly discontented about something. How-
has become the widely known option for retired or ever, a number of social movement scholars have
retiring Americans. Though AARP is not the only pointed out that discontent or ideological support
option for older persons looking for insurance, of a movement’s goals are usually not enough to
Activists and Activism, Digital 3

ensure an individual’s engagement in activism. identities as being an outcome of particular


Indeed, the vast majority of people who typi- social movements.
cally support a movement’s goals remain inactive.
What is important to whether or not people par- Social Networks
ticipate is whether they have social network ties Social networks are thought to be a key aspect
to other participants and become targeted for of social movement phenomena. A social network
participation requests. refers to a set of social units (individuals, groups,
The scholars Bert Klandermans and Dirk and so on) and the interrelationships among them.
Oegema argue that at the level of the individual, In recent years, social movement scholars have
becoming a participant in a social movement can given considerable attention to social networks in
be conceived of as a process with four different social movements.
steps. The steps are: (1) becoming a part of the Digital social networks (such as those created
mobilization potential (e.g., sympathizing with through Facebook or Twitter) are just one mode
the movement’s goals); (2) becoming a target of of social networks. Researchers have long known
mobilization attempts; (3) becoming motivated about the importance of interpersonal networks
to participate; and (4) overcoming barriers to based on face-to-face interactions and/or joint
participate. memberships in groups (such as social movement
Another factor that influences participation organizations). In recent years, attention has
is whether or not individuals are biographically turned to the role of digital social networks.
available to participate. That is, are their personal In previous studies on face-to-face social net-
schedules sufficiently free or flexible to allow works, the following intervening variables have
participation in activism? For instance, full-time been implicated as relevant to network mecha-
employment and child-rearing obligations are nisms: (1) communication, (2) recruitment appeals,
two barriers to social movement participation. (3) identification, (4) social influence, (5) incen-
Whether or not one participates in activism tives and sanctions, (6) social support, (7) social-
is also affected by the risks and costs involved. ization, (8) knowledge and information, (9) per-
Activities vary in terms of the risks that activ- sonal efficacy, (10) norms, (11) subjective interest,
ists may face such as the likelihood of physical (12) beliefs about others’ willingness to contribute,
violence. Activities also vary in costs in terms of and (13) trust.
money and time. Social media and related digital technologies
Identity is another important aspect of social may modify these and other traditional social
movements. Individuals are more likely to engage movement processes. For instance, biographical
in collective action if they have a shared collec- availability is thought to influence participation
tive identity. Social networks provide referent and, relatedly, to be associated with the costs
others and groups with whom an individual can and risks of participation. But, for some types
make social comparisons in the collective identity of activism, social media and other digital tech-
formation process. nologies may bring down costs, so biographi-
Individuals who are more embedded in a cal availability may not be a barrier to the same
social network tend to have higher levels of extent as for some types of offline activism.
movement identification. This is a reciprocal Relatedly, the relationship between network
process. The higher one’s identification with the ties and identification may be modified in simi-
movement, the more motivated one is to make lar ways. Indeed, in offline activism, participation
social ties to other movement participants. in certain types of activities—such as attending a
On the other hand, the more ties one has, the rally or protest demonstration—involves poten-
more information one receives about the move- tially revealing one’s personal identity and the
ment and the more likely one is to receive sup- linkage between personal and collective identities.
port for identifying with the movement. Some Certain types of social media (such as Twitter, for
social movement scholars see collective identi- example) allow one to engage in social movement
fication as a necessary condition for collective discourse and other forms of activism without
action. Other scholars see the creation of new necessarily revealing one’s true personal identity.
4 Activists and Activism, Digital

Digital Activism to allow voters from different states to coordinate


Social media is intertwined with the World Wide their votes. Social media played an important role
Web, the Internet more generally, and mobile in Barack Obama’s first successful campaign for
phones. Many social movement organizations and president of the United States in 2008.
social movement activists have Web sites where Such examples illustrate the instrumental func-
people are invited to follow them via Facebook tion of digital technology with respect to social
and Twitter. Many social media posts link to Web and political activism; it helps communication
sites. Many people utilize social media via their in information dissemination, networking, and
mobile phones. Many social media functions are action coordination. Less often discussed—and
linked to e-mail. Thus, this suite of digital tech- more contentious, as is discussed below—is the
nologies needs to be considered simultaneously. symbolic role that this technology plays in social
Social media and other digital technologies are movement activity. By serving as a potential
revolutionizing the way people live and how they forum for the development of a sense of solidar-
communicate and interact with others. They have ity, commonality, and trust, the Internet and other
enabled the development of transboundary social information communication technologies (ICTs)
networks, and the speed, reliability, scale, and rel- can help build a collective identity among partici-
atively low cost of digital networks have in turn pants and supporters of a movement.
allowed for an unprecedented expansion in the These two major functions of digital technol-
scope and reach of contemporary activism. Digi- ogy are copresent to varying degrees depend-
tal activism refers to the use of digital technolo- ing on the type of activism under consideration.
gies, such as mobile phones and Internet-enabled There are four broad categories in which partici-
devices, in campaigns for social and political pation using social media and other kinds of digi-
change. Indeed, contemporary social movements tally enabled social movement activities can be
are using these technologies as tools of communi- placed. The first entails information distribution
cation and mobilization and to access alternative through Web sites, listservs, and Internet-enabled
forms of media, which serve as both a means and devices wherein these technologies serve not as
target of social and political protest. interactive media but as information hubs about
One of the first social movements to use the causes, social media organizations (SMOs), and
Internet was the Zapatista movement in southern social movements.
Mexico in the early 1990s. In this movement, the The second category includes online activities
Internet, along with telecommunications and vid- (such as social media) in support of offline protest
eos, was instrumental in disseminating information events such as marches and rallies. Such activities
from the Zapatistas to the rest of the world and in include providing information on, and logistical
organizing a global network of solidarity groups, support for these events as well as recruitment of
which helped to create an international public participants and supporters. Here, too, the Inter-
opinion movement that deterred the Mexican gov- net does not serve as an independent arena of
ernment from engaging in extensive repression. activism; rather, it is simply a space for organizing
A few years later, antiglobalization protests and coordinating nondigital activism.
in Seattle, Montreal, and Genoa were supported Third, digital activists make use of social media
by e-mail systems, the World Wide Web, and the and other online avenues for participation, such
short message service (SMS). The use of the Inter- as online petitions, boycotts, letter-writing, and
net and other digital technologies for the purpose e-mail campaigns and more contentious forms of
of movement activity has increased and diversified Web site “hauntings” and virtual sit-ins. Last, the
in the 21st century, even within the realm of insti- fourth category encompasses the organization of
tutional politics. For example, strategic voting entire campaigns and movements online—some-
emerged as an online movement during the 2000 times referred to as e-movements. In this type of
U.S. presidential election as a way for American digital activism, all aspects of organizing take
citizens to renegotiate their participation in the place without face-to-face coordination; social
electoral process by using Web sites that were media, Web sites, blogs, or listservs are often the
designed by several individuals and small groups organizing centers of protest action.
Activists and Activism, Digital 5

Effect of Digital Technology of movements. The alteration of resource costs


A major debate among scholars of digital activ- has consequences for the probability of successful
ism pertains to the question of whether its fun- mobilization. Second, it is argued that the prolif-
damental driving processes differ from offline eration of ICT has led to the emergence of new
activism. Does utilization of social media and and fundamentally different kinds of social pro-
other digital technologies for the purpose of test activities, bundled together in an emergent
social movement activity amount to a qualita- “digital repertoire of contention.” The resultant
tive or merely quantitative shift in activism? Put “new new social movements” are conceived of
differently, do these relatively novel technologies as diffuse, relatively unstructured, and capable
have any enduring impact on activism, and if of bringing together activists with diverse back-
so, do they simply augment activism, or do they grounds in virtual public spheres.
alter it in a more fundamental way. The debate These “internetworked movements” depend
on this issue has unfolded among scholars in more on information exchange and communica-
three clearly discernible camps. tion than on the support of traditional SMOs, the
Those in the first camp argue that, over the importance of which has also been undermined
long term, there will be no real, lasting impact of more simply by the low cost of online organizing.
usage of digital technologies on social movement Therefore, in the modern social movement, social
processes. According to this approach, the digital activism is becoming less reliant on institutions as
network is a poor substitute for face-to-face inter- individual activists themselves—movement entre-
actions in terms of its ability to foster the endur- preneurs—are gaining greater capacity to partici-
ing bonds of trust and commitment thought to pate in an increasingly diverse set of movement
be critical to mobilization. Some within this camp activities. Indeed, as a result of the proliferation
further argue that the digital divide—the uneven of digital technology, the social movement has
distribution of access to, use, and knowledge of been shifting from the “grand coalition” among
ICTs—undermines the impact of the Internet on SMOs toward ad hoc, ephemeral, group-based,
activism or even risks further disenfranchising “direct action politics.”
those without ICT access. Some scholars argue that the meaning and struc-
Scholars in the second camp contend that the ture of activism have been transformed by the use
differences between online and offline activism of social media in particular, which has allowed
are in degree rather than in kind. Along this line for small-scale, many-to-many forms of politically
of thought, the effects of social media and other oriented communication or “micro­activism.”
digital technology on activism can be considered Actions such as the formation of political Face-
scale-related effects because ICT usage is seen as book groups, retweeting of articles of political
simply augmenting or accelerating the processes interest, and sharing videos of a political nature
driving contemporary activism and protest by, on YouTube reflect microlevel intentions and are
for example, enabling a transboundary or fully not necessarily geared toward mobilization.
global reach. Further, although social media and However, while the two latter camps differ
the Internet (more broadly) may allow for rela- with regard to their estimations of the effects of
tively inexpensive and quick dissemination of digital technology on activism, they tend to focus
information, they do not change the fundamen- on different types of protest. Indeed, the schol-
tal nature of the activists, what they do, or how ars who find that social media and other online
they do it, explain Lance Earl and colleagues in technology simply augment or accelerate the
addition to Jennifer Bennett. drivers of contemporary activism tend to study
The third camp is populated by those who online activities that support or facilitate offline
argue that some uses of ICT may in fact alter the protest, whereas those who find more fundamen-
dynamics of activism in significant, “game-chang- tal changes have been largely focusing on online
ing” ways. First, some scholars taking this posi- mobilizations. In the first case, social media and
tion insist that the low cost of ICT-enabled social other ICTs allow for movement-related messages
movement activity has significantly decreased to be spread globally, instantaneously, and inex-
costs to the emergence, expansion, and success pensively to gain broader support for a movement
6 Activists and Activism, Digital

These protesters in New York City gathered in support of Egyptian democracy activists on January 29, 2011, in the early days of the
Arab Spring protests. The Occupy Wall Street protest movement, which began in New York City on September 17, 2011, and spread to
numerous cities, drew inspiration in part from the Arab Spring movement earlier that year.

but do not thereby alter the fundamental dynam- benefits and limitations of this technology. On
ics of the offline struggle. the one hand, the Internet has several advantages
In the second case, however, the dynamics of as a public sphere; as alluded to above, it opens
online disruption are likely to differ from those up space for ordinary citizens and groups typi-
of offline protest; for instance, protesters are less cally excluded from mainstream media to gain
likely to be motivated by group solidarity than by visibility and forge links across a range of issues.
the perceived effectiveness of the protest action Indeed, those mobilized across digital networks
compared to offline activists. Further, as a result against neoliberal globalization are increas-
of the speed, convenience, and general appeal of ingly afforded greater opportunities to exchange
social media and other ICTs, the demographic information outside the control of the dominant
composition of activists is shifting and diversifying. media corporations.
For example, the technological leap experienced in The emerging digital community and social
the developing world wherein most young people relations have been characterized as decentralized,
own mobile phones even if their homes are with- democratic, heterogeneous, fluid, open, informal,
out electricity or running water has opened up the and in many ways self-governing. In particular,
world of activism to those who may not otherwise the ease with which individuals can generate and
have participated in it. This is also the case with share content via social media is seen by some as
youth in general, among whom the use of digital indicative of a more democratic and egalitarian
technology, and social media in particular, is dis- society. Social networking Web sites and services
proportionately intensive and widespread. provide “radical public spheres” that constitute
Among those who agree that digital tech- new forums for the development and expressions
nology has changed the game of contemporary of political citizenship, forums that are less sub-
activism, there is acknowledgment of both the ject to elite control.
Activists and Activism, Digital 7

On the other hand, some scholars argue that A matter of contention, however, is how sig-
such microactivism may do more harm than good. nificant the role of social media was in bringing
Although social media provide new and open about the uprisings in the Arab region. Some
spaces for social and political engagement, the skeptics argue that real, progressive sociopoliti-
ease with which individuals can create and join cal change is brought about by high-risk activism,
communities of interest may in fact detract from strategic hierarchies, and a precise division of
more serious and coordinated efforts to bring tasks; social media, rather, creates loosely struc-
about social and political change, resulting in tured and relatively leaderless networks incapa-
weak ties and low-risk activism or “slacktivism.” ble of launching revolutions. Consequently, these
Liking digital items on Facebook or retweeting a networks have a difficult time establishing goals
news story demands little effort but the positive and achieving consensus.
feeling derived from engaging in such activity may Further, some have argued, the protest move-
satisfy one’s need for social connection, negating ment in the Middle East was ultimately caused by
the drive to interface with formal political power. the underlying sociopolitical and socioeconomic
Nonetheless, the proliferation of online spaces conditions in the region. For example, in Egypt,
to craft political identities helps “bind politics to the sociopolitical disparity between the small rul-
everyday life,” states the scholar José Marichal. ing elite and the masses had long reached critical
Indeed, some scholars have asserted that the pro- levels, “prompting most experts on the region to
portion of the population (in Western societies) expect a major upheaval at some point,” states
that is considered to be part of a social move- scholar Ekaterina Stepanova. Indeed, a variety of
ment is somewhat exaggerated. This points to cautions have been employed against overgener-
one way in which this exaggeration may get fos- alizing about the importance of social media in
tered: participation in trivial, low-cost, and low- these cases. For instance, food prices and food
impact activities that participants self-perceive shortages played a role. In some countries (such
as meaningful social movement activity. Indeed, as Tunisia), there was a relatively highly educated
this insight might serve as a counterpoint to the and underemployed youth cohort. Further, some
“social movement society thesis,” that scholars scholars have argued that old-school technolo-
David Meyer and Sydney Tarrow describe as the gies such as fax machines actually played signifi-
routinization and institutionalization of social cant roles in some instances. Also, some schol-
movements and protest in Western societies. ars have noted that Western journalists focused
mostly on English-language Twitter posts, blogs,
Web-Supported Offline Mobilization: and so on, and this may have distorted the cen-
The Arab Spring trality of these technologies to those living in the
In the 2011 Arab Spring protests, social media affected countries.
networks facilitated the rapid collapse of two However, while social media was not the sole
regimes, Tunisia and Egypt, and aided sociopo- cause of these revolutions, it enhanced the ability
litical mobilization in Bahrain and Syria. Pro- of citizens to affect domestic politics. Indeed, the
testers used Facebook, Twitter, and YouTube to fact that the movement occurred and spread as
schedule and coordinate the protests and to share quickly and garnered the participation and sup-
their plight with the rest of the world. Thus, digi- port that it did was largely due to the mobilizing
tal media undoubtedly played an important role effects of ICT and social media tools, access to
in the political upheavals in the Middle East, which significantly lowered the costs of collective
which spawned a revolutionary fervor that spread action, especially for protesters in Tunisia and
across regions, countries, and continents. Indeed, Egypt. The use of Facebook, Twitter, and YouTube
Occupy Wall Street, which began in New York galvanized the movement by revealing the extent
City and spread to countless other cities across of concern for and commitment to addressing the
the globe, drew tactical inspiration in part from sociopolitical and socioeconomic issues faced by
the Arab Spring. So, too, did the student protests citizens in the Arab region and, therefore, fos-
in Quebec, Canada, organized under the banner tering a “public sense of shared grievances and
of the Maple Spring. potential for change.”
8 Activists and Activism, Digital

For example, before and after the protest protest activities such as virtual sit-ins or denial
events, social media messages about liberty, of service (DoS) attacks, which entail targeting
revolution, and freedom were sent worldwide, Web sites or online applications with false exter-
and the offline protests often followed sharp nal requests so that they are unable to respond to
increases in revolutionary conversations. Fur- legitimate traffic, as well as defacement of Web
ther, Tunisia, with a very large population of sites or “e-graffiti.”
Facebook users, and Egypt, with more Internet Anonymous emerged out of an extremely popu-
users than any other country in the region save lar Internet image board called 4chan, where users
Iran, experienced greater civil disobedience and engaged collectively in online pranks, says Cole-
pressure toward change. Thus, social media also man. Beginning in 2008, some factions of Anony-
aided in the organization of the movement by mous began to engage in political action—launch-
synchronizing the actions of the impassioned ing DoS attacks, creating and circulating images
public, allowing citizens to unite and coordinate and videos, as well as taking to the streets, first
rapidly and on a larger scale than would have protesting against the abuses of the Church of
been possible in the absence of these media tech- Scientology, then in 2010 against the Motion Pic-
nologies. This function is particularly critical in ture Association of America in support of the file-
the context of states that exercise tight control sharing Web site The Pirate Bay and against Pay-
over access to mainstream sources of informa- Pal and MasterCard in support of WikiLeaks, the
tion and means of communication. online organization dedicated to facilitating whis-
Therefore, although social media may be tle-blowing and publishing classified materials.
deemed a “weak activist” tool by some, in the Another turning point in the development
case of the Arab Spring, it was used to encour- of Anonymous as a political protest movement
age and facilitate risky offline activism; protest- came during the Arab Spring in 2011, when they
ers filled the streets to demonstrate against—and aided the antigovernment protesters in Tunisia
indeed overthrow in some cases—some of the by launching DoS attacks against government
world’s most enduring and unruly dictatorships. and tourist Web sites, circulating videos of the
In other words, in the case of this movement, the street violence and compiling information pack-
use of digital media enhanced the scale, speed, and ets for Tunisian cyberactivists and protesters
reach of the mobilizations. As such, the impact of detailing how to evade government surveillance,
digital technologies on activism in the context of describes Coleman.
the uprisings in the Middle East is illustrative of While Anonymous has continued since then to
the second thought camp outlined above. engage in a wide range of operations elsewhere in
the Middle East as well as Europe, the group has
Online Mobilizations: paid particularly close attention to the activities
Hacktivism and Anonymous of the U.S. government since the suicide of Aaron
Much of the world’s attention has recently been Swartz, digital activist and former co-owner of
captured by Anonymous, the “rhizomatic, digi- the social news Web site Reddit. At the time of his
tally based protest movement,” according to death, Swartz was facing up to 35 years in prison
scholar Gabriella Coleman. Although initially a and a fine of $1 million for the alleged theft of
name used to coordinate Internet pranks, Anon- online journals with the intent to post them on
ymous has become a worldwide, decentralized the Internet.
network of individuals focused on promoting In response, deeming the case against Swartz
freedom of information, expression, and trans- “a grotesque miscarriage of justice,” Anonymous
parency—even as they remain committed to launched Operation Last Resort, a campaign
protecting their own privacy and identities. This in protest of the American criminal justice sys-
clandestine, anarchic online group is steeped in tem and cybercrime laws. This operation largely
hacktivist culture, which was birthed through the involved hacks on the property and databases of
Internet. The term hacktivism is an amalgamation the U.S. government, including defacing the Web
of the words hacking and activism and describes site of the U.S. Sentencing Commission, replacing
politically motivated hacking. It involves digital the home page with a video and a message that
Activists and Activism, Digital 9

read, “The federal sentencing guidelines enable


prosecutors to cheat citizens of their constitution-
ally-guaranteed right to a fair trial”—a reference
to the fervent pursuit of charges against Swartz
and a justice system whose minimum sentencing
laws unduly empower government prosecutors to
elicit guilty pleas from suspects afraid of facing
hefty prison sentences at trial.
Anonymous is a self-described decentralized
network and purports to have no leaders, hier-
archical structure, nor any geographical epicen-
ter, according to Coleman. Membership is open
to all—Anonymous is a name that any individ-
ual or group can adopt as their own. However,
even though there are no formal barriers to par-
ticipation, there are certain kinds of knowledge,
skills, and values that lead some and not others
to engage in such “electronic civil disobedience.”
These include computer programming and hack-
ing skills as well as various digital media litera-
cies, such as video editing, Web design, and the
technical capability to use Internet relay chat
(IRC). Thus, although Anonymous has no formal
leader, the IRC operators hold more authority on
the chat and are charged with maintaining order, Aaron Swartz, the former co-owner of Reddit and a digital
explains Coleman. activist, in Boston, Massachusetts, in 2009. Swartz committed
Further, although the group maintains an anti- suicide on January 11, 2013, while being pursued on charges of
leader ethic, when it comes to operations like wire fraud and violation of the Computer Fraud and Abuse Act.
targeting hacking, only a relatively small group
of extremely tech-savvy Anons can participate.
While the “power to hack” does not translate
into the power to lead all actions within the move- effective because participants faced risks of seri-
ment, those who have more of a presence on IRC, ous personal harm, either from the violent sup-
have put in more work, and have taken greater pression of opposing authorities or from the
risks carry somewhat more authority. participants themselves. Further, as mentioned
Indeed, because what Anonymous and other above, in general, the riskiest hacktivist activities
hacktivists do is in the fuzzy, gray area of legal- carried out under the banner of Anonymous are
ity, if not outright illegal, their brand of social performed by only the most technically proficient
movement activity carries more risk than other sects, who are extremely skilled and knowledge-
forms of digitally enabled protest, such as sign- able when it comes to concealing their identities
ing an online petition or creating a Facebook and physical locations, treating anonymity as a
group about a relevant sociopolitical issue, the political tool to regulate risk as well as account-
opportunity costs of which are negligible. To ability. On the other hand, the power structures
be sure, hackers in general tend to have higher against which the group organizes are disposed
confidence in their approaches to problem solv- with highly sophisticated and resourced agencies
ing and engage in more risky behavior than the geared toward protecting the digital security of
general public. However, it is debatable whether the state apparatus from such threats and identi-
online protest activities such as targeting hacking fying the culprits.
carry more risk than traditional forms of protest; At any rate, the disruptive online tactic known
nonviolent, offline protests have been historically as hacktivism and those who perform it such as
10 Activists and Activism, Digital

Anonymous are strong candidates for elements of activism: (1) supersized—it magnifies traditional
contemporary activism, which might be said to processes; and (2) Theory 2.0—it actually changes
be game changers. Indeed, although Anonymous the processes that underlie activism. These conjec-
engages in online activities that support offline tures continue to constitute hypotheses for future
activism, and participates in the offline protests research on social media and activism.
themselves, the nuance of this movement lies in its
use of such digitally based civil disobedience. The David B. Tindall
dynamics of this kind of online protest likely dif- Tracy Groenewegen
fer from offline forms, both in their organization University of British Columbia
and their role in contentious campaigns. By coor-
dinating and carrying out skilled, targeted attacks See Also: Anonymous; Clicktivism; Cloud
on the computerized and virtual assets of those in Protesting; Cyber-Vigilantism; Hacktivism;
power in the context of a relatively decentralized, International Unrest and Revolution.
faceless global network, Anonymous serves as
a compelling illustration of the groundbreaking Further Readings
brand of activism conceived of within the third Bennett, Lance. “Communicating Global Activism:
camp discussed above. Strengths and Vulnerabilities of Networked
Politics.” In Cyberprotest: New Media, Citizens
Conclusion and Social Movements, Wim van de Donk, Brian
Social media and other digital networking tech- D. Loader, Paul G. Nixon, and Dieter Rucht, eds.
nologies are central to contemporary activism. New York: Routledge, 2004.
They can greatly reduce the costs of organizing Coleman, Gabriella. “Hacker Politics and Publics.”
and increase the efficiency of organizing. Social Public Culture, v.23/3 (2011).
media and related digital technologies can pro- Diani, Mario. “Social Movement Networks Virtual
vide information about events and about sub- and Real.” Information, Communication &
stantive and ideological issues. Again, this can be Society, v.3/3 (2000).
done more efficiently—such as by providing links Earl, Jennifer, et al. “Changing the World One
to uniform resource locators (URLs). Webpage at a Time: Conceptualizing and
Social media can have subtle effects with regard Explaining Internet Activism.” Mobilization: An
to interpersonal social networks. For example, International Journal, v.15/4 (2010).
social media can provide an indicator of the Earl, Jennifer and Katrina Kimport. Digitally
numbers of others who support or participate in Enabled Social Change: Activism in the Internet
a movement and which, from the individual per- Age. Cambridge, MA: MIT Press, 2011.
spective, may affect the tipping point or threshold Farrell, Henry. “The Consequences of the Internet
for influencing one’s participation. Social media for Politics.” Annual Review of Political Science,
can provide reference points for self–other com- v.15 (2012).
parisons that are utilized in the formation of col- Howard, Phillip and M. M. Hussain. “The Upheavals
lective identities. Indeed, social media can make in Egypt and Tunisia: The Role of Digital Media.”
people’s social networks more visible (for instance, Journal of Democracy, v.22 (2011).
by showing the friends of an individuals friends on Klandermans, Bert and Dirk Oegema. “Potentials,
Facebook, information that is not usually as sys- Net­works, Motiva­tions and Barriers: Steps Toward
tematically available for offline social networks Participation in Social Move­ments.” American
based on face-to-face interactions). At the same Sociological Review, v.5 (1987).
time, it can also distort perceptions about the com- Langman, Lauren. “From Virtual Public Spheres
position of a given actor’s social network (e.g., to Global Justice: A Critical Theory of
when an individual friends strangers on Facebook Internetworked Social Movements.” Sociological
or starts following unknown Twitter followers). Theory, v.23/1 (2005).
In Digitally Enabled Social Change, Jenni- Lennard, Natasha. “Anonymous Hacks U.S.
fer Earl and Katrina Kimport talk about two Sentencing Commission Website for Aaron
schools of thought about the effects of the Web on Swartz.” Salon (2013). http://www.salon.com
Actors and Social Media in Politics 11

/2013/01/28/anonymous_hacks_doj_website_for_ social media efforts, especially YouTube videos


aaron_swartz (Accessed June 2013). showing how regular people could help Obama,
Marichal, José. “Political Facebook Groups: Micro- just like their favorite celebrity, by taking the day
Activism and the Digital Front Stage.” Paper off to help on election day or making campaign
Presented at Internet, Politics, Policy 2010: An phone calls. A similar campaign was used in
Impact Assessment, St. Anne’s College, Oxford, Obama’s 2012 re-election effort with celebrities
UK, 2010. such as Penny Marshall and KaDee Strickland.
Meyer, David S. and Sidney Tarrow. “A Movement
Society: Contentious Politics for the New Political Campaigns
Century.” In The Social Movement Society: In addition to showcasing the potential of social
Contentious Politics for the New Century, David media, Obama’s 2008 election also heightened
S. Meyer and Sidney Tarrow, eds. Lanham, MD: awareness and discussion of celebrity endorse-
Rowman & Littlefield, 1998. ments of political candidates. The partnership of
Nip, Joyce Y. M. “The Queer Sisters and Its politicians/political parties and celebrities is not
Electronic Bulletin Board.” Information, a modern phenomenon. Warren Harding’s 1920
Communication & Society, v.7/1 (2004). presidential election saw celebrity endorsements
Stepanova, Ekaterina. “The Role of Information from Mary Pickford, Douglas Fairbanks, and Al
Communication Technologies in the ‘Arab Spring’: Jolson. Franklin D. Roosevelt had the support of
Implications Beyond the Region.” PONARS luminaries such as Judy Garland, Humphrey Bog-
Eurasia Policy Memo, v.159 (2011). art, Orson Welles, and James Cagney. President
Taylor, Paul. “From Hackers to Hacktivists: Speed John F. Kennedy was endorsed in 1960 by Sammy
Bumps on the Global Superhighway?” New Media Davis, Jr., and Dean Martin. Ronald Reagan, not
Society, v.7 (2005). surprisingly due to his Hollywood background,
White, M. “Clicktivism Is Ruining Leftist received support from many celebrities including
Activism.” (2010). http://www.guardian.co.uk/ Frank Sinatra (who personally planned inaugura-
commentisfree/2010/aug/12/clicktivism-ruining tion events after both of Reagan’s elections).
-leftist-activism (Accessed January 2013). In the early days, however, celebrities were
more on the fringe of campaigns serving as quiet
fund-raisers or doing meet-and-greets. Today
celebrities have become actively involved in elec-
tion campaigns and they are not afraid to voice
Actors and Social their opinions. Conversely, politicians have “gone
Hollywood” by appearing on entertainment pro-
Media in Politics gramming (starting with candidate Bill Clinton’s
saxophone playing on the Arsenio Hall Show up
After the 2008 U.S. presidential election, pun- to Vice President Joe Biden’s appearance on Parks
dits began to describe Barack Obama as the first and Recreation). While it is clear that politicians
technological or social media president. While rely on Hollywood actors for visibility and fund-
part of this moniker was due to the president’s raising, any impact that such endorsements have
desire to retain his personal technology, such as on voting or opinion formation is much less clear.
his BlackBerry and e-mail, after being sworn in, The 2008 election, however, provided an oppor-
it also referenced his use of social media dur- tunity to conduct a broader study of the effect of
ing the campaign. One of Obama’s Web sites, celebrity endorsements on political elections due
My.barackobama.com, was the hub of a carefully to the long duration of the contest, as well as the
constructed campaign designed to utilize social number of celebrities involved, especially Oprah
media for encouraging voter turnout, soliciting Winfrey. Winfrey is one of the most influential
campaign contributions, sharing information, and media figures today not just because of her televi-
encouraging civic engagement. Celebrities such as sion ratings, but also her ability to influence opin-
Chris Rock, Orlando Bloom, and Matthew Brod- ion and purchase decisions. Books selected for her
erick were featured prominently in many of the book club become best sellers, including Obama’s
12 Actors and Social Media in Politics

Platforms
In order for the media or celebrities to have an
impact on someone’s point of view, the mes-
sage must first be created, circulated, and then
repeated, usually by opinion leaders (family
members, valued friends, or celebrities). In other
words, people need to have access to the conver-
sation before the conversation can change their
views. This is where social media can heighten
the potential impact of a celebrity endorsement.
Social media is a global platform for opinion
leaders of all kinds. In fact, good use of social
media can turn the average person into a world-
wide opinion leader. Perez Hilton, for example,
began as a simple blogger who was an unknown
until he used his social media footprint to build a
brand of celebrity gossip that has now become a
leading source of celebrity news.
Social media thus becomes another platform for
promotion, whether it is the promotion of mov-
ies, books, or social/political causes. Celebrities
must always ensure that whatever they are post-
ing or supporting works to maintain the brand
that the actor and his/her team have carefully cre-
ated. Branding is not a new concept in the digital
age. Fans’ perception of an actor are based on a
created image that is devised by an actor’s team,
Oprah Winfrey at a rally in support of then-candidate Barack or, in the Golden Age of Hollywood, the studio
Obama and his wife Michelle Obama in December 2007. One that owned the star’s contract. Fan magazines, fan
estimate found that Winfrey may have brought the 2008 Obama letters, and appearances on radio and television
campaign as many as 1 million votes through her endorsement. used to be the ways in which fans learned more
about their favorite celebrity. Now this informa-
tion is carried (often in real time) through Web
sites, Facebook pages, or Instagram. One of the
book, The Audacity of Hope, which was touted on key differences between the traditional media fan/
her show in 2006, and her annual list of favorite celebrity interaction and social media interaction
items drives sales. In addition, prior to 2008, Win- is that the frequent updates/posts shared through
frey had never endorsed any political candidate, social media convey a greater sense of personal
which gave her endorsement of Barack Obama connectivity between the celebrity and the fan.
additional credibility. Studies of her impact on the In social media, celebrities are able to control
election resulted in the discovery of what has been the ways in which they reveal themselves to their
dubbed “The Oprah Effect.” The Oprah Effect is fans. It is their choice to say what they want and
a calculation of how many votes Obama earned when they want it. They can let fans see a part of
due to her endorsement of his candidacy. The their lives that would otherwise be off limits even
formula estimated that over 1 million votes were to the paparazzi. The result is a sense of greater
cast for Obama because of Winfrey’s support. The connection between the fan and the actor.
thought is that if Oprah can bring 1 million votes, The current trend of posting “selfies,” or pho-
other, even lesser, celebrities could have a similar tos of a celebrity that they take of themselves (usu-
impact, even if it is only thousands or tens of thou- ally with the help of a mirror) often in a bedroom,
sands of votes generated. bathroom, or behind-the-scenes area, allows fans
Actors and Social Media in Politics 13

into the most private of spaces. Of course, such Conversely, Bill Clinton has less than 800,000
intimate glimpses of a celebrity’s life are only Twitter followers. But how does this translate
available to fans that have been “invited,” by into influence?
agreeing to follow or “like” the celebrity. In June 2013, a teenage girl posted an Insta-
Celebrities are opinion leaders and thus have gram picture of Justin Bieber—who she happened
a greater potential to impact thoughts and deci- to be sitting next to at an NBA basketball game.
sions, even if the impact is to only reinforce an Her Instagram following jumped to over 1,000.
already held belief. It is not uncommon for a fan However, subsequent pictures showed the young
to buy a product simply because their favorite pop star touching her arm (most reports say the
celebrity endorses or recommends it. In one study touch was accidental contact). Justin Bieber fans
by Ani Istanboulian, 43 percent of respondents viewed the image differently and mistakenly
indicated that they have learned more about a thought that the two were dating. The picture
cause because of a celebrity they follow online. went viral and the “Beliebers” (the name given
This is not necessarily unique to social media. to Bieber’s dedicated fans) began to send the girl
In World War II, the government relied heavily death threats and hate posts. As a result, she had
on celebrities to help sell war bonds or to create to change all of her social media profiles to pri-
propaganda films that raised the spirits of the vate settings, as well as leave the game early as she
troops and citizens on the home front. Actors feared for her safety.
also worked to reinforce the official government While this example is extreme in terms of
discourse about what was occurring overseas. In showing the influence that celebrities can have on
addition, celebrities also worked to influence the their fans, as well as how that influence can esca-
government’s stance on issues relating to how late very quickly in social media, it also points to
to fight the war. For example, Walt Disney cre- the fact that fans can be radical in their feelings
ated the 1943 animated/live-action film Victory about a celebrity. In addition, it shows that age
Through Air Power to try to convince the U.S. matters in terms of possible impact of a celebrity
government to shift its military strategy to domi- endorsement. If a voter or consumer is younger,
nance in the skies (through war planes) rather they are more likely to be influenced by a candi-
than on the ground or sea. The film was a visual date or product endorsed by a celebrity, especially
adaptation of Alexander P. de Seversky’s book if the celebrity himself or herself is younger. This
and featured de Seversky in the live action por- does not mean that older celebrities are not useful
tion of the film. Disney was a firm believer in de as endorsers, it just indicates that is it important
Seversky’s theory of the importance of air superi- to know the audience that is being targeted when
ority and thus served as an endorser of this cause. seeking the support of a celebrity. There are some
celebrities, however, that have been shown in a
Social Media Reach study in 2007 by Forbes to have a negative influ-
While politicians or political causes have always ence on opinion: Rosie O’Donnell, Madonna,
looked to celebrities to bring visibility and dol- Jane Fonda, Tom Cruise, and Donald Trump.
lars to their campaigns, social media increases the Influence can also be seen in a celebrity’s Klout
volume and reach of the conversation. In addi- score, which tracks influence across eight social
tion, social media tools create a straightforward media platforms. A Klout score is based primarily
system for tracking the potential strength of a on the topics discussed, people’s reaction in terms
celebrity endorsement. The number of followers of “likes” and retweets, who posts are shared with,
that a celebrity has on Twitter or Facebook, for frequency of posts, and number of followers. The
example, is a strong predictor of their popular- highest Klout scores (out of 100) belong to Justin
ity and potential influence. Lady Gaga has over Bieber, Justin Timberlake, and Rihanna with 93.
38 million followers on Twitter and over 57 mil- They are followed closely by Lady Gaga, Taylor
lion on Facebook. Justin Bieber has over 2 billion Swift, Oprah Winfrey, and Stephen Colbert (who
views on YouTube and over 40 million followers helped convince Bill Clinton to join Twitter). An
on Twitter. Oprah has over 19 million followers interesting note is the decline of Ashton Kutcher,
on Twitter and 8 million “likes” on Facebook. who was once seen as the pre-eminent social media
14 Actors and Social Media in Politics

user. However, Kutcher suffered very negative pub- where politicians try to out-do each either by invit-
licity over a series or tweets, especially regarding ing A-list celebrities). Over the last decade or so,
his dismay over the firing of Joe Paterno. After this however, celebrities have shown a greater willing-
incident, Kutcher turned his social media accounts ness to support a social or political cause that they
over to a public relations firm. As a result, Kutch- believe in rather than a political campaign. Sup-
er’s Klout score dropped to a low 87. porting the wrong political party or candidate can
tarnish a star’s brand or decrease their fan base.
Comedians Supporting philanthropic endeavors is a safer
While Kutcher may not have benefited from endorsement option. By supporting a cause rather
tweeting controversial statements, numerous than a candidate, celebrities are able to appear with
comedians have made their livings by criticizing politicians from both sides of the aisle, which gains
politicians or social issues in a humorous, but visibility for the cause without potentially angering
sometimes controversial manner. Bill Maher’s fans who may not hold the same political ideol-
Politically Incorrect and Dennis Miller, the faux ogy. For example, Jeff Bridges wrote on his Web
news anchor from Saturday Night Live who fol- site prior to the 2012 conventions that he would
lowed up with his self-titled show, shaped a genre be attending both the Democratic and Republi-
of entertainment in which the lines between come- can conventions to talk to politicians on behalf of
dian and commentator became blurred. Such No Kid Hungry, a group dedicated to eradicating
faux newscasts or talk shows gained tremendous childhood hunger in America.
popularity on Comedy Central in the early 2000s. Passion and commitment are key to the success
The Daily Show with Jon Stewart and The of a celebrity endorsement of either a politician or
Colbert Report (both on Comedy Central) have cause, and can successfully leverage the popular-
taken the satire and parody of news and politics ity of an actor’s fan base and get fans to partici-
to new levels. One key difference is that now the pate. Lady Gaga, Justin Bieber, Ashton Kutcher,
politicians are in on the joke and use the shows to Matt Damon, Britney Spears, and more have used
promote their agendas. The Daily Show’s “Indeci- social media to spread the word about causes they
sion 2008,” Stewart’s “March to Restore Sanity” support. Celebrities are able to deliver the mes-
versus Colbert’s “March to Keep Fear Alive,” and sage of a candidate or a charity to vastly more
Jon Stewart/Bill O’Reilly’s “Rumble in the Air people through their social media networks, or
Conditioned Auditorium” brought significant reach, which results in increased awareness, as
attention to the presidential campaigns while pro- well as more donations of money and time. The
viding issue information to the shows’ fans. The collaborations between nonprofits and celebrities
messages are conveyed through social media with are mutually beneficial as the actor gets positive
Facebook, Twitter, and dedicated Web sites serv- publicity and the cause gets validation. In other
ing also as platforms for discussion. words, a fan will see a group as legitimate and
It has been noted that younger voters rely more worth supporting if an actor they trust is involved
on the above shows for news regarding elections or in the organization.
current events than they do on traditional media. Many celebrities want to have part of their brand
Other comedians, however, have taken a more be identified with political and social awareness and
straightforward approach to message delivery. Vic- activism. Edward Norton cofounded Crowdrise,
toria Jackson, a former Saturday Night Live cast which is a grassroots donation platform. Crow-
member, is cohost of a Web series, PolitiChicks, drise allows users to tap into their social networks
that provides a platform for her political commen- to raise funds for their charitable causes. Celebri-
tary rather than comedy. Jackson is a supporter of ties such as Seth Rogan, Danny Devito, and Will
the conservative Tea Party movement. Ferrell all use the site. Crowdrise allows users to
create a microsite to raise money for a cause. The
Other Causes microsite can be permanent so that a person who
The interconnectivity between Washington, D.C., is truly committed to the cause can friend-to-friend
and Hollywood is well evident during election fund-raise continually. The better a celebrity is at
years (or the White House Correspondents Dinner, social media, the greater their chances of soliciting
Actors and Social Media in Politics 15

high levels of donations. Actor Ian Somerhader stories. In the Dean Cain example, followers from
from The Vampire Diaries raised $120,000 in one Australia posted in support of the video’s message
month for one of his charities. The additional ben- that Australia’s gun control laws did not work.
efit of Crowdrise is that an actor’s public profile
allows everyone to see what issues matter to them, Drawbacks
important for branding efforts. There are downsides to having celebrity endorse-
Malaria No More is another charity that has ments, especially in the age of social media.
successfully leveraged celebrity endorsements to Social media allows for a message to be posted
promote awareness of an issue that is not perceived and reposted, but the creators cannot control
to be of high priority by many in the United States. the reposting or the editing of certain content. A
Malaria No More designed a campaign that used recent example was Clint Eastwood’s address at
well-known comedians. The results ended up on the 2012 Republican National Convention. East-
the popular Funny or Die Web site. The cam- wood has a long political career from his support
paign resulted in 300,000 Facebook and Twitter of Richard Nixon in the 1960s to being mayor
supporters and $750,000 in donations. In 2010, of Carmel-by-the-Sea, California. During the
Lady Gaga supported a campaign to repeal the convention, Eastwood engaged in a 10-minute
military’s “Don’t Ask Don’t Tell” (DADT) policy. debate with an empty chair that was used to sym-
The social media activists asked her followers to bolize Obama. It became a defining moment in
visit the Servicemembers Legal Defense Network the campaign as the meme “Eastwooding” went
and within three days over 100,000 people went viral along with the posting of pictures of empty
to the site. Almost all of those were first-time view- chairs. In just a few days an “Invisible Obama”
ers. Her comments on Facebook resulted in over Twitter account had over 32,000 followers. Even
50,000 “likes.” Senate Majority Leader Harry Obama tweeted an image of himself sitting in a
Reid posted comments to Lady Gaga, through his chair in the White House accompanied by the line
campaign’s Twitter account, about the upcoming “This seat’s taken.”
vote that would repeal DADT. As a result of the Other celebrities have changed their support
exchange, some of Gaga’s followers tweeted their for a cause or candidate. Matt Damon, a strong
support of Reid. supporter of Obama in 2008, was extremely
The recent debate over gun control illustrates vocal in his lack of endorsement in 2012. Damon
how one celebrity can work to influence opin- asserted in social and mainstream media that he
ion through social media posts. Dean Cain, who felt that Obama had not delivered on his promises.
played Superman on the TV series Lois and Damon, however, is still active in his support of
Clark, posted a question on Twitter on April 10, other causes through social media such as the H20
2013, asking his followers if gun control could Africa Foundation. But even the negative social
work. Along with the post, he shared a link to a media case studies demonstrate that celebrities get
video that analyzed the effectiveness of Austra- people talking about the politician or cause.
lia’s semiautomatic gun control ban. Cain did not Another potential concern is the trend of celeb-
engage in a hard-sell approach, but rather let the rities viewing Twitter or Facebook as a revenue
video inform his followers so they could formu- stream rather than a transparent form of commu-
late their own opinion (or at least feel that they nication with fans. Currently, there are a handful
have formed their own opinion rather than being of celebrities who are willing to be paid to tweet
manipulated by the choice of video). Conversely, by an advertiser. The level of payment is based
Jim Carrey took a more direct approach on the on number of followers. For example, Kim Kar-
other side of the same issue by mass tweeting dashian is paid $10,000 per tweet to reach her
members of the U.S. Senate. Allowing people to almost 18 million followers, while Tia Mowry
come to their own conclusion, especially if it is the commands $1,275 per tweet for her just over
conclusion supported by the celebrity, politician, 1 million followers. The sponsored tweets are
or advertiser, is an important grassroots strategy. apparent, but if more celebrities adopt this prac-
Social media further provides validity to an issue tice it may impact the appearance of sincerity of
by allowing “regular” people to post their own any of their tweets.
16 Adbusters Media Foundation

Conclusion culture, pro-environment, activist organization


While the potential for celebrity influence via founded in 1989 by Kalle Lasn and Bill Schmalz.
social media sounds significant, this is still a new The AMF has an anti-institutional ideology that
area of study and more long-term research needs focuses on challenging traditional notions of con-
to be conducted. In the short term, it appears that sumerism, and represents itself as an organization
having a celebrity who is passionate about the for and by activists involved in building resistance
cause or candidate can have a positive impact. against consumer culture. The AMF is especially
They are able to keep an issue in front of the critical of the advertising industry, claiming that
public for a longer period of time, that is, change it is the source of many of society’s problems,
the story’s news cycle, and keep the issue on the which, the organization argues, are all worsened
cultural agenda. If nothing else, they allow for through excessive and increasing consumerism.
a broader, cross-platform conversation among a Characterized by some as anticapitalist, the
global, activist audience. AMF publishes Adbusters, a reader-supported,
advertising-free, bimonthly magazine with
Pamela C. O’Brien an international circulation of approximately
Bowie State University 120,000 people in 60 countries. Adbusters fea-
tures critical views of consumerism and adver-
See Also: Advertising and Marketing; Colbert tising, as well as criticisms of academia and its
Report, The; Daily Show, The; Musicians and Social impact on public policy decisions. In the place of
Media in Politics; Television and Social Media; paid advertisements, Adbusters features satirical
Television Personalities and Social Media in Politics. “anti-ads” that often mock traditional advertise-
ments and promote public service and nonprofit
Further Reading
Andelman, David. “Celebrity Power?” (October 17,
2007). http://www.forbes.com/2007/10/17/forbes
-tracker-celebs-oped-cx_daa_1017celebs.html
(Accessed June 2013).
Effron, Lauren. “The Most Influential Celebrities on
the Internet” (May 6, 2013). http://abcnews.go
.com/Entertainment/influential-celebrities-internet/
story?id=19118745 (Accessed June 2013).
Istanboulian, Ani. “A New Power: How Celebrities
Can Use Social Media to Influence Social
Movements.” http://digitallibrary.usc.edu/cdm/
ref/collection/p15799coll3/id/30702 (Accessed
June 2013).
Sniderman, Zachary. “Do Celebrities Really Help
Online Causes?” Mashable.com (June 29, 2011).
http://mashable.com/2011/06/29/celebrities-social
-good (Accessed May 2013).

Adbusters Media
Foundation A protester at George W. Bush’s second presidential inauguration
on January 20, 2005, holds a satirical “Corporate American
The Adbusters Media Foundation (AMF) is a Flag” created by the Adbusters Media Foundation that features
Vancouver-based, not-for-profit, anticonsumer corporate logos in place of stars and is marked “sold.”
Addiction, Social Media 17

organizations. In 2013 AMF released a book The AMF promoted the Occupy Wall Street pro-
written by Lasn titled Meme Wars, offering a test with a poster featuring a dancer atop Wall
harsh critique of the way neoclassical economics Street’s iconic charging bull and the AMF staff
is taught and written about. created the #OCCUPYWALLSTREET hashtag on
A key component of the AMF’s ideology and Twitter. The movement, which has gone global,
practice is the concept of culture jamming, a was started by the AMF, but the group does not
vehicle used by many anticonsumer culture move- control the movement or its participants.
ments to advocate for less consumerism through The AMF has received praise as well as criti-
civil disobedience and the interruption of tradi- cism for its opposition to consumer culture. Some
tional media culture. The AMF believes that cul- claim that it represents a cultural revolution and
ture jamming is the key to deconstructing con- offers inspiration for the changes needed for
sumer culture as it currently exists. Participants a more just world, while others argue that the
in these activities are called culture jammers. The organization is making a commodity out of cul-
AMF’s approach to culture jamming is largely tural resistance and lacks the necessary money or
inspired by situationist theories, which empha- power to create any lasting change.
size the reversal of received messages in order to
undermine traditional power structures. Meghan R. Sobel
Common culture jamming tactics include re- University of North Carolina at Chapel Hill
figuring logos, fashion statements, and product
images; advocating various forms of hacktivism See Also: Activists and Activism, Digital; Economic
to overcome traditional cyberspace restrictions; and Social Justice; Hacktivism; International Online
and purchasing airtime on major networks to Communities; International Unrest and Revolution;
advocate for anticonsumption ideals. In addition, Occupy Movement.
culture jamming sometimes entails transforming
mass media to produce ironic or satirical com- Further Readings
mentary about itself, using the original medium’s Adbusters Media Foundation. http://www.adbusters
mode of communication. .org (Accessed June 2013).
Binay, Ayse. “Investigating the Anti-Consumerism
Campaigns Movement in North America: The Case of
The AMF has launched numerous international Adbusters.” Unpublished doctoral dissertation,
anticonsumerism campaigns designed to encourage University of Texas, Austin (2005).
people to decrease their participation in consumer Rumbo, Joseph. “Consumer Resistance in a World
culture. The AMF created and cosponsored events of Advertising Clutter: The Case of Adbusters.”
such as “Buy Nothing Day,” “Unbrand America,” Psychology & Marketing, v.19/2 (2002).
and “TV Turn-Off Week,” which the organization Winkler, Anne. “Manufacturing Dissent? The
believed would help citizens lessen their involve- Cultural Politics and Communicative Strategy
ment in excessive consumer consumption. The of the Adbusters Media Foundation.” ProQuest
AMF has also sold Blackspot shoes, which are Dissertations and Theses. University of Alberta,
made in an “antisweatshop” facility in Pakistan. Canada (2004).
The most notable of the AMF’s campaigns has
been Occupy Wall Street. According to the AMF
Web site, along with groups such as Occupy Wall
Street, USDayOfRage, NYC General Assembly,
Take The Square, and Anonymous, the AMF Addiction,
called for
Social Media
20,000 people [to] flood into lower Manhat-
tan [on September 17, 2011], set up tents, Social media addiction is an increasingly popular
kitchens, peaceful barricades and occupy Wall term used to represent heavy use of social net-
Street for a few months. works that interferes with daily life. Many studies
18 Addiction, Social Media

have shown that social media possess addictive increasing debate among psychological commu-
qualities similar to drug, alcohol, or chemical nities. Scholars identify that social media users
addictions. Terms associated with social media become addicted to different aspects of media
withdrawal, similar to those of other addiction usage. One of the first studies to assess Facebook
withdrawals, include frantically craving, very addiction was crafted by Cecilie Andreassen of
anxious, extremely antsy, miserable, and jittery. the University of Bergen, Norway. She identi-
Excessive usage of social media is only begin- fied addiction occurring more regularly among
ning to be examined in a modern, media-laden younger users than older users. Andreassen
world as a possible psychiatric disorder and by- also identified that people who are anxious and
product of the cultural adoption of mediated socially insecure use social media more than oth-
platforms at an increasing rate. The scope and ers, possibly because those who suffer from social
examination of social media addiction is derived anxiety find it easier to communicate via social
from studies that focus on Internet addiction. media than face to face.
Other addiction studies relating to pathological It has also been found that organized and more
gambling and substance dependency also provide ambitious individuals tend to be less at risk from
a framework for evaluation. A study by the Inter- social media addiction as they will often use
national Center for Media & the Public Agenda social media as an integral part of work and net-
(ICMPA) at the University of Maryland concludes working. People scoring high on narcissism tend
that most college students are not just unwilling to be more active on social network sites as those
but functionally unable to be without their media sites provide opportunities to present oneself in a
links to the world. “I clearly am addicted, and the favorable way in line with one’s ideal self.
dependency is sickening,” says one respondent. Research that evaluates gender and the usage
of social media has indicated that women are
Forms more at risk of developing social media addic-
The six different types of social media outlets tion, which many scholars believe is a result of
from which addiction may stem are (1) Wikipedia, the social nature of interacting with the media.
(2) blogs and microblogs, such as Twitter; (3) con- The five-factor model of personality, also
tent communities, such as YouTube; (4) social net- known as the Big Five, assesses broad domains or
working sites, such as Facebook; (5) virtual game dimensions of personality that are used to describe
worlds, such as World of Warcraft; and (6) virtual human personality and has been used as a tool to
social worlds, such as Second Life. understand addictive tendencies and their rela-
Cell phone addiction is identified as a form of tion to personality type. The model focuses on
social media addiction. With 6.7 billion mobile personality assessment based on five main dimen-
subscriptions, 1.3 billion smartphones, 2.3 bil- sions: (1) extraversion (being outgoing and talk-
lion users consuming news on mobile devices, ative), (2) agreeableness (being sympathetic and
and 4 billion users receiving ads on their mobile warm), (3) conscientiousness (being organized
devices, the mobile segment possesses a 94 per- and prompt), (4) neuroticism (being nervous and
cent penetration rate for the planet and signifi- moody), and (5) openness to experience (being
cantly adds to the ubiquity of social media access. creative and intellectually oriented).
Social media addictive tendencies have been
Assessment reported to be positively related to extraversion
Although mobile technology may increase social and negatively related to conscientiousness. Schol-
media addiction issues, some scholars say that ars have reported that extraversion, neuroticism,
engaging social media regularly is an activity that and openness to experience were all positively
benefits children and adolescents by enhancing associated with frequency of social media use. It
communication, social connection, and even tech- has been suggested that extroverts use social media
nical skills. for social enhancement, whereas introverts use it
Questions of whether social media addicts for social compensation, each of which appears to
are addicted to the platform of social media or be associated with elevated use. People who score
the associated content have become an area of low on conscientiousness are assumed to use social
Addiction, Social Media 19

media as a way of procrastinating; hence, consci- is rated on a 7-point scale with anchors of 1
entiousness is assumed to be negatively associated (strongly disagree) and 7 (strongly agree). High
with social media use. Neuroticism is assumed ratings indicate high addictive tendencies.
to be positively related to use of social media as The NEO-Five Factor Inventory is a short,
it may be a way of seeking support. In addition, 60-item version of the NEO Personality Inven-
social media gives people with high scores on tory-Revised, which provides a brief, compre-
neuroticism more time, compared to face-to-face hensive measure of the domains of the five-factor
interactions, for contemplation before acting. model of personality: neuroticism, extraversion,
Andreassen’s Bergen Facebook Addiction Scale openness, agreeableness, and conscientiousness.
is based on six basic criteria, where all items are The BIS-BAS scales assess behavioral inhibition
scored on the following scale: (1) very rarely, using seven items. Focus is on measuring predis-
(2) rarely, (3) sometimes, (4) often, and (5) very position to avoid threatening or punishing stim-
often: uli. The BAS scale of 13 items assesses predisposi-
tion to approach appetitive stimuli.
• You spend a lot of time thinking about
Facebook or plan use of Facebook. Conclusion
• You feel an urge to use Facebook more Overall, the swell of social media prominence
and more. and its associated addictive qualities is an area
• You use Facebook in order to forget of increased investigation from academic, cor-
about personal problems. porate, and technological orientation. As media
• You have tried to cut down on the use of increases bandwidth, cell phone networks con-
Facebook without success. tinue to stream faster data, and device capacity
• You become restless or troubled if you increases, the end user is interacting with more
are prohibited from using Facebook. complex information becoming traded on social
• You use Facebook so much that it has media spaces. This exchange of information con-
had a negative impact on your job or tinues to situate technology and the end user in an
studies. increasingly complex relationship, with addictive
tendencies seemingly on the rise.
Andreassen’s study shows that scoring of often or
very often on at least four of the six items may Jason Schmitt
suggest that a person is addicted to Facebook. Green Mountain College
There have been other measures to assess social
media addiction, including the Facebook Attitude See Also: Attention Crash; Cognitive Surplus;
Scale. This scale has six items for assessing atti- Facebook; Social Computing and Social
tudes toward Facebook. Each item is rated on a Information Processing; Social Media, Adoption of;
5-point scale with anchors of 1 (strongly disagree) Superconnected.
and 5 (strongly agree). Higher scores then reflect
positive attitudes toward Facebook, according to Further Readings
N. B. Ellison and colleagues. Ellison, N. B., C. Steinfield, and C. Lampe. “The
The Online Sociability Scale is comprised of Benefits of Facebook ‘Friends’: Social Capital
five items, each pertaining to frequencies of dif- and College Students’ Use of Online Social
ferent uses of Facebook, such as comments on Network Sites.” Journal of Computer-Mediated
photographs or sending private messages. Scores Communication, v.12/4 (2007).
are rated on a 9-point scale using the anchors of Osuagw, Nnamdi. Facebook Addiction: The Life
1 (less than once per year) and 9 (more than once & Times of Social Networking Addicts. n.l.:
daily). Higher ratings reflect high frequency of Ice Cream Melts Publishing, 2009.
Facebook use. Perlow, Leslie. Sleeping With Your Smartphone: How
The Addictive Tendencies Scale has three items to Break the 24/7 Habit and Change the Way You
representing salience to, loss of control of, and Work. Cambridge, MA: Harvard Business
withdrawal from Facebook usage. Each item Review, 2012.
20 Advertising and Marketing

Advertising and advertising through social media can offer com-


panies unique opportunities to engage with their
Marketing customers through open communication, collab-
orative information creation, and rapid feedback.
Increasingly social media is the first thing that Also, social media advertising has shown promise
people check when they wake up in the morn- as a way to influence product awareness, opinions
ing and the last thing that they check before they and attitudes, information seeking, purchasing,
go to bed. Staying connected via smartphone or and postpurchase discussion. This is the case even
tablet (the PC is rapidly being replaced globally if—perhaps, especially if—the “product” being
as the device of choice for accessing the Internet) marketed is a political candidate, an advocacy
is not restricted to teenagers or young adults, agenda, or a particular ideological stance on a
although they are still the heaviest users of social salient social issue. These benefits of social media
media. Worldwide, one out of seven people had a advertising will become clearer as social network-
Facebook page in 2013 (approximately 1 billion ing sites continue to refine their advertising and
people or more than three times the population marketing platforms.
of the United States, with 680 million of those According to a Vizu study in October 2012,
being mobile users), and close to four out of five 75 percent of advertisers are using social media,
people visit social networks or blogs on a regular shifting budgets from offline to online to do so, as
basis. Twitter doubled its user base in the last six they recognize the need to create advertising cam-
months of 2012 and has surpassed 200 million paigns for both traditional and social media. Social
active users. YouTube has 4 billion views per day media marketing (SMM) involves both paid and
with 72 hours of content being uploaded every unpaid practices. Unpaid platforms can be corpo-
minute, and Flickr provides users access to over rate Facebook pages, blogs, YouTube channels, or
8 billion photographs. While these numbers are Twitter accounts. These are all clearly identified
impressive, the figures will continue to increase as as being created and maintained by a corporate
consumers turn more to second screen (mobile) entity, as transparency is very important in social
devices to not only stay connected through social media advertising. Paid platforms involve ads
media, but also to watch and discuss the majority on any of the above sites or the sponsorship of
of their entertainment and news programming. blogs. The paid portion of social media efforts are
As the eyes of consumers turn more and more a relatively small percentage of advertising bud-
to social media, companies look increasingly gets, with 70 percent of advertisers only spend-
to social media as a key platform for delivering ing between 1 and 10 percent of their budgets on
advertising messages. social media. It is anticipated that this percentage
By 2017, it is predicted that social ad spend- will continue to rise, as over 64 percent of compa-
ing will rise to $11 billion, up from $4.7 billion nies plan to increase their social media advertising
in 2012. The importance of such high connectiv- spending in 2013.
ity for social media advertising and marketing is By 2017 social media advertising may account
magnified, because social media sites are able to for almost 20 percent of a company’s total adver-
collect tremendous amounts of both demographic tising budget. Of the money being spent, over 50
(age, sex, race, income) and psychographic (val- percent of advertising dollars are going to Face-
ues, beliefs, desires, consumption patterns) data. book ads, with Twitter and YouTube a distant
Such market research is referred to as “netnog- second with 13 percent. But SSM spending is not
raphy.” In spite of these values, companies have consistent worldwide. North America dominates
been slow to incorporate social media into their social media advertising spending, accounting for
advertising mix. This is due in part to a lack of almost half of all ads globally. Western Europe
clear understanding regarding how social media and Asia each spend approximately one-fourth of
fits into a traditional integrated marketing com- all global social media advertising dollars, while
munication (ICM) plan, as well as an inability to the Middle East and Africa combined account for
effectively measure the metrics that demonstrate less than 1 percent. These figures do not match
a return on investment. In spite of the concerns, with social media and Internet use as the United
Advertising and Marketing 21

States ranks fourth in social media use behind billion (97 percent of that revenue is from adver-
Indonesia, Argentina, and Russia. tising), return on investment for the companies
The primary area for paid advertising on social placing the advertisements has decreased due to
media is through what is known as native adver- increased cost. However, businesses still see profit-
tising. Native ads are ones that are extremely rele- ability, as there is an average $2 return for every
vant, that is, targeted to specific users and embed- $1 spent through Google AdWords.
ded within news streams on Facebook, Twitter, or
LinkedIn. Native ads could involve video or inter- Facebook
active content, but the goal of native advertising Facebook, a company that posted $305 million in
is to find commonalities between target audiences advertising revenue in 2012, is constantly updat-
and advertising to bring the two together. This ing and expanding its tools for advertisers. In July
is where social media excels, as individuals seek 2012, the company launched page post targeting
out social media sites or groups that match their enhanced, which allows organizations to target
own interests. The search for commonality can their page posts based on key demographic and
lead to the creation of brand communities where psychographic information such as “likes,” gen-
consumers gain information, share ideas, play der, relationship status, and more. This then helps
games, and more. Advertisers need to find, or
occasionally create, such sites to reach their target
audience(s). Such targeting is engaging, relevant,
and fosters word-of-mouth or viral spread of the
advertising message. Social media sites have been
creating multiple ways to assist companies in the
distribution of native advertising and the forma-
tion of brand communities, as can be seen in the
sampling of techniques and platforms that follow.

Google
One of the earliest advertising services on the
Internet was Google AdWords, which launched in
October 2000. Through AdWords a business cre-
ates an ad and then identifies key words related to
the business. Whenever a potential customer per-
forms a Google search using one of the key words,
the business’ ad might appear. The system worked
on a pay-per-click basis (also known as cost per
impression or CPM): companies were only charged
if someone clicked on the ad that directed them to
the advertiser’s Web site, and prices per click were
relatively low, with many at $0.25.
In 2002, AdWords was switched to an auction
model where companies have to bid in order to
receive key placement and a greater chance of their
ad being shown. This has resulted in significant
price increases, with some searches costing $100
per click in order to receive the highest placement
on Google. Placement does matter, as advertise-
ments in the top positions receive 10 times as Industry representatives gathered in Facebook’s booth at
many clicks as ads that are in side locations. While ad:tech London, an event for online marketing and advertising
Google AdWords is very profitable for Google, specialists in September 2010. By 2012 Facebook’s advertising
and 2012 revenue increased 35 percent to $12.21 revenues had exceeded $300 million.
22 Advertising and Marketing

to drive traffic to a company’s Web site by col- rate the recommendation is $1.50. Companies
lecting user information on the Facebook domain that want to increase their chances of having their
based on the clicking of the “like” button. This tweets appear can bid more. In addition, com-
was followed in August by Pages You May Like, panies can pay a recommended $2.50 per new
paid-for sponsored stories, and Sponsored Results, follower to have their company included in the
ads that display near searches as well as more “Who to Follow” box on the Twitter home page.
refined ad targeting techniques. Facebook’s tools Facebook also allows companies to push coupons
are not limited to large companies. Page Like Ads or promotions to potential customers through
are designed to assist small businesses in creating Facebook Offers. Offers can be shared with other
ads for either the mobile or desktop platforms. users and will appear in a user’s timeline.
More recently, Facebook added Partner Cate- In February 2013, Twitter bought Bluefin Labs,
gories to track user data across the Web as well as a company that captures social media analytics,
outside the Web. Previously, advertisers only had which resulted in the launch of Twitter TV Ad
access to data in a person’s Facebook profile. With Targeting. This service allows television advertis-
the Custom Audience feature, advertisers receive ing campaigns to be synced to Twitter ad cam-
not only Facebook profile information, but also paigns. The service tracks when an ad runs on
offline information such as purchase history, job television and then who tweets about the show.
category, and lifestyle. While there are many pri- While there is no guarantee that a tweet about a
vacy concerns with such tactics, as will be discussed TV show means that a person saw the ad, it does
later, Partner Categories do not share information indicate a higher level of engagement. Companies
about one specific Facebook user. Rather, they cre- can build in interactivity, and there is an increased
ate categories that show advertisers the number of possibility of consumer-to-consumer communica-
users who fall into them, such as dog owners. If tion. The goal of all of Twitter’s advertising plat-
that is a category that a company’s advertisement forms is to help businesses target individuals who
appeals to, then the Power Editor tool will allow will more likely become customers, and conver-
a target message to be driven to those Facebook sion rates can occur for as little as $0.60. The
users. All of these advertising features, as well strategy appears to be working. In just two years
as a tool to set the advertising budget, are easily of offering paid advertising, Twitter’s advertising
accessed through the Ads Manager button on a revenue grew 213 percent to $139.5 million in
company’s Facebook page. Advertisements on 2011 and $288 million in 2012.
Facebook must be kept simple, as the ad headline Another trend for advertising on Twitter makes
can be no more than 25 characters and the text is use of the high number of people who follow tweets
only 90 characters. An ad may feature an image, by celebrities. Fans like to feel that they really know
but that image will then be the thumbnail every- their favorite celebrity and posts on social media
one sees on the company’s Facebook page. allow this to occur (although many posts are made
by public relations firms rather than the celebri-
Twitter ties themselves). Companies are beginning to pay
Twitter began to refine its advertising options in celebrities to tweet about their product or service.
2010 with Promoted Tweets, Promoted Trends, For example, Kim Kardashian is paid $10,000 for
and Promoted Accounts. These types of promoted a sponsored tweet to reach her over 17 million fol-
advertisements are clearly labeled as such, but lowers. Charlie Sheen joined Twitter and quickly
can be targeted to relevant users and thus appear was paid $9,500 to tweet about internships.com.
in their timeline. Users can click on the tweet, The site received over 95,000 clicks in one hour.
trend, or account for more information or they Such sponsored tweets are akin to having paid
can dismiss the information out of their timelines. celebrity endorsers, but it is not always clear to
However, users cannot opt out of receiving future readers that the tweets are being sponsored.
promoted items. Prices for Promoted Trends
are $200,000 a day, and Twitter recommends a YouTube
cost-per-click bid of at least $0.50 for Promoted YouTube also has a booming advertising busi-
Tweets, but in order to receive a higher placement ness, showing in 2012 a 60 percent increase in
Advertising and Marketing 23

revenue over 2011. Advertisers paid over $4 bil- frequently when they are seeking out information
lion to YouTube; this will likely increase because on a company or product.
of new revenue-sharing programs. The new pro- A company’s social media sites should become
grams eliminate the need for content creators to the primary place that consumers go to seek out
seek YouTube’s permission to pair their videos information. Because companies cannot control
with a sponsor. There is now a simple “monetize” all of what is being said about them in social
button that permits content creators to connect media, they do need to monitor on a regular basis
with a monetizing partner almost seamlessly— what is being said about their products or services.
although some users do report glitches, delays, The comments, if positive, can be used to help
and even interruptions in monetizing through the promote the company through sharing the posts
“green button” function. Content creators keep across social media platforms or to implement a
roughly half of all of the revenue. Ads can occur predetermined communication plan to deal with
before the video or on the home page. YouTube’s negative posts. All companies need to have social
Ads Leaderboard allows possible advertising cre- media policies and plans in place.
ators an opportunity to view which ads are cur- Another drawback to social media marketing
rently the most popular. YouTube’s advertising is a lack of effective metrics to measure success
processes are tied to Google’s AdWords through of advertisements. Therefore, many companies
TrueView suite. utilize social media primarily as a way to build
brand image and awareness, which is measured
Integrated Marketing Communication using pins, “likes,” views, click-throughs, shares,
Regardless of which social media platform(s) a and retweets. Advertisers would prefer to find a
company selects to advertise on, the advertising way to assess brand lift and sales through social
messages must be part of the company’s over- media marketing. Without an effective way to
all marketing plan (IMC). Integrated marketing gather this data, greater use of social media as an
communication is a process in which companies advertising platform will continue to be limited.
create a coordinated plan across all aspects of the Many companies are working to develop effective
marketing mix in an attempt to control and unify metrics, and a beta test by Twitter of one such
the messages distributed to consumers about an metric demonstrated that promoted tweets had a
organization’s objectives or goals. Traditional 22-percent higher message association.
IMC plans rely on managers to carefully con- The potential downsides of social media adver-
trol what is being said and how it is being said. tising do not outweigh the potential benefits. Com-
Since social media is heavily consumer-generated, panies who use their social media walls to push
companies lose part of that control. That does their advertising messages witness strong conver-
not mean, however, that social media cannot be sion rates, clicks that result in sales, sign-ups, time
incorporated into an IMC plan. on-site, or other tangible activities. Unpaid social
Companies need to recognize the unique nature media ads can also result in strong referral traffic
of social media in order to utilize it effectively. For such as sending potential customers to company-
example, companies need to talk to, not at, con- sponsored blogs. Regardless of what a company
sumers, as well as listen to what the consumers are uses, either paid or unpaid, it is important to use
saying. Hard or direct sell tactics are not the most social media as a way to help customers as much
effective in social media ads. This is due, in part, as possible. As with traditional advertising, social
to the multiple communication channels seen in media ads need to show how a company or prod-
social media: company to customers, customers uct can solve a problem that a customer is facing.
to company, and customer to customer. While If a company can convince that targeted individual
this does shift the balance of power toward the that their product will most successfully correct
consumer, social media–savvy companies realize the problem, then a sale can occur. In social media,
that this is the new landscape consumers operate however, such successful problem solving can go
in. Consumers trust social media sites for provid- viral and be spread to thousands, if not millions,
ing unbiased information, although this may not of other people. It is word of mouth on a digi-
be a correct assumption, and turn to them more tal, global scale. In addition, social media benefits
24 Advertising and Marketing

from the fact that all posts, whether advertising or Other Issues
not, appear organic and thus, people are willing It is important to note that there are other issues
to share those posts with others, especially if they that companies need to be aware of when they are
involve a good success story. creating a social media marketing plan. Many of
There are many other strategies for how to these are legal issues that relate to privacy. Over
effectively use social media marketing as part of the last few years, there have been increasing
an IMC plan. Experts consistently reference social numbers of lawsuits aimed at clarifying the rela-
media’s ability to easily track consumer prefer- tionship between the types of information that
ences through what they “like” or follow. Com- social media sites gather about their users and
panies can use this information to seek out the what they can provide to advertisers. Learning
sites that bring customers together based on com- such personal information is key to the ability to
mon interests related to a company’s core busi- use social media to effectively target the consum-
ness. These sites provide engaged potential cus- ers advertisers are trying to reach, but is this a
tomers that should be more receptive to related violation of user privacy?
advertising messages, whether sponsorship of a California now requires that all apps (either
site or a banner ad. Shared interest also allows for on the Apple App Store or the Android Store)
feedback that the company can use to improve have a privacy policy that is available to consum-
its messages or the products themselves. In addi- ers prior to downloading an app. Other states
tion, allowing consumers to share what they are and Congress are currently looking into privacy
“liking” throughout their entire social media issues and more regulation will be likely in the
presence makes consumers feel like they are part future. Regulation regarding collecting personal
of the process (or dialogue), while also becoming data from children has already changed as a result
another form of unpaid advertising. of an amended Children’s Online Privacy Protec-
tion Act (COPPA) of December 19, 2012, by the
Customer Participation Federal Trade Commission that seeks to limit
Research has shown that social media advertise- the information a company can collect and share
ments that encourage some level of customer about children under the age of 13 without paren-
participation or interaction are also effective. tal consent.
Examples include loyalty programs, online vot-
ing (especially for social causes to receive fund- Conclusion
ing), or gaming. Games may not appear to be an Regardless of how social media is used as an adver-
ad, but if created properly they can be an effec- tising tool, businesses need to keep in mind that
tive way to promote a product. Movie companies some aspects of good advertising do not change.
have embraced this form of online advertising. First, companies need to clearly define the objects
These examples tie into the need for companies to that they wish to achieve through social media.
think outside the box of what an advertisement Advertising is driven by assessment and account-
should look like, as well as a willingness to be a ability. Companies need to know that they are
bit outrageous in the creative content of an ad. receiving return on investment as well as meeting
For example, Dove’s “Evolution” campaign fea- all of an IMC plan’s goals. Clearly defined out-
tured a short video that exposed the make-up and comes will help a business to carefully select the
Photoshop tricks used to make models appear marketing channels that best fit their corporate
more conventionally beautiful. The video was message, since there are too many social network-
designed to encourage discussion about distorted ing sites to utilize them all for each campaign.
body image and issues of self-esteem. The video Companies need to pick the ones that best match
was viewed over 44,000 times the first day and with the marketing objective. Regardless of which
12 million times within the first year. The bigger traditional or social media platforms they select,
benefit for Dove is the estimated $150 million of all advertising messages must be kept consis-
free advertising the campaign created due to viral tent and straightforward. Effective social media
spreading of the video that resulted in mainstream marketing campaigns should be simple, show a
media discussion of the ad. product’s advantage of price and quality over the
Advocacy Groups, Political Branding of 25

competitors, contain an engaging or fun advertis- organizations (NGOs), lobby organizations, pres-
ing message, and clearly convey the unique selling sure groups, activist groups, or social movement
proposition of the product or service. organizations. Advocacy groups may differ by
size and objectives­—either long-term impact or
Pamela C. O’Brien short-term response to the issue in focus. The
Bowie State University range of issues addressed by various advocacy
groups covers issues addressed by local, state, and
See Also: Buzz Creation; Cause-Marketing federal governments, as well as issues that are not
Campaigns; Click-Through Rate; Engagement addressed by government, but are of interest to a
Advertising; Focus Groups; Going Viral; Google specific community. This range can cover labor,
AdWords/AdSense in Campaign Strategy; Interactive civil rights, democracy, education, health care,
Advertising Bureau; Proxy Measurements; Return the environment, commerce, religion, or the jus-
on Investment; Rich Media Ad; Search Engine tice system. Motives may vary from political and
Optimization; Sponsored Listings; Viral Marketing. religious to commercial spheres. Methods used
by groups for advocacy activities include lob-
Further Reading bying, media campaigns, publicity stunts, polls,
Kaplan, Adreas M. and Michael Haenlein. research, and policy briefings. Some groups are
“Users of the World, Unite! The Challenges supported by powerful business or political inter-
and Opportunities of Social Media.” Business ests and exert considerable influence on the politi-
Horizons, v.53/1 (2010). cal process; others have few such resources.
Long, Mary C. “Social Media Advertising Statistics Some groups have developed into important
and Trends to Get Your Company off its Duff and political institutions or social movements. Pow-
Online.” Mediabistro.com (April 5, 2013). http:// erful lobby groups are sometimes argued to be
www.mediabistro.com/alltwitter/social-media-advert manipulating the democratic system for com-
ising-statistics_b39349 (Accessed April 2013). mercial gains; therefore, lobbying activities have
Mangold, W. Glynn and David J. Faulds. “Social become strictly regulated in some countries as
Media: The New Hybrid Element of the Promotion a result. Advocacy groups with less financial
Mix.” Business Horizons, v.52/4 (2009). resources may use direct action, protests, and
Thomas, Lisa and Jason Gordon. “Social Media and riots as a form of civil disobedience; therefore, in
Advertising: What Is on the Horizon?” Social some countries they are accused of being a threat
Media Law Reporter, v.2/2 (January 8, 2013). to the social order as “extremists.”
Vizu. “Paid Social Media Advertising: Industry Advocacy groups can initiate policy changes
Update and Best Practices 2013.” http://www through various channels apart from govern-
.mediapost.com/whitepapers/10/paid-social-media ment or the political structure, such as media
-adv-report-2013-final (Accessed May 2013). messages along with public opinion campaign-
ing. Groups will generally use two distinct styles
when attempting to manipulate the media—they
will either put across their outsider status and
use their inability to access the other channels
Advocacy Groups, of influence to gain sympathy, or they may put
across a more ideological agenda. Examples of
Political Branding of such groups were the trade unions that would
campaign in the form of industrial action and
Advocacy groups, or interest groups, are specific marches for workers’ rights, gaining much media
actors that undertake a systematic effort to further attention and sympathy for their cause. The activ-
or achieve specific policy goals, to some extent, ities of advocacy groups with less or no financial
through the influence on public opinion; there- resources for campaigning are especially interest-
fore, their impact in the development of politi- ing with respect to assessing opportunities for the
cal, economic, and social systems is undoubted. use of social media to facilitate civic engagement
Advocacy groups might include nongovernmental and collective action.
26 Advocacy Groups, Political Branding of

Social Media and Political Branding media are being used and perceived by groups
The whole idea of “branding” products, services, who strive to accomplish certain goals.
or ideas is about communication with a target A study on the use of various social media
group. Advocacy groups, especially those for- engines by advocacy groups was conducted
malized as NGOs or lobby organizations, aim to in 2012. According to its outcomes, advocacy
address policy issues, and therefore may need to groups of different political and ideological ori-
interact with their target communities through a entations operating in the United States are using
political brand. social media to interact with citizens every day.
The use of social media is a feature of politi- A survey of 169 representatives from 53 national
cal and civic engagement for millions of people advocacy/activist groups operating in the United
around the world. The survey conducted by the States assessed the extent to which these groups
Pew Research Center’s Internet and American perceive and use social media as tools for facili-
Life Project in the United States in 2012 discov- tating civic engagement and collective action. To
ered that around 60 percent of American adults assess how members of advocacy groups per-
use social networking sites like Facebook or Twit- ceive social media as tools that can facilitate civic
ter, and that 66 percent of those social media engagement and collective action, social media/
users—which is about 40 percent of all adults communication directors were asked to rank five
in the United States—have done at least one of social media technologies (Facebook, Twitter,
eight civic or political activities with social media. YouTube, blogs, and e-mail discussion lists) in
The following figures from this study also sup- terms of their effectiveness in facilitating various
port the statement that political branding of advocacy-related tasks.
advocacy groups through social media is essen- Quantitative results reveal that all groups are
tial nowadays: 38 percent of those who use social using a variety of social media technologies to
networking sites or Twitter use those social media communicate with citizens almost every day.
to “like” or promote material related to politics Facebook received the strongest scores overall,
or social issues that others have posted; 34 per- with Twitter and e-mail discussion lists often
cent of social media users have used the tools to being noted as other strong options. YouTube
post their own thoughts or comments on political was overwhelmingly regarded as the worst or
and social issues. Also, 21 percent of those who among the worst in most cases. Among the larger
use social networking sites or Twitter belong to a groups, other applications being used include
group on a social networking site that is involved Flickr, Tumblr, Foursquare, Identi.ca, Picasa,
in political or social issues, or that is working to and Vimeo. Medium-sized groups reported that
advance a cause. There are no major differences they use Vimeo as well as Jumo, Diigo, and Con-
by ideology or partisanship when it comes to stant Contact. Of the small groups, some use
using social media this way. About 31 percent of Flickr and also Joomla, JamSocial, Myspace,
social media users have used site tools to encour- and Atheist Nexus, a social media site for the
age other people to take action on a political or Atheist community.
social issue that is important to them. Qualitative results suggest that groups believe
that social media can facilitate civic engage-
Advocacy Groups and Social Media Use ment and collective action by strengthening out-
Advocacy groups are using the Internet to accom- reach efforts, enabling engaging feedback loops,
plish organizational goals, and have been doing increasing speed of communication, and by being
so for more than 10 years. It has been suggested cost-effective. As noted in the study,
that the Internet has had a positive impact on the
activities of social movement organizations by . . . while some groups raised doubts about
increasing the speed, reach, and effectiveness of social media’s ability to overcome the limita-
communication and mobilization efforts. Assess- tions of weak ties and generational gaps, an
ing the extent to which social media can facilitate overwhelming majority of groups see social
civic engagement and collective action requires a media as essential to contemporary advocacy
broader and deeper understanding of how social work, and laud its democratizing function.
Advocacy Groups, Political Branding of 27

Individual Engagement that rises from an activist information chain to


Social media provide considerable impact on ini- more general Web sites (blogs and social network-
tiating and proceeding with the political commu- ing sites), and then appears in the mainstream
nication campaigns that engage individuals with press that monitors and may even own such Web
advocacy activities. The branding of political mes- sites. Many news stories may first appear in social
sages is a powerful networking tool. Moreover, media as catchy phrases and anecdotes that take
branded political communication helps activists on a life of their own when thousands and even
gain access to the mass media on terms far more millions of networked citizens hit their send or
favorable to activist messages than if those mes- forward keys.
sages were packaged in more conventional ideo- The place of the Internet and social media in
logical terms. the structure of global issue activism activities is
Activist networks using branded communica- rather central with respect to the relations among
tion strategies can sustain long-term political ini- different players. Some authors argue that the
tiatives even in the absence of the strong central importance of social media as a means of mobi-
coordination and the organizational resources lizing action increases with such characteristics of
that seem to be required for success in more con- the social movement as the number of actors and
ventional advocacy politics. At the same time, organizations in a network, the diversity of issues
there may be political disadvantages in loosely and goals, the geographical reach, or the length
networked consumer activist campaigns that lack of run time for a campaign. Another prediction
the decision-making capacity and strategic coher- is that the stability, effectiveness, and strength of
ence of more conventional campaigns run by member identification with complex (multi-issue,
NGO advocacy organizations. multi-goal) campaigns increase with the emer-
Individuals disconnected from traditional gence of network coordinating hub organizations
social and political institutions can therefore that use e-mail and Web news to keep dynamic
join advocacy campaigns through social media. networks in communication over time.
For increasing numbers of citizens—especially Another angle of using social media by advo-
younger generations—politics in conventional cacy groups and activists is that the alternative
(collective, government-centered, electoral) forms movement opposed to branded products or
has become less salient. companies can become strong and influential
The campaign as a permanent basis of politi- in social media. Some multinational companies
cal organization can be traced directly to the have been developing their brand histories for
changing social conditions of globalizing societies decades; therefore, to confront them advocacy
and their weakened group, party, and ideologi- groups may need to create alternative branded
cal bases of political organization and mobiliza- campaigns, especially when arguing about par-
tion. Campaigns in such social contexts thus serve ticular policy changes.
more than just the purpose of communicating One of the recent studies of the social media
political messages and achieving political goals. effect in advocacy campaigns and global activ-
They also become mobilizing and organizing ism analyzed a case involving Nike in which one
devices in contexts that lack more fundamental activist network was aiming to pressure the mul-
organizing mechanisms such as strong parties, tinational company to join standards monitor-
formal interest groups, or ideologically defined ing systems. The advocacy group and activists
social movements. did that independently of government brokering.
The Internet in general and social media in par- The case reflects the perception of many activ-
ticular are actively used in global activism for rea- ists that international labor standards regimes
sons far beyond reducing the costs of communica- have largely slipped past governmental regulation
tion. The Internet uniquely facilitates the loosely and that organizations such as the International
structured networks and affinity ties of this brand Labor Organization are ineffective advocates. As
of late modern politics. Electronically driven sto- a result, many sweatshop activists seek to create
ries contain the potential to scandalize a cam- labor standards monitoring systems that must
paign target with a blitz of electronic information be sustained and enforced through consumer
28 Africa, North

pressure. Combining the low cost and global Political Outreach and Organizing
reach of social media with the public salience of Political movements, parties, politicians, and
logo campaigns (that might begin on the Inter- activists use social media to reach beyond those
net and spread out in the mass media), sustain- who already support their cause or party and seek
able activist networks have developed successful to further gain support. Social media have been
political strategies based on targeting companies useful tools for political outreach in north Africa,
and their brands. with political messages reaching populations that
were not particularly politically active and draw-
Tetiana Kostiuchenko ing those people into political activism. For exam-
National University of Kyiv-Mohyla Academy ple, in Egypt, young people were galvanized to
move into the streets to protest in 2011 because
See Also: Activists and Activism, Digital; Bottom- calls to action were heard through Facebook and
Up Campaigns; Campaigns, Grassroots; Campaigns, through the messages of popular bloggers.
2012; Citizen Journalism; Demonstrations, In Algeria, particularly in the south of the
Organizing; Facebook; Lobbyists; Nongovernmental country, organization of youth activism around
Organizations; Special Interest Campaigns. issues of social and economic justice have been
enabled in part by the use of social media. Pro-
Further Readings tests in several cities in March 2013 demanding a
Bortree, Denise S. and Trent Seltzer. “Dialogic more equitable distribution of wealth in Algerian
Strategies and Outcomes: An Analysis of society received wide coverage on social media.
Environmental Advocacy Groups’ Facebook Part of political organizing is mobilizing support-
Profiles.” Public Relations Review, v.35/3 (2009). ers. In Libya, when activists and those fighting the
Obar, Jonathan, Paul Zube, and Cliff Lampe. revolution in 2011 were running from the Libyan
“Advocacy 2.0: An Analysis of How Advocacy army or had no access to state controlled media,
Groups in the United States Perceive and Use Social they took to using social media platforms as one
Media as Tools for Facilitating Civic Engagement method for reaching their supporters to inform
and Collective Action.” Journal of Information and mobilize them into action.
Policy, v.2 (2012). The most obvious demonstration of social
Rainie, Lee, Aaron Smith, Kay Lehman Schlozman, media’s importance in politics in north Africa can
Henry Brady, and Sydney Verba. “Social Media be seen in the popular uprisings that took place in
and Political Engagement.” Pew Research Center Tunisia, Egypt, and Libya. While the precise impor-
(2012). http://pewinternet.org/Reports/2012/ tance of social media’s roles in those uprisings is
Political-Engagement.aspx (Accessed June 2013). still being debated, it is clear that social networking
sites like Facebook and Twitter were used as means
for citizens to speak out and as a vehicle to gather
in virtual space. These gatherings in virtual space
often translated to political gatherings in physical
Africa, North space, like in Tahrir Square in Cairo, the site of the
most visible symbol of the Egyptian revolution.
The 21st century has seen social media in north Politicians in north Africa, particularly after the
Africa play an important role in politics. Various revolutions in that region, recognize the impor-
social media platforms have been used for politi- tance of social media in communicating their polit-
cal organizing and outreach, have been co-opted ical messages. The Egyptian military began to use
by mainstream media and citizen journalists Facebook to communicate with Egyptian citizens
alike, have allowed a means to circumvent gov- after the uprisings and the fall of President Hosni
ernment censorship, and provided people a place Mubarak, clearly indicating they recognized the
to debate issues of social importance. The use of utility of that social media in political outreach.
social media in politics in the region has blurred Social media play an important role in north
national borders and to a large degree torn down African politics during elections. For example,
political information silos. in both rounds of the 2012 presidential election
Africa, North 29

Thousands of people fill Tahrir Square in Cairo, Egypt, on July 29, 2011, during a protest called the “Friday of Unity.” Social media,
including not only Facebook but also YouTube video and Flickr pictures taken from within crowds like this one, are thought to have
encouraged even more Egyptians to join their fellow citizens in publicly protesting years of authoritarian rule during the Arab Spring.

cycle in Egypt to elect the first post-Mubarak Dalia Ziada, has used blogging to organize both
leader of Egypt, candidates and political parties online and street protests over several years dur-
had a social media presence, having learned the ing Egypt’s transition from authoritarian rule to a
efficacy of communicating through social media new regime.
with supporters, the general public, and main-
stream media from the experiences of the revolu- Citizen Journalism
tion. Both Mohamed Morsi and Ahmed Shafik, It is through social media in north Africa that
the two Egyptian run-off presidential candidates major political events are being written about,
in the May 2012 elections, maintained a presence recorded, and filmed in real time by ordinary peo-
on Facebook. Smaller parties in the 2011 Tunisian ple acting as citizen journalists as those political
election cycle used Facebook to recruit support- events unfold. Twitter feeds from the revolution
ers and train poll station observers. In an Asso- in Libya, Facebook posts in Tunisia, YouTube
ciated Press interview, Tunisian election observer videos uploaded and blogs written in Egypt are all
University of Washington Professor Philip How- stories from a citizen’s perspective, often appear-
ard noted that female candidates in that election ing as the events take place or very soon thereaf-
seemed particularly inclined to use Facebook. ter. It is hard for a government and its political
Not only do politicians and political parties leaders to deny a story that is politically damag-
use social media in north Africa for organizing ing when there are people’s own experiences of
and outreach, but so do citizen activists. For that event online for citizens and people around
example, a young Egyptian female online activist, the globe to see, read, and hear.
30 Africa, North

Social media coverage by citizen journal- One example of the use of social media to get
ists of major political events that include visual around government censorship efforts was seen in
images often strike the strongest political chord Libya in January 2011. In the wake of the Tunisian
with audiences. YouTube video and Flickr pic- uprising and some riots in Libya sparked by hous-
tures from within the crowds at Egypt’s Tahrir ing concerns, Libyan opposition Web sites were
Square encouraged people to come out onto hacked (as many political scholars and media pro-
the streets in protest and join their fellow citi- fessionals suggest, by Libyan government agents)
zens in showing their anger and frustration with so that their sites had pro-Muammar Qadhafi
years of authoritarian rule. Facebook and other messages in place of their regular content or had
social media images of street vendor Mohamed been taken offline. In response to this censorship,
Bouazizi’s self-immolation in Tunisia in protest opposition groups switched to social media plat-
of the confiscation of his goods by municipal forms like Facebook until they could get their Web
authorities brought Tunisians onto the streets in sites up and running again. This allowed them to
angry protest. be in contact with their supporters who had access
Whether it was witnessing other citizens’ politi- to those social media and get around the censor-
cal actions in the Egyptian revolution, or seeing a ship efforts of the Libyan regime.
graphic demonstration of the results of govern- Another example that demonstrates north Afri-
ment agents’ disregard for an ordinary man in can government recognition of the importance of
Tunisia, social media serve as a galvanizing politi- social media can be seen in the Egyptian govern-
cal force when used by citizens to document their ment’s attempt to block access to the Internet
own or others’ experiences. in January 2011. This censorship was a crude
Social media platforms like Twitter and Face- attempt to silence multiple avenues for dissenting
book have also been used by citizens to docu- voices to protest and organize on social media.
ment important political occasions or milestones.
During the Egyptian elections in May 2012, for Mainstream Media’s Use of Social Media
example, citizens were using social networks Mainstream media, both within north African
to document their voting experiences. People countries, as well as internationally, make use of
posted pictures to Facebook of voting, of wait- politically important news about north African
ing in lines to vote, and even of the ballots. They politics found on social media. This use may some-
tweeted accounts of the day on Twitter, enabling times be to supplement the professional report-
records of that historic event to be captured for ing gathered by a mainstream source, but is also
themselves, their friends, and followers. This per- sometimes used as primary reporting material.
sonalizing of political discourse and experience in One example of this mainstream media use
north Africa is made possible by the capabilities can be seen in footage of the Libyan revolution
of these social media. unfolding in the streets shown by Al Jazeera tele-
vision provided by social media sources. Citizens
Censorship took the video footage on their cell phones and
Due to state control and censorship in the north then posted that video to social media sites. Dur-
African region, social media capabilities allow ing the Libyan revolution, activists like Danya
for citizens and opposition groups to find ways Bashir used Twitter to provide journalists, espe-
to communicate political messages through medi- cially journalists outside of Libya, information
ated channels that are not blocked. Many govern- about what was taking place around them, so
ments in the region do not have good records of that information could be reported internation-
respecting media freedom. In their 2013 ranking, ally. This was a deliberate strategy of using social
Reporters Without Borders ranked north African media to connect with mainstream media.
countries like Morocco, Libya, Tunisia, Egypt, Mainstream media use social media as politi-
and Algeria with relatively low scores in respect cal news dissemination channels in north Africa
to media freedom. Social media provide a plat- as well. For example, international news organi-
form for voices to be heard who have no other zations like CNN and Al Jazeera used Twitter in
media outlet or limited media choices. the coverage of the Egyptian revolution, and their
Africa, North 31

tweets were influential. Their tweeted reports on impact. First, social media exist in conjunction
the Day of Rage protests in Cairo, the limiting with mainstream media, and do not serve all the
of Internet access by the Egyptian government, or functions nor have all the conventions of the
the resignation of President Mubarak influenced mainstream press. For example, journalists are
what was trending on Twitter. trained, and taught how to tell stories and report
on situations objectively, something that is not
Forum for Debate expected of a person in the midst of a protest in
Social media play a critical role in politics in Morocco or fighting in Libya.
north Africa as they provide citizens with a medi- Second, the populations in north Africa have
ated forum for discussion and debate about issues social, political, and economic grievances and
of importance in their societies. It is important to concerns about governance that stretch back
note that political discourse often takes place on decades, and so the power of social media in
social media before, during, and in the aftermath changing governments through revolution, or
of important political events. changing long-standing political patterns should
For example, political discussion on blogs was not be overstated. Third, social media enhance
taking place before the revolutions in Tunisia rather than replace more traditional forms of
and Egypt on topics of concern like liberty and political organization in north Africa like door-
democracy. Through discussion on social media, to-door campaigns, radio and television advertis-
citizens who were opposed to the leadership in ing, and speeches at political rallies.
their countries were able to discuss what concrete
goals should be achieved in order to bring about Rick Malleus
political change. Seattle University

Blurring National Boundaries See Also: Africa, Sub-Saharan; Al Jazeera Effect;


Social media enable political messages and dis- Arab Spring; Egypt; Feb 17 Voices; Developing
course to cross geographical and national bound- Nations; Libya; Tunisia.
aries in north Africa. This development allows
people in the whole region to see how political Further Readings
groups organize, to hear their messages, to gauge Alqudsi-Ghabra, Taghreed. “Creative Use of Social
the effectiveness of political strategies, and to Media in the Revolutions of Tunisia, Egypt and
anticipate governmental responses to political Libya.” International Journal of Interdisciplinary
movements. Social Science, v.6/6 (2012).
Researcher and communication professor Choudary, Alok, William Hendrix, Kathy Lee,
Philip Howard of the University of Washington Diana Palsetia, and Wei-Keng Liao. “Social
and his team analyzed over 3 million tweets, You- Media Evolution of the Egyptian Revolution.”
Tube content, and blog posts and concluded that Communications of the ACM, v.55/5
discussion on social media played a role that was (May 2012).
central to shaping political debates in the revolu- Gaworecki, Mike. “Social Media: Organizing Tool
tions across north Africa. As Howard states, and a ‘Space of Liberty’ in Post-Revolution
Egypt?” Social Policy (Winter 2011).
Our evidence suggests that social media car- O’Donnell, Catherine. “New Study Quantifies Use
ried a cascade of messages about freedom and of Social Media in Arab Spring.” UW Today
democracy across north Africa and the Mid- (September 12, 2011).
dle East, and helped raise expectations for the Schemm, Paul. “Tunisia Elections Milestone
success of political uprising. for Arab Spring.” Associated Press (October
26, 2011).
Limitations of Social Media Wollenberg, Anja and Jason Pack. “Rebels With a
While social media play an important role in Pen: Observations on the Newly Emerging Media
politics in north Africa, it is important to real- Landscape in Libya.” Journal of North African
ize that there are limitations to social media’s Studies, v.18/2 (2013).
32 Africa, Sub-Saharan

Africa, Sub-Saharan improving political stability and security, as well


as contributing to a growing sense of government
The objectives of disseminating knowledge, ideas, as being accountable to the governed, as indicated
and news and the sharing of common feelings, by citizen satisfaction measurements. As in much
concerns, and thoughts with large groups are as of the world, patterns of voting, governance, and
old as human existence’s dependence on collec- monitoring the works of public servants have
tive aspirations and efforts. In view of the indus- been reshaped to demand ethos of transparency,
trialized nations’ leading role in advancing the accountability, and pluralism in politics. Govern-
technological and sociopolitical infrastructures ment leaders, civic groups, and movements for
of communication and interaction, sub-Saharan change in Nigeria, South Africa, Zambia, Sudan,
Africa’s participation in this global new medium Côte d’Ivoire, Senegal, Uganda, and many other
has been greatly undervalued or outright dis- countries in the region have been forced to alter
missed as inconsequential. But understanding the their platforms and political behavior patterns in
transformation in the context of the realities of line with international calls for high standards
the region is vital to developing a fuller apprecia- of democratic rules. Internet access, Facebook,
tion of a global phenomenon. Twitter, Flickr, LinkedIn, and countless venues
of information currently avail themselves to the
Background hopes and aspirations of Africa’s youth eager to
Sub-Saharan Africa has lagged behind the world play important roles in their nation’s futures. Pub-
in its industrial and technological developments lic servants such as the national leaders in Nigeria,
in the modern era. The continent’s limited access Kenya, South Africa, and Rwanda joined interna-
to electricity, technology, and software, com- tional trends of having open lines of communica-
bined with poverty and restrictions to freedom tions with hundreds of thousands of their people
of expression and free flow of information, have following their ideas on Facebook and Twitter.
been given as explanations for its lack of vigor-
ous social media. Yet, many traits such as low Adapting the Medium
level of economic development and technologi- Clearly, Africa’s less developed socioeconomic
cal advancement, and persistence of political and and political structures have not offered ideal
social structures of authoritarian governance, are conditions for the use of social media to realize
shared by other regions. While the drawbacks accelerated transformations. The creative adap-
of limited institutional and social barriers have tation of information technology to sub-Saharan
some validity in constraining social media, the Africa’s realities has brought about significant
overall determination of the people coupled with changes for the region. Innovative approaches to
alternative ways of communication and organi- overcoming the challenges include using mobile
zation leave a great deal of room for the viable technology to compensate for the high costs and
development of social media. Social media may limited availability of computers.
be a new means of laying the foundation of infor- A major factor in the relative narrowing of the
mation exchange and shared learning that could gap has been the sharp rise in access to mobile
lead to building freer and more prosperous socio- services. In contrast to fixed landlines, over
political communities. 60 percent of people in Africa are estimated to
As of mid-2012, only around 15 percent of use mobile phones. Mobile broadband services
Africa’s population had access to the Internet. requiring less electricity and technical know-how
However, this statistic hides an underlying reality have consequently been introduced to the region,
in which social media is playing a significant role offering opportunities for easier and more user-
in influencing politics on the continent. Mobile friendly access to populations that might not have
phone subscription in the region, estimated to adequate literacy.
be as high as 750 million, is believed to provide Through the spread of mobile telephony that
access to information and communication for provides connections to the Internet, growing num-
individuals, movements, and institutions, prov- bers of Africans have been able to take advantage
ing in many cases to be a crucial component in of both local and global social media for gaining
Africa, Sub-Saharan 33

From Senegal to Angola and Zimbabwe to


Sudan, activists from below and government offi-
cials from above continue to wage contests to win
public opinion through the use, blocking, or nego-
tiation of social media as a tool understood to have
a profound impact on local, regional, and global
politics. Facebook, Twitter, YouTube, texting, and
other venues are used for civic engagements, polit-
ical mobilization, and dissemination of ideas and
information. Public servants and heads of govern-
ment including Raila Odinga, prime minister of
Kenya; Jonathan Goodluck, president of Nige-
ria; Lindiwe Mazibuko, leader of the opposition
in the parliament of South Africa; Paul Kigame,
president of Rwanda; David Coltart, leader of the
New Party in Ghana; and others maintain Twitter
accounts for communication by the government
and political parties. Opposition groups also use
social media platforms to inform their followers
and influence opinion.
While only about 15 percent of Africa’s population had access to
the Internet in mid-2012, over 60 percent of people in Africa are Social Media and Politics
estimated to use mobile phones. These Kenyan students played Social media, largely understood as the alternative
a game on a smartphone in August 2012. mode of communications fusing human and tech-
nological dimensions of communities, has clearly
had a strong impact in Africa with the myriad
aspects of health, agriculture, security, business,
access to information and communicating their and leisure all affected by its advent. The political
ideas. Pay-as-you-go airtime models and inexpen- component linking the headline-grabbing upheav-
sive handsets have also widened mobile phone use. als of the Arab Spring and other regions has not
These practical applications of information com- been as glaring and noticeable. Still, for observers
munication technologies (ICTs) in addressing the who look deeper, the effects have been remark-
continent’s unique conditions have led to greater able. The circular causality of the dynamics is evi-
qualitative use of social media despite limited tech- dent in the ways state and nonstate actors have
nological and economic structures. sought to respond to the effects resulting from
The suspension of mobile communication is the use of social media. Issues of governance,
believed to have been instrumental in the revolt accountability, opennesss, and human security are
and riots in Togo where protesters, using camera- raised by the global phenomenon of social media
equipped mobile phones, succeeded in putting pertaining to sub-Saharan Africa. Movements for
international pressure on the repressive govern- greater democratization, human rights, and social
ment. Similarly, demonstrators in Côte d’Ivoire justice have adopted varied programs of change
gained international sympathy for their cause in different parts of the region.
by exposing violent reprisals with their cam- Reflections of the global and local in the region
eraphones and lively blogging platforms in Abi- are indicated by the fact that Facebook has
djan. André-Michel Essoungou has underscored become the most visited Web site, with more than
the view that African bloggers are charting new 17 million users and Swahili, Hausa, and Zulu
courses for democratic society. Greater access languages incorporated into the medium. The
to the public square is being built with alternate fact that President Goodluck first announced his
media such as the Congoblog and Ushahidi in candidacy in Facebook similarly underscores the
central and east Africa. depth of the change in the continent.
34 Age

In Uganda, groups opposing inflation, cor- Windhoek, Namibia: Friedrick-Ebert-Stiftung


ruption, and political mismanagement mounted Media Project in Africa, 2011.
campaigns on Facebook, Twitter, and blogs cul-
minating in walk-to-work protests believed to
have been stopped by the government jamming
of the use of all social media. The government of
Mozambique also sought to quell food riots by Age
blocking the tools of dissent. While technologies,
economic opportunities, and economic infra- Just over half of all Americans (56 percent) have
structures in sub-Saharan Africa might fall short a social media profile and about half of Ameri-
of those of the affluent world, the consequences cans are active users. But more than four out of
of the spread of social media and their impact on five young adults are on social media (83 per-
politics is, however, as profound and enduring. cent, ages 18–29) while less than a third of the
oldest Americans are (32 percent, 65 and over).
Alem Hailu This is the inverse of traditional news use and
Helen Bond political participation by age; that difference has
Howard University fueled a robust body of research on the role of
social media in democracy. Much scholarship has
See Also: Africa, North; Bottom-Up Campaigns; found that those who follow news and politics in
Cloud Protesting; Diaspora/Migration; Digital social media or have friends who do so are bet-
Revolution; Economic and Social Justice; Human ter informed, more engaged, and more active in
Rights; International Examples of Political Parties and politics, but a competing hypothesis is that social
Social Media; Poverty; Ushahidi. media displaces traditional news use, limiting
engagement and participation.
Further Readings Traditional media use, methods of civic engage-
Atwood, Amanda Kubatana. “Zimbabwe: Mobile ment, and political participation are all down
Phones for Advocacy.” In SMS Uprising, Mobile substantially since the 1960s, and many of these
Phone Activism in Africa, Sokari Ekini, ed. Cape declines are generational. In the 1960s, the young-
Town, South Africa: Pambazuka Press, 2010. est and oldest Americans read a daily newspaper
Bailard, Catie. “Mobile Phones Diffusion and at nearly the same rate. The oldest Americans,
Corruption in Africa.” Political Communication, those now of retirement age, still largely read a
v.26/3 (2009). daily print newspaper, belong to a social or fra-
Carty, Victoria. Wired and Mobilizing: Social ternal organization, union, book club, or sports
Movements, New Technology, and Electoral league—and more than two-thirds of them vote.
Politics. New York: Routledge, 2011. Americans under 30, on the other hand, are much
Essoungou, André-Michel. “Young Africans Put less likely to follow news in print or on TV, to
Technology to New Uses: Kenyan Software a join an organization, or to vote. They are more
Tool for Political Participation.” Africa Renewal likely to be online than the oldest Americans and
(April 2010). much more likely to be active in the social media
Internet Usage Statistics. “The Internet Big space. In fact, social media have been described
Picture
World: Internet Users and Population as the new inbox for young adults. The results are
Stats.” http://www.internetworldstats.com/stats promising, but mixed, as to whether social media
.htm (Accessed April 2013). or online engagement complements or displaces
Livingston, Steven. “Africa’s Evolving Infosystems: traditional political participation.
A Pathway to Security and Stability.” Africa Social media and politics intersect in four
Center for Strategic Studies Research Paper Issue important ways: As a conduit for the dissemina-
2. Washington, DC: National Defense University tion of information from political leaders and
Press, 2011. candidates; as an aggregation and distribution
Sarrazin, Tom. Texting, Tweeting, Mobile Internet: source for opinion leaders to attain and share
New Platforms for Democratic Debate in Africa. knowledge; as a platform for the manifestation of
Age 35

pure, participatory journalism and democracy, in what it was in the 1960s; union membership,
which anyone can share knowledge with (poten- signing petitions, and church attendance are all
tially) anyone; and as a digital town hall, in which down dramatically and newspaper readership
citizens can directly converse with leaders, can- has dropped by half. All of these factors are age-
didates, and each other. Much of the motivation related—the oldest Americans, those of retire-
for the first and fourth forms—for politicians to ment age, are still much more likely to partici-
engage in “direct-to-consumer” contact with the pate in these ways. Sixty percent of adults aged
public through social media—is to reach young 65 and older still read a newspaper regularly and
potential and actual voters. 69 percent vote; 22 percent of those under 35
The scholars danah boyd and Nicole Ellison regularly read a newspaper and half vote. While
define social network sites as online communi- all Americans are more likely to get news online,
ties that allow users to (1) build a public profile, Americans over 30 are much more likely to get
(2) connect with selected users, and (3) peruse news online than those under age 30. In fact, Pew
and interact with content created by those users. data shows that online news use is up 51 percent
The fact that users define their own communi- among 18- to 29-year-olds but it is up 140 per-
ties means that social media connections are net- cent among 60- to 64-year-olds. Pew also found
works of peers, and tapping into this peer-to-peer that teens are increasingly likely to be adding
architecture is how things go viral. Politicians Twitter, Instagram, and Tumblr accounts while
and other political actors, and members of advo- losing a little affinity for Facebook.
cacy organizations and other nonprofits, greatly
employ Facebook, the microblogging site Twit- Age and Social Media in Politics
ter, and the video sharing site YouTube in their Social media use in political campaigns first
public outreach, beginning in earnest in 2008 but appeared in meaningful numbers in the 2006 mid-
diffusing widely since then. As an example, both term congressional elections, when about one in
MoveOn.org on the left and the National Rifle six candidates from the Democratic and Republi-
Association on the right are highly active on all can parties populated Facebook pages. By 2008
three platforms, which are then used to interact it was more than half. In both of those elections,
with each other. The federal government’s antibul- population age was a strong predictor of Face-
lying arm, stopbullying.gov, embraces Facebook, book use in the campaign: Candidates running in
Twitter, Tumblr, and an active blog expressly to districts with a large population aged 65 or older
reach teens who are most at risk to be involved did not use Facebook; those representing younger
with bullying. constituents did.
The reason for social media outreach is clear: President Barack Obama was a pioneer in
Young adults in the United States follow the news targeting young voters online in the 2008 presi-
at about half the rate of their elders and even the dential election, when he won the most lopsided
migration to news online has been led by adults margin of young votes (70 percent voted Demo-
in their 30s and 40s. Ever since the Baby Boomer crat) since 1976. The race was called the social
generation reached adulthood in the 1960s, they, media election and U.S. News and World Report
and each subsequent generation, has been less referred to the victory as the Facebook election
informed, less civically engaged, and less politi- and the Facebook effect: 2008 was the first year in
cally involved than the generation before. Social which candidates truly engaged in a social media
media seems a rich environment in which to conversation with citizens through Facebook and
reverse this. Myspace; it was when Facebook partnered with
mainstream news organizations, including ABC
Age, Media Use, Civic Engagement, News and CNN, and was the first time CNN
and Political Participation employed YouTube to integrate citizens’ ques-
Robert Putnam painstakingly detailed the gen- tions into presidential debates.
erational decline in news use, civic engagement, By 2010, the lesson had been learned as
and political participation. Active leadership in the Republican Party (GOP) took the lead
neighborhood and fraternal organizations is half on Facebook and Twitter, outspending and
36 Age

outperforming the Democrats in midterm con- gathering and sharing, and in civic engagement
gressional races, which went overwhelmingly to online, political participation increases both
the GOP. Voter turnout among young adults, 18 online and off. Young adults who share news
to 29, was 20 percent; but this time only 58 per- and political opinions through social media are
cent voted Democrat. more likely to correspond with candidates and
representatives; contribute, volunteer, or contact
The Two-Step Flow of News a news outlet online; and to vote offline. Another
Columbia University scholars Elihu Katz and recurring finding is the importance of internal or
Paul Lazarsfeld found that news did not reach self-efficacy—the belief that one can influence the
all people in the same way but that news reached political process. Since efficacy is an established,
some people (opinion leaders) who then curated predictive variable of both civic engagement and
and disseminated it through their networks. This political participation, it has often been measured
happens robustly in online social networks but in social media. Behaviors that have long been
the important political variable is whether there known to support civic engagement and political
is a high-information node in a network, sharing participation offline, like news consumption and
news with peers. A seven-nation study of youth- self-efficacy, have repeatedly been shown to do
oriented civic engagement Web sites throughout the same in social media. Young adults who are
Europe found that social identity, online and exposed to political news through social media
off, was a major predictor of civic engagement are more likely to engage in political activities like
and efficacy among young adults. Shakuntala volunteering, donating, and voting. Older adults,
Banaji and David Buckingham, education schol- who are more likely than the young to follow the
ars in London, learned that having older adults news and be engaged and politically active, are also
positively engaged, online and off, helped inspire more likely to migrate those behaviors into social
young adults and teens to believe that they could media. These findings support a complementary
successfully become engaged in political discus- hypothesis, in which social media sharing serves
sions and actions. A lack of personal modeling as an adjunct or able replacement for diminished
or engagement, on the other hand—the lack of use of traditional news media. Given the sparse
a peer opinion leader—failed to deliver the same use of media by young adults in comparison to
engagement. their elders, this complementary hypothesis offers
reasons for optimism.
Competing Hypotheses A competing hypothesis comes from Putnam,
There are two competing hypotheses regarding who suggested the decline in civic participation
social media use, civic engagement, and politi- is because entertainment media, especially tele-
cal participation, and age is highly predictive of vision, is displacing time that used to be spent
which is dominant. One body of literature sug- engaging in social activities, like bowling leagues
gests that traditional, offline habits, like news use, and fraternal organizations. This time-displace-
talking politics, and voting, migrate nicely into ment hypothesis may also apply to social media
the social media environment and, in fact, may use. A 2011 study found that college students
be improved, especially among active users, who who were highly active on social media (spent the
tend to be young. Another recent area of study most time, visited the most frequently, considered
argues that time spent with social media may dis- it highly important, and had many friends) were
place time spent on traditional civic activities like less informed and less likely to follow political
following the news, spending time with neigh- news. Those students who were active news seek-
bors, and heading to the polls. ers were more highly informed and more likely to
Homero Gil de Zúñiga and his colleagues share news through social media. But they were
have repeatedly found that migrating traditional also much less likely to spend time with social
news and political values into social networking, media than those who were not as well informed.
like seeking and sharing political information, Another important variable in social media
increases civic engagement and political participa- research is ambient exposure to news. It is hypoth-
tion. Among those who are active in information esized that those who score highly on social
Aggregation 37

media involvement will be more likely to be acci- social media environment, where the youngest
dentally exposed to news through that channel as adults dominate, remains an important space in
their friends share news. What occurred, instead, which to try to reach young adults.
is that large networks of young adults, who are
the least likely to follow news and politics, were Kelly Kaufhold
also the least likely to share these items through Texas Tech University
social media. This tends to support the displace-
ment hypothesis. This finding has been countered See Also: AARP; Campaigns, Congressional (2006);
somewhat by Gil de Zúñiga and others who have Campaigns, Congressional (2008); Campaigns,
found that, among people who do follow news, Presidential (2008); Mobile Connectivity, Trends in
large networks contribute to civic engagement Politics and; Social Issues Advocacy, Netroots Driven;
and political participation. Voter Demographics; Youth Engagement.

Youth, Social Media, and Activism Further Readings


Students have been leaders in the use of social boyd, danah m. and Nicole B. Ellison. “Social
media, especially Facebook, Twitter, and You- Network Sites: Definition, History and
Tube, for organizing major social movements. Scholarship.” Journal of Computer-Mediated
Notable examples include the 2006 immigration Communication, v.13/1 (2007).
protests, especially in California; support for vot- Gerbaudo, Paulo. Tweets and the Streets, Social
ing, especially for candidate Obama in the United Media and Contemporary Activism. London:
States and against copyright reform in Canada Pluto, 2012.
in 2008; protests following the Iran election in Gil de Zúñiga, Homero. “Social Media Use for News
the summer of 2009; tuition hike protests in the and Individuals’ Social Capital, Civic Engagement
United Kingdom in 2010; and the Arab Spring and Political Participation.” Journal of Computer-
early in 2011. Mediated Communication, v.17/3 (2012).
Paolo Gerbaudo, in Tweets and the Streets, Putnam, Robert. Bowling Alone: The Collapse and
Social Media and Contemporary Activism, writes Revival of American Community. New York:
about some pitfalls at the intersection of social Simon & Schuster, 2000.
media, youth, and politics. In the Egyptian upris- Shakuntala, Banaji and David Buckingham. “Young
ing which began the Arab Spring in January and People, the Internet, and Civic Participation: An
February 2011, Egyptian leaders had taken a Overview of Key Findings From the CivicWeb
hands-off approach to limiting access to social Project.” International Journal of Learning and
media for the strategic purpose of winning over Media, v.2/1 (2010).
young, middle-class Egyptians. This was the
cohort by far the most likely to be online and to
be active in social media. In fact, they became
known as shabab al-Facebook and they emerged
as a powerful source for information and instiga- Aggregation
tion in the spread of the Arab Spring.
The term aggregator refers to a person or ser-
Conclusion vice involved in the collection, refinement, and
The complexity of the social media environ- indexing of information from a variety of online
ment, news, and political involvement is largely sources. This term has been used on the Internet
explained by age because age largely predicts for years, based on the idea that the Web func-
media use, which predicts civic engagement and tions to combine a variety of distinct sources of
political participation. The oldest Americans are information into a single coherent form. In the
the most likely to follow news in print; those of most general sense, a search engine functions as
middle age, on television; but those in their 30s an aggregator, scanning Web pages and producing
and 40s—not their teens or 20s—are the most indexes that can be efficiently surveyed as a form
likely to follow news online. For this reason, the of extractive media. Search engine results and
38 Aggregation

other aggregated media are intended for brows- large number of clicks on headlines on aggregator
ing rather than immersive reading. There are a services leads to users reading full articles, serv-
number of types of aggregator Web sites, rang- ing as a major source of online traffic for newspa-
ing from those that collect pictures to economic pers. The New York Times has demonstrated that
data. News aggregators and poll aggregators are paywalls (methods of requiring users to pay for
distinct. The differences between news and poll online subscriptions after reading small samples
aggregation can be used to understand aggrega- of articles) offer a way of using aggregation as a
tion as a general concept. form of advertising and securing revenue.

News Aggregators Poll Aggregators


News aggregators collect materials from a num- Poll aggregators work in a similar but distinctly
ber of news sources, providing direct links to the different way. A Web page that aggregates poll
original material and possibly brief summaries data does not collect material from legacy news
of content from a number of sources. The inter- sources but information from a variety of sources
faces provided by aggregator Web sites allow that needs an effective index. Several sources
users rapid access to information that has been provide real-time aggregation of Twitter output
refined and indexed. The particular methods for and trending topics. These collected measures
refinement and indexing explain the differences provide users a refined sense of what is happen-
among aggregator brands. An aggregator might ing on social networks in concrete terms. More
rewrite headlines to emphasize a particular argu- sophisticated aggregation systems, such as those
mentative perspective in order to better serve a used for tabulating aggregated election statistics,
market segment. A popular culture aggregator employ algorithmic technologies to create value-
might include news items but only in the sense added indexes for a number of quantitative data
that they fit with the overall theme and style of sources. By synthesizing inputs from a number
the brand. A political aggregator would likely not of sources, aggregator Web sites provide a more
include the funny pictures of cats that have come robust form of information.
to typify pop culture aggregators in favor of poll Poll aggregation Web sites played a major role
results and analyses. Functionally different aggre- in the final weeks of the 2012 presidential elec-
gator sites segment the market similarly to cable tion. When major information aggregators’ pro-
television channels. jections tended to show a substantial lead for
Aggregators typically eschew the traditional President Barack Obama, the use of aggregated
news schedule, releasing material as it is collected data became a news story in itself. Aggregators
or created. This draws users regularly as the pages provide important forms of public information in
include a much larger range of regularly updated that they present information coherently through
information than a single news source. For read- an objective process over traditional, highly
ers, the appeal is clear: Aggregator sites provide impressionistic forms of political reporting. This
quick access to a large amount of information has been described as providing what has been
that has confirmation from multiple sources. termed big data in the world of journalism.
Nonlinearity is a major advantage for aggregators Aggregators provide a site where dialectical pro-
as users can access different news stories at ran- cesses are applied to data before public consump-
dom outside the narrative context of traditional tion, providing aggregators credibility beyond
news that might provide occasions for advertis- narrative journalism beholden to a fragmented
ing. By removing material from the context in public sphere. In this sense, arguments are pre-
which it is presented alongside advertising, news debated to create coherent results that are judged
aggregators have been accused by content provid- to be the best from an objective standpoint. The
ers of damaging their businesses. The relationship importance of data aggregation for social media-
between aggregation and newspaper revenue is enmeshed publics will likely increase as the rapid
complex. Some content producers have argued argument presentation and testing on social net-
that aggregation deprives their sites of traffic and work sites will require increasingly comprehen-
thus revenue. Content aggregators respond that a sive forms of data for users’ needs.
Al Gore’s Penguin Army 39

Poll aggregation offers a major source of value See Also: Algorithmic Authority; Blog Syndication;
for news agencies or news aggregators as the con- Forecasting Elections; Information Abundance;
cept of aggregation solves major issues for publish- Information Aggregation.
ers. Managing relationships with aggregators can
be a complex matter as management methods are Further Readings
mixed: Some rely on human editors, while others Grueskin, Bill, Ava Seave, and Lucas Graves. The
function through user preferences or other auto- Story So Far: What We Know About the Business
mated means. The importance of the integration of of Digital Journalism. New York: Columbia
mechanical elements should not be understated—if University Press, 2011.
an aggregator uses a publicly accessible method for Silver, Nathan. The Signal and the Noise. New York:
collecting and analyzing data, the relative credibil- Penguin, 2012.
ity of the aggregator can be substantial and can be Tow Center for Digital Journalism, Columbia
inoculated against arguments of bias. Journalism School. “Introduction: The
In terms of aesthetics, aggregated informa- Transformation of American Journalism Is
tion functions as a sort of collage. Instead of pre- Unavoidable.” http://towcenter.org/research/
senting a single argument or perspective at one post-industrial-journalism/introduction (Accessed
time, aggregation allows users to see a number of December 2012).
perspectives to evaluate simultaneously. Google
News, for example, uses a juxtaposition of dif-
ferent popular articles covering an event, provid-
ing a rapid glimpse of multiple possible readings
and sources the reader can choose among. Other Al Gore’s Penguin
aggregators carry articles that cover a number of
topics and ideas with looser organization. In poll Army
aggregation, information converges. Instead of
presenting a sea of numbers, refinement techniques On May 24, 2006, the same day that Al Gore’s
allow the aggregator to present a single represen- An Inconvenient Truth was released, a two-
tation of a current fact or stream of online social minute video titled Al Gore’s Penguin Army was
activities. Typically, additional information is released on YouTube. The video sparked a series
available for more interested users. Aesthetically, of controversies as many viewed the video to be
these methods for managing the arrangement of a product of astroturfing by a major company to
information are a form of rhetorical activity. dispel any potential truth from Gore’s movie. The
video has a definitively amateur feel with very low
Conclusion production quality. The drawings are primitive,
Aggregation provides opportunities for users to and the sound effects seem to be more in tune
gain rapid access to refined indexes of information. with middle-school projects than professionally
As a form of computational reasoning, this gives developed marketing tools.
aggregated data sets credibility for use in pub- The Wall Street Journal found the release date
lic argument. News and culture aggregators have curious and chose to investigate the video more
effectively produced a form of continuous, in-the- closely. They ultimately traced the video back to
moment information uniquely suited for persons the DCI Group—a Republican public relations
using social networking systems. Aggregators are and lobbying firm that represents both General
likely to increase in importance as their capacity to Motors and ExxonMobil. While many in the
drive traffic to news sites with paywalls becomes public believe either company could be behind
more apparent and as the cultural logic continues the video (although most seem to believe Exxon
to provide substantial gains for collections and col- is responsible), to this date the actual developer
lages of news over singular news sources. has yet to be identified, and DCI refuses to release
the information. As of today, the video has been
Daniel C. Faltesek watched 630,426 times while collecting 1,410
Oregon State University thumbs-ups and 4,003 thumbs-downs.
40 Al Gore’s Penguin Army

At the beginning of the video, a penguin carry-


ing an umbrella and designed to look like Al Gore
leads a group of other penguins into a lecture hall
where he presents a talk on global warming. As his
audience grows increasingly bored with his pre-
sentation (which attempts to link global warming
to the Middle East crisis, the latest Lindsey Lohan
scandal, and even the Red Sox winning the World
Series), the Gore penguin uses a twirling motion
of his patterned umbrella to hypnotize the oth-
ers. Once hypnotized, the background changes to
something called Red State Theater. At the the-
ater, there are long lines of penguins waiting to
see the X-Men movie, while less than a handful
are waiting for Gore’s movie. While the penguins
at X-Men have a great time, those at An Inconve-
nient Truth are sleeping.
After the movie scenes, the video returns to the
classroom setting where Gore tells the sleeping pen-
guins they must take action to stop global warm-
ing. He fails to even realize that the audience has
failed to hear his point—let alone become willing
to act on it. The screen then proceeds to provide
a series of recommendations on how citizens can Former vice president and Nobel laureate Al Gore speaking on
stop global warming. The list includes not exhal- climate change and poverty in Davos, Switzerland, on January
ing, being a vegetarian, walking everywhere, and 24, 2008, at the annual meeting of the World Economic Forum.
taking cold showers. At the very end of the You-
Tube video, a shark eats a penguin and the screen
flashes “The End” before Gore opens his umbrella
and begins attempting to hypnotize the audience. Curious as to who or why, Regalado e-mailed
While the video is somewhat humorous, it has a Toutsmith and found that he was working from a
homemade quality. At first viewing, it seems more computer associated with DCI.
likely to be the product of a college student creat- DCI refused to discuss the linkage, citing cli-
ing a quick video satire in his or her dorm room ent confidentiality in their defense. Yet, after
than a professionally done video with an explic- Regalado’s communication, the sponsored links
itly political message. Most viewers believed the on Google were removed. The video contains no
individual who posted the video (Toutsmith—a actual information and instead focuses on simply
29-year-old claiming to be from Beverly Hills) attempting to discredit Al Gore and An Inconve-
was exactly that. nient Truth. Assuming DCI was responsible for
Of the initial watchers, few felt there was any the creation of the video, it is clear they were
mass conspiracy behind the video or effort to building on America’s distrust of the mainstream
influence public attitudes through the video’s post- media. Rather than presenting an op-ed, they
ing—it was simply viewed as a humorous satire. posted the video on YouTube in an effort to get
Wall Street Journal reporter Antonio Regalado, citizens to buy into the content and presentation.
however, noticed a peculiarity. Despite being a With social media, however, this is becoming an
very low-quality YouTube video, it was the first ever-increasing concern. If citizens are unwilling
sponsored hit in Google when searching for Al to trust mainstream media and believe any pre-
Gore. This suggested someone (or some group) sentation of fact is largely based on some biased
had spent a large sum of money on search engine opinion or attitude, they will turn toward sites
optimization and to buy ad space for the video. such as YouTube, which permit individual citizens
Al Jazeera Effect 41

to create their own accounts and videos. But, the transformative influence of the Al Jazeera sat-
sophisticated lobbying and media relations agen- ellite TV network on international and regional
cies have quickly realized that these mechanisms politics, it also connotes new media in general,
can be successful and have started taking strides including various state-funded broadcasters and
to infiltrate the medium. What they learned from the assortment of Web and mobile information
the Al Gore’s Penguin Army video, however, is and communication technologies (ICTs). New
the need to dot all the I’s and cross all the T’s. forms of media and news sources are changing
If not for the Google search purchases, the farce politics because they “altered the dynamics of
would have likely been successful. influence” such that “states, media organiza-
To date, Exxon, General Motors, and DCI tions, and political actors cannot set agendas or
have all refused to acknowledge the controversy establish boundaries of discourse” as effectively
and the party responsible for the creation of the as they once could. This, of course, comes with
video and purchase of the Google-sponsored ads several caveats.
remains a mystery. The video has had little impact Seib proposed the Al Jazeera effect as a parallel
on the climate debate—as evident by the failure to the CNN effect, which asserted that media cov-
to reach a million hits in over five years. Yet, the erage of overseas events or issues could compel
work of Regalado helped to protect social media governments to act, leading to less governmental
sites like YouTube from poorly conceived efforts autonomy in foreign policy. Taking a different
by political players to falsely represent their course to the same long-studied question of the
funders and goals in posting content. power of media in politics, Seib asserts that gov-
ernments are losing control over news and infor-
William J. Miller mation and are forced to compete with new types
Flagler College of actors, including nontraditional news organi-
zations, citizen journalists, bloggers, insurgent
See Also: Deception in Political Social Media; media, social movements and nongovernmental
Environmental Issues; Ethics of Social Media in organizations (NGOs). New media are “supersed-
Politics; Flog; Lobbyists; Online Smear Campaigns; ing the traditional political connections that have
Opposition Videographer; YouTube. brought identity and structure to global politics.”
Seib’s description of the Al Jazeera news chan-
Further Readings nel’s impact on Arab politics shows why the
Al Gore’s Penguin Army. http://www.youtube.com/ Qatar-based network’s name is borrowed for the
watch?v=IZSqXUSwHRI (Accessed December term. Although it is a relatively young station,
2012). founded in 1996, one of its biggest “strengths”
Regaldo, Antonio and Dionne Searcey. “Where Did was to inject “contentious debate into an Arab
That Video Spoofing Gore’s Film Come From?” news business that was previously known for its
Wall Street Journal (August 3, 2006). drab docility.” The effect is about the disruptive
Tapper, Jake and Max Culhane. “Al Gore YouTube power of a more greatly distributed media ecosys-
Spoof Not So Amateurish.” http://abcnews.go.com/ tem in the political realm.
GMA/story?id=2273111&page=1 (Accessed Seib proposes the “virtual state” as an emerg-
December 2012). ing counterweight to the primacy of the territorial
states that made up the world system. This new
form is an ICT-based community that actualizes
what Seib calls “imagined” comradeship, borrow-
ing on Benedict Anderson’s “imagined communi-
Al Jazeera Effect ties.” The “virtual state” gives cohesion to collec-
tive identities that lack what states are premised
Philip Seib employed the term Al Jazeera effect upon, the physicality of a defined territory. These
to describe the impact of the global proliferation are formed by deeper affiliations than the types
of emerging news organizations and communica- of connections the more commonly used term
tion channels on world affairs. While inspired by network denotes. Seib holds out as an example
42 Al Jazeera Effect

the assemblage of Kurdish Web sites, chatrooms, in political campaigns of central importance.
TV stations, and press that manifested a “Kurd- Politicians adjust and politics changes to meet the
istan” when none existed on the map. This Kurd- demands of new media.
ish identity, which draws together a multilingual In authoritarian states, the emergence of media
people whose homeland overlaps with contiguous outlets challenges governments that resist reform
regions of Turkey, Iran, Iraq, and Syria, presents and control the flow of information. New sources
a particular challenge to the governments of each of information are more likely to let the public
state. They still operate on a traditional concept discover the failings of official state media that
of sovereignty to repress expressions of Kurdish stick closely to the government’s line. Citing
nationalism, with varying degrees of success. China as an example, citizens in constricted polit-
Another example of a “virtual state” exempli- ical systems are finding ways to get news the rul-
fies the “dark side” of the effect. Al Qaeda and ing powers seek to block. China, like many coun-
its affiliates’ effective use of media and communi- tries, faced the dilemma by which Internet access
cation to recruit “citizens” to its ideology under- is important for economic development—since
mines the traditional state system. With franchises international business requires it—while stimulat-
in Iraq, north Africa, and supporters elsewhere in ing internal dissent seen as a threat to the reigning
the world, Al Qaeda uses violence to pursue its political order. Within this balance, China’s many
transnational objectives in defiance of govern- censors play a cat-and-mouse game to block Web
ments. In Al Qaeda’s war, the realm of media is content while activists and interested citizens find
a crucial battlefield. Al Qaeda’s media production new ways to circumvent them.
unit released videos to news organizations and its Still, Seib recognizes the growth in communi-
Web sites are intended to further their cause and cation avenues involves negative consequences
weaken their enemies. beyond the added benefit to terrorists, scammers,
The Al Jazeera effect, however, could be most and others with nefarious motives. With so much
pronounced in shaping global politics, where it information out there, people struggle to deter-
gives more connective form to the great supra- mine what is valid, amounting to an inaudible
national identities. A global Muslim ummah, or “cacophony.” Such overload can be worsened as
community of followers, could start to articulate greater circulation is given to falsehoods, espe-
itself more completely through wide use of ICTs. cially as the gatekeeping functions of traditional
Though the concept is in the Koran, the Muslim news organizations weaken. With greater com-
holy book, numerous national, ethnic, and sectar- petition, the economics of media may shift, and
ian divisions brought fragmentation of the more shriveling advertising and subscription revenues
than 1 billion people in the world calling them- do not sustain operations. Also, many emerging
selves Muslim. While only a possibility thus far, news organizations are more like political actors,
the unification of the ummah could fundamentally affiliated with states or nonstate movements,
transform global geopolitics and push states to making them active participants in conflicts. They
submit their foreign policies to pursuit of a popu- may advance particular agendas and become tar-
lar, pan-Islamic agenda. While Seib admits this is gets of military attacks as quasi-combatants.
speculative, it demonstrates how a dramatic shift For all the potential of new ICTs, they clearly
in world affairs is made possible. will not solve some of the most pressing social
problems, Seib admits. In societies failing to meet
Domestic Politics basic living needs, their potential to improve polit-
New media not only alter international affairs, ical processes is highly unlikely. Even in places
but also redirect domestic politics in all but the and geopolitical fields ripe for social and politi-
most destitute and isolated countries. Many poli- cal change, communication and media as forces
ticians embrace changing media environments, for change compete with many other, sometimes
using ICTs, for example, to present themselves more powerful factors. The Al Jazeera effect is
“unmediated” to potential donors or fund-raisers. therefore limited and conditional.
This is more revolutionary than the introduction Overall, the tide of new information sources is
of television, which made candidates’ telegenics uncontrollable and that can make predicting the
Algorithmic Authority 43

success of democratization and peace-building source they follow closely and trust, they assess
difficult. Seib is still cautiously optimistic that allegations of bias on any source that fails to
the Al Jazeera effect can engender greater trans- adhere to their personal views of the world. It
parency and “intellectual independence” among was with this in mind that Clay Shirky—a pro-
the public. The public will more easily make fessor of new media at New York University—
demands on state officials and agencies that are suggested in November 2009 that the nature
finding it harder to ignore popular will. New of authority is up for grabs in the current news
media empower democratization movements environment. Shirky argues that new classes of
and amplify voices seeking reform. Seib argued aggregators (such as Google, Wikipedia, and
this would likely materialize in the Middle East, even Facebook) are eroding the institutional
but he could not say when. As popular upris- monopoly of authority previously held by large
ings raged across the Middle East in 2011, many corporations. With the advent and further devel-
observers have debated the role of media in fer- opment of social media, the reliability of these
menting them—the question at the heart of the Al new aggregators has become even more impor-
Jazeera effect. tant. After all, whether we can truly believe
everything we read on the Internet ultimately
William Lafi Youmans depends on where we’re reading it.
George Washington University When we give a source authoritative status, it
demonstrates a few things. First, it says that we
See Also: Arab Spring; Bahrain; CNN Effect; trust the particular source of information. Not
Cyber-Jihad; Egypt; Human Rights; Libya; News everything posted on the Internet is true. Count-
Media; Television and Social Media; Tunisia. less examples exist of individuals pulling infor-
mation from the Internet and declaring it fact,
Further Readings only to be proven incorrect. It is why academics
Anderson, Benedict. Imagined Communities: resist the urge to cite sites like Wikipedia, despite
Reflections on the Origin and Spread of the information provided. But, most important,
Nationalism. London: Verso, 1991. authoritative status tells us that others accept the
Livingston, Steven. “Clarifying the CNN Effect: An information presented by a particular source as
Examination of Media Effects According to Type correct. This explains why students may opt to
of Military Intervention.” Research Paper R-18. not cite Wikipedia as their faculty members may
John F. Kennedy School of Government Joan give little credence to information from the site.
Shorenstein Center on the Press, Politics and Public Even if students believe it to be true, whoever they
Policy (June 1997). http://www.genocide-watch are reporting to must share that faith before the
.org/images/1997ClarifyingtheCNNEffect source is viewed as authoritative.
-Livingston.pdf (Accessed May 2013). Shirky defines algorithmic authority as:
Seib, Philip. The Al Jazeera Effect: How the New
Global Media Are Reshaping World Politics. . . . the decision to regard as authoritative an
Dulles, VA: Potomac Books, 2008. unmanaged process of extracting value from
Seib, Philip. Al Jazeera English: Global News in a diverse, untrustworthy sources, without any
Changing World. New York: Palgrave Macmillan, human standing beside the result saying “Trust
2012. this because you trust me.”

In his characterization, Shirky presents three key


elements of algorithmic authority. First, Shirky
asserts that the algorithmic authority takes mate-
Algorithmic Authority rial from multiple sources. Of these sources, none
are widely regarded as being universally trustwor-
Most Americans, it is often argued, have become thy. No single person ever is tasked with indicating
distrustful of the mainstream American media the results are valid (or reliable) before the infor-
today. While many citizens have a particular mation is published. Ultimately, such functions
44 Alpha Blogger

exist widely on the Internet. Google does this for presented unfiltered. No longer does an institu-
PageRank, and Wikipedia largely does the same tional monopoly serve the role of determining
through its transparent postpublication review. what information is correct or incorrect and pre-
The second key element according to Shirky senting it as so.
is that the algorithm must produce good results.
By producing these sound results, people learn to William J. Miller
trust it. At this point in the process, the aggregator Flagler College
becomes an information tool—but it is still not an
authoritative source. The third characteristic dem- See Also: Aggregation; Edgerank; Googlearchy
onstrates the development of the aggregator as an and Politics; Search Engine Optimization; Social
authority. When people become aware of their own Authority; Social Media Optimization.
trust along with the trust of others, an authority is
born. Think about Wikipedia as an example. If an Further Readings
individual trusts Wikipedia, but those the individ- Kuntz, Tom. “The Rise of ‘Algorithmic Authority.’”
ual is talking to do not trust Wikipedia, citing the http://ideas.blogs.nytimes.com/2009/11/18/
site will not gain the individual credibility. If they the-rise-of-algorithmic-authority (Accessed
do trust Wikipedia, however, the individual will be December 2012).
able to relay any information from the site to the Pasquale, Frank. “Assessing Algorithmic
people he or she is speaking with, and no one will Authority.” http://madisonian.net/2009/11/
question the information presented. 18/assessing-algorithmic-authority (Accessed
Shirky discusses how the development of algo- December 2012).
rithmic authority is both similar and different Shirky, Clay. “A Speculative Post on the Idea
to how we have always derived authority. Most of Algorithmic Authority.” http://www.shirky
important, however, is that authority is a social .com/weblog/2009/11/a-speculative-post-on-the
arrangement, not a cultural fact. As a result, -idea-of-algorithmic-authority (Accessed December
authority runs on a wide spectrum. As Shirky 2012).
explains, some forms of authority are respected
enough to settle a bar bet, while others should be
included in congressional speeches or dissertation
defenses. At present, algorithmic authority seems
to be more closely aligned with the bar bet pole, A-List Bloggers
but as sites like Wikipedia have begun focusing on
validity and citations, it has grown in authorita- See Alpha Blogger
tive value. For Shirky and others who now study
the idea of algorithmic authority, the key take-
away is that the concept is at least being placed on
the spectrum and seen as a potential authoritative
source moving forward. Alpha Blogger
Algorithmic authority is not universally viewed
as authoritative yet for myriad reasons. First, In a broad sense, an alpha blogger can be con-
the authority status can change daily. Some ele- sidered someone with a highly respected opinion
ments may be authoritative, while others are not within a specific community in the blogosphere.
(consider the difference between YouTube and But, in a networked media system, any message
the YouTube Government channel). Second, they in the blogosphere (as well as in other social
can still be manipulated almost as easily as the networks) can be quickly spread to other media
megacorporations they are potentially replacing. spaces, platforms, and communities. Therefore,
And third, some types of information and knowl- the message must be a respected opinion that was
edge are not able to be measured for accuracy. created from blogs, and it can be easily expanded
Nevertheless, algorithmic authority allows indi- to other media systems, such as the mainstream
vidual users to judge the validity of information media. This opinion leader is not just respected
Alpha Blogger 45

within a blog’s community. An alpha blogger’s Social Media as Surveillance and


message can be used in other media spheres, the Influence of Blogs
and this coverage has consequences, such as the Within a scenario of growing surveillance of
change of media agenda or even the pressure over social media over actors such as politicians, com-
politicians, companies, and other public actors. panies, and media, there is no doubt that bloggers
The concept of influence is a key point, at have become some of the most active watchdogs
least in terms of generating echo and debate, and of the media landscape. And, following the work
therefore, it is important to underline that not of Hugh Hewitt, there are several examples of
all widely read authors can be considered alpha this surveillance.
bloggers. Many bloggers have good search engine Journalists themselves are under surveillance
optimization and huge statistics of unique visitors, by the blogosphere. Dan Rather of CBS News
but their articles and opinions are not taken into is a high-profile example who suffered from its
consideration by the people who are interested in impact. In September 2004, some messages were
that topic. This point leads us to a second charac- published on forums at FreeRepublic.com dis-
teristic of an alpha blogger: His or her influence is cussing the validity of the documents used by
over a specific theme, such as technology, fashion, CBS to show the alleged privileges of President
media, education, or politics. George W. Bush during his tenure with the Texas
Initially, the first alpha bloggers were identi- Air National Guard. This was the beginning of
fied within the media tech agenda. The first alpha a blog campaign against Dan Rather, signalling
bloggers showed a growing influence over tech the beginning of his fall, which concluded when
media thanks to reputation, novelty, and a spe- it was demonstrated that the documents Rather
cial way of reporting in their articles. Due to the reported were forgeries. In this case, blogs such
small size of the blogosphere during the first years as PowerlineBlog.com, WizBangBlog.com, and
of this community, identifying alpha bloggers was RatherBiased.com can be identified as strategic
not complicated. People like Dave Winers, Doc nodes that developed the story that finally ended
Searls, and Robert Scoble became alpha blog- with Dan Rather’s resignation. These blogs, in
gers; they knew how to become heavy influencers collaboration with others, got the proof necessary
within specific topics. to demonstrate that the documents were false,
Before taking into account the personal influ- and they got the story to the mass media. Based
ence of some bloggers, it is important to remem- on the Rather incident, Matthew Sheffield (Rath-
ber that the blogosphere itself is a sort of commu- erBiased), Paul Mirengoff (Powerline), and Kevin
nity that has gone through different stages. The Aylward (Wizbangblog) can be considered alpha
first was the appearance of bloggers in 1999; the bloggers. They changed the media agenda and
second lasted until 2004, when the blogosphere public opinion, resulting in the fall of Dan Rather.
attained popularity in the media; and the begin- In another political case, the resignation of U.S.
ning of the third stage occurred in 2005, when Senator Trent Lott from Mississippi is a paradig-
blogs became a sort of professional media with matic example of blogger political surveillance.
commercial operations such as the purchase Lott made some racist statements at the end of
of Weblogs Inc. in October by America Online 2002 at the birthday party of Senator Strom Thur-
(AOL) for $25 million. In this deal, the media mond. The tipping point was the fact that presti-
group AOL acquired 85 blogging sites about gious media like the Washington Post did not men-
many different topics, from technology to movies tion the controversial and racist comments. But,
and travel. This event proved media were aware Josh Marshall, with his blog Talking Points Memo,
of the influence of many bloggers. started a conversation around the issue.
In every one of these stages are examples of how Josh Marshall covered what the professional
bloggers became individual influencers within spe- media had missed. This case is one of the earli-
cific topics. Today, the blogosphere is no longer a est examples of the power of the blogosphere to
new network and its growth has slowed, but its modify the mainstream media agenda and to force
maturity as a social network allows analysis with the media to report on issues they may not want
more perspective. to. Although mainstream media reported almost
46 American Debt Crisis and Twitter

nothing of Trent Lott’s segregationist statements, legislation required to raise the debt ceiling if the
on the Internet, the news was quickly spread by Democrats did not agree to sweeping spending
hundreds of blogs. cuts. The debt ceiling is a distinct piece of legisla-
Alpha bloggers are no more than the chan- tion that is ancillary to the budget process, requir-
nels for collective intelligence, tipping points on ing congressional approval and a presidential
the Web that give relevance to those issues that signature. The debt ceiling is viewed largely as a
should be part of the mainstream media agenda. formality required to continue the Congress’s and
Alpha bloggers are not the cause of this visibility, the president’s economic agenda. Failure to raise
but they accelerate it. The reason for the effective- the debt ceiling could result in a financial calamity,
ness of alpha bloggers lies in the credibility they sending the United States and possibly the world
gain over long terms on the Web, their ability to economy into an economic depression.
tap resources and acquire proof that professional Despite the real and measureable consequences
media did not obtain, and their independence attached to the debt ceiling, congressional lead-
from large media groups and political and busi- ers used its built-in sense of urgency as a rhetori-
ness lobbies. This independence is perceived by cal and political tactic. These debates took place
bloggers as their best advantage. in the context of what many economists call the
Today, becoming an alpha blogger is more worst economic recession since the Great Depres-
difficult than during the first years of the blogo- sion. Nervous investors worried that failure to act
sphere. Now, the community is much bigger, swiftly could cause credit agencies to downgrade
the media ecosystem is more complicated and the U.S. credit rating, which would instigate a
interlinked, and there are more social networks double dip recession.
(microblogging) that are competing for attention Similarly, frustrated citizens took to social net-
in a crowded marketplace. working sites, like Twitter, to express their dis-
content. Here, the aggregated voices of citizens
José-Manuel Noguera Vivo inaugurated a new regime of public participation
Catholic University of San Antonio in economic policy as Twitter changed the nature
of the debt ceiling debates. This entry traces the
See Also: Blog Storm; Blogosphere; Blogs; Buzz relationship between the American debt crisis
Creation. and social media—from its origins in the dot-
com bubble of the mid-1990s to the debt ceiling
Further Readings debates and the public’s response on Twitter.
Hewitt, Hugh. Blog: Understanding the Information
Reformation That’s Changing Your World. History
Nashville, TN: Nelson Books, 2005. The story of the American debt crisis begins
Scoble, Robert and Shel Israel. Naked Conversations: in the late 1990s with the dot-com bubble and
How Blogs Are Changing the Way Businesses subsequent collapse. While the harbinger to the
Talk With Customers. Hoboken, NJ: John Wiley Internet, Advanced Research Projects Agency
& Sons, 2006. Network (ARPANET), was developed in the
Tremayne, Mark, ed. Blogging, Citizenship, and the early 1960s, it was not until the early 1990s—
Future of Media. New York: Routledge, 2007. with the introduction of Netscape’s browser
Mosaic—that the Internet fully entered the pub-
lic’s imagination.
By the mid-1990s, Internet industries began
posting record profits by trading on the public’s
American Debt Crisis high expectations that everything from bank-
ing and investment to travel and entertainment
and Twitter would now become digital. Corporations rang-
ing from Netscape to eBay pioneered new rev-
The American debt crisis refers to the 2011 finan- enue streams grounded in what became termed
cial scare when Republicans threatened to obstruct as the “attention economy.”
American Debt Crisis and Twitter 47

Public reaction to the American debt crisis and the resulting debt ceiling debates included both street protests and innovative use
of social media. These marchers carried banners referencing the housing crisis at an Occupy Wall Street protest against the Bank of
America and its foreclosure policies on March 15, 2012. The event included a symbolic “occupation” outside of a bank branch office.

The premise of this attention economy is infor- had no proven earnings yet grew exponentially
mation overload, which envelops consumers in a from its initial set price of $28 per share to $71
flood of goods and services. In this environment, in a matter of months. The dot-com boom, as it
the material production of goods is secondary is called, earned savvy investors millions. As G.
to securing the antecedent conditions for con- Thomas Goodnight and Sandy Green note in
sumption—mainly capturing attention through their essay “Rhetoric, Risk, and Markets,” the
advertising. Unlike traditional economic models growth of Netscape was premised almost entirely
that privilege supply over demand, the attention on assumptions about its future earning potential.
economy privileges demand over supply. As the Whereas previously, companies such as Micro-
volume of goods increasingly exceeded demand, soft had to prove their earnings through years of
consumption became less of an automatic process operational experience, Netscape and countless
and more an act of strategic decision making on other dot-com start-ups traded exclusively on
behalf of the consumer. In short, people’s atten- their perceived capacity to produce massive rev-
tion became another commodity that was bought, enue. Goodnight and Green suggest that this sort
sold, and traded. In the dot-com bubble, it was the of behavior, which produced the dot-com bubble,
shiny, new technologies that entranced investors as the hope of new communication technology,
and begot rapid speculation over future earnings. rapidly surpassed its material capabilities. The
Unfortunately, the good times proved unsus- bubble burst on Friday, March 10, 2000, when
tainable because a schism grew between the the National Association of Securities Dealers
actual value of Internet start-ups (use value) and Automated Quotations (NASDAQ) tanked and
their speculative representations in public cul- drew into relief the differences between use and
ture (exchange value). Netscape, for example, exchange value.
48 American Debt Crisis and Twitter

The dot-com collapse, as Joshua S. Hanan homeowners, and real estate professionals per-
observes in his essay “Home Is Where the Capi- ceived their discourse as an instrument that could
tal Is,” forced Wall Street to find new financial reflexively manipulate the invisible hand of the
outlets for profit-making. The same year that marketplace. Unfortunately, this irrational exu-
NASDAQ witnessed major declines, Wall Street berance could not be maintained as home prices
lobbied Congress to pass the Gramm–Leach– began appreciating at unsustainable rates. By late
Bliley Act (GLBA), which repealed some of the 2005, the United States replaced dot-com spec-
consumer safeguards codified in the Glass–Stea- ulation with a housing bubble. As huge deficits
gall Act of 1933. Congress reasoned that gut- began mounting on Wall Street and Main Street,
ting some of the post-Depression era protection the pocketbooks of the federal government ulti-
would invite a swell of capital and resuscitate mately became infected. By late 2007, America
the United States’ ailing economy. The passage was embroiled in the worst financial crisis since
of GLBA dissolved the regulations that sepa- the Great Depression.
rated investment from commercial banks, allow-
ing Wall Street to participate in practices previ- Crisis
ously reserved only to commercial banks—such As a response to the crisis largely attributed to
as credit default swaps (CDs) and collateralized President George W. Bush, U.S. citizens elected
debt obligations (CDOs). Democrat Barack Obama as president and
In addition to Congress’s deregulation of Wall charged him with the task of fixing America’s
Street, the Federal Reserve also felt compelled to financial woes. His first policy directives included
intervene by lowering national interest rates to passing the $800 billion American Recovery
unprecedented levels, hovering around 1 percent and Reinvestment Act of 2009, or the economic
by 2003. This move prompted mortgage lending stimulus, as it is more frequently referred. Almost
institutions to offer home loans at historically low immediately after Congress ratified the stimulus,
rates and made home equity lines (which are con- conservatives expressed concern that it was coun-
tingent on the federal interest rate) increasingly terproductive and reckless. If irresponsible spend-
appealing. At Congress’s and the Federal Reserve’s ing created this mess, Republicans reasoned, more
behest, financial institutions also began offering spending certainly would not help the problem.
products aimed at giving low-income families the Many citizens agreed with the conserva-
means to secure homes. This new kind of loan, tive critique of Obama’s fiscal policy, and they
dubbed subprime mortgages, had lax qualifica- gave Republicans control of the U.S. House of
tion standards and was not insured by the federal Representatives during the midterm elections in
government. Banks compensated for the risky November 2010. This afforded conservatives
investment by charging higher interest rates and leverage in the upcoming budget negotiations
deferring their risk to the new securitization pro- due to occur that summer. In April 2011, Obama
cesses opened up by CDOs. gave a national address on the budget, which
outlined $4 trillion in cuts to nonentitlement
Housing Bubble programs and defense spending over the next
All across the United States, people felt compelled decade as well as tax increases on those mak-
to buy up homes with a fervor never before seen. ing over $250,000 per year. Republicans scoffed
From home valuation Web sites such as Zillow at this legislation, suggesting that it relied too
.com to television shows like Flip This House, a heavily on taxing the rich and failed to include
larger cultural trend emerged that conceptualized enough spending cuts.
the home as an investment more so than a resi- In May 2011, Secretary of the Treasury Timo-
dence. Rather than serve merely as an adequate thy Geithner announced that the government was
representation of home values across the United quickly approaching its debt ceiling, and while
States, Zillow.com helped produce such values the Treasury could take some measures to pro-
by virtue of the site’s linguistic organization. long the time before the United States passed its
By entering a number of complex debates cen- borrowing limit, legislation was needed before
tered on the present economy, countless renters, August 2, 2011.
American Debt Crisis and Twitter 49

Republican Speaker of the House John Boeh- proposed solutions. Indeed, the more individuals
ner seized this opportunity to force the Repub- expressed their concern about the debt ceiling, the
lican agenda and argued that neither he nor any more attention it received. This process is theo-
Republicans would support the upcoming debt rized at length by Damien Smith Pfister who notes
limit increase without deep spending cuts. Annie in his essay, “The Logos of the Blogsphere,” that
Lowrey, writing for Slate, described the debt ceil- blogging platforms, such as Twitter, allow the
ing as a “political football” that oppositional par- public to shape deliberation.
ties—both Republican and Democrat—have used Pfister outlines three overlapping ways social
to advance a partisan agenda. Republicans held media shape matters of public concern, such as
the debt ceiling hostage until their demands were the American debt ceiling. First, social media
met. For example, Lowrey reported that Repre- grant the public a new voice by allowing them to
sentative Michele Bachmann advised Congress to circumvent the gatekeeping of traditional media
immediately slash $125 billion a month in spend- outlets that set the agenda for matters of national
ing rather than lift the debt ceiling. The debt importance. Indeed, it is highly unlikely that an
ceiling debates, as the media came to call them, editor would allow #FuckYouWashington to
became a proxy battle for broader economic appear in a periodical. Twitter bypasses this tra-
stewardship. Each side adduced a fiscal agenda ditional sieve, favoring the aggregate (or trend)
on how to handle the United States’ massive debt to dictate which conversations will be seen by the
moving forward. public. Conventional news outlets are then forced
to reflect on the discourses as the tweets become
The Debt Ceiling Debates and Twitter ubiquitous in the public sphere. For instance, on
The public reacted to this impasse by taking to July 25, 2011, the newspaper periodical Reuters
the streets and various social networking plat- published an article on the #FuckYouWashing-
forms. Jeff Jarvis, a prominent U.S. blogger and ton Twitter feed that highlighted the nation’s
journalist, took to Twitter to express his frustra- anger with an increasingly dysfunctional political
tion. He tweeted, “Hey, Washington assholes, it’s system. Many other news outlets followed suit
our country, our economy, our money. Stop fuck- shortly after.
ing with it,” and “People, it’s time to get fuck- Second, bypassing the gatekeeping function
ing pissed off.” The next day, Jarvis exclaimed allows for a diversity of views that facilitate the
“FUCK YOU WASHINGTON. C’mon, people. production of novel lines of argument, or topoi.
Let’s hear it.” On July 24, 2011, “#FuckYou­ In contrast to the media’s coverage of the debt
Washington” trended on Twitter and generated debates that focused on the partisan bickering,
20,000 hits in under an hour. In response to Jarvis injected his frustration and citizen’s discon-
this new trending top, Jarvis joked, “I do hope tent. Third, Twitter enables instantaneous and
Twitter doesn’t have a prissyfilter for trending. continuous publishing of arguments, thoughts,
#FuckYou­Washington.” Beyond frustration with claims, and gripes, which accelerates and diver-
partisan bickering, the Twitter flow portended a sifies the number of arguments available. While
broader public concern for America’s standing in old models of media require publication time—
the international economy. Whereas America was printing, editing, and so on—Twitter is instanta-
historically viewed as the global debtor state— neous. As such, it provides an excellent platform
with its currency functioning as the gold standard for citizen participation because it provides an
up until the early 1970s—citizens worried that outlet that can keep pace with a rapidly changing
America, “the shining city on the hill,” was dim- debate. In short, microblogging platforms pro-
ming. Jarvis’s digital act of defiance demonstrates vide a communication medium that truly brings
the complex relationship between social media ordinary citizens into the public sphere.
and the American debt ceiling. Not only were The nation’s reaction to the American debt
social media responsible for the origins of the cri- crisis on Twitter offers an interesting example of
sis (through the dot-com bubble), but they also how social media have transformed the ways citi-
became a powerful medium that created a tempo- zens participate in public policy—particularly in
rary space for disagreement and dissent regarding regard to economics. Whereas economic policy
50 American Enterprise Institute

has historically been relegated to the deliberative American Enterprise


expertise of economists, congressional leaders,
and the likes of the Federal Reserve, social media Institute
have carved out a space for citizens to engage
in these increasingly pressing matters. As the The American Enterprise Institute (AEI) bills itself
#FuckYou­Washington Twitter feed demonstrated as a nonpartisan think tank composed of scholars
for so many, social media are increasingly break- and supporters who are committed to supporting
ing down the meditational buffer between citi- the advancement of “liberty, increasing individual
zens, public representatives, and economic valua- opportunity, and strengthening free enterprise.” It
tion. Unfortunately, such dissent was not enough is one of the most powerful and influential think
to halt Standard and Poor’s August 5, 2011, deci- tanks in Washington, D.C., and boasts a staff of over
sion to downgrade the United States’ credit rating 185 employees and 50 adjunct fellows. It should be
from an AAA to an AA. noted that its nonpartisan stance does not mean it
avoids taking sides on political issues. Generally,
Justin Eckstein its views are closely aligned with the business/eco-
Joshua S. Hanan nomic wing of the Republican Party, though it does
University of Denver not generally comment on social issues that ener-
gize other portions of that party’s base. The insti-
See Also: Activists and Activism, Digital; tute has seven focus areas for its research: econom-
Campaigns, 2012; Innovation and Technology; ics, foreign and defense policy, politics and public
International Online Communities; International opinion, education, health, energy and the envi-
Unrest and Revolution. ronment, and society and culture. Not only does
it widely publish its reports on a variety of related
Further Readings issues, but it also has become an important online
Goodnight, G. Thomas and Sandy Green. presence and favorite source of information for
“Rhetoric, Risk, and Markets: The Dot-Com American conservatives. Its AEIdeas blog has daily
Bubble.” The Quarterly Journal of Speech, traffic that sometimes exceeds 40,000 visitors and
v.86/2 (2010). its online magazine The American also maintains a
Hanan, Joshua. “Home Is Where the Capital Is: prominent place on the Web, in part because of its
The Culture of Real Estate in an Era of Control American.com Web address.
Societies.” Communication and Critical/Cultural A brief look at the history of the AEI shows that
Studies, v.7/2 (2010). it traces its roots back to the 1938 founding of the
Lowrey, Annie. “Debt Ceiling Crisis: The Debt American Enterprise Association (AEA), in an age
Ceiling Is a Pointless, Dangerous Relic, and when economic issues were very much a part of
It Should Be Abolished.” Slate (May 16, politics as evidenced by Franklin Roosevelt’s New
2011). http://www.slate.com/articles/business/ Deal policies and the efforts to recover from the
moneybox/2011/05/abolish_the_debt_ceiling.html Great Depression; yet at the same time economists
(Accessed December 2012). played almost no direct role in the government or
Pfister, Damien Smith. “The Logos of the major advocacy groups. AEA began its academic
Blogosphere: Flooding the Zone, Invention, and and advocacy role in 1943, when its members
Attention in the Lott Imbroglio.” Argumentation wrote a series of 50 analyses of different bills before
and Advocacy, v.47 (2011). the U.S. Congress. These analyses were meant pri-
Shaw, Lucas. “Pundit Starts ‘#FuckYouWashington’ marily to assist legislators in understanding how a
Twitter Craze Over Budget Battle.” Reuters given piece of legislation might impact the business
(July 25, 2011). http://www.reuters.com/ and economic interests of the United States and
article/2011/07/25/idUS1274259920110725 particular industries. The following year, the AEA
(Accessed December 2012). established another important piece of its ongoing
Sheridan, Gavin. “Debt Crisis Triggers Rallying identity and role in the Washington, D.C., power
Call: #FuckYouWashington.” http://storyful.com/ structure when it created a board of several emi-
stories/1000005702 (Accessed December 2012). nent academics, including people like economist
American Enterprise Institute 51

Milton Friedman and political scientist James Q. mainly uses the form of news essays to provide
Wilson. By the 1960s, the AEA became more of more detailed accounts of various items that have
a force in wider American society. In addition to recently been in the news, and to provide politi-
continuing to publish its legislative analyses, which cal analysis in line with AEI’s research specialties.
according to its own bookkeeping had been con- Articles range from foreign policy to monetary
sulted by 85 percent of senators and 73 percent of policy to popular sports. Many of the articles
House members, it also created materials for use contain an element of advocacy and offer various
in school debate programs. In 1962 it changed its policy prescriptions to problems with economic
name to its current American Enterprise Institute. development, political disputes, or other issues. As
One of the most unappreciated aspects of its is standard, each article can easily be shared on all
history is AEI’s role in creating daily press briefing the major social networking sites by readers, mak-
materials for Congress. This practice was so ben- ing it easier for a story to go viral. On the whole,
eficial, that soon the White House began releasing the articles evidence a leaning toward fiscal conser-
its own daily press summary in order to provide vatism, an emphasis on American interests in the
its take on the day’s news. In essence, it was one of conduct of foreign policy, and a strong focus on the
the world’s first news aggregators. Furthermore, it economic implications of various regulatory poli-
was one of the earliest research/advocacy groups cies. However, a look at the site’s archive reveals
to incorporate computer technology in order to that many articles express disagreement with both
process more data, in this case regarding the U.S. major U.S. political parties on a host of laws and
federal budget. From the 1970s onward, AEI issues, which burnishes the AEI and American
would host some of the most famous economic .com’s credentials as an independent think tank.
and political scholars in the United States, many AEI’s blog AEIdeas is another essential ele-
of whom had served or would go on to serve in ment of its social media strategy. Its daily traffic
the administrations of Ronald Reagan, George numbers are among the highest of any think tank,
H. W. Bush, and George W. Bush. and testify that not only does the blog generate
AEI scholars, including Irving Kristol, have even interest, but also readers return to it as a trusted
been credited with launching the neoconservative source of information. Under the banner Freedom
political movement, though others like Norman Opportunity Enterprise, the blog hosts a number
Ornstein are openly more centrist or liberal and of columns that are devoted to AEI’s research
are also allowed to publish under AEI’s auspices. divisions. There are also columnists who make
In recent years its activities with the more Demo- regular contributions on dedicated pages. These
cratic Party–aligned Brookings Institution have articles are quickly searchable by topic and inter-
produced notable publications on the process of est area. They are also written by people who are
political campaigns and public engagement and well-known area or issue specialists, giving them
the role of the various institutions of government additional credibility. Subscribers to the blog can
in providing access points for the public to inter- get daily updates on Afghan/Pakistani politics,
act with the state. It is in this sense in particular U.S. economic policy, and a host of other issues
that one sees that its claim of nonpartisanship is tailored to their interests.
given actual funding and support in its research Its 75 years of traditional research and advo-
activities. cacy, or think tank, operations when combined
with its formidable online presence featuring doz-
Social Media ens of the most famous public policy analysts in
For social media users, AEI’s online magazine and the United States places the American Enterprise
blog are clearly two of its most popular tools for Institute in the clear position of one of the most
quickly disseminating information and encourag- influential think tanks in Washington, D.C., and
ing public advocacy on behalf of certain laws and one that looks likely to maintain this position for
causes. The American was begun in 2006 and took the foreseeable future.
the legacy of AEI’s earlier print magazines online.
It uses Rich Site Summary (RSS) feeds to push Jeremy Kleidosty
content directly to its subscribers. The magazine University of St. Andrews
52 Amplification

See Also: Aggregation; Blogs; Foreign Policy; paying for that. If John Doe has 1,000 friends or
Lobbyists; Nonprofit Organizations; Political followers and combined they have 1 million friends
Economy; Public Intellectual. and followers, a person’s reach can exponentially
grow from the actions of John Doe.
Further Readings Amplification is the rate at which individuals
Abelson, Donald. Do Think Tanks Matter?: Assessing who follow you take another individual’s content
the Impact of Public Policy Institutes. Montreal: and share it across their own personal networks.
McGill-Queen’s University Press, 2009. On Twitter, this focuses on retweets. Facebook and
American Enterprise Institute. “American Enterprise Google+ look at the number of shares per post.
Institute.” htttp:/ www.aei.org (Accessed May YouTube and blogs look at the number of share
2013). clicks per video or post. Analytically, the informa-
Rich, Andrew. Think Tanks, Public Policy, and tion gleaned from measuring amplification can be
the Politics of Expertise. New York: Cambridge quite useful. First, one can determine what types
University Press, 2005. of posts or videos are most likely to penetrate into
one’s second- or third-level network. Further, one
can examine what times of day lend themselves to
amplification, which can help shape one’s social
media scheduling. If one’s messaging is truly suc-
Amplification cessful, the hope is that one’s network will grow
as second-level individuals ultimately choose to
In the past two years, social media marketing has become first-level supporters.
begun to focus on the concept of amplification. As amplification has become more widely rec-
Amplification with social media involves taking ognized as an important social media metric, more
some positive action or statement and then shar- sophisticated efforts at increasing amplification
ing it far and wide across social media platforms. have been developed for various forms of social
Politicians have utilized such ideas in the past, media. On Facebook—which has always presented
but not in the concentrated way they are used the most opportunities for sharing and endorsing—
through social media. If we look at George W. Sponsored Stories have been created that allow
Bush’s 2000 election strategy of enrolling volun- companies to pay to repost any action an individ-
teers to call their friends in support of his candi- ual takes regarding them. These stories show up
dacy and then asking those friends to call 10 of in the far right column of a person’s friends’ feeds,
their own, we see how word-of-mouth endorse- thus appearing as a personal endorsement from
ments from individuals we already know can that person. Further advancements are permit-
make for a successful campaign strategy. As a ting payers to place the sponsored stories directly
result of the new potential presented to amplify into your Newsfeed. Twitter has a similar ability
via social media, it is important to understand through the use of embedded tweets. This feature
how it can become a politically viable means of gives someone the option of embedding a tweet
quickly passing along information. onto a Web site, consequently allowing followers
When purchasing ad space on any type of social to spread a message in other mediums.
media (Facebook, Twitter, YouTube, etc.), there is From a political standpoint, we know that pol-
a limit as to how many ads a person can buy since iticians have become increasingly curious about
he or she pays per click. On Google, for example, social media since Howard Dean’s 2004 primary
the purchaser buys per paid search; on Facebook, campaign and Barack Obama’s successful uti-
the buyer pays per display. But with social media, lization in both the 2008 and 2012 presidential
everyone that becomes involved in a person’s par- campaigns. Through amplification, a message
ticular network has a network of their own that can reach a large audience very quickly at very
their activities are shared with. So when John Doe little cost and lead to more first-level connections.
“likes” a person’s post, his network of friends The downside, however, that is largely ignored in
is exposed to that person’s post because of John the current literature is that as quickly as a can-
Doe’s action—and the person is not responsible for didate or campaign can share good news with
Annette Strauss Institute for Civic Life 53

large numbers, others have the same capabilities


to share bad news. Thus, the idea of amplifica-
tion can work for or against a politician depend-
ing on the news being shared. While a campaign
can control the content of information sent over
social media from their own handle, they lack the
ability to control whatever anyone else has to say.
In this way, amplification has quickly become a
double-edged sword for political consultants and
politicians as unsatisfied citizens have the same
tools at their disposal (although with a presum-
ably smaller audience, at least initially).

William J. Miller
Flagler College Student activists speak with an educator at an event in a series
called “Why Bother? Engaging Texans in Democracy Today,”
See Also: Facebook; Klout Score; Social Media, cosponsored by the Annette Strauss Foundation in 2012 and
Definition and Classes of; Social Media Optimization; 2013 to address low civic engagement in central Texas.
Social Media Strategies and Tactics; Twitter; YouTube.

Further Readings
Carr, D. “How Obama Tapped Into Social Networks’ mayor, community leader, and philanthropist
Power.” New York Times (November 9, 2008). who devoted most of her life to helping others.
http://www.nytimes.com/2008/11/10/business/ At the heart of the University of Texas at Aus-
media/10carr.html (Accessed October 2012). tin, the institute is aligned with the university’s
Solis, B. “Politics in the Social Media Age: How public role of designing and testing new ways of
Tweet It Is.” (October 29, 2010). http:// increasing civic involvement. It benefits from the
www.briansolis.com/2010/02/social-media collective expertise of scholars who are nationally
-optimization-smo-is-the-new-seo-part-1 (Accessed renowned for their contributions to the study and
October 2012). development of civic participation and the con-
Thuringer, A. “Case Study: Howard Dean and the ditions that give rise to or suppress engagement.
Blogosphere.” (June 2, 2011). http://thuringer.me/ Through nonpartisan research, education, and
blog/2011/6/2/case-study-howard-dean-and-the outreach, the institute seeks to understand and
-blogosphere.html (Accessed October 2012). overcome obstacles to civic engagement.

Programs and Activities


Among the current programs related to social
media and politics, the institute’s New Politics
Annette Strauss Forum is one of the most prominent. The forum
focuses on engaging college-age adults by either
Institute for Civic Life providing the necessary skills to become effective
as citizens, or by sharpening and honing their abil-
The Annette Strauss Institute for Civic Life aims ities and talents to take leadership roles in their
to shed light on how new technologies of com- communities. The New Politics Forum increas-
munication and innovative outreach can be used ingly relies on social media tools to more efficiently
to increase political understanding and participa- communicate with its targeted audience, and to
tion. Most of the institute’s research efforts are more readily engage youth in civic activities.
therefore dedicated to applied research. Founded In fall 2011, the New Politics Forum organized
in 2000, the institution was named in honor the 21st Century Civic Engagement Conference,
of Annette Greenfield Strauss, a former Dallas offering an overview of new online platforms that
54 Annette Strauss Institute for Civic Life

citizens use to engage with politics and government ovee.itvs.org), a platform that allows for online
uses to engage citizens. Based on the premise that interactive viewing with panelists chatting in
there exists a new landscape in civic engagement, response to viewer comments, including a “like”
the focus of the conference was, in essence, how function. The goal is to let people have more than
citizens can talk to each other to increase engage- one option for engaging with events.
ment and improve governing. Speakers from
some of the most innovative efforts to use digi- Research
tal technologies to engage citizens (such as Code The Annette Strauss Institute conducts research
for America and SeeClickFix) discussed new plat- that furthers scholarly and public understanding
forms, social innovation, and global citizenship. of media, politics, and civic participation. In the
In spring 2012, the New Politics Forum hosted field of digital and social media, there are several
The White House Youth Town Hall in partnership concurrent projects being conducted, one of the
with the White House Office of Public Engage- most prominent being the Engaging News Proj-
ment. The town hall focused on how young peo- ect. The goal of this project is to provide practi-
ple can engage their government and each other cal, research-based techniques for engaging online
to address community problems. This event lev- audiences in commercially viable and democrati-
eraged several interactive technologies, including cally beneficial ways. The project is directed by
a statewide conference call, a moderated Twit- Natalie Jomini Stroud, associate professor of
ter feed, and LinkedIn groups created during the communication studies and assistant director of
town hall. Thereby, social media and communica- the Annette Strauss Institute.
tion technologies allowed viewing groups around Given the increasing influence today’s digital
the state to interact directly with Ronnie Cho (of media landscape exerts over citizens’ civic lives,
the White House Office) and to discuss collectively the Annette Strauss Institute recently housed
through Twitter hashtags and LinkedIn groups the and launched the new Digital Media Research
problems addressed by the event. Program (DMRP) led by School of Journalism
Every spring, the Annette Strauss Institute Associate Professor Homero Gil de Zúñiga. This
offers the Campaign Boot Camp, an intensive newly added research unit will develop a system-
course on how to be effective working on politi- atic research program generally aiming to address
cal campaigns, and how to use social media for the influence of new technologies use in people’s
political organizing and mobilization. Also, the daily lives, as well as the effect of such use on
Executive Communication Training Seminar, usu- the overall democratic process. More specifically,
ally offered once a year, always includes a com- the DMRP will shed light over the impact of
ponent on social media. All activities organized new communication technologies use (i.e., social
by the institute encourage the use of social media, media), and user-generated content with respect
and engage external audiences by posting videos, to several benchmarks of a healthy democracy:
uploading pictures, and using Facebook pages citizens’ political knowledge, political discussion,
and Twitter hashtags to disseminate events. and overall civic and political engagement.
Finally, the new initiative of the institute, called
“Why Bother? Engaging Texans in Democracy Homero Gil de Zúñiga
Today” comprises a series of public dialogues and Magdalena Saldaña
news stories produced in partnership with KUT Regina Lawrence
Radio and KLRU-TV. This initiative is not aimed University of Texas at Austin
in particular at young people or college students,
but instead at all citizens of central Texas, in order See Also: Activists and Activism, Digital; Internet
to discuss new forms of engagement, exploring Gathering; Networks, Political; Social Capital; Voter
ways to inspire more people to get involved. Turnout; Youth Engagement.
“Why Bother?” has included an active social
media presence. The most recent public dialogue, Further Readings
about how citizens can effectively engage state Bennett, W. Lance, et al. “Communicating
legislators, was also shown over Ovee (https:// Civic Engagement: Contrasting Models of
Anonoblog 55

Citizenship in the Youth Web Sphere.” Journal of Ethics


Communication, v.61/5 (2011). Contemporary media ethics scholars have dis-
Gil de Zúñiga, Homero, et al. “Social Media cussed how new technologies have enabled decep-
Use for News and Individuals’ Social Capital, tion. They have written about technologies such
Civic Engagement and Political Participation.” as very small recording devices that are easily hid-
Journal of Computer-Mediated Communication, den and digital editing technologies that make it
v.17/3 (2010). easier to manipulate how information is presented
Pasek, Josh, et al. “Realizing the Social Internet? and processed. The ability to verify what is true
Online Social Networking Meets Offline Civic or factual in the blogosphere is threatened when
Engagement.” Journal of Information Technology opinion is misrepresented as fact, when bloggers
& Politics, v.6/3–4 (2009). plagiarize, when conflicts of interest are not dis-
Valenzuela, Sebastián, et al. “The Social Media Basis closed, or when a blogger lies about his or her
of Youth Protest Behavior: The Case of Chile.” identity, especially when the identity of the blog
Journal of Communication, v.62/2 (2012). host is not identified from the start. Furthermore,
with the advent of Web 2.0 and applications that
assist in facilitating interactions among users,
increased collaboration and information sharing
have raised more privacy concerns in relation to
Anonoblog regulation and enforcement. Ethicists have dis-
cussed the potential of new communication tech-
Blogs are conceptualized as tools that have been nologies to threaten transparency and account-
designed to promote immediate interaction ability. For example, the following considerations
between the host blogger and blog visitors. Blogs must be analyzed in relation to blogging and eth-
feature artifacts such as comments, trackback, ics; scholar Richard Johannesen notes the follow-
blogrolls, and archives. Furthermore, blogging ing in regard to ethics:
culture embraces a particular set of norms that
encourage linking to other blogs and sharing via • What is the communicator’s intent,
comments additional information regarding any and what is the audience’s degree of
subject being discussed. However, there has been awareness?
an emergence of the anonoblog. The anonoblog, • Does the communicator use ghostwriters
which is also referred to as a ghost blog, is an to make him or herself appear to possess
anonymous, easy-to-use publishing platform that personal qualities that he or she does not
arranges entries in reverse chronological order. have?
This program is a simple content management • What are the surrounding circumstances
system with a number of practical benefits, among of the communicator’s job that make
them the automatic creation of Rich Site Summary ghostwriting a necessity?
(RSS) feeds so that readers can subscribe and get • To what extent does the communicator
information automatically rather than visiting actively participate in the writing of his
an actual Web site. The fascinating aspect about or her own writing?
ghost blogging technology is that it allows anyone • Does the communicator accept responsi-
with Internet access to have a Web presence to bility for the message he or she presents?
create, publish, and update material on the Web
without knowing HTML, CSS, PHP, XML, or any Identity
other programming languages. Therefore, if indi- Social media communications are rarely unilateral.
viduals can write e-mail messages, they have the Social media sites make it easy for people in vast
ability to develop an anonoblog post; and many geographical areas to leave blog comments, for
blogging programs actually allow an individual to example, sending Facebook or Twitter messages.
post by sending an e-mail. However, anonoblogs As anonymity or pseudoanonymity are common
are primarily characterized by a tension between online, it is not always possible for an individual to
ethics and identity. know where the initial communication originated
56 Anonymous

because the speed of this social networking sys- Anonymous


tem has the possibility to facilitate referrals,
advice, and the formation of relationships with Anonymous is an Internet meme that represents
a few clicks of a mouse, and in this arena, casual the concept of a decentralized online community
interaction sometimes cannot be distinguished acting anonymously—as an unnamed collec-
from more formal relationships. The frequent use tive—in a coordinated manner, usually toward
of anonymity and pseudoanonymity online also a self-agreed goal. In its early form, Anonymous
can give rise to inadvertent conflicts of interest was identified with a fringe group of law-break-
as bloggers unintentionally develop relationships ing pranksters. The Anonymous collective has
with parties who have interests that are adverse to become increasingly associated with hacktivism—
those of the initial blogger. For example, the ini- the use of computers and computer networks as
tial blogger also may state a position on an issue a means of protest to promote political ends. It
that is adverse to the interest of another party strongly opposes Internet censorship and surveil-
and inadvertently create an issue conflict. Those lance, seeks mass awareness, and aids revolution
most opposed to ghost blogging would argue that against corrupt entities. For many, Anonymous
those who use the anonoblogging format should has become the faceless face of the new cyberwar
reveal their identities as much as possible (name, against oppressive governments and all-powerful
photo, background info, etc.), reveal their per- corporations. Anonymous is responsible for raids,
sonal affiliations and conflicts of interest, and cite invasions, activism, protests, and public defama-
and link all of their sources referenced in each of tion via both legal and illegal means, with inten-
their posts. In many social networks, this concept tions both good and malevolent.
is still being negotiated. Anonymous’s origin is attributed to 4chan.org,
an English-language image board that started
Reynaldo Anderson in 2003. Unlike many Web forums, 4chan does
Ryan Branson not have a registration system. Blog entries, files,
Harris-Stowe State University and information are posted anonymously; posts
are signed with the Anonymous moniker, and
See Also: Alpha Blogger; Blog Syndication; the pseudonym Anonymous is used during chats.
Blogosphere; Blogs; Ghost Blogging. The general understanding on 4chan is the term
Anonymous does not stand for a single person
Further Readings but rather a collective of unidentified users. In
Croteau, D., W. Hoynes, and S. Milan. Media/Society: 2006, the Anonymous meme emerged on 4chan
Industries, Images and Audiences. Thousand Oaks, from this idea of a collective of unnamed indi-
CA: Sage, 2012. viduals with a shared identity.
Hornyak, M., B. Peach, and M. Fekula. “Blogging: Anonymous now consists of users largely
A New Threat to Student Research?” from multiple image boards and Internet forums.
Developments in Business Stimulation and Several wikis and Internet relay chat (IRC) net-
Experiential Learning, v.30 (2003). works, such as AnonOps, AnonNet, or Voxanon,
Johannesen, R. Ethics in Human Communication are maintained to overcome the limitations of
(5th ed.). Long Grove, IL: Waveland Press, 2002. traditional image boards. The group is banded
Kuhn, M. Interactivity and Prioritizing the Human together by the Internet through 4chan, 711chan,
Code: A Code of Blogging Ethics. School of Encyclopaedia Dramatica, IRC channels, You-
Journalism and Mass Communication, University Tube, and Facebook.
of North Carolina at Chapel Hill, 2007. Anonymous has no leader, no ranking or con-
Minta, M. “Lawyers and Social Media: The Legal trolling party, and relies on the collective power of
Ethics of Tweeting, Facebooking, and Blogging.” its members—Anons—acting in ways that benefit
The Turo Law Review, v.28.1 (2012). the group. An image commonly associated with it
Schmidt, J. “Blogging Practices: An Analytical is the suit without a head, representing a leader-
Framework.” Journal of Computer-Mediated less organization and anonymity. Anybody who
Communication, v.12/4 (2007). wishes to join can be an Anon and work toward a
Anonymous 57

Protesters wearing the Anonymous group’s iconic Guy Fawkes masks at a demonstration against the Church of Scientology in Los
Angeles, California, on February 10, 2008. The 2008 demonstrations were the group’s first mass protests in the physical world and
involved thousands of people in North America, Europe, New Zealand, and Australia gathering in front of Scientology churches.

set of goals. Anonymous contains a wide range of preference for the Guy Fawkes mask is believed
beliefs and lifestyles spread over many media and to have grown directly from the EPG meme.
languages. The views of the loudest members of In 2008, Anonymous launched Project Chanol-
Anonymous are not necessarily the views of the ogy, a protest movement against the practices of
rest of Anonymous. Members usually have agen- the Church of Scientology, its first widely noted
das all agree on and coordinate and act upon, but raid and first protest in the physical world. This
all act independently toward them. started in response to the church’s attempts to
One of the trademark symbols associated with remove material from a highly publicized inter-
Anonymous is the Guy Fawkes mask, which is a view with Scientologist Tom Cruise from the
stylized depiction of Guy Fawkes, the best-known Internet, claiming it was unfairly edited to mis-
member of the Gunpowder Plot, an attempt to represent the religion and was intended only
blow up the English Palace of Westminster, Lon- for current members of the church. On January
don, in 1605. The mask portrays a white face 21, 2008, Anonymous responded with a You-
with a subtle smile and red cheeks, a wide mous- Tube video, Message to Scientology, showing it
tache upturned at both ends, and a thin, vertically views the church’s actions as Internet censorship
pointed beard. In late 2006, stick-figure comics and asserting its intent to expel the church from
depicting a character bound to fail at everything the Internet. It stated, “We are Anonymous. We
started to appear on 4chan and became known are Legion. We do not forgive. We do not for-
as Epic Fail Guy (EPG). On September 30, 2006, get. Expect us.” Also, thousands of protesters
a thread was posted in which EPG found a Guy took to the streets in North America, Europe,
Fawkes mask similar to the one in the movie V for New Zealand, and Australia in front of Scien-
Vendetta. Thereafter, many EPG threads appeared tology churches. As part of Project Chanology,
depicting him with the mask. Anonymous’s many Anons sported Guy Fawkes masks to draw
58 Anonymous

attention to their identity as Anonymous as well people linked to their social networking profiles,
as visually telling Scientology it was an “epic fail.” thus exposing them to unwanted publicity and
Anonymous has since adopted the Guy Fawkes large levels of abuse. This explicit private mate-
character for its wider protests against authority. rial that had once been captured during intimate
In its initial years, Anons gathered in virtual moments appeared on Moore’s site as form of
space created by IRC, where they discussed tech- “revenge.” Though this Web site attracted a great
nology, politics, and activism, sometimes with a deal of attention, some salacious and mostly con-
dose of sexual banter and lulz, a play on LOL— demnatory, Moore trolled critics and rarely took
laugh out loud—that describes the thrill of mis- legal complaints seriously. After facing legal trou-
chievous and even nasty pranks. With high-profile ble he shut down Is Anyone Up, only to go bigger
campaigns centered on distributed denial of ser- and bolder with a new site, HunterMoore.tv, that
vice (DDoS) attacks that knock target Web sites not just published nude photos of private citizens
offline, Anonymous then transformed into an but also offered details of where they lived.
international movement that draws new recruits In reaction to this, Anonymous launched a cam-
by the thousands. Operation Payback was paign against Moore—to hold him accountable
launched in 2010, and one of its extensive, collec- and protect those victimized by this sort of cyber-
tive operations involved a series of DDoS attacks bullying. Using the method of doxing—getting
targeting companies that cancelled services to the information about an individual using the Inter-
whistle-blowing Web site WikiLeaks, including net and social engineering techniques—Moore’s
PayPal and MasterCard. personal information, such as Social Security
Today, Anonymous’s rapid rise to becoming number and home address, was published in a
a catalyst and nerve center for real-life revolu- Pastebin doc as part of #OpHuntHunter, an off-
tions has taken even some of its own members by shoot of the antibullying operation #OpAnti­Bully.
surprise. Tunisian Anons collaborated with their Anonymous initially launched #OpAnti­Bully
international counterparts on Operation Tunisia, as a response to the suicide of Amanda Todd, a
launched on January 2, 2011, well before most 16-year-old Canadian teen who took her life after
Western media outlets realized there was a revo- years of being bullied online.
lution underway in the Arab world. Anonymous Anonymous also took down HunterMoore.tv
launched a series of DDoS attacks against Tunisian via a denial-of-service attack; they hacked into
government Web sites. Additionally, Anonymous Moore’s servers and defaced the site. Additionally,
provided protesters with documents required to Anonymous published a second Pastebin doc that
take down the incumbent government and distrib- includes a link to Moore’s FTP site, which he uses
uted a care package, translated into Arabic and to upload files to HunterMoore.tv, and his login
French, offering cyberdissidents advice on how information. Anons also compromised Moore’s
to conceal their online identities to avoid detec- SoundCloud account and registered a premium
tion by the regime’s cyberpolice. They also aided product with his credit card information.
in passing information about the protests in and
out of the country. After Tunisia, Anonymous’s Criticism
interest in the wave of protest movements in other Anons have been called criminals and terrorists;
Arab world countries, such as Libya, Algeria, and many traditional activists have criticized Anony-
Egypt, did not wane. mous for its methods. Also, for Anons, personal
privacy is not always sacred, as the public pun-
Antibullying Efforts ishing of security firm HBGary in February 2012
In late 2012, Anonymous voiced support for vic- demonstrated. The firm’s Web site was defaced,
tims of nonconsensual pornography or “revenge and Chief Executive Officer Aaron Barr had his
porn.” Hunter Moore, considered a revenge porn social media accounts hijacked and personal infor-
entrepreneur, and dubbed “the most hated man mation leaked online, all in retribution for threat-
on the Internet” by Rolling Stone magazine, cre- ening to reveal the identity of leading Anons.
ated his now-defunct Web site, Is Anyone Up, Yet, there has never been, nor has a desire been
in 2009. It bared revealing photos and videos of expressed for a large-scale diabolical Anonymous
Antibullying Campaigns 59

operation. Rather, using tools of disruption and forcing the object of bullying into changing a spe-
spectacle, Anons may have unwittingly redefined cific behavior. When it migrates to the ubiquity of
civil disobedience for the digital age. In the elec- social media, bullying can have a political as well
tronic landscape that has exploded with largely as a social component. Research shows that those
unchecked intrusion and surveillance, many being bullied are more likely to skip school or
social media scholars and practitioners argue that avoid work, may find it difficult to concentrate on
Anonymous has made the case for “anonymity,” schoolwork or work-related tasks, are more likely
although many others maintain that the group to use drugs or alcohol, tend to have more physi-
may have outlived its useful function in bringing a cal health problems, have lower self-esteem, and
healthy dose of anarchy to the online political land- may even be likely to bully others when they feel
scape. In either event, the organization reminds they are in power. Many people tend to character-
the digital public, on a regular basis, of the need ize bullying as an intentional act, but many who
to revisit and perhaps reinvent the very concept of are enacting bullying behaviors do not realize that
“privacy” in the new media environment. they are bullying. Bullying is also social, and so
those who are not directly enacting the bullying
Soumia Bardhan behaviors do not realize that they are often per-
St. Cloud State University ceived as a negative part of the bullying experi-
ence, too. Unfortunately, if someone confronts a
See Also: Hacktivism; Instant Messengers, IRC bully’s behavior, then he or she risks being bullied
and ICQ; Meme Mapping; Pornography, Revenge; in retaliation.
Tunisia; WikiLeaks. As digital technologies have continued to allow
personal information to be spread to more people
Further Readings more quickly, perhaps not coincidentally, bullying
Coleman, Gabriella. “Everything You Know About behaviors have received increased attention from
Anonymous Is Wrong.” http://www.aljazeera.com/ traditional media outlets, concerned parents, edu-
indepth/opinion/2012/05/201255152158991826 cation administrators, and the public at large.
.html (Accessed October 2012). Given that social media may have allowed bul-
Coleman, Gabriella. “Our Weirdness Is Free, lying behaviors to be more prevalent and acces-
The Logic of Anonymous—Online Army, sible, it is appropriate that many social media
Agent of Chaos, and Seeker of Justice.” http:// campaigns have been formed to combat bully-
canopycanopycanopy.com/15/our_weirdness_is_ ing—usually bullying that is aimed at children
free (Accessed October 2012). or young adults. These campaigns often embrace
Morris, Alex. “Hunter Moore: The Most Hated Man multiple platforms including Facebook, Twitter,
on the Internet.” http://www.rollingstone.com YouTube, e-mail, and interactive Web sites. Even
/culture/news/the-most-hated-man-on-the-internet campaigns that are not facilitated through social
-20121113 (Accessed May 2013). media outlets often include social media aware-
Singel, Ryan. “War Breaks Out Between Hackers and ness and education as part of their aims.
Scientology—There Can Be Only One.” http://
www.wired.com/threatlevel/2008/01/anonymous Cyberbullying
-attac (Accessed October 2012). Many antibullying campaigns have given special
attention to cyberbullying, or bullying that hap-
pens through social media sites, via text messag-
ing, or even by means of specially created Web
sites. Cyberbullying has allowed bullying behav-
Antibullying iors to be more pervasive, as what was once
limited to face-to-face interaction with a bully
Campaigns or bullies is now less restrained as to when and
how the bullying can happen. In addition, digital
Bullying is the use of influence or power to technologies allow for messages to be sent more
degrade others, sometimes with the intent of quickly and for new forms of bullying to happen,
60 Antibullying Campaigns

such as the digital manipulation of a photo. Mes- personalities, including Kermit the Frog. Though
sages or images that were meant to be personal it originated in the United States, the campaign
can also be used by bullies to control or humiliate has found success in several countries on five dif-
an individual. ferent continents. The campaign seems to have
Once bullying behaviors are enacted online, inspired other campaigns that confront bullying
they also become more difficult to control. on a more general level, such as the Sears Team
Whereas teasing or taunting is somewhat ephem- Up to Stop Bullying Project and the I Choose
eral in nature, once a picture is distributed or a Anti-Bullying Campaign. Much like the It Gets
hateful remark posted in a public forum, it may Better Campaign, the projects use Web sites to
be impossible to stop the picture or message from provide information and educational resources to
being further distributed by others. Cyberbully- help confront bullying as well as personal stories
ing also has the potential to be anonymous, some- of being bullied.
thing that might make a bullied person feel inse-
cure and afraid, and something that may make Stopbullying.gov
it difficult for parents, authority figures, or law Another popular antibullying campaign is the
enforcement to intervene. Because it can be so dif- U.S. Department of Health and Human Services
ficult to confront bullying behaviors or to iden- platform stopbullying.gov. The Web site is espe-
tify those who are bullying, many antibullying cially aimed at the bullying of schoolchildren. In
campaigns have been aimed at understanding and characterizing bullying, it points to aggression,
prevention. Others have focused on providing power imbalance, and specific behaviors such
emotional support for victims of bullying. as threats, rumors, physical and verbal attacks,
and exclusion. It is careful to separate bullying
It Gets Better Campaign from behaviors such as stalking, hazing, or other
Probably the best known antibullying movement aggressive behaviors that may not necessarily
is the It Gets Better campaign. In response to a involve bullying. In addition to tips for interact-
large number of suicides related to young people ing with children, parents, teachers, and school
being bullied for being perceived as lesbian, gay, officials about bullying, the Web site also offers
bisexual, or transgender (LGBT), media personal- extensive considerations about preventing cyber-
ity Dan Savage and his husband, Terry Miller, cre- bullying behaviors.
ated the campaign in 2010. Initially, the campaign In particular, it suggests that parents be aware of
featured a YouTube video calling for LGBT indi- the Web sites their children visit and other online
viduals to share how their lives got better after they activities they engage in. It also warns that par-
left bullying environments. Within the first week ents should not avoid the social media platforms
of the campaign, more than 200 inspirational sto- and online domains that their children use, even
ries were posted in response. By the end of the sec- if they are not of interest. Having a sense of how
ond week, the YouTube channel associated with such Web sites or platforms work and what they
the campaign reached its 650-video limit. Soon, contain or facilitate can help a parent to contex-
a Web site was created, the It Gets Better Project, tualize any talk about interaction that may take
which eventually hosted 30,000 entries from indi- place via the outlets. The campaign also suggests
viduals with a variety of backgrounds and across that parents ask their children for any online pass-
diverse genders and sexual orientations (including words, promising to use them only in an emer-
individuals who identified as straight). gency. Parents are also encouraged to friend their
More than 40 million viewers have watched It children on Facebook and to follow them on Twit-
Gets Better videos, and the Web site received the ter so they know what kinds of online behaviors
Academy of Television Arts and Sciences Gover- are happening. Some children fear that, if their
nor’s Award at the Creative Arts Emmy Awards parents know about others cyberbullying, their
ceremony in 2011 in honor of the campaign’s use parents will become upset and take away online
of media to educate and inspire others. President or mobile device privileges even if the children are
Barack Obama created a video for the site, as not directly involved. Parents are encouraged by
have a variety of other politicians, celebrities, and the stopbullying.org campaign to tell their children
Antibullying Campaigns 61

that they always want to know when someone is Although social media campaigns to prevent
being bullied and that they will not take away any or correct bullying situations at work are not as
privileges if such behavior occurs. widely known as those that are aimed at helping
youths, many options are available. For example,
Born This Way Foundation the Workplace Bullying Institute offers a Facebook
In addition to celebrities contributing to antibul- page, interactive blog, and Web site to help indi-
lying movements through videos or promotional viduals (both employers and employees) navigate
appearances, some have made more enduring con- bullying situations. The Facebook page allows
tributions. Perhaps the most notable of these is users to post educational videos about identifying
the Born This Way Foundation (BTWF). Founded and dealing with bullying, inspirational quotes
in 2011 by popular musician Lady Gaga and her or graphics that encourage people to keep posi-
mother, Cynthia Germanotta, the organization tive attitudes if they are being bullied, and links
has a mission of inspiring youth and building sup- to other resources about bullying. The Facebook
portive communities. The title of the organization page also provides information about the devel-
coincides with the title track of Gaga’s Born This opment of antibullying laws in workplaces and
Way, an anthem that encourages individuals to allows participants a space to tell their individual
accept and celebrate their diversity. BTWF is a stories. The interactive blog provides news stories
partnership with the Berkman Center for Internet and opinion pieces, sometimes illustrated with
and Society at Harvard University, the California YouTube videos or enhanced by links, to further
Endowment, and the John D. and Catherine T. information, and users can respond to the blog
MacArthur Foundation. It was also established posts and discuss them with each other.
with the help of media personality Oprah Win-
frey. Although helping the bullied is a big part Effect
of its mission, the Web site and accompanying Although antibullying campaigns have been effec-
social media features are also used to boost the tive at raising awareness about bullying and helping
self-esteem of potential bullies so as to minimize individuals to respond to bullying behaviors, crit-
the need to judge or pick on others and to encour- ics have warned that antibullying campaigns tend
age general acceptance. The organization has to deal with proactive bullying, or bullying that
won awards including the LennonOno Grant for is premeditated and intentional, rather than reac-
Peace from Yoko Ono, demonstrating again its tive bullying, or the kinds of bullying that emerge
widespread support. out of heated interactions. Specifically, individuals
might be taught that bullying is wrong and warned
Rankism and Workplace Bullying against picking on others or trying to make oth-
While the It Gets Better, stopbullying.org, and ers feel bad about themselves, but such teachings
Born This Way campaigns work to stop bullying do not necessarily recognize that, when someone
aimed at children, teenagers, and traditional col- is interacting with others and not getting what he
lege-aged students, other campaigns offer support or she wants, more temporary bullying behavior
and interaction specifically for adults. Although may emerge until he or she is satisfied. Because this
social bullying is something that may happen to an kind of bullying is more of the moment, it may be
adult, many times the bullying that occurs will be harder to recognize and correct.
as part of his or her work life. Sometimes, this bul- Antibullying campaigns enacted through digi-
lying happens from a superior in a work situation. tal platforms have been particularly effective at
This is often referred to as rankism, or an indi- moving the focus of bullying from punishment
vidual using superior rank to manipulate, punish, to prevention, even if there is much work to be
or humiliate someone. When peers in a work envi- done. Being caught in a moment of bullying can
ronment bully each other, that is often referred to be awkward and humiliating, whether one is
as workplace bullying. Many times, this bullying being bullied or observing it. Antibullying cam-
happens when an individual feels as if he or she is paigns have instilled a stronger sense that what is
being blocked from a professional goal, although happening should not be the norm and that bul-
it may happen for other reasons as well. lying behavior is wrong. In addition to sensitizing
62 Antislavery Campaign and Social Media

people toward recognizing the behavior, antibul- are forced into agricultural fieldwork, mining, the
lying campaigns also help individuals to develop production of over 100 everyday consumption
empathic skills to consider how others may feel in items, or sex trade. As Kevin Bales states, they are
bullying interactions. Even when watching videos “disposable people,” who are bought and sold,
such as those in the It Gets Better Project, where exploited and coerced, often subject to brutality
individuals being bullied are encouraged not to and violence, and paid little to nothing for their
take their own lives and to look forward to a servitude. Given the magnitude of the problem, in
brighter future, viewers of the videos will likely the past several decades numerous organizations
come to see those who are targets of bullying as and individuals have been engaged in antislavery
feeling human beings. Unfortunately, antibullying and antitrafficking campaigns intended to raise
campaigns have yet to develop effective ways of awareness and identify solutions. The Internet
correcting bullying that go beyond punishment of and more recently social media have been instru-
the bullying individuals. That limitation is not so mental in such campaigns.
much a result of ineffective campaigns but rather An array of scholars and activists have high-
a lack of development of research regarding how lighted that, unlike antiquated versions of slavery
bullying interactions can be prevented. that entailed legal ownership of humans recognized
by certain governments, the contemporary variant
Jimmie Manning of slavery is deemed illegal by governments world-
Northern Illinois University wide that no longer permit one individual to claim
ownership over another. This legal framework that
See Also: Anonymous; Berkman Center; Born criminalizes slavery is grounded in fundamental
This Way Foundation; Lesbian, Gay, Bisexual, and human rights principles, yet in the lack of a viable
Transgender Rights; Rumors; Social Media, Adoption set of practices to reinforce the principles it benefits
of; Youth Engagement. slaveholders rather than slaves. Without legal rec-
ognition and government oversight, slaves remain
Further Readings as much outside of the rule of law as slaveholders,
Kowlawski, Robin M., Susan P. Limber, and Patricia and thus the precarity of their livelihoods and the
W. Agatston. Cyberbullying: Bullying in the Digital threat against their lives increase, whereas the pos-
Age. Malden, MA: Blackwell, 2007. sibility of tracing them and the capacity to offer
Prinstein, Mitch. “Why Current Bullying Campaigns help to them decrease.
Will Be Unsuccessful, But Could Be Improved.” Because of such circumstances, present-day slaves
Psychology Today: The Modern Teen. http://www are often hidden in plain sight. Emma Thompson
.psychologytoday.com/blog/the-modern-teen became involved in the antislavery cause after she
/201103/why-current-anti-bullying-campaigns found out that a young woman named Elena had
-will-be-unsuccessful-could-be-improv (Accessed been held as a sex slave in a massage parlor a few
December 2011). blocks away from the actress’s residence in Lon-
Savage, Dan and Terry Miller. It Gets Better: Coming don. Elena was smuggled from Lithuania into Eng-
Out, Overcoming Bullying, and Creating a Life land with the promise of a service job, but instead
Worth Living. New York: Dutton, 2012. she was sold to sex traffickers and forced to serve
20 to 30 clients a day. Many slaves are held in loca-
tions as visible as the one where Elena was held yet
remain as invisible as Elena was. They are often
women and children, and often migrants, and they
Antislavery Campaign become slaves because they are given away by a
spouse or a parent for money, are lured with prom-
and Social Media ises of a better life, or are kidnapped.

There are an estimated 27 million slaves around the Antislavery Groups


globe, many of them victims of human trafficking National authorities are primarily in charge of pro-
within national borders or internationally. They tecting the human rights of their residents; however,
Antislavery Campaign and Social Media 63

the global nature of contemporary slavery and the entities and resources for antislavery advocates.
previously described legality issues leave many The Web sites and Facebook pages of other global
governments incapacitated in this regard, whereas antislavery groups such as Anti-Slavery Interna-
red tape and corruption within many governments tional and The No Project add research support
on all continents only add to the problem. Under and artistic expression to the efforts against slav-
these circumstances, the involvement of interna- ery. A well organized Web site, containing action
tional bodies as well as of grassroots groups is key tools, an activist map, and a resource library, as
for endeavors against slavery. well as a strong presence on Facebook and Twit-
In 2007, the Global Initiative to Fight Human ter, are contributing to the success of another
Trafficking (GIFT) was launched by a partner- growing global antitrafficking coalition, Stop the
ship formed of the International Labor Organiza- Traffik, which tries to involve businesses, chari-
tion (ILO), the Office of the United Nations High ties, faith groups, schools, universities, and com-
Commissioner for Human Rights (OHCHR), munity groups in the attempt to combat contem-
the United Nations Children’s Fund (UNICEF), porary slavery. The Products of Slavery Web site
the United Nations Office on Drugs and Crime offers an interactive map, locating items produced
(UNODC), the International Organization for through forced labor and outlining statistical data
Migration (IOM), and the Organization for Secu- related to these items, as well as a shopping hub,
rity and Cooperation in Europe (OSCE). This ini- sharing opportunities to purchase products that
tiative strives to create a multistakeholder strat- have not been made by using forced labor. The
egy, which builds on national efforts throughout Teens on Trafficking Web site is aimed at educat-
the world, by means of providing technical assis- ing teens about the dangers of becoming enslaved
tance and promoting effective responses. by means of Internet safety tips, movie and link
Additionally, advocacy groups such as the lists, and testimonies from teens, as well as by
U.S.-based Alliance to End Slavery & Traffick- encouraging teens to take a stand against slavery.
ing (ATEST) or the United Kingdom–based Helen The Free the Slaves (fts) blog comprises an array
Bamber Foundation, and political and artistic of documents including rescued slave stories, pol-
personalities from Hillary Clinton and Barack icy proposals, and information about antislavery
Obama to Angelina Jolie and Ricky Martin, have actions and tools.
generated and supported antislavery and antitraf- The antislavery interactive art exhibit in New
ficking discourses and activities. For example, York titled The Journey, cocurated by Emma
ATEST has sponsored a Modern Day Slavery Thompson, as well as the antislavery concept
Museum, a mobile exhibition that allows visitors music album Just Enough for the Real World, co-
to interact with the reality of slavery in the Florida produced by Emma Thompson, were made widely
tomato industry, and the Helen Bamber Founda- known through various Web sites, the fts blog, and
tion has sponsored the Everyday Project, a live several powerful public service announcements
broadcasting of musician Phil Knight’s two weeks featuring the actress and posted on YouTube. Phil
of solitary confinement inside an iron-clad ship- Knight’s solitary confinement also turned from a
ping container that resembles those in which many local event into an international one through live
slaves are transported. Celebrity power has helped video streaming on the Just Enough for the Real
reinforce appeals to citizens and civic groups to be World Web site.
mindful of the existence of contemporary slavery The Internet and social media can provide not
and to join the cause of stopping slavery. only opportunities for international organizations
and national bodies to coordinate their actions
Social Media against slavery and trafficking, but also for regu-
New technologies and new media have been lar people to contribute their capabilities to fight
important aides for such initiatives and activities, these problems. In an article published in The
which have been publicized through Web sites Judges’ Journal in 2013, Judge Herbert B. Dixon,
and blogs and more recently through social media Jr., shares a case in which crowdsourcing through
such as Facebook and Twitter. The Web sites social media networks functioned as a technique of
of GIFT and ATEST provide visibility to these rescuing people under threat of becoming slaves. In
64 Antiwar Protesting

2010, an antislavery activist was made aware that Bales, Kevin. Ending Slavery: How We Free
two women from Russia traveled to the United Today’s Slaves. Berkeley: University of California
States after one of them had paid approximately Press, 2007.
$3,000 to an exchange program for a promised Brysk, Alison and Austin Choi-Fitzpatrick, eds. From
job in Washington, D.C. The activist learned that Human Trafficking to Human Rights: Reframing
the exchange program contact changed the details Contemporary Slavery. Philadelphia: University of
and directed the women to travel to New York for Pennsylvania Press, 2011.
work as hostesses at a lounge. Cunneen, Mary. “Anti-Slavery International.” Journal
The activist suspected the two women were of Global Ethics, v.1/1 (2005).
being lured into a human trafficking operation, Dixon, Herbets B., Jr. “Human Trafficking and the
but as he was unable to convince them not to travel Internet* (*and Other Technologies, Too).” The
to New York he posted an online plea to an anti- Judges’ Journal (2013). http://www.americanbar
slavery discussion group describing the situation .org/publications/judges_journal/2013/winter/
and asking for help. Within minutes, discussion human_trafficking_and_internet_and_other_
group members offered information and support, technologies_too.html (Accessed May 2013).
called human-trafficking hotlines and the Russian Kara, Siddharth. Sex Trafficking: Inside the Business
embassy in Washington, D.C., offered places for of Modern Slavery. New York: Columbia
the women to stay, researched the travel agency University Press, 2009.
and the lounge where the women were promised Miers, Suzanne. Slavery in the Twentieth Century:
work, and volunteered to meet them at the bus The Evolution of a Global Problem. Lanham, MD:
depot. One member of the discussion group met AltaMira Press, 2003.
the women at the bus depot in New York and ulti- Parrot, Andrea and Nina Cummings. Sexual
mately succeeded in convincing them to not meet Enslavement of Girls and Women Worldwide.
the exchange program contact. Westport, CT: Praeger, 2008.
As Judge Herbert B. Dixon, Jr., asserts, such Quirk, Joel. “The Anti-Slavery Project: Linking the
a massive mobilization of non–law enforcement Historical and Contemporary.” Human Rights
and nonmilitary personnel in numerous locations Quarterly, v.28/3 (2006).
in such a short interval to assist and protect these Scarpa, Silvia. Trafficking in Human Beings: Modern
two traveling women would have been impossible Slavery. New York: Oxford University Press, 2008.
without the Internet and access to an online dis- Smith, Heather M. “Sex Trafficking: Trends,
cussion group. In this case and in similar cases, Challenges, and the Limitations of International
the Internet and social media can foster alliances Law.” Human Rights Review, v.12 (2011).
between individuals and groups interested in
making slavery truly a thing of the past.

Sorin Nastasia
Southern Illinois University Edwardsville Antiwar Protesting
See Also: Activists and Activism, Digital; Antiwar protesting is any form of expressed
Campaigns, Digital; Campaigns, Virtual; opposition to a state’s explicit declaration of war
Crowdsourcing; Economic and Social Justice; Human or threat of impending war. Protests can include
Rights; Lobbyists; Social Media, Adoption of. tactics ranging from public education and debate
to sabotage, assassination, and self-immolation,
Further Readings as well as conventional political activity such as
Antislavery.org “Today’s Fight for Tomorrow’s direct action and civil disobedience. Marches and
Freedom.” http://www.antislavery.org (Accessed protests have become one of the major forms of
May 2013). antiwar protesting because they provide a dem-
Bales, Kevin. Disposable People: New Slavery in onstration of the social movement’s legitimacy,
the Global Economy. Berkeley: University of unity, size, and commitment. Additionally, they
California Press, 2004. create an oppositional consciousness and solidify
Antiwar Protesting 65

activist identities through the creation of an “us- for peace instead of registering for military service.
versus-them” mentality. This era of antiwar sentiment also saw the rise of
the America First Committee, an antiwar organiza-
History tion that had the largest registered membership ever
Antiwar protesting is a separate phenomenon in the United States. Where the antiwar protests
from the larger “peace movements,” which have during World War I had a global focus of creating
a more expansive goal of ending war in general peace between international entities, the U.S. anti-
and promoting world peace. Antiwar protesting war movement between the world wars attempted
has its roots in historic peace churches such as to foster an isolationist attitude, advocating peace
the Quakers, the Church of the Brethren, and while also advocating noninterventionist policies.
the Mennonites, which advocated peace as part Once the United States entered World War II,
of a larger faith-based platform. In the United vocal opposition to war declined though it was
States and Britain, the antiwar position began not erased entirely. With the dropping of the
to grow between the War of 1812 and the Civil atomic bomb, antiwar discourse began to focus
War, resulting in many propeace publications dur- on how to deal with nuclear weapons. Antiwar
ing this time, as well as speakers and politicians groups were not explicitly against nuclear weap-
publicly advocating abstention from war. Several ons: they instead advocated public education pro-
riots also occurred in response to Abraham Lin- grams. There was little agreement as to what type
coln’s attempt to draft citizens to fight in the war. of policy should be put in place to deal with these
With the dawn of the 20th century and the weapons. Some groups argued for disarmament,
impending World War I, a growing antiwar senti- others for an international system for controlling
ment in the United States began to manifest itself. the weapons, and still others wanted two super-
Started by groups such as the U.S. Fellowship powers to control the weapons.
of Reconciliation (FOR) and later spearheaded Protests at this point took place through pub-
by the Socialist Party of America, led by Eugene lic discourse and education programs, as well
Debs, the antiwar protests in the United States as individuals as a part of the system provid-
took place both through public media channels ing some pushback. Scientists working on the
and through direct action. Socialists banded bomb attempted to share technical information
together with labor activists and anarchists to with their allies to reduce the threat of a single
spur protests and riots opposing the war, claim- nation wielding the weapon for its own purposes.
ing that the war was an affront to the “working- Other activists such as United World Federalist
man,” who was being used to protect the interests cofounder Cord Meyer, Jr., even went so far as to
of wealthy manufacturers. join the CIA in an attempt to promote peace from
The anti–World War I sentiment also saw the within. All of these protests, however, met with
beginnings of the conception of antiwar protests as opposition in the form of a growing Cold War
part of a global movement. Where previous anti- and McCarthyist fear of security and any form of
war protests would take the form of appeals to the action that could be taken as “anti-American.”
host state, protests against World War I took place At the end of the Korean War and the sub-
across international borders. FOR was one group to sequent censure of Senator Joseph McCarthy,
begin this process, sending delegates to other coun- a space for debate opened up and government
tries and meeting with other antiwar advocates to policies could be questioned much more easily.
promote peaceful relations. Likewise, the Socialist Appeals to the U.S. government came not only
Party saw the workingman on each side of the con- internally, but also through international channels
flict as part of the same system of oppression. such as marches staged by the British Campaign
After World War I, groups such as the Wom- for Nuclear Disarmament and statements by
en’s Peace Union (WPU) protested war within the Pope Pius XII, Jawarharlal Nehru, and the Brit-
governmental system, lobbying Congress to out- ish Labor Party. Public demonstrations, education
law war, and organizing antiwar demonstrations, campaigns, and civil disobedience culminated in
marches, and meetings. Other groups like the War government officials investigating the possibilities
Resisters League encouraged people to “register” of a ban on testing nuclear weapons.
66 Antiwar Protesting

Once the Test Ban Treaty was ratified in 1963,


the focus on regulating nuclear arms began to
shift. As U.S. involvement—and the resulting
media images of deployed troops and casualties—
in Vietnam in the 1960s increased, so did antiwar
sentiment. College campuses began as a locus of
this sentiment, housing the vehemently antiwar
Students for a Democratic Society (SDS). SDS
began by mobilizing college students and advo-
cating tactics of civil disobedience. This included
draft-oriented methods of protest: refusing to reg-
ister for the draft, burning draft cards, or fleeing
the country to avoid the draft. More radical meth-
ods that often included violence, such as attacks
on selective service centers to disrupt drafting,
were also carried out. Additionally, SDS orga-
nized massive teach-ins and protests that would
rally large numbers of people.
The protests against Vietnam proved to have
more of an effect on policy than many previous
protests. By creating a coherent and visible oppo-
sition to the war while simultaneously engaging Antiwar protests in the United States diminished after President
in actions that increased the cost and difficulty of Barack Obama’s 2008 election, but still occur. The se protesters
recruiting people to fight the war, the protests help wore the Guy Fawkes masks of the Anonymous group at an
draw attention to U.S. foreign policy. Eventually antiwar rally in New York City on April 9, 2011.
this scrutiny led to the withdrawal of troops; it
also resulted in “Vietnam syndrome,” political
and public discourse emphasizing a less interven-
tionist foreign policy and more widespread accep- widespread demonstrations, the George H. W.
tance of peaceful means of negotiating in place Bush administration carried out the war in a way
of war. When the Vietnam War ended in 1975, that did not appear unilateral by bringing in Euro-
active protests began to dissipate, but the move- pean allies, as well as using a large-scale deploy-
ment left behind many groups that could be easily ment of troops to minimize U.S. casualties and
mobilized when necessary. make the war as brief as possible. Where Viet-
At the outbreak of the first Persian Gulf War as nam resulted in prolonged engagement and, con-
a response to Iraq’s invasion of Kuwait in 1990, sequently, allowed time for antiwar sentiment to
groups left over from the Vietnam era mobilized grow and manifest through demonstrations and
to articulate an antiwar response. Because of this actions, the actual full-scale war part of the Persian
networked system between activist groups, dem- Gulf War was conducted in little over a month, not
onstrations on both the local and national lev- giving the antiwar movement enough time to gen-
els were organized before forces were deployed. erate widespread opposition.
Where previous protests had been largely in The next decade saw a continued decline
response to military operations already in place in antiwar protests but, as with the end of the
and a current or inevitable war, the protests Vietnam War, activist groups continued to oper-
against the Persian Gulf War were pre-emptive ate and exist within a network that allowed
and sought to defer full-scale military action in large-scale demonstrations and actions to be put
favor of economic sanctions. together quickly. The threat of military action by
Lessons from the Vietnam War protests were the United States in Afghanistan proved to be the
also put into practice by the government. In antici- catalyst that pulled together these networks in
pation of the mobilization of activist groups and expressions of coordinated action.
Antiwar Protesting 67

Afghanistan and Iraq protests began to show the emergence of a global


As with the Persian Gulf War, demonstrations consciousness and an appeal to a sense of belong-
against the Afghanistan War began to occur ing to a global community that possesses funda-
before the U.S. military actually invaded Afghan- mental rights and suffers common injustices.
istan. The protests were “antiwar” in the sense
that they advocated the use of nonviolent means New Technology and Social Media
of negotiation, rather than opposing a current In opposition to both the Afghanistan War and
war. Protests against the Afghanistan War proved the Iraq War, new technologies allowed for an ease
to be much smaller than those of Vietnam and of organization unparalleled in previous spikes in
were quickly put down in the presence of both antiwar protests. The Internet has broadened the
domestic and international support for the war reach of communications, allowing international
stemming from the September 11, 2001, attacks organization to take place more easily and for
on the World Trade Center. Additionally, the anti- more politically empowered groups to reach out to
war movement did not have many allies in top- less developed groups in other countries. Addition-
tier political positions and there were no appar- ally, the Internet and the World Wide Web have
ent political divisions that could be exploited over allowed groups to disseminate information and
whether or not to go to war. create a political structure focused on grassroots
Though the antiwar protests surrounding the activism and identification with a global sense of
Afghanistan War were brief, actions in opposition justice that has multiple and flexible interpreta-
to the Iraq War were more widespread due to a tions, where previous activist organizations have
more questionable reasoning for military action. had to rely on tapping into potential participants’
These protests, along with others that occurred identification with class struggles and issues.
before and during the invasion of Iraq, did not Contemporary networks of communication
explicitly prevent or shorten the war. They were, have also allowed protests to include the shar-
however, able to put pressure on the governments ing of stories and information from the soldiers
involved in waging the war so that they became themselves. Though not the politically tied allies
politically cautious. of before the 21st century, these soldiers have pro-
The actions against the Iraq War also saw an vided a weight and legitimacy to activist groups
increase in global coordination between activist and have articulated an antiwar position rooted
groups. Protests were not only organized along in firsthand experience. Moreover, by bringing
regional and national levels, but also on interna- the soldiers themselves into the collective identity
tional levels. International protests for U.S.-led of antiwar protesters, family members and other
wars had occurred previously, but the Iraq War traditionally prowar but nonmilitary individuals
protests were unique in that they created large- are also brought into the fold.
scale, simultaneous actions around the globe. Feb- The incorporation of technology into protest
ruary 15, 2003, saw the largest protest in history, has also been criticized as creating isolated groups
a synchronized demonstration that took place in that encourage pre-existing ideas rather than
over 600 cities and 60 countries in the face of an bringing in new members. Listservs and message
impending invasion of Iraq, which would occur a boards have the dual danger of attracting only
month later on March 20, 2003. Millions of peo- individuals who already agree with the positions
ple were involved and some of the largest num- advocated and of creating a system that installs
bers came from European cities, though they were new forms of control through moderators and
protesting an American war. list managers who can censor undesirable opin-
The Afghanistan War protests found a new ions. This results in the closing down of a public
articulation of how protesters identified them- space for debate. It has also led to “slacktivism”
selves as part of a global consciousness. Where whereby individuals can share information via
pre-Vietnam protests focused on whether the social media instead of participating in demon-
United States should pursue isolationist policies strations and marches.
and Vietnam-era protests focused on the draft Even with the possibility of congealing pre-
and U.S. foreign policy, the Afghanistan War existing, radical opinion, the scope of potential
68 Apple v. Does

antiwar protest participants did expand during to Social Movements, David A. Snow, Sarah A.
this period. Where Vietnam-era protests were pri- Soule, and Hanspeter Kriesi, eds. Malden, MA:
marily led by the radical left and student organi- Blackwell Publishing, 2007.
zations in the United States, protests of the early
21st century have attempted to appeal to people
with diverse cultural, ethnic, and national back-
grounds, as well as members of mainstream soci-
ety who were not particularly politically radical. Apple v. Does
This has resulted in protests gaining more cred-
ibility, legitimacy, and support than many pre- Apple v. Does (O’Grady et al. v. Superior Court,
21st-century protests. May 2006) was a California Court of Appeal case
With the election of Barack Obama in 2008, that dealt with the scope of journalistic shield laws
antiwar protests have begun to subside. Specula- and whether those laws applied to “online” jour-
tion as to the cause of this is varied. Some believe nalists involved in the unauthorized disclosure of
that the perception of Obama as a liberal have corporate trade secrets. The appellate court, revers-
overshadowed the reality of his prowar stance. ing the decision of a Santa Clara County Superior
Others have posited that the lack of a draft Court trial judge, held that trade secrets do not fall
has caused the war to be felt less in the United outside the protections of the First Amendment,
States and other countries, failing to spur the that there is no substantive distinction under the
same response that Vietnam did. Still others have First Amendment between print and Internet jour-
pointed to the large amount of money that the nalism, and that Apple’s attempt to subpoena the
defense industry pours into various communities identities of the journalists’ sources violated the
through government contracts as a reason why Stored Communications Act.
people are reluctant to speak out against the war. The petitioner, Jason O’Grady, owned and oper-
In each case, direct action and marches have gone ated “O’Grady’s PowerPage,” which was described
by the wayside, but the activist networks and as an “online news magazine” that focused on
global connections fostered in recent years have information about Apple computer products.
held, and protest in the form of written and spo- O’Grady, along with the unidentified publisher of
ken criticism has not disappeared. Apple Insider, another Apple online news maga-
zine, published a number of articles in 2004 about
Todd Woodlan an upcoming Apple product release called Asteroid
Val Hartouni or Q97. The new item was a FireWire breakout
University of California, San Diego box for GarageBand that allowed users to pro-
duce digital audio recordings. The articles included
See Also: Activists and Activism, Digital; Cloud diagrams of the device and details about its func-
Protesting; Conflict Resolution, Social Media and; tionality. The articles were published under pseud-
Documentaries, Social Media, and Social Change; onyms by several different authors.
Human Rights; Lobbyists; MoveOn.org. Apple filed a complaint against the unidenti-
fied Web authors, claiming that they had illegally
Further Readings published classified trade secrets without Apple’s
Carty, Victoria and Jake Onyett. “Protest, authorization. According to Apple’s attorneys, the
Cyberactivism and New Social Movements: The descriptions and diagrams of the new product were
Reemergence of the Peace Movement Post 9/11.” very similar to internal presentation files at Apple,
Social Movement Studies: Journal of Social, with the exception that the statement “Apple Need
Cultural and Political Protest, v.5/3 (2006). to Know Confidential” had been removed. Apple
Gitlin, Todd. The Whole World Is Watching: Mass also sought subpoenas to compel the publishers to
Media in the Making and Unmaking of the New disclose the names of the individuals who had pro-
Left. Berkeley: University of California Press, 1980. vided the unauthorized information.
Marullo, Sam and David S. Meyer. “Antiwar and O’Grady and the other petitioners responded
Peace Movements.” In The Blackwell Companion by seeking a protective order against Apple’s
Apple v. Does 69

discovery. They argued that the identities of the mean that the businesses’ rights or property were
sources were protected under the California Con- being threatened. Moreover, the language of the
stitution’s reporter’s shield, that the sources were statute made clear that the judgment about the
further safeguarded under the First Amendment’s threat to rights or property rested with the busi-
protection of reporter’s privilege, and that the nesses, not with Apple. The Internet providers
sources could not be disclosed without violating could request that the exemption be invoked, but
the Stored Communications Act. Apple’s attor- Apple could not impose the exemption on them.
neys responded that reporter’s privilege did not If the Internet providers believed that the exemp-
apply to trade secret infringement and that the tion did not apply, then they needed to comply
California reporter’s shield was not applicable to with the language of the act and protect the iden-
requests for discovery or to anonymous speech on tities of sources of communication.
Internet Web sites, which did not constitute jour- The Court of Appeals next turned to the appli-
nalism. The trial court found in Apple’s favor and cability of the California Reporter’s Shield. The
denied the petitioners a protective order. O’Grady California Constitution stated that
and the others then appealed to the California
Court of Appeals. . . . a publisher, editor, reporter, or other person
connected with or employed upon a newspa-
Appeal per, magazine, or other periodical publication
In reversing the decision of the trial court, the . . . shall not be adjudged in contempt . . . for
Court of Appeal began its decision with a review refusing to disclose the source of any informa-
of the Stored Communications Act (SCA). Accord- tion procured while so connected or employed
ing to the Act, for publication in a newspaper, magazine or
other periodical publication.
. . . a person or entity providing an electronic
communication service to the public shall not According to Apple, the petitioners failed to meet
knowingly divulge to any person or entity the the conditions of the shield because they were
contents of a communication while in elec- not engaged in “legitimate journalism or news.”
tronic storage by that service. Internet Web sites did not fall under the language
of “newspaper, magazine, or other periodical”
The SCA, however, contained exemptions that and, even if they did, what O’Grady and the oth-
could be applicable to the case. One of these ers were doing was not journalism but trade secret
exemptions was that disclosure was authorized and copyright infringement.
to protect the rights or property of the service Taking a different view of the reporter’s shield,
provider. According to Apple, the noncompliance the Court of Appeal held that it was impossible
with the subpoenas would subject the service for a judicial body to determine what consti-
providers to legal action by Apple, which repre- tuted “legitimate” and “illegitimate” journalism
sented a threat to the providers’ rights and prop- without endangering the protections of the First
erty. Compliance would, therefore, be the only Amendment. Print reporters, for instance, regu-
way of ensuring that their rights and property larly include verbatim documents in their report-
were safeguarded. ing, yet this does not exclude them from legal
The Court of Appeal rejected Apple’s argu- protection. Following this reasoning, the Court of
ment. Noting that the failure to comply with the Appeal held that there is no reasonable distinc-
subpoenas could incur costs to the service provid- tion between the publication of such a document
ers, this did not constitute a substantive threat to in a newspaper versus posting it on an Internet
either rights or property. As businesses, the service Web site. Apple also failed to state any compel-
providers were perfectly free to choose whether ling reason why Internet publications should be
they wanted to undertake action that either excluded from the reporter’s shield. Many print
increased or avoided such costs, choices that busi- magazines, in fact, are now offering electronic
nesses must make every day. The fact that pend- versions of their publications, yet few would con-
ing legal action necessitated such a choice did not tend that the publication being online invalidates
70 Arab Spring

its journalistic nature. Therefore, the fact that and reporters of Internet media. The decision was
“new media” was not included in the specific lan- also significant in that the Court of Appeal was
guage of the shield did not mean that the shield’s willing to equate electronic forms of journalism
intention was not applicable to digital magazines with more traditional forms and held that the
and Internet publications. Since the intention of First Amendment applied equally to both.
the shield was to protect reporters in the gath- At the same time, the case revealed the difficul-
ering of information, it made little difference to ties in protecting intellectual property rights in
the Court of Appeal that the mode of publication the electronic age and the Court of Appeal’s rul-
was not specifically covered in the language of the ing will make that effort even more challenging.
California Constitution. The decision also evaded, rather than resolved,
Finally, the Court of Appeal addressed the the thorny issue of whether every individual who
petitioners’ claim that the First Amendment pro- posts information to a Web site should be consid-
vided broad protection of the identities of con- ered a “journalist” subject to First Amendment
fidential sources who divulge information to protections or whether lines of distinction need
reporters. Here, the Court of Appeal relied on a to be drawn to clarify the legal definition of an
balancing test established in Mitchell v. Superior Internet news publication and a journalist. These
Court. Mitchell recognized a qualified privilege and other issues will continue to challenge the
for reporters, editors, and publishers to withhold legal system and society as social media contin-
the identity of confidential sources, though this ues to expand.
privilege had to be weighed against factors such
as the nature of the litigation and the exhaus- Eric C. Sands
tion of alternative remedies. Applying the Mitch- Kaitlyn E. Pettet
ell criteria, the Court of Appeal ruled that the Berry College
qualified journalistic privilege was upheld in the
case because none of Mitchell’s exceptions were See Also: Blogger Rights and Responsibilities; Blogs;
deemed applicable. Apple, for instance, had not Citizen Journalism; Evolution of Social Media; News
exhausted all the means at its disposal to com- Media; Press Freedom and Online/Social Media
pel its own employees to reveal their role in the Security.
unauthorized disclosures since it had not forced
any of them to testify under oath about the leaks. Further Readings
As such, the potential threat to First Amendment Mitchell v. Superior Court 37 Cal.3d 268 (1984).
protections of journalistic sources outweighed http://scocal.stanford.edu/opinion/mitchell-v
Apple’s interests in discovering the identities of -superior-court-30726 (Accessed May 2013).
those sources. O’Grady et al. v. Superior Court (Apple v. Does)
139 Cal.App.4th 1423 (2006). http://www
Significance .internetlibrary.com/pdf/OGrady-Apple-Cal
Apple faced a great deal of criticism over the law- -Crt-App.pdf (Accessed May 2013).
suit, which perhaps explains why the decision was Samson, Martin. “O’Grady v. Superior Court.”
not appealed further. It should also be noted that http://www.internetlibrary.com/cases/lib_case430
the decision by the California Court of Appeal .cfm (Accessed May 2013).
did not apply to courts outside the state of Cali-
fornia, though courts in other states could look
to the decision for guidance in their own rulings.
The case did, however, establish some important
precedents in the development of First Amend- Arab Spring
ment law and its applicability to social media.
The California Court of Appeals refusal to dis- In the uprisings that began in late 2010 in Tuni-
tinguish between legitimate and illegitimate forms sia and swept across several countries in north
of journalism broadened the legal protections of Africa and the Middle East, social media played
print journalism to include publishers, editors, a significant—yet hotly debated—role. Platforms
Arab Spring 71

such as Facebook and Twitter were used early on Facebook—which sparked street protests during
by activists both to organize demonstrations and a previous government attempt to block the site—
to disseminate information outside of their coun- remained accessible. Though the site was already
tries’ borders. Social media were also utilized in fairly popular in the country, low data packages
some countries by governments seeking to crack introduced in 2009 enabled Tunisians to access
down on online activism. Facebook from mobile phones at low rates. Face-
Blogging and social media were already popular book therefore quickly became a central platform
across the Arab region, and in some countries— for sharing photos, videos, and written content.
including Tunisia, Egypt, and Syria—online activ- The Tunisian government had been monitoring
ism was already a phenomenon going back half online activity using sophisticated methods such as
a decade or more, with activist networks already deep packet inspection (DPI) for years but, in the
in place. In other countries, such as Libya, low wake of the protests, sought out new techniques
Internet penetration rates meant that social media for intimidating online activists. In January 2011,
were relatively unused for activism prior to the the government perpetrated a man-in-the-middle
2011 uprising. attack by creating a fake Facebook login page
and redirecting the site’s uniform resource loca-
Tunisia tor (URL) to that page. This resulted in Tunisians
In the final weeks of 2010, Tunisians took to the attempting to access Facebook accidentally hand-
streets in protests inspired by the self-immola- ing their login information, including their pass-
tion of a young fruit vendor named Mohammed words, to Tunisian authorities. Victims of these
Bouazizi. The demonstrations—which started in attacks would later log into Facebook and find
the town of Sidi Bouzid—went largely unnoticed that their accounts had been hijacked or deleted.
at first, but photographs of the protests quickly Internet service providers (ISPs) were also
spread on social media, causing the demonstra- reported to have throttled consumer bandwidth,
tions to grow, with protesters eventually demand- and users throughout the country reported outages
ing an end to the government of Zine al-Abidine of data service in areas where protests occurred,
Ben Ali, who had ruled the country for 23 years. though the outages may have been caused by net-
Official state media did not report on the pro- work overload. As the demonstrations escalated,
tests at first, and international media were largely harassment of bloggers and social media users—
prevented from entering the country, creating a a phenomenon that had existed since 2001—was
gap in reporting. For the first several weeks of reported. Prominent blogger Slim Amamou was
protests, only a select few international media out- detained at the Ministry of the Interior, which he
lets—including France 24 and Al Jazeera—man- reported to his online friends and followers using
aged to report on the demonstrations, both rely- Google Latitudes. Lina Ben Mhenni and another
ing on on-the-ground reports and photographs well-known blogger, Sofiane Chourabi, found
from bloggers. As early as December 28, 2010, their e-mail and Facebook accounts hacked.
Al Jazeera English had begun to use photographs In response to the government crackdown,
taken by Tunisian blogger Lina Ben Mhenni, sympathetic foreign groups, such as the collec-
whose blog—“A Tunisian Girl”—quickly became tive known as Anonymous, targeted attacks at
a source for journalists seeking an insider’s view Tunisian government Web sites. Anonymous and
of the protests. Another already-popular exile other groups also worked to help Tunisian Inter-
media site, Nawaat.org, reported on the protests net users access online security, circumvention,
around the clock. and anonymity tools.
The gap in reporting, coupled with an esti- The government’s efforts to intimidate activ-
mated 36 percent Internet penetration rate, led to ists proved largely ineffectual, however, and on
social media becoming the primary tools for cir- January 13, 2011, Ben Ali made what would be
cumventing the official state narrative. Although his final television speech, promising an end to
the Tunisian government had censored the Inter- censorship. Within hours of his appearance, most
net heavily for years, blocking numerous opposi- online blockages were lifted, and the next day,
tion blogs and the majority of video-sharing sites, Ben Ali and his family fled the country.
72 Arab Spring

Egypt Facebook, groups shared information on where


In Cairo, on the day Ben Ali fled Tunisia, a small demonstrations would take place. Google Docs
group protested in solidarity outside the Tunisian containing information on what to do in the
embassy. Shortly thereafter, a Facebook page that event of tear gas, as well as other key informa-
had already risen to popularity in the year prior tion, were disseminated throughout both public
announced Tuesday, January 25, as a national and private online networks.
Day of Rage to call for an end to emergency law, On January 25, as more than 20,000 Egyptians
an increase in minimum wage, and the dissolution took to the streets, the government—which was
of parliament. The Facebook page on which the well aware of Egypt’s online activist networks—
Day of Rage was announced was titled “We Are quickly responded by blocking access to Twitter,
All Khaled Saeed,” so named for a young victim live-streaming site Bambuser, and the site of an
who had died at the hands of police in 2010 in independent opposition newspaper, Al-Dostor.
Alexandria. By January 2011, the page had nearly The next day, as protests continued in Cairo’s Tah-
half a million users, due in large part to the fact rir Square, authorities blocked Facebook as well.
that images of Saeed’s brutalized body had circu- Members of the We Are All Khaled Saeed group,
lated online, causing outrage and resulting in the aware of the possibility of a ban, had already
prosecution of the responsible officers. begun collecting members’ e-mail addresses.
On Twitter, activists selected the hashtag Egypt’s Internet penetration at the time of
#jan25 in advance of the protests, while on the uprising stood lower than Tunisia’s, at

A protester holds a sign referencing the Facebook and Twitter elements of the Egyptian uprising in 2011. Egyptian activists used
Facebook pages to draw the support of nearly half a million followers and gather large demonstrations in Tahrir Square. The protests led
to President Hosni Mubarak’s resignation on February 11, 2011, and to the country’s first truly democratic elections in over 7,000 years.
Arab Spring 73

approximately 25 percent, but Egypt’s popu- and more determined. On February 10, it was
lation—nearly eight times that of Tunisia’s— announced that President Hosni Mubarak was to
meant that more than 20 million Egyptians were give a speech. For hours, Egyptians and foreign
Internet users. The government, seeing this as a observers awaited his appearance, speculating on
threat, looked for a solution and, on January 28 Twitter using the hashtag #ReasonsMubarakIs-
at 12:34 a.m., forced Egypt’s ISPs to disconnect Late. Following the speech, in which the president
from the Internet. Only one ISP with 8 percent made it apparent he would not be stepping down,
of the market share, Noor, remained operable. protesters marched toward the presidential pal-
Activists mobilized to set up hubs at homes con- ace and were let past the guards without incident,
nected to the ISP, working with a digital hub in indicating that Mubarak was not there and the
Tahrir Square that was amassing photo and video speech had been prerecorded. The next day, it was
content from protests, utilizing wires spliced from announced that he had stepped down.
street lights to keep their equipment charged. After Mubarak stepped down, Egyptians con-
As they did with Tunisia, hacktivist collectives tinued to use social media to organize additional
such as Anonymous and Telecomix sought to protests as well as to register complaints against
assist Egyptians on the ground, providing land- the interim government and, later, the government
line numbers for dial-up connections. Meanwhile, of President Mohammed Morsi. Citizen journal-
although foreign media were allowed into Egypt, ism became increasingly popular; one collective in
many journalists began to rely upon mobile con- particular, Mosireen, collected videos, organized
nections to activists on the ground for reports. screenings, and later used social media success-
Three days later, the one remaining ISP, Noor, fully in a campaign to raise more than $40,000
was disconnected. Google and Twitter responded on the fund-raising site IndieGogo. Hashtags
by offering a tool called Speak2Tweet, which such as #egypt, #fuckscaf (which refers to Egypt’s
allowed Egyptians on the ground to call a number Supreme Council of Armed Forces), and #tahrir
using their mobile phones and leave voice mes- were still being used nearly two years after the
sages that would then be tweeted from Speak2T- initial uprising, and many prominent Egyptian
weet’s Twitter account. With many of the voice Twitter users continued to comment regularly
messages in Arabic, several groups mobilized to to media. Additionally, following the election
form translation teams, transcribing and trans- of Mohammed Morsi, his party—the Muslim
lating the messages into English for a broader Brotherhood—increased their use of social media,
audience; many such messages were then used by tweeting from @IkhwanWeb and regularly updat-
journalists in their reporting on the demonstra- ing their official Facebook page.
tions. Web sites such as Global Voices Online,
which reports on blogs and social media around Morocco
the world, used personal networks to report mes- Following the success of Egyptian protesters, indi-
sages received from Egypt via telephone. viduals and groups throughout the Arab region
On February 2, Internet services were resumed. began using social media to call for protests in
The shutdown, which was said to have cost Egypt other countries, including Libya, Bahrain, Syria,
$90 million, actually may have had the oppo- Algeria, Morocco, Jordan, Sudan, and Yemen.
site effect as intended, many bloggers reported, While protests did occur in each of these coun-
instead encouraging some to join the protests. tries, the degree to which social media were a
A few days prior, on January 28, friends of contributing factor is debatable. Internet penetra-
Wael Ghonim, an Egyptian Google executive, had tion throughout the region ranged wildly. While
begun to report him as missing. On February 7, around 77 percent of Bahrainis were connected
Ghonim was released and, in a tearful interview, to the Internet in February 2011, in the remaining
admitted that he was the creator of the We Are countries, Internet penetration rates ranged from
All Khaled Saeed Facebook page while calling approximately 5 to 50 percent.
all Egyptians heroes. Ghonim’s appearance may Moroccan activists may have had the most
have revitalized the crowds in Tahrir Square, for success using social media. Using the hashtags
over the next four days, the crowds grew larger #Feb20 and #Fev20 (the French equivalent),
74 Arab Spring

Moroccan activists planned protests for February utilized to send word of demonstration dates and
20, 2011. Although initial turnout was low, the locations and enabled Yemenis living in disparate
demonstrations sparked the creation of a popular parts of the country to connect. Many indepen-
Web site Mamfakinch (which means no conces- dent opposition groups are reported to have held
sions in Moroccan dialect), which—using Twit- meetings in private Facebook and Google groups.
ter, Facebook, and other social media—may have In mid-2011, an estimated 30 Yemeni revolution-
played a role in stoking further protests. A cam- ary Facebook groups existed.
paign on YouTube in which youth explained their
reasons for supporting the February 20 move- Bahrain
ment also went viral. In Bahrain, the government—which had for years
On March 9, 2011, King Mohammed VI controlled online content and conducted online
responded to protesters’ demands, promising surveillance—was prepared for the protests,
reforms and later pardoning dozens of political which were advertised on Facebook and Twitter
prisoners. Protests nonetheless continued, and to occur on February 14, 2011. On February 11,
on June 17, 2011, the king announced a series of in an apparent effort to prevent the demonstra-
constitutional reforms, passed through a national tions, Bahrain’s King Hamad appeared on state
referendum on July 1. While the reforms were media to announce that each family would receive
supported by much of the population, the Febru- 1,000 Bahraini dinars to celebrate the 10th anni-
ary 20 movement rejected the proposals and con- versary of the National Action Charter referen-
tinued to organize demonstrations into 2012. dum, also on February 14.
The king’s overtures did not stop the protests,
Libya however, and despite their small size, the dem-
In Libya, where initial protests were ultimately onstrations were met with force by the govern-
successful due to North Atlantic Treaty Organi- ment. After security forces killed four protesters
zation (NATO) assistance, social media served and injured more than 300 on February 17, the
as channels for getting information about the demonstrations quickly escalated, and within
demonstrations out of the country. With low a few days, the opposition demonstrations had
Internet penetration in Libya, journalists relied garnered more than 150,000 participants, while
heavily on media hubs that emerged along with smaller counterdemonstrations brought together
the protests. One Web site in particular, libya tens of thousands.
feb17.com, helped to connect Libyans on the Online, a similar battle was waged, with
ground with journalists, while a popular Twitter progovernment forces utilizing Twitter to dis-
account, @Feb17Voices, relayed on-the-ground credit and, in some cases, threaten opposition
accounts from around the country. The Libyan activists and foreign journalists, including the
diaspora played a clear role in disseminating New York Times’ Nicholas Kristof. Bahrain’s
information from activists on the ground, often government reportedly spent millions of dollars
using traditional means of contact rather than on public relations during the protest, some of
social media platforms. which may have gone toward attempts to hijack
the social media narrative. According to numer-
Yemen ous reports, the government also utilized a Ger-
Estimates of Yemen’s Internet penetration in 2011 man digital surveillance tool called FinFisher,
range from 2 to 15 percent, but the country’s produced by the Gamma Group, though Gamma
extremely young population (according to the Cen- officials claim that they did not sell to Bahrain
tral Intelligence Agency World Factbook, 42 per- and that the version used was an unofficial copy.
cent of the country’s population is aged 14 years Throughout 2011, Bahraini authorities arrested
or younger) reportedly factored into why social numerous high-profile bloggers and online activ-
media contributed to the protests in that country. ists including Ali Abdulemam—the founder of
While the bulk of mobilization efforts report- BahrainOnline.org who was then sentenced in
edly occurred through word of mouth, radio, and absentia to 15 years in prison—and Nabeel Rajab,
short messaging service (SMS), Facebook was the president of the Bahrain Center for Human
Arab Spring 75

Rights. Bloggers and activists continued to report a “real army in virtual reality.” Meanwhile, on
harassment and intimidation by authorities well Twitter, seemingly independent actors attempted
into 2012. to distract from opposition reports by flooding
the hashtag #Syria with dozens of tweets per min-
Syria ute, typically linking to photos of the country and
In Syria, a small number of activists inspired by other content unrelated to the uprising.
Egypt’s uprising used social media to call for a As the conflict continued well into 2012 and
Day of Rage on February 5, but only a handful of the death toll rose above 15,000, foreign media—
demonstrators showed up. Three days later, Syr- mostly barred from the country—continued to
ian authorities restored access to Facebook, You- rely upon citizen media reports but, following
Tube, and Blogspot, all of which had been banned several high-profile mistakes, frequently offered
since 2007. While some celebrated this develop- caveats when information was unverified.
ment, others cautioned that it would make sur-
veillance by Syrian authorities easier. The Role of WikiLeaks
On March 7, additional protests and hunger While numerous reports—as well as Wiki­
strikes were triggered by the arrest, the day prior, Leaks founder Julian Assange himself—credited
of several young boys in the city of Daraa for WikiLeaks’s late 2010 release of U.S. diplomatic
writing antiregime slogans on walls in the city. A cables with prompting the uprisings in Tunisia
second Day of Rage was announced for March and Egypt, others viewed the whistle-blowing site
15, and simultaneous demonstrations took place as having a limited role.
across several cities in Syria, with protesters Sami Ben Gharbia, one of the cofounders of
demanding an end to Syria’s emergency law, an the Tunisian citizen journalism site Nawaat.org,
end to government corruption, and more free- worked to coordinate translations of the cables
dom in general. The next day, protests continued related to Tunisia, posting them on a site he
in front of the Interior Ministry, with an esti- founded called TuniLeaks. Gharbia argued that,
mated 200 people calling for the release of politi- because the cables were then available for Tuni-
cal prisoners. Several human rights activists were sians to read, they helped tip the balance by con-
arrested, prompting calls on Twitter for their firming what many citizens already knew. Promi-
release. These events led to the announcement of nent, award-winning Egyptian blogger Wael
a Day of Dignity on Friday, March 18, a phe- Abbas shared Gharbia’s sentiment, according to
nomenon that would lead to Friday as a weekly Yasmine Ryan, comparing the role of WikiLeaks
day of protest for the first several months of the to the many videos he had posted of Egyptian
uprising. police brutality.
By late March, accounts of government inter-
ference with social media began to emerge. One Twitter Revolution?
prominent activist, Khaled Elekhetyar, briefly Prominent writer Malcolm Gladwell, in an
went missing and returned to find government October 2010 essay subtitled “Why the Revolu-
supporters had hijacked his accounts. As reports tion Will Not Be Tweeted,” argued that online
of mass killings in Daraa emerged on Twitter, activism cannot create the type of “strong ties”
foreign media began to rely on social media for needed for real change. Citing the work of Evgeny
their reporting; in particular, graphic videos from Morozov, Gladwell also argued that governments
Daraa showing extreme violence helped draw would always have the upper hand online.
global attention to the unfolding crisis. Early on, journalists revived the term Twit-
As in Bahrain, an online battle also began to ter Revolution, first used in Moldova and then
unfold, with a network dubbing itself the Syr- Iran in 2009, to describe what was happening in
ian Electronic Army (SEA) perpetrating attacks Tunisia and Facebook Revolution to describe the
on the Web sites and Facebook pages of those it events in Egypt. The successes in the two coun-
deemed to be supportive of the Syrian opposition, tries prompted a slew of responses to Gladwell’s
including Oprah Winfrey. In June 2011, Syrian original piece as well as numerous academic arti-
President Bashar al-Assad recognized the SEA as cles debating the veracity of such claims.
76 Artists and Social Media in Politics

While there is no consensus as to whether the of Political Change in Morocco?” Mediterranean


various uprisings would have happened without Politics, v.16/3 (2011).
social media, scholars have pointed to several fac- Morozov, Evgeny. The Net Delusion. New York:
tors to determine the utility of social media in a Public Affairs, 2011.
given country, including the degree of Internet Noman, Helmi. “Syrian Electronic Army: Disruptive
access, the prior existence of strong online and Attacks and Hyped Targets.” Information Warfare
offline networks, and the technical savvy of a Monitor. http://www.infowar-monitor.net/2011/06/
given government in conducting censorship and syrian-electronic-army-disruptive-attacks-and
surveillance. -hyped-targets (Accessed December 2011).
On the Media. “Inside the Libyan Diaspora’s
Jillian C. York Resistance Movement.” http://www.onthemedia
Independent Scholar .org/2011/feb/25/inside-the-libyan-diasporas
-resistance-movement (Accessed February 2011).
See Also: Activists and Activism, Digital; Africa, Ryan, Yasmine. “Breaking Through Information
North; Bahrain; Citizen Journalism; Countries Banning Monopoly.” Al Jazeera English (October 6,
Social Media for Political Reasons; Egypt; Facebook; 2011). http://www.aljazeera.com/indepth/
Feb 17 Voices; FinFisher; Hacktivism; International features/2011/10/2011104115312389414.html
Unrest and Revolution; Iran; Libya; Mamfakinch; (Accessed December 2012).
Syria; Tunisia; Twitter; WikiLeaks/Arab Spring. Tufekci, Zeynep and Christopher Wilson. “Social
Media and the Decision to Participate in Political
Further Readings Protest: Observations From Tahrir Square.”
Aday, Sean, Henry Farrell, Marc Lynch, John Sides, Journal of Communication, v.62 (2012).
and Deen Freelon. “Blogs and Bullets II: New
Media and Conflict After the Arab Spring.”
United States Institute of Peace. http://www.usip
.org/publications/blogs-and-bullets-ii-new-media
-and-conflict-after-the-arab-spring (Accessed Artists and Social
July 2012).
Al-Assad, Bashar. Syrian Arab News Agency. Media in Politics
[Speech]. (June 20, 2011). http://www.sana.sy/
eng/337/2011/06/21/353686.htm (Accessed The use of social media in art grew out of a
June 2011). movement in the 1990s called “Net Art,” which
Ghannem, Jeffrey. “Social Media in the Arab World: attempted to harness the newly developed World
Leading up to the Uprisings of 2011.” Washington, Wide Web for artistic pursuits. Where Net Art
DC: Center for International Media Assistance/ focused on investigating the effects and limitations
National Endowment for Democracy, 2011. of the new technology, social media art utilized
Ghonim, Wael. Revolution 2.0: The Power of the services such as Myspace, Facebook, Twitter, and
People Is Greater Than the People in Power: Tumblr to create artworks that also tapped into
A Memoir. New York: Houghton Mifflin the social possibilities of the World Wide Web.
Harcourt, 2012. Leila Nadir and Carry Peppermint have described
Gladwell, Malcolm. “Small Change: Why the social media art as “environmental art” that takes
Revolution Will Not Be Tweeted.” The New place within a new media environment, extending
Yorker (October 2010). http://www.newyorker principles of installation sculpture, performance
.com/reporting/2010/10/04/101004fa_fact_ art, and public art to the online sphere.
gladwell (Accessed December 2012). Social media art is typically identified as start-
Gumbiner, Daniel, Diana Abouali, and Elliott Colla. ing around 2007, with Facebook’s lifting of mem-
Now That We Have Tasted Hope. San Francisco: bership restrictions requiring users to be part of
McSweeney’s/Byliner, 2012. universities. Facebook’s more mature user base
Molina, Irene Fernández. “The Monarchy vs. the gave the Web site more legitimacy in the eyes of
20 February Movement: Who Holds the Reins new registrants, which in turn propelled social
Artists and Social Media in Politics 77

media to mainstream acceptance not afforded by of protected material. In turn, this caused many
the early sites such as Myspace, Friendster, and videos to be taken down and subsequently re-
LiveJournal that catered toward younger audi- uploaded, as well as directing PRVs to focus on
ences and had a much less clean and organized copyright issues in the digital age.
aesthetic. This new focus on social media as a Social media art also extends beyond the shar-
culturally accepted way to interact with others ing of artworks through social media networks.
combined with Web 2.0 principles of open infor- It often takes the form of performance, with the
mation and collaboration to create blogs, wikis, artist creating an artwork that unfolds over the
and other content creation and sharing sites that social network through the actions of partici-
opened up new possibilities for artists. Many of pants. Though the artist is the primary creator of
these technologies were also adapted to be easy to the work, it often takes on a life of its own as it is
install, which in turn allowed nonprogrammers to modified and directed by participants. A large part
set up and manage complex sites and databases. of social media artworks involved the artist ini-
The rise of Application Programming Interfaces tializing the work, but then allowing it to develop
(APIs) gave access to large data sets and features in unintended ways according to responses from
in social media sites that could be used for art viewers or co-collaborators, many of whom were
pieces as well. personally unknown to the artist. These artworks
Initially, art’s engagement with social media use pre-existing platforms such as Facebook, Sec-
was primarily marketing-driven and used for ond Life, Twitter, or chat rooms to deliver and
self-promotion. Artists, galleries, and museums create content or to organize large-scale perfor-
attempted to find new ways to share pre-made mances that took place on the social media net-
artworks and create online brands and identities. works themselves. These works attempt to bring
Within a few years, however, the exploratory ten- in other users of the social networks in order to
dencies of Net Art had taken hold and the social involve them in the art-making process while also
media sites and principles were used as a medium drawing attention to the power of crowdsourcing.
in their own right to stage performances and cre- Major artists in social media art include Ai
ate crowdsourced works. These artworks also Weiwei, An Xiao, Nic Rad, Man Bartlett, Lau-
began to take on a political tone, some dealing ren McCarthy, William Powhide, Jennifer Dalton,
with the larger implications of technologies that and the “global online art collective” @Platea.
allowed varying degrees of freedom and control The art itself is usually composed of a process
and others drawing attention to more specific of selection, bringing in pre-made elements from
political movements and actions. digital sources. Photos, Rich Site Summary (RSS)
feed entries, tweets, and data from a wide variety
Forms of pre-existing Web sites accessible through open
Political remix videos (PRVs) are one instance of APIs allow artists to access and manipulate data.
how artists began to use access to digital tech- Users can add their own data to many projects
nology and social media for political purposes as well. Though these channels provide a great
beyond simply advertising offline art. Claiming degree of access, much of it is also closed off
a heritage that extended through Situationist and from use by anyone other than the programmers
other types of cinematic reframing, PRVs reor- of the specific platform. Even in the face of some
ganized and reframed mass media video clips restricted information, social media art has devel-
as political commentary, seeking to provide a oped primarily as a medium that champions the
critical view of the mass media’s presentation of open access of the World Wide Web and the abil-
political events and characters, as well as social ity to take previously unavailable data and use it
issues such as class, gender, and race. The abil- in new contexts.
ity to host these videos on YouTube, as well as
the ease of sharing through social media networks Themes
such as Twitter and Facebook, allowed for mass Claire Bishop has drawn the connection between
dissemination. However, these videos often met the process of reusing pre-existing data in social
with copyright issues stemming from their use media art and the appropriation art of the 1980s,
78 Artists and Social Media in Politics

in which artists would reshow premade artworks a stand-in for the private selves. Peppermint and
within a new setting. According to Bishop, the Nadir have also asked whether the amount of
difference between the two lies in the differing shared private information will become so large
ways they operated. Appropriation art relies on that the individual and the artists themselves will
a principle of repurposing while social media art disappear as a result of too much information to
uses selection as a major component. Instead of process, heralding a new type of anonymity.
revisiting appropriation art’s questioning of issues With a focus on the redefinition of public
of authorship and originality as they exist in the space, social media art also seeks to make an
age of mechanical and digital reproduction, social intervention in the use of that space. Groups such
media art looks to provide meaningful recontex- as @Platea attempt to re-envision social media
tualization of existing artifacts. It focuses on the as a “digital megacity” and social media art as
way that technology operates through assembling work that takes place within this city, continu-
already existing data rather than creating it from ing principles laid down within “offline” public
the ground up. Such a focus on repurposing has art. They advocate creating artworks that exist
also opened up themes initially brought up by Net within a public online space both as monumen-
Art, such as the “archival impulse” pointed out tal works that are extremely visible and as hidden
by Hal Foster. works that users can stumble upon as they move
Social media art, like Net Art, works by prob- through online space. Works such as “The Dive”
ing into pre-existing databases of images, infor- encourage participants to engage in a collective
mation, and objects but reconstructing them into performance, updating social media profiles with
new, subjective archives. In turn, this serves to sub- textual or pictorial content that contain represen-
vert entrenched systems and hierarchies by creat- tations of “diving” throughout the day.
ing new arrangements and privileging individual The purpose of these performances is to repur-
interpretations over objective or systematic ones. pose these sites and the new technological fea-
Additionally, selecting archival materials serves tures to turn them into artistic works that cause
to break apart origin myths of current power other users not involved with the creation of the
structures, removing some of their justification. piece to question the environment they are inter-
By reconstructing histories within new contexts acting in. Occasionally, works also become social
and with new subjective interpretations, legitima- media “covers” of previous works. “Following
cies of the hegemonic power structures created by Piece 2.0” is one such example, a reperformance
those histories are also called into question. of Vito Acconci’s 1969 work “Following Piece”
Many artworks take on the growing issue of that took place as multiple artists followed people
the dissolution between public space and private in public spaces and reported details through the
space. They address the growing issue of shar- #fp20 hashtag on Twitter. This work attempted to
ing too much information online, causing peo- call into question what happens when people “fol-
ple’s lives to become lived out in the open. More low” someone on Twitter and bring attention to
prevalent in early social media artworks, these the voyeuristic nature of many social media sites
works anticipated the need for self-censorship where private users can watch public and private
and default privacy controls within networks, as actions of other users without a reciprocal gaze.
well as discussions about how private informa-
tion posted online should be used in offline and Social Issues
professional settings. Some works, such as Cary Where @Platea brings up issues of public and pri-
Peppermint and Leila Nadir’s “Overexposed vate space within a discourse of the World Wide
Dancing,” look at how the new technology led Web as a city, other social media art projects
to people sharing intimate moments of their lives examine social media’s potential to create a global,
with both friends and strangers, sometimes inad- public forum for discussion about political issues.
vertently, sometimes with full knowledge of an #Class was a one-month project organized by Wil-
opening up of the private sphere. Others, such as liam Powhide and Jennifer Dalton that sought to
Nic Rad’s “PeopleMatter” series, explored how examine the ability to incorporate social media
public online faces and representations become into a public dialogue about “the gallery model,
Artists and Social Media in Politics 79

the commodification of art, and all the unquanti- colloquial use of social media platforms allows
fiable, intangible, unpaid aspects of participating individuals who do not have an academic under-
in the art world.” It broadened the notion of an standing of art history, art theory, or even basic
online public space to include a physical gallery art techniques to work on pieces. Additionally,
space that was supplemented by social media tech- the ability to crowdsource pieces lets anyone
nologies, allowing participants throughout the with access to a computer and the appropriate
world to become involved without having to be Web sites give input into the project or steer it
present physically at the time the performance was in a particular direction. Many of these artists
happening. The project addressed issues of access, can be temporary artists, only working on one
attempting to bring art to individuals who did not or a few social media pieces before returning to
live in major metropolitan art centers. Many of another occupation.
the panels and artworks within the project were The accessible nature of social media art, com-
also aimed at drawing attention to the growing bined with the use of repurposed data and pre-
class issues in the art world, as well as within the existing elements, brings up issues related to high-
larger economic system in the United States. brow and low-brow art. With many untrained
Social media art has been cast as a potential artists creating works outside of traditional medi-
venue not just for access to dominant art para- ums, the work’s adherence to formal high-brow
digms by artists in marginalized areas, but also to structure and execution is put aside, replaced by a
give global exposure to emerging artists. Through focus on innovation and collage-like reconstruc-
increased communication and the ability to share tion of data. Often, these works are critiqued as
information across large distances, artists can cre- having a derivative style that reflects the use of the
ate art worlds that do not have a physical pres- technological medium in mass culture and society.
ence in cities such as New York or London and These works also tap into uses and expressions of
can promote works by artists not physically pres- technology as found in advertising, education, sci-
ent. The low cost of using a pre-existing social ence, and everyday use. In turn, these more every-
media platform or setting up an entirely new site day influences bring social media art away from
allows artists who would traditionally lack access the realm of the high brow and into what could
to art materials or artist groups to create and be identified as the domain of low-brow art. For
share works. As artists can communicate with less social media art, this movement is seen as benefi-
reliance on galleries and showing work in a sin- cial, even though it calls into question its status
gle physical location, it is possible for artists and as “art.” By tapping into low-brow art methods
groups of artists to create alternative art worlds and sentiments, social media art can further its
outside of the current institutional structure. goal of breaking down hierarchies and promoting
These projects, and other social media art mass participation in the art-creating process. It
projects, attempt to bring production back into also encourages participants and viewers to look
the hands of the masses. They question the legiti- at the technological media they use every day in
macy of a single author and advocate for crowd- an artistic, creative, and politically active context.
sourced creation of art and knowledge. By bring-
ing in multiple participants with varying degrees Political Critiques
of input over the artwork, social media art Social media art also calls into question the divi-
attempts to resist hegemonic structures of power. sion between online and offline worlds by seek-
Multiple, subjective experiences are privileged, as ing to make real world change. It responds to a
are fragmentation and constant evolution of the critique of technology as a disembodying force
work. Many pieces, especially those by groups that creates a separate, virtual environment that
such as @Platea, also seek to include a global per- stands in opposition to a “real” or physical world.
spective by bringing in contributors from around It seeks to explore online art as an extension of
the world. offline life, as well as the ability of online organi-
Artists who are brought into these works are zation and sharing to effect change offline. Addi-
often not traditionally trained and do not need tionally, it seeks to use social media as art, but
to be professional artists. The widespread and in ways that align with the typical use of social
80 Artists and Social Media in Politics

media by the mainstream public. Social media


art repurposes social media and accentuates its
potentially creative aspects, but it seldom engages
in hacking the sites or using the media in ways
drastically beyond the popular use. Such tactics
appear to fall short of a full exploration of the
potential of new technologies, but they allow a
broader population to view and add to the work.
By bringing together global artists and advocat-
ing the creation of multiple, subjective narratives,
social media art creates oppositional structures to
offline institutions. The art world is commonly a
target of these works that seek real-world change
(as with #Class), but governmental structures are
also often critiqued.

Ai Weiwei
Once such instance of a specific, local critique of
a political institution is the work of Ai Weiwei.
Working in China, Ai’s work seeks to bring atten-
tion to what he feels are unjust practices of the
Chinese government. Twitter is one of his major
outlets, though the service is banned in China. His
account has upwards of 200,000 followers and is A surveillance camera sculpted out of marble was one of a group
used to share his work as well as organize gath- of works by Ai Weiwei shown at the Smithsonian’s Hirschhorn
erings while also presenting a real-time record Museum and Sculpture Garden in Washington, D.C., in 2012.
of his art activism. His tweets often criticize the
government, providing a public expression of dis-
sent to both national and global audiences. These
tweets have included hospital pictures following Ai’s imprisonment and beatings have garnered the
an assault by police in Chengdu, a list of the stu- attention of the international community, result-
dents who died in the Sichuan earthquake, and ing in petitions and criticism from media outlets
the organization of Say Out Your Name Activ- and activists in a number of different countries,
ity, where Chinese nationals tweeted out their real primarily in the West.
names and locations. Global art groups paid particular attention to
The anti-authoritarian stance and alterna- his extended imprisonment in 2011. New York’s
tive space of dissent that Ai has created has also Creative Time, along with the Guggenheim
resulted in a forceful response from the Chinese Museum, the Tate Modern, the United States, the
government. Through his highly visible and European Union, and other institutions all put
globally-followed social media accounts, Ai has out public calls for Ai’s release. Many of these
gained a considerable amount of immunity from took the form of performances that repurposed
action on the part of the Chinese government. He motifs from Ai’s work.
has been able to openly criticize the procedures Ai’s work taps into many of the themes and
of the government, along with its positions on issues that social media art in general deals with.
human rights and democracy. However, he has His tweets work from behind the “Great Fire-
not been completely without scrutiny or with- wall” to make public the private actions of an
out attempts at censorship. He has been beaten, authoritarian government. Bringing attention
placed under house arrest, and held secretly to these actions allows him to create an alterna-
under questionable charges. Because of his stat- tive narrative to the official, government-sanc-
ure gained through his social media artworks, tioned one. By creating a public voice, he has
Asia 81

also become the centerpiece for other activists to users in Asia may soon surpass the total number
rally around, inspiring them to form their own of users in the world. China, with 538 million
critiques, or to pass on his criticism and artwork users, already has the greatest number of Inter-
to others. Through this increased visibility online, net users of any country in the world despite its
he hopes to bring about institutional change in relatively low penetration rate. In addition, its
China and increased global scrutiny into govern- policy of filtering and its restrictions on outside
mental practices. media have resulted in a robust local social media
sphere that is much more familiar to its citizens
Todd Woodlan than Facebook or Twitter.
Val Hartouni
University of California, San Diego Scope of Social Media in Asia
In 1999, well before Friendster was established
See Also: Actors and Social Media in Politics; and before the dot-com crash, South Korea had
Documentaries, Social Media, and Social Change; its own popular social media site, CyWorld. Users
Interactive Documentary; Musicians and Social were given a home page and the capability to link
Media in Politics; Pioneers in Social Media and to friends, write diaries, and share photos. They
Politics; Writers and Social Media in Politics. could also explore a virtual world with an avatar,
as would become popular with Second Life. By
Further Readings 2007, the number of registered users was more
Bishop, Claire. “The Digital Divide: Claire Bishop on than one-third of the country’s population. In
Contemporary Art and New Media.” Artforum addition, the citizen journalism site OhmyNews
(September 2012). was launched in 2000 by Oh Yeon Ho with
Plateastweets.blogspot.com. “@Platea: A Global the motto “Every Citizen Can Be a Reporter.”
Online Public Art Collective.” http://plateastweets Although the service soon hired a paid staff, the
.blogspot.com (Accessed May 2013). majority of its stories were written by thousands
Xiao, An. “Always Social: Social Media Art (2004– of registered users who are paid the equivalent of
2008), Part One.” Hyperallergic, v.14 (June 2010). a few dollars for each story accepted by the site’s
editors. The site was credited with helping to elect
a progressive president, Roh Moo-hyun, in 2002.
In June 2005, a photograph of a woman who
came to be known as Dog Poo Girl brought to light
Asia the possibility of Internet vigilantism. After her
dog defecated on the floor of a subway in Seoul,
In some ways, social media can be said to have South Korea, a photograph of her and the offend-
been invented in Asia, in the sense that the conti- ing mess was posted to a blog. She was identified
nent itself can be classified as an “early adopter.” within hours based on her bag, her watch, and her
It is not surprising, given the variety of cultures dog. Information about her, her family, and her
and politics in Asia, that the use of social media in university was used to place harassing phone calls.
the region is varied. Some Asian countries boast In China, this sort of activity has been called
the highest rates of Internet connectivity in the renrou sousuo (RRSS), which translates as
world (Japan, Singapore, South Korea, and Tai- “human flesh search engines.” In 2006, a World
wan) as well as some of the lowest (Cambodia, of Warcraft player posted to a bulletin board
Myanmar, and North Korea). system (BBS) accusing his wife of adultery with
Asia, according to an analysis of Internet world “Bronze Mustache,” the nickname of a student
statistics, boasts 1 billion Internet users out of an she met while playing the game online. In a short
estimated 1.3 billion users worldwide. Because time, the identity of the student, along with his
only about 28 percent of Asia’s population is contact information, became publicly available,
online, compared to 43 percent worldwide and and enraged citizens began to pester him and his
78 percent in the United States, its recent growth family, as well as their employers and the stu-
in online population means that the total Internet dent’s university.
82 Asia

Not all instances of RRSS involve public East also tended to spend more time on the site
humiliation, however. In 2009, Deng Yujiao than their counterparts in other regions of the
allegedly stabbed a man who sexually assaulted world. The public relations firm Ogilvy ranked
her. She also stabbed his companion. The two six Asian countries (India, Indonesia, the Philip-
turned out to be government officials, and pines, Thailand, Malaysia, and Taiwan) and Aus-
because Deng’s assailant died, she was charged tralia in the top 20 of Facebook countries, ranked
with murder even though she had acted in self- by number of users. Ogilvy reported that more
defense. Bloggers took up her cause, and the than one in four Facebook users (27 percent) in
New York Times reported that more that 4 mil- 2012 were from Asian countries.
lion posts were written in her defense. As a result In 2011, the public relations firm Burson-
of worldwide attention garnered by this online Marsteller surveyed social media and found that
resistance, the police agreed to investigate Deng’s Facebook was the most preferred social media site
claim and released her on bail. She was eventu- in Australia and seven Asian countries and cities
ally convicted of a lesser crime and the govern- (Hong Kong, India, Indonesia, Malaysia, the Phil-
ment officials were censured. ippines, Singapore, and Thailand). Other coun-
A 2012 survey by the Pew Charitable Trusts tries had other top sites. In China, for instance,
of 21 countries included China, Japan, and India. the preferred social media site is Qzone, with 531
The highest penetration of social media was seen million active users and 8.6 billion page views;
in British, American, Russian, and Czech respon- Western sites like Facebook, YouTube, and Twit-
dents, where about 50 percent reported that they ter do not make it into the top five Web destina-
used social media sites. In China and Japan, the tions of China overall, nor even the top five social
penetration was closer to 30 percent, while India media sites. Smaller sites are the most popular in
reported only 3 percent. Among younger users, other countries, such as South Korea’s CyWorld
however, the gap was lower. In the United States, (18 million active users, with 1.6 billion page
80 percent of respondents aged 18 to 29 reported views), Vietnam’s Zing (15 million users, 1.7 bil-
using social media, compared to 71 percent in lion views), Japan’s FC2 (14.5 million users, 3.3
Japan and 61 percent in China. billion views), and Taiwan’s Wretch (9 million
The Pew survey also asked users of social media users, 14 billion views).
whether they used sites to share their views about
music and movies, community issues, and politics, Filtering and Other Controls
among other subjects. U.S. respondents were more Web filtering began in Asia soon after the first
likely to talk about music and movies (63 percent) connections were made. In 1994, China was con-
and least likely to talk about politics (27 percent). nected directly to the international Internet and,
The Asian countries in the study seemed to be much with the help of Qian Tianbai and the University
more interested in expressing opinions about cul- of Karlsruhe, the Computer Network Informa-
ture; in China and India, about 85 percent of users tion Center under the Chinese Academy of Sci-
expressed opinions about music and movies, well ences completed the installation of a domain name
above the U.S. average. In terms of politics, opin- server for China’s .cn domain on May 21, which
ions about politics were also more likely in China ended the history of top-level domain (TLD) name
(35 percent) and India (45 percent), even though servers being kept abroad. The Chinese govern-
the rate was lower in Japan (22 percent). ment’s first Web site, Window on China, went
Other studies confirm the popularity of social online that same year. In January 1996, the Chi-
media while exploring differences in Asian users. nese Public Security Bureau began to take steps
A study of LinkedIn’s 120 million users also found to solve the problems related to free international
a robust community of Asian social networkers. links to the Internet by restricting international
Unlike Europe and North America, where a user’s access to four portals managed by the Ministry
network would typically span about 500 miles, of Posts and Telecommunications, the Ministry of
users in Asia tended to have much more dispersed Electronic Industry, the Education Commission,
networks of up to 1,000 miles, second only to and the China Academy of Science, a chokehold
Africa’s 1,500 miles. Users in Asia and the Middle that remains to the present day. At the same time,
Asia 83

the Public Security Bureau demanded that all


Internet users be registered with the post office,
signing a statement of responsibility and doing
nothing to harm the state before they are allowed
to use the Internet.
Also in 1996, China famously took steps to
limit the information that is available to Chinese
users of the Internet, marking a new direction in
information policy. The Associated Press reported
“China tightens control of Internet, blocks 100
Web sites” on September 9, 1996, when China
used its bottleneck of four access points to the
outside world to prohibit Internet users from
seeing the Web sites of U.S. news media, Tai-
wan’s government, dissidents, and other politi-
cally sensitive groups. According to the Associ-
ated Press, the blocking became known when the
U.S. embassy received calls from Americans who
found they could no longer read U.S. newspapers.
Sites that were blocked included the news sites of
the Los Angeles Times, the Wall Street Journal,
the Washington Post, the Voice of America, and
CNN; the dissident sites from the Taiwan Gov-
ernment Information Office, the Tibet Informa-
tion Network, and Amnesty International; and
the sexually oriented site for Playboy. Spectators following events by laptop in China while waiting
Similarly, in 1996 Singapore announced that outdoors during celebrations of the 60th anniversary of the
its major ISPs would block pornographic Web founding of the People’s Republic of China on October 1, 2009.
sites in order to preserve its values, as reported in
the New York Times on October 14. Singapore,
which already had banned Playboy and Pent-
house magazines, extended its effort to exclude boards as well as human censors that find infor-
content that might undermine moral values. At mation that the filters missed results in the post
first, the government allowed Internet users only being deleted and the user account being sus-
to access Web pages through a proxy server that pended. This, coupled with the famous capitula-
did not contain prohibited material. Recently, tion of Google to prevent users inside China from
however, this blocking has become mostly per- seeing search results that the government finds
functory; in 2007, the government announced offensive, seems to indicate that the power of the
that it blocks only 100 pornographic sites as a Internet to set information free has been defeated.
“ceremonial” gesture. In 2007, the military government of Myanmar
Starting in 2000, China began to ask service (Burma) shut down the country’s Internet access
providers to comply with a “self-discipline” pact for two weeks in order to stop the circulation of
and prevent the dissemination of information images of its crackdown on protests by monks
that harms national security and social stability— and civilians in what came to be known as the
meaning that they must regularly patrol discus- Saffron Revolution. In August, the leaders of a
sion boards and delete information that might student movement organized a rally to protest the
be offensive to the government. This was tested rise in fuel prices. The movement was taken over
by Reporters Without Borders in 2003, which by Buddhist monks, and by September the protest
found that a combination of filtering that prohib- grew to 150,000. Protesters logged attacks on
its certain words from being posted on discussion them by uploading video and firsthand accounts
84 Association of Internet Researchers

to media outside the country. When the govern- declined to directly censor online activities in the
ment shut down the Internet on September 29, belief that it is essential to encourage the use of the
the flow of images out of the country was slowed, Internet and new media. The Internet was banned
but was still possible through trusted networks outright by the Taliban in Afghanistan in 2001,
and satellite. When it is not in crisis mode, the but after the fall of the Taliban the country was
government also restricts upload speeds for cus- given the authority to control the .af domain. The
tomers, which is thought to be an attempt to ONI reports no evidence of filtering. In a country
restrict Internet usage. where only 1 percent of the population has Inter-
YouTube was banned in Bangladesh in 2009, net access, Mahabir Pun began the Nepal Wire-
when only 1 percent of its citizens were online, less Networking Project in 2003 with the aim of
because it carried an audio recording of a meeting bringing service to remote mountain regions.
between the Bangladeshi prime minister and army
officials after a deadly mutiny of border guards. Christopher Leslie
In 2012, YouTube was banned again because it Polytechnic Institute of New York University
refused to filter a trailer to a film that portrayed
the Prophet Muhammad unfavorably. See Also: China; Countries Banning Social Media
The Open Net Initiative’s (ONI’s) studies show for Political Reasons; Fax Machines and Tiananmen
a variety of approaches to filtering schemes that Square Crisis; Great Firewall of China; India;
shape what information their citizens access in Indonesia; OhMyNews.com; Weibo.
the region. China, Myanmar, and Vietnam used
extensive filtering to block Web sites with politi- Further Readings
cally sensitive content, human rights issues, inde- Deibert, Ronald, et al. Access Controlled: The
pendent media, and reform platforms, a practice Shaping of Power, Rights, and Rule in Cyberspace.
that was keenly felt when it came to sites that Cambridge, MA: MIT Press, 2010.
used local languages. Thailand and Pakistan Deibert, Ronald, et al. Access Denied: The Practice
take a moderate approach to filtering, blocking and Policy of Global Internet Filtering. Cambridge,
only what they consider to be sensitive or illegal. MA: MIT Press, 2008.
Other countries use filtering, such as South Korea Kahney, Leander. “Citizen Reporters Make the
(which filters sites that promote reunification with News.” Wired.com (May 17, 2003).
North Korea) and Singapore (which strictly filters Pew Charitable Trusts. “Social Networking Popular
pornography). Across Globe” (December 12, 2012). http://www
The ONI points out that filtering in Asia often .pewglobal.org/2012/12/12/social-networking
exhibits a “lack of transparency,” in that citi- -popular-across-globe (Accessed July 2013).
zens do not necessarily know that their content
is filtered. In this way, when users cannot reach
content they are looking for, it seems as if there
is a technical, not political or social, block. Only
users in Thailand and South Korea were presented Association of
with a block page that informed the user that the
content he or she was looking for was banned. Internet Researchers
Furthermore, governments are not always clear
from whence their authority to filter derives. In The Association of Internet Researchers (AoIR) is
2007, Thailand became one of the few countries an academic society, founded in 1999, that exam-
that requires a court order before Internet content ines the emerging, and interdisciplinary, field of
can be filtered. Internet studies. As it came into being shortly
Afghanistan, Malaysia, and Nepal, however, after the Internet became popular with the gen-
do not appear to use filtering at all. Although eral population, the AoIR has helped shape how
Malaysia has the legal mechanism to force con- academia conducts research related to the World
tent providers to stop communication of inde- Wide Web, applications, social media, and how
cent or offensive material, the government has individuals engage with these. Each year the
Association of Internet Researchers 85

AoIR holds a scholarly conference where papers out a mandate from the Clinton White House,
exploring members’ work are presented. The convened a special panel of 33 Internet scholars,
organization also promotes online and other col- practitioners, critics, and visionaries to develop an
laboration and cooperation among its members, anthropological research agenda for studying the
and maintains AoIR-L, a listserv that serves over Internet and society in the 21st century. In 1998
2,000 subscribers. Drake University hosted a conference known as
The international system of interconnected “The World Wide Web and Contemporary Cul-
computer networks that is known as the Internet tural Theory: Metaphor, Magic & Power.” At
originated during the 1960s as the U.S. govern- this symposium, discussions began regarding
ment sought to build fault-tolerant, robust com- the need for a learned society that concentrated
puter networks that would permit communica- upon advancing the field of Internet studies. Con-
tion between distant sites. While the U.S. military sequently, the following year over 60 Internet
originally was highly involved in the development researchers and scholars convened to form the
of the Internet, this work built upon work done AoIR. The organization soon took a leading role
earlier in the United Kingdom. in shaping how research related to the Internet is
The Advanced Research Projects Agency Net- conceived, conceptualized, and conducted.
work (ARPANET) first connected laboratories
and scholarly centers at universities and various Objectives and Services
research facilities, allowing connectivity between Internet studies, as an emerging and innovative
scientists in different cities and nations to become field, examines technology and individuals’ and
a reality. As groups such as the National Science groups’ response to this from a variety of disci-
Foundation (NSF) increased funding to computer plinary perspectives. These disciplinary perspec-
network connectivity projects, the ARPANET tives include artistic, cultural, economic, peda-
expanded during the 1980s and then evolved to gogical, political, psychological, social, technical,
provide researchers access to university-based and other outlooks. Certainly studies of the Inter-
supercomputers. net and its effects may be conducted by members
By the mid-1980s the NSF network (NSFNET) of traditional academic departments, such as
succeeded the ARPANET, and by the end of that anthropology, communications, psychology, soci-
decade private Internet service providers began to ology, or other fields of study. Internet studies,
emerge. After the NSFNET was decommissioned however, has become a recognized field of study
in 1995, the commercial uses of the Internet blos- at a variety of institutions, although sometimes
somed, as the last remaining restrictions on the known as “convergent media,” “digital culture,”
use of the Internet were removed. As a result, or “new media.” A variety of colleges and univer-
growth of the Internet by commercial organiza- sities have created separate departments of Inter-
tions and individuals boomed. net studies, including Appalachia State University,
As early as the 1970s computer scientists began Brandeis University, Curtin University of Tech-
studying the effects of computer networking sys- nology, Endicott College, Hebrew University of
tems. While researchers in the fields of business Jerusalem, Oxford University, and the University
and library science also began studying how com- of Minnesota. The creation of the AoIR helped
puters were changing the ways in which indi- to build communication and interaction between
viduals and groups interacted, such interest was members of these institutions and to encourage
generally not shared by scholars in other fields. collaboration and the sharing of resources.
By the mid-1990s, however, scholars interested The AoIR believes that valuable and authen-
in a variety of disciplines began taking increasing tic research related to the Internet is predicated
notice of the growth of the Internet. upon the fundamental principles of academic
In 1996, Georgetown University began offering freedom, equality of opportunity, and respect for
an M.A. degree in Internet studies and the Uni- human dignity. To that end, the AoIR has estab-
versity of Maryland formed the Resource Cen- lished policies that its members and officers do
ter for Cyberculture Studies. Around the same not discriminate against individuals because of
time, the National Science Foundation, carrying age, ancestry, color, disability, marital status,
86 Astroturfing

national origin, race, religion, sex, or sexual ori- AoIR-L, the listserv of the association, has
entation. Operation of the AoIR is administered over 2,000 members and has played a tremen-
by an executive committee, which is culled from dous role in allowing discussion of methodolo-
its board of trustees. The AoIR works to foster gies, ethics, research questions, and other areas of
interdisciplinary and interprofessional interaction concern to those who conduct Internet research.
between scholars that promotes critical research Various working groups have undertaken projects
into the Internet’s aesthetic, cultural, economic, on behalf of the AoIR membership, resulting in
political, and social characteristics. Seeking to dif- leading-edge documents regarding ethics, politics,
ferentiate itself from the monolithic and tradition- and interaction with the communities in which
bound practices of many other learned societies, researchers live and work. As concerns about and
the AoIR has eschewed many common structures interest in the nexus of social media and politics
in order to encourage a more organic, natural continue, the AoIR will undoubtedly continue to
community of scholars. A key part of building play a lead role in defining how research in this
this community has been the annual meeting of area is conducted.
the AoIR, its listserv, and its publications.
A variety of scholars played lead roles in form- Stephen T. Schroth
ing the AoIR. Steve Jones, professor of commu- Kyle A. Hammock
nications at the University of Illinois at Chicago Knox College
(UIC) served as the organization’s first president
and helped create the infrastructure by which the See Also: Advocacy Groups, Political Branding
AoIR is run. Nancy Baym, a professor of commu- of; Blogger Rights and Responsibilities; Campaigns,
nications at the University of Kansas, succeeded Digital; Cyberculture; Deception in Political Social
Jones as the AoIR president in 2003. Baym also Media; Freedom of the Press and National Security;
organized the learned society’s first conference in Nonprofit Organizations.
Lawrence, Kansas, that took place in 2000. Pro-
gram chair for the first five AoIR conferences was Further Readings
Jerry Hunsiger, then at Virginia Polytechnic Insti- Hughes, J., ed. SAGE Internet Research Methods.
tute and State University, who also greatly helped Thousand Oaks, CA: Sage, 2012.
to build the organization’s technical infrastruc- Ó Dochartaigh, N. Internet Research Skills, 3rd ed.
ture. The annual AoIR conference has grown to Thousand Oaks, CA: Sage, 2012.
include hundreds of scholars, students, and oth- Post, R. C. Democracy, Expertise, Academic
ers interested in the interdisciplinary approach to Freedom: A First Amendment Jurisprudence for
Internet research of the learned society. Because the Modern State. New Haven, CT: Yale University
it embraces research using a variety of method- Press, 2012.
ologies, the AoIR welcomes scholars from a vari- Weaver, R. L. From Gutenberg to the Internet:
ety of perspectives and provides a forum that is Free Speech, Advancing Technology, and the
friendly and supportive of participants. Held in Implications for Democracy. Durham, NC:
a new location each year, the AoIR annual meet- Carolina Academic Press, 2013.
ing has taken place in Minneapolis, Maastricht,
Toronto, Brighton, Chicago, Brisbane, Vancou-
ver, Copenhagen, Milwaukee, Gothenburg, Seat-
tle, and Salford. Each conference is organized
around its own theme, and those covered to date Astroturfing
have included performance and participation;
sustainability, participation, and action; intercon- “Astroturfing” is a political, public relations, or
nections; the Internet; and bandwidth. Through advertising campaign that deceptively and artifi-
2006, selected papers presented at the conference cially creates an impression of widespread grass-
were compiled in an Internet Research Annual, of roots support for a product, policy, or concept,
which four editions were published in conjunc- when in actuality limited support exists. Typi-
tion with Peter Lang Publishing. cally, a corporation or political group employs
Astroturfing 87

astroturfing to promote corporate concerns while in a targeted politician’s district. Public opinion
claiming to represent the public interest and com- polling and focus groups help refine the messages
munity concerns. The term is a derivation of most likely to resonate with the targeted groups.
AstroTurf, a brand of artificial carpet designed to Talking points and scripts are provided to the sup-
simulate natural grass. porters, and the supporters are encouraged (and
Astroturfers mimic and reproduce the forms frequently paid) to make phone calls and send
and messages of traditional grassroots social e-mails to their elected officials, to write letters to
movements and use software to mask their identi- the newspaper, and post comments on their social
ties. Dummy interest and pressure groups (called networking profiles. Supporters are also encour-
front groups) are often used to create the percep- aged and paid to fill rooms at town hall meetings.
tion of public backing of the client’s agenda and An astroturf campaign will also usually include
to hide the identity of the organization or corpo- several media events and press conferences, full-
ration funding the astroturfing effort. The names page advertisements in insider media outlets such
of corporate front groups are strategically selected as Politico and Roll Call, and paid research stud-
to disguise the actual funders of the group. For ies supporting the effort.
instance, during the debate over the 2009 Ameri- A spin-off technique, known as grass tops, uses
can health care law, the drug lobby PhRMA and influential community leaders such as mayors,
the Service Employees International Union ran religious leaders, and business executives to lobby
television ads under the group called Americans members of Congress and regulators. Instead of
for Stable Quality Care. Another common tech- blanketing Capitol Hill with thousands of iden-
nique is the mobilization of thousands of support- tical postcards, grass tops advocacy mobilizes a
ers or the creation of numerous online personas handful of local and regional public opinion lead-
to post reviews and comments, call into talk radio ers in key states to make the case to lawmakers.
shows, and ballot stuff online surveys. The Pub-
lic Relations Society of America has decried the Social Media
practice as unethical and considers assisting front Technological advances, including e-mail, voter
groups as malpractice under the organization’s databases, automated phone services, telephone
code of ethics. banks, and social networking, decreased the cost
The term dates back to 1985, when U.S. Senator of astroturfing and fostered its popularity. For
Lloyd Bentsen responded to the large number of example, persona management software can gen-
postcards arriving in his office by saying, “a fellow erate thousands of fictitious identities and add
from Texas can tell the difference between grass- a degree of realness by creating a name, e-mail
roots and astroturf. . . . This is generated mail.” account, and social media profile for each vir-
Such techniques, however, have a long history. tual account, randomizing the operator’s Internet
In Julius Caeser, William Shakespeare describes protocol (IP) address or establishing IP addresses
Cassius writing letters “in several hands . . . as if in specific geographic locations to trick geoloca-
they came from several citizens” to urge Brutus to tion services and linking dummy accounts to the
join the conspiracy against Caesar. Astroturfing profiles of other fake accounts to add legitimacy.
techniques flourished in the United States and are These fake accounts are referred to as sockpup-
an accepted, if often hidden, aspect of public rela- pets, and the practice of using misleading online
tions campaigns. Today, astroturf efforts are espe- identities is known as sockpuppeting.
cially common in political consulting and digital Astroturfing campaigns are frequently used on
communications firms and are usually called issue the Internet to generate buzz and word of mouth
campaigns or grassroots advocacy. via blogs, Twitter, and social networking sites. In
Modern astroturfing campaigns are incredibly 2006, for instance, a travel blog called Wal-Mart-
sophisticated. Many public relations firms main- ing Across America, which appeared to chronicle
tain databases of citizens willing to mobilize for a couple’s cross-country trip in an RV while stay-
various companies and causes. If a voter database ing in Wal-Mart parking lots, was revealed to be
does not exist, consumer lifestyle databases are funded by a front group named Working Families
consulted to locate sympathetic voters located for Wal-Mart and written by employees of the
88 Attention Crash

public relations firm Edelman, who represented Pfau, Michael, Michel M. Haigh, Jeanetta Sims,
Wal-Mart. On Web sites like Yelp and Amazon, and Shelley Wigley. “The Influence of Corporate
astroturfers write glowing reviews. In 2010, a Front-Group Stealth Campaigns.” Communication
government investigation found that iPhone Research, v.34/1 (2007).
game developers were paying the public relations
agency Reverb Communications to post positive
reviews of games in Apple’s App Store, which gave
the impression that the reviews were authored by
disinterested consumers. Governments have also Attention Crash
used the technique. The Chinese government
reportedly trains and funds thousands of com- Nowadays, individuals live in a world governed
mentators to permeate Internet forums and mes- by modern technologies that can be character-
sage boards with progovernment comments in an ized by an abundance of impulses related to all
attempt to shape public opinion. spheres of one’s life. These attention catchers do
In the United States, the Federal Trade Com- not only engage one’s concentration but also one’s
mission’s Guides Concerning the Use of Endorse- reaction, as individuals often have to respond to
ments and Testimonials in Advertising require stimuli quickly and make related decisions rap-
product reviewers, endorsers, and others provid- idly. The increasing plethora of impulses may not
ing testimonials to disclose material connections enrich one’s cognition and knowledge, but on the
such as payments or free products. So by law in contrary, it may lead to attention crash, which can
the United States, Twitter and Facebook users, be defined as the decrease in selective concentra-
bloggers, and individuals writing product reviews tion and wrong allocation of cognitive processes
on e-commerce sites must disclose connections in the face of stimulus appearance.
they share with the seller of the product or ser- Attention crash depends on individual and
vice. This includes celebrities, who often endorse social determinants because one’s attention is
products in traditional advertisements and on shaped by biological, physical, sociological, psy-
Web sites and social networking sites. chological, and cultural factors and consequently,
people have different attention crash thresholds.
Dan Schill The most important factor responsible for atten-
Southern Methodist University tion crash is information overload. Other terms
that are used to describe the excessive quantity
See Also: Campaigns, Digital; Campaigns, of information are, among others: information
Grassroots; Campaigns, Virtual; Deception in explosion, information overkill, information
Political Social Media; Ethics of Social Media in inundation, information obesity, info glut, info
Politics; Flog; Sockpuppets; Viral Marketing. glitz, information dirt, information anxiety, infor-
mation monster, info garbage, and information
Further Readings fatigue syndrome.
Beder, Sharon. “Public Relations’ Role in Information overload happens during novel
Manufacturing Artificial Grass Roots Coalitions.” situations (e.g., travel to a foreign country) that
Public Relations Quarterly, v.43/2 (1998). require new cognitive abilities or quick percep-
Cho, Charles H., Martin L. Martens, Hakkyun Kim, tions of unknown data, as well as in familiar
and Michelle Rodrigue. “Astroturfing Global scripts when an individual has to cope with many
Warming: It Isn’t Always Greener on the Other pieces of information simultaneously. It should
Side of the Fence.” Journal of Business Ethics, be stated that not only information itself, but
v.104/4 (2011). also the speed at which it is offered determines
McNutt, John and Katherine Boland. “Astroturf, attention. Additionally, attention is also shaped
Technology and the Future of Community by linguistic and nonlinguistic elements of mes-
Mobilization: Implications for Nonprofit sages. For example, novel and symbolic language
Theory.” Journal of Sociology & Social Welfare, devices are said to catch attention easier, whereas
v.34 (2007). well-known linguistic tools often foster quicker
Attention Crash 89

cognition and understanding. Taking into account needed. Thus, software and hardware have to
the nonlinguistic dimension of information, issues be upgraded and replaced with newer models,
such as size, color, and employed images may whereas social media offer new functions and
stimulate or hinder one’s cognitive possibilities. opportunities related to their use.
To avoid attention crash, both information cre- Attention crash in relation to social media is
ators and recipients should be involved. Thus, also related to the lack of division between pro-
those who receive information should carefully fessional and private life, between duties and free
select the flow of information intake. At the same time. Individuals check e-mail, write blogs, and
time, information overload exerts responsibility use other social media at work and at home to be
on those who create data because they should be constantly updated about vocational and private
economical as far as their content is concerned. issues. Information overload takes place when
There are different types of information over- people are overburdened due to cyber-based and
load. The first type is called task-related infor- place-based sources of information. Cyber-based
mation overload. It describes a situation in sources of information include information and
which a person has to go through various pieces communication activities taking place with the
of information to find and digest the data impor- use of the Internet, mobile phones, smartphones,
tant for a performed task. Another type is called laptops, computers, personal digital assistants,
message overload, and it appears together with and iPads. Cyber-based information overload
new communication media such as e-mail and mirrors a situation in which a person is exposed
social online networks. This kind of overload is to many messages simultaneously, such as e-mails
connected with the magnitude of messages, each and phone conversations as well as voice and text
related to performing a different activity. The messages. Place-based sources of information are
third type is media overload, which is related to connected with factors not of electronic origin
the vast choice of media as far as channels and and encompass physical environments (housing,
content are concerned. offices, public places), commuting, environmen-
Irrespective of the reasons causing attention tal pollution, and so on. Place-based information
crash, when attention wanes, it may lead to sev- overload is connected to the necessity to deal with
eral short-term and long-term results. First of all, too many professional or private issues with a lack
in the face of being overburdened with impulses, of relaxation. It should be stressed that, although
an individual may have problems with making place-based sources of information have no direct
proper decisions and selecting the right or needed online electronic dimension, they are connected
piece of information. Second, attention decrease with cyber-based information overload.
leads to longer response time or inability to make As far as the domain of politics is concerned,
decisions. Third, it may also have long-lasting attention crash may happen as the result of con-
consequences, such as nervousness and stress. stant exposure to many impulses related to politi-
cal issues. Thus, politicians should remember to
Social Media and Politics carefully select the number of social media and
Attention crash is related to the technological the ways they use them when contacting poten-
advancement of modern times; in the past, indi- tial voters, supporters, or antagonists to keep the
viduals had to handle less information. More- stakeholders interested in their political activi-
over, only a small percentage of people had to ties, as well as to avoid information overload and
deal with information processing on an everyday consequent cognitive problems with selecting and
basis. With the advent of social media and their interpreting political information.
subsequent popularity, the exposure to impulses
has been increasing drastically. Individuals spend Magdalena Bielenia-Grajewska
more and more time relying on and using social University of Gdansk
media. Additionally, the producers in the infor-
mation industry create the need to buy newer and See Also: Addiction, Social Media; Cognitive
newer products that offer more and more sophis- Surplus; Social Computing and Social Information
ticated functions, although some of them are not Processing; Superconnected.
90 Audience Fragmentation/Segmentation

Further Readings Michael Gurevitch, Stephen Coleman, and


Misra, Shalini and Daniel Stokols. “Psychological Jay Blumler state that, in the face of intensified
and Health Outcomes of Perceived Information competition for public attention and information,
Overload.” Environment and Behavior, political news and analysis that might in the past
v.44/6 (2012). have reached the most people in the course of a
Shenk, David. “Data Smog: Surviving the Info Glut.” week’s viewing can be easily missed; they assert
Technology Review, v.100/4 (1997). that channel choices and time-shifting options
Toffler, Alvin. Future Shock. New York: Bantam lead not only to fragmentation of the audience
Books, 1990. but to the emergence of distinct issue publics. For
Van Heghe, Hans. Learning to Swim in Information. example, MTV or Sky Sport viewers might not
Penryn, CA: Ecademy Press, 2006. want to hear about crises in the global economy
or the causes of international tensions, and they
can exclude themselves from exposure to issues
and forms of address that they find unappealing,
disturbing, or mystifying.
Audience Jae Lee conceptualized fragmentation as divi-
sion of the audience into small clusters not com-
Fragmentation/ municating with each other or as the formulation
Segmentation of small and exclusive speech communities, where
members of different communities fail to com-
New technologies and the emergence of the Inter- municate across borders or to hold shared expe-
net have driven the evolution of the concept of riences; he operationalized it as the existence of
audience and inherently interrelated concepts of a common agenda by means of incidental news
audience fragmentation and segmentation. While exposure facilitated by structural factors of online
political speech in past times was almost exclu- communication in the new information environ-
sively a product of an individual’s personal think- ment. Lee asserts that the leaning toward audience
ing and ability to express him- or herself, the fragmentation has arisen as one of the main con-
speaker of today seems to be transformed into a cerns that might undercut a healthy democracy
number of consultants and speech writers, accord- because fragmentation threatens democracy in
ing to Jens Kjeldsen. He asserts that both politi- that it prevents people from sharing public issues
cally and rhetorically this speech has become a and from understanding each other, concluding
polyphonic compromise, and modern media have that (1) several think that higher selectivity in the
added situational complexity, thus obscuring the new information environment will motivate frag-
traditional sense of communicator and audience. mentation in the public, leading to the decline of
As communicators grapple with how to make social cohesion; and (2) an extremely segmented
effective use of social media—often referred to as public cannot discuss common social problems in
Web 2.0—techies are already preparing for Web a constructive fashion, much less agree on meth-
3.0. Web 2.0 is distinguished by Internet users’ ods to solve them.
ability to interact with each other online and to
produce Web content themselves; Web 3.0 will Political Polarization
feature greatly improved interactivity among Political observers are concerned that the frag-
computers, making the Internet much easier for mentation of contemporary news media and the
people to use, says Tom Price. He asserts that proliferation of ideological cable news options
together, social media and mobile devices make may fuel opinion polarization among viewers;
public affairs communication faster and less con- while enabling people to construct ideologically
trolled than ever before, and the impact of new congruent information environments, media frag-
media grows as a rapidly growing stream of users mentation also provides viewers with opportu-
directs their smartphones and tablet computers nities to select their own programming from a
to Facebook, Twitter, YouTube, blogs, and other broad range of alternatives. Still, the implications
social sites. of fragmentation seem quite problematic for the
Audience Fragmentation/Segmentation 91

functioning of American democracy: two strongly population with higher socioeconomic status tend
ideological camps on the left and right of the to acquire this information at a faster rate than
political spectrum, drawing upon entirely distinct the lower-status segments, so the gap in knowl-
bases of information, pursuing distinct political edge between these segments tends to increase
agendas and talking past each other rather than rather than decrease; moreover, using or not using
deliberating toward sound public policies on mat- the Internet is no longer only economic, but even
ters of collective, rather than particular, concerns. more educational.
For instance, most entertainment media programs The amount of content made available by the
or political comedy shows, such as The Daily Internet together with the requirement of active
Show, The Colbert Report, or Saturday Night selection produces a great variety of individual,
Live, like the news they parody, are appealing to content-specific usage patterns, namely: (1) peo-
ever more fragmented audiences. ple with higher education use the Internet for
Maxwell McCombs proposes that it is unlikely informational and service-oriented purposes; and
that a fragmented audience can have constructive (2) people with lower education use the Internet
discussions about the same social issues and reach significantly more for entertainment reasons. Still,
a consensus to solve problems, and the result may Bonfadelli admits that there are at least four barri-
be clearly deleterious for social cohesion and the ers to people benefiting from today’s information
proper functioning of democracy. Lance Bennett society: (1) lack of basic computer skills; (2) bar-
and Shanto Iyengar propose that fragmentation riers to access, especially as these new media are
of the national audience reduces the likelihood of expensive; (3) further barriers because of a lack of
attitude change in response to particular patterns user friendliness; and (4) gaps in the way the Inter-
of news; as media audiences devolve into smaller, net is used, based mostly on education.
like-minded subsets of the electorate, it becomes Lee recognized that changes in the media envi-
less likely that media messages will do anything ronment, exemplified by the prevalence of the
other than reinforce prior predispositions. Internet, have apparently raised the likelihood of
audience fragmentation because people now have
New Technologies and Media an unprecedented number of options for consum-
In the last decade, the media and entertainment ing their preferred media content and channels;
industries have experienced unprecedented levels audiences are indeed more likely to turn to media
of fragmentation, and the driving force behind content specific to their interests under media
this trend is the development of digital technol- conditions with a broader range of choices, and
ogy and the Internet. Lee recognized that new changes in audience behavior lead to inequality
technologies have the potential to drive diversi- in political involvement, such as news media use,
fication. The heterogeneity of public opinion also knowledge, and voter turnout.
grows with an increase in level of education, and
the economics of the media industry and the psy- Social Clusters
chology of the audience work as countervailing Along with changes in technology and the media,
forces of audience fragmentation. there is a greater emphasis on style, packaging, and
In today’s information society, the Internet the aesthetic form and look, and the 1980s also
threatens to divide society into two classes, the saw the emergence of new social clusters such as
information elite and those not linked to the Inter- the yuppie, the career woman, and the new man,
net. It seems to be politically important because according to Christina Goulding, Avi Shankar, and
inequalities in knowledge thus lead to exclusion Richard Elliot. They argue that at the center of all of
from social resources and inequalities in social these changes was consumption, which is increas-
power, as Heinz Bonfadelli claims. However, the ingly a productive process, goal-orientated and
Internet is still more an infrastructure and not a purposeful, and consumption, therefore, becomes
medium in the traditional sense, reaching only a means whereby individuals can creatively con-
small segments of the population. Still, Bonfadelli struct and express the crowd of identities that are
asserts that, as the infusion of mass media informa- open to them; consequently, self-postmodern is
tion into a social system increases, segments of the characterized as Homo consumericus, a creature
92 Audience Fragmentation/Segmentation

defined by consumption and experiences derived. activities. Tom Price writes: “It will accelerate
Of particular interest in contemporary theory are the ability to identify the exact people you want
the concepts of identity, subcultural communi- to communicate with.” Andrew Lipsman and
ties, fragmentation, and the creation of meaning Carmela Aquino assert that social media’s ubiq-
through consumption experiences. Still, Goulding, uity and rise in popularity in recent years have
Shankar, and Elliot argue that fragmentation is one largely contributed to shaping a more social
of the central themes of postmodern approaches environment online—not just among friends,
to consumption, consisting primarily of a series but also between brands and consumers as well
of interrelated ideas: (1) the fragmentation and as candidates and voters. Today, social media
concurrent proliferation of the media; (2) the frag- has become an integral part of the political
mentation of markets into smaller segments; and media landscape, growing as a primary channel
(3) the fragmentation of life, experience, and soci- for campaigns to reach out to their constituents,
ety, for instance increasing political instability, provide open lines of communication, and weigh
increasingly rejection of political authority, and in on the issues of the day (when they can’t get
increasing disintegrating social institutions like on television, of course).
marriage, family, and workplace. Bennett and Iyengar argue that information
channels have proliferated and simultaneously
Mass Media Effects become more individualized, and so it is impor-
Maxwell McCombs argues that it is possible tant to understand if it is still relevant to conceive
that the likelihood of audience fragmentation of mass media or if that concept has been made
cannot be high enough to threaten the persis- obsolete by audience fragmentation and isolation
tence of the common agenda without meeting from the public sphere; under the underpinnings
these two assumptions: (1) The audience-side of communication processes, it is important to
assumption is that a good portion of the public develop research that uncovers changing pat-
that visit diversified Web sites for public affairs terns of content distribution and new audience
information; and (2) the media-side assumption consumption habits. Thus, it is not surprising
or fragmentation hypothesis is the existence of that media economics has emerged as one of the
high heterogeneity in the media agenda across hottest subfields in economics, with important
different news outlets, and they can be tested on spillover into political communication, along
the homogeneity of the media agenda and on the with the growing numbers of studies on bias and
assumption that diversified news media offer a market segmentation based on consumers’ politi-
variety of different agendas. cal preferences, the fashioning of news content to
Still, McCombs recognizes that, the more one targeted consumer segments, and the impact of
investigates the fragmentation hypothesis, the media competition on policy outcomes.
more one will understand two important questions The development of cable television and the
rising with the new information environment: sudden increase of media outlets on the Inter-
(1) whether mass media will still have significant net have created a more fragmented information
effects on individuals’ public lives because the new environment in which cable news, talk radio, and
technologies have eroded the centralized nature 24-hour news outlets compete for attention. For
of mass communication, which raises a question instance, new technologies such as Internet radio,
about the persistence of mass media effects; and MP3 players, podcasting, and satellite radio affect
(2) whether the Internet has positive or negative attitudes and usage of traditional radio, and nat-
effects on people’s knowledge of public issues. The urally with choice comes fragmentation in con-
possibility that new technologies drive the advent sumer activity.
of segmented audiences and lead to society fail- Through social media, companies can target
ing to have a common experience is known as the small groups for conversations about specialized
fragmentation hypothesis, McCombs says. topics, Price adds, and such conversation and
Some foresee enhancement of the ability to relationship-building can nurture networks of
segment and target online participants and to supporters who will listen to company arguments
measure online opinion and the impact of online and may provide a third-party defense when the
Avaaz 93

firm faces criticism. Social media are about the Gurevitch, Michael, Stephen Coleman, and Jay G.
stakeholders, not the company. Ian Morrison, Blumler. “Political Communication—Old and
president emeritus of the Institute for the Future, New Media Relationships.” The ANNALS of the
has said the following: American Academy of Political and Social Science,
v.625 (2009).
A lot of people look at this as another chan- Kjeldsen, Jens E. “Mediated Publics and Rhetorical
nel for advertising and marketing, but they’re Fragmentation.” In Democracy, Journalism
missing the point. The whole issue of social and Democracy: New Developments in an
media is the consumers’ controlling whom they Enlarged Europe. The Researching and Teaching
hang out with. Communication Series. Tartu, Estonia: Tartu
University Press, 2008.
Price argues that to engage in conversations Lee, Jae Kook. Incidental Exposure to News:
effectively, an organization must relinquish some Limiting Fragmentation in the New Media
control of its employees as well. Communicators Environment. Austin: University of Texas at
must be empowered to converse with stakehold- Austin, 2009.
ers in real time, and online discussions will pass Lipsman, Andrew and Carmela Aquino. “The Digital
by any organization that requires every post to be Politico: 5 Ways Digital Media is Shaping the 2012
approved by a lawyer or executive. But employees Presidential Election.” comScore (April 30, 2012).
must be trained for this new challenge, and com- http://www.comscore.com/Insights/Presentations
panies must prepare thoughtfully. _and_Whitepapers/2012/The_Digital_Politico
Nowadays, it makes sense to explore the larger (Accessed June 2013).
democratic implications of a fragmented media McCombs, Maxwell E. “A Look at Agenda-Setting:
environment populated with vastly different audi- Past, Present and Future.” Journalism Studies,
ence segments, Bennett and Iyengar say. More- v.6/4 (2005).
over, the more homogeneous audiences are easier Price, Tom. “Beyond Control: How Social Media
to communicate with due to the similarities of and Mobile Communications are Changing Public
their needs, which justify new audience consump- Affairs.” A Foundation for Public Affairs Report.
tion habits. Washington, DC: Foundation for Public Affairs,
2011.
Jaime R. S. Fonseca
Technical University of Lisbon

See Also: Communication; Evolution of Social


Media; Innovation and Technology; Media and Avaaz
Communication Policy; News Media.
Before the Internet, activist organizations tended to
Further Readings build coalitions around one or a few related issues
Bennett, W. Lance and Shanto Iyengar. “The and use a top-down approach in their decision
Shifting Foundations of Political Communication: making. The Internet, and more specifically the
Responding to a Defense of the Media Effects tools and philosophy behind Web 2.0, now brings
Paradigm.” Journal of Communication, v.60 (2010). a new generation of activism, especially transna-
Bonfadelli, Heinz. “The Internet and Knowledge tional activism. Activist organizations now can act
Gaps: A Theoretical and Empirical Investigation.” much more quickly and work more easily across
European Journal of Communication, v. 17/1 greater distances. Also, activist organizations can
(2002). now distribute decision making across their mem-
Goulding, Christina, Avi Shankar, and Richard bers and can allow members to choose to support
Elliot. “Working Weeks, Rave Weekends: à la carte the causes they find important. Avaaz is
Identity Fragmentation and the Emergence of one of the new generation of activist organizations.
New Communities.” Consumption, Markets and Unlike new activist organizations MoveOn
Culture, v.5/4 (2002). and 38 Degrees, Avaaz is a transnational activist
94 Avaaz

organization. It is one of the largest activist net- enough support it is then sent out to all members
works, with over 20 million members in over 190 via e-mail alerts. The petition is also sent out via
countries. The countries with the largest member- social media to garner more support and poten-
ships are Brazil (3.8 million), France (2.2 million), tially more members. On Twitter Avaaz mainly
Germany (1.2 million), and the United States (1.2 tweets about campaigns and often asks readers to
million). Headquartered in New York City, Avaaz sign petitions and retweet posts. Facebook is used
has offices in 18 cities around the world includ- a little differently. While information on cam-
ing Rio de Janeiro, Madrid, Delhi, and Sydney. paigns is included in posts on Facebook, Avaaz
Avaaz operates using thousands of volunteers also posts activism news from its new activism-
and approximately 50 staff members who use oriented news site, Avaaz Daily Briefings. Avaaz
e-mail, Skype, and more to create a virtual office has 601,000 “likes” on Facebook and 484,000
of activists. followers on Twitter.
The word avaaz means “voice” in Farsi and Once petitions gain enough signatures, some-
has similar meanings in several other languages. times millions of signatures in a few days, the
Through its Web site, Avaaz.org, Avaaz has given subjects of the campaigns, usually government
voice to its members and has launched hundreds or corporation leaders, are shown the petition
of national and international campaigns. Avaaz and signatures to persuade them to take action
provides an online platform for like-minded to address an issue. If they do not respond to the
people to raise support for an issue and then petition, Avaaz then takes action in the form of
persuade governments and corporations with in-person protests, sit-ins, rallies, marches, flash-
online petitions and sometimes in-person pro- mobs and other creative media stunts. Avaaz may
tests. Avaaz members take on a variety of issues also put ads in various media.
ranging from climate change to corruption to For example, in 2011, a petition on sex traf-
human rights at the international, national, or ficking in hotels had gained enough signatures
even local level. and support from Avaaz members to present the
In 2007 Avaaz was founded and initially sup- petition to Hilton Hotel officials. The petition
ported by MoveOn, a progressive online activism with 317,000 signatures requested that Hilton
group, and Res Publica, a British public policy train staff to identify guests who are victims of
think tank. The founding team consisted of sev- child sex trafficking. When Hilton officials were
eral individuals, including founding president and slow to respond, Avaaz said it would put ads in
executive director Ricken Patel. Since 2009 Avaaz the hometown newspaper of Hilton’s chief execu-
has accepted no governmental, corporate, or other tive officer. Hilton agreed to take action.
outside support, relying instead solely on small Since its founding in 2007, Avaaz has taken
donations from its millions of members. As the on other campaigns related to human rights, like
founding architect of Avaaz, Patel, a Canadian, a campaign in response to rapes in India and a
drew upon his past experiences to lay the founda- campaign for funding education for poor chil-
tion for Avaaz. Before Avaaz, Patel worked with dren in Pakistan. Avaaz has also taken on envi-
International Crisis Group, a nongovernmental ronmental issues like climate change and animal
conflict resolution organization, in the war-torn rights, including stopping an international whale-
countries of Afghanistan, Liberia, Sierra Leone, hunting ban from being overturned. Avaaz has
and Sudan. He then volunteered with MoveOn also taken on corruption in countries like India
where he gained an understanding of online activ- and Brazil.
ism. In 2012 Foreign Policy listed Patel as one of In 2011 during the Arab Spring, Avaaz moved
the top global thinkers. beyond petitions for change and took a more
direct role in Syria. Initially Avaaz raised $1.5
Campaigns and Activities million from 30,000 members to support citizen
Campaign ideas come from Avaaz members, not journalism during the Arab Spring. Avaaz began
Patel. Members submit a petition to the Avaaz by sending cameras, satellite phones, and satel-
staff, who then send the petition to a random lite uplink equipment to the protesters in Syria. It
sample of 10,000 members. If the petition gains then sent in people to train protesters on how to
Avaaz 95

Alex Wilks, a representative from the international nongovernmental organization Avaaz, presenting 2,442,240 signatures against
the Anti-Counterfeiting Trade Agreement (ACTA) to the European Parliament’s petitions committee on February 28, 2012. He stands
alongside Green Party Members of the European Parliament Margrete Auken, Sandrine Belier, and Eva Lichtenberger.

use the equipment and how to do citizen journal- states that if Avaaz has an ideology, it is practical
ism to help get the news out to the international idealism, with Avaaz taking action to do good in
mainstream media. Using the network of activ- the world.
ists it developed in Syria, Avaaz also smuggled
in medical supplies and dozens of international William Hart
journalists. And, when those and other journal- Norfolk State University
ists were under fire and needed to leave Syria,
Avaaz helped evacuate them. The journalists See Also: Activists and Activism, Digital;
were safely evacuated from Syria, but 13 Syrian Clicktivism; GetUp.org.au; MoveOn Effect, The;
activists lost their lives in the process. MoveOn.org; Nonprofit Organizations; Syria;
Avaaz has faced criticism for its work, includ- 38Degrees.org.uk; Web 2.0.
ing the criticism that it ventured beyond its capa-
bilities with its actions in Syria. In addition, crit- Further Readings
ics of online activism like Evgeny Morozov have Karpf, David. “Online Political Mobilization From
referred to online activism as slacktivism or click- the Advocacy Group’s Perspective: Looking Beyond
tivism, implying that members of such organiza- Clicktivism.” Policy & Internet, v.2/4 (2010).
tions like Avaaz put forth very little effort and Kavada, Anastasia. “Collective Action and the Social
are not significantly engaged in an issue. Oppo- Web: Comparing the Architecture of Avaaz.org
nents have also claimed that Avaaz is a progres- and Openesf.net.” In Communicative Approaches
sive organization funded by George Soros. Patel to Politics and Ethics in Europe, Nico Carpentier
96 Avatars

et al., ed. Tartu, Estonia: Tartu University identity have become increasingly prominent in
Press, 2009. debates about the politics of virtual worlds and
Kavada, Anastasia. “Engagement, Bonding, and social media, placing avatars in the center of cur-
Identity Across Multiple Platforms: Avaaz on rent political debates about the Internet.
Facebook,YouTube, and MySpace.” MedieKultur,
v.28 (2012). Avatars, Identity, and Representation
Because users construct their avatars, they can
subsequently play with or try on different identi-
ties through their virtual bodies. Users can have
multiple avatars, shifting between selves in a way
Avatars that permits users of virtual worlds to embrace
a kind of digital schizophrenia. Early theorists
An avatar is an online representation of a human of cyberculture argued that the possibilities of
user. The term is derived from a Sanskrit word for online identity enabled by avatars reveal how
the physical incarnation of a Hindu god, first used people’s identities are not stable but are flexible
to describe the digital version of a human user by and constantly shifting. The avatar is not simply
the designers of Lucasfilm’s Habitat, an early vir- a representation but a real manifestation of the
tual world from the 1980s. In Habitat, avatars were fluidity of people’s own identities. Because of
two-dimensional animated figures through which this fluidity, these theorists forecasted a future
users would interact with others and the digital in which racism, homophobia, and other forms
environment. Beyond online worlds, Neil Stephen- of discrimination based on identity would wane
son’s 1992 cyberpunk novel Snow Crash depicted because of the ability to remake one’s identity
a virtual reality called the Metaverse in which an online through disembodied avatars.
individual’s social position was determined by Recent studies have determined that pos-
the appearance of his or her avatar. In these early sibilities enabled by avatars are not as fluid as
examples, an avatar was always a visual, graphical initially thought. Prejudice against fat and non-
representation of a user. In more recent years, ava- white avatars still remains even with the variable,
tar has been used to describe nearly any represen- virtual body of the avatar. Because identity can
tation of a user—textual, visual, or otherwise—not be changed online, marginal identities are often
only in virtual worlds but in forms of social media completely erased in virtual worlds. Rather than
as diverse as Internet forums, blogs, or social net- enabling a more equitable way of understanding
working Web sites. identity through digital representations, avatars
A user constructs an avatar so others can iden- reproduce—if not exacerbate—the prejudices
tify him or her as a unique and distinct individual about identity already present in the offline world.
online. An avatar usually has a visual or textual Because prejudices still exist online, users may
form that is mutable yet remains consistent over choose to represent their identities in ways that
time. Consequentially, it both does and does simply repeat privileged identity categories. If and
not correspond to the physical body of the user when marginal identities are represented online,
behind the screen. A user of virtual worlds often they often are so via drop-down menus that do
identifies his or her real self as the one constructed not permit fluid manifestations of identity. Non-
and embodied online through the avatar. An ava- white and nonmale avatars are often represented
tar grants users the ability to play with, perform, through reductive and stereotypical caricatures,
or otherwise transform identities in ways impos- especially when users pass as a race or gender that
sible for physical bodies, often through a strategic is different from that of their own bodies.
veil of anonymity. This latter attribute of avatars
has been identified as both a political strategy Avatars, Activism, and Anonymity
for a more egalitarian society and a threat to the The anonymity of the avatar, however, still has
democratic potential of the Internet. While early a massive significance for the political agency of
studies of cyberculture celebrated the possibilities Internet users. Avatars in virtual worlds, on blogs,
enabled by avatars, questions of anonymity and and on social networking Web sites permit their
Avatars 97

users to express their personal voices in the face Avatars, however, are not nearly as anonymous
of repressive social and governmental regimes. as often perceived by the users and theorists of
While avatars may erase specific populations social media. Not only does the informatic struc-
from online representation, they also, perhaps ture of the Internet enable the tracking of indi-
paradoxically, enable an individual to manifest as viduals, but also avatars are almost always con-
visible to others while minimizing very real pos- structed within private, for-profit Web sites and
sibilities of violence that minorities and otherwise services that have little interest in challenging
oppressed individuals may face. This use of ava- established governmental and social norms. The
tars is most commonly associated with sexuality, political economy of social media privileges the
gender, and political activism. Gay individuals identification and fixing of identity, not its con-
can out themselves online while remaining clos- tinued fluidity. And, the anonymous nature of the
eted beyond the Internet, protecting themselves avatar is increasingly understood to disrupt the
from very real threats of physical violence. Female possibilities for a democratic civil society fostered
bloggers in the Middle East use the anonymity by the Internet.
of avatars to gain some form of liberation, most A number of recent Internet policy analyses
often through self-expression, while still living have suggested that bodily identity be definitively
under otherwise repressive governmental, social, linked with online representations of the self.
and religious norms. Through avatars, activ- The anonymity of avatars is believed to empower
ists can visibly organize and protest online while cyberbullies and Internet criminals along with
remaining beyond the reach of police power. political dissidents. Avatars that do not represent

In an elaborate example of an avatar based on a human user, as many early avatars were, these U.S. Navy personnel at the Office of
Naval Research at Camp Pendleton, California, in September 2010 demonstrate an apparatus that creates a 3-D avatar of the user for
training purposes. The “mixed reality” training system used here is an Afghan environment “Infantry Immersion Trainer” for U.S. Marines.
98 Avatars

the true bodies and identities of the user are false Further Readings
sockpuppets that can spread disinformation, Blascovich, Jim and Jeremy Bailenson. Infinite
challenging both established governmental order Reality: Avatars, Eternal Life, New Worlds, and
as well as the coherence of activist groups. The the Dawn of the Virtual Revolution. New York:
increasing prominence of these arguments chal- HarperCollins, 2011.
lenges the belief that the anonymity of avatars Bollmer, Grant David. “Demanding Connectivity: The
is a political good. It seems that social network- Performance of ‘True’ Identity and the Politics of
ing Web sites, Facebook in particular, are mov- Social Media.” JOMEC Journal, v.1/1 (2012).
ing toward this understanding of identity in the Hillis, Ken. Online a Lot of the Time: Ritual, Fetish,
policing and regulation of user profiles. While the Sign. Durham, NC: Duke University Press, 2009.
avatar has long been a feature of online social- Morningstar, Chip and F. Randall Farmer. “The
ity—and will most likely continue to be so for Lessons of Lucasfilm’s Habitat.” In Cyberspace:
years to come—its fluidity and anonymity are First Steps, Michael Benedikt, ed. Cambridge, MA:
increasingly problematic in understanding the MIT Press, 1991.
relationship between social media, governance, Nakamura, Lisa. Cybertypes: Race, Ethnicity, and
and political agency. Identity on the Internet. New York: Routledge,
2002.
Grant David Bollmer Stephenson, Neal. Snow Crash. London: Penguin
University of Sydney Books, 1992.
Zittrain, Jonathan. The Future of the Internet and
See Also: Cyberculture; Identity Politics; Internet How to Stop It. New Haven, CT: Yale University
Forums; Second Life; Sockpuppets. Press, 2008.
B
Bachmann, Michele traditional values. Bachmann is notable for her
general strategy of avoiding appearances on
Barack Obama’s deft use of social media as a cor- mainstream news programs, preferring instead
nerstone of his 2008 presidential bid helped him to appear on sympathetic media outlets like Fox
win the election. Social media not only allowed News and Christian-based television and radio
the Obama campaign to build a network of channels. Bachmann generally does not write op-
small donors but also empowered it to appeal eds in national newspapers or appear on main-
to younger and first-time voters, who were bet- stream news. Instead, she shapes her message by
ter able to identify with the candidate through distributing dispatches directly to her social media
social media tools. Through Facebook and Twit- audience through tweets and Facebook status
ter events, these “inexperienced” voters felt a updates. Bachmann’s provocative statements are
stronger connection to Obama the candidate—an ready-made for headlines, news talk programs,
identification that is made more difficult in a tele- and the Twitterverse. Social media allow her to
visual, talking-head context in which the candi- appeal directly to her followers and display her
date is often interviewed by middle-aged media personality, while also engaging her critics, who
elites. The 2008 presidential campaign proved the further circulate her message and draw attention
success of social media as a coalition-building, to her and her positions. Their attacks help Bach-
base-empowering technology. Since the Obama mann to position herself as an outsider, a victim
victory, Republicans have followed suit in taking of a censorious, elite media unconcerned with the
to social media to directly engage their constitu- values of common folks. This strategy works well
encies. Among those who have made good use of at galvanizing her base of social conservatives
social media in recent campaigns is Minnesota who identify as having “traditional,” Christian-
Congresswoman Michele Bachmann. Bachmann centered values.
is also the founder and chair of the Tea Party During her 2010 re-election campaign Bach-
Caucus, a 61-member coalition of Republicans, mann used mobile attack ads against her oppo-
17 of whom were first-term members elected in nent at the Minnesota State Fair—the second-
the 2010 midterm elections. largest state fair in the United States and a prime
Through her use of social media, Bachmann event for elected officials to target a multitude
managed her persona as a political outsider of voters. Her campaign created short, fair-
devoted to her evangelical Christian faith and themed YouTube videos targeting voters at the

99
100 Bachmann, Michele

identified as evangelical. Bachmann embarked


on a bus tour that visited each county in advance
of the caucus. Because caucus rules and proce-
dures are more arcane than are those of the more
straightforward primaries (which proceed much
like a general election does), and because only 15
states hold caucuses for nominating presidential
candidates, they challenge candidates to make
sure voters, especially first-time ones, are famil-
iar with the rules for participation. To this effect,
the Bachmann campaign attempted to make use
of the popular Facebook application Farmville
to help game users spread the word about the
Bachmann campaign. The Bachmann Farmville
application encouraged game players to knock on
the doors of other player’s farms and place vir-
tual Bachmann signs in players’ front yards. It is
unknown to what extent the Farmville venture
was successful in courting younger voters or even
what percentage of Iowans actively played games
on Facebook. The use of Farmville does suggest,
however, that the Bachmann campaign felt com-
fortable enough with social media applications to
employ tactics her rivals did not.
The Bachmann team posted videos from their
Michele Bachmann in October 2011. One theory about her poor bus tour to YouTube to serve as a guide for
showing in the 2011 Iowa caucus after having won the first Iowa spreading the word about the Bachmann cam-
straw poll is that her reliance on social media over traditional paign as well as for how and where to partici-
media left her unable to sustain her momentum with Iowa voters. pate in the caucus process. The YouTube video
strategy also allowed the Bachmann campaign to
save money on the costs of direct mail and televi-
sion ads. This cost-saving gambit works so long
fair. Recognizing that many fairgoers would have as a targeted constituency makes frequent use of
smartphones capable of viewing YouTube content, social media. Bachmann’s campaign floundered
the campaign created videos that asked fairgoers in Iowa as Bachmann followed her first-place fin-
why they should support her opponent, who sup- ish in the first straw poll with a sixth-place finish
ported raising the price of food and drink items in the caucus elections. Evangelical voters were
purchased from food vendors—an omnipresent disproportionately represented in Iowa compared
sight at the state fair. The strategy demonstrated to the rest of the country. Depending upon which
that Bachmann and her campaign staff were able poll scholars rely, evangelicals made up roughly
to capitalize on very specific opportunities. one-quarter of all Republican voters. Bachmann
primarily appealed to these social conservatives.
Iowa 2011 It is not clear why Bachmann went from first to
In the following year, 2011, Bachmann, buoyed finishing sixth in Iowa. It is likely that her over-
by her first-place finishing in an Iowa straw poll reliance on social media, including YouTube, with
measuring support for Republican candidates to its comments section providing space for her sup-
challenge Barack Obama for the 2012 presidential porters to respond to campaign messaging, and
election, began devising her social media strategy her underutilization of paid television spots, and
to appeal to Iowa conservative and Republican more important, her refusal to engage in candid
voters—many of whom, like Bachmann herself, interviews with mainstream news sources limited
Bachmann, Michele 101

her access to likely Iowan voters and lessened her formal announcement came increased press scru-
appeal among big donors. The Bachmann cam- tiny, including the revelation that she and her hus-
paign’s bodyguards reportedly prevented journal- band, a therapist, had separately received generous
ists who were not preapproved to ask her ques- farm subsidies and Medicaid payments, respec-
tions or photograph her. If recent history is any tively. Also in question was whether her husband,
sort of guide, Republicans who appeal to evan- Marcus Bachmann, practiced controversial and
gelicals tend to do well in the Iowa caucus, with discredited “gay conversion” therapy. In addition,
Mike Huckabee winning in 2008 and Bachmann’s Bachmann committed a faux pas in her hometown
rival for the hearts of evangelicals, Rick Santo- of Waterloo when she declared it the home of John
rum, triumphing in the most recent Iowa cau- Wayne, when in fact it is actually the onetime
cus. History also shows these candidates tend to home of serial killer John Wayne Gacy. The popu-
struggle to appeal to a broader coalition of voters lar sentiment circulating around the blogosphere
after the Iowa caucus. Santorum, by all accounts, seemed to call into question Bachmann’s intelli-
relied upon a more traditional media campaign— gence and her mainstream appeal. The increased
including multiple television interviews—to for- scrutiny of Bachmann’s private life prevented her
tify support behind his candidacy. from adequately controlling the message of being
Iowa was a compelling litmus test for the Bach- a political outsider whose interests lie with Ameri-
mann campaign because it demonstrated the cans holding traditional values.
importance of assembling a broad coalition of sup- Bachmann’s messaging—both in social media
porters, including those less conservative Repub- and through planned media appearances—
licans who vote primarily on economic issues. sparked backlash from those not sympathetic
Though Bachmann is an experienced tax lawyer, to her positions. While preparing for candidate
can speak about fiscal policy, and is the darling of debates, Bachmann appeared on the popular late-
many Tea Party members for that reason, she pri- night television show, Late Night With Jimmy Fal-
marily pitches her messages to fellow social con- lon, which was an uncharacteristic media move
servatives. Frequently absent is an explicit appeal for her. Fallon unlikely shared a target audience
to moderate or independent-minded voters. Her with Bachmann. As Bachmann emerged from the
entire New Hampshire staff resigned before the green room to do her segment, The Roots, Fal-
primary there due to concerns about Bachmann lon’s house band, played a cover of a Fishbone
putting too much focus on those selfsame Iowa song “Lyin’ Ass Bitch,” though those lyrics were
voters. Bachmann’s campaign manager resigned not sung during Bachmann’s introduction.
during the Iowa campaign, which further com- The Roots have a history of playing tongue-in-
plicated Bachmann’s ability to appear to be the cheek songs that are topical to the featured guest.
momentum candidate. Without big donors pay- After the show, when the song’s significance
ing for television spots, and with Bachmann’s became apparent to Bachmann, she demanded
near refusal to submit to candid, live interviews, an apology from NBC and further displayed her
her social media strategy for getting out the vote outrage during a subsequent appearance on Fox
was not nearly enough to sustain her momentum News. Fallon issued a tweetpology by tweeting
forged from the results of the first straw poll. his regrets about the introductory song played
during Bachmann’s entrance. The Fallon expe-
Backlash rience challenged Bachmann’s control over her
The New Media Index from the Pew Research Cen- messaging, which was much more difficult to
ter for Excellence in Journalism noted that, after accomplish through broadcast media program-
Bachmann officially announced her candidacy for ming, which appeals to a broad audience. Too, it
president, she was the most popular subject on provides an example of why Bachmann tended to
political blogs as well as being one of the most avoid engaging in those media opportunities. In
popular subjects on Twitter. To be dominant on this regard, Bachmann preferred not to use social
both platforms simultaneously is unusual, though media defensively—that is, to conduct damage
the content circulating among political blogs was control and manage impressions of a gaffe or
almost uniformly negative. With Bachmann’s humiliating media moment after the fact. Instead,
102 Backchannel

Bachmann preferred to use social media to get Pew Research Center Project for Excellence
ahead of her direct-to-constituent message and in Journalism New Media Index. “Michele
thus maintain more control over it. Bachmann.” http://www.journalism.org/analysis
Bachmann also made waves by asserting that _report/3 (Accessed December 2012).
the human papillomavirus (HPV) vaccine causes Preston, Jennifer. “Republicans Shake More Hands
mental retardation and calling for Sharia law, the Using Social Media.” New York Times (December
practice of an ultraorthodox form of Islam, to be 28, 2011).
outlawed in the United States. Perhaps most con- Stolberg, Sheryl Gay. “For Bachmann, Gay Rights
troversially she accused Huma Abedin, a Muslim Stand Reflects Mix of Issues and Faith.” New York
woman who served as deputy chief of staff for Sec- Times (July 26, 2011).
retary of State Hillary Clinton, of having ties to
the Muslim Brotherhood. Many, including noted
Republican leaders John McCain and Speaker
John Boehner, saw this as a baseless attempt to
pass guilt by association. Notably, Bachmann took Backchannel
to Fox News and to her social media accounts to
level the same charge of having associations with The term backchannel refers to any digital commu-
the Muslim Brotherhood against fellow Minne- nications tool that facilitates conversation away
sota representative, and the first Muslim elected from public view. As opposed to Stewart Brand’s
to the U.S. Congress, Keith Ellison. Ellison made famous phrase, that “information wants to be
waves among some conservatives, including Bach- free,” network backchannels provide an architec-
mann, by taking his oath of office with his hand ture within social media for maintaining privacy
placed on the Quran. Despite bipartisan expres- and secrecy. The most common backchannels
sions of disappointment, even outrage, over Bach- are invitation-only e-mail lists operated through
mann’s comments, she did not lose favor with her services like Google Groups or Yahoo! Groups.
constituencies. But, notably, she did not expand Restricted-access threads on bulletin boards and
her constituencies either. moderator-only discussion spaces on large blogs
and wikis also act as backchannels. The central
Conclusion characteristic of backchannels is that they enable
Social media provides unprecedented means for conversation among formal, semiformal, or infor-
reaching and dialoguing with one’s followers. The mal networks while also maintaining barriers to
most successful politicians are able to deftly com- public viewing. Due to the ease with which these
bine both social and traditional broadcast media network backchannels can be formed, they play a
with its diverse audience to build the largest pos- substantial, but hidden, role in social media-driven
sible coalition in order to expand both the breadth political campaigns. Both their existence and the
of their audiences and the depth of loyalty those challenges they create for researchers significantly
audiences hold for them. Bachmann is a unique complicate academic understanding of the Web.
case who seemed, especially after her defeat in
the Republican primaries, to have been concerned Examples
principally with cultivating her loyal constituency. The best-known backchannel is the (now defunct)
JournoList listserv, which was shut down after a
Samuel Boerboom controversial leak in June 2010. JournoList was a
Montana State University Billings Google Group launched in February 2007 by Ezra
Klein, a popular journalist and blogger who then
See Also: Boehner, John; Campaigns, Grassroots; was working at The American Prospect. The list
Campaigns, 2012; News Media; Tea Party Movement. was composed of left-leaning journalists, policy
experts, and academics generally known person-
Further Readings ally by Klein himself. Between 2007 and 2010,
Crowley, M. and M. Scherer. “The True Believer.” JournoList grew to include approximately 400
Time, v.178/5 (2011). individuals. Conversations on the off-the-record
Backchannel 103

list spanned a wide range of topics, from policy board members are displayed on the organiza-
details to sports and entertainment media. Klein tion’s Web site, and it is no shock that they com-
describes the theory behind JournoList as “an municate via e-mail. But, potential members
insulated space where the lure of a smart, ongoing face a much higher barrier to entry. From 2007
conversation would encourage journalists, policy to 2010, JournoList grew to approximately 400
experts and assorted other observers to share people. The Washington Post editorial board’s
their insights with one another.” membership size remained stable.
In June 2010, JournoList e-mails by Wash- The opaque nature of backchannels like Journ-
ington Post blogger David Weigel were leaked oList also make them nearly impossible to study.
to two blogs, FishBowlDC and the Daily Caller. Though it was intermittently mentioned in news
The e-mails featured off-color comments about reports from 2007 to 2010, the list’s Fight Club
conservative activists who were part of Weigel’s Rule meant that scholars, practically speaking,
regular beat. Within days, he was forced to resign could not treat it as an object of study. What’s
from the Post, and leading conservative bloggers more, the ease with which a backchannel listserv
seized on the case as evidence of a liberal media can be constructed makes it impossible to esti-
conspiracy. Conservative commentators viewed mate the size of the backchannel universe. One
the backchannel as a place for journalists to agree month after JournoList was shut down, Jeffrey
upon liberal news frames and squash inconve- Goldberg reported that a new backchannel list
nient stories. JournoList participant, and The had replaced it. As such, network backchannels
Atlantic national correspondent James Fallows, display a Russian nesting doll character—there
countered by asking, “Have you ever been on a can be backchannel lists within backchannel lists,
listserv? . . . It had all of the virtues, and many ad infinitum. These limits on scholarly capacity to
of the faults, of the standard Internet e-mail list.” observe backchannels lead them to generally be
omitted from scholarly discourse on social media.
Key Features
JournoList displays several features common to Criticism
all backchannels. It is a digital instantiation of There are two major critiques of backchannels—
a traditional phenomenon: In decades past, net- one normative, the other practical. The norma-
works of journalists would gather for dinner par- tive critique holds that backchannel lists subvert
ties, or the “boys on the bus” who traveled with the online norm that everything should be public.
the presidential campaigns would meet for beers In online communities and discussion boards that
in their shared hotels. Today, these network ties revel in the free flow and sharing of information,
take on an additional, digitally enhanced form. exclusive backchannel discussions would appear
The creation of a backchannel e-mail list cultivates to violate the norm of publicness. Conservative
the same network-based conversations that have bloggers hold that private online conversations
always occurred among journalistic professionals among journalists and academics constituted a
and their key sources. It is now easier to cultivate breach of journalistic ethics. Social media opti-
these ties, however, and their digital form creates mists who view unchecked online participation as
novel opportunities and threats. a social good may voice concern that backchan-
Network backchannels are publicly opaque but nel lists replicate traditional, exclusive hierarchies
permeable. This makes them distinct from official that the new medium might otherwise subvert.
organizational listservs, which are publicly visible The practical critique holds that, unlike old,
but closed. Most backchannels include a version informal networks of information exchange,
of “Fight Club Rules” that caution list members these lists create digital traces that can themselves
from discussing the list’s existence in public. As be problematic. Weigel’s statements about the
such, a potential backchannel list member is conservatives he interviewed were uncontrover-
unlikely to know of the list’s existence until he or sial in context, but detached from their temporal
she receives an invitation to join. Compare this to and conversational space, they took on a very dif-
the e-mail list for the Washington Post editorial ferent meaning. “Off-the-record” conversations
board. This is a publicly visible entity—editorial left no formal traces in the predigital era. Today,
104 Bahrain

such conversations can be leaked, mined, and Bahrain


exploited in new and troubling ways.
The flood of publicly available social media Similarly to what happened in other countries
activity leads many observers to presume that the that were part of the Arab Spring, social media
dictum, “information wants to be free,” has come played an important role in the 2011 and 2012
to pass. The existence of backchannel lists pro- unrest in Bahrain, which was dubbed the “pearl
vides a rebuke to that presumption. Backchannel revolution” by the media because of the tradition
communications and coordination efforts occur of pearl hunting in the small Gulf nation. Begin-
online but out of sight. For practical reasons, this ning on February 14, 2011, thousands of protest-
leads social media theorists to rarely consider ers took part in demonstrations that culminated
them or factor them into theories of online com- in a month-long occupation of the so-called Pearl
munication. They remain a useful and frequently Roundabout in the capital Manama. In the course
used tool and should be treated as such. of this protest wave, a number of social media,
from social networking sites such as Facebook
David A. Karpf and Twitter to video platforms such as YouTube
George Washington University and Bambuser, as well as blogs, Internet forums,
and chats, were widely used by activists to mobi-
See Also: Antiwar Protesting; Blogs, Role in Politics; lize people, to coordinate among themselves, and
Chat Rooms; Internet Forums; Networks, Political; to inform the news media and audiences both at
Social Network Analysis. home and abroad about the unfolding events.
The Kingdom of Bahrain (which means coun-
Further Readings try of the two seas in Arabic) is a small state com-
Calderone, Michael. “JournoList: Inside the Echo posed of 33 islands on the western coast of the
Chamber.” Politico.com (March 17, 2009). http:// Persian Gulf and is a short distance from Qatar to
www.politico.com/news/stories/0309/20086.html the east and Saudi Arabia to the west. The biggest
(Accessed December 2012). of these islands is Bahrain Island, where the capi-
Fallows, James. “On Today’s Hot Media Stories: tal Manama is located and where the majority of
Sherrod, ‘JournoList.’” The Atlantic (July 21, the country’s 1,234,000 population lives. A for-
2010). http://www.theatlantic.com/politics/ mer colony of the United Kingdom, Bahrain hosts
archive/2010/07/on-todays-hot-media-stories a strategic U.S. naval base where the Fifth Fleet
-sherrod/60210 (Accessed December 2012). is anchored. Similarly to its neighbors, Bahrain
Goldberg, Jeffrey. “Meet the New JournoList, is a very affluent country, with a per-capita gross
Smaller Than the Old JournoList.” The Atlantic domestic product as high as the European Union
(July 21, 2010). http://www.theatlantic.com/ (EU) average. However, wealth is unequally dis-
national/archive/2010/07/meet-the-new-journolist tributed, and most of the economic and political
-smaller-than-the-old-journolist/60159 (Accessed power of the country is in the hands of the Sunni
2012). minority, numbering around 25 percent of the
Karpf, David. The MoveOn Effect: The population, with the Shia majority harboring a
Unexpected Transformation of American number of grievances.
Political Advocacy. New York: Oxford Politically, Bahrain is a constitutional monar-
University Press, 2012. chy, currently ruled by Hamad bin Isa Al Khalifa,
Klein, Ezra. “On JournoList, and Dave Weigel.” who has been on the throne since 2002. Despite
Washington Post (June 25, 2010). http://voices. a slow path of democratization begun with the
washingtonpost.com/ezra-klein/2010/06/ first parliamentary elections in 1973, the king
on_journolist_and_dave_weigel.html (Accessed continues to enjoy almost absolute power in the
December 2012). country. The sovereign appoints all the ministers,
Turner, Fred. From Counterculture to Cyberculture: including the prime minister, is the commander
Stewart Brand, The Whole Earth Network, and the of the military, presides over the court system,
Rise of Digital Utopianism. Chicago: University of and has the power to dissolve the lower house
Chicago Press, 2002. elected chamber and to appoint the members of
Bahrain 105

the upper house of parliament. Almost all the were of Shia origin, and an important role in call-
members of the government, including the prime ing the demonstrations was played by Shia clerics.
minister, come from the king’s family. The repre- But, the movement vehemently rejected the label
sentation of opposition is limited to authorized of sectarianism that was used against it by the rul-
parties, like the Shia el-Wefaq and the secular ing regime. The protesters called in their majority
Wa’ad, while more radical forces like the Haq for an overhaul of the political system in Bahrain
movement are banned. with more power to elective institutions.
Corresponding to its level of wealth, Bahrain
enjoys high rates of connectivity and social media Response
penetration. According to World Bank data, in Faced with the tenacity of the mobilization, the
2011 more than 80 percent of the population Bahraini government tried to placate demon-
was Internet connected. Social media were also strators by making some concessions, including
widely accessed as testified by a 34 percent Face- removing unpopular ministers. But, in mid-March
book penetration rate in the same year, according it launched a full-scale crackdown against the
to the Arab Social Media Report. These figures movement, with the crucial support of Saudi Ara-
put Bahrain together with Kuwait and Qatar bia and United Arab Emirates troops. On March
among the most Internet-connected countries 15, the king declared a state of emergency. On the
in the Arab world and far above countries like following day 5,000 security forces with aerial
Egypt and Tunisia. support and tanks rolling on the ground stormed
the Pearl Roundabout, whose central pearl mon-
2011 Uprising ument was later demolished. Most demonstra-
The 2011 uprising in Bahrain developed on the tors retreated in face of overwhelming force, and
back of the events in Egypt and Tunisia. Moreover, 1,000 were arrested.
the movement built on the experience of previous In the following weeks and months, the gov-
uprisings against the monarchy in the mid-1990s ernment successfully used its repressive force to
and the mid-2000s. A day of rage was called on subdue the movement, arresting organizers, fir-
February 14. This date was chosen for being the ing public employees sympathetic to the move-
10th anniversary of the contested constitution of ment, and erecting checkpoints around poor Shia
2002, which had been imposed by King Hamad villages. But, after a phase of relative latency,
without consultation, and which has been com- with smaller demonstrations in the second half
pared to the constitution of 1973, severely limit- of 2011, the movement made a comeback in the
ing the power of elective institutions. early months of 2012. More than 100,000 took
In anticipation of the first day of protest, calls to the streets on March 9, 2012, in what was
for participation flowed through Facebook pages, publicized as the biggest demonstration since the
Twitter accounts, and blogs, which made up for birth of the movement. Moreover, a number of
the lack of strong opposition from newspapers, protests were scheduled in the run-up to the Bah-
radio, and television. Thousands of protesters rain Grand Prix in April in an attempt to force its
took part in the march, which was immediately cancellation, as happened the previous year.
met with a violent response from police. The fol- In the course of the wave of protest, social
lowing day, demonstrators occupied the Pearl media constituted the medium of choice for the
Roundabout in Manama and set up a protest movement. In advance of the February 14 protests
camp in imitation of Tahrir square. The occu- and in the following days, activists created dedi-
pation continued until the morning of February cated Facebook pages and events to publicize the
17, known as Bloody Thursday, when the police demonstrations. Twitter hashtags like #bahrain,
raided the camp and killed four protesters. #14feb, and #feb14, with messages written both in
After reoccupying the roundabout on February Arabic and English, were used to exchange infor-
19, the movement swelled in the subsequent days, mation and to galvanize morale. Mobile phone
with several marches of more than 100,000 people networks were used to circulate practical infor-
between the end of February and the beginning of mation, such as locations of assembly points and
March. Most of the participants in the movement emergency updates. Videos channeled through
106 Bahrain

YouTube and the live-streaming service Bambuser activists. Possibly the most famous activist tweep
documented the numerous human rights viola- in Bahrain is Zainab al-Khawaja, the daughter of
tions committed by police. Abdulladi al-Khawaja, a prominent activist and
Social media-powered citizen journalism was the cofounder of the Bahraini Center for Human
particularly important in the case of Bahrain Rights. Zainab al-Khawaja maintains a popu-
because of Al-Jazeera’s cold response to the upris- lar Twitter feed in English called @angryAra-
ing. The Qatar-based Arabic broadcaster gave the biya, which counted more than 30,000 follow-
uprising in Bahrain much less coverage and sym- ers in early 2012. Another famous Twitter user
pathy than the uprisings in Egypt and Tunisia, to is Nabeel Rajab (@NABEELRAJAB), cofounder
whose success it had strongly contributed. The with Zainab’s father of the Bahraini Center for
network was accused by Bahraini activists of a Human Rights and its current director, who was
double standard, and commentators argued that sentenced in 2012 to three years in jail because of
Sheikh Hamad, the ruler of Qatar, feared a conta- the content of his tweets.
gion to his own country.
Censorship
Activists The Bahraini monarchy, cognizant of the impor-
Crucial in driving social media campaigning was tant role played by social media in the movement,
the close-knit community of digital activists and has repeatedly targeted digital activists and con-
bloggers who had been developing in Bahrain nected accounts and Web sites. This repressive
since the early 2000s. One of the initiators of this campaign has led Reporters Sans Frontieres to put
activist community was Mahmoud al-Yousif, an Bahrain on its list of enemies of the Internet along-
engineer working in the information technology side countries like North Korea, Iran, and Belarus.
sector who came to be known publicly as BlogFa- Since the beginning of the uprising, many blog-
ther. Since 2005, Yousif used his blog to protest gers and social media activists have been arrested.
against sectarian segregation and to campaign in On June 22, 2011, 21 bloggers went on military
favor of freedom of expression. He soon became trial for a number of charges, including defama-
a target of repression by the state apparatus until tion and insults to the king and the royal fam-
he decided to abandon blogging in 2008. He was ily, inciting hatred against political institutions,
arrested in March 2011, during the crackdown inciting people to commit violent crimes, misuse
against the movement. of social media, and defaming public figures on
Another prominent pioneer of digital activism social media. Eight of them were handed life sen-
in Bahrain is Ali Abdulemam, a computer engi- tences, while the remaining 13 faced between two
neer by profession and the founder of the online and 15 years of imprisonment.
forum Bahrain Online. Established in the late Apart from legal prosecutions, digital activists
2000s, Bahrain Online has attracted tens of thou- have also been subject to police violence, including
sands of members and hundreds of thousands at least two killings. On March 31, 2012, Ahmed
of daily visitors, who debate Bahraini politics Ismael, a citizen journalist who had reported sev-
and society on its numerous discussion threads. eral episodes of police violence on YouTube, was
Since the uprising, the Web site has cast itself as shot dead by a plainclothes policeman. On April 9,
the media center of the revolution and has been 2011, Zakariya Rashid Hassan al-Ashiri, a blog-
banned by the government. Abdulemam, who ger, was killed while in police custody, though the
was arrested in 2010 during a crackdown against official version claimed he had died due to illness.
prodemocracy activists, was released on February The blogger Sayid Yousif al-Muhafdah has been
23, 2011, after a week of protests as a demonstra- reported missing since March 19, 2011.
tion of goodwill from the government, but he was The Bahraini regime has repeatedly attempted
rearrested during the ensuing crackdown. to censor the Internet through its control of BIX,
Besides blogs and Web forums, in recent years the Bahraini Internet exchange. The authori-
social networking sites such as Facebook and ties did not operate a full-scale “kill switch” of
Twitter have been increasingly adopted as pro- Internet communications as in the case of Egypt.
paganda and agitation tools by prodemocracy Nevertheless, Internet connection in the country
Bahrain 107

Women demonstrating for the release of political prisoners in Manama, Bahrain, in the Pearl Roundabout on February 19, 2011,
two days after a government crackdown at the site had led to the deaths of four protesters. That year, Bahrain was one of the most
Internet-connected countries in the Arab world, with over 80 percent of its population online, and with 34 percent using Facebook.

was severely disrupted by state authorities in the as the Gathering of National Unity on February
attempt to weaken movement communication, 22, 2012. Proregime Internet users, suspected
with a study from Arbor Networks observing a of being bankrolled by the regime and its intel-
20 percent slowdown in mid-February 2011. The ligence service, trolled activist pages in an attempt
government targeted activist accounts on live- to intimidate prodemocracy activists. Pictures
streaming Web sites like Bambuser and antigov- of prodemocracy demonstrations posted online
ernment pages on Facebook. Moreover, it blocked were used to identify famous personalities among
chat services like PalTalk and Internet-based chats the protesters, including football players, artists,
and forums like Bahrain Online, which were used and academics and to shame them publicly.
by activists to communicate. A number of Web At the end of 2012, the prodemocracy move-
sites denouncing human rights abuses were closed ment in Bahrain continued to remain active in the
down since the start of the protests, with only a face of overwhelming state repression. The regime
handful of them being unblocked in early 2012. had unsuccessfully attempted to initiate a dialogue
Apart from censoring prodemocracy commu- toward reconciliation with the opposition, and
nications, the regime of King Hamad has also the conflict remained unsolved. Notwithstanding
tried to turn social media mobilizing potential in the arrests, killings, torture, and intimidation, the
its own favor. Supporters of the regime created community of digital activists and social media
Facebook pages and Twitter accounts that were activists that has played a crucial role in the upris-
used to publicize loyalist demonstrations, such ing also continued to be active and to maintain a
108 Bambuser.com

number of channels to fuel dissent and organize this, the company provides its services for free to
protest against the regime. charitable organizations and individuals. How-
ever, news organizations and corporations that
Paolo Gerbaudo use Bambuser must purchase a premium service.
King’s College London In 2012, the Associated Press (AP) partnered
with Bambuser after using its footage for more
See Also: Activists and Activism, Digital; Al Jazeera than three years; the agreement allows the AP to
Effect; Arab Spring; Countries Banning Social Media distribute footage from Bambuser’s users to major
for Political Reasons; Egypt; Middle East; Tunisia; media outlets. So far, the AP has used crowd-
WikiLeaks/Arab Spring; YouTube. sourced Bambuser footage in its coverage of sev-
eral high-profile events, including the civil war in
Further Readings Syria and the 2013 Boston Marathon bombings.
Bassiouni, M. Cherif and Nigel S. Rodley. Report of In 2011, the Bambuser app was one of the
the Bahrain Independent Commission of Inquiry. most popular apps downloaded on smartphones.
Bahrain Independent Commission of Inquiry, 2011. Although Bambuser.com is not the only service
http://globalhighered.files.wordpress.com/2011/12/ that allows users to stream live video, it has
bicireporten.pdf (Accessed December 2012). gained popularity due to its ease of use. To use
Colangelo-Bryan, Joshua. No Justice in Bahrain: the service, an individual first creates an account,
Unfair Trials in Military and Civilian Courts. and then downloads the Bambuser app. Then, the
New York: Human Rights Watch, 2012. user is able to stream video from a smartphone;
Louër, Laurence and John King. Shiism and Politics moreover, the app allows users to steam even in
in the Middle East. New York: Columbia low-bandwidth environments.
University Press, 2012. In addition to its streaming video app, Bam-
Noueihed, Lin and Alex Warren. The Battle for the buser also maintains a Facebook page, a Twitter
Arab Spring: Revolution, Counter-Revolution and feed, a blog, and an online video archive. The
the Making of a New Era. New Haven, CT: Yale company’s founders use social media to update
University Press, 2012. users on the role of the service in broadcasting
from global conflicts.

Use by Activists
Although most Bambuser.com users employ the
Bambuser.com service to share personal videos, the company has
become a tool for activists and citizen journal-
Bambuser.com is a video streaming service that ists, especially in the Middle East. Specifically, in
allows users to record, share, and watch live several countries that have experienced political
video captured by cell phones and computer cam- uprisings during the Arab Spring, activists have
eras. These videos can also be shared on popular used Bambuser to document government atroci-
social media Web sites such as Facebook, Twitter, ties and political corruption.
and Tumblr. Although the Bambuser application For example, in Egypt during the 2010 par-
(app) was initially designed for social use, politi- liamentary elections, activists uploaded videos
cal activists in the Middle East have used the ser- documenting large-scale election fraud; 10,000
vice to document government wrongdoing. videos were uploaded in a single day. In January
Bambuser.com was founded in Stockholm, 2011, during the massive protests in Cairo against
Sweden, in 2007 by 12 self-described “ninjas”; the regime, activists used the service to docu-
the company is still run by its small staff, and ment police brutality; subsequently, the Egyptian
currently operates an additional office in Fin- government shut down access to Bambuser. In
land. According to Bambuser’s Web site, its mis- response, Bambuser set up a channel devoted to
sion is to provide an easy and inexpensive way airing video footage from the protesters. After
for individuals to “share moments with the world the collapse of the Hosni Mubarak government,
through real-time video.” In accordance with Egyptian activists used Bambuser to document the
Berkman Center 109

November 2011 parliamentary elections. Prior to Berkman Center


the elections, two of the founders of Bambuser
traveled to Egypt to help train activists to use the The Berkman Center for Internet and Society is
service to monitor for fraud. a research center at Harvard University whose
Antigovernment activists in Syria have also used mission is to understand and explore cyberspace.
Bambuser’s streaming services since the start of the It was founded in 1998 at Harvard Law School.
civil war in March 2011. Opponents of the regime Berkman Center focuses on the study and assess-
of President Bashar al-Assad used the service to ment of cyberspace’s development and dynamics
document events such as funerals, bombings, and as well as on relevant laws and sanctions. More-
attacks on civilians by government forces. Although over, it is interested in the relation and interaction
the Syrian government has banned Bambuser and of Internet-related technologies with society. The
arrested those who have the app on their phones, center’s research is used to further develop Inter-
users have relied on satellites or wireless networks net potential and to assess Internet-related law. As
in Jordan and Turkey to stream video. is underlined on the center’s homepage:
Overall, most of the live-stream videos from
Syria are submitted by men ages 12 to 20. In addi- We are a research center, premised on the
tion, one of Bambuser’s busiest times is Friday observation that what we seek to learn is not
afternoons, the Muslim day of prayer, since many already recorded. Our method is to build out
activists stream footage of demonstrations in the into cyberspace, record data as we go, self-
streets as people leave mosques. study, and share. Our mode is entrepreneur-
Since it is difficult for journalists to cover the ial nonprofit.
Syrian conflict, videos taken by Bambuser users
from Syria have been shown on many major news Berkman Center is actually the successor of
networks, including the BBC, CNN, AP, and the Center on Law and Technology, which was
Reuters. For example, one Syrian activist broad- founded in 1996 by the Harvard Law School pro-
casted live during a mortar attack in Homs; this fessors Jonathan Zittrain and Charlie Nesson.
video was broadcast on 80 networks and was Based on a donation given in 1997 by the Berkman
shown 600 different times. Bambuser has been family, who owned the communications company
used by other activists in the Middle East, and The Associated Group, the center changed its
was temporarily banned in both Bahrain and Tur- name to Berkman Center for Internet and Soci-
key. It has also become an outlet for anti-Vladimir ety at Harvard Law School in 1998. Apart from
Putin supporters in Moscow, and has been used by the Berkman family donation, the center receives
Occupy Wall Street protesters, who hope to docu- financial support from foundations, corporations,
ment inappropriate police conduct. private donors, international organizations, and
government entities. All corporate donors agree
Kelly A. McHugh to give their funds as unrestricted gifts, for which
Matthew Geras there is no contractual agreement and no prom-
Florida Southern College ised products, results, or deliverables. This policy
complements the overall policies of Harvard Law
See Also: Activists and Activism, Digital; Arab School and Harvard University.
Spring; Bahrain; Egypt; Streaming Media; Syria. The center’s overall mission and organization is
shaped by its board of directors, which are all fac-
Further Readings ulty members. The Berkman Center community
Bambuser.com. “About Us.” http://bambuser.com/ consists of a network of faculty members (full-
about (Accessed July 2013). time staff and faculty associates), around 30 fel-
Shanley, Mia. “Live From Syria: Swedish Streaming lows each academic year, more than 100 students
Site Gains Followers.” Reuters.com. http://www each year from a range of schools and disciplines,
.reuters.com/article/2012/10/02/us-sweden lawyers, entrepreneurs, and visual architects who
-bambuser-idUSBRE8910D620121002 (Accessed all engage with the challenges and opportunities of
July 2013). cyberspace. The center offers classes, workshops,
110 Berkman Center

and conferences. It hosts Internet-related events rich and invaluable information. The project
and visiting lecturers. It offers various Web pres- attempts to bypass content control and censor-
ences reached by millions of visitors from around ship of various facts. In addition, the center is
the world. All Berkman events, including confer- also preoccupied with research on the interaction
ences, talks, and so on are Webcast, and most between different fields of social sciences. The
of them are also available either on Berkman.tv metaLab(at)Harvard is a newly founded experi-
or on Berkman’s YouTube channel. It publishes mental research unit that focuses on arts, media,
books by faculty members and fellows in the and humanities. One of the lab’s major projects
Berkman publication series, academic research has been the extraMUROS. It is an open source
papers, policy papers, and blog spots. Further- HTML5 platform for creating interactive docu-
more, the center’s monthly newsletter on Internet, mentaries and new forms of storytelling.
law, and policy, The Filter, has a steadily growing In 2011, the center launched the Youth and
readership of more than 17,000 subscribers; more Media Lab. This is a youth-driven research-and-
than 8,000 people receive the weekly Events and development lab that concentrates on the media
Digital Media Roundup. Last but not least, the literacy and digital empowerment of young peo-
center offers fellowship and summer internship ple. Its aim is to stimulate initiatives around youth
programs. and technology. The lab is a meeting point for
Berkman Center enjoys a global reputation for different strands of research. The lab’s activities
cutting-edge research on Internet-related areas. include exploratory research, curriculum build-
There are three basic areas of inquiry: law, tech- ing, development of new tools, and peer teach-
nology, innovation, and knowledge; the relation- ing. The Internet Law (iLaw) program was also
ship between the Internet and civic activity; and launched in the fall of 2011 and was an intensive,
technology, law, and development. In the first week-long Harvard Law School program and
field of study, the center’s researchers try to find course. The program focused on the development
ways to balance between the need for innovation of the cyberlaw curriculum. It involved the revi-
in new technologies and the need to secure broad sion of important aspects of cyberlaw.
public access to these new technologies. In the Among the most eminent projects are that of
second area of inquiry, the center seeks to con- the Digital Public Library of America (DPLA) and
tribute to the ongoing discussion about the Inter- StopBadware. DPLA was launched in December
net’s impact on democracy. Issues like the Internet 2010. The project aims at designing a large-scale
promoting political participation and democratic digital public library accessible to all. In order to
dialogue are in the epicenter of various adversary find effective strategies to achieve this, the center
discussions. The third area of inquiry examines has brought together experts from cultural and
the impact of technology in developing countries. educational organizations, librarians, authors,
Access to the Internet and consequently to more publishers, and state and local government,
information could probably boost economic among others. In 2006, Berkman Center estab-
growth and enhance educational opportunities. lished the nonprofit organization StopBadware,
whose aim is to stop spyware, viruses, and other
Projects threats on the Internet. StopBadware envisions
The Berkman Center runs a number of prominent building a safer Web. Since 2010, it functions as a
and innovative projects. Indicatively, the follow- stand-alone organization.
ing are some of the most well known. Within the The programs mentioned here are only
context of research concerning the relationship some of the many that the center has launched
between the Internet and civic activity, the cen- (Media Cloud, H2O, ProjectVRM, Public Radio
ter works on the creation of the Internet Moni- Exchange, etc.). The Berkman Center for Inter-
tor. This project is about gathering and evaluating net and Society at Harvard University contin-
data from multiple sources. It then offers the data ues research on the development and design of
freely available online, functioning as an online methods and tools to further enhance the knowl-
fact base. This base will provide policy makers, edge and the use of Internet technologies. Dur-
digital activists, students, and many others with ing the last years, the center has seen continuous
Big Data 111

growth. In May 2008, it was elevated to a major, sets provide researchers with large amounts of
university-wide, interdisciplinary center also information on many topics, ranging from demo-
known as Interfaculty Initiative. Since July 2006, graphics and psychographics to social networking
the center has been located in the second floor statistics. These sets are often made usable and
of a renovated, wood-frame house at 23 Ever- archived through data mining techniques.
ett Street in Cambridge, Massachusetts. The Thomas H. Davenport, Paul Barth, and Randy
Berkman Center inspired the launch of further Bean identify the many forms of big data, includ-
research centers, such as the Stanford Center for ing “clickstream data from the Web, social media
Internet and Society, the Oxford Internet Insti- content (tweets, blogs, Facebook wall postings,
tute, the NEXA Center for Internet and Society etc.) and video data from retail and other set-
at the Polytechnic University of Turin, and many tings.” Big data also refers to any digitally archived
others. Berkman Center maintains a fruitful col- information, ranging from recorded content from
laboration with the NEXA Center, the Keio Uni- telephone call centers to biological data from lab-
versity in Japan, and other research centers and oratories. Because the term big data refers to so
educational institutions around the world. many different types of data sets, standardization
of meaning and analysis is rare across disciplines.
Anastasia Veneti Big data collected from social media include
University of Athens the recording of user-generated content such
as Facebook posting, tweets, user preferences,
See Also: Born This Way Foundation; Center shared links, and profile information. Big data
for Innovative Media; Cloud Computing; Digital sets also typically record other less obvious mea-
Cultures Research Centre; MIT Media Lab; Oxford sures, such as time spent lurking, deleted content,
Internet Institute. and geotracking locations. This information is
stored in large servers and databases, and is some-
Further Readings times only accessible with the owner of the social
Berkman Annual Report for Academic Year 2010– media’s permission.
2011. http://www.law.harvard.edu/programs/ Barbara Trish declared 2012 the year of big data
reports/1-2010-11_berkman_web.pdf (Accessed in politics based upon the way the U.S. presiden-
December 2012). tial campaigns of Barack Obama and Mitt Rom-
Berkman Center for Internet and Society. http://cyber ney used large data sets to connect with voters and
.law.harvard.edu (Accessed December 2012). influence public opinion. The Obama re-election
Berkman@10 Special Annual Report. “A Decade of campaign used big data sets derived from Twitter
Exploring Cyberspace, Sharing in Its Study, and and Facebook to personalize messages, track issue
Pioneering Its Development.” (December 1, 2007). efficacy, and target specific segments of the larger
http://cyber.law.harvard.edu/sites/cyber.law.harvard U.S. population. The Romney campaign used big
.edu/files/Berkmanat10report.pdf (Accessed data to identify potential donors and supporters
December 2012). based upon social media information such as pur-
chasing history and religious affiliation.

Controversy
Maurice Vergeer writes that new innovations
Big Data in data collection and interpretation represent
new possibilities in understanding the role of the
MaryAnne Gobble writes that the definition of big Internet in politics. However, not all researcher
data is multifaceted, ambiguous, and dynamic, perspectives support such an optimistic view.
suggesting the term has different meanings While the information sciences have made great
between academic disciplines and practitioners. advances in the interpretation and use of big data,
Put simply, big data sets are too big because of traditional social-political science approaches still
their volume, speed of information or velocity, or favor small-data and theory-driven approaches.
because of the variety in the type of data. Big data Vergeer proposes the real advancement in social
112 BlackPlanet.com

and political research will only occur when the is an acceptance of big data analysts that there is
two oppositional approaches work together and inaccuracy within the information collected.
support each other’s inquiry. The future of big data collected from social
The development and integration of big data media for politics is uncertain, although the suc-
in the 2012 election also invoked debate between cess of its use in the 2012 U.S. presidential elec-
strategists about the potential future of politics. tion suggests that it is an important tool in cam-
The collection and documentation of private paigning. As John Timpane reflects, social media
information makes up the majority of concerns and big data sets help politicians find votes and
regarding the ethics of big data. If social media turn potential voters into supporters. Big data is
data is private, archiving and collecting this infor- a tool and likely a new frontier in politics and
mation is an invasion of one’s privacy and can be campaigning because of the vastness of the data
deemed unethical. Alternatively, if social media it can provide.
data is public, archiving and collecting such infor-
mation is ethical. Alison N. Novak
Alternatively, debate surrounds access and use Ernest A. Hakanen
of big data in politics. Big data sets derived from Drexel University
social media giants such as Facebook or Twitter
are costly, meaning that political campaigns with See Also: Data Mining; Mobile Media User Data
smaller budgets are often unable to purchase the Collection and Privacy Protection; Obama for
information. What the data sets are used for is America iPhone Application; Open Data.
also of concern. Joe Turow writes that informa-
tion gathered from big data sets is beginning to Further Readings
be used by online retailers who adjust prices to Davenport, Thomas H., et al. “How Big Data
meet specific socioeconomic information about Is Different.” MIT Sloan Management Review,
individuals. This means that pricing is becom- v.54/1 (2012).
ing more individualized and customized to what Gobble, MaryAnne. “Big Data: The Next Big
retailers believe an individual should be charged. Thing in Innovation.” Research Technology
Turow also notes that news Web sites are also Management, v.56/1 (2013).
starting to customize the display of news articles Timpane, John. “High Tech, Old School Politics Won:
to match what they believe individual viewers Team Obama Mined Valuable Data, But Also
will most likely read. Specifically, political cam- Went Door to Door.” The Philadelphia Inquirer
paigns use big data sets to create personalized (November 11, 2012).
or targeted advertisements to appeal to users. Trish, Barbara. “The Year of Big Data.” Campaigns
Just as news media that personalize headlines to & Elections, v.314 (2012).
reflect what they think will appeal to viewers, Turow, Joseph. The Daily You: How the Advertising
language, images, and messages are being cus- Industry Is Defining Your Identity and Your Worth.
tomized based upon the information gained by New Haven, CT: Yale University Press, 2012.
big data sets. Turow suggests this is problematic Vergeer, Maurice. “Politics, Elections, and Online
because possible inconsistencies may develop Campaigning: Past, Present . . . and a Peek Into the
from such customization. Future.” New Media and Society, v.15/9 (2012).
Critics are also skeptical due to the size and vol-
ume of big data sets. Vergeer writes that there is
a tradeoff for volume over accuracy that plagues
the collection and use of big data. In order to ana-
lyze such large data sets, generalizations about BlackPlanet.com
social media indicators such as relationship status
and political orientation can potentially be misin- Launched in 1999 by Omar Wasow and Benja-
terpreted. For example, big data sets cannot dif- min Sun, BlackPlanet.com is a social network
ferentiate when a child is browsing the Internet site (SNS) that was initially started as an entity
on his or her mother’s computer. Therefore, there to connect its members to potential jobs and
BlackPlanet.com 113

relationships. However, over time BlackPlanet was not African American owned, it was a cultur-
.com has built an online community of roughly 20 ally sensitive operation that operated a control-
million members and become an important forum ling interest in other minority SNSs, such as Asian
for other social and political issues of importance Avenue.com, the English-language Latino entity
to the African American community. Historically, MiGente.com, and the gay site GLEE.com. Yet,
black social networks in the form of fraternities, BlackPlanet.com, along with MiGente.com and
sororities, and other organizations have been an AsianAvenue.com, were seen as so profitable by
important source of empowerment for African 2008 that they were purchased by Radio One, an
Americans. Prior to BlackPlanet.com’s emergence, African American media company, for the sum of
other social network sites were launched to focus $38 million.
on marketing to the African American commu-
nity, such as The Drum (1988), Melanet (1989), Civic Engagement
and NetNoir (1995), and they, along with others, Prior to the launch of Myspace and Facebook,
represent a generation of black online entities that BlackPlanet.com was active in regard to civic
catered to specific audiences prior to and after the engagement in the African American community.
Internet became commercially viable. In regard to For example, BlackPlanet.com currently engages
BlackPlanet.com, it was and is a pioneer in minor- in raising money for programs involved in public
ity social media ownership, civic engagement, and education, has raised funds for projects related to
social media ethics. earthquake or tsunami relief, and also promotes
a Riser of the Month reward, which recognizes
Minority Ownership members that are social or community advocates.
Historically, in the area of traditional media, However, one of the more memorable accounts
minority ownership and employment has faced of civic engagement on the site was when then-
challenges and, in recent times, have even declined. presidential candidate Barack Obama became a
Previously, during the civil rights movement and member of BlackPlanet.com and was able to gain
social disturbances that followed, the Kerner Com- close to 200,000 friends within 10 days.
mission successfully argued for greater minor- Many of the members of BlackPlanet.com
ity participation in ownership and employment were also members of Myspace or Facebook, and
opportunities. Yet, by the 1990s and the passage these socially connected networking sites helped
of the Telecommunications Act of 1996, the own- Barack Obama organize a constituency under
ership of minority media began to decline due to the auspices of the Obama campaign, which
consolidation of broadcast media and the under- transcended national borders. For example, the
collateralization of minority-owned outlets that Obama campaign’s use of online SNSs such as
struggled during economic downturns. However, My.BarackObama.com, Facebook, and others
the advent of new media technology provided allowed the viral explosion of an unsolicited Web
opportunities in entrepreneurship and innovation. video called “Yes We Can,” by will.i.am (Wil-
BlackPlanet.com and other minority SNSs liam James Adams), a member of the music group
emerged in the 1990s as entrepreneurial opportu- Black Eyed Peas. What started as a campaign
nities in response to what some scholars referred from the North American region for Obama was
to as the digital divide. For example, recent stud- also exhibited in the Caribbean community with
ies indicate that African Americans more than overwhelming presence in polling data and musi-
any other ethnic group receive most of their news cal creations reflecting this support in Jamaica
from the Internet and also represent, as recently as and Trinidad and the other locales in the region.
2010, a disproportionate number of users on the The Obama campaign represented an impor-
SNS Twitter. Therefore, the launch of BlackPlanet tant turning point, geographically speaking,
.com by Omar Wasow and Benjamin Sun, the chief among peoples of African descent in Western
executive officer of Community Connects Inc., society in relation to the nexus between civic
remains a historical example of where economic engagement and the cybersphere. Thus, SNSs like
success merged with social advocacy. Although BlackPlanet.com and others have utilized the digi-
Community Connect, the majority stakeholder, tal processes available today that have collapsed
114 Blog for America

awareness. Second, this approach of SNSs to vir-


tual identity construction allows users to choose
their identities, although this fact or practice can
still influence users to take into account the dom-
inant social norms of racial or gendered labels.
Finally, with regard to social media ethics, Black-
Planet.com will likely be among the SNSs that
will respond to the rapid change of technological
innovation in relation to their various constitu-
encies who are engaged in networking, commu-
nity service, and economic advancement in their
respective locations.

Reynaldo Anderson
Harris-Stowe State University

See Also: Campaigns, Presidential (2008);


DemocracyforAmerica.com; Meetup.com; Race/
Ethnicity and Social Media; Townhall.com.

Further Readings
Anderson, R. and K. Harris. “Black History Dot
Com: The Role of Social Media Technology in
Will.i.am’s “Yes We Can” video plays via YouTube projected onto Linking the Black Atlantic in the Barack Obama
a screen above a crowd during an Obama campaign event led by Campaign.” In Migration, Technology, and
Michelle Obama on February 3, 2008, at San Jose State University. Transculturation: A Global Perspective, Myna
German and Padmini Banerjee, eds. St. Charles,
MO: Lindenwood University Press, 2011.
Byrne, D. “Public Discourse, Community Concerns,
time and space on a national and global scale to and Civic Engagement: Exploring Black Social
such a state where change is globally synchronous Networking Traditions on BlackPlanet.com.”
or occurring at the same time in several spheres Journal of Computer-Mediated Communication,
and locations, influencing history and shrinking v.13 (2008).
geographical distances that previously prohibited Nakamura, L. Cybertypes: Race, Ethnicity,
civic engagement. and Identity on the Internet. New York:
Routledge, 2002.
Social Media Ethics
Interestingly enough, BlackPlanet.com has
become an example of how the identities chosen
by online users of SNSs exemplify the relationship
between technology and avatars (virtual represen- Blog for America
tations) and the tension between a previously uni-
tary identity and a virtual identity that operates Blog for America was from March 2003 to March
under a different set of laws and hierarchies. For 2004 the official title of the campaign Weblog of
example, previously constructed social identities Howard Dean, at the time a candidate in the U.S.
were in response to earlier conventions of norms Democratic Party presidential primaries. It was
and stereotypes, whereas the Internet allows for arguably the most important campaign blog in
a collaborative approach to identity that does the 2004 elections, and it constituted the engine
not necessarily conform to previous cultural log- behind the improbable run for the U.S. presi-
ics or explanations or that conform to common dency of the former governor of Vermont, a then
Blog for America 115

relatively unknown figure on the national political for America had enabled Dean supporters to take
stage. Heralded as a revolutionary campaign tool an active role in the campaign and to be involved
capable of fostering community action, Blog for in the decision making of the campaign, thus
America failed, however, to gather sufficient voter feeling motivated, believing they were making a
support for Howard Dean, who exited the presi- difference, gaining a sense of community previ-
dential race after unsuccessful bids in the Iowa ously possible only for local elections, and forever
and New Hampshire primaries. Scholarly assess- transforming political campaigns. Campaign blog-
ment of Blog for America has ranged from regard- gers were cited in these articles calling Blog for
ing it as a vehicle for enhanced civic involvement America a new form of open source campaigning,
with potential to counteract the negative effects of because of its conversational tone and its interac-
television on the political process to viewing it as tive possibilities, and also calling blogs the new
a form of discourse inviting antagonism and thus town hall meetings, because of their potential for
risking to polarize society and to weaken demo- debate and participation. However, the limits of
cratic culture. the blog’s effectiveness were seen in the Iowa and
Blog for America was launched by the Dean New Hampshire primaries, in which the online
campaign on March 15, 2003, with a post by energy was not translated into voter turnout.
campaign manager Joe Trippi, who explained After a disappointing third place in the Iowa pri-
that it was intended as a place for the campaign mary and a catastrophic second place in the New
to let people know when, where, and how they Hampshire primary (at least partially attributable
could help, thus to get as much support as pos- to his scream during the Iowa concession speech),
sible from the grassroots. The frequency of blog Dean ended his candidacy for the U.S. presidency.
postings by campaign staffers Matthew Gross,
Zephyr Teachout, Clay Johnson, and Nicco Mele Analysis
increased from 17 during March 2003 to 140 Researchers examining various aspects of Blog
during May 2003 and further to 300–400 each for America have been far from reaching consen-
month between June 2003 and February 2004. sus regarding the blog’s format, functions, mean-
The blog became increasingly successful as people ings, or impact. In 2005, researchers Matthew
began checking the information placed there, and Kerbel and Joel Bloom mirrored 2003 journalists’
Dean started to establish himself as an outspoken conception that Blog for America had been an
anti-establishment candidate. However, the blog authentic virtual community and not just a mere
surged in popularity after June 10, 2003, when conveyor of information. These scholars added
Blog for America introduced the ‘‘moveable type’’ that the blog had become an alternative to mass
software that allowed viewers to write comments media through its focus on partisanship and advo-
in response to the campaign posts. Soon thereaf- cacy. They saw it in the tradition of the 19th-cen-
ter, comments grew from several a day to thou- tury press, which boosted voter mobilization and
sands a day, and the blog reader community grew helped support many worthy civic causes, instead
from thousands to hundreds of thousands. Blog of a focus on objectivity and balance, which came
for America became not only a campaign infor- much later and were an imperfect response to the
mation hub but also a policy discussion portal, necessities of mass marketing.
with added capacity for being a recruitment, con- However, in 2006, Jennifer Stormer-Galley and
sultation, mobilization, and fund-raising instru- Andrea Baker disagreed that Blog for America con-
ment for the Dean campaign. stituted a truly interactive forum. After describ-
ing how the red bat, which went on to become
Impact a powerful symbol of the Dean campaign (repre-
It is thus unsurprising that in late 2003 and early senting Dean’s projected success in the race and
2004 the mainstream media paid much atten- the campaign’s success in fund-raising activities),
tion to the Blog for America phenomenon. At the was first suggested on the blog but finally adopted
peak of Dean’s fame, journalists from the Boston for a campaign event only after a supporter made
Globe, the Washington Post, the New York Times, a phone call to campaign staffers to ask whether
and the Pittsburgh Post-Gazette agreed that Blog they were listening to online suggestions, these
116 Blog Storm

scholars asked whether citizens and staff were Justice, Glen. “Howard Dean’s Internet Push:
talking “with” one another or “at” one another. Where Will It Lead?” New York Times (November
They contended that the Dean campaign primarily 2, 2003).
used the blog to facilitate parasocial interaction, Kerbel, Matthew R. and Joel David Bloom. “Blog
an illusion of face-to-face relationship, in this case for America and Civic Involvement.” The
employed for scoring political points, rather than Harvard International Journal for Press/Politics,
using the blog to assist in mobilization for action, v.10/4 (2005).
which would have been truly transformational. Kreiss, Daniel. “Open Source as Practice and
James Janack stated that while the Dean cam- Ideology: The Origin of Howard Dean’s
paign may have been willing to relinquish some Innovations in Electoral Politics.” Journal of
control over its message, thus opening up the Information Technology & Politics, v.8/3 (2011).
possibility for dialogue, the participants on the Reston, Maeve. “A Wired Dean Is Altering Conduct
blog (many of whom were ardent Dean support- of Politics.” Pittsburgh Post-Gazette (November
ers) exercised that control themselves by tagging 16, 2003).
opponents to Dean as “trolls” and disciplining Stromer-Galley, Jennifer and Andrea B. Baker.
such opponents by means of either ignoring or “Joy and Sorrow of Interactivity on the Campaign
excluding them. Trail: Blogs in the Primary Campaign of Howard
Benjamin Warner goes even further with deny- Dean.” In The Internet Election: Perspectives on
ing the merits of Blog for America by asserting the Web in Campaign 2004, Andrew P. Williams
that this blog and other blogs such as those of and John C. Tedesco, eds. Lanham, MD: Rowman
the Obama campaign in 2008 used rhetorical & Littlefield, 2006.
techniques, enhanced with aid from high-tech Trippi, Joe. The Revolution Will Not Be Televised:
features, of leading participants into dangerous Democracy, the Internet, and the Overthrow of
antagonism in which the legitimacy of political Everything. New York: Regan Books, 2004.
opposition was brought into question and adver- Warner, Benjamin R. “The Polarizing Influence of
saries were treated with enmity. According to this Fragmented Media: Lessons From Howard Dean.”
argument, in taking this approach political candi- Atlantic Journal of Communication, v.19 (2011).
date blogs go against ethical media practices and Weiss, Joanna. “‘Blogs’ Shake the Political Discourse,
pose a threat to democracy, rather than engaging Website Bloggers Changing the Face of Political
citizens and enriching democratic processes. Campaigns.” Boston Globe (July 23, 2003).
Whether considered a success or a failure, Wiese, Danielle R. and Bruce E. Gronbeck. “Campaign
whether regarded as a positive or a negative devel- 2004: Developments in Cyberpolitics.” In The
opment, Blog for America remains a significant 2004 Presidential Campaign, Robert E. Denton, ed.
development regarding the relation between social Lanham, MD: Rowman & Littlefield, 2005.
media and politics, and will continue to have an
influence on political campaigns of the future.

Sorin Nastasia
Southern Illinois University Edwardsville Blog Storm
See Also: Activists and Activism, Digital; Blogs are a relatively new social phenomenon that
Blogosphere; Blogs; Blogs, Role in Politics; first emerged in the late 20th century. However, in
Campaigns, Presidential (2004); Campaigns, Virtual. the last several years, blogs have become a pow-
erful sociocultural force. Originally developed as
Further Readings a system of online communication between a few
Faler, Brian. “Add ‘Blog’ to the Campaign Lexicon.” enthusiasts in the mid-1990s, the blogosphere has
Washington Post (November 15, 2003). emerged as an important mainstream artifact in
Janack, James A. “Mediated Citizenship and Digital relation to the digital sphere in the genres of per-
Discipline: A Rhetoric of Control in a Campaign sonal diary, journalism, community forums, and
Blog.” Social Semiotics, v.16/2 (2006). entertainment. In recent years, research on social
Blog Storm 117

media is addressing the influence of different types to the more traditional model of search-and-
of blogs in relation to Internet practices and com- visit traffic. Syndication technology allows social
puter-mediated communication (CMC). One such media consumers the ability to customize their
blog phenomenon is that of the blog storm. Marvin own tastes and news feeds, although a draw-
Ammori notes that blog storms are sociopolitical back is relying on sources to an extent that the
ad hoc campaigns organized by groups or collec- information becomes a mere echo chamber for
tives that are private and exist due to the existence the consumers and can skew their perspectives.
of inexpensive technology; and these groups dis- However, this feature has been common since the
sipate following the conclusion of the campaign. 1990s and has been a part of mainstream social
Also, blog storms have become a common feature media technology since the early 2000s.
in the blogosphere in relation to politics, social
movements, and corporate promotions. More Theory and Blog Storms
important, there is a need to be cognizant of this The 2004 presidential campaign was one of the
particular subgenre of blogs, related technology, primary forces driving the explosion of blogs
and theoretical perspective of a blog storm. and blog storms. Bloggers were allowed access to
conventions and issued press credentials among
Blog other forms of recognition traditionally allowed
A blog is an online Web site that is dedicated to mainstream journalists. However, a theoretical
to posts by the author or authors. Often, posts consideration or explanation for the emergence of
will contain related information from various blog storms is in the area of Trevor J. Pinch and
forms of media, such as newspaper articles, diary Wiebe E. Bijker’s social construction of technol-
entries, television, radio, and/or personal obser- ogy theory (SCOT) and sociological structuration
vations. Furthermore, they have the ability to theory (SST), as discussed by Anthony Giddens.
embed links, photos, video, and other forms of SCOT is the appropriation of blog technology for
media. Collectively, the blogosphere, as it refers an individual or a group’s communicative goal,
to itself, does have self-referential qualities, and and SST explains the duality of structure and
ongoing digital conversations are encouraged agency and the relationship between micro- and
among blog authors and consumers with capac- macroparadigms.
ity for feedback and opportunity for posting com- Two examples of these theories working in tan-
ments, with software to account for the traffic a dem with relation to blog storming in the 2004
page can generate. There are many different types U.S. presidential campaign were the Howard
of blogs, public or private, dedicated to a multi- Dean and John Kerry campaigns. The Dean cam-
tude of topics and ideas. However, what makes paign was the first major presidential campaign
the blog storm unique is its capacity and flex- to derive its fund-raising energy through a grass-
ibility to cheaply organize highly effective social roots digital blog storm approach that represented
media campaigns that have the ability to influence an exciting alternative to the conservative media
consumers or voters. establishment. Conversely, in relation to the Kerry
campaign, a conservative blog storm campaign
Technology and Blog Storms organized around the title Swift Boat Veterans for
Two important technological components in Truth and helped to blunt the initiatives of the
relation to blog storming are Really Simple Syn- Democratic nominee’s campaign. However, since
dication (RSS) and Atom; both are XML-based the 2004 U.S. presidential campaign, the utiliza-
programs that increase the blog storm’s ability to tion of blog storms by ad hoc groups and other
market, grow, and gain consumers across social organizations has evolved in ever more sophisti-
media networks. The utilization of syndication cated ways, particularly in corporate promotions
technology aggregates helps the individual blogs of consumer products and entertainment.
to update new content swiftly and efficiently.
Syndication technology is a push program that Reynaldo Anderson
directs content to social media users interested in Ryan Branson
the topic on the basis of subscription, as opposed Harris-Stowe State University
118 Blog Syndication

See Also: Blog Syndication; Blogosphere; Blogs, feeds to various subscribers or secondary Web
Role in Politics. sites. While the content of most blog syndication
is text based, bloggers also utilize video formats,
Further Readings podcasts (utilizing the success of developments
Ammori, M. “A Shadow Government: Private such as Apple’s iTunes platform), and other inno-
Regulation, Free Speech, and Lessons From vations in social media technology. Blog syndica-
the Sinclair Lewis Blogstorm.” Michigan tion amplifies previous modes of content distribu-
Telecommunication Technology Law Review, tion, including e-mail lists and self-promotion via
v.1 (2005). social network sites such as Facebook.
Lackey, M. E. and J. P. Minta. “Lawyers and Social Most blogs allow users to subscribe to a Web
Media: The Legal Ethics of Tweeting, Facebooking, or syndication feed that distributes syndicated
and Blogging.” Touro Law Review, v.28/1 (2012). material, such as blog posts, directly to users via
McIntosh, S. “Blogs: Has Their Time Finally Come— various digital media options, known as feed or
or Gone?” Global Media and Communication, news readers. Multiple Web feeds may be aggre-
v.1/3 (2005). gated on a single reader, or aggregator, which
Schmidt, J. Blogging Practices: An Analytical allows users to customize their news content.
Framework. Bamberg, Germany: Bamberg Content syndication modes include Really Simple
University Research Center for New Syndication (RSS) or Atom feeds and full-content
Communication Media, 2008. feeds. RSS feeds display headlines and, occasion-
ally, summaries of the original post on the user’s
feed reader. Full-content feeds provide content as
it appeared on the original site.
Alternatively, blogs may syndicate original
Blog Syndication materials to secondary, aggregator Web sites. The
original post thereby reaches a wider audience,
Blog syndication is a process by which the content and the original Web site or blogger enjoys the
of a blog Web site is disseminated, in full or in prestige of content syndication on one or more
part, via republication on other Web sites or digi- aggregator Web sites. The receiving Web sites
tal media readers. Original blog material is dis- generate greater traffic and interest by aggregat-
tributed to secondary sites via various Web feed ing noteworthy and immediate material from
programs. Blog syndication adheres to the same notable writers and sites. Blogs may permit lim-
general principles by which newspaper columns ited use of their original Web content to specified
and television programs are syndicated to diverse syndication partners or may allow unrestricted
local and national media outlets. syndication to any interested aggregator Web site.
Web syndication technology began with Apple The vast majority of bloggers receive no com-
Computer’s Meta Content Framework in 1995. pensation through the syndication of their con-
Studio One Networks designed the first syndi- tent, though broadened exposure and increased
cated programs intended for large-scale content traffic may generate income by way of paid adver-
distribution for American Honda in 1999. Since tising on the blog site. Bloggers may also receive
that time, millions of online publishers have dis- a portion of the revenue generated by paid adver-
seminated Web site content through standard for- tisements on a receiving site, usually based upon
mat news feeds. Political blogs quickly adopted the Web traffic attributable to their syndicated
this social media technology and now routinely posts. Finally, bloggers may be awarded royalties
share links and blog content via a diverse number based upon end-user access via licensed syndica-
of Web feed syndications. tors, though licensed blog syndication is most
Blog syndication is one of the principal means often limited to private, closed systems, such as
by which a blogger may increase Web traffic, university libraries, rather than publicly available
expand viewership, and network with other Web aggregator sites.
sites. A blog site creates original material and sub- Content syndication is widely employed by
sequently distributes such content through Web aggregator sites as a strategic method of link
Blogger Rights and Responsibilities 119

building with regard to search engine optimiza- Blogger Rights


tion. The content of syndicated material includes
embedded links that direct search engine algo- and Responsibilities
rithms to the Web sites to which the content is
linked. As such, an aggregating Web site and, to Blogger rights and responsibilities are outlined in
a lesser degree, the original Web site may signifi- Section 230 of Title 47 of the U.S. Code as well
cantly increase their respective rankings in rel- as case law shaping its interpretation. Part of the
evant search engine results through the dissemi- 1996 Communication Decency Act, the legisla-
nation and aggregation of content with related tion called Section 230 was titled “Protection for
anchor terms. private blocking and screening of offensive mate-
Of course, as aggregator sites collect more rial.” For the estimated 31 million U.S. bloggers
content-related material, search engine results as of mid-2012 (according to BlogWorld.com),
will inevitably link to the aggregator site before, this has become a safe haven with protection from
or instead of, the original Web site on which the legal action against others’ comments made on a
content first appeared. This substitution and blog, keeping bloggers from being labeled as pub-
elevation of an aggregator site over the original lishers. Some believe Section 230 gives bloggers
blog site is often cited as an unfortunate conse- more rights than Congress originally intended
quence of the blog syndication method, but the and shows how Internet publishers are treated
benefits of wider recognition and exposure have differently than publishers in print, TV, and radio.
motivated the rapid expansion of the blog syndi-
cation model. Content of Section 230
With the prolific multiplication of politically Initially viewed as a necessary step to ensure
oriented blogs and, subsequently, aggregator access to Internet content while also offering pro-
sites, the blogosphere has been effectively satu- tection to Internet service providers (ISPs), Sec-
rated with political news and commentary. Blog tion 230 offered protection against lawsuits for
syndication may be regarded as attempting to hosting potentially illegal content on Web sites,
remedy this problem by selectively identifying the servers, and more. Since 1997, Section 230 was
most popular and useful materials from diverse expanded to include lawsuit protection from Web
Web sites and reproducing such content on a sites hosting forums, wikis, blogs, ratings Web
single Web site. However, blog syndication also sites, and others.
aggravates the problem by creating even more The actual text of the section, only about 850
political Web sites and multiplying online con- words, sets policy protections for “Good Samari-
tent through the reproduction of previously pub- tan” blocking, and outlines definitions of infor-
lished materials. mation content providers and access software
providers. In its findings, the section states that
Justin Paulette the Internet and interactive computer services,
Independent Scholar like those provided by blogs, “offer a forum for a
true diversity of political discourse” and “Ameri-
See Also: Aggregation; Blogs; Blogs, Role in Politics; cans are relying on interactive media for a variety
Information Aggregation; RSS Feeds. of political, educational, cultural, and entertain-
ment services.” The policy statement has messages
Further Readings about promoting the continued development of
Davis, Richard. Typing Politics: The Role of Blogs in interactive services, the value of the competitive
American Politics. New York: Oxford University free market, user control over the information he
Press, 2009. or she receives, and enforcement of criminal laws
Hammersley, Ben. Developing Feeds With RSS and of obscenity, stalking, and harassment.
Atom. Sebastopol, CA: O’Reilly Media, 2005. The Good Samaritan passage says that “no
Schwartz, Larry and Susan Gunelius. The Truth provider or user of an interactive computer ser-
About Blog and Twitter Content Syndication. vice shall be treated as the publisher or speaker of
Seattle, WA: Amazon Digital Services, 2009. any information provided by another information
120 Blogger Rights and Responsibilities

content provider.” The second part of this item identified, the likelihood of obtaining financial
says no provider is liable for a good faith effort damages from an individual who does not have
to restrict access to obscene or lewd material even funds (judgment proof) is not promising.
if material is constitutionally protected. A pro-
vider is not liable for providing means for users to Editing Content
restrict such materials. For a blogger to exercise traditional editorial
Under the section, interactive computer ser- functions, like deciding which guest blogs to
vices must notify users of parental control pro- publish, or which comments to delete or trim, is
tections available. Section 230 has no effect on typically immunized under Section 230. The pro-
criminal law, intellectual property law, and the tected functions would be those an editor would
Electronic Communications Privacy Act of 1986, typically perform on user-submitted content. The
and should not prevent state law enforcement.   Digital Media Law Project from the Berkman
Center for Internet and Society offers guidelines
Definition of Terms to bloggers for acceptable editorial functions that
Definitions provided in Section 230 affect blog- would be covered by Section 230 protections:
gers. Interactive computer service refers to “any screening objectionable content, removing/edit-
information service, system, or access software ing/correcting content, selecting content for publi-
provider that provides or enables computer access cation, paying a freelance writer for content (if the
by multiple users to a computer server, including payee is an employee of the blog, Section 230 may
specifically a service or system that provides access not cover the situation—state agency laws apply),
to the Internet. . .” This includes blogs, forums, providing neutral forms or drop-down menus
and listservs. Information content provider means for content submission, or leaving defamatory
“any person or entity that is responsible, in whole third-party content on the site after being notified
or in part, for the creation or development of of its nature. Some limitations in the immunity
information provided through the Internet or any could come when editing in the following man-
other interactive computer service.” An access ner: materially altering the third-party content’s
software provider simply provides the software meaning, using drop-down menus or forms to
and tools to filter, allow/disallow content, digest create discriminatory content, or not upholding a
content, transmit, organize, or translate. A com- promise to remove certain material (which could
plete list of tools is included in Section 230. become a promissory estoppel issue).

Individuals Who Post Content Case Law


The ISO or Web site owner is not liable for the Section 230 has been tested in the courts, and
third-party content on his or her Web sites, but between 1996 and 2009, 184 cases used the sec-
the individual who posted the content is liable tion, according to David Ardia. The majority of
for the information contributed to the Web site. the cases are those with defamation-based claims,
These individuals can be sued for the content but cases also include invasion of privacy, misap-
they contributed, whether they posted the infor- propriation, and negligence. In DiMeo v. Max, the
mation under their actual name (or username) court found the defendant not liable for comments
or if they posted the information anonymously, left by third parties on a blog. An often-cited case
according to George Pike’s article in Information is Fair Housing Council of San Fernando Valley
Today. Unfortunately, some ISOs are not will- v. Roommates.com, LLC. In the case, a fair hous-
ing to reveal the identity of anonymous posters. ing organization sued Roommates.com for viola-
Their unwillingness to contribute this informa- tions of the Fair Housing Act. A three-judge panel
tion might be due to potentially negative impli- found that Roommates.com was not protected by
cations arising from their Web site member- Section 230 of the Communications Decency Act
ship. Some lawyers in anonymous poster cases because it asked questions of participants that
have resorted to “John Doe” lawsuits (simi- were then used to craft member profiles. It was
lar to anonymous music download lawsuits). protected in the “additional comments” portion
Even if the individual who posted the content is of its site because particular information was not
Blogger Rights and Responsibilities 121

sought. The questions or prompts were a distin- Daily Kos, Michelle Malkin, and Daily Dish
guishing point for the judges, and later the Ninth have been studied in academic journals because
Circuit. Content that users provide is protected by of their reach and impact. Daily Kos is a blog
Section 230, but case law is carving out distinc- from the liberal side of the political spectrum.
tions like whether or not how the site categorizes Founded in 2002, it boasts 2.5 million unique
and channels information to others is immune. visitors per month and claims to be a news orga-
For example, Carafano v. Metrosplash.com, Inc. nization, community, and activist hub all in one.
contradicted the Roommates.com case saying the It provides a wiki with frequently asked ques-
site operator receives full immunity regardless of tions that helps set the tone and standards for
the selection process, or editing. the blog. One such standard is how the blog han-
dles the “outing” of an anonymous viewer—it is
Bloggers and Politics a bannable offense. In response to backlash on
Bloggers are both users and providers of interac- a Chevron ad on the Daily Kos blog, founder
tive computer services. By posting content, they Markos Moulitsas Zúniga created an advertis-
are users, and by offering mechanisms for com- ing policy and concluded that running an adver-
menting, they are interactive computer services. tisement does not imply endorsement. The site
Bloggers do not have to post user guidelines or also has rules for participation in creating diaries
standards for what is acceptable on their blog, and comments in threaded discussions, as well as
but it is generally recommended that they do so. handling trolls.
When editing or curating posts, the blogger can Michelle Malkin’s blog represents conserva-
make good faith edits. A New York court ruled tives. She is a syndicated columnist, author, and
in favor of a blogger who took an inflammatory Fox News Channel contributor. She uses a disclo-
comment by another and moved it to center stage sure statement and terms-of-use page to cover the
as a blog post with a picture and headline. The basics of who can comment and how comments
decision was split, with the dissenters making a will be handled. As she states, “I welcome your
case for the amount of edits and treatment the participation, but if you abuse my hospitality,
post received. don’t be surprised if you are shown the door.” She
Developments in 2006 brought concern for asks that participants register, and be at least 18
bloggers with the Federal Election Commis- years old. Andrew Sullivan’s independent Daily
sion’s eye on online communication and political Dish was formed in 2000, and purports to be one
advertising. The Electronic Frontier Foundation of the first political blogs. Its site statistics report
reported the final decision was that bloggers could an average of more than 113,000 visits a day. Sul-
still promote a candidate, or criticize one without livan’s site contains a privacy policy, with a spe-
compensation, without new restraints. Bloggers cial note about Children’s Online Privacy Protec-
paid to promote a candidate, in a nonadvertise- tion Act (COPPA) compliance.
ment form, could do so and were not required to RedState.com provides an exhaustive list of
disclose the payment. posting policies, with blog-specific terms like
“sockpuppeting,” using multiple accounts to post
Examples of Political Blogs and thereby providing deceptive extra support for
Political blogs might be run by a candidate, a one’s own position. The site even lists theories that
campaign, a political action committee, a politi- will not be accepted by users—like a call for the
cal party, or nonaligned groups (faith-based, overthrow of the U.S. government. In contrast,
gender-specific, or socioeconomic groups). A two political party blogs, Democrats.org and GOP.
growing number of blogs focus on politics from com, simply post terms and conditions along with
the local, regional, and state levels. Some of a privacy policy. In local-level politics, a Cincin-
these individual and organizational blogs include nati set of bloggers at CincyVoices actually refer-
Daily Kos, Michelle Malkin’s blog, and Daily ences Section 230 on their blog, stating that guest
Dish. Other blogs are created and maintained bloggers, readers’ comments, tips via e-mail, and
by certain political parties; examples include Rich Site Summary (RSS) feeds or other sources
Democrats.org and GOP.com. are considered another content provider.
122 Blogger Rights and Responsibilities

and forums for questions, debate, and discus-


sion. Section 230 gives bloggers room to be an
open forum for discussion, but with great free-
dom comes great responsibility. Journalists act-
ing as bloggers can lean on the Society of Profes-
sional Journalists’ code of ethics for guidance,
but bloggers are largely operating outside of tra-
ditional journalism.
Political bloggers can self-regulate standards
of responsibilities like quickly correcting inac-
curacies, properly citing sources, adhering to
copyright laws, and disclosing conflicts of inter-
est or paid endorsements. For their own content,
becoming an information content provider, they
must realize their words will not be immune
under Section 230.
David Ardia writes:

If Congress considers modifying section 230,


it should keep in mind that the rich infor-
mational ecosystem we know today is not
Senator Strom Thurmond with Army Chief of Staff Eric Shinseki simply a product of the decentralized, open
at his 100th birthday celebration on December 4, 2002. architecture of the Internet. It is a function of
Bloggers drew attention to Trent Lott’s comments at the event, the “breathing space” Internet intermediar-
in an early example of the power of political bloggers. ies currently have under the law to facilitate
speech that may be injurious or illegal.

Sarah Maben
Implications of Political Blogs Jennifer Edwards
Without the restrictions of a traditional news out- Tarleton State University
let, bloggers are offering firsthand information to
the public as an alternative source of news. Even See Also: Berkman Center; Blogs; Blogs, Role
in 2002, political bloggers were exerting their in Politics; Ethics of Social Media in Politics;
power. When the mainstream media passed over Press Freedom and Online/Social Media Security;
the story of the racist comment made by Trent Lott Professional Bloggers.
at the 100th birthday party for Strom Thurmond,
bloggers reported, and kept reporting, until they Further Readings
got the legacy media’s attention. Political bloggers Ardia, David S. “Free Speech Savior or Shield
are important actors in the agenda-setting pro- for Scoundrels: An Empirical Study of
cess, according to Kevin Wallsten’s 2007 research. Intermediary Immunity Under Section 230 of the
Mitzi Lewis found a strong relationship between Communications Decency Act.” Loyola of Los
blog reading and online political discussion and Angeles Law Review, v.43/2 (2010).
participation during the 2008 U.S. presidential Benton, Joshua. “David Ardia: Why News Orgs Can
campaign. She concludes that the potential effects Police Comments and Not Get Sued.” http://
of blog reading could impact the political land- www.niemanlab.org/2009/01/david-ardia-why
scape of the world. -news-orgs-can-police-comments-and-not-get
In political discourse, Section 230 aims to -sued (Accessed May 2013).
open the marketplace of ideas for an exchange Digital Media Law Project. “Section 230 of the
of varying opinions. The aim is a blogosphere Communications Decency Act.” http://www.dmlp
with information about candidates, platforms, .org/section-230 (Accessed May 2013).
Blogosphere 123

Electronic Frontier Foundation. “Legal Guide for led to the disenfranchisement of people from
Bloggers—Election Law.” https://www.eff.org/ direct participation in the spheres of media and
issues/bloggers/legal/election (Accessed May 2013). politics, limiting their means and outlets of free
Etalkinghead.com. “Political Blogs Directory.” expression. The traditional media incorporated
http://www.etalkinghead.com/directory (Accessed public opinion through the use of experts, held as
May 2013). representative of the people, although they enter
Lewis, Mitzi. “An Analysis of the Relationship the political domain to further their own agenda,
Between Political Blog Reading, Online meaning that the true voice of the people was cur-
Political Activity, and Voting During the 2008 tailed from the public sphere.
Presidential Campaign.” International Journal of The pluralization of sources of information
Interdisciplinary Social Sciences, v.6/3 (2011). and opinion through the blogosphere has enabled
Pike, George H. “A Safe Harbor Against Lawsuits.” the true democratization of knowledge, Megan
Information Today, v.23/10 (November 2006). Boler states, although it coexists simultaneously
Tune, Cydney and Marley Degner. “Blogging and with the blatant falsification of information by
Social Networking: Current Legal Issues.” government and corporate powers. Whether and
Computer & Internet Lawyer, v.26/11 (2011). how blogs then mobilize civic engagement and
Wallsten, Kevin. “Agenda Setting and the affect the media and political landscape becomes
Blogosphere: An Analysis of the Relationship a key question.
Between Mainstream Media and Political Blogs.” While many theorists celebrate the political
Review of Policy Research, v.24/6 (2007). influence of the blogosphere, others disagree on
its ability to transform politics and increase civic
engagement. Some argue that, while a triumpha-
list narrative has been written of the blogosphere,
most blogs in fact have little political influence,
Blogosphere stating that the collective fact-checking of Dan
Rather’s erroneous coverage of a key news story
The blogosphere is a coined term describing both in the 2004 U.S. presidential race (known as
the network of aggregate blogs in cyberspace and Memogate) serves as one of the few exceptions to
the online community created by their intercon- the norm of blog flops.
nection. Through its dynamic linking of people, Theorists also argue whether links between
political parties, organizations, content, and con- blogs—or the lack of—are evidence of isolation
cepts, the blogosphere has become a much-stud- or of interconnection among bloggers. Bloggers
ied space, both representing and arguably facili- commonly link solely to their own self-selected
tating an era of open source politics. Vigorous community of those sharing their political
debate continues between utopian and dystopian views, evidencing partisanship and curtailing the
views over the blogosphere’s potential and actual potential for expanded interaction and political
impact on politics. thought. Theorists comment that political blog-
In considering the blogosphere’s impact on the gers express emancipation as well as cynicism;
political domain, many theorists eschew the popu- however, Antoinette Pole and Matthew Ker-
lar technodeterminist position that the movement bel argue that real political influence and civic
arises from and is determined by the technology engagement is achieved through the blogosphere.
itself, stating that the growing phenomenon of In maps of the blogosphere (visualized through
blogging emerges from currents in culture over the mapping of the static or dynamic hyperlinks
generations. that connect blogs), clusters reveal distinct sub-
Aaron Barlow argues that rise of the blogo- groups and niche interests (such as topics of law,
sphere has been a slow march then sudden explo- military, and security dominating political com-
sion that stemmed from increasing discontent munities). Political discourse is the most densely
with the noninclusivity of politics and media and linked network neighborhood, above other niche
an era of depressed civic engagement. The empha- topics such as fashion and sports. The influence
sis on the role of the press as an observer of society of A-list bloggers also can be identified by their
124 Blogs

core positions at the center of the network, and and access to the blogosphere itself and in turn
a distinct right and left split in the blogosphere is impact the blogosphere when blogs are moved to
apparent, clearly evidencing the liberal and con- escape their control.
servative networks of politics. While some theorists may argue that the blogo-
Matthew Kerbel states that the loosely affili- sphere arose from rebellion against the controls
ated community of bloggers collectively calling of political forces and the traditional media,
themselves the progressive netroots has the great- researchers now examine whether the control
est potential to build political advantage through of the blogosphere is shifting from—or to—the
the decentralized nature of the blogosphere and domain of media empires and governments and
their ability to engage real and virtual commu- its effect on the both the realm of the Internet and
nities of activists. Others, however, argue that of politics.
the expansion of channels of the social Web and
speed of change in this constantly adapting digi- Wendy Dent
tal landscape mean mapping and predicting the University of Southern California
future of the blogosphere is largely futile.
In examining the political clout of blog net- See Also: Alpha Blogger; Blogs; Cynicism, Political;
works, issues of how readers assess credibility Networks, Political; Professional Bloggers; Social
and independence become paramount. Theorists Worlds; Vlogging.
examine how the blogosphere competes with tra-
ditional media as an informed source of public Further Reading
knowledge and belief and assess whether old-style Barlow, Aaron. The Rise of the Blogosphere.
journalism is now threatened by the blogosphere, Westport, CT: Praeger, 2007.
about to become obsolete or to be replaced by a Boler, Megan. Digital Media and Democracy: Tactics
new business model. in Hard Times. Cambridge, MA: MIT Press, 2008.
Aside from ranking the top topics on the blogo- Kerbel, Matthew Robert. Netroots: Online
sphere (which include the Arab Spring), studies Progressives and the Transformation of American
have shown that journalistic institutions are still Politics. Boulder, CO: Paradigm, 2009.
the central and dominant influencers of the media Pole, Antoinette. Blogging the Political: Politics and
ecosystem, with a majority of blogs linked not to Participation in a Networked Society. New York:
other blogs (such as those by independent blog- Routledge, 2010.
gers) but to traditional or legacy media. Numer- Tremayne, Mark. Blogging, Citizenship, and the
ous successful bloggers and sites (such as the Future of Media. New York: Routledge, 2007.
Huffington Post, ranked the top political blog
site) have been acquired by the traditional media.
Blogs have emerged as prime real estate for
advertisements, causing the blogosphere to be
challenged and influenced by commodification Blogs
and commercialization and proving it to be ironi-
cally similar to the legacy media it has allegedly Blogs (short for Weblogs, personal logs on
revolutionized. While bloggers have claimed the the World Wide Web) are online personal dia-
role of watchdog over both political and media ries, edited in reverse chronological order, usu-
powers, the distinction between the traditional ally authored by a single individual. They have
media and the blogosphere is now blurred. strongly contributed to enhancing media plural-
The rising numbers of hate blogs and Arab ism and cultural diversity worldwide. Bloggers
Spring blogs have also fueled debates about cen- deprived of liberty or life for their online com-
sorship, surveillance, and freedom of expression. munications, supported by human rights organi-
Although the blogosphere emerged from efforts zations, are considered defenders of free speech
to circumvent the gatekeepers of the past, new in the modern information society, a role once
gates and gatekeepers have also emerged (such as played solely by print and radio or television
China’s Great Firewall), which limit both content journalists. Although international law provides
Blogs 125

for numerous guidelines on the contents and lim- distinction between a professional journalist and
its of the right to free expression, their practical a blogger even more.
application to media publishing is traditionally Blogs have strongly added to the promotion of
set within acts of national law. Therefore, setting free expression by media professionals and pri-
the limits of free speech for online publications, vate individuals alike. Unlike traditional press,
including blogs, is one of the biggest challenges however, blogs offer little background informa-
to contemporary human rights law. Weblogs also tion on the status of their authors and publish-
provoke important questions on the scope and ers. Blogs often lack information on the legal
scale of intermediary liability and project shifts status of the entities responsible for blog con-
in the economic model of the global media mar- tent or the locations of their publishers, which in
ket, adding to the change in the professional situ- turn brings doubt on their objectivity, trustwor-
ation of journalists and the advertising market. thiness, source protection, reliance on a uniform
Blogs hold an increasing commercial value with system of ethical principles, and assignment of
the introduction of commercial blogs, or splogs, civil liability, in particular as some bloggers may
as new methods for online advertising. attempt to give false personal data to avoid lia-
bility for unjust criticism.
Blogs Versus Traditional Media The European Parliament Culture Committee
Although blogs are sometimes referred to as jour- in 2007 expressed worry that bloggers may con-
nals or media outlets, their legal status remains siderably pollute cyberspace with spam, misinfor-
unclear as numerous significant differences mation, and malicious content. In order to avoid
between blogs and traditional media may be that risk, more transparency in the blogosphere
depicted. The crucial difference lies in the orga- was called for. The committee proposed a volun-
nization of traditional media outlets when com- tary system of labeling blogs according to their
pared with blogs. The former are run by editorial authors’ preferred status. Bloggers who wished to
boards, editors-in-chief, and publishers who all perform the journalistic profession online would
aim to provide high-quality publications signifi- be requested to place a suitable disclaimer on their
cantly more professional than amateur, nonmedia blogs, which would result in them obtaining the
publications. Traditionally, media law distributes rights and obligations of a professional journalist,
responsibility for published content among differ- including, for example, the right to protect jour-
ent actors: authors, editors, and publishers. This nalistic sources from judicial enquiry or the obli-
feature usually may not be identified with blogs, gation to show professional diligence in preparing
where an individual usually embodies all the edi- online publications. The proposal met with much
torial functions, and no severability of rights and criticism as an attempted attack upon free speech
obligations may be identified. Therefore, uni- online and was never adopted. Currently, no dis-
formly granting all bloggers status equal to media tinction between media and blogs can be made.
journalists is questionable. Simultaneously quali-
fying blogs as media would subject their editors Legal Status
to any and all national and international media The confusion on the legal status of blogs brings
law regulations. A positive assertion of blogs as numerous questions on the allowed and justifiable
media would result in laying particular profes- limits of free speech for blogs and bloggers per-
sional due diligence obligations and respectively mitted by national laws and international human
higher-quality and professional standards upon rights law. Due to the transboundary character
their authors, ones usually required from profes- of blogs’ natural environment that is the cyber-
sional journalists by law. space, the issue of media freedom, thus far left
While it is clear that not all blogs and bloggers to national regulations, became the subject of an
aspire to be professional bloggers, there exist no international debate. Although international law
criteria for telling apart bloggers who wish to per- provides for numerous guidelines on the contents
form as journalists and those who do not. Pack- and limits of the right to free expression, its prac-
ard notes that the increased popularity of social tical application to media publishing is tradition-
media and microblogs, such as Twitter, blurs the ally set in acts of national laws.
126 Blogs

The 1947 Universal Declaration on Human freedom of expression and factual truth. Compli-
Rights (UDHR) in its Article 19 provides for the ance with general copyright rules, such as a prohi-
basic framework of free speech as a human right. bition of plagiarism and obligatory quotations of
Repeated in numerous international law trea- sources, as well as an obligation to minimize pos-
ties, the internationally recognized human right sible harm caused by a publication are also often
to free speech allows each individual to concur- named. Deriving from the developments in jour-
rently distribute, receive, and share information. nalism ethics, blogging ethics call for the accuracy
Any limitation to any of those three complimen- of interpretation, without any misinterpretations
tary rights must be foreseen in an act of law and of the facts, including disclosure of any possi-
applied only in exceptional, individual instances. ble photo editing or text clipping. Bloggers aim
Grounds for limiting the individual right to free to seek the truth, claim editorial independence,
speech broadly set in Article 29 UDHR include and hold accountability and transparency vis-à-
securing due recognition and respect for the rights vis their readers. The development of journalism
and freedoms of others as well as meeting the just ethics proved it impossible to adopt a single, uni-
requirements of morality, public order, and the versally applicable set of detailed ethical rules.
general welfare in a democratic society. Although Ethics of difference, or ecumenical ethics, reflect
the international community has been working this inefficiency by allowing journalists to act dif-
for more than 60 years on defining the universally ferently in particular situations when respecting
recognized particulars of those terms, no practi- the same principles. Such flexibility is necessary to
cal and universally applicable consensus may be allow different styles of journalism and the meet-
found. National laws on defamation or lese maj- ing of different agendas set for different media.
esty strongly differ, although all are based on the It therefore also finds its way into social media,
consensus expressed in Article 19 UDHR. including blogging.
This disaccord on the human rights standard
of free speech proves particularly difficult when Rights and Responsibilities
faced with the transboundary characteristic of Blogs raise uncertainty when it comes to indi-
blogs. State jurisdiction, that is state competence vidual responsibility for online content. Identify-
to exercise its laws, may be recalled on the basis ing an author of a blog post might be practically
of availability of illegal content within state terri- impossible and, unlike with traditional media,
tory as the so-called effective jurisdiction. Blog- such as printed press, radio, or television, an
gers residing abroad may therefore be considered editor-in-chief or an editorial board are rarely
liable or criminally responsible for their online named within a blogging Web site. Anonymous
publications in foreign states, and those states blogs or blog posts, therefore, evoke the ques-
may exercise their laws over foreign defendants, tion of the right to anonymous speech online. The
as confirmed by the 2011 case of Joe Gordon, right to anonymous speech does not originate
an American citizen sentenced to prison without directly from Article 19 UDHR and may not be
parole in Thailand for defaming the Thai king on recognized as an imminent element of the right
his blog, operated from his U.S. home. Gordon to free speech in the light of the contemporary
was apprehended and charged upon his arrival to international human rights doctrine and jurispru-
Thailand for a holiday. dence. There is no universal consensus that such a
This lack of legal certainty among bloggers has right is enforceable, and a clear line may be drawn
provoked them to identify international, com- between the U.S. acknowledgment of such a right
munity-based ethical values, set within numer- and the European or Asian reluctance to recog-
ous blogging codes of ethics, all sharing a simi- nize it within national systems of law. Therefore,
lar set of basic principles. While relying on the no universal right to anonymity for bloggers may
notoriously recognized principles of netiquette, be identified, making the question of online con-
blogging codes of ethics usually include the obli- tent liability and responsibility a pressing issue.
gation to provide transparency of sources and Anonymity of the authors of press publications
resources, accountability for the information provided for in some acts of national laws is
published, as well as commitment toward the always safeguarded with the subsidiary liability
Blogs 127

of the editor-in-chief or the publisher, who both the U.S. political life, where presidential speeches
hold authority to decide upon the actual publica- are often written by unaccredited ghostwriters.
tion of anonymous information and hold respon- While in the United States, political context ghost-
sibility for the overall content of the media they writing is considered a legitimate exception from
manage. Regarding the nature of blogs, where the copyright protection, in civil law countries it repre-
author usually embodies all editorial functions, sents a violation of the author’s moral rights, such
no similar mechanism may be identified. as the right to have one’s name mentioned as the
The scheme for online content regulation recog- author of a work published or used. Moral rights
nized in most democratic countries is the so-called may not be transferred, and their breach always
notice-and-takedown procedure. Originating results in liability toward the author. Therefore,
from the 1998 U.S. Digital Millennium Copyright ghost blogging ought to be considered ethically
Act and reflected in the 2000 European Union foul and illegal in numerous national jurisdictions.
(EU) Electronic Commerce Directive, the notice- While generally blogs are no different than any
and-takedown procedure sets Internet service other Web site and bloggers are obliged to adhere
providers free from the responsibility or liability to copyright laws, they constitute a vast resource
for content they render access to as long as they of user-generated content, which once considered
have no knowledge of the infringing character of media resources may be subject to certain copy-
such content. Upon receiving a proper notifica- right exclusions. Article 2 of the 1886 Berne Con-
tion of its infringing character, service providers vention for the Protection of Literary and Artistic
are obliged to temporarily or permanently disable Works in its 1979 Paris version provides no copy-
access to such content. The access is disabled tem- right protection for “news of the day” and “mis-
porarily without undue delay upon the receipt of cellaneous facts” as long as they have the character
a valid notification, and it is disabled permanently of “mere items of press information.” This same
after receiving a copy of a court order confirming provision is repeated in the majority of national
its infringing character. Access to the content in copyright acts, just to mention Article 3 of the
question may be re-enabled as a result of a court Korean Copyright law where “reports on current
decision, finding that no law infringement was events” and “miscellaneous reports published in
caused through its publication. newspapers and magazines” are considered non-
In a majority of countries worldwide, service works and offered no copyright protection. A
providers hold no liability for the content they similar provision can be found in Copyright Law
enable access to as long as they have no knowledge for Lichtenstein, which in Article 25 repeats the
of its infringing character. Therefore, it is bloggers exact wording of the Berne Convention. Mexican
in particular and content providers in general who copyright law excludes from protection “articles
are obliged to assure the legality of uploaded con- on current events,” following the stipulation of its
tent. The situation is different in countries that Article 10, paragraph 2.
exercise Internet filtering policies, such as China Should blogs be considered press, their particu-
and the majority of Muslim countries, where lar contents may be considered “mere press infor-
information controls are based on state security mation” in the meaning of the Berne Convention
and religious reasons. There, the burden of liabil- and suffer exclusion from copyright protection.
ity for online content rests jointly upon the con- This exception relates solely to short and not-too-
tent provider and the service provider. complex or refined pieces of information, lacking
traits of individual and creative character. It may
Copyright Issues be argued that the nature of microblogs makes
The questionable legal status of Weblogs raises them a rich supply of “mere press information”
numerous copyright issues. An original copyright whose authors hold no copyright to the messages
issue is raised by “ghost blogging.” The term they publish.
describes a practice covering blogs written by a The Berne Convention, binding upon 166 states
ghost author, who is not credited for his or her worldwide, in its Article 10 makes another excep-
works—which are credited to another person. tion from full copyright protection. Although
Ghost blogging resembles a practice common in news items generally are considered copyrighted
128 Blogs

works, with the exception of mere press infor- in the social media is repeated by mainstream
mation mentioned above, the Berne Convention media in what is called a blog storm. Individual
permits the quotations from newspaper articles A-list bloggers enjoy authority and user attention
and periodicals. They may be quoted in the form far greater than some mainstream media outlets.
of press summaries in a manner compatible with Because there are no professional management
fair practice and in an extent that does not exceed organizations reflecting the transnational charac-
that justified by the purpose. Details of this form ter of the global electronic media, the assertion of
of permitted use of press information are set applicable laws and a nominal fee for the use of
within acts of national laws, although such use user-generated content remain troublesome.
must always be accompanied by a mention of the Bloggers often publish copyrighted works,
source and of the name of the author. French copy- but unlike traditional media, they are either less
right law, next to quotations for informatory pur- persistent when claiming fees for the use of their
poses, allows for making press summaries (revue contents or are willing to offer their works for
de presse). This term is often defined broadly free. Blogs have therefore added to a shift in the
as to include compilations of news from differ- contemporary market mechanisms, representing
ent newspapers. Some scholars argue, however, what has been described as peer production. This
that such broad interpretation is contrary to the is a concept at the foundation of a new economic
meaning of the term, which ought to cover only model, described as a hybrid economy. The hybrid
parts of such articles. The wider definition allows economy is the economic model well suited to
news aggregation on large scale. Spanish law also satisfy the demands of global online media, also
allows press summaries when used as quotations, when it comes to the production and management
although their permitted scope is much more nar- of user-generated content. It is a mix of elements
rowly defined. There reviews of press are consid- from two conventional, yet thus far dichotomous,
ered subject to quotation rights. They may only economic models: the commercial economy,
be used when serving analysis, comment, or criti- in which value of goods or services is expressed
cal assessment. In the case of using a press item in money, and the sharing economy, invaluable in
for a press summary, the author’s right to receive money, in which love or friendship serve as the
remuneration for such use is rarely granted and, if prime examples.
so, in a limited scope, although the authors retain This categorization was harshly disrupted by
their full personal rights, and so a mention of the the rise in popularity of user-generated content,
source and of the name of the author must appear available online for free, usually under creative
on such a press summary. Such forms of nonmon- commons licenses. Peer-production may usher in a
etary gratification are, however, often considered new chapter in social evolution, one that has been
sufficient by community journalists and bloggers, called the “network information economy.” The
which in turn strongly influence the traditional term is meant to cover the creation of new resources
media labor market. not quantifiable in currency. Peer production may
soon rule world markets. Blogs represent peer pro-
Employment duction in the media market. Therefore, the media
The sudden boom of user-generated content on labor market, next to the entertainment industry,
social media platforms evoked by the rise in pop- may be named an economy sector revolution-
ularity of blogs and moblogging (mobile blog- ized by the dynamic shift in content production
ging) in particular has caused a significant shift and sharing schemes. The value of online content
in the employment scheme on the media market. is not always expressed with money, making the
The place of professional journalists, often work- traditional employment contract forever less com-
ing under employment contracts, is being taken mon in the media labor market.
by amateur bloggers, willing to provide labor This economic shift in media is reflected in the
without remuneration, considering the profes- fact that blogs have contributed to employment
sional experience and reputation gained as suf- uncertainty among journalists. Many of them feel
ficient reward. The power of the blogosphere is obliged to use social media as a facet of their work.
reflected in situations where a news item initiated On the other hand, the 2012 Eurobarometer
Blogs 129

report on Journalists and Social Media offers transactional decision. Should such an omission
an insight into a recent positive tendency in the cause or was likely to cause the average consumer
media market caused by blogs and other social to make a transactional decision that he would
media. It states that social media positively con- not have made otherwise, such a publisher will
tributed to the employment in media in Ireland face legal liability. An unfair advertising practice
because Google and Facebook have located their also takes place when the publisher fails to iden-
European headquarters there, while Twitter has tify the commercial intent of the commercial prac-
announced plans to do so as well. tice, if it is not apparent from its context. There-
fore, any forms of so-called grassroots marketing
Commercial Potential may fall under the definition of unfair business
Companies often review the contents of social commercial practice, if the actual motivation of
media sites, including blogs seeking opinions about the blogger is not disclosed and the information
their products, while advertisers distribute pro- is aimed at causing the reader to decide upon a
motional materials through online communities. purchase of goods or services.
The microblogging site Twitter serves as a popu- Some blogs openly serve as advertising spaces.
lar source for many companies to investigate con- Blogs for profit and commercial blogs are emerg-
sumer concerns about their products and services. ing categories of for-profit enterprises organized
Although often published with little or no objec- seemingly as individual online diaries.
tive of financial gain, in an effort to exercise free They are often organized through blog syndi-
speech, blogs hold much commercial potential. cation. A controversial category of commercial
Next to social networks, blogs are considered blogs are spam blogs (splogs), which require users
the crucial resource for viral marketing—promo- to follow embedded links available on the Web
tional information published online often under site. They are aimed at promoting affiliate sites
the pretense of a personal view. A recommen- and artificially increasing online traffic. In order
dation given by a blogger to a certain good or to achieve that aim, splogs attempt to attract Web
service intended to influence the readers to buy crawlers, that is, programs searching the Web for
the item or service is considered a commercial information used in search engines, with huge
activity when the blogger provides such a recom- amounts of key words included in their contents
mendation in return for personal gain, pecuniary or metadata. They rarely contain original content
or not. Should they not disclose the profit-seek- but rather are a set of odd words or commercial
ing motivation, they may face responsibility for messages promoting the affiliated Web site. A
misleading or covert advertising, which is recog- splogger gains revenue for every click originat-
nized among unfair trade practices in numerous ing from his or her site. Splogs are considered an
national legal systems. unwanted commercial practice, resembling spam
This covert marketing method is the official and therefore considered contrary to existing
business practice for flogs (fake blogs, flack blogs). legal regulations, either ones dealing with spam
These are blogs that appear to present plausible, directly or unfair commercial practices generally.
objective information while being created by a
company or organization for marketing or politi- Joanna Kulesza
cal purposes. They are aimed at setting off viral University of Lodz
marketing and fake grassroots campaigns. For
example, the EU Directive 2005/29/EC of May See Also: Alpha Blogger; Blogger Rights and
11, 2005, concerning unfair business-to-con- Responsibilities; Blogosphere; Blogs, Role in Politics;
sumer commercial practices in the internal mar- Citizen Journalism; Flog; Microblogging; Splogs;
ket in Article 7, paragraph 2, refers to misleading User-Generated Content; Viral Marketing.
omissions and names as such a commercial prac-
tice if, in its factual context, its publisher hides Further Readings
or provides in an unclear, unintelligible, ambigu- Katsh, Ethan M. The Electronic Media and the
ous, or untimely manner any information that Transformation of Law. Oxford: Oxford
the average consumer needs to make an informed University Press, 1991.
130 Blogs, Role in Politics

Packard, Ashley. Digital Media Law. Chichester, UK: groups, mobilizing large communities of inter-
John Wiley & Sons, 2012. est to take collective action around elections and
Singer, Jane B. and Cecilia Friend. Online Journalism policy issues. Still others act to support existing
Ethics: Traditions and Transitions. New York: institutions—both the Democratic Party and the
M.E. Sharpe, 2007. Republican Party include blogs on their Web sites,
as do most major news organizations. Then, there
are blogs like the Huffington Post and Talking
Points Memo, which have grown into full-fledged
news organizations in their own right, creat-
Blogs, Role in Politics ing more competition within the news environ-
ment. In the early years of the blogosphere, blogs
Political blogs play a variety of roles in contem- were primarily used to challenge and pressure
porary politics. Blogs adopt a variety of forms— the mainstream media, altering and occasionally
from low-traffic, pseudonymous, single-author driving news coverage. Today, the two overarch-
sites to heavily trafficked, multiauthor sites fea- ing themes of blogs in politics are agenda seeking
turing blog content by political elites. Given the and partisan reinforcement.
wide variation in blog architecture and niches, it In the early years of the blogosphere, there was
is perhaps unsurprising that the role of blogs in far less variation in blog types. A few prominent
politics is both complicated and variable. Some early moments helped craft the shared under-
blogs serve as virtual megaphones for individual standing of the influential role that blogs can play
citizens to voice their political opinions. Other in politics—an influence that was largely con-
blogs are the functional equivalent of advocacy tained within the realm of media criticism. Four

George Allen appears in a parade in Alexandria, Virginia, on February 12, 2012, during his 2012 Senate campaign. Bloggers seized
on Allen’s 2006 use of the word macaca during a videorecorded campaign appearance and used the incident to raise support for the
campaign of his Democratic opponent, Jim Webb. Webb narrowly won that race, and Allen lost to another Democrat, Tim Kaine, in 2012.
Blogs, Role in Politics 131

events in particular, spanning from 1998 through over these years, either.” Though several report-
2006, serve as particularly important reference ers were present at the event, the majority lead-
points. First was the central role that Drudge er’s racially charged statement received no press
Report.com played in the Bill Clinton–Monica coverage with the exception of a brief mention in
Lewinsky reporting. Second was Senator Trent ABC News’s online column, The Note.
Lott’s 2002 resignation as majority leader fol- Prominent bloggers Joshua Micah Marshall,
lowing blog-driven coverage of his controversial Duncan “Atrios” Black, and Glenn “Instapundit”
remarks about retired Senator Strom Thurmond. Reynolds seized on this comment and brought
Third was the 2004 Rathergate episode, in which together evidence of Lott’s history of racially
conservative bloggers uncovered evidence that questionable commentary. Pressure from these
documents relied upon by Dan Rather to make bloggers influenced the mainstream media to pay
on-air accusations were likely forged. Fourth was more attention to the story, and the resultant cas-
Senator George Allen’s 2006 Macaca Moment. cade of media attention led to Lott’s resignation
All four of these episodes demonstrate the power as Senate majority leader two weeks later. The
of blogs in relation to the mainstream media. Trent Lott scandal is commonly credited as the
first major political impact of the blogosphere,
Bill Clinton with John Podhoretz of the New York Post refer-
In January 1998, the editors of Newsweek maga- ring to it as “the Internet’s First Scalp.”
zine were debating whether to go to press with the
story of an affair between President Bill Clinton Dan Rather
and his intern Monica Lewinsky. Matt Drudge In September 2004, Dan Rather reported on
published the story himself on his Web site, 60 Minutes about a series of memos that raised
DrudgeReport.com, under the headline “News- apparent questions about President George W.
week Kills Story on White House Intern.” By pub- Bush’s service in the Texas Air National Guard
lishing the story, Drudge forced the mainstream during the Vietnam War. Bloggers at PowerLine-
media’s hand, setting off a series of events that Blog and participants in the conservative FreeRe-
culminated in impeachment proceedings for the public discussion board examined the documents
42nd president of the United States. The Drudge and concluded that they were forgeries. The tor-
Report is technically a protoblog. Founded in rent of blog-based criticism led CBS to retract
1997, the Drudge Report lacks several common the story. Though it has never been conclusively
blog features—most notably reverse-chronolog- proven whether the documents were indeed forg-
ical postings and reader comments. Neither the eries, the blogosphere-generated media backlash
blogger.com software (developed in 1999 by Pyra led to the forced resignation of several produc-
Labs) nor the terms Weblog or blog existed when ers and likely hastened Rather’s retirement. The
Drudge launched his online tip sheet. Nonethe- Trent Lott episode and Rathergate are commonly
less, the early prominence of the Drudge Report referenced as a pair—one blog-based success on
sent strong signals to later bloggers about the the left, the other on the right.
potential power of the nascent medium.
George Allen
Trent Lott Virginia Senator George Allen’s August 2006
In December 2002, Senate Majority Leader Trent Macaca Moment demonstrated a different type
Lott offered some remarks at the 100th birth- of blog power. Allen was speaking at a campaign
day celebration of retired Senator Strom Thur- event in rural Virginia. A tracker from his Dem-
mond. Thurmond had also run for president in ocratic opponent’s campaign (Jim Webb) was
1948 on the prosegregation States Rights Demo- attending the event with a video camera. Allen
cratic Party (Dixiecrat) ticket. Included in those departed from his stump speech and referred to
remarks was the statement that “when Strom the Indian-American tracker as “macaca,” asking
Thurmond ran for president we voted for him. the audience to “give a welcome to macaca over
. . . And if the rest of the country had followed here. Welcome to America and the real world of
our lead we wouldn’t have had all these problems Virginia.” Macaca is an obscure Francophone
132 Blogs, Role in Politics

racial slur against Algerians. The Webb campaign Early blogs were counterinstitutional, usually
released the video to the Washington Post before run under pseudonyms. Later blogs began to be
posting it to YouTube, and the Post covered it. hosted by legacy media and political institutions.
The liberal blogosphere—particularly DailyKos. A political blog hosted by NYTimes.com plays
com—seized on the video and used it to con- a different role in politics than a blog hosted by
tinually raise questions about Allen’s past racial Blogspot.com.
comments. Progressive bloggers also used it to This typology yields four distinct blog types.
drive money and volunteers toward the Webb The first (closed and individual reputation) fea-
campaign, raising more than $300,000 for the tures independent blogs. All early blogs were
Democratic challenger. Webb went on to win the independent blogs, and it is the standard format
election by approximately 9,000 votes, giving the for the vast majority of blogs today. The second
Democratic Party a Senate majority. (open and individual) features community blogs.
The macaca episode indicates a break from DailyKos.com is the primary example of a com-
the previous moments of blog power. While munity blog. It is counterinstitutional in nature
the Drudge, Lott, and Rather examples all fea- but acts as a gathering space for an online com-
tured blogs forcing the media to alter coverage, munity of interest. Community blogs function as
the Allen episode featured the Washington Post quasi-advocacy groups. The third quadrant (open
breaking the story. YouTube, which was founded and institutional reputation) features bridge
in 2005, also played a prominent role in this blogs. These blogs combine the open architecture
episode. Rather than challenging media organi- of a community site with the existing reputation
zations, bloggers in 2006 made use of the latest of a large political or media operation. Think-
social media tools to directly participate in poli- Progress, the Center for American Progress’s
tics. DailyKos’s community blog architecture sup- blog, and Huffington Post both offer examples
ported mass fund-raising and volunteering by a of this format. The fourth quadrant (closed and
nationwide community of interest. Here, one sees institutional) features institutional blogs. Institu-
the role of blogs in politics expanding but also tional blogs such as Paul Krugman’s blog at the
becoming more varied. While community blogs New York Times augment traditional media and
like DailyKos leveraged social media to directly political institutions rather than challenging them.
contribute to a Senate race, other types of politi- Most blogs adopt the individual format, but the
cal blogs influenced politics in different ways. To most politically influential blogs tend toward the
understand the evolving role of blogs in politics, it other three formats.
then becomes necessary to understand the varying
architectures employed within the blogosphere. Partisan Echo Chambers
Noteworthy within the landscape of the (Ameri-
Types of Blogs can) blogosphere is the absence of prominent
As political blogging gained influence, it also centrist blogging hubs. The political landscape
was adopted by wider segments of society and features high-traffic conservative blogs such
adapted toward a wider range of ends. Develop- as Hotair.com and biggovernment.com. It fea-
ments in the underlying software platforms also tures high-traffic progressive blogs such as Dai-
contributed to varying uses. Political blogs can lyKos.com and talkingpointsmemo.com. But, no
be placed within a four-part (two-dimensional) equivalent centrist sites exist. This is indicative
typology to better understand their technological of the echo chamber phenomenon. As originally
affordances. The first dimension is open-versus- described by Cass Sunstein, the Internet allows
closed architecture. Closed blogs have a single citizens to seek out news and information that fit
author or a select group of authors. They offer with their existing preferences and biases. Politi-
slim opportunities for the audience to contribute cally engaged citizens in America tend toward the
content. Open blogs offer a diary structure, which poles—there is no robust, well-organized Ameri-
allows the audience to act as a participatory com- can center. While the political blogosphere has
munity, adding their own content to the site. The not caused political polarization in America, it
second dimension is institutional embeddedness. has doubtless been a contributor. Whereas the
Blood Sport Campaigns 133

broadcast news era tended toward centrism, the Pariser, Eli. The Filter Bubble. New York: Penguin
postbroadcast, niche news era tends toward par- Press, 2011.
tisan reinforcement. The blogosphere is a major Perlmutter, David. Blog Wars. New York: Oxford
example of this echo chamber phenomenon. University Press, 2008.
Prior, Markus. Post-Broadcast Democracy: How
Agenda Seeking Media Choice Increases Inequality in Political
Political scientist Richard Davis has helpfully Involvement and Polarizes Elections. New York:
coined the term agenda seekers to describe the role Cambridge University Press, 2007.
of blogs in politics. This phrase helpfully places Sunstein, Cass. Republic.com 2.0. Princeton, NJ:
bloggers among other sets of actors who seek to Princeton University Press, 2007.
influence the political and media agenda. The early
influence of blogs in politics was as a challenge
to existing media institutions. Then, those insti-
tutions adapted to the blogosphere. Today, blogs
serve as a cluster of outlets for citizen engagement Blood Sport
with politics. Bloggers, like other motivated seg-
ments of the public, seek to influence the agenda. Campaigns
The medium has become incorporated within the
political system rather than overturning it. These On September 5, 2012, former President Bill Clin-
agenda seekers play a variety of roles, depending ton addressed the Democratic National Conven-
both upon their goals and upon the varying blog tion. “Democracy does not have to be a blood
architectures they employ. There is no singular sport,” he said. “It can be an honorable enter-
role of blogs in politics. Rather, bloggers as agenda prise that advances the public interest.” Though
seekers use the medium to pursue multiple ends. Clinton’s statement seems uncontroversial, that
did not stop critics from pouncing, and thanks to
David A. Karpf social media, they were able to post their thoughts
George Washington University instantaneously, anonymously, and globally. On
Yahoo! News, for example, within seconds a
See Also: Alpha Blogger; Blogosphere; MoveOn dozen comments were posted under Clinton’s quo-
Effect, The; Myth of Digital Democracy. tation. Sixty seconds after Mitt Romney uttered
the phrase binders full of women, Web domains
Further Readings were purchased under that name. The “war
Davis, Richard. Typing Politics. New York: Oxford room” of Clinton’s era—releasing documents to
University Press, 2009. the press corps within a day of a scandal breaking
Karpf, David. “Macaca Moments Reconsidered: or appearing on television hours after allegations
Electoral Panopticon or Netroots Mobilization?” erupt—is extinct. Campaigns have reached a new
Journal of Information Technology and Politics, blood sport apex through social media.
v.7/2 (2010).
Karpf, David. The MoveOn Effect: The Unexpected Definition
Transformation of American Political Advocacy. The term blood sport comes from the Roman
New York: Oxford University Press, 2012. arena games in which violent fighting was a pub-
Karpf, David. “Understanding Blogspace.” Journal of lic spectacle at the expense of gladiators, reli-
Information Technology and Politics, v.5/4 (2008). gious martyrs, animals, and out-of-favor politi-
Kerbel, Matthew. Netroots: Online Progressives and cians. The goal was not just winning the fight
the Transformation of American Politics. Boulder, and inflicting pain in the process but provid-
CO: Paradigm, 2009. ing entertainment that draws blood and other
Kreiss, Daniel. Taking Our Country Back: The physical portrayals of brutality. Modern-day
Crafting of Networked Politics From Howard “blood sport” can refer to recreational activi-
Dean to Barack Obama. New York: Oxford ties including football, boxing, mixed martial
University Press, 2012. arts, and hunting, plus uncivilized practices like
134 Blood Sport Campaigns

dogfighting and cockfighting as well as cultural Components


forms like bullfighting. Usage of the metaphor For a campaign to sink to the level of attaining
encompasses ritualistic, fetishistic, and aesthetic blood sport status, six elements amid this social
components in which the code of behavior rises media revolution are necessary: (1) There needs
from competing gamesmanship to impaling prey. to be orchestration. Dirty laundry is not aired
Defining blood sport campaigns seems similar on clothespins accidentally. Even if an operative
to the U.S. Supreme Court’s definition of porno- is acting alone, the deed attains purposeful cohe-
graphic obscenity—“you know it when you see sion, and others latch onto it with like-minded
it.” The literature provides working definitions aims. (2) The aim is the destruction of the other
for negative attack campaigns and common crite- side. Blood sport campaigns do not cast aspersions
ria for lowering turnout, and while news reports on the opponent with any goal less than the other
and mainstream books frequently mention the side failing. (3) The orchestrated, destructive act
notion of blood sport campaigns, the scholarly is targeted toward revealing something salacious.
literature provides no conceptual definition. The violation is not a commonplace misdeed. It
As a point of departure, one can combine the captures the imagination, wrinkles the nose, or
elements of the concept drawn from John Barry, stimulates the senses. (4) A victim is involved. The
Thomas Hollihan, and communication scholars victim does not have to be a puppy or a pregnant
including William Benoit, who describe the char- spouse; it can be a concept such as justice or a
acter traits in campaign combat. Accordingly, one notion such as consistency. (5) The act has to be
defines a blood sport campaign as a campaign captured manifestly. Gary Hart did not unravel
that deploys tactics designed to cause a political when Miami Herald reporters were camped out-
actor personal humiliation based on issues irrel- side his home reporting allegations of impropriety;
evant to policy governance. he was sunk when a photo emerged of him with
his mistress on his lap. Howard Dean’s 2004 can-
Growth of Blood Sport Campaigns didacy was not upended by a poor showing in the
Every campaign season seems to sustain com- caucus but later that night when he screamed in
plaints of history’s most negative advertising. a unidirectional microphone. George Allen’s 2006
Candidates benefit from oppositional research- re-election in Virginia was not sunk by his support
ers unsealing their opponent’s divorce records, for the unpopular Iraq war but by the infamous
interviewing laid-off employees, scouring old macaca video on a blog. Finally (6), the item goes
college records, and tracking private receptions viral. Allegations grow legs across the Internet.
on video—methods not encountered in the aver-
age job interview. The political world, however, Anonymity
entices people into “rigid dichotomies of good The above six components of blood sport cam-
and bad, we and they, in-group and out-group,” paigns, and their growth, also mentioned above,
states Hans Eysenck. Research indicates that, as are engendered more easily through social media
cyberdiscourse finds itself in a marketplace with largely because of the ease with which they can be
little to no regulatory intermediary, political oper- executed anonymously. The identities of the com-
ations become more polarized. batants are often shielded. It is not uncommon
In an article about campaign speech in a to hear of political campaign practitioners tak-
changing digital landscape, Jean Seaton pre- ing their poll-tested, professional, astroturf mes-
dicted that, the more advanced that technology sages to the digital airwaves cloaked in grassroots-
would become, the more politics would devolve attired anonymity. Operatives routinely create
into less civilized terrain. According to Seaton, fake Twitter accounts, build comment threads on
“Politics, always with an element of the blood blogs, establish Facebook wall feeds, and buy Web
sport, moves towards the ethics and psychology site domains, all with little risk of being traced.
of the Roman arena, with a huge armchair audi-
ence enjoying the fighting for its own sake, and Reform
even having the thrill of a remote participation A democracy that thrives on free speech and open
in the outcome.” airwaves faces a balancing act of permitting views
Boehner, John 135

that can be offensive and vulgar while aspiring Boehner, John


for constructive decency in unrepressed argu-
mentation. The agenda-setting process of today John Andrew Boehner (pronounced Bay-ner)
can often hinge on popular hashtags and memes. became the 61st speaker of the U.S. House of
Citizens have gatekeeper roles, occupying vir- Representatives in January 2011. The speaker is
tual space, with the freedom to elevate discourse the presiding officer of the House, second in suc-
through online opinion forums or troll free public cession to the office of the president after the vice
spheres for exploitative purposes. Scholars, media president and the leader of the majority party in the
practitioners, and researchers argue over how to House. The speaker and the senate majority leader
handle this new frontier with its abuses. are the two most powerful members of Congress.
One proposal is censorship of comment sec- Speaker Boehner has championed the adoption of
tions on news sites. More promising are efforts social media technologies as an integral part of
by Web-based, fact-checking organizations like Republican House members’ campaigning, con-
PolitiFact.com and Factcheck.org that adjudicate stituent communication, and organization.
claims in political campaigns, and online ombuds- John Boehner was born into a working-class,
men who monitor the content of their own news Catholic family in the southwestern Ohio city of
forums. In the high-choice media environment, Reading in 1949. He swept floors in his family’s
content has a tendency to police itself. Salience bar at the age of eight. He was a linebacker on
can build democratically. Bogus news stories have the high school football team. He enlisted in the
a way of not generating page views, and fringe Navy after high school but had to leave the ser-
voices are diluted. Advancements in microblog- vice because of a bad back. He received an honor-
ging technology, while giving rise to citizens able separation. Boehner worked part-time jobs
essentially running their own printing presses as a custodian to pay for college, graduating from
and television broadcast studios, ought not abol- Xavier University after seven years. He was the
ish civil discourse in politics and allow the blood first college graduate in his family.
sport tacticians to contort public opinion.
Career in Politics
David E. Clementson Boehner entered public office as a member of the
Michael J. Beatty city council for Union, Ohio. In 1985, he was
University of Miami elected to the Ohio State House of Representa-
tives. Five years later, he ran against the incumbent
See Also: Astroturfing; Campaign Strategy; U.S. House representative from Boehner’s district
Candidate Image; Flog; Online Smear Campaigns; and won. To date, Boehner has held this seat for
Rumors; Social Media Strategies and Tactics; 20 years, winning re-election 10 times with little
Trending Topic; Truth Team; Twitter; Viral opposition in his heavily Republican district.
Marketing; YouTube. Boehner was one of the youngest members
when he entered the House in 1991, but he became
Further Readings one of the Republican Party’s rising stars. A mem-
Barry, John M. Power Plays: Politics, Football, and ber of the so-called Gang of Seven, Boehner and
Other Blood Sports. Jackson: University Press of other first-term Republicans challenged corrupt
Mississippi, 2001. practices such as the House Bank, a congressional
Benoit, William L. Communication in Political office run by the sergeant-at-arms, who let Demo-
Campaigns. New York: Peter Lang, 2007. cratic and Republican House members overdraw
Eysenck, Hans J. The Psychology of Politics. New their accounts without penalties for as many as
Brunswick, NJ: Transaction, 1999. eight months, and the House Post Office’s money
Hollihan, Thomas A. Uncivil Wars: Political laundering scheme involving several prominent
Campaigns in a Media Age. New York: Bedford/St. Democratic House leaders.
Martin’s, 2009. Boehner helped fellow Representative Newt
Seaton, Jean. “A Fresh Look at Freedom of Speech.” Gingrich be elected the Republican House Minor-
Political Quarterly, v.69/B (1998). ity Leader in 1994 and was also one of the
136 Boehner, John

coauthors with the minority leader of the Con-


tract With America. The scandals, the appeals of
the contract promising reforms in Congress and
in the nation’s finances, and political changes out-
side of Congress resulted in a 1994 House elec-
tion that gave Republicans majority control for
the first time in 40 years.
Boehner has been an active prompter of impor-
tant legislation since his election to the House.
He coauthored the 2001 No Child Left Behind
law with Democratic Senator Edward “Ted” Ken-
nedy. He wrote and won passage of the 2006 Pen-
sion Protection Act, perhaps the most thorough
revision of the pension system since the 1970s. He
voted for the $700 billion Troubled Asset Relief
Program (TARP) to bail out banks in 2008 but
opposed President Obama’s health care proposal,
the president’s decision to withdraw American
troops from Iraq, and the Democratic Party’s
economic stimulus plan. Boehner’s policy prefer-
ences tend to reflect his support of business and
his suspicions of big-government regulation. He is
also one of the House’s most effective advocates
of government-provided vouchers for attendance Speaker of the House John Boehner during an appearance at
at private and religious schools. the Values Voter Summit in Washington, D.C., in October 2011.
Speaker Boehner has often challenged govern- Boehner has been aggressive in promoting social media use by
ment efforts to regulate the Internet. In 2011, Republicans, at times having the highest Klout score in Congress.
Boehner denounced Federal Communications
Commission (FCC) network neutrality regula-
tions as an attempt by the government to take over
the Internet. He feared that the regulations, pub- control the Internet. Civil liberties groups feared
lished in 2010 to expand to broadband providers the bill threatened individual privacy.
the rules now governing phone companies, would When House Republicans were divided over
be used to control Internet content and political efforts to stamp out piracy of online content in
views. The FCC regulations sought to insure that bills such as the Stop Online Piracy Act, Boeh-
cable customers had equal access to all online ser- ner agreed not to bring the bills to the floor for
vices, content, and applications. They also sought a vote. The bills had become a contest between
to prohibit unreasonable network discrimination. traditional media and the new social media of
It is unclear what “unreasonable” meant. Facebook, Reddit, Google, Twitter, and Wikipe-
The House of Representatives passed the Cyber dia. Social media saw the bill as an assault on
Intelligence Sharing and Protection Act (CISPA) in Internet creativity and innovation. They also
April 2012, creating a process for private compa- feared that they were being enlisted in policing
nies and the national government to share online Internet content for law enforcement agencies.
information in order to thwart cyberattacks by Boehner’s decision to withdraw the bills from
foreign governments, criminals, and terrorists. consideration left the bills’ Democratic spon-
President Obama threatened to veto the act, pre- sors exposed, and Senate Democratic Majority
ferring a Senate version that granted the Home- Leader Harry Reid had to pressure fellow Demo-
land Security Department authority to monitor crats to withdraw their support.
cybersecurity in the United States. Speaker Boeh- Boehner’s reputation in the House is as some-
ner responded that the administration wanted to one willing to deal with all parties. A major Ohio
Boehner, John 137

newspaper claims that Boehner has perfected the House. He led many members of his party in an
art of disagreeing without being disagreeable. orchestrated series of demands for the House
Boehner rose rapidly though the Republican Democratic majority to return to the floor when
House leadership ranks, serving as chairman of then House Speaker Nancy Pelosi (D-CA) gav-
the House Republican Conference during the eled the session to a quick end on August 1, 2008,
104th Congress (1995–97). The House Republi- when an important energy bill sat ignored on the
can Conference organizes the Republican mem- House’s agenda. The Republican demands for
bers of the House, serves as a way for the House reopening the session were publicized by the mem-
party leaders to communicate with their members, bers’ streaming videos, tweeting, and texting from
and helps develop the agenda for the Republican their personal cell phones and laptop computers.
Party in the House. Chairman Boehner also led Barack Obama’s successful 2008 presidential
the Thursday Group, a Republican House leader- campaign showed how to enlist social media and
ship group composed of two dozen interest-group networking as ways to raise campaign contribu-
lobbyists sympathetic with Republican goals, in tions, persuade voters, and connect with support-
a highly publicized lobbying effort to raise grass- ers. Then–Minority Leader Boehner used this
roots and congressional support for the passage demonstration of social media’s power to chal-
of the key provisions of the Republicans’ Con- lenge his party members to increase their use of
tract With America. these technologies. In their weekly party meetings,
Boehner has served as chair of the House Com- they discussed how to effectively use social media
mittee on Education and Workforce and as the tools and which tools were the most successful.
Republicans’ minority leader. He became the sur- Boehner promised that the party would have
prise winner for the position of house majority an electoral advantage over the Democrats if they
leader in 2006 over then-Acting Majority Leader became expert users of the new media forms.
Roy Blunt (R-MO). Boehner won by promising Boehner taught by example, becoming one of
greater independence to the committees and more the House’s most frequent tweeters and holder
involvement by the regular party members in pol- of Congress’s highest Klout score. A Klout score
icy decisions. He also called for limits on the prac- tracks the frequency of a person’s name appearing
tice of earmarking and on government spending. in seven different social media forums.
Boehner became speaker of the U.S. House after Social media’s ability to direct unfiltered mes-
the Republicans regained control of the House sages to the public make it vastly preferable for
in 2011. Speaker Boehner is the first speaker to members who worry that the print and electronic
serve as his party’s majority and minority leader press may adversely affect the timing and content
since 1961. of their messages. Republican members are espe-
cially sensitive to the limits of traditional media
Social Media forms because of a feared liberal bias among jour-
Many members of Congress quickly adopted nalists and media elites. Television and radio are
social media when they became available. For costly and may be limited in their geographical
example, Twitter came online in summer 2006. reach. Social media permit communicating direct
In April 2007, Eric Cantor (R-VA), the Repub- partisan and election appeals, unlike the frank-
lican majority leader and then deputy minority ing privilege, the member’s ability to contact their
whip, became the first member of Congress to constituents through free postal mail, which pro-
establish a Twitter account. Boehner was one of hibits such campaigning.
the first members of Congress to use Facebook The 2010 congressional elections were a water-
as a way of contacting constituents and other shed moment in social media history. Almost every
Americans. Almost 300,000 Facebook contacts candidate running for Congress or a state guber-
were logged on his account (@SpeakerBoehner) natorial seat used Twitter. Minority Leader Boeh-
by June 2012. ner, working with his minority whip, Eric Cantor
Boehner recognized the advantages of social (R-VA), and chief deputy whip, Kevin McCarthy
media as a political weapon deployed by the (R-CA), set up a Web site eliciting public input to
minority party against the majority party in the create a policy agenda for the 2010 congressional
138 Boehner, John

campaign. America Speaking Out continues to more likely to contain multimedia links than were
attract online and Twitter feeds. Democratic members. This study also found that
Boehner’s staff orchestrated an aggressive vir- Republican House members not only used social
tual campaign that helped 85 new House Repub- media more often than their Democratic Party
licans to be elected in the 2010 House elections. colleagues but also that their tweets were both
Teams of staffers generated rapid response tweets, more substantial and more often retweeted than
e-mails, YouTube ads, and targeted messages were those of Democrats in the House. Republi-
to news media pointing out opponents’ gaffes, cans also outpaced Democrats in the number of
inconsistencies, or alleged falsehoods. They used followers on their Twitter lists. Only two Demo-
online virtual worlds such as Second Life to pro- crats were among the top 20 members of Con-
mote partisan positions. Social networking tech- gress with the largest Twitter followers.
nologies directed supporters of candidates to cam-
paign Web sites where they could make political Conclusion
donations. Once in office, these new Republican The adoption of social media is strikingly differ-
members were taught how to be savvy users of ent from earlier adoptions of new technologies by
social networking skills. members of Congress. Most congressional offices
The House speaker has used social media to did not use e-mail until the mid-1990s. Regu-
help mobilize interest groups and shape and moni- lar televising of House and Senate proceedings
tor public opinion. Social media also permit gaug- did not occur until 1979. Fewer members of the
ing constituent opinion and can reach out to new House were first adopters of faxing or individual
followers. House Republicans were early adopt- Web sites. The primary reason for the speed in
ers of Visible Vote, a digital media application which social media have been adopted is the urg-
that seeks to provide immediate communication ing of key party leaders such as John Boehner.
between elected officials and their constituents. Under his leadership, the U.S. House of Repre-
The Republican leadership prompted House sentatives and especially House Republicans have
committees to adopt both Facebook and Twit- entered the social media age.
ter. The House Financial Services and the Foreign
Affairs Committees instituted a service through Timothy J. O’Neill
which citizens can send questions to ask witnesses Southwestern University
at committee hearings. Republican Party leaders
launched a Facebook application listing “where See Also: Campaigns, Congressional (2010);
the jobs are” in 2011. Campaigns, Presidential (2008); Cantor, Eric; Klout
Boehner’s pioneering efforts with social media Score; McCarthy, Kevin; Pew Internet and American
and networking has affected the House pro- Life Project.
foundly. VoterTide’s 2012 Social Media Index
placed seven Republican office holders on its top Further Readings
10 nonpresidential-candidate list of politicians “Boehner, John Andrew.” Biographical Dictionary
who are the most linked and have the greatest of the United States Congress, 1774–Present.
impact on online sites. Boehner authorized Face- http://bioguide.congress.gov/scripts/biodisplay.pl
book’s first live streaming of a House session. It ?index=B000589 (Accessed August 2012).
occurred on January 4, 2011, during Boehner’s Chi, Feng and Nathan Yang. “Twitter Adoption
formal election and assumption of the office of in Congress.” Review of Network Economics,
speaker. The House Republicans streamed a live v.10/1 (2011).
presentation of President Obama’s 2012 State of Rainie, Lee and Aaron Smith. “Politics on Social
the Union address accompanied by real-time fact- Networking Sites.” Pew Internet and American
checking and a social question-and-answer forum Life Report (2012). http://pewinternet.org/
on their social media sites. Reports/2012/Politics-on-SNS.aspx (Accessed
A 2012 Pew study found that Republican September 2012).
members of the House were three and a half times Sides, John, et al. Campaigns and Elections. New
more likely to mention legislation and 60 percent York: W. W. Norton, 2012.
Bookmarking 139

Bookmarking in a secure database format (SQLite). Internet


Explorer’s Favorites are stored as individual files.
Bookmarking is the action of marking a Web site One problem that computer users have to tackle
on a person’s browser so that the person can eas- is the fact that, when they change their personal
ily access it for later use. This function is consid- computers, they have to remember to back up,
ered to be very significant, especially for users among other things, their bookmark lists. Thus,
who are interested in visiting regularly a number all browsers offer the function of exporting and
of Web sites and they are unable to remember importing the bookmark list. Also, many brows-
all the uniform resource locators (URLs), or they ers (more precisely the later arrivals—Firefox,
want to note interesting Web pages in order to Chrome, etc.) include the function of importing
read them later. The use of bookmarks speeds the list of bookmarks of other browsers (usually
up the process of browsing and eliminates con- Internet Explorer).
nection errors caused by errors that may occur Users usually tend to gather many book-
when typing a URL. The bookmark is stored in marks. But, bookmarks are only useful if users
any of various storage formats. All Web brows- keep them organized in a way that makes them
ers include bookmark features. Bookmarks easy to find again. On many occasions, organi-
are accessed through a menu in the user’s Web zation in folders is not enough. Firefox supports
browser and can be organized in folders for easy assigning tags to bookmarks for easy searching.
access to stored URLs. It can be time-consuming, but it does allow the
In addition to bookmarking methods offered user to have the same bookmark in multiple tag
by browsers, many external applications offer bundles. Firefox also introduced live bookmarks
bookmark management. In the political realm, as that contain a list of links to recent articles sup-
in the business sphere, the rapid proliferation of plied by a news site or Weblog, which is regu-
social media combines with the relative ease of larly updated via Rich Site Summary (RSS) feeds.
mining user identification and preference infor- Thus, they allow users to dynamically monitor
mation. This permits interested parties to use changes to their favorite news sources. Instead
social bookmarking, in combination with other of treating RSS feeds as HTML pages like most
“tagging behaviors,” as a way to collect what news aggregators do, they are treated as book-
users think of as private material in order to cre- marks that are updated in real time with links to
ate detailed user profiles. These profiles can then the appropriate sources.
provide the basis for sales, propaganda, and/ Today, many users work on multiple comput-
or political campaigns. While this practice is of ers during the day. The problem is that, if a person
concern to a growing number of social media works on multiple computers, keeping up with
and political scholars, it remains completely bookmarks requires that person to bookmark the
unknown and invisible to most of the buying— same sites on every computer. This problem was
and voting—public. solved by introducing bookmarking Web sites
Bookmarks first appeared in browsers back in that give the user on-the-go access to links any-
1993. The first browser to offer this function was where Internet access is available. A typical exam-
Mosaic, and they were called Hotlists. Today, all ple of such a service is Google Bookmarks, which
different browsers incorporate a built-in book- was introduced in 2005. Google Bookmarks is a
mark manager that controls the list of bookmarks. free online bookmark storage service available to
The list storage method varies, depending on the Google account holders. Users can access their
browser, its version, and the operating system bookmarks from any computer by signing onto
on which it executes. One method includes stor- their Gmail accounts. The bookmarks are search-
ing bookmarks in an HTML file (usually called able, and searches are performed on the full text
bookmarks.html). This approach permits publi- of the bookmarked pages, not just the labels and
cation and printing of a categorized and indented notes. It is worth noting that this service is com-
catalog and works across platforms. With this pletely separate from browser-based bookmark-
method, it is not necessary for bookmark names ing and should not be confused with the book-
to be unique. Other browsers store bookmarks mark function on any popular browser, Google
140 Born This Way Foundation

Chrome included. It is a cloud-based service that Born This Way


allows users to bookmark favorite Web sites and
add labels, tags, or notes. Other browsers offer Foundation
similar services. An extension of the above ser-
vice is social bookmarking, which enables users Founded in 2012 by popular music star Stefani
to add, annotate, edit, and share bookmarks of Germanotta (better known as Lady Gaga), the
Web pages. Born This Way Foundation uses social media
The term bookmarking is also employed in and advocacy to improve the lives of lesbian, gay,
various services with a similar function. For bisexual, transgender, and queer (LGBTQ) youth.
example, in Facebook a user can bookmark a The organization works to achieve this mission
Facebook app, group, or page in order for it to through communication campaigns directed at
constantly appear in the left-hand corner of the youth, through public advocacy, and by fund-
home page. The term bookmark is also employed ing research to identify the causes and possible
in various applications (e.g., word processing) in solutions to the problem of bullying. Along with
order to indicate a location in a document that a Germanotta, the Berkman Center for Internet and
user wants to access immediately. Society at Harvard University, the Mac­Arthur
Foundation, and the California Endowment are
Andreas Veglis also founding partners. The organization is led by
Aristotle University of Thessaloniki cofounder and president Cynthia Germanotta.

See Also: Aggregation; Blogs; Cloud Computing; Aims and Activities


Facebook; Social Bookmarking. The foundation employs a three-pronged strategy
in its mission to support and empower LGBTQ
Further Readings youth. It has identified the three pillars of this mis-
Google Bookmarks. http://support.google.com/ sion as safety, skills, and opportunity. The orga-
bookmarks/? (Accessed December 2012). nization promotes the first component, safety, by
Google. “Google Chrome Support.” http://support providing an online space where young people
.google.com/chromeos/a/?hl =en& can communicate openly with each other with-
topic=1692328&rd=1 (Accessed December 2012). out fear. Despite advances in gay rights and the
Heymann, Paul, Georgia Koutrika, and Hector increased visibility of young people coming out
Garcia-Molina. “Can Social Bookmarking Improve as gay, bisexual, or transgender, bullying and the
Web Search?” In: First ACM International psychological toll it takes on youth is a persistent
Conference on Web Search and Data Mining problem in the United States. Accordingly, with a
(WSDM’08), Stanford, CA, February 11–12, 2008. mantra of building a kinder and braver world, the
Michlmayr, Elke and Steve Cayzer. “Learning User organization’s first interactions with youth encour-
Profiles From Tagging Data and Leveraging age social acceptance, safety, and community. Sec-
Them for Personal(ized) Information Access.” ond, focusing on skill building, the Born This Way
Proceedings of the Workshop on Tagging and Foundation provides young people with training
Metadata for Social Information Organization, in public advocacy so that they can experience not
16th International World Wide Web Conference just self-acceptance but self-efficacy. By providing
(WWW2007), Banff, Alberta, Canada, May 2007. training and resources to support civic engage-
Microsoft Inc. Internet Explorer Help Center. http:// ment, youth may feel empowered to create change
windows.microsoft.com/en-US/internet-explorer/ on their own behalf. Finally, the organization aims
internet-explorer-help#internet-explorer=top to provide specific opportunities for young people
-solutions (Accessed December 2012). to become involved in programs that promote
Newson, Alex. Blogging and Other Social Media: change within their local communities.
Exploiting the Technology and Protecting the
Enterprise. Aldershot, UK: Gower, 2008. History and Core Values
Vandenbroek, Alicia. Bookmarking: Beyond the Launched on February 29, 2012, the founda-
Basics. Santa Barbara, CA: Linworth, 2012. tion is housed at Harvard University, a site that
Born This Way Foundation 141

these goals center on the creation of nonhetero-


normative attitudinal and behavioral changes in
relation to sexual identity.
Germanotta also pledged that Born This Way
would foster a culture of acceptance by discour-
aging bullying and by encouraging young people
to actively challenge bullying when they see it
happening around them. This is a distinguishing
feature of the foundation’s mission and the type
of social change it seeks to promote. Guided by
research on social media best practices from its
founding partner, the Berkman Center, the orga-
nization conveys the message that LGBTQ youth
and allies need to all contribute to creating a
culture that is not just kinder and more accept-
ing but also braver through its public communi-
cations, starting with the tagline “Empowering
Youth. Inspiring Bravery.” This slogan echoes the
refrain of Lady Gaga’s popular song, “Born This
Way” from which the foundation gets its name.
Promoting the belief that sexuality is a fundamen-
tal, intrinsic component of individual identity, the
song became an informal gay anthem when it was
released in 2011. Its lyrics proclaim not just that
Lady Gaga on tour for her 2011 Born This Way album in she was “born this way,” meaning different, but
Stockholm, Sweden, on August 30, 2012. Her foundation of also that “I was born to be brave.”
the same name uses social media to empower lesbian, gay, Beyond the slogans and the song, the founda-
bisexual, transgender, and queer (LGBTQ) youth. tion promotes this core value through a variety
of communications. It solicits stories of bravery
from members and visitors to the Web site as well
as ideas about how to build what it describes as
reflects the organization’s seriousness and its kinder and braver communities. Consistent with
focus on research as well as advocacy. Its debut the three pillars of its mission statement, by claim-
attracted widespread national publicity due to the ing bravery as its core value, the Born This Way
fame of its founder Lady Gaga and the involve- Foundation marries the positive ethos of the gay
ment of high-profile entertainers and other lead- pride movement with a more demanding norma-
ers, including former television talk show host tive model of citizenship that requires vigilance,
and media entrepreneur Oprah Winfrey; inspi- activism, and civic engagement as well as affirma-
rational speaker Deepak Chopra; and Secretary tion and visibility from its followers.
of Health and Human Services Kathleen Sibelius.
The foundation also benefited from its founder’s Carole V. Bell
fan following at its launch, attracting more than Northeastern University
100,000 registrants to the site in its first week.
During a series of interviews around the launch See Also: Antibullying Campaigns; Berkman Center;
with national news organizations that attracted a Clicktivism; Lesbian, Gay, Bisexual, and Transgender
general audience as well as youth-oriented media Rights; Musicians and Social Media in Politics.
like MTV, Germanotta (Lady Gaga) described an
idealistic and value-driven vision for the founda- Further Readings
tion. She characterized its ultimate goal as pro- Berkman Center for Internet and Society. “Born This
moting love, acceptance, and unity. At their core, Way Foundation Partnership.” http://cyber.law
142 Bottom-Up Campaigns

.harvard.edu/research/youthandmedia/bornthisway work such as mobilizing people and presenting


(Accessed December 2012). social and political issues from political elites to
Born This Way Foundation. “Our Mission.” http:// the public. Although academic discussions on the
bornthiswayfoundation.org/pages/our-mission/ importance of bottom-up campaigning have been
(Accessed August 2012). mentioned in many different political subjects, it
Preston, Caroline. “Lady Gaga’s Foundation Is Born, has been paid more attention due to the recent
With Help From Some Prominent Nonprofit political events in 2010 in the Middle East and
Midwives.” The Chronicle of Philanthropy. http:// north Africa, known as the Arab Spring.
philanthropy.com/article/Lady-Gaga-s
-Foundation-Is/130966 (Accessed December 2012). Arab Spring
Arab Spring refers to the antigovernment demon-
strations that occurred in the Arab region in late
2010. Starting in Tunisia, both large- and small-
scale political campaigns were initiated against
Bottom-Up Campaigns each of the long-term governments in more than
nine countries, such as Algeria, Bahrain, Jordan,
In recent years, the increased use of social media Egypt, Morocco, Yemen, and so on. Most impor-
and the development of information and com- tant, these demonstrations were organized by
munication technologies (ICTs) have led to a citizen groups who were good at utilizing social
significant transformation of society. Without a media such as YouTube, Facebook, and Twitter.
doubt, it also has caused substantial alterations in Facebook and Twitter, especially, assumed central
many areas of politics, especially in the methods roles in spreading the news about uprisings, form-
of communication. Recent research has reported ing and sharing political opinions, and encourag-
the potential role of social media as strengthen- ing the public to take part in the demonstrations.
ing ties between political actors and the public. The government’s attempts to suppress informa-
Ultimately, a healthy democracy, as currently tion via the Internet ended in failure because the
being pursued by contemporary society, results public’s common desire to change the regime pro-
from an accurate reflection of public needs. From liferated through social media platforms; thus,
this perspective, the introduction of social media any control over communication and information
has been welcomed in politics due to its charac- about uprisings that was uploaded by people on
teristics in terms of being an interactive commu- the Internet was beyond the government’s capac-
nication medium. Many observers expect social ity. As a result, the uprisings in the Arab region
media to be a vehicle to encourage the public to have been considerably successful for the public.
engage in political activities, and the effective use These unprecedented political events suggest
of social media could be a way to overcome prob- two momentous implications: (1) the gradual rise
lems in the current political environment, such as in importance of bottom-up campaigning created
political cynicism, political apathy, and low levels by the advent of social media, and (2) the possibil-
of political participation. ity of transformation from the traditional political
In general, bottom-up campaigning can refer process in which political elites are empowered to
to a campaign that is not organized by political deal with the determination of political issues to
parties or elites, but is arranged by the public. a new democratic process in which public opin-
Unlike the traditional custom of political behav- ion is equally reflected in those outcomes. The use
ior pursued in the top-down manner of the politi- of social media has therefore increased, and its
cal process, bottom-up campaigning is character- popularity has meant the public now has a way
ized by political activities of citizen groups who to freely express their political thoughts. Accord-
have acquired new political power due to the ingly, the public is now becoming empowered to
ability to deal with social media and to mobilize take over political matters that were typically the
like-minded people to reach their final political responsibility of political elites, such as mobiliz-
aims. That is, the development of social media ing the people and forming political agendas, as
have consequently transferred prime political noted earlier.
Bottom-Up Campaigns 143

Howard Dean Campaign characteristics of social media and the increased


On the other hand, the significance of bottom-up influence of voters resulting from the widening
campaigning is also mentioned in the research of communication channels that enabled them to
area of election campaigning. Academic discus- engage in political activities.
sions regarding this matter began with Howard In particular, the central point of difference
Dean’s 2004 campaign for the Democratic presi- between the Obama campaign and other cam-
dential nomination in United States. Despite his paigns was that it combined a traditional cam-
failure to gain the nomination, his campaign is paign organization, which mainly consisted of
considered one of the first attempts at utiliza- campaign professionals and skilled staff, with a
tion of the Internet as a political communica- new style of campaign organization, which con-
tion medium. During his campaign, his national sisted of grassroots people. This led to extensive
campaign director, Joe Trippi, used the Internet grassroots help by assigning professional tasks to
for fund-raising, and his primary works were to volunteers. The volunteers tried to find out how
manage campaign blogs such as Dean for Amer- they could help Obama’s campaign without any
ica and to update the Web site Meetup.com to supervision from national campaign staff. They
communicate with the potential voters. Meetup organized casual meetings by themselves to dis-
.com is a social networking Web site that allows cuss political issues and to share their thoughts
people who have common interests and hobbies about campaign issues. They also canvassed to
to come together in online as well as offline dis- encourage people to vote for Obama. Those activ-
cussions to be able to connect to each other. ities by volunteers were not designed by the cen-
Although Dean’s Internet campaign is widely tral campaign organization but managed by the
considered as an innovative campaign strategy volunteers themselves. Although the central cam-
and the creation of a new form of campaign paign staff trained volunteers to distribute their
communication using a bottom-up approach, campaign messages, they did not direct how to
many observers have mentioned that it failed to spread these messages to others. That is, the staff-
make a strong tie with voters at that time. ers in the central campaign organization played
a role in spreading unified campaign messages to
Barack Obama Campaign volunteers, while grassroots people took over the
Afterward, some of the ideas of Dean’s cam- role of distributors of the message.
paign strategy were further developed in Barack Various arguments have been presented on
Obama’s campaign in the 2008 U.S. presidential whether Obama’s campaign could be seen as a
election. At that time, Obama and his camp real- true bottom-up campaign in that the central staff-
ized that the traditional campaign style, a top- ers trained the volunteers to spread their cam-
down approach, was no longer as effective as it paign message. Nonetheless, it is meaningful that
once was. Furthermore, he needed to challenge the Obama’s 2008 campaign has led to a remarkable
Hillary Clinton campaign, which was firmly orga- change in terms of a new form of utilization of
nized with skilled campaigners who had technical mass media, especially in the use of the Internet,
knowledge in managing campaigns. In particular, and the management of campaign organization
a lack of awareness of his brand, compared to that compared to most traditional campaigns. Unlike
of Clinton, was a first priority. Taking all things the top-down approach method of traditional
into consideration, Obama chose social media to campaigning, in which campaign profession-
inform the public of his brand and to gather sup- als and political elites manage all the campaign
port across the country. For instance, he created activities, the Obama campaign enabled voters to
his own social networking Web site, MyBarack get involved in many kinds of campaign activi-
Obama.com, and initiated some Web pages for ties and to be empowered to handle campaign
fund-raising and group e-mailing to promote responsibilities on their own. Given that it is not
voting. Similar to other social networking sites, possible to manage the election campaign solely
participants could create their own profiles and by political parties or candidates or the voters, it
invite friends to their personal blogs. It also meant is possible through the cooperation of all three of
that Obama and his team fully understood the these actors; the Obama campaign could then be
144 Bounce Back

considered as a successful example of a bottom- Carty, V. Wired and Mobilizing: Social Movements,
up campaign. New Technology, and Electoral Politics. New
York: Routledge, 2010.
Conclusion Gibson, R. K. “New Media and the Revitalisation of
Because different forms of social media such as Politics.” Representation, v.45/3 (2009).
YouTube, blogs, Twitter, podcasts, and social net- Munoz, G. A. “Emotional Branding: Obama’s
working services by mobile application have been Bottom-Up Campaign.” Communication Studies,
quickly introduced into politics, it is true that v.6 (2009).
many alterations, especially in the form of com- Talbot, D. “How Obama Really Did It.” Technology
munication between political organizations and Review, v.111/5 (2008).
the public, have taken place. Furthermore, there
is no doubt that the development of social media
has opened doors to allow the public to engage
in political activities and to raise political agen-
das whenever they want. It also means that they Bounce Back
are no longer passive actors in expressing their
political thoughts, and they are empowered by In its litigation with Samsung, Apple relied on
the development of social media to achieve their several of its patents to argue that its iPhone and
political aims. iPad were completely novel or, as Apple attorney
As explained earlier, the utilization of social Harold McElhinny stated, that its iPhone and iPad
media by the public in the case of the Arab Spring had “created an entirely new product category.”
has shown the significant influence of social media Some of those patents referred to the design of
in the political process, and it has proven that the the devices; for example, U.S. Patent D593087
public can change the world with efficient use of covered the ornamental patterns and U.S. Pat-
social media. It could be regarded as a typical ent D504,889 the schematic drawings. Others
example of bottom-up campaigning. Perhaps a of those patents referred to the features of the
bottom-up campaign could help to revitalize poli- devices; for example U.S. Patent No. 7,469,381
tics and lead to a healthy democracy because the addressed the bounce back effect, U.S. Patent No.
party organizations would need to accept the var- 7,844,915 on-screen navigation, and U.S. Patent
ious opinions of the public, as mentioned in the No. 7,864,163 tap to zoom.
research. Therefore, the importance of bottom- U.S. Patent No. 7,469,381, or in brief ’381, was
up campaigning cannot be overlooked at least in issued on December 23, 2008. The registration
terms of the establishment of genuine democracy. document lists Bas Ording as its inventor. Ording is
also credited with inventing the dock magnification
Jooyeon Lee (user interface for providing access) for Mac OSX,
University of Leeds and worked at Apple until July 2013. As speci-
Chunsik Kim fied in Walter Isaacson’s biography of Steve Jobs,
Hankuk University of Foreign Studies Apple’s chief executive officer was approached in
the lobby of the company by a young designer who
See Also: Activists and Activism, Digital; Arab showed him a way to fit more icons in the dock
Spring; Campaigns, Grassroots; Campaigns, at the bottom of the screen. The young designer
Presidential (2004); Campaigns, Presidential (2008); was Ording, and Jobs hired him on the spot. Jobs
Cloud Protesting; Internet Gathering; Social Media was fond of many of Ording’s projects, and he was
Strategy and Tactics. particularly connected to the bounce back effect
described in U.S. Patent No. 7,469,381. The ’381
Further Readings patent abstract reads as follows:
Bennett, Lance W. “Changing Citizenship in the
Digital Age.” In Civic Life Online: Learning In accordance with some embodiments, a
How Digital Media Can Engage Youth, W. Lance computer-implemented method for use in
Bennett, ed. Cambridge, MA: MIT Press, 2008. conjunction with a device with a touch screen
Bounce Back 145

display is disclosed. In the method, a move- the overscroll bounce patent, but it would likely
ment of an object on or near the touch screen reintroduce the feature if Apple could not back
display is detected. In response to detecting the up its patent.
movement, an electronic document displayed As patent blogger Florian Mueller asserts, it
on the touch screen display is translated in is not surprising that the ’381 patent faced chal-
a first direction. If an edge of the electronic lenges to its validity because the bounce back
document is reached while translating the elec- effect constituted a great achievement in the realm
tronic document in the first direction while the of user-interface psychology, but in a strictly tech-
object is still detected on or near the touch nological sense, it had little merit. Additionally, as
screen display, an area beyond the edge of the a commenter on Mueller’s blog affirms,
document is displayed. After the object is no
longer detected on or near the touch screen There is no doubt that Apple has done the best
display, the document is translated in a second job in realizing the rubber band idea into their
direction until the area beyond the edge of the iOS GUI. You really have to give Apple credit
document is no longer displayed. for that. . . . However, just the fact that you
have done it well doesn’t mean others have no
Thus, the bounce back effect is a method for right to do it and catch up.
list scrolling and document translation, scaling,
and rotation on a touch screen display. This is Moreover, as an analysis by Global Innovation
what gives scrolling on an iPhone its rubber Commons reveals,
band-like bounce. When a user places a finger
on a device screen, drags an image or document The breadth of the intellectual property listed
past the screen’s edge, and then releases the fin- in this lawsuit seems to imply that Apple
ger, the image or document bounces back to fill is desperate to do anything in its power to
the full screen. In other words, if a person scrolls hamper the market acceptance of Samsung’s
too far on an iPhone, whatever he or she is look- phones and tablet. Unfortunately, in its
ing at bounces back into position. The ongoing attempt Apple may have exposed an inherent
conflict between Apple Inc. and Samsung Elec- weakness in its patent holdings. The absence
tronics Co, Ltd. has in part been fuelled by the of certain of its own patents in the cited art of
fact that, after Apple patented the bounce back the ’381 patent represents, at best, ignorance
effect and featured this effect on its products, on Apple’s part. This issue, as well as others,
Samsung also adopted a similar feature, and as may present significant challenges in Apple’s
such, all of the Samsung Galaxy phones have a suit against Samsung.
bounce back effect.
However, in October 2012, the U.S. Patent and Sorin Nastasia
Trademark Office invalidated Apple’s bounce, Southern Illinois University Edwardsville
scroll, or rubber-banding patent. The patent was
rejected on prior art considerations, including See Also: Bounce Back Effect; Innovation and
one concerning a controlling content display by Technology; Mobile Apps.
AOL/Luigi Lira published by the U.S. Patent and
Trademark Office in 2003 and another regarding Further Readings
a continuous scrolling list with acceleration by Global Innovation Commons. Intellectual Property
Apple published by the U.S. Patent and Trade- Analysis of Apple Inc.’s U.S. Patent No.
mark Office in 2007. The U.S. Patent and Trade- 7,469,381. http://www.m-cam.com (Accessed
mark Office claims that no inventive step was September 2012).
found between the prior art and Apple’s patent, Kim, Miyoung. “Jobs’ Exit Opens Door for Nimble
and therefore it was now up to the company to Apple Rivals.” Financial Post (August 25, 2011).
prove to the patent office or the appeals court Mueller, Florian. Patent Office Tentatively Invalidates
that the patent was new. As for Samsung, it Apple’s Rubber-Banding Patent Used in Samsung
already found a workaround to avoid infringing Trial. http://www.fosspatents.com/2012/10/
146 Bounce Back Effect

patent-office-tentatively-invalidates.html (Accessed as well as state-level claims of unfair competition,


September 2012). common law property infringement, and unjust
Mullin, Joe. “Billion Dollar Verdict Is a ‘Slap on enrichment. Samsung also filed multiple com-
the Wrist,’ Says Apple Lawyer.” Ars Technica plaints against Apple, the first of which was on
(December 6, 2012). April 22, 2011, at the Central District Court in
Wingfield, Nick. “Jury Awards $1 Billion to Apple in Seoul, South Korea. This was shortly followed by
Samsung Patent Case.” New York Times (August trials started by Samsung against Apple in Tokyo,
24, 2012). Japan, and in Mannheim, Germany, as well as at
Worstall, Tim. “Apple’s Patent Problems: USPTO the British High Court of Justice, the United States
Invalidates the Rubber Banding Patent.” Forbes District Court for the District of Delaware, and the
(October 23, 2012). United States International Trade Commission.
In June 2011, in the U.S. District Court in San
Jose, California, Judge Lucy Koh, a Harvard-
educated former federal prosecutor who had also
served on the California state bench and as a part-
Bounce Back Effect ner in a Silicon Valley law firm where she litigated
technology patent lawsuits, attempted to appeal to
The bounce back effect has been one of the company representatives’ goodwill. According to
points of contention in a series of ongoing law- a Bloomberg Business Week report from March
suits between two giant technology corporations, 29, 2012, Judge Koh noted, “Last time you were
the U.S.-based Apple Inc. and the South Korean- here you said that you had a business relation-
based Samsung Electronics Co, Ltd., regarding ship . . .” She then wondered, “Can we all just get
the design of smartphones and tablet computers. along here? Can I send you out to ADR,” refer-
In the course of the trials, Apple representatives ring to alternative dispute resolution, a form of
alleged that Samsung products had infringed private mediation. “I will send you with boxes of
upon Apple intellectual property by violating chocolates,” Judge Koh said. “I mean, whatever.”
several Apple patents, including the bounce back Yet, Apple did not conciliate with Samsung but
patent for an animation that produces a rubber rather returned in February 2012 to the U.S. fed-
band effect when a user scrolls past the end of a eral courthouse in San Jose to sue Samsung again.
window on an iPhone or iPad. In this lawsuit, Apple won decisively against
In 2010, Samsung supplied Apple with iPhone Samsung. On August 24, 2012, after just three
and iPad components with a value of $5 to $7 bil- days of deliberations, the nine jurors on the
lion, according to a Financial Post report from case found that Samsung infringed Apple’s pat-
August 25, 2011. However, Samsung’s Galaxy line ents on iPhone’s bounce back effect (U.S. Patent
of products comprising smartphones and tablets is No.7,469,381), on-screen navigation (U.S. Pat-
also a competitor of Apple’s iPhone and iPad. In ent No.7,844,915), and tap to zoom (U.S. Pat-
early 2011, Apple launched accusations that Sam- ent No.7,864,163), as well as design patents
sung’s Galaxy smartphones and tablets slavishly that cover iPhone features such as home but-
copied Apple’s iPhone and iPad. However, because ton, rounded corners, and tapered edges (U.S.
patents, trademarks, and designs are registered all D593087) and on-screen icons (U.S. D604305).
over the world, the dispute could not be solved in However, the jury concluded that Samsung did
the courts of a single country, and as such, the two not infringe Design Patent 504,889 regarding the
companies started many suits and countersuits in ornamental design of the iPad. This jury awarded
different countries in various parts of the globe. Apple $1.049 billion in damages and Samsung
Apple first filed a complaint against Samsung zero damages. Apple’s attorneys subsequently
on April 15, 2011, in the United States District filed a request to stop all sales of the Samsung
Court of the Northern District of California. The products cited in violation of the U.S. patents, but
38-page document submitted by Apple included this request has not been granted by the court.
federal claims for patent infringement, false des- Apple won the ruling in the United States, but
ignation of origin, and trademark infringement, it did not win many of the international rulings.
Brave New Films 147

In August 2012, a three-judge panel at the Seoul inclination of Judge Koh to reduce the amount
Central District Court in South Korea delivered a to be paid by Samsung to Apple. Regardless of
split decision, declaring that Apple infringed two what happens in the U.S. court, the Apple-versus-
of Samsung’s wireless patents, while Samsung Samsung litigation, including the fight over the
violated one of Apple’s utility patents, namely bounce back or the rubber band effect, showcases
the bounce back effect. The court awarded small the fierce global competition for consumer mobile
damages to both companies and ordered a tem- communications.
porary sales halt of the infringing products in
South Korea, although none of the banned prod- Sorin Nastasia
ucts were the latest models of Samsung or Apple Southern Illinois University Edwardsville
devices. Also in August 2012, a three-judge panel
at the Tokyo District Court in Japan decided that See Also: Bounce Back; Innovation and Technology;
Samsung Galaxy products did not violate Apple Mobile Apps.
technology patents and awarded legal cost reim-
bursement to Samsung. Further Readings
In Europe, the results of the lawsuits were Barrett, Paul. “Apple’s War on Android.” Bloomberg
mixed. A court in Germany initially granted Business Week (March 29, 2012).
Apple’s request to bar Samsung from selling Gal- Ju-huin, Kim. “Samsung, Apple on Edge Over U.S.
axy products in the European Union, but after Ruling.” Korea Herald (December 6, 2012).
hearing Samsung allegations that Apple evidence Kim, Miyoung. “Jobs’ Exit Opens Door for Nimble
was tampered with to make the dimensions and Apple Rivals.” Financial Post (August 25, 2011).
features of the two firms’ products seem more Mullin, Joe. “Billion Dollar Verdict Is a ‘Slap on
related and similar, this court rescinded the deci- the Wrist,’ Says Apple Lawyer.” Ars Technica
sion. The British High Court of Justice ruled that (December 6, 2012).
Samsung products are not too similar to Apple’s Ubertazzi, Benedetta. Exclusive Jurisdiction in
but refused to grant Samsung a request for ban- Intellectual Property. Tubingen, Germany: Siebeck,
ning Apple products from the British market. In 2012.
turn, Samsung unsuccessfully attempted to obtain Wingfield, Nick. “Jury Awards $1 Billion to Apple in
court orders in France and Italy to bar Apple Samsung Patent Case.” New York Times (August
products from the markets in these countries. 24, 2012).
Meanwhile, additional developments out of the
courts have thrown doubt on Apple’s big victory
in the U.S. federal court. In October 2012, the
U.S. Patent and Trademark Office ruled that 20
patents relating to scroll technology lacked nov- Brave New Films
elty and therefore invalidated Apple’s patent on
the bounce back effect. As Tim Worstall explained Brave New Films was founded in 2004 by Robert
in a Forbes article on October 23, 2012, patents Greenwald, an award-winning film and television
are granted for things that are new and inventive, director who left industry to pursue independent
and the U.S. Patent and Trademark Office pointed production. With an emphasis on social justice,
out that Apple’s scrolling bounce back was antici- Brave New Films uses traditional and new media
pated by products of other firms, and as such, it to encourage people to support their campaigns.
was neither new nor inventive. Centered on documentary and short video produc-
Based on claims that Apple tampered evidence tions, these campaigns come from a strongly lib-
and that the jury foreman was not honest, as well eral perspective. Common themes link these cam-
as on arguments regarding rubber banding patent paigns, and the organization’s strategies include
invalidation and lack of feature novelty, Samsung strategic use of digital media and alternative dis-
appealed the previous decision of the California tribution techniques and mobilization techniques
court. The ruling was expected during December to encourage people’s involvement. These activities
2012, but court hearings have so far revealed an create some impact, and they also draw criticism.
148 Brave New Films

Brave New Films pursues campaigns that focus


on holding corporations, politicians, and others
in positions of power accountable to the public
for their statements and activities. One theme in
these campaigns focuses on corporate respon-
sibility to the public, as with the documentaries
Wal-Mart: The High Cost of Low Price or Koch
Brothers Exposed. Another theme centers on the
media’s responsibility to the public, targeting par-
ticularly Fox News, as seen with the documentary
Outfoxed and the Web series called Fox Attacks.
A third theme focuses on government and politi-
cal responsibility. The campaigns target Republi-
cans and Democrats alike, such as on former New
York City mayor Rudy Giuliani and Connecticut
Senator Joseph Lieberman.
Earlier campaigns were built around docu-
mentary productions directed by Greenwald,
with dedicated Web sites and social media con-
nections. Walmartmovie.com boasts 2,500 pages
about the global retailer’s techniques for keeping
costs down at the expense of its employees and
the environment. With the growing popularity John McCain announcing his candidacy for president on April
of YouTube, Brave New Films moved some of its 25, 2007, in Portsmouth, New Hampshire. Brave New Films used
campaign activities online and even moved away short videos on YouTube, one of which was seen by as many as
from the documentary-centered campaign. 9 million people, to challenge McCain’s campaign.
More recent campaigns use series of short vid-
eos. For example, the popular The Real McCain
campaign looked for and revealed inconsisten-
cies in the 2008 presidential candidate’s cam- channel features more than 500 videos, drawing
paign through videos that juxtaposed clips of more than 52 million views. With the advent of
McCain’s speeches and media appearances with Brave New Theaters, interested citizens can use
clips from other media and interviews that pro- the documentaries available to organize their own
vided counterpoints. One video, “McCain’s community screenings and discussions. The docu-
YouTube Problem Just Became a Nightmare,” mentaries listed come from Brave New Films and
drew 9 million views on YouTube, going viral. other independent documentary makers.
The viral video—or a video that gains popular Project-specific Web sites organize campaign
and media attention rapidly within a compressed activities in a central location. In addition to
time period—functions as a key part of their dis- embedded videos, the sites usually feature a blog,
tribution strategies. background information, and press coverage.
Alternative distribution strategies augmented All sites encourage viewer interaction so long as
with social media help Brave New Films sidestep comments remain respectful. Almost all recent
mainstream media in order to reach audiences campaigns include social media connections with
directly. Several sites and YouTube offer free view- Facebook, YouTube, Twitter, Podcasts, Digg, and
ings of entire documentaries, such as The Real Google+. Among these, Facebook sees the most
Rudy. Slacker Uprising, about Michael Moore’s activity, with regular wall posts to issue-related
speaking tour, was offered to viewers who reg- press coverage and short videos, but those activi-
istered for the Web site for free downloading. ties occur only during the peak times for the cam-
On iTunes Brave New Films offers podcasts and paigns. The Facebook activities remain secondary
downloads of some documentaries. The YouTube to the dedicated sites.
Buzz Creation 149

Alongside raising awareness, these campaigns files/documents/pages/designing_for_impact.pdf


encourage audiences to act. They suggest con- (Accessed May 2013).
necting to or using social media, such as liking on
Facebook, tweeting on Twitter, or sharing on Digg.
Other suggestions encourage writing blog posts,
hosting screenings, writing letters to or calling poli-
ticians, signing petitions, and learning more about Buzz Creation
issues. They also solicit donations, and the orga-
nization uses Nationbuilder to help collect those Buzz creation is a systematic and organized effort
monies. As incentives, those donating can receive to encourage people to talk about a particular
various merchandise, such as posters, specially organization, institution, person, brand, product,
designed T-shirts, and DVDs and DVD sets of their or service and to recommend spreading it to oth-
films. As a 501(c)4 organization, Brave New Films ers that are part of their relational networks. The
relies on those donations to operate independently. word buzz literally refers to a low, continuous
Even with all these efforts, not all campaigns humming or murmuring sound, made by or simi-
succeed. When the Saints Go Marching In featured lar to that made by an insect. In common usage,
a short video and signature campaign that drew a buzz refers to a rumor, and buzz creation refers
more than 120,000 signatures toward swaying to the making of hype, or interest in something.
one senator to vote for the Gulf Coast Recovery Buzz is created when a receiver is captured by
Act. The bill died in Congress. Further, Brave New a message because of curiosity and interest. If the
Films and Robert Greenwald draw strong backlash receiver considers the message interesting, fascinat-
from right-wing media and other critics. Fox News ing, and entertaining and trusts the source, he or
figure Bill O’Reilly went so far as to call Green- she will not only be influenced by its contents but
wald “a ridiculous human being” and “just to the may also spread it to his or her relational network.
right of Fidel Casto.” Brave New Films posted that The creation of a buzz is thus directly related
footage to its YouTube channel with a response. to the creation of an appealing story around an
event, institution, organization, person, product,
Heather McIntosh or service. Stories that deal with taboo topics such
Boston College as sex, deceits, bathroom humor, or unusual, out-
rageous, or hilarious topics, as well as remarkable
See Also: Center for Social Media; Documentaries, stories and stories about secrets (both kept and
Social Media, and Social Change; i-Docs.org; YouTube. revealed), often create a buzz.
Buzz also becomes viral through the help of
Further Readings advocators, likewise known as testimonials or
Aufderheide, Pat. “In the Battle for Reality: ambassadors that support the message contents
Social Documentaries in the U.S.” (2004). http:// and are willing to help the sender of the message to
www.centerforsocialmedia.org/making-your distribute it themselves. Most effective communi-
-media-matter/documents/other-documents/battle cations are those based on personal recommenda-
-reality-social-documentaries-us-2004 (Accessed tions made by fellow individuals whose comments
May 2013). are less likely to be viewed as corporate sponsor-
Brave New Films. “About Brave New Films.” http:// ships. However, not all advocators are equally suc-
www.bravenewfilms.org/about (Accessed May cessful at creating buzz. A number of studies show
2013). that the most effective buzz is created by those
Brave New Theaters. “Michael Moore’s Slacker individuals with strong recognized personal influ-
Uprising” (2012). http://slackeruprising ence characteristics, such as celebrities and those
.bravenewtheaters.com (Accessed May 2013). who have large and extended relational networks.
Clark, Jessica and Barbara Abrash. “Designing for These studies also show how personal influence is
Impact: A Report on How Documentaries Make directly linked to the diffusion of an innovation,
A Difference.” Center for Social Media (2011). that is, the extent to which a new product or dis-
http://www.centerforsocialmedia.org/sites/default/ covery is adopted by a group of people and to the
150 Buzz Creation

circulation of commentaries. In other words, cer- on their social network sites. Blogs are popular
tain conversations expand faster and into larger media for electronic buzz marketing campaigns.
groups of society because of the influential role Marketers trade products or pay for bloggers’
and relational network of the advocator. promotion among their followers. Instant mes-
While the history of oral traditions is very saging (IM) applications are considered a vehicle
ancient, only in the past decade have organiza- for carrying out buzz marketing campaigns, with
tions, institutions, and political entities sought either humans or IM bots doing the pitching. IM
to capitalize on the impacts of personal influence bots are programs that attempt to stimulate con-
in people’s opinion formation and behaviors to versation as if they were real humans.
create one-to-one conversations with those who Ethical concerns have risen in relation to dis-
heavily influence their peers. In marketing, schol- guised marketing activities that create buzz, for
ars introduced the concept of buzz marketing as example, when organizations deliberately engage
synonymous to word-of-mouth marketing, which people to influence other individuals who do not
refers to interpersonal communication between realize they have been recruited and become them-
noncommercial sources about a commercial issue. selves promoters among their social networks.
Buzz marketing is a strategy to amplify initial This approach is known as undercover marketing
marketing efforts by third parties through their or stealth marketing and is based on the idea of
passive or active influence in order to create posi- creating buzz around a product or service so that
tive feelings. By creating sophisticated buzz cam- consumers market the product to others through
paigns, marketing people can attract individuals a network of referrals, which expands. Despite
and make them believe that they are influencers the fact that buzz creation for undercover market-
and thus convince them to spread the word to ing practices has been considered unethical and
their friends and colleagues. Other times, organi- deceptive in the code of conduct of the Word-Of-
zations hire people to actively share contents on Mouth Marketing Association (WOMMA) and
their networks on behalf of the organization and the American Marketing Association (AMA), a
thus support buzz creation. number of organizations still practice them.
Not all buzz creation is positive. Large corpora-
tions, and also governments and political actors, Chiara Valentini
can be targets of anticorporate groups, dissidents, Aarhus University
and activists who can use similar marketing tech-
niques to create and spread negative buzz about See Also: Activists and Activism, Digital;
them. Leaks about organizations’ and personali- Advertising and Marketing; Campaigns, Digital;
ties’ scandals often become buzz because of the Engagement Advertising; Ethics of Social Media in
secrecy and outrageous nature of the events and Politics; Going Viral; Instant Messengers, IRC, ICQ;
the inner human attraction to these types of sto- Network Influentials; Peer to Peer; Rumors; Viral
ries. Ongoing negative buzz is potentially danger- Marketing.
ous because it can later turn into a crisis.
With the event of information and communica- Further Readings
tion technologies, the Web, and especially social Carl, Walter J. “What’s All the Buzz About? Everyday
media, buzz creation has increased and gained Communication and the Relational Basis of
new forms of practices. Influencers use online Word-of-Mouth and Buzz Marketing Practices.”
media in the forms of e-mail, blogs, listservs, Management Communication Quarterly, v.19/4
personal Web sites, chat groups, and consumer (2006).
rating sites to disseminate ideas. YouTube is one Kirby, Justin and Paul Marsden. Connected
of the most-used social media for creating buzz, Marketing. The Viral, the Buzz and Word-of-Mouth
especially when an organization creates and posts Revolution. Burlington, MA: Elsevier, 2012.
funny videos that not only attract viewers but also Sprague, Robert and Mary Ellen Wells. “Regulating
stimulate sharing among them. Organizations can Online Buzz Marketing: Untangling a Web of
also hire people so that they can speak positively Deceit.” American Business Law Journal, v.47/3
about the organization, products, or services (Fall 2010).
C
Campaign Strategy and American Life Project reveal that, while most
citizens were technologically engaged, a significant
In the 2008 American presidential election, Dem- portion of senior citizens were not included. Of
ocratic candidate—and now president—Barack the 37 percent of senior citizens who actually used
Obama displayed the ability to learn from the the Internet, 60 percent were considered political
past by altering the long-held, traditional adver- users. However, during the 2008 election, only
tising and get-out-the-vote (GOTV) strategies of 22 percent of the entire population of senior citi-
the Democratic Party. After watching colleagues zens in the United States was considered politically
Al Gore and John Kerry fall to George W. Bush engaged online. Because senior citizens are typi-
in 2000 and 2004, Obama opted to utilize new cally a significant voting bloc during elections, the
methods of communicating with voters through lack of technological involvement is revealing, par-
big-budget branding. Rather than focus on tradi- ticularly because the 2008 election has likely revo-
tional strategies, Obama began working with new lutionized how campaigns are organized.
techniques that built more on Internet techniques While a technology gap unquestionably exists
similar to those that Howard Dean employed in the United States, much of the past research has
four years prior. However, the trend to move focused on income and education as being two
toward innovative campaigns with strong new variables that lead to someone being connected
media presences did not stop with the race for the or not. However, when looking at the impact of
presidency; instead, it has trickled down to the campaigns on participation and civic life, age is
lowest-budget, local races. emerging as the dividing factor. Looking back at a
discussion of new campaign techniques that have
Technology Gap developed in recent years, one finds a significant
Referring back to the 2008 election, more than discrepancy between younger and older citizens.
half of the voting-age population relied on the First, the numbers related to social networking
Internet as a political resource. While this num- are staggering. According to research, 75 percent
ber reflects the large societal impact of the Internet of citizens aged between 18 and 24 use social
and implies future trends for electoral politics, it is network sites, compared to 10 percent of those
important to take into consideration which demo- between 55 and 64 and only 7 percent of those
graphics of the population were using the Internet over 65. When considering the utilization of text
as a resource. The data from the 2008 Pew Internet messages, statistics show that 85 percent of those

151
152 Campaign Strategy

between 18 and 29 have sent or received a text there are traceable differences between various
message compared to only 11 percent of those subgroups. Boomers, the recently retired, and the
over 65. Likewise, 28 percent of those between 18 older elderly all bring different political leanings
and 29 have sent or received an e-mail, compared to the table and likewise have different levels of
to only 6 percent of those over 65. familiarity with new media technologies. Because
More directly, consider that 65 percent of vot- society continues to experience a gap in who has
ers between 18 and 29 said that they had watched access to technology and who does not, it suffices
some kind of campaign video online, and 59 per- to say that, in order to include as many segments
cent said they had read a political blog, visited a of the population as possible in political life, the
candidate’s Web site, or used a social networking needs of each segment need to be taken into con-
site as a source of campaign information in 2008. sideration. Old methods of engaging the popula-
Among those voters between 30 and 64 years old, tion politically need not be abandoned for techno-
however, only 38 percent said they had watched a logical advancement. Past research has indicated
campaign video online, and 38 percent said they a successful morphing of both new and old tech-
had looked at a blog, Web site, or social network- nology, accounting for the preferences of both the
ing site. Even more tellingly, only 17 percent of old and young. While the future of social capital
those over age 65 had seen an online video, and in America remains unclear, it can be argued that
just over 10 percent had visited a blog or cam- its maintenance is contingent upon how success-
paign Web site. The divide is clearly great. ful campaigns are in understanding their targets
It is expected that political campaigns will con- and working with citizen preferences.
tinue relying on technological advancements to
organize and structure their messages. Technol- The 2008 Election and Internet Presence
ogy has proven to be an attractive resource for In the age of ubiquitous computing, social net-
campaigns as their ability to narrowcast increases working tools saturate everyone’s daily life. Cam-
when constituents self-select what they access paigns are largely becoming decentralized, fueled
online. In addition, the number of adult Ameri- in part by the development and advent of social
cans who report the Internet as very important networking. Having the ability to communicate
to their political decision making continues to in real time to anyone, anywhere, has become a
increase, from 1996 onward. This has significant major advantage when understood and utilized
implications for how technology may be used in properly. The 2008 election proved to be the first
the future by political, and perhaps civic, organi- in which social networking sites, and other forms
zations. As the youngest generation of voters is of new media, ultimately became the medium and
the most attached to the Internet and soft news the message. What proves to be the best aspect for
sources for learning about campaigns, candidates campaigns and candidates about the new technol-
are unlikely to abandon them in favor of the ogy is that it makes it incredibly easy to reach mil-
media of yesterday. lions in milliseconds at little—if any—cost.
On the other hand, particularly at the state In 2000 and 2004, the Republican Party utilized
level, constituent demographics continue to be multilevel marketing techniques to help spread
taken into consideration. For example, some news and aid George W. Bush on his path to the
scholars argue that, just as constituent demo- White House. However, their techniques, when
graphics influence the home-style representation viewed in comparison to the Obama campaign of
of an official, it also influences how campaign and 2008, can be considered primitive at best. Barack
political messages are relayed, what type of media Obama is unquestionably the first Internet presi-
is used, and how issues are framed. This research dent—or perhaps wired president. He understands
also indicates that those regions reporting large the Internet and the power of new technologies.
numbers of elderly constituents are less likely to Some go as far as to ask who the United States’
rely solely on technology to broadcast messages. first chief technology officer will be.
When looking at elderly voters, scholarship has The Obama campaign ultimately took what peo-
typically focused on voters over age 65. Within ple thought they knew about politics and turned
this group, however, it is important to note that it into a different game for a different generation.
Campaign Strategy 153

He used the Internet in political ways that had campaigns: Web sites should be used to bring
never been thought of or conceived previously. together a large number of small donors, to draw
His outside-the-box thinking and strategizing led the faithful together, to understand the dynamics
to campaign ads appearing through text messages, of Internet giving, and to understand who uses
Facebook wall posts, and video games. While John the Internet and how one can most easily reach
McCain admitted he did not use e-mail, Barack them. The design of the Obama site made it as
Obama successfully navigated the plethora of new easy to donate as to do any type of impulse buy-
media techniques on his way to the White House, ing. Obama’s site demonstrated that he loved peo-
where he became the first president to ask for a ple rather than someone like Clinton, whose site
laptop computer to be put in the Oval Office. showed little besides her love for policy.
The 2008 campaign proved to be a new era for The importance of an Internet presence is
the use of the Internet in political campaigns and unquestioned. Researchers found that the 2008
marked the growing dominance of the medium as election marks the time when upstart Internet
a political tool. The Obama campaign was suc- publications upstaged their print counterparts
cessful in using the Internet to recruit and organize and became a crucial method of how voters get
1.5 million volunteers along with creating 8,000 their political news. In this election cycle, cam-
online affinity groups and organizing 30,000 paigns used paid-search techniques to target
events. He succeeded in doing electronically what online advertising and direct Internet users to
previously had to be done through shoe leather their own online content. Likewise, others believe
and phone banks: contact volunteers and donors, that campaign 2008 is likely to be remembered
and schedule and promote events. The first suc- as the one in which the bloggers pushed aside the
cessful step Obama took to developing a suc- mainstream media. While such an assertion has
cessful Web presence was beginning his Internet not necessarily been proven, there is some rem-
campaign by hiring two start-up college students, nant of truth in the idea that, for particular indi-
notably Chris Hughes, a founder of Facebook. viduals, blogs and online content have surpassed
Rather than attempting to strategize a plan from traditional news media. However, as the discus-
scratch, Obama recruited staffers who had hands- sion has emphasized, large proportions of the
on experience with the activities he and his chief electorate still have little to no online engagement.
strategist, David Axelrod, felt were necessary to Aside from traditional Web sites, the Obama
create the desired new media presence. With sites campaign was successful with its video presence
like YouTube, Facebook, and Myspace gaining on YouTube. Begin by considering the viral nature
popularity in 2006 as the new technology fads to of Will.i.am’s “Yes We Can” music video, which
affect campaigns, Obama immediately set out to generated millions of hits in a short period of
have a strong, active presence on each. In short, time. Obama’s YouTube video channel contained
Obama’s Internet presence in the 2008 election more than 1,800 videos with approximately 19
helped do for the Internet what the 1960 election million viewings. These numbers roughly outpace
did for television: legitimize its role and demon- McCain four to one. Rather than depending on
strate its potential. news coverage of events, the campaigns were able
The impact of this approach was clearly noted to take as much footage of any event they wished
throughout—and after—the election. On Face- and post it, edited or unfiltered, for anyone to
book, Obama had 2 million supporters, compared watch on the Internet. The news media was not
to 600,000 for McCain. Likewise, on Myspace, necessary to reach the voters.
Obama had 844,927 friends, while McCain had In another form of new media, the Obama
barely more than 200,000. Beyond the social net- campaign successfully utilized text messaging
working sites, Obama’s Web site was largely con- like no campaign before. Largely by choosing to
sidered far more dynamic than any of the others. first announce his vice president choice via text
Whereas critics suggested that much of Hill- message, Obama was able to garner nearly 2 mil-
ary Clinton’s Internet presence came off as disin- lion individuals onto his text message list, which
genuous and lacking authenticity, Obama’s cam- he would later use throughout the campaign to
paign appeared to learn the lessons from earlier contact supporters about ways to get involved in
154 Campaign Strategy

their local communities. This use has continued— as the Millennials, Generation X, or the Baby
including announcing the passage of health care Boomers) focus on overgeneralizations regard-
reform via text in March 2010. ing their alleged characteristics, they can still be
In an entirely new avenue of advertising, the useful when framed appropriately as overviews of
Obama campaign began utilizing in-game adver- group behavior and traits.
tising. Recognizing that the Playstation3 and The youth vote is unquestionably important
Xbox360 both connect to live Internet feeds, with regard to representation. Young adults
Obama purchased advertising space in popular tend to be represented by politicians who are
EASports titles, such as Madden NFL 09, NAS- more likely to listen to the views of older citizens
CAR 09, NHL 09, NBA Live 09, and Burnout because they are more likely to vote. Further, it is
Paradise. Ads would appear throughout the important for political parties as they attempt to
games on scoreboards and billboards. The adver- lock in young members into the future. With 82
tisements were targeted at eligible voters in key million members, the generation has tremendous
battleground states (mainly Colorado, Florida, voting power and has been shown to choose to
Iowa, Indiana, Montana, North Carolina, New become engaged in public life when they have the
Mexico, Nevada, Ohio, and Wisconsin). All motivation, opportunity, and the ability to do so.
were considered to be swing states, and all had In this regard, one would expect to have seen vot-
been won by Bush in 2004. The ad campaign ing increases in the 2008 election, given the atten-
ultimately cost just under $45,000 and ran for tion Obama paid to making it as easy as possible
roughly a month. for these voters to participate.
Barack Obama unquestionably had a budget-
ary advantage, yet John McCain failed to mount a
challenge in regard to social networking on other
types of free media. Obama had more friends on
Facebook and Myspace, more viewers watched his
YouTube channel, more subscribers were tweet-
ing him to be president on Twitter, and he had
thousands of more pictures uploaded to Flickr.
Obama properly understood and integrated new
media into his campaign. While he used Facebook
to talk about his enjoyment of playing basketball
and spending time with his daughters, Senator
McCain used the space to talk about his love for
fishing and his favorite movie, Letters From Iwo
Jima. The branding effect—and ultimate target-
ing strategy—was clear.

The Youth Vote


The Millennial Generation—those born between
1978 and 1996—has historically not been viewed
as politically active. The cycle that has led to lack
of involvement normally follows this logic: Young
voters do not vote or participate because politi-
cians do to not involve them; politicians do not
involve Millennials because they tend not to vote
or participate. As Scoot Keeter explains, high-tech
high touch is supposed to work with young vot-
ers. They are ethnically and racially diverse com- A young Barack Obama supporter at a rally on the Boston Common
pared to older citizens. While many journalistic during the presidential primary campaign in October 2007. Youth
accounts of generations present in America (such voters voted for Obama by a two-to-one margin that year.
Campaign Strategy 155

Youth voters, collectively, rose to meet expecta- running television ads. Web sites are less expen-
tions—turning out more than they had as a group sive than billboards. As Daniel Shea and Michael
since 1972 (the first year the voting age was low- John Burton point out, every position paper,
ered). Not only did they confirm popular suspi- every ad, every news release can be posted for all
cions by turning out, but they also overwhelm- to see at minimal cost. Yet, a campaign that relies
ingly voted for Obama, by a two-to-one margin too heavily on technology risks alienating, or at
over Senator McCain. With roughly 23 million the least not reaching, older voters. Given that
voters participating between the ages of 18 and older voters are historically more reliable, this is
29, the 2008 election saw an increase of almost 2 a risk for a candidate seeking election. Will candi-
million voters. Exit polls showed the role of youth dates opt to emphasize a traditional campaign or
voters in turning previously red states—particu- a digitalized campaign, or will they be forced to
larly North Carolina and Indiana—blue. While run both campaigns now at a higher cost? Even
overall turnout was up only modestly, young peo- though social networking and online videos are
ple provided much of that uptick. free to disseminate, as Obama showed through
Obama’s candidacy became a national move- the hiring of Hughes, there is a cost to find the
ment that lent itself to mass mobilization among best workers and consultants in the field.
that very portion of the population that is the At the national level, it appears highly improb-
most new-media friendly and tech savvy, the able that a candidate could succeed with only a
younger generation. They are black, white, yel- tech-savvy, youth-oriented strategy. Such a cam-
low, and various shades of brown, but what they paign simply runs the risk of not reaching enough
share—new media, online social networks, and important voters. However, this is not to say that
a distaste for top-down sales pitches—connects tech-savvy campaigns are not equally impor-
them. In other words, the bond is based on the tant to a candidate’s success. Previous research
medium. They build relationships in communities by Chapman Rackaway suggests that statewide
that transcend cultural, temporal, and geographi- candidates in 2009 were operating at a campaign
cal boundaries, and membership in these commu- level roughly comparable to those of presidential
nities provides for a civic engagement that is more candidates of 1996. Yet, many of the technologies
connected than ever. And ultimately, once people Rackaway examined involved significant financial
are connected through a network, you cannot dis- investments. With the Obama era of new media
connect. It is like unbreaking an egg. While such emerging with significantly smaller marginal costs,
journalistic explanations can oftentimes be over- it is important to see how quickly local candidates
stated, one has yet to find evidence that suggests begin attempting to utilize it. Obama was able to
such assertions are not likely to be valid. demonstrate the power of running two campaigns
targeted at two different groups of citizens: a tra-
Conclusion ditional, more expensive campaign based on tele-
Clearly new technologies emerged in 2008. And, vision and radio ads and a secondary campaign
even more clearly—particularly in the general based on technology and the Internet to reach the
election—Barack Obama dominated in utilizing younger voters with lesser direct costs. If candi-
new technology. On the question of campaigns, dates wish to reach all voters, it appears that their
Obama could communicate at almost no cost best approach is to balance a tech-savvy, youth-
with any number of supporters to direct their oriented campaign with a more traditional one.
influence throughout his election. Social network- Candidates fail to realize the potentially nega-
ing and new media are cheap, efficient ways to tive effects that a new media campaign can have
reach particular voters while also allowing for on their images. As we discussed earlier with
detailed targeting. However, as the numbers sug- regard to the Hillary Clinton campaign and the
gest, such techniques do not reach older voters John McCain Facebook page, a disingenuous new
at a similarly high rate. For once, young voters media campaign can counteract the intentions of a
are receiving attention that older voters are not. candidate and actually make them appear out of
Whether this continues in 2012 or not is a ques- touch. So far, it appears that personality and image
tion to be considered. YouTube is cheaper than play roles in the potential success of new media
156 Campaigns, Congressional (2000)

campaigns. Obama came off as a youthful politi- Germany, Julie Barko. “The Online Revolution.”
cian who ran a modern campaign. He understood In Campaigning for President 2008, Dennis W.
the technology and how it could be best utilized; Johnson, eds. New York: Routledge, 2009.
he did not merely choose to use it because he felt Gulati, Girish J. “No Laughing Matter: The Role of
he was expected to. The 2008 campaign demon- New Media in the 2008 Election.” In The Year of
strated what can happen when the right online tool Obama, Larry Sabato, ed. New York: Longman
merges with the right online dynamic. In short, 2010.
it is better to steer clear of tools like Twitter or Keeter, S., J. Horowitz, and A. Tyson. Young Voters
YouTube unless the campaign plans on regularly in the 2008 Election. Pew Research Center for the
updating them and giving followers a reason to People and the Press, 2008.
look at them. One tweet per month will come off Rackaway, Chapman. “Trickle-Down Technology?
as insincere and disinterested. And, even in the case The Use of Computing and Network Technology
of Obama, YouTube presented negative attributes in State Legislative Campaigns.” In Politicking
as well. Consider that he was put on the defensive Online, Costas Panagopoulos, ed. New Brunswick,
during the Democratic primary due to the release NJ: Rutgers University Press, 2009.
on YouTube of the inflammatory speeches of the Shea, Daniel M. and Michael John Burton. Campaign
Chicago pastor of his church, Jeremiah Wright. Craft. Westport, CT: Praeger, 2006.
There is no question that an online, new-media Smith, A. “The Internet’s Role in Campaign 2008.”
presence can work well to capture the attention of Pew Internet & American Life Project (2008).
young voters at a significantly lower cost; however, http://www.pewInternet.org/Reports/2009/6--The-
relying on such tactics to supplant a traditional Internets-Role-in-Campaign-2008.aspx (Accessed
campaign at the state and local level is asking too December 2012).
much if a candidate is targeting their entire cam-
paign at a younger demographic. As a consultant,
the media attention given to Obama’s successful
use of Twitter, Facebook, text messaging, and
YouTube posed serious problems when design- Campaigns,
ing campaigns for smaller political actors. A new-
media presence can activate voters who have never Congressional (2000)
even considered the role of a township trustee, let
alone voted for one. However, such activation The 2000 congressional elections, held in Novem-
simply does not assure victory. New media are ber, determined the composition of the 107th
simply not a less costly alternative to a traditional Congress. Before the elections, the 106th Con-
campaign. Rather, they are a new mechanism that gress had a Republican majority in both the House
alters ground campaigns for successful candidates of Representatives and the Senate. The election
by running in parallel to more traditional cam- coincided with the 2000 presidential election and
paign approaches. It casts a net over voters who resulted in a brief period of unified government
otherwise would have been untouched without under Republican control. As a result of the elec-
sacrificing the traditional approach. tion, Texas Governor George W. Bush controlled
the White House; in addition, Republicans main-
William J. Miller tained control of the House. The Senate, however,
Flagler College was evenly divided, with each party controlling
50 seats; this necessitated a tie-breaking vote by
See Also: Candidate Image; Evolution of Social Vice President Dick Cheney.
Media; Facebook; Twitter; YouTube.
Congress Before the 2000 Election
Further Readings In the previous congressional elections, held in
Fraser, M. and S. Dutta. “Obama and the Facebook 1998, the Republicans maintained control of both
Effect.” Media Post Publications (November 17, chambers, despite losing five seats in the House.
2008). In the Senate, they controlled 55 seats, and the
Campaigns, Congressional (2000) 157

Democrats controlled 45 seats. In the House, the margins in both the House and the Senate, both
Republican Party controlled 223 seats; the Demo- the national parties and outside interest groups
crats controlled 211 seats, and one seat was held focused intensely on winning the comparatively
by an independent. few competitive races. In a sample of 12 competi-
Mississippi’s Trent Lott served as Senate tive congressional races, David Magleby found
majority leader, and Tom Daschle, from South that parties and interest groups outspent the can-
Dakota, was the Senate minority leader. In the didate by a margin of two to one.
House, Speaker Newt Gingrich of Georgia led the One notable trend in this cycle was the record-
Republicans, and Missouri’s Dick Gephardt led setting sums of soft money raised and spent by
the Democrats. In addition, in mid-2000, Demo- both parties. Democrats, who had in the past
crats gained an additional Senate seat, following lagged behind the Republicans, achieved near
the death of Paul Coverdell, a Republican from parity in this election cycle. Specifically, Demo-
Georgia. At this point, Georgia Governor Roy crats raised $243 million, and the Republicans
Barnes appointed fellow Democrat, Zell Miller, to raised $244 million. This was particularly sig-
the seat. In the special election held in November nificant for Senate Democrats; the Democratic
2000, Miller won the seat in his own right. Senatorial Campaign Committee (DSCC) raised
In the run-up to the 2000 election, approval of $63 million; in contrast, in 1994, the DSCC had
Congress had ticked up slightly, buoying Repub- raised a paltry $372,000 of soft money.
lican hopes of retaining control. In 1999, a Gal- There was also an increase in hard money
lup poll found that Congress had a job approval during this round of congressional elections;
rating of 37 percent, with 56 percent of respon- although both parties increased their fund-raising
dents expressing disapproval. By October 2000, from the 1998 election cycle, the Republicans still
however, congressional job approval rose to 49 maintained a significant advantage in this area. In
percent, while the disapproval rating dropped to the 2000 election cycle, Democrats raised almost
42 percent. $270 million in hard money, while Republicans
raised more than $447 million.
Competitive Seats Another trend was a sharp increase in outside
Data from the Cook Political Report indicated contributions, with many groups doubling the
that only 47 of the 435 House seats up for election amount they had spent in the previous cycle. On
could be considered competitive races. This repre- the Democratic side, the American Federation
sented a decline from the 58 competitive seats in of Labor-Congress of Industrial Organizations
the 1998 election and was sharply contrasted with (AFL-CIO), National Education Association
elections in 1992, 1994, and 1996, all of which (NEA), Sierra Club, and League of Conservation
boasted more than 100 competitive seats. Voters (LCV) all stepped up their campaign activ-
On the Senate side, of the 33 races in the ities. On the Republican side, both the National
cycle, 24 seats were held by Republican incum- Rifle Association (NRA) and the National Fed-
bents, and nine seats were held by Democratic eration of Independent Business (NFIB) sharply
incumbents; of those, only four races were for increased election-related spending. During the
open seats. Moreover, only a small number of 2000 election season, interest groups collectively
these races were considered competitive. Demo- spent more than $260 million, one-fifth of what
crats focused on vulnerable Republican seats in the national parties spent.
Delaware, Florida, Michigan, Minnesota, Mis-
souri, Montana, Pennsylvania, and Washington. Issues in the Election
Republicans focused their energies on trying to Although the congressional election coincided
pick up vulnerable Democratic seats in Nebraska, with a close presidential race between Texas
Nevada, and New York. Governor George W. Bush and Vice President Al
Gore, neither party promoted a national cam-
Campaign Spending paign agenda, preferring to let candidates focus
Overall, the 2000 election cost more than any on district- or state-level issues. Although con-
other previous election. Because of the narrow gressional Democrats had hoped to capitalize on
158 Campaigns, Congressional (2000)

the continuing unpopularity of the Republican- Boyle found that only 18 percent of the popula-
initiated impeachment proceedings against Bill tion reported using the Internet to receive news
Clinton, Republican candidates responded by and information about the election. Those most
deemphasizing their party affiliation in election likely to use the Internet for political informa-
advertisements and direct mail and instead trum- tion were individuals in the 18 to 25 age group,
peted the resources they had secured for their with 85 percent of these respondents indicating
constituents. that they had some form of exposure to online
Overall, pre-election polls demonstrated that political information. In contrast, only 11 percent
no single issue captured the attention of vot- of voters 66 and over used the Internet to obtain
ers. In one Gallup poll, 17 percent of voters political information.
indicated that education was their top concern, Both political parties did use e-mail communi-
while another 12 percent stated that they were cation during the campaign, although usage was
most concerned with ethics, morality, and family limited. Specifically, the Democratic Party cre-
decline. Combined economic problems were the ated only four unique e-mails, and the Republi-
top concern of 21 percent of respondents, while can Party produced only two. According to the
another 11 percent stated that health care was Pew Research Center, in total, only 12 unique
their top concern. e-mails were produced during the 2000 campaign
During the campaign, both political parties and by both parties and outside interest groups. Dur-
interest groups mobilized voters by focusing on ing this cycle, the dominant method used to com-
an array of social and economic issues. Televi- municate with voters continued to be traditional
sion advertising focused on abortion and health direct mail.
care, while direct mail advertisements tended to
emphasize issues such as education, gun control, Notable Races
and Social Security. During the 2000 election cycle, several Senate
races garnered national attention. In New York,
Technology and the 2000 Election in the race for the Senate seat vacated by Demo-
Although Internet usage was growing at this time, crat Daniel Patrick Moynihan, First Lady Hill-
the 2000 election did not feature the use of Inter- ary Clinton ran against Republican Congress-
net technology and social media to the degree man Rick Lazio. Lazio vastly outspent Clinton;
that those technologies have shaped, and some- he spent $40 million, compared to Clinton’s $29
times dominated, subsequent elections. However, million. Despite this disparity in funding, Clin-
both of the presidential candidates had Web sites ton won the seat, securing 55 percent of the vote,
in 2000; many congressional candidates, in con- compared to Lazio’s 43 percent.
trast, did not. State party Web sites did exist, In Montana, a tragedy upended a close Senate
although many of them simply served as a source race that featured Democratic Governor Mel Car-
of news about the election, and were not used to nahan challenging incumbent Republican John
organize campaigns or as integral components of Ashcroft. In mid-October, Carnahan was killed
campaign strategies. Perhaps the most significant in a plane crash; because election law prevented
use of the Internet in the 2000 election, however, Carnahan’s name from being removed from the
was in the area of online fund-raising, since 2000 ballot so close to Election Day, his widow, Jean
was the year in which presidential candidate John Carnahan, pledged to serve if her husband won.
McCain (R-Arizona) broke all previous records Carnahan won the close election, with 50.5 per-
by using the Internet to raise $2.7 million in only cent of the vote, compared to Ashcroft’s 48.4 per-
three days. cent; this made him the first person to be elected
During the election cycle, 54 million U.S. to the Senate posthumously.
households, approximately 51 percent of the Finally, the race for the open Senate seat in
population, had a home computer. Although this New Jersey was noteworthy for the high sums
was a 9 percent increase from 1998, only 42 per- spent by the Democratic candidate, Jon Corzine.
cent of those with a computer used the Internet Corzine, a former chief executive officer (CEO)
at home. In line with this, a study by Thomas P. of Goldman Sachs, spent a record-setting $35
Campaigns, Congressional (2000) 159

approximately 77 percent of the races by a mar-


gin of at least 20 percent. In addition, within dis-
tricts, there was general congruence between the
results of the presidential race and the congres-
sional race. Specifically, congressional Democrats
won 81 percent of the districts that Gore won,
and congressional Republicans won 80 percent of
the districts that Bush won.
Despite the Republican victory, Democrats did
succeed in shrinking the Republican majority. In
the Senate, Democrats defeated five Republican
incumbents: Delaware’s Bill Roth, Michigan’s
Spencer Abraham, Minnesota’s Rod Grams, Mis-
souri’s John Ashcroft, and Washington’s Slade
Gorton. In contrast, only one Democratic incum-
bent, Virginia’s Chuck Robb, lost his seat. In the
House, the Republicans lost two seats; one was a
pickup by Democrats, while the other was won
by an independent. This reduced their majority to
nine seats, and this constituted the third straight
election in which Democrats chipped away at the
Republican majority in the House.
The Republican control of Congress was short-
lived, however. In May 2001, Senator Jim Jef-
fords, a Republican from Vermont, switched his
party affiliation, becoming an independent and
New Jersey Senate candidate Jon Corzine set a record for caucusing with Democrats. This shifted control of
personal money spent in his bid to win the Democratic the Senate to the Democrats, with Tom Daschle
primary—$35 million­—twice the previous record. His efforts assuming the role of majority leader.
were rewarded when he won 50 percent of the vote in 2000.
Kelly A. McHugh
Tina Cota-Robles
Florida Southern College
million of his own money to win the Demo-
cratic primary. In the general election, he spent See Also: Campaign Strategy; Campaigns,
another $60 million, nearly doubling the record Congressional (2002); Campaigns, Presidential (2000).
for candidate spending on a Senate race. He
defeated his Republican challenger, Congress- Further Readings
man Bob Franks, winning 50 percent of the vote Jacobson, Gary C. “A House and Senate Divided: The
to Franks’s 47 percent. Clinton Legacy and the Congressional Elections of
2000.” Political Science Quarterly, v.116/1 (2001).
Results and Subsequent Developments Kaid, Lynda Lee, ed. The Millennium Election:
The election resulted in unified government under Communication in the 2000 Campaign. Lanham,
Republican control. The outcome of the 2000 con- MD: Roman & Littlefield, 2003.
gressional election was a 50–50 split in the Senate Magleby, David B., ed. The Other Campaign:
and a small Republican majority in the House of Soft Money and Issue Advocacy in the 2000
Representatives. The House was composed of 221 Congressional Elections. Lanham, MD: Rowan &
Republican seats, 212 Democratic seats, and two Littlefield, 2003.
independents. Most of the House races were gen- Price, Tom. “Background: Nascent Revolution.” CQ
erally not competitive, with candidates winning Researcher, v.22/36 (October 12, 2012).
160 Campaigns, Congressional (2002)

Campaigns, Redistricting and Competitive Seats


As a result of the 2000 Census, states partici-
Congressional (2002) pated in redistricting; this had the potential to
alter the composition of many congressional dis-
The 2002 congressional elections, held in Novem- tricts. Overall, the new map favored the Republi-
ber, determined the composition of the 108th Con- cans, with House seats being reapportioned from
gress. Before the elections, the 107th Congress Democratic areas in the Northeast to Republican
was composed of a Republican majority in the areas in the South. According to James E. Camp-
House, with Democrats narrowly controlling the bell, if the 2000 election had been conducted with
Senate. The election occurred 14 months after the the new districts in place, George W. Bush would
terrorist attacks of September 11, 2001, ensuring have won an additional 10 districts.
that national security issues would factor promi- The result of redistricting was a map with 236
nently in the campaign. Buoyed by the popularity Republican-leaning districts and 199 Democratic-
of Republican President George W. Bush, as well leaning districts. Prior to the election, it was esti-
as a favorable round of redistricting and reappor- mated that there would be 178 safe Republican
tionment, Republicans maintained control of the seats and 154 safe Democratic seats. According
House, and regained control of the Senate. to an analysis by Congressional Quarterly, in the
2002 election, there were only 48 districts with
Congress Before the 2002 Election toss-up races. In addition, of the 34 Senate seats
The previous congressional elections, held in up for election in this cycle, 20 were Republican-
2000, had resulted in a brief period of unified held seats and 14 were Democrat-held seats. Con-
government under Republican control. Spe- gressional Quarterly judged only 13 of these races
cifically, the outcome of the 2000 congressio- to be competitive.
nal elections was a 50–50 split in the Senate
and a small Republican majority in the House Campaign Spending
of Representatives. In the Senate, Mississippi’s In the 2002 election cycle, Democrats raised more
Trent Lott was the majority leader, and North soft money than Republicans, overcoming what
Dakota’s Tom Daschle was the minority leader. had been a traditional disadvantage. Specifically,
In the House, Dennis Hastert of Illinois served the Democratic Senatorial Campaign Committee
as speaker, and Dick Gephardt of Missouri was (DSCC) raised $95 million, and the Democratic
minority leader. Congressional Campaign Committee (DCCC)
Republican control of Congress, however, was raised $56 million. In contrast, the National
short-lived. In May of 2001, Senator Jim Jeffords, Republican Senatorial Committee (NRSC) raised
a Republican from Vermont, switched his party $66 million, and the National Republican Con-
affiliation, becoming an independent and caucus- gressional Committee (NRCC) raised $70 million.
ing with the Democrats. His departure from the The Republicans, however, continued to enjoy
Republican Party gave Democrats control of the their traditional advantage in hard money. In the
Senate. In the run-up to the 2002 election, Presi- 2002 election cycle, Republicans raised $400 mil-
dent Bush made clear that one of his key goals lion, compared to the $220 million raised by Dem-
was to rally support for Republican candidates in ocrats. Although this was a lower level of spending
order for his party to regain control of the Senate. than in the 2000 election, it was a record-setting
In a Gallup poll taken in October of 2002, the amount for a midterm election cycle.
public appeared satisfied with Congress’s perfor- Outside interest group spending declined from
mance. Specifically, 50 percent of respondents the 2000 election cycle, especially on the Demo-
indicated that they approved of Congress, while cratic side. Groups that traditionally supported
40 percent expressed disapproval; the remaining Democrats, including Planned Parenthood,
10 percent had no opinion. Notably, this repre- Sierra Club, and the National Association for
sented a higher approval rating than Congress the Advancement of Colored People (NAACP),
had enjoyed before any of the three previous mid- all spent less on this election. In contrast, two
term elections. key Republican-leaning groups, the Club For
Campaigns, Congressional (2002) 161

Growth and the National Federation of Inde- important” in their voting decision. Furthermore,
pendent Business, increased their spending from on this issue, Republicans held a 29-point advan-
2000 levels. tage over Democrats, with 57 percent of respon-
In accordance with this, in 2002, party spend- dents stating that Republicans could best handle
ing on the ground game surpassed the spending the issue of terrorism and national security, com-
of outside interest groups. Republicans made a pared to only 27 percent who adjudged Demo-
particular effort in this area, with House Repub- crats to be superior on this issue.
licans launching the Strategic Taskforce to Orga- Although terrorism was the dominant issue
nize and Mobilize People (STOMP); STOMP in the campaign, candidates also focused on a
dispatched Republican luminaries to competitive variety of domestic issues. On the Republican
races in order to raise money, recruit volunteers, side, both the candidates and the national party
and mobilize Republican voters. focused on taxation; tax issues were the most
frequent topic of mailers and campaign commer-
Issues in the Election cials. Another common theme for Republicans
The 2002 election cycle was the first election was prescription drug benefits for seniors. Spe-
after the terrorist attacks of September 11, 2001, cifically, the party trumpeted the House’s success
when Islamist extremists hijacked four commer- in passing a prescription drug bill that had stalled
cial planes, with three planes crashing into the in the Democrat-controlled Senate. In contrast,
Pentagon and the Twin Towers in New York Social Security was the most prominent issue in
City; the fourth plane was diverted by passengers communications from Democratic candidates;
and crashed in rural Pennsylvania. Nearly 3,000 direct mail and television commercials focused on
Americans and many international citizens who the specter of a Republican plan to privatize the
were working in New York’s financial district program. Direct mail communications from the
were killed in the attacks. Democratic Party focused mainly on prescription
One of the most notable effects of the terrorist drug benefits and education issues.
attacks was a spike in the popularity of the presi-
dent. Before the attacks, the president’s approval Technology and the 2002 Election
rating stood at 51 percent; immediately after the Although Internet usage had increased between
attacks, however, Bush’s approval rating jumped 2000 and 2002, in this election cycle few Ameri-
to 90 percent. Although his approval rating cans sought election information online. A study
dropped from these stratospheric levels, in the by the Pew Research Center found that only 22
run-up to the 2002 election Bush remained enor- percent of Internet users searched online for elec-
mously popular, enjoying a 63 percent approval tion information; this was up from 15 percent in
rating. the previous election cycle. Of those users, 79 per-
Capitalizing on his popularity, Bush helped cent reported that they sought specific informa-
campaign for Republicans in competitive races. tion on the positions of a political candidate, a
During the election, he made a total of 108 cam- jump from 69 percent in 2000. Overall, however,
paign stops for 46 Republican candidates for the only 11 percent of users said the Internet was
House and Senate. He visited Missouri seven times their main source for political information. Tele-
and South Dakota and Minnesota five times each. vision remained the dominant source of political
David Magleby and J. Quin Monson estimate that, information for most voters.
during these visits, the president helped raise $140
million for Republican candidates. Vice President Notable Races
Dick Cheney, First Lady Laura Bush, and former During this election cycle, both national parties
Republican Mayor of New York Rudy Giuliani also and interest groups focused intensely on a small
made visits on behalf of Republican candidates. number of competitive races, especially in the
A pre-election Gallup poll confirmed that Senate. One such race was in Minnesota. The
national security issues loomed large for voters. tight race between Democratic incumbent Paul
In the poll, 83 percent of respondents stated that Wellstone and Republican Norm Coleman, the
terrorism was “very important” or “extremely mayor of Saint Paul, was marred by tragedy when
162 Campaigns, Congressional (2004)

Wellstone was killed in a plane crash in late Octo- for winning candidates was nearly 40 percent. In
ber. The party chose Walter Mondale, former vice addition, challengers only succeeded in defeating
president and 1984 Democratic presidential can- four incumbents; this occurrence was a historical
didate, as his replacement. The NRSC spent $8.3 low. This put the re-election rate at 79 percent for
million on the race, while the DSCC spent $7.5 the Senate and 98 percent for the House.
million. Coleman went on to win the election,
garnering nearly 50 percent of the vote, compared Kelly A. McHugh
to Mondale’s 47 percent. Tina Cota-Robles
Another costly Senate race occurred in South Florida Southern College
Dakota, between Democratic incumbent Tim
Johnson and Republican Congressman John See Also: Campaign Strategy; Campaigns,
Thune. The DSCC transferred $4.5 million in Congressional (2000); Campaigns, Congressional
soft money and $1.4 million in hard money to the (2004).
race; similarly, the NRSC transferred $3.5 mil-
lion in soft money and $900,000 dollars in hard Further Readings
money to South Dakota Republicans. Including Campbell, James E. “The 2002 Midterm Election: A
expenditures by interest groups, a total of $24 Typical or an Atypical Midterm?” Political Science
million was spent on the race, making it the most and Politics, v.36/2 (2003).
expensive in U.S. history. Johnson won the elec- Jacobson, Gary C. “Terror, Terrain, and Turnout:
tion, narrowly maintaining his seat by a margin Explaining the 2002 Midterm Elections.” Political
of just 524 votes. Science Quarterly, v.118/1 (2003).
Magleby, David B. and J. Quin Monson, eds. The
Results and Subsequent Developments Last Hurrah? Soft Money and Issue Advocacy in
The 2002 midterm elections resulted in Repub- the 2002 Congressional Elections. Washington,
lican control of both the Senate and House of DC: Brookings Institution Press, 2004.
Representatives. In the Senate, Republicans held Pew Research Center for People and the Press.
51 seats, the Democrats held 48 seats, and one “Political Sites Gain, but Major News Sites
seat was held by an independent. In the House, Still Dominant: Modest Increase in Internet Use
the Republicans controlled 229 seats, while the for Campaign 2002.” http://pewinternet.org/
Democrats controlled 205. Reports/2003/Modest-increase-in-Internet-use-for
The election represented a strong showing for -campaign-2002/Report/Findings.aspx (Accessed
the Republican Party and testified to the popular- December 2012).
ity of President Bush; Republicans bucked the his-
torical pattern that the party in the White House
would experience midterm loses. Specifically,
Republicans enjoyed a net gain of two Senate seats
and eight House seats. In the Senate, Republicans Campaigns,
successfully won three seats held by Democratic
incumbents in Georgia, Missouri, and Minnesota. Congressional (2004)
The only Democratic pickup in the Senate was in
Arkansas, where the incumbent Republican was The 2004 congressional elections, held on
plagued by a personal scandal. November 2, determined the composition of the
Overall, turnout for the election was 29 per- 109th Congress. The elections, which occurred
cent, slightly below the turnout in the 1998 mid- at the same time as a closely contested presiden-
term elections. Some states with competitive races tial election, resulted in Republicans maintaining
saw much higher numbers. For example, the control of both houses of Congress. A central
highest turnout occurred in Minnesota and South issue in the campaigns was the partisan polariza-
Dakota, with 61 percent turnout in those states. tion surrounding the George W. Bush presidency.
The competition during this election cycle was In addition, this election marked a large increase
particularly low. The average margin of victory in Internet activity by both campaigns and voters.
Campaigns, Congressional (2004) 163

Congress Before the Election 47 competitive seats in 2002. Moreover, in 2003,


In the previous congressional elections, held in after gaining control of the Texas legislature, state
2002, the Republicans maintained control of Republicans engaged in a second round of redis-
the House of Representatives and gained con- tricting, altering the boundaries of several con-
trol of the Senate. In the wake of the September gressional districts with Democratic incumbents.
11, 2001, terrorist bombings, under the leader-
ship of President George W. Bush, Republicans Campaign Finance Reform
were able to buck the historical trend whereby The 2004 election was the first election in which
the party holding the White House traditionally parties and candidates were subject to the regula-
loses seats in the midterm elections. In the 108th tions of the Bipartisan Campaign Reform Act of
Congress, Republicans controlled 229 seats in 2002 (BCRA), often referred to as the McCain-
the House and Democrats controlled 204 seats; Feingold Act. The BCRA contained various pro-
one seat was held by an independent. In the Sen- visions designed to make the funding of elections
ate, 51 seats were controlled by Republicans, 48 more transparent; this included the elimination
by Democrats, and one by an independent. Den- of the soft money loophole, which had allowed
nis Hastert from Illinois was the Speaker of the individuals to give unlimited money to political
House and California’s Nancy Pelosi was minor- parties for party-building activities or issue adver-
ity leader. In the Senate, Tennessee’s Bill Frist was tising. In addition, the act doubled the limit for
majority leader and South Dakota’s Tom Daschle individual contributions to a candidate, raising it
was minority leader. to $2,000; it also increased the amount an indi-
Prior to the elections, polls showed public dis- vidual could donate to a party, from $20,000 to
satisfaction with Congress. In a Gallup poll in $25,000.
late June 2004, only 41 percent of respondents The BCRA contained a “stand by your ad”
indicated they approved of Congress’s job per- provision, which required parties and candidates
formance and 52 percent expressed disapproval. to identify sponsorship of political ads. Although
This poll, however, showed that Democrats and these rules applied to television advertising and
Republicans diverged in their assessment of Con- direct mailing, at the time of the 2004 elections,
gress. Specifically, 58 percent of Republicans the Federal Election Commission exempted most
approved of the job Congress was doing, com- digital communications from regulation. Specifi-
pared to only 28 percent of Democrats and 39 cally, mass e-mail and text messages were not sub-
percent of independents. ject to disclosure requirements.
In this cycle, the BCRA did little to arrest the
Level of Competitiveness in increasing costs of congressional campaigns.
House and Senate Races According to OpenSecrets.org, in 2004, the aver-
Although the presidential race between Presi- age winner in a House race spent $1 million,
dent Bush and Massachusetts Senator John Kerry while the average winner in a Senate race spent
remained close throughout the campaign, several $7.8 million. In contrast, in 2002, the average
factors made it unlikely that the Democratic Party House winner spent $898,000 and the average
would gain control of Congress. In the Senate, the Senate winner spent $5.3 million.
Democrats were defending 19 seats, 10 of which
were in states that Bush carried in 2000. In con- Issues in the Election
trast, Republicans were defending only 15 seats; No single national issue dominated the 2004 con-
all but three of those races were in states Bush had gressional campaigns. This was demonstrated by
carried in 2000. a Gallup poll taken in mid-October 2004; when
The situation in the House was similarly unfa- asked what they considered to be the most impor-
vorable for a Democratic takeover. The redistrict- tant issue in the 2004 election, 32 percent of
ing from the 2000 census had reduced the num- respondents said the economy, 29 percent said ter-
ber of competitive seats, and prior to the election, rorism, 22 percent said Iraq, and 15 percent said
Congressional Quarterly identified only 37 health care. Additionally, Democrats and Repub-
House seats as competitive; this was down from licans indicated that different issues motivated
164 Campaigns, Congressional (2004)

their electoral choices; Democrats were most con- Network (MSN) for election news. Notably, 33
cerned about domestic issues, such as the econ- percent of those who sought news online indi-
omy and Social Security, while Republicans rated cated they felt that traditional news sources did
terrorism and moral issues as most important. not provide enough information about political
Another issue separating the voters was atti- issues and candidates’ positions.
tudes toward President George W. Bush; in the In addition, for the first time, Web sites became
month before the election, Gallup found highly a standard feature of congressional campaigns,
polarized attitudes regarding his administra- and in 2004 all 68 Senate candidates maintained a
tion’s performance. Specifically, 71 percent of personal Web site. Notably, in addition to provid-
Republicans strongly approved of incumbent ing information about the candidate, campaigns
Bush, while 68 percent of Democrats strongly used these sites to encourage voting; 63 percent of
disapproved of him. candidate Web sites provided information about
Because of this polarization, in close races the voter registration, and 32 provided information
national parties focused on increasing the turnout about obtaining an absentee ballot. This was a
of their bases. The Republican National Commit- sharp jump from 2000, when only one-quarter of
tee (RNC) developed a 72-hour task force, which Senate Web sites provided any information about
used databases to pinpoint likely Republican vot- voting opportunities.
ers before Election Day. On the Democratic side, Another frequent feature on the Senate sites
more than 30 groups, including EMILY’s List and was a function that allowed visitors to customize
the Sierra Club, worked under the umbrella of an e-mail letter extolling the candidate and then
America Votes to contact and turn out likely Dem- send it to friends and family; this was available on
ocratic voters. In addition, in competitive congres- 28 sites. Another 22 sites provided a template for
sional races in this cycle, an average of 21.7 inter- e-mailing a letter to a newspaper.
est groups participated in voter mobilization. In addition, in this cycle many congressional
campaigns began using e-mail as part of a voter
The Internet and the 2004 Election outreach strategy; however, it was still used less
During the preceding years, Internet use had than other traditional forms of campaign com-
grown rapidly, and by 2004, 61 percent of the munication. Specifically, in competitive states,
adult population was online. In accordance with 15.2 percent of voters reported receiving e-mail
this, prior to Election Day, many voters used the communications from a campaign; in contrast, 69
Internet to research candidates and issues. A sur- percent of voters received phone calls and 72 per-
vey conducted by the Pew Research Center found cent received mailers.
that 31 percent of Americans got at least some of The national committees for both parties also
their election news online, and 18 percent of the invested in online advertising, with the RNC
public used the Internet as their primary source spending $487 million and the DNC spending
for news; this was up from 11 percent in 2000. $257 million. Most of these funds, however, were
In addition, Pew found that Americans reported devoted to advertising for presidential rather than
using the Internet for a wide variety of political congressional candidates.
activities; among Internet users, 52 percent of
adults went online to get political news or go to Notable Races
chat rooms, 35 percent used e-mail to discuss pol- In 2004, two Senate candidates made an online
itics, and 11 percent used the Web to volunteer or strategy the centerpiece of their campaigns. In
donate money to a campaign. Florida, Democratic candidate Betty Castor hired
When seeking online news, citizens tended to Larry Biddle as her deputy campaign manager;
gravitate toward traditional, established outlets, he was a veteran of the of Howard Dean cam-
with 43 percent reporting that they obtained news paign. In the Democratic primary, Castor initially
from sites like CNN.com and the online version lagged behind her better-funded opponents; her
of the New York Times. An additional 28 per- campaign rebounded after she launched a fund-
cent reported that they relied on service providers raising Web site modeled after Dean’s. She man-
such as America Online (AOL) or the Microsoft aged to raise $1.5 million in the second quarter of
Campaigns, Congressional (2004) 165

2004 and collected $40,000 in one six-day fund- John Thune challenged Senate minority leader
raising haul. and three-term incumbent Tom Daschle. Thune,
After winning the primary, Castor continued who had lost the 2002 Senate election by a little
to use an online strategy in the general election more than 500 votes, received strong support
campaign against Republican Mel Martinez, sec- from national Republicans, who argued that Das-
retary of Housing and Urban Development in the chle was obstructing Bush’s agenda. The overall
Bush administration. This included her Web site, cost of the race was more than $30 million; this
BettyNet.com; the campaign used the site to com- averaged approximately $67 spent per registered
municate with and coordinate volunteers, dubbed voter. Thune won the election by a margin of 51
“Betty Heads.” In addition, her campaign fol- to 49 percent; this marked the first time since
lowed Dean’s in using Meetup.com to encourage 1956 that a Senate party leader was defeated.
supporters throughout Florida to gather in small
groups to campaign on behalf of Castor. Despite Election Outcome
her efforts to generate support online, Castor lost The election resulted in continued Republican
the election by one percentage point. control of Congress, with Republicans strength-
The Internet also featured prominently in the ening their majorities in both chambers. In the
North Carolina Senate race for the open seat Senate, eight seats switched parties, resulting in a
vacated by Democratic vice presidential nominee net gain of four seats for Republicans. Specifically,
John Edwards. Like Castor, Democratic candi- the Republicans picked up open seats in Georgia,
date Erskine Bowles hired an Internet strategist. South Carolina, North Carolina, Florida, and
A key component of his online effort was fund- Louisiana and defeated the incumbent Democrat
raising; he raised $500,000 online, with many in South Dakota. The Democrats picked up open
of the donations in amounts of around $100. In seats in Illinois and Colorado. In the House, 13
addition, three months before the election, his seats changed parties, resulting in a net gain of
campaign developed a blog, named “Blog for three seats for Republicans. Specifically, Demo-
Bowles,” to provide details on the candidate’s crats won seats in Colorado, South Dakota, New
activities; in response, his Republican opponent, York, Georgia, and Illinois. The Republicans won
Richard Burr, developed his own blog, named seats in Kentucky and Indiana and also defeated
“Blogg4Burr.” Bowles also communicated with a several Democratic incumbents in Texas, as well
list of 100,000 supporters via e-mail and adver- as winning a newly created district in the state.
tised extensively online, placing ads on three Overall turnout was 60 percent of the elec-
North Carolina news sites, as well as on Google. torate; this was a 5 percent increase from 2000.
Bowles eventually lost the election to Burr, by a Republicans, however, enjoyed a turnout advan-
margin of 52 to 47 percent. tage; in House elections, Republicans had an 8.7
Another notable race occurred in Illinois to percent turnout advantage and enjoyed a 9.6
replace the retiring Republican incumbent. State turnout advantage in Senate races. Overall, voters
senator and future president Barack Obama ini- displayed strong party loyalty, with districts vot-
tially faced Republican investment banker Jack ing for a presidential and congressional candidate
Ryan. A personal scandal forced Ryan to abruptly from the same party more than 80 percent of the
withdraw from the race, and Allan Keyes, a con- time. In the House the incumbent re-election rate
servative activist, replaced him. As a result, this was 98 percent, and in the Senate it was 96 per-
was the first Senate election in which both candi- cent; this led one scholar to deem the election the
dates were African Americans. During the cam- least competitive in the postwar era.
paign, Obama used his online presence to culti-
vate a national profile; during his keynote speech Kelly McHugh
at the 2004 Democratic National Convention, his Florida Southern College
Web site received 250 hits per second. Obama
eventually won the race by a 43-point margin. See Also: Campaigns, Congressional (2002);
The most expensive Senate race in this elec- Campaigns, Congressional (2004); Campaigns,
tion occurred in South Dakota, where Republican Presidential (2006).
166 Campaigns, Congressional (2006)

Further Readings publicized election returns, of those states hold-


Jacobson, Gary C. “Polarized Politics and the 2004 ing gubernatorial elections in 2006, Democrats
Congressional and Presidential Elections.” Political were able to gain six governorships, increasing
Science Quarterly, v.120/2 (2005). the number of governors affiliated with the Dem-
Malbin, Michael J., ed. The Election After Reform: ocratic Party from 22 to 28. This included wins
Money, Politics, and the Bipartisan Campaign in Massachusetts, New York, and Ohio, formerly
Reform Act. Lanham, MD: Rowman & Littlefield, strongholds for Republican governors through
2006. much of the 1990s and early into the 21st cen-
Williams, Andrew Paul and John C. Tedesco, eds. tury. The election was also notable because the
The Internet Election: Perspectives on the Web turnover in partisan control led to Nancy Pelosi
in Campaign 2004. Lanham, MD: Rowman & becoming the first female speaker of the House of
Littlefield, 2006. Representatives.
Although there are a variety of explanations
for this partisan swing, many experts contend
that two central factors were dissatisfaction with
the country’s involvement in the Iraq War, and job
Campaigns, approval ratings below 50 percent for President
Bush. In addition, the Republican Party was ham-
Congressional (2006) pered by a series of scandals that hurt the confi-
dence of some voters in the Republican Party and
The congressional elections in 2006 occurred culminated in lost seats. For example, Mark Foley
midway through the second term of George W. resigned from Congress in September 2006 after
Bush’s presidency. In this election the Democratic the news media reported that he had sent sexual
Party picked up seats in both the U.S. House of messages to underage male members of the con-
Representatives and the U.S. Senate. In addition, gressional page program. The Republican leader-
the Democratic Party saw an electoral advance in ship also became embroiled in the scandal when
the number of governorships held by the Demo- the House Ethics Committee reported that mem-
cratic Party. These gains resulted in a shift in the bers of the leadership had been aware of Foley’s
partisan balance of power in Congress as Demo- behavior prior to the media revelations.
crats became the majority party in both the House Social media technology has been harnessed
and the Senate. A summary of the election night in political campaigns with increasing fervor
returns and a brief explanation for the success of since around the beginning of the 21st century.
the Democratic Party is noted below. Although much of this technology seems com-
Beginning with the House of Representatives, monplace today, many social networking sites
according to publicized election returns, Demo- had only just come into existence during the 2006
crats gained 30 seats at the end of the electoral election. The following sections address how can-
process, resulting in the party controlling 233 of didates have used the technology in their cam-
the 435 seats. This became a newsworthy event paigns, some of the risks and rewards of expand-
because the Republican Party had been the party ing social media usage, and the manner of media
in power in the U.S. House for the previous 12 usage by citizens in 2006.
years, following their substantial seat gains in
the 1994 midterm election. Subsequently, in the Online Fund-Raising
U.S. Senate, according to publicized election Modern campaigns tend to blend old media (e.g.,
returns, the Democrats gained six seats, barely radio, television, and direct mail) with forms of
edging out the Republican Party for majority sta- new media (e.g., Web sites, blogs, Twitter, and
tus, holding 51 of the 100 total seats. This 51 Facebook). As more citizens have become famil-
to 49 margin was achieved as a result of two iar with forms of new media and as some can-
Independent members, Joseph Lieberman and didates have learned to utilize social media suc-
Bernie Sanders, declaring that they would caucus cessfully, others have followed suit. One of the
with the Democratic Party. Finally, according to earliest forays into social media at the federal level
Campaigns, Congressional (2006) 167

occurred when Senator John McCain attempted campaigns because they are an inexpensive way
to capture the Republican presidential nomina- to reach and organize potential voters and inter-
tion in 2000. McCain utilized the Web to help ested supporters. They also provide a way for
him raise money for his campaign and collected citizens to follow campaign news and candidate
over $2 million in a matter of days. Although announcements with relative ease and to adver-
George W. Bush ultimately won the Republican tise their civic engagement to friends and family.
Party nomination, subsequent candidates fol- However, they are not without risks, as candi-
lowed in McCain’s footsteps and far surpassed dates may have to contend with public postings
his online fund-raising. of negative feedback and criticism of their pages.
Particular to the midterm elections in 2006, In one of the earliest attempts to use social
the Pew Research Center projected that MoveOn. networking, Howard Dean used the Web site
org, a political advocacy group, was able to use Meetup.com to enlist supporters in his bid for
the Internet to raise over $20 million in 2006. In the Democratic presidential nomination in 2004.
doing so, online fund-raising became a technique Dean showed the potential of these platforms
used by groups as well as a platform for candidates when he collected almost 188,000 supporters
to raise small contributions quickly. Nevertheless, very early in the presidential primary process.
Web-based fund-raising in 2006 still made up a Savvy congressional candidates in 2006 took
relatively small portion of total campaign funds, notice and most worked to create a presence
with estimates at $100 million. Furthermore, online. By 2006, according to one Web-based
most of the money collected online was still being scholarly study, about four-fifths of House can-
devoted to more traditional forms of media adver- didates and approximately 85 percent of Senate
tising, such as television spots. Scholarly estimates candidates had a political Web site. However,
placed online advertising at $40 million. It was in 2006, the use of political Web sites by inde-
not until 2008 that Democratic presidential hope- pendent and third-party candidates still lagged
ful Barack Obama showed the tremendous poten- behind that of major-party candidates. In addi-
tial of online fund-raising as he raised approxi- tion, numerous scholarly studies have found that
mately $500 million through the Web. The typical better-financed candidates, candidates engaged
donor made a small contribution to the Obama in competitive campaigns, and young candidates
campaign and made multiple donations over the were more likely to have Web sites compared to
course of the campaign. Thus, online fund-rais- their counterparts.
ing has provided a convenient way for citizens to According to an analysis of congressional
invest in campaigns and for candidates to collect campaign Web sites in 2006 conducted by Girish
funds and information on supporters. Neverthe- Gulati and Christine Williams, two faculty mem-
less, large donors are still more prevalent in cam- bers at Bentley College, U.S. House and Senate
paigns and many citizens still do not contribute to candidates focus on a number of criteria. In par-
political campaigns. ticular, candidate Web sites tend to state their
positions on a variety of campaign issues, their
Political Campaign Web Sites e-mail address, news about their campaign, and
and Social Networking a biographical sketch of the candidate. In addi-
Besides online fund-raising through campaign tion, by 2006, candidates were becoming more
Web sites, candidates began to use social net- savvy in using personal campaign Web sites to
working platforms like Meetup.com and Face- solicit campaign funds and to recruit volunteers.
book to connect with interested citizens and sup- However, political Web sites in 2006 lagged
porters. Friendster was one of the earliest social behind modern campaign Web sites in their use
networking Web sites and burst onto the scene of audio and video content and in posting can-
in the United States in 2002. The introduction of didate appearances, etc. In the years since 2006,
Friendster was rapidly followed by other social campaigns have become much more adept at
networking Web sites, including MySpace and merging campaign information with media con-
LinkedIn in 2003, Facebook in 2004, and Twit- tent. Today, presidential campaign Web sites link
ter in 2006. These Web sites are beneficial to to separate YouTube pages chock-full of videos
168 Campaigns, Congressional (2006)

about the candidate as well as profiles on Face- also increased the degree of public exposure on
book, Twitter, and Tumblr. the campaign trail and the potential to get caught
Although modern federal-level campaigns are saying something controversial.
more likely to utilize Facebook today compared This is exactly what happened in 2006 when
to 2006, Facebook was used during the midterm George Allen, a U.S. senator running for re-elec-
congressional elections in 2006. According to a tion, made public remarks during a campaign
study of Facebook profiles and pages in 2006 and rally. A campaign worker who was at the event
2008 conducted by Gulati and Williams, less than on behalf of Allen’s opponent, Jim Webb, cap-
20 percent of U.S. House candidates from the tured the controversial remarks on camera and
Democratic and Republican parties personalized they were subsequently broadcast on YouTube.
their Facebook profiles in 2006. However, just In the video, Allen could be heard referring to
two years later, 72 percent of candidates had a Webb’s campaign volunteer on more than one
Facebook presence and about half of these indi- occasion as “macaca.” The volunteer, S. R. Sid-
viduals opted to customize their pages. Gulati and arth, was a U.S. citizen of Indian descent, and
Williams also concluded that incumbents, Repub- Allen was criticized for being racially insensitive.
lican candidates, poorly financed candidates, and The meaning of the term is disputed but news
candidates with weak opposition or no opposi- sources contend the word is either a substitute
tion were less likely to update their Facebook term for “monkey” or a French racist slur used
information. to describe Africans. After the video went viral
Besides the rate of candidate usage, the man- on YouTube, Allen apologized for the remarks
ner in which candidates could customize their but stated that he made up the term and did not
sites also changed over time. In 2006, congres- know what it meant.
sional and gubernatorial political candidates When Allen lost his bid for re-election to the
could utilize a specific location on their network Senate, many attributed his loss to his remarks
to create profiles. The social networking site sent and the publicity they received, derailing his
passwords for the profile pages to the Republi- campaign and severely damaging his prospects.
can and Democratic national committees to dis- Allen’s unexpected loss helped the Democrats to
tribute to the individual candidates. The candi- capture their very narrow lead in the U.S. Senate.
dates could then add information to their pages, Although his faux pas had an immediate effect
and friends of the profile could post on the pro- on the 2006 midterm election, it was also instruc-
file page. After this trial run in 2006, Facebook tive to candidates running in subsequent election
modified its treatment of political candidates for cycles. Political candidates were put on notice
the 2008 election. Candidates were given pages that they were no longer immune to exposure and
instead of profiles and all pages were located in a that their words and actions anywhere could be
special subsection of pages for politicians. Thus, captured and broadcast with relative ease.
politicians were organized in the same fashion Although YouTube footage can hurt political
as athletic teams and film stars and had more candidates, it also has the potential to help cam-
capability to personalize their page with photos paigns. YouTube allows candidates to gain more
and videos. control over the type and amount of information
that is disseminated. It also allows candidates to
YouTube bypass the media and to post whatever footage
Besides Facebook, another technology that was they feel will best showcase the campaign or the
novel to campaigns in 2006 was YouTube, which candidate.
burst onto the scene in 2005. YouTube eventu-
ally became a medium where candidates could Robocalls
broadcast video of campaign stops, campaign When it comes to social media techniques,
commercials, candidate debates, etc. In addition, potential voters are arguably more likely to seek
it became a repository where citizens could view them out on their own volition. On the other
information about political candidates. However, hand, citizens who receive robocalls may wish
as some candidates learned the hard way, YouTube to block the incoming messages because of the
Campaigns, Congressional (2006) 169

nature of the message and the frequency of con- The increase in cell phone use, however, has
tact. Robocalls are automated messages used by presented one key drawback for survey research-
campaigns to contact mass numbers of potential ers and pollsters. As more youth rely solely on cell
voters. Campaigns elect to use this technology phones, conducting sound surveys is becoming
because it is less expensive than other methods more problematic. For instance, as respondents
of contacting voters, such as door-to-door can- become more geographically mobile they may not
vassing or direct mail. These automated calls change their cell phone numbers to reflect their
are designed to encourage turnout on Election current area of residence. This presents obstacles
Day or to provide information with the intent for researchers who wish to speak only with resi-
of soliciting a vote for a particular candidate or dents of a particular state or region.
a campaign contribution. However, the poten-
tial for this technology to backfire is higher than Citizen Media Usage in 2006
for other mediums. If the content of these auto- Although campaigns are increasingly using tech-
mated messages is too negative or if voters are nology to reach voters and potential supporters,
contacted incessantly, it may dissuade the indi- it remains to be seen whether this coincides with
vidual from voting or may persuade him or her where citizens actually report they are getting
to vote for the opponent. their campaign information. In order to deter-
During the 2006 congressional election, a study mine the viewing habits of Americans and their
conducted by the Pew Internet and American Life interactions with technology, the Pew Internet
Project found that 64 percent of registered voters and American Life Project and the Pew Research
indicated that they had received a robocall in the Center for the People and the Press conducted
final stretch of the campaign season. The study a daily tracking survey of Americans at the end
also found that respondents reported being con- of 2006. The survey showed that Americans still
tacted by robocalls more than by any other type get the majority of their news about campaigns
of communication except direct mail. If anything, from television and newspapers. However, 15
the use of robocalls has likely increased in subse- percent of survey respondents reported getting
quent elections as technology has become more the majority of their campaign news from the
adept at targeting voters. Internet. This figure is approximately double
the number of respondents who made the same
E-mails, Cell Phones, and Text Messaging claim in 2002, the previous time midterm elec-
As cell phones have become more portable and tions were held. In addition, the survey con-
as more individuals have come to own a personal cluded that voters from both major political par-
computer, campaigns have learned to capitalize ties were just as likely to cite the Internet as their
on this technology. These media have become a main source of news. In other words, in 2006,
good way for candidates to mobilize support- neither party could claim a stronger Internet
ers, to solicit funds, and to ask supporters to presence among Americans.
initiate contact with undecided family members For those Americans who reported utilizing
or friends. While the media can track YouTube the Internet in 2006, the top reasons for doing
posts or monitor campaign finance Web sites, so were to collect information about the candi-
they have a much harder time following e-mail dates and campaigns and to exchange communi-
chains or text messages. E-mails also advantage cations about them with others. A small portion
campaigns because they provide an inexpensive of Americans went further and reported posting
method of contacting individuals and acquiring their own political commentary to a Web site or
additional personal information about the poten- blog or forwarding someone else’s. Finally, cam-
tial supporters. Despite the potential benefits of paign Internet users reported getting their political
this technology, according to a study conducted information most from news portals like Google
by the Pew Internet and American Life Project, News, from major network and cable television
only 14 percent of registered voters reported that Web sites, from local news Web sites, and from
they had received an e-mail communication from online national newspaper content. However,
a campaign in 2006. approximately 20 percent of campaign Internet
170 Campaigns, Congressional (2008)

users reported getting their news from less con- Rainie, Lee and John Horrigan. “Election 2006
ventional sources like blogs, international news Online: The Number of Americans Citing the
organization Web sites, candidate Web sites, and Internet as the Source of Most of Their Political
satirical news Web sites. News and Information Doubled Since the Last
Mid-Term Election.” Pew Research Center for the
Rhonda Wrzenski People and the Press. http://www.pewtrusts.org/
Indiana University Southeast uploadedFiles/wwwpewtrustsorg/Reports/Society_
and_the_Internet/PIP_Politics_2006.pdf (Accessed
See Also: Campaigns, Presidential (2000); July 2013).
Campaigns, Presidential (2004); Facebook; Fund- Vargas, Jose Antonio. “Obama Raised Half a
Raising, Influence on Elections; Meetup.com; Billion Online.” Washington Post. http://voices
MoveOn.org; YouTube. .washingtonpost.com/44/2008/11/obama-raised
-half-a-billion-on.html (Accessed July 2013).
Further Readings Williams, Christine B. and Girish J. “Jeff” Gulati.
“America Votes 2006.” CNN. http://www.cnn.com/ “Social Networks in Political Campaigns:
ELECTION/2006 (Accessed July 2013). Facebook and the Congressional Elections of 2006
Balz, Dan. “Democrats Take House.” Washington and 2008.” New Media & Society. http://nms.sage
Post. http://www.washingtonpost.com/wp-dyn/ pub.com/content/early/2012/09/12/146144481245
content/article/2006/11/07/AR2006110701838 7332.full.pdf+html (Accessed July 2013).
.html (Accessed July 2013). Zeleny, Jeff. “Report Finds Negligence in Foley
“The Brief History of Social Media.” University of Case.” New York Times. http://www.nytimes
North Carolina at Pembroke. http://www.uncp .com/2006/12/09/washington/09foley.html?
.edu/home/acurtis/NewMedia/SocialMedia/ ref=markafoley&_r=0 (Accessed July 2013).
SocialMediaHistory.html (Accessed July 2013).
Cornfield, Michael and Lee Rainie. “The Internet
and Politics: No Revolution, Yet.” Pew Research
Center. http://www.pewresearch.org/2006/11/06/
the-internet-and-politics-no-revolution-yet Campaigns,
(Accessed July 2013).
Craig, Tim and Michael D. Shear. “Allen Quip Congressional (2008)
Provokes Outrage, Apology.” Washington Post.
http://www.washingtonpost.com/wp-dyn/content/ Several innovations in social media took place
article/2006/08/14/AR2006081400589.html just before the 2008 election cycle. Many of
(Accessed July 2013). these technologies had just been launched dur-
“Election 2006: Governors’ Overview.” New York ing the 2006 election but were so new that no
Times. http://www.nytimes.com/ref/elections/2006/ one was really using them. In 2008, candidates
Governor.html (Accessed July 2013). at both the congressional and presidential level
Gulati, Girish J. “Jeff” and Christine B. Williams. were just beginning to test the possibilities and
“Closing the Gap, Raising the Bar: Candidate limits of social media. Social networking sites like
Web Site Communication in the 2006 Campaigns Facebook and Second Life were launched in 2003
for Congress.” Social Science Computer Review, and had somewhat established conventions for
v.25/4 (2007). political campaigning. YouTube was the big story
Johnson, Dennis W. Campaigning in the Twenty-First in the 2008 election, having launched only a few
Century: A Whole New Ballgame? New York: years earlier in 2005. The 2008 election was the
Routledge, 2011. first time candidates used Twitter as a campaign
Rainie, Lee. “Robocalls During the 2006 Election.” technology. The site had just been launched in
Pew Internet and American Life Project. http:// 2006. In addition to these relatively new forms
www.pewinternet.org/Reports/2006/Robocalls-in of technology, there were established online cam-
-the-2006-campaign/Data-Memo.aspx (Accessed paign techniques, such as e-mailing and blogging,
July 2013). which continued to be popular in 2008.
Campaigns, Congressional (2008) 171

The 2008 congressional elections were an Still, there were many congressional candidates
important time for the Democratic Party. In 2006, using social media during the 2008 election.
the Democratic Party won a majority of seats in the
House of Representatives, and the trend toward Studies and Reports
Democratic leadership continued in 2008. All of The adoption of social media by congressional
the seats in the House of Representatives were up candidates was likely fueled by the fact that vot-
for election in 2008. The Democratic Party won ers were spending a substantial amount of time
an additional 21 seats in the 2008 election, giv- online in 2008. A Pew Internet and American Life
ing them 257 seats to the Republicans’ 178 seats. Project report stated that the 2008 election was
Unlike the House of Representatives, going into an important time for the Internet and politics.
the 2008 election, the Senate was evenly split: 49 Approximately 40 percent of all Americans got
Democrats, 49 Republicans, and two Indepen- their news and campaign information online. Peo-
dents (Bernie Sanders of Vermont and Joe Lieber- ple were not using official news sites just for infor-
man of Connecticut). However, it is worth noting mation. Approximately 39 percent of Americans
that the two Independents had been caucusing accessed primary news documents directly from
with the Democrats, so the Senate had been oper- the campaigns. Additionally, 19 percent of Ameri-
ating with a Democratic majority since 2006. In cans were going online once a week or more to
the Senate, 35 of the 100 seats were up for elec- do things related to the campaign, and 23 percent
tion in 2008. The Democrats gained eight Senate of Americans were either receiving e-mail from
seats in the 2008 election, giving them a major- campaigns or using e-mail to engage in political
ity in both the House and the Senate. After the debate. By June 2008, nearly one in 10 Ameri-
2008 election, Nancy Pelosi continued as Speaker cans had made a campaign donation online. The
of the House of Representatives, a position she amount of voter activity online made social media
maintained until the Republicans regained the an enticing place for political campaigns.
House in the 2010 election. Harry Reid continued The partisan breakdown for political activity
as the majority leader in the Senate, a position he shows little difference between voter behavior
continued to hold after the 2012 election. With based on party affiliation. The Pew Foundation
President Barack Obama taking office in 2008, reports that 78 percent of Republicans, 74 per-
this was the first time in more than a decade that cent of Democrats, and 76 percent of indepen-
the country was under single-party leadership. dents spend time online. Of those, 55 percent of
Much of the attention in the 2008 election cycle Republicans, 61 percent of Democrats, and 56
was focused on the contentious presidential race. percent of independents viewed news related to
Candidates for both parties began announcing the 2008 election online. The real breakdown
their campaigns in January 2008. The Republican was less along party lines and more along age
nomination was secured by John McCain rela- lines. Younger Internet users were more likely to
tively early in the primary season. The Democratic be Democrats and tended to favor Obama over
Party primary contest continued through June Clinton in the presidential election. Obama sup-
2008, when Obama secured the nomination over porters, overall, were more likely to use a variety
Hillary Clinton, the presumptive nominee. The of online technology: online video, e-mail, and
2008 presidential election was the most expensive social networking sites. Research also indicates
presidential election on record. The two major that Democratic candidates behaved differently
candidates spent more than $1 billion during the online. The Pew Research Foundation found that
election cycle. A major source of campaign fund- Democratic candidates were more likely than
ing was online donations. Candidate Ron Paul their Republican counterparts to use the Internet
set fund-raising records by collecting $6 million as a place to break a story and bypass more tradi-
online in a single day. Obama’s campaign made tional mass media outlets.
extensive use of social media, online organizing, While most voters and candidates were using
and online fund-raising. Many of the lessons of the Internet during the 2008 election cycle, many
the Obama campaign would not be adopted by of them seemed to be wary of the information
congressional candidates until the 2010 election. they found online.
172 Campaigns, Congressional (2008)

The Pew Foundation reports that 60 percent


of Internet users agreed with the statement “The
Internet is full of misinformation and propaganda
that too many voters believe is accurate.” Almost
half of those polled did not believe that the news
information they received online was the same as
the information they received elsewhere. Addi-
tionally, more than one-third of people polled
thought that the “the Internet let those with the
loudest voices and most extreme positions drown
out average people’s views.” The Internet did not
seem to be a place that voters trusted for their
news. Instead, 37 percent of voters said they
went online to feel connected to candidates and
engaged with the election process. Younger Inter-
net users, in particular, saw the Internet as a place
to connect with the democratic process.

Relationship Between Social Media Mike Gravel’s 2007 YouTube ad, “Rock,” gained him national
and Mass Media attention and an Internet following. YouTube launched in 2005
Oftentimes social media was simply a route to and was first tested as a medium for reaching voters during
the mainstream media. In 2008, social media was political campaigns in the 2008 election.
often used to generate “earned media.” Earned
media is when a politician does something that
generates media buzz that does not have to be paid
for by the candidate. A candidate’s daily activities, of Minnesota. During the election, Bachmann
statements, or successes may be reported by the received attention for going on the MSNBC show
news media, giving him/her increased exposure to Hardball and calling for an investigation to deter-
voters. In this way, it is distinct from paid adver- mine if Barack and Michelle Obama were “pro-
tising. Online, take for example Democrat Mike America or anti-America.” The Huffington Post,
Gravel’s YouTube ad “Rock.” In this ad, Gravel an online news site, wrote stories about the event,
spends the first minute staring at the camera say- calling Bachmann’s statements modern McCar-
ing nothing. Then, he turns away from the cam- thyism. Blogging sites DailyKos and OpenLeft
era, throws a rock in a lake, and spends the next began distributing the video of Bachmann’s inter-
minute walking away from the camera. Gravel, view and using the interview to direct traffic to
a little-known candidate before this video, was the fund-raising site ActBlue. In the weekend fol-
invited to appear on news shows of multiple net- lowing the interview, Tinklenberg received over
works to explain the meaning of the advertise- $700,000 in donations, and ActBlue received
ment. The commercial generated a large amount more than $300,000. In the end Bachmann still
of free press for the candidate. In a year when won the election, but the event helped to demon-
the average cost of winning a House race was strate the way mainstream media reporting can
nearly $1.1 million, using social media to gener- impact online activities.
ate “earned media” could provide an important
strategic advantage. YouTube
While online activities can help a candidate YouTube was launched in February 2005, and
generate interest in his/her campaign, offline during the 2006 election the site was still in its
activities can also spur actions online that hurt a infancy. The campaigns for the 2008 election were
campaign. In 2008, Michele Bachmann narrowly an important period for candidates learning how
beat Elwyn Tinklenberg and Bob Anderson to to operate the technology and testing its poten-
become the District 6 representative for the state tial. The Pew Foundation reports that 35 percent
Campaigns, Congressional (2008) 173

of Americans watched online videos during the own voice heard on the site. Approximately 70
2008 election cycle. Political videos were created percent of congressional candidates had their own
and distributed by a variety of sources, including YouTube channel during the 2008 election. The
individuals, campaigns, and other political orga- median number of videos posted was 20.5. Often
nizations. Research seems to indicate that many these videos were commercials that had aired on
of these videos maintained the format of politi- television, speeches given on the campaign trail,
cal commercials before YouTube. They averaged or footage of campaign rallies. At the high end
about 30 seconds and they made use of many tra- of the pool, Nancy Pelosi, Democratic represen-
ditional tactics seen in television campaigns. The tative from California, posted 1,445 videos dur-
most-viewed political videos in the congressional ing the campaign. The site was primarily used by
election on YouTube were consistently attack ads. incumbent candidates who had a strong base and
Approximately 44 percent of the political videos the resources to devote campaign staff to develop-
posted in relation to the congressional campaigns ing videos.
were 30-second advertisements. In the North Carolina Senate race between
One major difference between YouTube vid- Elizabeth Dole and Kay Hagan, traditional attack
eos and more traditional television advertising ads featured prominently on the candidates’
was the ability for average citizens and political YouTube channels. The Dole campaign posted
organizations to distribute videos without incur- a television advertisement called “Promises,”
ring the large cost associated with mainstream which received more than 100,000 views. The
media advertising. A primary example of this was ad accused Hagan of hosting secret fund-raisers
a video of George Allen during the 2006 midterm with a prominent atheist group and asked what
elections titled “Macaca Moment.” Republican kind of promises Hagan was making in exchange
George Allen served as senator from Virginia for campaign funds. One of Hagan’s most popu-
from 2001 to 2007. While running for re-election lar YouTube videos, receiving more than 130,000
in 2006, during a campaign stop Allen pointed views, was called “Belief.” In this 30-second ad,
to S. R. Sidarth, a campaign tracker filming the Hagan responded to the challenges Dole made
event, and referred to him as a “Macaca.” The about her Christian beliefs and accused Dole of
term means “monkey” and was originally used faking her voice.
by colonists in Africa to refer to the native black The official campaigns for Dole and Hagan
population. The video of the event was widely posted several advertisements dedicated to the
distributed online, and the attention it received question of Hagan’s religious beliefs. In support
from bloggers generated significant coverage by of these candidates, outside organizations made
the mainstream press. The event is credited with longer versions of these advertisements that were
costing Allen the 2006 election. The video and also popular on YouTube. The National Repub-
the resulting loss demonstrated the power You- lican Senatorial Committee made a two-and-a-
Tube afforded citizen journalists. Because of the half-minute Web video called “Godless,” which
video and the resulting loss, congressional candi- included more clips of representatives from the
dates went into 2008 well aware of the power of Godless Americans PAC. In response, MoveOn
YouTube. and the Democratic Senatorial Campaign Com-
In the Minnesota Senate race between Repub- mittee created Web videos questioning Dole’s vot-
lican incumbent Norm Coleman and Democrat ing record and accusing her of taking money from
Al Franken, there were multiple allegations about oil companies to thwart green energy initiatives.
Coleman’s ethics while in office. YouTube users, These advertisements were often television com-
such as NormColemanMustGo, made and dis- mercials that were being circulated on the Web
tributed videos challenging Coleman and sup- through YouTube.
porting Franken. Franken won the race and this
was one of several gains made by the Democrats Myspace and Facebook
in Congress. The big social media story of 2008 was YouTube,
With so many citizens posting YouTube vid- but more traditional social networking sites also
eos, it was important for candidates to make their played a key role in the election. Specifically,
174 Campaigns, Congressional (2008)

Myspace and Facebook were important places for and Facebook accounts herself. Most political
candidates to get to know the voters. Myspace was candidates hired staff to maintain their profiles
launched in 2003, and Facebook followed shortly and produce tweets. Neither of these politicians
after in 2004. Both sites were used by candidates was up for re-election. Al Franken, a Democrat
and voters to distribute campaign information in from Minnesota who was elected to the Senate in
the 2006 election. During the 2008 campaign, 2008, was one of the few campaigning senators
Facebook introduced features that allowed users to use the technology during the election. In the
to design applications for other users. Campaigns House of Representatives, where everyone was
took advantage of this to turn the site into a phone up for election, several candidates used the tech-
bank, raise funds, and release news to users. Dur- nology. Notable among them are John Boehner,
ing the 2006 election, Facebook made profile Republican representative from Ohio who, as an
pages for every candidate running for office and incumbent, defeated Nicholas Von Stein with 68
provided campaigns with the passwords neces- percent of the vote. Boehner was quite familiar
sary to access and maintain these sites. In 2008, with the technology, having joined Twitter in July
Facebook switched from candidate “profiles” to 2007. House Speaker Nancy Pelosi, Democratic
candidate “pages.” The original candidate pro- representative from California, joined Twitter
files were similar to other user profiles, and Face- in August 2008. Pelosi was considered to be in
book users could friend a candidate just like they a “safe district”—in 2008 she won 72 percent
could anyone else. With pages, users “liked” can- of the vote—but her campaign still kept up with
didates instead of friending them. This created a most of the major advances in social media.
distinction between general users and politicians. Some members of Congress were using Twit-
Much like with the candidate profiles, Facebook ter for political conversations outside the election.
required an official campaign representative to Republican Representative John Culberson of
create the page and to maintain it. Texas and Democratic Representative Tim Ryan
Facebook was popular among congressional of Ohio took to Twitter during the summer of
candidates in 2008. In the Senate, 89.6 percent of 2008 to debate the ethics of opening the Arctic
candidates had profiles and in the House it was National Wildlife Refuge in Alaska to oil drilling.
72.4 percent. In 2008, the use of Facebook was Culberson and Ryan both won their elections by
most successful for politicians who were already wide margins that year and were campaigning in
well known. Candidates such as Nancy Pelosi, what were considered “safe” districts.
Barney Frank, and Rahm Emanuel saw continual While Twitter was used by candidates to discuss
increases in Facebook supporters throughout the political issues and campaign, it was used by other
election. Other candidates might have sustained organizations during the election to monitor the
activity, even if it was less. voting process. In 2008, a project called “Twit the
Vote” encouraged users to use iPhones at the polls
Twitter to tweet about any difficulties with the voting pro-
Like YouTube, Twitter was still a fairly new tech- cess and provide updates on wait times at polling
nology during the 2008 election. Twitter was stations. These tweets were combined with Google
founded in 2006. There were approximately 1.6 Maps to give voters a picture of the voting process
million tweets in 2007, and by 2008 that number throughout the day. The information was also col-
had grown to more than 400 million tweets. Dur- lected by Vote Report to help monitor fraud and
ing the election, those politicians who did tweet other problems on Election Day.
used the technology primarily to report their
location or talk about their activities for the day. Second Life
Some early adopters in the Senate were Marco Some congressional candidates were more
Rubio, a Republican senator from Florida who immersed in the new media than others. For
joined in August 2008, and Claire McCaskill, a instance, George Miller, a Democratic represen-
Democratic senator from Missouri who joined in tative from the San Francisco Bay Area who has
September 2008. McCaskill’s use of social media served from 1975 to the present, used a variety of
is noteworthy in that she maintained her Twitter social media outlets during the 2008 campaign.
Campaigns, Congressional (2008) 175

Miller had an avatar on the site Second Life, he he used text messaging to announce the selection
ran a podcast called MillerTV, and he had a regu- of Joe Biden as his running mate. The presiden-
larly active blog site. All of these formats have tial candidates also made use of the recent emer-
allowed Miller to answer questions directly from gence of the smartphone by developing phone
his constituents. applications that made it possible for supporters
Miller was not the only congressional candi- to do campaign fund-raising from their personal
date to make use of Second Life for political cam- phones. In 2008, congressional candidates were
paigning. Second Life was launched in 2003, and slow to catch on to text messaging. Mainly, they
by 2008 many universities and businesses were faced a problem collecting cell phone numbers
establishing a presence within the virtual world. of supporters. By 2010, candidates like Senator
During the 2008 election, several candidates set Robin Carnahan and Representative Roy Blunt
up offices in Second Life. Ron Paul, a member of were using stunts and gimmicks to get voters
the U.S. House of Representatives from Texas, to contact them by text message. The contact
and YearlyKos, an early version of the popular allowed them to develop databases of voters for
conference Netroots Nation run by Daily Kos, sending out campaign news and organizing sup-
both held political rallies in Second Life during porters by text messaging.
the 2008 election. It is unclear how much the site Much of the movement forward in social media
actually contributed to election outcomes, but the campaigning in 2008 was made by the presiden-
site was sufficiently established that it was a stan- tial candidates. The slow rate at which many
dard place for political campaigning. members of Congress adopted social media might
E-mail was an established form of campaign be attributed to the rules that governed use of the
communication prior to the 2008 election. Bill Web in 2008. Prior to 2008, members of Con-
Clinton used e-mail as a form of political cam- gress were not allowed to post any official state-
paigning during the 1992 presidential election. ments on social media sites. All official statements
Both President George W. Bush and Democratic had to go through House.gov or Senate.gov.
candidate John Kerry used e-mail during the Social media sites could be used for campaign-
2004 election to release breaking news and to ing but were not allowed for other activities. As
organize volunteers. So, by 2008 e-mail, unlike a result, most candidates were simply unfamiliar
other social media, had become a conventional with the sites. Additionally, most candidates hired
campaign method. The Pew Research Foun- people to do their social media campaigning, and
dation reports that 23 percent of Americans for some candidates that expense was a luxury
received an election-related e-mail at least once they could not afford.
a week during the 2008 election. These e-mails
often urged voters to support a particular candi- Amber Davisson
date or discuss a particular political issue. Most DePaul University
candidates collected the e-mail addresses of sup-
porters when they visited the campaign Web site. See Also: Campaigns, Congressional (2006);
However, this required a voter who was proac- Campaigns, Congressional (2010); Campaigns,
tively interested in the candidate. Republican Presidential (2008).
campaign firms like Voter Contact Service and
the Voter Emailing Company were popular dur- Further Readings
ing the election for their database of potential Gulati, Girish J. “Jeff” and Christine B. Williams.
voters. These firms provided candidates with “Congressional Candidates’ Use of YouTube in
access to voters who might not take the initiative 2008: Its Frequency and Rationale.” Journal
to visit a campaign site. of Information Technology & Politics, v.7/2–3
(2010).
Mobile Technology Karpf, David. “Macaca Moments Reconsidered:
One emerging trend during the 2008 election was Electoral Panopticon or Netroots Mobilization?”
the use of mobile technology by political cam- Journal of Information Technology & Politics,
paigns. Barack Obama broke new ground when v.7/2–3 (2010).
176 Campaigns, Congressional (2010)

Klotz, Robert J. “The Sidetracked 2008 YouTube Incumbents and challengers used social media
Senate Campaign.” Journal of Information to advertise their positions, attack opponents,
Technology & Politics, v.7/2–3 (2010). raise money, and gain notoriety in 2010. A main
Smith, Aaron and Lee Rainie. “The Internet and the reason that candidates gravitated to social media
2008 Election.” Pew Internet and American Life is because voters were using it to gather informa-
Project, June 15, 2008, Washington, DC. http:// tion and make decisions about who to support.
www.pewinternet.org/~/media//Files/Reports/2008/ While there was tremendous activity online, there
PIP_2008_election.pdf.pdf (Accessed July 2013). is less of a correlation to greater voter turnout or
Williams, Christine B. and Girish J. “Jeff” Gulati. determining victorious candidates from their use
“Social Networks in Political Campaigns: of social media.
Facebook and the Congressional Elections of 2006
and 2008.” New Media & Society, v.15/1 (2013). Studies and Reports
According to a Pew Internet report, 73 percent
of adult Internet users used online sources to get
information about or get involved in the 2010
campaigns. This represented 54 percent of all
Campaigns, adults. Of those online political users, 58 percent
looked online for news about politics, and 32 per-
Congressional (2010) cent in the United States reported that they got
most of their information about the 2010 cam-
Social media was in its infancy and thus sparsely paigns from sources online.
used in the 2006 elections. It played a more prom- About 21 percent of adults used Facebook or
inent part in the 2008 campaigns. By 2010, the Myspace or another social networking site for
use of sites like Facebook and Twitter became reg- political purposes during the 2010 campaigns,
ular features in the congressional elections. according to the Pew surveys. Another 2 percent
Republicans won 63 seats in the House of Rep- used Twitter. Nine percent said they received can-
resentatives and six seats in the U.S. Senate. The didate information, 8 percent posted political
63 seat pickup in the House allowed Republicans content, and 7 percent friended a candidate or
to capture majority control and was nine more political group on a social networking site. One
than they gained in the 1994 midterm election percent said they used Twitter to follow the elec-
that ushered in the so-called Republican revolu- tion results in 2010 as they were happening.
tion in Congress. The Pew report found that political social
The six seats in the Senate were less than com- media users were younger and generally more
monly expected earlier in the year and allowed educated than other Internet users. About 42 per-
Democrats to retain control of the U.S. Senate. cent were younger than 30 years old, and 41 per-
The use of social media helped fuel the Tea Party cent had college degrees. Demographically, they
movement and the anti-Washington and anti- were similar to all Internet users in terms of race,
incumbent moods that aided the Republicans’ gender, and income.
ascent in the House. It also worked to curb their The survey found 40 percent of Republican
chances of winning some key seats in the Senate. voters and 38 percent of Democratic voters got
Facebook, Twitter, and YouTube barely existed involved in the campaigns through the use of
during the 2006 midterm election. A YouTube social media. About 22 percent of those who iden-
video led to a change in campaigning as a result of tified as Tea Party supporters used social media
the so-called macaca moment, in which Virginia sites for political purposes. Of the Internet users
Senator George Allen was caught on tape using a identified in the report, they voted for Republi-
racial slur and eventually lost his re-election bid. can candidates for Congress by a 45 to 41 percent
By 2008 and 2010, candidates were well aware margin over Democratic candidates.
that their every statement on the campaign trail Still, the main source of campaign news for Pew
could be recorded and was likely to end up on survey participants was television (67 percent),
social media sites and go viral within moments. which was consistent with the past two midterm
Campaigns, Congressional (2010) 177

elections. Newspapers garnered 27 percent, while measure of fans. This was likely due to increased
the Internet provided 24 percent of the campaign enthusiasm to get involved and vote. The report
news. That was up from 15 percent in 2006 and counted the fans and friends for the official Face-
13 percent in 2002. Radio held relatively steady book pages from May 1 to August 31, 2010, of
at 14 percent. Internet news sources cut primarily the members of the 111th Congress. They found
into the influence of newspapers, which dropped that 251 of 255 Democratic members (98.4 per-
from 34 percent in 2006. cent) and 169 of 178 Republican members (94.9
The percentage of adult online users who percent) had fan pages. In the Senate, 53 of the 57
viewed videos online increased from 19 percent Democratic senators (92.9 percent) and 39 of 41
in 2006 to 31 percent in 2010. Users with higher Republican senators (95.1 percent) had fan pages.
education and income levels were more likely to They did not count independent members.
watch political videos online. Viewing was rela- They measured the rate at which fans were
tively consistent across age groups. Men (36 per- added to measure public sentiment on Facebook.
cent) were more likely than women (26 percent) The report found that Republicans increased
to watch political content. White non-Hispanics their number of fans faster than Democrats.
(33 percent) viewed online videos more than Republicans also had more fans overall. They
black non-Hispanic (24 percent) and Hispanic numbered 1,634,127 on May 1 and 2,148,619 on
(23 percent) users. August 31. Democrats increased from 780,035
By party, Republicans were more likely to view on May 1 to 952,847 on August 31. The increase
videos online in 2010 than Democrats in the Pew among House Republicans was at a statistically
poll. About 40 percent of Republicans watched significant rate, while in the Senate, there were
online videos, up from 19 percent in 2006, while no significant differences based on party. This
Democrats increased to 32 percent in 2010 from was pertinent because there were fewer Republi-
24 percent in 2006. Twenty-two percent of non- cans in Congress at the time.
voters admitted to watching political videos Research by Bloomberg found that all 73
online in 2010, up from 16 percent in 2006. Democratic and Republican candidates for Sen-
The main sources of online news according to ate had Facebook accounts, 72 of them had Web
the Pew report were the major cable networks sites, and 70 used Twitter. There were YouTube
and the search engines. CNN.com was used by accounts on 85 percent and blogs on 43 percent
22 percent, followed by Yahoo.com at 20 percent, of the Web sites.
Google.com at 13 percent, and Fox and Msn. The day after the election, Facebook reported
com at 10 percent. MSNBC.com was used by 7 that 74 percent of House candidates and 81 per-
percent, and AOL.com and the New York Times cent of the Senate candidates with the most Face-
by 4 percent, and then the candidates’ Web sites book fans on their sites won their contests.
and Drudge Report at 2 percent, followed by the Another report by HeadCount.org also found
Huffington Post identified by 1 percent. Twenty- that Republicans appeared to be more engaged
nine percent of users were using other sources. than Democrats in the online world in 2010.
Another use of social media was to connect Republican candidates for Senate had 1.4 million
and interact with campaigns. Sixteen percent of Facebook friends and more than 500,000 follow-
adults said they sent e-mails related to the elec- ers on Twitter compared to 300,000 friends and
tions, and 17 percent revealed online for whom 90,000 followers for their Democratic opponents.
they would vote. Seven percent gathered informa- A study by the E-Voter Institute found that three
tion or organized meetings through social media, out of five Americans who considered themselves
while 6 percent took part in an online discussion, as somewhat politically active were members of a
listserv, or other political activity. Five percent social network. The study also found that 70 per-
used the Internet to volunteer, help a campaign, cent of them planned to vote in 2010. More than
or get people to the polls. two out of five voters expected candidates to make
One comprehensive report by OhMyGov Inc. campaign information available or to engage sup-
found that Republicans in Congress fared better porters using social media. Forty percent expected
than Democrats in getting Facebook “likes” as a candidates to use Twitter, and around half of
178 Campaigns, Congressional (2010)

respondents expected online ads, campaign vid- Traditional media companies found ways to use
eos, blogs, Webcasts and podcasts. Two-thirds social media to increase their brands. The Wash-
expected to receive e-mails and TV ads. Eight out ington Post coined the #Elections hashtag on
of 10 expected an official Web site. Twitter, the first news organization to do that. The
A study from the University of Michigan New York Times created maps and charts for elec-
School of Information and the College of Engi- tion monitoring that were viewable on the iPad.
neering looked at the use of Twitter in the 2010 The New York Times also created a Twitter visual-
campaign. It found that conservatives were the ization to track election discussions on that social
most active tweeters during the campaign cycle. It network. The Wall Street Journal did live election
analyzed tweets from 687 candidates for the U.S. coverage available online and on the iPad.
House, Senate, and gubernatorial seats. The study Twitter encouraged voters to use the hashtag
found that Republicans and specifically Tea Party #votereport to tell about their experiences at the
candidates tweeted more often than Democrats. polls and use #NYCvotes specifically for New
The Republicans tweeted an average of 732 times York voters. Foursquare created a real-time map
over a three-year period compared to 551 tweets of where people were voting. It also offered an “I
for Democrats. Voted” badge to anyone who checked in at his or
Republicans tended to tweet about economic her polling station while voting.
issues with posts related to “bills,” “budget,” Facebook posted notes to remind people to vote
“deficit,” “spending,” and “WSJ” (Wall Street and apps to help people find polling locations.
Journal), as well as “Bush” as top topics. Dem- Scientists from the University of California,
ocrats focused on a variety of topics like “edu- San Diego, studied the impact of Facebook on
cation,” “jobs,” “oil spill,” “clean energy,” voting in 2010. On November 2, almost all
“reform,” and “Afghanistan.” of the 61 million who signed onto Facebook
The self-identified Tea Party candidates were received a get-out-the-vote message on the top
studied closely. Despite the image of the Tea Party of the news feed. The nonpartisan message
as a disparate, grassroots, unorganized movement, included a reminder that it was Election Day,
researchers found that Tea Party members formed a link to local polling places, and an option to
more of an online community than the other can- click on “I Voted” to be included in a count of
didates. Tea Party members retweeted each other’s Facebook users who had reported voting. It also
messages an average of 82.6 times, compared to included pictures of up to six of their friends
52.2 for Republicans and 40 retweets for Demo- who reported voting.
crats. Tea Party proponents specifically tweeted In the study, published in the September 13,
about then-Speaker of the House Nancy Pelosi, 2012, issue of Nature, two control groups of
liberal Massachusetts Congressman Barney Frank, 600,000 did not receive the pictures. One group
and former President Bill Clinton, all perceived as had the get-out-the-vote message, and the other
adversaries to the conservative movement. group did not receive any message. Researchers
The Michigan researchers were able to predict then examined public voting records to determine
election outcomes with 88 percent accuracy based actual voter turnout among the various groups.
on the number and content of tweets, the num- They found that the message that showed a
ber of followers, and taking into account incum- user pictures of their friends who had voted was
bency. They found that too many tweets could be directly responsible for 60,000 additional votes
a campaign liability, and the proper amount and nationwide. They also concluded that it was
tone of the social networking done by candidates responsible for 280,000 indirect votes by friends
would be in a middle range. of friends, which they termed the “social conta-
gion effect.”
Traditional and Social Media Blend Because only about 1 percent of Facebook users
Both traditional and new media companies found stated their political affiliations, the role of ideol-
innovative ways to use social media in 2010. Twit- ogy or party could not be determined. With about
ter and iPad formats were two of the most-used 90.7 million total voters in 2010, about 37.8 per-
platforms by the traditional media companies. cent voter turnout, the number of votes tracked
Campaigns, Congressional (2010) 179

did not sway the national results but could have with a YouTube video on May 5, 2009, with a
played a significant factor in individual races. 2:49-minute video discussing why he was run-
Ultimately of significance from this study, ning for the Senate and used campaign videos and
according to the authors, is their conclusion that social networking throughout the campaign to
online activities could influence real-world actions get his message across to voters of different age
like voting. groups and demographics. In the three-way race,
Rubio accounted for 72 percent of all Facebook
House, Senate, and Gubernatorial Races “likes,” 58 percent of all Twitter followers, 85
The candidate with more Facebook fans won six percent of all YouTube views, 55 percent of all
of the 10 top contests for the U.S. Senate (Cali- Web visits to candidate Web sites, and 48.9 per-
fornia, Illinois, Missouri, Pennsylvania, West Vir- cent of the final vote. His campaign raised dona-
ginia, and Wisconsin). tions from one in three of his e-mail subscribers. In
Five of the top 10 candidates searched on October 2010, Rubio had 128,800 Facebook fol-
Google in October won their races, and five lost. lowers, compared to 51,600 for Crist and Meek
The top 10 most-searched candidates in Google combined. Rubio’s television ads urged viewers to
News for October 2010 included the two can- follow him on Facebook. Rubio’s use of Twitter
didates for governor of California. The first was was also prolific during the campaign. Early in
Meg Whitman, former chief executive officer the campaign, he would post updates from the
(CEO) of eBay and Republican candidate, and campaign trail using Twitter and Facebook. But,
fourth was Democrat Jerry Brown. after an incident in May 2009, when he disclosed
The second-most searched was Senate Major- personal information about a date night with his
ity Leader Harry Reid, who survived a re-election wife that was picked by the Miami Herald, Rubio
challenge from Tea Party candidate Sharon Angle, was more reserved in his use of social media.
the fifth-most searched candidate. Angle in Nevada had about 94,700 Facebook
The third-most searched was Rand Paul, Tea friends in October 2010 compared to 13,700
Party-backed candidate for Senate from Ken- for Reid, the Senate majority leader. Christine
tucky, who won his race. Paul, son of Texas Con- O’Donnell had 25,600, twice as many as her
gressman Ron Paul, was an important figure in opponent Chris Coons in the race for the Dela-
the emergence of the Tea Party and in making the ware Senate seat. Both Angle and O’Donnell lost
movement a national phenomenon. their races even as they gained national notoriety
The sixth and seventh were high-profile, yet for their support from the Tea Party.
losing candidates who also had Tea Party sup- According to the Project for Excellence in Jour-
port, Carl Paladino for governor of New York nalism, President Barack Obama was the subject
and Linda McMahon for a Senate seat from Con- of the largest number of stories online from Janu-
necticut. Then-Speaker Nancy Pelosi was the only ary through October 2010.
House member in the top 10, at number eight. Republican Senate nominee from Delaware
Patty Murray, an incumbent Senator from Wash- Christine O’Donnell, a Tea Party–backed candi-
ington, was ninth. date, was second. O’Donnell garnered much atten-
Charlie Crist, the governor of Florida who was tion for some comments she made before she was
forced out of the Republican Party by Tea Party a candidate. O’Donnell had said that she “dabbled
favorite Marco Rubio, who won the Senate seat, into witchcraft” in a 1999 episode of Politically
was 10th. Crist ran as an independent against Incorrect with Bill Maher. When those clips became
Rubio and Democrat Kendrick Meek. There was Internet sensations during the 2010 campaign,
speculation late in the campaign that Crist would O’Donnell felt compelled to address the issue. She
gain support from Bill Clinton and announce he ran a 30-second ad in which she said, “I’m not a
would caucus with Democrats if he won the race witch. I’m nothing you’ve heard. I’m you.” The
in an attempt to bolster moderate and Democratic ad, uploaded on YouTube on October 4, 2010,
voters to support him over Rubio. had more than 1 million views and caused more
Rubio ultimately won the seat aided by his own harm than good for her campaign by perpetuating
popularity online. Rubio launched his campaign the story and inviting ridicule of her candidacy. It
180 Campaigns, Congressional (2010)

led to Web chatter that questioned her fitness as a Specter and tried to dissuade Sestak from chal-
candidate and invited further scrutiny of her cam- lenging him. An online straw poll by the Progres-
paign. By the end of October, O’Donnell publicly sive Change Campaign Committee from May 6
regretted making and airing the video. through 11, 2009, called “Should a Draft Sestak
Meg Whitman, who spent more than $160 movement be created to take on Sen. Arlen Spec-
million of her own money on her campaign, was ter in the Pennsylvania Democratic primary?”
the subject of the third-most stories, followed by garnered 8,000 votes nationwide, with 86 per-
Kentucky candidate Rand Paul. cent responding yes and 85 percent of Pennsylva-
Joe Sestak, who was challenging for a Senate nians in support. Sestak took on the Democratic
seat out of Pennsylvania, was fifth. Sestak was establishment and defeated Specter in the pri-
a Congressman from eastern Pennsylvania who mary before ultimately losing to Republican Pat
decided to challenge Senator Arlen Specter for Toomey in the general election.
the Democratic nomination. Specter was a long- Nevada Senate foes Angle and Reid were sixth
time moderate Republican who switched parties and seventh on the list, then Crist and Paladino.
in 2011 to avoid a primary challenge from a more Arkansas Senator Blanche Lincoln, a Democrat
conservative Republican, which he was widely who angered many in her party and ultimately
expected to lose. President Obama, Vice President lost re-election, was ninth. Gubernatorial candi-
Joe Biden, and Governor Ed Rendell supported date Brown of California was 10th.
In early 2010, the campaign of Carly Fiorina
caused an online stir with a Web video. Fiorina,
a former Hewlett-Packard chief executive officer
(CEO), was running in the Republican primary
for U.S. Senate in California. The so-called demon
sheep 3:22-minute-long video posted on YouTube
depicted her opponent, former Representative
Tom Campbell, as a fiscal conservative in name
only (FCINO) as a play on Republican in name
only (RINO). The video showed footage of docile
sheep walking in a field before switching to images
of Campbell, while the narrator criticized Camp-
bell’s past positions as not being fiscally conserva-
tive. Then, it switched back to the field, and there
was an image of a person, supposedly Campbell,
in a sheep’s costume and with bright, glowing-red
eyes. The campaign claimed that they were depict-
ing that Campbell was a wolf in sheep’s clothing.
The ad was viewed more than 100,000 times online
that week and led to a #demonsheep hashtag, a
top-trending phrase in a few days, largely through
the ad being mocked. California Democrats coun-
tered the video with three of their own that took
on the Republican challengers Fiorina, Campbell,
and Chuck DeVore. Fiorina went on to win the
primary over Campbell. She was defeated in the
general election by incumbent Democrat Barbara
Boxer. Fiorina had 306,000 Twitter followers,
A Tea Party protest sign from the Taxpayer March on Washington, while Boxer had 23,400.
D.C., on September 9, 2009. During the 2010 congressional Another provocative ad was used by Demo-
campaign, conservatives, particularly those identifying with the crat Alan Grayson in central Florida against Dan
Tea Party, were the most active users of social media. Webster for a House seat. The ad, titled “Taliban
Campaigns, Digital 181

Dan Webster,” actually aired on television before sites. As the avenues of social media grew and
it went viral and caused an Internet reaction. transformed, so did their roles in being used for
Grayson’s ad took comments by the religiously congressional and presidential elections.
conservative Webster out of context, quoting the
phrases “Wives, submit yourselves to your own Sean D. Foreman
husband,” and “She should submit to me—that’s Barry University
in the Bible.” It repeated “submit to me” in try-
ing to paint Webster as an extremist. Grayson, the See Also: Boehner, John; Campaigns, Presidential
incumbent, lost the seat to Webster. (2008); Campaigns, 2012; Grassley, Chuck; Tea Party
In a strange twist of online activity, an intern Movement; West, Allen.
with Rand Paul’s campaign was accused of sign-
ing onto DailyKos, a progressive political blog Further Readings
site, with a fake identity to post negative com- Bond, Robert M., Christopher J. Fariss, Jason J. Jones,
ments about Paul’s opponent Jack Conway. Adam D. I. Kramer, Cameron Marlow, Jaime
Another odd occurrence was when someone E. Settle, and James H. Fowler. “A 61-Million-
using the handle WingNutWatch joined Twitter Person Experiment in Social Influence and Political
and tried to provoke Tea Party activists to tweet Mobilization.” Nature, v.489 (September 13, 2012).
racist or suspicious messages. They were collected http://www.nature.com/nature/journal/v489/n7415/
and monitored on the Web site TeaParty Tracker. full/nature11421.html (Accessed November 2012).
Senator Chuck Grassley of Iowa took to Twit- Foreman, Sean D. and Robert Dewhirst, eds. The
ter in 2007 at age 77 and was a frequent tweeter Roads to Congress 2010. Lanham, MD: Lexington
during the 2010 campaign. One of his television Books, 2011.
ads made light of the fact that Grassley said, “I’ll Gulati, Girish “Jeff” J. and Christine B. Williams.
tweet; I’ll text; I’ll do whatever it takes. I work “Diffusion of Innovations and Online Campaigns:
for you.” Social Media Adoption in the 2010 U.S.
Allen West was elected in the Tea Party move- Congressional Elections.” Paper presented at the
ment, the first African American elected to Con- 2011 6th General Conference of the European
gress from Florida since Reconstruction. The use Consortium for Political Research, Reykjavik,
of Facebook postings and YouTube clips helped Iceland, August 25–27, 2011 (with permission
generate excitement about West’s campaign. from authors).
Sarah Palin, the 2008 Republican vice presiden- Nelson, Rebecca, Richard T. Hartman, and Andrew
tial nominee, used Facebook and Twitter to gen- B. Einhorn. “Social Media in the 2010 Election,”
erate interest about her favored candidates in the OhMyGov Inc. Research (September 2010). http://
2010 primary and general election contests. Her consulting.ohmygov.com/?s=2010&Submit
SarahPAC raised money online to support con- .x=0&Submit.y=0 (Accessed November 2012).
servative candidates and try to defeat Democrats. Sabato, Larry J. Pendulum Swing. Upper Saddle
When the Republican Majority Leader John River, NJ: Pearson, 2011.
Boehner (R-OH) became the speaker of the House Smith, Aaron. “The Internet and Campaign 2010,”
in the 112th Congress, he had to find ways to hold Washington, DC: Pew Research Center. http://
the moderate and conservative wings of the Repub- pewinternet.org/Reports/2011/The-Internet-and
lican Party together, especially with the arrival -Campaign-2010.aspx (Accessed November 2012).
of more than 40 Tea Party-backed candidates.
The use of social media by officials once sworn
into office continued to shape political debates
throughout the session, including the 2011 show-
down over raising the national debt ceiling. Campaigns, Digital
The use of social media in 2010 foreshadowed
the role it would play in the 2012 campaigns. It Evolving media, online technologies, and digi-
would now be expected that every candidate had a tal applications have fundamentally changed
Web page and high visibility on social networking how political candidates campaign. Candidates
182 Campaigns, Digital

seeking office can no longer rely solely on tradi- organize volunteers. Subsequent elections saw a
tional media outlets and historic campaign strate- vast rise in the use of candidate Web sites, specifi-
gies to win elections; they must now also cam- cally among presidential candidates, and contem-
paign where audiences and potential voters are porarily, a candidate cannot be viewed as a seri-
in digital environments. This is not to say that ous contender without an official Web site.
traditional methods of political campaigning are The initial integration of Web sites into cam-
no longer relevant, but in order for a candidate paign strategies provided a central location for
to be successful, campaigns must strategically voters to receive targeted information about can-
incorporate digital campaign tactics into overall didates, find details about candidates’ positions
campaign strategies. Candidates have started to and voting records, and through rudimentary dis-
use digital campaign components in almost every cussion boards, connect with other like-minded
aspect of political campaigning. voters. Web sites also began to alter the one-to-
many method of communication prominent in
Evolution of the Digital Campaign political campaigning. Voters had the ability to
The history of digital campaign tools is relatively communicate directly with campaigns via e-mail
short yet substantial and significant. Digital tech- as well as connect with people, across socio-
nologies began to make a measurable contribu- economic boundaries, through contributions to
tion to political campaigns in the late 1980s, when online discussion groups.
the fax machine was used to distribute campaign These early Web sites initiated the use of the
information to the political press. Although, by Internet as a digital campaign tool. Campaigns
contemporary standards, the fax machine may quickly learned that they could, at least to some
not be considered a revolutionary digital tool, extent, use the Internet to control public percep-
it allowed campaigns a method of quickly con- tion, distribute information directly to the politi-
trolling campaign talking points and providing cal press and opinion leaders, and quickly raise
rebuttals directly to the media. The campaigns of questions regarding the positions of opposing
the early 1990s saw e-mail emerge as a campaign candidates. Campaigns began sending point-by-
tool. E-mail allowed campaigns to send mass and point rebuttals of opponent’s claims directly to
chain e-mails to constituents or potential voters the media, attempted to control the flow of news,
about particular issues or policies. E-mail mes- and tried to influence how debate outcomes were
sages were also seen as tools for empowering reported. On a broader political level, national
voters by encouraging recipients to become more political organizations began to use Web sites to
active in the campaign. communicate and actively connect with voters
However, these early campaigns did not neces- and analyze how individuals, beyond early adopt-
sarily incorporate e-mail as part of their overall ers and activists, used the Internet.
campaign strategies, rather as supplemental com- However, use of the Internet during these early
munication, and continued to focus their atten- digital campaigns did not come without criti-
tions on more traditional campaign methods. As cism. Those leery of the long-term impacts and
digital campaigns have continued to evolve, e-mail potentials of the Internet regarded campaign and
has remained a consistent tool for reaching sup- political communication occurring through it as
porters and potential voters. As most recipients being symbolic of nothing other than individu-
have signed up to receive e-mail from campaigns, als engaging with a popular new medium. Crit-
it is an effective communication tool, especially ics questioned the validity of online deliberation,
when incorporated into broader digital campaign argued that online participation did not equate to
tactics, and still serves as one of the key sources of a substantive commitment to civic engagement,
campaign fund-raising. and struggled to find measurable links between
In 1994, Senator Dianne Feinstein became online political interaction and more tangible
the first political candidate to construct a Web forms of political engagement, such as voting.
site, initiating the use of a communication chan- Interestingly, many of these criticisms of early
nel that would permanently change how politi- digital campaigns still resonate in contemporary
cians communicate with voters, fund-raise, and assessments regarding the impact of emerging
Campaigns, Digital 183

digital tools, such as social media and mobile through most traditional mass media formats and
applications. allow for extensive engagement with the formal-
Although the Internet landscape has changed ized political system. New interactive media envi-
dramatically since the introduction of candidate ronments encourage networking, organization,
Web sites, they are still essential tools in integrated the generation of new spaces, and the emergence
political campaign strategies. Candidate Web sites of new types of communities, all of which pro-
continue to function as the communication hub vide forums where voters can become integral in
and serve as the official face of digital campaigns. digital campaigns. In addition, widespread and
Contemporary campaign Web sites are the most affordable access to the Internet, mobile tech-
effective location through which to engage in nologies, and other cheap, populist technological
direct messaging with voters, emphasize impor- tools is providing ways for voters to become more
tant campaign events, and encourage community informed, involved, and engaged. As communica-
building among supporters. Candidate Web sites tion technologies have continued to evolve, digi-
also provide the highest level of image control for tal tools, such as online video, social networking
campaigns, where embedded videos, news stories, sites, candidate Web sites, and mobile applica-
and links to internal social networking sites can tions, have become essential weapons in the arse-
control what information voters see and, perhaps nals of political campaigns.
most important, what they do not.
Social media Web sites began to emerge as dig- Online Video
ital campaign tools in the elections of the mid- Online video has become one of the most impor-
2000s. While the early functionalities of these tant tools in digital campaigning. Videos that
Web sites were somewhat limited, they helped are appropriately conceptualized and placed can
generate voter interest and recruit volunteers and cheaply, quickly, and effectively reach a vast audi-
fundamentally changed the relationship between ence, easily generating thousands of views and
voters and campaigns. Social media sites created shares. With the rise of video on demand (VOD)
the perception of a two-way relationship between services and the decline in traditional television
voters and candidates and greatly expanded the viewing, the digital environment is ripe with
many-to-many format of communication first potential audience members. Digital videos can
experienced through discussion boards. Social convey a sense of informality between candidates
networking has extended political and campaign and supporters, introduce potential voters to
communication, expanded opportunities for the everydayness of candidates, and easily reach
democratic engagement, altered traditional politi- specific target demographics. Candidates have
cal margins and hierarchies, and made democ- used online video to announce their candidacies,
racy more accessible. These networks have also involve the public in the selection of campaign
become important vehicles through which cam- themes, share campaign information, recruit vol-
paigns clarify and highlight information, gener- unteers, and solicit donations. Campaigns have
ate donations, and mobilize volunteers and vot- created, uploaded, and shared thousands of vid-
ers. When integrated into overarching campaign eos, have saved millions of dollars in advertising
strategies, social media have helped produce some expenses, and have generated audience views in
of the most substantial digital political events thus the hundreds of millions.
far in the history of political campaigning.
Social Networking
Digital Campaign Landscape In digital campaigns, vast networks of support-
Digital tools have resulted in substantial changes ers are formed around candidates, parties, issues,
in how politicians campaign. Voters are no lon- and ideas via social networking sites. During
ger passive audience members who must wait election cycles, campaigns work to use the mil-
for information; rather, the Internet has changed lions of candidates’ “friends,” posts, comments,
voters into active gatherers and creators of infor- and tweets generated on social networking sites
mation. Digital environments provide for levels to convert enthusiastic participants into active
of selectivity and interactivity that are limited voters. Campaigns utilize the functionalities of
184 Campaigns, Digital

social media sites, such as interactive applica- Candidate Web Sites


tions, groups, debate participation, and contests, Candidate Web sites remain an important hub of
to consistently engage potential voters in the elec- digital campaign communication. Web sites are
tion process. Through strategies that offer various where the highest levels of message control and
methods of consistent participant engagement, candidate image construction occurs and where
campaigns can work toward creating a commu- campaigns can frequently update content and
nity of like-minded people that will hopefully incorporate interactive features to keep voters
translate into votes. By incorporating social net- interested and returning. Voter interaction with
working strategies into other methods of digital candidate Web sites can provide a wealth of infor-
and traditional campaigning, campaigns are able mation for campaigns. These interactions allow
to spread messages across multiple sites and plat- campaigns to create databases of potential voters,
forms that complement their target demograph- effectively and rapidly access voter demographic
ics. Campaigns have embraced the role of social and issue data, and quickly send targeted e-mails.
media in digital campaigning by allocating signifi- Campaigns also engage in microtargeting by
cant resources to ensure that target audiences stay offering opportunities to join different constitu-
active and involved with the campaign through ency groups and including state-by-state content
social networking. pages with local information, both of which allow
Attempting to harness the power of social for targeting constituency-based content.
media, the Barack Obama campaign created its
own social networking site, MyBarackObama Mobile Applications
.com. The campaign used the site, which allowed Mobile applications connect voters to campaigns,
users to create profiles, friends lists, and per- literally in the palms of their hands, and possess
sonal blogs to encourage users to join groups, many of the characteristics of the aforementioned
participate in fund-raising, arrange events, and technologies. Application users function as digital
participate in volunteer activities. The goal of foot soldiers of the campaigns and through push
MyBarack­Obama.com was to bring supporters notifications (a way for an application to send
from other social networking sites and Obama’s information to a user’s phone even when the app
candidate Web site to this central hub of Obama is not in use) are often among the first people to
supporters, where the campaign’s message could get campaign updates and news sent directly to
be communicated and supporters could be ener- their smartphones. Through mobile apps, users
gized to volunteer, donate, and vote. can employ social integration functionalities to
Campaigns also use social networking for post tweets, updates, and messages, send e-mails
microtargeting (techniques that involve cluster- directly from the campaign to their own social
based marketing to specific demographic seg- networking pages, help register voters, and access
ments) of voter constituencies. By establishing canvassing information directly through the app.
profiles on specialized social networking sites that Social integration technologies also utilize Google
are geared toward specific demographics, such mapping technologies to help supporters find their
as the black, Latino, Asian American, and the way to campaign events and polling locations.
lesbian, gay, bisexual, and transgender (LGBT)
communities, campaigns can effectively target Digital Campaign Outcomes
demographic segments with talking points that These digital tools serve to supplement and
are of specific concern to them. Microtargeting enhance traditional campaign strategies. They
can also be accomplished through the creation also provide new ways of managing a candidate’s
of segmented social networking sites, such as image and presence, fund-raising, volunteer mobi-
the creation of Twitter accounts for each state, lization, voter engagement, community building,
which allows campaigns to target state-relevant and targeting voters.
messages to supporters. This type of digital cam-
paigning allows campaigns to target more aggres- Image and Presence
sive advertising and topics to users of specific sites Managing a candidate’s image and presence
based on constituency demographics. is important in digital campaigning. Digital
Campaigns, Digital 185

technologies can help candidates effectively build and mobile technologies have made it easier for
their political brands and, if leveraged effectively, campaigns to recruit and mobilize voters. Digital
this presence can help candidates build political campaigns provide centralized locations through
buzz, reach potential voters, build community, which campaign messages can resonate with
and work to translate enthusiasm into votes. Dig- potential volunteers, offline events can be orga-
ital platforms are excellent venues through which nized, volunteers can post photos and testimo-
to float issues, host debates and conversations nials of their experiences, and new volunteers
about relevant campaign topics, and provide mes- can be recruited. Online volunteer mobilization
sage-driven information. Digital campaigns can has resulted in thousands of offline events being
be used to challenge or rebut statements by or the planned, volunteer groups being created, and
positions of opponents, to help drive mainstream millions of phone calls to potential voters being
media coverage, and to circumvent media and made through virtual phone-banking platforms.
political branding by communicating with sup- Political campaigns have capitalized on the use
porters directly and interactively. of digital tools to energize volunteers and engage
them in event organization, grassroots fund-rais-
Fund-Raising ing, and vote building.
Digital fund-raising is perhaps one of the crown- Much in the same ways that campaigns have
ing achievements of digital campaigning. In 1998, recruited and managed volunteers, digital tools
Barbara Boxer’s online fund-raising campaign, have been used to build a sense of community
which was considered very successful at the time, among supporters. Using digital strategies, such
netted $25,000. This was just the beginning of as text message alerts, the ability to watch cam-
the impact that digital technologies would have paign speeches from mobile apps, behind-the-
on campaign fund-raising. Contemporarily, cam- scenes photos and videos, and updates from offi-
paigns raise hundreds of millions of dollars online cial campaign blogs, have moved campaigns past
and routinely break fund-raising records for the simple e-mail blasts and created the sense of com-
amount of money that is raised in very short munity with supporters. The use of social net-
time frames. Digital fund-raising is substantially working groups, hashtags, mobile apps, airing of
more cost-efficient than traditional methods of campaign videos on YouTube, and the ability to
fund-raising, and while the result is often large check in at rallies through social media all work
numbers of small donations, these donations to make supporters feel like an integral part of the
cost campaigns very little to solicit. Campaigns campaign community. The key way to accomplish
have developed new, inventive, and sometimes community building is through capitalizing on the
gimmicky methods for effectively reaching more experience of being involved with the campaign,
donors than has been possible through tradi- which can ultimately turn campaign supporters
tional fund-raising methods. Digital donors often into voters. Through employing these techniques,
include people who have never given to politi- digital campaigns have been successful in har-
cal campaigns and those who are willing to give nessing and mobilizing volunteers, building sub-
small donations repeatedly. Over time, it is pos- stantial online communities, and increasing voter
sible that digital fund-raising strategies will make engagement.
campaigns less beholden to wealthy donors or
private interest groups. Gathering Data and Targeting Voters
Digital campaigns are also a very effective method
Volunteer Mobilization, Community through which to collect data about potential vot-
Building, and Voter Engagement ers. Through data mining, microtargeting, voter-
Using digital campaign strategies to bring together file targeting, and social media analysis, cam-
a mass number of volunteers first occurred in paigns can learn about voters’ online behaviors,
1998 when Jesse Ventura’s gubernatorial cam- voting trends, and the key issues resonating among
paign organized a 72-hour final drive through certain demographics and develop the most effec-
the state entirely via e-mail. Since then, online tive strategies for cultivating relationships with
videos, social networking, candidate Web sites, these potential voters. Through a combination of
186 Campaigns, E-Mail

demographic and behavioral targeting, campaigns abilities, and fundamentally changed political
can use information about individual voters to campaigning. As online technologies and the dig-
drive recruitment and increase persuasion and ital environment continue to change and evolve,
turnout. Campaigns have deployed such sophis- so too will the ways in which these technologies
ticated digital listening strategies that they can are integrated into political candidates’ overall
customize digital messages using social network- campaign strategies.
ing capabilities and use geo-targetable options to
deliver ads within their voters’ districts, targeting LaChrystal Ricke
advertising almost to the individual level. Digital Sam Houston State University
campaigns track each potential voter with such
detail that they know once he or she has cast a See Also: Campaign Strategy; Campaigns, 2012;
ballot and then turn their attention to last-minute E-Democracy; Evolution of Social Media; Voter
deciders. Turnout

Challenges of Digital Campaigns Further Readings


While online tactics are essential to contempo- Chadwick, Andrew. Internet Politics: States, Citizens,
rary digital campaigns, there are inherently chal- and New Communication Technologies. Oxford,
lenges that accompany them. The ease with which UK: Oxford University Press, 2005.
Web sites can be created and the speed at which Davis, Steve, Larry Elin, and Grant Reeher. Click
social media posts and user-generated videos can on Democracy: The Internet’s Power to Change
become viral can make it difficult for campaigns Political Apathy Into Civic Action. Cambridge,
to control candidates’ images, keep talking points MA: Westview Press, 2002.
from becoming distorted, and keep the voters on Holihan, Thomas. Uncivil Wars: Political Campaigns
point with the campaigns’ messages. in a Media Age. Boston: Bedford, 2009.
This requires campaigns to manage and Howard, Phillip. “Deep Democracy, Thin Citizenship:
attempt to control both what is occurring in the The Impact of Digital Media in Political Campaign
mainstream media as well as what is happening Strategy.” Annals of the American Academy of
in the digital environment. The fragmentation of Political and Social Science, v.597 (2005).
the Internet can also make it difficult for cam- Panagopoulos, Costas. Politicking Online:
paigns to get and keep the attention of poten- The Transformation of Election Campaign
tial voters. With so much information and so Communications. New Brunswick, NJ: Rutgers
many sites through which voters can choose to University Press, 2009.
engage, retaining voters’ attention and translating
that attention into action, such as donations or
votes, can be difficult. Finally, regulations regard-
ing Internet campaigning lag far behind the con-
stantly developing functionalities of the digital Campaigns, E-Mail
environment, potentially making it difficult for
campaigns to know what is permissible in digital The use of e-mail in campaigns is one of the many
campaigns. digital communication tools enabled by Internet
technology. E-mail, short for electronic mail, is
Conclusion a method used to exchange messages across the
The Internet environment and digital campaign Internet or computer networks. In the context of
tools have already significantly impacted politi- political campaigns, e-mail is an efficient way for
cal campaigning and elections. These tools have politicians to connect with large numbers of vot-
revolutionized how analysts, candidates, and ers as message production and distribution is both
citizens think about and deal with politics. Digi- quick and inexpensive. Although slow at first to
tal campaigns have altered the ways in which emerge in the realm of electoral politics, e-mail
candidates and campaigns interact with voters, has become a standard strategy for voter outreach.
substantially impacted campaigns’ fund-raising Typically used to supplement other communication
Campaigns, E-Mail 187

strategies, e-mail is now prevalent in virtually every State Digital to develop and manage tens of mil-
campaign at all levels of government. lions of voter contacts in an e-mail campaign that
E-mail messaging involves asynchronous com- engaged more than 13.5 million individual sup-
munication between a sender and a receiver. This porters. Professional e-mail services assisted 2012
means that an immediate response is not neces- candidates with crafting specific language to be
sary for ongoing discussion. To engage in com- used in an e-mail’s subject line that would most
munication via e-mail, connection to an Internet effectively appeal to voters. In an effort to more
server is only required for as long as it takes to successfully connect with individual citizens, digi-
send or receive a given message. This communi- tal professionals also helped campaigns micro-
cation style is convenient for political campaigns target e-mails to specific audiences. Knowledge
because it allows them the capacity to distribute of demographics and other personal information
content at any time during the day. Unlike other associated with individual e-mail addresses was
media that require audiences to be present and crucial in allowing campaigns to send smaller and
engaged during the time of message distribution, more specialized batches of messages to particu-
e-mail technology offers senders and receivers the lar audiences.
flexibility of attending to messages at times and E-mail is an effective form of campaign com-
locations that are most convenient for them. munication for several reasons. It can be used to
The dramatic impact of Internet communi- increase fund-raising efforts, to better organize
cations was recognized during the 2004 elec- and mobilize volunteers, and to advertise less
tion. Candidates such as Howard Dean—who expensively. E-mail technology also provides an
famously employed an array of digital tools to incredibly quick method for campaigns to react
raise money and generate national support dur- to media coverage or attacks from political oppo-
ing the presidential primaries—used Web-based nents. Unlike other media messages that require
platforms such as Web sites and e-mail to con- considerable amounts of time and organization
nect with voters. In particular, the campaigns of for production and distribution, campaigns can
presidential candidates George W. Bush and John quickly craft and disseminate e-mail to mass audi-
Kerry sent hundreds of millions of e-mails in their ences. For example, on October 16, 2012—the
efforts to recruit volunteers and solicit donations. evening of the second televised presidential debate
Since 2004, the use of e-mail in elections has between candidates Mitt Romney and Barack
increased significantly as billions of e-mails were Obama—vice presidential candidate Paul Ryan
sent during the 2012 election. sent an e-mail on behalf of the Romney campaign
There are several strategies that campaigns with the subject “Mitt crushed it” just moments
employ to generate massive lists of citizens’ e-mail after the debate formally ended. The timeliness of
addresses. While an individual may actively con- this message was important because it immedi-
tact a campaign requesting to be on an e-mail list, ately assured recipients of the e-mail that, despite
it is more common for the campaign to reach out opposing opinions being projected by Demo-
and request information from voters. Campaigns crats, political pundits, and journalists, the Rom-
strategically feature space throughout their litera- ney campaign was confident that their candidate
ture that allows readers to provide their personal had been victorious in the debate. The ability to
contact information. When visiting a campaign quickly distribute messages via campaign e-mail
Web site during the 2012 election, it was not allows candidates a measure of control for fram-
uncommon for visitors to be automatically redi- ing themselves and their opponents in the midst
rected to a Web page that asked the users to enter of the media frenzy and mudslinging that often
their e-mails and zip codes before continuing to accompany major elections.
the Web site of the candidate. In modern elections, e-mail exists as an inte-
Larger campaigns with sufficient funds may gral part of a political campaign’s integrated
also employ the assistance of professional services marketing communication strategy as it supple-
that specialize in managing digital voter contacts. ments the strength of other media. By announc-
For example, Barack Obama’s 2012 re-election ing campaign events and featuring interactive
campaign worked closely with the company Blue hyperlinks to other sources of relevant digital
188 Campaigns, E-Mail

President Barack Obama hugs First Lady Michelle Obama following the third presidential debate with Governor Mitt Romney, at Lynn
University in Boca Raton, Florida, on October 22, 2012. Immediately following the second debate, Paul Ryan famously sent out an
e-mail on behalf of the Romney campaign with the subject “Mitt crushed it.” The message was intended to reassure supporters that
despite opinions to the contrary by Democrats, political pundits, and the media, their candidate had “won” the debate.

information, campaign e-mail can function as e-mail from the presidential campaigns included
a doorway through which voters can connect messages sent from vice presidential candidates
with the campaign and find other more engag- Joe Biden and Paul Ryan as well as the candi-
ing ways to support a candidate. In 2012, it was dates’ campaign managers, their digital directors,
common for campaigns to feature hyperlinks and their wives. Drawing on a range of senders
throughout their e-mails that would direct read- was effective because particular messages can be
ers to a campaign’s official Web site, where they more influential when sent by a particular person.
were exposed to a wealth of additional informa- In addition to political elites who sent messages
tion about the candidate. Hyperlinks to other on behalf of candidates, voters were encouraged
digital platforms such as blogs, social network to use the simple process of forwarding e-mail to
sites, and other digital media were also fre- spread campaign communication to their friends.
quently embedded in campaign e-mail as a way E-mail forwarded by friends can exist as an effec-
to attract voters to these different forms of cam- tive means of connecting with voters because citi-
paign communication. zens are more likely to read, and perhaps be per-
Campaign e-mail often appears to come suaded by, an e-mail that is sent by someone they
straight from the candidate. However, campaigns know personally.
also rely on other influential persons to send mes- There are many qualities of campaign e-mail
sages on their behalf. During the 2012 election, that make it a powerful platform for mediating
Campaigns, Grassroots 189

campaign communication. However, it is impor- corporations. Grassroots activities refer to public


tant to acknowledge the difficulty in assessing relations from the ground up, created by the peo-
the direct effects that an e-mail may have on its ple rather than targeted at the people. In politics,
recipient once it is sent. E-mail is easily deleted grassroots campaigning often becomes a public
or ignored, and even when data regarding deliv- manifesto of sustained public advocacy efforts,
erability rates, open rates, and click-through indirect lobbying, or political activism. This form
rates are available, it is complicated to measure of political persuasion can be a highly effective
the degree to which a given message may or may way to alert legislators and elected officials about
not have impacted an individual reader. Further, public concerns and spur them to action.
once an e-mail is sent, the campaign loses control In recent years, the Internet and mobile tech-
over to whom it is forwarded and how its content nology have significantly altered traditional
is used. Despite these drawbacks, the broad use approaches for grassroots campaigning. Today,
and emphasis on e-mail in past elections suggests local activists and nongovernmental organiza-
that this form of campaign communication will tions (NGOs) should not solely rely on tradi-
remain an important element of candidates’ digi- tional media to amplify the voice of the people
tal strategies. but actively embrace new strategies and tactics
for citizen engagement.
Stephanie E. Bor The term grassroots can be traced back to Sen-
Robert K. Avery ator Albert Jeremiah Beveridge of Indiana, who
University of Utah once referred to the Progressive Party in 1912 as
the party that “has come from the grass roots. It
See Also: Campaign Strategy; Campaigns, Digital; has grown from the soil of people’s hard neces-
Engagement Features; Microtargeting. sities.” The U.S. suffragists’ campaigns and the
Civil Rights and Anti-Vietnam War movements
Further Readings of the 1950s and 1960s set up a model for con-
Graf, J. “New Media—The Cutting Edge of temporary grassroots activism. Most activists
Campaign Communications.” In Campaigns on embrace grassroots campaigning as a means to
the Cutting Edge, R. Semiatin, ed. Washington, influence public policy, social norms, and values.
DC: CQ Press, 2008. Grassroots campaigns can be orchestrated by
Green, J. “Fundraising: The Science Behind grassroots organizers or even lobbyists seeking
Those Obama Campaign Emails.” Bloomberg to educate, organize, and engage constituents to
Businessweek (November 29, 2012). http://www contact public officials in order to affect public
.businessweek.com/articles/2012-11-29/the-science policy. Their efforts are successful because cam-
-behind-those-obama-campaign-e-mails (Accessed paign participants are viewed by politicians as
December 2012). potential voters for a competitor in the next elec-
Hallen, Ed. “‘Hey’:—An Analysis of the Obama/ tion. In the United States, grassroots lobbying has
Romney Emails.” Klaviyo Blog. http://www become the fastest-growing area in the political
.klaviyo.com/blog/2012/11/06/re-hey-an-analysis persuasion business largely due to the provisions
-obamaromney-emails (Accessed December 2012). of the Lobbying Disclosure Act of 1995. Accord-
ing to this document, grassroots lobbyists are not
considered professional lobbyists and are exempt
from registration with the secretary of the Senate
and the clerk of the House of Representatives as
Campaigns, well as from disclosing estimates of the organiza-
tion’s total lobbying expenditures.
Grassroots Traditional grassroots activities may take the
traditional forms of organized letter writing to the
A grassroots campaign is a planned activity local legislator, gathering signatures for petitions,
organized to mobilize public support to bring raising money from small donors for political
pressure on legislators, government officials, or advertising or campaigns, canvassing, attending
190 Campaigns, Grassroots

rallies, toll-free phone lines, small group meet- reinvigorate American democracy. For instance,
ings, interviews with key public officials, and oth- social media increased the public responsiveness
ers. Another popular tactic is the use of telephone and accountability of both parties.
trees, which involves groups of constituents call- A new model of civic engagement was cre-
ing their networks and asking them to contact the ated that blends traditional media with social
office of the lawmaker with a common request or media, where ordinary citizens can become
purpose. Due to limited resources, activists often agents of persuasion and leverage their personal
use a variety of inexpensive outreach scenarios networks for various political causes. Most cit-
such as local press coverage, word of mouth, and izens now use their inner circles as trust filters
political rallies to bring about social change and to evaluate political information. Unless politi-
influence government decisions. cal advocacy groups become trusted members of
During the Ban Bus Campaign, an activist tour these networks, they will not be able to engage
through 24 U.S. cities, intended to educate Ameri- the public and influence the course of electoral
cans about the problem of land mines and influ- events. Increased media attention to the political
ence them to write letters to the U.S. government, agendas of independent bloggers and advocacy
the campaigners were able to build grassroots sup- groups have given ordinary citizens more promi-
port of the anti-land mine treaty due to increased nence and voice in national debates. Social media
media coverage, demining performances on the have also enriched political conversation, which
streets, photography exhibits picturing landmine allows people to reach to the bottom of the story
casualties, as well as student and veteran involve- when they evaluate the information about candi-
ment, and so on. dates and policy ideas. During elections, candi-
Pseudo-grassroots campaigns, also known as dates are now forced to answer questions coming
astroturfing, are often fabricated to affect public directly from grassroots networks.
opinion. This kind of artificial grassroots action In 2010, a study by the public relations firm
imitates public advocacy efforts started by indi- Burson-Marsteller found that nearly all of the 34
viduals or local communities and often withholds examined advocacy groups, including the Asso-
information about the source’s financial connec- ciation of American Retired Persons (AARP), the
tions. Many online astroturfers use software to Human Rights Campaign, and National Taxpay-
mask their identities. In 2003, “grassroots” letters ers Union, use at least one social media platform
favoring Republican Party policies appeared in to communicate their views on specific federal
local newspapers around the United States, when legislation and regulation with stakeholders.
signers were electronically submitting prewrit- New social networking sites have significantly
ten letters from a political Web site that offered enhanced grassroots strategies and tactics for
petitioners points for sending a letter to a local public outreach and community engagement.
paper. Another classic example of astroturfing In 2011, an individual petition on Change.org
is the campaign mounted in 1994 by the Coali- asking Bank of America and its Chief Executive
tion of Health Industry Choices to lobby against Officer Bryan Moynihan to drop its unexpected
the Clinton administration’s health care reform new $5 per-month banking fee for debit card cus-
plan. Aside from other means, they engaged in an tomers attracted the support of 300,000 signatures.
aggressive media campaign featuring Harry and When President Barack Obama signed the petition
Louise, a middle-aged couple who complained and U.S. Senator Richard J. Durbin responded to
about the plan. Bank of America and the petition on Twitter, it
prompted Congress to look at legislation for out-
Recent Actions of-control banking fees. In 2012, various organi-
The 2008 Barack Obama campaign demonstrated zations, including Tumblr, Reddit, Twitter, and
the advantages of social media for political activ- Fight for the Future organized a highly visible pro-
ism, citizen engagement, and fund-raising. The test against the proposed Stop Online Piracy Act
Brookings Institution Center for Technology (SOPA). This action involved 115,000 Web sites,
Innovation highlighted direct advantages in using with Wikipedia going dark for 24 hours, caus-
social media to improve campaign engagement and ing 3 million people to e-mail the U.S. Congress
Campaigns, Grassroots 191

to express their opposition to the bill. As a result, through Twitter’s systems. The system then cal-
congressional leaders shelved the proposed legisla- culated a score for both candidates. Tanya Kappo
tion until finding a better solution to online piracy (@Nehiyawskwew) and her followers started the
and protection of intellectual property. “#idlenomore” hashtag in support for the event
Idle No More to address the Canadian First
Hashtag Politics Nations people’s objections to provisions in Bill
Smartphones and mobile technology help activists C-45, which was seen as part of a broader agenda
to access their social networks on the go. What’s to impose legislation on aboriginal people with-
now being called “hashtag politics,” according to out their consent. The hashtag went viral after her
Duncan Meisel, has changed the political land- followers started tweeting about other indigenous
scape, giving grassroots activists from both politi- issues. Soon National Chief Shawn Atleo and
cal parties a new way to share their views and others called for a march to Parliament, which
gain followers. A label called a hashtag, which drew some serious media attention. Although the
combines a # symbol and a key word that con- hashtag did not stop the bill, it showed aborigi-
nect posts from different users, is an established nal people that they can influence their leaders
convention for organizing ideas on Twitter. Like through grassroots social media campaigns.
a frame, a hashtag organizes and amplifies public
conversations. Cost-Efficient Fund-Raising
The role of the organizer practicing hashtag Social media helps advocacy organizations to cut
politics is to organize the conversation around down on overhead and operating costs for orga-
a topic hashtag and then curate the conversa- nizing grassroots campaigns. It is also is reduc-
tion to draw more supporters. Every day, Twitter ing the need for both paid and volunteer staff. By
evaluated and weighed the sentiments of tweets looking into available resources within their own
mentioning both Barack Obama and Mitt Rom- networks, grassroots campaigners can mobilize
ney relative to every other message that passed people, raise money, and promote programs in

Protesters gather against the proposed Stop Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA) in New York on January 18, 2012, as
part of a series of organized events and protests. The grassroots effort had 115,000 Web sites and prompted 3 million citizens to e-mail
their congressional representatives in opposition. The bills were removed from further voting two days later.
192 Campaigns, Grassroots

a more expedient manner. Traditionally, online and Gregory Asmolov, a student of the Saratov
fund-raising, describe Dick Armey and Matt University of Technology created the platform
Kibbe, can be done in the form of e-mail solici- www.gdecasino.ru to map illegal sites in the
tations that direct people to a Web site, money city. The founder then mobilized other users to
bombs to raise a lot of money in the same day, map their own neighborhoods and cities. The
static donation buttons on Web sites, and fund- map became the basis for activists to write com-
raising campaigns for specific events or efforts. plaints to the local police, leading to the closure
However, social media may also provide inde- of at least seven gambling dens. In March 2011,
pendent platforms for like-minded people to con- Russian President Dmitry Medvedev referred to
nect and collaborate; they lay the foundation for www.gdecasino.ru to show the map of illegal
massive, internationally connected grassroots gambling sites on his iPad to the Russian chief
movements. Social media consultant Laura “Pis- prosecutor as proof of the weaknesses of Russian
tachio” Britton used Twitter to raise $25,000 law enforcement.
in a week, leveraging her contacts and her con-
tacts’ networks. Asking each of her Twitter fol- Crowdsourcing
lowers—all 44,000 of them—to donate $2 each, In the past decade, crowdsourcing has been used
Pistacho got enough response and enough public to organize protests, report on poor government
retweeting, or republishing, of her request to raise performance, track aid flows, or even find may-
$25,000 for CharityWater.org. The Twestival, the oral candidates. The organization Uncaucus in
largest global grassroots social media fund-rais- Rhode Island approached the mayoral election
ing initiative, took place in more than 200 cities not only as an opportunity to elect a worthy
in Europe, Asia, and America simultaneously, and candidate but to get many residents involved as
raised $1.2 million in 14 months for 137 non- a collective hiring manager. Their social media
profit organizations. outreach made the election discussion public and
In societies with increased government control accessible to a wide range of participants. Blow
over political participation and traditional media, the Whistle, a campaign to expose a senator
social media can be viewed as a “balancing force,” who manipulated congressional rules to thwart
according to Marco Skoric and colleagues, to the Whistleblower Protection Enhancement Act,
the traditional media. The possibility for success combines crowdsourcing with traditional grass-
increases when skilled, networked individuals roots political activism.
create a “community of concern” around crowd- In an attempt to ferret out the anonymous sena-
sourcing platforms that emerge as bottom-up tor who killed the bill, the campaigners published
grassroots initiatives. As perceived government the contact information for all 87 active U.S. sena-
control of the traditional media drives citizens to tors, and challenged listeners to contact represen-
generate more political content on social media, tatives to ask point blank, “Did you kill this bill?”
their political efficacy and self-confidence become Due to e-mails from hundreds of participating lis-
stronger. Interestingly, such political attitudes teners, 55 senators publicly stated that they were
and skills acquired online can later translate into not responsible for the secret hold. After recon-
active, real-life participation in political activities, vening in January, the Senate voted 92–4 in favor
such as election rallies. of reforming the rules for secret holds, making it
It has become much more difficult for govern- harder to use them to sabotage the legislative pro-
ments to block information and stifle collabora- cess. Ushahidi, a popular incident-reporting sys-
tion. On the other hand, by enabling ordinary tem that combines elements of Twitter and Google
citizens to monitor data and directly contribute Maps, documented many incidents that escaped
to the formation of policy, open source gover- the mainstream media coverage in the aftermath of
nance helps continuously improve transparency the disputed 2007 presidential elections in Kenya.
and state accountability to its citizens and cor- Ushahidi has been deployed to monitor elections
rect poor performance. In 2009, when gambling in Mexico and India and attacks on immigrants in
machines were declared illegal in Russia, driving South Africa and worked as a mutual aid coordi-
gambling underground, explain Josh Machleder nation platform during unprecedented wildfires in
Campaigns, Organizing 193

Russia. By providing visualizations and monitor- Technology to Support Citizen Engagement,


ing implementation of relief and recovery efforts, Marcus Foth, et al., eds. Cambridge, MA: MIT
crowdsourcing proved to have a strong impact in Press, 2011.
developing countries, according to Maja Bott and Machleder, Josh and Gregory Asmolov. “Social
Gregor Young, allowing for wide dissemination of Change and the Russian Network Society
weather and crop market price information (e.g., Redefining Development Priorities in New
Mali, Uganda), crowdfunding microcredit (e.g., Information Environments.” http://www.internews
Kiva.org), and so on. .org/research-publications/social-change-and
The attributes of the Web 2.0 era, such as digital -russian-network-society (Accessed December
transparency, increased Internet literacy, and real- 2102).
time public engagement, have changed grassroots Meisel, Duncan. “Hashtag Politics.” In Beautiful
campaigning. More than ever before, grassroots Trouble: A Toolbox for Revolution, Andrew Boyd,
campaigners have opportunities to give voice to et al., eds. New York: OR, 2012.
the underresourced and powerless through low Parkinson, Michael and Daradirek Ekachai. “Gee.”
technological solutions. Small organizations and In International and Intercultural Public Relations:
individuals are no longer dependent on resources A Campaign Case Approach. Upper Saddle River,
once available only to governments and large cor- NJ: Pearson Allyn & Bacon, 2006.
porations. Today’s citizens can choose what news Skoric, Marko M., Ji Pan, and Nathaniel D. Poor.
they want to receive and whose political agendas “Social Media and Citizen Engagement in a City–
to propel forward though their own social net- State: A Study of Singapore.” Proceedings of the
works. The best political advocacy organizations Sixth International AAAI Conference on Weblogs
become members of online citizen networks; learn and Social Media, June 4–7, 2012.
their cultures, languages, and needs; and utilize “Vast Majority of Leading U.S. Political Advocacy
multimedia resources to drive civic discussions. Groups Are Using at Least One Social Media
Platform to Connect and Organize Stakeholders,
Sergei Samoilenko Study Finds.” Burson-Marsteller (July 13, 2010).
George Mason University http://www.burson-marsteller.com/newsroom/
lists/PressReleases/DispForm.aspx?ID=768&
See Also: Fund-Raising; Open Source Governance; nodename=Press%20Releases%20Archive
Twitter. (Accessed December 2012).
West, Darell. “Ten Ways Social Media Can Improve
Further Readings Campaign Engagement and Reinvigorate American
Armey, Dick and Matt Kibbe. Give Us Liberty: A Democracy.” Brookings Institution (June 28,
Tea Party Manifesto. New York: William Morrow, 2011). http://www.brookings.edu/research/
2010. opinions/2011/06/28-social-media-west (Accessed
Bott, Maja and Gregor Young. “The Role of December 2012).
Crowdsourcing for Better Governance in Wilcox, Dennis L., Glen T. Cameron, Hryan
International Development.” Praxis, The Fletcher H. Reber, and Jae-Hwa Shin. THINK Public
Journal of Human Security, v.27 (2012). Relations. Upper Saddle River, NJ: Pearson, 2012.
Coombs, W. Timothy and Sherry J. Holladay. PR
Strategy and Application: Managing Influence.
Hoboken, NJ: Wiley-Blackwell, 2009.
“Crowdsourcing for Congressional Fairness.”
CrowdStation (February 24, 2011). http://blog Campaigns, Organizing
.ideascale.com/2011/02/24/crowdsourcing-for
-congressional-fairness (Accessed December 2012). Over the last decade, the use of social media
Hirsch, Tad. “More Than Friends: Social and Mobile has increased dramatically, and political candi-
Media for Activist Organizations.” In From Social dates have taken notice. In 2008, Barack Obama
Butterfly to Engaged Citizen: Urban Informatics, became the first presidential candidate to employ
Social Media, Ubiquitous Computing, and Mobile a comprehensive social media strategy; the
194 Campaigns, Organizing

then-Democratic presidential nominee used social on Twitter, Obama had 118,107 followers, while
media to raise record-breaking sums of money, McCain had only 4,942 followers. Although
organizing a nationwide group of volunteers and Obama’s social media presence was not the sole
disseminating his campaign message. The 2012 factor for his eventual election victory, it was key
election demonstrated that social media is now to his ability to raise vast sums of money and
a crucial part of presidential campaigns, and mobilize young supporters.
increasingly, congressional campaigns. Although By the time of the 2010 midterm elections,
social media has not obviated the need for tra- the number of Americans using social media had
ditional campaign activities, such as television grown significantly. Overall, in this election, 22
advertising and door-to-door canvassing, it has percent of adults reported that they used social
drastically changed the way that campaigns raise networking for political engagement. In addition,
money, communicate their messages to voters, 11 percent of adults indicated that they followed
and mobilize voters prior to Election Day. a political candidate on Twitter or Facebook.
The demographics of social media users had
Evolution of Social Media in Campaigns begun to change as well; although younger indi-
Although Obama is often credited with introduc- viduals had dominated social media, in this elec-
ing social media into political campaigns, many tion, older voters began using social media in
aspects of his social media strategy were mod- greater numbers. Specifically, 33 percent of users
eled on the efforts of Vermont Governor How- above the age of 50 used social networking for
ard Dean, who unsuccessfully campaigned for the political activity during this election. In compari-
2004 Democratic presidential nomination. Key to son, in the 18 to 29 age group, 42 percent of users
Dean’s meteoric, albeit temporary, ascendancy to reported that they used social networking for
front-runner status was his successful use of the political activity.
Internet site Meetup.com; the site was designed During this cycle, Republican congressional
to connect local individuals sharing common candidates adopted many of the approaches of
interests, in this case shared support of the Dean the Obama campaign; social media was especially
campaign. At the start of the campaign, in mid- important for the Tea Party movement, which
2003, Dean had only a few hundred supporters supported Republican candidates who adhered
on Meetup.com; by the end of his campaign in to their small government, antitax principles.
February 2004, the campaign could boast more FreedomWorks and American Majority, two
than 600,000 supporters on the site. umbrella organizations for the movement, hosted
In 2008, then-Illinois Senator Barack Obama conferences to train Tea Party activists in online
employed a hybrid campaign strategy during his campaign techniques. These efforts paid off, and
Democratic primary race against New York Sena- a Pew study found that, during this election cycle,
tor and former First Lady Hillary Clinton as well as Republicans were more likely than Democrats to
during his general election campaign against Ari- use social media for campaign activities. Specifi-
zona Senator John McCain. Specifically, Obama cally, 40 percent of Republicans used social media
melded traditional campaign activities with social for campaign activities, compared to 38 percent
media activism; central to this effort was Obama’s of Democrats.
Web site, www.myBarackObama.com. The site Some commentators dubbed the 2012 presi-
was designed by Facebook cofounder Chris dential election the “social media election.” Both
Hughes and allowed Obama supporters to donate Obama and his Republican opponent, former
money, access information about the candidate, Massachusetts Governor Mitt Romney, had a
and volunteer for phone banks and door-to-door significant presence in social media, communicat-
canvassing. ing with voters through Facebook, Twitter, and
Although McCain did eventually incorporate YouTube. Although Romney made social media
social media into his campaign, Obama vastly a centerpiece of his campaign, hiring Zac Mof-
outpaced him in this regard. By Election Day, fatt, cofounder of the digital adverting firm Target
Obama had 844,927 friends on Myspace, com- Victory as his social media director, the Obama
pared to McCain’s 219,404 friends. In addition, campaign again proved to be more successful at
Campaigns, Organizing 195

using new media. On Twitter, the Obama cam- donating online were first-time political donors.
paign averaged 29 tweets per day, while the Rom- Moreover, donors to the Dean campaign were
ney campaign averaged just one. In addition, the also individuals who had not previously volun-
Obama campaign posted twice as many videos on teered for a political campaign.
YouTube as did the Romney campaign. In the 2008 election, Obama replicated this
In the future, it is likely that social media will approach. Overall, his campaign raised a record-
be an essential part of presidential and congres- breaking $756 million; $500 million of this money
sional campaigns. Voters are increasingly relying was from online donations. In addition to solicit-
upon the Internet to gain political information; ing individual donations, the myBarackObama
according to one survey, during the 2012 election, .com Web site also allowed Obama supporters
82 percent of U.S. adults expected to receive most to set up their own individual fund-raising sites
of their political news online. In accordance with and request donations from friends and family.
this, Americans now expect elected officials to In total, more than 70,000 Obama supporters set
use these mediums as well; the same survey found up individual fund-raising pages. Like Dean sup-
that 62 percent of respondents expected politi- porters in 2004, donors to the Obama campaign
cal candidates to have a social media presence. tended to give small but frequent donations. Spe-
Although using social media is not a guarantee of cifically, the average online donation for Obama
electoral success, candidates who fail to adapt to was about $80, and 40 percent of Obama’s online
the new digital environment will be at a signifi- donations were less than $200.
cant disadvantage. Social media has not only vastly increased the
sums of money raised by candidates but has also
Social Media and Fund-Raising allowed campaigns to use technology and data
The clearest way that social media has changed mining to devise targeted fund-raising appeals.
campaign organizing is in the area of fund-rais- For example, during one part of the 2008 elec-
ing; the advent of social media has led to a vast tion, the Obama campaign tested several thou-
increase in online fund-raising. sand unique fund-raising e-mails. In order to
Traditionally, campaigns have relied on a net- assess the effectiveness of each e-mail, the cam-
work of wealthy donors who were able to donate paign would first send it to a subset of donors.
the maximum of $2,500 to a candidate, as permit- Individual e-mails that proved most effective in
ted by federal law. In addition to large donations soliciting donations would later be sent to the full
from individuals, candidates also received contri- list of potential donors. Overall, e-mail solicita-
butions from bundlers; here, prominent support- tions are far less costly than traditional mail solic-
ers collected donations from multiple individuals itations, which cost approximately 20 cents for
before bundling the contribution and donating it every dollar raised.
to the candidate. Another way campaigns raise The ability of presidential candidates to raise
money is through fund-raising events, for exam- vast sums of money online may have broad
ple, a dinner with the candidates or other party reverberations, ending the public financing of
luminaries. Donors pay fees to attend the dinner; presidential campaigns. Pursuant to the Federal
at the national level, the fee is often several thou- Election Campaign Act, the federal government
sand dollars per plate. provides an optional grant of money to each gen-
Although presidential and congressional candi- eral election candidate to pay for valid expenses;
dates still engage in these traditional fund-raising in exchange for the grant, the candidate accepts a
activities, candidates have recently begun to solicit limit on overall campaign spending. From 1976
donations online, with many campaigns deriving through 2004, all general election candidates
a majority of their funding from online dona- accepted public financing. In the 2008 election,
tions. In 2004, the Dean campaign was the first to due in part to his ability to raise vast sums of
demonstrate the value of small donations from a money online, Obama declined the $84 million
vast network of dedicated supporters. During his in public funding; he became the first presiden-
run for the Democratic nomination, Dean raised tial candidate to opt out of public financing for
$20 million on the Internet; 44 percent of those the general election. McCain, however, did accept
196 Campaigns, Organizing

public financing; the Republican found himself at Social media has added a new layer to these
a significant disadvantage, with Obama outspend- outreach efforts, and the Internet has become a
ing him by a margin of two to one. Subsequently, key destination for campaign advertising; candi-
in the 2012 election, neither Obama nor Romney dates now post both Web videos and static ads
elected to accept public financing. with links to relevant Web sites. In 2012, both
Fund-raising through social media is especially Obama and Romney employed digital advertising
effective for underdog or insurgent candidates, agencies to oversee their online efforts. In total,
who unlike presidential candidates, may lack Obama spent $52 million on digital ads, while
party support or public visibility. For example, Romney spent $26.2 million. Some of the most
Ron Paul, a congressman from Texas, used online popular destinations for digital ads were Face-
fund-raising to sustain his long-shot candidacy book, YouTube, and Twitter.
for the 2008 Republican presidential nomination. These Web advertisements were often dis-
Specifically, Paul would request that his online tinct from the candidates’ television advertise-
supports detonate money bombs by rapidly rais- ments. For instance, when announcing his 2012
ing large sums of money. In November 2007, campaign theme, “Forward,” Obama released
despite single-digit support in national polls, Paul a seven-minute Web-only ad that recounted the
managed to raise $4.3 million in a single fund- successes of his first term. Obama also used Web-
raising drive. In December 2007, he set a fund- based advertising to disseminate negative infor-
raising record by raising $6 million in one day. mation about Romney. The campaign released a
Online fund-raising was also crucial in the six-minute advertisement focusing on the plight
January 2010 special election in Massachusetts of workers who were laid off after Romney’s ven-
to fill the U.S. Senate seat held by Ted Kennedy, ture capital firm bought their employers. This was
who died in August 2009. In the race, Republi- an expanded version of a two-minute television
can State Senator Scott Brown faced off against ad that the Obama campaign ran in swing states.
Democrat Martha Coakley, Massachusetts attor- Online commercials can be produced and
ney general. Although Coakley was favored in posted quickly and, in 2012, proved to be an
the heavily Democratic state and enjoyed an ini- effective way for the candidates to rebut their
tial fund-raising advantage, Brown was able to opponents. After the second presidential debate,
rapidly raise funds online. In a period of 18 days the Romney campaign posted a Web advertise-
in January 2010, he raised $14 million in online ment that collected instances of Obama mocking
donations; this included a single-day fund-raising Romney; this was juxtaposed with Obama stat-
drive that yielded more than $1 million. Brown ing that he intended to conduct a campaign based
went on to win the election, garnering 52 percent on issues, not personal attacks. Similarly, after
of the vote, compared to 47 percent of the vote the first presidential debate, widely judged to be
for Coakley. a decisive victory for Romney, the Obama cam-
paign released a video highlighting various mis-
Social Media and Voter Outreach statements by the Republican candidate.
Successful campaigns must translate fund-raising Overall, Web-based ads have rapidly become
dollars into effective voter outreach, gaining the a staple of campaign advertising; in 2012, there
attention and support of voters. Here, campaigns were six times more online ads than there were
seek to create favorable pictures of the candidates in the 2008 election. Despite the growth in online
by disseminating both biographical information advertising, television still remains the dominant
and policy positions. Reciprocally, a campaign medium for campaign advertising, and only about
seeks to create unfavorable images of the oppo- 2 percent of campaign spending in the 2012 presi-
nents, using opposition research to highlight dential election was devoted to online advertising.
unpopular policy positions or personal scandals. Social media and technology have also impacted
To accomplish these tasks, campaigns have typi- the way that campaigns undertake direct mailing
cally devoted a large percent of the campaign operations. Increasingly, campaigns are abandon-
budget to direct mail as well as television and ing generic direct mail communications and instead
radio advertising. using data mining to develop mailers targeted at
Campaigns, Organizing 197

specific demographic or ideological groups. In by the Obama campaign, compared to only 18


addition, these mailers often contain links to a percent who reported being contacted by the
candidate’s Web site, highlighting areas of interest McCain campaign. In many swing states, the gap
to that voter. The campaign can then gather data was much larger. In Nevada, 50 percent of voters
on how often these Web sites are accessed. Some were contacted by the Obama campaign, com-
mailers also contain quick response (QR) codes, pared to 29 percent who were contacted by the
which voters can access with smartphones. McCain campaign; in Colorado, the Obama cam-
paign contacted 51 percent of voters, while the
Social Media and Voter Mobilization McCain campaign contacted 34 percent. Obama
In addition to the “air war,” namely the effort to won both of these states in 2008; during the 2004
sway voters through television advertising, cam- election, both of these states had gone to Repub-
paigns also rely on the “ground war,” with mem- lican George W. Bush.
bers of the campaign contacting individual vot-
ers and encouraging them to turn out on Election Future of Social Media and Campaigns
Day. Campaigns employ two primary methods to Although it is impossible to assess the degree
encourage turnout: door-to door canvassing and to which a well-crafted social media strategy
phone banks. Voter mobilization is predicated improves a candidate’s electoral prospects, the
upon personal communication between the cam- last two presidential elections demonstrate that it
paign and voters, and campaigns are increasingly is now an essential part of any national campaign.
turning to social media sites to recruit volunteers Since the 2004 election, social media has proved
to engage in these mobilization activities. to be a key tool for fund-raising, communication,
In 2008, the Obama campaign’s “ground and volunteer recruitment.
game” was vastly superior to that of his rival, Social media clearly present many opportuni-
with the Democrat boasting more offices in bat- ties for candidates; it contains significant risks as
tleground states and disciplined teams of sea- well. As a bottom up medium of communication,
soned campaign professionals. A key component individual social media users are empowered to
of that success, however, was Obama’s army of create and upload content; this content can then
unpaid campaign volunteers, many of whom go viral and dominate political discourse, drown-
were recruited through social media sites. Begin- ing out official communication from any cam-
ning in 2007, the campaign sent these volunteers paign. This was much in evidence in September
to Camp Obama and, by late summer, had trained 2012, when a video of Romney speaking at a
more than 1,000 individuals in get-out-the-vote private fund-raiser went viral. In the video, the
(GOTV) techniques. As a result, the Obama team Republican presidential candidate stated that
was able to begin voter mobilization efforts even 47 percent of the population supported Obama
before paid staff had arrived in many states. because they expected to receive government aid
Throughout his campaign, Obama continued from his administration. The video, uploaded by
to recruit volunteers through social media sites. an anonymous YouTube user, received 1.6 million
One million Obama supporters signed up for views in a single day, and the subsequent scandal
e-mail alerts and were willing to participate in was covered heavily in television and print media.
voter mobilization activities when contacted by Earlier in the campaign, Obama had also experi-
the campaign. This permitted the Obama cam- enced the downside of social media, when conser-
paign to expand its focused GOTV efforts beyond vative bloggers seized on a line from a speech, in
the 72-hour model successfully used by Republi- which the president seemed to suggest that small
cans in 2000 and 2004. Specifically, the Obama businesses owed their success to the government.
campaign conducted intense GOTV actives dur- The quote became a political meme, and the
ing the three months prior to the election. Romney campaign eventually incorporated it into
The ability to recruit volunteers online had a stump speeches, making it a focus of the Republi-
discernible effect, with Obama outperforming can convention in August.
McCain in voter contact. Nationwide, 26 per- As these examples demonstrate, social media
cent of voters reported that they were contacted is serving to democratize discourse in political
198 Campaigns, Presidential (2000)

campaigns, diminishing the role of the news media and second, it paved the way for online involve-
and elected officials as authoritative sources of ment in national campaigns in the years to come.
political information. Although political candi- In one of the most contentious presidential
dates have successfully harnessed social media as races ever, George W. Bush was declared the
a campaign tool, its ultimate effect is to change winner over Al Gore when a recount in Florida
the manner in which elected officials interact with gave Bush the state by a mere 537 votes. While
voters. For instance, a recent study found that the election is memorable for its unprecedented
more than 90 percent of the members of Con- postelection recounts and the involvement of the
gress had Twitter accounts, catering to an elector- U.S. Supreme Court, it is also noteworthy for the
ate that is increasingly tech savvy. Although social multiple ways in which it laid the groundwork
media is unlikely to ever fully replace traditional for subsequent shifts in the role played by social
campaigning, its usage will undoubtedly increase media as well as online political venues. Although
in future election cycles. presidential candidates had already proven that
Web sites were of interest to some voters—both
Kelly McHugh Republican and Democratic candidates had sites
Catherine Aquilina as early as the 1992 election—in 2000, the presi-
Florida Southern College dential campaigns boosted their online presence
and included interactive elements to help recruit
See Also: Campaign Strategy; Campaigns, volunteers and donors.
Presidential (2008); Opposition Videographer; Social By 2000, more Americans were going online,
Media Strategies and Tactics. and about 104 million adults accessed the Internet
looking for election information. Some research-
Further Readings ers noted that the Internet seemed to be assuming
Aronson, Elise D. “Cyber-Politics: How New Media a role similar to that played by talk radio because
Has Revolutionized Electoral Politics in the United it gave people another platform through which to
States.” Colgate Academic Review, v.9 (2012). express their opinions. It also provided ways for
Semiatin, Richard J., ed. Campaigns on the Cutting Americans to have personal contact with presi-
Edge. Thousand Oaks, CA: CQ Press, 2013. dential campaigns, which in the past had been
Smith, Aaron. “The Internet’s Role in Campaign reserved mainly for the party faithful.
2008.” Pew Internet & American Life Much of this was done through the respective
Project. http://web.pewinternet.org/~/media/ campaigns’ Web sites, which were more interac-
Files/Reports/2009/The_Internets_Role_in_ tive than in previous campaigns. For instance, the
Campaign_2008.pdf (Accessed December 2012). Gore–Lieberman site offered a way for a visitor
Smith, Aaron. “22% of Online Americans Used to the page to select a state and type in a list of
Social Networking or Twitter for Politics in 2010 volunteer activities he or she was willing to do.
Campaign.” Pew Internet & American Life Project. That information was then sent to officials in that
http://pewinternet.org/Reports/2011/Politics-and state so that the volunteer could be assigned cam-
-social-media.aspx (Accessed December 2012). paign duties. The Bush–Cheney Web site had a
link to multimedia, which allowed visitors to see
short video clips of the candidate talking about
campaign issues.
Although campaigns during both the prima-
Campaigns, ries and the general election recruited volunteers
through their Web sites, they were also interested
Presidential (2000) in raising money online. Candidate Bill Bradley
asked the Federal Election Commission (FEC),
The 2000 presidential election in the United which oversees federal elections, if federal candi-
States will always be remembered for two rea- dates could process credit card and debit payments
sons: First, the election’s outcome was not actu- from donors. The FEC ruled that online credit
ally decided until a month after the vote was held, card contributions to presidential candidates were
Campaigns, Presidential (2000) 199

eligible for federal matching funds. This began During the 2000 election, AOL debuted Elec-
the now-common process of soliciting contribu- tion Guide 2000, an online election site for voters
tions online through Web sites and social media that provided local voter guides, virtual candidate
outlets. Senator John McCain’s campaign raised debates, issue charts, and a Presidential Match-
more than $6 million online during the 2000 elec- maker feature that matched voters and candidates
tion, setting a bar that would easily be shattered on certain issues. More than 20 million families
in the coming years. But, for a country in which visited the site, and 165,000 people registered to
(at that time) only 132 million people had online vote through the site. This endeavor, which was
access, it was no small feat. done in cooperation with CBS News, earned AOL
During the 2000 election, there was no Twitter an honorable mention in the 2000 James K. Bat-
or Facebook. However, there was America Online ten Awards, which recognize excellence in civic
(AOL), which featured chat rooms, conference journalism. The site featured rolling online chats
rooms, and auditoriums. These virtual rooms were with all of the presidential candidates and virtual
places that members could go online to chat with debate halls in which a variety of federal, state,
other people, to play games, to debate topics, or and local candidates could participate and speak
just to share information. AOL actually began in to their potential voters.
1988 as AppleLink, a joint project of Apple Com- AOL and the candidates were not the only
puter and a company called Quantam Computer organizations working to identify people with an
Services. The idea was to find a way to connect interest in the election. It has been noted that vir-
Apple II and Macintosh computers. The early chat tual organizers in the 2000 election began to locate
rooms that were developed in this project could people with common interests and move them
only hold 23 people at one time. The software toward identifying with one particular candidate.
was refined and enlarged, and it became a chat This was made easier through online sites that not
program called People Connection. It was later only provided information but also allowed for
renamed America Online. In January 2000, Time
Warner and AOL announced that they would be
merging. The companies completed the merger
and became AOL Time Warner in 2001, a deal
that was destined to fall apart later in the decade.
By 2000, there were 29 million people subscrib-
ing to AOL. This was the height of the company’s
popularity, and it coincided with the presidential
election. According to a Pew Internet and Ameri-
can Life report, about 30 percent of Americans
said that they used commercial services such as
America Online in 2000 as their primary source
for election news. Younger people were more
likely to visit chat rooms to discuss the election,
while older voters were more likely to participate
in online polls.
Studies have found that people who go online
to participate in campaigns increase their politi-
cal activation. In other words, if they spend time
online discussing the campaign or election issues,
they tend to be more active in political issues and
in their communities. In 2000, AOL wanted to be
the hub of online political participation. It had George W. Bush in Concord, New Hampshire, signs paperwork to
already been through the 1996 presidential and become a presidential candidate in the 2000 election. Bush and
the 1998 midterm elections and noted that mem- running mate Dick Cheney later released a Web site with links to
bers were interested in political topics. videos of Bush speaking on campaign issues.
200 Campaigns, Presidential (2004)

feedback and real-time chats. In this way, politi- candidates and their public based on an increas-
cal activists began to build communities of people ingly dynamic, interactive approach to online
who shared common interests and were trained media that opened the door to easy acceptance of
in how to organize and network online. President social media’s role in subsequent elections.
Bill Clinton’s Summit for America’s Future was an
example of an organization that worked to train Melissa M. Smith
volunteers in how to organize groups of people Mississippi University for Women
and mobilize them for political action. It brought
together a wide group of people to encourage vol- See Also: Campaigns, Grassroots; Campaigns,
unteerism among Americans. Virtual; Chat Rooms; MoveOn.org.
The seeds sown by political activists during the
2000 election led to the involvement of several Further Readings
online organizations during the 2004 campaign Denton, Robert. The 2000 Presidential Campaign.
and grassroots support for organizations such Westport, CT: Praeger, 2002.
as MoveOn.org. In 2000, MoveOn launched an Kohut, Andrew and Lee Rainie. “Internet Election
Internet discussion forum that provided a way for News Audience Seeks Convenience, Familiar
members to give feedback to the organization. In Names.” Pew Internet & American Life Project.
2004, MoveOn paid for the airing of several anti– http://pewinternet.org/Reports/2000/Internet
George W. Bush ads and raised $750,000 for ads -Election-News-Audience-Seeks-Convenience
targeting Bush’s military record. -Familiar-Names/Report.aspx (Accessed
Senator John McCain turned his attention to November 2012).
grassroots organizing early in his 2000 campaign. Trent, Judith and Robert Friedenberg. Political
His campaign, as noted above, raised a signifi- Campaign Communication. Lanham, MD:
cant amount of money through its Web site. The Rowman & Littlefield, 2008.
site provided ways for people to get involved in Wagstaff, Keith. “The Good ’Ol Days of AOL Chat
the campaign with the thought that involvement Rooms.” http://www.cnn.com/2012/07/06/tech/
would lead to donations. After McCain won the web/time-aol-chat-room/index.html (Accessed
New Hampshire primary, he raised $300,000 September 2012).
overnight through his Web site. There was so
much traffic on the site that it became temporar-
ily unavailable.
The McCain campaign made use of online chat
rooms with donors and even disclosed informa- Campaigns,
tion about how money would be spent. McCain
was the first candidate to raise $1 million online Presidential (2004)
in only 48 hours.
The 2000 presidential election paved the way The 2004 presidential campaign did not feature
for the more interactive, involvement-oriented social media as it is known today. Facebook was
online political campaigns that emerged in 2004 still in its infancy, and Twitter did not even exist.
and especially in 2008, when then candidate The year did mark, however, a seminal moment
Barack Obama raised $500 million online and in American politics for the influence of the Inter-
declined to take any federal matching money for net in campaigns and elections, both in terms of
his campaign. Although the opportunities were how candidates connected to voters and how vot-
more limited, Americans went online to listen, ers interacted with one another. The Internet and
discuss, and learn about the candidates. They also its social dimensions also featured prominently in
registered their support through online volunteer campaign strategy and were a leading factor in
efforts, donations, and discussions in chat rooms. driving several important events during the cam-
Although the 2000 presidential election predated paigns. In short, the 2004 presidential campaign
the existence of “social media” as they are known demonstrated the importance of the Internet for
today, it established a new relationship between contemporary American electoral politics and
Campaigns, Presidential (2004) 201

pointed in the direction of the growing influence political information positively impacted their
social media would play in elections to come. decision to vote.
During the 2004 presidential campaign, three In terms of partisanship, Democratic voters
out of 10 Americans used the Internet to interact appeared to be more active in obtaining online
with the election. Among active Internet users, political information than Republicans. Support-
52 percent used the Web to get news or infor- ers of John Kerry were more likely to send and
mation about the election. These numbers rep- receive e-mails about the election, track opinion
resented a sharp increase from previous election polls about the candidates, research endorsements
cycles. In 1996, only 4 percent of the American and ratings by interest groups, and participate
public turned to the Internet for election infor- in online polls and surveys. Kerry voters were
mation, and in 2000, that number was 18 per- also more likely to get involved in online discus-
cent. Similarly, only 22 percent of Internet users sions and debates, contribute money online, and
used the Web in 1996, with that number climb- believe that the Internet played an important part
ing to 33 percent in 2000. Clearly, 2004 captured in shaping their vote preferences.
the growing influence of the Internet in informing
American voters. The reasons for this increase are Attacks on Candidates
many but include growing familiarity and expe- The Internet and social media, especially blogs,
rience with using the Web, an increase in Web impacted the 2004 election in other ways. In
content and news in particular, and the increas- every campaign, there are inevitable gaffes and
ing availability of broadband network connec- attacks on candidates, but in 2004, the Internet
tions making connecting to the Internet faster gave added power to these events that, for periods
and more stable. of time, defined the campaigns and likely torpe-
What is even more striking about 2004 is how doed the candidacy of one contender in the Dem-
Americans used the Internet to engage with the ocratic primary. After a subpar performance dur-
election. Among those who used the Web for elec- ing the first debate, President George W. Bush was
tion information, 34 million researched candi- criticized by the mainstream media for appear-
dates to inform themselves about where the can- ing awkward, unprepared, and uncomfortable
didates stood on important issues. In addition, answering questions. Soon after, however, blog
32 million people received or sent jokes or com- sites on the Internet reported that photographs
ments through e-mail about the election. Another from the debate allegedly showed a suspicious
18 million people reported taking part in online bulge inside of the president’s jacket. Specula-
polls and surveys. Also, 16 million people visited tion soon ran rampant that Bush was wearing a
Web sites run by various organizations to check radio receiver and that someone had been feed-
on endorsements or ratings of candidates. Almost ing him answers to the debate questions. This
6 million people joined chat groups to engage in scenario supposedly explained a bizarre moment
political discussions and debate. Finally, 4 million during the debate in which the president com-
people contributed money to candidates and cam- plained about being interrupted even though no
paigns online. one had been talking at the time. The Bush cam-
Surveys also captured the fact that the time vot- paign, apparently unaware or unconcerned with
ers spent on the Internet affected their political what was being said on the Internet, was slow
opinions and vote choices. Among voters receiv- to respond to the allegations, and the suspicion
ing political news from the Internet, 52 percent trailed his campaign for several weeks.
reported that the information they were able to The Internet played an even greater role in sab-
obtain online helped them to structure their vote otaging the candidacy of Howard Dean, who was
choices. Another 27 percent said that online challenging John Kerry for the Democratic nomi-
information influenced them to vote either for or nation. Dean had enjoyed an improbable rise as
against a certain candidate. Moreover, there was a potential candidate and looked well positioned
also evidence that online political information to finish strong in the Iowa caucuses. Despite his
influenced political participation. Also, 23 per- momentum, Dean finished a disappointing third
cent of survey respondents reported that online behind John Kerry and John Edwards. Undaunted
202 Campaigns, Presidential (2004)

by the poor showing, Dean delivered a speech to the group’s attacks throughout the Internet. This
supporters in which he intended to sustain their speedy dissemination of the story helped contrib-
enthusiasm for his candidacy. While the exact ute to almost one in three Americans believing
cause of what came next is unclear, Dean appeared that there was at least some truth to the allega-
to finish his speech with a throaty scream. On the tions. In addition, like the Bush radio receiver
Internet, the event was quickly dubbed the “Dean story, the Kerry campaign was slow to respond to
Scream” and the “I Have a Scream” speech. the attacks and was apparently unaware of how
Edited videos soon appeared on the Web attach- quickly the story was spreading across the Inter-
ing the scream to music soundtracks and mocking net. Many analysts would later attribute this fail-
captioning. Blog sites regurgitated the story for ure as a major factor in Kerry’s election defeat.
days and helped create the impression that Dean
was unhinged and lacking the temperament to be Dean Campaign Innovations
president. The event, and the Internet sensation The 2004 presidential campaign also demon-
that followed it, soon led to Dean withdrawing strated how social media and the Internet would
his candidacy. play major roles in campaign activities in the
During the general election contest, two other future. Ironically, it was Howard Dean, a man
events were significantly influenced by social whose candidacy was undone by social media,
media and the Internet. During the fall campaign, who demonstrated the potential for social media
questions were raised about whether President
Bush had fulfilled his duty requirements while a
member of the Air National Guard. As the story
grew, CBS news ran a story supported by docu-
ments from the late Lt. Col. Jerry B. Killian, Bush’s
squadron commander. The documents claimed
that Bush had received preferential treatment dur-
ing his time in active service and that Killian had
been encouraged to obscure the fact that Bush was
not fulfilling his duties. After CBS ran the story,
an Internet blogger, Harry MacDaugald, alleged
that the documents used by CBS were fakes. His
analysis of the documents purported to show that
that were written with fonts and formatting styles
that were not in existence when the memos were
supposedly composed. Other bloggers took up
the fake documents story until CBS was forced to
conduct an internal investigation into the story.
The news organization concluded that the docu-
ments could not be authenticated and admitted
that they should not have been used.
Finally, John Kerry came under attack from a
group calling itself the Swift Boat Veterans for
Truth (SBVT). The group launched a series of
attacks on Kerry’s candidacy, calling into question
his fitness to serve as president. Among the allega-
tions made by the group, Kerry was accused of
lying about atrocities committed by U.S. soldiers Howard Dean speaking at a September 26, 2006, Democratic
in Vietnam, embellishing his own service record, National Committee event. Dean’s presidential run came to an
and accepting undeserved combat medals. When end shortly after what became known as the “Dean Scream”
SBVT’s allegations first surfaced, they were bol- or the “I Have a Scream” speech, after he hoarsely finished his
stered by bloggers and message boards that spread speech with a loud “Yeah!” Video parodies appeared online.
Campaigns, Presidential (2004) 203

to benefit political campaigns. One area where Given his early cash-flow problems, Dean had
Dean clearly highlighted the potential for social initially considered accepting public financing for
media assistance was in fund-raising. When Dean his campaign. The problem with public financ-
began his campaign for the presidency, he pos- ing, of course, was that it would place stringent
sessed little cash, almost no staffers, no visible limits on the amount of money the campaign
constituency, and a single campaign office in Ver- could raise. As the fund-raising problems reversed
mont. Dean soon hired a campaign manager, Joe themselves, Dean began to reconsider the public
Trippi, who wanted to utilize the Internet to over- financing option. His concern, however, was that
come these deficiencies. To fill the need for cash the decision could alienate supporters. To gauge
and resources, Dean and Trippi devised an inno- this potential problem, the Dean campaign pio-
vative fund-raising strategy that defined short- neered the use of the online referendum. Sim-
term goals for donors to maximize motivation ply put, Dean put the public financing question
to contribute. The campaign focused on current before his supporters and allowed them to vote
news stories about the opposition candidates to on how he should proceed. His supporters over-
build immediate momentum for fund-raising. The whelmingly endorsed forgoing the public option,
strategy was an extraordinary success. During the which gave Dean the cover he needed to abandon
height of the primary season, Dean had increased his earlier decision. Dean supporters voting yes to
his cash resources to $40 million, boasted a staff rejecting public financing were then sent personal
of more than 400 people, and had opened numer- messages and requests for donations. The online
ous campaign offices in 24 states. referendum thus revealed itself to be a power-
Dean and Trippi utilized social media Web ful tool for candidates to evaluate the support of
site MeetUp.com to bolster popular support for their constituents and to provide legitimacy for
his candidacy. MeetUp.com assisted individuals controversial decisions.
in arranging get-togethers according to shared
interests. Harnessing the Web site’s networking Other Uses
potential, the Dean campaign soon built an Inter- The Kerry and Bush campaigns also relied on the
net community of supporters numbering in the Internet and social media to enhance their elec-
hundreds of thousands. The organization allowed tion efforts, but neither did so to the extent of
the campaign to transmit important information the Dean campaign. Building on Dean’s fund-
to supporters, build its fund-raising base, and raising success, Kerry, along with the Democratic
direct activists to spread the campaign’s message National Committee, used the Internet to build
to new voters in diverse areas. The social net- a substantial campaign war chest. Internet fund-
working effort was so successful that members raising allowed the campaign to raise more than
continued organizing even after the collapse of $122 million in contributions. Republicans har-
the campaign. nessed the power of social media in other ways,
Another innovation employed by the Dean focusing instead on voter mobilization. The Bush
campaign was the use of blogging. The campaign campaign combined the time-tested grassroots
began its Blog for America and eventually posted voter turnout strategy with an Internet-based
more than 2,900 entries while receiving more than organization strategy. Like the Dean campaign’s
30,000 comments. The blog provided another use of MeetUp, the Bush campaign used the
opportunity for the campaign to direct the activi- Internet to organize team-building sessions with
ties of campaign loyalists, gave Dean supporters supporters around the country. These sessions
a venue to network and socialize, and created a focused on tactics and strategy and even featured
broad social network to draw ideas for campaign appearances by the first lady and the president.
activities and messages. The blog also enhanced More than 30,000 such sessions would eventually
Dean’s fund-raising opportunities and was cred- take place, involving more than 350,000 people.
ited as a key component in his fund-raising suc- The 2004 presidential campaign was not a
cess. That being said, the blog was also frequently total victory for social media because many of its
plagued by technological problems that frustrated most powerful technologies were not yet in exis-
both campaign staffers and visitors. tence. Nevertheless, the election demonstrated the
204 Campaigns, Presidential (2008)

growing influence of the Internet and social media Arizona, who was from a previous generation,
in American elections and how candidates must with physical disabilities from his time as a pris-
be able to harness this technology to win the elec- oner of war in Vietnam, and was said to have not
tions of the future. even used a typewriter, let alone text messages.
Obama’s 365–173 electoral college win (53–46
Eric C. Sands percent in the popular vote) was fueled in part by
Kaitlyn E. Pettet a successful social media strategy.
Berry College Obama’s campaign used the Internet to adver-
tise, communicate, and organize. It also aired its
See Also: Blogs; Campaigns, E-Mail; Campaigns, positions and defended against attacks. There
Presidential (2000); Campaigns, Presidential (2008); were close to 500 million blog postings about
Campaigns, 2012; Fund-Raising; Social Media Obama from the start of the Democratic National
Strategies and Tactics. Convention in August in Denver to Election Day.
During the same period, there were around 150
Further Readings million blog posts that mentioned McCain.
Ceaser, James and Andrew Busch. Red Over Blue: On Myspace, Obama had 844,927 friends
The 2004 Elections and American Politics. compared to 219,404 for McCain. In the last two
Lanham, MD: Rowman & Littlefield, 2005. days of the campaign, Obama gained more than
Cornfield, Michael. “The Cyber-Education of John 10,000 new friends, while McCain gained around
Kerry and Other Political Actors.” http://www 964. Obama had about 200,000 Myspace friends
.pewinternet.org/Reports/2005/Commentary-on in January 2008 when the primary campaign
-the-impact-of-the-internet-on-the-2004-election/ started. Obama’s Twitter account had 118,107
Going-Broadband-Getting-Netwise.aspx (Accessed followers, gaining 2,865 on November 3 and 4.
December 2012). McCain’s Twitter account had 4,942 in total.
Rainie, Lee, Michael Cornfield, and John Horrigan. Obama’s campaign let followers know where
“The Internet and Campaign 2004.” http://www he was every step of the campaign trail. It was
.pewinternet.org/Reports/2005/The-Internet-and updated multiple times a day with messages in the
-Campaign-2004.aspx (Accessed December 2012). first person so that followers felt a personal con-
nection to the candidate himself. It also included
live video streams of his public appearances.
Obama would occasionally personally type mes-
sages, which would be signed with his initials bo
Campaigns, to authenticate.
It was well known that Obama was an avid
Presidential (2008) BlackBerry user throughout his campaign. When
he became president, his use of the personal and
Social media in political campaigns came of age presidential BlackBerry devices had to be limited.
during the 2008 presidential election. The cam- Through Election Day, Obama’s Facebook fan
paign of Barack Obama best embraced Web 2.0 page had more than 2.5 million fans and many
tools to transform the notion of campaigning secondary groups with thousands of supporters.
nationally and virtually. The 2008 election can Students for Barack Obama was created in July
be seen as the beginning of the Internet age in 2007 to energize young voters, and campaign
political campaigns. Social media were useful staffers eventually made it an official part of
not only for facilitating the distribution of cam- the campaign. By contrast, McCain had around
paign messages, but they also provided utility as 620,000 Facebook supporters. More than 5.4
a mechanism for continuous and ongoing politi- million Facebook users clicked on an “I Voted”
cal engagement by citizens reached by particular button to let their friends know they had per-
messages. formed their civic duty.
Forty-seven-year-old first-term Illinois Senator There were various applications for smart-
Barack Obama defeated Senator John McCain of phones that allowed Obama supporters to share
Campaigns, Presidential (2008) 205

quotes, speeches, and inspirational messages. background as a community organizer saying, “I


A YouTube channel, “BarackObamadotcom,” guess a small-town mayor is sort of like a com-
had more than 120,000 subscribers and 1,800 munity organizer, except that you have actual
videos by election time. There were more than responsibilities.” The Obama campaign raised
18 million channel views for Obama compared $10 million over the next 24 hours.
to 2 million for McCain on YouTube. Two mil- Obama easily exceeded his Democratic primary
lion people created profiles on his Web site challengers online. His social media presence was
My.BarackObama.com. stronger than Hillary Clinton’s. Obama had more
One explanation for the disparity in numbers than 250,000 Facebook members during 2007
is that the early users of social media more closely compared to 3,200 for Clinton. Meanwhile, Clin-
resemble the profile for Democratic voters than ton faced resistance from a “Stop Hillary Clin-
for Republicans, especially in terms of age. This ton” Facebook site, while Obama enjoyed dozens
was expected to change in subsequent campaigns of supportive groups.
as all candidates and consultants realized the In early 2007, Joe Rospars was hired to
importance of social media strategies. direct new-media efforts. Rospars had worked
Not only could candidates reach supporters for Dean’s 2004 campaign and for the Demo-
through a variety of sources, but they could also cratic National Committee. He was joined by
tailor their messages on each social network. Can- Social Media Director Chris Hughes, a Face-
didates and campaigns used social media to try to book cofounder. They created a team of experts
connect with constituents. Companies use those known as Triple O—Obama’s online operation.
same spaces to post ads and try to reach targeted They formed My.BarackObama.com (MyBO) to
groups of customers. create groups, organize events, raise funds, and
have supporters connect with one another. More
Obama Campaign than 2 million profiles were created by support-
The Obama campaign revolutionized the use ers, 200,000 offline events were planned, about
of social media sites for campaigning and fund- 400,000 blog entries were posted, and more
raising purposes. It picked up where 2004 Demo- than 35,000 volunteer groups were created. At
cratic presidential hopeful and former Vermont least 1,000 groups were created the day Obama
Governor Howard Dean left off with online fund- announced his candidacy on February 10, 2007.
raising. Dean’s campaign is credited with starting On MyBO, the campaign built a database with
to systematically collect online donations during 13 million e-mail addresses, 6.5 million online
his unsuccessful 2004 run. donors, 2 million members of their social net-
The Obama campaign took it to a new level work, and tens of thousands of engaged activists.
when it had more than 3 million online donors Obama raised more than $600 million and much
making more than 6.5 million donations. The of it was online. Supporters were encouraged to
average online donation was $80, and 6 million set up their own grassroots finance committees on
of the donations were in increments of $100 or MyBO. More than 70,000 people raised $30 mil-
less. The average donor gave money more than lion from their family and friends. Around 3 mil-
once to the campaign. These figures allowed the lion phone calls were made in the final four days
Obama campaign to raise the most money of of the campaign by supporters using MyBO’s vir-
any campaign in history and from the most total tual phone-banking system.
donors. One result of Obama’s phenomenal fund- One key advantage for Obama was the use of
raising ability was that he declined matching pub- the Internet to organize in caucus states. He won
lic funds, becoming the first candidate to do that the main caucuses in his primary contest against
since the system was set up in 1976. Hillary Clinton among other Democratic challeng-
Obama raised online more than $100 million ers. Winning the Iowa caucus and then in other
of the $150 million haul in September 2008. A caucus states throughout the primary season pro-
large chunk of it came after Sarah Palin’s accep- pelled Obama to the Democratic nomination. The
tance speech at the Republican National Con- use of text messages to reach younger voters was a
vention (RNC), where she disparaged Obama’s key component of Obama’s strategy in Iowa.
206 Campaigns, Presidential (2008)

change. Digg, Eventful, Faithbase, MyBatanga,


and AsianAve all had an Obama presence. Obama
was dubbed the Social Networking King by the
Washington Post. Facebook pages like “One Mil-
lion Strong for Barack” and “Students for Barack
Obama” met potential voters where they were
already spending their time.
In September 2007, then-candidate Obama
went on the business networking site LinkedIn
to connect with white-collar voters. He asked a
discussion question: “How can the next presi-
dent help small business and entrepreneurs to
survive?” It received 135 answers by the next
morning. Obama and Republican candidate
Rudy Giuliani were the first candidates to have
profiles on LinkedIn. Obama was the first to have
a LinkedIn group.
The Obama campaign collected voter contact
information at its thousands of events by asking
Barack Obama’s Facebook fan page had more than 2.5 million attendees to send a text message to 62262 (the
fans in 2008. Many secondary group Facebook pages were numeral spells the word Obama on a phone).
created and had thousands of followers, including “One Million Sometimes, they were asked to send the word
Strong for Barack” and “Students for Barack Obama.” HOPE or to send their names, zip codes, and com-
ments during debates. Scott Goldstein ran the text
messaging operation. At a campaign event with
Obama and Oprah Winfrey in Columbia, South
Team Obama used YouTube to post many ads Carolina, the crowd was asked to text “S.C.” to
that reached voters for free. It was estimated that 62262. In the following weeks, the people who
the campaign’s official materials were viewed for responded were sent text messages asking them to
a total of 14.5 million hours online for free. It make phone calls or volunteer to urge people to
would take $47 million to buy that much time in vote in the January 26 primary. Obama won the
broadcast television advertisements. South Carolina primary by 28 points over Hillary
Kate Albright-Hanna ran Obama’s video team. Clinton. In exchange for some personal informa-
She left CNN to work on the campaign, led a team tion, people were placed on the campaign mailing
that shot more than 2,000 hours of footage from list. Those folks then got campaign updates and
Obama campaign events, and uploaded 1,100 reminders. They were the first to learn through
videos on Obama’s YouTube channel. Obama’s text message that Obama selected Delaware Sena-
videos were viewed nearly 52 million times, com- tor Joe Biden as his running mate.
pared to 9.5 million for McCain’s online videos. The night Obama accepted the Democratic
The Obama campaign videos also had a “Con- nomination at Invesco Field in Denver, of the
tribute” button conveniently located on the chan- more than 75,000 people in the audience, more
nel that enabled supporters to donate to the cam- than 30,000 used phones to text and join the
paign using Google Checkout. program. Supporters received an average of five
Obama’s campaign could reach different to 20 text messages per month depending on
demographics through targeted social network- their demographics and where they lived. They
ing sites. It communicated with Baby Boomers received three reminders on Election Day to go
on Eons.com, Latinos on MiGente.com, African out and vote.
Americans on BlackPlanet.com, and gays and les- According to Obama 2008 Campaign Direc-
bians on GLEE.com. Flickr and YouTube were tor David Plouffe, a goal of the campaign was
used to spread the campaign’s themes of hope and to expand the size of the electorate by reaching
Campaigns, Presidential (2008) 207

first-time voters among minorities and youths. were far surpassed on Facebook, Myspace, Twit-
They collected 13 million e-mail addresses, sent ter, and YouTube, as noted above, by the Obama
more than 7,000 differently targeted messages, campaign.
and more than 1 billion total e-mails throughout Vice presidential nominee and Alaska Gover-
the campaign to reach these voters. By compari- nor Sarah Palin was a spirited user of social media.
son, Democratic nominee John Kerry’s campaign But, the campaign needed her to moderate her use
had 3 million e-mail addresses in 2004, and How- so that she did not overshadow the Republican
ard Dean’s had 600,000. nominee. A rumor about Palin and her family
When Obama was attacked for his relationship emerged through social media and required the
to Reverend Jeremiah Wright, who made con- campaign to respond. The rumor was that Pal-
troversial comments from the pulpit, he gave a in’s daughter Bristol was actually the mother of
speech on race relations in Philadelphia on March Palin’s 4-month-old baby. The McCain campaign
18, 2008. The speech was eventually watched by needed to respond to correct the record that the
more than 7 million people on YouTube. 4-month old was indeed the governor’s baby. In
Another role that changed in the 2008 cam- the meantime, it became known that Bristol, an
paign was that citizens could use the Internet unmarried teen, was pregnant.
to instantly fact-check statements by politicians
and share their findings quickly and widely. One Supporters Weigh In
example was when vice presidential candidate One common perception of the major party cam-
Sarah Palin said she opposed the so-called bridge paigns is that Republicans tend to run top-down
to nowhere in Alaska. But, when records showed organizations with more closely controlled chan-
that she previously supported it and the news nels of information. Democrats are more com-
spread around on social media sites, then the fortable ceding control to people outside of the
McCain campaign stopped saying it. formal party leadership hierarchy. This enables
On the other hand, offhanded comments by Democrats to be more open to outside involve-
candidates at seemingly friendly and private ment by supportive groups.
events can be recorded and cause trouble along A comedy network called Barely Political cre-
the campaign trail. Obama made a comment at ated ObamaGirl and released several videos, in
a San Francisco fund-raiser that some people in which Amber Lee Ettinger showed her enthusi-
western Pennsylvania cling to their guns and reli- astic support for Obama. One video released in
gion and see immigrants as different from them. June 2007, called “I Got a Crush on Obama,”
The audio was used by conservative commenta- was viewed more than 10 million times before
tors to stir up opposition to Obama and to show the campaign ended. It became a national sensa-
that he held disdain for heartland, blue-collar tion and gave a lighthearted look at the popular
Americans. While Obama’s Facebook page had obsession with Obama. A sexily dressed Ettinger
musical and pop culture interests that appealed to danced and gushed over the Illinois senator in
the social media generation, complete with short- a pop love song platform (the song was sung
hand language, McCain’s use of social media did by Leah Kauffman). The video was named the
not appeal to young or tech-savvy voters. number three meme of the decade by Newsweek
and the top Web video of the decade by Webby
McCain Campaign Awards. Other videos included “Obama Girl vs.
The McCain campaign had a modest online pres- Giuliani Girl,” “Super Obama Girl,” and “Ralph
ence compared to the Obama campaign. McCain Nader and Obama Girl.” The videos were fea-
did not fully embrace the potential of social media tured on all the major cable networks. Ettinger
in the way that Obama and his supporters did. appeared on Saturday Night Live and was named
McCain had a handful of staff members dedicated the Hottest Girl on the Internet in 2008.
to social media efforts and hired an outside firm Another video unaffiliated with the campaign
to do additional work. They created a network- called “Yes We Can,” complete with powerful
ing site called McCainSpace, but it did not gain music and lyrics established an online anthem for
popularity. McCain’s social network numbers Obama. The song, performed by the musician
208 Campaigns, Presidential (2008)

Will.i.am, was edited to appear like candidate The main sources of Internet-based news infor-
Obama was performing with Will, who echoed mation in 2008 were MSNBC.com (26 percent),
words spoken by Obama in campaign speeches. CNN.com (23 percent), and Yahoo! News (22
Several celebrities made cameo appearances in the percent), followed by Google News (9 percent)
video. It became a theme and rallying cry for sup- and Fox News (9 percent).
porters; it went viral and was viewed by millions. A survey conducted by Complete and released
The “Yes We Can” video captured the enthusi- by Cisco found that 62 percent of respondents reg-
asm of the MTV generation and demonstrated ularly used the Internet as a source of information
the power of the Internet in helping a candidate during the 2008 campaign. Television was cited
appeal to diverse populations. by 82 percent in the survey as a source of politi-
These and other campaign aids on social media cal news. The use of online videos was five times
led Obama critics and the McCain campaign to greater than in 2004, with around 30 percent of
deride Obama for his celebrity status. The attacks registered voters reporting that they viewed vid-
only seemed to help reinforce Obama’s credibil- eos online to follow the 2008 elections, and 75
ity online and his popularity in social media. The percent of those viewers finding that online videos
celebrity ad boomeranged on McCain when one helped them to follow news and events about the
of the celebrities, Paris Hilton, made her own presidential race more closely.
video in which she denounced McCain, while sit- One academic study in the Journal of New
ting in a bikini, and announced her own tongue- Communications Research found that the cov-
in-check run for president. erage of the main candidates in social media
Obama had a chance meeting with Samuel was more equal in volume compared to tradi-
“Joe” Wurzelbacher, “Joe the Plumber,” on the tional media. They found that, from September
campaign trail in Ohio. Obama said he wanted 8 through November 3, Obama was mentioned
to “redistribute the wealth” in a polite disagree- 160,207 times in traditional media, followed by
ment with Wurzelbacher, and the comment was McCain at 143,611, Palin at 84,714, and Biden
caught on camera and went viral. Joe the Plumber at 20,834. In social media sites, McCain was
became a common name for a common person mentioned 275,780 times, followed by Obama
who might be harmed by Obama’s planned eco- at 271,400, Palin with 270,266, and Biden at
nomic policies. Joe the Plumber, who was not 266,523. While there was parity in the num-
actually a licensed plumber, was mentioned in ber of mentions online, this does not provide a
the first debate 23 times by McCain and Obama. measure of whether the coverage was positive or
From there, interest in Joe the Plumber and use of negative or the context of the coverage.
him as a campaign pawn by both sides intensified. The same study found the American economy
was mentioned 204,258 times in traditional
Social Media as Sources of Information media. That far outpaced Iraq at 86,458, Afghani-
A Pew survey released in January 2008 showed stan at 66,774, and Iran at 34,316, with Joe the
that 24 percent of Americans said they regularly Plumber at 8,176. In social media, Iraq was the
learned political information from the Internet. most-mentioned topic at 280,473, then Iran at
That was double the 13 percent who said the 130,015, Afghanistan at 125,650, Joe the Plumber
same thing at a comparable point in 2004 and at 46,178, and the American economy at 16,191.
three times the 9 percent reporting from 2000.
This was especially noteworthy for young people. Conclusion
Forty-two percent of 18- to 29-year-olds said they Rather than engaging in retail politics and going
regularly learned something about the campaign door-to-door to meet voters, social media allow
form the Internet, up from 20 percent in 2004. candidates to go directly to citizens at a time and
While the percentage of people learning some- place of their choosing and usually in a network
thing about the campaign was down slightly on where they feel comfortable communicating and
local television news and nightly network news, it sharing information.
was at similar levels for cable news networks and The 2008 election has been referred to as the
daily newspapers between 2004 and 2008. Facebook election. It was the first time that all
Campaigns, 2012 209

major congressional and presidential candidates of New Communications Research, v.4/1 (Spring/
used social networking sites to connect to voters. Summer 2009).
Social media sites also made connections with Panagopoulos, Costas. Politicking Online:
traditional media outlets to expand their reach. The Transformation of Election Campaign
Facebook held joint efforts with ABC News for Communications. New Brunswick, NJ: Rutgers
election coverage and political forums. YouTube University Press, 2009.
teamed up with CNN to use video questions from Plouffe, David. The Audacity to Win: The Inside
citizens during one of the presidential debates. Story and Lessons of Barack Obama’s Historic
While it is clear that candidates used social Victory. Waterville, ME: Thorndike Press, 2010.
media to reach voters and rally supporters, what Vargas, Jose Antonio. “Obama’s Wide Web: From
is less certain is what impact they had on the elec- YouTube to Text Messaging, Candidate’s Team
tion results. Though the 2008 Obama campaign is Connects to Voters.” Washington Post (August
heralded as a path breaker for its use of new media 20, 2008).
and social networks, there is no way to know how
many votes that translated into on Election Day.
There are several reasons why Obama won, includ-
ing national fatigue with Republicans after eight
years under George W. Bush, the record amount Campaigns, 2012
of money that Obama raised, and his change mes-
sage that he pushed. Social media aided in politi- Social media were a common and important part
cal socialization efforts as well as in quick and of the 2012 presidential and congressional elec-
relatively inexpensive communication and organi- tions. By 2012 it was an expected part of the
zation. Based on the experience of the 2008 cam- election process for campaigns to launch social
paign and with the rapidly changing pace of tech- media messages and to use their online presence
nology, it was expected that the impact of social as a way to influence voters and traditional and
media in the 2012 campaigns would be profound. cable news coverage. President Barack Obama’s
re-election campaign set the hallmark for the use
Sean D. Foreman of social media in the campaign even as Republi-
Barry University can challenger Mitt Romney’s team did a competi-
tive job in social networking. One of the reasons
See Also: Campaigns, Congressional (2010); cited for Obama winning re-election is the chang-
Campaigns, 2012; Palin Phenomenon; Web 2.0. ing electorate and Obama’s ability to win with
younger voters, and especially women, Hispanics,
Further Readings and Asian Americans. Each of these groups is an
Bullock, David and Brent Leary. Barack Obama’s important social media user demographic cluster,
Social Media Lessons for Business. Murfreesboro, and the Obama election strategy mirrored that
TN: White Bullock Group, 2008. technology use profile.
Carr, David. “How Obama Tapped Into Social One of the most-visited sites, especially during
Networks’ Power.” New York Times (November the last few weeks of the campaign, was the New
9, 2008). http://www.nytimes.com/2008/11/10/ York Times–hosted blog fivethirtyeight.com by
business/media/10carr.html?_r=0 (Accessed Nate Silver. A Nielsen study found that Hispan-
November 2012). ics had higher usage rates of mobile and social
Graber, Doris. Mass Media and American Politics, media than whites, and Hispanics and African
8th ed. Washington, DC: CQ Press, 2009. Americans have adopted Twitter at faster rates
Heilemann, John and Mark Halperin. Game Change: than whites. More than 60 percent of African
Obama and the Clintons, McCain and Palin and American, Asian American, and Hispanic women
the Race of a Lifetime. New York: HarperCollins, have smartphones, compared to 33 percent of
2010. white women. People were clearly connected
Metzgar, Emily and Albert Maruggi. “Social Media and getting more information than ever about
and the 2008 U.S. Presidential Election.” Journal candidates and campaigns. It is unclear whether
210 Campaigns, 2012

that translated into votes or not. It certainly does instant feedback, fact-checking, and conversation
allow the campaigns to reinforce their messages while events like conventions and debates were
and give more reminders about voting at minimal happening. Twitter, like many social networks,
cost. For example, in Virginia, the Obama cam- has the potential to bring both positive and nega-
paign was texting volunteers to make sure voters tive attention to a statement or situation.
stayed in line even after polls closed. One of the highlights—or lowlights—of the
A comment by Romney was secretly captured instant communication tool was during the
on video at a fund-raiser in Boca Raton, Florida. Republican National Convention (RNC). Leg-
Romney said, “There are 47 percent of the people endary actor Clint Eastwood gave a speech prior
who will vote for the president no matter what. All to the introduction of nominee Mitt Romney.
right, there are 47 percent who are with him, who Eastwood, beloved for many tough-guy movie
are dependent upon government, who believe that roles, spoke to an empty chair that he addressed
they are victims, who believe the government has as having President Obama seated in it.
a responsibility to care for them, who believe that Tweets were fast and furious during the actual
they are entitled to health care, to food, to hous- presentation. Then, after Eastwood left the stage
ing, to you name it—that’s an entitlement.” The an Invisible Obama account was established on
47 percent comment was unearthed by Mother Twitter. It immediately had 6,000 followers. The
Jones, a liberal magazine, and went viral. hashtag #Eastwooding was prevalent on the site.
After the campaign, the country faced a so- Around 9:30 p.m., Obama tweeted a photo of
called fiscal cliff as tax breaks were set to expire, himself in the Oval Office with the caption, “This
and a debt ceiling limit vote was required. Presi- seat’s taken.”
dent Obama called on citizens to tweet members The following week, Obama’s Democratic
of Congress to urge them to act on the expiring National Convention (DNC) speech witnessed
tax cuts and debt ceiling. record levels of Twitter activity. There were 4
In 2012, Obama had more than 1.7 million
friends on Myspace. He had more than 29 million
“likes” on Facebook, while Romney had nearly
8 million. On Instagram, Obama had 1.4 million
followers, while Romney had 38,000 people with
which to share campaign photos. For music afi-
cionados, on Spotify, 14,654 subscribers could
keep tabs on Obama’s musical interests, while
402 knew Romney’s favorite songs.
The YouTube channel BarackObamadotcom
had more than 290,000 subscribers and more
than 288 million video views in December 2012.
Romney’s YouTube channel had almost 29,000
followers and 33.6 million video views.
Pinterest sites by the candidate’s wives gen-
erated attention around some of their favorite
activities. Michelle Obama showed pictures from
events around the White House and had 42,000
followers. Ann Romney had 12,000 followers
interested in her recipes and family.
Obama had more than 20 million Twitter fol-
lowers compared to 1.2 million for Romney. After Clint Eastwood spoke to an empty chair during a speech at
the Republican National Convention, President Barack Obama
Twitter tweeted a photo of himself in the Oval Office to his more than 20
Twitter emerged as the real-time tool of choice for million Twitter followers. Obama’s 2012 re-election campaign set
candidates and campaigns in 2012. It allowed for a standard for using social media in political campaigning.
Campaigns, 2012 211

million tweets during the last day of the DNC, by Ryan that the Obama administration was
more than all three days combined of the RNC. “caught with their hand in the cookie jar turning
In the moments after Obama’s speech accept- Medicare into a piggy bank for Obamacare” gar-
ing renomination, there were more than 52,000 nered 55,540 tweets per minute. The moderator,
tweets per minute. There was no comprehensive ABC News’ Martha Raddatz, was also tweeted
report of how many tweets were positive or nega- about her performance, and her Twitter following
tive, but it is clear that the president generated increased from 6,000 to more than 20,000 during
online chatter. the debate.
The first presidential debate on October 3 Obama (@barackobama) became the third
between Obama and Romney had a memorable person and the first politician to reach 10 mil-
social media moment and surpassed the DNC as lion Twitter followers. (The first two were Lady
the most tweeted-about event in history. While Gaga and Justin Bieber.) Obama joined Twitter
describing what spending programs Romney on March 5, 2007. It took four years, six months,
would cut, he singled out the subsidy to the Pub- and five days to reach the 10 million mark.
lic Broadcasting Service (PBS). Romney said, “I Obama hosted a Twitter town hall meeting on
like PBS. I love Big Bird.” But, Romney said he July 6, 2011. It focused on education and eco-
would not borrow money from China to pay nomic issues that appeal to young people, such
for it. Immediately, Big Bird was tweeted 17,000 as student loan interest rates. Obama, who is
times per minute, and PBS was in 10,000 tweets known to be verbose, had trouble staying within
per minute. Big Bird became the fourth-most- the 140-character limit at times.
searched term that night. The comment led to On Election Day, the Obama campaign pro-
several fake Twitter addresses being created, and moted #VoteObama, and it was listed as the top
#SaveBigBird was a topic trending worldwide. worldwide trend. When clicked, the message read,
Other blog posts and Tumblr images from Ses- “Election Day is here. Stand with Barack and con-
ame Street followed. There were more than 10.3 firm your voting location now: OFA.BO/k3Qny
million tweets about the first debate, more than #VoteObama.” The link sent people to a tool to
the 9.5 million from the DNC, and 4 million dur- help them figure out where to vote.
ing the RNC, according to Twitter. As for percep- A picture of President Obama and his wife
tions of the results, 25 percent of relevant tweets Michelle hugging after he won re-election became
said Obama looked “rusty,” while 22 percent said the most-tweeted photo of all time, with more
that Romney was “on his game.” The conven- than 500,000 retweets. One estimate showed
tional wisdom nationally was that Romney had that 90 percent of senators and House members
a better debate performance. Yet, the thoughts on had Twitter accounts as well as 42 governors and
the candidates’ performances were not followed more than 35 world leaders. Democrats success-
by changes in attitudes on social media about fully took their message online, while Republi-
their policy positions. Romney gained respect for cans appeared to rely more on television adver-
his debate performance but did not earn notice- tisements to reach mainstream voters.
able support for his campaign in return.
The vice presidential debate on October 11 Primaries
between Joe Biden and Paul Ryan drew 4 mil- Early in the cycle, as around 10 contenders geared
lion tweets. The most tweeted-about moment was up to compete for the chance to challenge Obama,
when Biden sarcastically asked, “Oh, now you are questions arose about the ability of Republican
Jack Kennedy?” after Ryan tried to use the former candidates to have successful social media strat-
president as an example of when tax rates were egies. Newt Gingrich had an early start on his
lowered and economic growth increased. The competitors, having assembled a base of follow-
reference to Jack (John F.) Kennedy immediately ers for his organizations American Solutions and
brought to mind the infamous line that Lloyd Winning the Future. Gingrich, who announced his
Bentsen used on then–Vice President Dan Quayle campaign on Twitter, had 1.3 million Twitter fol-
in a 1988 debate. There were 58,275 tweets per lowers in late 2011, many times more than all of
minute after Biden’s Kennedy comment. A line the rest of the Republican challengers combined.
212 Campaigns, 2012

A story broke that about 80 percent of his fol- Obama, they found the people most likely to
lowers were fake either from inactive or dummy respond were females aged 40 to 49 on the West
accounts, paid for by the Gingrich campaign. Coast. They sought someone with similar appeal
Mitt Romney had about 1.15 million Face- on the East Coast, and rather than find a hand-
book fans in late 2011, prior to the Republican some, male movie star, they enlisted actress Sarah
primary and caucus season. Still, Romney’s Klout Jessica Parker. The fund-raising appeals were also
score, a measure of online influence, was at 75, varied to try to attack different demographics.
while Herman Cain’s was at 80 and President Some were focused on Parker and her starring
Obama’s was 88. role in Sex in the City. Other messages pointed
Herman Cain made a big splash as a Tea Party- out that Vogue editor Anna Wintour would be
supported candidate running for the Republican present. Still others highlighted a private Mariah
primary. A YouTube video with his chief of staff, Carey concert after the dinner.
Mark Block, went viral and gained attention for Other efforts to microtarget include the Obama
the campaign. Block spoke supportively about campaign sending a fund-raising appeal to sup-
Cain, took a long drag from a cigarette, and porters but with several variations. One such
blew smoke toward the camera. Cain, a former mailing included at least six slight varieties in
restaurant business executive, then appeared the same message, varying the amount of money
on the screen with a wide grin without say- asked for, the subject line, and the general appeal
ing a word. The video had 1.3 million views in of the message.
less than a week and inspired several parodies. The Obama campaign sliced the electorate into
Cain’s Twitter handle emphasized his personality manageable pieces with very specialized interests.
@THEHermanCain. One constituency was dog lovers. The campaign
Michele Bachmann, a Minnesota congress- ran pro-Obama Internet ads featuring Bo, the
woman and Tea Party favorite, took to social First Family’s Portuguese Water Dog. The ads
media to get her message out. In one Facebook urged voters to “Bark for Barack” and to donate
comment, she jabbed one of her opponents: “Imi- to the campaign. There were Pet Lovers for
tation is the sincerest form of flattery; thank you Obama pages on Facebook, Pinterest, and other
Governor Perry for using my ideas for your tax social media sites with pictures of the president
plan.” The posting generated 931 comments. and Bo. Supporters were also encouraged to share
Governor Rick Perry of Texas became the pictures of themselves and their pets.
object of online ridicule after a gaffe made in a The campaign also had pet-themed products
Republican debate. Perry said he would abolish for sale on the Web site. Other goods targeted for
three federal cabinet departments and then could segmented groups included Latinos, nurses, and
not remember the third one. young mothers, with a Babies for Obama outfit.
Digital citizens got a different glimpse of Rom- Obama for America and the Democratic Party
ney in his online profile than what they might have released an iPhone app to allow campaign volun-
seen in the debates and speeches. He listed “likes” teers to find registered Democrats in their neigh-
for Modern Family, American Idol, Star Wars, borhoods. Targeted addresses showed the names,
waterskiing, and horseback riding with his wife. ages, genders, and party affiliations of voters liv-
ing there. While it raised some privacy concerns,
Obama Campaign the data was public information that is com-
The Obama campaign already had a massive monly used by campaigns. It is generally housed
amount of social media data and contacts from in campaign offices and passed out on paper. This
the 2008 campaign and from his first term in app allowed volunteers to access the information
office. One goal was the win back people who had without visiting campaign headquarters.
unsubscribed from the 2008 e-mail lists. Another
was to microtarget voters based on their interests Romney Campaign
or personal appeals to their favorite celebrities. Romney’s campaign did a good job of getting
When the campaign offered a chance for donors on various social media sites and trying to reach
to win dinner with George Clooney and President potential voters. Romney launched his presidential
Campaigns, Virtual 213

bid in June 2011. The campaign claimed to have machine and fixed the error. The video gained
had 3.25 million visitors to MittRomney.com by more than 10 million views, several hundred
January 2012. thousand of them on Election Day. There were
The Romney campaign used a company called also video reports of machines making the oppo-
ShareThis to target people who spent time on the site error in other states, when a voter tried to
official Web site and to track them around the cast a vote for Romney but the machine read it
Internet. Users would then get links to learn more as a vote for Obama. These individual, isolated
or to donate to the Romney campaign. The strat- instances fueled Internet stories that each side
egy was used to identify people who were inter- had officials trying to rig the vote in their favor.
ested in the Republican candidate, just like those However, there were not widespread or system-
used to find potential customers for a variety of atic glitches.
consumer products.
Both parties and presidential campaigns used Conclusion
microtargeted ads based on Internet searches. The use of social media to promote one’s candi-
Microsoft and Yahoo! sold information to cam- dacy was not enough. They also needed to be used
paigns to allow them to tailor ads. Google and to organize and encourage people to act. With the
Facebook representatives said that they were not profound role of social media in the 2008 and
using this political matching service. 2012 campaigns, observers were left to imagine
One woman reported that, while she was listen- what new platforms would come to transform the
ing to music on Pandora, an ad to assist the Rom- political scene in 2016.
ney campaign appeared on her iPhone screen.
The ad said, “To help Mitt Romney become the Sean D. Foreman
next president, Romney for President, Inc. would Barry University
like to use your e-mail address—tap OK to let
Pandora share this info.” It had boxes for “No See Also: Bachmann, Michele; Campaigns,
Thanks” and “OK” on the screen. The woman, Congressional (2010); Campaigns, Presidential (2008);
who was listening to a Garth Brooks song when Microtargeting, Ryan, Paul; Tea Party Movement.
the pop-up appeared, took a screen shot and
posted it on Twitter with the comment “#fail.” It Further Readings
was unclear if the woman received the ad because Issenberg, Sasha. The Victory Lab: The Secret Science
she lived in battleground state North Carolina or of Winning Campaigns. New York: Crown, 2012.
because of the type of music. Schoenberg, Shira. “Social Media Open New Chapter
in 2012 Campaign.” Pew Internet (November
New Concerns 4, 2011). http://www.pewinternet.org/Media
An issue that arose in this election was what -Mentions/2011/Social-media-open-new-chapter
could happen to voters who took pictures of their -in-2012-campaign.aspx (Accessed January 2013).
ballots and posted them on Instagram or another Silver, Nate. The Signal and the Noise: Why So Many
site. Many states have laws making it illegal to Predictions Fail but Some Don’t. New York:
show one’s marked ballot to someone else. State Penguin, 2012.
laws vary across the nation on election proce-
dures and penalties for violations. Laws vary
from potentially having these ballots invalidated
and the votes not counting to fines and imprison-
ment or both. Campaigns, Virtual
One person made a video of what he or she
described as an attempt to vote on a faulty Virtual campaigns are promotional and market-
machine. A user named “centralPAvote” showed ing campaigns based upon new information and
how he or she tried to cast a vote for Obama, but communication technologies (ICTs). Campaigns
the machine kept registering for Romney. The can be understood as a series of communicative
voter then told officials, who recalibrated the activities in a set time period arranged by defined
214 Campaigns, Virtual

strategies based on the targeted audience. Tech- detailed and customized targeting of audience,
nological innovations and changes in the media and disengaging from mainstream media. How-
and political culture have led to a modernization ever, it should be mentioned that virtual cam-
of political electoral campaigning. Political actors paigning, in many cases, functions in conjunction
around the world adopted a wide array of Inter- with traditional campaigning.
net-based communication tools and embarked on Although the use of Internet technology in
virtual campaigning strategies. From the U.S. gen- political campaigning is not new, its first uses
eral election in 1996, when both major and minor were simplistic. Political Web sites were con-
party presidential candidates had Web sites, to fined to candidates’ biographies and speeches,
Howard Dean’s innovative use of the Internet for campaign news, and position papers. The sites
fund-raising and mobilization in 2004 and Barack were not sophisticated and were less interactive.
Obama’s extensive and effective use of the Web in With advances in Web-based campaigning, politi-
the U.S. general elections in 2008 and 2012, poli- cal actors and their campaign consultants have
ticians have increasingly sought to capitalize on novel and creative ways to contact and commu-
the opportunities offered by ICTs. nicate with their public. E-mails, blogs, online
chats, bulletin boards, newsgroups, interactive
Postmodern Campaigning Web sites, instant messaging, and social networks
Internet technology has permeated the political have ensured interactivity, and in some cases have
process as political actors in both developed and engaged participants in a synchronous exchange
developing democracies exploit new communica- conversation environment.
tion tools and utilize social networking such as Web message boards can be thought of as
Facebook and Twitter to achieve more efficient a hybrid between group e-mail lists and news-
campaigns. Pippa Norris characterized this phase groups. Similarly, with e-mail lists, Web message
of political campaigning as postmodern cam- boards promote complicity and community build-
paigning, and Jay Blumler and Dennis Kavanagh ing through interaction among the participants.
have termed the media environment of postmod- Entry into this group of participants and viewing
ern campaigning the “Third Age of Political Com- exchanges are determined by specific membership
munication.” Virtual campaigning can sometimes rules. Web message boards usually lend them-
be the one and only communication tool, as was selves to dynamic conversation on topics that
the case in Poland in 2011. As a result of new involve relatively short responses.
laws that prohibited the use of traditional meth- The 2008 and 2012 U.S. presidential cam-
ods of promotion (such as billboards or television paigns were examples of a creative and exten-
advertisements), political parties in Poland had to sive use of new technologies such as Facebook,
focus on the Internet for their 2011 parliamentary YouTube, Twitter, and Myspace, as well as Ning,
electoral campaigns. Friendfeed, LinkedIn, and Google+. The Barack
Nevertheless, virtual campaigns still share the Obama campaign in 2008 created its own social
same goals as traditional campaigns. One differ- networking site, My.BarackObama.com (MyBO),
ence is that they can now exploit the multimedia and the John McCain campaign followed with
capacities of the Web. Campaigns are fundamen- McCainSpace. Both MyBO and McCainSpace
tally about contacting and communicating with allowed individuals to create their own profiles,
voters and targeted audiences, mobilizing the interact with others, donate funds, join groups,
electorate, gaining supporters, and promoting the and arrange events. The Obama campaign took
candidate, the party, or the platform. The ulti- things even further and used the site to target vot-
mate goal of any political campaign is to persuade ers and to organize its get-out-the-vote efforts.
the electorate to vote for a particular candidate Moreover, virtual campaigns can include the
and party. What makes the use of ICTs important use of smartphone and mobile applications to
in political campaigning is that it has changed create buzz. New tools include both iPhone and
the pattern of political communication with new Android applications and short messaging service
methods for generating content, enabling interac- (SMS, or text). With a mobile app, one can have
tivity, using sophisticated promotional tools and iconic placement on a person’s phone and can
Campaigns, Virtual 215

also create app alerts. Mobile applications run have photo galleries, video clips that cover events
faster and create one-on-one messages directly to and speeches (sometimes available through live
the user. Furthermore, iPhone and Android appli- streaming), Really Simple Syndication (RSS)
cations provide data on millions of voters and feeds, and in some cases, online structures that
powerful analytics to campaign workers. invite voters to create their own campaign mate-
The dissemination and gathering of political rial. Applications, such as the RSS, provide users
information is crucially important in any political with real-time information.
campaign. The ICTs allow users to find a lot of They also offer visitors the opportunity to
information in multiple ways. Political Web sites download campaign paraphernalia such as elec-
provide a variety of data and sources from the tronic bumper stickers, ringtones, buttons, desk-
process of the political and electoral system to a top wallpapers, and graphics (e.g., party logos, or
calendar of campaign events, actions, and ways posters). Moreover, YouTube, Google’s popular
to participate. Furthermore, Web message boards, user-generated online video-sharing service, has
forums, chats, and social networking provide a seriously affected online campaigning. YouTube
communication platform for the exchange of enables political campaigners to upload a practi-
ideas and information. This bottom-up interac- cally unlimited amount of filmed materials eas-
tion allows the participants to comment on the ily, at no cost, and without third-party mediation.
party’s activities and provide suggestions. The The site, due to its popularity, facilitates high
opinions that are expressed in these communica- rates of exposure. The broad and successful use
tion activities along with the users’ credentials of Web 2.0 applications by Barack Obama set
that are registered in the candidates’ sites are the example for other politicians too. In the 2009
valuable data for the political actors. elections for the 18th Knesset (Israeli Parliament),
22 of the 33 parties that competed had channels
Engaging Voters on YouTube, while there was a total of nearly
In addition, virtual campaigns have also been 1,000 videos uploaded by these parties.
very effective in mobilizing voters and enhancing Virtual campaigning has enriched the tra-
people’s engagement in campaigns. Being among ditional fund-raising mechanisms of politics.
the most popular politicians in Facebook, Barak Online structures encourage voters’ financial con-
Obama had registered 32,313,965 friends by tributions to parties or candidates. In addition to
Election Day in 2012. The Obama virtual cam- the most usual link “Donate,” many Web sites
paigning strategy became a dominant mobilizing provided alternative choices such as “Sponsor a
political force. Indicatively, the following are some Media Ad.” Among the best-known and most
interesting figures for Barack Obama’s campaign successful examples of Internet-based fund-raising
as of his Election Day 2012: 22,112,160 Twitter and grassroots organizing is Howard Dean’s cam-
followers of @barackobama, 2,304,851 Google+ paign for the 2004 U.S. Democratic presidential
followers, 2.2 million volunteers, and 382,000 nomination. Dean pioneered in Web fund-raising
blog posts using the phrase “Voting for Obama” by raising $27 million in total by online contri-
between September 1 and November 4, 2012, butions during his campaign. His innovative use
according to Google search. Obama allowed and of Meetup.com in order to organize thousands
encouraged supporters to participate by posting of offline gatherings brought together nearly
videos, photos, and testimonials. Online struc- 200,000 supporters. The Obama campaign built
tures in virtual campaigning enable individuals on this tactic, and in the 2012 electoral campaign,
to mobilize other potential voters, participate in he raised $504 million online.
creating their own campaign material, and recruit
users as campaign volunteers. By responding to Challenges
followers in the social media, a candidate adds a Undoubtedly, Internet-based technology has
human touch to the campaign and can more easily brought forth new challenges for the political
turn digital followers into real-world volunteers. communication terrain. The effects of ICTs on
Web 2.0 also offered a very rich terrain for political campaigning are at the epicenter of an
promotional campaigning. Modern Web sites ongoing debate in political science. There are
216 Campaigns, Virtual

three main schools of thought: cyber optimists, Web campaigns with clearly defined demands have
cyber skeptics, and the reinforcement theorists or also included e-petitioning. E-petitioning is a very
cyber pessimists. popular form of online political participation.
Cyber optimists, or mobilization theorists, Nonetheless, the role of e-petitioning in political
constitute the optimistic strand in literature on and social Web campaigns has bolstered an ongo-
computer-mediated communication. They sup- ing discussion around its potentials and pitfalls.
port that ICTs empower democracy by foster- New technology can increase exposure to a wider
ing greater participation, encouraging political audience and provide new methods for member-
conversation, improving interactive information ship. The term cyberactivism is used to describe
sharing, and reducing costs. Political communica- the use of advanced information and communi-
tion online is fast, easy, and inexpensive. On the cation technologies for campaigns. Greenpeace,
other hand, cyber skeptics believe that the Inter- among other organizations, has used cyberactiv-
net has been overestimated as a medium for acti- ism extensively, which has helped it revolutionize
vating the citizenry and that it only supplements the way it runs its campaigns.
traditional political communication tactics, from There are numerous examples of social groups
which it differs only slightly. Finally, reinforcement that have used social media not only to organize
theorists or, cyber pessimists, doubt the Internet’s but to make their voices heard. Social media and
potential to increase political participation and Facebook, in particular, have been instrumental
to provide a new repertoire of collective action. in the creation, organization, and promotion of
Their argument is highly influenced by their belief the Spanish movement Indignados, which pro-
that the Internet aggravates de facto differences in tested against austerity measures. The same orga-
political participation. For them, new technolo- nizational and campaigning model built around
gies reinforce deeper divisions between the “info- network communication was adopted by simi-
rich” and the “info-poor.” lar movements like Occupy Wall Street and the
Despite differing opinions on the impact of Greek Indignant. Virtual campaign practices
ICTs in political communication and politics, enable these movements to mobilize online and
the infusion of new technologies in campaign- offline rallies, attract worldwide attention, and
ing techniques is an indisputable fact. Virtual gain broader public support. The Internet envi-
campaigning benefits such as being lower in cost, ronment is their battleground and ultimately their
eliminating geographical boundaries, and allow- political weapon.
ing an independence of media interests, and new, On the whole, virtual campaigns have heralded
sophisticated methods of promotion and com- a new era in political campaigning by embracing
munication have proved invaluable. Apart from ICTs. Internet-based communication tools are
political parties and politicians, virtual campaigns either used on their own or are embedded in tra-
have been deployed by other nonstate actors like ditional marketing strategies. Virtual campaign-
nongovernmental organizations (NGOs), ethnic ing has led to a much more sophisticated politi-
communities, trade unions, lobby groups, interest cal marketing approach. Though there is much
groups, and protesters. research to be done on their impact, efficiency,
Nonstate and other civil society actors make and drawbacks, virtual campaigns have estab-
use of the aforementioned campaigning tools to lished their ubiquitous presence. The two-way
raise public awareness of and put pressure on flow of communication, the control over content
particular policies or political decision makers. production, the low cost, and the extensive expo-
Along with these action campaigns, many solidar- sure are only some of the benefits that the new
ity campaigns exist in support of moral and social technologies offer users. The masterful utiliza-
issues like social justice or human rights. These tion of these new technologies by U.S. politicians
actors use the advantages of ICTs to enhance their could not help but be noticed by political actors
campaigns and render them more effective. They around the world.
can provide large amounts of information on
their Web sites and can also create and encourage Anastasia Veneti
online participatory forms of interaction. Many University of Athens
Canada 217

See Also: Activists and Activism, Digital; to making grassroots politics both visible and
Campaigns, Digital; Campaigns, 2012; effective.
Communication; Facebook; International Examples
of Political Parties and Social Media; Obama for Politicians and Political Parties
America iPhone Application; Web 2.0. In Canada, most politicians and political parties
have an established presence on social media,
Further Readings although the type and frequency of use vary
Baringhorst, Sigrid, Veronica Kneip, and Johanna greatly. The political parties currently represented
Niesyto, eds. Political Campaigning on the Web. in the parliament (Bloc Québécois, the Conserva-
New Brunswick, NJ: Transaction, 2009. tive Party of Canada, the Green Party of Canada,
Blumler, Jay and Dennis Kavanagh. “The Third the Liberal Party of Canada, and the New Demo-
Age of Political Communication: Influences and cratic Party) have traditionally relied on Web sites
Features.” Political Communication, v.16 (1999). and blogs to inform their constituencies. Politi-
Lev-On, Azi. “YouTube Usage in Low-Visibility cal parties and politicians have gradually added
Political Campaigns.” Journal of Information Facebook, Twitter, Flickr, or YouTube accounts in
Technology & Politics, v.9/2 (2012). an effort to be present in the new communication
Norris, Pippa. Digital Divide, Civic Engagement, spaces inhabited by Canadians. During elections,
Information Poverty and the Internet Worldwide. the use of social media by politicians and political
Cambridge, UK: Cambridge University Press, parties rises to prominence. While occasionally a
2001. politician’s social media activity becomes news-
Pew Research Center for the People and the Press. worthy outside of election times, such stories tend
“Social Networking and Online Videos Take to have a controversial component and, overall,
Off: Internet’s Broader Role in Campaign 2008.” receive less academic or journalistic attention.
(January 11, 2008). http://people-press.org/reports/ A relatively recent phenomenon, the electoral
display.php3?ReportID=384 (Accessed November use of social networking sites such as Facebook
2012). or Twitter in Canada has been, to a great extent,
Towner, L. Terri and David A. Dulio. “New Media encouraged by the enthusiasm surrounding the
and Political Marketing in the United States: 2012 media coverage of Barack Obama’s 2008 U.S.
and Beyond.” Journal of Political Marketing, presidential campaign. Yet, the role of such sites
v.11/1–2 (2012). during the Canadian federal elections held the
same year remained limited: parties relied on the
more established official Web sites and blogs. As
parties and specific politicians started to experi-
ment with Facebook or YouTube, the latter
Canada were mostly used in a static way, merely to pres-
ent information on the electoral campaign or to
Social media have become an increasing pres- announce specific news. Social networking pro-
ence in the everyday lives of Canadians. Yet, in files were rarely used to engage with voters, while
spite of an online presence consisting of Web politicians’ profiles were rarely updated.
sites and blogs, politicians and political par- On the other hand, political parties relied on the
ties have generally lagged behind in making use use of online videos for electoral purposes, creat-
of social media. Overall, they still regard these ing and posting content that occasionally became
Web sites as means of disseminating information viral. Further studies on this use are warranted, as
rather than spaces where they could engage citi- anecdotal evidence suggests that negative ads and
zens in real discussions. Citizens have also relied attack videos were also the most widely seen and
on social media to respond to or resist exist- shared videos. For instance, the “Pooping Puf-
ing political configurations. As several cases of fin” video circulated by the Conservative Party
unexpected citizen mobilization through Face- depicted a bird pooping on the shoulder of the
book and Twitter have gained notoriety, social Liberal Party leader; the video backfired, the Con-
media became increasingly imagined as crucial servatives apologized, and subsequently removed
218 Canada

the video. Overall, the use of such videos remains answering the tweets and posts left by citizens
a campaign strategy of praising leaders or attack- on his social networking accounts, as well as his
ing opponents, inviting little feedback or engage- informal and funny YouTube self-presentations,
ment from citizens. were seen as succeeding in mobilizing previously
For political communication scholar David apathetic constituencies, particularly youth. While
Taras, social media made a proper debut in the these elections were indeed marked by a signifi-
context of Canadian electoral politics with the cantly high voter turnout, the latter cannot be
2011 federal elections. These elections were explained simply by reference to social media use.
marked by an unrestrained enthusiasm for the Nevertheless, the media coverage of these elec-
potential role of Facebook and Twitter (and to tions brought to light various aspects of social
a lesser extent, YouTube and Flickr) in bring- media use for electoral purposes. First, effective
ing politicians and voters closer. However, Taras use of social media requires that politicians tap
remains skeptical, arguing that while the effec- into the specific interactional dimension of these
tiveness of social media is difficult to assess, in all sites. Thus, politicians are expected to not simply
probability, electoral uses of social media remain use social media as a means of self-promotion or
the fiefdom of political junkies. dissemination of campaign platforms, but rather
For example, Twitter can be understood as as a means of entering into a dialogue with citi-
an online space where journalists, politicians, zens. Second, by becoming part of this dialogue,
and interested citizens interact with each other. politicians can no longer control their own rep-
However, Taras suggests that in the context of resentation; tweets will be retweeted, Facebook
the 2011 federal elections, this space was largely posts will be shared and, in the process, their
dominated by a small number of journalists and message can be altered or reappropriated. How-
leading campaign tweeters, with the rest of the ever, in the absence of sufficient research on the
followers merely consuming the discussion. Fur- electoral effectiveness of social media, it is impos-
thermore, the number of Canadians active on sible to assess the extent to which social media
Twitter remains rather low. Last, but not least, the will indeed transform relations between citizens
different parties running in these elections have and politicians. More important, the direction of
made strategic choices to invest in specific social this transformation cannot be assumed as either
media (e.g., the New Democrats used Facebook empowering for citizens or necessarily leading to
to share photos and promote upcoming events; a more democratic political setting.
both the New Democrats and the Green Party
created an iPhone application providing updates Citizens
about the campaign), but there does not seem to To a great extent, Canadians have started using
be a general consensus over what works or what social media to engage with politics long before
should be included in the campaign strategy. In their politicians, political governments, or govern-
general, the use of social media was neither inno- ments did. However, not all Canadians have Inter-
vative nor sufficient by itself to explain the results net access or use social networking sites, although
of the elections. the adoption of the latter has grown across all age
Where the political use of social media during groups. Even when it comes to those Canadians
federal elections has so far been modeled after who are online, the extent of use of social media
the broadcasting model of communication (i.e., for political purposes remains hard to assess, as
one to many), the 2010 municipal elections in seemingly innocuous actions such as liking a poli-
Calgary, Alberta, have been touted as the “right” tician’s Facebook status can constitute both an act
way of using social media in electoral politics. of passive consumption of, or active engagement
Naheed Nenshi’s reliance on Facebook, Twitter, with, politics.
and YouTube to connect to voters has been seen In the early 2000s, blogs were the most vis-
by journalists and political commentators as an ible form of social media used for political dis-
important factor in his unexpected rise from a cussions. Partisan blogs were often maintained
relatively unknown politician to Calgary’s mayor. by politically active citizens. These blogs were
An independent candidate, Nenshi’s insistence on clustered into blogrolls (i.e., lists of blogs), based
Canada 219

on political affinities. Although such blogs did


engage each other in discussions over platforms
and issues, becoming a deliberative space within
a democratic setting, this deliberation remained
dominated by a few bloggers and segregated along
ideological lines. Furthermore, the impact of such
blogs on Canadians at large, or on elections, is
not clear, as empirical studies are largely missing.
Canadian citizens with Internet access often
engage in the creation and maintenance of an
active civic culture by relying on social media. The
political use of the latter varies greatly, from the
creation of online content to disseminating existing
political information or mobilizing citizens around
particular issues. Many federal and provincial gov-
ernment agencies have now incorporated social
media into their daily communication practices; in
most cases, these profiles are controlled in a cen-
tralized manner by strategists and used to broad-
cast information. On rare occasions, governments
try to consult citizens on local issues (with British
Columbia and Alberta often touted as examples
of successful government/citizen interaction). Citi-
zens are also contributing to this dissemination- The 36th mayor of the city of Calgary, Alberta, Canada,
based use of social media: for instance, the popular Naheed Nenshi in October 2010, eight days before the
hashtag #cdnpoli brings together tweets discussing election. Nenshi’s ability to connect with voters on Facebook,
Canadian politics, often recirculating official news. Twitter, and YouTube was seen as an important factor in his
Yet, the extent to which these activities represent a rise from an unknown politician to Calgary’s mayor.
dialogue between citizens, politicians, and govern-
mental institutions, or affect the decision-making
process, remains unclear.
Occasionally, citizens also use social media Canadians and nonprofit organizations, and seek
to engage with politics in innovative ways. In to spur debate, post information, and urge Cana-
the 2011 federal elections, students orchestrated dians to act. In 2007, the Facebook group Fair
“vote mobs” (public gatherings where partici- Copyright for Canada drew attention to the pro-
pants use makeup, clothes, or dancing to attract posed copyright reform, successfully delaying the
attention and encourage voting) and uploaded introduction of new legislation as citizens peti-
them on YouTube. During the same elections, a tioned their representatives and staged protests in
group of artists and citizens from Vancouver cre- public places. In 2010, Canadians Against Pro-
ated and uploaded several YouTube videos mock- roguing Parliament, another group born on Face-
ing the Canadian prime minister and Conservative book, successfully mobilized protesters across
candidate, Stephen Harper. The videos, collected Canada to oppose the prime minister’s decision
under the name “Shit Harper Did,” went viral to temporarily suspend the parliament. More
within hours. Such cases were quickly noticed by recently, a politically energized coalition of uni-
traditional media, who further amplified them. versity students used social media to mount their
Social media have also been used as both mobi- own version of the “Arab Spring” style protest.
lization tools and as repositories of opinion and Such examples speak not only about the affor-
information challenging traditional media cover- dances opened up by social media in terms of
age and official governmental communication. re-engaging with politics and making it “fun,”
Such initiatives can be driven by both individual but also about the emergence of spaces where
220 Candidate Image

the status quo can be both reproduced and chal- Further Readings
lenged. Most mediatized cases of social media use Koop, Royce and Harold J. Jansen. “Political Blogs
by citizens and nonprofits for political purposes and Blogrolls in Canada. Forums for Democratic
challenge the status quo. Yet, authorities are also Deliberation?” Social Science Computer Review,
using social media to monitor citizen activities. In v.27/2 (2009).
the wake of the anti-G20 protests, police scruti- Reilly, Ian. “‘Amusing Ourselves to Death?’ Social
nized social media for signs of civil disobedience, Media, Political Satire, and the 2011 Election.”
while in the aftermath of the 2011 Vancouver Canadian Journal of Communication, v.36/3
riots caused by the defeat of the local hockey (2011).
team, police relied on social media to identify Taras, David and Christopher Waddell. How
individuals engaged in the destruction of public Canadians Communicate IV: Media and Politics.
and private property. Both examples signal the Edmonton, Canada: Athabasca University Press,
need for a careful evaluation of the political affor- 2012.
dances opened up by social media, as these spaces
become monitored by various actors, including
the police, employers, and other citizens. Further-
more, it is not clear to what extent social media
can also be appropriated by extremist or reaction- Candidate Image
ary politics.
Yet, even with this caveat, the use of social Candidate image is a term often used in social
media for political purposes largely speaks to an science literature to describe the cognitive image
ongoing interest in and engagement with poli- a voter has of a candidate. This image is based
tics. It is not easy to assess the effectiveness of upon a number of characteristics largely cat-
this engagement, or to assume that social media egorized as a candidate’s position on issues and
activities automatically transform into protests, personal characteristics. Candidate image is an
petitions, or voting. However, against a prevail- individual construct, in that each person has a
ing view of citizen disengagement from politics, different image of a particular candidate. How-
the political uses of social media bring to light an ever, these individual constructions can be exam-
active Canadian civic culture. Yet, social media ined in aggregate to better understand the over-
are neither the only spaces nor the only reasons all image the voting public has of a particular
for this culture. candidate.
Furthermore, social media open up new spaces Understanding candidate image is important
where citizens can interact among themselves, because research has found that voters make their
or with politicians and official institutions. Such voting decisions based on overall image of a can-
interactions may be issue-driven and short-lived; didate. In general, voters are more likely to vote
their effectiveness depends, to a great extent, on for a candidate for whom they hold a positive
being replicated by a sufficient number of peo- image than one for whom they have a negative
ple. Yet, this interaction is archived and, to some image. Because modern campaigns are candidate-
extent, publicly available. This opens up different focused, as opposed to party-focused, candidates
possibilities and worries, as both citizens and pol- must appeal directly to voters through many dif-
iticians could be monitored and held accountable ferent types of campaign communication, which
on the basis of these archives. has traditionally included television advertise-
ments, debates, and campaign Web sites. Social
Delia Dumitrica media is an increasingly important form of com-
University of Calgary munication within a campaign and one in which
candidates can further define their image with the
See Also: Blogs; Facebook; idlenomore.ca; Influence public. The importance of social media in con-
on Elections; Negative Campaigning; Political Parties; tributing toward candidate image is a relatively
Quebec, Canada 2012 Student Protests; Twitter; new area of study and one with many questions
YouTube. yet to be answered.
Candidate Image 221

History and Research can have a profound influence on overall candi-


Dan Nimmo and Robert Savage’s book Candi- date image.
dates and Their Images (1976) is generally con- To explain how candidate image emerges,
sidered the first major work on candidate image. most studies examine the candidate-voter interac-
Nimmo and Savage claimed that voters, through tions during a campaign. This approach to image
interaction with a candidate’s messages, form a assumes that voters form their own individual
cognitive image of a candidate during a campaign. images of candidates; however, these images are
Since that time, the concept of candidate image formed in relation to messages and events in the
has been taken up by social scientists with the campaign. A campaign provides voters with a
majority of studies being conducted in the fields myriad of messages about a candidate. Those mes-
of political science and communication. Candi- sages serve to form a candidate’s image—the com-
date image is an important concept because it can posite perceptions of a candidate in the mind of a
influence a campaign in many ways. The concept voter. Additionally, candidate images are formed
has largely been studied to determine how can- incrementally over the course of a campaign. For
didate image emerges, the components of image, these reasons, candidates are constantly sending
and how image affects voting behavior. messages to voters and should constantly monitor
Several major conceptual approaches have their public image and the other messages about
emerged in the literature. One approach is themselves being sent to voters.
founded in persuasion literature and sees image One type of message that candidates send to
as something that is projected by the candidate voters is their issue positions—the stance of a can-
in an effort to persuade voters. This approach didate on any given campaign issue. Studies have
places an emphasis on examining the messages shown that voters do not separate candidate issue
sent to voters to understand what kind of image positions and candidate image. Instead, voters
a candidate wishes to project. While it is true that combine issue positions with image perceptions
candidates send messages to voters in a number in an effort to create an overall candidate image
of ways and that these messages do influence that is partially based on issue positions. Thus,
their overall image, voters do not simply accept most candidates are careful and strategic in what
all messages being sent to them. Therefore, information is given to the public on their issue
another approach claims that candidate image is stances. While scholars disagree regarding the
determined primarily by the voter and gives the importance of issue positions on candidate image,
candidate little room to influence the perceptions there is clear evidence that issue positions and
of the voter. candidate image are correlated. Those candidates
While both of these approaches help in under- whose issue positions are favorable for a voter are
standing some of the primary contributing fac- also those candidates with more favorable images
tors toward candidate image—messages from for the voter.
the candidate and the voter—they do not capture Additional research has focused on how much
the dynamic relationship between candidates and emphasis is placed on issue positions versus image
voters. Thus, the most commonly used approach characteristics in overall voting choices, as well as
to studying candidate image combines these two how much an issue position contributes toward
factors and examines the interaction of the mes- overall candidate image. Much of the research in
sages and voter perceptions to examine how the this area was conducted in an age without social
intent of the message is perceived, interpreted, media. The emphasis of the research was on how
and contributes toward candidate image. Much candidates conveyed their messages through tra-
of the research on candidate image has taken this ditional media and the relative weight given to
third, interaction approach. In other words, it is those messages by voters. New research has yet
ultimately the composite image a voters holds to fully take up the question of how social media
that determines voting decisions rather than how changes the way candidates present their issue
that image lines up with the image a candidate has positions to voters and the relative weight given
attempted to communicate to the voters, but the to issue positions compared to image characteris-
messages sent by candidates during a campaign tics via social media.
222 Candidate Image

An important component of candidate image supported candidates who were consistent with
is its temporary nature. An examination of the their own ideologies and preferences in both issue
research on candidate image shows there is a stances and image characteristics. Thus, scholars
loose, common set of “ideal” candidate charac- studying the components of candidate image have
teristics that is relatively stable across campaigns. also included an examination of how voters per-
What is not stable is the relative weight given to ceive a candidate’s issue positions as similar to
an individual characteristic in any given cam- their own.
paign. The voting public and the candidates set As stated previously, research directly attests
the agenda as to what issues and image charac- to the claim that image has an effect on voting
teristics are more salient for a candidate in a par- decisions. It is this effect on voting that indicates
ticular campaign. The candidates are then judged why image is an important part of any campaign.
based on those salient characteristics. Several studies have examined various types of
Candidate image is not a static concept. It is campaign communication to understand how
constantly changing based on new information they influence candidate image. It is important
that a voter receives about a candidate. Campaigns to understand the influence of the various types
can now take many months from start to voting of campaign communication on candidate image
day. During that time, many messages can influ- and also examine how social media is changing
ence a candidate’s image. Most notably, major the influential nature of these traditional types of
campaign events such as candidate debates can campaign communication.
have a profound effect on the image a voter holds
of a candidate. Several studies have examined the Campaign Communication
shift in candidate image surrounding events such Political candidates in the past few decades have
as campaign debates and have found them to be enjoyed the opportunity to reach the public through
influential in changing candidate image. Addition- mass-mediated forms of campaign communica-
ally, during the entirety of a campaign, many slow tion, such as television advertisements, campaign
changes in candidate image can occur. The posi- Web sites, televised debates, and, more recently,
tion of a candidate as an incumbent or challenger social media. Scholars have examined these forms
also has an influence on the candidate’s image. of communication because of the important effects
they may have on candidate image in the minds of
Components voters and the general public.
Although candidate image has been examined by Noted effects on candidate image and voting
a number of scholars, the exact components of behavior have supported the importance of the
candidate image are still being debated. A num- television campaign ad to political candidates and
ber of studies have been conducted in efforts to their campaigns. Further, the public perceives tele-
determine the components of candidate image. vision as a very credible source of information,
Many of the studies have employed scales and historically indicating they are more likely to get
asked respondents to rate candidates on a variety their information about political candidates from
of characteristics. The characteristics of candidate television than from other media sources such
image that are studied are many and varied. Some as newspapers. As a result, television campaign
of the most commonly examined characteristics advertisements play an important role in cam-
of candidate image are: credibility, trustworthi- paigns. The influence of the television advertise-
ness, competence, composure, sociability, physical ment is further seen with the appearance of these
attractiveness, homophily, leadership, strength, ads in the social media. The costly advertisements
honesty, intelligence, activeness, and experience. used to be seen by a limited public on television,
Early research defined image as focusing purely on but now can be seen at any time through the use
a candidate’s personality characteristics, appear- of social media, which further extends the influ-
ance, and behavior. However, an increasing num- ence of this form of campaign communication.
ber of studies have found an association between Research on exposure to television ads typi-
candidate issue positions and candidate image cally indicates positive effects on assessments of
perceptions. Recent research found that voters candidate image, although negative effects have
Candidate Image 223

also been noted. In terms of positive effects, cam- multiple opinions on perceptions of a candidate
paign ads have been found to increase candidate can influence a person while watching a debate.
name recognition as well as improve overall eval- In addition, those who do not watch a debate can
uations of candidate image following exposure still be influenced by the debate through the con-
to the ads. Exposure to political advertising has tinual coverage of the event on social media. The
resulted in higher candidate ratings for character- information gathered about the debate through
istics such as intelligence, strength, dependability, social media can contribute to the image a voter
honesty, and fairness. In terms of negative effects has of a candidate even when the voter was not
on candidate assessment or image, findings typi- exposed to the actual debate. This secondary
cally reflect that exposure to negative advertising exposure is an area that requires further study
produces negative image evaluations of an oppo- to determine the relative weight of the influence
nent. The positive and negative effects are both compared to that of primary exposure.
important findings because both indicate that Since the 1996 U.S. presidential campaign—the
viewing advertisements influences perceptions of first in which both candidates maintained cam-
candidate image and, in turn, candidate image paign Web sites—the prevalence of Web sites as
assessments are considered an important predic- campaign tools has dramatically increased at all
tor of voter decision making. levels of politics. By 2000, candidates running for
While research on campaign advertisements all levels of office in the United States had a cam-
has suggested that ads are an institutionalized paign Web site. The initial value of a Web site is
part of presidential campaigns, campaign debates that it allows a candidate a forum in which to
have also been established as a foundational ele- present an image and message that has not been
ment of U.S. presidential campaigns. Findings reinterpreted by any other source. The Internet
indicate that image evaluations of candidates are has become a widely used vehicle for candidate-
strong determinants in candidate selection and controlled information that is available to voters
that debates provide an opportunity for voters at all times. Voters are increasingly turning to the
to assess and better understand the candidates’ Internet as a source of information about political
personalities and images. While research is not contests and candidates. According to research
overwhelming, much of it indicates that voters conducted by the Pew Internet and American Life
are more likely to gain insight into candidate Project, in 2004, over 37 percent of the U.S. adult
image rather than candidate issue positions dur- population used the Internet to get political infor-
ing debate viewing. These findings indicate just mation. That number dramatically increased in
how important debates can be to a presidential 2008 with 55 percent of the U.S. adult population
candidate’s image due to the length of time that going online to get involved or get information
viewers are exposed to candidates in this type about the election. Even in the 2010 U.S. mid-
of campaign communication compared to other term election, 54 percent of adults went online
types. Increasingly these debates are shown on to get information about the election. There is a
various social media sources in addition to being clear upward trend in the use of the Internet to get
televised. political information.
Recent U.S. presidential campaigns have seen Researchers have found it difficult to exam-
voters interacting with candidates and others via ine the effects of exposure to Web sites on voter
social media during debates. The added impor- evaluations of candidates’ images due to the ever-
tance of an additional medium through which a changing nature of Web sites and the plethora of
voter can experience a debate brings about new information available on one site. The same is
influences on candidate image. The previous true for social media sites where users are often
model of debate watching on television in the pri- saturated with an incredible amount of news, sto-
vacy of one’s home meant there were few outside ries, opinions, photographs, and more during a
influences on a person’s perceptions of the debate short period of time. Regardless of this difficultly
while debate watching. Now, many voters watch in measurement, it is clear that social media have
debates via social media and/or while using social become a primary means for candidates and their
media such as Twitter and Facebook. As a result, campaigns to communicate with voters.
224 Candidates, Political Branding of

When candidates first started using online plat- of 1996.” Communication Monographs, v.67
forms in their campaigns, they were typically used (2000).
as conduits for sending messages and image con- McKinney, Mitchell. S., Elizabeth A. Dudash, and
cepts to voters. Today’s online platforms provide G. Hodgkinson. “Viewer Reactions to the 2000
for much more interactivity, thus increasing the Presidential Debates: Learning Issue and Image
potential for their influence on a candidate’s image Information.” In The Millennium Election:
as the voter interacts with the content. Because Communication in the 2000 Campaign, L. L. Kaid,
social media allow for participation, information et al., eds. Lanham, MD: Rowman & Littlefield,
creation and sharing, and interaction with a com- 2003.
munity, the potential messages that compose a Nimmo, Dan and Robert L. Savage. Candidates and
candidate’s image are multiplied. Their Images: Concepts, Methods, and Findings.
Barack Obama’s 2008 presidential campaign Pacific Palisades, CA: Goodyear, 1976.
was the first major U.S. campaign to make signifi- Pew Research Center. “Politics.” http://pewinternet
cant use of social media platforms. The campaign .org/Topics/Activities-and-Pursuits/Politics.aspx
used Facebook, Myspace, Twitter, and YouTube, (Accessed April 2013).
among others, to communicate with voters and Robertson, Scott, Ravi Vatrapu, and Richard Medina.
create and mobilize communities of like-minded “Off the Wall Political Discourse: Facebook Use in
voters. As a result, almost all U.S. political can- the 2008 U.S. Presidential Election.” Information
didates now have a presence on social media. Polity, v.15/1–2 (2010).
Research has shown that voters are now just as Trammell, Kaye D., Andrew Paul Williams, Monica
likely to get their campaign news and information Postelnicu, and Kristen D. Landreville. “Evolution
from online sources as they are from traditional of Online Campaigning: Increasing Interactivity
campaign information sources, such as televised in Candidate Web Sites and Blogs Through Text
advertising and debates. Social media platforms and Technical Features.” Mass Communication &
are increasingly a significant part of the overall Society, v.9/1 (2006).
campaign strategy for candidates at all levels of Xenos, Michael and Kirsten Foot. “Not Your Father’s
office. The 24/7 availability of information and Internet: The Generation Gap in Online Politics.”
the sense of connectivity between candidate and In Civic Life Online: Learning How Digital
voter via social media will continue to increase Media Can Engage Youth, W. Lance Bennett, ed.
the importance of social media in the overall for- Cambridge, MA: MIT Press, 2008.
mation of candidate image.

Jenifer L. Lewis
Nazarbayev University
Candidates, Political
See Also: Campaign Strategy; Campaigns, Digital;
Campaigns, Virtual; Candidates, Political Branding Branding of
of; Debate; Facebook; FightTheSmears.com; Focus
Groups; Online Smear Campaigns; Television and In the past several decades, political candidates
Social Media. and politicians in the United States and in other
countries have come to rely on insights and tech-
Further Readings niques from the discipline of brand management
Foot, Kirsten and Steven Schneider. Web to improve their presentation and appeal to their
Campaigning. Cambridge, MA: MIT Press, 2006. constituencies. While television has been the dom-
Hacker, Kenneth L., ed. Presidential Candidate Images. inant medium associated with political branding,
Lanham, MD: Rowman & Littlefield, 2004. in recent years the Internet and social media plat-
Hacker, Kenneth L., Walter R. Zahaki, Maury J. forms have become increasingly important for the
Giles, and Shaun McQuitty. “Components of branding of political actors, and have brought
Candidate Images: Statistical Analysis of the Issue- new opportunities and new challenges to political
Persona Dichotomy in the Presidential Campaign branding practices.
Candidates, Political Branding of 225

As researcher Manuel Adolphsen notes, fol- value-laden narratives with emotional appeals
lowing the coverage of presidential races in the and trust-building messages with do-good claims.
United States or of electoral races worldwide, one In the political arena, the brand is a political
might get the impression that it is less a political actor’s public perception, and branding refers to
contest and more a marketing competition, not the building and mediation of a coherent concep-
unlike those between Nike and Adidas, Coca-Cola tual structure which links all aspects of a politician’s
and Pepsi, or the various airlines. Many political presence and discourse, including physical appear-
experts and campaign teams advise political fig- ance, psychological profile (including affective and
ures to employ strategies from brand management intellectual, irrational and rational facets), and
to create their particular and recognizable set of content and style of communication. Branding of
messages and emotions, their own brand, and to political candidates during election campaigns and
align their communication activities through vari- of politicians in office after the elections has been
ous types of media outlets with the brand. Addi- accomplished through value-based words, images,
tionally, many journalists and bloggers describe and gestures to connect with the public as well as
the endeavors of political figures, especially dur- through promises of action, change, or uprising to
ing electoral seasons, by means of terms and con- gain needed support. Such political branding prac-
cepts from management and marketing, particu- tices have become powerful tools that enable aspir-
larly those related to branding. Today, branding is ing politicians and elected officials to configure
being used not only in the mediatization and sale their identities to appeal to their target publics and
of commercial products but also in the mediatiza- the general public, and as such to encourage iden-
tion and sale of political beliefs. Branding is being tification of citizens with their personas. Addition-
used for launching and maintaining the images of ally, such practices have enabled political figures to
presidential candidates and other political candi- counteract the images of other politicians and as
dates, and for gaining and sustaining support for such to hurt their political opponents.
political actions and even wars. Because of its strong impact on political life,
A brand has been described by business schol- branding has raised many evaluative questions.
ars as the symbolic value of a given product or Some commentators have argued that political
the perceived benefits gained by a consumer when branding has positive consequences because tradi-
purchasing the product. Such scholars discuss the tional political communication leaves many people
brand differentiators that are aimed at making indifferent, whereas political candidates’ and politi-
a specific product stand out among other simi- cians’ adherence to the rules of commercial brand-
lar merchandise and specify that such differen- ing helps facilitate a brand connection and thus
tiators are not directly related to economic and empower the electorate and various constituen-
functional value, but rather that they are social cies. Other observers have contended that political
(pertaining to socialization or standing in soci- branding has negative consequences either because
ety) and cultural (tapping into groups’ and com- branding might drive substance out of politics and
munities’ customs and traditions). The brand is replace it with glitz or because the over-reliance on
marked by the systematic association of products branded communication in politics can easily shift
with lifestyles desired by consumers or the care- toward manipulation of the public and thus cause
ful orchestration of sensorial and sensual aspects injuries to democracy. However, claims have also
of the consumption context and situation. The been made that branding is neither inherently good
brand, therefore, is related to how the product is nor inherently bad, but rather its worth depends
showcased, frequently through a comprehensive on how political actors make use of it.
media or multimedia effort, and what consumers
perceive it to be after such an effort. Branding, 1980s and 1990s
as such, is viewed in business literature as any In the 1980s and 1990s, coordinated political
organizational activities focused on the creation branding campaigns became a political reality first
and fostering of a distinct brand image in the in the United States and, following U.S. examples,
consumers’ minds and the public sphere. Brand- in other parts of the world. Such branding cam-
ing includes the production and dissemination of paigns, at the time made up mostly of television
226 Candidates, Political Branding of

commercials, televised campaign speeches, and into the first and the second decades of the third
televised interviews, were aimed at showing what millennium to include not only televised but also
was unique about a candidate, what would make new media activity of political figures. In 2000,
the respective candidate different from others, the attempts of the Al Gore campaign to pursue
and what would make the specific candidate dis- Internet branding to mobilize the younger elector-
tinguishable for the public. In the 1980 presiden- ate remained ultimately unsuccessful. However, it
tial campaign, Ronald Reagan ran on a platform is unclear whether this was due primarily to the
that both encouraged consumerism and employed novelty of the new media as a means for political
consumerist appeals. The Reagan brand was built communication or mostly to the greater branding
on the emotional narrative, which seemed consis- capability of the George W. Bush campaign.
tent with the American dream, of the politician’s The Bush team had already used branding
rise from a humble background to fame, and was extensively in the 2000 Republican Party prima-
also built on promises of progress, prosperity, fis- ries to position the candidate as a folksy charac-
cal responsibility, and global democracy made to ter, a compassionate conservative, and a believer
the American public and especially to the Baby in freedom, and to cast doubt on opponent John
Boomer generation. McCain’s integrity, views, and plans. Bush went
In the 1992 presidential campaign, commercial on to be dubbed “the ultimate brand” in the media
branding experts helped position Bill Clinton as for the simplicity and discipline of his campaigns
a candidate and then a president with a message and the skillful integration of values and emotions
that was direct, simple, moving, and reassuring. into his discourses, which worked to solidify the
The Clinton brand also integrated an emotional support of his base and to diminish public sup-
narrative alluding to the American dream, but it port for his challengers both in the presidential
linked to it promises of government support to defense of the need for the Iraq War and when the
those in need and of social justice. incumbent president was facing Democratic Party
Particularly noteworthy internationally was presidential nominee John Kerry.
the rebranding in the mid-1990s, with inspira- In 2004, the efforts of the Howard Dean cam-
tion from Clinton’s branding campaign and with paign to add to the list of political branding tac-
assistance from commercial branding experts, of tics blogging, particularly blogging with reader
Tony Blair and the British Labour Party. A televi- response capacity, created many waves in the
sion campaign set up by a consulting company American political arena, yet the triumph of the
specializing in branding helped transform Tony Dean brand was short-lived, for various reasons
Blair’s image from one of a youthful optimist with that might range from the newness of blogging
exceedingly idealist views to that of a mature pol- as a political practice to the differences in public
itician capable of combining optimism with prag- perception of the candidate in new media envi-
matism. The campaign also helped reposition the ronments as compared to traditional media envi-
Labour Party from a political force with a focus ronments to the lack of message discipline of the
on the lower societal class to a “New Labour” candidate.
with potential interest for the working and pro- After the innovative uses of blogging by the
fessional categories. The Labour Party’s huge suc- Howard Dean campaign team in 2004, and as
cess in the 1997 elections and Blair’s subsequent social media continued to diversify and grow
tenure as prime minister led to the widespread in popularity, political candidates for various
involvement of branding experts in politics not offices at national and local levels in the United
only in Great Britain but also in Germany, France, States started social media operations for political
and other European countries. Tony Blair himself branding purposes. Meanwhile, political candi-
used branding again to reconnect with the British dates, public officials, political parties, and activ-
electorate in the subsequent electoral cycle. ist groups in various other countries in the Ameri-
cas and on other continents have found branding
2000s opportunities through social media.
Now established as useful in campaigns, politi- In the 2008 Democratic Party primaries and
cal branding has slowly but steadily been adjusted presidential elections in the United States, political
CAN-SPAM Act (2003) 227

communication experts noticed the seamlessness Further Readings


of Barack Obama’s corporate identity and the Adolphsen, Manuel. “Branding in Election
promotion of his image in the same way as a con- Campaigns: Just a Buzzword or a New Quality
sumer brand. With lessons learned from the Dean of Political Communication?” In Politische
campaign, the Barrack Obama campaign built in Kommunikation heute, Kathrin Mok and Michael
2008 an unprecedented political branding opera- Stahl, eds. Leipzig, Germany: Frank & Timme,
tion that integrated traditional media and social 2010.
media, and replicated in 2012 the operation, Graff, Garrett M. “Barack Obama: How Content
although many doubted the repeat was possible. Management and Web 2.0 Helped Win the White
The Obama image relied on previously utilized House.” Infonomics, v.57 (2009).
brand differentiators such as the narrative of the Harfoush, Rahaf. Yes We Did: An Inside Look
unlikely candidate, as well as on original ones at How Social Media Built the Obama Brand.
such as the narrative of his community organiz- Berkeley, CA: New Riders, 2009.
ing experiences. It relied on simple key concepts Kaplan, Andreas M. and Michael Haenlein.
like hope and solidarity, which some argued to be “Users of the World, Unite! The Challenges
groundbreaking and others found to be inspired and Opportunities of Social Media.” Business
by social activists in the United States and inter- Horizons, v.53 (2010).
nationally. It also relied on a now well-known Kushin, Matthew James. “Did Social Media Really
refusal to use emotional appeals and to appear as Matter? College Students’ Use of Online Media
a populist, instead enhancing likeability through and Political Decision Making in the 2008
coolness and candor. But what made the Obama Elections.” Mass Communication and Society,
brand truly unique in the 2008 and 2012 elec- v.13 (2010).
tions was the ability of the campaign not only to Needham, Catherine. “Brand Leaders: Clinton, Blair
use social media platforms for mobilizing poten- and the Limitations of the Permanent Campaign.”
tial voters and interacting with them, for gaining Political Studies, v.53 (2005).
political capital and doing fund-raising, but also Parikh, Komal H. Political Fandom in the Age of
to allow no discrepancy between approaches to Social Media: Case Study of Barack Obama’s 2008
the traditional media and to the social media, Presidential Campaign. London: Media@LSE,
bridging the two in a coherent manner. 2012.
Additionally, scholars have found that the Shirky, Clay. “The Political Power of Social Media:
viability of the Obama campaign was enhanced Technology, the Public Sphere, and Political
by several unmatched social media practices in Change.” Foreign Affairs (January/February 2011).
the political arena so far, including tapping into Zhang, Weiwu, Thomas J. Johnson, Trent Seltzer,
existing networks (of grassroots activists, of and Shannon L. Bichard. “The Revolution Will Be
students) to amplify support, offering the right Networked: The Influence of Social Networks on
incentives (donation matching, dinner with Bar- Political Attitudes and Behaviors.” Social Science
rack Obama) to increase engagement, and always Computer Review, v.28/1 (2010).
striving to personalize the social media experi-
ence. It is therefore no surprise that Obama-style
cross-media and social-media branding is being
emulated worldwide.
CAN-SPAM Act (2003)
Sorin Nastasia
Southern Illinois University Edwardsville The Controlling the Assault of Non-Solicited Por-
nography and Marketing (CAN-SPAM) Act of
See Also: Blog for America; Blogs; Campaigns, 2003, Public Law 108-198, was a U.S. law passed
Digital; Campaigns, Presidential (2004); Campaigns, by the 108th Congress and signed by President
Presidential (2008); Campaigns, 2012; Campaigns, George W. Bush on December 16, 2003. The
Virtual; Facebook; Social Media, Adoption of; law regulates unsolicited commercial e-mail and
Twitter; Web 2.0. placed several limitations and penalties on such
228 CAN-SPAM Act (2003)

messages. Spam is a broad term that refers to Many requirements of the act do not apply
any unsolicited commercial e-mail message that to commercial messages when the business and
is a nuisance to computer users. Spam e-mail fre- recipient have a pre-existing relationship, such
quently contains fraudulent or deceptive market- as information regarding a subscription mem-
ing content or unwanted sexual subject matter bership, or account, warranty, or product recall
that offends recipients. The high volume of spam information; notifications of account balance;
often requires Internet service and e-mail provid- and e-mails about product updates or upgrades.
ers to upgrade systems to handle the high level The CAN-SPAM Act preempts state laws specifi-
of e-mail traffic. At the time of the act’s passing, cally related to spam e-mails.
spam was viewed as a major problem and a threat When the CAN-SPAM Act was being consid-
to the viability of e-mail. Issues related to the ered, many antispam groups advocated that the
CAN-SPAM Act are of interest to social media legislation should go further. Some argued that
political strategists because advocates of unsolic- commercial e-mail should be prohibited unless a
ited commercial e-mail argue that spam is a legiti- recipient has opted in or given prior affirmative
mate solicitation technique that is protected by consent to receive the message, similar to an opt-
the First Amendment. in requirement adopted by the European Union.
The CAN-SPAM Act states that unsolicited Others argued that a centralized list similar to the
commercial e-mail may be sent to recipients as National Do Not Call registry should be created
long as the messages conform to several regula- wherein consumers could place their names to opt
tions. For instance, header information, such as out of all commercial e-mail. A do not e-mail list
originating domain name and originating e-mail was not included in the CAN-SPAM Act, but the
address, may not be false or misleading. The sub- act did require the FTC to study the feasibility of
ject heading of the e-mail must not be deceptive. A such a registry. In its report, the FTC concluded
working return e-mail address or functioning opt- that such a registry would not decrease spam
out mechanism must be included in the message to without an effective authentication system and
allow recipients to indicate that they do not wish to that an e-mail registry would raise serious secu-
receive future commercial e-mails from the sender. rity and privacy threats.
Unsolicited messages may not be sent to a recipient Many lawsuits and legal actions have been
who has opted out unless the recipient opts back brought against spammers based on the CAN-
in to receiving e-mail from the sender. The e-mail SPAM Act. In 2004, the FTC filed a civil lawsuit
must be clearly and conspicuously identified as an against Phoenix Avatar, a Detroit-based spam
advertisement or solicitation, and businesses may operation, and charged the company with making
not knowingly promote themselves with false or deceptive claims about a diet patch sold via spam
misleading e-mails. Commercial e-mail containing e-mails and not including a valid opt-out oppor-
sexually oriented material must include a warning tunity. Phoenix Avatar later settled with the FTC.
label in the subject line. In March 2006, the FTC obtained a $900,000
Under the act, the Federal Trade Commission consent decree against Jumpstart Technologies,
(FTC), state attorneys general, and Internet ser- LLC for numerous alleged CAN-SPAM Act viola-
vice providers, but not individuals, may sue viola- tions, including disguising its commercial e-mails
tors of these provisions. Violators are subject to as personal messages and misleading consumers
statutory damages of up to $250 per e-mail, up as to the terms and conditions of its promotions.
to a maximum of $2 million, which may be tri- The CAN-SPAM Act was intended to address
pled by the court to $6 million for serious, aggra- unwanted commercial e-mail messages and does
vated violations. Violators may be sentenced to not apply to text or multimedia messages between
up to three or five years in prison for knowingly cell phones (also called short message service,
committing fraud through e-mail, such as falsi- or SMS). Text messages sent between two cell
fying header information in multiple commercial phones or from one phone to many phones does
e-mails or accessing a protected computer with- not fall under the definition of spam in the CAN-
out authorization and using that computer to SPAM Act; however, when messages are sent to
send commercial messages. e-mail addresses associated with a mobile device
Cantor, Eric 229

or from an e-mail account, it does fall under the served as state treasurer for Ronald Reagan’s
act. Mobile spam remains a concern, and several 1980 presidential campaign. While attending
bills have been introduced that would change the George Washington University, Cantor interned
statute to cover mobile spam. for House Republican Tom Bliley of Virginia,
where Cantor began his interest in politics. After
Dan Schill earning a law degree from William & Mary Law
Southern Methodist University School and a master’s degree from Columbia Uni-
versity, Cantor’s sights turned toward a seat in the
See Also: Campaigns, E-Mail; Personalization; Viral Virginia House of Delegates.
Marketing. Canter was elected to the Virginia House of
Delegates in 1992 and served for nearly a decade.
Further Readings During that time, Cantor served on a number of
“CAN-SPAM Act of 2003 Information.” Elite Email. important committees, including the committees
http://www.eliteemail.com/spam/can-spam-act.html on Corporation Insurance and Banking, General
(Accessed December 2012). Laws, Courts of Justice, and Claims. He also
Hamel, Adam. “Will the CAN-SPAM Act of 2003 served on the committee on Science and Technol-
Finally Put a Lid on Unsolicited E-Mail?” New ogy, where he began to take an interest in emerg-
England Law Review, v.39 (2004). ing trends such as the Internet.
Soma, John, Patrick Singer, and Jeffrey Hurd. “Spam On March 14, 2000, Cantor announced that
Still Pays: The Failure of the CAN-SPAM Act of he would seek a seat in the House of Represen-
2003 and Proposed Legal Solutions.” Harvard tatives being vacated by Congressman Tom Bli-
Journal on Legislation, v.45 (2008). ley. Cantor had previously worked on Bliley’s re-
election campaigns, and Bliley quickly endorsed
Cantor for the seat. With the assistance of Bliley’s
political organization and endorsement, Cantor
was able to win the seat.
Cantor, Eric Cantor has served on a number of influential
committees, including Financial Services, Inter-
Eric Cantor is Virginia’s 7th Congressional Dis- national Relations, and Ways and Means. Where
trict representative and has served in the House of Cantor has stood out the most, however, has
Representatives since 2001. He is a member of the been his rapid rise through the ranks of leader-
Republican Party and is, in many opinions, one of ship. In just his second term of office, Cantor
the most influential members of Congress. On Jan- was appointed chief deputy Republican whip, the
uary 3, 2011, Cantor was elected House majority highest nonelected position in the Republican cau-
leader, the second-most powerful position in the cus. During his six years in the position, Cantor
House of Representatives. Many analysts believe proved to be an effective leader and effective in
that he will one day be elected speaker of the organizing votes and helping control the Republi-
House if the Republicans maintain their control can message. He has proved to be a tireless fund-
over the chamber. During his tenure in Congress, raiser, helping raise more than $30 million for
Cantor has also become known as an innovator the National Republican Campaign Committee.
in his use of social media to make Congress more His hard work was rewarded in 2008, when he
accessible to the public and to advance his parti- was unanimously elected Republican whip for the
san objectives. Cantor’s partnership with his com- 111th Congress. This promotion was followed
munications director, Matt Lira, has produced a a year later with his election as House majority
number of social media initiatives that have the leader, placing him second in power to Speaker of
potential to change how Congress operates and the House John Boehner.
how citizens interact with their government. Cantor has been a leading conservative
Cantor was born in Richmond, Virginia, the voice in the House of Representatives and has
son of a schoolteacher and real estate agent. Can- crossed swords with Democrats and Republicans
tor’s father was involved in national politics and alike. On the Republican side, Cantor became
230 Cantor, Eric

disillusioned with a number of Republicans fol-


lowing the sweeping Republican victories in 1994.
He believed that some Republican members had
become too comfortable in Washington and had
lost their reformist impulse. Others, he felt, had
fallen too easily into the trap of pork spending to
guarantee re-election. In some instances, Cantor
has even supported challengers to these Republi-
cans. On the Democratic side, Cantor has been a
leading voice opposing President Barack Obama
and congressional Democrats. He supports fis-
cal responsibility, reducing the size and spend-
ing of government, promoting growth, especially
through small business, in the economy, and he
has continued his war against pork-laden spend-
ing bills.
In promoting his principles and leading the
Republican Party in the House, Cantor has
reached out to social media as a vehicle for lead-
ership and communication. Cantor was one of
the first Republican House members to establish
a heavy presence on Facebook, which he sees as Republican Majority Leader Eric Cantor speaking at the Values
being one of the key ways that constituents will Voter Summit in Washington, D.C., on October 7, 2011. Many
interact with members of Congress in the future. consider Cantor one of the most influential Congress members.
Cantor was also quick to take advantage of
other emerging platforms like Twitter, YouTube,
LinkedIn, Quora, and Digg. Cantor, in fact, has
been so successful promoting social media appli- So far, Democratic reaction to the Citizen
cations to his party that the Republicans now CoSponsor application has been mixed. The
lead the Democrats in social media use. Along idea of allowing citizens greater ways of being
with Lira, Cantor sees social media as a critical informed about the legislative process is very
ingredient in the future success of conservatism appealing, and the potential exists for greater citi-
and the party. Both men agree that the day is zen engagement. At the same time, however, of
rapidly approaching that social media will be the the initial six bills available for tracking through
dominant factor in electoral success. the application, five were sponsored by Republi-
Canter and Lira, however, have not been con- cans, leading to Democratic complaints that the
tent to simply make use of existing social media CoSponsor initiative is highly partisan rather than
but have attempted to innovate within the field broadly inclusive. Cantor, in turn, has responded
as well. One project, called Citizen CoSponsor, that the application is still in its early stages and
is built on Facebook’s Open Graph protocol. The that, as it expands, more Democratic legislation
application allows users to pick pieces of legis- can certainly be included.
lation that they are interested in, and the appli-
cation will allow them to track the bill’s prog- YouCut
ress. Users receive updates on the bill as it moves Another innovative project initiated by Can-
through the legislative process. The application tor was YouCut, which was created to support
also allows users access to the full text of the pledges made by Republicans to voters in 2010 to
legislation. If a person supports the bill, there is cut government spending. Each week the House is
also an option to click a button indicating sup- in session, voters can go to Cantor’s Web site and
port for the legislation, thus making the citizen a select one of three government programs to cut.
“cosponsor” of the bill. The proposal that garners the greatest number of
Cantor, Eric 231

online votes is then introduced as a bill, and the greater citizen involvement and awareness of the
public is able to track its progress on the Web site. legislative process and to facilitate citizens’ par-
Citizens are also given the option of proposing ticipation in Congress.
their own spending cuts to government programs, Finally, Cantor and Lira have spearheaded a
and thus far, the Web site has generated tens of number of social media summits designed to make
thousands of suggestions. While not all the pro- Congress more aware of the potential of social
posals are reasonable, some have drawn attention media to improve American politics. One of these
to clearly wasteful spending. One user, for exam- events was a Hackathon held in December 2011.
ple, discovered $800,000 that was being spent on The Hackathon invited software developers, Cap-
a fantasy basketball league. itol staffers, interest groups, and members of Con-
Democrats have largely dismissed YouCut gress to discuss how to use technology to increase
as a partisan gimmick and have been reluctant government openness and transparency. Among
to embrace its underlying principle of cutting the initiatives discussed at the Hackathon was
government spending. Moreover, given that the how to improve grassroots information efforts
Republicans do not control the Senate or the through social media. Press releases, for example,
White House, there is little chance that any of tend to be one-way communications that do not
the spending-cut bills will pass. Cantor, however, allow citizens to respond to what they are being
remains undaunted. While achieving significant told. Social media as a vehicle for information
government spending cuts is a long-term goal, the communication allows a number of ways for citi-
immediate objective of YouCut is to show citizens zens to not just receive information but also to
that legislators care about wasteful government offer feedback and suggestions for alternatives.
spending at a time when the economy is putting Other topics discussed included how to cre-
such strain on taxpayers. Moreover, despite Dem- ate more socially connected legislation using
ocratic attacks that YouCut is partisan in nature, social media technologies like YouCut and Citi-
Cantor disagrees. Social media applications like zen CoSponsor. The goal is to create social media
YouCut, for Cantor, are nonpartisan because they hubs where citizens can provide input about what
are not fundamentally about promoting a parti- the government is doing and what changes they
san agenda. They are, he maintains, about mak- would like to see. The Hackathon also focused
ing government more accountable and allowing it on the need for Congress to become more literate
to work better. in social media because of the opportunities that
the technology offers representatives. Too often,
Other Projects members of Congress delegate social media inter-
Cantor also supports using technology to increase action to staffers because they are uncomfortable
government transparency and allowing greater or unfamiliar with its application. According to
public participation in the legislative process. Cantor and others, this unwillingness to engage
First, Cantor has pushed for changes in the way social media is a big mistake and represents a
that the congressional record is made available to lost opportunity to engage with constituents in
the public, in particular by allowing it to be read truly meaningful ways. Social media represents a
on portable electronic devices. Second, Cantor meaningful way for citizens to become involved
joined other Republicans in adopting the Stan- in government, and direct interaction with repre-
dards for the Electronic Posting of House and sentatives is a critical way of making that interac-
Committee Documents and Data. Beginning on tion significant.
January 1, 2012, the clerk of the House will now In short, Eric Cantor is probably one of the most
be required to maintain a single Web site where forward-looking members of Congress in terms of
the public can access House bills, amendments, understanding the role and impact of social media
and resolutions. All documents will be posted in in American democracy. His tireless efforts to push
XML or PDF formats. Video hearing and mark- his party and Congress to understand the benefits
ups will also be formatted to be machine read- of social media are an important contribution to
able, allowing for easier transcription and pub- bringing government into the 21st century. While
lication. The goal of these changes is to allow some critics may dismiss some of his efforts as
232 Carnivore

being motivated more by partisanship than prin- provider (ISP) to provide the court the following
ciple, there is no question Cantor’s leadership will information: the name of the officer who installed
continue to push the boundaries of what social the surveillance program, the date the program
media can bring to American government. was installed, and the configuration that the pen
register was programmed to search. Project Car-
Eric C. Sands nivore had been moribund but was quickly acti-
Kaitlyn E. Pettet vated after the 9/11 terrorist attacks. This program
Berry College was an Internet surveillance program overseen by
the Federal Bureau of Investigations (FBI); it was
See Also: Crowdsourcing; Hoyer, Steny; McCarthy, designed to carry out surveillance of electronic
Kevin; Ryan, Paul. communications, especially e-mail. The Carni-
vore program essentially “sniffs out” e-mails that
Further Readings are deemed suspicious by the FBI to look for pos-
Cantor, Eric, Paul Ryan, and Kevin McCarthy. Young sible cybercrimes, ones that have been committed
Guns: A New Generation of Conservative Leaders. or plans to commit cybercrimes.
New York: Threshold Editions, 2010. In 1998, the FBI began to create a program
Carr, Austin. “How Republicans Are Using Social known as Carnivore. The program was originally
Media to Win Mid-Term Elections.” Fast designed to sift through the contents of a sus-
Company. http://www.fastcompany.com/1695195/ pect’s e-mail, and when it was deemed necessary,
how-republicans-are-using-social-media-win-mid to record that person’s e-mail for future reference.
-term-elections (Accessed December 2012). Some Americans felt that this program was an
Stirland, Sarah. “Hackathon Means Government’s invasion of their privacy. The FBI contends that
Getting Geekier.” http://techpresident.com/ Carnivore is a “sniffing” program; Carnivore
blog-entry/capitol-hills-dec-7-hackathon-means sniffed through e-mails via the ISP, filtered the
-governments-getting-geekier (Accessed December data, and searched for the information the Car-
2012). nivore was programmed to seek. They say it was
a confined search, that Carnivore processed the
relevant data, and created an event file to show it
complied with the court order that was required
for the FBI to use Carnivore. By doing this, the
Carnivore FBI claims that the searches are not in violation
of the Fourth Amendment. The FBI says that Car-
Carnivore was a program created under the Bill nivore did not violate the Fourth Amendment
Clinton administration to surreptitiously alert law because it only searches for what the court order
enforcement of terrorist activity. Following the authorizes, thus not overstepping its boundaries.
terrorist attack on the Twin Towers in New York The FBI justifies its position by pointing to the rise
on September 11, 2001, and subsequent passage in cybercrime and how the government has had
of the Uniting and Strengthening America by Pro- to adapt to the times with advances in technol-
viding Appropriate Tools Required to Intercept ogy. The purpose of Carnivore was to ensure the
and Obstruct Terrorism (USA PATRIOT) Act of safety and security of the American people. Some
2001 (“Patriot Act”), the U.S. government gained of the crimes that the FBI was targeting with the
new powers to attempt to prevent terrorism. program were terrorism, information warfare,
The Patriot Act allowed pen registers (a device child pornography, and securities fraud.
used to record all numbers dialed from one phone
line) to collect information transmitted over Legal History
the Internet and between computer networks, One of the first Supreme Court cases to deal with
extended the jurisdiction of all pen registers across the issue of electronic monitoring was Olmstead
the United States, required enforcement officials v. United States (1928). In this case, the FBI placed
to file a court order to obtain the pen register, a wiretap on the phone of Roy Olmstead, a sus-
and finally, required the hosting Internet service pected bootlegger, without judicial approval. The
Carnivore 233

Supreme Court held that telephone conversations provider of electronic service must help install
did not receive protection under Fourth Amend- wiretaps and pen registers; ISPs must make sure
ment rights. Under the Supreme Court’s approach to allow only the government to use the device,
to this case, the FBI did not need to obtain a war- which they are authorized by a court to do; and
rant to seize evidence unless it physically tres- all networks must have the ability to accommo-
passed to obtain the evidence. Even though the date electronic surveillance by 1998. All in all,
court ruled so, Justice Louis Brandeis dissented, there has been great progress in the government’s
saying that wiretapping was an invasion of pri- ability to obtain and use wiretaps and pen regis-
vacy, thus violating the Fourth Amendment. Wire- ters. Government abuse of electronic surveillance
tapping, he claimed, allowed the FBI to listen in is still possible, but many procedures have been
on conversations that might contain confidential enacted to ensure that it does not occur.
information. He concluded that the government There have been several attempts to seize arti-
violated the Fourth Amendment when it used cles from third-party news organizations in the
wiretaps without obtaining a warrant to do so. past. Warden v. Hayden (1967) held that search
Thirty-nine years later, the Supreme Court warrants could be issued to law enforcement to
changed its original opinion in a different case seize evidence in connection with crimes. Simi-
that was brought before the court. In Katz v. larly, Zurcher v. Stanford Daily (1978) held that
United States (1967), the court overruled the prosecutors could seize evidence from news orga-
Olmstead decision and changed its opinion to nizations. In response to the Zurcher decision,
agree with Justice Brandeis’s dissenting view. In the U.S. Congress passed the Privacy Protection
Katz, the court held that the FBI was violating Act (1980). The Privacy Protection Act’s purpose
the Fourth Amendment rights of citizens in wire- is to protect the work of journalists from being
tapping without a warrant. The court ruled that seized unless they are suspected of a crime. This
recording oral conversations is protected under act protects the author’s work as long as it is orig-
the Fourth Amendment. Essentially, evidence does inal and the author has the intention to publish
not need to be physically seized for the Fourth it. The statute also protects such things as news-
Amendment to protect it, and a warrant is needed papers, books, and broadcasts. The information
for law enforcement to use a wiretap on suspected that the journalists are presenting is protected as
criminals. long as they are not involved in a crime or cause a
The following year, Congress passed the Omni- physical injury, or the person holding the materi-
bus Crime Control and Safe Streets Act of 1968. als committed a crime. As long as journalists are
The particular point of interest in this bill is Title not involved in a crime, their information cannot
III. The statute issued guidelines that the FBI must be seized through the Carnivore program. How-
follow in order to obtain electronic information. ever, if the FBI has suspicion that journalists are
It required a written application showing prob- involved in a crime and their work needs to be
able cause to be filed with a judge in the local seized, the FBI can obtain a search warrant from
jurisdiction. The judge must decide if the stan- a magistrate and seize the evidence.
dard for probable cause has been met before he
or she authorizes the wiretap or pen register. In Concerns
1986, under the Electronic Communications Pri- Carnivore, as envisioned, raised the possibil-
vacy Act, Congress slightly amended Title III. ity that constitutional protections were in jeop-
This act still confirmed that a pen register receives ardy. The Fourth Amendment of the U.S. Con-
less protection than a wiretap, but it established stitution protects U.S. citizens from searches and
procedures by which law agencies could obtain seizures without due process. Many citizens and
pen registers. social groups feared that Carnivore, as it stood,
The next major advance in government surveil- breached the Fourth Amendment rights of the
lance came in 1994 when Congress passed the people of the United States. Before the Internet
Communications Assistance for Law Enforce- was first created, there was debate about whether
ment Act (CALEA). CALEA enacted the follow- the government could monitor the phone calls of
ing procedures: when law enforcement asks, a suspected criminals.
234 Catholic Church and Social Media

The concern brought forth is that Carnivore See Also: Federal Privacy Act; Freedom of the Press
breaches the Fourth Amendment; however, the and National Security; Innovation and Technology;
FBI reiterates that it does not invade privacy Reporters Committee for Freedom of the Press.
because the Department of Justice cannot search
and seize anything without a court order to do Further Readings
so, thus claiming that the due process test is met. Associated Press. “FBI Ditches Carnivore Surveillance
When an e-mail is flagged and the conditions of System” (January 18, 2005). http://www.foxnews
the warrant are met, the date, time, origin, and .com/story/2005/01/18/fbi-ditches-carnivore-
destination of the e-mail are sent to the FBI. The surveillance-system (Accessed July 2013).
FBI has called Carnivore a diagnostic tool that Jennings, E. Judson. “Carnivore: US Government
works through an Internet service provider; it Surveillance of Internet Transmissions.” Virginia
separates only those e-mails under investigation Journal of Law and Technology (Summer 2001).
and it does nothing with the rest. Regan, Priscilla M. “From Clipper to Carnivore:
When Carnivore was first implemented, multi- Balancing Privacy, Law Enforcement and
ple groups questioned its effectiveness and feared Industry Interests.” Paper prepared for 1999
the intrusive agenda of government. Several of Annual Meeting of the American Political Science
the parties who were not in favor of the program Association , Atlanta, September 2–5, 1999.
were privacy groups, Internet service providers, George Mason University, 2001.
and House Majority Leader Richard Armey. They Tountas, Stephen W. “Carnivore: Is the Regulation
wondered how the Carnivore program met the of Wireless Technology a Legally Viable Option to
requirements of a legal wiretap. Two major issues Curtail the Growth of Cybercrime?” Washington
were brought up at the hearings held to discuss the University Journal of Law and Policy (2003).
program. The first issue was that many felt Car-
nivore should require a full Title III court order
instead of just a pen register. The second issue
in the hearings was whether the FBI had over-
stepped its boundaries in creating the Carnivore Catholic Church
system. A U.S. appeals court decided that Carni-
vore was to be treated like any other wiretapping and Social Media
program and that it needed a court order before
the program was used. Before the program ended Although involved in communication to and
however, it still only used a pen register instead of interaction with the general public for centuries,
the full Title III court order. the Catholic Church was not quick to embrace
The FBI officially ended the Carnivore program the use of social media. As an important tool that
in 2005. Instead of continuing Carnivore, the FBI permits organizations to reach millions of follow-
decided to use commercial software and asked ers quickly and inexpensively, however, church
ISPs to wiretap, and compensated them after- leaders are exploring social media as a means of
ward. The FBI did not use the Carnivore program communication, outreach, and interaction with
at all between 2002 and 2003. The reason given the public. In utilizing social media, the Catho-
for why it abandoned Carnivore was that the soft- lic Church has made use of both existing social
ware was too expensive to use. At the time, many media, such as Facebook, Twitter, and YouTube,
experts believed that Carnivore was a far superior and Web sites and other applications specifically
product than the commercial products. However, developed to interact with the broader general
many advances were made with the commercial public as well as the Catholic faithful. More atten-
software, which is why the FBI decided to discon- tion is gradually being given to the effectiveness
tinue the program. of various social media platforms as pressures
to communicate with as many as possible is bal-
R. Bruce Anderson anced with the results of those communications.
Jon Klos The Roman Catholic Church, with over
Florida Southern College 1.2 billion members, is the largest Christian
Catholic Church and Social Media 235

denomination globally. Among the oldest institu- it provides programming chiefly related to the pope
tions in the world, religious or secular, the church and his activities and travels.
is headquartered in Vatican City and uses a hierar-
chical model of governance led by a pope as well Social Media and the Holy See
as various cardinals, archbishops, bishops, and In 1995, the Holy See launched the Vatican’s Web
other leaders who, per church teaching, are the site, which can be found at www.vatican.va and
apostolic successors to Christ. The Holy See rep- which provides information in eight languages,
resents the ecclesiastical and canonical authority including Chinese, English, French, German, Ital-
of the church and refers to both its central admin- ian, Latin, Portuguese, and Spanish. This Web
istration and authority. Individual nations are site contains a variety of information about the
divided into dioceses, which in turn are divided pope, the Holy See, and the Vatican. Biographical
into parishes. information is included about the pope, as well as
Each diocese is led by a bishop or archbishop, a calendar of his activities; a collection of encyc-
and there are nearly 2,800 dioceses globally. licals, letters, messages, and other messages and
Nearly 1 million individuals belong to religious speeches; prayers; and apostolic exhortations and
orders, serving as nuns, brothers, or priests. Some constitutions. Also included are photographs of
of those ordained report directly to bishops or the Vatican, various popes, and visitors to the Holy
other diocesan authorities, while others are mem- See. The Web site also provides links to informa-
bers of separate religious orders, such as the Soci- tion regarding this history of the Holy See, litur-
ety of Jesus (the Jesuits), Carmelites, Dominicans, gical celebrations, various offices of the Roman
or Franciscans. These religious orders have their Curia, and other miscellaneous information. As
own governance structures, although ultimate one might expect from a religious organization,
authority over ordained members rests with the the Holy See Web site also includes a variety of
Holy See and the Roman Curia. online reference materials, including the Catholic
From its base of operations in Vatican City, the Church cathecism, the Bible, the Code of Canon
Holy See has long sponsored and operated a vari- Law, books, and documents related to the Second
ety of media that are used to communicate with Vatican Council. Links to Roman basilicas and
both the Catholic faithful and the outside world. papal chapels are provided, as is a concordance to
Since 1861 the Holy See has published the daily the liturgical year.
newspaper L’Osservatore Romano (The Roman In December 2012 Pope Benedict XVI launched
Observer). L’Osservatore Romano is published a Twitter account, using the account name Pon-
daily in Italian, with weekly editions also appear- tifex. Twitter is a social networking service that
ing in English, French, German, Malayalam, Pol- permits users to microblog by sending followers
ish, Portuguese, and Spanish. text-based messages of up to 140 characters in
The newspaper presents coverage of the pope’s length. These messages, known as tweets, can be
activities, official documents of importance, and accessed through either the Internet or a variety
editorials by members of the Curia. Although of mobile devices.
considered the official newspaper of the church, In the three remaining months of his reign,
L’Osservatore Romano does not possess the Mag- Pope Benedict drew 3 million followers, and his
isterium, or teaching authority, of the Holy See successor, Pope Francis I, found his following had
unless an article or editorial is penned by a mem- swelled to over 6 million when he took over the
ber of the Curia. Official documents are published account. This compares with the 30 million fol-
monthly in Acta Apostolicae Sedis (Acts of the lowers of U.S. President Barack Obama or the 38
Apostolic See), a gazette devoted to encyclical let- million of popular singer Justin Bieber. Although
ters, official decrees, and ecclesiastical appoint- he was 85 years old when he first tweeted, Bene-
ments. The Holy See also operates Radio Vaticana dict was a strong proponent of using social media
(Radio Vatican), which broadcasts programming as a means of communicating with the Catholic
around the globe in 47 languages and which has faithful and others. During his reign, he became
operated since 1931. In 1983 Centro Televisivo the first pope to maintain a Facebook page and a
Vaticano (Vatican Television Center) debuted, and YouTube channel.
236 Catholic Church and Social Media

The Vatican desires to use social media to as a journalist with Time magazine and as a cor-
communicate the Catholic Church’s message to respondent with Fox News. The scope of Opus
a younger audience that is increasingly adept at Dei’s social media presence has been universal,
using technology as a means to communicate. with chapters in 66 nations around the globe,
Certainly the social media accounts have per- many of which have their own Web sites and
mitted priests and others to employ a variety of social media accounts. Individuals and orga-
audiovisual resources, including animated fea- nizations that oppose the work and policies of
tures, blogs, images, videos, and Web sites, in Opus Dei have also used social media and the
conjunction with traditional means to engage in Internet to criticize the prelature, with a variety
dialogue, evangelize, and teach. Some have sug- of sources of information critical of the group.
gested, however, that the church’s use of these Because Opus Dei embraced social media rela-
applications has proven more successful in com- tively early, however, it has been able to respond
municating with those who are already partici- to these criticisms quickly and effectively.
pants than with nonbelievers.
Order-, Diocesan-, or Parish-Based
Opus Dei Social Media
The Prelature of the Holy Cross and Opus Dei In addition to those social media sites and applica-
(Opus Dei) is a conservative Catholic organiza- tions controlled by the Holy See and Opus Dei, a
tion founded in 1928 that encourages its mem- variety of Catholic religious orders, dioceses, and
bers to apply spirituality to their daily lives and parishes use social media to communicate with
to adhere to a strict regimen of prayer and ritual. their congregants and the general public. When
Controversial, Opus Dei is embraced by those initial attempts to give the church an electronic
Catholics who desire a more traditional approach, presence took place as early as the mid-1990s,
including a “call to holiness,” while the group is most of these early efforts mirrored the content of
reviled by those who believe it to be misogynistic, diocesan newspapers and church bulletins already
secretive, and elitist. Opus Dei has made great use used save in electronic form. Such efforts seldom
of social media, the Internet, YouTube, and other attracted new readers and, because those who
electronic means of communication in order to attend Mass and other religious services tend to
reach its members, advocate for certain issues, be older than the general population, the numbers
and provide information to the general public. of believers who could access such services were
Opus Dei’s Web site, for example, contains a vari- initially few. Despite this, many Catholic dioceses,
ety of articles, videos, podcasts, and other infor- parishes, schools, social organizations, and other
mation organized around a variety of themes. groups worked to develop a Web presence, some-
These themes include information about Opus thing that proved beneficial when the more inter-
Dei, personal testimonies of members, social ini- active social media platforms known as Web 2.0
tiatives, multimedia presentations, links to other became increasingly prevalent and popular.
sites, and the like. In an effort to reach as many As social media applications became more
individuals as possible, the Opus Dei Web site can interactive, and as a greater percentage of the
be accessed in 30 different languages. Opus Dei population became wired, a variety of dioceses,
has also posted videos on YouTube, used Twitter, churches, schools, religious orders, and other local
and established a distinct and commanding pres- Catholic organizations became users of social
ence using social media. media. From providing reminders of upcoming
Opus Dei’s success with social media has social events to conducting outreach activities to
not gone unnoticed. In 2012 the Vatican, reel- reach new members, these groups used a variety
ing from a variety of communications missteps, of social media to make the public aware of these
hired Greg Burke to formulate its media strategy and other opportunities. As social media users
and to coordinate the Holy See’s social media tended to be younger than the traditional Cath-
endeavors. Burke, a member of Opus Dei who olic, this permitted these local organizations to
holds a master’s degree from the Columbia Uni- reach a group of the laity who had been difficult
versity School of Journalism, previously served to reach. Because the Catholic Church sees what
Catholic Church and Social Media 237

it offers to the public as more important than a church, controversy can ensue. When Catholic
“product” or “brand,” those using social media Online posted comments on its Facebook page
found that they often needed focus on inspiration criticizing gay marriage, others who favored this
and movement building as ways to inspire and attacked the account, causing it to be shut down
motivate those who engaged with it on Twitter, for several hours. The often anonymous nature
Facebook, YouTube, or other platforms. of the Internet often allows such attacks to go
unchallenged, as it is difficult to ascertain who is
Independent Catholic-Oriented behind them, much less to stop them.
Social Media Third-party-controlled social media sites also
A variety of uses of social media have developed run the risk of affiliating the Catholic Church
through third parties who, while often Catholics with products and services with which it does not
themselves, are independent of church control. wish to associate. A plethora of dating sites claim
Examples include Catholic Online (www.catholic to be directed toward Catholics, for example.
.org), a for-profit Web site that is owned by Cali- While most of these are harmless and provide a
fornian Michael Galloway. Catholic Online pro- service of interest to many, a few such sites are
vides a variety of services to users, including links written in a manner that others would find objec-
to news updates concerning the church and its tionable. Church authorities have, as a result,
members, lists of saints and their biographies, sometimes received complaints about Web sites,
free e-mail accounts, shopping, dating oppor- applications, and other social media over which
tunities, and other assistance for those curious they have no control. As such services continue
about Catholicism. With an attractive and engag- to push the boundaries of good taste, such com-
ing interface, Catholic Online appears similar plaints will undoubtedly multiply.
to a variety of other social media choices. As a
result, it attracts many users who are not oth- Stephen T. Schroth
erwise familiar with or members of the church. Jason A. Helfer
Other independent Catholic social media sites Knox College
that are controlled by laypeople and independent
of church control include Independent Catholic See Also: Campaigns, Grassroots; Christian Right;
News (www.indcatholicnews.com), Catholics Faith-Based Social Change; Latin America; Political
United for the Faith (www.cuf.org), Our Sunday Base; Twitter; Web 2.0;Youth Engagement.
Visitor (www.osv.org), and the National Catholic
Reporter (www.ncronline.org). Such sites, which Further Readings
often use a variety of social media, cost the church Allen, J. L., Jr. Opus Dei: An Objective Look Behind
nothing and often have design elements and fea- the Myths and Reality of the Most Controversial
tures that are attractive to the lay public. As a Force in the Catholic Church. New York:
result, the independent sites attract a variety of Doubleday, 2005.
users who are more varied than do the sites run Curran, C. E. The Social Mission of the U.S. Catholic
by the church itself. Church: A Theological Perspective. Washington,
Such independent social media sites are not DC: Georgetown University Press, 2011.
without their own controversy, however. For Himes, K., ed. Modern Catholic Social Teaching:
example, the owner of Catholic Online has been Commentaries & Interpretations. Washington,
involved in various disputes with former employ- DC: Georgetown University Press, 2005.
ees. Disputes such as this bring a certain level Massaro, T. Living Justice: Catholic Social Teaching
of disgrace and disrepute upon the church even in Action, 2nd ed. Lanham, MD: Rowman &
though it is not involved in any way in the actions Littlefield, 2012.
of the owners of the sites. Such independent sites O’Brien, D. J. and T. A. Shannon, eds. Catholic Social
often confuse the lay public, offering viewpoints Thought: The Documentary Heritage, 2nd ed.
that are inconsistent with church teachings and Maryknoll, NY: Orbis Books, 2010.
doctrine. Even when the message of such inde- Vogt, B. The Church and New Media: Blogging
pendent social media sites aligns with that of the Converts, Online Activists, and Bishops Who
238 Cato Institute

Tweet. Huntington, IN: Our Sunday Visitor contemporary thinkers; and Policemisconduct.net,
Publications, 2011. a project on reporting police misconduct nation-
wide. Additionally, Cato Unbound is a Web-only
publication featuring a debate between four peo-
ple with unlimited responses over a month. Other
publications include Cato Journal and Regulation,
Cato Institute both peer-reviewed, as well as Cato’s Letter, Cato
Supreme Court Review, and Cato Policy Report.
The Cato Institute is a U.S.-based public policy
research organization guided by the principles Social Media
of individual liberty, limited government, free The Cato Institute and many of its analysts and
markets, and peace. Its scholars and analysts are scholars are actively involved in social media,
actively involved in conducting research on vari- particularly in its use of Facebook, Twitter, and
ous policy issues while working to remain inde- YouTube. While the institute mainly uses social
pendent and nonpartisan. Often labeled as a liber- media to promote its Web-based content and
tarian “think tank,” the institute’s engagement in upcoming events, its analysts are quick to weigh
the public sphere is highly influential, particularly in on Twitter about relevant debates and current
on economic and social policies. The Cato Institute events as they unfold.
does not support any political party including the In early 2012, the institute turned to the pub-
Libertarian Party, and its position on topics such lic through the Web for support against pending
as immigration reform, gay and lesbian rights, gun lawsuits that threatened to change control of the
control, foreign policy, and government spending organization. Cato started a Web site and Face-
align it with both Republicans and Democrats on book page called Save Cato when the legal dis-
different issues. The Cato Institute is influential pute became more public to present its position
on public opinion and on policy makers through and encourage others to support it through social
Internet and social media outreach. media. The lawsuits were brought by Charles
The mission of the Cato Institute is to increase and David Koch, billionaire owners of Koch
the public’s understanding of public policies Industries and supporters of numerous conserva-
through the principles of limited government, free tive and libertarian special interest groups and
markets, individual liberty, and peace. The insti- think tanks. The Save Cato site pleaded with
tute strives to provide clear and publicly acces- the public to join the institute in persuading the
sible analyses of important public policy issues Koch brothers to drop what Cato labeled as a
through a wide array of media. Its analysts appear takeover attempt. The dispute concerned con-
as guests on television networks, make presenta- trol of shareholder seats, with the Koch broth-
tions at conferences and other speaking engage- ers claiming protection of their legal interests
ments, publish research reports and books, and while Cato’s position insisted its ability to remain
write blogs and op-eds. Additionally the institute independent was threatened. The lawsuits were
sponsors many of its own conferences such as the finally dropped after an agreement was reached
Annual Monetary Conference or the Conference which the institute claims will allow its research
on Health Care Reform, hosting notable scholars to remain nonpartisan.
and specialists.
The Cato Institute’s online presence is notable Background
in its effort to influence the public’s understand- Maintaining political independence allows the
ing of public policy issues. The institute main- Cato Institute to declare itself as ideologically
tains its own Web site in both English and Span- based rather than politically based. In addition to
ish, while also being responsible for other sites its resistance of more control by the Koch broth-
such as Downsizing the Federal Government, a ers, the institute also does not accept any gov-
proposal to cut the government’s budget depart- ernment funding and instead receives its funding
ment by department; Libertarianism.org, promot- through private donations and book sales. Fur-
ing the ideas of libertarianism from classical to thermore, the Cato Institute does not engage in
Cato Institute 239

Participants at the Cato Institute–Wikimedia District of Columbia Legislative Data Meetup on June 8, 2013, at Cato Institute
headquarters. The meetup provided an opportunity for WikiProject U.S. Federal Government Legislative Data participants in the
Washington, D.C., area to discuss efforts to increase the amount of information about the U.S. government on Wikipedia.

any lobbying efforts or support any political can- access to information. The institute remains com-
didates. Its scholars and analysts are known to be mitted to expanding civil society, where individu-
critical of both major parties at different times. als make choices about their own lives, while
Though often considered to have closer ties with reducing the political society, where someone else
elements of the Republican Party, there have been is able to make or greatly influence those choices.
abundant criticisms of Republican office holders Though societies of the world are becoming
and the Cato Institute explicitly resists being tied more complex, the Cato Institute maintains the
to the conservative movement because conserva- position that the appropriate answer to such com-
tism connotes maintaining the status quo. plexity is not more centralized control and plan-
Founded in 1977 by Edward H. Crane and ning but less. The institute claims that socialism
Charles Koch, the Cato Institute was named after and government planning are not appropriate
a series of essays in 18th-century England known solutions for the modern world because a concen-
as Cato’s Letters, Cato being a reference to Cato tration of planning only works in simple societies
the Younger, the defender of republican institu- where it does less damage. Centralized planning
tions in Rome. The essays were written about a is outdated and inhibits social progress, and the
society free from excessive government power institute’s attempts to influence both policy mak-
and were inspirational to many of the architects ers and the public through the use of decentral-
of the American Revolution. The Cato Institute ized social media platforms can be one example
believes that the principles of individual liberty, of how it follows its ideology.
limited government, free markets, and peace are
even more relevant and powerful today in an Brett J. Craig
increasingly globalized world with unprecedented Nazarbayev University
240 Cause-Marketing Campaigns

See Also: FactCheck.org; Fiscal Cliff Crisis; Gun corporate giving because the latter generally
Control; London School of Economics Public Policy involves a money donation by a for-profit organi-
Group; Polarization, Political. zation to a nonprofit one with no direct involve-
ment of the for-profit organization in the cause,
Further Readings and the donation is tax deductible. By compari-
Boaz, D. Cato Handbook for Policymakers. son, cause marketing is a marketing activity in
Washington, DC: Cato Institute, 2008. which an organization with a product, service,
McGann, J. and R. Sabatini. Global Think Tanks: or image to market builds a relationship with a
Policy Networks and Governance. New York: cause for a mutual benefit.
Routledge, 2011. Cause marketing can take many forms; for
Tompkins, E. K. “Think Tanks and Public Policy example, it can be associated with sales promo-
Research Institutes.” Behavioral & Social Sciences tion techniques where a product purchase leads to
Librarian, v.26 (2006). a donation to a charity or a cause or with prod-
Weidenbaum, M. “Measuring the Influence of Think uct licensing, endorsements, and certifications,
Tanks.” Society, v.47 (2010). like the case of the American Heart Association’s
stamp of approval on Cheerios, a breakfast cereal
produced by the company General Mills, for its
low-fat and low-cholesterol standards, but also
through employee service programs or simply
Cause-Marketing with the promotion of a common message. Gor-
don Liu and Wai-Wai Ko indicate as the most
Campaigns common cause-marketing implementation strat-
egies sponsorship, transaction-based, joint pro-
Cause-marketing campaigns, also known as motion (for example through cooperation with
cause-related marketing campaigns, are market- regard to advertising efforts), and in-kind, nonfi-
ing campaigns dealing primarily with social and nancial corporate contributions. These four strat-
charitable causes. Such campaigns are often the egies represent four distinct ways of implement-
result of cooperative efforts between for-profit ing cause-marketing campaigns. These are not
and nonprofit organizations. In cause marketing, mutually exclusive; an organization can employ
organizations are partners and strive to achieve different strategies for the same campaign.
their mutually agreed-upon objectives. Cause-marketing campaigns have been recently
Cause marketing is considered a win-win situ- used for political causes, too, as a way to increase
ation. For nonprofit organizations, these cam- citizens’ involvement. In the 2012 U.S. presiden-
paigns are important activities for promoting tial elections, for example, the Kenneth Cole
their causes through the financial support of a Foundation, a foundation created by the Ameri-
business and for reaching possible supporters can fashion designer Kenneth Cole in association
through a company’s customer base. For the for- with Emory University and Rock the Vote, a non-
profit organization, a cause-marketing campaign partisan American nonprofit organization whose
is an important strategy for improving customer mission is to engage and build the political power
relations, its own image, and its brand position- of young people, announced the launch of an
ing as a social responsible company, increasing its innovative retail program that encourages voter
ability to attract, motivate, and retain employees; registration. The program aimed to raise aware-
appealing to investors and financial analysts; and ness about the importance of voting by allow-
even boosting sales. ing Kenneth Cole’s custumers to register their
Sue Adkins defines cause-related marketing as votes in stores and online. Customers could also
an activity in which an organization uses money, show their support for the cause by purchasing a
techniques, and strategies to support worthwhile limited-edition tote with the message “Rock the
causes at the same time as it builds its business. Vote (and the tote).”
Although the distinction is not always so clear, Virgin America, an American airline company,
cause marketing differs from philanthropy or was also a partner of Rock the Vote and engaged
Cause-Marketing Campaigns 241

in this cause by creating a specific campaign called Festival. For each purchase made by a customer
Both Sides of the Aisle Win. Passengers on Virgin’s with an American Express card, the company
Washington, D.C.-to-San Francisco flights could donated an amount of money to the cause. In
register to vote midflight by scanning a quick 1983, the same company got engaged in another
response (QR) code on the airplane’s backseat cause-marketing campaign, this time to support
screens. Another example of political-cause and the restoration of the Statue of Liberty. The res-
cause-marketing campaigns is the Patagonia case. toration of the Statue of Liberty was a success-
Patagonia, an outdoor clothing and gear company, ful initiative as the company was able to donate
embarked on a cause-marketing campaign in the $1.7 million in three months. Sue Adkins reports
summer of 2012 before the U.S. presidential elec- that American Express engaged in more than 90
tion with its Vote the Environment campaign, in causes in 17 different countries in the years to
conjunction with nonprofit partners HeadCount come, clearly indicating that the company saw
and the left-leaning League of Conservation Vot- both a commercial and a social interest in devel-
ers. As with the Kenneth Cole Foundation and oping specific cause-marketing campaigns.
Virgin, the scope of this cause-marketing cam- After American Express, many other organiza-
paign was to motivate consumers to register to tions decided to engage in different cause-marketing
vote. However, in this case, Patagonia sponsored a campaigns in order to boost profits, increase repu-
specific political cause, environmentalism. tation, and improve brand positioning. According
Although cause marketing was originally a to the Cone 2010 Cause Evolution Study, which is
marketing strategy that occurred offline, today a study exploring consumer attitudes and expecta-
it is more and more often conducted online, for tions of companies’ support for social and environ-
example, with the establishment of online charity mental issues, cause marketing continues to grow
auctions. Organizations can create programs to among organizations, and consumers are expect-
help sellers and corporations donate a percentage ing even more. The results of this study conducted
of their sales to a nonprofit organization through by Cone Communications, a public relations and
the use of auctions. marketing agency, indicate that about 83 percent
of Americans want more of the products, services,
History and retailers they use to support causes.
It is believed that cause marketing is a practice that This indicates that consumers are extremely
has been long employed by organizations to con- sensitive to an organization’s commitment and
vey specific messages around their corporate iden- involvement in social causes and may switch from
tities and to link with the public and local com- one brand to another of a comparable product
munities. An example of early marketing activities and price if the latter brand is associated with a
associated with a cause is the case of William Hes- “good cause.” However, Philip Kotler and Nancy
keth Lever, an English business owner of a soap Lee underline that the organization’s commitment
and cleaning product company—Sunlight—who in a cause has to be perceived by consumers as
introduced gift schemes in 1890 with the intent to genuine to avoid consumers’ rejecting claims of
donate a monetary prize to a charity on the basis cause-marketing campaigns. Furthermore, the
of consumers’ voting, which was possible only by organization needs to clearly ponder which cause
purchasing Sunlight products first. to support as some customers may have concerns
It was, however, only in more recent years that about the charity the brand is associated with and
cause marketing became a thoughtful and planned may not want to purchase the product as a result.
strategy by organizations. Sue Adkins points to Overall, cause-marketing campaigns can be ben-
the early 1980s as the time for cause marketing’s eficial for organizations that have existing, long-
real beginning and American Express, an Ameri- term associations with a cause or charity and if
can multinational financial services corporation, the effort is perceived as an authentic, natural
as the pioneer of cause marketing. In 1981, Amer- extension of the apparent commitment.
ican Express developed a cause-marketing cam-
paign for donating funds to different nonprofit Chiara Valentini
organizations as a part of the San Francisco Art Aarhus University
242 Center for Communication and Civic Engagement

See Also: Activists and Activism, Digital; Campaign of citizen resources that promote civic engage-
Strategy; Campaigns, Digital; Campaigns, 2012; ment and participation in local, national, and
Corporate Social Responsibility; Fund-Raising; global affairs. In recognizing that new tech-
Nonprofit Organizations; Special Interest Campaigns; nologies have a critical impact on human com-
Voter Apathy; Youth Engagement. munication, CCCE seeks to understand new
challenges and opportunities for civic engage-
Further Readings ment through its operation of a number of proj-
Adkins, Sue. Cause Related Marketing: Who Cares ects. Projects include the organization of public
Wins, 2nd ed. Worbun, MA: Butterworth- events, reports, conferences, and curriculum that
Heinemann, 2012. address the need to understand shifts in human
Cone Communications, “Cause Marketing Remains communication by assessing the present state of
Strong: 2010 Cone Cause Evolution Study.” http:// the media and changing political climates.
www.conecomm.com/cause-marketing-remains The CCCE maintains an intellectual agenda
-strong (Accessed on November 2012). that motivates and reinforces the range of diverse
Kenneth Cole Foundation, “Kenneth Cole Partners interests represented in CCCE activities. Its orga-
With Rock the Vote.” http://kennethcole.tumblr nizational philosophy recognizes two distinct
.com/post/32267308765/kenneth-cole-partners views of social and political change. One perspec-
-with-rock-the-vote (Accessed November 2012). tive claims that civic life is declining as a result of
Kotler, Philip and Nancy Lee. Corporate Social decreased psychological importance and organiza-
Responsibility. Doing the Most Good for Your tional coherence of traditional politics. A different
Company and Your Cause. Hoboken, NJ: John school of thought suggests that political participa-
Wiley & Sons, 2005. tion continues to thrive, however, it is represented
Liu, Gordon and Wai-Wai Ko. “An Analysis of in a new form; in response to changes in society,
Cause-Related Marketing Implementation old patterns of civic life are being replaced to meet
Strategies Through Social Alliance: Partnership the needs of contemporary personal lifestyles. In
Conditions and Strategic Objectives.” Journal of line with the latter view, the CCCE believes that
Business Ethics, v.100 (2011). new concepts and methods are required to study
Patagonia. “Vote the Environment.” http://www these emerging representations of politics and
.patagonia.com/us/vote-the-environment citizenship. In particular, new research should be
(Accessed November 2012). designed “to identify new patterns of communica-
Rock the Vote. http://www.rockthevote.com/about/ tion and civic engagement in order to understand
partners (Accessed November 2012). the way in which they fit with more traditional
Virgin America. “Both Sides of the Aisle Win: Virgin political communication forms, and to compare
America Goes to Washington; New Flight Takes those patterns across different societies.”
Off From SFO-Reagan National.” [Press release]. As defined in its intellectual agenda, CCCE
http://www.virginamerica.com/press-release/2012/ research addresses five broad areas of interests.
virgin-america-goes-to-washington.html (Accessed First, it seeks to “reassess traditional media and
November 2012). citizen information needs” by considering the
decline of traditional media gatekeeping and the
rise of emerging news networks and communica-
tion channels. Second, it attempts to understand
“the rise of ‘lifestyle’ politics,” a concept that sug-
Center for gests that traditional political appeals are being
replaced with consumer-based value appeals that
Communication and address quality-of-life concerns, such as those
Civic Engagement related to the environment and personal rights.
Third, the work of the CCCE addresses “the decline
The Center for Communication and Civic of common political experiences,” thus recogniz-
Engagement (CCCE) at the University of Wash- ing that the Internet has allowed traditional forms
ington is dedicated to research and the creation of political engagement to be replaced by virtual
Center for Communication and Civic Engagement 243

communities that enable individuals and activists the boundaries of traditional politics and com-
to act on a global level. The fourth area covers munication.” Specific campaigns that have been
questions about “the changing politics of digital identified for analysis have included the Nike
media and the Internet,” which primarily involves Anti-Sweatshop campaign and the World Trade
the investigation of issues surrounding Internet- Organization campaign. The CCCE considers cit-
based issue advocacy campaigns. And finally, the izens’ activities surrounding these campaigns with
fifth area in CCCE’s intellectual agenda seeks to an emphasis on monitoring the role of the Inter-
understand “global activism and large-scale pub- net in shaping the course of these campaigns. In
lic networks” by examining the characteristics of its research, the CCCE refrains from advocating a
global cause networks. particular position, instead focusing on providing
an understanding of how it works.
Projects The CCCE has hosted several conferences,
The interest areas outlined above are explored in workshops, and speakers on the University of
an extensive index of CCCE projects. For exam- Washington campus. For example, in January
ple, the organization has created multiple “Learn- 2009, the center hosted a media-election work-
ing Communities” whose participants include shop to discuss the roles of traditional media and
students, faculty, and practitioners who work on new media during the 2008 electoral campaigns.
projects that link the University of Washington to In May 2000, the CCCE hosted the two-day
community organizations. Becoming Citizens is Communicating Civic Engagement in Europe and
one Learning Community that allows University the United States conference, which featured an
of Washington students to intern at local schools array of participants from universities throughout
and community centers, where they facilitate civic the world.
engagement projects. In Spring 2012, 12 Becom- Directors and staff, as well as faculty and stu-
ing Citizens interns met with students once a dents across the University of Washington, sup-
week in various community sites and taught civic port the coordination of CCCE research, learn-
engagement skills to students using digital media. ing, and outreach activities. While the center is
They assisted students in creating short videos housed in the department of communication, it is
about prevalent civic issues such as youth vio- cosponsored by the political science department
lence, healthy living, and the environment. and scholars are represented from a range of aca-
Another CCCE project, Developing Technolo- demic disciplines including political science, geog-
gies for Public Engagement and Deliberation, raphy, computer science and engineering, and
aims to introduce civic technologies into actual information science. The CCCE’s organizational
political contexts in an effort to improve public model has been praised for its capacity to effec-
deliberation in online communication forums. tively integrate higher education resources with
With support from a $730,000 three-year grant community organizations. Using an academic
from the National Science Foundation, this proj- institution as the center’s hub, this organization
ect is led by an interdisciplinary group of schol- has built public services that increase community
ars from the University of Washington, which participation in civic activities.
include Lance Bennett, Alan Borning, and Travis The CCCE recognizes the historical signifi-
Kriplean. This research team implements several cance of new technologies in changing the ways
online platforms that are designed to achieve mea- that humans participate in public affairs, and it
surable improvements in various areas of political is dedicated to understanding new challenges and
behavior. Additionally, communicative outcomes opportunities for civic engagement.
produced by the project’s interactive online plat-
forms enable public officials to gain insight into Stephanie E. Bor
the needs and opinions of citizens. University of Utah
The CCCE is also dedicated to tracking and
studying activist and issue campaigns. Accord- See Also: Activists and Activism, Digital; Education,
ing to its Web site, the CCCE is particularly Issues in; Engagement Features; Open Data; Youth
interested in individual campaigns that “redefine Engagement.
244 Center for Democracy and Technology

Further Readings governmental surveillance protocols and calls


Center for Communication & Civic Engagement. for stronger legal standards protecting personal
“Center for Communication & Civic information in digital environments.
Engagement.” http://ccce.com.washington.edu
(Accessed May 2013). Research and Analysis
Dalton, Russell J. The Good Citizen: How a Younger The CDT provides research and analysis, in the
Generation is Reshaping American Politics. form of reports, papers, and commentary, on a
Washington, DC: CQ Press, 2009. wide variety of issues related to Internet freedoms
Gil de Zúñiga, Homero, et al. “Social Media Use and governance. It also produces policy posts,
for News and Individuals’ Social Capital, Civic in-depth analysis on current technological policy
Engagement and Political Participation.” Journal issues, testimonies, and other reports from CDT
of Computer-Mediated Communication, v.17/3 experts. The CDT monitors various issues of tech-
(2010). nological concern in order to provide the public
with timely and reputable information.
A primary area of research and analysis for
the CDT is information and policies related to
free expression. While broad in nature, the CDT
Center for Democracy focuses its analysis most specifically on issues of
online child safety, intermediary liability (a sec-
and Technology tion of the Telecommunications Act of 1996 that
provides broad immunity for online service pro-
The Center for Democracy and Technology viders with respect to material posted by third
(CDT), based in Washington, D.C., is a nonprofit parties), Internet neutrality (standardized techno-
public policy organization. The CDT works to logical protocols that enable Internet innovators
influence technological policy innovation with to distribute content and services without seeking
the overarching goal of keeping the Internet open, permission), the Children’s Online Privacy Protec-
innovative, and free. The CDT was instrumental tion Rule (COPPA), and international free expres-
in shaping early Internet legislation and has advo- sion, which focuses on deterring unilateral global
cated for policy and protections as the Internet legislation that may serve to threaten the Inter-
has evolved. net’s vitality and freedoms.
The CDT believes that the unique, open, decen- Consumer and health privacy are another area
tralized, and user-controlled nature of the Internet of concern for the CDT. The organization pro-
and its ability to foster opportunities for innova- vides information related to consumer privacy on
tion, democratic participation, and human devel- issues of behavioral advertising (consumer profiles
opment must be preserved. The CDT focuses on created by compiling detailed information about
enhancing freedom of expression by fighting for an Internet user’s online activities), spyware (pro-
the rights of individuals to freely and openly com- grams on computers that open security holes for
municate, publish, and access online information. users), identity management, baseline privacy law
It opposes any level of governmental censorship (basic privacy protections that apply across the
that threatens, or perceives to threaten, the free life cycle of consumers’ data), and data security.
flow of information online. The CDT believes Related to health privacy, CDT provides informa-
that the key to appropriate Internet usage lies not tion on consent, the 1996 Health Insurance Por-
within governmental control, but rather within tability and Accountability Act (HIPPA), privacy
technological tools that allow individuals to enforcement, and state privacy protections.
engage with the Internet in the manner best suited The CDT also provides research and analysis
to them personally. It also promotes the idea that on issues of digital copyright and Internet open-
online privacy is best protected via a mixture of ness and standards. Regarding digital copyright,
laws, corporate policy, and technological tools the CDT provides information on graduated
that give individuals control over their personal response policies (policies that call on Internet ser-
information. The CDT advocates for limiting vice providers to take action against subscribers
Center for Democracy and Technology 245

of governmental policy and industry practices.


Through ongoing working groups, the CDT
brings together companies, trade associations,
public interest groups, technologists, and academ-
ics to facilitate communication and seek collabor-
ative opportunities. These working groups focus
on issues such as government privacy and secu-
rity issues, consumer privacy, and free expression.
CDT also collaborates with a range of Internet
stakeholders and is committed to fostering dia-
logue that produces implementable discussions
on how to best protect and preserve the nature of
the Internet. The CDT collaborated with compa-
nies and advocates to successfully argue for First
Amendment protections for Internet commu-
nication before the U.S. Supreme Court. It also
The Center for Democracy and Technology believes in the worked with Congress to pass legislation shield-
freedom to communicate, publish, and access online information ing Internet service providers (ISPs) from liability
and opposes governmental censorship that threatens, or related to user-generated content and created the
perceives to threaten, the free flow of online information. Anti-Spyware Coalition, credited with improv-
ing trust and security on the Internet. The CDT is
also credited with helping shape new health policy
protections and supporting the development of
suspected of online copyright infringement), sec- innovative technology vital to better health care.
ondary liability (policies that hold service provid-
ers liable for infringement committed by users), Conclusion
digital rights management, and international The Center for Democracy and Technology is
copyright. On Internet openness and standards, concerned with building consensus-driven coali-
CDT has compiled research on Internet gover- tions among Internet stakeholders with the
nance, technical standards, and neutrality. central focus of finding practical and balanced
Aligning with one of the organization’s core solutions to contemporary policy challenges
beliefs, the CDT provides substantial research and in the evolving Internet environment. Through
analysis on governmental security and surveil- research, analysis, and involvement in various
lance. Information related to this issue includes policy and legislative initiatives, the CDT consis-
information on the Electronic Communications tently works toward its goal of keeping the Inter-
Privacy Act (ECPA) of 1986, which specifies net open, innovative, and free.
standards for government monitoring of Internet
communication and cell phone conversations; the LaChrystal Ricke
PATRIOT Act, which provided expanded provi- Sam Houston State University
sions for government surveillance in the United
States and to access records about individuals, See Also: Cyberculture; Digital Government; Digital
including citizens; cybersecurity; and terrorism Revolution; Innovation and Technology; Privacy.
information sharing (the development of domes-
tic intelligence gathering that the CDT theorizes Further Readings
endanger freedom of expression, privacy, and Clarke, Richard and Robert Knake. The Next Threat
other civil liberties). to National Security and What to Do About It.
New York: HarperCollins, 2010.
Initiatives Levmore, Saul and Martha Nussbaum. The Offensive
A primary initiative for the CDT is leadership Internet: Speech, Privacy, and Reputation.
and advocacy that assists in shaping the direction Cambridge, MA: Harvard University Press, 2011.
246 Center for Information Technology and Society

Swire, Peter and Kenesa Ahmad. Privacy and through interdisciplinary engagement that the
Surveillance With New Technologies. New York: CITS works to not only research, but also create
iDebate Press, 2012. technology, and parse out the social understand-
ings that may be embedded in new technological
innovations. Additionally, through both inves-
tigating and creating technology, the CITS con-
nects technology with humanity by producing
Center for Information research that explains how people use, adopt,
adapt, and create technologies in order to par-
Technology and ticipate in society.
Society The CITS engages in three primary types of
activities: research, education, and connect-
The Center for Information Technology and Soci- ing people. The primary focus of the center is
ety (CITS), at the University of California, Santa research. Research teams are composed of inter-
Barbara, was founded in 1999, on the 30th anni- nationally recognized scholars who investigate
versary of the birth of the Internet. The center the dynamic, technologically driven environ-
functions as a unit within the University of Cali- ments pervasive in contemporary organizations
fornia (U.C.), Santa Barbara’s Institute for Social, and society, how society and social groups are
Behavioral, and Economic Research. The center affected by technology, and how social dynamics
is composed of faculty from 13 university depart- impact technological innovation and diffusion.
ments, with diverse disciplinary backgrounds, The CITS also focuses on refining and teach-
who study similar phenomena related to tech- ing the skills involved with developing the next
nology and society. The overarching goal of the generation of researchers, inventors, educators,
CITS is to forward research related to contem- policy makers, and citizens. Through educational
porary information technology across engineer- initiatives, such as a Ph.D. emphasis in technol-
ing sciences, the social sciences, and the humani- ogy and society, and the involvement of under-
ties. Through formal events, public presentations, graduate and graduate students in their research,
informal meetings, and a graduate degree empha- the CITS teaches the skills involved in under-
sis, CITS forwards its mission to apply the knowl- standing trends and evolutions in technological
edge gained from multidisciplinary endeavors to and sociological environments.
understand the multitude of ways that informa- An emphasis on interdisciplinary training and
tion technologies are developed, used, and impact intensive faculty involvement prepares students
contemporary society. for a variety of future careers related to research,
teaching, policy making, and the technology
Core Beliefs and Activities industry. Finally, the center focuses on connect-
Funded by private gifts, the university, and ing people. Through public lectures, conferences,
research grants, the CITS hosts monthly lectures, media outreach, multimedia content on its Web
conferences, workshops, and speakers, and sup- site, and a quarterly newsletter, the CITS engages
ports a variety of working groups. various academic units within U.C. Santa Bar-
The CITS examines the technological develop- bara, other academic institutions, the industry,
ments that are stimulating complex social innova- policy makers, and the public in a broad and vital
tions and profoundly altering the ways that peo- conversation about the multifaceted dynamics of
ple live, work, and interact. Additionally, CITS information technology and society.
research looks at how individuals repurpose and To promote and share the research of the CITS,
reconfigure technologies as they adopt and adapt the center hosts a variety of public events and
to these technologies. A central belief of the speaker series aimed at connecting on-campus
CITS is that multidisciplinary research efforts and off-campus audiences in conversation about
are vital to increase the collective knowledge the role of technology in contemporary life.
and understanding of technologically moderated These presentations center around a wide vari-
cultural transitions and social innovations. It is ety of topics, such as the relationship between
Center for Innovative Media 247

the mind, brain, and virtual reality, communica- Conclusion


tion and consumption, the history and use of air The Center for Information Technology and Soci-
war and drones, the digital divide, and conversa- ety is dedicated to exploring the cultural tran-
tion roundtables with faculty and graduate stu- sitions and social innovations associated with
dents. Presentations sponsored by the center are technology. Through research, activities, and edu-
archived on its Web site and available for viewing cational opportunities, the CITS works to pro-
by the public. The CITS also hosts workshops, duce insight into the relationship between tech-
such as the Santa Barbara Forum on Digital nology and society.
Transitions and the Santa Barbara Social Innova-
tion Design Charrette on Digital Advocacy, that LaChrystal Ricke
bring academics and practitioners together for Sam Houston State University
collaboration.
See Also: Cyberculture; Digital Revolution;
Research Initiatives E-Democracy; Innovation and Technology.
The CITS conducts worldwide investigations of
information technologies and their impact on all Further Readings
aspects of human existence. The center is com- Creeber, Glen and Royston Martin. Digital Culture:
posed of a diverse team of over a dozen research- Understanding New Media. New York: Open
ers who, in addition to conducting research, also University Press, 2008.
organize public forums and facilitate partnerships Doueihi, Milad. Digital Cultures. Cambridge, MA:
with the technological industry and the public Harvard University Press, 2011.
sector. In addition, CITS faculty work to improve McChesney, Robert. Digital Disconnect: How
technological engineering through the incorpo- Capitalism Is Turning the Internet Against
ration of social insight into the process of tech- Democracy. New York: The New Press, 2013.
nological innovation. The center’s research ini- Miller, Vincent. Understanding Digital Culture.
tiatives are diverse and range from explorations Thousand Oaks, CA: Sage, 2011.
of social computing, to the use of technology in Trednnick, Luke. Digital Information Culture:
classrooms, to how technology is used in orga- The Individual and Society in the Digital Age.
nizing community events. The research examines Cambridge, UK: Chandos Publishing, 2008.
many aspects of contemporary social and cultural
transitions, but focuses most specifically on the
distinct areas of civic engagement and the trans-
formation of community, global cultures, and
learning and information literacy. Center for Innovative
The center’s research on civic engagement and
community focuses on social collaboration and Media
dynamic communities. It examines the ways in
which the structures of communities have been The Center for Innovative Media (CIM) at
and will always be inextricably tied to technology. George Washington University (GWU) aims to
This research realizes that human engagement is spark and inspire debate across different media
moderated by the technologies of the Industrial platforms. The center’s flagship projects to date
Revolution and their immediate successors. CITS include the Public Affairs Project, the Documen-
research on global cultures focuses on multidis- tary Center, Conversation Series, and Face the
ciplinary methods for visualizing social and cul- Facts. Each project utilizes social media to begin
tural differences and disparities created by global dialogue surrounding innovative ideas address-
communication technologies. Finally, the center’s ing global challenges.
research on technology in education examines the The Center for Innovative Media is part of the
adoption, application, and most effective use of School of Media and Public Affairs of the Colum-
instructional technology in a variety of educa- bian College of Arts and Sciences at GWU, a
tional environments. coeducational private university in Washington,
248 Center for Innovative Media

D.C. GWU has been ranked one of the top 10 Nina Gilden Seavey, has been in existence for
most politically active college campuses in the more than 20 years. The center offers courses in
country. The programs offered through the School the theory and practice of documentary films and
of Media and Public Affairs reflect this title. The international fellowships and exhibits work from
school offers an interdisciplinary program of new and established directors and producers.
media, public affairs, and politics that focuses on The program has six primary goals: to teach
the changing political landscape in the digital age. documentary filmmaking principles and methods;
produce high-quality films for national and inter-
Flagship Projects and the Influence national audiences; host symposia, seminars, and
of Social Media screenings that foster dialogue about the state of
Planet Forward, a project with the Public Affairs documentary films both past and future; encour-
Project, is a social network in and of itself where age the production of documentary films by global
global issues such as sustainability, climate emerging filmmakers; consult with independent
change, and green energy are discussed and evalu- filmmakers, traditional broadcast outlets, and
ated. The platform goes beyond engaging with emerging outlets on the distribution of films; and
students at GWU to include citizens, scientists, forge a community of new and established film-
experts, and business leaders with opportunities makers at home and abroad.
to discuss issues and, ideally, find solutions. The center’s global presence makes it a force-
As a platform hosting user-generated con- ful figure in the world of public affairs. Similar
tent, Planet Forward allows users to submit their to other projects sponsored by the CIM, it casts
comments and suggestions on a number of cli- aside traditional roles and allows new filmmak-
mate-related topics, such as water conservation, ers, seasoned producers, and independent devel-
nuclear energy, geothermal energy, solar power, opers to discuss films and the state and purpose
science, business factors, campus sustainability, of documentaries.
hydroelectric power, recycling, public transporta- Other CIM research conducted by its associate
tion, and natural gas. Each of the landing pages director Kerric Harvey explores the theoretical
for the different topics features a clickable call- implications and policy usefulness of new media
to-action button to allow users to submit their storytelling formats when they are imported to
ideas and sentiments. Planet Forward tips the online and virtual environments, especially as
traditional top-down format of media by allow- innovative techniques for conflict mediation both
ing for contributors to start the conversations and within and across troubled cultures and com-
compete to find the best ideas. munities. The Halloween 24-Picture Day Project
Also housed in the Public Affairs Project is used the video capture function of everyday cell
the Center for Innovative Media’s Conversation phone cameras as the basis for an interactive eth-
Series, which offers GWU students a unique look nography, in which male and female experiment
at the Washington political and national media participants were able to explore the same city,
landscape with compelling dialogues with leading on the same night, from the perspective of highly
journalists and policy analysts. Students are no contrasting perspectives about urban safety.
longer viewers of a conversation but participants During the watershed 2010 midterm election,
as they have the option to submit questions via the Twitter Election Day Drama and Poetry Proj-
Twitter live during conversations. Frank Sesno, ect explored ways in which Twitter—one of the
director of the center’s Public Affairs Project and fastest growing types of social media—might be
former CNN bureau chief, hosts the live conver- used ethnographically within the political sphere.
sations. Guests on the Conversation Series have An original radio program emerging from this
included Hillary Rodham Clinton, Tom Ridge, experiment was produced at GWV’s Global
Walter Mondale, Chuck Todd, Ted Turner, and Media Institute and enjoyed six broadcasts on
Dee Dee Myers. XM Public Radio (Sirius) and the Federal News
Deemed one of the top 10 documentary pro- Network throughout December 2011.
grams in the country, the Documentary Center, To date, the latest initiative by the CIM is Face
directed by filmmaking Emmy Award–winning the Facts USA, which aims to cut through the
Center for International Media Assistance 249

confusing political rhetoric and provide truth- media and their effectiveness in developing coun-
ful facts to allow for knowledgeable and accu- tries around the world. In addition to assembling
rate discussions. The project seeks to not only work groups, research reports, and events, the
provide accurate information but also facts that CIMA distributes a comprehensive list of digital
are compelling, memorable, and creative. The media information and maintains a bibliographic
primary criteria for facts are that they must be database of international media assistance
relevant and provocative. All facts are developed resources. Ultimately, the CIMA believes that
from a research team with the CIM, screened independent media is critical in the world today
by veteran editors, and verified by professional and works to promote and maintain its presence.
fact-checkers. In 2008, the center’s first report became the first
Face the Facts USA utilizes social media to of its kind to examine the field of media devel-
engage university students and citizens to have opment. Empowering Independent Media: U.S.
conversations. This user-generated site allows Efforts to Foster Free and Independent Media
viewers to host a Face the Facts Discussion, which Around the World spearheaded the organization’s
is a 90-minute conversation with friends, col- mission and provided an in-depth, analytical look
leagues, or community members about a big issue at U.S. international media development efforts.
facing the United States. Face the Facts USA goes The organization differentiates between
beyond traditional fact-checking sites to seek out media development and media for development.
viewer input and choose topics that are compel- According to the CIMA, media development
ling and meaningful to those in the United States. seeks to develop the media sector in a country as
an end in itself, while media for development uses
Marion Jeanette Herbert the media to convey specific messages on issues,
Independent Scholar including health care, poverty reduction, the
environment, and governing. The organization
See Also: Interactive Documentary; Pioneers in affirms that both are needed to achieve balance
Social Media and Politics; Twitter. within the field and be sustainable. For countries
that are struggling economically and politically,
Further Readings the CIMA believes that media assistance is crucial
Brown, James Wilson and James W. Thornton. New in spurring a revival and placing accountability
Media in Higher Education. Washington, DC: on those in charge.
Association for Higher Education, 1963.
Center for Innovative Media. George Washington Developing Countries
University. http://smpa.gwu.edu/CIM (Accessed At home and around the globe, social media
December 2102). has changed how traditional journalists gather
Perse, Elizabeth M. Media Effects and Society. information and has empowered individuals to
Mahwah, NJ: Lawrence Erlbaum, 2001. join the conversation. This is particularly power-
ful in developing countries seeking to gain truth
and promote justice. The CIMA believes digital
media is changing the media landscape in a num-
ber of ways.
Center for In many ways, social media is placing power
in the hands of the powerless. Citizen journalists
International Media have emerged as the population of users world-
Assistance wide accessing the Internet and cell phones has
increased. Ordinary citizens can create blogs,
The Center for International Media Assistance which many turn to instead of traditional news
(CIMA) is an initiative by the National Endow- coverage for breaking coverage or opinion articles.
ment for Democracy, a U.S. nonprofit organiza- Blogs are enormously popular worldwide with
tion that promotes democracy. The center works the CIMA reporting 113 million blogs worldwide
to support efforts of independent journalists and in 2012—with only 36 percent in English. More
250 Center for Internet Studies

important, there is no longer a gatekeeper of what The CIMA hopes that its advocacy efforts will
media are distributed. Users can share and con- not only allow for the continued growth of media
nect with each other and completely bypass tra- in developing countries, but that awareness will
ditional outlets. be raised to the necessity of media assistance for
Many activities, such as violence or corruption, political and economic stability in all countries.
would often go unreported if it weren’t for the
democratization of media and citizens owning cell Marion Jeanette Herbert
phones and capturing scenes and posting to Twit- Independent Scholar
ter or Facebook. It is not that social media nec-
essarily influence or command the public to act, See Also: Activists and Activism, Digital; Blogs;
but it acts as a means for information to spread Citizen Journalism; Egypt; Facebook; Iran; Twitter.
faster and thus organize acts. For instance, many
credit Twitter and Facebook for the swift organi- Further Readings
zation of protesters during the 2009 Iranian elec- Boyd, E. B. “How Social Media Accelerated the
tions. Many news outlets turned to these outlets Uprising in Egypt.” Fast Company (January 31,
to gather information. Similar results occurred 2011). http://www.fastcompany.com/1722492/
in 2011 when word spread on Twitter and Face- how-social-media-accelerated-uprising-egypt
book that protests were scheduled for January 25 (Accessed December 2012).
in Egypt. The social media tools offered a means Center for International Media Assistance. http://
of organization and provided courage to many cima.ned.org (Accessed December 2012).
citizens that perhaps would not dare risk death De Leon, Justin C. and Charlotte R. Jones. Tunisia
or imprisonment without knowing others were and Egypt: Unrest and Revolution. New York:
alongside them. Nova Science, 2012.
Mainwarning, Simon. We First: How Brands and
Noteworthy Reports Consumers Use Social Media to Build a Better
The CIMA has crafted many reports documenting World. Basingstoke, UK: Palgrave Macmillan,
the role of social and digital media in developing 2011.
countries. Digital Media in Conflict-Prone Soci-
eties, released in October 2009, examines how
social media bridges the information void that
so often exists in areas of conflict or war. Politi-
cal unrest makes access to these regions difficult Center for Internet
for traditional journalists, although those who
live in those countries can share their experiences Studies
in vivid manners. Not only is the decimation of
information quicker, but the report notes that dig- The Yale Center for Internet Studies (YCIS) began
ital media tools can foster peace and build com- with the goal of understanding the effects of the
munication systems that foster healthy dialogues Internet on society and the influence of society on
and nonviolent political solutions. the Internet. The YCIS was founded in 1998 by
Social media is significant in developing coun- codirectors David Gelernter and Robert Dunne,
tries not just from a citizen journalist standpoint, computer science professors at Yale University.
however. It also serves as an equalizing factor. Big- While housed in the Department of Computer
ger Cities, Smaller Screens: Urbanization, Mobile Science, the YCIS was an interdisciplinary center
Phones, and Digital Media Trends in Africa exam- that included perspectives from social science,
ines how a farmer in Africa can access the same humanities, business, and law. Building on Yale’s
information via his or her cell phone as a man strength in public policy, the center especially
on Wall Street in New York. The convergence of sought an understanding of public policy as it
African urbanization and technological change relates to the Internet. From its beginnings until
is a major driving force within the country as a the mid-2000s the YCIS hosted research fellows
means of information. and sponsored colloquiums and roundtables
Center for Responsive Politics (OpenSecrets.org) 251

covering such Internet studies topics as the Digital as a diary of your electronic life; every document
Millenium Copyright Act and e-commerce. In you create and every document other people send
its efforts, the YCIS collaborated with other you is stored in your lifestream.” Aspects of time-
universities and technology companies such as oriented streams can be seen in today’s social
Sun Microsystems, IBM, and Mirror Worlds media, for example, in blogs, Rich Site Summary
Technologies. The YCIS is currently inactive. (RSS) feeds, Twitter, and especially Facebook’s
The Center for Internet Studies grew out of the Timeline. In the late 1990s Gelernter and Freeman
strong interest Yale students had in Gelernter and commercialized their lifestream work and founded
Dunne’s Internet-related courses in the late 1990s. Mirror Worlds Technologies, which sold a
By 2001 Internet studies had emerged as an area livestream type of software called Scopeware to
of study at U.S. universities, according to the businesses. However, due to poor sales in 2004 the
Chronicle of Higher Education. In 2001 Brandeis company ceased operations. Gelernter continues to
University offered the first Internet studies be a strong proponent of the lifestream approach
undergraduate major. A few years previously, to computing. At the time of this writing, Gelernter
Georgetown University began a master’s degree and Freeman were working with Lifestreams
program in Internet studies. Also, the Association Technologies Corporation, which is developing a
of Internet Researchers was founded in 1999 and browser-based app (see Lifestreams.com).
the Oxford Internet Institute in 2001.
In this milieu, Gelernter and Dunne established William Hart
the YCIS. Dunn, a popular professor at Yale, Norfolk State University
taught courses on the Internet and law. The courses
covered such topics as constitutional rights on the See Also: Oxford Internet Institute; Social
electronic frontier, censorship, and privacy. Dunne Networking Web Sites.
codirected the center and taught his courses until
his untimely death in 2008. A textbook based Further Readings
on his course was finished and posthumously Gelernter, David. “The End of the Web, Search, and
published in 2009 as Computers and Law. As Computer as We Know It.” Wired (July 17, 2013).
an attorney, Dunne also served as legal counsel http://www.wired.com/opinion/2013/02/the-end
to then new Internet companies, including Mirror -of-the-web-computers-and-search-as-we-know-it
Worlds Technologies, a company that sponsored (Accessed July 2013) .
the YCIS and was cofounded by Gelernter. Gelernter, David. Mirror Worlds, or The Day
The New York Times called Gelernter a Software Puts the Universe in a Shoebox: How It
“rock star” of the computing world. Bill Joy, the Will Happen and What It Will Mean. New York:
founder of Sun Microsystems, referred to him as Oxford University Press, 1991.
a computer science visionary. Gelernter’s 1991 Gelernter, David and Eric Freeman. “The Yale
book Mirror Worlds foretold the World Wide Lifestreams Project Page.” http://cs-www.cs.yale
Web, search engines, and aspects of social media. .edu/homes/freeman/lifestreams.html (Accessed
In 1993, in response to the book, Ted Kaczynski, July 2013).
also known as the Unabomber, sent Gelernter a
mail bomb that severely burned Gelernter and
caused permanent damage to his right eye and
right hand. Kaczyncki opposed technological
advances and the ill effects he saw that they Center for
brought on society.
In the mid-1990s, along with a Yale Ph.D. Responsive Politics
student, Eric Freeman, Gelernter used concepts
from his book to develop a new paradigm of
(OpenSecrets.org)
computing. Instead of the space-oriented desktop Money being sourced into the political arena can
metaphor of personal computing, they proposed “a lead to some voices being heard louder than oth-
time-ordered stream of documents that functions ers as donors attempt to influence voters, elected
252 Center for Responsive Politics (OpenSecrets.org)

officials, and legislation. With Americans more Society of Professional Journalists have taken
concerned than ever about the transparency of advantage of this training.
their government, the Center for Responsive Poli- Researchers using the center’s databases can
tics, a social media outlet, has altered mainstream identify which political candidates are receiving
political agendas when reports on the OpenSe- money from interest groups, such as tracking
crets Blog broke national news, such as stories the patterns of tobacco company contributions
on health care reform and political donations to over the past 10 years. For each interest group,
National Football League teams. a contribution breakdown by type and political
The center, headquartered in Washington, D.C., party that dates back to the 1990 election cycle is
provides a comprehensive unbiased resource on provided. Also available is a list of companies by
federal campaign contributions and lobbying industry that have provided the most combined
data, mainly through its Web site www.Open political support through their employees and
Secrets.org. The analyses that are generated shed political action committees. Other data available
light on money spent to influence both federal include special interest group and lobbyist spend-
elections and the policies that have an impact on ing. Donations to and campaign contributions
Americans. Their nonpartisan goal is to advocate from political action committees are detailed.
for a transparent and responsive government. Committees with foreign connections are identi-
The Center for Responsive Politics was founded fied. Advocacy group spending is revealed. Can-
in 1983 by U.S. Senators Frank Church (D-ID) didate spending on elections, including those who
and Hugh Scott (R-PA). Before widespread use of have dropped out, is profiled. Financial profiles,
the Internet, the center revolutionized the world investments, and personal finances of politicians
of politics by publishing books that reported the are overviewed, including an identification of
spending patterns of interest groups and major the most wealthy members of Congress. Users
industries, including the patterns of political can even learn which public relations firms have
action committee spending. This momentous task signed former White House employees and which
had never before been undertaken by any other interest groups are hiring former members of
organization. Congress to lobby on their behalf.
OpenSecrets.org, launched in 1996, is a clear- The center also follows giving that is not man-
inghouse for data and analyses on political dollars, dated to be registered. For example, researchers
such as outside spending, federal lobbying monies, provide reports that break down the spending
federal earmarks, and personal finances of elected by politically active nonprofits. The center also
officials. The Web site has received many awards, identifies trends, such as how the earmarks for
including the 2011 Online Journalism Award as federal funding for organizations, companies,
well as several Webby Awards. Along with sev- projects, and groups are linked to political bud-
eral full-time researchers, it employs reporters, gets. The financial support of these congressional
office personnel, outreach staff, and interns that earmarks is also identified. Additionally, political
work to accomplish its mission. The organiza- party fund-raising is overviewed, individual and
tion is overseen by a board of directors, which soft money contributors are listed, and the most
includes financial moguls, professors, attorneys, expensive races and campaign contribution lim-
and advocates. its are identified. A local feature provides profiles
The bulk data sets, provided at no charge by by city, by zip code, and graphically for the lay
the center, are frequently used by journalists researcher.
and academics. OpenSecrets.org is often cited The center earns income through custom
by major news corporations, such as CNN, the research services and licensing data for commer-
New York Times, and National Public Radio. cial use to provide capital to operate and to sup-
The center offers workshops on how to conduct port legislation that advocates for continued gov-
computer-assisted research, how to responsibly ernmental transparency. The center also receives
report data, and how to best use OpenSecrets outside funding through a combination of grants
.org. Organizations such as the Wall Street Jour- from foundations and individual donations. No
nal, the National Press Foundation, and the contributions are accepted from businesses, labor
Center for Social Media 253

unions, or trade associations. Its most sizable public events exploring the fast-changing envi-
charitable donations are received from the Ford ronment of public media.
Foundation, the MacArthur Foundation, the
Open Society Foundations, the Rita Allen Foun- Initiatives
dation, the Rockefeller Brothers Fund, and the A primary goal of the center is to investigate and
Ham Rove Memorial Fund of Coastal Commu- set standards for socially engaged media-making.
nity Foundation of Stephen Colbert. In December Through its work, it helps create codes of best
2011, the total assets of the center were reported practices for many forms of media and incubates
on its Internal Revenue Service form 990 as media strategies. The center focuses on encour-
$1,802,834. aging a public media environment that supports
Through education and outreach, a free and civil society and democracy and promotes ways
accessible database, research and analysis, and a to use media as creative tools for public knowl-
custom research service, the Center for Respon- edge and action. While a great deal of the center’s
sive Politics allows users to explore the connec- work focuses on the evolution of documentary
tions between money and politics. The center is films and video in a digital era, it also maintains
positioned to continue to be one of the premier a Web site that serves as an information clearing-
social media outlets in revolutionizing politics for house for filmmakers, activists, and scholars.
years to come. The center’s Web site provides information
and best practices on fair use and free speech for
Kristen L. Majocha documentarians, media practitioners, and educa-
University of Pittsburgh at Johnstown tors. This information is designed to help indi-
viduals better interpret and apply fair use under
See Also: Data.gov; Influence on Elections; U.S. copyright law and to understand how and
Lobbyists; Special Interest Campaigns; Tranparency. when it is legal to use copyrighted material in
media projects. This information also serves as
Further Readings a useful tool for media criticism and freedom of
Crouse, Angie and the Center for Responsive expression. In collaboration with the Washington
Politics. The Blue Pages, 2nd Ed.: A Directory of College of Law, the information on the Web site
Companies Rated by Their Politics and Practices. provides tools for media creators, teachers, and
Sausalito, CA: PoliPointPress, 2010. researchers to better practice their fair use rights.
OpenSecrets.org, “About Us.” http://www.open The center also provides teaching materials, codes
secrets.org/about (Accessed June 2013). of best practices, documents, and online videos to
help individuals best enact the fair use doctrine.
In addition, the center provides users a wealth
of information regarding best practices for mul-
tiple types of media education and production.
Center for Social Information is provided regarding effective appli-
cation of OpenCourseWare (OCW) for academic
Media and research libraries. The OCW movement is
part of a larger open educational resources (OER)
The Center for Social Media at the School of movement that strives to provide high-quality
Communication at American University in Wash- digital education tools and resources freely and
ington, D.C., was founded in 2001. Through openly to anyone with Internet access. The infor-
partnerships with many organizations, such as mation provided by the center assists educators
the National Alliance for Media Arts and Culture, in making course material available as widely as
Filmmakers Collaborative, the Public Broadcast- possible to public-access users.
ing Service (PBS), the American Civil Liberties The center also provides information on best
Union, Filmmakers for Conservation, and Cen- practices for media literacy education and jour-
ters for Environmental Filmmaking, the Center nalism (both practical and theoretical). A media
for Social Media produces research and hosts literacy guide identifies principles that adhere to
254 Center for Social Media

contemporary community consensus regarding librarians, archivists, scholars, lawyers, and new
acceptable practices for use of copyrighted mate- media experts convened to discuss the repurpos-
rials whenever and however they occur. Draw- ing of audiovisual elements in a digital era. Top-
ing upon interviews from practicing and former ics included problems with third-party rights, the
journalists, the center produced a report for jour- challenges and opportunities of digital rights man-
nalists and educators detailing the ways in which agement (access control technologies that are used
journalists should encounter copyright issues and by hardware manufacturers, publishers, copyright
how these issues can affect the practice of journal- holders, and individuals with the intent to limit
ism as a field. The report provides examples about the use of digital content and devices after sale),
the cost of not understanding proper copyright and use of contracts.
implementation in daily journalistic practices and The Web site also provides the public with access
provides suggestions for avoiding unnecessary to timely documentaries on issues of social con-
mistakes. The information is also geared toward cern and importance. These documentaries cover
assisting journalists in asserting proper journalis- a variety of topics, such as terrorism, homophobia
tic principles when making fair use decisions. and gay rights, the role of U.S. women in military
Focusing on one of the center’s primary areas combat, and preventing sexual violence. The Web
of expertise, the Web site also offers substantial site also provides video focus group interviews
information for filmmakers and online video pro- with established documentary filmmakers.
ducers regarding the best practices in the making
of online video and the application and interpre- Conclusion
tation of fair use in this process. The center has The Center for Social Media showcases and ana-
also coordinated with documentary filmmakers lyzes media for public knowledge and action.
and professional associations to produce a clear The center aims to help media creators, practitio-
and precise statement of fair and reasonable ners, students, and educators understand the best
approaches to fair use. practices for engaging with media in their fields.
The center also provides reports on various Through research, resource material, film screen-
topics, such as ethical challenges in documentary ings, conferences, and other events, supports its
filmmaking, practices for sustainable filmmaking, mission to investigate, showcase and set stan-
the evolution of public engagement, understand- dards for socially engaged media-making.
ing documentary audiences, creating truly public
media, digital storytelling, socially engaging pub- LaChrystal Ricke
lic access projects, and policy guides for indepen- Sam Houston State University
dent filmmakers.
See Also: Cyberculture; Digital Revolution;
Events and Documentaries Documentaries, Social Media, and Social Change;
In addition to providing media creators, practi- Innovation and Technology; Television and Social
tioners, and educators with a wealth of free infor- Media.
mation through its Web site, the center also hosts
conferences, film screenings, and other public Further Readings
events. The center’s Media that Matters confer- Aufderheide, Patricia and Peter Jaszi. Reclaiming
ence shares with participants cutting-edge prac- Fair Use: How to Put Balance Back in Copyright.
tices designed to assist established and aspiring Chicago: University of Chicago Press, 2011.
filmmakers, nonprofit organizations, funders, and Creeber, Glen and Royston Martin. Digital Culture:
students. Workshops at this conference include Understanding New Media. New York: Open
media entrepreneurship and understanding and University Press, 2008.
applying fair use, and also offer participants the Hansen, Mark. New Philosophy for New Media.
opportunity to showcase current projects for pre- Cambridge, MA: MIT Press, 2004.
sentations and critique at group strategy sessions. Postigo, Hector. The Digital Rights Movement:
At the center’s Repurposing and Rights: A Non- The Role of Technology in Subverting Digital
Profit Summit conference, public broadcasters, Copyright. Cambridge, MA: MIT Press, 2012.
Center on Public Diplomacy 255

Center on Public with the U.S. Department of State, as well as other


think tanks, institutes of higher education, and for-
Diplomacy eign ministries throughout the world. In 2013, Jay
Wang, associate professor of public relations at the
The Center on Public Diplomacy (CPD) is located USC Annenberg School of Communication and
in the Annenberg School of Communication at Journalism, became the new CPD director.
the University of Southern California (USC) in As part of their dedication to advancing schol-
Los Angeles, California. The CPD is dedicated arship, the CPD has developed programs and pub-
to advancing the study and practice of public lications that support public diplomacy research
diplomacy through the organization of programs initiatives. For example, in 2009 a competitive
and events that focus on teaching, training, and international research fellows program was estab-
research development. The CPD is frequently lished. This program provides opportunities for
acknowledged in international publications and six nonresident fellows to conduct research in
was honored with the prestigious U.S. Depart- their distinct areas of specialization. More spe-
ment of State’s Benjamin Franklin Award for Pub- cifically, each fellowship is designated for two
lic Diplomacy in 2008. years and provides recipients with a stipend and
The CPD was established in 2003 as a partner- student assistants to support his or her given
ship between the Annenberg School for Commu- research agenda. Fellows are expected to pres-
nication and Journalism and the School of Inter- ent their research in public forums at USC, and
national Relations at USC. As pronounced in its to publish in the center’s various publication out-
mission statement, the CPD “seeks to advance lets. In addition to the Research Fellows program,
and enrich the study and practice of global pub- the CPD also hosts visiting scholars from around
lic diplomacy through its research and publica- the world, which include one U.S. Public Diplo-
tion programs, professional training and public mat in Residence, and a Canada-U.S. Fulbright
events.” This mission is reflected in the organiza- Visiting Research Chair in Public Diplomacy. The
tion’s five-year strategic plan that was established CPD publication program supports individual and
in January 2011. The plan highlights the following collective research through its production of the
five strategic objectives: (1) to strengthen public CPD blog, books and reports, book reviews, a
diplomacy scholarship, (2) to increase midcareer magazine, an e-newsletter, and a monthly online
training programs, (3) to enhance outreach efforts
to develop international networks, (4) to design
an organizational structure and facility to sup-
port CPD initiatives, and (5) to expand the CPD’s
funding base. Increasingly, even the most basic
public diplomacy skill set includes the ability to
work deftly, comfortably, and strategically with
social and online media, a situation that mirrors
changes in the practice of “traditional diplomacy”
as implemented by Hillary Clinton’s social media-
intensive update of State Department activities.
A diverse range of individuals including an advi-
sory board, staff, student interns, research fellows,
and contributing scholars support the operation of
CPD projects. Additionally, more than 40 USC Uni-
versity Fellows are involved with the center from a
variety of academic disciplines including commu-
nication, engineering, cinema, religion, and medi- The Center on Public Diplomacy’s 2008 Summer Institute
cine. Professor Philip Seib served as the director of in Advanced Public Diplomacy was an immersive, intensive
the center from 2009 to 2013. During his leader- two-week course designed to combine traditional classroom
ship, Seib helped strengthen the CPD’s relations instruction with collaborative hands-on exercises.
256 Chaffetz, Jason

review PDiN Monitor. It also publishes CPD Per- Sciences’ School of International Relations. The
spectives on Public Diplomacy, which is a series of MPD degree is designed to provide students with
papers that showcase critical thinking about the public diplomacy training for careers in public ser-
study and practice of public diplomacy. vice, nongovernment organizations (NGOs), and
CPD has hosted several conferences that con- corporate business. Students accepted to this pro-
front significant issues and themes in international gram complete a number of required courses on
diplomacy. Its first conference, The Public Diplo- historical and comparative approaches to public
macy and World Public Opinion Forum, was held diplomacy, global issues and public diplomacy, and
in Washington, D.C., in April 2006. This event a practicum in public diplomacy research. Curric-
allowed practitioners, politicians, public opinion ular objectives for the MPD program emphasize
pollsters, and academics to collaborate to develop the role of nonstate actors, global public opinion,
informed recommendations for improving public international news, and international communica-
opinion research. Since this time, multiple confer- tion as they relate to public diplomacy processes.
ences have been organized on the USC campus to Since its inception, the CPD has become inter-
discuss critical issues surrounding public diplo- nationally recognized as a productive leader in
macy in international affairs and conflicts. Con- the field of public diplomacy scholarship. With
ference themes have addressed global events such support from academic, corporate, government,
as the peace process in Northern Ireland, Ameri- and public policy circles, the CPD exists as a cen-
can military and public diplomacy in Africa, and tral organization for practitioners and leaders to
the 2008 Beijing Olympics. Additionally, distinct collaborate and contribute to the advancement of
forums have been organized to address the top- public diplomacy research and practice.
ics of science, faith, water, and media in rela-
tion to public diplomacy. For example, in March Stephanie E. Bor
2013 CPD hosted a conference on international University of Utah
broadcasting in the social media era. This meeting
allowed practitioners, policy makers, broadcast- See Also: Clinton, Hillary; Digital Diplomacy;
ers, and social media experts to engage in panels Education, Issues in; Institute for Public Diplomacy
and conversations that examined the role of trans- and Global Communication; International Social
forming media venues in relation to the design and Media and Politics; Polling; Social Media, Definition
implementation of public diplomacy programs. and Classes of.
The CPD is also dedicated to supporting con-
tinuing education for midcareer public diplo- Further Readings
macy professionals. Since 2005, the center has Potter, E. H., ed. Cyber-Diplomacy: Managing Foreign
offered a Summer Institute in Public Diplomacy. Policy in the Twenty-First Century. Montreal:
This annual two-week intensive training program McGill-Queens University Press, 2009.
offers professionals opportunities to collaborate USC Center on Public Diplomacy. “USC Center on
with international colleagues from various back- Public Diplomacy at the Annenberg School.” http://
grounds, and to study strategies for improving uscpublicdiplomacy.org (Accessed May 2013).
their country or organization’s image and impact Wilson D., Jr. Digital Diplomacy: U.S. Foreign Policy
in the world. Distinguished public diplomacy in the Information Age. Washington, DC: Center
experts facilitate courses covering a range of top- for Strategic and International Studies, 2001.
ics including cultural diplomacy, influence and
credibility, and soft power and public diplomacy.
Participants also learn critical tools for advancing
their effectiveness in crisis communication, digital
diplomacy, international exchanges, nation brand- Chaffetz, Jason
ing, public opinion, and strategic communication.
The CPD also features a Master of Public First elected to public office in 2008, Jason Chaf-
Diplomacy program (MPD) that is offered in part- fetz is the U.S. representative for the 3rd Con-
nership with the USC College of Letters, Arts and gressional District of Utah. He is a conservative
Chaffetz, Jason 257

Republican and has formally identified as such of resources and formal campaign infrastructure.
since 1990, the year he met Ronald Reagan. Chaf- However, Chaffetz achieved a major upset victory
fetz first served in politics in 2004 as campaign in the June 2008 primary, defeating Cannon with
manager and later chief of staff for Jon Huntsman 60 percent of the vote.
who became Utah’s governor in 2005. Chaffetz’s victory was surprising for many rea-
In late 2005, Chaffetz reentered the private sec- sons. Cannon had the endorsements of President
tor to manage his corporate communications and George W. Bush, U.S. Senators Orrin Hatch and
marketing business, Maxtera Utah. From then Bob Bennett, and the vast majority of all Utah
until 2008, Chaffetz was a Utah Valley University Republican officials. Furthermore, Cannon spent
trustee, the chairman for the Adjutant General in approximately six times what Chaffetz did in
Review Board of Utah’s National Guard, and a the campaign. Chaffetz took a hard stance against
member and later president of the Planning Com- requesting earmarks based on his fiscal conserva-
mission of Highland City, Utah. tism, and this position caused some controversy
during the race. In the November election, Chaf-
2008 Election fetz won 66 percent of the vote.
On January 1, 2007, Chaffetz publicly announced
that he would be investigating the possibility First Term in Office
of running for Congress in 2008. His principle As the 2009 congressional term began, Chaffetz
Republican opponent would be Chris Cannon, a announced publicly that he would not have an
six-term veteran of Congress. He officially entered apartment in Washington, D.C. Instead, he would
the Republican primary race on October 1, 2007, sleep in a cot in the closet of his office, and his
as did David Leavitt. Also on the first of October, family would remain in Utah. This was a demon-
Leavitt’s campaign announced that it had already stration of both his loyalty to and allegiance with
generated $100,000 of funding for his bid for Utah and his fiscal philosophy. Chaffetz argued
Cannon’s seat, more than twice what Chaffetz had further that he wanted to be a living example of
raised up to that point. Leavitt was a family legacy how Congress ought to function and that his peers
in local politics as the brother of Michael Leavitt; could and should similarly cut their budgets on
Michael was a cabinet member of the Bush admin- behalf of their constituents. Chaffetz also began
istration and a three-term governor of Utah. By the tradition of Cotside Chats on his Web site in
March 2008, a Utah poll indicated that Chaffetz the style of Franklin Roosevelt’s Fireside Chats.
enjoyed only 4 percent support in the race. Upon Barack Obama’s receipt of the Nobel
In March 2008, almost 1,200 delegates were Peace Prize in 2009, Chaffetz criticized the award
elected in Chaffetz’s 3rd District. Chaffetz as meaningless.
announced to the delegates by mailer that his plan In late 2009, Chaffetz and his fellow Congress-
for his campaign was going to be radically differ- man Jim Matheson cosponsored a bill designed to
ent than the traditional money-centered variety. prevent the import of nuclear waste into the United
Instead, Chaffetz committed to running for office States. This position was opposed by Utah’s two
without a campaign office, paid staff, or polling. senators, Bennett and Hatch. Also in late 2009,
His goal was to spend approximately $70 to $80 Chaffetz promulgated legislation restricting the
per delegate for the campaign in its entirety. Chaf- use of full-body scanning technology in American
fetz reasoned that a candidate’s spending on the airports to cases in which metal screenings indi-
election was likely to reflect how he or she would cated that more screening was necessary. Chaf-
perform in office and set out to show his fiscal fetz was critical of the increase in troops sent to
conservatism as an asset. Afghanistan by President Obama; his criticism
Chaffetz promulgated a campaign based on arose from his perception of a lack of policy and
far-right values and held more conservative posi- exit strategy for the Afghanistan conflict.
tions than Cannon. Opponent David Leavitt, rep-
resenting the opinion of many in his party, indi- Latter Elections and Terms
cated to the press that Chaffetz had no chance to Video footage of Chaffetz critiquing President
win the Republican nomination based on his lack Obama’s progress and choices at a January 2010
258 Chaffetz, Jason

meeting garnered extensive coverage in the media a winning sports team. Chaffetz believes that such
and went viral online. There is little doubt that matters are not important enough to take up the
one reason the video went viral was the social time of members of the House.
media network maintained by Chaffetz. Later in
2010, Chaffetz ran against Democrat Karen Hyer Social Media Use
and several third-party candidates and won with One of the primary strategies Chaffetz employed
72 percent of the vote. He was endorsed by the during his campaign was to make his social media
Salt Lake Tribune. presence strong. Chaffetz managed his social
In 2011, Chaffetz sponsored the ultimately media accounts himself and used them frequently;
unsuccessful Cut, Cap, and Balance Act of 2011, as of December 2012, all of his Facebook posts and
also known as HR 2560. The act would have cut tweets were all composed by him personally. His
discretionary spending for the fiscal year 2012 to use of social media made Chaffetz more appealing
$31 billion below that of 2011. HR 2560 also to a younger voting bloc, as did his appearance on
appropriated only $126.5 billion for war. Overall, The Colbert Report in January 2009. There, he
the act was designed to reduce federal spending to was featured in the “Better Know a District” seg-
21.7 percent of the U.S. gross domestic product ment and consented to a leg-wrestling match with
(GDP) by 2013 and 19.9 percent by 2021. host Stephen Colbert, which he lost.
Chaffetz revealed a proposal for Social Secu- Upon taking office, Chaffetz attributed his suc-
rity reform in late 2011. The proposal included cess to strong principles and policies alongside
seven elements including the calculation of yearly determination and strategic use of social media.
cost of living increases (COLAs) with the use of a Chaffetz called keeping abreast of technical trends
chained consumer price index for workers (CPI-
W). It also increased the standard age of retire-
ment and added means testing for beneficiaries in
high-income brackets. The overall purpose of the
reforms proposed would be to continue growth of
the Social Security program but slow that growth
to avoid insolvency and excessive debt.
Chaffetz was a strong supporter of Mitt Rom-
ney during the 2012 presidential campaign and
followed Romney’s opponent, Newt Gingrich,
during the primaries in order to voice his support.
In September 2012, the United States diplo-
matic mission in Benghazi, Libya, was attacked
by armed intruders. Several Americans were
killed in this attack. Chaffetz sat on the House
Oversight and Government Reform Committee
that reviewed the U.S. government’s reactions to
this attack and was vocal in his criticism of the
White House’s and State Department’s manage-
ment of the crisis. His committee released more
than 100 pages of internal State Department
documents concerned with the Libya attack to
the public, which included names of Libyan activ-
ists who worked with the United States. Chaffetz
maintained that the information released was not
classified and therefore was eligible for release.
Chaffetz promised at the outset of his term to Representative Jason Chaffetz returns his safety equipment after
refuse to vote on resolutions that he calls trivial. observing the demolition of an unsafe building in Port-au-Prince,
An example would be a resolution to congratulate Haiti, on March 29, 2011, after the January 2010 earthquake.
Chaffetz, Jason 259

paramount and discussed his social media use, One key difference in the way that Jason Chaf-
describing his success as the “worst nightmare” fetz uses social media, however, is that he uses his
of Congress. According to Chaffetz, this was true own voice and is active himself on his pages. This
because his win proved that campaigns could be is apparent to his followers and opponents alike,
successful without excessive spending, and this and it means several things. Ultimately, followers
reality was a threat to officials running more tra- are more motivated to interact on his pages know-
ditional campaigns. ing that they will actually be interacting with him.
Chaffetz also sees attention to social media and Also, when his content is reposted, retweeted or
technical trends as his means of distinguishing his otherwise shared, it is content that originates with
work from that of his peers. him. Because his content is not just curated from
Chaffetz is very active on Twitter and Facebook other sources, his reach is more meaningful.
and also has a YouTube channel featuring a large A 2012 Pew research study showed that
amount of content. His philosophy on using these younger groups of social media users are far more
social media outlets is that they allow outreach likely to use social media platforms as tools for
and connection to voters and the people whom he civic engagement. These users are also somewhat
represents. Chaffetz has stated that it is important more likely to identify as liberal or Democratic.
to him to ensure that his constituents can reach This means that a politician like Jason Chaffetz
him directly and refuses to erect bureaucratic has a real opportunity to fill a space that is mostly
strata around himself. vacant: conservative politicians appealing to a
Chaffetz chooses to post and tweet personally younger constituency through the strategic use of
on Facebook and Twitter, respectively. His pub- social media. This is apparently an opportunity
lic rejection of outsourcing these tasks has distin- that Chaffetz plans to continue to capitalize upon.
guished him from most of his peers, increased his
appeal to younger voters, and broadened his reach Karla Lant
for election purposes. His use of social media also Northern Arizona University
makes him abundantly accessible to constituents.
Chaffetz has stated that he believes his constitu- See Also: Bachmann, Michele; Cantor, Eric; Ryan,
ents can relate to him as a person based on his Paul.
social media presence.
Chaffetz argues that politicians who do not uti- Further Readings
lize social media in this way are living in the 20th Bufkin, S. “Jason Chaffetz Admits House GOP Cut
century and eschewing opportunities to interact Funding For Embassy Security: ‘You Have to
with their constituencies. He states that there is Prioritize Things.’” Huffington Post. http://www
no excuse to underutilize this free form of com- .huffingtonpost.com/2012/10/10/jason-chaffetz
munication for politicians. -embassy_n_1954912.html (Accessed December
Various social media sentiment or popular- 2012).
ity indexes have data for Jason Chaffetz. As of Chaffetz, J. “Freshman Rep: Social Media Is 21st
December 2012, Poleet reported that Chaffetz Century Route to Victory.” CNN.com (2009).
had approximately 32,000 followers on Twitter http://www.cnn.com/2009/POLITICS/10/29/
and a Klout score of 81. According to Klout, such chaffetz.social.media/index.html (Accessed
a score indicates a high level of influence in the December 2012).
social media realm and is calculated using things Chaffetz, J. Jason Chaffetz Campaign Web Site. http://
like number and quality of social media interac- www.jasonforcongress.com (Accessed December
tions. Some experts argue that social media did 2012).
not have as much impact in the 2012 election Chaffetz, J. Jason Chaffetz, Facebook Page. https://
cycle as it did in the 2008 cycle, in part because www.facebook.com/pages/Jason-Chaffetz/
mainstream politicians learned to do things like 212373730233 (Accessed December 2012).
flood the Internet with their own content at the Chaffetz, J. Jason Chaffetz Twitter Page. @JasonIn
right times so that dissenting content would be TheHouse. https://twitter.com/jasoninthehouse
drowned and remain unheard. (Accessed December 2012).
260 Change.gov

Chaffetz, J. “Jason in the House.” YouTube Channel tools such as Facebook, Twitter, and YouTube. His
of Jason Chaffetz. http://www.youtube.com/user/ use of these tools did not end after Election Day
JasonChaffetz (Accessed December 2012). on November 4, 2008, but continued throughout
Chaffetz, J. U.S. Congressman Jason Chaffetz Official the transition. Change.gov was a transitional site
Web Site. http://chaffetz.house.gov (Accessed that was used to continue President-Elect Obama’s
December 2012). digital presence and keep his millions of online fol-
Civic Impulse, LLC. “Representative Jason Chaffetz.” lowers engaged in the process.
GovTrack.Us. http://www.govtrack.us/congress/ The U.S. General Services Administration man-
members/jason_chaffetz/412270 (Accessed ages presidential transitions (the time between
December 2012). election day and the inauguration of the president-
Groubal Community Sentiment Index. “Jason elect) as outlined by the Presidential Transition
Chaffetz: Popularity.” http://www.groubalcsi.com/ Act of 1963 (P.L. 88-277), 1998 (P.L. 100-398),
score/jason-chaffetz (Accessed December 2012). and 2000 (P.L. 106-293). Before 2008, much of
Hersh, J. “Jason Chaffetz Has No Regrets on the transition occurred behind closed doors with
Sensitive Libya Documents Dump.” Huffington prominent appointments to cabinet positions
Post. http://www.huffingtonpost.com/2012/10/23/ announced via news media—television, radio, or
jason-chaffetz-libya-documents_n_2006856.html newspapers. Change.gov marked the first time that
(Accessed December 2012). citizens were not only kept abreast of the transi-
OhMyGov. “Jason Chaffetz.” http://ohmygov.com/ tion, but also invited to become involved in the
accounts/Person/73-jason-chaffetz/summary transition in an effort for government transpar-
(Accessed December 2012). ency. The campaign of 2008 was a campaign of
Peterson, E. “Scanning Jason Chaffetz’s Inner Being, firsts. The first African American president was
From Godless California Democrat to the Tea elected. He used social media and Web 2.0 tools
Party Prince of Utah.” City Weekly (2011). http:// during the campaign to raise funds, organize
www.cityweekly.net/utah/article-14211-chaffetz grassroots communities, and mobilize an unprec-
-revealed.html (Accessed 2012). edented number of young voters. He was the first
Project Vote Smart. “Representative Jason Chaffetz’s president to select a chief technology officer to the
Biography.” http://votesmart.org/candidate/ cabinet, signifying plans to continue using tech-
biography/103482/jason-chaffetz#.UMPxg5PjmNx nology in government.
(Accessed December 2012).
Smith, T. “Social Media and American Politics: Overview of the Site
Study.” Computer Business Review. http://www. The goal of social media and Web 2.0 tools is to
cbronline.com/blogs/cbr-rolling-blog/social-media- provide a mechanism for collaboration and con-
and-american-politics-study-221012 (Accessed versation that builds a community without limits
December 2012). or restrictions of location and time. Change.gov
utilized this by allowing users to ask questions of
the newly elected administration. Change.gov fea-
tured a Newsroom with a blog and a press room
where ideas were shared and questions answered;
Change.gov a Learn section with information about the tran-
sition, the administration, and inauguration and
Change.gov was a Web site created by the office biographical information about the president-elect
of the president-elect, Barack Obama, “to lay out and vice president-elect; and an Agenda section
the agenda and priorities for the Obama Admin- that featured major policy issues—the same issues
istration.” The site was operational November that were presented during the campaign. To con-
5, 2008, to January 20, 2009. Information was tinue the encouragement of public involvement,
provided on this Web site to keep the transition the site also featured an area for citizens to share
process transparent. It has been repeatedly noted their Story and Vision as well as submit their ideas
that President Barack Obama won the presidency to the president via the Citizen’s Briefing Book. It
because of his use of social media and social media also featured links to America Serves, which asked
Change.gov 261

Americans to serve as volunteers in their commu- Web sites and noted by political commentators.
nities by signing up on the site, and Jobs, where As a result, President-Elect Obama was asked this
applicants could submit their personal information question during an interview with George Stepha-
as a first step in applying for a position. By the end nopoulos of ABC’s This Week. This controversy
of December, only two months after the election, shows how social media can referee open govern-
the site had received over 140,000 job applicants, ment. The transcript of that question and the rest of
and by Inauguration Day had received 400,000. the interview were posted on Change.gov.
The site provided a link to USAjobs, a govern- The numbers during the transition show that
ment site for federal employment, which received interest from the public continued after the presi-
an additional half-million visits (from 2.3 million dential election. Transitional sites such as Change
weekly visits in summer 2008 to 2.8 million during .gov have been visited by 15 percent of all Ameri-
the time Change.gov was active). Your Seat at the cans, including 10 percent of John McCain–Sarah
Table allowed citizens to see the groups meeting Palin voters. About 27 percent of Obama voters
with the transition team. In keeping with the shar- went online to either participate in the transi-
ing quality that is common of most social media tional process or learn more about the transition.
tools, Change.gov changed its traditional copy- More than 4,000 users participated in the health
right notice to include a Creative Commons license care discussion on Change.gov. During the first
that allowed users to share and repost the content. round of open questions on Change.gov’s Open
for Questions, 20,000 users submitted 10,000
YouTube Presidency questions and 1,000,000 votes. The second round
Another first with Change.gov was the medium of open questions generated 76,031 questions
used to deliver the weekly presidential address. from 103,512 users with 4,713,083 votes.
Then-President-Elect Obama delivered the usual
radio address and used YouTube and other video Conclusion
platforms as well to post a video of the address on Change.gov showed that despite security and legal
the transition Web site. As of August 2012, his first issues, social media can be used to promote govern-
address (http://www.youtube.com/watch?v=Zd8 ment transparency and a more democratic form of
f9Zqap6U) on November 15, 2008, was viewed government through citizen participation. Change
1,082,502 times on YouTube. YouTube was also .gov was a Web site used to keep citizens apprised
used to generate discussion and answer questions of developments of the transition and involved
posed by citizens. Another feature of Change.gov in that transition. The site and its premise set a
was Join the Discussion. The policy team shared precedent that will likely continue. Because social
videos and requested feedback from citizens. This media happens in real time, it must be noted that
may have appealed to users as it had the same struc- the transitional site of Change.gov ended at 12:01
ture as a Facebook post with threaded comments. p.m. on Inauguration Day—a minute after Obama
Another feature of the Web site was Open for Ques- became the presiding president. It was replaced by
tions. Press Secretary Robert Gibbs responded to President Obama’s WhiteHouse.gov.
the most popular questions via a video post using
YouTube and other video platforms. La Loria Konata
Georgia State University
Controversy and the Numbers
Open for Questions asked citizens to submit ques- See Also: Activists and Activism, Digital; Campaigns,
tions to the administration. The most popular ques- 2012; Innovation and Technology; International
tions would be answered and would be determined Online Communities; International Unrest and
by the number of votes garnered. One question was Revolution.
if the administration would investigate the “grav-
est crimes” of the George W. Bush administration. Further Readings
Initially, it was ignored and later it was errone- “Change.gov.” Economist, v.389/8606 (2008).
ously posted that the question had been previously Cogburn, D. L. and F. K. Espinoza-Vasquez. “From
answered. This response was featured on other Networked Nominee to Networked Nation:
262 Change.org

Examining the Impact of Web 2.0 and Social The initial function of the Web site provided an
Media on Political Participation and Civic avenue for support of social causes or charities
Engagement in the 2008 Obama Campaign.” through online petitions and pledges. Although
Journal of Political Marketing, v.10/1 (2001). this idea still exists at the core function of the
Elin, G. “Yes We Can. . .Use Comments, Web site, the creators of Change.org found it neces-
Services on Government Web Sites.” Sunlight sary to differentiate it from other online petition-
Foundation Blog, http://sunlightfoundation.com/ ing and pledging platforms. In 2008, the site was
blog/2008/12/03/yes-we-canuse-comments-web redesigned to focus on online petitioning through
-services-on-government-web-sites (Accessed personal narratives.
August 2012). The introduction of petitioning through per-
Gordon-Murnane, L. “The 51st State.” Searcher, sonal narrative became a turning point in the site’s
v.17/5 (2009). political history. Change.org founders encouraged
Jamieson, Dave. “The Supplicants.” New Republic, bloggers to paint human stories for the social jus-
v.239/11 (2008). tice petitions they sponsored. This new form of
Learmonth, M. “Social Media Paves Way to White advocacy drew increased Internet attention and
House.” Advertising Age, v.80/11 (2009). raised Change.org’s position in search engine
Melber, A. “Changing.gov.” Nation, v.288/4 (2009). results and popular culture writ large. In 2012,
Melber, A. “The People’s Press Conference.” Nation, Rattray made Time magazine’s top 100 most
v.288/13 (2009). influential people of the year.
Miller, C. C. “How Obama’s Internet Campaign Several successful advocacy initiatives contrib-
Changed Politics.” New York Times. http://bits uted to Change.org’s increased attention, broader
.blogs.nytimes.com/2008/11/07/how-obamas- social significance, and political success. In 2011,
internet-campaign-changed-politics (Accessed South African activist Ndumie Funda birthed a
August 2012). petition asking the South African government to
Miller, E. “A Good Time for Transparency.” Sunlight declare “corrective rape,” the raping of lesbians
Foundation Blog, http://sunlightfoundation.com/ as a way to “return” them to heterosexual nor-
blog/2008/11/07/a-good-time-for-transparency malcy, a hate crime. Funda’s personal story of
(Accessed August 2012). the death of her partner, who was a victim of the
Schoeff, M. Jr. “A Renaissance for Government crime, drew 170,000 signatures for her petition
Work?” Workforce Management, v.88/2 (2009). and helped influence the South African govern-
Smith, A. “Joining the Discussion at Change.gov.” ment to create a task force to review the issue.
Pew Internet & American Life Project. http:// In April 2012, the mother of Trayvon Martin,
pewinternet.org/Commentary/2008/December/ a Florida boy shot in “self-defense” by neighbor-
Joining-the-Discussion-at-Changegov.aspx hood watch volunteer George Zimmerman, cre-
(Accessed August 2012). ated a petition requesting justice be brought to her
Smith, A. “From BarackObama.com to Change. son’s death. This petition encouraged the Florida
gov.” Pew Internet & American Life Project. http:// 4th District State Attorney’s office to investigate
pewresearch.org/pubs/1068/post-election-voter- Trayvon’s death and prosecute Zimmerman for
engagement (Accessed August 2012). murder. Martin’s mother also contacted main-
stream U.S. media outlets, which helped fuel the
coverage of the case and brought national atten-
tion to her petition. Change.org’s traffic grew
from an average of 4 million visitors in December
Change.org 2011 to more than 11 million hits during the time
span of the Trayvon Martin case.
Change.org is an online advocacy platform that Once a petition like Funda’s or Martin’s gains
encourages citizen petitioning and digital activ- traction, Change.org campaign directors further
ism through grassroots campaign initiatives. Ben an issue’s reach by joining it to similar causes,
Rattray launched the Web site in 2007 with sup- distributing information about the petition via
port from two other Stanford University students. mass e-mails, and highlighting chosen issues on
Chartered Institute of Public Relations Social Media Guidelines 263

the Change.org Facebook and Twitter pages. people to take their political advocacy to mass
Change.org also provides tools to citizen petition- audiences. The continuing challenge for Change
ers. Online tutorials on attracting media atten- .org will be in figuring and refiguring how to
tion, building a social media conversation, and keep citizens’ voices powerfully centered in the
fostering an offline social presence all help inform media spotlight.
Change.org’s petitioners learn how to use the
platform as a means for broader political change. Cindy Vincent
This business model of providing activist tools Lisa Foster
and linking advocacy to personal narratives con- University of Oklahoma
tinues to allow citizens avenues for agitation
against powerful state and corporate entities. See Also: Activists and Activism, Digital; Bottom-Up
In addition to Funda and Martin, Molly Katch- Campaigns; MoveOn Effect, The; MoveOn.org.
pole successfully stopped the implementation of
$5 debit service fees from Bank of America and Further Readings
prompted similar actions against U.S. bank- Goecks, Jeremy, Amy Voida, Stephen Voida, and
ing policies by her fellow citizens. Bettina Siegel Elizabeth D. Mynatt. “Charitable Technologies:
intervened in the U.S. Department of Agriculture Opportunities for Collaborative Computing in
(USDA) policy on school food options by raising Nonprofit Fundraising.” Presentation at the ACM
concerns about the “pink slime” in USDA beef. Conference on Computer Supported Cooperative
School districts may now choose beef for lunches Work, San Diego, CA, November 8–12, 2008.
that are slime free. Both women’s petitions gained http://grouplab.cpsc.ucalgary.ca/grouplab/uploads/
national media prominence. Publications/Publications/2008-CharitableTech.
For its successes, Change.org is not without CSCW.pdf (Accessed October 2012).
controversy. Although the site’s address is an .org, Sifry, Micah L. “E-Petitioning: How Change.org . . .
which connotes the nonprofit status it started Harnesses E-Democracy in Politics.” National
under in 2007, in 2009, Change.org became a Journal (June 9, 2012).
for-profit business as a Certified B Corporation. William, Moner. “The Network Dynamics of Political
This status has brought public scrutiny with accu- Engagement via Online Petition Platforms.”
sations that the .org phrasing of the site’s name Presentation at the National Communication
intentionally misleads users. The site’s mission Association, Orlando, FL, November 15–18,
statement states that, although it is a for-profit 2012.
business, the profits are used to help build the
Change.org business and expand its reach for cre-
ating social justice.
Online advocacy tools, like Change.org, have
been heralded by scholars as the future of dem- Chartered Institute of
ocratic participation and simultaneously criti-
cized as a passive invitation to social change. Public Relations Social
Skeptics fear that online petitioning tools erode
civic impulses toward offline political action
Media Guidelines
with slacktivist and armchair activist outlets. The Chartered Institute of Public Relations
However, new research on political advocacy (CIPR) is a London-based, professional organi-
and social media suggests that online petition- zation that offers various grades of membership
ing platforms are neither revolutionary paths to to all public relations practitioners in the United
participatory democracy nor lazy citizenship. Kingdom (UK). With approximately 9,200 mem-
Instead, online petitioning, and Change.org in bers, CIPR is led by a governing body of roughly
particular, should be viewed as necessary game 50 members who are directly elected by the mem-
adapters to activism in the new media environ- bership. At the core, CIPR aims to enhance the
ment. At present, Change.org provides an inter- reputation and understanding of the public rela-
active, multimedia platform that allows ordinary tions profession.
264 Chartered Institute of Public Relations Social Media Guidelines

The CIPR developed a social media best prac- that allow users to interact with each other
tice guidance document, which first debuted in and share opinions and content. As the name
February 2007. Two years later, the document implies, social media involves the building of
was revised to incorporate changes in legisla- communities or networks and encouraging
tion and new developments in measurement and participation and engagement.
evaluation. In April 2011, yet another revision
and update was released online to include core Integrity, competence, and confidentiality are
principles as well as best practices and legal issues the three core principles of the code of conduct for
to consider when developing and implementing all members of the CIPR. Because social media is
social media campaigns. a key and growing component of public relations
In May 2010, CIPR launched a social media practice, the panel provides readers with an out-
advisory panel (CIPRsm) that included 15 of the line of best practices and those practices to avoid,
UK’s foremost social media thinkers. The panel highlighting how these core principles play into
was created to develop and advance the CIPR social media activity.
social media best practice guide. The group was The list of 10 best practices include engage in
led by Rob Brown, an account executive at Stani- conversation; ensure brand is consistent across net-
forth, and evaluated issues pertaining to best works and platforms; disclose relationships when
practices in social media. endorsing an organization, client, or customer; be
The panel did its best to remain transparent honest about who manages social media channels;
and inclusive. It established a wiki where CIPR outline the content approval process from the off-
members and supporters could view minutes from set; be transparent when updating information;
the meetings and offer input into the development correct errors openly and in a timely manner; add
of the guidelines. Members from both the panel a views-are-my-own disclaimer; be up front about
and the CIPR general membership were encour- conflicts of interest and paid-for opportunities; and
aged to collaborate and contribute to the working be respectful. The panel also outlined five prac-
document. tices to avoid, including do not forget that a social
In April 2011, the committee and the organiza- media presence becomes part of a brand legacy; do
tion published the most recent version of the social not make an audience feel uncomfortable; do not
media guidelines. Although the organization has bring a company into disrepute; do not reveal com-
members from across the globe, the document pany- or client-sensitive information or intellectual
was designed specifically to help guide those with property; and do not be fake.
communication campaigns that include social A large portion of the guidelines outline legal
media in the UK. issues that should be taken into consideration
The CIPRsm panel advised those who worked when incorporating social media into public rela-
with international campaigns to consult the guide- tions practice. The CIPRsm panel clearly points
lines and legal considerations for each respec- out that the guidelines do not constitute legal
tive country in which target audiences would be advice but are instead issues to consider in an era
engaged in social media. Although the document of rapid development in British law.
was first released in 2011, the CIPRsm panel The best practice guide points to the Adver-
recommended that the document be continually tising Standards Authority (ASA) Code of Prac-
reviewed, updated, and further developed to keep tice digital remit emphasizing the importance
up with the real-time changes that occur naturally of marketing messages online through social
in the social media sphere. media. Intellectual property is also discussed
As social media platforms change and grow, within the guidelines. The law of confidence in
maintaining a common definition of social media the UK requires that a duty of confidentiality be
was important to the panel. To that end, the established. This important issue cannot be over-
CIPRsm advanced its definition of social media. looked when posting information to any social
media channel.
Social media is the term commonly given to The guidelines also suggest that public relations
Internet and mobile-based channels and tools practitioners should strongly consider distributing
Chat Rooms 265

and using Creative Commons licensed content CIPR SM. Wiki Home. http://ciprsm.wikispaces.com/
where possible and appropriate. Copyrights, trade- guidelines-review (Accessed December 2012).
marks, and design rights are also covered within Creative Commons (CC). CC Home Page. http://
the guidelines. Defamation through social media creativecommons.org (Accessed December 2012).
outlets is identified, and examples are provided. Panel, CIPR Social Media. “Best Practices Guides
With such a wide range of issues to guide an & Toolkits.” CIPR. http://www.cipr.co.uk/sites/
organization’s social media use, the CIPRsm doc- default/files/CIPR_social_media%20_best%20_
ument discusses recommendations for employers practice%20_guidance%20_2011_1_0.pdf
in setting up social media policies. (Accessed December 2012).
The final section of the social media best prac-
tice guide places attention and focus on social
media measurement. While social media measure-
ment is important, an industry-wide standard has
not yet been established. After the initial meeting Chat Rooms
of the CIPR’s social media panel, it was decided
that another group, known as the social media Online chat rooms provide Internet users virtual
measurement group, would be established and meeting places that allow for conversation and
tasked with deciding issues such as quantification interaction between people that might not oth-
of influence, engagement and conversation qual- erwise be able to communicate with each other.
ity, and best practice approaches to social media Internet relay chat (IRC), the form of interaction
campaigns evaluation. Philip Sheldrake, who is in chat rooms, is conducted semisynchronously in
also a member of the social media panel, leads the real time, where comments posted appear almost
group of nine who are developing these industry- instantly for other users to view and respond to.
wide standards. IRC is a much more real-time mode of computer-
With a copyright date of October 2012, CIPR mediated communication than listserv messages,
released a book Share This: The Social Media bulletin boards, and e-mail. Posts to IRC conver-
Handbook for PR Professionals. This practical sations are generally quite short, usually one or
handbook, written by numerous public relations two lines, allowing the IRC interaction to be simi-
practitioners from a variety of sectors, addresses a lar to multiparticipant face-to-face conversation.
diversity of social media tools and techniques tak- Chat rooms have been widely used for political
ing place in the media and its professions by the discussion and are one of the early developments
CIPR social media panel. The 26-chapter book is in social media.
split into eight topic areas that can be referenced The first online chat-based system, called Talk-
as an easy-to-read guide for all working in the matic, was developed in 1974 by Doug Brown
public relations industry. and David R. Woolley on the Programmed
Logic for Automated Teaching Operations
Alisa Agozzino (PLATO) System at the University of Illinois. The
Ohio Northern University first online chat system that was available to the
public was called CBSimulator, and was released
See Also: Social Media, Adoption of; Social Media, by CompuServe. Since these early chat-based sys-
Definition and Classes of; Wikis and Collaborative tems, chat rooms have emerged as one of the pri-
Project Web Sites. mary means for real-time communicative interac-
tion on the Internet.
Further Readings Chat rooms also allow Internet users to inter-
Advertising Standards Authority (ASA). ASA Home act online in multiuser virtual environments
Page. http://www.asa.org.uk (Accessed December (MUVEs). There has been an increase in the use
2012). of voice over Internet protocol (VoIP) in MUVEs,
Chartered Instutue of Public Relations (CIPR). CIPR but the interaction within these environments
Home Page. http://www.cipr.co.uk (Accessed has remained primarily Internet relay chat. Users
December 2012). are either signed in to a fully text-based online
266 China

platform or appear as avatars (visual representa- communication technologies, but that these same
tions of individuals in the world) in the virtual technologies also pose the opportunity to allow
environment along with communicative fields, users to access a wide variety of viewpoints. As
such as a text box, where they can post com- such, the use of chat rooms for people to engage
ments and track the discussion of other users. in effective political discourse is similar to that
Text boxes displaying Internet relay chat have of face-to-face interaction; people need to take
been successful tools for allowing communicative responsibility for their communicative interac-
interaction as they are able to support multiple tions and information exposure.
users contributing comments and are thus called
chat rooms. Much like instant messaging, IRC Devan Rosen
allows users to select set usernames that appear Ithaca College
before each comment they post, allowing multiple
users to comment and maintain conversational See Also: Communication; Content Communities;
interaction. In addition to IRC interaction being Flaming; Internet Forums; Second Life.
semisynchronous, it is also persistent. Because
face-to-face interaction is generally ephemeral, Further Readings
it is very difficult to refer back to previous parts Bimber, Bruce. “Digital Media and Citizenship.” In
of a conversation for reference, something that is The SAGE Handbook of Political Communication,
possible in chat rooms. The persistence of these Holli Semetko and Margaret Scammell, eds.
interactions allows for the storage of all data as Thousand Oaks, CA: Sage, 2012.
chatlogs, which can in turn be used for analyses Smith, Marc., Shelly D. Farnham, and Steven M.
of the users’ interactions or referred back to as Drucker. “The Social Life of Small Graphical
artifacts of past interactions. However, the nature Chat Spaces.” In Proceedings of the 2000 ACM
of chatlogs as dynamic, nonthreaded interactions SIG CHI Conference. New York: Association for
introduces some hurdles. It can be difficult for Computing Machinery, 2000.
users to follow more than a few conversations, Young, Jeffrey R. “The Journalist in the Chat Room:
and there is frequently conversational leakage, An Analysis of Washingtonpost.com’s Love
where different users cross their conversations in Online.” Journal of Electronic Publishing.
the same chat room interaction. http://quod.lib.umich.edu/j/jep/3336451.0005.4
Communication and information technolo- 02?rgn=main;view=fulltext (Accessed December
gies present many benefits, such as the speed of 2012).
information access and the ability to communi-
cate with people regardless of geographical loca-
tion, but these benefits are paired with some sub-
stantive drawbacks. One of the pitfalls of online
interaction, such as conversations in chat rooms, China
is that the anonymity of the individuals can lead
to a less-than-civil discourse (also called flaming), In terms of the raw number of people connected
which does happen in political chat rooms. As a to the Web, China has the world’s largest popula-
result, many chat rooms have moderators that can tion of netizens. In 2012, it reached 513 million,
remove inappropriate comments or block users namely twice the number of Internet users in the
that violate the norms of the chat room com- United States. Chinese citizens are increasingly
munity. An additional drawback of chat room connected to social media Web sites like Sina
interaction is that people are able to seek out Weibo (China’s Twitter), Tencent, or the Renren
discourse with other users that agree with their Network (China’s Facebook), and approximately
views, such as political viewpoints, and thus not 50 percent of them have more than one social
be confronted with the opposing viewpoints that profile. By 2011, Weibo users were estimated at
are often present in physical community forums. 249 million, while active Tencent and Renren
Bruce Bimber points out that this form of selec- Network members reached 711 million and 160
tive exposure can happen across the spectrum of million, respectively. With more than 25 million
China 267

messages posted each day on Weibo, microblog-


ging has become a crucial means of information
diffusion in Chinese society. The rapid expan-
sion of Internet use in China was accompanied
by hopes in the West that online networks would
facilitate demands for regime change and that the
Internet would provide opportunities for the free-
dom of speech and political liberalization. Yet, the
Internet’s expansion has affected the governance
of nondemocratic polities in both liberal and non-
liberal ways. While new social media have created
virtual communities that play a supervisory role in
the political system and stimulate online and out-
door collective action, the democratic potential
of these networks has also been tightly circum-
scribed by the Chinese government for purposes
of regime survival. New information communica-
tion technologies (ICTs), including social media
networks, have been used as channels for more
effective censorship and thought work and as After Google stated in a 2010 blog entry that it would stop
instruments for the anticipation and the preven- censoring its Chinese search engine and operate “within the law,
tion of disruptive social or political protests. if at all” and may close its Chinese offices, devastated citizens
brought offerings of flowers, candles, and notes to Google
Social Media, the Diffusion of Opinions, headquarters in Beijing. Security guards intervened, saying it was
and Collective Action an “illegal flower tribute,” and removed all traces of the tribute.
University students, retired officials, urban intel-
lectuals, lawyers, the migrant population, peas-
ants—netizens across social classes in China—
now commonly use online networks as means to quickly and reach out to a significantly wide audi-
express their opinions and interact with other fel- ence before being censored. A report by the China
low citizens. In some cases, new social media have Labour Bulletin found that, throughout the Nan-
given rise to various forms of formal and informal hai Honda strike in Zhongshan, Guangdong, in
online collective action, or what Susan L. Shirk 2010, workers created a chat room on Tencent to
refers to as “self-organized communities.” Neti- post details about the gathering, like protesters’
zens have hosted and supported campaign Web meeting locations. Similarly, information access
sites around questions pertaining to food safety, on the Internet has enabled mobilizers to draw
property and homeowners’ rights, gender equal- upon examples of successful protests as sources
ity, environmental protection, and labor condi- of inspiration to determine the content of their
tions. Bulletin board systems also have facilitated claims. Prior to their strike, workers at the Honda
the diffusion of online signature petitions around transmission plant saw in online news that their
some of these matters. Campaign Web sites and company had granted workers at other plants a
petitions in turn have helped diffuse public frus- monthly income raise of 500 yuan (or $73). Based
trations about the government’s inability to keep on these reports, they asked for a similar increase.
up with popular demands. As outdoor mobilization unfolds, online forums
Social forums have not only constituted vehi- constitute spaces for the interpretation of conten-
cles for the expression of opinions but also have tious events among netizens and the channeling of
contributed to the logistical organization of out- opinions about the legitimacy of popular claims
door collective protests. The Internet indeed helps and government response to protests. When
activists bypass state-imposed obstacles to large- environmental protesters in Qidong, Jiangsu,
scale gatherings insofar as messages can be spread destroyed local government infrastructure and
268 China

stripped the mayor in July 2012, Weibo became regime-preservation purposes. In this context,
the center of debates over how far protesters Beijing has succeeded in developing one of the
should go in having their claims heard and what world’s most-advanced Internet control regimes.
boundaries citizens should not cross in the pol- To protect its image in cyberspace, the Chi-
ity. Interpretations of contentious events usually nese government has relied upon Internet tech-
generate significant flows of reactions. An earlier nology and social media users to contain online
protest against a molybdenum–copper project debates and orient discussions toward apolitical
in Shifang, Sichuan, in July 2012 triggered more topics. Under the Great Firewall of China (GFW),
than 5 million posts on Weibo within three days. key word filtering is built into instant messaging
Online social media networks have pushed services and online messaging software. Terms
the Chinese government toward greater informa- like “Falun Gong,” “Tian’anmen Square,” and
tion transparency. While forums diffuse stories “gathering” get noticed, and warnings are sent
often neglected by China’s state-run newspapers accordingly to relevant local public security
and television channels, including unwelcome bureaus. Internet service providers hire hundreds
speeches by foreign politicians, they also con- of thousands of employees whose task is to screen
strain the latter to break contentious daily news and censor online conversations and blog posts.
in a context of increasing competition among According to Freedom House, the size of the
traditional and commercial media. Xinhua News Internet police may have reached approximately
Service and the People’s Daily, traditionally at the 40,000 in recent years. In 2010, it was estimated
service of China’s Central Propaganda Depart- that about 350 million videos, articles, and pho-
ment, now break sensitive stories about citizen tographs had been removed by censors.
protests and local government power abuses. The censorship system has also been agile at
Some cases have helped improve government targeting posts in politically contentious areas of
awareness with respect to bad local governance China more proactively. A study conducted by
and prompted Beijing to rectify corrupt practices. Carnegie Mellon University revealed that, among
To that extent, greater transparency on the part 57 million posts on Weibo between June and
of online state-run media can help contain resent- September 2011, the deletion rate was higher in
ment among disgruntled citizens. minority areas characterized by ethnic conflict
Yet, that scandals and social conflicts are now like Tibet (53 percent) than in cities like Beijing
being exposed nationally could constitute a dou- (12 percent). Finally, the regime has recruited
ble-edged sword for the government. On the one ordinary citizens to bolster progovernment opin-
hand, more transparent news coverage facilitates ions online and discredit oppositional views.
the coordination of online petitions and boycotts They are called the 50 Cent Party (wu mao dang)
and helps promote greater consciousness among for the amount they are remunerated per posted
netizens with respect to their right to information comment.
and expression. On the other hand, the online The authorities have also used social media
state-run media choose to break sensitive inci- to discourage and anticipate online or outdoor
dents at the earliest moment possible to remain mobilization. Since 2010, the government has
the dominant voice setting the agenda and ori- enforced mandatory real-name registration pro-
enting public opinion against counterhegemonic cedures requiring that all network and blog users
rhetorics expressed in social media networks. register with their citizen identity card number.
This measure has facilitated the government’s
Containing Online Debates Through ability to identify potential “troublemakers” on
Censorship and Propaganda the Internet while also discouraging many for-
The Internet is not immune to state control and merly anonymous bloggers from posting politi-
regulation. Because new social media world- cally compromising or subversive comments.
wide have fostered the diffusion of opinions Furthermore, the severe sanctions imposed upon
and facilitated collective action, they have also bloggers who dare speak against the government
reinforced government vigilance on the Internet also aim to deter other citizens from engaging in
in a wide range of nondemocratic countries for similar forms of activism. In April 2011, retired
China 269

official Fang Hong was sent to a labor camp for remove content that openly attacks regime inter-
one year for having posted a tweet that criticized ests or interpretations of China’s history viewed
Chongqing Party Secretary Bo Xilai’s crackdown as compromising the image of the Chinese Com-
on organized crime and mocked Wang Lijun, then munist Party (i.e., alternative understandings of
city police chief. Tibet and Xinjiang’s history). As such, more subtle
Beyond the deterring effects of regulations per- political criticisms by netizens may not be system-
taining to online identity registration and repres- atically targeted by Internet censors. Increasingly
sion of popular activism, social media have helped aware of the content that is likely to be removed
the authorities avert collective action on the Inter- or tolerated, Chinese netizens play on words and
net and outdoors. Web site owners are commonly have developed coded language couched in met-
asked by the Public Security Bureau to shut down aphors to express their resentment with respect
forums they fear could become sites of contes- to Internet policing and government corruption.
tation. Similarly, in February 2011, the Jasmine This, for instance, translates into political satires
Revolution did not materialize as the government and cartoons about local government officials’
was able to identify preemptively through online laziness and police zeal, generally referred to as
monitoring the various meeting points where pro- egao, or evil joking.
tests were to take place across the country and Regime legitimacy and the likelihood of social
mobilize enough police forces to stop them. In unrest are intimately linked to the Chinese govern-
cases where the government was unable to antici- ment’s ability to keep up with citizens’ demands
pate localized resistance, it may still prevent the and needs. However, two obstacles are likely to
latter from having spillover effects in other locali- arise in the process of gauging public opinion
ties. In July 2009, the Xinjiang government forc- accurately. First, the hiring of netizens to post
ibly shut down Internet access for several months progovernment comments on blogs and social
across the autonomous region to ensure violent media networks makes more challenging the task
ethnic riots between Uyghurs and Han Chinese in of assessing how unpopular certain political deci-
Urumqi would not spread to other localities. Gen- sions or policies are. Second, a significant number
erally, to this day, protests in China have consisted of public servants at various levels of the Chinese
of series of isolated contentious events rather than bureaucracy remain unfamiliar with Weibo and
a set of social movements. other social media applications. Being regularly
updated on the latest popular concerns in differ-
Implications of the Internet ent localities will require relevant departments
Monitoring Regime at the central, provincial, and local levels to fol-
The state’s control of the Internet has impacted the low closely Weibo tweets for policy design and
nature of citizen participation in online forums in reform-related purposes. This in turn will require
two ways. First, a large proportion of discussions more effective coordination and information
among netizens remains devoid of all political sharing among all government levels.
content and mostly relates to mainstream popu-
lar culture. Tweets on Weibo are generally linked Marie-Eve Reny
to funny jokes, fashion images, and movies. As University of Chicago
such, they tend to differ significantly from those
on Twitter, where the content of discussions is See Also: Blogs; Campaigns, Organizing; Internet
often related to global events. Second, instances Forums; Internet Gathering; Human Rights; News
of online activism in China remain for the most Media; Transparency.
part moderate and symbolic. Moreover, Chinese
citizens assert their rights toward the market Further Readings
more than they question regime legitimacy. Bradsher, Keith. “A Labour Movement Stirs in
Yet, Chinese citizens increasingly take advan- China.” New York Times (June 10, 2010).
tage of institutional loopholes in the Internet mon- “Carnegie Mellon Performs First Large-Scale Analysis
itoring regime to defy online government control. of ‘Soft’ Censorship of Social Media in China.”
The Internet regulation system was designed to Carnegie Mellon News (March 7, 2012). http://
270 Christian Right

www.cmu.edu/news/stories/archives/2012/march/ participation (including the virtual world) as a


march7_censorshipinchina.html (Accessed August democratic virtue. Individuals and groups based
2012). in the United States constitute the bulk of what
“Decade of Change: The Workers’ Movement in is known as the Christian Right movement, but
China, 2000–2010.” China Labour Bulletin. similar ideological discourses may be identified
[Research report], 2012. elsewhere. The history, influence and evolution
Deibert, Ronald J. “Dark Guests and Great Firewalls: of the Christian Right have been predominantly
The Internet and Chinese Security Policy.” Journal researched with reference to U.S. politics.
of Social Issues, v.58/1 (2002). The core of the message conveyed by the Amer-
Gang, Qian. “China’s Malformed Media Sphere.” ican Christian Right is analogous to the “jer-
China Media Project (July 11, 2012). http://cmp emiad,” a religious prophetic genre historically
.hku.hk/2012/07/11/25293 (Accessed August 2012). employed in connection with a call for social and
Internet World Stats. “Top 20 Internet Countries political engagement. There is, first of all, a recon-
2012 Q1 With Highest Number of Users.” http:// struction of a “golden age” when Christianity
www.internetworldstats.com/top20.htm (Accessed was deep-rooted in cultural and public life. The
June 2012). narratives vary according to each group, but most
Lim, Louisa, “A Tweet, a Year in a Labor Camp, and refer to the “Founding Fathers,” the American
Now an Appeal.” National Public Radio (May 25, Revolution, and the U.S. Constitution as the key
2012). http://m.npr.org/news/World/153701190 elements of the American “golden age.” The sec-
(Accessed August 2012). ond feature of the message is the notion of a wide-
Magistad, Mary Kay. “How Weibo Is Changing spread moral and social decline that can be his-
China.” Yale Global Online (August 9, 2012). torically located. Some allude to the 1960s, others
http://yaleglobal.yale.edu/content/how-weibo- to earlier episodes. The central claim is that “big
changing-china (Accessed August 2012). government” (including welfare programs), soft
Qiang, Xiao. “The Rise of Online Public Opinion national defense (especially during and after the
and Its Political Impact.” In Changing Media, Cold War), and “cultural leftism” (secularization
Changing China, Susan L. Shirk, ed. New York: in particular) have undermined the prosperity and
Oxford University Press, 2011. character of the nation.
Shirk, Susan L. “Changing Media, Changing China.” Finally, there is also a call for recovery and res-
In Changing Media, Changing China, Susan L. toration in parallel with a protest against the sec-
Shirk, ed. New York: Oxford University Press, ularization of the political sphere. This prophetic
2011. call for the restoration of America often includes a
Yang, Guobin. The Power of the Internet in China: spiritual discourse of personal conversion—being
Citizen Activism Online, New York: Columbia “born again”—and putting faith into practice to
University Press, 2009. transform society in a “bottom-up” or grassroots
Yu, Jincui. “Weibo Skills Essential for Officials to fashion. There is a sense that good and evil are
Interact With Public.” http://www.globaltimes.cn/ easily identifiable in political life and should be as
content/723345.shtml (Accessed August 2012). clearly outlined as possible within the context of
Yu, Louis, Sitaram Asur, and Bernardo A. Huberman. a “culture war” between right and left. There is
“What Trends in Chinese Social Media.” The 5th also a top-down strategy of accessing governmen-
SNA-KDD Workshop ’11 (2011). tal power to enact social change via “Christian”
or “biblical” legislation.
A possible explanation for the recent politi-
cal rise of figures associated with the Christian
Right (such as Sarah Palin) is the broad alliance
Christian Right between evangelicals and mainstream neoconser-
vatives. Church historians and critics point out
Students of the Christian Right have made par- the evangelical movement’s lack of an overarch-
ticular reference to its impulse to expand the ing political philosophy. Its propensity to forge
public sphere with new discourses and modes of alliances and adapt to other political movements
Christian Right 271

is a general trend, and the current alliance with Social Media


neoconservatism represents a recent development Eschatology informs organizations of the Chris-
after the Ronald Reagan era. The Christian Right, tian Right in their engagement with social media.
however, is theologically diverse. While most of The American Values group, led by Gary Bauer,
the movement in America subscribes to various has three categories of news on its main Web site:
branches of evangelicalism (e.g., televangelists “pro-life,” “traditional marriage,” and “pro-
Jerry Falwell and Pat Robertson), groups and Israel.” The Christian Worldview Network’s page
leaders with Roman Catholic background (such includes a “worldview times” section, includ-
as Paul Weyrich, one of the founders of the Heri- ing headlines applying Bible prophecy to current
tage Foundation) and traditional Protestants (such events. Bridges for Peace, a group with many
as D. James Kennedy, founder of the Coral Ridge offices worldwide, hosts online a number of radio
Ministries and Center for Reclaiming America for talks and videos about Israel. “We invite you to
Christ) should not be overlooked. join us in a practical expression of this desire to
bless Israel,” says Chief Executive Officer (CEO)
Themes Rebecca Brimmer on its Web site, “by . . . fulfilling
Millennialism is a recurring element in the politi- biblical prophecy through the vital and important
cal theology of the movement and arguably a work of Bridges for Peace.” Sometimes, however,
crucial way of differentiating its subgroups and there is also an attempt to justify the pro-Israel
inner tensions. The Christian Right’s jeremiad is stance with secular arguments that speak to a
often combined with a perception of eschatologi- broader neoconservative audience. One of the key
cal urgency embedded in some variation of premi- campaigns of the Christian Coalition of America
llennial theology, the belief that Jesus Christ will is called “Stand with Israel.” In a YouTube inter-
return after a great tribulation and persecution of view with Senator Lindsey Graham, the coalition
the church to establish a millennium of prosperity invites readers to join it, explaining the policy in
and peace. The dispensational variety of this view terms of democratic peace and freedom of wor-
of history adds a prominent political role for Israel ship in the Middle East.
in the eschatological era—a belief that strongly Postmillennial groups also shape their social
influences the foreign policy agenda of most of media strategy under the influence of their escha-
the Christian Right. Francis Schaeffer, author of a tological narrative, often voicing disagreement
Christian Manifesto in the 1980s defending a cul- with Israel-centered interpretations of prophecy.
tural strategy for contemporary Christians, was Moreover, the millennium of peace and pros-
a nondispensational premillennialist influence on perity requires a biblical strategy putting faith
the movement. Tim LaHaye (American Coalition in action. Economic historian Gary North, one
for Traditional Values), popular writer and pastor, of the pioneers of the Christian Reconstruction
is a key intellectual in the dispensationalist group. movement, has written a multivolume verse-by-
A postmillennial minority believes that the trib- verse “Economic Commentary on the Bible”
ulation refers to the early church. The optimistic and made it fully available for free online. He
task for Christian politics today is to establish also wrote a “Biblical Blueprints” series that
a Christian millennium of prosperity and peace was republished online. Rushdoony’s Chalcedon
via conversions and widespread application of a Foundation currently offers an extensive audio
biblical worldview to social, political, scientific, and video library, as well as a number of digi-
and cultural life. While the outline of a jeremiad tal educational resources on applied Christianity
narrative also applies to this latter group, there under the “Research” section. American Vision,
is a deliberate attempt to differentiate its theol- led by Gary DeMar, is a “Christian Worldview
ogy and view of history from the majority view of Ministry” particularly proud of its social media
evangelicalism and the Christian Right. Members engagement, defining itself as an “Internet leader
of the Christian Reconstruction movement, such for disseminating information and distributing
as the late Calvinist theologian R. J. Rushdoony educational resources that build a comprehen-
(founder of the Chalcedon Foundation), are often sive Biblical worldview, motivating Christians to
associated with this view. engage and reclaim our culture for Christ.” Its
272 Christian Right

call for bottom-up action and “Reconstruction- on institutes and lobby organizations. The nonde-
ist” theology is reflected in the motto “Exercis- nominational evangelical Christian Institute, led
ing Servanthood Dominion” and the key project, by Colin Hart, has a strong journalism depart-
“Restoring America One County at a Time.” The ment and campaigns mixing social media in vari-
project’s blog classifies local news according to ous formats, newsletters, and print publications.
each topic on the policy agenda and geographi- Christian Concern maintains another relevant
cal location. media program, with an emphasis on Christianity
in legal and political life.
International Groups The Dutch and British cases differ from the
The label Christian Right has also been applied United States in terms of setting. An acute con-
to religious-political groups outside the United cern with secularization is a central theme, per-
States. In countries with a balanced multiparty haps because the presence of national churches in
structure, the movement has attained a clearer both countries leads to additional political fric-
political expression. In Canada, for example, Ste- tion with both mainstream conservatives and the
phen Harper, a member of the Alliance Church so-called cultural left. European supranational
and leader of the Conservative Party, became the politics is another factor that differentiates these
prime minister in 2006. The direct influence of two cases from the American context.
Christian Right figures such as evangelical lob-
byist Charles McVety (Canada Family Action) in Mainstream Neoconservatism,
the Harper administration is debatable. However, Education, and Alternative Views
the complex historical formation of the Con- The recent literature on the Christian Right
servative Party can be traced back to Christian debates the extent to which the movement has
right-wing politicians (e.g., Preston Manning) been reinforced, or even partly co-opted by
and organizations (such as the Reform move- mainstream neoconservatism, particularly in the
ment). While a number of groups with an active United States. This would at least in part account
and significant presence in social media draw for a widespread perception of the movement’s
upon the U.S. agenda and cognate organizations influence in the political process, especially in key
(such as Focus on the Family Canada), the differ- issue-areas where both ideologies greatly overlap,
ences should not be neglected. For one thing, the such as foreign policy, education, and family-
Canadian Christian Right has strong historical related policy. Media consumption often reflects
links with the Social Credit movement and tends this overlap, especially in terms of television and
to qualify its views on capitalism, unlike its U.S. radio. The use of the #tcot (after the Top Conser-
counterpart. vatives on the Twitter Web site) hashtag is another
Another relevant case is that of the Nether- indicator of the overlap between mainstream neo-
lands, where religious groups and political activ- conservatism and the Christian Right.
ism are institutionally correlated in newspapers, There are, of course, groups and organizations
political parties, and nonprofits. A key group that distance themselves from secular manifesta-
representing the Christian Right in this case is tions of conservatism and the mainstream media.
the Reformed Political Party (SGP), assisted by This procedure may accompany a discourse of
the Guido de Brès Foundation (a policy research mistrust and counterhegemony, often visible in
institute) and the Reformatorisch Dagblad daily the social media. Some interpret this move in light
newspaper. The group of Calvinistic churches sup- of the Christian Right’s concern for reshaping
porting the movement in the Netherlands is very education in a way that better reflects its world-
suspicious of indiscriminate use of television, but view and historical narrative. This effort predates
the Internet engagement of these organizations the Internet and remains parallel to it, requiring
(including Twitter and Web sites) seems to oper- no aggressive social media presence, as it seems
ate at a professional level. In the United Kingdom, to have already branded itself to its constitu-
the direct influence via political parties (such as ency (e.g., Liberty and Bob Jones Universities). A
the Scottish Christian Party) is practically negli- newer genre, exemplified by virtual homeschool-
gible, with much of the effort being concentrated ing curricula and other distance courses, appears
Citizen Journalism 273

in a number of platforms, especially digital video media presence of the Christian Right in similar
and Webinars. These are frequently offered not isolated cases is hard to measure, but it should
by the higher education institutions, but by non- not be neglected.
profits associated with the Christian Right. A key
concern, in continuity with the jeremiad narrative Lucas G. Freire
readapted for the movement by figures like David University of Exeter
Barton and Peter Marshall, is historical revision-
ism portraying America’s national identity as that See Also: Bachmann, Michele; Catholic Church
of a “Christian nation.” and Social Media; Faith-Based Social Change; Palin
Critics have ascribed the Christian Right’s sus- Phenomenon; Tea Party Movement.
picion of widely accepted views on history and
natural science to anti-intellectualism. However, Further Readings
the movement’s interest in public intellectuals, Anderson, Braden P. Chosen Nation: Scripture,
educational institutions, and nonprofits, as well Theopolitics, and the Project of National Identity.
as the grassroots development of a social media Eugene, OR: Cascade, 2012.
presence focused on the production and dissemi- Butler, Jennifer S. Born Again: The Christian Right
nation of alternative knowledge, begs for a more Globalized. London: Pluto Press, 2006.
nuanced reading of the phenomenon. Communi- Gushee, David P. The Future of Faith in American
cation theorists have attempted to reinterpret it in Politics: The Public Witness of the Evangelical
light of the postmodern condition of epistemolog- Center. Waco, TX: Baylor University Press, 2008.
ical suspicion. Empirical research on popular mis- Hart, D. G. From Billy Graham to Sarah Palin:
trust of mainstream accounts of climate change, Evangelicals and the Betrayal of American
public health, and creationism has suggested the Conservatism. Grand Rapids, MI: Eerdmans,
notion of “I-pistemology,” or “the self as ori- 2011.
gin of all truth,” as a plausible way of framing Klemp, Nathaniel J. The Morality of Spin: Virtue and
social media activity on a more individual basis. Vice in Political Rhetoric and the Christian Right.
Although individual experience and judgment are Lanham, MD: Rowman & Littlefield, 2012.
emphasized in the intensification of the use of Shields, John A. The Democratic Virtues of the
these new platforms, the traditional roles of sci- Christian Right. Princeton, NJ: Princeton
ence, democracy, and institutionalized knowledge University Press, 2009.
are not fundamentally questioned. The use of Van Zoonen, Liesbet. “I-Pistemology: Changing
social media is employed rather as a “corrective” Truth Claims in Popular and Political Culture.”
way of presenting an alternative story while at the European Journal of Communication, v.27 (2012).
same time avoiding the gatekeeping practices of Williams, Daniel K. God’s Own Party: The Making
the traditional platforms. of the Christian Right. Oxford: Oxford University
Press, 2012.
Conclusion
Overall, the Christian Right’s engagement with
the social media is relatively modest at the grass-
roots level, with the bulk of the effort being con-
centrated at the top organizations able to raise Citizen Journalism
funds for national campaigns. Working together,
though, both grassroots and well-articulated The proliferation of communication technolo-
groups have shown great effectiveness in isolated gies and new media has transformed contempo-
cases. In 2013, the social media campaign to call rary journalism by harnessing the power of audi-
the public’s attention to the abortion-related ences and citizens to participate in news reporting
Kermit Gosnell case attained considerable suc- and dissemination, leading to the rise of citizen
cess in terms of awareness and mobilization. journalism. Citizen journalism reverses the tradi-
Another instance is the rise of Tea Party activ- tional relationship between audience as consumer
ism in recent years. The relevance of the social and reporters as producers of news. J. Rosen’s
274 Citizen Journalism

definition of this type of journalism captures such can become an instant reporter on his or her com-
reversal: “When the people formerly known as the munity without the overseeing control of editors
audience employ the press tools they have in their and publishers. Bloggers have had a palpable
possession to inform one another, that’s citizen influence on mainstream media, as can be gleaned
journalism.” The new concept strives to democ- from the resignation of CBS’s news anchor, Dan
ratize news practices by putting community inter- Rather, in 2004 after bloggers proved that the
ests ahead of corporate interests with an undi- documents CBS relied on to claim that George W.
luted emphasis on audience participation. This Bush evaded military service were in fact forger-
entry focuses on two fundamental implications ies. Among other blogs, Freerepublic.com and
of citizen journalism: first, how citizen journal- the DrudgeReport.com publicized the forgeries in
ism transforms the traditional news production, the CBS investigation, forcing other mainstream
consumption, and dissemination processes; and media to cover the issue and eventually leading
second, how these tools foster more participatory to CBS’s humble apology. In politics, the Senate
and democratic political and media cultures. Majority Leader Trent Lott resigned in 2007 after
Citizen journalism has subverted the traditional his controversial comments praising the efforts of
journalistic paradigm in which news is exclu- segregationist Strom Thurmond. Lott’s comments
sively produced by professional journalists and became political and media fodder largely due to
massively disseminated by organizations to reach the work of bloggers from TalkingPointsMemo
audiences who are less likely to be involved in the .com and Instapundit.com. Spurning the gatekeep-
earlier processes. New media offer several ways ing role of editors, the new citizen reporters and
to transcend this rigid model of news production, bloggers have become gatewatchers who filter
dissemination, and consumption. Steve Outing of mainstream news by highlighting, promoting, and
The Poynter Institute suggests 11 layers in which debating issues central to their communities.
news organizations can wield the power of the The participatory emphasis underlying the citi-
Internet to embrace citizen journalism practices. zen journalism model is based on a vision of an
These 11 layers range from innovations that are inclusive public sphere in which audiences become
easy to implement, such as “opening up to pub- active political agents and the democratic process
lic comments,” to the most radical innovations, becomes more representative of diverse views in
such as “wiki journalism: where the readers are society. The inclusive vision in which marginal-
editors.” Mainstream news organizations have ized political voices are aired and heard is central
already used the Web to encourage public com- to South Korea’s OhmyNews, which remains one
ments sections in which readers “react to, criticize, of the best known, if not the first, organized effort
praise or add to what’s published by professional to consciously set up a citizen journalism outfit.
journalists.” Wiki journalism moves beyond sim- C. H. Bentley describes OhmyNews’ founder, Oh
ple user comments to permit anyone to compose, Yeon-ho, as a “new Martin Luther in this Digi-
post, or edit any news story that has been posted tal Reformation” for his bold vision of a modern
on the Web site. The goal is to produce well- journalism in which “every citizen is a reporter.”
crafted, balanced, and credible news coverage via The OhmyNews citizen journalism model relies
harnessing the power of crowdsourcing and mobi- on an army of thousands of citizen reporters who
lizing smart mobs to utilize group effort and intel- write news stories that are edited by a few pro-
ligence in the news production and consumption fessional journalists in what might be termed as
processes. The blending of these processes has fos- a professional–amateur (pro–am) collaboration.
tered produsage, a hybrid form of journalism that Evidence of the potency of such pro–am collabo-
entails simultaneous production and usage. ration was witnessed in the coverage of important
With the proliferation of new social media events including the southeast Asia tsunami in
tools, like blogs, citizens challenge the gatekeeping 2004 and the London terrorist bombing in 2005.
and agenda-setting powers of mainstream media. While the above examples demonstrate citizen
As a form of citizen media, blogging erases tradi- journalism’s ability to challenge corporate main-
tional barriers associated with news gathering and stream media’s narratives, social media have sharp-
publishing. Any citizen with access to a computer ened citizen reporters’ tools and exponentially
Civil Rights 275

augmented the scale of user-generated content. As Reston, VA: The Media Center at the American
violent confrontations between police and street Press Institute, 2003. http://www.hypergene.net/
demonstrators followed the contested 2009 elec- wemedia/download/we_media.pdf (Accessed
tions in Iran, Iranian citizens flooded Facebook, December 2012).
Twitter, and YouTube with dramatic footage Newman, N. “The Rise of Social Media and Its
and video evidence that highlighted the regime’s Impact on Mainstream Journalism: A Study of
heavy-handed tactics. The breathtaking speed at How Newspapers and Broadcasters in the UK and
which dissidents’ stories were updated and the US Are Responding to a Wave of Participatory
accompanying social media attention ensured that Social Media, and a Historic Shift in Control
the opposition’s narrative drove the news agenda Towards Individual Consumers.” The Reuters
worldwide. A YouTube executive, N. Newman, Institute for the Study of Journalism, 2009.
asserted their site’s role as a vital citizen report- http://reutersinstitute.politics.ox.ac.uk/fileadmin/
ing platform by claiming that “Iranian citizens documents/Publications/The_rise_of_social_media
are having their voices heard, their faces seen and _and_its_impact_on_mainstream_journalism.pdf
their story gets told around the world without (Accessed December 2012).
filtering.” In sum, citizen reporters have trans- Outing, S. “The 11 Layers of Citizen Journalism.”
formed journalism from a lecture-like communi- The Poynter Institute (May 31, 2005). http://www
cation practice into a participatory, critical, and .poynter.org/uncategorized/69328/the-11-layers-of
discursive conversation. -citizen-journalism (Accessed December 2012).
Papandrea, M. “Citizen Journalism and the
Aziz Douai Reporter’s Privilege.” Boston College Law
University of Ontario School Faculty Papers. Paper 167, 2007. http://
lawdigitalcommons.bc.edu/lsfp/167 (Accessed
See Also: Blogs; Crowdsourcing; MIT Center December 2012).
for Civic Media; Myth of Digital Democracy; Rheingold, H. Smart Mobs: The Next Social
OhmyNews. Revolution. Cambridge MA: Basic Books, 2002.
Rosen, J. A Most Useful Definition of Citizen
Further Readings Journalism. PressThink (2008). http://journalism
Allen, S. “Citizen Journalism and the Rise of ‘Mass .nyu.edu/pubzone/weblogs/pressthink/2008/07/14/
Self-Communication’: Reporting the London a_most_useful_d.html (Accessed December 2012).
Bombings.” Global Media Journal, v.1/1 (2007).
Bentley, C. H. “Citizen Journalism: Back to
the Future?” Discussion paper prepared
for the Carnegie Knight Conference on the
Future of Journalism, Cambridge, MA, June Civil Rights
20–21, 2008. http://blogimg.ohmynews.com/
attach/752/1098233647.pdf (Accessed December In American English, the term civil rights refers
2012). to individual rights defined within the Bill of
Bruns, A. “The Active Audience: Transforming Rights, several amendments to the U.S. Consti-
Journalism From Gatekeeping to Gatewatching,” tution (Thirteenth, Fourteenth, Fifteenth, and
2008. http://snurb.info/files/The%20Active%20 Nineteenth), and election rights within the Vot-
Audience.pdf (Accessed December 2012). ing Rights Act. Within civil law systems, the very
Bruns, A. “Produsage: Towards a Broader Framework same rights are described with the term civic rights
for User-Led Content Creation.” In Proceedings (Burgerrechte, droits civiques), which refers to
Creativity & Cognition, v.6 (2007). http://eprints. rights granted by states exclusively to their citi-
qut.edu.au/6623/1/6623.pdf (Accessed December zens, shaping the mutual relationship between the
2012). individual and the state. In the United States, those
Gillmor, D. “Foreword.” In We Media: How rights may also be described with the term civil
Audiences Are Shaping the Future of News and liberties. The most important civil rights include
Information, S. Bowman and C. Willis, eds. voting rights, right to labor, right to education,
276 Civil Rights

primarily of individual liberties guaranteed by a


state to its citizens within acts of national law.
While human rights are recognized globally,
based on a system of international treaties, civil
rights are guaranteed by national constitutions
and other acts of national laws. Unlike human
rights, which are thought of as originating from
the innate dignity of the human person, civil
rights are considered legal rights and therefore
granted to an individual by a state. Civil rights so
perceived cover the right to free speech and reli-
gion in the shape defined by national acts of law,
the right to vote, the right to education, or the
right to obtain diplomatic protection from state
authorities while abroad. Civil rights are only
generally mentioned in international law treaties
as they primarily originate from national laws.
For example, they are briefly mentioned in the
Charter of Fundamental Rights of the European
Union (EU). Since 2009, the charter is perceived
Hospital staff participate in computer and Internet skills training
at the Juba Teaching Hospital Health Information Resource as part of law of the EU as per the Lisbon Treaty,
Center in Juba, Sudan, in 2009. The right to Internet access may in which a direct reference thereto was made. It
be recognized as a civil right in some legal systems even though defines particular political, social, and economic
it is not an element of the universal human rights law. rights of EU citizens that are to be considered by
EU bodies when drafting and exercising acts of
EU law. Chapter V of the charter, devoted entirely
to citizens’ rights, includes every EU citizen’s right
and right to diplomatic protection. Concurrently, to vote and to stand as a candidate at elections to
states are obliged under numerous international the European Parliament as well as at municipal
law treaties to grant human rights, including civil elections. It also grants every person within the
and political rights, to individuals in their juris- jurisdiction of EU states the right to good admin-
dictions. In this context, the term civil rights cov- istration, that is, for their affairs to be handled
ers a certain category of human rights as referred impartially, fairly, and within a reasonable time
to in the 1966 International Covenant on Civil by the institutions and bodies of the EU. Further-
and Political Rights (ICCPR). In civil law systems, more civic rights in the EU include each individ-
those rights are described with the notion of civil ual’s right to have the community make good for
rights (bürgerliche Rechte, droits civils). Next to any damage caused by its institutions or by its ser-
civil rights, political and economic rights may be vants in the performance of their duties. Every EU
identified as separate but complementary groups. citizen holds the right of access to documents of
Jointly, they form the universal catalog of human the European Parliament, Council, and Commis-
rights. Social media strongly influences the per- sion and to refer to the Ombudsman of the Union
ception of civil rights, urging the need for their cases of maladministration in the activities of the
uniform application. EU institutions or bodies. Active participation in
According to author Robert G. McCloskey, the social and political affairs may also be exercised
subject of civil rights is the liberties of a person as through the right to petition. Freedom of move-
a person and not primarily as an economic ani- ment and of residence as well as the right to diplo-
mal. In American English, civil rights are rarely matic and consular protection in the territory of a
referred to as civic rights, although they reflect the third country is granted to every citizen of the EU.
idea of civic rights (Burgerrechte, droits civiques) The catalog of civil rights guaranteed by
in civil law countries. This is a category consisting national constitutions to a large extent repeats
Civil Rights 277

certain globally recognized human rights, empha- obligation of states toward any and all individu-
sizing their recognition in national legislation als within their jurisdictions.
and detailing their execution. The interrelation Among the civil rights named in the ICCPR,
between civil rights and human rights is very close. numerous basic human rights have been iden-
Although civil rights originate from national acts tified. The rights to physical integrity, includ-
of law, in large part they reflect human rights ing the right to life, freedom from torture, and
named in international treaties. For example, the cruel, inhuman, or degrading punishment as well
right to life, considered a basic human right, is as a general prohibition of slavery are named in
granted by numerous human rights treaties and Articles 6, 7, and 8 of the covenant. The inherent
repeated in acts of national laws, first and fore- right to life is granted in Article 6 to each indi-
most in constitutions. vidual and requires states to take active measures
to grant that right effective legal protection. It is
The International Covenant on considered a supreme right, which suffers no der-
Civil and Political Rights ogations and is to be understood broadly. Among
Although states are obliged to respect and pro- civil rights, the right to individual liberty and
tect human life in general, their particular obli- security of person also are named. Following the
gations toward individuals originate from acts common law habeas corpus doctrine, Article 9 of
of national law. Similarly, the human rights law the ICCPR prohibits arbitrary arrest and deten-
system endows citizens with a right to participa- tion. Any deprivation of liberty may only be con-
tion in political life, as enshrined within Article veyed as an exception to that rule and based on
25 ICCPR; however, details of the execution of a provision of law in accordance with procedural
that right and limits of its application are defined minimal standards, provided for in Articles 9 and
in national acts of law. 10 of the ICCPR.
There are also those rights that are granted Individual liberty is often interpreted as not
solely by national laws, while their international only the freedom to convey certain action within
status as human rights has not yet been confirmed. the limits set by law protecting the rights and
The right to Internet access may serve as a freedoms of others but also as freedom from any
good example of depicting the practical differ- intrusions. It constitutes an obligation of any
ence between civil rights as an element of the third party, that is, state authorities and private
human rights system and civil rights covering individuals alike, to refrain from imposing any
only rights recognized by an individual state. limitations upon individual freedom unless such
While some states, like Brazil or Norway, rec- intrusions have been provided for by law.
ognize the right to Internet access within their Among civil rights, the ICCPR includes a
national acts of law, the global debate on the principle of procedural fairness and the protec-
existence of the human right to Internet access tion of the rights of the accused in its Articles 14
as an emanation of the right to access informa- and 15. Those rights include the right to a fair
tion continues. Therefore, the right to Internet trial, presumption of innocence, and the right of
access may be recognized as a civil right in some an appeal to a court of higher instance. It also
national legal systems, while it is not an element includes the principle lex retro non agit, disal-
of the universal human rights law. lowing any criminal proceeding to be initiated
The term civic rights can also be used to upon an act of law that was not in force at the
describe a category of human rights included in time when the act subject to responsibility was
the ICCPR, an international treaty fundamental being committed.
to existing human rights law next to economic, Among civil rights, individual liberties such
social, and cultural rights defined in the Interna- as the freedom of movement, religion, thought,
tional Covenant on Economic, Social and Cul- speech, assembly, and association are named in
tural Rights acknowledged by the United Nations Articles 12 through 22 of the ICCPR. It grants
(UN) on December 16, 1966. each individual the right of privacy, including
In this context, civil rights are a category of protection against unlawful attacks to individual
human rights law, constituting an international honor and reputation. The following articles of
278 Civil Rights

the ICCPR mandate individuals with the right to transboundary character of the network changed
marry and every child with the right to acquire a the way communities arise and operate. Particu-
nationality. larly young people engage in online communica-
Article 19 of the ICCPR grants each individual tions more willingly and frequently than they par-
the freedom of speech fundamental to all social ticipate in real-life local elections or other forms
media. The individual right to freedom of opin- of participatory democracy, which allows exercise
ion and expression is composed of three comple- of civil rights offline. This globalization of the
mentary rights: freedom to hold opinions and perception of civil rights resulted in the need for
the liberty to receive information and to impart unification of standards provided in national laws
it, regardless of frontiers. Confines for exercising for universal civil rights enshrined in the human
these complementary rights are defined in Article rights system. People gathering in online com-
29, paragraph 2, which subjects their implementa- munities wish to be granted equal protection of
tion to such limitations as are determined by law the right guaranteed to them by international law
and introduced for the purpose of securing due treaties.
recognition and respect for the rights and free- A good example of that challenge is posed by
doms of others. Restrictions may also be set up the right to assembly. It is recognized as a civil
in order to meet the just requirements of morality, right granted to individuals by states of their citi-
public order, and the general welfare in a demo- zenship or residence according to Article 25 of
cratic society. the ICCPR. Thanks to the impact of social media,
The imminent trait of the human rights system this civil right gained a new dimension with the
is that it is based on a fundamental rule of non- outburst of the Arab Spring in late 2010, originat-
discrimination. Therefore, human rights named ing from and strongly shaped by virtual assem-
in the ICCPR are to be applied to every human blies. Groups of individuals were exercising their
being. Only Article 25 of the ICCPR, granting right to public gathering online, discussing crucial
the right to participation in political activities, political issues on social platforms while commu-
restricts its application to citizens of state par- nicating and planning real-life gatherings in cyber-
ties, obliging them to grant to every citizen the space. The right to assembly transformed into the
right and the opportunity to take part in the con- right to virtual assembly. Also, the 2012 Occupy
duct of public affairs, directly or through freely Wall Street movement contributed to raising the
chosen representatives, to vote and to be elected, awareness of social media’s impact on exercising
and to have access to the public service in his or civil rights while channeling social disapproval
her country. ICCPR introduces a system of inter- for the economic crisis and aiming at protecting
national protection of rights granted therein. social and economic rights.
The UN Human Rights Committee was estab- Another example of a civil right significant in
lished to monitor the introduction and execution social media and subject to different interpreta-
of those rights within national legal systems. It tions by national authorities is the right to privacy,
is a treaty-based, high-level group of experts enshrined in Article 17 of the ICCPR. Privacy may
who examine state reports by ICCPR parties. not be subject to arbitrary or unlawful interfer-
Although the committee is entitled to settle dis- ence. This prohibition is perceived differently by
putes between state parties, its quasi-judicial individual national authorities. While in Europe
character remains disputed, just as its actual the right to privacy is recognized as a human right
effect on the introduction of effective civil rights with state authorities obliged not only to refrain
protection mechanisms. Its political character from interference with individual privacy but also
causes criticism for representing nondemocratic to actively prevent any interruption thereof by third
states and reluctance to refer to numerous long- parties, in the United States the right to privacy is
lasting human rights violations. not enshrined in any federal act of law and often
recognized as the effect of free market powers.
Changes Brought by Social Media Hans Shattle argues that the contemporary
Social media brought a dramatic change to the sense of community and group identity may serve
way civil rights are perceived and exercised. The as the basis for civil rights development, although
Clickable Calls to Action 279

those groups currently are primarily shaped by While for marketing strategies the goal may
technology and social media. According to Hans be to drive sales, in the political arena the goal is
Shattle, the notions of allegiance, belonging, and often to generate votes or donations and galva-
loyalty are shared nowadays regardless of histori- nize support for a cause. Many consider an ad or
cally established communities guarded by laws Web site without a clickable call to action a fail-
across national and political jurisdictions, while ure or a missed opportunity because the viewer is
advocacy networks function based on shared no longer engaged. It is considered a best practice
goals and principles. Citizenship has given place to for those in political office or nonprofits to create
a shared cause, uniting individuals within online emotionally hard-hitting videos or content that is
communities and requiring a uniform application wrapped up in a button to compel the viewer to
of globally recognized civil rights. take action.

Joanna Kulesza Best Practices


University of Lodz There are measurable ways to create a successful
call to action campaign. A site should have a small
See Also: Human Rights; International Social Media number of distinct actions but not too many so as
and Politics; Lesbian, Gay, Bisexual, and Transgender to overwhelm or lose the interest of the viewer.
Rights. It is important, as well, to use active and urgent
language to coerce the viewer to take action.
Further Readings Some buzzwords include donate, subscribe, reg-
Croteau, David and William Hoynes. Media/Society: ister, buy, and call. Placing a deadline on a call
Industries, Images, and Audiences. Thousand to action or suggesting that supplies are limited
Oaks, CA: Pine Forge Press, 2003. creates a sense of urgency. The visuals of a click-
Jacobs Henderson, Jennifer and Aaron Delwiche. able button are equally as important in retaining
The Participatory Cultures Handbook. London: a viewer’s attention. This includes where the but-
Routledge, 2012. ton is placed on the Web site and the colors, fonts,
Schattle Hans, Globalization and Citizenship. shapes, text, and visual effects of the button.
Lanham, MD: Rowman & Littlefield, 2012. Not all calls to action are hosted on a party’s
Web site. Many calls to action are hosted on a
platform that can redirect traffic back to a site.
For instance, YouTube’s Clickable Call to Action
now allows users to drive traffic from their vid-
Clickable Calls eos to external uniform resource locators (URLs)
of their choice with a semitransparent ad that
to Action appears over the video.
Google offers a wide range of applications for
A call to action, by definition, urges a reader, nonprofit organizations to promote their causes.
listener, viewer, or respondent to react and take Google for Nonprofits offers a wide array of prod-
immediate action upon hearing a message. In the ucts and applications that are either discounted
digital era, calls to action have been leveraged or free for nonprofit organizations. It allows
on Web sites to allow viewers to instantly, with nonprofits to not only broaden their constituent
the click of a button, respond to a message. The bases but also to use applications to save time and
button may be a graphic or text that is created money while connecting with other nonprofits to
to capture the viewer’s attention. The goal of the learn about their best practices. Using these tools
clickable call to action is to retain the viewer and to publicize a campaign or cause is crucial to drive
urge them down a conversation funnel, which is traffic to the call to action button.
a term used to track consumers and their page
views and clicks. Ultimately, it provides a focus to Clickable Successes
a Web site, a way to measure a site’s success, and In the 2008 presidential election, President
a direction for a site’s users. Barack Obama became one of first politicians to
280 Click-Through Rate

effectively use social media to spread awareness Feeding America, Amnesty International, Habitat
for his campaign for office and galvanize voters. for Humanity, and Water.org.
His methods were no different than candidates
of years past, such as John F. Kennedy, who uti- Marion Jeanette Herbert
lized television. In Kennedy’s case, however, the Independent Scholar
call to action was less immediate as it was asking
for a vote on Election Day or a check to support See Also: Campaigns, Digital; Click-Through Rate;
his campaign. Through social media, President Clicktivism.
Obama was able to drive voters to his Web site,
www.barackobama.com, where they could imme- Further Readings
diately see a clickable call to action button with Carr, David. “How Obama Tapped Into Social
the words, “Quick Donate $5.” The verbiage on Networks’ Power.” New York Times (November 9,
the button indicated that a donation of just $5 2008).
was significant and the action would not take “How to Effectively Use Call to Action in Nonprofit
much of their time. Once clicking on the button Videos.” SocialBrite (December 12, 2012).
and continuing down the conversation funnel, the http://www.socialbrite.org/2011/11/30/how-to
Web site’s host could not only track additional -effectively-use-calls-to-action-in-nonprofit-videos
information on the viewers but ideally encourage (Accessed December 2012).
them to donate more money. Many calls to action Kabani, Shama Hyder. The Zen of Social Media
offer incentives. At one point, President Obama’s Marketing: An Easier way to Build Credibility,
campaign page offered a free T-shirt to those who Generate Buzz, and Increase Revenue. Old
donated $30 or more. Saybrook, CT: Tantor Media, 2010.
President Obama carried his social media strat- Kony 2012, Invisible Children Campaign. http://
egies from 2008 into his 2012 campaign, when invisiblechildren.com/movedc (Accessed
he was re-elected after a strong presence on You- December 2012).
Tube, Twitter, Facebook, and other social media Mainwaring, Simon. We First: How Brands and
outlets. Consumers Use Social Media to Build a Better
In 2012, a video, “Kony2012,” created by World. Basingstoke, UK: Palgrave Macmillan,
Invisible Children, Inc., went viral on YouTube. 2011.
The video was released on March 5, 2012, and
portrayed a Ugandan militia leader indicted
on war crimes, Joseph Kony, who was arrested
before the end of 2012. The film had more than
94 million views on YouTube by October 2012. Click-Through Rate
At the end of the video, a stop clock ran out of
time and text appeared telling the viewer that the A click-through rate (CTR) is defined as a ratio of
time had come to take action. It laid out three clicks received divided by the number of impres-
ways in which viewers could help the cause: Sign sions of an online ad or link. Both ads and links
the pledge to support the cause, purchase the appearing on social media can be rated for effec-
bracelet and action kit, and sign up to donate tiveness by CTR. Usually, it is expressed as a per-
a few dollars per month. The film then directed centage. For instance, if a link is displayed 1,000
viewers to Kony2012.com and the Invisible Chil- times and results in 12 clicks, the CTR is 1.2 per-
dren Web site, where clickable calls to action cent. CTR is used as a measure of the effectiveness
were abundant in asking for pledges and offering of both online ad placement as well as content
merchandise. The film was so successful that it link placements. It is somewhat analogous to a
resulted in a resolution by the U.S. Senate and response rate in traditional advertising, although
contributed to the decision to send troops by the generally traditional advertising response rates
African Union. require a more concerted effort from the respon-
Other recent compelling campaigns that have dent. In recent elections, CTR has taken on new
led to greater awareness include videos from importance as calls for social action and campaign
Click-Through Rate 281

donations can be linked to highly effective CTR 1,000 displays. A high expected CTR can directly
for online advertising spending and social media increase the CPM as the advertiser expects a
campaigns. higher average number of clicks per display. CPM
can also be high even with a low CTR when the
Factors Impacting Click-Through Rate advertiser’s goal is branding to the target demo-
There are a variety of factors that can impact the graphic of the publisher’s users. The more direct
CTR of a placement. Effective targeting, so that cost per click (CPC) method charges a fixed rate
the viewer of the content is most likely to be inter- per click. Here, the CTR most directly impacts the
ested in the target subject, is perhaps the largest likelihood that a publisher will continue to choose
predictor of ultimate CTR. For example, an ad to display an ad or link. If the CTR is too low,
for a political candidate is likely to have a higher then the publisher is likely to prefer a higher CTR
CTR on a Web site with content about that can- unit so that they can generate more advertising
didate’s political party than on a Web site focused revenue. However, both the CPM and CPC meth-
on linguistics. Similarly, the channel used for dis- ods provide no guaranteed direct linkage to rev-
play can impact the CTR. An ad for a candidate enue for the advertiser and are subjected to reduc-
that is displayed in a search channel, when a user tion in value with the spread of click fraud. The
has specifically searched for “how to contribute last method of cost per action (CPA) was created
to a political campaign” versus an ad displayed as a reaction by advertisers to less-than-expected
on a general election news Web site is likely to value per click. In this method, the advertiser pays
have a higher CTR as searches have been shown a fixed rate per action generated by a click from
to have higher CTR overall for similarly themed the publisher’s content. The most common action
content. Platforms also have been shown to have is a completed sale. CPA is analogous to a com-
different levels of CTR, with mobile platforms mission in a more traditional sales setting. This
having a higher CTR than desktop computers. method serves as a regulator of the quality of a
Content and design elements have also been click and reduces the direct importance of CTR as
linked to CTR. Research has shown that incen- a measure of effectiveness. In CPA relationships,
tives, emotional appeals, interactivity, color, CTR is used as a diagnostic tool to identify poten-
animation, and placement position all have an tial barriers between a click and ultimate action.
impact on ultimate CTR. These content and
design elements have also been shown to have Marc-David L. Seidel
differing impacts for consumer-focused versus University of British Columbia
business-focused ads. Personal referral mecha-
nisms, where a user is sent a link by a friend, have See Also: Advertising and Marketing; Audience
also been found to be directly linked to increased Fragmentation/Segmentation; Campaign Strategy;
CTR. Another factor impacting CTR rates is click Google AdWords/AdSense in Campaign Strategy;
fraud. Click fraud is defined as clicks that are gen- Proxy Measurement; Search Engine Optimization.
erated by fraudulent means. With the widespread
accessibility of revenue from online advertising, Further Readings
click fraud has become a large factor, constantly Fjell, Kenneth. “Online Advertising: Pay-Per-View
being battled by large advertising clearinghouses Versus Pay-Per-Click With Market Power.” Journal
such as Google, Bing, and Facebook. of Revenue and Pricing Management, v.9 (2010).
Immorlica, Nicole, Kamal Jain, Mohammad Mahdian,
Impact of Click-Through Rates on and Kunal Talwar. “Click Fraud Resistant Methods
Advertising Costs and Revenue for Learning Click-Through Rates.” Internet and
CTR can influence the cost for online advertisers Network Economics, v.3828 (2005).
and the revenue for online publishers who accept Lohtia, Ritu, Naveen Donthu, and Edmund K.
ad or link placements. Online advertisers gener- Hershberger. “The Impact of Content and Design
ally have three methods of paying a publisher for Elements on Banner Advertising Click-Through
the display of an ad or link. The most basic, cost Rates.” Journal of Advertising Research, v.3/4
per impression (CPM), charges a fixed rate per (2003).
282 Clicktivism

Porter, Stephen R. and Michael E. Whitcomb. “The crimes involving children in his native Uganda
Impact of Contact Type on Web Survey Response and other African countries.
Rates.” The Public Opinion Quarterly, v.67/4
(2003). Outcomes
Varian, Hal R. “Position Auctions.” International The Rush Limbaugh–Sandra Fluke incident was
Journal of Industrial Organization, v.25/6 (2005). a particularly conspicuous example of successful
online activism. When Limbaugh labeled San-
dra Fluke a “slut” and “prostitute” on his talk
show, he triggered a backlash that outstripped
prior controversies. Though he is no stranger
Clicktivism to dispute (by most analyses, his popularity
relies upon it), the swiftness and strength of the
Also known as slacktivism, clicktivism is a response came as a surprise in this case. News
portmanteau, or combination of terms describ- of the incident spread quickly through feminist
ing activism that is conducted via the Internet. social media networks and resulted in at least
Critics complain that online activism is inade- 12 advertisers and two radio stations withdraw-
quate and may even harm the social and politi- ing their support from the Rush Limbaugh show
cal causes people are attempting to support by despite its status as the most listened-to talk
conferring a false sense of accomplishment that show in the United States.
forestalls more effective engagement. Despite In another indication of the influence of this
clicktivism’s negative connotations, in particu- activism, the confrontation between old media
lar the perception that Internet-based activism is and citizen-fueled social media also brought
lazy and ineffective, in the 2000s, social media about a very rare apology from the venerable and
increasingly became a valued site for political usually fearless broadcaster. This outcome differs
organization. Social media networks like Twit- conspicuously from other Limbaugh-related dis-
ter, YouTube, and Facebook in particular are key putes, which have often ended in even the most
sites for recruitment and messaging for a vari- powerful critics apologizing to him.
ety of organizations from political campaigns to
activist groups. Carole V. Bell
In the United States, Internet-based boycotts Northeastern University
of companies that have been accused of support-
ing discriminatory media content have resulted See Also: Actors and Social Media in Politics; Artists
in advertisers discontinuing their sponsorship of and Social Media in Politics; Musicians and Social
several popular, formerly desirable radio and tele- Media in Politics.
vision programs, including the Glenn Beck show.
In one of the most high-profile examples of Further Readings
online activism, during the 2012 American presi- Butler, M. Clicktivism, Slacktivism, or Real Activism:
dential campaign influential conservative talk Cultural Codes of American Activism in the
show host Rush Limbaugh drew rapid and wide- Internet Era. University of Colorado, 2011.
spread criticism for his comments characterizing CNN Political Unit. “More Limbaugh Advertisers
Georgetown law student Sandra Fluke as a “slut” Jump Ship.” Political Ticker (2012). http://
and a “prostitute” in response to her congressio- politicalticker.blogs.cnn.com/2012/03/05/
nal testimony in support of health care coverage limbaugh-advertisers-jump-ship (Accessed
for contraception. December 2012).
Clicktivism has also enabled international Gregory, S. “Kony 2012 Through a Prism of Video
causes to spread quickly across national borders Advocacy Practices and Trends.” Journal of
as with “Kony 2012,” a viral video that was seen Human Rights Practice (2012).
by tens of millions of viewers worldwide and Karpf, D. “Online Political Mobilization From the
helped raise awareness of efforts to arrest Lord’s Advocacy Group’s Perspective: Looking Beyond
Resistance Army leader Joseph Kony for war Clicktivism.” Policy & Internet, v.2/4 (2012).
Clinton, Hillary 283

Kony 2012, Invisible Children Campaign. http:// during her husband Bill Clinton’s time in the
invisiblechildren.com/movedc (Accessed White House.
December 2012). President Barack Obama nominated Hillary
Watson, Tom. “The New Networked Feminism: Clinton for secretary of state (the third woman
Limbaugh’s Spectacular Social Media Defeat.” and sole former First Lady to serve in this posi-
Forbes (March 5, 2012). http://www.forbes.com/ tion), and she was confirmed on January 21,
sites/tomwatson/2012/03/05/the-new-networked 2009. Her term was marked by strong advocacy
-feminism-limbaughs-spectacular-social-media for human rights, especially for women and chil-
-defeat (Accessed December 2012). dren. She was one of the most-traveled secretaries
of state, reported by the U.S. State Department
as having logged 956,733 miles over 379 days on
the road, visiting 110 countries. Although diplo-
macy typically has been considered a “boots-on-
Clinton, Hillary the-ground” position, Clinton recognized that
the human connections could be enhanced and
Hillary Rodham Clinton has engaged in several advanced via social media.
major national roles in her life, including 67th
U.S. secretary of state (2009–13), U.S. sena- Social Media
tor (D-NY, 2001–09), First Lady (1993–2001), As secretary of state, one of Clinton’s most notable
and 2008 presidential candidate. Although she initiatives was to greatly enhance the use of social
employed social media (including announcing media and other new technologies as a means of
her run) during the campaign, the Barack Obama fostering dialogue between people worldwide,
campaign’s innovative use of the Internet for fund- as well as a way to increase foreign policy initia-
raising and audience targeting overshadowed her tives. This occurred both within the Department
efforts. She is being touted as a leading potential of State as well as with international partners
candidate for the 2016 presidential race, with the intent on expanding Internet freedom. Clinton
“Ready for Hillary PAC” (launched in Febru- encouraged ambassadors to expand their Twit-
ary 2013) reaching over 50,000 Facebook fans ter and Facebook presences in order to increase
and having over 100,000 e-mails in its database responsiveness and to help catalyze participation.
in two months, 43 months before the November The State Department now boasts its own Twitter
2016 election. In a life known for extensive pub- feed in 11 languages, 192 other Twitter feeds, and
lic service and inventiveness in her use of power, 288 Facebook accounts, and diplomats in the for-
Clinton’s mark on diplomacy will perhaps be best eign service institute must be trained in the uses
remembered by her extensive use and promotion of social media. As secretary of state, Clinton had
of social networking technology, combined by almost 13 million Facebook fans, 2 million Twit-
record-setting travel. ter followers, and 16 million video views with
A 1969 Wellesley College graduate, Hillary around 27,000 subscribers. These innovations
Clinton served as senior class president and was have significantly impacted foreign policy and rei-
active in student politics; she graduated in 1973 maged power relationships; in the past diplomats
from Yale Law School, where she met future hus- would have used overnight flash messages, and
band Bill Clinton. She served on the presidential now news spreads through multiple connection
impeachment inquiry staff, advising the House technologies.
Judiciary Committee during the Watergate affair; Clinton’s 21st-Century Statecraft initiative
following that, she became a faculty member involved the use of social media tools to achieve
at the University of Arkansas Law School. She foreign policy goals. She tripled funding for com-
married Bill Clinton on October 11, 1975, and puter training and surveillance-evading software
in 1978, he was elected Arkansas governor, with for dissidents. Clinton first learned of the 2010
Hillary Clinton serving as First Lady (1979–81 uprisings now known as Arab Spring from Twitter.
and 1983–92). Clinton also served as the First Her perspective is that employing technology will
Lady of the United States from 1993 to 2001, enhance U.S. advocacy for the disenfranchised.
284 Clinton, Hillary

Examples include using text messages to raise Service, designed to facilitate diplomatic engage-
money for the Haitian earthquake survivors and ment through social media. E-interns assist vari-
sending a delegation of women technology lead- ous agencies to conduct digital diplomacy, such
ers to Africa to discuss how social media can as developing public relations campaigns using
serve as a platform for people in underdeveloped social media sites, creating means of gathering
countries. She also established divisions within and analyzing media coverage of issues, research-
the State Department to answer violent anti ing information technology-based interventions,
American extremism on the Internet with rapid writing articles for the various State Department
response Twitter or video feeds. With her 21st- Facebook pages on issues, and surveying social
Century Statecraft platform, Clinton has champi- media efforts by nongovernmental organizations
oned technology as means to engage people in a (NGOs), diplomatic posts, and others.
less traditional diplomatic way, while enhancing On January 21, 2010, in remarks on Internet
the State Department’s engagement with publics freedom at the Washington, D.C., Newseum,
and issues worldwide. Clinton gave what was termed a historic speech on
This revolutionizing turn to the diplomatic use Internet policy and global online freedom. Clinton
of technology has been articulated in a number of described the spread of information networks as
addresses. In remarks at the Barnard College com- creating a new nervous system for the planet, but
mencement on May 18, 2009, Clinton reminded she cautioned about the threats to online freedom
graduates that the social networking tools such as through government censorship and other virtual
Twitter or Facebook that they commonly use can walls. In a follow-up speech at George Washing-
be employed to fight human trafficking or child ton University on February 15, 2011, Clinton
marriage, decry unfair treatment of journalists, reminded the audience that the Internet is now
or call for group actions. Social media were tools the world’s town square, classroom, and market-
for democratizing diplomacy, and she announced place, where people shape and are shaped by what
the formation of the Virtual Student Foreign happens there. She called on people worldwide to

Secretary of State Hillary Rodham Clinton delivered a speech titled “Internet Rights and Wrongs: Choices and Challenges in a
Networked World” at George Washington University in Washington, D.C., on February 15, 2011. Clinton called the Internet “the
‘public space’ of the future—a vital, global town square in which everyone shares an equal interest.”
Clinton, Hillary 285

protect the freedoms of expression, association, technology, e-mail, Facebook, Twitter, and Sina
and assembly in the online context, calling these Weibo (the Chinese Twitter). She noted that tech-
three freedoms “the freedom to connect.” These nology has become a big part of diplomacy, which
digital rights provide people a platform to present was demonstrated through her ability to speak to
ideas and innovation, as well as establish connec- students in six countries.
tions and the possibility for economic growth. At
a conference on Internet Freedom at the Hague on Conclusion
December 8, 2011, on the eve of Human Rights Hillary Clinton embraced social media as a way
Day, Clinton spoke of creating an international to conduct foreign policy in an interdependent
digital defenders partnership to combat restric- world that demands and expects greater intercon-
tions on human rights on the Internet. nectedness. She is a champion of technological
Clinton has repeatedly described 21st-Century innovations and initiatives, and she aggressively
Statecraft as the use of Internet tools to achieve for- developed the State Department’s use of technol-
eign policy goals, advocating for Internet freedom ogy to add dimension to its policies and agendas.
through a number of programs, initiatives, grants, As a result of her efforts, American diplomacy that
and forums. Among those were State Department typically had been a formal process of staid inter-
stands taken on behalf of online activists and jour- actions between trained actors has been enlarged
nalists who have been imprisoned; international to include the public. This coincides with Clin-
forums on Internet freedom and governance tied ton’s public service history of focusing on engag-
into human rights issues; establishing the Office ing people to engender change, especially for the
of the Coordinator for Cyber Issues; and support- under-represented.
ing U.S. Agency for International Development
(USAID) executing a program to establish digital Beth M. Waggenspack
safety capacity-building to local media and orga- Virginia Tech
nizations around the world. Secretary Clinton’s
21st-Century Statecraft initiatives connected pri- See Also: Campaigns, Presidential (2008); Digital
vate and civic sectors with foreign policy by join- Diplomacy; Nongovernmental Organizations; Twitter
ing resources and partners together for innovative Diplomacy; USAID Impact Blog.
diplomatic work via new technologies.
One example is the GSMA mWomen Program, Further Readings
described as a public-private partnership led by Calabresi, Massimo. “Hillary Clinton and the Rise of
the Global Women’s Initiative that aims to close Smart Power.” Time (November 7, 2011).
the global mobile phone adoption gender gap. Clinton, Hillary. “The Art of Smart Power.”
Civil Society 2.0 joins the technical capacity of NewStatesman.com (July 18, 2012). http://www
civil society organizations with tech-savvy groups .newstatesman.com/politics/politics/2012/07/hillary
and individuals to help raise digital literacy, -clinton-art-smart-power (Accessed April 2013).
enhance NGO communication networks, and Clinton, Hillary. “Global Town Hall.” U.S.
amplify the impact of civil society movements. Department of State YouTube Channel (January
There have also been several Tech@State confer- 29, 2013). http://www.youtube.com/watch?v=5E_
ences on topics ranging from using technology rS38kClg (Accessed April 2013).
during disasters to developing apps for specific Clinton, Hillary. “Internet Rights and Wrongs:
needs, such as mobile money. Choices & Challenges in a Networked
As secretary of state, Clinton engaged in a num- World.” U.S. Department of State (February
ber of “Global Town Halls,” which employed 15, 2011). http://www.state.gov/secretary/
social media and IP video conferencing technol- rm/2011/02/156619.htm (Accessed April 2013).
ogy. Her last such chat occurred on February Clinton, Hillary. “Remarks at Barnard College
4, 2013, at the Newseum in Washington, D.C., Commencement Ceremony.” U.S. Department
where she answered questions from college stu- of State (May 18, 2009). http://www.state.gov/
dents worldwide. Secretary Clinton took ques- secretary/rm/2009a/05/123599.htm (Accessed
tions through voiceover Internet protocol (VoIP) April 2013).
286 Cloud Computing

Clinton, Hillary. “Remarks on Internet management system as the cloud-based entity


Freedom.” U.S. Department of State (January maintains hold of a great deal of potentially pri-
21, 2010). http://www.state.gov/secretary/ vate or personally sensitive information. Fur-
rm/2010/01/135519.htm (Accessed April 2013). thermore, cloud-based servers must have strong
Hanson, Fergus. “The History of eDiplomacy at the encryption and security protections and proce-
U.S. Department of State.” Brookings Institute dures in order to protect such content. As such,
(October 25, 2012). http://www.brookings.edu/ the legal and ethical use of client data (particu-
research/reports/2012/10/25-ediplomacy-hanson larly across international borders) has drawn
-history (Accessed April 2013). increased attention from political and privacy
Leibowitz, Alex. “Secretary Hillary Clinton’s IP advocates, alike. This would be especially impor-
Video Chat and the Future of Social Media.” tant in situations involving personal and poten-
socialmediatoday.com (February 5, 2013). http:// tially sensitive information, such as medical
socialmediatoday.com/node/1216951 (Accessed records, legal documents, and political prefer-
April 2013). ences, actions, and affiliations.
Thierer, Adam. “Hillary Clinton’s Historic Speech Examples of cloud computing include Apple’s
on Global Internet Freedom.” Techliberation iCloud storage services, Google’s cloud platform
.com (January 21, 2010). http://techliberation (including Docs, Calendar, Spreadsheets, and
.com/2010/01/21/hillary-clintons-historic-speech Drive storage system), or DropBox, as well as
-on-global-internet-freedom (Accessed April 2013). Amazon’s Web Service, Microsoft’s SkyDrive, and
IBM’s PrivateCloud, or EMC’s Atmos.
The term cloud computing is a metaphor ref-
erencing the abstract and amorphous nature of
a decentralized computer network that mirrors
Cloud Computing the network structure of the Internet, only on a
smaller scale. With the rise of computer networks,
Cloud computing is a term that describes the use broadband Internet access, and in particular the
of a network of remote servers to perform func- mobility turn of the 2000s with the rise of the
tions that were traditionally run from localized mobile data grid, it was realized that it could be
computers. Rather than using one’s own comput- advantageous to users to access their content or
ing hardware and software to run programs, store services on their devices while storing their con-
information, or develop content, these files and tent or software elsewhere. This was true not
services are held elsewhere and accessed via the only in terms of bypassing the finite limitations
Internet from massive off-site data servers. Cloud of hard drive storage but also by providing ser-
computing services are often accessed via personal vices to mobile clients that could not otherwise
computers or, increasingly, through the use of be possible with a relatively static, centrally local-
mobile phones and tablets with either a dedicated ized network. The concept of the cloud would
software platform or a Web-based user interface. be embraced as a forward-looking technology
The primary advantage in operating within a by many citizens and digital firms alike, as land
cloud infrastructure is that it is often desirable to broadband and mobile data speeds continued to
outsource data management, software licensing, increase data transmission speed.
and server ownership and maintenance to other
third-party firms that operate on an economy of Privacy Issues and Security Concerns
scale and expertise rather than perform all tasks Perhaps the most troubling concept of the cloud is
in-house. Individual users and consumers who use the privacy of users’ stored content and communi-
cloud-based software or storage often are drawn cation. Privacy advocates have argued that most
to the ease, reliability, and stability of these “any- end-user license agreements (EULAs) effectively
where, anytime” services and the platforms with allow cloud service providers to access one’s con-
which they are provided. tent at any time for any reason, a clearly troubling
However, cloud computing requires that the notion to those who argue for digital privacy pro-
user have a great deal of trust in the remote tections. There have also been several cases where
Cloud Computing and Citizen Privacy 287

cloud-based storage has been hacked by outside Couillard, D. A. “Defogging the Cloud: Applying
individuals, either on an individual scale or en Fourth Amendment Principles to Evolving Privacy
masse, and users’ personal data, stored content, Expectations in Cloud Computing.” Minnesota
and communication have been compromised. Law Review, v.93/6 (January 1, 2009).
Despite strong encryption and security practices, Rong, C. and R. M. Esteves. “Social Impact of
cloud-based systems are under constant attack Privacy in Cloud Computing.” Cloudcom 2010
from hackers or other parties that wish to access (January 1, 2010).
private and sometimes sensitive information.
Even more troubling to privacy advocates is
government surveillance of cloud-based commu-
nication and content. Under the USA PATRIOT
Act, government agencies can monitor users’ Cloud Computing
online communication and content by requesting
access to user data, which in most cases does not and Citizen Privacy
require a warrant.
Cloud-based file storage services have also Cloud computing is a technology of the informa-
come under fire as distributors of intellectual tion technology (IT) sector that became publicly
property through nonlegal means because virtual available in the first decade of the 21st century.
file storage can also serve as a distribution net- Cloud computing is the current innovation of the
work for music, video, software, or other com- global IT sector and is swiftly developing into the
monly shared material. Most notably, this was the service offering of choice in business as well as
case that led to the 2012 shutdown of MegaUp- government. In general, cloud computing offers
load.com by the U.S. Department of Justice for three types of services: software as a service (Saas),
distributing illegal content, which resulted in the infrastructure as a service (IaaS), and platform as
seizure of all user data contained in the company’s a service (PaaS). SaaS is a software delivery model
25-petabyte server matrix. with its data centrally located and accessed by cli-
The cloud appears to be the future of comput- ents with a web browser. IaaS is associated with
ing. As mobile networks increase in both speed computer hardware or infrastructure with service
and coverage, and as more electronic devices that is associated with a platform virtualization
appear that can share similar files (such as docu- environment; and finally, PaaS deploys software
ments, music, video, and such), a network-based applications to support the systems and cycles of
storage that is accessible anywhere will appeal to Web applications available online.
consumers, and corporations will increasingly use All of these service models are promoted or
this strategy for many of the same reasons. The deployed with public clouds, hybrid clouds, private
biggest threat to the future of cloud computing clouds, and community clouds. Even Facebook can
appears to be the security and privacy question, be considered a cloud computing service. Although
along with the ability to roll out faster infrastruc- users may appear to “own” their personal Face-
ture to appease data-hungry consumers. book page, the site, along with its unique hardware
and software, is owned by Facebook. There are sig-
Doug Tewksbury nificant concerns regarding cloud service providers
Niagara University (CSP) in the area of privacy and security, however.
Moreover, given the efficacy issues regarding cloud
See Also: Data Mining; Privacy; Social Computing as more public sector entities rely on these services
and Social Information Processing; Social Media, it is important to briefly review the evolution of
Definitions and Classes of; Topology of Social cloud computing, its economic impact, and its
Networks. challenges in government and voter privacy.
In addition to scalability and reliability in gov-
Further Readings ernment and privacy, the need for securing data in
Ceruzzi, P. E. Computing: A Concise History. the cloud is a paramount concern. For example,
Cambridge, MA: MIT Press, 2012. the 2.0 phase of social media and the Internet has
288 Cloud Protesting

created an incredible urgency related to informa- Preferences, and Market Efficiency.” Washington
tion, collaboration, and creativity; however, the & Lee Law Review, v.70 (2013). http://
issue of security conflicts and its attendant vulner- scholarlycommons.law.wlu.edu/wlulr/vol70/iss1/6
abilities remains a barrier. Currently many secu- (Accessed July 2013).
rity experts believe that the cloud model creates Sidana, Harpreet Singh. “Cloud Computing:
an opportunity for illegal activity in relation to Managing Security.” InfoSys Lab Briefings, v.10/1
hackers, identity theft, and/or creative produc- (2012). http://www.infosys.com/infosys-labs/
tion. Therefore this leads to a widely held percep- publications/Documents/winning-it/cloud
tion that SaaS applications and cloud computing -computing.pdf (Accessed July 2013).
services are less trustworthy than locally con-
trolled networks within an organization.

Drawbacks
The security drawback for cloud computing is the Cloud Protesting
issue of having to share files with a third party.
Because it can be accessed from any personal Social media and mobile technology have changed
computer with Internet connection, viruses can the way people organize, mobilize, and protest.
infect the data files. Another issue is control over Organizing has become easier and quicker, and
saved data if security is not up to standards of IT protest tends to be fluid, temporary, and elu-
governance and files lost cannot be retrieved. sive. Organizational patterns have transformed,
with individuals and networked collective action
Growth and Future Trends becoming prominent at the expense of traditional
Cloud computing will continue to contribute not movement organizations. The narrative of the
only to business innovation in regard to e-com- action is no longer centralized and controlled by
merce but also within the education field in rela- social movement organizations, but any activist
tion to management and the passing and sharing can contribute by producing, selecting, and dif-
of knowledge. For example, individuals that use fusing material like tweets, pictures, and videos.
Google Docs to send data and receive messages Cloud protesting indicates a type of social orga-
are already performing an aspect of cloud com- nizing for collective action that has individuals (and
puting. However, security concerns may lead to their needs, identities, and bodies) at its core. Cloud
a move to some type of centralized data control protesting is fostered by social media platforms
institution whereby a legal authority can engage and mobile devices. The notion was developed by
in identity management. S. Milan as a theoretical concept to illustrate how
social media politics change organized collective
Reynaldo Anderson action. Examples of cloud protesting include the
Harris-Stowe University worldwide Occupy Wall Street mobilizations and
Kandace Harris Anonymous, a digital activism network.
Clark Atlanta University Cloud computing is the delivery over the Inter-
net of customized services such as software. Ser-
See Also: Cloud Computing; Cloud Protesting; vices are stored “in the cloud,” where users can
Electronic Voting; Voter Privacy. access them on demand. The sharing of products
and infrastructure result in cost reductions for the
Further Readings end users. Applying the computing metaphor to
Carstensen, Jared, Bernard Golden, and J. P. collective action, the cloud takes on two mean-
Morgenthal. Cloud Computing: Assessing the ings. On the one hand, the cloud is an imagined
Risks. Cambridgeshire, UK: IT Governance digital space, where participants store, share, and
Publishing, 2012. enjoy soft resources crucial to collective action,
Kesan, Jay P., Carol M. Hayes, and Masooda N. such as collective identities and narratives. On the
Bashir. “Information Privacy and Data Control other hand, the cloud is a metaphor for a spe-
in Cloud Computing: Consumers, Privacy cific way of connecting individuals in an instance
Cloud Protesting 289

of collective action, which appears to be heavily individuals rather than traditional organizations.
influenced by the modes of interaction typical of The Arab Spring brought thousands of people to
social media. the streets in north Africa; the Spanish movement
In times of social media, the cloud, made of of the Indignados (literally, the outraged) and
blogs, social networking, microblogging, and dig- antiausterity protests like the worldwide Occupy
ital storytelling platforms, is the main place where spurred a new wave of mobilization; fluid net-
conversations and exchanges about politically works like Anonymous mobilized online. Con-
oriented collective action take place. This digital trary to earlier mobilizations, activists privileged
space is to be intended in the guise of a symbolic a way of converging that focused on, and highly
place between mobile devices and social media valued, individual needs, preferences, and con-
platforms, similarly to B. Sterling’s definition of tributions. The private and subjective experience
cyberspace as the “place between the phones” of individuals became central to the collective
where a telephone conversation appears to occur. dimension because participants shared via social
A set of vital ingredients enabling mobilization media not the actual action but the experience of
coexists in the cloud: identities, meanings, slogans, the action, filtered through their own perspectives.
protest practices, and expertise. They emerge and The prominence of individual over group
are negotiated both in online and offline settings engagement influences the way activists expe-
but are brought to life, exchanged, and stored in rience collective identity, that is to say the pro-
the cloud. At the same time, the cloud is a meta- cess through which people give meaning to their
phor for social media-specific ways of creating experiences and develop emotional attachment to
meaningful connections among individuals and their fellows, according to F. Polletta and J. Jas-
speaks to the individualization observed in con- per. Typically, when the action is the expression of
temporary collective action. a group of people acting together, the group gives
meaning to the individual. In cloud protesting, on
From the Organization to the Cloud the contrary, taking action is the sum of individ-
One can distinguish three main types of groupings ual, and not group, performances. Rather than a
that have supported politically motivated collec- unifying group narrative, the resulting collective
tive action in the West from the 1960s onward: identity is the sum of the shared meanings that
the social movement organization (1960s–1990s), have survived the exercise of pooling together
the network (1990s–mid-2000s), and the cloud individual experiences.
(from mid-2000s onward). In the first phase, iden-
tity- or issue-based organizations such as student, Tailoring Participation to
church, antiwar, or women’s groups provided Collective Action
leadership, managing crucial resources like fund- Social media and mobile devices influence col-
ing and monopolizing the cultural and norma- lective action in four ways. First, social media
tive production of the movement. In the 1990s, enables an unprecedented speed in protest orga-
informal networks and affinity groups took cen- nization and diffusion. Second, social media have
tral stage, also thanks to the horizontal and par- the ability to broaden participation because ral-
ticipatory possibilities offered by the Internet. lies and sit-ins unfold on these same platforms as
These informal networks, which coexisted with much as they take place in real life—even if one
traditional organizations, embodied multiple and might question the quality and perseverance of
flexible identities and horizontal leadership. The such participation. Third, social media influence
movement’s cultural and normative production the tactics adopted by activists in what might be
was no longer monopolized by large-scale organi- called the politics of visibility. Action becomes
zations, but the different nodes would voice their functional to its visibility, and in turn, the visibil-
claims and build their narratives in a number of ity afforded by social media becomes the measure
Web sites and online, self-organized platforms. of the success of a movement’s tactics. Fourth, and
The new wave of protest that spread across the most important, social media enable the creation
world in 2010 and 2011 inaugurated the phase of a customizable narrative and a tailored collec-
of cloud protesting characterized by networked tive identity that virtually fit all. On the one hand,
290 Cloud Tiger Media

through social media protesters actively partici- as communication devices and into an indepen-
pate in the first person to building a collective dent “social presence”; it also is an indication of
identity, and on the other, social media give voice a new awareness for the role of digital technology
and visibility to personalized yet universal narra- not just as a tool for networking and organizing,
tives, whereby everyone participates in building but as the backbone of a movement’s’ cultural
the collective plot. and normative production.
The cloud gives a presence and a multifaceted
shape to immaterial resources like identities and Stefania Milan
narratives in an array of digital objects, such as Tilburg University
tweets, links, photographs, and videos, which
render those meanings tangible. Rather than See Also: Activists and Activism, Digital; Arab
being managed and imposed by social move- Spring; Cloud Computing.
ment organizations, resources are in the cloud to
be enjoyed by participants in a pick-and-choose Further Readings
fashion. By taking part in the protests and making Harvey, Kerric. “Online for the Ancestors: The
them visible via microblogging platforms, each Importance of an Anthropological Sensibility in
participant defines him- or herself, and by exten- Information Superhighway Policy Design.” Social
sion the mobilization, by means of posts, pictures, Science Computer Review, v.14/1 (Spring 1996).
and short videos. He or she selects other similar Milan, S. “Cloud Protesting: Dissent in Times of
material posted on the Web by fellow coprotest- Social Media.” Citizen Lab (October 18, 2011).
ers and passes on (e.g., retweets) what he or she itizenlab.org/2011/10/cloud-protesting-dissent-in
believes is exciting and appropriate to the collec- -times-of-social-media (Accessed January 2013).
tive representation of “who we are.” Milan, S. “WikiLeaks, Anonymous, and the Exercise
In addition, anyone can easily identify with the of Individuality: Protesting in the Cloud.” In
network of individuals engaged in the protests as Beyond WikiLeaks, B. Brevini, P. McCourdy,
the collective identity is built on minimum com- and A. Hintz, eds. Basingstoke, UK: Palgrave
mon denominators and ephemeral slogans rather Macmillan, 2012.
than ideological strongholds. The personalized yet Polletta, F. and J. Jasper “Collective Identity and
universal narratives of the protest emerge thanks Social Movements.” Annual Review of Sociology,
to social media originating a hashtag-style col- v.27 (2001).
lective narrative. Such a narrative is flexible, real Sterling, B. “The Hacker Crackdown. Law and
time, and crowd controlled. It connects individ- Disorder on the Electronic Frontier” (1993). http://
ual stories into a broader context that gives them cyber.eserver.org/sterling/crackdwn.txt (Accessed
meaning. In turn, it scores very low in organiza- January 2013).
tional control. In other words, the cloud leaves
little room for classical social movement organi-
zations: the loose collective actor identified by the
cloud becomes the group, providing a slack sense
of belonging and virtually no responsibility over Cloud Tiger Media
fellow activists.
Like in cloud computing, the cloud reduces the Cloud Tiger Media, Inc., owns and operates
costs of mobilization for collective actors by offer- Upworthy, a viral aggregator that delivers curated
ing resources that can be accessed via social media daily picks via Pinterest, Facebook, Twitter, and
and enjoyed independently by individual activists. e-mail newsletters. With the financial backing of
Not only does cloud protesting represent a new Chris Hughes, the cofounder of Facebook, Cloud
type of social mobilization that has brought indi- Tiger Media was founded on March 26, 2012,
viduals and their individualized media to the fore- by Peter Koechley, the former managing editor
front of dissent, in a fashion that concretizes the of the online satirical news site The Onion, and
notion of the Internet and its contiguous technol- Eli Pariser, president of online campaign network
ogies moving beyond their original functionality MoveOn. Eli Pariser is now Upworthy’s chief
Cloud Tiger Media 291

executive officer. The aim of the news aggregation itself as having an informal, friendly relationship
site, Upworthy, is to spread progressive content with the user. Once users click on the content they
virally through the Internet. wish to view, the site further invites users to iden-
Upworthy describes itself as mission-driven. tify with the organization’s progressive stance.
Curators sift through the clutter of videos, blogs, Before users can view any content, they are met
and pictures available online, and highlight con- with a window that states “I support equality for
tent that will make citizens more aware of larger all. I believe everyone should be treated equally,
social issues. According to its mission statement, regardless of race, gender, or sexual orientation.”
the company’s goal is not to appear unbiased, The user is given the opportunity to either click
but rather to bring attention to progressive social “I agree” or “I disagree.” If the users click “I dis-
issues. It describes itself as pro-gay marriage, and agree,” they go directly to the content. If the users
antichild poverty. click “I agree,” they are met with another window
Upworthy works with causes to build traffic that again states, “I support equality for all.” In
and to connect them to an audience, in return for addition, this window solicits users to enter their
a referral fee. While Upworthy’s content curators e-mail with “We’ve got tons of great content that
do create some stories, most of their time is spent we think you’ll love. Check out our daily email,
searching through visual sites such as YouTube. The Upworthiest, and find out!” After submitting
Unlike traditional news outlets, which emphasize an e-mail address, the user clicks a button that
timely current events, Upworthy focuses on con- states, “I’m in!” At this point the user also can
tent that is of high interest to its audience. Upwor- close out of the window to access the content.
thy focuses on online content that is visual and At the time of writing, Upworthy does not dis-
sharable. Reposting or sharing Upworthy content play advertising. While mission-driven, Upworthy
allows audience members to shape and define their is a business, and as a business it makes money by
own public identity. At the same time, reposting creating leads and traffic to nonprofits. Upworthy
and sharing Upworthy content connects new audi- acknowledges in its Web page, “About Us,” that
ences with the organization’s progressive content. it often faces moral decisions about who to work
Upworthy describes its audience as the “Daily with. While it promises to work only with organi-
Show generation.” As such, the curators spend zations that are creating positive social change, it
much of their time curating a clickable headline also states that Upworthy almost never completely
that is humorous, tongue-in-cheek, and sarcas- agrees with everything a group does. For example,
tic. When Upworthy’s curators find content, they while Upworthy would support, and agree that a
come up with a list of headlines. They then use a religious group that provides food for low-income
platform, SimpleReach, which tracks every social people is positive, it may disagree with that group’s
action around Upworthy’s content and correlates stance on gay marriage.
those actions with site engagement. With the help As traditional media outlets, such as news-
of SimpleReach, Upworthy can discover which papers and radio, are becoming less effective in
headline is most effective in generating clicks. For raising awareness of public-interest stories, those
example, in October 2012, Upworthy published companies that focus on the distribution of social
a map of gay rights around the world with the media, such as Upworthy, are becoming more
headline “Hey Look, It’s a Map of Inequality!” effective.
One of Upworthy’s most-viewed videos in 2012 One year after its inception, Upworthy became
was of a local Wisconsin news anchor defending the fastest-growing media company in the world,
her weight to an online bully. Another was an ad growing from zero to 10.4 million readers.
from an Australian organization defending gay According to Facebook metrics, Upworthy had
marriage titled “If This Video Makes You Uncom- approximately 1.2 million followers, and about
fortable, Then You Make Me Uncomfortable.” 65 percent of the U.S. population has a friend
Once a user clicks on a headline, he or she is who likes Upworthy in the spring of 2013.
directed to Upworthy.com. The header on the
page, “Things that matter. Pass ’em on,” reflects Molly Swiger
Upworthy’s progressive mission. It also positions Baldwin Wallace University
292 CNN Effect

See Also: Aggregation; Change.org; Daily Show, inspired by CNN, it has since been applied to many
The; Facebook; Going Viral; Lesbian, Gay, Bisexual, forms of modern media and networks.
and Transgender Rights; Moveon.org; Onion, The; Given the prevalence of the CNN effect, it is not
Pinterest; Social Media; Twitter; YouTube. surprising that academics have taken to studying
the actual impact of its emergence. Steven Livings-
Further Readings ton wrote the seminal paper on the topic, “Clari-
Reno, Jamie. “With Upworthy, Internet Heavies Push fying the CNN Effect.” Livingston’s central argu-
Social Media With Significance.” The Daily Beast. ment is that the media functions in one of three
http://www.thedailybeast.com/articles/2012/04/29/ ways: agenda setting, impeding, or accelerating. In
with-upworthy-internet-heavies-push-social-media the agenda-setting role, the media helps tell people
-with-significance.html (Accessed April 2013). what policies to pay attention to. With impeding,
Shontell, Alyson. “Brilliant, Unusual Way Media they move toward raising efforts to block a policy
Startup Upworthy Grew to 10.4 Million Monthly moving toward acceptance. And with accelerat-
Readers in its First Year.” San Francisco Chronicle ing, the media helps push an issue through the
(March 17, 2013). http://www.sfgate.com/ policy process in an expedited manner. Constant
technology/businessinsider/article/The-Brilliant- coverage on a particular piece of news may lead to
Unusual-Way-Media-Startup-Upworthy-4388967 political attention being paid to it, and sometimes
.php (Accessed April 2013). forces the matter, requiring politicians to address
Upworthy.com. “Upworthy Is . . .” http://www.up issues because of the resulting public interest.
worthy.com/about (Accessed April, 2013). Whether this is good for government depends
on whether one is a citizen or a politician. For pol-
iticians, the CNN effect is troublesome because
there is less time for reflection, analysis, and intel-
ligence gathering. While transparency increases,
CNN Effect accuracy may in fact decrease in the initial stages.
For example, on September 11, 2001, CNN ini-
The term CNN effect arose after the Cable News tially reported that a small Cessna plane had acci-
Network’s (CNN) saturation coverage of several dentally collided with the World Trade Center
key events during the tail end of the Cold War before more information became available. Deci-
era—especially the 1989 Tiananmen Square Mas- sions must be made much more quickly with the
sacre and the collapse of communism in Europe— presence of constant news.
which were followed in the 1990s by similar If speed truly is the key to determining whether
24-hour coverage of the Gulf War and crises in the CNN effect is valid, then recent trends in
Somalia. Whereas traditionally Americans would social media suggest that it is transforming into
have had to wait for the evening news or the publi- a more generalized social media effect. While
cation of a daily newspaper the following day, the CNN was able to bring the public information
CNN effect allowed them to remain up-to-date quickly in the mid-1990s, Twitter, Facebook, and
every minute of the day with immediate coverage. other social media sites have quickly become the
As a result of the real-time reporting, some go-to place for immediate news coverage. Recent
observers started to believe that decisions related to political events have borne this out. During the
foreign policy in the United States were being made raid on Osama bin Laden’s hideout in May
in response to what CNN was reporting. Histori- 2011, an unknowing Pakistani was live-tweet-
cally, the media had always had some influence on ing the American attack based on the noises he
decision making in the United States, but what was hearing from his apartment. Likewise, if the
citizens were witnessing appeared to be a differ- Arab Spring had occurred in 1995, CNN would
ent phenomenon. The CNN effect was faster and have been able to provide timely updates, but it
deeper than what had previously been observed. would not have been able to present the quantity
The American public was seemingly receiving of detailed information that individuals experi-
information at the same speed as decision makers encing the protests firsthand were able to share.
in Washington, D.C. While the term was originally And without those firsthand accounts, some
Coattail Effect 293

foreign policy decisions in the United States.


There is a cost associated when citizen journalists
are able to take to a large audience at no cost, and
instantaneously. For politicians, strategic plan-
ning and the days of collecting all available infor-
mation prior to being asked to make a statement
are gone. If a public official responds by telling a
reporter that he or she is still collecting informa-
tion or is unsure of making any comments at the
time, social media will likely explode with claims
of incompetence or ineffectiveness. In the age of
immediate information, Americans have largely
come to expect immediate, accurate answers and
that can prove to be as problematic as it is helpful.
CNN staffers prepare for a CNN/YouTube Republican presidential
debate in November 2007. During the debates, candidates faced William J. Miller
some of the thousands of voter questions sent in via YouTube. Flagler College

See Also: Al Jazeera Effect; Amplification; Citizen


Journalism; Facebook; Social Media, Definition and
could question how responsive outside forces Classes of; Twitter.
would have been. The actions of countries like
China, North Korea, and Pakistan, with their Further Readings
varying degrees of government-enforced censor- Livingston, Steven. “Clarifying the CNN Effect: An
ship of the Internet and social media, shows an Examination of Media Effects According to Type
acknowledgment of the potential power of social of Military Intervention.” Research Paper R-18.
media in enacting change. It was easy to monitor John F. Kennedy School of Government Joan
state-controlled media, but with the emergence Shorenstein Center on the Press, Politics and
of social media, it has become more difficult to Public Policy (June 1997). http://www.genocide
censor what the world learns about a particular -watch.org/images/1997ClarifyingtheCNNEffect
situation. -Livingston.pdf (Accessed May 2013).
The most recent example of the new CNN effect Robinson, Piers. The CNN Effect: The Myth of News
occurred with the Boston Marathon bombings in Media, Foreign Policy and Intervention. New
April 2013. While television news networks and York: Routledge, 2002.
traditional media were quick to make informa- Seib, Philip. The Al Jazeera Effect: How the New
tion available to the general public, social media Global Media Are Reshaping World Politics.
sites were exploding with frequent updates, ques- Dulles, VA: Potomac Books, 2008.
tions, pictures, and video. As would be expected,
law enforcement officials at all levels have begun
monitoring such sites to attempt to garner any
relevant clues regarding cause or motive. While
social media did not directly lead to the capture Coattail Effect
of anyone involved, there was a healthy, public
deliberation occurring and ultimately a platform The coattail effect describes the ability of popular
through which Americans could rally around one political candidates to attract electoral support for
another in the wake of the attacks. other candidates of the same party. Much of the
All of the above is not to say that the CNN discussion of coattail effects examines the tendency
effect is a net positive. At a minimum, it is known of presidential candidates to help their party’s
that the CNN Effect has changed from being down-ballot contestants (i.e., congressional candi-
merely about alleged claims of media dictating dates) earn electoral victory. For this reason, the
294 Coattail Effect

coattail effect is sometimes studied as part of the Several factors other than a high-profile candi-
larger body of research on presidential–congressio- date’s popularity could influence the likelihood of
nal voting. Still, the notion of coattail effects is just apparent coattail effects. Specifically, party identi-
as applicable to other levels of government. fication, attitudes toward specific presidential can-
For instance, a popular gubernatorial candidate didates, and a host of forces unique to each indi-
may influence the outcome of state legislative races vidual, lower-level election may determine if and
in favor of his or her own party. At any level of gov- when citizens’ congressional voting decisions are
ernment, an exceptionally popular candidate who influenced by their presidential voting decisions.
helps a considerable number of candidates from his Incumbency is another important variable in the
or her party achieve election may be said to have coattail effect phenomenon. Traditionally, the
very long coattails. For instance, U.S. presidential effects of a presidential candidate’s endorsement
candidate Ronald Reagan is often credited with of lower-level candidates have been regarded as
helping Republican candidates for Senate unseat an issue altogether separate from coattail effects.
12 incumbent Democrats during the 1980 election So, while coattail effects and endorsement effects
season. The ability to generate a strong coattail are sometimes examined together, true coattail
effect is generally regarded as a political achieve- effects do not depend on a party’s congressional
ment for a presidential candidate, in part because candidate having been directly endorsed by that
it helps ensure support for a president’s legislative party’s presidential candidate.
agenda. However, the idea of coattail riding may The coattail effect is more likely to occur in
have negative connotations when it implies that a years that feature a presidential election. This is
down-ballot candidate did not earn victory on his because presidential candidates are among the
or her own merits. In addition to being the subject most well-known leaders of political parties and
of scholarly inquiry, the concept of electoral coat- because presidential elections attract more voters
tails is also a topic of discussion among journalists to the polls than midterm elections. The physi-
and political analysts in news media. cal layout or appearance of a ballot can influ-
ence coattail effects as well. In the early days of
Identifying the Coattail Effect political parties, coattail effects were particularly
The simplest measure for identifying the presence common because all of a political party’s candi-
or absence of a coattail effect is to compare the dates were listed in a single column—sometimes
number of votes earned by a presidential candidate on a single piece of paper. Thus, it was easy
to the number of votes earned by his or her party’s and common for voters to cast a straight-party
congressional candidates in the same year. A presi- ticket rather than cast a split-ticket vote. In fact,
dential candidate who earns more votes than the the coattail effect was once so strong that it was
rest of his or her party is said to have helped his or entirely common for U.S. presidents to begin their
her party by way of the coattail effect, whereas a terms with majorities in both houses of Congress.
presidential candidate who earns fewer votes than The presence of strong third-party candidates
his or her congressional counterparts is regarded as for president can also complicate the nature of
having failed to cultivate a coattail effect. Impor- the coattail effect. In such elections, it is not
tantly, the work of numerous political scientists, unusual for a party’s down-ballot candidates to
most notably Warren E. Miller of the University of receive more votes than that party’s presidential
Michigan, has produced much more nuanced equa- candidate. The 1948 U.S. presidential election
tions for accurately calculating coattail effects. In between Harry Truman (Democratic), Thomas
fact, it has been proposed that a presidential candi- Dewey (Republican), Strom Thurmond (States’
date who substantially outperforms congressional Rights Democratic), and Henry Wallace (Progres-
candidates of his or her own party has apparently sive) is a prominent example of this occurrence.
low pulling power and, therefore, little or no coat- Regardless of whether a third-party presiden-
tail effect. Ultimately, because of the multitude of tial candidate is involved, a presidential election
variables that influence the outcome of presidential year in which a party’s congressional candidates
and congressional elections, the coattail effect is garner more votes than their presidential candi-
difficult to identify with scientific precision. date is sometimes noted for exhibiting a reverse
Coburn, Tom 295

coattail effect. The notion of a negative coattail Representatives. Coburn is considered one of
effect refers to the tendency of unpopular presi- the staunchest conservatives (both economic and
dential candidates to negatively influence the social) in the Senate. He is probably best known for
electoral fortunes of other members of the same his criticism of government waste and pork barrel
party. For instance, U.S. presidential candidate spending. He is such a critic of government pro-
Barry Goldwater is sometimes said to have been grams and spending that he is frequently referred
such a weak Republican candidate for president to as “Dr. No.” Despite his conservative reputa-
in 1964 that many voters were discouraged from tion, Coburn has sought to work across party lines
voting for Republican candidates farther down on tax and debt issues—most notably as part of
the ballot. the “Gang of Six.” His conservative stances on
In Singapore, the advent of Group Represen- abortion, taxes, and spending reflect the views of
tation Constituencies has encouraged a form of the majority of his voting constituents.
coattail effects in the election of members of par- Thomas Allen Coburn was born in Casper,
liament. The system requires candidates to run as Wyoming, in 1948. He attended the University
part of three- to six-person slates, each of which is of Oklahoma, where he received his undergradu-
required to include a member of a minority com- ate degree, and Oklahoma State University, where
munity. The most popular candidate on each of he received his medical degree. For much of his
these slates is often credited with helping lesser- career, Coburn was a doctor.
known candidates on the same slate get elected. In 1994, Coburn was elected to the U.S House
New Zealand’s mixed-member proportional elec- of Representatives from Oklahoma. Like many
toral system, which sometimes encourages major other Republican challengers, he endorsed Newt
party representatives to endorse members of Gingrich’s Contract with America—a series of
minor parties, may also increase the likelihood of popular conservative proposals that Gingrich
some form of coattail voting. promised to bring to the House floor for a vote if
Republicans gained control of the House of Rep-
Mark J. Glantz resentatives. Once elected to the House, Coburn
St. Norbert College supported the Contract with America, including
a balanced budget amendment, welfare reform,
See Also: Political Base; Political Parties; Voter tax cuts, and term limits. However, Coburn soon
Turnout. became disillusioned with Gingrich, feeling that
he was selling out conservative principles that he
Further Readings had promised to promote in the Contract with
Hogan, Robert. “Gubernatorial Coattail Effects in America. Gingrich was too moderate for the con-
State Legislative Elections.” Political Research servative Coburn. Coburn was easily re-elected in
Quarterly, v.58/4 (2005). 1996 and 1998. Coburn declined to run for re-
Miller, Warren. “Presidential Coattails: A Study in election in 2000, keeping a campaign promise not
Political Myth and Methodology.” Public Opinion to run for more than three terms.
Quarterly, v.19/4 (1954). In 2004, Coburn was elected to the Senate seat
Moos, Malcolm. Politics, Presidents, and Coattails. vacated by the retiring U.S. senator from Okla-
Baltimore, MD: Johns Hopkins University Press, homa, Don Nickles. In the Senate, he became
1952. known for his fierce opposition to government
waste and spending—even if it displeased his fel-
low Republicans. For example, Coburn offended
his fellow Republican Senator Ted Stevens of
Alaska when he opposed the Bridge to Nowhere.
Coburn, Tom Throughout his Senate career, he sought to ban
earmarks as well as make public which senators
Tom Coburn is currently a Republican U.S. sena- requested them. On social issues, Coburn opposed
tor from Oklahoma. Before serving in the Sen- abortion in all instances as well as gay marriage.
ate, he served three terms in the U.S. House of He was easily re-elected in 2010.
296 CODEPINK

Despite his reputation as a conservative, See Also: Fiscal Cliff Crisis; Grassley, Chuck;
Coburn forged friendships across party lines, McConnell, Mitch; Spending and Debt, Government.
most notably with the young freshman senator
from Illinois, Barack Obama. The unlikely duo Further Readings
sponsored legislation cracking down on govern- Allen, Jonathan. “Gang of Six Makes Last Ditch
ment waste. Despite their vast philosophical dif- Effort.” Politico (July 19, 2011).
ferences, the men remain friends to this day. Burns, Alexander. “Tom Coburn, Still not a Newt
In recent times, Coburn has worked across Gingrich Fan.” Politico (December 4, 2011).
party lines with the “Gang of Six” to solve debt Coburn, Tom A. The Debt Bomb: A Bold Plan to
and tax issues. For example, in 2011 he worked Stop Washington From Bankrupting America.
with the “Gang of Six” to forge a compromise Nashville, TN: Thomas Nelson, 2012.
that would lead to Congress raising the debt ceil- Gerstein, Josh. “Coburn Dismisses Fiscal Cliff.”
ing (though their compromise was not adopted). Politico (December 9, 2012).
More recently, Coburn signaled that he would Mak, Tim. “Tom Coburn: If Mandate Falls, Pull Plug
support raising some taxes in order to avert the on Health Law.” Politico (April 29, 2012).
so-called fiscal cliff. This stance ran contrary to his Raju, Manu. “Coburn’s Book Criticizes Both Parties
party, which insisted that it would not raise rates on Debt Woes.” Politico (April 17, 2012).
(though it would consider closing rates in order Raju, Manu. “Secret Talks Under Way About ‘Fiscal
to raise revenue). While Coburn primarily wants Cliff.’” Politico (June 6, 2012).
to cut spending, he considers it unrealistic to rule Raju, Manu and John Bresnahan. “Tom Coburn
out raising taxes. Coburn has also disagreed with Rapped by Ethics Committee.” Politico (May 25,
his party on defense spending. While supporting 2012).
a strong national defense, Coburn is more will- Robillard, Kevin. “Coburn: GOP Lacked ‘Positive
ing to cut defense spending—especially in areas Vision.’” Politico (November 11, 2012).
where he perceives waste and fraud. According Rogers, David. “Tom Coburn Targets Boeing in
to the publication National Journal, Coburn on Airline Fight.” Politico (March 18, 2012).
average votes with Republicans in Congress 85 Wong, Scott. “Gang of Six ‘Hopeful’ for Budget
percent of the time. Deal.” Politico (November 12, 2012).
Coburn is perceived as a principled conserva-
tive and man of integrity. Even his critics grudg-
ingly respect his adherence to principle. However,
his reputation as a man of integrity was challenged
as a result of the fallout over Nevada Republican CODEPINK
Senator John Ensign’s extramarital affair. Ensign
resigned from office after it was revealed that he CODEPINK is a self-described women’s movement
sought to keep the affair quiet by offering bribes. for peace. Formed in 2002, CODEPINK focuses
An investigation revealed that Coburn knew on challenging U.S.-led and funded military action
about Ensign’s affair and was aware of negotia- across the globe. Its goal is to encourage the real-
tions to silence Ensign’s mistress’s family through location of resources spent for militarism to the
bribes. In 2011, the Senate Ethics Committee rep- funding of humanitarian issues, such as education,
rimanded Coburn for his conduct in the matter. health care, and the environment. The organiza-
Coburn serves on a number of high profile tion is of special interest to a study of social media
committees including Finance, Judiciary, and and politics because of its use of digital platforms
Homeland Security and Government Affairs. to develop, organize, and mobilize its membership,
Undoubtedly, Coburn will play a major role in leading to widespread recognition of its actions
negotiations over taxes and the debt for years to within the political public sphere.
come.
Background
Jason Roberts CODEPINK’s membership includes a decentral-
Quincy College ized collection of mostly U.S.-based chapters, with
CODEPINK 297

international chapters in Canada, Germany, and issue clarification. The About Us section provides
Japan. While the group accepts male members, the a summary of the group’s beliefs. The news sec-
membership is primarily composed of women. tions provide access to published news reports
The group entered the public sphere on Novem- that illustrate how these beliefs are incorporated
ber 17, 2002, when founders Media Benjamin, in the broader public sphere. Discussion areas
Jodie Evans, Diane Wilson, and Starhawk began a and links to social networking accounts permit
four-month vigil at the White House in protest of a decentralized membership to negotiate these
military action in Iraq. With approximately 100 issues in interactive forums.
other women, CODEPINK maintained an all-day The Act Locally section of the Web site pro-
presence outside the gates of the White House vides various items to organize and mobilize
lawn to bring attention to its call for peace. collective action both online and offline. This
The name of the organization rearticulates the section includes online petitions, a calendar of
terrorist color-coded system, developed by the events, and informational resources. Of particu-
George W. Bush administration in the wake of lar note is the Action Toolkit. Within this section,
the September 11 terrorist attacks on the United members find “jumping off points to assist your
States. In this system, Code Red signifies the top own creativity in being audacious, informed, and
level of alert for a terrorist crisis. Alternatively, visible for peace.” The toolbox allows members
CODEPINK signifies the highest level of alert to download the PDF file for “How to Organize
for a humanitarian crisis. Furthermore, the color a Local CODE PINK Chapter,” obtain talking
pink connects with the traditional gendered iden-
tity marker of femininity, thus connecting with
the group’s identity as a women’s movement. The
group’s discourse is characterized by themes asso-
ciated with liberal feminism, invoking assumptions
about the “innate” nature of women as more car-
ing and nurturing.
The group generated national attention by
staging protests such as mock funerals and rallies
designed to garner news media attention and by
making appearances in high-profile congressio-
nal hearings, inaugural ceremonies, and political
party conventions. A key element to its success in
creating awareness is its use of digital media.

Digital Media
The group’s use of digital technology, including
a Web site, discussion boards, text messages, and
e-mail newsletters, is a vital component to its
growth and success, particularly as it relates to
its ability to organize and mobilize its constitu-
ency. The organization’s primary Web site, www
.codepinkalert.org, has been the center in its
overall strategy for organization, mobilization,
and publicity. The site serves as a clearinghouse
of resources that local chapters and individuals
can use to stage protests, write letters to newspa-
pers or representatives, and take other collective A CODEPINK member takes part in a four-month, all-day vigil
actions. in front of the White House, beginning November 7, 2002. The
Moreover, the Web site is an important tool vigil inspired others, from private citizens to nongovernmental
of organizational cohesion because it allows for organizations, to stand with the group for peace.
298 Cognitive Surplus

points for media protests, and view pointers for a decentralized organizational structure, to offer
staging a protest. For example, “Guidelines for members a specialized forum for interaction, to
Organizing a Protest” suggests ways for find- coordinate group action, and to obtain public-
ing a location, getting permits, writing press ity in a broader public sphere. From a theoretical
releases, and sending e-mail alerts. These guide- standpoint, the group’s actions have important
lines encourage protests not just in metropoli- implications for the role of digital technology in
tan cities, such as New York, Los Angeles, and allowing diverse groups to enter the discourse in
Washington, D.C., but also in smaller towns the broader public sphere.
and cities. Significantly, the Action Toolkit has
strategic implications for generating mainstream Maria Anne Simone
offline publicity. Rowan University
In addition to the Web site, e-mail newslet-
ters serve an important function for coordinating See Also: Activists and Activism, Digital; Human
and mobilizing action. End users can sign up for Rights; Identity Politics.
newsletters that provide information and updates
about upcoming opportunities for action. All of Further Readings
these newsletters are connected back to the main Khan, Shaan and Jethro Mullen. “American Activists
Web site as well as the various social networking in Pakistan to Protest U.S. Drone Strikes.” CNN
sites used by the organization. (October 6, 2012). http://www.cnn.com/2012/
The organization also uses a collection of social 10/05/world/asia/pakistan-us-drone-protest/index
media to remain connected to members and other .html (Accessed December 2012).
organizations with similar or sympathetic view- Simone, M. A. “CODEPINK Alert: Mediated
points. It has a section on its Web site dedicated Citizenship in the Public Sphere.” In Mediated
to Pink Allies. It also contributes guest articles Citizenships, K. Wahl-Jorgensen, ed. New York:
and blog posts on other organization’s Web sites, Routledge, 2008.
thus expanding the reach of its message beyond a Simone, M. A. “Deliberative Democracy Online:
potentially narrow or niche audience. Bridging Networks With Digital Technologies.”
In addition to these resources that permit a The Communication Review, v.13/2 (2010).
one-to-many or many-to-many communication
pattern, CODEPINK has also expertly used one-
to-one digital media resources to coordinate their
actions. When attending national media events,
such as a congressional hearing, CODEPINK Cognitive Surplus
members have used text messaging as a way to
provide instructions to the group member inside Cognitive surplus is a concept used to capture
the hearing. For example, CODEPINK member the “surplus” or extra productive labor time that
Midge Potts attended the congressional hearings people have in the new media age. Proposed by
regarding the Valerie Plame Wilson affair and was Clay Shirky, the term cognitive surplus refers to
able to situate herself on the camera screen, wear- the amounts of time freed up through digital and
ing a bright pink shirt that read, “Impeach Bush online technologies. Shirky argues that people
Now.” Thanks to text messages from her fellow spend this surplus time engaging in a wide range
CODEPINK members watching the live broad- of creative production online.
cast, she positioned herself in the camera’s view Using the example of LOL Cats, Shirky
despite a full audience. explains that most people spend their extra time
on the Internet doing benign activities like creat-
Implications of Digital Media Use ing and circulating captioned pictures of cats. He
For activist organizations, CODEPINK’s use of contrasts this to collaborative and crowdsourced
digital media has significant practical implica- projects like Ushahidi that aggregate individuals’
tions. The group has been able to use these media contributions to create useful, real-world tools
outlets as a way to create group cohesion, despite aimed at solving real-world problems.
Colbert Report, The 299

Comparing these uses of surplus time and labor, about the time produced in, and by, people’s digi-
Shirky provokes people to consider all that they tally connected lives.
might accomplish together if they could harness
our collective cognitive skills through collabora- Anna Feigenbaum
tive online projects. What if, for every time some- Bournemouth University
one created a LOL Cat image, they instead gener-
ated data, transcribed a document, or translated a See Also: Crowdsourcing; Public Intellectual; Social
text aimed at utilizing and generating civic virtues? Media, Strategies and Tactics.
Shirky’s take on cognitive surplus has its critics.
One recurring objection relates to how Shirky ele- Further Readings
vates people’s active involvement in online activi- Dyer-Witheford, Nick. Cyber-Marx: Cycles
ties (however mundane) above any kind of passive and Circuits of Struggle in High Technology
consumption of television (however intellectually Capitalism. Urbana-Champaign: University of
rich). His argument that creative online connec- Illinois Press, 1999.
tion always trumps television watching draws Guantlett, David. Making Is Connecting. Cambridge:
criticism from those who see television viewing as Polity, 2011
a more dynamic and, quite often, social process. Kleiner, Dmytri and Brian Wyrick. “Info Enclosure.”
His view also raises questions from people who Mute, v.2/4 (January 29, 2007).
are critical of a “making is connecting” position Shirky, Clay. Cognitive Surplus: Creativity and
that fails to account for the many ways in which Generosity in a Connected Age. New York:
social media and collaborative online forums are Penguin, 2010.
also used for antihumanitarian purposes (such as
by neo-Nazi groups).
Contra Shirky, there are also those who dis-
agree with the idea that people should convert
their leisure time into free labor time—even if Colbert Report, The
such work is being done for civic projects. This
view draws attention to larger questions of waged As one of the original “reporters” and cowriters
work under capitalism, emphasizing the ways on The Daily Show, Stephen Colbert developed a
in which crowdsourcing creativity can reinforce persona that parodied ultraconservative television
a culture in which private companies profit and journalists and political pundits. When Jon Stew-
people’s creative labor remains undervalued and art joined The Daily Show, Colbert’s character
unrewarded in the workforce. became a foil for Stewart’s liberal perspective. In
Since Shirky first made his proposal, users and an attempt to keep Colbert with Comedy Central
uses of social media have proliferated. While after Steve Carell, another of The Daily Show’s
LOL Cats are still common across the web, Inter- popular reporters, left to pursue films, Colbert
net memes now picture a range of figures from received his own show, The Colbert Report (with
Feminist Ryan Gosling to Willy Wonka, as web both Ts silent), on October 17, 2005. Airing Mon-
users create communities through sharing parody, day through Thursday, The Colbert Report utilized
political critique, statistics and worldviews—in some of Colbert’s more popular segments including
addition to captioned cat photos. At the same “The Word,” which parodied Bill O’Reilly’s “Talk-
time, crowdsourced and collaborative digital ing Points.” The similarities include captioning,
platforms have also proliferated, as Internet users although Colbert’s often mock what the actor is
co-construct everything from weather and traffic saying. Colbert’s show focuses on his conservative,
reports to localized aid relief. egotistical persona rather than a standard evening
The debate over whether or not the masses can news format. It thus becomes a satire of both news
be harnessed into more social-justice-oriented and talk show programming. The Colbert Report
projects remains unresolved. But as discussions has been nominated for seven Emmy Awards, and
continue, Shirky’s conception of cognitive sur- Colbert’s coined term truthiness was named 2006
plus offers a terminology through which to think Word of the Year by Merriam-Webster.
300 Colbert Report, The

The Colbert Report heavily utilizes social presidential ballot in his home state of South Car-
media through the show’s Web site, Google+, olina. He held a rally at the National Mall, March
Facebook, Twitter, and “The Word” app for the to Keep Fear Alive, on October 30, 2010; the same
iPad. In fact, Colbert was awarded the first-ever day Jon Stewart held his Rally to Restore Sanity.
Golden Tweet Award for the most retweeted Both marches had their own Web sites, Facebook
tweet in 2010 for his comment about the Gulf oil pages, and Twitter accounts. Attendance at the
spill. Colbert tweeted, “In honor of oil-soaked event reached more than 200,000, while 4 million
birds, ‘tweets’ are now ‘gurgles.’” The tweet was streamed the event live over the Internet.
retweeted more than 44,000 times. Prior to 2010, Neither politicians nor the media are safe
however, Colbert learned the power of the Inter- from Colbert’s humor. On September 5, 2012,
net in August 2006, when he created a green- Colbert introduced the Internet Numbo-Tron
screen challenge as a result of a “Better Know a 3000, which turns out random integers with-
District” segment that featured Colbert wielding out providing any supporting information, as a
a light saber in front of a green screen. Fans, on way to mock the media’s extensive discussion of
their own, edited the footage and posted their Michelle Obama’s record tweet numbers. Per-
results online, mostly on YouTube. The popular- haps most significant in terms of Colbert’s use
ity of the videos resulted in Colbert issuing the of social media is the star’s successful creation of
formal challenge to create the best video from the a SuperPac, Americans for a Better Tomorrow,
August 10 footage. George Lucas appeared on the Tomorrow. Colbert’s SuperPac has raised more
show on October 11 to showcase his own entry. than $1 million through online donations. The
Two other green-screen challenges were issued influence of the SuperPac can be seen in its receiv-
later based on footage from a music video and ing a Peabody Award in April 2012 for its paro-
John McCain. dying of the political money system and the cor-
Not only does Colbert use social media to rally responding Supreme Court decision.
his Colbert Nation, but he also mocks sponsor-
ship and social media campaigns as in his parody Influence of The Colbert Report
of Nissan’s Leaf Wave campaign or his “Hail and the Colbert Nation
to the Cheese: Stephen Colbert’s Nacho Cheese Colbert’s influence on social media, in spite of his
Doritos 2008 Presidential Campaign Coverage.” “fear” of technology, can also be seen in the many
But, as is often the case, Nissan and Doritos ben- naming “awards” he has won (although many
efited from Colbert’s teasing as seen in an increase were invalidated) through social media write-in
in national media coverage as well as increases in campaigns he encourages on air: a bridge in Hun-
Twitter followers and “likes” on Facebook. Such gary, the mascot of the Saginaw Spirit, and a Time
an increase in popularity after an appearance on 100 online poll. NASA was forced to deal with the
the show has been called the “Colbert Bump.” strength of the Colbert Nation when fans voted to
Perhaps this is why he was approached by Wheat name the new International Space Station module
Thins in February 2012 for a “sponsortunity” (a after Colbert. NASA instead named a treadmill
word coined by the actor to satirize overt spon- C.O.L.B.E.R.T. (Combined Operational Load
sorship of newscasts). Colbert read on air from a Bearing External Resistance Treadmill). Sweden,
corporate branding memo he was sent by Wheat however, has been able to keep Colbert from run-
Thins, the sponsor of the show, and he devoted the ning its Twitter account (@Sweden), which is con-
middle third of his February 23 program to mak- trolled by a different Swedish citizen each week.
ing fun of what the memo contained. He ended by He had wanted to make tweets using the hashtag
placing 17 Wheat Thins in his mouth at one time, #artificialswedener. Such mobilization is a dem-
which was against the advice of the memo. Spon- onstration of Colbert’s influence over the 18- to
sors are willing to risk Colbert’s insults in order to 35-year-old demographic.
receive the Bump. Colbert has experienced the downside of social
Colbert has attempted (facetiously) to enter media for celebrities. On February 17, 2012,
into the realm of real-world politics. In 2007, fans took to the Internet in concern when Col-
he attempted to be placed on the Democratic bert missed two tapings (after the audience was
ColorofChange.org 301

already seated). Colbert also stopped updating racial disparities in education, the criminal justice
his Facebook and Twitter feeds. In 24 hours, Col- system, and in health care, as well as the growing
bert became one of the top Google searches. Fans gaps in economic resources, voter intimidation,
feared that the show had been cancelled, but the police brutality, and media accountability.
reality was that the super-private Colbert, unlike Sometimes called a black MoveOn.org, Color
his publicity-seeking TV alter ego, was spending of Change draws its influences from that digital
time with his ailing mother out of the spotlight. activist group, which has nearly 7 million mem-
bers. MoveOn.org was founded in 1998 during
Pamela C. O’Brien the President Bill Clinton sex scandal, when the
Bowie State University group circulated a petition to censure the president
and move on. The response to that effort helped
See Also: Actors and Social Media in Politics; launch the organization, which has served as a
Advertising and Marketing; Daily Show, The. model for the political efforts of similar groups
nationally and internationally. Color of Change
Further Readings has been called a civil rights movement for the
Brian, Matt. “Stephen Colbert Wins Twitter’s First- social media age that seeks to move beyond tradi-
Ever Golden Tweet Award.” The Next Web. tional methods of organizing.
http://thenextweb.com/twitter/2010/12/15/stephen Color of Change is often contrasted with the
-colbert-wins-twitters-first-ever-golden-tweet historic civil rights organization, the National
-award (Accessed November 2012). Association for the Advancement of Colored Peo-
Grier, Peter. “What Did Stephen Colbert Super PAC ple (NAACP). The NAACP has about 250,000
Spend Its Money On?” The Christian Science dues-paying members, while the Color of Change
Monitor (February 1, 2012). http://www.csmonitor reports 800,000 mostly middle-class, online mem-
.com/USA/Elections?Vox-News/2012/0201?What bers, ages 35 to 55, about half of whom are white.
-did-Stephen-Colbert-super-PAC-spend-its-money Its members pay no dues but contributed about
-on (Accessed December 2012). $250,000 through online donations and tripled
Thielman, Sam. “Stephen Colbert on Wheat its membership during a three-month period in
Thins: ‘Tonight, We Have a Product That Is Too 2007 to pay the legal fees of the defendants in
Important.’” Adweek. http://adweek.com/news/ Jena Six, a civil rights case in Louisiana.
advertising-branding/mediavest-places-kraft-key In fact, NAACP President Ben Jealous has
-mtv-network-shows-138505 (Accessed January said organizations like the Color of Change are
2013). replacing the black press’s historic role in “pub-
licizing injustices and rallying public sentiment.”
Although Color of Change has been critical of
the NAACP for its perceived failure to attract
and encourage political advocacy among younger
ColorofChange.org African Americans, the two groups worked
together to coordinate efforts in the Jena Six case,
ColorofChange.org is a grassroots political in which six black teenage boys were charged with
action organization founded by California activ- attempted murder in a schoolyard fight with a
ists James Rucker and Van Jones in the after- white boy. A protest of 20,000 people in the small
math of Hurricane Katrina, which devastated town of Jena, Louisiana, demonstrated the Color
New Orleans in 2005. The organization’s stated of Change’s ability to mobilize people around a
goals are threefold: to make government more cause using new technology. And, the grassroots
responsive to the concerns of African Americans, actions put pressure on the governor and the dis-
to amplify and strengthen their political voices, trict attorney to subsequently reduce the charges
and to bring about political and social change. against the teens to a misdemeanor.
The organization took advantage of a perceived The organization has been involved in other
vacuum in black political leadership to take on events, including raising more than $10,000 in an
a variety of issues. It focuses on concerns such as Internet campaign to help Donna Edwards’s best
302 Committee to Protect Journalists

incumbent Representative Albert Wynn. Color See Also: Activists and Activism, Digital;
of Change has also been cited in the grassroots Campaigns, Grassroots; Civil Rights; MoveOn.org.
effort to force conservative commentator Glenn
Beck off the air after its members undertook an Further Readings
e-mail writing campaign to pressure advertisers Color of Change. “What Is ColorofChange.org?”
to drop his television show. Not all of its efforts (2010). http://colorofchange.org/about (Accessed
are successful, however. The organization was not October 2012).
able to influence the outcome in the case of Troy Garcia-Castañon, M., A. D. Rank, and M. A.
Davis, a black Georgia man executed for a mur- Barreto. “Plugged In or Tuned Out? Youth, Race,
der that supporters said he did not commit. and Internet Usage in the 2008 Election.” Journal
Still, Color of Change appears to have tapped of Political Marketing, v.10 (2011). http://faculty
into a narrowing of the digital divide as access to .washington.edu/mbarreto/papers/JPM_MGC_
cell phones fill the technology gap between haves final.pdf (Accessed October 2012).
and have-nots. Significantly, in the past decade, Garofoli, J. “Louisiana’s Jena Six Beating Case
the number of blacks or Latinos who use the Galvanizes S.F.’s ‘Black MoveOn.’” SFGate
Internet has nearly doubled from 11 percent to (September 22, 2007). http://www.sfgate.com/
21 percent. news/article/Louisiana-s-Jena-Six-beating-case
The organization has been successful in engag- -galvanizes-2539458.php#ixzz2AENduyDH
ing younger African American voters, a group that (Accessed October 2012).
is more likely to use mobile technology, according McGrath, M. “Technology, Media, and Political
to the Pew Center for the People and the Press. Participation.” National Civic Review, v.100/3
Pew reported that about 36 percent of African (2011).
Americans used their cell phones to participate National Association for the Advancement of Colored
in the 2010 midterm elections, by far the largest People (NAACP). “NAACP Passes Resolution
group of youthful voters as compared to white Supporting Strong Clean Air Act.” http://www
and Hispanic voters. In addition, the Pew Internet .naacp.org/press/entry/naacp-passes-resolution
and Family Life Project has found that minority -supporting-strong-clean-air-act (Accessed
Internet users are more than twice as likely to use October 2012).
social media tools such as Twitter as are white “National Association for the Advancement of
Internet users. Colored People.” New York Times (2012). http://
As more African Americans access the digital topics.nytimes.com/topics/reference/timestopics/
realm, Color of Change joins a coalition of blog- organizations/n/national_association_for_the_
gers, black radio hosts, and activists known as advancement_of_colored_people/index.html
the Afrosphere, a group focused on black politi- (Accessed October 2012).
cal, cultural, and economic self-determination Smith, A. “The Internet’s Role in Campaign 2008”
that is not often reported in mainstream media. (April 15, 2009). http://www.pewinternet.org/
However, the organization’s political strategy is Reports/2009/6--The-Internets-Role-in-Campaign
not only online; it uses a multipronged effort that -2008.aspx (Accessed December 2012).
includes nationally coordinated events, ad place-
ments in TV and print outlets, and coordination
with affinity groups to magnify its impact. Online
efforts include the use of social media, e-mail lists,
and phone calls to accumulate data about mem- Committee to Protect
bers, which allows it to better track the interests
of members and to target receptive audiences. As Journalists
a result, the organization has learned what issues
will mobilize its constituents. With the expressed purpose of protecting freedom
of expression and democracy, the New York–
Ingrid Sturgis based Committee to Protect Journalists (CPJ) has
Howard University championed the cause of journalists worldwide
Committee to Protect Journalists 303

for more than 30 years through its research and and an Internet advocacy coordinator based in
advocacy. According to CPJ’s Web site, hundreds San Francisco. Its 35-member governing board
of journalists are killed, imprisoned, or harassed includes noted journalists from around the world.
each year. CPJ is proactive when journalists are
attacked, censored, or otherwise impeded in their Attacks on the Press
work. These efforts include publishing letters to According to its flagship publication, “Attacks
prominent parties stating the group’s position on the Press,” released in February 2013, 70
on issues impacting freedom of the press; alerts journalists were killed as a result of doing their
when journalists are adversely impacted as a jobs in 2012—a 43 percent increase over the
result of their work; data on journalists killed, year before—and 35 journalists had disappeared.
imprisoned, or exiled; an annual “Impunity Additionally, the report stated 235 journalists
Index” identifying cases where parties guilty of were imprisoned in 2012—53 more than the year
killing or otherwise impeding journalists are not before and the highest number since the report
held accountable; a “Journalist Security Guide” was started in 1990. Syria was identified as the
to help journalists better protect themselves; and deadliest country for journalists, with 28 killed
an annual report, “Attacks on the Press,” detail- there in 2012, followed by Somalia with 12.
ing instances of press hindrance worldwide. Its And, for the first time, the report also included a
annual International Press Freedom Awards “Risk List” of countries where press freedoms are
honor brave journalists who do their jobs in spite increasingly being threatened. The list includes
of the dangers they face. Syria, Brazil, Somalia, Pakistan, Russia, Turkey,
CPJ works with governments, nongovernmen- and Ecuador. Syria, Turkey, Ethiopia, Vietnam,
tal organizations, and other entities to combat and Iran were cited in the report for imprisoning
freedom of the press violations, with major cam- journalists, and a trend of increased cyberattacks
paigns against impunity—CPJ states that an aver- on individual journalists and news organizations
age of more than 30 journalists are killed each was also noted. Additionally, the report identi-
year, with the perpetrators usually going unpun- fied increases in governmental intolerance to dis-
ished—and against criminal prosecution of jour- sent, as well as repressive legislation. In its recent
nalists in instances of alleged slander and libel. press conference at the United Nations announc-
The group actively engages social media—includ- ing its latest “Attacks on the Press” report, CPJ
ing Facebook, Twitter, and Google+—to empower stated that many of the journalists imprisoned or
journalists and others concerned with the protec- killed in 2012 were “citizen journalists,” who are
tion of the free flow of information. CPJ’s social becoming increasingly important to news organi-
media sites are available regionally, including in zations throughout the world for their first-per-
Asia, Africa, and the Americas, and are available son reporting. Other major sections of the report
in several languages. include the areas of religion, law, security, censor-
ship, and technology. CPJ plans additional events
Formation and Funding throughout the world promoting the report.
Formed in 1981 by a group of U.S. correspondents Recent alerts published on the group’s Web site
concerned about the dangers facing their col- include “Pro-Kurdish Reporter Sentenced to Jail
leagues in other areas of the world, CPJ launched in Turkey”; “Journalist, Family, Attacked with
its first advocacy campaign in 1982 when three Acid in India”; “In Mali, a Journalist Stabbed for
British journalists were detained in Argentina his Critical Reporting”; and “Letter Bomb Sent to
while covering the Falklands War. A letter from Home of Colombian Journalist.”
CPJ Honorary Chairman Walter Cronkite was CPJ’s monitoring of journalists’ security is
instrumental to their release. updated regularly through its Journalist Secu-
Funded by foundations, corporations, and rity Blog, including editors, publishers, writers,
individuals, CPJ’s staff of 27 currently includes producers, photographers, technicians, camera
regional specialists; a network of representa- operators, and directors of news organizations
tives worldwide, including Mexico City, London, in its definition of “journalists.” Abductions,
Nigeria, Nairobi, Bogota, Brussels, and Bangkok; attacks, threats, killings, censorings, expulsion,
304 Communication

harassment, imprisonment, vanishings, and legal Alley; Reporters Committee for Freedom of the Press;
actions against journalists are monitored. Jour- Reporters Without Borders.
nalists can contact CPJ for help when cover-
ing the news, traveling on assignment, or in an Further Readings
emergency. As well, the organization’s Journalist Committee to Protect Journalists. Attacks on the
Assistance Program aids journalists in serious sit- Press: Journalism on the World’s Front Lines.
uations resulting from their work, such as when Hoboken, NJ: John Wiley & Sons, 2013.
they are physically assaulted and need medical Inglehart, Louis E. Press and Speech Freedoms in the
care, when they have specific needs while impris- World From Antiquity Until 1998: A Chronology.
oned, and when they need to go into exile or hid- Westport, CT: Greenwood Press, 1998.
ing to escape threats. Reporters Without Borders. http://www.rsf.org
The organization recently reported that a (Accessed May 2013).
record number of journalists were killed in the
Iraq War—at least 150, as well as 54 media sup-
port workers in Iraq between March 2003 and
December 2011. Most of the journalists were
murdered in targeted assassinations resulting Communication
from their reporting.
In other recent activities, CPJ Executive Direc- Communication is used in a broad sense to include
tor Joel Simon wrote a letter to British Prime formal, informal, verbal, nonverbal, print, indi-
Minister David Cameron warning Great Britain vidual, collective, face-to-face, and virtual forms.
against plans for a Royal Charter system of press The main objective here is to discuss the impact
regulation. As well, the group was instrumental of communication technologies on the transfor-
in the approval of new Mexican legislation that mation of social and political relations, as well
will put in place a constitutional amendment giv- as the impact of social and political relations on
ing the federal Mexican government greater juris- the way communication technologies are used.
diction in prosecuting crimes against freedom of Diffusion of information through various forms
the press. of communication may foster political participa-
In 2012, CPJ honored four journalists who tion, dialogues, civic engagement, and political
persevered in their work despite dangers: docu- education. Recent research has documented the
mentary filmmaker Dhondup Wangchen of growing importance of communication technolo-
Tibet, currently imprisoned in China; Ferghana gies and Internet media as uncensored platforms
News reporter Azimjon Askarov, currently serv- for sustaining freedom of expression as well as
ing a life sentence in Kyrgyzstan; Mari Konig of for disseminating their users’ political views and
Brazil’s Gazeta do Povo, who was attacked and activities.
threatened following his reporting of corruption Studies of contemporary political transforma-
and human rights violations; and Mae Azango of tion consistently make reference to new patterns
Liberia, who was forced into hiding as a result of of communication among key actors. Communi-
her reporting on female genital mutilation. Addi- cation is viewed as a networking or exchange of
tionally, Alan Rusbridger, editor of the Guardian, ideas between two or more individuals or groups
was recognized for his dedication to freedom-of- with an aim to achieve better mutual understand-
the press issues. The awards dinner raised $1.6 ing concerning certain issues. With regard to polit-
million in support of CPJ’s work. ical participation, traditional coffee houses, cul-
tural clubs or societies, and political salons have
Chandra D. Clark been effective means of communication allowing
Florida State University individuals to engage in social and political move-
ments. However, communication is not simply
See Also: Domestic Surveillance and Social Media; the device by which individuals know each other
National Freedom of Information Coalition; but also a powerful tool through which individu-
National Press Club; 100Reporters Whistleblower als control each other.
Communication 305

As Manuel Castells argues, the transformation communicate. Communication implies elimi-


of communication, caused by the explosion in nating contradictory elements that might exist
wireless communication in the 1990s as well as by between individuals or groups. Successful politi-
technological convergence between Internet wire- cal actors are those who are able to achieve their
less communication and multiple applications in goals and resolve political and social problems
the 2000s, has resulted in the empowerment of through dialogue, effective communication, and
communicative capacity worldwide penetrating compromise.
both public and private spheres of people. Citi- Communication is a process that involves
zens have become increasingly empowered to par- sending messages or symbols in such a way as
ticipate actively in political domains. to help the receiver understand the meaning the
The one-way communication of radio, televi- sender or communicator intends to make. Good
sion, and print media provide information to an communication might lead to effective persuasion
audience but cannot solicit immediate feedback. in which communicators try to convince other
In contrast, the two-way communications of people to adopt a certain view or change their
the Internet and cybernetwork encourage politi- attitudes or behaviors regarding an issue by the
cal engagement and allow for mutual feedback. transmission of a message through free choice.
Cybercommunication or social networking refers For example, electoral competition between more
to a type of online community that depends on or less united or consolidated political parties
a computer-based simulated circulatory milieu is the main framework in which much political
through which the participants or users interact communication and persuasion take place. News
with one another. This type of interaction and is designed in order to persuade or tell narratives
immediate social reaction to new phenomena that are appealing and make sense to audiences,
tend to create special kinds of written visual con- rather than in order to deliver the most compre-
tacts of a global form. hensive information possible.
Communication technologies play critical roles
Communication Technologies in the presidential, parliament, or party election
Communication technologies and social net- processes through both offline and online politi-
works including the Internet, Google, Facebook, cal campaigning. A well-known example of using
Twitter, YouTube, e-mail, mobile phone, texting smart communication for political purposes is
(short messaging service, or SMS), forums, and Barack Obama’s 2008 presidential campaign. By
blogging, to mention a few, are used not only as using interactive Web 2.0 tools and social net-
means to maintain social connectivity but also working technologies, Obama’s presidential elec-
as mobilizing tools to express social and politi- tion campaign changed the strategies by which
cal demands, such as social justice, freedom, and politicians recruit volunteers, defend against
democracy, among other civil rights. For example, critical attacks, and communicate with support-
in many countries, the Internet has contributed to ers. The campaign manipulated YouTube for free
a more active, critical, and politicized citizenry, advertising. Because of their friendly and uninter-
where citizens are no longer passive receivers rupted features, YouTube videos were more effec-
of state-oriented media. Put differently, politi- tive in the campaign than television ads.
cally oriented and mediated communications do The manipulation of the Internet in organiz-
not merely express people’s political ideologies ing Obama’s supporters did not only save time
but also generate, establish, and proliferate their and money but also helped people repeatedly and
political ideologies in public zones. enthusiastically listen to his speeches. In addition
The rise of online and cybercommunication to text messages, Obama supporters used a social
has significantly impacted the practices of politi- networking site, created with the help of a Face-
cal leaders as well as the content and fashion book cofounder, through which they were able
of political communication. Politicians seeking to log in and find lists of people they could call.
to be effective and influential aspire to develop Such a communicative strategy shows a strong
skills in various and multiple domains. The tendency toward more personalized and profes-
most important skill, however, is the ability to sionalized styles of campaigning.
306 Communication

Online, grassroots cybercirculation is character- and Tunisian protesters through online commu-
ized by nonhierarchical communication that draws nication tools to produce and share information
on the various interactive applications of electronic about the revolutionary movements.
communication. One of these applications is blog- In the Middle East, both males and females of
ging. A blog, typically created by a single or anony- younger generations, constituting more than 65
mous person, is a personal Web site that contains percent of the overall population in the region,
news or information in the form of diary. Bloggers are active users of communication technologies.
manage political communications in a more auton- Young people between 15 and 29 years old make
omous way. This means that a blog allows the user up around 70 percent of Facebook users in the
substantial freedom to partake in political activi- Arab region. The Arab young generations have
ties criticizing oppressive regimes and calling for expressed pride in their ability to combine both
social reform or revolution. Recent uprisings have local culture and modern, global ways of life.
demonstrated that activists in different countries They use both Arabic and English in their offline
shared their experiences through e-communication and online communication. They also tend to
including blogs. For instance, Arab and Muslim participate in risky activities and uprisings more
blogs have become crucial aspects of global or than the older generation. Change has become
transnational communication due to the accessibil- the key word used by the young generation with
ity and sociable connectivity through which indi- reference to changing old-fashioned and corrupt
viduals or users can form a resisting force against political systems.
the dominant power of the ruling elite. According to Arab Social Media Report, coau-
Electronic communications and social media thored by Fadi Salim and colleagues, the percent-
actively contribute to creating their own social age of female users is lower than male users. Glob-
role as privileged channels of democratic politics. ally, the gender breakdown of social media usage,
In other words, the role of cyber- and mediated represented in Facebook for example, reflects real-
communication is crucial in facilitating demo- world demographics, with the number of male
cratic transition. This is clearly shown in the and female Facebook users being roughly equal.
impact of new communication technologies on This trend, however, is not applicable to the Arab
political movements and democratic transitions region, where only a third of Facebook users are
in the Middle East. women. However, the number of female users
is steadily increasing; it reached 33.5 percent in
Communication and the Arab Spring 2011 compared to 32 percent in 2010. Through
In traditional societies such as Arab or Middle utilizing cybercommunication and social net-
East countries, there is an acute juxtaposition works, women have become active participants in
of various forms of communication including, new forms of leadership. However, this statement
for example, the local and global, indigenous does not negate the fact that Arab women are not
and imported, traditional and modern, oral and merely cyberactivists but also active participants
written, and idealistic and pragmatic. However, on the ground, partaking in and organizing politi-
there has been a recent preference for applying cal rallies and protests.
new communication technologies. Such new During the January 25 Egyptian revolution, a
communication technologies and social networks female activist in Cairo stated that political activ-
have been effective tools in the unprecedented ists used Facebook to schedule the protests, Twitter
phenomenon of the Arab Spring bringing down to coordinate the activities, and YouTube to dis-
authoritarian regimes and political dictators in seminate the news worldwide. The participation of
several Arab countries including, for example, Arab women in the social and political transfor-
Egypt and Tunisia. The Arab Spring shows how mations taking place across the Middle East has
online and offline communication played central played an instrumental role in challenging stereo-
roles not only in mobilizing people to engage types about Middle Eastern women as oppressed
in political revolts but also in shaping political and submissive. Women have played leading roles
movements. Also, during the Arab Spring, peo- comparable to men in organizing and participating
ple in other countries collaborated with Egyptian in political and social movements in Egypt, Tunisia,
Communication 307

and Yemen. They have participated in transform- means for opposing the Egyptian regime. Similarly,
ing the political landscapes in their countries. in Tunisia, forms of social media, including blogs,
Merlyna Lim argues that mediated communi- commented on the corrupt and illegal practices of
cation or social media have been an integral part Zine al-Abidine Ben Ali’s family and government.
of political activism of Egyptians for years, with In Egypt, the government or state-run online
54 out of 70 recorded street protests from 2004 network, a top-down communication, was used
to 2011 substantially involving online activism. by the Mubarak regime for providing people with
Social movements, especially protests, can also be false information about economic and political
understood as networks of people brought together conditions. Egyptian political activists, including
by a common goal or interest. Social movements members of the Muslim Brotherhood, have used
as social networks can also be comprehended in various forms of communication including the
terms of an initial core made of densely known Internet, forums, and blogs to express their politi-
groups with stronger ties that mobilize weakly cal views challenging government media during
linked individuals, thus transforming messages of Mubarak’s oppressive regime. The Internet has
discontent into a mass movement. facilitated change in the balance of power and
Communication technologies such as mobile levels of freedom among actors because it is more
phones and the Internet facilitate the cooperation resistant to state control and censorship than
of the users and free them from the government’s most traditional forms of mass media. Younger
exploitative and misleading media. During the cor- bloggers, some of whom are sons and daughters
rupt and repressive regime of Hosni Mubarak, in of imprisoned political activists, including the
which emergency (martial) law was applied and Muslim Brotherhood, were active in resisting the
street protests were considered illegal, therefore to oppressive regime through electronic communi-
be crushed by police brutality, cybercommunication cation and the Internet. During the January 25,
and blogs flourished and increased as alternative 2011, revolution, when Mubarak’s government

Crowds of young people turn out for a demonstration calling for political change in Morocco on June 9, 2011. During the Arab Spring,
protesters from other Arabic countries were able to communicate with Egyptian and Tunisian protesters through online social media and
other communication tools to collaborate and share information about the revolutionary demonstrations.
308 Conflict Resolution, Social Media and

temporarily shut down the Internet, the reaction pro-peace and social justice movement during
of the protesters intensified in such a way that a time of terrorism, war, and intense political
they attracted regional and global attention, thus struggle.” Internet activism has become a tool of
garnering support for their plea for increasingly outparties in conflict, groups of people or sectors
democratic rule. of society who are feeling marginalized, disem-
powered, or treated unjustly. More than being a
el-Sayed el-Aswad tool for organizing people with like-minded social
United Arab Emirates University sensibilities, ultimately, these new technologies
have become new ways of declaring and register-
See Also: Activists and Activism, Digital; Arab ing conflict with in-groups or ideas, be they auto-
Spring; Cyber-Jihad; News Media; Social Worlds. cratic regimes, despotic rulers, or unpopular gov-
ernmental policies. In some ways, as Joss Hands
Further Readings indirectly reminds readers, dissent, resistance, and
Castells, Manuel. The Rise of the Network Society. rebellion in a digital culture is simply a new tech-
Hoboken, NJ: Wiley-Blackwell, 2010. nological manifestation of activism against a pre-
el-Aswad, el-Sayed. “Arab Spring and Islamism: vailing authority’s domination and exploitation.
Muslim Brotherhood and the Salafis in Egypt.” Social media therefore becomes revolutionary
Paper presented at the 111th Annual Meeting of as simply a new variation of “the scream” against
the American Anthropological Association, San oppression, as defined by John Holloway. The
Francisco, California, November 14–18, 2012. scream is two-dimensional: It is a scream of rage;
el-Aswad, el-Sayed. “Breadom.” Tabsir: Insight on more important, it carries within it “a projec-
Islam and the Middle East. http://tabsir.net/ tion of possible otherness,” therefore the hope of
?p=1370#more-1370 (Accessed November 2011). change. Leah Lievrouw echoes this sentiment by
el-Aswad, el-Sayed. “Rethinking Virtual World and implying that the roots of alternative and activist
Cyber-Circulation in the Middle East.” Paper new media lie also in the fact that they are decry-
presented at the 109th Annual Meeting of the ing the present and insisting on the creation of a
American Anthropological Association, New different future.
Orleans, November, 17–21, 2010. As mechanisms of protest and insurgency,
el-Aswad, el-Sayed. “United Arab Emirates.” social media can therefore potentially play a
In Encyclopedia of Social Networks, Vol. 1. role in far-reaching social and political reforms
George A. Barnett, ed. Thousand Oaks, CA: and, therefore, have become part of the way in
Sage, 2011. which social and political conflicts are ultimately
Lim, Merlyna. “Clicks, Cabs, and Coffee Houses: managed, resolved, or transformed due to the
Social Media and Oppositional Movements in structural social and political changes. There is,
Egypt, 2004–2011.” Journal of Communication, however, still very little agreement about exactly
v.62 (2012). under which circumstances the Internet and its
Salim, Fadi, et al. “The Role of Social Media in Arab ever-growing range of concomitant technologi-
Women’s Empowerment.” Arab Social Media cal tools become agents of change in social con-
Report, v.1 (2011). flict, although some degree of empirical testing is
beginning to explore theory in this area.
A recent study by the U.S. Institute of Peace,
subtitled “New Media and Contentious Politics,”
concluded that, while new media such as blogs,
Conflict Resolution, Twitter, Facebook, and YouTube have played
major roles in episodes of contentious politics as
Social Media and activist tools in replacing authoritarian regimes
and in promoting freedom and democracy, “pol-
According to Richard Kahn and Douglas Kell- icy makers and scholars know very little about
ner, the global Internet has created “the base and whether and how new media effect contentious
basis for an unparalleled worldwide anti-war/ politics.”
Conflict Resolution, Social Media and 309

There is, however, some agreement that alter- In many ways, there is nothing new to this
native and activist new media are inexpensive structural representation of social conflict; what
and powerful tools for challenging mainstream is different here is the way that the conflict is
or popular culture, let alone political elites. Note, enjoined, or made active, in that social media
for example, this all-encompassing perspective by allows for a more economical and faster form of
Leah Lievrouw: conflict declaration and, therefore, an escalated
form of out-party activism (meaning those who
Web sites, mobile phones, digital photography, want a change in the status quo).
video and audio, blogs, wikis, file sharing sys- New communication tools simply speed up
tems, social media and open source software the disseminating process of protest by creating,
all permit social groups with diverse interests distributing, receiving, and consuming content in
to build and sustain communities, gain visibil- ways that have not been technologically possible
ity and voice, present alternative and marginal before. The utility and impact of these techno-
views, produce and share their own do-it-your- logical innovations as novel and very hard-to-
self (DIY) information sources, and resist, talk control antithetical forces that recruit and enlist
back, or otherwise confront dominant media others randomly became more fully realized dur-
culture, politics and power. ing the various Arab protests since December
2010. However, the basic and universal conflict
These objectives are mainly achieved in how new dialectic is still at work here. James Laue and
media technologies assist people in assessing Gerald Cormick frame conflict commonly as a
information and each other. social phenomenon that arises “when existing
Leah Lievrouw concludes that “mobilization is power arrangements are seen as non-legitimate
a core concept across social movement theories” and resource allocation as inadequate.” More-
and that new media share this in the way that over, that
“people convert their collective concerns into col-
lective action to bring about change.” Moreover, . . . crisis occurs when the holders of power
she cautions, in the words of Lauren Langman, (in-parties) being challenged by subordinate
that “these new kinds of Internet-based social groups (out-parties) define the situation as seri-
movements, cyberactivism are fundamentally new ous enough to take new and unusual action
and require new kinds of theorization,” and notes, to avoid or minimize what they perceive to be
moreover, that various scholars caution that “even severe costs.
the most tech-savvy contemporary movements do
not rely solely on the Internet and new digital tech- One could therefore argue that the social media
nologies, but use a mix of mass media and new and resultant in-person protests were in pursuit
media systems and techniques to communicate of basic human needs that James Laue and Gerald
with their participants and with the wider public.” Cormick define as freedom, justice, and empower-
The power of social media appears to lie in the ment or self-determination. In a number of cases
extent to which they play roles in out-group for- during the Arab revolts, notably in Tunisia and
mation, albeit electronically or in person at des- Egypt, the social and political public spheres in
ignated places of protest (such as Tahrir Square those countries were transformed. In that sense,
in Egypt during the so-called Arab Awakening), social media actors, however indirectly, became
and also to the degree that these forms of oppo- initiators of an indirect negotiation process in an
sitional communication empower out-groups attempt to ultimately resolve or transform the
to use their newly found voices to interact with prevailing political system.
powerful in groups in insisting on social and sys- In the process, social media activism became
temic change. To invoke a simple Hegelian model the most successful example to date of the poten-
of conflict analysis, in confronting the political tial, and one could argue far from fully realized
structures of their day, social media actors put potential, of the interventionist nature of these
forward a new antithesis to the thesis or prevail- new information technologies. This claim can be
ing power of the day. made in spite of the inability of cyberactivists to
310 Conflict Resolution, Social Media and

fully translate their online and in some cases resul- change addressing the deep-rooted sources of
tant in-person protests into recognizably changed conflict that exist in many societies. However, the
or new political systems, with Egypt as the most social media revolution is a part of much larger
notable case in point. In spite of the fact that the technological and societal changes in a brave,
Hosni Mubarak regime came to an end because of new, digital world. In that sense, the social media
the crisis that occurred during the Arab revolt in revolution is not utopian and will most probably
which social media played a transformative role, only revert back to more social and less activist
these same activists recently took to the streets roles in societies where the necessary structural
again two years after these events because of their changes have occurred. Barring that, social media
disillusionment over the seemingly autocratic ten- activism will become a standard part of social life
dency of the newly instated President Mohamed and out-group formation.
Morsi and the political struggles for power that
are still occurring in that country. At best, the Johannes Botes
social media awakening in Egypt has thus far con- University of Baltimore
tributed to a rethinking or internal restructuring
of how the country is managed without necessar- See Also: Arab Spring; Egypt; Tunisia.
ily leading to transformative political change that
will satisfy these activists. Further Readings
In spite of formulating new agendas and Aday, Sean, Henry Farrell, Marc Lynch, John Sides,
the discussion of once-forbidden topics, social John Kelly, and Ethan Zuckerman. “Blogs and
media’s usage is not necessarily effective and, Bullets: New Media in Contentious Politics.”
some would argue, simply ineffective in creat- United States Institute of Peace PEACEWORKS
ing or leading directly to new social and politi- Report, 2012. http://www.usip.org/print/
cal systems. This apparent inability to directly publications/blogs-and-bulletts-new-media
impact the resolution and transformation of (Accessed December 2012).
social and political change lies at least in part Hands, Joss. @ Is for Activism: Dissent, Resistance
in the fact that social media activism is not as a and Rebellion in a Digital Age. London: Pluto
rule represented by organized and leader-driven Press, 2011.
entities. While creating a dialectic for discussion Harvey, Kerric. “Dramaturgical Techniques for
or pressure for change, social media essentially Capturing Political Sensibility With Social Media:
represents a leaderless out-group phenomenon, The Twitter Election Day Theatre and Poetry
and often only represents a relatively youthful, Project.” International Journal of the Humanities,
educated, and economically sound part of the v.9/4 (2012).
society. There is, however, some preliminary sup- Harvey, Kerric. “A New Media Approach to
port for the idea that the social media may be Old Problems: Phone Flicks and Cease Fires.”
useful as a platform for affective and/or artistic International Journal of the Humanities, v.5/5
expressions of political attitude. Experiments in (2007).
using social media to create virtual versions of Holloway, John. Change the World Without Taking
political satire, theater, and poetry suggest that, Power: The Meaning of Revolution Today.
in some cases, they may be a valuable vehicle for London: Pluto Press, 2002.
archiving public sentiment collected through cre- Kahn, Richard and Douglas Kellner. “New Media
ative ethnographic methods. and Internet Activism: From the ‘Battle of Seattle’
Without ultimately being able to lay claim to to Blogging. New Media and Society, v.6/1 (2004).
having contributed to system change and to rec- Laue, James and Gerald Cormick. “The Ethics of
tifying social injustices, social media activism can Intervention in Community Disputes.” In The
be written off as mostly having nuisance value Ethics of Social Intervention, Gordon Bermant,
for oppressive regimes, but will ultimately be Herbert C. Kelman, and Donald P. Warwick, eds.
controlled by censorship and by legal and secu- Washington, DC: Halsted, 1978.
rity devices to minimize the role these technolo- Lievrouw, Leah A. Alternative and Activist New
gies can play in fomenting the need for structural Media. Cambridge, UK: Polity Press, 2011.
Constituencies, Social Media Influence on 311

Constituencies, Social individuals calling for a new constitution, greater


access to government, and better representation
Media Influence on as well the desire for individual freedoms.
Current ways to serve constituents vary from
A constituency describes those individuals repre- state to state and from country to country. One
sented by an individual chosen or appointed to of the most common ways being used to provide
act on their behalf. Constituencies can be various constituency service is through communication
in type, kind, and composition. For example, the options available on Web sites. A majority of agen-
director of a food program in a city serves a spe- cies, departments, and politicians use Web sites to
cific constituency within a set border. Its enabling solicit ideas and feedback from their constituents.
statute or initial legislation parameters for opera- Constituency services used to be conducted face
tion are included as well as its base of operation, to face and through mail, conventions, town hall
target constituency, and enforcement powers. The visits, and the like. Social media has changed the
director of the food program is either appointed nature and description of constituency service due
or chosen within a merit system by application to the fact that posts and updates to social media
and interview. Once selection occurs, the direc- sites may require immediate responses or imme-
tor becomes acquainted with the powers inherent diate posts that encourage followers to ask for
in the position and a job description listing the responses or clarifications.
major tasks and duties.
Traditionally, representatives are identified Social Media and Reform
from a constituency and determined to be the Social media has built a virtual society along the
best fit for representing that constituency through lines of inclusiveness, expansion, immediacy, and
some form of vote or application process. Of a lack of concrete institutions. In doing so, it has
course, with social media, how one defines and reconditioned the constituent and the services it
describes the concept of a constituent is a moving requires. Prior services that have gone unques-
target. What could once be counted on as solid tioned and accepted now see demands from con-
support around one or more ideas, social media stituencies for immediate reform often through
has redefined to be the first step in the proving the means of social media. Ombudsman services
ground toward operationalization. or constituency services have become redesigned
to capture the needs of those using social media,
Serving Constituencies especially when those individuals are able to tell
Depending on where one is, constituencies can be their friends and followers that their questions
limited by law to a certain group that is allowed have gone unanswered. Neglecting a constituent
to participate in government, or constituencies who uses social media multiplies the chances for
can be pools of individuals with equal access to negative feedback from other constituents who
government. Thus, the definition of constituen- may be supporters of the politician or represen-
cies can be region-specific and state- or country- tative. It also intensifies the response from other
specific. A user can visit a blog or discussion people regarding the neglect. Furthermore, the
forum on a Web site that is housed in another archive function inherent in the Internet can be
country, express views, link Web sites and video, a reminder of each instance that a representative
and then be told by citizens in that country that was inactive and unavailable.
what happens in “our” country is none of the The costs to use social media for updates,
user’s business. Social media groups then can limit posts, blogs, discussion forums, and the like are
the constituency themselves, be it international relatively inexpensive. This differs from the high
constituencies or even city or state constituencies. costs of mail, travel, personal appearances, and
In the past few years, there has seemingly been a speechwriters in order to reach the constituency
global push in some areas by individuals in those in the system in place and practiced prior to the
areas to become more inclusive in the governing Information Age. The ease of devices and the
process. In early 2011, in Egypt and Tunisia, social availability of affordable equipment and desktop
media provided daily updates on the progress of and mobile applications smoothly deliver services
312 Constituencies, Social Media Influence on

to constituents in a few hours what it used to take to be against the citizens. During the tent city
a small army to do in weeks. Politicians as well occupation of cities in the U.S. Occupy Move-
as constituents have expressed a need for money- ment, politicians visited a host of cities, includ-
saving efforts to produce results. For individuals ing New York, Atlanta, and Los Angeles, often
seeking it, Internet connection, iPhones, Androids, tweeting messages to constituents while there.
as well as other mobile devices are accessible Although no specific legislation was passed as
through the purchase of particular equipment a result of the Occupy Movement, portions of
and usually a monthly fee. Social media operates the issues the occupiers requested were passed
on the virtual structures built into these devices in separate forms in several pieces of legislation.
and is enhanced by mobile applications. Con- There is no doubt that the attention given to the
stituents own this equipment and use the virtual events in Tahrir Square, Occupy Wall Street, and
structures for a number of things. The politician occupy events around the world called attention
or representative does not have to create or invent to income inequality, social inequality, and educa-
these structures or this equipment. What he or she tion loan and mortgage debt.
needs to do is get involved in the virtual groups The new constituency through social media
that already exist or within the existing structures has forced the redesign of bureaucratic structures.
create groups of their own. Users of social media Social media by its inherent foundation calls for
are alerted to the creation of a group formed by a the destruction of generally accepted bureaucratic
politician or representative in a number of ways, structures. Traditional structures were rigid and
and they can decide to join that group. Some who hierarchical and operated through chains of com-
join may be constituents, some are not constitu- mand. The chain of command was how things got
ents, and others are just interested and may be done, how communication was transferred, and
from anywhere on the globe. how rewards were given. Social media allows any-
one with a fast thumb to become the most impor-
Increased Visibility tant person in the group and thereby the one to
Adult usage and registration on social media sites follow. In the protests of Tahrir Square as well as
has increased tremendously, with one in eight in the Occupy Movement it was not uncommon
people being on Facebook in the current environ- to hear that social media leaders one came to rec-
ment and with more than 30 percent of adults on ognize were first-time leaders due in large part to
some type of social media overall. If one tried to their Twitter or Facebook followings. From these
contact someone in Tahrir Square in Egypt during cases, the new constituency can be seen as a sub-
the 2011 uprising, or someone in Occupy Wall set of a subset of a constituency.
Street in New York or Occupy L.A. (Los Angeles) The original constituency expanded to a
during those tent city occupations, surely social larger constituency because of the growth of
media would have been the most efficient source. social media. Social media generates group after
A new constituency was created during those group after group because of the invitation to
protests, and the world took note. If politicians friend as well as the dissemination of photos and
showed up during the protests, their appearances videos that are being constantly uploaded and
and words were tweeted in real time to the world. updated. It is this expanse of support and link-
If they held up any signs, shook hands with some- ing of constituents to other indirect constituents
one, or sat in on a teach-in, the photos of these that has authors of social media asserting that
exchanges were texted, tweeted, and uploaded to constituency services can no longer be defined or
numerous Facebook and YouTube accounts. performed as they have in the past. The political
Appearances like these have changed the rela- element that used to run through an issue caus-
tionship of representatives to their constituen- ing a representative to do something about it
cies. In the case of Tahrir Square and the protests is no longer completely definable. Social media
against then President Hosni Mubarak, the lack keeps defining it with every new friend and every
of appearances by politicians was viewed as a new group. Thus, constituency services have
negative, and accusations went out that any poli- become harder to accomplish as the services that
tician not with the citizens in Tahrir Square had were once essential and expected are redesigned
Constituencies, Social Media Influence on 313

in real time due to the contributions of others in Constituency services are not the only area of
other groups. constituency that is impacted by social media.
Social media creates overlapping issues and The operationalization and implementation of
overlapping constituents. What that means is policy is also impacted. Depending on the level
that, if a powerful group of constituents leans of social media, the degree of policy creation and
one way on an issue but through social media is implementation can fluctuate. While social media
outnumbered or absorbed by another group of instantly captures the rural citizens’ views and
constituents, then issues and constituencies can opinions on policy, these views may still be just
be lost or eliminated. What social media has not that—views. While social media can crown new
been able to do as yet is to distinguish between kings and queens of opinion, it can also highlight
the overlapping issues and constituency issues. the disconnection of the constituent from policy.
Online petitions do not provide a mechanism Social media does not make one instantly brilliant
for distinguishing a particular constituency, and if that person does not know where to look for
therefore, the issue being promoted or debated information. Thus, social media can continue to
is represented by a mesh of voices. Where once disseminate erroneous information and ideas and,
these voices were housed in a single choir or con- if influential enough, can be translated into policy.
stituency, social media allows all voice types and Erroneous policy in implementation is enraging
levels to make music together. It is often up to due to the practice of the legislation that, at some
the politician to find the soprano, tenor, and bass level, fails to meet the needs of a constituency.
voices that are indeed his or her choir of con- The constituency cannot be reached or satisfied
stituents and try to provide services to them to because, in this case, too much reliance on social
their satisfaction. The old norms and traditions media created a theoretical nightmare in the form
of constituency services will not hold the atten- of a new but inappropriate law. The submission
tion of today’s constituents as long as it used to by the politician to the severity of social media
and should be considered for revision. and the perpetual nature of friending, posting,
and updating creates a confusion of who the
Needs for the Future politician really works for and who the politician
In order for some level of effective constituency really represents. Social pressure is not absent in
services to be achieved, politicians will need to social media, and while the virtual aspect of social
use social media to recruit individuals who can media is romantic and lofty, that is not to assume
lend their expertise to the social media aspect of that the motives of users are as well.
constituency services. Other elements are always Social media aids in the goal of citizen par-
being added to social media options. A user knows ticipation. It aids the representative in knowing
the new options and their uses. Some even help within seconds the immediate opinions of con-
design new uses from the interaction they encoun- stituents. In this way, citizens reduce the distrac-
ter between other users of social media. Politi- tion that status has on disconnecting citizens from
cians hoping to deliver previous levels of constitu- policy creation. Rich or poor can view Webinars,
ency services will need to employ individuals to and rich or poor can tweet their opinions about
adopt and adapt to constituent demands. Once policy. Automation produces a level of equality,
the Internet looked like a tool that would be more and social media harnesses those automation
of a research professional instrument with few gains in one place to be used for virtual social
envisioning the use expected today. Social media, gathering. This is not to say that self-interest does
like the Internet, is here to stay. It has taken on a not enter into the debate, into the tweet, or into
life of its own, although it is not yet truly out of the Facebook post. This happens all of the time
diapers. Just when constituents had gotten used no matter the venue used. What social media
to e-mail and text messages, Facebook, Twit- does is allow individuals in relative anonymity
ter, Rich Site Summary, sometimes called Really to voice their disapproval and state the disadvan-
Simple Syndication (RSS) feeds, Flickr, and other tages self-interest has on the issue. Not surpris-
social media options were born and instantly used ingly, constituents of representatives have voiced
while forming new and expanded constituencies. their disapproval at instances of self-interest that
314 Constituencies, Social Media Influence on

their representatives have introduced, including generate funds from constituents as well as well-
meaningless photo ops updated for no real rea- wishers and supporters. In the past few years, a
son besides self-interest. Politicians can assess the YouTube search for, say, “Redemption Song” by
limits of their self-interests in the arena of social Bob Marley may very well be preceded by a video
media and get the quickest response from their ad for a congressional or presidential candidate.
constituents than previously waiting for letters or These ads come armed with easy ways to send
e-mails expressing disapproval. donations for the candidate by PayPal or credit
When social media assists in highlighting pop- card on a protected (https) Web site.
ular and unpopular policy, the concept of effec- The cost of the campaign ad or video may be
tiveness becomes harder to achieve and define. significant, but what it can do that other ads may
What social media allows for in the grouping of not be able to do is basically cover most areas
people around an idea, it disallows in common or Web sites people visit regularly, thus giving it
measures of effectiveness, making reporting dif- greater visibility. Campaign signs in yards and
ficult and challenging, to say the least. With an on highways have diminished over the years and
expanded constituency, the politician cannot rely are mostly seen in high-traffic areas where con-
on the usual measurements. With an expanded stituents may drive or at televised conventions
constituency, one can only guess if support for that constituents may watch. Where else may a
a particular policy under certain conditions will constituent receive information? The Internet,
be perceived as a failure by the members of the of course—not just any area on the Internet but
expanded constituency. those areas like YouTube, Wikipedia, Twitter,
Webinars that tout the good things the politi- Facebook, and LinkedIn—in other words, in vir-
cian or representative has accomplished is one tual high-traffic areas. Placing ads in these areas
way. Moreover, the real constituents that are will get noticed and may even be commented on
mixed in with the expanded constituency also by a spontaneous group in one of the social media
use different measures to determine a politician’s sites discussing and examining the language, tar-
effectiveness due to their exposure to social media. get audience, or color scheme.
Social media will assist in regulating the effective-
ness of a policy or the services a politician pro- Conclusion
vides by presenting the results to the group and For some time to come, social media will struggle
feedback on those results regarding what could to present a common core of characteristics from
have been done better in order to increase the out- specific groups for effective narratives. In this
put for the constituency group. In this case, social case, redefinition and redesign will work in har-
media serves as a constant check on policy from mony with developments in social media. Hope-
policy creation to policy implementation. A rep- fully, constituencies will move in tandem as well,
resentative faces the added pressure of external and representatives will figure out how to effec-
voices making noise in social media sites about tively reach them. A representative using social
policy implementation errors they heard about on media to communicate using cost-effective means
Facebook or Twitter. While this external group is continues the economic goals of revenue reallo-
not affected by the errors within their own lives cation. Social media does not limit this practice,
beyond hearing about it on social media sites, and in the future, the structures now being devel-
they still wield great influence and, many times, oped will deliver even more cost-effective meth-
are able to manipulate representatives and poli- ods and approaches for constituency services.
ticians that they neither know nor vote for. It is Representatives should not feel threatened by
often unfair that these representatives have to the changes coming as fast as the speed of light
adjust to constituencies they do not represent and as they relate to social media but should notice
may not be able to see. how social media is yet another opportunity to
Another way that representatives and politi- lessen the gap between people and institutions.
cians use social media is through fund-raising. The former mode of communication and service
An advertisement on a social media site like You- delivery is unsustainable in the current environ-
Tube can run through the life of a campaign and ment. Social media has moved policy creation and
Content Communities 315

policy implementation into the living rooms of like YouTube and Pinterest, were created to share
every local and international constituency. original content of a wide nature. Other commu-
nities have a more defined purpose, as in the case
Lisa Saye of Wikipedia, which is an open source encyclo-
Independent Scholar pedia consisting of entries written and edited by
users.
See Also: Campaign Strategy; Campaigns, Digital; As in any network, the larger a network, the
Evolution of Social Media; Networks, Political; Voter more benefits there are to all members. This
Demographics. understanding drives many participants to remain
responsible and active participants in their chosen
Further Readings content communities. There are various reasons
Carter, Matt. “Speaking Up in the Internet Age: Use why people participate in content communities,
and Value of Constituent Email and Congressional even ones like Wikipedia where there is no rec-
Websites.” Parliamentary Affairs, v.52/3 (1999). ognition for individual contributors. Some of the
Kraft, Michael and Scott Long. Public Policy: Politics, reasons for participation include creative expres-
Analysis and Alternatives, 3rd ed. Washington, sion, connecting with people with similar inter-
DC: CQ Press, 2010. ests, and sharing personal opinions.
McKevitt, David and Alan Lawton. Public Sector Both individuals and organizations have been
Management: Theory, Critique and Practice. quick to grasp the potential for political impact
Thousand Oaks, CA: Sage, 1994. through these content communities. Individuals
Reed, Betty Jane and John Swain. Public Finance use these communities to express and aggregate
Administration, 2nd ed. Thousand Oaks, CA: political opinions. Politicians and political parties
Sage, 1997. also strive to create and maintain a presence on
some of the most popular sites such as YouTube,
Tumblr, and Pinterest. Nonprofits and activist
groups also have been quick to tap into the power
of these communities, especially as they offer low-
Content Communities cost avenues to reach large numbers of people.
Perhaps the most well-known and influential
One of the driving forces behind the acceptance of all content communities is the site YouTube.
and rise of social media are content communities. In the sense that a picture is worth 1,000 words,
These are sites that allow users to upload and YouTube often has been the source of ground-
share various kinds of media. Content communi- breaking videos. The popularity of the Web site
ties exist for various reasons; some are coopera- lies not only in the great number of users but also
tives for developing open source software, others in its innovative interface and ease of use. You-
are used to display and distribute original art, and Tube was one of the first Web sites to allow video
still others are just to share interesting links and content to be uploaded by users. More compelling
Web sites. Of course, the use of these content com- was the fact that it offered an intuitive interface
munities often goes beyond just sharing and takes that anybody could use to convert and upload
on political dimensions. According to Alexa.com, videos from a wide variety of sources. Nowa-
two of the 10 most-visited sites in the world are days, individuals can upload videos to YouTube
content communities: YouTube and Wikipedia. directly from smartphones. In addition, there has
Content community sites are typically popu- been little or no censorship, although YouTube
lated by user-generated content. Users are gener- does have a set of basic guidelines, including a
ally required to set up accounts and thereafter can statement of what it considers to be unacceptable
begin uploading and sharing their own content. content. These features have allowed YouTube to
These communities house a wide variety of con- outlast its competitors as well as become a force
tent, including software, videos, visual art, and of in global politics. The main ways people use this
course, textual documents. The goals of content site are to (1) upload videos of events that are not
communities are quite varied. Some communities, being covered by media; (2) provide footage from
316 ContractfromAmerica.org

areas where the international press does not have Cushla Kapitzke and Michael A. Peters, eds.
access; and (3) act as a platform for politicians to Rotterdam, Netherlands: Sense, 2007.
air their views.
Other sites such as Tumblr and Pinterest are
increasingly being used by citizens, politicians,
and advocacy groups to voice their opinions and
share messages. Both sites were extensively used Contractfrom
by both the Republican and Democratic Party
candidates in the 2012 elections. America.org
In addition to providing public platforms for
political ideas and opinions, another function that ContractfromAmerica.org is a Web site devoted
content communities are playing is that they are to promoting conservative, small-government
allowing audiences to bypass the agenda setting ideals associated with the popular Tea Party
and framing functions of the mass media. Instead movement. Ryan Heckler, a Tea Party activ-
of relying on the mass media for an understand- ist from Houston, conceptualized the idea for
ing of what is important news, audiences can now the Web site, which served to collect the beliefs
turn to Web sites such as Digg and StumbleUpon of Tea Party activists in order to create a docu-
to collaborate with other users to define what ment cataloging their most important principles.
is the most important and significant news for The Web site emphasizes the grassroots nature
themselves. of the Tea Party movement because it solicited
ideas from anyone who visited the site and then
Saman Talib put them up for a vote to narrow down what
Humber College these activists believe to be their most important
values. The interactive nature of this Web site
See Also: Audience Fragmentation/Segmentation; highlights the importance of social media as a
Delicious.com; International Online Communities; democratic tool with the ability to bring together
Reddit; StumbleUpon; Tumblr; YouTube. regular people from across the nation to express
their specific beliefs to one another. However,
Further Readings critics of the Tea Party movement question the
Forte, A. and A. Bruckman. “Why Do People Write supposedly democratic nature of endeavors like
for Wikipedia? Incentives to Contribute to Open- the Contract from America Web site. They argue
Content Publishing.” Proceedings of GROUP, v.5 that, rather than being built from the bottom up,
(2005). Tea Party activities are actually being directed by
Okoli, C. and W. Oh. “Investigating Recognition- large, self-interested organizations.
Based Performance in an Open Content The Contract From America Web site was
Community: A Social Capital Perspective.” introduced on September 1, 2009. Between this
Information & Management, v.44/3 (2007). date and January 2010, the Web site reports
Schweiger, W. and O. Quiring. “User-Generated that “hundreds of thousands of freedom-loving
Content on Mass Media Web Sites: Just a Americans” submitted their ideas for consid-
Kind of Interactivity or Something Completely eration. Then, “grassroots leaders across the
Different?” Paper presented at the annual meeting nation” completed surveys that narrowed these
of the International Communication Association, ideas down to the 22 most important. Finally,
New York, New York, 2009. http://citation.all individual Web site visitors further narrowed
academic.com/meta/p_mla_apa_research_ down these 22 ideas to 10 by voting. On April
citation/0/1/2/7/4/p12745_index.html (Accessed 15, 2010, as Tax Day Tea Party events were being
December 2012). held across the nation, the contract was revealed.
Suzor, Nicolas P. and Brian F. Fitzgerald. “The Role of In its final form, the contract highlighted three
Open Content Licenses in Building Open Content overarching principles: individual liberty, limited
Communities: Creative Commons, GFDL and government, and economic freedom. Then, it
Other Licenses.” In Global Knowledge Cultures, listed the 10 voter-determined principles: protect
Cornyn, John 317

the Constitution; reject cap and trade; demand a including links to their Facebook pages and Twit-
balanced budget; enact fundamental tax reform; ter accounts. Despite its use of social media tools,
restore fiscal responsibility and constitutionally the Web site and the Tea Party at large continue
limited government in Washington; end runaway to receive the criticism that they are not really
government spending; defund, repeal, and replace a bottom-up movement. These critics question
government-run health care; pass an all-of-the- how a Web site that relies on contributions and
above energy policy; stop the pork; and stop the direction from already-established organizations
tax hikes. Three hundred candidates and elected can advertise itself as truly being a grassroots
officials signed the document in order to show movement. This has larger implications for social
their support for these principles. Sixty-seven media in general as it struggles between the need
of the signers who were candidates in the 2010 for organization and individual expression.
midterm elections went on to win their elections,
including Jim DeMint, Marco Rubio, Michele Meredith Neville-Shepard
Bachmann, and Rand Paul. University of Kansas
While this Web site claims to have provided a Ryan Neville-Shepard
grassroots experience, not all agree that this is the Indiana University–Purdue University, Columbus
case. For instance, although the Web site claims
to be a bottom-up call for ideas from nonpolitical See Also: Astroturfing; Campaigns, Bottom-Up;
conservatives, the Web site also advertises spon- Campaigns, Grassroots; DeMint, Jim; E-Democracy;
sorship from large organizations like Freedom- Taxes; Tea Party Movement; Townhall.com.
Works, Newt Gingrich’s American Solutions for
Winning the Future, and a Libertarian think tank Further Readings
named The Heartland Institute. Such organiza- Contract From America. “About Us.” http://www
tions have been accused of astroturfing the Tea .thecontract.org/about (Accessed December 2012).
Party movement. In other words, critics of Web Contract From America. “The Contract From
sites like ContractfromAmerica.org accuse these America.” http://www.thecontract.org/the-contract
organizations of using their funds to manufac- -from-america (Accessed December 2012).
ture the false appearance of the Tea Party as a Czeglédi, Sándor. “Beyond ‘Teabonics’: The Tea
grassroots movement that organically developed Party and Language Policy.” Proceedings of
from people who wanted to work outside of the the HUSSE10 Conference. Debrecen, Hungary:
system. For instance, although the Web site visi- Hungarian Society for the Study of English, 2011.
tors contributed their own ideas, Dick Armey, the Karpowtiz, Christopher F. “Tea Time in America?
chairman of FreedomWorks during the contract’s The Impact of the Tea Party Movement on the
development, also had a heavy hand in drafting 2010 Midterm Elections.” Political Science and
the results. The Web site also explicitly thanks Politics, v.44/2 (2011).
many of these organizations and describes them as
invaluable to the process of creating the contract.
ContractfromAmerica.org was key in establish-
ing concrete objectives for the Tea Party move-
ment. If one wanted to run as a Tea Party-backed Cornyn, John
candidate in 2010, he or she established his or
her loyalty to the movement by signing the con- John Cornyn III is the senior U.S. senator from
tract associated with the Web site. The Web site Texas and the current chair of the Republican
continues to urge donations to support conserva- National Senatorial Committee. He is also one of
tive candidates by allowing one to give money the first senators to adopt Facebook and Twitter
directly on ContractfromAmerica.org. The site and has pioneered the use of new social media
keeps visitors updated on current issues of con- and technologies in Congress.
cern by publishing blog posts on its main page John Cornyn was born into a military family in
and also encourages them to stay connected to Houston, Texas, in 1952. He is the second of the
the site through other forms of social media by three children of Dr. John and Gale Cornyn. He
318 Cornyn, John

members of the Texas State Supreme Court in a


scandal tying campaign contributions to court
decisions. Cornyn decided to run for the court in
1990. His campaign stressed judicial integrity. He
earned a master’s of law degree from the Univer-
sity of Virginia during his eight years on the court.
A later series of scandals, in this case involv-
ing then-Texas Attorney General Dan Morales’s
ties to five lawyers who had successfully sued the
tobacco industry, forced Morales’s resignation.
Morales was convicted and sentenced to prison
for falsifying documents in order to secure part of
the tobacco settlement money.
Cornyn ran successfully for this office, becom-
ing Texas’s first Republican attorney general since
Reconstruction. The Texas attorney general is
the state’s chief law enforcement official. He or
U.S. Senator John Cornyn records selected passages of an she is responsible for a variety of duties includ-
1844 letter from Republic of Texas President Sam Houston to ing enforcing child support decisions, consumer
former U.S. President Andrew Jackson. The senator’s July 2012 protection, and some criminal prosecutions. The
recording was part of the Texas State Library and Archives attorney general is also the official legal represen-
Commissions Voices of Texas History project. tative for more than 300 state agencies.
Attorney General Cornyn focused on cyberbul-
lying, cybersexual predators, and identity theft
during his three years in office. He established
graduated from high school while his family was the Texas Internet Bureau, a state agency charged
living in Japan, earning his varsity athletic letters with investigating the illegal use of the Internet.
in wrestling and track and field. After attend- Cornyn’s crusade against these Internet crimes
ing Trinity University in San Antonio, major- would continue once he was elected to the U.S.
ing in journalism, Cornyn went into real estate. Senate.
The mid-1970s national recession caused him to
rethink his plans and attend St. Mary’s School Career in the Senate
of Law, also in San Antonio, where he served as Cornyn was first elected to the U.S. Senate in 2002.
president of the student bar association and as an He became only the fourth Republican to represent
editor on the law journal. Texas in the Senate since the late 1800s. Senator
Cornyn secured appointment to three of the Sen-
Political Career ate’s most prestigious and powerful committees:
Cornyn ran a successful private law practice when the Armed Services, the Judiciary, and the Budget
local Republican leaders approached him to run Committees. He continues to serve on these com-
for state district court judge in San Antonio. He mittees and the Senate Finance Committee, per-
won election to this partisan office in 1985. Gov- haps the most powerful committee in the Senate.
ernor Bill Clemens, the first Republican governor He easily won re-election to the Senate in 2008.
in Texas since Reconstruction, appointed Cornyn Cornyn’s legislative agenda has been to support
the presiding judge overseeing judicial adminis- transparency in government, a balanced budget
tration in 22 south Texas counties. This was an amendment to the U.S. Constitution, and the
unusual promotion for so new a trial court judge. promotion of high-technology industries in the
On December 6, 1987, CBS’s 60 Minutes tele- United States. He is the member of several Sen-
vision news program featured a story about the ate caucuses such as the Senate Republican High
Texas Supreme Court titled “Is Justice for Sale?” Tech Task Force and is chair of the Senate Radio
The program uncovered evidence implicating two Frequency Identification (RFID) Caucus.
Cornyn, John 319

Continuing his crusade against cyber child por- site OpenCongress, Cornyn ranked 11th among
nography, Senator Cornyn joined his successor, the 47 Senate Republicans in consistently voting
Texas Attorney General Greg Abbott, in an effort with other Republicans during 2011 and 2012.
to pass legislation at the national and state levels Cornyn rose to be the vice chair of the Senate
to prosecute cyber child pornographers. He spon- Republican Conference in 2006 and became the
sored the Stopping Adults Facilitating the Exploi- chair of the National Republican Senatorial Com-
tation of Today’s Youth (SAFETY) Act of 2009, mittee (NRSC) in 2006. The NRSC is responsible
which would make facilitation of online child for identifying, recruiting, and providing finan-
pornography by either the content provider or the cial and other support for Republican candidates
Internet or e-mail provider a federal crime. It also for the U.S. Senate. Cornyn was unanimously
increased penalties for sexually exploiting a child. reelected to the chairmanship in 2012.
The senator’s concerns about “murderabilia,”
goods federal or state prison inmates sell over Pioneering Social Media in the Senate
the Internet that are associated with their crimes, Cornyn was elected to the Senate before the
caused Cornyn to introduce the Stop the Sale of rise of social media and networking. Facebook,
Murderabilia to Protect the Dignity of Crime Vic- for example, did not debut until 2004. He has
tims Act of 2007. become, however, one of the most fervent cham-
Cornyn opposed the Stop Online Piracy Act pions of these new technologies in today’s Senate.
of 2011, one of several attempts to punish online He was an early adopter of social networking, and
theft of intellectual property. While acknowledg- he helped orchestrate the Republican gains in the
ing that such piracy was theft, he was concerned Senate during the 2010 congressional campaign
that the bill would chill the freedom of speech. through traditional and social media techniques.
Cornyn’s Senate voting record demonstrates Cornyn’s Facebook page became active in
both his willingness to work with members from 2008. He has more than 27,000 “likes” on his
the other party and his dedication to Republi- Facebook page and close to 42,000 Twitter fol-
can values. He voted for the Bush administra- lowers, making him one of the most popular poli-
tion’s Economic Stabilization Act of 2008 and the ticians in social media. In 2012, Cornyn had more
Obama administration’s economic stimulus act in Facebook “likes,” more tweets, and the second-
2009. Senators Cornyn and Patrick Leahy (D-VT) largest number of subscribers to his YouTube
were jointly awarded the Bi-Partisan Leadership channel, trailing only Congressman Ron Paul
Award in 2005 by the Project on Government (R-TX). He averages 10 posts per day on both
Oversight. This private watchdog organization his Facebook and Twitter accounts. Unlike let-
celebrated the two senators’ efforts to prevent ters, phone calls, and e-mails that are filtered by
exceptions to the Freedom of Information Act his staff, constituents can contact Cornyn directly
from being buried in legislation. through his Facebook and Twitter accounts.
On the other hand, Cornyn opposed Dem- Cornyn’s Senate office possesses one of the
ocratic proposals such as President Barack most effective social media operations in Con-
Obama’s health care proposal. He threatened to gress. The senator was the first Republican sena-
force the Senate to vote on the nomination of tor and one of the first elected officials of either
Priscilla Owens to the U.S. Fifth Circuit Court party to participate in a live town hall meeting
of Appeals in 2005 by challenging the constitu- on Facebook. Facebook invited Cornyn to par-
tionality of a Democratic filibuster. Democratic ticipate in a discussion about the ways in which
senators had prevented 10 federal court nomina- social media connect constituents with their rep-
tions by President George W. Bush from coming resentatives in Congress.
to a vote on the floor. Cornyn’s threat prompted Cornyn has urged other Republican senators to
seven Republican and seven Democratic sena- use social media and social networking not only
tors to agree not to filibuster any nominees unless as ways to campaign but also as ways to engage
there was an extraordinary reason, avoiding what their constituents and to communicate directly
could have been a dramatic challenge to the Sen- with the public. Every Republican senator now
ate’s unlimited debate rule. According to the Web has a paid social media expert on staff. Forty-one
320 Cornyn, John

of the 47 Republicans in the Senate in 2012 regu- YouTube channels to communicate with constitu-
larly tweet. ents in 2010. Republican channels drew far more
Cornyn represents the second-most populous viewers than did Democratic channels.
state in the union, a state of enormous racial, lin-
guistic, and cultural diversity. Senators like him Conclusion
may be prompted to adopt innovative technolo- There are dangers in overestimating social media
gies such as Facebook and Twitter to reach out and networking impact on members of Congress.
to this broad constituency, a problem the House While 89 percent of members of Congress were on
of Representative members who represent more Facebook and Twitter in 2012, compared to only
homogenous districts may not face. At the time 20 percent in 2009, few do more than use social
of this writing in 2012, there are important dif- media to push their talking points. Congressional
ferences in senatorial usage of social media, staffers surveyed by the Congressional Manage-
however. Republican senators had an 11-point ment Foundation thought that constituent visits
advantage over Democrats in Twitter usage. Both to the home and Washington offices have more
Republican and Democratic senators were more influence on members than any interest group or
likely to adopt Twitter than their party colleagues other form of contact. E-mail and postal mail had
in the House. equal impact. The use of social media and net-
Social media does offer new versions of old working to generate enthusiasm among support-
campaign tactics. Ads on YouTube and on cam- ers, raise money, and communicate ideas has not
paign Web sites have made virtual campaigns replaced traditional ways of getting out the vote,
faster and cheaper. Rapid-response tweets, texts, but their importance is growing.
and e-mails can challenge alleged misstatements While the new social media outlets are assum-
or point out gaffes committed by political oppo- ing the roles once fulfilled by traditional print
nents. Social networking sites can link friends to and televised news organizations, they are not
common campaign Web sites so that they can replacing traditional forms of politicking, such as
make political contributions. An effective ad hand shaking, baby kissing, marching in parades,
can go viral on YouTube, gathering thousands speaking at luncheons, attending town halls, or
of viewers in a few hours. As chairman of the receiving and sending personal notes to follow-
NRSC, Cornyn is especially proud of committee’s ers. But social media extends and multiplies the
spoof of President Barack Obama’s announce- impact of other congressional actions. The floor
ment to run for re-election. The spoof drew more speech, once confined to the printed page of the
YouTube viewers than did the president’s actual Congressional Record, the official published
announcement. Even online virtual worlds such journal of the House and the Senate, or to the
as Second Life have been enlisted to promote broadcast of C-SPAN, is now often replayed on a
candidates and policies. Second Life participants member’s Facebook, YouTube, or linked Twitter
have used their digital personas, called avatars, sites, giving the member far more exposure than
to press political causes and beliefs through Sec- before.
ond Life’s electronic community. It is unclear how much John Cornyn’s leader-
Members of Congress regularly use Twitter to ship on social media and networking has affected
report on their daily activities, to link to news the Senate and American politics. He has demon-
articles about themselves, and to engage in other strated to his Senate colleagues the new technolo-
self-promotional activities. They use Twitter as gies’ potential. But, social media is only part of
a new medium to share information that they a system of complementary and conflicting pres-
already share through mediated media such as sures on senators and their followers.
television, the printed press, radio, and directed
communications including postal letters, pam- Timothy J. O’Neill
phlets, e-mail, Web sites, and public appearances. Southwestern University
YouTube’s CitizenTube reported that almost 90
percent of Republican and 75 percent of Demo- See Also: Campaigns, Congressional (2010);
cratic House members of Congress had their own Campaigns, Virtual; OpenCongress.org.
Corporate Social Responsibility 321

Further Readings For some specialists, CSR is connected with


“Cornyn, John.” Biographical Dictionary of the taking care of the local community and local envi-
United States Congress, 1774–Present. http:// ronment, whereas others draw one’s attention to
bioguide.congress.gov/scripts/biodisplay.pl the panlocal or even global scope of CSR activi-
?index=c001056 (Accessed August 2012). ties. There are various approaches to CSR itself,
Golbeck, Jennifer, Justin M. Grimes, and Anthony stressing its legal, social, or economic character.
Rogers. “Twitter Use by the U.S. Congress.” CSR can be also more communication-oriented
Journal of the American Society of Information and focus on proper relations with stakeholders
Science, v.61/8 (2010). or, in other words, with the corporate environ-
Parmalee, Richard and Shannon L. Bichard. Politics ment and sustainable development of the com-
and the Twitter Revolution: How Tweets Influence pany itself. This approach also covers the linguis-
the Relationship Between Political Leaders and the tic layer of communication, concentrating on the
Public. Lexington, KY: Lexington Books, 2011. role of selected language devices and their roles
“Perceptions and Use of Social Media on Capitol in increasing or decreasing the effectiveness of
Hill.” Congressional Management Foundation, CSR communication. Apart from the mentioned
2012. http://www.congressfoundation.org/storage/ term, the following concepts are also used in the
documents/CMF_Pubs/cmf-socialcongress.pdf discussion of CSR: corporate citizenship, strate-
(Accessed August 2012). gic philanthropy, corporate social responsiveness,
Turk, Michael. “Social and New Media—An Evolving latterly good governance, environmentalism and
Future.” In Campaigns on the Cutting Edge, corporate sustainability. Other terms that encom-
Richard J. Semiatin, ed. Thousand Oaks, CA: CQ pass the CSR ideas concentrate more on the image
Press, 2013. of the company (e.g., business reputation, com-
pany identity).
Although the first ideas resembling CSR can be
traced back to ancient times, it is the 21st century
that has witnessed the rapid development of this
Corporate Social domain. There are various reasons for the popu-
larity of CSR in the performance of modern orga-
Responsibility nizations. One of them is the growing competi-
tion between companies and other legal entities to
Corporate social responsibility (CSR) is under- attract the attention of stakeholders. Very often,
stood in many ways. According to some the organizations offer similar products or ser-
approaches, CSR is connected with economic vices, and the social aspect of their activities must
development and providing help for those in be stressed to make people interested in them.
need. For some people CSR is linked mainly Moreover, the issue of network society, with lat-
with ecological issues and protecting flora and tices and grids underlying the relations between
fauna, stressing its focus on nature. For others, people and organizations, is important in shaping
CSR is related to creating company image in the the interdependencies at both the individual and
eyes of stakeholders, and it involves the imple- group levels.
mentation of public relations knowledge and Narrowing this issue to the topic of CSR, the
methods. In most definitions, CSR is understood activities of individuals determine organizations
through the prism of meeting the interests and and vice versa. The other notion is the abundance
needs of broadly understood stakeholders, tak- of risks that many organizations are exposed to—
ing into account the environment they are part of economic, political, and social types. The same
and simultaneously aiming at achieving profits. situation concerns individuals who seek compa-
In other words, CSR-oriented companies want nies that pay attention not only to the business
to find the balance between people, planet, and activity itself but also to other factors determining
profit. Moreover, the scope of interest also var- the life of stakeholders at the micro- and macro-
ies across CSR definitions by taking into account levels. The other reason for the popularity of CSR
geographical factors. nowadays is the development of technology and
322 Corporate Social Responsibility

communication possibilities that determine the is required. The other reasons for its popularity in
information flow between individuals and orga- organizations are its large scope and low cost. It
nizations. Moreover, the appearance of social also should be stated that virtual contact is rela-
media can be said to stimulate interest in CSR. tively cheap in comparison with standard methods
Because individuals not only have immediate of interaction. In the traditional mode of commu-
access to information related to organizational nication, it is the organization that controls the
performance, but they also can participate in the information flow and has to bear, in most cases,
discussion on a company’s successes and failures, the costs related to meetings, telephone calls, and
organizational communicators must provide pos- correspondence. Online interaction does not offer
sibilities for free and efficient discussion. The shift the company the position of the main content
from passive observers to active creators of public creator, but it allows the organization to conduct
discussion that describe the positions of modern communication quickly and cheaply. It should
stakeholders in the social media has also stimu- also be remembered that social media do not only
lated the interest of organizations in promoting enhance the communication between organiza-
CSR issues. Although CSR is becoming more and tions and their stakeholders, but they can also
more popular in the performance of modern com- influence the image of the company in a negative
panies, in many organizations such policies are way by disclosing information about corporate
used only when some failures appear as the instru- failures and irresponsible behavior very quickly.
ment of crisis management. CSR should be the Openness and honesty are crucial as com-
focus of organizations not only in the moments panies cannot hide certain facts. Moreover, the
of change, when maintaining the interest of stake- stakeholders can participate in CSR discourse
holders is crucial, but also on an everyday basis, on organizations without the participation of the
and to be effective it should constitute the core of organization itself because social media facilitate
standard organizational activities. The other rea- communication at both intergroup and intragroup
sons for the popularity of online communication levels of organization. Thus, the way communica-
in organizational communication are its potential tion is handled has also changed. Modern CSR
large scope and low cost. communication involving social media should
As far as strategies of CSR communication are concentrate on helping stakeholders in CSR
concerned, the following types can be enumer- issues and enhancing their participation in CSR
ated: informing strategy, interacting strategy, and dialogue. However, the organizations that opt for
process strategy. The informing strategy involves social media communication should remember to
a one-way communication process and covers update them constantly.
aspects that should be communicated to broadly There should be people in the organization
understood stakeholders. The interaction strategy, selected for reading the posts and responding to
on the other hand, involves a two-way communica- the questions on a daily basis. Another important
tive process. Thus, it relies on stakeholders’ active notion related to CSR communication in online
participation and better perceptions of stakehold- settings is the respect for all participants. All
ers’ needs and expectations. The process of going stakeholders should be treated in the same way,
from one strategy to another is linked with effec- having equal rights to participate in the ongoing
tive strategic management. discussion. Moreover, the organization should
select linguistic tools that will be understood by
Corporate Social Responsibility all participants. One option is to select metaphors
and Social Media that rely on well-known domains in disseminat-
With the increasing role of social media in people’s ing knowledge on CSR issues. Another impor-
lives, it is not surprising that they also determine tant issue is the language level of communication
CSR. The popularity of social media in commu- itself, represented, for example, in respecting the
nicating CSR is determined by the following rea- linguistic identity of the online users who should
sons: Due to the popularity of social media, orga- have the option to read information in their native
nizations are given the chance to communicate tongues. In the case of international companies,
with a vast number of stakeholders at any time it it is often required to run Web sites and social
Corporate Social Responsibility 323

media tools in many languages to meet the lin- CSR aspects with specialists with different back-
guistic needs of stakeholders. grounds and diversified knowledge. This type of
Social media often lead to the creation of online network may stimulate the discussion of
online social networks that are unregulated, and CSR among people of diversified backgrounds
they stimulate effective discussion among partici- and, consequently, show future paths of interest,
pants and knowledge exchange in related settings. investigation, and implementation. Social media
There are also various reasons why online social can also restrict the access to information on CSR.
networks are popular among users. First of all, Moreover, some individuals may prefer standard
they do not demand regular contact because a forms of communicating CSR issues because there
person can decide when he or she wants to enter can be stakeholders not familiar with the Internet
the network. The mentioned freedom is especially and its online tools. Thus, the role of an organi-
visible in asynchronous online networks; people zation is to take into account different commu-
may enter the social media when it is needed and nicative needs of stakeholders to allow them the
comfortable for them. There are no restrictions possibility to express their views in the way they
as far as the timing for joining the discussion is want and are able.
concerned because they do not have to respond However, it should be stated that, in many
immediately, but they have time to search for data cases, social media seem to be more effective
and post comments. than the standard forms of communicating CSR.
This is especially important for those who are First, people do not have to disclose their true
not fluent in the language used in the information identities. In this case, they are more likely to
flow as they can check the words or phrases they share their doubts, comments, and even criticism
do not understand. These features are important as they can express them anonymously. Second,
in the discussion of CSR because the participants social media offer tools that can be used only
are given time to provide answers and, what is temporarily or as an addition to the regular Web
more, they can discuss CSR themes when it is site. The example can be darksites that are cre-
convenient for them. Taking into account the dif- ated in a moment of crisis to deal with novel and
fusion of information in online media, the social unexpected negative instances. To add, hatesites
networks in virtual settings can be discussed can be created by those not satisfied with the
by using the terms homophily and heterophily. performance (also in the ethical sense) of the
Homophilous online networks encompass indi- organization.
viduals sharing certain features or attitudes in Another form of CSR communication is a blog,
common. Consequently, the participants using or an Internet diary of the CSR stakeholder. Apart
social media can have similar ages, educations, from personal comments and ideas, the blogger
professions, and attitudes to technology. can provide links to sources of information on
In this case, individuals select the networks CSR as well as offer some discussion between his
because of user similarity. Moreover, homophily or her posts. Facebook is another popular form
in online media is often related to similar back- of CSR social media communication. According
grounds, genders, hobbies, or localities. Both to various studies, the popularity of Facebook
individuals and organizations involved in the CSR is very high, as high as 90 percent in the United
discourse rely on common features in conducting States. This tool offers immediate posting that is
effective dialogues. Thus, knowledge creation and important in CSR discussion of novel or sudden
dissemination take place among similar individu- issues. Many CSR stakeholders also tweet and
als or entities. post their comments and suggestions regarding
The contradictory type of network is called sustainable responsibility on Twitter.
a heterophilous online network. Heterophilous
online networks rely on users who have differ- Corporate Social Responsibility
ent backgrounds, knowledge, skills, or positions and Politics
in the group or community. Thus, people rely on The relationship between CSR and politics is
these networks if they want to obtain data they related to corporate performance. The growing
do not possess or if they want to discuss some role of politics in modern organizations is also
324 Corporate Social Responsibility

connected with the change of companies’ position economic life determine the political sphere. In
in the modern reality. The shift from passive receiv- classical liberalism, there is the need to set bound-
ers to active creators of activity, especially in the aries between business and politics. In libertarian
sphere of citizenship rights and public goods, has laissez-faire, the boundaries between politics and
resulted in more company responsibility toward business are completely unfixed. There are no
people and the environment. Because companies coercive systems that aim at controlling socioeco-
do not exist in a vacuum, even the stakeholders nomic imbalances and their subsequent presence
not directly involved in CSR policy are influenced as political inequalities.
by CSR statements. For example, the owners of
small firms have to observe the changes taking Corporate Social Responsibility,
place in other organizations and respond to them Politics, and Social Media
in the way they run their companies. Moreover, The relation between CSR, politics, and social
the political situation in a country shapes the CSR media is represented in many ways. First, the
policies of companies. topic of organizational performance, including
For example, economic crisis often leads to its CSR communication in online settings, is a
reducing staff, lowering salaries, or cutting addi- topic of interest for those directly or not directly
tional benefits in companies. Moreover, politics involved in politics. Both politicians and broadly
shapes the relation between governments and understood stakeholders are interested in how
organizations and also determines the role of the company deals with CSR issues and how its
stakeholders in community life. Companies inter- attitude determines politics on a more macro
ested in following CSR policies impose some rules scale. As social media constitute an important
or regulations before they are introduced by gov- tool in the dialogue between individuals and poli-
ernments. Additionally, if a government does not ticians, CSR is also a topic of discussion among
obey regulations regarding safety at work, envi- interested parties.
ronmental policies, and so on, companies may Modern organizations use online communica-
not observe them either. Thus, politics is often tion tools to present their CSR policies and strate-
mirrored in company performance. gies, taking into account the political grounding
Taking the regional dimension of a companies’ of CSR parties. Moreover, taking into account
performance, the issue of politics should be taken the speed of information creation and publica-
into account by companies when they want to tion in the case of social media, with tools such as
adapt to local conditions. There are various ways social networking sites, blogs, content communi-
the notion of CSR and politics is researched in ties, and virtual worlds, companies can respond
modern literature. One of the possibilities is to very quickly to the changing political reality and
show how the political power present in a given adjust their CSR policies to meet the needs of
territory enhances or hinders the interest of stake- broadly understood stakeholders. Taking politi-
holders in CSR policies. One such study was con- cal actors into consideration, social media foster
ducted to determine the relation between CSR their discussions with the public, allow them to
and political beliefs in the United States and how notice reactions to their policies very quickly, as
the popularity of one party in given states shapes well as answer questions.
CSR attitudes. It should also be stated that the It should be mentioned, however, that the
attitude to CSR in companies depends on the power of social media also demands constant
type of political system. For example, in market updates of these communication tools because
socialism, the boundary between business and online communication requires the online partic-
politics is not strict, and companies participate in ipation of all involved interlocutors. Moreover,
distributive equity. In a property-owning democ- in the case of politics, there exists the possibil-
racy, there are institutional mechanisms eliminat- ity of contradictory opinions and ideas as people
ing the excessiveness of economic power in poli- show interest in various political parties. Conse-
tics. In welfare-state capitalism, it is important to quently, the online social media focused on dis-
eliminate power imbalances in business and pub- cussing CSR issues from the political perspective
lic domains. In liberal equality, the imbalances in should respect the rules of free discussion and
Countries Banning Social Media for Political Reasons 325

respect all participating users, regardless of their Stakeholders for Member Identification.” Business
political beliefs. Ethics: A European Review, v.15/2 (2006).
Rubin, Amir. “Political Views and Corporate
Magdalena Bielenia-Grajewska Decision Making: The Case of Corporate Social
University of Gdansk and SISSA, Italy Responsibility.” Financial Review, v.43 (2008).

See Also: Advertising and Marketing;


Communication; Constituencies, Social Media
Influence on; Content Communities; YouTube.
Countries Banning
Further Readings
Bielenia-Grajewska, Magdalena. “Corporate Social Media for
Networking.” In Encyclopedia of Social Networks,
George A. Barnett, ed. Thousand Oaks, CA: Sage,
Political Reasons
2011. China, Egypt, Iran, North Korea, Saudi Arabia,
Bielenia-Grajewska, Magdalena. “Corporate Syria: this is just a partial list of countries that
Social Responsibility and Communication With have banned or restricted access to the Internet
Stakeholders.” Studia Germanica Gedanensia, v.23 and social media for political reasons. The list,
(2010). however, is always changing as some countries
Bielenia-Grajewska, Magdalena. “Linguistic Aspects utilize temporary bans on certain sites while oth-
of Informal Learning in Corporate Online Social ers permanently restrict access to all social media
Networks.” In Virtual Professional Development that is not government controlled. But why would
and Informal Learning via Social Networks, countries want to restrict their citizens’ access to
Vanessa P. Dennen and Jennifer B. Myers, eds. the wealth of information available on the Inter-
Hershey, PA: IGI, 2012. net? The answer to this question is complex and
Capriotti, Paul. “Communicating Corporate Social involves issues of culture, economics, and politics.
Responsibility Through the Internet and Social Antonio Gramsci’s theory of hegemony illus-
Media.” In The Handbook of Communication and trates the concept that the dominant or ruling
Corporate Social Responsibility, Øyvind Ihlen, group must control access to cultural informa-
Jennifer Bartlett, and Steve May, eds. Chichester, tion and ideology by subordinate groups in order
UK: John Wiley & Sons, 2011. to stay in power. Such control allows these ideo-
Cramer, Jacqueline. Corporate Social Responsibility logical views to be accepted without hesitation
and Globalisation. An Action Plan for Business. or challenge. They become an accepted status
Sheffield, UK: Greenleaf, 2006. quo. While the threat or reality of coercion is one
Genasi, Chris. Winning Reputations: How to Be Your way in which this can occur, more often than not
Own Spin Doctor. Basingstoke, UK: Palgrave, continued domination is done through the care-
2002. ful control of processes related to human agency,
Hazlett, Shirley-Ann, Rodney McAdam, and Lisa ideological consensus, and economic domination.
Murray. “From Quality Management to Socially Advertising, public relations, and mass media are
Responsible Organisations: The Case for CSR.” all key tools for ideological control. Social media,
International Journal of Quality & Reliability however, makes such control far more difficult,
Management, v.7 (2007). especially in times of rising political and economic
Hopkins, Michael. Corporate Social Responsibility strife, because it is challenging for a government
and International Development: Is Business the or dominant entity to control the information
Solution? London: Earthscan, 2012. being disseminated via the Internet.
Mäkinen, Jukka and Arno Kourula. “Pluralism in Before looking at the current state of social
Political Corporate Social Responsibility.” Business media restrictions and censorship, it is important
Ethics Quarterly, v.22/4 (2012). to discuss the roles media and journalism have
Morsing, Mette. “CSR as Strategic Auto- historically played in propaganda. There is a pre-
Communication—on the Role of External vailing belief that all conflicts are fought on two
326 Countries Banning Social Media for Political Reasons

fronts: the battlefield and the minds of the popu-


lace. The result has been the increasingly orga-
nized use of propaganda not just during times of
war, but whenever there is a cause that needs to
be advanced. In times of war, the military prizes
the value of controlling information and the
media, because there is concern that if journalists
are given unrestricted access to an area of conflict
they will report stories that could either endanger
lives or that could be negative to the dominant
group. If either of these two occurs there could be
a negative impact on public opinion, which might
then call into question the reality created by the
dominant group and threaten the continuation of
the status quo.
Ways of controlling the media by the military
or other dominant groups have differed greatly
over time, ranging from embedded journalists,
planting stories, controlled daily briefings, and
outright bans. Before the 20th century, infor-
mation about battles came from field officers
and were not impartial reports, but government
propaganda. This led in World War I and II to
government-created agencies that worked to steer
journalists away from areas that showed destruc-
tion and human devastation. Journalists have also
been asked to not show certain images or videos When the Turkish Information and Communication
if they are perceived to be a threat to the stabil- Technologies Authority introduced filters that Turkish Internet
ity of public opinion. Such maneuvering strate- users would have to choose from before browsing the
gies were designed to increase a sense of distance Internet, thousands of Turks gathered in some 40 cities and
between the public at home and the battlefield. As towns around the country on May 15, 2011, to join marches
the Vietnam War suggests, uncensored coverage organized on Facebook against state Internet censorship.
of a conflict can lead to significant antiwar sen-
timent. In Vietnam, the government’s attempt to
control information given to journalists backfired
as the media, especially television, decided that through social media are outside of that system,
they were not satisfied with reporting distorted and their stories can effectively remove the sense
facts. The result was a shift in media coverage to of distance between the public and the conflict.
the antiwar protests at home, which gave these Their real-time images and stories make the con-
movements greater visibility and credibility. flict “real,” and the volume of voices lends legiti-
Control of parachute journalists, journalists macy to the reports and carries the stories into the
sent to cover a conflict but who have little knowl- mainstream media, where they feed the demands
edge of the region or terrain, is relatively straight- of a 24-hour news cycle. The way to attempt con-
forward in times of war. While such control is trol is through banning the technology citizens
a threat to freedom of speech and the ability of use to disseminate information. With social media
the media to expose corruption, the need for the it is also more difficult for those in power to hide
media to work cooperatively with the government when they are controlling the flow of information,
in order to have access to information allows the and the control is more transparent to the outside
military to encourage a certain level of journalis- world. In addition, there are often ways to work
tic self-censorship. Citizen journalists who report around the technological bans, thus resulting
Countries Banning Social Media for Political Reasons 327

in negative publicity to the group attempting to to call an international phone number and have
restrict access to social media without stopping their message translated into a tweet. By the time
the flow of information. the bans occurred, the uprisings had already gath-
One downside of reporting through social ered considerable strength and repressing speech
media where fact is mixed with propaganda is that on social media had limited impact; the bans were
it is extremely difficult to tell what is the truth. thus short-lived.
As there are virtually no filters on who can post
information or alter existing content, and social Effects of Bans
media activists may not subscribe to the same Outside of China, which will be discussed below,
journalism ethics, social media users have to be the greatest restrictions on social media occur in
diligent in their interpretation of what is fact ver- the Middle East and north Africa, especially in
sus fiction. But citizen journalists or activists are countries that are predominately Muslim and/
essential in bringing a conflict into the home, as or countries that are communist or have “repre-
they can go where mainstream journalists cannot, sentative democracies.” It is also common to see
and they understand the culture and landscape far temporary bans on certain social media or Inter-
better, while not being limited by deadlines and net sites as permanent bans are extremely diffi-
corporate policy. In addition, social media allows cult to enforce. Iran has been engaged in Internet
those at home to become direct participants in censorship since 2005; during the Arab Spring, it
the stories by responding with posts and tweets banned Google.
of their own. Social media posts also have the However, there are approximately 150,000
appearance of being genuine and not impacted by Iranian users of Facebook. Saudi Arabia, with-
the government or corporations, which can give out explanation, banned access to Facebook in
the stories and videos greater weight in the eyes November 2010, but the ban was lifted shortly
of the readers. Perhaps most significantly, social thereafter with no word as to why. The Saudi
media stories can go “viral” and spread around government has also threatened to ban Skype
the world through reposts, links, and retweets. and other instant messaging applications. Ban-
gladesh, in May 2010, attempted to ban access
Arab Spring to Facebook after satirical images of Muhammad
All of these factors are evident in the most recent appeared on the site. The ban was not success-
examples of countries attempting to ban social ful and lasted only a week. In Pakistan, there
media for political purposes. In spring 2011, are continued attempts to ban information that
social media chronicled the uprisings that have is anti-Islamic or a threat to internal security. In
come to be referred to as the Arab Spring. Begin- Syria, citizens can be jailed for looking at political
ning in Tunisia and moving to Egypt, Syria, and content on the Internet or using Twitter. Govern-
other countries in the Middle East and north ment permission is also required to create a Web
Africa, social media was used as an effective site. Facebook and YouTube had been officially
tool to mobilize protests and draw world atten- banned since 2007, but those restrictions were
tion. During the revolutions, the governments lifted in 2011.
attempted to shut down the Internet in order to Another challenge of banning social media is
hinder the ability of protesters to organize and attempting to ban something that does not reside
disseminate information. within the country. In April 2013, the Indian gov-
The most significant impact of the Internet ernment came under fire for its possible attempt
ban was the inability of protesters to use social to regulate the Internet. But as the government
media as a call for help. During the ban, protest- indicated, it is difficult to create regulation when
ers resorted to old-fashioned methods of commu- the servers do not reside within the country. Reg-
nication, such as holding handmade signs with ulation is often tied to the location of the servers.
instructions for where to meet, or they found And that is the problem that many countries face.
ways around the Internet blocks. Speak2Tweet Even countries that do ban social media cannot
was developed by Google, Twitter, and SayNow do so fully as the nature of technology is such that
during the Egyptian uprising to allow anyone there are many ways around the bans.
328 Countries Banning Social Media for Political Reasons

China while retaining their online pseudonyms. The reg-


China has had the most success in terms of restrict- ulations also place greater responsibility on ser-
ing its citizens’ access to social media even though vice providers to delete forbidden posts and then
it is a country with extremely high Internet use, report them to the government where violators
with 540 million users. Strict restrictions were put could be jailed. The restrictions come after mul-
in place in 2009 when Uighur activists attempted tiple sexual and financial scandals were exposed
to use Facebook to organize independence pro- by Internet users, which resulted in the resigna-
tests in the Xinjiang region. There are still about tion or dismissal of 10 local government officials.
700,000 users of Facebook in China even though The new regulations are the strongest to date in
Facebook, Twitter, and YouTube are banned per- China and could be an indicator of more to come
manently, and others, such as LinkedIn or the based on recent changes in leadership in the Com-
application Dropbox, are banned occasionally. munist Party.
The Chinese government tries to direct its citizens Since the majority of social media users are
to its Twitter-like weibos. While Chinese citizens young, the new restrictions could backfire on the
do not have access to many foreign Web sites, Chinese government. As seen in the Arab Spring,
including the New York Times and Bloomberg, it is the youth who are very familiar with social
foreign companies can request a presence on the media who can mobilize a social movement or
weibos where they are subject to censorship by revolution. It is important to remember that it
the government. is people who drive protests through technol-
The Chinese government claims that the reason ogy rather than technology driving the protests.
they have to restrict Internet access is to prevent Social media users have proven themselves to be
rumors and stop the distribution of inappropriate extremely proficient in finding work-arounds to
material. However, Chinese citizens can purchase government Internet controls, which could serve
illegal drugs and firearms on Web sites that are as a threat to hegemonic control. That is exactly
not shut down by the government. It is evident what governments fear, but the decision to ban
that the government is concerned with the ability social media rather than find a way to control
of its citizens to gain access to differing ideologi- its counterhegemonic messages is shortsighted.
cal perspectives on human rights, which create a When people are prevented from getting what
direct threat to the stability of the government. they want, even if it is access to YouTube, back-
lash often follows.
Circumventing Bans
For all of the attempted bans, there are even Pamela C. O’Brien
more ways for technologically savvy individu- Bowie State University
als to get around them. If there is any Internet
access it is possible to go beyond a country’s fire- See Also: Arab Spring; China; Citizen Journalism;
walls and access banned sites through virtual pri- Egypt; International Unrest and Revolution; Iran;
vate networks or VPNs. VPNs also serve to keep Monarchies, Social Media, and Politics; Speak2Tweet;
the browser history of users private. In Septem- Syria; Weibo.
ber 2012, the Chinese government took steps to
restrict access to VPNs through new software, Further Readings
but this also limits the ability of foreign corpo- Besser, Howard. “Effects of Media Access Restrictions
rations to access their own internal networks. and Censorship During War.” Social and Cultural
This could be a threat to the country’s financial Impact of New Information (Fall 2001). http://
growth as VPNs allow foreign companies to pre- besser.tsoa.nyu.edu/impact/f01/Papers/Kaaya/
vent the government and other companies from MediaPaperJ.htm (Accessed May 2013).
seeing their communications while also providing Butt, Anaam. “Five Countries That Love to Ban the
transactional safeguards. These new regulations Internet as Much as China.” http://www.policymic
issued by the Standing Committee of the National .com/articles/32467/5-countries-that-love-to-ban
People’s Congress also require social media users -the-internet-as-much-as-china (Accessed May
to provide their real names to service providers, 2013).
Crowdfunding 329

Coleman, R. Leigh. “Social Media Is Changing crowdfunding. Lessig argues that large amounts
Countries and Saving Lives.” Christian Today of special-interest-group money have corrupted
(June 21, 2011). http://www.christiantoday.com/ the American political system and claims that
article/social.media.is.changing.countries.and one solution would be to refund $50 to all voters
.saving.lives/28188.htm (Accessed May 2013). in order to allow them to use that money to serve
Shah, Anup. “War, Propaganda and the Media.” as the sole source of campaign funding.
http://www.globalissues.org/article/157/war Both of these perspectives are rooted in the
-propaganda-and-the-media (Accessed May 2013). theory of self-organizing social structures, an
organizational approach that received substan-
tial attention at the turn of the 21st century.
Howard Rheingold’s identification of the smart-
mob detailed the way that groups of individuals
Crowdfunding could physically self-organize—for protest, art,
or entertainment—using mobile personal tech-
Crowdfunding, in contrast with the traditional nology like short messaging service (SMS) mes-
fund-raising model of obtaining financial back- saging. The scholarly turn to lauding the self-
ing from a few large investors, is fund-raising organizing, information-generating capacity of
by collecting a large number of small donations. leaderless crowds stands in rather stark contrast
While not unique to the Internet era, the method to the suspicion of mass behavior expressed by
has been transformed by the possibility of using sociological scholars in the late 19th and early
Web-based services to reach out to potential small 20th centuries. Gustave Le Bon developed the
funders, including through e-mail solicitation, concept of crowd psychology, identifying the
dedicated software platforms, and Web site dona- fundamental expression of crowd-driven phe-
tion buttons. Crowdfunding is used to generate nomena as irresponsibility and impetuousness.
start-up or operating capital for a wide variety of In a similar vein, Charles Mackay documented
enterprises ranging from art or commercial pro- the tendency of crowd-sourced ideas to take on
duction to journalism, disaster relief, or political fantastical, delusionary dimensions that lead to
campaigns. While crowdfunding is important for concrete consequences like the creation of eco-
the decentralization of project capitalization in nomic bubbles.
general, it also occupies an interesting role in the As the notion of crowdfunding is tied to the
modern debate over campaign finance. Crowd- concept of collective investment rather than the
funding as a campaign fund-raising technique purchase of a finished product, crowdfunders
received a jumpstart in 1999, when the Federal more closely occupy the position of shareholders
Election Commission ruled that online credit or collaborators than customers. This notion of
card donations were eligible for matching federal the crowdfunder as investor was given greater
funds. legitimacy in the United States by the April
Exploring the theoretical underpinnings of 2012 JOBS Act, a law that loosens require-
crowdfunding, legal scholar Yochai Benkler ments on small investors in start-up compa-
described how drastically lowered information nies. Recent growth in crowdfunding volume
costs are leading to a “networked information is exponential: In 2012, crowdfunding research
economy,” in which large-scale cooperation firm Massolution estimated $2.8 billion would
replaces old market forms. In this new economic be raised through crowdfunding worldwide,
mode, “commons-based peer production” up from $1.47 billion in 2011 and $854 mil-
describes the process whereby large collections lion in 2010. Large platforms like Kickstarter
of individuals, motivated by social and individ- (www.kickstarter.com) and Indiegogo (www
ual impulses, collaborate on a common product. .indiegogo.com) provided concrete examples of
More normatively, Lawrence Lessig extended the model’s success in a large variety of project
his own argument regarding the need to liber- areas, while platforms like Kiva (www.kiva.org)
ate media products to common public ownership and the Lending Club (www.lendingclub.com)
in order to also embrace the benefits of political have popularized crowdfunding as an avenue for
330 Crowdsourcing

providing both humanitarian microloans in the Crowdsourcing


developing world and larger loans in developed
nations. The term crowdsourcing is an amalgamation of
While crowdfunding is now used more broadly, the word crowd, those who participate in the
it has for decades been an aspect of state and activity, with the word outsourcing, a procure-
national elections in the form of public financing. ment practice and means to outsource an activity
Public financing models require candidates who to the crowd, as defined by Jeff Howe in 2006.
accept public financing to raise money in small In this initial meaning, crowdsourcing refers the
increments from many donors in exchange for process of outsourcing a task (e.g., cocreation,
receiving matching public funds, which are also user innovation, or repetitive, small tasks) to a
crowdsourced through a voluntary checkoff box group of individuals, the crowd, which can be
on income tax forms. nonexperts acting as volunteers or experts in that
Although Bill Bradley, Howard Dean, and John specific field.
McCain have all used crowdfunding to support Although crowdsourcing can occur in offline
their respective bids for the White House, in 2008, as well as in online environments, it is now seen
Barack Obama was the first major-party presiden- mainly as an online activity. The problem to be
tial candidate since 1976 to reject public financ- addressed or the tasks to be developed are dis-
ing and turn to purely private financing, which tributed to an unknown group of individuals. The
he achieved in substantial part through small, contribution given by the crowd (e.g., solution of
Internet-based donations. Michael Malbin of the a problem, suggestion, or recommendation) is
Campaign Finance Institute argues that Obama owned by the entity responsible for the call, the
was able to do that because the 2004 election crowdsourcer. It is somehow related to the notion
showed that the Internet could indeed effectively of the wisdom of the crowd, explored a few years
raise large sums through small donations. In this before by James Surowiecki, with open source
way, while Internet-enabled crowdfunding may principles applied in the software industry as well.
not have eliminated the role of large donors in Compared to outsourcing, the main difference is
campaign financing; ironically, it may have helped the fact that, in this case, it is a well-defined and
render public financing obsolete. paid individual or entity that takes the task, while
in crowdsourcing, the task is addressed by an
Emily Shaw undefined and usually large group of individuals,
Thomas College who often participate on a voluntary basis.
Since 2006, the term has been applied to
See Also: Campaigns, Presidential (2008); describe many and diverse kinds of Internet-
Campaigns, 2012; Crowdsourcing. based, collaborative activities and seems to
change every time new applications and tasks are
Further Readings outsourced to an undefined group of individu-
Benkler, Yochai. The Wealth of Networks: How als. It has been used, for example, in knowledge
Social Production Transforms Markets and production, in problem solving, in microtasks, in
Freedom. New Haven, CT: Yale University Press, user studies, in software development, in different
2006. businesses activities, in content production (e.g.,
Le Bon, Gustave. The Crowd: A Study of the Popular encyclopedias, photography, user-generated news
Mind. Mineola, NY: Dover, 2002. sites, etc.), in the assessment of graphical per-
Lessig, Lawrence. Republic, Lost: How Money ception and visualization design, in geographic
Corrupts Congress—and a Plan to Stop It. New data collection for disaster response, or in urban
York: Twelve, 2011. planning issues. In common seems to be the idea
MacKay, Charles. Extraordinary Popular Delusions that a group of diverse individuals will produce
and the Madness of Crowds. New York: Harmony more accurate decisions than individuals or even
Books, 1980. experts acting alone.
Rheingold, Howard. Smartmobs: The Next Social This dispersion in the use of the term crowd-
Revolution. New York: Basic Books, 2002. sourcing leads various authors to propose
Crowdsourcing 331

different definitions for crowdsourcing, consider- representativeness of the crowd. This is in part
ing the particular issue he or she is addressing. a consequence of the fact that small but power-
Confronted with this diversity of meanings and ful groups of more active participants may easily
definitions, Enrique Estellés-Arolas and Fernando misrepresent the crowd perspective, influencing
González-Ladrón-de-Guevara proposed an inte- the results toward the interests of specific social
grated definition of crowdsourcing: Crowdsourc- groups or individuals.
ing is a type of participative, online activity in These circumstances challenge the widely held
which an individual, an institution, a nonprofit view about the representativeness and accurate
organization, or a company proposes to a group decisions that crowdsourcing produces, an issue
of individuals of varying knowledge, heterogene- of particular relevance in crowdsourcing used
ity, and number, via a flexible open call, the vol- within public policy decision-making processes,
untary undertaking of a task. as is the case when it is applied to replace or to
The undertaking of the task, of variable com- complement the formal practices of citizen par-
plexity and modularity, and in which the crowd ticipation in urban planning.
should participate bringing their work, money, In part, this kind of risk can be minimized if
knowledge and experience, always entails mutual new tools for transparency are used (e.g., if a
benefit. The user will receive the satisfaction of summary of all user contributions is made pub-
a given type of need, be it economic, social rec- lic, which will easily reveal the existence of any
ognition, self-esteem, or the development of indi- social or geographic bias). The value and the
vidual skills, while the crowdsourcers will obtain material compensation for the work provided by
and utilize to their advantage what the user has the crowd and the ethical consequences of wages
brought to the venture, whose form will depend paid to the crowd are important social and ethical
on the type of activity undertaken. issues that anyone considering to apply crowd-
With such a diverse range of applications, the sourcing must consider, as well as those willing
strengths and weaknesses of crowdsourcing var- to take part in it.
ies from case to case and depends on the role As results from the above definitions, there
assigned to the crowd in each particular process. are different types of crowdsourcing. It can be
For the entity or person responsible for the call, employed to accomplish a task, to find solutions
crowdsourcing facilitates data collection and for problems, and to gather information. It can
evaluation of specific issues, helps solve problems be used to cast a vote on a particular issue, idea,
otherwise more difficult to address internally in or proposal; for creative work; and for raising
the organization, is a cheaper and faster way to funds for a specific initiative. In paid crowdsourc-
deliver some specific tasks, and avoids expen- ing, which is becoming increasingly common in
sive or complex infrastructures. It can also make for-profit activities, the crowd receives compensa-
it easier to develop new products and services tion for their participation in the process, while
and to experiment and implement new ideas by in nonpaid crowdsourcing, particularly suited for
accessing talent dispersed in the crowd, and it can the accomplishment of public policy objectives, a
generate better results. variety of incentives can be used instead.
Nonetheless, crowdsourcing is a process not Crowdsourcing can be designed, after due con-
exempt of difficulties and weaknesses, given the sideration of its advantages and ethical limita-
nature of the role played by the crowd. Crowd- tions, for use in public policies. As Darin Brab-
sourcing can be seen as an exploitation of unpaid ham argues, the crowdsourcing model developed
labor (e.g., the unethical use of an unpaid or in the business field is an appropriate model for
cheaper and socially unprotected labor force) citizen participation in the urban planning pro-
and have a number of other limitations in part cess, not only to gather information but also to
associated with issues of trust and reliability, explore creative solutions for practical urban
along with the fact that it is difficult to apply in problems or for urban design proposals.
highly complex tasks.
Crowdsourcing may also produce faulty Carlos Nunes Silva
results as a consequence of the lack of statistical University of Lisbon
332 Cultivation

See Also: Digital Citizen; Internet Gathering; Open Cultivation


Source Governance; Open Source Politics; Web 2.0.
Cultivation is a prominent theory in mass com-
Further Readings munication research that describes a process
Brabham, Daren C. “Crowdsourcing as a Model for whereby viewers’ perception of the real world and
Problem Solving: An Introduction and Cases.” the media world merge and blur together. This
Convergence: The International Journal of cultivation effect is the result of cumulative expo-
Research Into New Media Technologies, v.14/1 sure to large amounts of media over long periods
(2008). of time. Generally speaking, media do not directly
Brabham, Daren C. “Crowdsourcing the shape viewers’ opinions but rather provide per-
Public Participation Process for Planning ceived facts upon which viewers form opinions.
Projects.”Planning Theory, v.8/3 (2009). These shifts are small but pervasive and impact
Brabham, Daren C. “Moving the Crowd at the whole of viewers’ worldviews.
iStockphoto: The Composition of the Crowd and Cultivation theory emerged from research
Motivations for Participation in a Crowdsourcing started in the 1960s at the University of Pennsyl-
Application.” First Monday, v.13/6 (2008). vania by George Gerbner and the Cultural Indica-
Estellés-Arolas, Enrique and Fernando González- tors Project. Cultivation theory posits that heavy
Ladrón-de-Guevara. “Towards an Integrated consumers of media (and television in particu-
Crowdsourcing Definition.” Journal of lar) develop views of the world similar to what
Information Science, v.38/2 (2012). they see in the media. Cultivation theory argues
Goodchild, Michael F. and J. Alan Glennon. that television is different and more powerful
“Crowdsourcing Geographic Information than earlier media for several reasons. Television
for Disaster Response: A Research Frontier.” distributes consistent audiovisual stories across
International Journal of Digital Earth, v.3/3 demographics, providing audiences with a unified
(2010). vision of the television world, despite the vary-
Heer, Jeffrey and Michael Bostock. “Crowdsourcing ing characteristics, backgrounds, and experiences
Graphical Perception: Using Mechanical Turk to of its viewers. This has a mainstreaming effect
Assess Visualization Design.” CHI 2010, April that homogenizes public opinion. Diverse publics
10–15 (2010). become similar in outlook because they consume
Howe, Jeff. “The Rise of Crowdsourcing.” Wired, the same media messages over time. This has the
v.14/6 (2006). overall tendency to maintain and propagate the
Kleemann, Frank, G. Günter Vose, and Kerstin status quo while reinforcing faith in dominant
Rieder. “Un(der)paid Innovators: The Commercial social and political powers.
Utilization of Consumer Work Through Television is also a unique medium because
Crowdsourcing.” Science, Technology & many viewers receive very large amounts of expo-
Innovation Studies, v.4/1 (2008). sure, often from very early ages. Because of this,
Kostakos, Vassilis. “Is the Crowd’s Wisdom television is understood to be a centralized system
Biased? A Quantitative Assessment of Three of storytelling that replaces prior institutions and
Online Communities” (2009). http://arxiv.org/ individuals in socializing viewers from infancy
abs/0909.0237 (Accessed December 2012). on. The problem is that the symbolic televisual
Surowiecki, James. The Wisdom of Crowds. New world may have very little in common with objec-
York: Anchor/Random House, 2004. tive social reality.
Vukovi, Maja. “Crowdsourcing for Enterprises.” Over the course of its history, cultivation has
Congress on Services, IEEE Computer Society, been particularly concerned with the impact of
2009. television violence because violence was deter-
Zook, Matthew, Mark Graham, Taylor Shelton, mined to be the primary message of television nar-
and Sean Gorman. “Volunteered Geographic ratives, both as fiction and news. Heavier view-
Information and Crowdsourcing Disaster Relief: ers may suffer from what theorists call the Mean
A Case Study of the Haitian Earthquake.” World World Syndrome, whereby they judge the world
Medical & Health Policy, v.2/2 (2010). to be more dangerous and individuals to be less
Cultivation 333

altruistic than they actually are. Resonance occurs has sometimes been a challenge for cultivation’s
when the everyday life experiences of viewers broader acceptance and has generated controversy
reflect or resemble these televised worlds. For within the media effects community. Critics have
instance, viewers who live in neighborhoods where noted that cultivation theorists rarely differentiate
violence is more common are likely to receive a between different kinds of programming and have
double dose of the cultivation effect and have the questioned whether general exposure or exposure
violent worldview of television reinforced. to genre-specific content are better predictors of
While violent content has been a source of effect. Critics have also claimed that cultivation
particular interest, cultivation studies have also theorists haven’t thoroughly explained the cogni-
measured media’s impact in other areas, includ- tive processes behind television’s impact on view-
ing attitudes toward gender, ethnicity, age role, ers. Cultivation’s precise mechanisms of social
family, the environment, nutrition, politics, and change (including mainstreaming and resonance)
science. In terms of political opinions, research- are also difficult to test using traditional social sci-
ers have found that television’s tendency is to entific methods that would assess causality rather
socialize people into standard roles and behav- than merely correlation. But meta-analyses of the
iors and that heavy television viewing correlates many cultivation studies published over more
to middle-of-the-road and mainstream political than three decades indicate that there is a small
outlooks. Heavy viewers also reply to questions but reliable cultivation effect in heavy consumers
more readily than others, suggesting that there of media. Cultivation theorists liken this to other
is a cognitive shortcut already in place and that systems such as climate change, financial markets,
their answers are less considered. Studies have or elections, where a slight but pervasive shift in
also found that cultivation’s effects may be mod- public opinion may have a system-wide effect.
erated or strengthened by other variables includ-
ing educational attainment, life experience, and Paul Falzone
whether television is viewed alone or with others. Independent Scholar
Though cultivation was originally envisioned
as relating primarily to television, subsequent See Also: Communication; Echo Chamber
studies have expanded it to include a variety of Phenomenon; Legacy Media/Old Media; News
other media, including magazines, newspaper Media; Polarization, Political; Television and Social
articles, video games, and online social network- Media.
ing. Some modern theorists have pointed out that
the Internet, like television, represents an immer- Further Readings
sive media environment and that reality television Gerbner, George. “Cultivation Analysis: An
in particular bears much in common with social Overview.” Mass Communication & Society,
networking platforms. v.1/3–4 (1998).
The cultivation approach to research distin- Gerbner, George and Larry Gross. “Living With
guishes it from many other positivist traditions in Television: The Violence Profile.” Journal of
communication. While traditional effects research Communication, v.26/2 (1976).
focuses on the impact of specific media treat- Morgan, Michael, James Shanahan, and Nancy
ments and measurable effects, cultivation focuses Signorielli. “Growing Up With Television:
on long-term socialization over time and across Cultivation Processes.” In Media Effects: Advances
media. Because of this, cultivation researchers in Theory and Research, 3rd ed., Jennings Bryant
rarely use experimental methods that test the and Mary Beth Oliver, eds. New York: Routledge,
short-term effects of media exposure. Instead, cul- 2009.
tivation research usually involves two methods: Shanahan, James and Michael Morgan. Television
content analysis of media and surveys (primary and Its Viewers: Cultivation Theory and Research.
and secondary) of viewers to assess exposure to Cambridge, UK: Cambridge University Press, 1999.
television and perceptions of the world. Shrum, L. J. “Processing Strategy Moderates the
This shift in perspective from selective exposure Cultivation Effect.” Human Communication
to immersive experience of a medium over time Research, v.27 (2001).
334 Cyberculture

Cyberculture that began in the 1990s. Therefore, despite the


existence of the term cyberculture for over a gen-
Historically, cyberculture is a term that is inter- eration, it is only recently, since the emergence of
related to a set of issues that can be character- cyberculture studies, that an investigation of its
ized by ideological, technological, sociocultural, impact in relation to humans has occurred. How-
or social scientific theory and praxis. In contem- ever, at a historical minimum, it is important to
porary terms, cyberculture is broadly used by note the historical beginnings of cyberculture, its
media pundits and laypeople alike as a catchall manifestations, and how the concept of identity is
phrase to capture the social norms of everyday reflected in relation to the digital sphere.
technology users such as hackers or cyberpunks
or various literary versions of techno-utopia Historical Beginnings
motifs or themes. More specifically, despite the Computers had been developed in the 1950s;
appearance of the term cyberculture during the however, the appearance of personal computers
1960s and 1970s, it is generally understood as in the 1970s would transform work and leisure
the mass human interface with digital technology via communication technologies and the subse-
quent manufacturing and globalization of those
technologies. For example, by the 1980s, people
could utilize their personal computers to commu-
nicate in what came to be referred to as cyber-
space. The term cyberspace became popular fol-
lowing the publication of William Gibson’s book
Neuromancer in 1984, which described an exis-
tence where the human body is left behind and
cognition is transformed and exists in a virtual
realm. However, it may be more appropriate to
describe the physical construct of cyberspace
as a term used to describe an aggregate of elec-
tronic digital technology that enables individuals
to communicate in different formats. The spe-
cific technology that allows individuals to com-
municate was based upon military technology
of the 1960s, referred to as Advanced Research
Projects Agency Network (ARPANET), which
was developed to enable American communica-
tion networks to survive a nuclear attack. How-
ever, cyberspace is where the social interaction of
cyberculture via communication, work, entertain-
ment, and business takes place and is embedded
with other physical and social spaces.

Manifestations
There are several manifestations of cyberculture
including, but not limited to, social network sites
(SNSs), online gaming, blogs, e-commerce, file
Kathrin Fricke, known by her online persona of Coldmirror, sharing, chat, and other forms of communication.
signs autographs at the Gamescom 2012 convention in Currently, within this context, these manifesta-
Cologne, Germany. Coldmirror operates one of the most tions of cyberculture have influenced new forms
popular German YouTube channels, and publishes blog and and patterns of consumption, habits, and tech-
vlog entries. The ability for Internet bloggers and video posters niques of knowledge acquisition and exchange.
to become celebrities is part of recent cyberculture. In fact, it may be argued that, by 2013, virtually
Cyberculture 335

every aspect of personal and institutional life in the more collaborative approach of social media
the physical world has developed its counterpart that operated under a different set of conven-
in cyberspace. tions. For example, previous cyberpunk text,
For example, since the emergence of e-com- film, or media frequently supplied and informed
merce sites like Amazon and the online auction users of the templates and conventions or tropes
site eBay, more and more consumers make online to appropriate in order to either engage in acts of
purchases instead of traveling in person to tradi- machine-influenced consciousness that promoted
tional brick-and-mortar business locations. Sec- the posthuman and the postracial with the tradi-
ond, social network sites like Facebook, Black- tional casting formula of nonwhites as window
Planet, Twitter, and Myspace collectively have dressing, or engage in online cultural tourism,
hundreds of millions of members and influence masquerading as the cultural other. In contrast,
the outcomes of elections and social movements. cyberculture is heavily invested in the idea of
Third, influential blogs and online news sites are forming imagined communities—and, increas-
rapidly displacing traditional news outlets as pri- ingly, the virtual complement to real-world affin-
mary sources of information for media consumers. ity groups—that reflect the needs and desires of
Fourth, more relationships are now being formed online users and is especially impacted by the
through online dating sites like E-harmony or forces of globalization.
Match.com than through traditional social loca- Cosmopolitanism and provincialism are
tions such as church. Finally, online sites such as strongly implicated in the growth of social net-
Wikipedia and/or search engines like Google have works and the desire for users to have relation-
rapidly influenced the acquisition and exchange ships with relatives and other like-minded users
of information, and the confluence of these and that previous generations of predigital communi-
aforementioned manifestations of cyberculture ties were unable to have. For example, despite the
have had tremendous implications for the previ- consequences of what scholars, politicians, and
ous conceptualizations of culture and community business leaders refer to as globalization, these
in relation to identity. forces have not necessarily drawn people closer
together. Moreover, it has enabled and made it
Identity easier for immigrants in particular to retain cul-
The Internet, its sociophysical construct cyber- tural ties or connections with families and com-
space, and its cultural construct cyberculture munities left behind and to slow down the process
offer their participants an instant ability to com- of identification with new homelands. Therefore,
municate within and across borders and over the formation of these imagined communities has
previously inaccessible distances. Thus, partici- empowered users to not only take advantage of
pants are creating imagined communities where organizing their cultural worldviews and social
individuals can participate and form various capital for economic or political motivations but
types of relationships whether real, virtual, or also to provide insight into how these identity for-
simulated that reconfigure previous human limi- mations operate across boundaries.
tations. However, in relation to identity, some
important considerations regarding cyberculture Reynaldo Anderson
are ethics and the nexus between informational Harris-Stowe State University
and communication technologies (ICTs) and
community formation. See Also: Avatars; Digital Citizen; Immigration.
In regards to ethics, previous scholarship done
by Lisa Nakamura explored race and cybercul- Further Readings
ture via the tension between previous conven- Bannerje, P. and M. German. “A Conceptual
tions of a unitary identity that was influenced Overview: Global Migration and Transculturation
by a certain set of stereotypes, laws, and social in the Digital Age.” In Migration, Technology, and
hierarchies. Furthermore, these practices oper- Transculturation: A Global Perspective, Myna
ated with a cultural hegemony or dominance that German and Padmini Banerjee, eds. St. Charles,
served the interests of powerful interests vis-à-vis MO: Lindenwood University Press, 2011.
336 Cyber-Jihad

Macnamara, J. The 21st Century Media {R}evolution: that may attack computers, networks, and other
Emergent Communication Practices. New York: information infrastructures to disrupt and coerce
Peter Lang, 2010. governments and populations. Terrorists’ use of
Nakamura, L. Cybertypes: Race, Ethnicity, and the Internet presents a clear and present danger
Identity on the Internet. New York: Routledge, to targeted governments and communities. The
2002. Internet provides a tactical tool to facilitate com-
Turkle, S. Life on the Screen: Identity in the Age of mand-control communications between different
the Internet. New York: Simon & Schuster, 1995. members of a terrorist organization. According to
this view of cyber-jihad, lack of strong regulation
and tough governance regimes turn the Web into
a lawless territory and a magnet for terrorists.
The ability to avoid state surveillance and law
Cyber-Jihad enforcement detection attracts terrorist organi-
zations to the Internet because they can freely
Cyber-jihad conjures up the fears and apprehen- create and use e-mails and Web sites. Internet
sions long associated with the so-called dark side service providers (ISPs) do not verify the iden-
of the Web. The Internet’s capacity to transform tities of registrants and those wishing to create
modern political life, whether as an empower- Web sites undetected. The Internet Corporation
ing tool at the disposal of activists and dissenting for Assigned Names and Numbers (ICANN),
populations, such as the anticorporate globaliza- the international body in charge of regulating
tion movement, or as an unprecedented mega- the Internet, does not have enough muscle to
phone in the hands of politicians, has not totally police the World Wide Web and prevent terror-
quelled some underlying fears about the dangers ists from recruiting, organizing, communicating,
and risks arising from the open nature of the Web. and fund-raising online. Further complicating the
These apprehensions and fears largely stem from matter are the jurisdictional issues often faced by
new media’s sociopolitical and security threats, those law enforcement organizations like Inter-
such as military cyberattacks that could cripple pol, who do have the clout, the resources, and
governments and business infrastructure, hacking the mandate to address transglobal criminal and
sensitive intelligence, cyberbullying, cyberterror- terrorist threats but who often find themselves
ism, and cyber-jihad. bogged down in the reams of red tape generated
While the term jihad comes from the Arabic by nefarious activities that cross national and
verb jahada, which literally means “to struggle,” international boundaries.
its popular usage has become predominantly From encrypted e-mail and messages, chat
associated with Al Qaeda and other Islamist ter- rooms, and spam mimicking to password-pro-
rorist organizations, especially after the 9/11 tected Web sites, Al Qaeda terrorists proved adept
attacks. Cyber-jihad conflates those terrorist at employing the Internet as an operational and
organizations’ use of the Web with regular Mus- tactical platform. After capturing many Al Qaeda
lims’ turn to the Internet for religious information terrorists and seizing their computers, U.S. secu-
and/or benign social, political, or personal uses of rity and intelligence officials discovered computer
the technology. This entry focuses on these twin evidence of encrypted messages and secure Web
implications embedded in the concept, the secu- site communications among the 9/11 conspirators
rity threat, and religious usage implications of and Al Qaeda leaders, such as Abu Zubyaydah,
cyber-jihad. about the planned attacks. In addition to pass-
As a security threat, cyber-jihad “loosely word-protected communication, Al Qaeda-affili-
describe[s] Islamic extremist terrorists’ use of the ated Web sites host a range of material includ-
Internet as a communications, fundraising, recruit- ing terrorist training manuals and propaganda
ment, training, and planning tool in their battle videos. Ansar-al-Islam, an Al Qaeda-affiliated
against the enemy,” according to R. B. Davis. Web site, gained notoriety after posting a video
Cyber-jihad facilitates acts of cyberterrorism, of the beheading of American hostage Nick Berg
in a “convergence of terrorism and cyberspace” by Al Qaeda’s Iraqi branch. While it is difficult
Cyber-Vigilantism 337

to provide exact numbers of Web sites that incite Denning, D. E. “Cyberterrorism: Testimony Before
terrorism, G. Weimann estimates such Web sites Special Oversight Panel on Terrorism.” Committee
to exceed 4,000 in number. Despite the Web sites’ on Armed Services, U.S. House of Representatives,
proliferation, Western governments choose not to 2000. http://www.cs.georgetown.edu/~denning/
shut them down as they provide a trove of infor- infosec/cyberterror.html (Accessed December
mation regarding terrorist activities and, thus, 2012).
help in the surveillance of terrorism. Helms, A. “Politics of Information: The Internet and
Some critics claim that Islamist terrorism as a Islamist Politics in Jordan, Morocco and Egypt.”
threat is overhyped and alarmist at best, pointing Journal of Middle East Media, v.1/5 (2009).
to cyber-jihad’s religious dimensions, which are http://www2.gsu.edu/~wwwaus/Helms2009.pdf
worth examining as well. A growing number of (Accessed December 2012).
Muslims use the Internet as a religious communi- Schleifer, S. A. “Understanding JIHAD: Definition and
cation tool. In this view of cyber-jihad, sometimes Methodology.” Islamic Quarterly (Third Quarter
described as e-jihad, the Internet facilitates indi- 1983). http://www.salaam.co.uk/knowledge/
vidual Muslims’ quests for self-improvement by schleifer1.php (Accessed December 2012).
providing a source of spiritual guidance, fatwas. Weimann, G. Terror on the Internet: The New Arena,
In this way, the Internet becomes both a means of the New Challenges. Washington, DC: United
propagating the faith and of circumventing tra- States Institute of Peace, 2006.
ditional state censorship in Muslim societies. In
shifting the center of authority, these online envi-
ronments permit Muslim users a degree of ano-
nymity while granting antiestablishment religious
fatwas unprecedented exposure. Other scholars Cyber-Vigilantism
similarly conclude that the Internet has enabled
alternative Islamic voices to be heard, which has The Internet provides its users with unprecedented
decentralized traditional religious authority. In means to access and disseminate information, the
this regard, Internet use appears to squarely fit in ability to speak and act anonymously, and a vast
with the literal definition of jihad, as improving potential audience from which to find people with
the self and the community by seeking religious similar passions and convictions. Cyber-vigilan-
guidance online. tism refers to the ways in which citizens without
official legal authority use such affordances to
Aziz Douai participate in the preservation of law and order
University of Ontario in both the online and offline worlds. Unlike tra-
ditional vigilantes like those associated with the
See Also: Arab Spring; International Unrest and frontier justice of America’s western expansion or
Revolution; Nation of Islam Movement. the subway patrols of New York City during the
1970s and 1980s, their online counterparts can
Further Readings come together and act more quickly, responding
Bailey, M. and G. Redden, eds. Mediating Faiths: to a wider range of transgressions and acting with
Religion and Socio-Cultural Change in the Twenty- diminished accountability, largely shielded from
First Century. Burlington, VT: Ashgate, 2011. threat of retaliation or physical harm.
Bunt, G. R. Islam in the Digital Age: E-Jihad, Online Perverted Justice is a prominent antipedophile
Fatwas and Cyber Islamic Environments. London: organization that exercises cyber-vigilante meth-
Pluto Press, 2003. ods to aid official law enforcement, using tactics to
Davis, R. B. “Ending the Cyber Jihad: Combating target pedophiles that police are not allowed to use
Terrorist Exploitation of the Internet With the Rule and contributing time and expertise that extend
of Law and Improved Tools for Cyber Governance. the limited resources of the professionals. Its mem-
CommLaw Concspectus, v.15 (2006). http:// bers pose as minors in chat rooms and work to find
commlaw.cua.edu/res/docs/articles/v15/davis.pdf the identities of adults who engage them in sexual
(Accessed December 2012). conversations. Before forging a relationship with
338 Cyber-Vigilantism

police, Perverted Justice carried out its own brand and not for the benefit or protection of any par-
of punishment by publishing the chat transcripts ticular country. In contrast, The Jester, usually
and identifying information to its message board. written as th3j35t3r, is an example of a patriotic
Members would then attempt to shame the alleged hacker, known for taking down dozens of Web
predator by notifying his neighbors, family mem- sites identified as supporting or recruiting Islamic
bers, and employers of the illicit acts. jihadists. The Jester is notable not just for its suc-
Similar tactics have been employed for a broad cess and prolific activities but also for commu-
spectrum of offenses, including matters trivial to nicating with the public almost entirely through
criminal justice systems. In 2005, after a woman social media, such as using Twitter to advertise
refused to clean up after her dog on a subway in each of the strikes as they are happening.
South Korea, another rider took a picture of her In 2011, an offshoot of Anonymous, which
and uploaded it to a blog, leading to the iden- called itself Lulz Security, or LulzSec, too con-
tification of the culprit only days later. In the fidently exploited what the Internet grants vigi-
large-scale public shaming that followed, cyber- lantes, succeeding in a series of attacks on high-
vigilantes unleashed an onslaught of criticism profile targets, each followed by publication of
and verbal abuse on the woman and attempted hacked data, all the while taunting its victims and
to locate and inform as many of her associates law enforcement alike through Twitter. Although
as possible. The speed and ease with which these it is common for vigilantes to become folk heroes,
kinds of damaging public humiliation campaigns in June 2011, LulzSec twisted this role, soliciting
can be carried out by anonymous groups without requests from fans for sites to attack, resulting in
due process is exemplary of both the power and a number of video game-related Web sites going
the danger presented by cyber-vigilantism. down shortly thereafter. In the year that followed,
The largest and most prolific group of cyber- most of the prominent members of LulzSec
vigilantes is Anonymous, a loose association of were arrested on hacking, conspiracy, and other
activists and pranksters united by a common charges, illustrating the other side of the coin: The
Internet subculture. Its members are ideologically Internet fosters a feeling of disconnectedness from
heterogeneous but numerous and active, regularly real-world consequences, but since the September
forming both ad hoc and long-term initiatives 11 attacks and the realization that the dangers
with targets as varied as copyright enforcement presented by the very properties of the Internet
organizations, pedophiles, foreign governments, that make it great, it is increasingly unfriendly to
security companies, and children’s online video anonymity.
games. They employ a range of strategies, includ-
ing public shaming, but with an emphasis on more Ryan McGrady
technical measures, like hacking to access private Jeremy Packer
accounts and information, changing the contents North Carolina State University
of a Web site, or removing the Web site from the
Internet completely. The latter, which results from See Also: Anonymous; Cyber-Jihad; Hacktivism;
a distributed denial of service (DDoS) attack, is Privacy.
usually accomplished through control of an army
of malware-infected computers. Many of Anony- Further Readings
mous’s attacks, to the contrary, have succeeded by Abrahams, Ray. Vigilant Citizens: Vigilantism and the
assembling such an army through members who State. Oxford, UK: Polity, 1998.
voluntarily install the software. In this way, indi- Samson, Ted. “Should We Cheer or Fear Cyber
viduals are able to take part in organized protest Vigilantes Like Anonymous?” InfoWorld (March
with a few mouse clicks, effecting real monetary, 2, 2011). http://www.infoworld.com/t/hacking/
political, or social damages. should-we-cheer-or-fear-cyber-vigilantes
Although Anonymous frequently acts interna- -anonymous-122 (Accessed December 2012).
tionally and has several times targeted governmen- Solove, Daniel. The Future of Reputation: Gossip,
tal entities, its actions are in defense of openness, Rumor, and Privacy on the Internet. New Haven,
against censors and loosely defined oppression, CT: Yale University Press, 2007.
Cyclical Message Strategies 339

Cyclical Message vote-urging conversations, with 29 percent urging


Obama and 32 percent urging Romney. The next
Strategies most-used channel was social media posts, with
25 percent of those messages coming from both
A cyclical message strategy involves using online supporters of Obama and of Romney.
resources, especially social media such as Twitter,
Facebook, and YouTube, to establish a message Networked Message Cycles
that will be received and then relayed to other At some point, the multidirectional flow of infor-
users. Additionally, messages will also have built mation becomes user powered, and a message can
in a response node, or return path, whereby the take on a life of its own, going viral or escaping
receiver sends responsive feedback to the origina- the Web completely to be taken up by mainstream
tor of the message so that subsequent waves of and elite media. In many cases, the loss of control
messages may be disseminated. When a variety by the producer over the message is compensated
of message channels are interconnected, the life for by the return on investment that comes from
cycle of the message is extended, and its audience the wide reach to networked audiences.
is vastly expanded. The use of the Internet and The great majority of the thousands of Internet
participation in social media sites has had a sub- tools that exist, including social media sites, are
stantial impact on the nature of the candidate– free. In this new realm of information channels,
constituent relationship. the ability to tap into and direct networked politi-
With the proliferation of user-controlled social cal messages through a variety of channels offers
media sites, it is now possible to friend (or unfriend) a distinct advantage to candidates and campaigns.
the president of the United States. An individual However, determining which to use and how to
or organization’s popularity and well-being are use them strategically can be difficult.
often directly connected to the number of Face- Establishing credibility, gaining receiver inter-
book friends or Twitter followers one can claim. est, and triggering receiver action are the intended
The narrowing of psychological distance between outcomes of what pioneering Internet strategist
political actors and those who are able to put them Julielyn Gibbons terms cyclical message strate-
into or remove them from office is an outcome of gies. Gibbons founded a social media consulting
Web-based message delivery systems, including agency, I3 Strategies, as an extension of her work
blogs, online news forums, and social media sites. with patient advocacy campaigns and early use of
A study by the Pew Internet and American Life the Internet as a tool in her work as an outreach
Project found, relative to the 2012 U.S. election director for the Michigan Democratic Party. In her
cycle, that about one-fifth of registered American home state of Michigan, where she was the first
voters used a social networking site such as Face- blogger to receive credentials in the Michigan State
book or Twitter to urge members of their social Capital, U.S. Senator Debbie Stabenow recognized
networks to vote. About one-third of those sur- Gibbons for her online advocacy and campaigns.
veyed reported that others had contacted them via In 2008, Gibbon spearheaded a David-against-
posts on social networking sites to ask them to vote Goliath Web-based campaign that relied success-
for a specific presidential candidate, either Barack fully on use of social media as essentially free mar-
Obama or Mitt Romney. Finally, 22 percent of keting tools to overcome a well-funded opponent.
registered American voters used a social network- In a similar campaign the same year, Gibbons and
ing site to tell how they voted or intended to vote; her colleagues developed a plan to interconnect
when age is factored in, the percentage rises to 29 Twitter, Facebook, and YouTube presences with
percent of those under age 50 who did so. Google and Facebook ads. Rather than aiming
A variety of message channels is used to con- for a mass audience, Gibbons’s group employed
verse about and influence political matters, microtargeting by age and gender demographics.
including face-to-face conversations, posts to Her cyclical message strategy in these cam-
social media, e-mails, and telephone and text paigns consisted in integrating links, uniform
messages. The Pew Project found that face-to- resource locators (URLs), and references to all of
face interactions were the most common in the the other media in use, in addition to face-to-face
340 Cynicism, Political

approaches, e-mail marketing, and other more candidate or issue,” says Gibbons. “If it’s forced
traditional message channels. Each message refer- or faked, the public will know it and you’ll look
enced the other channels and included small calls worse than not trying it at all.”
to action. Gibbons reports, “The best way to garner votes and support is
by maintaining transparency and communication
Some of the tactics that we used included ask- with voters,” concurs Amash. “Most elected offi-
ing supporters to change their Facebook pro- cials haven’t figured that out yet.”
file picture and Twitter avatar to the campaign
logo days before the election, posting and shar- Leslie Reynard
ing campaign ads and messages on YouTube, Washburn University
encouraging supporters to share on their Face-
book walls, creating and spreading a hash tag See Also: Advertising and Marketing; Audience
when folks tweeted about the campaign. Fragmentation/Segmentation; Campaign Strategy;
Microtargeting; Social Capital.
Every message included ways that the receiver
could connect back to the campaign’s other social Further Readings
media sites. Baresch, Brian, Lewis Knight, Dustin Harp, and
Another online political innovator is Repub- Carolyn Yaschur. “Friends Who Choose Your
lican Justin Amash, who as a member of the News: An Analysis of Content Links on Facebook.”
Michigan House of Representatives, was one of Presentation at the International Symposium on
the first to connect directly to constituents by post- Online Journalism, Austin, TX, April 2011.
ing his votes on his Facebook page in 2009 and Bodor, Tamàs. “The Issue of Timing and Opinion
announced his ultimately successful candidacy for Congruity in Spiral of Silence Research: Why
U.S. Congress on Facebook. As a member of Con- Does Research Suggest Limited Empirical Support
gress, Amash’s Web site includes links to e-mail, to for the Theory?” International Journal of Public
a newsletter subscription request, and to his voting Opinion Research, v.24/3 (2012).
record on Facebook. The use of Internet resources Rainie, Lee, Aaron Smith, Kay Lehman Schlozman,
for political purposes is constantly expanding, Henry Brady, and Sidney Verba. “Social Media and
as is the sophistication of media-marketing algo- Political Engagement.” Pew Internet and American
rithms and their strategic use to drive messages to Life Project (October 19, 2012). http://pewinternet
targeted consumers. New social networking tools, .org/Reports/2012/Political-engagement.aspx
such as Google Wave, are likely to expand the (Accessed April 2013).
possibilities for transparency, collaboration, and Silverman, Matt. “How Political Campaigns Are
enhanced communication, according to Gibbons. Using Social Media for Real Results.” Mashable
Traditional elite and mainstream media are less (June 10, 2010). http://mashable.com/2010/06/09/
prominent as decision drivers for consumer and political-campaigns-social-media (Accessed
constituent decisions, as people forage for news on November 2012).
the Internet. Logging software, click path moni- Slater, Michael D. “Reinforcing Spirals: The Mutual
toring, data mining, algorithms, and other analyti- Influence of Media Selectivity and Media Effects
cal tools allow for a finely tuned understanding of and Their Impact on Individual Behavior and
consumer intentions and behaviors. Social Identity.” Communication Theory, v.17/3
Thus, information networkers will increasingly (2007).
become important in helping political message
producers to navigate the labyrinthine connec-
tions and networks that now exist. In conjunction
with technological savvy, Gibbons and Amash
emphasize that the accuracy and authenticity of Cynicism, Political
the message itself is of primary importance.
“You want the social media to be a very nat- Political cynicism is an important sentiment and
ural, authentic extension of the campaign and is an indicator of the health of a democracy. The
Cynicism, Political 341

Oxford English Dictionary defines cynic as “a per- There has been a proliferation of explanations
son who believes that people are motivated purely for the apparent rise in political cynicism, with
by self-interest rather than acting for honorable or many accounts focusing on the way politics is
unselfish reasons.” The proposition that politicians communicated. Mass media critiques focus on
are motivated by self-interest rather than the public the impact of television entertainment in terms of
good is one most readers of this encyclopedia will both its displacement of time available to partake
be familiar with. But, there are further dimensions in civic activities and the program content that
of political cynicism beyond politicians alone. favors entertainment over civic values, therefore
Conceptualizing and measuring political cyni- facilitating the conditions in which political cyni-
cism has proven problematic, and disagreement cism thrives.
exists over how best to approach it. For many Campaign critiques contend that the growing
years, scholars made inferences on political influence of marketing and public relations tech-
cynicism based on American National Election niques used by political parties has ruptured the
Studies that measured political trust, alienation, link between citizens and representatives. Nega-
and efficacy. While there are some robust links tive political campaigning (particularly adver-
between these measures and political cynicism, tising) has been found to encourage cynicism,
Joseph Cappella and Kathleen Hall Jamieson con- though its impact on electoral turnout is disputed.
vincingly argue for a set of measures of political News media critiques contend that many prac-
cynicism that focus on the following: tices in political journalism are encouraging politi-
cal cynicism. For some commentators, the news
. . . the manipulativeness of advocates (can- media have shifted from a position of watchdog
didates in campaigns and representatives of of the powerful to attack dog, evidenced through
groups in policy debates), dishonesty, winning increasing journalistic negativity and cynicism
and getting ahead, looking good, using fear, toward politicians. A growing body of literature
the absence of real choice, and the role of big has explored the role of the political interviewer,
money. for example, and how cynicism is increasingly
imbued into his or her encounters with politi-
Nevertheless, it is important to point out that cians. Whereas in the past, interviewers displayed
Joseph Cappella and Kathleen Hall Jamieson’s respect and even deference toward politicians,
measures of cynicism are primarily aimed toward now they are aggressive and confrontational, with
politicians. Other scholars have established a an emphasis laid on landing punches or scoring
distinction between political cynicism directed points over their opponent. Such reporting is
at persons on the one hand and issues and insti- said to present the political process in a manner
tutions on the other. Furthermore, studies have designed to encourage suspicion, negativity, and
found that these dimensions of political cynicism distrust among its audience. In their defense, jour-
are not always correlated; for example, a citizen nalists point out that (1) rather than stirring up
may be cynical toward politicians in his or her voter cynicism, they are merely reflecting it; and
country but still have full faith in his or her sys- (2) politicians have given the public many reasons
tem of government. This broader dimension of to be cynical about their motivations (through
political cynicism is usually more stable and less high-profile scandals and so on).
prone to short-term change than that specific to a
particular issue or person. Social Media
In many Western democracies, political cyni- Social media is increasingly important in these
cism is said to be on the rise and has been associ- debates over political cynicism. The use of social
ated with broader concerns about declining polit- media is becoming an everyday feature of political
ical engagement, party identification, and voter and civic engagement for many people across the
turnout. Research shows that those people most world. A distinctive feature of social media is how
cynical of politics also tend to be the least politi- it offers many new opportunities for small-scale,
cally knowledgeable and engaged. Young people low-cost forms of political engagement, which
tend to be the most cynical of all. coexist alongside high- and medium-threshold
342 Cynicism, Political

expressions of engagement. According to research have been slow to embrace its participatory and
conducted in 2012 by the Pew Research Center’s empowering potential, largely using the platforms
Internet and American Life Project, some 66 per- for one-way impression management.
cent of social media users—or 39 percent of all
American adults—have done at least one of eight Conclusion
civic or political activities with social media. These Many of the findings mentioned above might
range from small-scale actions such as reacting to suggest that social networking can reduce politi-
others’ postings, sharing political content, or “lik- cal cynicism. However, studies that have isolated
ing” a political cause, to pressing friends to act political cynicism as a dependent variable have not
on issues and vote, or creating one’s own content, found a significant impact of social media use. Fur-
which is then shared. thermore, despite the fast-growing and diverse rep-
There is much hope that the many opportuni- ertoires of political engagement offered by social
ties for ordinary citizens to participate in politi- media, levels of political cynicism in most Western
cal actions through social media might lead to countries—especially cynicism directed at elected
greater political empowerment and reduced polit- officials—remain stubbornly high. This would sug-
ical cynicism. There are many examples of social gest that there are still more powerful explanations
media facilitating mobilization of like-minded for political cynicism, rooted in political socializa-
individuals around a political issue or campaign, tion, culture, and broader features of political sys-
and sometimes forcing change. Some studies have tems. Nevertheless, as social media make increas-
found that individuals who participate in social ing inroads into everyday life, and thus political
media environments are likely to experience a socialization and culture itself, it will be a central
sense of understanding, connection, involvement, focus of future research into political cynicism.
and interaction with others who participate in
these environments. Other studies have shown Daniel Jackson
how those who use social media, especially Face- Bournemouth University
book, are more civically and politically active
than nonusers. See Also: News Media; Social Capital; Voter
Young people in particular are increasingly Apathy; Voter Turnout; Youth Engagement.
relying on social media as a source of news and
information about politics and as a platform for Further Readings
interpersonal political communication. Younger Cappella, Joseph and Kathleen Hall Jamieson. Spiral
users are more likely to post their own thoughts of Cynicism: The Press and the Public Good. New
about issues on social media, post links to politi- York: Oxford University Press, 1997.
cal material, encourage others to take political Erber, Ralph and Richard Lau. “Political
action, belong to a political group on a social Cynicism Revisited: An Information-Processing
networking site, follow elected officials on social Reconciliation of Policy-Based and Incumbency-
media, and like or promote political material oth- Based Interpretations of Changes in Trust in
ers have posted. Government.” American Journal of Political
Furthermore, by facilitating unmediated, two- Science Review, v.34/1 (1990).
way communication between citizens and elected Jackson, Daniel. “Strategic Media, Cynical Public?
representatives, many hope that more productive Examining the Contingent Effects of Strategic News
connections can be made. In the United States, Frames on Political Cynicism in the UK.” Harvard
President Barack Obama has been praised for International Journal of Press/Politics, v.16/1 (2011).
his innovative use of social media in engaging, Rainey, Lee, et al. “Social Media and Political
mobilizing, and empowering supporters. All over Engagement.” Pew Internet and American Life
the world, politicians are developing their social Project (2012). http://pewinternet.org/Reports/
media presence. However, studies examining 2012/Political-engagement.aspx (Accessed May
their use of social media find that most politicians 2013).
D
Daily Show, The found that viewers of The Daily Show were more
knowledgeable about news than people who
On July 21, 1996, The Daily Show, a satirical watched “real” news programs.
news program, premiered on Comedy Central as a Having a media-savvy audience requires the
replacement for Bill Maher’s Politically Incorrect. show to be multiplatform in its approach to con-
Created by Lizz Winstead and Madeleine Smith- tent delivery. As the Internet and social media
berg, and hosted by former ESPN SportsCenter gained prominence, the show’s audience wanted
coanchor Craig Kilborn, The Daily Show paro- to be able to view segments from the show and
died traditional newscasts through monologues share them with others. Comedy Central, like
and on-location reports from correspondents many media companies at this time, was con-
such as Brian Unger and Stephen Colbert. The cerned about allowing its programming to go
Daily Show quickly developed a sizable audience viral. Originally part of the larger Comedy Cen-
of young, primarily male, 18- to 36-year-olds, a tral Web site, video of The Daily Show could not
key demographic for advertisers. Under Kilborn, be downloaded nor could users post comments
the focus of the show was popular culture and or blog.
character-driven human interest story parodies. In the summer of 2007, The Daily Show
This changed when Jon Stewart took over as host launched its own Web site. Users could embed
on January 11, 1999, after Kilborn moved to CBS. video clips into any social media site because
Renamed The Daily Show With Jon Stewart, the the embedded content serves as a portal back to
show became much more politically focused. the show’s Web site. By September, the site was
The show’s coverage of the 2000 election, receiving more than 800,000 views. After the suc-
“Indecision 2000,” showcased the new editorial cess of the Web site, The Daily Show expanded
voice of the show as a comedic, but informative, its social media presence to include Twitter, Face-
option to traditional news sources. While the book, YouTube, Tumblr, and Foursquare. The
show tends to present a more liberal viewpoint, Daily Show was also an early adopter of Face-
the goal is to encourage the audience to ques- book’s Open Graph applications, which allow
tion the political discourse being driven by tradi- users to automatically publish their media use
tional and social media rather than to present a onto their social media sites. Open Graph allows
specific agenda. While the show is seen as a soft people to see what their friends are reading and
news source, a 2007 Pew Research Center survey watching and, thus, pushes that content to a

343
344 Daily Show, The

broader audience. Serving as advertising tools million streamed the event live over the Internet.
for upcoming episodes, the social media sites pri- Both Stewart and Colbert actively tweeted and
marily repurpose the content from the television posted to Facebook throughout the event.
episodes. However, they also provide a way for In October 2012, Jon Stewart faced off against
fans to share their favorite videos and comment Bill O’Reilly in “The Rumble in the Air-Condi-
on recent stories, thus creating spaces for instan- tioned Auditorium.” This presidential debate par-
taneous political discourse. ody was streamed online (no other coverage was
On September 21, 2010, Jon Stewart available) for $4.95, with half of the proceeds
announced, at the height of the Tea Party move- going to charity. The demand was so high that it
ment, that he would be hosting a Rally to Restore overloaded the servers, which forced organizers
Sanity on the National Mall on October 30, just to tweet an apology to fans.
days before midterm elections. Stephen Colbert of The rally and debate typify how The Daily
The Colbert Report also announced he would hold Show utilizes social media to spread its humor
a March to Keep Fear Alive rally on the same day. and political viewpoints. The events required
Both marches had their own Web sites, and within minimal traditional publicity beyond the initial
a day of the announcement, the Rally to Restore television announcement followed by informa-
Sanity Facebook page indicated that more than tion on Facebook and Twitter. Yet, the publicity
132,000 people planned to attend. Attendance that the network received was significant as all
at the event reached more than 200,000, while 4 the major U.S. media outlets provided some level

Retired U.S. Navy admiral and former chairman of the Joint Chiefs of Staff Michael Mullen speaking with Jon Stewart on The Daily Show
on September 12, 2011. After some initial reluctance on the part of Comedy Central to make content available online, The Daily Show
embraced social media; its Facebook page had 3.5 million “likes” and it had 951,000 followers on Twitter as of October 2012.
DailyCaller.com 345

of coverage about both events. The Daily Show commentary.” The Daily Caller has found a niche
has shown that, by embracing social media, the by making its content readily available to fre-
show develops a greater reach into and under- quent news readers through social media, a You-
standing of its audience, who are able to stay con- Tube channel, and mobile platforms for iPad and
nected with the show no matter what device they Android users.
are using. While Stewart may not call himself a Journalist Tucker Carlson, the former cohost
journalist or politician, his influence on political of CNN’s Crossfire, launched the Daily Caller in
culture is significant. As of September 30, 2012, early 2010 alongside his college roommate, Neil
The Daily Show’s Facebook page had 3.5 million Patel, a former aide to Vice President Dick Cheney.
“likes” and 951,000 followers on Twitter. Carlson began his journalism career in the 1990s
at the Arkansas Democrat-Gazette and then later
Pamela C. O’Brien at the Weekly Standard. The site found immedi-
Bowie State University ate success, surpassing its traffic estimates in its
first 10 months of existence, according to Carl-
See Also: Actors and Social Media in Politics; son. Now the Daily Caller is a profitable entity. In
Advertising and Marketing; Colbert Report, The. January 2013, the site claimed 6.3 million unique
visitors, an audience Carlson says rivals that of
Further Readings the Boston Globe and Miami Herald.
Emmett, Arielle. “Networking News.” American The Daily Caller often employs slideshows to
Journalism Review. http://www.ajr.org/article go along with its stories in an effort to increase
.asp?id=4646 (Accessed September 2012). user clicks. One such slideshow, “Top 10 Most
Kirell, Andrew. “Jon Stewart Shreds Media Coverage Punchable Faces in Media,” created by Enter-
of ‘Winners’ and ‘Losers’ in Truly Unwinnable tainment Editor Taylor Bigler, gained a lot of
Israel–Gaza Conflict.” Mediaite (November 26, attention in social media prior to the 2012 presi-
2012). http://www.mediaite.com/tv/jon-stewart dential election. Bigler’s slideshow was based on
-shreds-apart-media-coverage-of-winners-and a comment MSNBC host Lawrence O’Donnell
-losers-in-truly-unwinnable-israel-gaza-conflict made about Mitt Romney’s son Taggert Romney
(Accessed December 2012). saying he wanted to take a swing at President
Pew Research Center. “Public Knowledge of Current Barack Obama.
Affairs Little Changed by News and Information In an effort to run a lean operation, the Daily
Revolutions” (April 15, 2007). http://www.people Caller has a staff of just under 50 people and
-press.org/2007/04/15/public-knowledge-of-current tends to hire younger reporters out of college
-affairs-little-changed-by-news-and-information while also utilizing a lot of content generated
-revolutions (Accessed September 2012). from freelancers.
Although it is part of the new wave of online
journalism, representatives of the Daily Caller are
now entrenched in the Washington, D.C., news
establishment as they belong to the press corps on
DailyCaller.com Capitol Hill and the White House press pool. As
a result, the Daily Caller’s roster of talent is often
In the competitive political news market, the Daily featured as guests on major cable and broadcast
Caller has emerged as one of the leading voices of news programs.
right-leaning/libertarian journalism. As an online- The Web site is a mixture of news, features,
only entity, the Daily Caller effectively uses social opinions, and investigative pieces with topics
media by teasing story slugs to attract consum- ranging from politics to pop culture and sports.
ers to its multimedia content. With over 100,000 Content is often based around catchy headlines
Twitter followers, @DailyCaller bills itself as and stories that utilize a combination of pictures,
“USA’s fastest growing news Web site dedicated video, text, and embedded links. Many maintain
to providing our audience with original reporting, that the Daily Caller’s amount of original mate-
in-depth investigations and thought-provoking rial—both text and video—has helped it emerge
346 Daniel Pearl Freedom of the Press Act

as a top journalistic voice rather than just a par- was never asked to pay anyone and of course
tisan outlet. Noted left-wing watchdog group never would pay anyone for this story.” After fac-
Media Matters is often critical of the Daily Caller ing criticism about the Menendez prostitute story
and its journalists for what the organization con- by those on social media, Carlson responded,
tends is biased reporting that unfairly distorts “Why should I care if a bunch of losers on Twit-
liberal points of view and President Obama. In ter don’t like it?”
turn, the Daily Caller has run a series of articles
that details the close relationship Media Matters’ Aaron J. Moore
director David Brock has with the Obama admin- Rider University
istration and MSNBC executives.
The Daily Caller covered in-depth the court See Also: Backchannel; Menendez, Robert; News
case of Philadelphia “abortion doctor” Kermit Media; Politico.
Gosnell and the terrorist attacks on the U.S.
embassy in Benghazi, Libya. Further Readings
Carlson, Tucker. Politicians, Partisans, and Parasites:
Key Figures My Adventures in Cable News. New York: Warner
The Daily Caller attempts to avoid being a Books, 2003.
mouthpiece for the Republican Party. While for- “The Daily Caller Shatters Traffic Predictions.”
mer Bill Clinton associate Lanny Davis has pub- Business Wire (November 10, 2010).
lished material on the site, and Mickey Kaus, Farhi, Paul. “For Daily Caller, Controversy Means a
a liberal on many topics, is a prominent writer ‘Good Day.’” Washington Post (March 6, 2013).
for the site, most of the key editorial figures call Leonnig, Carol and Luz Lazo. “Daily Caller Accused
upon a right-leaning background. Matt Lewis, in Alleged Smear Plot.” Washington Post (March
one of the Daily Caller’s commentators, is a 23, 2013).
renowned conservative blogger who first gained
notoriety with America Online’s Politics Daily.
Vincent Coglianese, a senior editor, has spent
time with the Heritage Foundation and in con-
servative talk radio. The site’s original primary Daniel Pearl Freedom
investor, Foster Friess, is a prominent conserva-
tive financier. of the Press Act
Senior video reporter Nicholas Ballasy’s style of
guerrilla journalism plays well for the site and its The Daniel Pearl Act of 2009 was signed into law
social media identity. Ballasy has caught up with by President Barack Obama on May 17, 2010.
numerous politicians including Bill Clinton, How- As an amendment to the Foreign Assistance Act
ard Dean, and Mitt Romney and entertainers like of 1961, the act requires the secretary of state to
Clint Eastwood, Tom Hanks, and Matt Damon expand the examination of the status of freedom
in public settings, putting them on the spot with of the press worldwide in an attempt to draw
interviews that are then often shared virally. attention to governments that attempt to silence
or condone media opposition by censorship,
Controversy coercion, imprisonment, or death. This addition
In March 2013, the Daily Caller published claims to the U.S. State Department’s Annual Country
made by Dominican prostitutes that they were Reports on Human Rights Practices identifies
paid by New Jersey Senator Robert Menendez countries where freedom of the press is violated,
for sex. Menendez disputed the claims, and later including imprisonment or other sources of pres-
Dominican investigators reported that someone sure, physical attacks, or censorship from sources
from the Daily Caller entered the country and including the government, military, police forces,
offered to pay prostitutes $5,000 to make claims intelligence agencies, rebel or extremist groups,
about Menendez. Speaking on behalf of the Daily or criminal groups. The annual reports incorpo-
Caller, Carlson said his site “never paid anyone, rate information about the status of the press in
Daniel Pearl Freedom of the Press Act 347

foreign countries, violations to press freedoms,


and actions taken by local governments to rem-
edy those situations.
Freedom of the press includes descriptions of
efforts to improve or preserve media indepen-
dence, as well as an assessment of progress made
on efforts to improve media treatment. In coun-
tries identified as having severe violations of free-
dom of the press, the report must detail govern-
ment involvement (participation or condoning
violations of press freedom), the actions that the
government has taken to preserve the safety and
independence of the media, and measures taken
to prosecute those who attack, injure, censor, or
murder journalists. The annual report factors into
decisions made by the U.S. Congress as it consid-
ers foreign aid and human rights issues.

Daniel Pearl
The Daniel Pearl Freedom of the Press Act is
named in honor of former Wall Street Journal
reporter Daniel Pearl, a veteran correspondent
who was reporting on terrorist groups in Paki-
stan. Specifically, he was attempting to discover Journalist Daniel Pearl was reporting on terrorist groups in
possible financial links between Richard Reid, Pakistan when he was abducted by Islamic extremists in Karachi
known as the “shoe bomber,” and Al Qaeda. Pearl on January 23, 2002. The act, named in his honor and signed into
was abducted in Karachi on January 23, 2002, law in May 2010, amends the Foreign Assistance Act of 1961.
just four months after the September 11, 2001,
terrorist attacks. His Islamic extremist kidnap-
pers, calling themselves the National Movement
for the Restoration of Pakistani Sovereignty, saw were convicted on July 15, 2002, and sentenced
Pearl as a symbol on several levels: a media figure, to death, but those sentences remain on appeal.
an American, and a Jew. They demanded a range In March 2007, during a closed military hearing
of actions from the United States for his return, at Guantanamo Bay, Khalid Sheikh Mohammed,
sending photos of him holding up a newspaper mastermind of the September 11 terrorist attacks,
with handcuffed hands and a gun at his head. said that he had personally beheaded Pearl. Pearl
Pearl’s kidnapping garnered attention from was 38 when he died.
people around the world; his pregnant wife called
for Pearl’s release. Several weeks passed without Legislation
information about his whereabouts or fate; his The bill that established the Daniel Pearl Free-
murder by decapitation was confirmed on Febru- dom of the Press Act was sponsored in the House
ary 21, 2002, via a three-minute videotape titled by Representatives Adam Schiff (D-CA) and
The Slaughter of the Spy-Journalist, the Jew Dan- Mike Pence (R-IN) as H.R. 3714, introduced on
iel Pearl that showed Pearl’s mutilated body. His October 1, 2009. It passed 403–12 on Decem-
body was found on May 16 in Gadap, about 30 ber 16, 2009. Sponsored in the Senate by Senator
miles north of Karachi, in a shallow grave. Three Christopher Dodd (D-CT) as S. 1739, it passed
of the murder suspects were caught after the Inter- the Senate unopposed on April 29, 2010, after a
net protocol (IP) address of the initial ransom controversial provision providing grants for inde-
demands was traced. Ahmed Omar Saeed Sheih, pendent media was removed. On May 17, 2010,
identified as the mastermind, surrendered. They President Barack Obama signed the legislation,
348 Data Mining

with Pearl’s widow Mariane, his 7-year-old son promote freedom of the press by putting on
Adam Daniel (born after Pearl’s murder), his par- center stage those countries in which journal-
ents Judea and Ruth, and his sisters Michelle and ists are killed, imprisoned, kidnapped, threat-
Tamara attending. ened, or censored.
As recorded by the White House, President
Obama said, Beth M. Waggenspack
Virginia Tech
I am very proud to be able to sign the Dan-
iel Pearl Freedom of the Press Act, a piece of See Also: Foreign Policy; Global Center for
legislation that sends a strong signal about Journalism and Democracy; Human Rights; News
our core values when it comes to the freedom Media; Reporters Committee for Freedom of the
of the press. All around the world there are Press; Reporters Without Borders; Terrorism.
enormously courageous journalists and blog-
gers who, at great risk to themselves, are try- Further Readings
ing to shine a light on the critical issues that Daniel Pearl Foundation. “About Us.” http://www
the people of their country face; who are the .danielpearl.org/about_us/danielpearl_bio.html
frontlines against tyranny and oppression. And (Accessed April 2013).
obviously the loss of Daniel Pearl was one of “Daniel Pearl Freedom of the Press Act to Be Sent to
those moments that captured the world’s imag- the President.” Press Release, U.S. Congress. (April
ination because it reminded us of how valuable 30, 2010). http://www.danielpearl.org/news_and
a free press is, and it reminded us that there are _press/articles/043010_Daniel_Pearl_Freedom_
those who would go to any length in order to President.pdf (Accessed April 2013).
silence journalists around the world. Lee, Jesse. “Protecting Press Freedoms Worldwide.”
The White House Blog (May 17, 2010). http://
In a press release marking the signing, Judea www.whitehouse.gov/blog/2010/05/17/protecting
and Ruth Pearl said, in part, -press-freedoms-worldwide (Accessed April 2013).
Pearl, Daniel, Helene Cooper, and Mariane Pearl. At
We absolutely agree with the president that Home in the World: Collected Writings From the
this act sends a strong message for defending Wall Street Journal. New York: Wall Street Journal
the freedom of the press and empowering Dan- Books, 2002.
ny’s colleagues around the world to seek the Pearl, Mariane. A Mighty Heart: The Brave Life and
truth and share their reporting without fear of Death of My Husband, Danny Pearl. New York:
retribution from their government. Scribner, 2003.
Pearl, Ruth and Judea Pearl. “The Daniel Pearl
Conclusion Freedom of the Press Act.” Press Release (May 17,
Daniel Pearl has been remembered as a symbol of 2010). http://www.danielpearl.org/news_and
hope who has inspired others toward developing _press/articles/DanielPearlPressActCoverage.pdf
cultural understanding. His legacy has resulted (Accessed April 2013).
in a stronger U.S. policy concerning freedom of
the press. Representative Adam Schiff, one of the
main sponsors of the act, stated on April 30, 2010,

Daniel Pearl’s life was an inspiration to all Data Mining


of us. We hope this legislation will help the
United States work with other nations to bet- Three inter-related concepts capture both the
ter protect his colleagues serving on the front- nature and the importance of social media meta-
lines in the fight for greater accountability and information in the political process. Political use
transparency. Freedom of expression cannot of social media, “big data,” and “data mining”
exist where journalists are not safe from per- constitute a powerful triangle in elections, each
secution and attack. Our government must determining and informing the other.
Data Mining 349

Politicians use social media as strategic tools dynamic—characteristics that pose challenges to
mainly for election campaigns with the aim to data mining tasks to invent new, efficient tech-
connect with their publics and advertise their niques and algorithms.
candidacies. Issues related to the impact of social Data mining (DT), knowledge discovery from
media on democracy and public debate raise data (KDD) or knowledge discovery and data min-
significant questions of global interest, such as ing (KDDM) are all umbrella terms describing sev-
(1) the impact of social media on political com- eral activities and techniques for extracting infor-
munication and civic engagement; and (2) how mation from data and suggesting patterns in very
politicians in different political systems use social large databases, which includes massive data col-
media to communicate with the voters, according lection, data warehouses, statistical analysis, and
to James Webster. deductive learning techniques. P. Gundecha and
Philip Howard writes that campaigns are com- P. Liu propose that it is an integral part of many
plex exercises in the creation, transmission, and related fields including statistics, machine learning,
mutation of significant political symbols; however, pattern recognition, rule induction, genetic algo-
there are important differences between political rithms, decision support systems, bioinformatics,
communication through new media and political business intelligence, data visualization, and infor-
communication through traditional media. mation retrieval. Data mining algorithms aim to
As social media is widely used for various pur- effectively handle large-scale data, extract action-
poses, vast amounts of user-generated data exist able patterns, and allow insights. For instance,
and can be made available for data mining of social anaylsis of variance (ANOVA) or Kruskal-Wallis
media, which can expand researchers’ capabilities tests can be used to compare audiences; multivari-
of understanding new phenomena and improve ate regression models or time series are for predic-
business intelligence to provide better services tions; tree analysis or latent class models target
and develop innovative opportunities, P. Gunde- voters; and multidimensional scaling helps in ana-
cha and P. Liu have found. An effective political lyzing the positioning of media.
campaign is about defining and acknowledging
the stakeholders, framing arguments, and creat- New Techniques
ing icons, and all three of these kinds of political New examples of data mining techniques used
objects are much easier to manage using the new in the contemporary era are algorithms that are
communications tools developed over the last commonly found in the machine learning and
decade, says Philip Howard. Information is still data mining communities, such as artificial neu-
power, but having raw data does not a king make, ral networks, decision trees, and support vector
and instead, Philip Howard proposes that it is the machines. M. Hindman, K. Tsioutsiouliklis, and
careful production of political culture through the J. Johnson propose using crawl depth to capture
manipulation of data that makes political power. surfer behavior that starts at each of the seed
The implications of thinned citizenship roles and sites, and then follow all of a site’s outgoing
data shadows are profound, and people must con- hyperlinks, downloading all of the pages acces-
tinue to assess trends in political communication sible from a given seed site. These downloaded
both in terms of individual voter behavior and the pages are then classified as either positive (simi-
larger character of political culture. lar to pages in the seed set) or negative (more
Understanding the opinions of the general pub- similar to a reference collection of random con-
lic and consumers may uncover unknown pat- tent). The depth of the crawl reflects the number
terns, and that is the goal of data mining processes. of iterations of this process, and thus how many
Patterns of consumption evolve with changes in hyperlinks away a site can be from one of the
the digital media marketplace; social media have original seed sites.
emerged to challenge the notions of what media Next they used support vector machines clas-
are, how they operate, and how they impact soci- sifier (SVMC): After being provided with both a
ety, says J. G. Webster. Social media data is largely positive set (in this case the seed set) and a nega-
user-generated content on social media sites, and tive set (a collection of random Web pages), the
it is vast, noisy, distributed, unstructured, and SVMC inductively learns to differentiate between
350 Data.gov

relevant and irrelevant pages, producing highly Howard, P. N. “Digitizing the Social Contract:
reliable classification of Web pages. Producing American Political Culture in the Age
of New Media.” The Communication Review,
Advantages v.6 (2003).
Before the 2012 U.S. presidential election, Erin Issenberg, S. The Victory Lab. The Secret Science of
McCarthy and Micah Sifry described the enor- Winning Campaigns. New York: Crown, 2012.
mous advantages they foresaw for the techniques McCarthy, Erin. “The Perfect Storm—The
of data mining in election campaigns: Convergence of Big Data, Data Mining, Social
Media, and Politics.” SourceLink (August
The 2012 U.S. election may very well come 30, 2012).
down to who leverages big data better.  So Sifry, Micah. “Special to CNN” (October 9, 2011).
far, Obama has a five-year head start and is http://edition.cnn.com/2011/10/09/tech/innovation/
the clear frontrunner when it comes to lever- obama-data-crunching-election/index.html
aging data, data mining, and social media to (Accessed September 2012).
achieve very real results. . . . This will be a year Webster, J. G. “User Information Regimes: How
of discovery in exploring how quickly things Social Media Shape Patterns of Consumption.”
can change in the new world of social commu- Northwestern University Law Review,
nication. . . . Mitt Romney is just now begin- v.104/2 (2010).
ning to consider building an analytics team and
infrastructure. A Huffington Post AP report,
“Mitt Romney Uses Secretive Data Mining to
Identify Wealthy Donors,” said Romney’s data
mining activities started as early as June. Data.gov
The smartest campaigns now believe they know Data.gov is a U.S. government Web site launched
who will vote for candidates even before voters on May 21, 2009, that provides public access
do. S. Issenberg tracks these fascinating tech- to data generated and held by the federal gov-
niques—which include cutting-edge persuasion ernment. At the nexus of the “open data” and
experiments, innovative ways to mobilize voters, “e-government” movements, Data.gov is a vast
heavily researched electioneering methods—and repository of government data sets, a source for
shows how the most important figures, such as information about how to access, use, and build
Barack Obama and Mitt Romney, are putting the repository, as well as an interactive platform
them to use with surprising skill and alacrity. with research tools that leverage the data. As of
May 2013, the Web site claims to host approxi-
Jaime R. S. Fonseca mately 450,000 data sets derived from 172 fed-
Technical University of Lisbon eral agencies, a significant growth from the 47
data sets that were initially made available at its
See Also: Audience Fragmentation/Segmentation; inception. Almost 60 percent of the data falls into
Big Data; Innovation and Technology. either the category of “geography and the envi-
ronment” or “transportation.” Some of the other
Further Readings categories include “national security and veterans
Gundecha, P. and P. Liu. “Mining Social Media: A affairs,” “population,” “energy and utilities,”
Brief Introduction.” In INFORMS TutORials “federal government finances and employment,”
in Operations Research, vol. 9. Hanover, MD: and “information and communication.”
INFORMS, 2012. The site is one manifestation of the Obama
Hindman, M., K. Tsioutsiouliklis, and J. A. Johnson. Administration’s Open Government Initiative,
“Googlearchy: How a Few Heavily Linked Sites an attempt to bridge citizen-government divides
Dominate Politics on the Web.” In Annual Meeting through the creation of a more inclusive, trans-
of the Midwest Political Science Association, parent, and accountable administration. Data
vol. 4 (2003). .gov was launched by Vivek Kundra, the first
Data.gov 351

chief information officer of the United States, Open and Electronic Government
and is currently managed by the General Services Data.gov is one of 18 sites that compose the
Administration’s Office of Citizen Services and Obama administration’s Open Government Initia-
Innovative Technologies, in connection with the tive. Upon taking office in January 2009, President
national chief information officer and chief tech- Obama released an “Open Government Directive”
nology officer. Though recent federal budget cuts directing government departments and agencies to
have threatened the viability of the site, Data.gov increase the transparency of government activities
continues to serve as a model for open govern- while also promoting citizen participation in, and
ment. It was one of the first U.S. government Web collaboration with, government programs and
sites to move to the cloud, and is a leader in the services. Specifically, the directive requires these
open data movement that has spread to more than departments to take the following steps toward
40 countries throughout the world, as well as to a more open government: (1) publishing govern-
entities like the Organisation for Economic Co- ment information online; (2) improving the qual-
operation and Development, the United Nations, ity of government information; (3) creating and
and the World Bank. institutionalizing a culture of open government;
and (4) creating an enabling policy framework for
Technical Architecture open government. An Executive Order issued by
In both its conceptualization and everyday usage, the White House on May 9, 2013, further clari-
Data.gov broadly reflects technical architec- fied the role of Data.gov by mandating that the
tural principles that are characterized by various data disseminated by the government be open and
“open” movements, particularly those of “open machine-readable as the new default standard. To
data” and “open source” (software). Beyond mak- promote its efforts, Data.gov maintains a blog on
ing content available to the public, raw data sets its Web site and has an active presence across pop-
available through the site are organized by type ular social media platforms, such as Twitter.
(such as table, chart, map, calendar, files and doc-
uments, or forms), agency, category, and topic to Community and Developer Engagement
allow for more efficient access by users. Geospatial Data.gov fosters a variety of end-user communi-
data is also available. Data sets are also accessible ties, so as to provide a space where like-minded
in a variety of formats that are machine-readable researchers and citizens may access material that
and platform-independent, namely CSV, XML, is particularly relevant to their needs. Examples
KML, and SHP. This allows users to create tools of these target sectors include agriculture, educa-
(such as widgets, gadgets, data extraction tools, tion, energy, health, and manufacturing. A special
and Rich Site Summary [RSS] feeds) based on the “developers” section of the site engages the devel-
materials contained in one or more of the relevant oper community by encouraging participation and
raw data sets. Ensuring that this raw data can be collaboration on projects that make use of govern-
marked up to allow for machine interoperability ment data. Additionally, developers may provide
is a central component of the Semantic Web ini- feedback as to what datasets they would like to see
tiative, whose incorporation Data.gov details in on Data.gov as an application programming inter-
their “Concept of Operations” document. The face (API), and may join challenges pertaining to
site also promotes an open source approach to the effective usage of open data via a related Web
software development, in that it makes the archi- site, Challenge.gov.
tecture leveraged by Data.gov to publish datas- Through these mechanisms, Data.gov “crowd-
ets available to interested developers themselves. sources” solutions to managing open data in
This “Open Government Platform” is based on partnership with various individuals and orga-
Drupal, an open source content management sys- nizations in the broader public and private sec-
tem, and includes modules for data, content, and tors. For example, the Sunlight Foundation, an
visitor relationship management. The source code educational organization committed to increas-
is hosted on GitHub, which uses a particular revi- ing accountability in the U.S. government, ran an
sion control system to manage collective software “Apps for America” contest in 2010 to leverage
development projects. the data sets released through Data.gov. Among
352 Debate

the submissions was a tool designed to help check candidates at local, state, and national levels par-
wait times for security screenings at airports. ticipating in rudimentary forms of online debate.
Other mobile and Web-based applications based These debates, which were organized and hosted
on data sets published through Data.gov include by various organizations and media outlets,
an alternative fuel locator, a tool to look up prod- attempted to harness and capitalize on the grow-
uct recalls, and a search engine for traffic safety ing power of the political Internet. Questions for
statistics. In March 2013, Data.gov recorded over these debates were drawn from comments made
6,000 daily visitors, including hits from outside on the campaign trail, and the hosting organiza-
the United States, and published over 1,300 new tion would post the candidates’ answers to a Web
data sets to the Web site. site for the public to read.
While these debates occurred through online
Michael Dick technologies, the public could not ask the can-
Jonathan A. Obar didates questions nor interact with them; inter-
University of Toronto ested individuals would have to either follow the
debate via the Web site or sign up to receive the
See Also: Crowdsourcing; Digital Government; debate through e-mail. These debates did, how-
E-Democracy; Open Data; Open Source Governance; ever, utilize early forms of wikis (Web sites that
Open Source Politics; OpenCongress.org; allow users to add, modify, or delete content) and
OpenGovernment.org; Social Media and Freedom of other group-page technologies, where individuals
Information Act; Sunlight Foundation; Transparency. could discuss the candidates’ answers. As online
technologies continued to evolve, organizations
Further Readings and media outlets continued to experiment with
Berdou, Evangelia. Organization in Open Source various types of e-debates.
Communities: At the Crossroads of the Gift and In 2008, technology and politics began connect-
Market Economies. New York: Routledge, 2011. ing in new ways, and social media provided new
Chun, Soon Ae, Stuart Shulman, Rodrigo Sandoval, options for reaching and engaging audiences in
and Eduard Hovy. “Government 2.0: Making online debating. The explosive use of social media
Connections Between Citizens, Data and during the 2008 presidential election marked a sub-
Government.” Information Polity, v.15 (2010). stantial shift in both social media platforms as hosts
Gurstein, Michael. “Open Data: Empowering the of political debates and in the integration of social
Empowered or Effective Data Use for Everyone?” media functionalities into televised debates. Major
First Monday, v.16 (2011). media outlets and social networking sites, such as
CNN, YouTube, Myspace, Yahoo!, the Huffington
Post, and Slate, teamed up to host political debates
and candidate forums and to engage the public in
political debating in a new way.
Debate The CNN–YouTube presidential candidate
debates invited the public to submit questions to
The integration of social media and politics has the candidates via 30-second videos uploaded to
altered the foundations of many traditional politi- YouTube. These questions, if selected, would be
cal processes and provided new methods through featured during two live candidate forum debates
which people can engage with politics. The use of broadcast on CNN. Between the two debates,
social media both for and during political debates more than 8,000 videos were submitted for possi-
offers new options for hosting political debates ble inclusion, with roughly 80 videos being selected
and has changed how individuals, the media, and for broadcast. During the debates, the candidates
candidates engage in political debating. responded directly to the videos, marking the
first time that unfiltered questions created by the
History of Social Media Debates public were answered during nationally televised
Online political debates, also referred to as debates. The two broadcasts broke debate view-
e-debates, date back to the mid-1990s, with ership records for both viewership on cable news
Debate 353

and for viewership from the ages of 18 to 34. The its social networking functionalities a way for
candidates’ answers were then uploaded to You- subscribers to use their controllers to judge can-
Tube’s YouChoose 2008 platform, where users didates’ debate responses as they were speaking.
could discuss the candidates’ answers through the Other interesting uses of social media appeared
site’s social media functions. throughout the 2012 presidential primary debates
Attempting to specifically target a younger gen- and included the solicitation of debate questions
eration of voters, Yahoo!, the Huffington Post, via Twitter and inviting the viewing audience to
and Slate teamed up to host an entirely online submit real-time feedback via social media, some
and interactive set of candidate debates. These of which was inserted by the moderators into the
debates, which ran simultaneously on all three live debates.
organizations’ Web sites, allowed users to submit These debates, candidate conversations, and
questions that were posed directly to the candi- social networking initiatives illustrate the distinct
dates. The candidates responded live, via the Inter- shift in the level of participation that voters can
net, and debate viewers were able to evaluate the now exercise in political debates. While they all
candidates’ answers and performance in real time. functioned differently, they are indicators of the
Myspace and MTV took a slightly different impact of social media upon political debates and
approach while still using social media to engage provide a lens through which the rise of social
the public in conversation with the candidates. media in political debates may be viewed. Integrat-
These media outlets promoted a series of candi- ing social media into political debates offers the
date dialogues, town-hall style discussions that public a level of interactivity with the process and
were hosted on various college campuses, Web- the candidates that was once reserved for high-
cast live on the MyspaceTV video platform and level donors and other political elite. The future of
MTV.com, and broadcast on MTV and MTVU. successful political debate must address an expec-
While these were not candidate debates, the ques- tation of interactivity with the common voter and
tions were submitted by the public through the will be marked by campaigns’ abilities to effec-
Myspace­IM instant messaging platform, e-mail, tively engage the public through social media.
or text message, and online viewers could ask the
candidates follow-up questions, respond online to How Social Media Has Changed Debate
the candidates’ answers, and debate among each Social media has substantially altered the ways
other in real time. that individuals, the media, and the candidates
Capitalizing even further on the relation- engage in political debate. Debate viewers are no
ship between social media and political debates, longer simply passive audience members; instead
Myspace sought and received official sanction- many have become dual screeners, or viewers
ing by the Commission on Presidential Debates who watch debates on television and simultane-
(CPD) to launch MyDebates.org. The Web site ously follow, discuss, and tweet about the debates
offered a downloadable application that streamed through computers or mobile devices. Through
the presidential debates live, provided searching sharing opinions, fact-checking, assessing diverse
and tagging capabilities, allowed the debates to perspectives, and judging the candidates’ per-
be archived for on-demand viewing, organized formance, participation in social media during
online polls, and tracked the candidates’ positions televised debates has changed the level of engage-
on issues. This marked the first time that the CPD ment many audience members have with politi-
partnered with an Internet and social media out- cal debates. Debate interaction through social
lets for debate coverage. media has also provided the media and political
The integration of social media into political campaigns with a ready-made focus group of at-
debates has continued to increase as social media home viewers through which to assess the public’s
technologies have evolved. Major mainstream thoughts, perceptions, and opinions.
media, online services, and social networking out-
lets have worked with the CPD to develop live The Audience
debate streams and live reaction platforms. Even Social media has provided new methods for a
XBox Live, the gaming system, incorporated into generalized audience to engage in political debate
354 Debate

discussion. Historically, there have been very lim- pundits, journalists, bloggers, other politicians,
ited opportunities for the public to engage with and average citizens unfolding in real time through
the formalized political debate system. While social media. The mainstream media, specifically
town-hall formats have allowed for a minimal cable news outlets, have recognized the emerging
level of participation, the collective public has role of the viewers’ voice in politics and also the
never possessed much ability to have unfettered importance of engaging with these viewers. It is
discussions about political debates that the main- not uncommon for news anchors to cite audience
stream media and political campaigns actually tweets and Facebook posts during newscasts,
paid attention to, until social media. Through make political predictions based on Twitter reac-
engagement with social media functionalities tions, or have the creators of Facebook or Twitter
during televised debates, audience members are pages on as guests to discuss what is occurring
expanding the sphere of engagement and using on social media regarding a topic or candidate.
social networks to have influence, voice opinions, Social media has helped to democratize political
and be involved. Through millions of posts, com- commentary in the mainstream media and has
ment, and tweets, online engagement in political given a voice to a wider range of political par-
debates fosters a more genuine dialogue between ticipants who can help to shape debate narratives
the constituencies and allows the audience to be long before the television pundits have the oppor-
engaged at a substantial level. tunity to dissect debates for the audience.
Candidates can no longer assume that political
gaffes will be missed or quickly forgotten by the The Candidates
media as the social media sphere will capitalize Social media has also substantially altered the
on these in ways not previously fathomed. In this ways in which candidates and campaigns engage
way, the public is able to leverage the functional- in and respond to debates. Social media provide
ities of the social media environment to insert itself instant indicators regarding the public opinion of
into political agendas and upend political mes- a candidate’s answer or stance on an issue. Social
sages carefully crafted by the political and media media sites allow campaigns to quickly and effi-
elite. This ability makes it practically impossible ciently determine what topics are resonating, or
for either the media or the campaigns to ignore trending, with potential voters and what topics the
the public’s engagement and quickly turns politi- voters attach the most significance to. Often, what
cal moments into pop culture fodder. Social media is being discovered through social media analysis
have also pushed campaigns to be more respon- is that the issues that the campaigns have attached
sible in their distribution of facts during debates. the most significance to are not the issues that
Dual screeners are often also savvy Internet users their constituencies find most important. Social
who can instantaneously fact-check any statement media listening (real-time monitoring and analysis
made by any candidate, pundit, or media person- of social media traffic) allows campaigns to better
ality. Social media allows the audience to quickly understand what issues are resonating with poten-
identify incorrect information, find the correct tial voters and strategize how to effectively com-
facts, and link followers to the accurate informa- municate with these voters during debates.
tion; these instant fact-checks keep the constitu- Prior to social media, campaigns would have
ency aware and discourage campaigns from pro- to wait until after the debates to gain access to
viding false or misrepresented information. audience opinions and reactions through formal-
ized debate analysis methods. With social media,
The Media the spin rooms of the past are no longer neces-
Audience engagement with social media has sary as campaigns can now analyze rapid-fire
pushed the mainstream media to find ways to online chatter to judge in real time the audiences’
effectively integrate what occurs in the social responses to the debate. In addition, most social
media environment into broadcasts. The audience media sites also include some type of user geolo-
no longer needs to wait for pundits to analyze cation data, which makes it easy for campaigns to
debates or candidate’s answers for them because identify the locations of the posters, understand
they have access to reactions and opinions from how their candidate is being received, and what
Debate 355

Many different types of organizations have experimented with the use of social media to engage the public in e-debates. These men
watched economic debate videos in a “YouTube Corner” at the annual meeting of the World Economic Forum in Davos, Switzerland,
on January 28, 2009. Among the many platforms and media outlets having an impact in online debates are Facebook, Myspace,
YouTube, Twitter, Yahoo!, XBox Live, CNN, the Huffington Post, and Slate.

is trending by geographic region; this data could a consistent tool in contemporary digital cam-
be especially important in vital battleground and paigns, candidates are using the platforms mainly
swing states. For campaigns and advocacy groups, to push their direct messages and discredit oppo-
the integration of social media into debates can nents versus using it to engage in conversation or
also serve as a boon for candidates, with massive debate with the potential voters. With a voting
amounts of online communication pushing infor- population that is increasingly engaged in social
mation about their candidates directly to voters, networking, the successful incorporation of social
even those who may not be watching the televised media into debate strategies will be vital.
debates, through status updates, tweets, links to The future relationship between social media
videos, and other types of online content. and political debates is uncertain. While many
Social media has also changed how candi- major media outlets have embraced the role of
dates engage opponents in online debate. Cam- social media in political debate, the CPD and
paigns are not only using social media updates most debate moderators have not largely accepted
and engagement to push their own platforms but social media into the formalized political debate
also to attack the credibility, stance, or statements process. As social media functionalities continue
of their opponents. Social media have allowed to develop, they will likely continue to grow in
campaigns ways to quickly and efficiently rebut importance as an increasingly active channel of
claims made by opponents and negatively reframe political engagement and allow for a more robust
opponents’ talking points. Social media have also and accountable discussion of key issues facing
led to the rise of hashtag attacks, or the appro- the constituency.
priation of a hashtag written by the opposition
and used to reframe the conversation against an LaChrystal Ricke
opponent. Although social media has become Sam Houston State University
356 Deception in Political Social Media

See Also: Campaign Strategy; Campaigns, Digital; At its most basic, the deception committed
Campaigns, Presidential (2000); Campaigns, in social media is simply an extension of other
Presidential (2004); Campaigns, Presidential (2008); deceptive statements, as when political groups
Campaigns, 2012; E-Democracy; Focus Groups; provide an account of events that is heavy on spin
Geotagging; Hashtag; Social Listening; YouTube; or leaves out elements that might be crucial to
YouTube Politics Channel. the reader’s interpretation. A prominent example
in recent history was the Kony 2012 viral video
Further Readings campaign launched by Invisible Children, a San
Denton, Robert and Jim Kuypers. Politics and Diego–based organization founded to raise aware-
Communication in America. Long Grove, IL: ness, especially among young people, of Joseph
Waveland Press, 2008. Kony and his Lord’s Resistance Army in Africa.
Holihan, Thomas. Uncivil Wars: Political Campaigns The video spread virally and was tweeted and
in a Media Age. Boston: Bedford, 2009. otherwise linked to by numerous celebrities. Time
Howard, Phillip and Steve Jones. Society Online: magazine ranked it the most viral video of all
The Internet in Context. Thousand Oaks, CA: time. But the video portrayed Kony as being in
Sage, 2004. Uganda, glossing over the fact that he had left six
Panagopoulos, Costas. Politicking Online. New years earlier and was likely in the Central Afri-
Brunswick, NJ: Rutgers University Press, 2009. can Republic, and an intervention by the Ugan-
dan army as advocated by the video would be
either pointless or circuitous. The “Stop Kony”
campaign associated with Kony 2012 had the size
and shape of a major social justice movement, but
Deception in Political was often criticized for not being grounded in the
facts of the real-life situation in Africa and the
Social Media problems of real-world child soldiers.

The anonymity of the Internet, which has only Fake Accounts


recently with the explosive growth of Facebook According to a 2013 Wired article, it has become a
ceased to be a default condition, has always lent simple business matter to purchase fake Facebook
itself to abuse. It has always been relatively sim- friends, Google+ friends, Twitter followers, Twit-
ple, and certainly very common, for Internet users ter retweets, Facebook “likes,” or other quanti-
to pretend to be people they are not, and to do tative forms of social media support. An internal
so for various purposes: sometimes anonymity is Facebook study in 2012 revealed that 83 million of
an important shield against abuse or to enable Facebook’s 955 million accounts were either false
the same kind of forthright honesty enabled by accounts or duplicates (such as maintained by peo-
offline venues of anonymity like 12-step programs ple who have separate personal and professional
and the Catholic confessional. Sometimes it has accounts). Most of these fakes were not politically
allowed teenagers to lie about their age and inter- connected and many were likely not maliciously
act in a social world of adults. Sometimes it pro- deceptive. But among them are millions of false
vides a cover for whistle-blowing and other impor- accounts created and maintained by social media
tant activities. But the types of abuse are obvious: management companies in order to create the illu-
fraud, trolling, harassment, and others. As politics sion of popularity or support.
has extended into social media, naturally politi- According to a 2013 Guardian article “Click
cal figures and groups have both committed and Farms,” usually operated overseas where labor is
fallen victim to these abuses. This is not surpris- cheaper, have workers either retweeting tweets,
ing: money in politics is spent, ultimately, to con- liking Facebook pages and posts, or adding Twit-
vince the audience of an idea, whether that idea is ter or Facebook friends from numerous fake
to vote for a candidate, to support a cause, or to accounts, for a predetermined fee, such as $15 per
believe a particular interpretation of a set of facts. 1,000 Facebook “likes,” or $100 per 1,000 Twit-
Competition can often encourage deception. ter followers. This practice is common outside
Deception in Political Social Media 357

politics, where marketers have discovered that the 100,000 Twitter followers, Gingrich had 1.3 mil-
number of “likes,” fans, friends, or followers is lion, and bragged about them to the press several
important to a large number of consumers, who times before it was discovered that 82 percent of
weigh these quantitative data much as they do the them were fake accounts (though that still leaves
qualitative data of reviews. his real total as higher than Romney’s).
When Facebook purged known fake accounts, Fake accounts are used not only to bolster
as reported by TechCrunch, some of the fan pages the appearance of support of specific politicians,
that lost the most “likes” as a result were those campaigns, and initiatives, but to encourage the
of games—Texas HoldEm Poker (the mobile app spread of particular memes and talking points. A
and Facebook game), CityVille, and FarmVille— careful examination of some of the most-shared
and pop singers Justin Bieber and Lady Gaga. political posts and meme images on Facebook,
One company advertised having 83,000 social especially those that are controversial or related
media personas—each with multiple social media to a current issue before Congress or in the news,
accounts on different platforms like Facebook and will reveal among the sharers and likers a number
Twitter—which it could use to generate “likes” of accounts that are almost certainly fake. (Tell-
and friends. In 2013, a botnet—using 1.8 million tale signs on Facebook are a use of only one pro-
linked personal computers—was discovered to be file photo, a busy feed but little to no personal
generating 3 million clicks per day (liking, retweet- interaction with friends, and minimal profile
ing, and other social media activities) and earning information.) These fake accounts may actually
$1 million per year from its customers. A 2013 be actively maintained instead of existing just to
study by Barracuda Labs found that the average generate “likes”—they may be used as incognito
consumer of fake Twitter followers purchased personas for political action committee (PAC)
50,000 followers; 16 percent had boosted their staffers and political party operatives to com-
support to more than 1 million followers, though ment from, discredit opponents’ supporters, and
in those cases it was not clear how many were manipulate the online conversation.
fake. Major brands accused of purchasing fake Fake Facebook and other social media accounts
social media support include Pepsi, Louis Vuitton, claiming to belong to politicians and public fig-
Sean “P. Diddy” Combs, and Mercedes Benz. ures are common, and sometimes used as parody
or online roleplaying games. Other times they
Politicians and Fake Accounts are actively deceptive or used for political pro-
In 2012, the Mitt Romney presidential campaign paganda by opponents. In 2009, a 38-year-old
was accused of having hired one of these compa- screenwriter, Alex Grossman, created a fake Face-
nies to generate hundreds of thousands of fake book account, “Governor Palin,” for former vice
Facebook “likes” and Twitter followers. Beginning presidential candidate Sarah Palin. He said later
in July, his average number of new Twitter follow- that he created the account in order to demon-
ers increased from 3,500 per day to 62,000 a day, strate the low political acumen of Palin’s support-
overnight. Facebook “likes” similarly climbed ers, and made frequent updates to the account
steadily in late July, spiking drastically just in time that were a mild parody of Palin’s persona, such
to hit 3 million “likes” on August 1 (and 3.2 mil- as “God loves us all, now matter how black or
lion a day later, despite an increase of less than African, or even gay or Jewish we are.”
2,000 a day a week earlier). Part of the motiva- In 2011, a cache of 75,000 private e-mails
tion may have been the launching of the Twitter obtained by the hacktivist group Anonymous and
Political Index, which claimed to track enthusiasm released to the public online revealed that defense
levels for Romney and President Barack Obama. contractor HBGary Federal had discussed a plan
Creating fake Twitter accounts was an easy way to work with partner companies Berico Technol-
to manipulate the index. Later in the month, ogies and Palantir in order to create fake social
Obama’s campaign was accused of having used media profiles to infiltrate leftist political groups.
the same tactic. Failed Republican candidate Newt One of the profiles was explicitly discussed, that
Gingrich may have beaten them both to the punch: of a Holly Weber who worked for Lockheed
the previous year, when Romney had fewer than Martin and maintained Facebook and LinkedIn
358 Decoy Campaign Web Sites

accounts. HBGary Federal staff also brainstormed http://www.wired.com/business/2013/04/buy


strategies for pretending to be teenagers online. -friends-on-facebook (Accessed October 2013).
The “persona management” operation was pro- Stuef, Jack. “Sarah Palin ‘Favorites’ Obama Jesus-
posed as a $2 million project, and was the basis Blood Church Sign Photo.” Wonkette (November
for various projects HBGary attempted to sell to 4, 2010). http://wonkette.com/429461/sarah-
the federal government. palin-favorites-obama-blood-church-sign-photo
Though attention has been focused on gener- (Accessed October 2013).
ating false “likes” and followers in social media,
denying real ones is another form of deception.
In 2010, Sarah Palin favorited and retweeted a
tweet made by neoconservative commentator
Ann Coulter, linking an image of a sign saying, Decoy Campaign
“The blood of Jesus against Obama history made
4 Nov 2008 a Taliban Muslim illegally elected Web Sites
president USA: Hussein.” Palin deleted the tweet
and claimed it wasn’t intentional. The first candidate Web site was constructed by
U.S. Senator Dianne Feinstein’s campaign in 1994.
Bill Kte’pi A decade later, Howard Dean’s pioneering use of
Independent Scholar Meetup.com and a myriad of individual bloggers
as a fund-raising, information-generating network
See Also: Al Gore's Penguin Army; Astroturfing; in the 2004 election cycle was another landmark
Avatars; Decoy Campaign Web Sites; Ethics of Social in electronic campaigning. Then, in 2008, Barack
Media in Politics; Flog; Sockpuppets; Splogs. Obama was named both “the first Internet Presi-
dent” and Advertising Age magazine’s “Marketer
Further Readings of the Year” for the Web savvy demonstrated by
Arthur, Charles. “How Low-Paid Workers at ‘Click his campaign. Further transformation of political
Farms’ Create Appearance of Online Popularity.” communication continued in 2012, when candi-
The Guardian (August 2, 2013). http://www.the dates’ debates were streamed live to computers
guardian.com/technology/2013/aug/02/click-farms and mobile devices for the first time.
-appearance-online-popularity (Accessed September As informal word-of-mouth contacts via social
2013). media sites becomes pervasive, more information
Blascovich, Jim and Jeremy Bailenson. Infinite exchange occurs via social media sites than via
Reality: Avatars, Eternal Life, New Worlds, and elite news sources. Among findings of the 2012
the Dawn of the Virtual Revolution. New York: Pew Internet and American Life Project surveys
HarperCollins, 2011. of digital politics are that more Americans now
Bollmer, Grant David. “Demanding Connectivity: obtain their news from Internet sources than from
The Performance of ‘True’ Identity and the Politics print and electronic media; 69 percent of online
of Social Media.” JOMEC Journal, v.1/1 (2012). adults in the United States are active users of social
Constine, Josh. “Operation Unlike Is a Go.” media, and 66 percent of these employ online
TechCrunch (September 26, 2013). http:// tools to communicate about civic and political
techcrunch.com/2012/09/26/facebook-fake matters. Younger voters are especially impacted
-accounts (Accessed October 2013). by this shift in sources and forms of political
Finn, Greg. “Study: Fake Twitter Follower news. The conflation of “objective” reporting,
Market Is Still Thriving Thanks to New Spam subjective impressions, parodies, satires, and out-
Tactics.” Marketing Land (July 2, 2013). http:// right deceptive message-generating practices cre-
marketingland.com/study-fake-twitter-follower ates new attitudes toward the democratic process,
-market-is-still-thriving-thanks-to-new-spam both humanizing and distorting perceptions of its
-tactics-50420 (Accessed October 2013). actors and, early research shows, may be increas-
Steuer, Eric. “How to Buy Friends and Influence ing both political cynicism and political engage-
People on Facebook.” Wired (April 5, 2013). ment among younger voters.
Decoy Campaign Web Sites 359

Dual Processing and Online Politics siphoning funds collected into the bank accounts
Research in human reasoning has posited that of the individuals who constructed the site. Two
people tend to process information via one of two such sites identified by news sources as fund-rais-
mental channels: centrally, with focus and logical ing scams were DemocraticNationalCommittee
concentration, or peripherally in a nearly auto- .org and RepublicanNationalCommittee.org. The
matic way, using heuristics or rules of thumb. Peo- September 21, 2012, broadcast of ABC News With
ple are likely to view Web content using periph- Diane Sawyer reported that the owner of these two
eral processing. As Internet content is generally domain names is a Massachusetts truck driver who
uncontrolled, its message-generating capacity is operates dozens of similar sites. Because he owns
easily abused, especially as people are not likely the domain names and posts a small disclaimer on
to be closely scrutinizing the information they are the sites, the site developer claims that his actions
receiving. Critics of the user-driven, bottom-up are legal. Neither party was aware that the look-
information flows in Web 2.0 believe that false alike Web sites existed until ABC News contacted
consensus or pluralistic ignorance may drive pub- them. The sites were rerouted shortly after the
lic policy decisions and election outcomes. ABC News report.
A 2006 study of a cable news show hosted by Another form of decoy content on social media
comedian Jon Stewart coined the phrase The Daily are election Web sites that use forum software and
Show Effect to describe the impact upon viewers anonymous domain registrations to generate dis-
of political parodies. Findings included negative cussion among genuine supporters of a candidate
impressions of both candidates, increased cynicism along with sham supporters who make inflam-
about the political process but increased confidence matory remarks that take the genuine supporters’
in their ability to sort through and understand pub- positions to extremes. Early examples discussed
lic policy issues. A study of Tina Fey’s 2008 Satur- in a Wired News report of November 6, 2007,
day Night Live impression of Sarah Palin found included RudyGiulaniForum.com, MittRomney-
attitude changes among those who viewed it. The Forum.com, and FredThompsonForum.com. The
word truthiness was coined in 2005 by Comedy Thompson forum was suspected as being driven
Central pundit Stephen Colbert and, in being by Ron Paul supporters.
named Word of the Year by the American Dialect These decoy forums often include links to You-
society, was defined as “the quality of preferring Tube videos that further denigrate the candidate.
concepts or facts one wishes to be true, rather Those who are familiar with the actual rhetoric of
than concepts or facts known to be true.” While the candidate and her or his supporters can differ-
some online communication strategies are clearly entiate between real and fake posts. However, in
designed as humor, and some (such as YouTube accordance with the peripheral processing mode
videos from sites like The Fake News Network) that most people utilize in perusing online mate-
may be meant as parody, there is a likelihood that rial, fact-checking seldom takes place. Many can
some users will not get the joke. Other studies of miss the fakery and, taking it as gospel, send it for-
political humor cited findings that Colbert’s satiri- ward through their networks, with the more sensa-
cal treatment of conservative talk show hosts leads tional messages going viral. The use of forum links
some respondents to agree with the conservative to generate spam often uses the opponent’s name
viewpoints he implicitly pokes fun at. in the hot type and enhances both the virility of the
message and its placement high on search engine
Social Media and Political Skullduggery results when the candidate’s name is keyed in.
Other Web tactics clearly fall into the dirty tricks Researchers at the Indiana University School
category. These include fake Twitter feeds; fake of Informatics and Computing studying infor-
or paid Twitter followers; fake spam messages; mation diffusion and opinion dynamics in net-
election malware embedded in political Web sites; worked online content have identified a form of
and decoy election Web sites, some of which political spam that they call political astroturf.
attempted to scam users in the 2012 cycle. Under the guise of grassroots organizing online,
Some look-alike decoy election sites that pose as a single entity generates a campaign via Twit-
fund-raising arms of the major parties are actually ter and other social media that can be used to
360 Deep Packet Inspection

spread disinformation to undermine competitors’ Weblogs and Social Media, 2011. http://www
campaigns. Such information flows can go well .aaai.org/ocs/index.php/ICWSM/ICWSM11 paper/
beyond the original online venues. In cases where viewFile/2850/3274 (Accessed November 2012).
tweets are retweeted and go viral, mainstream
news media may pick up the story and generate
it further. In their report to the Fifth Interna-
tional Association for the Advancement of Arti-
ficial Intelligence (AAAI) Conference on Weblogs Deep Packet
and Social Media, the researchers presented an
example from the 2010 midterm elections where Inspection
inflammatory wording in a tweet relating to the
use of stimulus funds for a study of drug-addicted Deep packet inspection is a refinement of the fire-
macaques generated a viral coke monkeys meme. wall technique that allows a third party to block or
Whether political speech on the Internet examine packetized information as it travels over
should or can be controlled is a growing issue. a network. One way that the Internet succeeds in
Anonymity is a key component of these discus- quickly transmitting data is by breaking informa-
sions. While courts have found that the First tion into small blocks of information known as
Amendment protects anonymous political speech “packets.” A typical packet contains about 500
and activity for those conducting those activities bytes of data, not including the header informa-
in the actual world, the protection of anonymous tion used to address and monitor the packet;
speech in online venues has not been secured and the maximum Ethernet packet is 1,518 bytes. In
remains open for judicial review. Legislation to practical terms, this means that a short, text-only
ban anonymous online speech has been intro- e-mail would be split into five to 10 packets when
duced in a number of states, including California it transverses the Internet, while a low-resolution
and New York. photo would be split into 200 to 500 packets. A
basic Web page with graphics could be around
Leslie Reynard a megabyte in size, requiring as many as 2,000
Washburn University packets, and an hour voice over Internet protocol
(VOIP) call would be 10 times that much.
See Also: Astroturfing; Deception in Political Social In what is now called shallow-packet inspec-
Media; Ethics of Social Media in Politics; Flog; Going tion, a packet’s addressing information is checked
Viral; Push Polling; Social Media Strategies and to see whether the source or the destination of the
Tactics; Sockpuppets; Wikipedia Misuse. packet meets with the approval of the network
administrator. This kind of technology was used
Further Readings for the first Web filtering, but it was rather crude;
McNealy, J. D. “A Textual Analysis of the Influence network administrators were able to block entire
of McIntyre v. Ohio Elections Commission in domains, such as YouTube.com. In addition, if all
Cases Involving Anonymous Online Commenters.” a network administrator wants to do is block cer-
First Amendment Law Review, 2012. tain kinds of packets (e.g., a telecom that wants
http://ssrn.com/abstract=2102786 (Accessed to stop customers from using VOIP), or block the
November 2012). originator or sender of a packet (e.g., a govern-
Rainie, Lee, Aaron Smith, Kay Lehman Schlozman, ment that wishes to stop communication between
Henry Brady, and Sidney Verba. “Social Media and its citizens and an offshore dissident group), then
Political Engagement.” Pew Internet and American a standard firewall will be sufficient. However,
Life Project (October 19, 2012). http://pewinternet this is increasingly too crude of a device.
.org/Reports/2012/Political-engagement.aspx With shallow-packet inspection, it would be
(Accessed April 2013). more difficult to block specific videos. As large
Ratkiewicz, Jacob, et al. “Detecting and Tracking content providers came to dominate the Web, a
Political Abuse in Social Media.” Proceedings new technology was needed to see what a user
of the Fifth International AAAI Conference on was sending. This was not easy; packet headers
Delicious.com 361

contain standardized addressing information that uniform resource locator (URL) address. The site
is easy to decode, while the information each was an extension of Muxway, a blog created by
packet contains may be in any variety of formats, Schachter to keep track of links related to Meme-
and is likely only a snippet of the entire message. pool, a cooperative site that included links to
In 2005, Thomas Porter reported that major interesting items on the Web. Originally dubbed
networking providers (such as Microsoft, Cisco, deli.icio.us, the site represented a domain hack
Checkpoint, Symantec, Nortel, SonicWall, NAI, that took advantage of the newly launched .us
and Juniper/Netscreen) had begun to develop Web address. The site was renamed delicious.com
systems that look at the contents of each packet, in 2007.
including the address information but also reach- The goal of the Web site was to allow users to
ing into the data each packet sends, before a deci- secure a single place where they could collect and
sion is made to send the packet to its destination. showcase individual links to pages across the Web.
In 2009, the Wall Street Journal reported that the The service didn’t save the Web pages; rather, it
Iranian government had set up a sophisticated deep stored the URL address to the pages along with
packet inspection system, causing Internet users to descriptions and tags. The service allowed users
experience extremely slow response rates. More to edit the URL address and title and to add notes
recently, in 2012, the administrators of the Tor ser- for additional descriptions and information about
vice noticed that the Ethiopian Telecommunication the bookmark.
Corporation began to employ deep packet inspec- Although other bookmarking services had been
tion based on its observation of its users, joining around since 1996, Delicious was different because
China, Iran, and Kazakhstan in this practice. it pioneered the use of tags. Tags are short key
words that users developed to categorize and locate
Christopher Leslie links again. These tags allowed users to organize
Polytechnic Institute of New York University their bookmarks by topic by assigning nonhierar-
chical key words, which provided an overview of
See Also: China; Countries Banning Social Media information on the referent site without having to
for Political Reasons; FinFisher; Firewalling; Freedom access the site itself. Tags could be created using
of the Press and National Security; Great Firewall of freely chosen index terms or chosen from a list of
China; Iran; Tor. drop-down words. Originally, multiple tags were
space separated, so multiword tags were written
Further Readings as run-on words (such as socialmedia instead of
Porter, Thomas. “The Perils of Deep Packet social media). Now, tags are comma separated, but
Inspection” (January 11, 2005). http://security the old run-on words are still used. The popularity
focus.com (Accessed July 2013). of the site led to the creation of online communities
Rhoads, Christopher and Loretta Chao. “Iran’s that developed shared vocabularies around these
Web Spying Aided by Western Technology.” tags, known as folksonomies.
Wall Street Journal (June 22, 2009). The Web site allows bookmarks to be stored
Whitman, Michael E. and Herbert J. Mattord. publicly—so other users can see them—or pri-
Principles of Information Security. 4th ed. Boston: vately. With the focus on public bookmarks,
Course Technology, 2012. the site encourages others to add, annotate, and
edit public bookmarks and tags. Users are able
to search through collections of other users to
discover new things, and a combined view of
all bookmarks with a given tag is available. The
Delicious.com Web page allows uses to follow not just particular
topics but specific users or specific tags by other
Delicious.com was founded by Joshua Schachter users. Following topics, tags, or users allows users
in September 2003 as a social bookmarking to see new links posted on the site. By subscribing
application. It is a free service that was designed to multiple tags, users are provided with automat-
to allow users to keep track of bookmarks by ically updated lists of relevant bookmarks. Many
362 Demand Progress

credit the social aspect of Delicious as a reason See Also: Bookmarking; Content Communities;
for its success. Digg; Evolution of Social Media; Folksonomy;
While public bookmarks are an important part Reddit; Social Bookmarking; StumbleUpon.
of Delicious.com, there are options for private
bookmarks. To keep an item private, users need Further Readings
to specify the bookmark as private when saving Chaney, Paul. “Using the New Delicious.com;
or editing. In addition, any bookmarks imported 5 Advantages for Businesses.” Practical
from Web browsers are private by default but Ecommerce (November 7, 2011). http://www
can be made public. The ability to import links .practicalecommerce.com/articles/3154-Using
from personal computers enables new users to -the-New-Delicious-com-5-Advantages-for
start with an established set of bookmarks and -Businesses (Accessed January 2013).
allows users to access the same bookmarks from Smith, Gene. Tagging: People-Powered Metadata
any computer. for the Social Web. Berkeley, CA: New Riders
Although the site was launched in 2003, Press, 2008.
Schachter maintained separate employment until Wetzker, Robert, Carsten Zimmermann, and
March 2005, in time for the firm to receive $2 Christian Bauckhage. “Analyzing Social
million in funding from Union Square and Ama- Bookmarking Systems: A del.icio.us Cookbook.”
zon.com in April. In December 2005, Delicious Proceedings of the ECAI 2008 Mining Social Data
.com was bought by Yahoo! for a rumored $15 Workshop, 2008.
million to $30 million. And by 2008, the book-
marking service had more than 5.3 million users
and supported 180 million unique bookmarks.
In April 2011, Yahoo! sold the domain to
AVOS, a company founded by Steve Chen and Demand Progress
Chard Hurley, the original founders of YouTube.
AVOS redesigned the sight and relaunched it in Demand Progress is a political advocacy orga-
September 2011 to help mitigate information nization that seeks to promote progressive poli-
overload. The redesign came as a surprise to many cies and candidates in the United States. It was
users and brought a great deal of criticism. Crit- founded in 2010 and claims over 1 million mem-
ics charged that many of the features were dis- bers. It has an especially strong voice on issues
abled, removed, or temporarily unavailable. And, of open access to information, censorship, and
although the company provided multiple remind- regulation of the Internet. Its self-proclaimed mis-
ers to export and back up bookmarks, many users sion is to promote civil liberties, civil rights, and
found their bookmarks deleted in the switch. government reform. As such, it has taken on a
AVOS sought to counter some of this criticism number of positions opposing various prospective
by creating stacks, which allowed users to group laws that would criminalize some types of online
together links with similar topics. Stacks could information sharing along with similar measures.
be worked on collectively, publically, or privately Aaron Swartz, its late founder, is also the inspira-
within groups. In addition, users could create tion for its current support of a law to decrimi-
their own stack in response to stacks created by nalize the violation of Internet service provider
others. Delicious users felt this new format was agreements and to reclassify them as civil matters.
too closely mimicking pinboards (such as Pin-
trest), and the feature was discontinued in August Historical Background and Campaigns
2012. AVOS continues to try to appease its mem- Swartz founded Demand Progress as an outgrowth
ber base and announced smartphone applications of his earlier work in providing easy public access to
and a new redesign that features faster loading public documents through initiatives like his pub-
and better search features in January 2013. lic.resource.org and his even larger project called
Open Library, which sought to make information
Carolyn Popp Garrity about every book ever published available online.
Birmingham-Southern College Rather than limiting itself to online petitions and
Demand Progress 363

publicity campaigns, Demand Progress has directly a court case there was no means of bringing direct
engaged in fund-raising efforts to support politi- pressure to bear on justices, but Demand Prog-
cians who are friendly to its causes and to bring ress mobilized its supporters in order to bring
pressure to bear on lawmakers who are voting on the indirect pressure of public awareness to the
legislation that affects its core values. case. Interestingly, in addition to the usual social
To date, Demand Progress has led a number media viral efforts its campaigns typically employ,
of campaigns that have been successful in draw- Demand Progress also created entertaining car-
ing wide attention to potential government over- toons to explain the ruling’s relevance and to
reach and abuse of secret information. It has been serve as a public education resource.
active in publicizing legislation such as the Protect
Intellectual Property Act (PIPA), the Stop Online Current Campaigns
Piracy Act (SOPA), and the Cyber Intelligence There is a high degree of continuity in the issues
Sharing and Protection Act (CISPA). targeted by Demand Progress. One of its promi-
Other related efforts include the “You’ve Been nent political allies, U.S. Representative Zoe
Owned” campaign, which raised awareness of the Lofgren of California, is spearheading efforts to
potential impacts of the October 2012 case Kirt- support work that honors Swartz’s legacy. The so-
saeng v. John Wiley and Sons. Unlike the online called Aaron’s Law has been proposed as both a
security legislation it had previously opposed, tribute to Swartz and as an effort to counterbal-
this judgment would have impacts in both the ance what the organization sees as heavy-handed
digital and material landscape. In essence, John tactics used to prosecute open information advo-
Wiley and their supporters argued that individu- cates. Specifically, it changes the Computer Fraud
als should not be able to resell used intellectual and Abuse Act so that violation of an individual
or copyrighted material, including books, music Web site’s terms of agreement or user agreement
albums, and countless other items. would no longer be classed as a felony, with cor-
Aside from the obvious threats to Web sites like responding lengthy prison sentences. It is the
eBay, this case would have potentially made it a prospect of such a long custodial sentence that is
crime for people to engage in a host of long-stand- supposed to have been a key motivator in Aaron
ing practices like selling used items from home, Swartz’s suicide.
lending films or books to friends, and so on. Being Another central campaign is “The Internet ver-
sus Hollywood.” Its claim is that after the fail-
ure of PIPA/SOPA legislation, the motion picture
industry continues to try to criminalize upload-
ing user-purchased materials to cloud comput-
ing sites. Specifically, it has filed a legal brief on
behalf of Kim Dotcom, the operator of the Web
site Mega­upload.com, who has been charged with
intellectual property and copyright violations as
his site has been used to distribute these materi-
als by others. According to Demand Progress, the
implication that a site operator could be held lia-
ble for acts committed by site users is potentially
catastrophic for any Web site that relies on user-
uploaded content, including even well-known
sites like YouTube. Taken to extremes, it argues
the logic could even extend to online e-mail ser-
vices that millions of people rely upon.
A protester at a January 18, 2012, event organized by the New Because of the genuine possibility that Mega­
York Tech Meet Up, which featured Demand Progress founder upload could be reasonably held liable for at
Aaron Swartz and others speaking against the Protect Intellectual least providing controls on uploaded content,
Property Act (PIPA) and the Stop Online Piracy Act (SOPA). the Demand Progress effort to generate petition
364 DeMint, Jim

signatures to send to the judge on the case spe- Further Readings


cifically focuses on the government seizure of files Demand Progress. “Demand Progress.” http://www
and information belonging to people who used .demandprogress.org (Accessed May 2013).
Megaupload and related sites and who now have “News for Demand Progress.” Huffington Post.
no way of retrieving their personal files. In other http://www.huffingtonpost.com/news/demand
words, it appeals to the long-standing principle -progress (Accessed May 2013).
that personal property cannot be seized without Ross, Gary. Who Watches the Watchmen?:
probable cause and specific legal sanction. The Conflict Between National Security and
Demand Progress is also involved in a non­legal Freedom of the Press. Washington, DC: National
campaign against major U.S. Internet service pro- Intelligence University, 2011.
viders (ISPs) that are implementing a “six strikes”
plan to cut down on copyright infringement and
similar problems. Rather than using legal means,
these firms will simply restrict or deny Internet
access to users who have been accused of violat- DeMint, Jim
ing copyright. The objections of Demand Prog-
ress center on the lack of a means to contest accu- Jim DeMint has served in the U.S. Senate from
sations without paying a fee, the ambiguity of South Carolina. Elected in 2004, DeMint is argu-
how and when the rules will be applied, and the ably one of the most prominent conservatives in
likelihood that most terms will be buried in the the Senate. He is an economic and social conser-
fine print of user agreements and thus not clearly vative opposed to abortion, gay marriage, and
understood by customers. pork barrel spending. DeMint is considered one
of the leaders of the Tea Party movement in Con-
Other Progressive Campaigns gress. Recently, DeMint shocked political insid-
Though the majority of its efforts have focused ers by announcing that he was leaving the Senate
on Internet issues, Demand Progress has also in January 2013 to serve as the president of the
engaged in initiatives that are in the wider Heritage Foundation.
stream of progressive (leftist) politics. These have James Warren DeMint was born in 1951 in
included a campaign to end indefinite military Greenville, South Carolina. He attended the Uni-
detention at places like Guantanamo Bay; an versity of Tennessee, where he received his bach-
effort to have state legislatures amend their con- elor’s degree, and Clemson University, where he
stitutions to create a national popular vote for graduated with his master’s in business adminis-
the U.S. presidency; and support for Lawrence tration. After college, DeMint founded a market-
Lessig’s Grassroots Democracy Act, which would ing research firm.
create vouchers to fund political campaigns for In 1998, DeMint was elected to the U.S. House
politicians who exclusively use public funding of Representatives from South Carolina. He was
and small donations and allow organizations to reelected in 2000 and 2002 and established his
aggregate smaller amounts into large donations reputation as an economic and social conservative.
that would theoretically reduce the influence of In 2004, DeMint was elected to the U.S. Senate
the wealthiest citizens and corporations on the from South Carolina. He quickly took conserva-
political process. tive stands on abortion, gay marriage, pork barrel
projects, and government spending. He blocked
Jeremy Kleidosty thousands of pork barrel projects. He is frequently
University of St. Andrews described as the most conservative member of
the Senate. In 2007, the American Conservative
See Also: Activists and Activism, Digital; Union gave DeMint a “perfect” rating.
Campaigns, Digital; Campaigns, Grassroots; In 2009, DeMint became an enthusiastic sup-
Campaigns, Virtual; Cause-Marketing Campaigns; porter of the Tea Party movement. The move-
Digital Media Law Project; Downstream Liability, ment’s opposition to President Barack Obama’s
Political Implications of; Privacy; Reddit. stimulus package and health care plan and vision
Democracy Now! 365

of a limited government reflected DeMint’s con- play a significant role in the conservative move-
servative views. He is usually considered one of ment for years to come.
the movement’s leaders.
In 2010 and 2012, he sought to recruit conser- Jason Roberts
vative candidates in Senate races. These included Quincy College
Sharron Angle in Nevada, Christine O’Donnell
in Delaware, Ken Buck in Colorado, Richard See Also: Campaigns, Congressional
Murdock in Indiana, and Todd Akin in Missouri. (2002); Campaigns, Congressional (2010);
Some of the candidates DeMint supported—such ContractfromAmerica.org; Tea Party Movement.
as Marco Rubio in Florida and Pat Toomey in
Pennsylvania—won their respective races. Sup- Further Readings
porters admired DeMint’s attempts to hold the DeMint, Jim. The Great Awakening: Two Years
Republican Party true to what they perceived to That Changed America, Washington, and Me.
be its core principles. On the other hand, critics Nashville, TN: B&H, 2011.
lamented the fact that most of the conservative DeMint, Jim. Saving Freedom in Health Care.
candidates endorsed by DeMint lost. They argued Nashville, TN: B&H, 2009.
that these candidates were too radical for their Gardner, Anne. “Tea Party Activists Excited About
respective electorates and that more moderate Jim DeMint Move.” Washington Post (December
Senate candidates would have won and resulted 6, 2012).
in Republican control of the Senate in 2010 or Maas, Harold. “Will Jim DeMint’s Departure Deflate
2012. Instead, conservative candidates like Rich- the Tea Party?” The Week (December 7, 2012).
ard Murdock and Todd Akin made controversial Raju, Manu and Scott Wong. “What Jim DeMint
statements about rape and abortion, and Repub- Tells Us About Washington Power.” Politico
licans missed the opportunity to regain control of (December 6, 2012).
the Senate. Sanneh, Kelefa. “The Evolution of Jim DeMint.”
DeMint easily won re-election in 2010, receiv- The New Yorker (December 8, 2012).
ing 61 percent of the vote. In the Senate, DeMint Sirota, David. “Jim DeMint, the Right’s New
served on a variety of committees, including the Kingmaker.” Salon (December 9, 2012).
Foreign Relations Committee; the Banking, Hous- Steinhauer, Jennifer. “Tea Party Hero Is Leaving the
ing and Urban Affairs Committee; and the Com- Senate.” New York Times (December 6, 2012).
merce, Science, and Transportation Committee.

Heritage Foundation
On December 6, 2012, Jim DeMint shocked his
Senate colleagues and political insiders when he Democracy Now!
announced that he would resign from the Senate
in January 2013 to accept a position as president Democracy Now! is a national, nonprofit, inde-
of the Heritage Foundation. DeMint contended pendent radio and television news program that
that he would have more influence over the con- broadcasts around the world. The program,
servative movement as president of the Heritage broadcast by Pacifica Radio, is the largest pub-
Foundation than as an individual senator from lic media collaboration in the United States. One
South Carolina. Some conservatives praised the of the principal goals of Democracy Now! is to
decision as a brilliant move on DeMint’s part, provide its listeners access to people and perspec-
while other conservatives condemned DeMint for tives that are often not available in the dominant,
deserting the movement. Some observers noted corporate-sponsored media in the United States.
that DeMint’s decision might have been moti-
vated by monetary factors. They pointed out that History
DeMint’s assets were valued at only $69,000— Democracy Now! was founded in 1996 by Amy
unusual in a body famous for its millionaires. Goodman, Juan Gonzalez, Larry Bensky, Salim
While DeMint is leaving the Senate, he will likely Muwakkil, Julie Drizin, and Denis Moynihan.
366 Democracy Now!

Amy Goodman is the core creator and principal not accustomed to hearing. The interview marked
host of the program, with Juan Gonzalez as a one of the few times during the election that the
consistent cohost. Goodman was previously the public was able to hear hard-hitting questions,
producer of the evening news on Pacifica Radio’s and Clinton called the questioning “hostile,” and
New York Station, WBAI, and gained interna- “combative,” and at times “disrespectful.” Good-
tional recognition and a number of awards for man said she was “just doing her job.”
her groundbreaking coverage of the U.S.-backed Democracy Now! began its daily weekday tele-
Indonesian occupation of East Timor and associ- vision broadcast shortly after September 11, 2001,
ated public massacres. and became an independent nonprofit organiza-
On February 16, 1996, Democracy Now! com- tion in June 2002. Highlights since 2002 include
pleted its first broadcast and became the only daily extensive coverage of the buildup before and oper-
election show in broadcasting. The show became ations during the wars in Afghanistan and Iraq; in-
so popular that public demand led to the daily depth analysis of the 2004, 2008, and 2012 politi-
program continuing beyond the elections, which cal conventions and national elections (during the
quickly became Pacifica’s flagship news and pub- 2008 Republican convention, several staff were
lic affairs program. forcefully arrested, leading to public outcry and
In 1998, Goodman and Jeremy Scahill, an early a lawsuit against the cities of St. Paul and Minne-
contributor and producer, traveled to Nigeria to apolis, Minnesota); in-depth coverage of the Troy
investigate the drilling activities of U.S.-based Davis execution; the 2008 financial crisis and the
oil companies in the Niger Delta. Goodman and Occupy Wall Street movement; as well as a wide-
Scahill then produced the radio documentary ranging list of national and international issues.
“Drilling and Killing: Chevron and Nigeria’s Oil Democracy Now! is as of December 2012 the
Dictatorship,” which investigated allegations of only public media program in the United States
Chevron’s role in the murder of Nigerian civilians that airs simultaneously on radio, satellite and
who were protesting the frequent oil spills that cable television, and the Internet. The program
decimated their communities. The documentary continues to cover critical news and social justice
won the 1998 George Polk Award. issues around the world, many of which receive
In 1999, Goodman traveled to Peru to inter- little to no coverage in the corporate news media.
view American prisoner Lori Berenson, where As such, Democracy Now! is widely seen as one of
Goodman was the first journalist to be admitted the most important and valuable sources for news.
into the prison to speak to Berenson. Later that
year, Democracy Now! did extensive coverage of Reach and Role
the World Trade Organization (WTO) protests Democracy Now!’s broadcast is carried on more
in Seattle, Washington, also known as the Battle than 1,000 public radio and television stations,
of Seattle. Extensive coverage of the protests in making it the largest media collaboration in the
the streets was paired with interviews and cover- United States. The program is broadcast on Paci-
age of the discussion and significant events taking fica Radio, National Public Radio (NPR), com-
place in the actual WTO meetings. munity and college radio stations, public access
Democracy Now! orchestrated a unique multi- TV channels, some public broadcasting systems,
media collaboration to cover the 2000 presidential satellite TV channels, Free Speech TV and Link
election. Distribution included satellite and cable TV carried on both DISH and DirecTV satellite
television, nonprofit community radio, and the systems, and on the Internet as downloadable and
Internet. The shows were live, two-hour daily spe- streaming audio and video on democracynow.org
cials at the Republican and Democratic national and via podcast.
conventions, broadcast directly from independent Democracy Now! plays a critical role in the
media centers in Los Angeles and Philadelphia. news media landscape by offering an alternative
Then, on Election Day in 2000, Amy Goodman to the main current news media industry, which
and Gonzalo Aburto conducted an impromptu is dominated by corporate, for-profit media con-
interview with Bill Clinton during which they glomerates. Corporate news media is often cat-
asked challenging questions that the president was egorized as threatening free press and democratic
DemocracyforAmerica.com 367

processes because corporate media outlets in Polk Award, the Robert F. Kennedy Memorial
the United States are legally responsible to their Prize, the Alfred I. duPont-Columbia Award, the
shareholders to maximize profits. Ed Herman and Electronic Frontier Foundation Pioneer Award,
Noam Chomsky point out several issues with for- and the Golden Reel from the National Federation
profit corporate news media in their book Manu- of Community Broadcasters, among many others.
facturing Consent, in which they trace the routes
by which money and power are able to filter the Devan Rosen
news, marginalize dissent, and allow the govern- Ithaca College
ment and dominant private interests to dominate
the messages that reach the public. The critical See Also: Citizen Journalism; Economic and Social
elements are a set of news filters that focus on the Justice; Global Warming and Climate Change;
size, concentrated ownership, owner wealth, and Nonprofit Organizations.
profit orientation of the dominant mass-media
firms and advertising as the primary income Further Readings
source of the mass media, among other selec- Goodman, Amy and Denis Moynihan. The Silenced
tion biases and control mechanisms. Democracy Majority: Stories of Uprisings, Occupations,
Now! is able to avoid these filters by remaining Resistance, and Hope. Chicago: Haymarket Books,
an independent, nonprofit, commercial-free news 2012.
broadcast funded entirely through contributions Herman, Ed and Noam Chomsky. Manufacturing
from listeners, viewers, and foundations. Democ- Consent: The Political Economy of the Mass
racy Now! does not accept advertisements, cor- Media. New York: Pantheon Books, 2002.
porate underwriting, or government funding. McChesney, Robert W. Rich Media, Poor Democracy:
Frequent and noteworthy guests on Democ- Communication Politics in Dubious Times.
racy Now! include (not a comprehensive list) Jer- Chicago: University of Illinois Press, 1999.
emy Scahill, Sharif Abdel Kouddous, Norman G.
Finkelstein, Cornel West, Dennis Kucinich, How-
ard Zinn, Michael Moore, Naomi Klein, Noam
Chomsky, Ralph Nader, Jeff Cohen, Danny
Glover, Matt Taibbi, Paul Krugman, Alan Der- Democracyfor
showitz, Alan Greenspan, Arundhati Roy, Bill
Clinton, Bill Moyers, Edward Said, Evo Morales, America.com
George McGovern, George Papandreou, Gore
Vidal, Hugo Chávez, Jean-Bertrand Aristide, Democracy for America (DFA) is a nationwide
Jimmy Carter, Joseph Stiglitz, Julian Assange, grassroots organization of more than 1 million
Lori Berenson, Mahmoud Ahmadinejad, Mumia people. Officially classified as a political action
Abu-Jamal, Yoko Ono, and Lou Dobbs. committee (PAC), DFA pursues progressive politi-
Democracy Now!, including Amy Goodman cal reforms within the Democratic Party as well as
and other staff, have won a myriad of awards for the nation as a whole. Founded in 2004 by former
their contributions to journalism and news media, Democratic presidential candidate and Demo-
including the Right Livelihood Award (often cratic National Committee (DNC) chair Howard
referred to as the Alternative Nobel Prize), the Dean, DFA provides campaign training, organiz-
Gandhi Peace Award, the Park Center for Indepen- ing resources, and media exposure so members
dent Media Izzy Award (three times), the ACLU- can support progressive issues and candidates up
NCA Henry W. Edgerton Civil Liberties Award, and down the ballot. DFA also sponsors public
the Paley Center for Media She Made It Award, educational venues for various issues and makes
the Gracie Award for American Women in Radio donations to candidates running for office.
and Television Public Broadcasting, the James Initially formed by Dean in 2001 as the Fund for
Aronson Award for Social Justice Journalism, a Healthy America PAC, the group was renamed
the Puffin/Nation Prize for Creative Citizenship, Democracy for America in early 2004. After failing
the Ruben Salazar Journalism Award, the George to win the Democratic nomination for president
368 DemocracyforAmerica.com

later that same year, Dean sought to build grass- normally gather together once a month in groups
roots support for various Democratic candidates across the nation, carrying out goals set at the
through the DFA. Headquartered in South Burling- national level. These local groups, however, are
ton, Vermont, DFA endorsed Democrats running independent and not formally associated with
for office at all levels of government in 2004. After the national organization. The DFA Community
ascending to the DNC chairmanship in 2005, Dean has a presence in all 435 congressional districts
relinquished control of the PAC to his brother, Jim and involves more than 600 online groups. Local
Dean. Since then, DFA has supported some 600 members’ support for certain political candidates
candidates in their successful campaigns for office, can serve as a guide for the DFA in determining
including President Barack Obama. whom to back. In addition, the DFA considers
As a PAC, the DFA can accept up to $5,000 in endorsements made by local groups in order to
donations per individual or PAC, but it cannot gauge member support for various candidates.
take contributions from corporations or unions. In Universal health care was the center of atten-
accordance with government regulations, the DFA tion for the DFA after the 2008 presidential elec-
reports to the Federal Election Commission (FEC) tion, specifically a single-payer system through
the identities of its donors. From the start, the DFA the U.S. government. This position is more liberal
has concentrated its efforts primarily on candidate than most Democratic officials’ stances at both
endorsements and sponsorships of training acad- state and national levels. Although candidates in
emies for grassroots activists, campaign staff, and the Democratic Party frequently receive endorse-
candidates (in contrast to large TV advertising ments and campaign support from the DFA, the
campaigns). Members of the DFA, from both local organization differs with the official party line on
and national levels, take part in these programs in a variety of issues, including the legalization of
order to learn how to conduct winning political same-sex marriage (which the DFA favors). The
campaigns. The foremost training program within DFA also was against the Don’t Ask, Don’t’ Tell
the DFA is the Campaign Academy, which involves military policy, sending an open letter—with the
two day-long workshops on campaign operations signatures of 100,000 members—to President
for candidates, staff, and activists. Various sessions, Obama and all 100 U.S. Senators in 2010. The
led by professional campaign personnel, cover dispute in Wisconsin over labor union rights was
the full range of campaign activities—from fund- a prime focus for the DFA in 2011, and the DFA
raising to voter turnout to social networking—in continues to fight against state voter identification
order to build a nationwide, grassroots organiza- laws, arguing that certain groups—particularly
tion of progressive activists possessing the skills minorities, seniors, and the disabled—are dispro-
necessary for competing effectively in elections. portionately affected and thus disenfranchised.
The DFA also runs a free online training pro-
gram called Night School that involves video Steven J. Campbell
Web-conferencing seminars. These hour-long, University of South Carolina–Lancaster
interactive sessions allow individuals to converse
with professional trainers and learn about a vari- See Also: Activists and Activism, Digital; Blog
ety of campaign-related topics. Through such for America; Bottom-Up Campaigns; Campaigns,
exchanges, participants can ask questions and Grassroots; Campaigns, Presidential (2004);
glean campaign materials right from their own Campaigns, Virtual; Networks, Political.
homes. In addition, the DFA grants scholarships
to liberal bloggers via a program called the Net- Further Readings
roots Nation Scholarship. Democracy for America. http://www.democracy
The DFA’s Campaign Academy and Night foramerica.com (Accessed October 2012).
School are complemented by a social networking Gillespie, Elizabeth. “Dean Promises His Group
mechanism known as the DFA Community. This Will Raise Money, Recruit Candidates.” USA
setup allows DFA members to identify and meet Today. http://www.usatoday.com/tech/webguide/
with other progressives in their locales as well internetlife/2004-03-18-howarddean-newsite_x
as organize groups and plan events. Members .htm (March 18, 2004). (Accessed October 2012).
Demonstrations, Organizing 369

Mercurio, John. “Democracy (Dean) for America.” repertoires of action across different national
CNN.com Morning Grind (May 6, 2004). http:// contexts and thematic settings. On the internal
www.cnn.com/2004/ALLPOLITICS/03/18/thu/ level, one can distinguish two further spheres of
index.html (Accessed October 2012). influence of social media: first, on the organiza-
tional processes of collective action, specifically
on how people organize protest events, take to
the streets, and network with other groups; and,
secondly, on collective identity, that is to say the
Demonstrations, mechanisms and practices through which people
motivate themselves to take action and recognize
Organizing each other as part of the same struggle.
Observers have mixed views about the impact
Contentious politics is rooted in a set of consoli- of social media on organized collective action.
dated action repertoires, with demonstrations The debate on the topic, in particular on account
being the most widespread protest tactic. Among of the 2011 protests, has developed along the
the most powerful images of 2011 and 2012 are dichotomy techno-optimism versus techno-
the pictures of thousands of people demonstrat- skepticism. For some, Facebook and Twitter are
ing in Tahrir Square (Cairo, Egypt), Zuccotti Park behind the new wave of contention, and they
(New York City), and Puerta del Sol (Madrid, have made obsolete everything we know about
Spain). However, citizens have been organizing people’s participation in politics and social
demonstrations long before the advent of social movements; organized collective action from
media, at least since the 19th century. What has now on will emerge online. For others, social
changed is the way people organize collective media are unable to originate the strong ties
action, and the range of media and technology that are needed for radical and massive mobili-
that support them in these operations. zation; digital social networking promotes indi-
Demonstrations play two fundamental roles vidual rather than collective action, while at the
within social movements: they are instrumental same time social media offer new and efficient
in conveying the contentious goals of a move- tools for state monitoring. Some observers have
ment, and, at the same time, they contribute to used the label “slacktivism” in order to describe
sustaining and reproducing the movement itself. online political activities performed with mini-
Demonstrations, in fact, provide activists with mal effort, which tend to make participants feel
an occasion to build and consolidate a collective good about themselves but are not very efficient
identity, establish networks of communication in achieving the stated political goals.
and exchange, and create a community. Tradition- Both positions find partial confirmation in the
ally, demonstrations have been organized through most recent waves of mobilization. In the so-
word of mouth, as well as communication chan- called Arab Spring, for example, scholars Philip
nels like the telephone, the fax machine, and, more Howard and Muzammil Hussain write that digi-
recently, Internet and e-mail. How did the advent tal social media were
of social media and mobile devices change the way
people organize demonstrations, and how do they . . . singularly powerful in spreading protest
contribute to shape contention repertoires? How messages, driving coverage by mainstream
are collective identity and movement creation and broadcasters, connecting frustrated citizens
reproduction influenced in this process? with one another, and helping them to realize
that they could take shared action regarding
Impact of Social Media shared grievances.
The influence of social media and mobile devices
on demonstration organization can be traced They continue:
primarily on two levels, one external and one
internal to the movement. On the external level, [T]he precise grievances have varied signifi-
social media have an impact on the diffusion of cantly from country to country. Yet the use of
370 Demonstrations, Organizing

digital media to rouse and organize opposition interaction among digital social media, the dif-
has furnished a common thread. ferent forms of movement organizations, and the
physical and geographical spaces of contention
But empirical analyses of Egyptian protests show and the different cultures, both referring to the
that online social networks were primarily used as use of communicative tools and to the organiza-
a platform of solidarity among upper-middle-class tional structure of mobilization, that are embed-
English-speaking activists and as “a key resource ded in different experiences of collective action.
for getting information to the outside world, per- Looking at the reciprocal influence of social
petuating the feeling that the world was watch- media and organizational cultures, scholars have
ing, which was an important factor for morale observed how in the Arab Spring, the Spanish
and co-ordination on the ground,” according to 15M, and Occupy Wall Street the use of social
Christopher Wilson and Alexandra Dunn, rather media has contributed to shape the repertoire of
than to organize protests. action and the structural organization of move-
ments. Scholars W. Lance Bennett and Alexandra
Analysis Segerberg, embracing techno-optimism, define
The 2011 protests have encouraged a more “digitally networked action” as those instances of
nuanced analysis of organized collective action in political participation and protest built on “per-
times of social media. Some scholars have focused sonalized communication” rather than on orga-
on the actual practices of organizing demon- nized groups. Digitally networked action is char-
strations, with the aim of understanding the acterized by a set of “inclusive [. . .] personal action

Occupy Wall Street protesters at a General Assembly meeting in Washington Square Park in New York City on October 15, 2011,
display their approval through hand signals adopted by organizers. October 15 was a global day of protest under the banner “United
for Global Change” in 950 cities in 82 countries; organizers spread the word online using many different types of social media.
Demonstrations, Organizing 371

frames” shared via social media. In this process become ‘soft leaders’ or choreographers, involved
of individualization of protest, the new “logic of in setting the scene, and constructing an emotional
connective action” overcomes traditional social space within which collective action can unfold.”
movement schemes; however, the two coexist, From this point of view, the influence of social
resulting in hybrid forms of protest. At the core media in the organization of demonstrations is
of this hypothesis is the idea that social media, not only technical, but it deeply restructures the
providing immediate access to information, and way in which people participate in acts of protest,
therefore to calls for action and available reper- even if not in the way that supporters of the prin-
toires of contention, have the ability to enhance ciples of “horizontalism” and “leaderlessness”
the personalization of protest, attributing to the would think. Gerbaudo offers the examples of
individual citizen-protester direct agency in the MeetUp, “informing users about ‘offline’ meetings
mobilization, at the expense of existing organized they might be interested in”; Doodle, a Web-poll-
activist groups. ing “application used to schedule meetings and
In his research on Occupy Boston, Jeffrey other appointments; and of course the popular
Juris has found empirical support to this obser- Facebook Event function, used to invite people to
vation, even if he does not share in full Bennett various activities.” These services, contends Ger-
and Segerberg’s techno-enthusiastic perspective. baudo, “are testament to the extent to which the
Focusing on the interaction between media prac- assembling of social groupings in our fragmented
tices and organizational cultures, Juris argued and dispersed societies relies on a complex pro-
that the activists’ adoption of specific communi- cess of symbolic and technical mediation.”
cation tools has the ability to strengthen as well as
weaken some of the organizational models pro- Social Movement Media Cultures
posed by the different groups in a movement. He The influence of digital media over mobilization
observed how “the increasing use of social media is culturally mediated at different levels: it inter-
such as Facebook or Twitter has led to new pat- acts not only with organizational cultures, but
terns of protest that shape movement dynamics also with “social movement media cultures,” as
beyond the realm of technological practice.” Fur- Sasha Costanza-Chock has found in his research
ther, “rather than generating organizational net- on Occupy Wall Street. Costanza-Chock argued
works, social media primarily operate via inter- that the movement, in terms of media practices,
personal networks, resulting less in ‘networks of is “complex and internally differentiated, rather
networks’ than in ‘crowds of individuals.’” In than a mass of digitally savvy youth with lap-
other words, social media enhance the “logic of tops and smartphones.” Different media cultures,
aggregation” in a way similar to how the Internet shaped by “previous histories of movement media
has fostered a “logic of networking” within the practices, as well as key individuals with past
global justice movement. experience as movement communicators” inform
Scholar Paolo Gerbaudo shares with Juris the the way in which different activists use digital
focus on the interaction among social media, media.
organizational cultures, and physical space, but The widespread accessibility of social media has
his analysis moves away from the techno-optimist challenged, transformed, and reshaped the role of
position. What for Juris is the “logic of aggrega- media activists, without eliminating it. In fact,
tion,” that is to say the capacity of social media while the use of Facebook is almost ubiquitous
to bring together in the same physical space and within Occupy protesters, “media, tech and press
in the same act of demonstrating a wide group of WGs composed by small numbers of relatively
individuals with different backgrounds and goals, highly skilled, more experienced movement actors
for Gerbaudo is the “choreography of assembly,” play key roles in creating, curating and circulating
in other words “a process of symbolic construc- media texts, as well as in shaping the media cul-
tion of public space which facilitates and guides ture of the movement.” In this process, the media
the physical assembling of a highly dispersed cultures of contemporary movements interact
and individualized constituency.” In this setting, with the legacy of past struggles for free culture
“influential Facebook admins and activist tweeps and digital commons, even if it is still too soon
372 Department of Homeland Security Social Media Monitoring Initiative

to assess the level of continuity and hybridization Gerbaudo, Paolo. Tweets and the Streets: Social
that this interaction will produce and to identify a Media and Contemporary Activism. London:
new established movement media culture. Pluto, 2012.
Gladwell, M. “Small Change: Why the Revolution
Diffusion of Action Will Not Be Tweeted.” The New Yorker (October
Social media also influence the diffusion of action 4, 2010).
repertoires across national boundaries. People Howard, P. H. and M. M. Hussain. “The Role
have seen the modular character of contention of Digital Media.” Journal of Democracy,
repertoires at work with antiausterity protests v.22/3 (2011).
like the Occupy Wall Street mobilizations, which Juris, J. S. “Reflections on #Occupy Everywhere:
have been reproduced with varying degrees of Social Media, Public Space, and Emerging Logics of
success by different actors in various parts of the Aggregation.” American Ethnologist, v.39/2 (2012).
world. The same mechanism is being analyzed Morozov, E. “The Brave New World of Slacktivism.”
by scholars using similar hypotheses and differ- Foreign Policy (May 19, 2009). http://neteffect
ent definitions: both Sidney Tarrow’s concept of .foreignpolicy.com/posts/2009/05/19/the_brave_
“thin diffusion” and the notion of “cloud protest- new_world_of_slacktivism (Accessed June 2013).
ing” aim at identifying in contemporary forms of Mozorov, E. The Net Delusion: The Dark Side of
protest an immediate exchange of symbolic con- Internet Freedom. New York: Public Affairs, 2012.
tent, such as slogans, tactics (think for example Nunns, A., N. Idle, and A. Soueif. Tweets From
of the rapid diffusion of protest camps within the Tahrir: Egypt’s Revolution as it Unfolded, in the
“global” Occupy protest), and protest know-how, Words of the People Who Made It. New York: OR
well beyond the traditional channels of commu- Books, 2011.
nication of social movements. Social media and Shirky, C. “The Political Power of Social Media.”
mobile technology are at the core of such thin dif- Foreign Affairs (January/February 2011).
fusion, which is nonetheless as powerful as the Skoric, M. M. “What Is Slack About Slacktivism?”
textbook “thick diffusion.” Paper for the Inter-Asia Roundtable on
Methodological and Conceptual Issues in Cyber
Stefania Milan Activism Research, National University of
Tilburg University Singapore (August 30–­31, 2012).
Lorenzo Zamponi Tarrow, S. “Occupying America: Lessons for Social
European University Institute Movement Theory.” Speech at the Inaugural
Cosmos Workshop, EUI, Florence (April 30, 2012).
See Also: Activists and Activism, Digital; Africa, Wilson, C. and A. Dunn. “Digital Media in the
North; Arab Spring; Bahrain; Cloud Protesting; Egyptian Revolution: Descriptive Analyses From
Egypt; Internet Gathering; Libya; Occupy Movement; the Tahrir Data Set.” International Journal of
Piccadilly Riots, London; Quebec, Canada, 2012 Communication, v.5 (2011).
Student Protests; Seattle 1999 WTO Protests; Spanish
15M Movement; Syria; Tunisia.

Further Readings
Bennett, W. Lance and Alexandra Segerberg. Department of
“The Logic of Connective Action.” Information,
Communication & Society, v.15/5 (2012). Homeland Security
Costanza-Chock, S. “Mic Check! Media Cultures and
the Occupy Movement.” Social Movement Studies,
Social Media
v.11/3–4 (2012).
Fuster Morell, M. “The Free Culture and 15M
Monitoring Initiative
Movements in Spain: Composition, Social In response to the growing ubiquity and pervasive-
Networks and Synergies.” Social Movement ness of social media, in 2010, the U.S. Department
Studies, v.11/3–4 (2012). of Homeland Security (DHS) created its Social
Department of Homeland Security Social Media Monitoring Initiative 373

Media Monitoring and Situational Awareness Ini- name; his/her affiliation, position, or title; as well
tiative (hereafter referred to as “the program”). as any identification that is publicly identifiable.
The program’s initial mission was to monitor social Analysts are instructed to disregard information
media Web sites for evidence of emerging and cred- not belonging to these categories.
ible threats to national security and to share and Once information of value is ascertained, it is
collect data about possible terrorism suspects and extracted from the site and, utilizing a specific
terroristic and criminal acts in planning. Web application, it then forms the basis of a
The program’s first task was narrowly tar- report. DHS maintained that only user-generated
geted at monitoring Web sites like Twitter and information from publicly available social media
Facebook for commentary on three 2010 events: sites is retained and that all unused information
the Haitian earthquake; the Vancouver, British is discarded or deleted. All saved information
Columbia, Olympic events; and the Deepwater becomes part of the federal record but is retained
Horizon oil spill. This focus was subsequently for no more than five years. By its own account-
expanded to include monitoring of numerous ing, information derived from social media
and disparate publicly available online forums, sweeps are wide-ranging (over 9,300 reported in
blogs, public Web sites, and message boards, as one six-month period alone) but often innocu-
well as search engines and content aggregators. ous (e.g., news stories about natural occurrences,
Sources of the derived information might origi- power outages, tornadoes, floods, or fires, or
nate from citizenry, the public at large, as well as Border Patrol apprehensions). Notwithstanding,
first responders, the press, volunteers, and oth- DHS issues no assurances that it will not seek
ers. The categories of individuals who are eligible more robust and sophisticated tools to mine the
to have their data monitored expanded as well. Internet for what it views as threats to national
They include the following: security. This wide scope has alarmed privacy
advocates, who, through a series of legal maneu-
• Any U.S. citizen or foreign individual verings and public disclosures, have sought to, at
whose information is of a potential life- the very least, curtail the scope of the program.
threatening nature
• Any U.S. or foreign official (whether History
private or public sector) who speaks pub- In 2010, the DHS Privacy Office approved the
licly for an organization initiative aimed at monitoring social media Web
• News readers, reporters (regardless of sites for what DHS believes are emerging threats
media focus) who utilize their report- to national security. The DHS Privacy Office was
ing capabilities to keep their audiences created by the U.S. Congress in 2003 as a com-
updated and informed on various phe- ponent of the Homeland Security Act of 2002
nomena or events (PL 107–296, 116 Stat. 2135), specifically Sec-
• Public officials (current or past) who tion 221 and 222 of that act. Under the supervi-
have been victimized in incidents related sion of the chief privacy officer, the Privacy Office
to national security is tasked with reviewing major initiatives of the
• Individuals engaged in terror incidents, agency to ascertain whether citizens’ right to pri-
drug cartels, or other major crimes as vacy is respected when planning or updating any
determined by DHS, who are killed or program, system, or initiative, while, at the same
found dead. time, ensuring that DHS has the ability to effec-
tively collect and share information about poten-
The program’s stated guidelines note that, in tial or ongoing threats to national security. DHS’s
the course of monitoring, analysts and informa- Privacy Office was the first statutorily required
tion compilers are not to post any information, privacy office in any federal agency and is respon-
seek out other users of the social media service sible for evaluating DHS programs, systems, and
or interact in any way with them, or accept any initiatives for potential privacy impacts, and pro-
invitations to interact in any way. Personally iden- viding mitigation strategies to reduce the privacy
tifiable information can include the individual’s impact. Furthermore, when privacy complaints or
374 Department of Homeland Security Social Media Monitoring Initiative

violations are alleged, the Privacy Office is tasked paid to social media. For example, the key word
with responding to those complaints and, if nec- searches are used when scanning Facebook or
essary, provides redress by ordering additional Twitter because DHS is particularly interested in
training, education, and public outreach in order breaking news tweets and Facebook posts. The
to encourage departmental transparency. names, usernames, blog URLs, and other identi-
As its guide, the Privacy Office purports to use fying information of “first responders” to these
DHS’s Fair Information Practice Principles (FIPPs) events are recorded for later analysis. The list of
as its policy framework in order to enhance indi- key words is dynamic, not static, but key words
viduals’ privacy protections by assessing the nature were initially selected by an unspecified commer-
and purpose for all personally identifiable informa- cially available software package and later cus-
tion (PII) collected in the service of fulfilling DHS’s tomized by DHS. Some at the hearing questioned
mission. The eight FIPPs—transparency, individual whether DHS was intending to keep dossiers on
participation, purpose specification, data minimi- private citizens. In response, the agency denied
zation, use limitation, data quality and integrity, this and stipulated that it regularly scrubbed its
security, and accountability and auditing—are a servers of nonrelevant information.
set of principles that rest at the heart of the Federal At the subcommittee hearing, DHS officials
Privacy Act of 1974 [PL. 93-579] and are highly noted the department is merely fulfilling its
influential in the crafting of privacy laws in many mission under the Homeland Security Act to
U.S. states as well as other nations. keep abreast of possible and credible threats to
DHS developed the program very much out of national security, and the program is an extension
the public eye. Only after DHS was sued under of other initiatives already in place with respect
the Freedom of Information Act by the Electronic to monitoring traditional media. Furthermore,
Privacy Information Center (EPIC) did details DHS argued that the program is legal because the
about the program emerge into public view. In agency forbids the wide-scale targeting of individ-
two contentious meetings on February 15, 2012 uals (with some exceptions made for individuals
(one public and one classified), DHS officials were in potential life-or-death situations, senior public
called before the Subcommittee on Counterintel- officials or spokespeople making public state-
ligence and Intelligence headed by Rep. Patrick ments, and members of the news media) and does
Meehan (R-PA) to explain the depth, ubiquity, not collect or catalogue PII. Privacy advocates
goals, and technical capabilities of the program. argued that this last statement directly contradicts
During testimony, DHS revealed that the agency prior statements made by DHS on the collection
had outsourced the program without competitive of PII (even in the same hearing) as well as the
bidding to General Dynamics, a major defense contents of DHS’s own report of the program,
contractor located in West Falls Church, Virginia. which contained portions of PII in commentaries,
As a condition of the contract, DHS noted that blog postings, and tweets from disparate sites.
it required all General Dynamics employees to
adhere to DHS privacy standards and to undergo Key Words
training in handling PII. Furthermore, the agency After its hearing before the subcommittee, DHS
noted that if General Dynamics employees misuse reluctantly released a redacted list of key words
PII of journalists, public figures, or the general and phrases the program uses to monitor social
public obtained through monitoring of various media and other Web sites. DHS deems a search of
social media (Facebook, Twitter, and a growing any of the key words or phrases worthy of inves-
list of other unspecified Web sites), said employ- tigation for possible signs of terrorist activities or
ees will be directed toward additional training or threats to national security. The key words were
dismissal from the program. included in DHS’s 2011 Analyst’s Desktop Binder
that was used to identify suspect media content.
How the Program Works
To facilitate the program, General Dynamics and Free Speech and Privacy
DHS engage in key word monitoring of various In response to the release of the list, EPIC char-
Web sites of interest, with particular attention acterized the words and phrases as broad, vague,
Department of Homeland Security Social Media Monitoring Initiative 375

and ambiguous. EPIC and other advocates like message boards, chats, and postings on blogs,
the Electronic Frontier Foundation (EFF) are con- Twitter, Facebook, and more.
cerned that the actions of the program have the Privacy advocates are most concerned that
potential to violate First Amendment rights and regardless of assurances to the contrary regard-
the Federal Privacy Act of 1974 (PL. 93–579]. ing the purposes of the program, DHS activities
Specifically, privacy and free speech advocates could expand to all online speech with no reason-
worry that DHS seeks to have unfettered access able suspicion that a crime had occurred and, as
to and use of individuals’ and groups’ PII (in vio- a result, degrade free speech and individual pri-
lation of guidelines put in place by the Federal vacy as protected under the Federal Privacy Act of
Privacy Act of 1974) and to monitor online dis- 1974. They noted that even DHS’s stated frame-
sent and criticism of the federal government by work for the program was fluid, particularly
the press and others in order to chill free speech. regarding the purposes for which the collected
Illustratively, privacy advocates noted that the information would be used and which agencies
cache of documents released to them by DHS would have access to it.
specified that, as part of its $11 million contract, Finally, during the subcommittee hearings, it
General Dynamics is expected to collect reports was noted by many journalists and members of
that criticize the handling of various events and Congress that there seemed to be little consensus
phenomena by agencies such as the Central Intel- among DHS officials as to the scale, scope, and
ligence Agency, the Federal Emergency Manage- overarching goals of the program. EPIC, EFF, and
ment Agency, Immigration and Customs Enforce- other privacy advocates have continued to urge
ment, Customs and Border Protection, and others. DHS to make available its reports on the pro-
Within the documents released by DHS were the gram. Despite DHS’s assurances to the contrary,
names of dozens of media outlets and publications a particular worry is that DHS might target com-
that were being monitored such as the New York munity activists, those engaged in controversial
Times, Computerworld, Wired Magazine, Drudge political issues, and those critical of DHS itself.
Report, and Huffington Post. As a result, the pri- DHS has been generally uncooperative in disclos-
vacy advocates argued that DHS’s practice of sur- ing documents and other pertinent information
veilling social media and other Web sites (especially about how the program operates. Privacy advo-
without independent guidelines and proper over- cates have requested that Congress require that
sight) could lead to abuse and could discourage DHS suspend the program until the full scope of
citizens from speaking out against the government. the program is revealed and privacy protections
The privacy advocates argued that concern are developed and implemented by entities out-
should not only be for the actual content collected side of DHS.
but also for the metadata behind it, as this allows
federal officials to access a computer’s identifying Debra Glassco
number (which can reveal the location of the indi- Rutgers, The State University of New Jersey
vidual, when the communication took place, and
the identities of other unsuspecting parties). They See Also: Domestic Surveillance and Social Media;
noted, too, that other agencies are seeking to fol- Electronic Frontier Foundation; Electronic Privacy
low the lead of DHS by implementing their own Information Center; Federal Privacy Act; Mobile
social media surveillance. For example, shortly Media User Data Collection and Privacy Protection;
after the implementation of the program at DHS, Pentagon Digital Engagement Team; Privacy; Social
the Federal Bureau of Investigation (FBI) initiated Media and Freedom of Information Act; U.S. Pentagon
its own operation, a tool that alerts FBI officials Social Media in Strategic Communications Program.
to social media threats and harvests historical
data from the Web that can later be searched and Further Readings
analyzed for content and location. As well, the Cantor, J. R. and D. Triner. “2012 Privacy
Department of Defense (DOD) follows DHS in Compliance Review of the NOC Publicly
exploring how DOD can forecast how groups Available Social Media Monitoring and Situational
will behave based upon information culled from Awareness Initiative.” http://www.dhs.gov/sites/
376 Developing Nations

default/files/publications/privacy/PCRs/PCR%20 human rights violations, voting rights violations,


NOC%20Situational%20Awareness%20 and corruption. People in developing nations pre-
Initiative%20(FINAL)%2020121108.pdf fer communication through social networks both
(Accessed April 2013). because of interactivity and flexibility and because
Cantor, J. R. and D. Triner. “2013 Privacy Impact social media content is more often displayed in
Assessment for the Office of Operations other languages than English and is often more
Coordination and Planning Publicly Available culturally relevant than other Internet content.
Social Media Monitoring and Situational
Awareness Initiative Update.” http://www.dhs Facebook
.gov/sites/default/files/publications/privacy/PIAs/ Facebook’s stated mission is to make the world
privacy_pia_ops_NOC%20MMC%20Update_ more open and connected, and the Facebook cor-
April2013.pdf (Accessed April 2013). poration has been looking outside of the devel-
Department of Homeland Security. “The Privacy oped world to market its products. This seems
Office.” http://www.dhs.gov/about-privacy-office to make sense, since beyond Facebook’s largest
(Accessed April 2013). market, the United States with 160 million users,
Electronic Privacy Information Center. “EPIC its next three largest markets are all in the devel-
v. Department of Homeland Security: Media oping world, respectively Brazil with 58 million
Monitoring.” http://epic.org/foia/epic-v-dhs-media users, India with 56 million, Indonesia with 43
-monitoring (Accessed April 2013). million, and Mexico with 38 million. Addition-
Electronic Frontier Foundation. “Social Networking ally, over 4 billion people have yet to get access
Monitoring.” https://www.eff.org/foia/social to the Internet, and many subsequently to social
-network-monitoring (Accessed April 2013). media, and a majority of these live in developing
countries.
In a report for the MIT Technology Review,
David Talbot states that Facebook already has a
well-established strategy of offering a Facebook-
Developing Nations centric Internet to those in the developing world.
This began in 2010 with Facebook Zero, which
As people in the developing world are gaining allows Internet carriers to offer a stripped-down
access to the Internet, they join social networks text version of the social network as a free or
at a high rate. Facebook creators have envisioned low-cost service. About 50 carriers in 45 coun-
particular strategies for attracting users in devel- tries participate, and they get revenue when users
oping countries, and as such Facebook is becom- click out of the text-centric Facebook Zero to see
ing a popular social networking platform in such photos or other links displayed in the feed.
countries. Twitter is also growing in importance Facebook is augmenting its strategy of pro-
for developing nations, especially for sharing com- viding a Facebook-centric Internet to those in
munity-related information. People in the devel- the developing world through its new Facebook
oping world often access the Internet and social Home, a collection of apps that lets Facebook lock
networks through their cell phones, which pro- the screens of smartphones and create a cover feed
vide a less expensive and more convenient option that fills those screens with status updates from
than fixed-line connections, and with ownership Facebook friends. Facebook Home might have
of cell phones rapidly increasing, particularly in limited appeal to users in developed countries
Asia and Africa, Internet usage through mobile who might already be besieged with a variety of
phones is now the largest and second-largest smartphone options, but it has a large market of
worldwide on these two continents, respectively. users in developing nations in which smartphone
Social media networks have been useful in adoption is at an earlier stage of growth.
developing nations because they can be an equal-
izer; can help save lives; and are instrumental for Twitter
economic empowerment, public mobilization, Facebook is not the only social media provider
and protest organizing; as well as for documenting expanding quickly into the developing world.
Developing Nations 377

Twitter, YouTube, Flickr, Google+, Google nations such as Japan and Germany are interact-
Chrome, and Instagram are also being promoted ing with others on social media platforms. While
and gaining reputations in various parts of Latin music, movies, and sports are popular topics
America, Asia, the Middle East, and Africa. Twit- across social media users in developed as well as
ter, which now has over 500 million users and developing nations, politics, community issues,
over 200 million active users, has a growing pres- and religion are more often approached by those
ence in the developing world. Among the top 10 in developing nations.
countries with the highest proportion of popula- In Tunisia and Egypt, two nations at the heart
tion with Twitter accounts are, along with devel- of the Arab Spring, more than six in 10 social net-
oped nations (including the United Kingdom in workers share their views about politics online,
first place, the United States in second place, and whereas across the 20 nations surveyed a median
the Netherlands in third place), several develop- of only 34 percent post their political opinions.
ing nations (Chile in fourth place, Venezuela in Similarly, in Tunisia, Egypt, Lebanon, and Jor-
fifth place, and Brazil in eighth place). dan more than seven in 10 social networkers
For countries whose media is strictly controlled discuss community issues online, compared with
by the government, such as Venezuela, Twitter has a cross-national median of just 46 percent. In
become the main source of freedom of speech. In Tunisia, Egypt, and Jordan more than six in 10
Venezuela, there is only one television channel that social networkers include religion in their online
is openly in opposition to the government, and
even this television channel is often self-regulated
due to constant threats of annulling its operating
license. Consequently, over 30 percent of Ven-
ezuelans use Twitter, and many of them engage
on this social media platform to voice their con-
cerns and to let others know what is happening
in the country. Additionally, Venezuelans in the
capital of Caracas often post on Twitter or learn
from Twitter about important community infor-
mation that is not otherwise available regarding
safe commutes to work, streets to take and streets
to avoid, accidents that require help, and vari-
ous types of hazards. As such, police and hospital
representatives have consequently become accus-
tomed to checking Twitter regularly.

Internet Access
According to a 2012 Pew Research Center Report,
fewer people in developing countries have access
to the Internet than in developed countries, but
when getting access to the World Wide Web more
people in developing countries are likely to join
social networking sites than in developed coun-
tries. The report, which examined the state of
social media internationally based on a survey of
20 nations worldwide, found that the vast major-
ity of Internet users in developing nations such
as Mexico, Brazil, Tunisia, Egypt, Jordan, Tur- A wheat farmer accessing information directly from the fields
key, India, and Russia are using social network- using a cell phone in India, a country where half the population
ing sites. The report also found that, conversely, owns cell phones. In 2013, almost a third of those with a cell
less than half of the Internet users in developed phone worldwide connected to the Internet through it.
378 Developing Nations

comments, while cross-nationally only approxi- market all the more as the annual growth rates of
mately 30 percent post anything about religion. developing nations are much higher than those
The Pew report and other reports by the United of developed ones. As developing nations become
Nations (UN) Foundations and by technology established as consumer markets, the costs of
expert groups show how the adoption of cell phones and of data plans continue to decline,
phones has led the way for this growth in social and phone coverage and telecommunications
media usage in developing countries. In 2013, the infrastructures continue to improve, thus making
number of cell phone subscriptions was roughly phones and Internet connections through them
equal to 90 percent of the world’s total popula- increasingly affordable.
tion, while global mobile/cellular penetration was
estimated at 96 percent, and almost a third of Use and Effects
those with a cell phone got on the Internet through Regarding reasons for the widespread use of
it. Asia has the largest and Africa has the second- social media in developing nations, two of those
largest Internet usage through mobile phones, outlined by expert Mike Shoag are that social
enabling those without the financial or infrastruc- media can be an equalizer and can help save lives.
ture means for fixed-line Internet to get online. A Those with little economic power and without
relatively cheap mobile phone is a more realistic access to services can now tap into information
option in Asia and Africa than a fixed-line con- and resources pertaining to education, health,
nection, and it still provides a quite stable way to safety, or financial opportunities in ways that
reach the Internet. Over 60 percent of the people were impossible before mobile phone technology
in Mexico, over 75 percent of the people in Egypt, and social media. In countries in Latin America,
over 85 of the people in Turkey, and over 50 per- Asia, and Africa, people have started to share on
cent of the people in India own cell phones, and and get from social media networks information
many of them employ these for not only Internet regarding survival and life skills and personal and
access but also social media presence. community protection. As a World Health Orga-
In both developing and developed countries nization report recently stated, one emergency
people use cell phones for sending texts, pictures, message can be spread through Facebook or Twit-
and videos, but in developing countries people ter faster than any influenza virus. Additionally,
are more likely to share such items with larger social media provides real-time insight into the
groups through social media, whereas in devel- lives of people, and as such thorough monitoring
oped countries people tend more to share such of social media can help predict disease outbreaks
items with small groups of family and friends and enable remedial interventions more accu-
through texting and conferencing. Addition- rately than traditional methods of prediction and
ally, when using cell phones, those in develop- intervention. As a Chronicle of Higher Education
ing countries are more likely to engage in con- article recently affirmed, social media tracks chol-
versations online, whereas those in developed era better than any health authority.
countries tend more to check the news, consumer Another reason mentioned by Shoag for the
information, and job-related information. success of social media in the developing world
The rising ownership of cell phones in develop- is that social media can be instrumental for eco-
ing countries, followed by the access to the Inter- nomic empowerment. Many individuals, groups,
net and use of social media in such countries, has and communities in developing countries can
been attributed primarily to the emergence of a gain access to microlending programs with help
middle class across the developing world. People from social networks. Additionally, social media
in developing nations are entering the global is increasingly useful to farmers in various parts
market for the first time and are just beginning of the world, who were often tricked because they
to garner the attention of major global brands. did not know the value of the crops they grew
They are earning enough disposable income to before they gained access to social media net-
start buying mobile phones and other products works, and who today are savvier traders because
such as household appliances or means of trans- they can find out the correct prices of their prod-
portation. They constitute an attractive consumer ucts through social media. For example, the
Developing Nations 379

World Bank’s International Finance Corporation Several recent studies have examined the role
has funded a project that helps farmers with infor- of social media in public mobilization and pro-
mation about prices via a short messaging service test organizing in a developing nation through
(SMS) message platform. cases from the Middle East. Social networking
Social media is also useful, for example, to cat- sites including Facebook, FriendFeed, Flickr, and
tle owners in Kenya, who were not able to track a Twitter were central to organizing and publiciz-
cow before the existence of social media, but who ing the postelection protests in Iran in 2009,
can now find out where a cow is through social facilitating solidarity inside the country and in
media. Kenyan authorities use a SMS platform to the diaspora, although these conjugated efforts
find stolen cows, which are expensive in the coun- were ultimately unsuccessful in overthrowing
try and very important for the livelihoods of peo- the regime.
ple in rural areas. A local Kenyan, for example, Social networking sites were also at the core
knew nothing about this platform until one eve- of the uprising in Egypt in 2011. Various groups
ning when her cow disappeared; she was advised including the April 6 Youth Movement, We
to post on the network and her cow as well as the Are All Khaled Said, National Association for
thief were identified within 30 minutes. Change, and Kefaya used social media platforms
to coordinate the spread of a revolutionary mes-
Mobilization and Protest Organizing sage. These groups called for gatherings in Cairo’s
Social media have also become so popular in the Tahrir Square as well as in Alexandria, Mansoura,
developing world because they can be instrumen- and Suez to express outrage over the economic
tal for public mobilization and protest organizing. oppression of the population and the administra-
Social media networks have often been employed tive malfunctioning of the state. Their demand
in actions striving for fairness in recent years. For was for Egypt’s President Hosni Mubarak to
example, the social media campaign of the Invis- leave the country. About 85,000 people pledged
ible Children organization to prevent Joseph Kony on social media to attend the gatherings, and over
and his militia group, Lord’s Resistance Army, a short period of time the revolutionary groups
from forced recruitment of child soldiers in north- gained tens of thousands of Facebook friends and
ern Uganda, the Democratic Republic of Congo, Twitter followers.
and southern Sudan, while so far not having led On January 28, 2011, Mubarak shut off the
to the capture of the rebel leader, has helped bring Internet for five days across the entire nation to
international awareness to the horrific cases of halt the communication flow and coordinated
kidnapping, abuse, and killing of children in the assembly taking place over social media plat-
area. Numerous politicians, activists, and celebri- forms. This outraged the international community
ties from various parts of the world have become and made the protesters even more determined.
involved in promoting the cause, and the African Following the blackout, over 1 million Egyptians
Union, backed by the UN and the United States, joined demonstrations across the country, a ten-
has established a brigade to put an end to the fold increase in the number of participants. The
atrocities in the region. In addition to helping raise day the Internet was restored, social media expe-
awareness about various causes, social media can rienced its highest number of active users from
help organize protests related to such causes. It has Egypt ever.
already been extensively documented that social As the demonstrations continued, some of the
media such as Facebook and Twitter functioned as nation’s most prominent public figures came out
a catalyst in the Arab Spring, enabling protesters in support, and they too posted online comments.
to meet, put their forces together, and resist gov- After 18 days of relentless protest, the unthink-
ernment actions. Social media are arguably becom- able happened: putting an end to 30 years of
ing part of an emerging system of political com- authoritarian rule, President Mubarak heeded the
munication in which discontent can be expressed demand of the Egyptian people and resigned from
even when formally forbidden by an autocratic office. Since the Egyptian uprising, people in the
government and a movement can be organized by developing world have increasingly used social
announcing to people where they should gather. media for political activist purposes.
380 Developing Nations

Citizen Journalism and Human Rights which are arguably catastrophic in many African
People in developing nations have also come to nations, often flourish due to lack of transparency
rely on social media for sharing as well as for and low likelihood of detection. This researcher
learning about human rights violations in various states that elite monopoly over telephonic com-
settings, voting rights violations during elections, munication increases the opportunities available
and corruption at various societal levels. Prior to to commit corrupt acts and decreases the likeli-
smartphones, special gear was needed to capture hood of detection and/or punishment. Conversely,
instances from everyday life in pictures and videos, the use of mobile phones and access to social
and media professionals were the only ones with media through mobile phones helps uncover acts
capabilities not only to capture such instances but of corruption, increases transparency, provides
also to make them broadly known. Many situa- means of detection, and can lead to imparting
tions of social injustice, political abuse, or admin- the appropriate punishments. For example, social
istrative dishonesty used to remain unreported media users can signal to one another, to justice-
either because there were insufficient media pro- oriented organizations, and to the international
fessionals to cover all such cases or even because community instances in which international aid
professional journalists agreed to hide, partake and government resources are appropriated by
in, or benefit from such actions. those in power rather than given to those in need.
Today, almost anyone with a cell phone can take Social media users can also document with pic-
a picture or make a film, and many can share such tures and film abuses and bribery in administra-
materials with the world in nearly real time. This tion, elections, and the treatment of various eth-
has had a dramatic impact on many realms, not nic groups. Bailard also affirms that in order for
least of which is the ability of people in developing mobile phone communication to effectively serve
nations to provide eyewitness accounts of oppres- in combating corruption there is a need for public
sion, violence, and abuse. The images of a young awareness campaigns as well as for coordinated
man who set himself on fire to bring attention to efforts, including through traditional media and
the corruption of local officials in Tunisia, or the social media, of activists inside those countries
video of a female protester who was sprayed with and in the international arena.
tear gas by police in Turkey, captured by locals, A powerful example of social media activism uti-
spread fast through social media, and showed lized for combating corruption comes from India,
the world what was happening in these coun- where social media outcry helped stop President
tries. Moreover, iReport-style mobile apps have Pratibha Patil’s plan to build herself a postretire-
allowed regular citizens to show what occurs dur- ment residence on land meant for military veter-
ing social unrest and to report such situations as ans. On April 11, 2011, moneylife.in carried a lead
police brutality, and iVote-style mobile apps have story uncovering that President Patil had grabbed
allowed regular citizens to monitor elections and 261,000 square feet of land that was intended for
report such situations as vote rigging. facilities for former soldiers. While former-presi-
dents are entitled to secure accommodation paid
Corruption from the national budget, Patil’s project was criti-
A study by Catie Snow Bailard, published in cized because she was trying to do that while she
Political Communication in 2009, outlined the was still in office and at the expense of the military,
use of social media through mobile phones in and also because of the huge size of the piece of
Africa to combat corruption. Bailard writes that land and the luxury of the projected home.
common forms of corruption in countries such After the story broke in moneylife.in, activists
as Cameroon or Namibia include misappropria- used social media platforms including Facebook
tion of aid from international donors and non- and Twitter to provide daily updates (including
governmental organizations; misappropriation of tree cutting on the property, explanations by the
government resources; bribes for basic services, president and her advisers, and reactions of mili-
administrative assistance, special policies, and tary personnel and of opposition forces) and to
licenses; clientelist politics; and favors to ethnic mobilize for action (starting online petitions and
compatriots. Bailard asserts that such practices, asking for street protests). While initially Patil,
Developing Nations 381

who herself had used a combination of traditional social networking platforms. Such a program is
media and social media strategies to win the elec- e-Sri Lanka, partially funded by the World Bank
tions in 2007, refused to give in to the social and supported by the government of Sri Lanka,
media dissent, finally she announced on April 27, through which people in this country were encour-
2011, that she would stop the construction of her aged to build “knowledge centers” through social
residence and return the land to the possession media capabilities.
of the state. Following this scandal, propagated
through social media, Patil decided to not seek Conclusion
re-election as president of India in 2012. Social media are more affordable for those in
developing nations because posting or searching
Culture on social media networks is free beyond paying
In addition to serving health, economic, political, the already decreasing cost of Internet connectiv-
and social purposes, social media networks also ity, and requires little knowledge of technologi-
have a cultural role in the developing world. A cal underpinnings beyond familiarity with getting
study by Amir Hatem Ali, published in the Har- online. Additionally, social media empower indi-
vard Human Rights Journal in 2011, details this viduals to create their own content (for example,
role. According to Ali, there is language dispar- posting on someone’s Facebook wall, posting a
ity on the Internet, with English being its unof- video to YouTube, or tweeting), and as such it
ficial language and over three-quarters of all Web is more convenient for people in the developing
sites being in English, and consequently the Inter- world than more centralized approaches to gen-
net has been more accessible to English-speaking erating content. Social media substantially reduce
people. Before the emergence of social media, the barriers regarding publishing content to the World
lack of online content in languages other than Wide Web by simplifying the process of publish-
English limited Internet development in nations ing, allowing self-expression as well as collective
where English is not the primary language. With action, and encouraging users to become active
the growth of social media, other languages than participants rather than being passive readers,
English are more frequently utilized in the online listeners, or viewers. Thanks to these features of
environment, and this is appealing to people from social media, the next billion people will be easier
developing nations and also offers an opportunity to engage.
to bridge the digital divide.
Additionally, there is cultural disparity on the Sorin Nastasia
Internet, with Western ideas, products, and prac- Southern Illinois University Edwardsville
tices being the main focus and an overwhelming
majority of Web sites coming from developed See Also: Activists and Activism, Digital; Africa,
nations, and consequently the Internet has been North; Arab Spring; Asia; Crowdsourcing;
viewed with reluctance in developing nations Demonstrations, Organizing; E-Democracy; Egypt;
around the world. Again, social media allowed Facebook; India; Indonesia; International Unrest and
people from such nations to contribute and seek Revolution; Iran; Latin America; Microblogging;
culturally relevant and culturally sensitive content Mobile/Smartphone Messaging; Social Media,
and has also made people less inclined to see the Adoption of; Twitter.
Internet as a Western technology that might be a
threat to their local cultures. Growth of Internet Further Readings
use in developing countries, after a period of stag- Ali, Amir Hatem. “The Power of Social Media in
nation, might be related to such aspects. Developing Nations: New Tools for Closing the
Ali provides several examples of instances in Global Digital Divide and Beyond.” Harvard
which the collaboration between the interna- Human Rights Journal, v.24 (2011).
tional community and local agents has resulted Avgerou, Chrisanti. “Information Systems in
in increased abilities of people in developing Developing Countries: A Critical Research
nations to partake in the creation, management, Review.” Journal of Information Technology,
and sharing of local content for local use through v.23 (2008).
382 Diaspora/Migration

Bailard, Catie Snow. “Mobile Phone Diffusion and Diaspora/Migration


Corruption in Africa.” Political Communication,
v.26/3 (2009). Social media provide a particularly fascinating
Fischman, Josh. “Twitter Tracks Cholera Outbreaks entry point to explore diasporas, because dias-
Faster Than Health Authorities.” Chronicle of pora and digital communication platforms are
Higher Education (January 9, 2012). http:// both characterized by paradoxical processes of
chronicle.com/blogs/percolator/twitter space and time compression. The links between
-tracks-cholera-outbreaks-faster-than-health the two processes have only received increased
-authorities/28205 (Accessed June 2013). attention during the last few years, although the
International Telecommunications Union. “The current total number of transnational migrants
World in 2013: ICT Facts and Figures.” http:// would amount to a country that would rank
www.itu.int/en/ITU-D/Statistics/Documents/facts/ among the first 10 in size globally.
ICTFactsFigures2013.pdf (Accessed June 2013). Diasporas online raise questions about the core
Kaplan, Andreas M. and Michael Haenlein. dynamics of cultural globalization spurred by the
“Users of the World, Unite! The Challenges developing World Wide Web and transnational
and Opportunities of Social Media.” Business migration flows: Do they ultimately, globally con-
Horizons, v.53 (2010). nect or divide humans; enable opinion formation,
McNab, Christine. “What Social Media Offers to voice, mobilization, and protest, or new forms of
Health Professionals and Citizens.” Bulletin of the surveillance and censorship; homogenize and bal-
World Health Organization (2009). http://www kanize the Internet or promote diversity; promote
.who.int/bulletin/volumes/87/8/09-066712/en democratization or reinstall hierarchies? Evidence
(Accessed June 2013). for all these processes is emerging and movements
Naghibi, Nima. “Diasporic Disclosures: Social in both directions have been observed.
Networking, Neda, and the 2009 Iranian Etymologically, the term diaspora derives from
Presidential Elections.” Biography, v.34/1 (2011). Greek words for scattering, sowing, and move-
Pew Research Center Global Attitudes Project. ment, while historically the notion was used
“Social Networking Popular Across Globe” mostly to describe Jews living outside Palestine
(December 2012). http://www.pewglobal.org/ or modern Israel. Currently, the term diasporas
files/2012/12/Pew-Global-Attitudes-Project captures the dynamics of people migrating away
-Technology-Report-FINAL-December-12-2012 from their homelands, to describe people living
.pdf (Accessed June 2013). outside of their homelands and to indicate the
Shoag, Mike. “Can Social Media Help Developing geographical locations where these people live.
Countries? Absolutely!” Forum One (June 2013).
http://forumone.com/blogs/post/can-social-media Media and Technology
-help-developing-countries-absolutely (Accessed Previously, migrants became largely uprooted from
June 2013). their origins when having to make do with letters
“Social Media and Mobile Web in the Developing that took a long time to arrive or costly phone calls
World.” JANA. http://www.jana.com/blog/social- to stay in touch with family and friends in their
media-and-mobile-web-in-the-developing homelands. Recent developments of low-cost air-
-world (Accessed June 2013). lines, social media, and affordable long-distance
Talbot, David. “Facebook’s Real ‘Home’ May telephone services allow migrants to maintain
Be the Developing World.” MIT Technology transnational ties with contacts living in the dias-
Review (April 9, 2013). http://www.technology pora and their home countries. Indeed, although
review.com/news/513416/facebooks-real technology developers did not project them as tar-
-home-may-be-the-developing-world get groups, migrants have been early adopters of
(Accessed June 2013). technologies motivated by their desire to keep in
Wilson, Christopher and Alexandra Dunn. “Digital touch with family members and friends and remain
Media in the Egyptian Revolution: Descriptive engaged with developments in their homelands.
Analyses From the Tahrir Data Set.” International Digital technologies are often celebrated
Journal of Communication, v.5 (2011). with freedoms gained through increasing speed,
Diaspora/Migration 383

mobility, unboundedness and deterritorialization, geographic regions. As such, global and deterrito-
while migrants are often found to negatively expe- rialized social media are used by landless popula-
rience deterritorialization as displacement and dis- tion subsets to manifest territorial claims. These
location instead of freedom. With the widespread include Tamil Eelam, Kurdish people, the Free
adoption of digital technologies, those living in Tibet Movement, and Uyghurs. The Sri Lankan
the diaspora may however digitally reterritorial- Tamil diaspora is estimated at 877,000 people.
ize themselves. Being inexpensive, decentralized, On the Tamil Nation Facebook group and other
international, low-threshold, easy-to-operate, and Web sites, blogs, and forum discussion pages
fairly deregulated, social media enable migrants such as eelamweb.com (“aimed at rebuilding
to remain connected beyond their physical envi- Tamil Eelam”) and eelam.com (“advancing the
ronments. Examples include audio- and video- independence of Tamil Eelam”), Tamils living in
chat including Skype and Viber; social network- the diaspora make claims for the nation of Tamil
ing sites such as Facebook and QQ; microblogs Eelam, expressing desire for political autonomy
such as Twitter and Weibo; video sharing sites like in Sinhalese-ruled northern parts of Sri Lanka.
YouTube and DailyMotion; and mobile messen- The “Kurdish question,” which pertains to
ger applications such as What’s App, Nimbuzz, autonomy of the region of Kurdistan in south-
and iChat. Social media and digital technologies west Asia, is increasingly debated online by cyber-
such as the mobile phone have thus altered pro- Kurds. Portions of the estimated 850,000 Kurds
cesses of migration and diaspora formation, as living in the diaspora use blogs such as kurdistan
migrants in the diaspora may experience living in blogcount.wordpress.com (“a blog counting the
a third space—a space not here or there, beyond blogs of Kurdistan”), Facebook groups such as
their homeland and country of arrival. The third the “Support an Independent Kurdish State”
space sustained through social media might be of page, and Twitter hashtags such as #Kurdish to
assistance in coping with feelings of dislocation identify messages pertaining to Kurdish people,
and homesickness. Furthermore, it may provide culture, and politics.
an outlet for the circulation of news, identity and Young Tibetan activists in the diaspora advo-
belonging, arranging for remittances, mobiliza- cate for Rangzen, an independent state of Tibet,
tion, protest, and activism. on social media. They attract users to their cause
Several recent large-scale research projects on Twitter using, for example, the hashtag #Free
have explored the intricate relationships between Tibet. Dharamsala, the capital of the exiled Tibetan
diaspora groups and social media use. Under the community in the Indian Himalayas, is home to
heading of Mig@Net a consortium of European an estimated 150,000 Tibetans. Social media use
researchers studied how migration and gender increased during the 2008 Summer Olympics in
intersect in transnational digital networks. They China and the 2011 community elections in exile.
focused in particular on border crossings, com- Illustratively, Tsering Choedup, an International
munication flows, religious practices, educa- Tibet Network Asia Coordinator, noted,
tion, sexualities, social movements, and conflict/
dialogue (MigNetProject.eu). The e-Diasporas I see social media such as not just as an inter-
Atlas brought 80 researchers using digital meth- mediary to relay news stories but also as an
ods together to map various processes of migrant important and effective tool to directly con-
connectivity. In particular, they traced the online nect individuals together and mobilize the
presence of various groups, including “Moroc- overseas Tibetan diaspora community, and to
cans on Facebook,” “French Expatriates,” and awaken global awareness on the Tibet issue.
also Chinese, Tamil, Tunisian, Palestinian, Rus- Social media also give an opportunity for
sian, Hmong, and Lebanese diasporas, among exiled Tibetans to build a link with Tibetans
others (E-Diasporas.fr). inside Tibet despite China’s Great Firewall.

Political Implications Proxy servers allow users to bypass Chinese Inter-


Several separatist movements use social media to net protocol-address-based geo-located filters and
garner public support for greater autonomy over censorship.
384 Diaspora/Migration

Uyghur people are a Turkic-Muslim minority


group living in the northwestern Chinese Xinji-
ang Uygur Autonomous Region. An estimated
600,000 Uyghur are living in the diaspora.
Uyghur language Web sites Diyarim.com, Salkin
.com, and Shebnem.com were tightly monitored
after July 2009 mass mobilizations by Uyghur
protesters in Urumqi, the capital of Xinjiang. In
September 2009, Xinjiang authorities approved
Internet monitoring legislation, blocking Internet
access for 20 million inhabitants in the region. In
addition, the surveillance of these sites eventually
led to the arrest of hundreds of moderators and
contributors living in China.
Sites maintained by Uyghur people living in
the diaspora have also been blocked by the Great
Firewall of China: Reporters Without Borders
found in October 2009 that 85 percent of Web
sites dedicated to the Uyghur community were
blocked. Nonetheless, a transnational Uyghur
political/cultural space is maintained on platforms
like Facebook (the “Uyghur Community” page),
Weibo, and YouTube as emotional responses and
calls for mobilization circulate alongside Uyghur
language folk songs and Islamic-themed videos.
Social media are also used to mourn dissolved
geographical entities. For example, former Yugo-
slav countries are digitally reunified on Titoville Members of the Tibetan diaspora in the United States march
.com and other sites that disseminate Yugo-nos- past New York’s Grand Central Station on October 10, 2009, on
talgic and retro-socialist discourses. Discourses their way from the United Nations to Times Square. The cultural
published on such sites may downplay the atroci- parade marked the 50th anniversary of exile from Tibet.
ties and traumas of war and conflict.
Furthermore, diasporic media, increasingly vis-
ible on Twitter, Facebook, and YouTube, not only
connect diaspora audiences with their homelands, Beyond rallying for support and providing
they may also provide bottom-up interventions news, digital technologies are also used for activ-
in Western-dominated international news media ism and even sabotage. Tamil cyberactivism, for
flows. During protests in Tunisia, Egypt, Libya, instance, included electronic disruption of Sri
and Syria, postings on Facebook played a chief role Lankan embassy Web sites that Tamil activists felt
in circulating news about political discontent from disseminated propaganda. In a similar vein in early
homelands and the diaspora to mainstream media 2013, Twitter user “@ThisIsGame0ver” defaced
such as CNN and Al Jazeera. The Jasmine Revolu- the official Web site of Sri Lanka’s Media Center
tion of 2011 in Tunisia was fuelled by digital align- for National Security. Palestinians living in the
ments between the homeland and the Tunisian diaspora have aligned themselves digitally with the
diaspora sustained through Twitter, YouTube, and “Boycott, Divestment and Sanctions” movement
DailyMotion and blogs such as Nawaat.org. In by campaigning against Israel on the popular Face-
addition, ElectronicIntifada.net, set up by U.S. citi- book group page “BDS movement.” The interna-
zens of Palestinian origins, has become an impor- tional Anonymous hacker collective has assisted
tant global English-language news outlet providing activist diasporic groups during the Arab Spring by
alternative coverage on Palestine issues. hacking into government Web sites in 2012.
Digerati 385

Other Uses and Concerns See Also: Activists and Activism, Digital;
In addition, everyday use of social media among Arab Spring; Developing Nations; Immigration;
people living in the diaspora provides migrants— International Online Communities; Race/Ethnicity
who are often marginalized in their country of and Social Media; Reporters Without Borders.
arrival—opportunities to assert their voices, pro-
vide alternative depictions of minorities, iden- Further Readings
tify themselves with fellow diasporic subjects as Bernal, Victoria. “Diasporas and Cyberspace.” In
well as their homelands, express belonging, and Diasporas. Concepts, Intersections, Identities, Kim
show solidarity. Living in the diaspora, Indian Knott and Seán McLoughlin, eds. London: Zed
migrants (nonresident Indians or NRIs) may, Books, 2010.
for instance, turn to the three-dimensional vir- Harris, Rachel and Aziz Isa. “‘Invitation to a
tual game environment of Second Life to articu- Mourning Ceremony’ Perspectives on the Uyghur
late a Desi identity (diasporic south-Asianness), Internet.” Inner Asia, v.13/1 (2011).
interacting with avatars (game characters) that, Sehgal, Saransh. “Free Tibet Movement Goes High
for example, combine Indianness and American Tech.” Asia Times Online (2011). http://atimes
popular culture. As the popularity of dedicated .com/atimes/China/NG19Ad01.html (Accessed
discussion forums such as AsianAvenue.com, May 2013).
BlackPlanet.com, and MiGente.com, frequented
by Asian Americans, African Americans, and
Latino Americans, respectively, showcase, social
media may be perceived as safe space to gather,
articulate hybrid identities, and circulate alter- Digerati
native community knowledge.
What remains unclear in the emerging litera- The term digerati is a label used to refer to the
ture on digital media use among migrants are technological elite. Digerati are distinguished
(1) the disparities in technology ownership and innovators and opinion leaders of information
Internet access between diaspora communities technology, cyberspace, social media, and the tech-
living in first world countries and those remain- nological hardware industries. The digerati have
ing in developing countries; (2) the role of social come to fruition in an environment in which the
media in financial transactions and remittances; intersection between information and networked
(3) differences and similarities between economic technology continues to grow. People considered
migrants and refugees; (4) the implications of members of the digerati are technological elites
tracking and data-mining migrant activity by who are professionals at the forefront of the Infor-
government and state regimes; and (5) the role of mation Age. The digerati both understand and
social media in human trafficking, circumventing advance the economic focus on technology and, as
border patrol, and policing. such, have immense control over the flow of digital
Considering the role of digital technologies in information. Control over the means of communi-
diaspora and migration underlines the urgency of cating digital information is a decisive responsibil-
contextualizing social media use. Social media do ity that could plausibly influence the way people
not exist in isolation and use in the diaspora is understand and interpret politics throughout the
shaped by the sociopolitical history of the differ- world. In essence, digerati is a class of people both
ent homelands, the variety of motivations for dis- economically and ideologically.
placement or migration (which may be political, Economically, the digerati develop, finance,
economic, social, or religious), and the present and generate the innovations and products char-
living conditions and social, political, and eco- acteristic of the Information Age. The economic
nomic status of diasporic people in their country underpinnings of the digerati class are distin-
of arrival. guished from more traditional business elites
first and foremost by their business philosophy
Koen Leurs focusing on information as a valuable resource
Utrecht University rather than any material product. In addition,
386 Digg

the digerati are rarely seen as in competition with relationship between the digerati and politics. San-
one another. Instead, the digerati often talk to one torum was a candidate for the Republican nomina-
another about ideas. They encourage innovative tion for president in 2012. Years prior, columnist
breakthroughs in one another. John Brockman Dan Savage started a campaign to redefine a lewd
notes that the cooperative competition character- sexual act as a “santorum” in an effort to defame
istic of the digerati is a key to innovation born Rick Santorum. In turn, when searching “santo-
from within the digerati class. rum” on Google, the first entries that appeared
The digerati also have a unique ideological view were the Web sites constructed by Savage related
of the entrepreneur–worker relationship. Eran to a sexual act. The Santorum presidential cam-
Fisher proposed that the digerati remove workplace paign requested the sites be removed from Google
hierarchy. The traditional workplace is rejected by searches, but Google refused. One can see how the
the digerati, who favor an environment in which digerati at Google made decisions that were based
the workers are the entrepreneurs and the entre- on their philosophies about the diffusion of infor-
preneurs are the workers. At one point in time, the mation and, subsequently, how said decisions could
color of a man’s collar dictated his level of impor- be interpreted as politically charged.
tance within the workforce. The digerati reject col- The digerati are a new class of individuals con-
lars altogether in favor of denim jeans and cotton sidered the cyber- and technological elite. Dig-
T-shirts. In turn, the digerati perceive themselves as erati often have the means to reinforce or alter
equally invested in the success of their endeavors, the exchange of information, including politi-
regardless of traditional workplace labels. cal information; as such, digerati have power to
The term digerati is a hybrid of digital and lite- influence the flow of political information.
rati, a centuries-old Latin term describing the intel-
lectual community who read and critique litera- Bradley J. Bond
ture. Hence, the digerati are those who are society’s University of San Diego
premier digital intellectuals. The term joins other
labels proposed to describe this class of people, See Also: Alpha Blogger; Luddite; Mashable;
such as the virtual intelligentsia or the creative Superconnected; Technology Diffusion Paradigm.
class. The origin of the term digerati as a descrip-
tor of the technological and cyberelite is debatable; Further Readings
however, popular press articles in The Guard- Brockman, John. Digerati: Encounters With the Cyber
ian, San Francisco Chronicle, and The New York Elite. San Francisco: HardWired Books, 1996.
Times have all used digerati to refer to a range of Coleman, Anita. “Interdisciplinarity, Interactivity,
people within the technological elite. Most would and Interoperability for Educating the Digerati.”
consider the premier bloggers, hardware devel- Education for Information, v.23 (2005).
opers, software developers, Web developers, and Fisher, Eran. “The Classless Workplace: The Digerati
social media innovators as members of the diger- and the New Spirit of Technocapitalism.” The
ati. However, the digerati label is appropriate for Journal of Labor and Society, v.11 (2008).
individuals in publishing, business, and academia Langdon, Christopher and David Manners. Digerati,
who influence the economy of the Information Age Glitterati: High-Tech Heroes. West Sussex, UK:
as well. The social media landscape is malleable, John Wiley, 2001.
with an influx of new, formidable players who are
continually altering the face of the digerati.
When one considers the responsibility of the dig-
erati to transform communication technologies and
assign functions for the use of technological innova- Digg
tions, the influence of the digerati on the diffusion
of information to the public becomes clear. In turn, Digg, begun in 2004, was a social news site and
the capacity of the digerati to alter political infor- one of the best-known examples of Web sites rely-
mation also becomes evident. Consider the Google ing on user-generated content, a phenomenon com-
problem of Rick Santorum as a case study in the monly referred to as Web 2.0. Essentially, Digg was
Digg 387

a Web platform where users were able to submit the 2008 Democratic National Convention and,
stories and have other users upvote or digg them. over the next two years, included interviews with
Celebrated as a turning point in the way that news notable political figures such as Bill Clinton, Al
stories were aggregated and disseminated across Gore, John Boehner, Treasury Secretary Timothy
the Web, one of Digg’s strengths was the ability for Geithner, and Federal Communications Com-
stories that didn’t make the mainstream news to mission (FCC) Chair Julius Genachowski. In late
reach a wider audience if there was enough interest 2008, Digg also came under criticism for what
in digging it. While Digg was initially focused on was perceived as a liberal bias as most of the top
technology stories, the site soon became a key way stories on the front page came from left-leaning
for political news stories to spread. Web sites such as Huffington Post and right-lean-
Digg was launched in 2004 by TechTV star ing stories were often buried.
Kevin Rose. The site grew in popularity over the While the 2012 sale and redesign of Digg has
next few years and became one of the most heav- dramatically changed Digg’s form and function,
ily trafficked sites on the Web. In 2012, the site the concept of socially curating the news that
was sold off to a number of companies (including Digg helped to popularize has had ripple effects
LinkedIn, BetaWorks, and the Wall Street Jour- throughout the Web as mainstream media sites
nal) and went under a complete redesign. With included ways to share their content on sites like
the 2012 redesign, the focus has shifted to big- Digg, Reddit, and StumbleUpon as well as social
ger stories dominating the site with more editorial networking sites like Facebook, Twitter, and Tum-
oversight. With this major change, it remains to blr. By 2011, even CNN occasionally let viewers
be seen how this will affect the overall distribution choose which story would air in the next hour
of mainstream versus alternative news stories. of television by voting via text message, demon-
Like earlier social news and bookmarking sites, strating that the idea of crowdsourcing the news
such as Slashdot and Del.icio.us, Digg has long had become a fixture for the public. Regardless of
been used as an example of how the Web democ- Digg’s future after its sale and redesign, the Web
ratizes media coverage of politics and world and social media continue to redefine the limits
events. Rather than have news stories chosen by and possibilities of user engagement with jour-
a group of newspaper editors or television pro- nalism and politics, and the impact of Digg is an
ducers, Digg’s structure (particularly in the older important part of that change.
version) allows that process to happen via crowd-
sourcing. Rather than a small group of people Shayne Pepper
choosing what content makes the front page, that Northeastern Illinois University
decision is made by each individual person who
diggs (votes up) or buries (votes down) a particu- See Also: Content Communities; Delicious.com;
lar story. This process lends itself to alternative Going Viral; Reddit; Social Bookmarking;
views having a chance at the spotlight, but it can StumbleUpon; Web 2.0.
also simply mean that predictably popular stories
reach the front page. Further Readings
While its beginnings were largely devoted to Gane, Nicholas and David Beer. New Media: The Key
technology stories in 2004, by the 2008 presiden- Concepts. Oxford, UK: Berg, 2008.
tial elections political stories soon began to domi- Levinson, Paul. New New Media. Upper Saddle River,
nate both the main page on Digg and media cover- NJ: Pearson, 2012.
age about Digg. The site arguably reached its peak Lievrouw, Leah. Alternative and Activist New Media.
of popularity during this time, and beginning in Malden, MA: Polity Press, 2011.
August 2008, Digg began its Digg Dialogg series, Lister, Martin, Jon Dovey, et al. New Media: A
which was a collection of video interviews with Critical Introduction. London: Routledge, 2009.
prominent politicians and celebrities in which the Meikle, Graham and Sherman Young. Media
questions asked were generated and voted upon Convergence: Networked Digital Media in
by the Digg user community. These Digg Dialoggs Everyday Life. Hampshire, MA: Palgrave
began with House Speaker Nancy Pelosi during Macmillan, 2012.
388 Digital Citizen

Digital Citizen fluid than the traditional party structure typically


allowed for.
In 1997, Wired contributor Jon Katz introduced Despite the fluidity of their understanding, Katz
the concept of the digital citizen. In his original did believe many of their common values were
article, Katz posited that a postpolitical commu- fairly obvious. Digital citizens are libertarian, tol-
nity was developing and brought with it a blend erant, technologically adept, disconnected from
of liberalism (focusing on humanity) and conser- traditional politics, rational, materialistic, and
vatism (highlighting economic positions). In this eager to learn. Most important, they enjoy dis-
way, the new community would directly refute course and discussion. Instead of accepting deci-
the interventionist attitudes of the left and the sions as fact, they choose to ask why and how. In
base intolerance of the right. This new commu- this sense, they will challenge authority when nec-
nity—which Katz referred to as digital citizens— essary and are apt to do so publicly via the Inter-
embraces rationalism, believes in civil liberties and net. Passivity is simply not common. Likewise,
free-market economics, and overall leans toward they share a love for popular culture. While they
moderated libertarianism. Most important, it are attuned to politics, they are far more likely to
believes all of this while actively utilizing available talk about movies and television. These things are
technologies. Since his initial claims, there have not simply entertainment; they are their identity.
been numerous studies of digital citizen, including As would be expected, the digital citizen tends to
another by Katz, and the eventual development of view the population of the world in two catego-
a Bloom’s taxonomy for this American. ries: those who understand and those who do not.
The cornerstone of the digital nation—as per- When it comes to government, the digital citizen
ceived by Katz—is individuals who actively par- has a negative view. Government is wasteful and
ticipate on the Internet. Their professional and clueless—unable or unwilling to be efficient and
social lives revolve around their ability to func- effective with the resources provided to it. They
tion on the Internet. While today this may seem view politicians as uninformed and unwilling to
like commonplace, in 1997—when Katz was work for solutions. The digital citizen simply does
writing—the number of Americans in this cate- not believe in the conventional political process.
gory was rather limited.
In 1997, these individuals seemingly formed Categories and Characteristics
a new social class. Digital citizens then did not After Katz’s initial predictive article, Wired
consist of a representative sample of the Ameri- worked with the Merrill Lynch Forum to con-
can public. Members were young, educated (or at duct a survey assessing Katz’s claims. In an effort
least in the process of gaining an education), and to create a clear profile of the digital citizen, the
typically affluent. They had disposable income survey involved just fewer than 1,500 Americans
and more free time than the average American. who were divided into four categories based on
Most worked in a small number of industries— their usage of e-mail, laptops, cell phones, beep-
higher education, computers, telecommunica- ers (revealing the age of the study), and home
tions, financial, and media. At the time, they were computers. The Wired categories were supercon-
geographically clustered in many of the same nected (e-mail three days a week and all four of
areas where today’s leading tech firms are. Digital the pieces of equipment), connected (e-mail three
citizens were found in New York, the San Fran- days a week and three of the pieces of equipment),
cisco Bay Area, Seattle, Boston, Austin, and the semiconnected (at least one piece of technology),
Research Triangle of Raleigh–Durham–Chapel and unconnected (none of the pieces of technol-
Hill in North Carolina. Originally, most were ogy). Digital citizens were deemed to be those in
male; and a vast majority was white. the superconnected and connected categories. In
With their reliance on the Internet, they also total, based on the survey they represented 8.5
had access to far more information than the aver- percent of the overall American population.
age citizen. Given their continuous education, Connectivity was found to lead to more demo-
they actively sought out opportunities to gain cratic values, more political participation, more
knowledge, making their political beliefs more political knowledge, and better trust of said
Digital Cultures Research Center 389

institutions. Connected Americans are shown to application, analysis, synthesis, and evaluation)
have more political knowledge (as Katz notes, into a digital taxonomy (remembering, under-
more connected individuals were able to iden- standing, applying, analyzing, evaluating, and
tify Newt Gingrich as speaker of the House than creating). The changes reflect the new nature of
knew Seinfeld’s first name is Jerry). learning and gathering information in a digital
Connected Americans are considerably more world.
likely to read books, which contradicts the anti- With the advent of social media, Katz’s hypoth-
literacy claims made by those who are opposed eses become even clearer. Digital citizens use the
to technology. Further, digital citizens are more Internet for both dissemination and deliberation.
likely to be informed and outspoken and have With the plethora of tools available today (even
prodemocratic ideals. They are more likely to compared to 1997), digital citizens now access
have confidence in democracy and take action by the Internet through computers, phones, and tab-
voting. In short, the less connected people are, the lets. They blog, post on Facebook, upload to You-
more ignorant they appear to be. These findings Tube, and tweet on Twitter. And, there are clear
run against some of Katz’s original hypotheses, differences still present between those who adopt
which claimed that digital citizens were not likely and those who do not. If Katz felt there were dif-
to be involved in mainstream politics. Addition- fering levels of citizen usage in 1997, the myriad
ally, critics of the study have pointed out that it of options available today to individuals with an
is almost impossible to distinguish which is the interest in following news or impacting change
cause and which is the effect within these variable through the Internet has only made such divisions
relationships, wondering, for instance, if digital more clear.
citizens are more politically engaged because they
are more technologically sophisticated or if being William J. Miller
more technologically sophisticated is somehow a Flagler College
cognate characteristic of political engagement.
Likewise, some of Katz’s demographic beliefs See Also: Citizen Journalism; Digerati; Digital
were proven to be untrue with the survey results. Government; Luddite; Social Media, Definition and
First, digital citizens are found to be young but Classes of; Superconnected.
not necessarily youths. Connected Americans
are more likely to be in their 40s than their 20s. Further Readings
Just over half of the digital citizens were male. Katz, Jon. “Birth of a Digital Nation.” Wired (1997).
As expected, almost nine out of 10 were white http://www.wired.com/wired/archive/5.04/netizen_
and over half lived in suburban areas surrounding pr.html (Accessed December 2012).
large metro areas. When it comes to education, Katz, Jon. “The Digital Citizen.” Wired (1997).
the results are both confirmatory and perplexing. http://www.wired.com/wired/archive/5.12/netizen_
Connected Americans are far more likely to have pr.html (Accessed December 2012).
graduated from college, but fewer than half are “The Digital Citizen—A New Type of Grassroots
in the category. The connected are economically Activism.” Webroot. http://www.webroot.com/
well-off, with most in the middle class as com- En_US/consumer/articles/ethics-digital-citizenship
pared to those not connected. (Accessed December 2012).
What the Katz article provided was a glimpse
at the development of a subculture in America
based on technological usage and skills. In the
wake of Katz, there have been a rash of scholarly
attempts to better understand what makes digital Digital Cultures
citizens unique and how their technological usage
correlates to political attitudes and behaviors. In Research Center
lieu of the development of digital citizens, there
has even been a transformation of the classical The Digital Cultures Research Center (DCRC)
Bloom’s taxonomy (knowledge, comprehension, is a network hub for researchers from across the
390 Digital Cultures Research Center

University of the West of England. Research- The research conducted by the DCRC revolves
ers from multiple disciplines, including art and around the concept of critical reflexivity, which
design, computer science, cultural and media combines criticality, creativity, and application.
studies, and geography, collaboratively investi- Critical reflexivity incorporates critical reflection
gate contemporary technocultures, how people on ethics, values, and aesthetics and combines
create culture via digital communications, and the creative arts, experimentation, and innovation
applications, practices, and politics of emerging with digital media in an effort to make the cen-
media technologies. Through a variety of publica- ter’s research more useful for its audiences. Much
tions, events, projects, and initiatives, the DCRC of the center’s research is conducted in open-inno-
aims to support and promote research regarding vation studio space. This atmosphere provides
the role and configurations of technology in con- a unique environment where ideas are shared
temporary cultures. through knowledge transfer projects, and design-
ers, artists, and engineers can share expertise to
Research and Initiatives produce more effective research results.
The DCRC conducts research and promotes
initiatives across five broad themes: pervasive Projects and Partnerships
media, play, participatory media, the attention The DCRC also engages in projects with mul-
economy, and connected communities. DCRC’s tiple worldwide partners. The center engages in
pervasive media research focuses on how technol- a range of projects that aim at understanding
ogy is being integrated into the fabric of urban the various applications of new media and how
space, how content creation provides individu- individuals interact daily with technology. These
als new ways of engaging with and in their envi- partnerships work to develop location-based
ronments, and how tagging digital content can applications along with new forms of perfor-
impact advertising, education, and entertainment. mance and narrative and to inform new media
DCRC’s play research, investigating the cultural development strategies.
significance of play and games, has led to the Partnering with Knowle West Media Center,
development of core texts within the field of game the DCRC’s Keeping in Touch project looks at
studies. The center’s participatory media research how communities may be strengthened through
examines how new forms of social media produc- individuals’ everyday uses of mobile media and
tion, such as Web 2.0, alter cultural production. communication technologies. The Measuring
This research, which could be especially relevant Value Networks project pairs the DCRC with the
to politics and political communication, exam- Watershed Media Center to produce a multicrite-
ines the influence of expanding user-generated ria method that organizations can use to measure
content, such as blogs, citizen journalism, peer- the value of their digital networks and leverage
to-peer media distribution, and video and photo them to develop and strengthen their networks’
sharing Web sites, and its impact on culture. The communities. The Creative Citizens: Creative
attention economy research looks at how social Networks project examines online interaction
and technological environments, where many between individuals participating in different
individuals in democratized societies spend their types of networks, both formal and informal, to
lives and time, alter the traditional values of the understand value-creation communication. The
public sphere. This research positions human goals of this project are to understand the poten-
attention as a scarce commodity, with the atten- tials that communication patterns, built around
tion of individuals being estimated, costed, mar- online platforms, may have in the practicalities
keted, bought, and sold via technology. Finally, of creative citizenship, community engagement,
connected communities focus the DCRC’s broad and community-led design and to recognize both
areas of research into the context of social val- the potentials and limitations of digital media.
ues by examining how individuals engage in civic Finally, a project called Microethology investi-
engagement and participatory culture via creative gates the habitual coming together of individuals
citizenship, or the use of creative resources and and technology and considers how digital culture
talents to engage socially and civically. is experienced in everyday life. This project strives
Digital Diplomacy 391

to develop a method for analyzing the everyday Diplomacy, as the art and practice of conduct-
interactions between people and digital media. ing negotiations between nations, is a complex
form of communication that needs different media
Conclusion to reach its target. Through digital media, the
The DCRC produces research aimed at enhanc- actors of diplomacy can listen, publish, engage,
ing knowledge and understanding regarding how and evaluate with innovative and new techniques
technologies are integrated into contemporary that enrich the quality, reach, and impact of their
cultures. Through research, projects, and ini- work. Diplomacy via information communica-
tiatives, the DCRC is able to provide valuable tion technology (ICT) obviously has more power
information and data regarding how individuals to reach and affect target audiences such as non-
engage in digital communication environments. governmental organizations (NGOs), other gov-
ernments, citizens, and others. This approach has
LaChrystal Ricke been called digital inclusion in diplomacy or digi-
Sam Houston State University tal civil engagement.

See Also: Content Communities; Cyberculture; Public Diplomacy


Digital Revolution; Social Media Political Gaming; Conventional diplomacy might be described as
Web 2.0. the ways in which government leaders commu-
nicate with each other at the highest level—the
Further Readings familiar form of elite diplomacy. However, public
Chadwick, Andrew. Internet Politics: States, Citizens, diplomacy, on the contrary, focuses on the ways in
and New Communication Technologies. London: which a country (or multilateral organization such
Oxford University Press, 2006. as the United Nations) communicates with citi-
Creeber, Glen and Royston Martin. Digital Culture: zens in other societies. The term public diplomacy,
Understanding New Media. New York: Open which is associated with the U.S. Information
University Press, 2008. Agency, was coined in the mid-1960s to describe
Gere, Charlie. Digital Culture. London: Reaktion, the conduct of foreign policy by engagement with
2009. foreign publics. Much digital diplomacy is based
Heineman, David and Barbara Warnick. Rhetoric on the principles of public diplomacy.
Online: The Politics of New Media. New York: Technology continues to present new chal-
Peter Lang, 2012. lenges to the way that diplomacy is conducted.
Siler, David and Adrienne Massanari. Critical Cyber- For example, computer databases enable the col-
Culture Studies. New York: New York University lecting and sharing of vast quantities of informa-
Press, 2006. tion, while upgraded networks facilitate instan-
taneous communication. Information has always
been the raw material of two of diplomacy’s basic
tasks—reporting and negotiating. In both cases,
the advantage lies with the side that is better at
Digital Diplomacy using advanced technologies to collect and pro-
cess the data needed for decision making.
Digital diplomacy refers to emerging multidi- When the structure of contemporary digital
mensional platforms that have the potential to diplomacy is analyzed, the four steps observed in
enhance international relations and other politi- any digital diplomacy activity include listening,
cal communication. The Internet and social media publishing, engaging, and evaluating. By listening,
are already being used by national governments to one can find out which blogs, groups, and forums
disseminate messages to sway public opinion and are already discussing the issue; gauge their atti-
influence other countries. At best, these efforts are tudes; and figure out the angles and tones. By
part of an integrated structure that supports stra- publishing messages in news, blogs, videos, and
tegic goals and complements conventional diplo- pictures across the global Web, a presence can
macy tools. be pushed out creatively. In the engagement step,
392 Digital Due Process Coalition

people can encourage questions, take part where comprehension of contemporary diplomacy. The
the debate is happening, and form partnerships program focused on using new social networking
with relevant organizations and online groups. sites, including the creation of a Facebook page
Finally, in the evaluating process, one can explore for the State Department’s Educational and Cul-
whether goals have been achieved. tural Affairs Bureau. The Digital Outreach Team
(DOT) program also established blogs in many
Examples languages including Arabic, Urdu, and Farsi.
One example that supports the idea of the poten-
tial of digital diplomacy was the virtual news con- Conclusion
ference held by Undersecretary of State for Public At its most basic, digital diplomacy offers a new
Diplomacy and Public Affairs James K. Glassman way to solve foreign policy problems using vari-
in 2008. On the virtual platform of Second Life, ous Internet platforms; digital diplomacy is con-
Glassman had a conversation with eight Egyptian ventional diplomacy through a different medium.
political bloggers who had covered the latest pres- It can be said that this new form of diplomacy
idential election in the United States. It was an is a consequence of the emergence of Web 2.0,
international event that a global Internet audience because it makes use of social media’s interactive
had the chance to follow via live Webcast. features. Web sites, Facebook, Twitter, blogs, and
The Public Diplomacy 2.0 Program, established vlogs may now be seen as methods of soft power
by Glassman, was also a turning point in the and as effective management tools.

Ece Inan
Girne American University

See Also: International Examples of Political


Parties and Social Media; International Intervention;
International Social Media and Politics.

Further Readings
Coleman, S. and J. Blumler. The Internet and
Democratic Citizenship. Cambridge: Cambridge
University Press, 2009.
Copeland, D. Guerrilla Diplomacy: Rethinking
International Relations. Boulder, CO: Lynne
Rienner, 2009.
Potter, E. H., ed. Cyber-Diplomacy: Managing
Foreign Policy in the Twenty-First Century.
Quebec: McGill-Queens University Press, 2009.
Wilson D., Jr. Digital Diplomacy: U.S. Foreign Policy
in the Information Age. Washington, DC: Center
for Strategic and International Studies, 2001.

Digital Due Process


James K. Glassman, the former U.S. undersecretary of state for
Coalition
public diplomacy and public affairs, who worked to increase the
use of the Internet in diplomatic outreach, speaking about Iran The Digital Due Process Coalition (DDPC) is
at the New American Foundation in 2010. an alliance of bipartisan political, commercial,
Digital Due Process Coalition 393

and legal interests seeking to reform U.S. laws The DDPC notes that courts apply ECPA incon-
on access to electronic communications/data. sistently and with difficulty and this, they contend,
Launched in 2010, the DDPC has sought to leaves Americans susceptible to cybercriminals,
reform key aspects of the 1986 Electronic Com- sexual predators, and compromised electronic pri-
munications Privacy Act (ECPA). The DDPC vacy rights. Two examples of legal inconsistency
argues that the ECPA is obsolete and inadequate the DDPC notes are how e-mail is subject to dif-
for determining government access to electronic ferent laws based on whether it is being drafted, is
communications/data for criminal investigations. opened/unopened, or is being stored by a service
The DDPC’s work benefits communications provider; similarly, a desktop document may be
companies and their customers by requiring that subject to Fourth Amendment warrant require-
access to data be determined by a consistent (e.g., ment, or possibly not if it is stored in a cloud.
across data types) and a due process (e.g., requir- Kevin Bankston, an attorney with the Electronic
ing probable cause, warrants, and/or judicial Frontier Foundation, has said publicly that coali-
review) protocol. The DDPC works toward its tion members disagreed on several issues, though
goal through a public awareness campaign and they share agreement on the following principles.
through political lobbying. First, they would give private electronic communi-
There are over 96 groups in the DDPC including cation the same protection as physical files stored
the American Civil Liberties Union (ACLU), Amer- in one’s home. Also, law enforcement’s access to
ican Library Association, Amazon.com, Americans information, they believe, should require appro-
for Tax Reform, Association of Research Libraries, priate legal paperwork. Additionally, they would
AT&T, the Brennan Center for Justice, the Center protect private information in either transit or
for Democracy and Technology, Citizens Against storage with access to electronic communication
Government Waste, Competitive Enterprise Insti- based on probable cause and not whether the
tute, Computer and Communications Industry content has been opened.
Association, Dell, eBay, Electronic Frontier Foun- In its stated wish to clarify, simplify, and unify
dation, Google, HP, IBM, Information Technol- rules for communications service providers, users,
ogy and Innovation Foundation, Integra Telecom, and government investigators, the DDPC would
Intel, Microsoft, NetCoalition, Oracle, Reddit, allow exceptions for access without court orders
Salesforce.com, the Progress and Freedom Foun- in emergencies. The DDPC has also claimed to
dation, Tumblr, and Vaporstream. Over 30 lawyers focus on the most frequently arising issues (e.g.,
and professors of law belong to the DDPC. Google probable cause access to cloud, stored email, or
executive Richard Salgado has given congressional private communications, or GPS/location infor-
testimony between 2010 and 2013 in support of mation, or transactional data).
the DDPC. Other organizations have attempted The DDPC notes that requiring a warrant
reform but DDPC has arguably achieved a wider for documents and private communications was
range and diversity of support. raised in 1998 by the bipartisan team of then-
Senator John Ashcroft (R-MO) and Senator Pat-
Reform Attempts rick Leahy (D-VT) in keeping with appeals, court
DDPC argues the ECPA has not been modified rulings, and legal scholarship on the issue. Such
since its enactment in1986, when the World Wide proposals are referred to as the warrant-for-con-
Web and e-mail were not widely commercially tent/location rules, as the DDPC wants a search
available to the public and fewer than 350,000 warrant to demonstrate reasonable grounds in
Americans owned cell phones, albeit without an authorized criminal investigation for tracking
today’s text messaging, Web surfing, and appli- any mobile device and obtaining transactional
cation downloading capabilities. Since 1986, or Web site visit data. This is perhaps meant to
DDPC argues, communication and technology address the occasional practice of making bulk
have become central foci of people’s daily lives requests for information on all of a Web site’s
including e-mail, electronic documents, mobile visitors or all of the online transactions in a juris-
computing, social media, global positioning sys- diction to find possible criminal activity; this is
tem (GPS) technology, and cloud computing. sometimes popularly called a fishing expedition.
394 Digital Government

More recently U.S. Congressmen Jerrold Nadler Privacy; Electronic Frontier Foundation; Electronic
(D-NY) and John Conyers (D-MI) supported the Privacy Information Center; Lobbyists; Privacy.
DDPC’s goals by introducing the U.S. Electronic
Communications Privacy Act (ECPA) Moderniza- Further Readings
tion Act of 2012 that ultimately failed; instead it Digitaldueprocess.org “About the Issue.” http://
was referred to committee. digitaldueprocess.org/index.cfm?objectid
=37940370-2551-11DF-8E02000C296BA163
Effects of Reform (Accessed June 2013).
A survey by Microsoft that suggests that 90 per- Levmore, Saul and Martha Nussbaum. The Offensive
cent of the population and business leaders care Internet: Speech, Privacy, and Reputation.
about the privacy and security of their personal Cambridge, MA: Harvard University Press, 2011.
data in the cloud seemingly validates the shared Swire, Peter and Kenesa Ahmad. Privacy and
principles of the DDPC. As another justification Surveillance With New Technologies. New York:
for the need to reform the ECPA, the DDPC argues iDebate Press, 2012.
that the government currently can compel a service
provider to disclose e-mail contents over 180 days
old with a subpoena and a notice to the user, yet a
warrant is required if the e-mail is 180 days old or
younger. In response to this issue, the Texas State Digital Government
government passed House Bill 2268 in 2013 with
no nay votes in either house of state government. Digital government first emerged in the mid-20th
The bill requires a judge’s warrant for access to century, when computers were introduced into
e-mail regardless of age, but it provides no federal the public sector. Since that time, digital govern-
coverage. As of June 2013 the bill was awaiting ment has moved through a series of overlapping
the signature of Governor Rick Perry. phases, variously emphasizing service delivery,
By protecting the privacy of users of commu- information sharing, and democratic engagement.
nications and technology companies’ products As low-cost, networked, and widely used commu-
and services, reforming the ECPA would arguably nications platforms, social media have potential
profit many of the companies within the coalition. applications for all of these functions. Likewise,
Some sectors of law enforcement and government social media offer governments novel platforms
would arguably oppose reform because the 1986 for internal collaboration, with the capacity
version of ECPA before reform allows for more or to link civil servants across and within various
easier access to electronic information. departments and agencies. Accordingly, a number
Some note how the courts are divided on of governments have developed both external and
whether access to GPS/location information internal social media initiatives, along with poli-
requires a warrant or a subpoena. The DDPC cites cies governing the use of these technologies by the
how Justice Department lawyers have previously civil service.
argued that cell phone customers gave up privacy While some are hopeful about social media’s
expectations when they voluntarily gave that capacity to produce more participatory, transpar-
information to their carriers/service providers. ent, accountable, and effective governments in
The DDPC has offered assurances that reforming the digital age, the role of social media within the
ECPA would not interfere with national security public sector has, as of yet, not been the subject of
or prevent companies’ use of consumer data for rigorous empirical analysis.
marketing purposes.
Early Digital Government
Gordon Alley-Young Computers were first introduced to the public
Kingsborough Community College sector in the 1950s and 1960s. Soon after this,
academics theorized that the computerization
See Also: Center for Democracy and Technology; of government would have dramatic effects on
Cloud Computing; Cloud Computing and Citizen both the policy process and on the organization
Digital Government 395

of public-sector bureaucracies. As they argued, citizens who are unwilling or unable to access
computers would bolster information processing services online.
capacity and disrupt established power struc-
tures and organizational forms. However, by the Democratic Engagement
1980s, research on digital government largely While service delivery was the central focus in
betrayed these predictions. Captured most the early days of government on the Web (and
famously by James N. Danziger and colleagues’ remains a key focus now in programs like the
reinforcement thesis, these studies suggested that United Kingdom’s Government Digital Service’s
computers tended to reinforce rather than undo Digital by Default agenda), many have now
established dynamics in the public sector. While turned their attention to the Internet’s capacity as
perhaps not as influential as initially predicted, a platform for democratic engagement. Initially,
computers, and with them information data- this capacity was explored in a relatively ad hoc
bases, intranets, and office-related software pro- way as particularly innovative ministers, depart-
grams, nonetheless continued to play roles in the ments, or civil servants experimented with online
day-to-day internal operations of governments consultations and chat forums, blogging, online
from the 1960s onward. voting, and e-petitions.
With time, a number of governments intro-
Online Service Delivery duced more comprehensive and sustained online
The advent of the World Wide Web in the 1990s engagement programs. Coinciding with the ris-
introduced new opportunities for government– ing popularity of social media and phenomena
citizen interactions. Seeking cost savings and like crowdsourcing, these programs explore how
improved customer experiences, governments new technologies can support more participatory,
initially focused their efforts on the Web’s appli- transparent, accountable, and effective govern-
cations to service delivery. Using their Web sites, ments. President Barack Obama’s Open Govern-
governments shared information about their ment initiative, the United Kingdom’s Power of
departments and agencies and offered guidance Information Taskforce, and Australia’s Gov 2.0
on how to access public services. With time, Taskforce are examples of such initiatives. While
governments focused not simply on the Web as largely focused on the benefits that will accrue
a platform for sharing information regarding from public-sector transparency and data shar-
services but also as a platform on which those ing (open data), these programs also invoke social
services could be delivered. For example, some media as fruitful avenues for government–citizen
government Web sites now allow citizens to pay engagement.
fines, file taxes, and register changes to personal
information. Social Media in the Public Sector
With a typically lower per-transaction cost than At present, many governments have developed
telephone, mail, and in-person options, online their own social media (such as blogs) in addition
transactions are appealing to governments. That to joining third-party sites like Facebook, Twitter,
said, the public sector has not always proven and YouTube. Typically, governments employing
itself capable of effectively managing contracts social media do so for the following reasons:
with the private-sector information technology
(IT) firms whose systems support these online • To support deliberative exchanges
transactions. Given the high costs of these con- between government and the public
tracts, and in certain cases the high failure rates • To share information about policy and
of online service initiatives, governments—and services
the academics, journalists, and members of the • To solicit and collect public feedback on
public who criticize them—have found reason to policy and services
doubt the value of new IT projects that prom- • For crisis communications (e.g., during a
ise massive savings and improved services. Simi- natural disaster or a security threat)
larly, online service delivery can be slowed by • To advertise job openings in the public
concerns over privacy and data security and by sector
396 Digital Government

• For social marketing (i.e., using market- interactions on social media; social media’s capac-
ing tactics to promote a socially ben- ity to accommodate official state languages and
eficial outcome, such as healthy eating those with disabilities; the definition of an offi-
campaigns) cial government spokesperson in online envi-
• To collect data in support of policy ronments; ownership of government content on
analysis or service delivery social media; and information management in
social media environments. In some cases, gov-
As the above list demonstrates, even though ernments must negotiate tailored terms of ser-
public-sector social media use first emerged amid vice agreements with popular social media sites
discussions of the Internet’s role in democratic to ensure that they can use these sites while also
engagement, in practice social media serve a complying with existing government policies. In
range of ends within the public sector, including addition to policies governing how civil servants
the more established service function of earlier use social media in professional capacities, some
digital government. governments have developed policies governing
In addition to their applications within this civil servants’ personal use of social media. Typi-
range of government–citizen interactions, a num- cally, these policies attempt to ensure that civil
ber of governments are employing social media servants’ personal use of social media does not
internally to support information sharing and betray their commitment to political neutrality
collaboration among civil servants. In some and professionalism.
cases, third-party public platforms like Blogger,
Twitter, and WordPress are used as forums for Amanda Clarke
civil servants to share information and network University of Oxford
with colleagues. In other cases, governments are
developing their own internal social media tools. See Also: E-Democracy; Open Source Governance;
For example, the Canadian federal government OpenGovernment.org.
has developed a cross-government wiki. Titled
GC­Pedia, this wiki enables civil servants to share Further Readings
information, collaboratively build documents, Danziger, James N, W. H. Dutton, R. Kling, and
discuss work-related issues, and network in a K. Kraemer. Computers and Politics: High
secure environment. Social media tools that sup- Technology in American Local Governments.
port collaboration may prove particularly valu- New York: Columbia University Press, 1982.
able when addressing complex, overlapping pol- Dunleavy, Patrick, Helen Margetts, Simon Bastow,
icy issues that demand the input of various units and Jane Tinkler. Digital-Era Governance: IT
across government. Similarly, tools like wikis Corporations, the State and E-Government.
may enable governments to retain valuable cor- Oxford: Oxford University Press, 2006.
porate information that might otherwise remain Government Digital Service. “About the Government
restricted to an individual computer’s hard drive Digital Service.” http://digital.cabinetoffice.gov.uk/
or with employees who leave or retire from the about (Accessed August 2012).
civil service. Due to a lack of empirical research, Government 2.0 Taskforce. “Engage: Getting on
however, it is difficult to discern the extent to With Government 2.0.” http://www.finance.gov
which these benefits have accrued as a result of .au/publications/gov20taskforcereport/doc/
governments’ internal use of social media. Government20TaskforceReport.pdf (Accessed
May 2012).
Governing Public-Sector Social Media Use Orszag, Peter R. Directive on Open Government.
As departments, agencies, and individual civil Washington, DC: U.S. Government Printing
servants adopt social media, governments have Office, 2009.
recognized the need for policies governing their Power of Information Taskforce. “Power of
use. Typically, these policies address issues such as Information Taskforce Report.” http://webarchive
threats to IT security imposed by social media use; .nationalarchives.gov.uk/20100413152047http://
privacy concerns arising from government–citizen poit.cabinetoffice.gov.uk/poit/wp-content/
Digital Media Law Project 397

uploads/2009/03/poit-report-final-pdf.pdf or counsel when presented with legal challenges.


(Accessed May 2012). Seeing the need for legal assistance by individuals
Reddick, Christopher G. and Stephen K. Aikins, and organizations exploring the realms of online
eds. Web 2.0 Technologies and Democratic journalism and media, the founders of DMLP
Governance: Political, Policy and Management began researching and creating means to meet the
Implications. New York: Springer, 2012. demand for legal assistance.
The four founders of the Digital Media Law
Project are David Ardia, Dan Gillmor, Matt Lovell,
and Phil Malone. With backgrounds in a variety
of legal fields, the founders came together at the
Digital Media Berkman Center with a common interest—the
role of law in communication. As a faculty associ-
Law Project ate at the Berkman Center and associate professor
at the University of North Carolina (UNC) School
Formerly known as the “Citizen Media Law Proj- of Law, David Ardia served as the first director
ect,” the Digital Media Law Project was created of the project. Ardia’s connection to the Berkman
in 2007 by four scholars to support independent Center arose through his pursuit and completion
online journalism and media. The Digital Media of a LL.M. from Harvard University. Dan Gill-
Law Project (DMLP) asserts that it contributes mor serves as the director at the Knight Center for
to the progress and maintenance of online media Digital Media Entrepreneurship at Arizona State
sources by providing individuals and organiza- University. Gillmor began his career as a journal-
tions with the education and legal resources nec- ist in the 1980s. Over the course of his career, he
essary for protection. The goal of DMLP is to has worked with the Detroit Free Press, Kansas
encourage proactive thinking about online publi- City Times, and San Jose Mercury News. In 2005,
cation and the law. Gillmor cofounded a Web site for the San Fran-
Citizen media, a term coined by Clemencia cisco Bay area that is now part of Backfence.com’s
Rodriguez, refers to media content produced “hyper-local” community sites. Matt Lovell is an
by citizens, or nonjournalists, and distributed alumnus of Harvard Law School and a partner
through various means to the citizen’s community. of Kirkland & Ellis LLP in a Chicago branch. He
The use of online media as a means of communi- worked for the Berkman Center by serving as the
cation is not limited to citizens: since the start of former assistant director of the Clinical Program
the project more corporations and industries have in Cyberlaw. As with Lovell, Phil Malone has a
adapted to the rise in social media and begun uti- connection to the Clinical Program in Cyberlaw,
lizing these media. As more commercial interests currently serving as director. Prior to his work at
began using social media, members of the Citi- the Berkman Center, he served as a federal pros-
zen Media Law Project changed the designation ecutor with focus on the Internet and computer
of the project to its current name to reflect the software/hardware. Malone served as primary co-
expansion of digital media content. counselor in the U.S. v. Microsoft Corp. trial.
The Digital Media Law Project is hosted by the As a result of the rise and development of tech-
Berkman Center for Internet and Society at Har- nology, members of the Digital Media Law Project
vard University. The Berkman Center is home to provide legal assistance and practical education
research initiatives exploring the development of for online media. Members of the DMLP recog-
cyberspace. The DMLP was inspired by the infor- nize the rights that new business initiatives are
mation gap between traditional news outlets and entitled to under the First Amendment and have
online journalism and media. As the number of developed resources to aid new initiatives through
independent online ventures increased, so did the the initial, and risky, stages of development. The
need for legal protection to ensure the security project has enlisted a community of attorneys and
of such ventures. Independent initiatives differ scholars to respond promptly to legal issues that
from professional news organizations that have arise affecting journalism. Legal resources avail-
resources available to obtain legal advice and/ able to the project’s clients include an online legal
398 Digital Revolution

guide, threat database, and a 50-state pro bono criminal investigation, denial of access, disciplin-
lawyer referral network. ary action, lawsuit, litigation, police activity, and
The three primary goals of the project are subpoena. The project’s Web site also provides a
to provide legal education and training, litiga- threat entry form for any individual or organiza-
tion and pro bono legal services, and a collection tion faced with a legal threat so that the database
and analysis of legal threats present to the online can remain up-to-date.
community. These primary goals are carried out Access to the project’s blog and newsletter can
through DMLP’s five core initiatives. The project be found on its Web site. Following through with
defines its initiatives as “(1) [providing] its detailed its initiatives, DMLP has participated in major
Legal Guide on media and business law topics for First Amendment and intellectual property cases
nonlawyers; (2) [providing] its searchable Data- through the filing of amicus curiae briefs. Such
base of Legal Threats directed at online publish- cases include Barnes v. Yahoo! Inc, No. 05-36189;
ers; (3) a nationwide attorney referral service, the Wright Development Group LLC v. Walsh, No.
Online Media Legal Network; (4) a Research and 08-2783; and Barclay’s Capital, Inc. v. Theflyon-
Response initiative to address breaking issues and thewall.com, Inc, No. 10-1372-CV.
trends in digital media law; and (5) its regularly
updated Blog and Newsletter on current issues in R. Bruce Anderson
media law, technology law and journalism.” The Christine Rose Warne
mission of DMLP is carried out through these five Florida Southern College
initiatives and continual research efforts.
The DMLP’s Legal Guide addresses the rights See Also: Berkman Center; Center for Civic Media;
and responsibilities of individuals and organiza- Citizen Journalism; Committee to Protect Journalists.
tions using online publication. The guide provides
information on many legal issues that may arise Further Readings
as a result of or in reference to online publication. Berkman Center for Internet and Society at Harvard
The legal guide is intended for use by citizens, University. “Berkman Center Fellowship
regardless of formal legal training, looking to cre- Opportunity: Digital Media Law Project Fellow.”
ate items for online publications. The guide can http://cyber.law.harvard.edu/node/6791 (Accessed
also be utilized by anyone interested in the subject July 2013).
of online journalism and the rights of its creators. Digital Media Law Project. “About the Digital Media
The guide is available online through the DMLP Law Project.” http://www.dmlp.org/about/digital
Web site. The guide can be searched by key word -media-law-project (Accessed July 2013).
and browsed by state or by section. Digital Media Law Project. “Core Initiatives.”
Individuals and organizations seeking to begin http://www.dmlp.org/about/initiatives (Accessed
new journalism initiatives can benefit from the July 2013).
pro bono legal assistance DMLP has provided Digital Media Law Project. “Founders.” http://www
the Online Media Legal Network. Launched in .dmlp.org/about/founder (Accessed July 2013).
2010, the Online Media Legal Network (OMLN) Online Media Network. “Our Mission.” http://www
includes attorneys, law school clinics, and in- .omln.org/aboutus (Accessed July 2013).
house legal counsel from across the United States. Rodriguez, Clemencia. Citizens’ Media Against
The purpose of OMLN is to provide legal assis- Armed Conflict: Disrupting Violence in Colombia.
tance at little or no cost to online journalism ini- Minneapolis: University of Minnesota Press, 2011.
tiatives and digital media creators.
The Database of Legal Threats provides users
with online speech threats including access to pre-
vious lawsuits, subpoenas, and cease and desist
letters. Users can search the database using full- Digital Revolution
text search or through categorization of entries.
The types of threats available through the data- In an attempt to cast light on the term digital
base include correspondence, criminal charge, revolution, it is convenient to make a parallelism
Digital Revolution 399

with the Industrial Revolution, which took place a key element of the productivity model. There-
during the 18th and 19th centuries and had sig- fore, technologies of information and commu-
nificant consequences on social, economic, and nication represent catalyst forces, which have
cultural conditions. Certainly, the Industrial pushed forward and enabled changes in politics,
Revolution marked a major turning point in in the structure of society, and in work organiza-
history: For the very first time, living standards tion. Moreover, people’s capacity to get to know
underwent unprecedented, sustained growth global events and react instantaneously through
after the transition from an agricultural-based online communication has transformed the
economy toward a machine-based manufactur- international society into a global village. This
ing one—the introduction of steam power, water revolution has marked a new age: the Informa-
wheels, machine tools, and so on. The first Indus- tion Age.
trial Revolution started in the 18th century and Together with the term postindustrial society,
merged into the second Industrial Revolution the information society is often compared or
in the second half of the 19th century with the identified with the following concepts: post-Ford-
development of the internal combustion engine ism, superindustrial society, postmodern society,
and electrical power generation. knowledge society, information revolution, liquid
The digital revolution has often been referred modernity, and digital society or network society,
to as the third industrial revolution and implies among others.
the change from analog mechanical and elec- On the whole, new technologies are not only
tronic technology to digital technology, occur- typical features of the information society but also
ring since the 1980s throughout the present day. a necessary condition or prerequisite for this soci-
The digital revolution is both a manifestation ety to exist and evolve. Nevertheless, their nature
and result of the emergence of information com- is not democratic: Information and communica-
munication technologies, and thus, inaugurates tion technologies have become another element of
the Information Age. This revolution entails stratification among people and countries.
mass production and widespread use of digital
logic circuits and its derived technologies—that Uneven Spread: The Digital Divide
is, the computer, digital cellular phone, and fax Certainly, there is evidence of striking inequalities
machines. The important technological, social, in the networked world regarding use, knowledge,
economic, and political consequences brought or access to information and communication
about explain its revolution-like nature. The technologies. The digital divide can be referred
information society represents the natural envi- to as unequal rates of Internet penetration, either
ronment of this phenomenon. among developing and developed countries—the
global digital divide—or inside the same coun-
The Information Society try—the social digital divide.
The term information society became popular in In wealthy countries, access to digital tech-
1980 through the work of Japanese sociologist nologies has been much more widespread than
Yoneji Masuda, The Information Society as Post- in developing countries. The gap is a question of
Industrial Society. Masuda recalls the notion accessibility and of quality of service. For instance,
of postindustrial society, which was previously some developing countries might be construct-
coined by Alain Touraine. ing infrastructures to expand new technologies.
As a continuation of the industrial society, Yet, they might have rejected fiber optics—which
in the postindustrial society information is a transmit faster signals—because the technology
decisive factor of economic activity. Certainly, is more expensive than slower cable. Economic
a preindustrial society depends essentially on development appears as one explanatory variable
commodities; an industrial society is organized of the global digital divide, which occurs once
around the use of energy to produce goods; again between rich and poor societies. Politics is
and in a postindustrial society, information— another factor to take into consideration. As a
the creation, distribution, use, integration, and matter of fact, in some African countries, state-
manipulation—information technology (IT) is owned technological firms have created de facto
400 Digital Revolution

situations of public monopolies, leading to higher technological tools should be available for all in
Internet costs for citizens. an inclusive information society. Efforts and strat-
Regarding technological disparities inside coun- egies to mitigate the digital divide should intensify.
tries, scholars have concluded that diversification
in Internet use in western Europe and the United Cyberpolitics
States has to do with patterns of household income, New technologies—the Internet, mobile phones,
education, and occupational status. These factors and tablets—have the capacity to strengthen
explain as well the uneven spread of “old” mass civic society and consolidate democracy around
communications, that is, cable, satellite television, the world. In postindustrial societies, significant
videocassette recorders (VCRs), and fax machines. institutions of representative democracy—parlia-
Information and communication technolo- ments, political parties, and government depart-
gies offer new opportunities to attain higher lev- ments—have established Web sites where they
els of development. Considering their capacity to outline their goals and tasks, post official docu-
reduce many traditional obstacles—for example, ments, and release updates and announcements.
time and distance—these technologies have great These Web pages enhance government trans-
potential to benefit millions of people. In this light, parency and accountability. Regarding political

A young indigenous man in Brazil works on a computer in 2010. The computer center was originally set up with the assistance of the U.S.
Agency for International Development (USAID) as part of an effort to narrow Brazil’s digital divide. In less developed countries, disparities
in access to technology have been found to be related to infrastructure cost, political issues, and economic underdevelopment.
Digital Revolution 401

parties, online instruments have contributed to culture, and entertainment; facilitating adminis-
fund-raising, to improve management and orga- trative or commercial transactions; and becom-
nization, and to diffuse ideas or publicize elec- ing a fundamental tool in the workplace. In few
toral programs. words, the manifestations can be seen in all orders
Campaigning and voting have substantially of life: from reading an e-book, Skyping with a
benefitted from the potential of digital technolo- friend living in another country, booking a hotel,
gies. Indeed, the development of social media and buying and downloading music on a cell phone,
digital marketing strategies in the 2008 Barack applying for a job, paying bills and taxes online,
Obama presidential campaign has transformed sending money from a laptop, holding a Web con-
the classic mechanisms of political communica- ference with business partners, or participating in
tion. In the recent 2012 presidential election, both online forums or blogs. The capital impact of the
candidates—Barack Obama and Mitt Romney— phenomenon explains its revolutionary dimen-
made special emphasis on cyberpolitics. sion and scope.
Electronic voting technology has been improved Although people find themselves in a globalized
and become rather popular in the last decade. As society, the digital revolution is not yet a global,
a result, countries such as the United Kingdom, comprehensive revolution: There are still notice-
Estonia, and Switzerland have implemented this able inequalities in the use and access to modern
voting system in governmental elections and ref- technologies around the world and even inside
erenda. E-voting has also been used in Canada’s developed countries.
municipal elections and primary elections in the In addition, this study has underlined the posi-
United States and France. tive side of digital technologies. However, the new
In transitional regimes, digital tools have had a media represent serious dangers and threats—
gigantic influence in the promotion of democratic cybercrime. At the same time, they entail real chal-
change. The use of Twitter in the coordination of lenges for the law to define new types of crimes
different revolutions and protests has resulted in and for police forces to establish mechanisms and
the term Twitter revolution. In this respect, it is procedures to capture computer criminals.
convenient to mention civil opposition against There is no need to speculate about supposed
fraudulent voting in Moldova (2009), Iranian tension between representative democracy and
election protests (2009–10), and the dissolution direct democracy after digital politics. Direct
of authoritarian regimes in Tunisia (2010–11) democracy is not going to replace representative
and Egypt (2011). governance. On the contrary, digital techniques
Civic engagement and activism have also can nurture deliberation and discursive methods
adapted to virtual societies, maximizing their orga- of decision making, which will invigorate politi-
nizational linkages and networking skills in an cal participation both through representative and
attempt, on the one hand, to consolidate democ- participatory channels.
racy in Western civilization, and on the other hand, The potential of digital technologies is to be
to promote transition processes in autocratic sys- explored and developed throughout the new mil-
tems. Finally, one of the most innovative effects lennium. The ideal horizon envisaged evokes the
of the digital revolution has been the revitaliza- concept of technoromanticism: Romanticism is
tion of direct democracy. Definitely, the interac- reinterpreted in the new age, attributing to tech-
tive capacities of new technologies have enhanced nologies the capacity to enhance the power of
citizen participation and deliberation, creating a imagination, restore the role of genius, and bring
sort of virtual agora or digital public sphere where about unity.
digital citizens discuss matters of mutual interest.
In this discursive space, public opinion is formed Leocadia Díaz Romero
and exerts influence on political action. Independent Scholar

Conclusion See Also: Campaigns, Presidential (2008);


The digital revolution has had a multidimensional Campaigns, 2012; Digital Citizens; Economic and
nature, reaching the world of politics, finance, Social Justice.
402 DipNote

Further Readings and engagement of DipNote expanded to include


“Declaration of Principles.” World Summit on the frequent reporting on the travels, speeches, and
Information Society, Geneva, December 12, 2003. work of the secretary of state as well as dissemi-
Hoppit, Julian. “The Nation, the State, and the First nation and translation of the president’s speeches
Industrial Revolution.” Journal of British Studies, and public addresses. This included extensive
v.50/2 (2011). efforts by DipNote to circulate Barack Obama’s
Karpf, David. The MoveOn Effect: The Unexpected historic Cairo speech, which was translated into
Transformation of American Political Advocacy. 10 different languages.
New York: Oxford University Press, 2012. DipNote partly seeks to challenge the main-
Lucas, Robert E., Jr. Lectures on Economic Growth. stream news media and offer an alternative source
Cambridge, MA: Harvard University Press, 2002. of information on U.S. foreign policy by allowing
Masuda, Yoneji. The Information Society as Post- participants to discuss important foreign policy
Industrial Society. Bethesda, MD: World Future issues with senior officials. However, there is very
Society, 1980. little interaction between blog authors and com-
McHale, John. Communicating for Change. Lanham, mentators, as it appears that DipNote encour-
MD: Rowman & Littlefield, 2004. ages more interactions among readers. Neverthe-
McLuhan, Marshall. The Gutenberg Galaxy: The less, DipNote is a moderated blog with all posts,
Making of Typographic Man. Toronto, Canada: comments, and questions being reviewed before
University of Toronto Press, 1962. posting. Sponsored and operated by the U.S.
Morozov, Evgeny. The Net Delusion: The Dark Side Department of State, it does not, however, rep-
of Internet Freedom, Philadelphia: Perseus, 2011. resent official government communication. Vari-
Norris, Pippa. Digital Divide. Cambridge: Cambridge ous bureaus within the State Department supply
University Press, 2001. most of the information posted on DipNote. For
Touraine, Alain. The Post-Industrial Society, New example, public affairs officers, who often travel
York: Random House, 1971. with the secretary of state, are constantly on the
lookout for potential content.
DipNote is managed by the Office of Digital
Engagement under the Bureau of Public Affairs.
The Office of Digital Engagement works across the
DipNote State Department’s units to organize and update
information across numerous social media plat-
DipNote is the first official blog of the U.S. Depart- forms employed by the State Department, includ-
ment of State. DipNote was created in 2007 dur- ing DipNote. A central editorial board manages
ing the George W. Bush administration with Con- the content of the blog by soliciting contributions
doleezza Rice as secretary of state. The blog was from numerous authors within the State Depart-
created with an American public in mind as a ment, U.S. Diplomatic Corps, and Foreign Service
part of government public affairs efforts. The idea officers in embassies abroad. In addition to inter-
behind the blog’s creation was to bring transpar- nal staff who post daily updates, moderate com-
ency to the State Department’s activities, educate ments, and provide daily links to leading news
people about its work, and create space for open stories in international relations, blog contribu-
and constructive dialogue. The blog came alive tors range from ambassadors to operatives.
on September 25, 2007, with a first post by then Expanding the digital presence of the U.S.
spokesperson Sean McCormack. Department of State, DipNote represents an
In 2009, DipNote was reformed with the launch effort of American government to engage in
of the 21st Century Statecraft, a new approach to cyberdiplomacy and public diplomacy 2.0. The
foreign policy through innovation developed by blog is a space where the department aims to
the State Department, which operates within the provide an alternative version of events to main-
context of an array of “smart power” public diplo- stream media as well as promote a discussion
macy techniques initiated by former secretary of surrounding U.S. foreign policy using Web-based
state Hillary Clinton. As a result, the objectives communication technology and engaging various
Disaster Relief 403

publics via social media. Content from DipNote DipNote. “Official Blog of the U.S. Department
is shared on the official State Department Face- of State.” http://www.blogs.state.gov (Accessed
book profile, Twitter account, YouTube chan- May 2013).
nel, Flickr account, Google +, and Tumblr. The Gilpin, D., E. Palazzolo, and N. Brody.
blog is structured so that visitors can browse the “Socially Mediated Authenticity.” Journal of
stories and posts by issues and regions. In addi- Communication Management, v.3 (2010).
tion, a social media dashboard on the home page U.S. Department of State. “Office of Digital
allows one to see easily most recent tweets, You- Engagement.” http://www.state.gov/r/pa/ode/
Tube videos, and photos on Flickr. Such energetic index.htm (Accessed May 2013).
online presence across various social media plat-
forms allows diplomats to more effectively use
the power of multimedia, images, videos, audio,
and information to inform the American public.
For example, DipNote allows one to easily track Disaster Relief
the diplomatic activity of Secretary of State John
Kerry on an interactive travel map and tweet him In recent years, the world has been hit with a
questions. series of big disasters, such as Hurricane Katrina
Although the general mission of the blog is to in New Orleans, earthquakes in Haiti and in vari-
manage public affairs and to inform U.S. pub- ous parts of Asia, the tsunami in Indonesia, and
lics exclusively, the content of the DipNote blog the earthquake and tsunami in Japan. Millions of
addresses global audiences and often attracts people worldwide are affected annually by such
comments from all over the world. In this sense, disasters, and in the United States alone hundreds
DipNote becomes a platform through which of people die yearly in such disasters. Due to the
diplomacy is portrayed publicly, serves as a win- rising frequency of natural and human-made
dow to American public diplomacy efforts, and disasters in various parts of the world and even at
creates a space for global dialogue. a global scale, there is an increasing need for fast
Despite the fact that DipNote generates mod- and effective communication about damage and
est traffic, it attracts visitors from more than 170 coordination of responses.
countries. The blog is most often accessed from In the past several decades information and
China, Saudi Arabia, Morocco, and Iran. Because communication technologies (ICT) have greatly
the blog offers an opportunity for foreign service helped such communication and coordination,
officers to inform the public and engage in foreign and in the past several years social media have
policy discussions and debates, a significant por- also provided means of expression and oppor-
tion of the traffic could also be originating from tunities to aid in situations of disaster. Despite
American government employees abroad. some concern about the legitimacy and reliability
of information provided through such platforms,
Anna Klyueva ICT and social media are contributing to sharing,
University of Oregon seeking, and synthesizing data, conveying opin-
ions and emotions, and organizing, managing,
See Also: Center on Public Diplomacy; Foreign and synchronizing relief.
Policy; Institute for Public Diplomacy and Global Public reaction to natural disaster has become
Communication; Office of Government Information an increasingly politicized phenomenon, made all
Services; Pentagon Digital Engagement Team; Public the more impactful by its amplification via social
Affairs Council; USAIDs Impact Blog. media multiple leveraging. During election cycles,
especially, the human and economic fallout from
Further Readings hurricanes, earthquakes, tornados, floods, and
Arsenault, A. “Public Diplomacy 2.0.” In Toward tsunami has become an opportunity for recip-
a New Public Diplomacy: Redirecting U.S. rocal finger-pointing within the national media
Foreign Policy, P. Seib, ed. New York: Palgrave discourse, as opposing parties seek to leverage
Macmillan, 2009. public suffering by developing critical rhetorical
404 Disaster Relief

for and give input outside of the official reports,


and to make critical decisions about, for example,
heeding warning and making plans to evacuate.
Computer technology has been useful in emer-
gency and disaster response and relief. Examples
include residents’ accessing of computers con-
nected to the Internet in public libraries dur-
ing various Gulf Coast hurricanes in the United
States to check for situation updates, look for
missing family members, and communicate
with loved ones; farmers’ usage of a grassroots
computer network in their area in the foot-and-
mouth disease outbreaks in the United Kingdom
Both government agencies and citizens are using social media to exchange information, talk to each other, and
extensively during natural disasters. This survivor of severe give emotional support; and donors’ employ-
flooding in Tennessee used a smartphone on May 5, 2010, to ment of a broad digital network, with partici-
share photos of damage to her home in Nashville on Facebook. pants from almost 100 countries, after the 2004
tsunami disaster in Indonesia, to identify local
needs, check assistance pledges, and make addi-
tional contributions.
narratives about their opponents’ responses and As technology is advancing, so are the ways
reactions to events and valorous narratives about in which it is utilized in disaster response. Social
their own. Although the politicization of disaster media technologies including Internet forums,
scenarios like Hurricanes Sandy and Katrina does Weblogs, social blogs, microblogging, social net-
not preclude the possibility of there being truth in works, podcasts, instant messaging, and crowd-
the accusations of, for example, institutional neg- sourcing are becoming the latest tools in the
ligence and/or insufficient government response, disaster preparedness field because they allow
the extended mining of such scenarios in order to imparting and sharing of information quickly
gain strategic political advantage appears to be a by regular citizens and elected officials while the
growing trend. disaster is still unfolding or in its immediate after-
math. Social media platforms are thus becoming
Use of Technology the newest go-to tool in cataclysmic situations.
As disasters affect the welfare of individuals and
family groups, as well as the well-being of com- Examples
munities and even nations, they serve as catalysts In the United States, Facebook, Twitter, Skype,
for innovative uses of computer technologies and smartphone apps were actively used to pro-
and social media. As researchers Jeanette Sutton, vide real-time situation updates during the 2007
Leysa Palen, and Irina Shklovski assert, disaster California wildfires, the 2009 Red River flood, the
situations are nonroutine events that result in 2009 Oklahoma grass fires, and the 2011 tornado
nonroutine behaviors. In times of disaster, people that devastated Joplin, Missouri. With aid from
and organizations adapt and improvise to suit social media platforms, many people from the
conditions as needs demand. Although in the regions hit by these disasters identified dangers
United States and around the world relief agen- and sought help, whereas others from outside the
cies have flexible structures that allow them to regions affected by the disasters found informa-
accommodate the particularities of the situation tion about loved ones living there or contributed
in order to pursue warning, rescue, and recovery to the relief efforts. Designated digital communi-
operations, they do not always successfully inter- ties to share information and resources were also
act with publics who might be in panic, in doubt, developed specifically for use in some of these
or in expectation of rapid interventions. Such disasters. During the 2007 California wildfires,
publics often leverage their own networks to ask RuralSite was a short-lived but well-used simple
Disaster Relief 405

bulletin board created for a small rural commu- During the earthquake in Haiti in 2010 as well
nity directly in response to the wildfires, whereas as during the disasters in Japan in 2011, social
MountainSite became a mature and resourceful media users constituted a volunteer base through
online community developed as a place where Ushahidi, an application which allows the cre-
regional residents could get information. ation of maps of first respondents in disaster
In 2010, the Red Cross published a research zones. Additionally, in the Japan disaster over
report based on a survey of 1,054 people in the 8,000 social media reports allowed the creation
United States about their expectations from and again through Ushahidi of a large map with details
use of social media during and after disasters. The about shelters, food stores, cell phone charging
survey data showed that Facebook was the most centers, and road closures. Other crowdsourcing
popular social media platform, with over 58 per- tools such as OpenStreetMap and GeoCommons
cent of the respondents maintaining a Facebook were also utilized in disaster relief in these con-
account, and also the preferred channel for post- texts to help match needs with resources.
ing eyewitness testimony or information regard-
ing safety. Analysis
Twitter was also high in both current use and As social media are being utilized for communi-
user preference for communication in case of a cation and coordination in situations of disas-
disaster. As expected, the study also showed that ter, reflections about their uses, opportunities,
the 18-to-35-year-old respondents were more and challenges have also began to emerge. In the
likely to engage in social media activity in a situ- United States, a 2011 Congressional research
ation of disaster than older people. As Facebook report argues that the use of social media for
currently has over 1 billion users and Twitter over emergencies and disasters may be conceptualized
500 million users worldwide, it is expected that as two broad categories: a passive use to dissemi-
they will continue to be the predominant media for nate information and receive user feedback via
disaster information and relief in the United States incoming messages, wall posts, and polls; and a
and internationally, although other social media systematic use as an emergency management tool.
platforms will also be employed in disaster relief. The systematic use might include conducting
After the Haitian earthquake in January 2010, emergency communications and issuing warnings,
many people showed what was happening and receiving and responding to victim requests for
shared their personal experiences by posting texts, assistance, monitoring user activities to establish
pictures, and videos on blogs, Facebook, Twitter, situational awareness, and using uploaded images
Flickr, and YouTube. Within just 48 hours, the to create damage estimates. The report states
Red Cross received 8 million U.S. dollars in dona- that the passive use represents the way in which
tions directly from texts on social media sites. emergency management organizations, includ-
In China, microblogging through a local site, ing the Federal Emergency Management Agency
Sina-Weibo, was used in response to the Yushu (FEMA), currently employ social media, whereas
earthquake in April 2010. According to a 2011 the systematic use should be a goal for such orga-
study, people used this microblogging system for nizations. The report finds, however, that many
four major purposes in the context of the Yushu problems regarding use are at least partially due
disaster: situation update, opinion expression, to the emerging state of the social media.
emotional support, and calling for action.
After the Japan earthquake followed by a tsu- Recommendations
nami and by nuclear failures in March 2011, resi- This congressional research report also outlines
dents of the areas affected by the disasters used several lessons learned or best practices regarding
Facebook, Twitter, and Japanese social networks the use of social media for emergency manage-
to keep their relatives and friends as well as the ment and relief administration purposes. These
national and the international communities up- include the need to identify target audiences for
to-date, whereas relief agencies also used such the applications, such as civilians, nongovernmen-
networks to provide help where it was needed tal organizations, volunteers, and participating
and to coordinate the aid flow. governments; the need to determine appropriate
406 Documentaries, Social Media, and Social Change

types of information for dissemination; the need Further Readings


to disseminate the information of most interest to Gao, Huji, Geoffrey Barbier, and Rebecca Goolsby.
the public; and the need to identify any negative “Harnessing the Crowdsourcing Power of Social
consequences arising from the application and Media for Disaster Relief.” Intelligent Systems,
work to eliminate or reduce such consequences. IEEE, v.26/3 (2011).
According to the report, the negative conse- Hughes, Amanda L., Leysa Palen, Jeanette Sutton,
quences that can arise from use of social media Sophia B. Liu, and Sarah Vieweg. “‘Site-Seeing’
platforms in disaster relief include instances in Disaster: An Examination of On-Line Social
of inaccurate information (e.g., after the 2011 Convergence.” In Proceedings of the Fifth
disasters in Japan tweets about persons who International ISCRAM Conference. Washington,
were considered disappeared were retweeted DC: ISCRAM, 2008.
even after the victims had been found), mali- Lindsay, Bruce R. “Social Media and Disasters:
cious activities (ranging from mischievous Current Uses, Future Options, and Policy
pranks to acts of terrorism), technological limi- Considerations.” Washington, DC: Congressional
tations (such as those related to power outages), Research Service, 2011.
administrative cost (regarding polling and feed- Qu, Yan, Chen Huang, Pengyi Zhang, and Jun
back and also regarding data storage and com- Zhang. “Microblogging After a Major Disaster
pilation), and privacy issues (about the potential in China: A Case Study of the 2010 Yushu
for the collection, retention, and data mining of Earthquake.” In Proceedings of the ACM
personal information by the federal government Conference on Computer Supported Cooperative
with respect to its use of social media for disaster Work. New York: ACM Press, 2011.
recovery purposes). Skarda, Erin. “How Social Media Is Changing
FEMA has taken into account such consid- Disaster Response.” Time (June 9, 2011).
erations as those outlined in the congressional Sutton, Jeannette, Leysia Palen, and Irina Shklovski.
research report, and in 2011 it implemented “Backchannels on the Front Lines: Emergent
social media strategies into its emergency manage- Uses of Social Media in the 2007 Southern
ment plans. Additionally, the U.S. Department of California Wildfires.” In Proceedings of the Fifth
Homeland Security announced that it will revise International ISCRAM Conference. Washington,
its terrorism advisory system, including a provi- DC: ISCRAM, 2008.
sion for alerts to be sent out over social media Zook, Matthew, Mark Graham, Taylor Shelton,
networks “when appropriate.” and Sean Gorman. “Volunteered Geographic
FEMA and the Federal Communications Com- Information and Crowdsourcing Disaster Relief:
mission, along with the mayor of New York A Case Study of the Haitian Earthquake.” World
Michael Bloomberg, also unveiled in 2011 PLAN Medical and Health Policy, v.2/2 (2010).
(Personalized Localized Alert Network), the first
geographically targeted emergency notification
system in the United States, which sends free emer-
gency alerts to enabled mobile devices to warn
citizens of imminent threats in their area. In other Documentaries,
countries, similar attempts to integrate social media
into disaster relief are being made by various gov- Social Media, and
ernmental bodies and nonprofit organizations.
Social Change
Sorin Nastasia Documentary films and videos have always com-
Southern Illinois University Edwardsville bined the emotionally involving strengths of nar-
rative storytelling with compelling situations
See Also: Crowdfunding; Crowdsourcing; presented by actuality. They use the strength of
Facebook; Flickr; I Am Gonna Be Your Friend authentic presentations from the real world with
Campaign; Microblogging; Social Media, Definition all of the emotionally compelling structures of
and Classes of; Twitter; Ushahidi; YouTube. storytelling in order to situate the audience in a
Documentaries, Social Media, and Social Change 407

specific relationship with the subject. This rela- Grierson, argued that the documentary form was
tionship should lead to a deeper understanding a way of saving democracy from a trend in pub-
of different social circumstance as a result of lic participation that had become perfunctory,
having seen the documentary. But the challenge apathetic, meaningless, and often nonexistent. In
is that seeing a documentary does not equal the the 1920s and 1930s, Grierson thought that the
same thing as doing something about the issue the dramatic power of documentary would help citi-
documentary discusses. The challenge faced by zens to function with more passion and vitality;
documentary filmmakers is not just to be under- in other words, documentaries have the narrative
stood as a filmmaker but also to be able to pres- power to spur people into social change.
ent issues in such a fashion that the audience feels While many viewers are aware of the more
motivated to act on them. journalistic approaches of recent decades, this has
Through a history of advocacy documentary, followed a less well-known history of advocacy
journalistic documentary, and independent pro- in documentary. Sometimes this was on behalf of
duction, attempts to reach audiences and insti- governments; for example, the Nazi-era Triumph
gate both understanding and social change have of the Will (1935) or the U.S. “New Deal” films
grown. The advancing quality and gradually of Pare Lorentz, such as The Plow That Broke the
declining costs associated with production have Plains (1936) and The River (1938). Sometimes
helped to multiply the range of voices that use this was done for independent causes, such as the
documentary in these ways. 1937 production of The Spanish Earth, designed
to inspire support for the agrarian anti-Fascists
Social Media in Spain, assembled with the participation of
Through more recent developments in interactive Joris Ivens, Ernest Hemingway, John Dos Pas-
computer networks, social media presents new sos, Lilian Hellman, Dorothy Parker, Archibald
opportunities to connect with audiences. Through MacLeish, and Orson Welles (as a narrator in an
the Internet’s ability to add context, interactiv- early version).
ity, and linking, a viewer’s opportunity to take In the network TV era (1950s until the mid-
action is enhanced. In some cases, the interactiv- 1980s), networks would mostly broadcast docu-
ity extends to organizational action, where a geo- mentaries from their own journalism divisions,
graphically diverse group with common interests with a more restricted intent to inform, rather
may be inspired by online documentaries to take than aspiring to the larger goal of inspiring social
collective action and work toward social change. change. However, the power of exceptional films
Networking through social media has also cre- like Edward R. Murrow’s broadcasts on Joseph
ated the possibility of crowdsourcing production McCarthy (See It Now, March 9, 1954) and
opportunities through fund-raising that takes migrant farm workers (Harvest of Shame, 1960),
place specifically to finance a film (on Web sites or Robert Drew’s work on the John F. Kennedy
like Take Part, Kickstarter, and others). Some campaign (Primary, 1960) would profoundly
producers and directors are even implementing change social attitudes and occasionally result in
their efforts as cross-platform efforts, where the legislative change. But these were documentaries
documentary film at the center is connected to operating out of a journalistic mode.
peripheral activity and networked groups through Between Grierson’s writings in the 1930s and
events, Web sites, podcasts, etc. the rise of television journalism in the 1960s
documentary had been taken as something resem-
History bling journalism. Audiences expected that what
Getting to this point has required an increasingly they were seeing were objective stories, not advo-
diverse set of notions of the function and con- cacy. But a greater reevaluation of documentary
ventions of documentary. The history of docu- was taking place in the last decades of the 20th
mentary that most viewers are not actually that century. Filmmakers like Frederick Wiseman,
aware of consists mainly of documentaries adopt- Barbara Kopple, Errol Morris, and Michael
ing an advocacy position. Most of the historical Moore benefited from the idea that documentary
figures significant to documentaries, such as John could be both observation and advocacy, where
408 Documentaries, Social Media, and Social Change

could spur change in the way that the mental


health industry conducted itself was exactly the
kind of thing that Grierson argued documentary
could accomplish.
Public screenings played a great role in distri-
bution in the 1960s and 1970s, where a number
of antiestablishment films were circulating to a
highly mobilized audience of antiwar protesters.
The 1968 film by Emile de Antonio In the Year of
the Pig was highly influential, and earned an Acad-
emy Award nomination for Best Documentary. A
group of 19 filmmakers known as the Winterfilm
Collective collaborated on the 1971 documen-
tary Winter Soldier, also advocating against the
Vietnam War. These were followed by Hearts and
Minds in 1974, which won the Best Documen-
tary Academy Award. One of the members of the
Winterfilm Collective was Barbara Kopple, who
went on to make Harlan County U.S.A. in 1975.
The film is notable because many of the striking
miners depicted in the film believe that the pres-
Documentary filmmaker and activist Michael Moore advocating ence of the film crew helped to bring a faster end
for a single-payer health care system in the United States to the strike.
at a Washington, D.C., event sponsored by the nonprofit Errol Morris in 1988 made The Thin Blue
organization Public Citizen on September 29, 2009. Line, which relayed the case of Randall Adams,
who had been accused of murdering a trooper in
Texas. Morris’s film indicated that Adams was
largely being railroaded, and his conviction and
audiences could be informed, could be shown to death sentence were actually hiding the real mur-
see the world differently, and could potentially act derer. Reaction to the film and surrounding pub-
on that difference. Simultaneously, this reevalua- licity led to Adams being exonerated.
tion saw an increase in the popularity of docu-
mentary film as a theatrical experience. Michael Moore
Developments in independent documentary Michael Moore’s first major film was the 1989
film separate from television had a greater ambi- Roger and Me. Moore included himself as a char-
tion to directly provoke an audience into action. acter advocating on the side of the labor unions
An instance that demonstrates the extent to which opposing the corporate interests of large auto
documentary could spur social change came as companies that were slowly destroying Flint,
a result of Frederick Wiseman’s 1967 documen- Michigan. Moore subsequently made Bowling
tary Titicut Follies. This film was an exposé of for Columbine in 2002, an extremely influential
the Bridgewater State Mental Hospital in Mas- documentary about the nature of gun culture in
sachusetts. Its footage was disturbing enough to America. He then made Fahrenheit 9/11 in 2004,
cause the film to be suppressed for a number of which remains the highest grossing documentary
years, with viewing restricted mostly to lawyers, of all time (as of May 2013). This film was an
doctors, and health care professionals. The film extended critique of America during the Bush
is considered to have had a direct effect on the administration following the attacks of 9/11.
closing of Bridgewater. Relatives of patients who Moore remained a character who adopts an advo-
subsequently died claim that if the film had been cacy position against the U.S. government.
in wider release their relatives might have had a The advocacy positions that Michael Moore
better outcome. The idea that this documentary has adopted have been translated to social media
Documentaries, Social Media, and Social Change 409

events. Moore claimed that if people could actu- mass, and to incorporate paths of action that can
ally see the damage done to the bodies of the connect a documentary to social change.
children of the Sandy Hook massacre they would Some more traditional documentary outlets,
immediately change their positions on gun rights like the Public Broadcasting Service (PBS) series
and the National Rifle Association; he based this POV and Independent Lens, have developed
on his understanding of the effects of photographs positions for people who coordinate both out-
of Emmett Till’s body and the images of the 1965 reach and education efforts. Nonprofit organiza-
Selma police attacks on African Americans that tions that have experience in the development of
subsequently bolstered support for the 1965 Civil educational materials have also gotten involved.
Rights Act. The Rockefeller Foundation awarded $975,000
Moore has a large number of social media fol- to Columbia University’s Teacher’s College to
lowers (in the millions). With every new 10,000 develop a multidisciplinary curriculum guide and
followers he gains, Michael Moore gives $1,000 a Web site to support the teaching of Spike Lee
to a charity chosen by one of his followers. Moore and HBO’s When The Levees Broke, a multipart
believes that the communication of images of bru- documentary about Hurricane Katrina. The grant
tality and violence through social media would included the distribution of 30,000 copies of the
actually have a positive effect on the way people film along with the curriculum book to educa-
relate to events and instigate social change. tors. The Web site remained active though most
of 2010, and offers a place where the curriculum
Other Approaches materials can still be downloaded free.
Moore’s films have capitalized on the popularity A similar effort is underway through Facing
of theatrical releases of documentary films as a History and Ourselves, which develops teach-
way of instigating social change. A slightly dif- ing materials to combat racism, anti-Semitism,
ferent approach has been taken by Robert Gre- and prejudice. It developed curriculum materi-
enwald and his company Brave New Films. Their als for the Marco Williams film Banished, about
projects have included the 2004 documentary the historical effects of the banishment of African
Outfoxed: Rupert Murdoch’s War on Journalism, Americans from several towns in the first decades
2005’s Walmart: The High Cost of Low Prices, of the 20th century. The materials are freely avail-
and the 2006 documentary Iraq for Sale: The War able online.
Profiteers. Greenwald and Brave New Films have Other documentaries are trying to use social
capitalized on distribution through social media media to develop transmedia platforms with
of documentary materials. He releases material in a particular documentary or set of documen-
shorter pieces on the Internet, where they have taries at the center. Top Documentary Films,
collectively received over 50 million views. Brave Documentary­WIRE, and Films For Action offer
New Films has also used sales to individuals who collections of both short and full-length docu-
host house party viewings as another way to get mentaries online. Over 20 years of growth, Wit-
viewers in touch with each other, increasing the ness, an international nonprofit organization,
possibilities of collective social action. has offered a combination of social documenta-
The plummeting prices of cameras, the ubiquity ries, with a variety of educational materials to
of simple editing platforms, and a higher general teach visitors to its Web site how to make docu-
level of media awareness (if not media literacy), mentary projects, all built on the action of using
plus the ability to distribute through YouTube the documentation of human rights abuses to
and online sites have led to an explosion in the help curtail them.
production of documentaries. The challenge for
the filmmaker now is standing out in the crowd. Kony 2012
The challenge for the viewer is deciding which A visible recent example of the interaction of
of these stories is worth paying attention to and social media and documentary—for better and
what kind of action to take as a result of seeing worse—came with the campaign and film known
them. And the challenge to social change is having as Kony 2012. In March 2012 the organization
a large enough niche of viewers to reach a critical Invisible Children released a 30-minute film that
410 Domestic Surveillance and Social Media

sought to make African war criminal Joseph Further Readings


Kony widely known. The film spread virally and Aufderheide, Pat. “In the Battle for Reality: Social
received 94 million views on YouTube, along with Documentaries in the U.S.” (2004). http://www
17 million views on Vimeo. The film was tied to .centerforsocialmedia.org/making-your-media
a social action campaign, a Web site, and the -matter/documents/other-documents/battle
distribution of posters, T-shirts, and stickers to -reality-social-documentaries-us-2004 (Accessed
publicize Kony and his human rights abuses. In May 2013).
the months after its release, the film was widely Clark, Jessica and Barbara Abrash. “Designing for
discussed, both in positive and negative terms. Impact: A Report on How Documentaries Make
The film was moving and easy to watch, causing A Difference.” Center for Social Media (2011).
an emotional resonance in viewers. At the same http://www.centerforsocialmedia.org/sites/default/
time, the film was widely criticized for its manipu- files/documents/pages/designing_for_impact.pdf
lation, inaccuracies, oversimplification of politi- (Accessed May 2013).
cal issues, and ultimately misguided efforts. There Crocco, Margaret Smith. “Teaching The Levees:
were short-term gains in international attention A Curriculum for Democratic Dialogue and
and criticism of Kony and his recruitment of Civic Engagement.” http://teachingthelevees.org/
child soldiers, and international aid for efforts to Teaching_The_Levees.pdf (Accessed May 2013).
apprehend him. But these efforts, as of this writ- Facing History and Ourselves. “Teaching Banished:
ing, have not achieved their central goal. Created to Accompany Banished: American
It remains to be seen whether Kony 2012 was Ethnic Cleansing, a Film by Marco Williams.”
a fluke incident or a sign of what might be pos- http://www.facinghistory.org/banished (Accessed
sible in the interaction of documentary and social May 2013).
media. It is also still not clear whether the general Moore, Michael. “America, You Must Not Look
arc of the campaign was primarily an example Away.” http://www.michaelmoore.com/words/
of “slacktivism”—offering online participants mike-friends-blog/america-you-must-not-look
an opportunity to do something that seems like -away-how-finish-nra (Accessed May 2013).
social activism, but actually accomplishes little
beyond a feeling of accomplishment.

Conclusion
Organizations like the Center for Social Media Domestic Surveillance
at American University are attempting to develop
methods for better understanding what is consid- and Social Media
ered successful in the relationship between doc-
umentary and social media. As larger numbers Domestic surveillance is surveillance by the gov-
of documentary productions are chasing after ernment (especially the federal government and its
more elusive sources of financial support, what intelligence agencies) conducted within the United
counts as a worthy investment in this relationship States and its territories, and in particular surveil-
becomes critical. At the same time, the differences lance of American citizens and legal residents. Sur-
in form that are affecting the understanding of veillance techniques include surveillance by human
documentary—a culture’s documentary literacy— operatives (the proverbial unmarked van, as well
remain an area in need of additional study. as discreet interviews of parties of interest, searches
of property and vehicles, and other means), cam-
Ralph Beliveau eras and other recording devices, satellite imagery
University of Oklahoma and aerial surveillance, and many forms of elec-
tronic surveillance. Electronic surveillance is some-
See Also: Activists and Activism, Digital; Brave times referred to as wiretapping, which originally
New Films; Center for Innovative Media; Center for referred literally to the act of listening in on tele-
Social Media; Crowdfunding; i-Docs.org; Interactive phone conversations via accessing the telephone
Documentary; Television and Social Media; YouTube. wire, but which has been extended to include other
Domestic Surveillance and Social Media 411

means of monitoring telephone calls, information through association rules, grid computing, and
transmitted by telephone wire, and all online con- other techniques. (In computer science the term
versation and activity, from e-mails and text mes- is somewhat more specific.) It is especially used to
sages to Web browsing and downloads. Wiretap- refer to these processes in such cases as when the
ping can sometimes also refer to, and surveillance sets of data are so large that extracting informa-
would certainly include, the monitoring of activ- tion from them manually would be prohibitively
ity online that may not constitute “conversation,” laborious. The use of data mining makes it practi-
such as Web browsing, downloading of images or cal to collect and maintain large amounts of data
information, Facebook activity (including profile which, were they to be analyzed manually, would
information and pages “liked”), and so on. be too much of a nuisance to be useful, and in this
fact is the principal difference between domestic
Development surveillance then and now.
Domestic surveillance has always been a concern Modern social network analysis, when con-
of the press, who in the course of their work must ducted by the relevant agencies in the federal
regularly deal with confidential information and government, draws on information from social
cloaked sources. In 2013, these extant worries were network sites like Twitter and Facebook, traf-
exacerbated by a relationship between the govern- fic analysis from the National Security Agency’s
ment and investigative journalists made increas- (NSA) phone call database, and such information
ingly tense by incidents like the Justice Depart- as purchase records and whatever has been uncov-
ment’s subpoenas of reporters’ phone records ered through other means of surveillance. Special-
and the detaining of Guardian columnist Glenn ized data mining software has been developed for
Greenwald after breaking a story on NSA surveil- this purpose—AT&T’s Hancock, for instance, was
lance. One online news site, Groklaw, even ceased developed to data mine customer information in
operations over surveillance concerns. Social net- order to generate marketing leads, but the social
works have been key to surveillance since before network connections that it unveils have been
the Internet, when part of the process of creating repurposed for the intelligence community’s use.
a profile of a subject included mapping his or her
social network—a visual presentation of informa- Social Network Analysis Research
tion about the people the subject knows and has Government entities like the Department of Home-
contact with, with both subjective and quantita- land Security and the National Security Agency are
tive information about each of his or her relation- at the forefront of social network analysis research.
ships to these people. Such social network maps It and related technologies and techniques like data
could reveal information that could prove to be mining are among the most actively developed
useful: two parties who might seem to be uncon- technologies and can be expected to remain so for
nected might prove otherwise after being mapped. some decades to come. Because so many threats to
Phone records may indicate calls between two national security come from decentralized extrem-
suspicious parties who have no apparent innocent ists—the Boston Marathon bombers, Tamerlan and
reason to know each other, for instance. Dzokhar Tsarnaev, for example, or the attempted
Modern social network analysis incorporates 2010 Times Square bombing by Faisal Shahzad—
far more information than was used in the past— social network analysis can be critical.
whenever possible, the amount of information The monitoring of social media becomes attrac-
greatly exceeds what a human agent could be tive to the intelligence community because suspects
expected to keep track of. Data mining is then flock to social media as a place to exchange infor-
used to search for useful information and patterns mation less conspicuously than through in-person
that would once have required an intuitive leap to meetings. In other words, the use of social media
perceive. Data mining in this informal sense refers to avoid surveillance makes social media a target
to the collection, extraction, and analysis of large for surveillance. However, in truth the wealth of
sets of data by software designed for the purpose, information that can be uncovered through social
using data management and preprocessing, visu- media surveillance would make it appealing to
alization, interestingness metrics, pattern mining the intelligence community regardless.
412 Domestic Surveillance and Social Media

Concerns about domestic surveillance and the including collecting information for later use (in
new forms it would take through technological order to provide the intelligence community with
advancements in the 21st century first focused on the ability to quickly build a profile for a newly
the Defense Advanced Research Projects Agen- identified person of interest), and searching for
cy’s (DARPA) Information Awareness Office patterns of suspicious activity in order to alert
(IAO) and its Total Information Awareness goal. human agents to the need for further investiga-
The IAO was formed in January 2002, combin- tion, much as software detects suspicious activity
ing several DARPA projects in order to address in order to alert human personnel to the possibil-
the government’s new priority on surveillance ity of actions ranging from password hacking to
and security in the immediate post-9/11 months. money laundering.
IAO is especially concerned with assymetric In addition to telephone call data, the NSA
threats—those threats which, like most modern program monitored Internet traffic in real time,
terrorists, differ radically in scale and strategy including e-mail and social media activity, as well
from the United States. The goal of Total Infor- as Web browsing, downloads, and other activity.
mation Awareness would be met by assembling The original program ended in 2007 under pub-
a database of all Americans and U.S. residents, lic pressure, but was resumed sometime shortly
including personal information and online and after the passage of the FISA (Foreign Intelligence
offline activity, in order to create a block of data Surveillance Act) Amendments Act of 2008, with
that could be mined to search for threats. Col- the FISA court officially reviewing surveillance
umnist William Safire spoke out vociferously programs and procedures. Arguments continue
against the IAO, and public and media criticism about whether the program violates Articles I or
mounted until the program was defunded the II of the Constitution, Fourth Amendment pro-
following year. tections, or restrictions on the War Powers Reso-
lution, among other issues. The view of many is
NSA that the legal argument itself is convoluted in part
The NSA’s domestic surveillance program, because the body of privacy and surveillance law
referred to in the government documents that ini- simply has not caught up to the capabilities of
tiated it as the President’s Surveillance Program, technology: there are few privacy or surveillance
began shortly after the 9/11 attacks. Much of the laws, or court decisions in the relevant area, that
program remains classified, and what is publicly are contemporary to the technology at the heart
known is largely the work of whistle-blowers and of the matter.
the occasional factoid revealed during a congres- According to a report by privacy advocacy
sional investigation. Though some suspected its group the Electronic Freedom Foundation, the
existence, most Americans had no inkling of it NSA constructed a $2 billion data center in Utah,
until the New York Times published an exposé which went fully operational in September 2013,
in 2005 on domestic wiretapping conducted by housing over 11 years of data collected by Narus
the NSA without warrants. The lack of a warrant, Semantic Traffic Analyzers (which intercepted
with the checks and balances it implies, was the and copied Internet traffic as it happened, in
major point of concern. essence wiretapping the Internet as a whole) and
It became clear with time that an additional other hardware.
point of concern for privacy advocates was the
underlying reason for permitting warrantless sur- PRISM
veillance: the purpose of the program was not A more recent revelation is the existence of the
limited to targeting persons of interest, but to PRISM surveillance program, an electronic data
identifying persons of interest. A warrant requires collection program operated by the NSA since
identifying a suspect in some form. What the new 2007, supervised by the FISA court, and revealed
program did was capitalize on modern technol- to exist in June 2013 thanks to the whistle-blow-
ogy and the dense bricks of information it pro- ing of NSA contractor Edward Snowden, who
duces about peoples’ activities for a variety of subsequently sought asylum overseas. The exact
uses, some strongly suspected, some confirmed, parameters of the PRISM program are unclear.
Dooced 413

They were originally alleged to include warrant- Dooced


less demands for customer records from telecom-
munications companies and social media compa- Dooced is a term that refers to being terminated
nies including Google, Facebook, and Apple. from a job because of something one has posted
The government has asserted that the program on a personal blog or Web site. The word origi-
is not used on domestic targets without a war- nates from the personal blog Dooce, written by
rant, while individual companies have denied Heather B. Armstrong. In February 2001, Arm-
knowledge of the existence of the program, or of strong began blogging about her personal life
backdoors providing government agencies with and work experiences, although she did not refer
access to their databases. Many in the media to her company or coworkers by name. A year
remained skeptical of the defenses following after Armstrong began blogging, someone anon-
Snowden’s accusations (accompanied by docu- ymously tipped off the vice presidents of the com-
mentation), with the New York Times announc- pany for which she worked. Armstrong was then
ing that the Obama administration had no cred- fired for making disparaging remarks about her
ibility on the issue. The assurance that the FISA colleagues and employer on her blog. Armstrong
court reviewed the process was challenged by a may not be the first person to lose a job because
former FISA judge, James Robertson, who criti- of their blog or Web site, but as a prominent and
cized the procedures of the court and its useful- vocal member of the early blogging community,
ness as an overseer. her blog became synonymous with these firings.
Following Armstrong’s termination in 2002,
Bill Kte’pi several other bloggers were fired because of their
Independent Scholar blog content, including Mark Jen, fired from
Google for blogging about Google’s employee
See Also: Activists and Activism, Digital; Carnivore; orientation process, and Ellen Simonetti, who
Department of Homeland Security Media Monitoring was terminated from her position as a Delta Air-
Initiative; ECHELON; FinFisher; Independent Media lines flight attendant for blogging photos that the
Center; Media Research Center; 100Reporters company deemed inappropriate. Simonetti later
Whistleblower Alley; Press Freedom and Online/ filed a sex discrimination lawsuit against Delta
Social Media Security; Privacy. Airlines, claiming inconsistency in its treatment
of employees’ online postings. These and other
Further Readings firings ignited a debate about workers’ rights to
Charles, Douglas M. J. Edgar Hoover and the Anti- free speech and privacy, a debate that continues
Interventionists: FBI Political Surveillance and the as blogging and social networking become a more
Rise of the Domestic Security State. Miami: Ohio ubiquitous part of individuals’ daily lives.
State University Press, 2007. Blogging and social networking have blurred
Diffie, Whitfield and Susan Landau. Privacy on the some of the boundaries between public and pri-
Line: The Politics of Wiretapping and Encryption. vate, as comments that may have gone unno-
Cambridge, MA: MIT Press, 2010. ticed and unreported in a face-to-face conversa-
Greenberg, Andy. This Machine Kills Secrets: How tion leave a digital footprint when posted online.
WikiLeakers, Cypherpunks, and Hacktivists However, as blogs and social networking sites
Aim to Free the World’s Information. New York: have gained popularity, they have also become a
Dutton Adult, 2012. part of corporate culture, facilitating interaction
Greenwald, Glenn and Ewen MacAskill. “NSA Prism between colleagues and allowing companies to
Program Taps in to User Data of Apple, Google, reach out to clients by creating and maintaining
and Others.” The Guardian (June 6, 2013). http:// an online presence. The blurring between public
www.guardian.co.uk/world/2013/jun/06/us-tech life and private life alongside the need for social
-giants-nsa-data (Accessed June 2013). media use in the workplace creates the poten-
Landau, Susan. Surveillance or Security? The tial for employees to post defamatory or harass-
Risks Posed by New Wiretapping Technologies. ing content for which employers may be liable.
Cambridge, MA: MIT Press, 2013. Accordingly, some employers monitor their
414 Dooced

employees’ activity on blogs and social network- and social media policies, as the threat of disci-
ing sites, resulting in numerous terminations due pline for blogging and social media use could be
to workers’ online activity. seen as limiting employees’ freedom of expres-
In the United States, most employees are sion, and in particular, curtailing workers’ rights
employed at-will, meaning they can be terminated to organize and improve working conditions.
at any time and for almost any reason, provided Passed in 1935, the National Labor Rights Act
the reason does not violate state or federal law or (NLRA) has historically provided some speech
a contractual agreement. As part of the doctrine protections for employees, and ambiguity and
of employment at-will, employee monitoring is unequal treatment in cases of termination have
legal in many forms, both inside and outside of raised the question of what constitutes pro-
the workplace. Employers monitor employees for tected speech online. Section 7 of NLRA protects
several reasons, including maintaining productiv- employees’ right to self-organization and collec-
ity, protecting trade secrets, and avoiding liabil- tive bargaining, allowing employees to discuss
ity in cases where employees may be in violation wages, hours, and working conditions without
of the law. Employees have some limited privacy fear of termination, while Section 8 makes it
protections at work, for instance, against wire- unlawful for employers to interfere with employ-
tapping or in cases in which the employee has a ees’ Section 7 rights. These laws apply to both
reasonable expectation of privacy. However, the union and nonunion workers. Thus, employees’
law has been slow to respond to changes in tech- use of blogs and social networking sites to discuss
nology that allow employers greater scope in their working conditions may include protected activ-
capacity to monitor employees. ity, so long as the content is not abusive.
The doctrine of employment at-will puts the The National Labor Relations Board’s (NLRB)
employee at a disadvantage in disputing claims of general counsel has disputed the lawfulness of
being “dooced.” Many bloggers, including Arm- some blogging and social media policies on the
strong, do not initially intend for their blogs or basis that they violate workers’ right to organize.
social media content to be seen by their employ- The NLRB’s general counsel argued that vaguely
ers. Employees may be protected in cases in which worded confidentiality and antidefamation poli-
they have a reasonable expectation of privacy, but cies could potentially curtail employees’ rights to
regardless of an author’s intentions or audience discuss wages, hours, and working conditions.
size, because blogs and social networking sites are The NLRB has called upon several companies,
publicly accessible, users have little reasonable such as General Motors, Target, and Costco, to
expectation of privacy. Content posted to blogs reformulate their blogging and social media poli-
and social networking sites are archived and cies. However, the NLRA only protects employee
traceable, and thus can be used in cases against postings related to working conditions.
employees even if the content is published under a
pseudonym or on an individual’s own time. Jennifer Whitmer
Many forms of employee monitoring are Simon Gottschalk
legally protected, and many employers actively University of Nevada, Las Vegas
monitor workers’ blogs and social media use.
Due to inconsistencies in how employees have See Also: Blogger Rights and Responsibilities;
been disciplined due to their online activity, Privacy; Professional Bloggers; Social Media Career
many employers have instituted blogging and Wreckers; Tweet Insurance; Unemployment.
social media policies to decrease their liability
in cases in which employees are fired because Further Readings
of their use of blogs or social networking sites. Ciocchetti, Corey A. “The Eavesdropping Employer:
Social media policies typically contain stipula- A Twenty-First Century Framework for Employee
tions against sharing confidential information, Monitoring.” American Business Law Journal,
disparaging the company, and posting harassing v.48/2 (2011).
or abusive content. However, there have been Cote, Marc. “Getting Dooced: Employee Blogs and
some debates as to the legality of some blogging Employer Blogging Policies Under the National
Dragonfly Effect, The 415

Labor Relations Act.” Washington Law Review, general, the trend is moving toward the imposi-
v.82/1 (2007). tion of liability for intermediaries.
Tune, Cydney and Marley Degner. “Blogging and The concept of downstream liability is impor-
Social Networking: Current Legal Issues.” The tant in relation to use of computer systems to
Computer & Internet Lawyer, v.26/11 (2011). raise awareness of a political issue, also known
as hacktivism. This practice relies upon the use of
networks to highlight political points by impair-
ing systems, and it has been seen as a type of
civil disobedience. Such hacktivism is becoming
Downstream Liability, increasingly sophisticated and increasingly relies
upon the exploitation of vulnerable systems as
Political Implications of a route toward the impairment of other, better
protected systems. This phenomenon can lead
The term downstream liability refers to a practice the political and legislative impetus toward the
in which an organization’s network is exploited expansion of the concept of downstream liability
in order to impair the computing capabilities of to better protect public services. However, there
another network. The intermediary’s system is is a need to find a balance that ensures that orga-
used as a stepping stone to gain access to the end nizations maintain secure systems while avoiding
target’s system. A fundamental legal issue lies in the imposition of duties that could hinder growth
the determination of the liability of the intermedi- and commercial competitiveness.
ary organization for any damaging activity tar-
geted at another organization. The organization Catherine Easton
that facilitates the downstream action could be Lancaster University
at fault because of insecure systems, processes,
or failure to warn of potential danger. Once an See Also: Activists and Activism, Digital;
organization is notified that there has been a net- Hacktivism; Political Parties.
work breach that could lead to the spread of a
virus, liability can arise. Negligence can be found Further Readings
if there is an awareness of a security breach with Chadwick, Andrew and Philip Howard, eds.
potentially wider implications followed by a lack Routledge Handbook of Internet Politics. New
of action or notification of the danger. York: Routledge, 2008.
This leads to a need for organizations to ensure McNair, Brian. Introduction to Political
the security of their systems and the effectiveness Communication. New York: Routledge, 2011.
of internal notification procedures in order to Ross, Gary. Who Watches the Watchmen?:
avoid liability. It is often difficult to track down The Conflict Between National Security and
the hackers, the originators of the damaging Freedom of the Press. Washington, DC: National
activity, whereas an intermediary organization, Intelligence University, 2011.
whose lack of oversight may have inadvertently
aided that hacker, is easy to identify and sue. The
concept of downstream liability is further com-
plicated by the differing legal approaches taken
across jurisdictions in relation to the duty to Dragonfly Effect, The
secure a computer system. For example, the rel-
evant legal regimes in the United States and the Sameer Bhatia was an entrepreneur. He had a suc-
European Union mandate differing duties and cessful Silicon Valley business and was living the
responsibilities in relation to computer security. high life when he was diagnosed with leukemia.
The laws on this issue also vary in the United At the time, he was 31 years old. Bhatia would
States from state to state. The divide lies between need a bone marrow transplant if he wished to
regimes that impose no liability and those that survive and beat the disease. Unfortunately, there
enshrine a concept of downstream liability. In were few South Asian donors, and as a result,
416 Dragonfly Effect, The

hope looked dim. Understanding firsthand the The final wing involves taking action. If an
potential of social media and networks, he took to individual has set a goal, engaged a chosen audi-
the Internet in an effort to solicit more potential ence, and convinced them to care, it should be
donors of the same ethnicity as Bhatia. Over 11 easy to get them to act. Key in this stage is to keep
weeks, more than 450 bone marrow drives were providing positive reinforcement to those who
held, and approximately 150,000 visitors looked are doing what an individual is asking. This will
at the Web site devoted to the cause. In the end, encourage others to do the same.
more than 20,000 possible donors entered the The key takeaway from The Dragonfly Effect is
registry, and one was a perfect match for Bhatia. that small, integrated activities can cause a ripple
Unfortunately, he did not survive his illness, but effect that leads to greater changes than expected.
thanks to his social media efforts, 266 patients These changes can have a positive impact. All it
were matched with donors enlisted as part of the takes in the social media era, however, is a wire-
Bhatia campaign. These events caused Jennifer less connection to begin implementing change.
Aaker and Andy Smith to write The Dragonfly
Effect in 2011. Political Campaigns
The Dragonfly Effect is titled as such due to the During the 2000 and 2004 presidential elections,
dragonfly being the only insect capable of flying the George W. Bush campaign team reminded
in any direction when its four wings are working America of the importance of word-of-mouth
together. Culturally, the dragonfly means many endorsements. Rather than relying on formal
things depending on where one is located. It typi- endorsements from national politicians, Karl Rove
cally involves new beginnings or change. Aaker orchestrated an Amway-style campaign in which
and Smith use these ideas to show how social supporters called their friends and endorsed Bush
media can make a large impact when harnessed and urged others to do the same. Rove understood
properly by those utilizing it. Following the meta- that the best way to sell a product (or candidate)
phor of the dragonfly, the authors use their work was through word of mouth and that consumers
to describe the four wings of the dragonfly effect— are more open to endorsements from friends than
focus, grab attention, engage, and take action. formal pitches. Today, this is even more easily
The first wing of the dragonfly is focus. Rather done via social media. In this way, The Dragonfly
than thinking big (which many marketing experts Effect provides campaigns (both candidate and
have previously recommended), Aaker and Smith issue-based) with a blueprint for success in tap-
instead suggest targeting a single, clear outcome. ping social media and psychological insights to
All resources should go directly toward this goal. see victory in the ballot box.
Within the text, the authors suggest setting a goal, To see how The Dragonfly Effect can be used
breaking it into subgoals, determining how to in campaigns, consider the election of President
measure success, and creating a specific plan to Barack Obama in 2008. The Obama 2008 cam-
use in reaching the goal. In the case of Bhatia, one paign was the first to truly utilize social media
can see the clear focus: finding a donor match. as a vehicle for possible success. Obama and his
The second wing is to grab attention. Once the team used social media to raise money, adver-
single goal is decided upon, the main task is to tise events, and empower supporters to be active
convince an audience to care. Aaker and Smith campaign assistants. Over the course of roughly
suggest being original, keeping it simple, making 15 months, Obama saw nearly 5 million support-
it grounded, and using as much visual imagery as ers join his cause on a combined 15 social net-
possible. After grabbing their attention, individu- works. On YouTube alone, he had more than 50
als must get their audience primed to take action million views on his channel. Other campaigns
in support of the single goal. Stories and personal used social media, but none were successful in
engagement are the key ways by which to do this. creating a culture of involvement and participa-
Online technologies can prove to be pivotal. Face- tion. Rather than simply creating the pages and
book, Twitter, e-mail, text messages, a blog, or social networking hubs and expecting individual
YouTube videos can all prove to be successful in supporters to help them take off, Obama and
implementing an engagement strategy. his team made sure that social media served as a
Drudge Report 417

vehicle to bring together supporters in real time major change in the world. In the aftermath, more
to help bring about the change they desired for campaigns have begun attempting to do the same.
the country. Obama allowed supporters to run
individual campaigns on their own through the William J. Miller
Internet. Flagler College
Looking at the specifics, the Obama team was
successful by focusing all attention onto Barack See Also: Campaign Strategy; Campaigns,
Obama as an individual. Rather than worrying Presidential (2008); Campaigns, 2012; Facebook; Fan
about policies or politics, the campaign wanted Page; Social Media Optimization; Social Networking
people to get to know Barack Obama, the indi- Web Sites; Twitter; YouTube.
vidual. After doing so, they believed voters
would be inclined to agree with him. Next, they Further Readings
assured that Obama was authentic on the Inter- Aaker, Jennifer and Andy Smith. “The Dragonfly
net. As opposed to Senator John McCain, Obama Effect.” Stanford Social Innovation Review,
enjoyed the social networks. He used his own v.8 (Winter 2011). http://www.ssireview.org/
favorite music, interests, sports, and movies. He articles/entry/the_dragonfly_effect (Accessed
did not pretend to be anyone but who he truly December 2012).
was. Likewise, his day-to-day updates were eas- Aaker, Jennifer and Andy Smith. The Dragonfly
ily relatable to all Americans. The conversation Effect: Quick, Effective, and Powerful Ways to
seemed to be more about how Obama was like Use Social Media to Drive Social Change. San
the average American than his activities as a pres- Francisco: Jossey-Bass, 2010.
idential candidate. Fine, Allison. “Social-Media Lessons From the
Perhaps most important, Obama acknowl- Dragonfly Effect.” The Chronicle of Philanthropy
edged that every single American was capable of (October 2, 2010). http://philanthropy.com/
helping to create change. A vast majority of the article/article-content/124837 (Accessed
money he raised was in amounts of $20 or less. December 2012).
By sharing posts and using Facebook walls and
Twitter feeds, Obama empowered even the most
powerless of Americans to work toward making
a difference, and the average citizen responded.
In the most general sense, Obama succeeded Drudge Report
in 2008 by following The Dragonfly Effect: he
created a single, clear goal and put all resources The Drudge Report was one of the first political
toward garnering the necessary support to achieve Web sites to achieve international fame when it
it. Obama focused on hope and change—a focused broke the story of the affair between U.S. Presi-
message for the future of the country. He utilized dent Bill Clinton and Monica Lewinsky in 1998.
top bloggers and social network specialists (such Its mixture of politics and gossip paved the way
as Chris Hughes) to assure social media was used for later political Web sites, including the Huff-
properly, and he had a complete map of the digi- ington Post and Politico. Founder Matt Drudge
tal landscape. He assured authenticity by being considers his publication to be part of the tradi-
himself in all networks. Everything he posted or tion of whistle-blowing, muckraking journal-
said was geared toward getting individuals to vote ism, and to this extent, the Drudge Report also
for him and Vice President Joe Biden. And, most may have influenced the development of sites
important, he embraced cocreation. He allowed like WikiLeaks. However, the Drudge Report’s
average citizens to take his brand and run with unique talent lies in recognizing and publishing
it to their friends, family, coworkers, and social small stories from the mainstream press that grow
networks. into much larger stories later. The site has little
The Obama campaign did exactly what The in the way of original content, choosing instead
Dragonfly Effect predicted: It took a series of small to aggregate content from other publications, and
events and allowed them to collectively lead to consists mostly of links to other Web sites.
418 Durbin, Richard J.

While its popularity has ebbed and flowed site. There are no audience comments, no opin-
over the years, the Drudge Report remains one ion bloggers, and no way to like or share stories
of the top-rated U.S. political news Web sites and via social media. However, the Drudge Report is
among the most popular Web sites in the world, among the top Internet sites that drive traffic to
drawing more than 20 million unique viewers other news Web sites.
per month. Journalists and political pundits rec-
ognize the Drudge Report as an influential media Susan Jacobson
agenda setter. Florida International University

Background See Also: Huffington Post; Information Aggregation;


Matt Drudge was born in 1966 in Tacoma Park, Politico; WikiLeaks.
Maryland. He moved to Hollywood, California,
in 1989, where he managed a gift shop at CBS Stu- Further Readings
dios before launching the Drudge Report, which Drudge, Matt. Drudge Manifesto. New York: New
started as an e-mail newsletter in the mid-1990s. American Library, 2000.
Hollywood gossip was the focus of the newsletter, Grossman, Lawrence K. “Spot News: The Press and
but when Drudge shifted to Internet publication in the Dress.” Columbia Journalism Review, v.37/4
the late 1990s, he turned his attention to politics. (1998).
In the early days, Drudge has said that he received Quantcast. “Drudgereport Network.” http://www
news tips from entertainment industry sources and .quantcast.com/drudgereport.com (Accessed
sometimes even rummaged through trash bins to October 2012).
get story ideas. Drudge has been both praised for
his ability to scoop mainstream news organiza-
tions on major stories and damned for recklessly
publishing stories that later turned out to be false.
Drudge calls himself a conservative populist, Durbin, Richard J.
and his publication is consistently listed among
the top conservative Web sites. The Drudge Richard J. “Dick” Durbin was born on Novem-
Report and the conservative Fox News cable TV ber 21, 1944. A native of East St. Louis, Illinois,
channel emerged at about the same time. Durbin became involved in that state’s politics in
1969, running several unsuccessful campaigns
The Lewinsky Scandal before being elected to the U.S. House of Repre-
On January 17, 1998, Drudge broke the news sentatives in 1982. First elected to the U.S. Senate
of the affair between President Bill Clinton and in 1996, Durbin served as Senate minority leader
White House intern Monica Lewinsky. The story (minority whip) from 2005 through 2007 and as
originated with Newsweek magazine’s Michael Senate majority leader (majority whip) from 2007
Isikoff, but Newsweek editors delayed running until the present.
the story in order to get more verification. Drudge Although known for his relatively traditional
found out about the story and promptly posted campaign style, Durbin has come to the attention
it online. Mainstream media coverage followed a of many proponents of social media for his spon-
few days later. Drudge continued to break new sorship of a variety of legislation seen as curtail-
details of the story, which culminated in Clinton’s ing freedoms, including the Stop Online Piracy
impeachment in December 1998. Act (SOPA) and his calls for a return to the Fair-
ness Doctrine. Although neither of these propos-
Format als has led to incursions in the right to free speech
While the Drudge Report is often considered a or innovation, Durbin’s continued influence and
groundbreaking online news publication, it has authority make his support for these types of
eschewed many social media norms. Other than reforms significant.
a form where readers may submit news tips, it The son of William Durbin and Anna Kit-
has never incorporated user participation into its kin Durbin, Durbin was educated in parochial
Durbin, Richard J. 419

schools, graduating from East St. Louis’s Assump- District to include more voters aligned to the
tion High School in 1962. Both of Durbin’s par- Democratic Party.
ents worked for the New York Central Railroad, Once in office, Durbin became known as one
and he worked in stockyards and slaughterhouses of the more progressive members of the U.S. Con-
during the summer to earn money to pay for col- gress and is acknowledged for having consistently
lege. Enrolling at the School of Foreign Service at liberal views on most issues. His voting record
Georgetown University the following fall, Durbin over the past three decades has been very similar
earned a bachelor of science degree in 1966. to the Democratic Caucus position. When he first
While a senior at Georgetown, Durbin served as entered the House of Representatives, Durbin sup-
an intern in the office of Illinois’s senior U.S. Sena- ported maintaining pre-existing restrictions on
tor Paul Douglas. Immediately upon graduation abortion and favored an amendment to the U.S.
from college, Durbin enrolled in the Georgetown Constitution that would have nullified the holding
University Law Center, graduating with a juris in Roe v. Wade, 410 U. S. 113 (1973). After 1989,
doctorate in 1969. Moving to Springfield, Illinois, however, Durbin reversed his opposition to abor-
the summer after graduating with his law degree, tion and has supported Medicaid funding of the
Durbin passed the Illinois bar exam and began his process and opposed any attempts to limit Roe v.
own law practice that same year. Wade. Durbin has also consistently favored legisla-
Beginning in 1969, Durbin served as legal coun- tion that restricts access to tobacco and regulates
sel to Illinois Lieutenant Governor Paul Simon, a smoking. Durbin’s opposition to the tobacco lobby
position he held until 1972. After this, he served stems in part from his father’s death from lung can-
as legal counsel to the Illinois State Senate Judi- cer when the future senator was 14 years old. To
ciary Committee, remaining in this role until further this concern, Durbin sponsored legislation
1982. Although he ran for a seat in the Illinois in 1987 that would ban cigarette smoking on all
State Senate in 1976 and for Illinois lieutenant domestic flights of two hours or less. Durbin’s pro-
governor in 1978 (as the running mate of Illinois posal, which sought to protect the health and safety
State Superintendent of Schools Michael Bakalis), of nonsmokers and airline employees, was adopted
Durbin lost both these elections. After the 1978 as part of the 1988 transportation spending bill and
loss to Republicans Governor Jim Thompson and was extended to all domestic flights, regardless of
Lieutenant Governor Dave O’Neal, Durbin began length, in 1989. Durbin ran successfully for re-elec-
working at the Southern Illinois University School tion to his House seat six times, handily beating the
of Medicine as an adjunct professor, all the while Republican opposition each time.
continuing his practice of law. In 1996, two-term Senator Paul Simon
In 1982, Durbin again ran for election, this time announced that he would not run for re-election.
winning the Democratic nomination for Illinois’s Durbin entered the Democratic primary for the
20th Congressional District, which was centered Senate seat, ultimately defeating future Illinois
in Springfield. In the general election in November, Governor Pat Quinn for the opportunity to run in
Durbin surprised 11-term Republican Congress- the general election. In the fall of that year, Durbin
man Paul Findley, who had first been elected to the scored a win against Illinois State Representative
seat in 1960. Durbin was successful for several rea- Al Salvi, winning the election by 15 points in part
sons. First, his message focused upon high unem- because of President Bill Clinton’s landslide re-elec-
ployment rates and financial difficulties facing tion. Durbin quickly rose to a leadership position
constituents, resonating with voters in the off-year within the Senate Democratic Party Caucus, as he
election who felt that President Ronald Reagan’s was appointed the assistant minority leader (assis-
economic policies were failing. Second, Durbin tant minority whip) by Senator Tom Daschle. Fol-
was able to raise donations from pro-Israel groups lowing the 2004 elections, in which Daschle was
across the United States who opposed Findley’s defeated for re-election, Durbin became the first
push for more equal treatment of the Palestinians Senate whip from Illinois since Everett Dirksen had
by the Israeli government. Finally, Durbin benefit- served in that position during the 1950s. Durbin
ted from the 1980 redistricting process, which had served as minority whip until 2007, when the
redrawn the now-eliminated 20th Congressional Democratic Party assumed control of the Senate, at
420 Durbin, Richard J.

which point he became majority whip. In addition support of certain legislation and policies. In par-
to his service to the Democratic Caucus, Durbin ticular, Durbin has expressed a desire for a return
has also served on a variety of committees, includ- to the Fairness Doctrine, which has alarmed those
ing the Appropriations Committee, the Foreign concerned with free speech and in favor of limited
Relations Committee, the Judiciary Committee, government regulation of the Internet. Durbin has
and the Committee on Rules and Administration. also expressed support for SOPA and has served as
a sponsor of the Preventing Real Online Threats
Use of Social Media to Economic Creativity and Theft of Intellectual
Durbin uses a variety of social media to commu- Property (PROTECT IP) Act (PIPA). While none
nicate with his constituency as well as to publi- of these attempts to limit activity on the Web was
cize stances he is taking on a variety of issues. To successful when first introduced, Durbin’s support
this end, Durbin’s office maintains a Web page, of this sort of regulation has left some uneasy.
a Facebook page, a Twitter account, a Flickr The Fairness Doctrine was a Federal Com-
account, and a YouTube channel. Each of these munications Commission (FCC) policy that was
has a slightly different purpose and focus. The first introduced in 1949. Through 1967, the Fair-
Web page, for example, not only delineates policy ness Doctrine was applied on a case-to-case basis,
initiatives and legislation Durbin favors but also after which point it was formally codified as part
provides connections for those seeking constitu- of the FCC’s regulations. The Fairness Doctrine
ent services, the locations of local field offices, or existed until 1987 when the FCC determined that
protections afforded consumers. Durbin’s Web the doctrine was no longer needed, although lan-
page also provides updates regarding the legisla- guage referencing it was not removed from FCC
tive agenda, recent press releases, and stories of regulations until 2011. At its essence, the Fairness
Illinois residents. Doctrine sought to ensure that viewers of televi-
Durbin’s Facebook page contains reminders sion programming were exposed to a variety of
to vote, links to Web sites and Facebook pages viewpoints related to controversial issues facing
of political allies, and other features relating to the nation. To that end, the FCC required hold-
constituents, special interest groups, and other ers of broadcast licenses to make two interrelated
issues of concern. His Twitter account sends out commitments. First, the Fairness Doctrine obliged
two to 10 tweets per day, updating those inter- broadcasters to devote a certain amount of their
ested in Durbin’s daily routine, speeches, Senate airtime to discussions of controversial topics
votes on pending bills, and the like. The Flickr affecting the public interest. Second, it compelled
account contains Durbin’s photostream, which broadcasters to present contrasting views regard-
shows the Senator greeting other politicians and ing these topics. The FCC afforded broadcasters
guests in his office, Durbin at work on various a wide degree of autonomy in presenting the con-
Senate subcommittees, and him out in the field troversial topics, and many used editorials, news
campaigning and meeting constituents. Finally, segments, or public affairs programs to do so.
Durbin’s YouTube channel contains videos of him Although the Fairness Doctrine was repeat-
making speeches on the Senate floor, announcing edly challenged in the courts, a variety of judicial
workshops for constituents, promoting public opinions determined that Congress acted within
works projects that will provide jobs in Illinois, its discretion in promulgating the requirement. In
and interacting with special guests to his office. Red Lion Broadcasting Co. v. FCC, 395 U. S. 367
Together, these social media sites permit Durbin a (1969), for example, the court held that when a
chance to connect with voters, constituents, and broadcast station makes a personal attack on an
others in a variety of ways, thus allowing individ- individual, he or she must be given free on-air time
uals of all ages to interact with him in the manner to respond to the attacks. As a variety of alter-
they feel most comfortable. native channels of communication became avail-
able, the Supreme Court did begin to question
Controversy the necessity of the doctrine, but left its fate to
Durbin has angered some proponents of free Congress. In 1987 the FCC abolished the Fairness
speech and Internet communications through his Doctrine, which was met by proposed legislation
Durbin, Richard J. 421

Democratic senator from Illinois Richard J. Durbin answering questions from bloggers in “The Big Tent,” an area set aside especially
for new media, including Google, Digg, and YouTube, during the 2008 Democratic National Convention in Denver, Colorado. Durbin
has angered some online activists and proponents of free speech through his support of such legislation as the Preventing Real Online
Threats to Economic Creativity and Theft of Intellectual Property (PROTECT IP) Act (PIPA).

reintroducing the policy, although this was vetoed belief that open discourse required a variety of
by President Ronald Reagan. The Fairness Doc- viewpoints. Nothing has come of this, however,
trine was separate and distinct from the equal time although conservatives and libertarians continue
rule, which requires radio and television broad- to oppose any return of the doctrine.
casters to provide opposing political candidates In 2010 Durbin cosponsored the Combat-
equivalent opportunities to appear on the air. ing Online Infringement and Counterfeits Act
In 2005, more than 20 members of the House (COICA), which sought to combat media piracy
of Representatives proposed the Fairness and by shutting down Web sites that facilitate such
Accountability in Broadcasting Act (FABA), behavior. COICA was criticized by many First
which would have restored the Fairness Doctrine Amendment advocates, who insisted that the
as part of the requirement to renew broadcast proposed legislation would foster censorship and
licenses. Specifically, FABA would have required harm many for the illegal actions of a few.
broadcasters to cover important public mat- The following year, after COICA failed to pass,
ters, hold twice-yearly public meetings to deter- Durbin served as a cosponsor of PIPA, which
mine which issues to cover, and demonstrate to was the Senate version of the more well known
the FCC that these obligations were being met. SOPA. PIPA was designed to prevent or curtail
Although introduced, FABA was referred to com- copyright infringement of intellectual property.
mittee, where no further action was taken. In Infringement was defined by PIPA as the distribu-
2007, Durbin publicly suggested a need for the tion of counterfeit goods, illegal copies, or tech-
return of the Fairness Doctrine, emphasizing his nology designed to foil digital rights-management
422 Durbin, Richard J.

software. The bill was designed to facilitate law consideration so that they could further study the
enforcement efforts to curtail digital copyright problems presented.
infringement, allowing the U.S. attorney general As one of the more liberal members of Con-
to seek injunctive relief against Web sites, facili- gress, Durbin continues to receive high marks
tating such activity. Indeed, after applying for and from a variety of left-leaning advocacy groups
receiving a court order so permitting, the govern- such as the National Association for the Advance-
ment would be able to force advertisers, financial ment of Colored People (NAACP), the American
institutions, Internet service providers, and search Civil Liberties Union (ACLU), and the National
engines to cease all interaction with the rogue site Education Association (NEA) while receiving
and to delete all links to it. low grades from conservative advocacy groups.
PIPA and SOPA enjoyed broad support among Durbin’s passion for protecting the rights of
a variety of groups. Both the U.S. Chamber of workers and his willingness to accept government
Commerce and the American Federation of Labor regulation may cause him to continue to support
and Congress of Industrial Organizations (AFL- efforts to combat Internet piracy.
CIO) supported the legislation, as did copyright
and trademark holders in business and indus- Stephen T. Schroth
try, along with labor organizations representing Megan A. Lee
their employees. Film studios, record companies, Knox College
publishers, and a variety of businesses represent-
ing traditional means of distribution, such as See Also: Campaigns, Congressional (2002);
cable networks, movie theaters, and others who Campaigns, Congressional (2008); Campaigns,
felt piracy was threatening their ability to com- Organizing; MoveOn.org; Social Media, Adoption of.
pete, also supported the measure. Other groups,
however, opposed PIPA and SOPA vigorously. Further Readings
Opponents of the legislation asserted that its pas- Douglas, P. H. In the Fullness of Time: The Memoirs
sage would impede innovation, limit freedom of of Paul H. Douglas. New York: Harcourt Brace
speech, and impugn Internet integrity. A variety Jovanovich, 1972.
of companies and organizations, especially those Morris, D. and E. McGann. Outrage: How Illegal
engaged in or affiliated with Internet businesses, Immigration, United Nations, Congressional
joined civil libertarians in opposing the bills. Rip-Offs, Student Loan-Overcharges, Tobacco
After the administration of President Barack Companies, Trade Protectionism, Drug Companies
Obama announced that it opposed the legisla- Are Ripping Us Off . . . and What to Do About It.
tion in its current form as a potential means of New York: Harper Perennial, 2008.
censorship of lawful activity and as a threat to Nowlan, J. D., S. K. Gove, and R. J. Winkel. Illinois
the underlying architecture of the Internet, con- Politics: A Citizen’s Guide. Urbana: University of
gressional leadership withdrew the bills from Illinois Press, 2010.
E
Earned Media hope behind these activities is that individuals
share them with members of their social networks.
Three types of media exist: paid media, owned How these individuals connect with their social
media, and earned media. Paid media involves a networks depends on the possibilities offered
group purchasing air time or space in order to dis- by the various Web sites. A “like” on Facebook
tribute its messages, such as a commercial during shows up in a person’s newsfeed for his or her
a television show. Owned media involves a group friends to see and hopefully prompts those friends
using its own outlets to distribute messages, such to like the same thing. Microblog sites such as
as press releases on a Web site. Earned media Twitter and Tumblr allow users to share others’
refers to the dissemination of a group’s messages posts with one click, to comment on them, and
through other outlets for free, such as news media to create their own posts. Pinterest allows users
coverage or social media sharing. Political cam- to create online pinboards with various images.
paigns rely on earned media to engage audiences YouTube channels and accounts host video, and
with their messages. these channels also allow sharing and comment-
With traditional media such as television and ing. After winning the 2012 election, for exam-
newspapers, campaigns use formal speeches, enter ple, Barack Obama tweeted a picture of himself
debates, stage events, create commercials, and hugging his wife Michelle Obama and the words
write editorials and letters to the editor with the four more years. In the days following the elec-
hope that news organizations would do more in- tion, Twitter users retweeted the post more than
depth stories on them. In contrast, social media 800,000 times, setting a record.
allow political campaigns to earn media from both The other part of the hope is that traditional
traditional media outlets and individual users. In news media cover social media activities as well as
addition to the traditional events, campaigns use the previous approaches. Obama’s tweet and the
sites such as Twitter, Facebook, YouTube, Tum- record number of retweets became a news item
blr, and blogs on dedicated Web sites. With these for several media outlets. His campaign’s starting
options, the campaigns employ short, word-based a Pinterest account garnered media coverage as
posts, still images, and videos to communicate well, with some stories even mentioning the chili
their positions and their activities. recipes listed there.
Social media make getting earned media even Earned media offer several advantages. First,
easier than traditional activities did. Part of the they offer the opportunity to reach a wider

423
424 ECHELON

Not all political activities relate to political


campaigns. The group Invisible Children released
a video known as Kony 2012, which laid out
plans for a campaign to raise awareness about the
crimes of Joseph Kony, leader of the Lord’s Resis-
tance Army in Uganda, accused of kidnapping
children and forcing them to serve in his army.
The video called for Kony’s capture and arrest,
and the video quickly went viral across multiple
social and traditional media. The video brought
attention to the issues, but it also drew criticism
for its messages and their execution.

Barack and Michelle Obama embrace in a photo similar to the Heather McIntosh
one that went viral on Twitter after the 2012 election, becoming Boston College
the site’s most shared photo ever. The photo was taken on
August 15, 2012, after a campaign event in Davenport, Iowa. See Also: Advertising and Marketing; Buzz Creation;
Cause-Marketing Campaigns; Engagement Advertising;
Facebook; Going Viral; Return on Investment; Tumblr;
Twitter; Viral Marketing; YouTube.
audience than targeted activities. Second, they
help generate interest in the campaign and draw Further Readings
attention to it. Third, they offer an affirmation for Drell, Lauren. “How Social Media Is Changing Paid,
those already supporting the campaign through Earned, and Owned Media” (June 23, 2011).
seeing their efforts getting outside attention. http://mashable.com/2011/06/23/paid-earned
Overall, this attention implies an agreement with -owned-media (Accessed December 2012).
the campaign’s messages. “Earned Media: Capturing Audience Attention.”
Earned media also come with challenges, such PR Newswire (November 28, 2012). http://blog
as standing out in a crowded media environment .prnewswire.com/2012/11/28/earned-media
and losing control over intended messages. Repub- -capturing-audience-attention (Accessed
lican candidate for president Mitt Romney learned December 2012).
this lesson when his comments about some Ameri- Fouhy, Beth. “Romney Controversy Points to Power
cans not paying income tax and about his views of Viral Video” (September 20, 2012). http://
on gay marriage became viral videos. The videos www.standard.net/stories/2012/09/20/romney
gained traction from individual social media users -controversy-points-power-viral-video (Accessed
and from the mainstream press, both in support December 2012).
and in derision of his comments. Once the videos
become available and start gaining attention, they
become difficult to retract or control.
Further, earned media allow others to insert
their own messages into political conversations. ECHELON
During the 2012 campaign, billionaire Donald
Trump created a video in which he offered Presi- ECHELON is a term associated with an intelli-
dent Obama $5 million to any charity of the pres- gence collection system used by the United States
ident’s choice if Obama produced records such and several of its allies. It is used primarily to sort
as his passport application and his college tran- through communication intercepts. This system is
scripts. The video became available to audiences based on a network of computers that automati-
through YouTube and soon gained media and cally search through large amounts of intercepts
popular attention. Instead of garnering support, for preprogrammed key words or addresses. Since
though, Trump’s video drew criticism. the existence of ECHELON was first revealed
ECHELON 425

in the late 1980s, debates have focused as to its The term ECHELON comes from the comput-
potential impact on civil liberties. Similar concerns ers that form the backbone of the surveillance sys-
can be raised about the capabilities that intelli- tem. Within each monitoring station, computers
gence agencies are developing for the purpose of contain catalogues and lists of key words, telephone
digital surveillance in the age of social media. numbers, and e-mail addresses that reflect infor-
The term ECHELON is often used to refer to mation that the intelligence agencies of the partner
the widespread surveillance capabilities developed countries are seeking. Each station uses a particu-
by the National Security Agency (NSA), the U.S. lar ECHELON dictionary that contains target lists
organization in charge of collecting and exploit- entered by its parent agency and partner organiza-
ing signals transmitted from communication sys- tions. When certain key words, addresses, or pat-
tems, radar, weapon systems, or signal intelligence terns appear in an intercept, they are automatically
(SIGINT). The ECHELON network relies on a recognized by the computer system, and are sent to
series of monitoring stations throughout the world. the intelligence agency that originated the request.
These are managed by the NSA and its counter- The system is particularly useful because it sepa-
parts in a series of partner countries, including rates intercepts of interest from those not of inter-
the Government Communication Headquarters est. A majority of intercepts are thus filtered out
(United Kingdom), the Government Communica- and not retained within any database.
tion Security Bureau (New Zealand), the Defense
Signals Directorate (Australia), and the Communi- Controversies
cation Security Establishment (Canada). ECHELON, as with any other surveillance sys-
The origins of the ECHELON system can be tem, raises important questions about the trade-off
traced back to the special relationship that devel- between national security and liberal democracy.
oped between the United States’ and the United Most media reports on ECHELON have empha-
Kingdoms’ (UK) intelligence apparatuses during sized potential abuses of power. In 1988, Marga-
World War II. This was formalized in 1946 when ret Newsham revealed that when she was working
the two countries signed the UK­­–USA agreement as a software engineer at a ground station based
that institutionalized cooperation in the realm of in Menwith Hill, UK, in the late 1970s, she heard
SIGINT. This agreement was later extended to phone calls from Senator Strom Thurmond (R-SC).
include three second parties: Canada, and then In addition, Margaret Thatcher supposedly used
Australia and New Zealand. Later on, third par- ECHELON to spy on her ministers. In 1992, senior
ties such as Norway, Denmark, Germany, Italy, intelligence officials working for GCHQ, the Brit-
and Turkey also joined the multilateral intelligence ish SIGINT organization, revealed in the (London)
cooperation network. Cooperation between these Observer that nongovernmental organizations
countries played a vital part in the collection of such as Amnesty International, Greenpeace, and
SIGINT on the Soviet bloc during the Cold War. Christian Aid had been intercepted by the system
At the end of the Cold War, ECHELON, along because they referred to arms trafficking.
with other interception systems, was redirected Negative media reports have reinforced the
away from the Eastern Bloc to focus on threats tendency among the general public to consider
such as terrorism and organized crime. the government’s eavesdropping networks as all-
The scope of the ECHELON primarily targets powerful. These stories have also raised impor-
nonmilitary entities such as governments, public tant questions about the impact of surveillance
and private organizations, companies, and indi- on democracy. International intelligence coopera-
viduals. Originally, the ECHELON computer net- tion in the area of SIGINT has allowed partner
work was only able to sort through intercepted countries to circumvent prohibition on domestic
satellite communications, and was only able to spying. This is done by means of a mechanism
analyze phone call–related information, but not whereby each partner can ask other partner-states
its content. In the last decades, however, the sys- to carry out intelligence collection on its citizens
tem has reportedly been updated and its surveil- on its behalf. Fears that ECHELON or other simi-
lance capabilities broadened to tap into cable lar surveillance systems have been used as a tool
communications and monitor the Internet. for domestic control are widespread. Allegations
426 ECHELON

about the use of the ECHELON system for politi- administration of George W. Bush had allowed
cal and economic espionage, and public knowledge the NSA to carry out a warrantless wiretap pro-
of the existence of NSA-run stations throughout gram which involved intercepting the communi-
Europe, led the European Parliament to establish cations of U.S. citizens.
a Temporary Committee on the ECHELON Inter- The growing importance of social media in the
ception System (1999–2004). This did not lead to early 21st century further stimulates long-stand-
any major revelation, but confirmed the existence ing debates about the trade-off between national
of the ECHELON system. security and liberal democracy. Social media have
The controversies generated by the ECHELON become an essential source of information for
network are not without historical precedent. intelligence agencies seeking to find information on
The investigations carried out by the U.S. Senate potential terrorist organizations or to predict polit-
Select Committee to Study Governmental Opera- ical trends abroad. For example, experts have sug-
tions With Respect to Intelligence Activities (the gested that a better understanding of social media
Church Committee) in 1975 shed light on a series could have helped the Central Intelligence Agency
of abuses of human rights and civil liberties com- (CIA) to forecast the Arab Spring of 2011.
mitted by the U.S. intelligence community in the The vast amount of information available
early Cold War. In a project codenamed SHAM- within social media platforms poses significant
ROCK, the NSA was able to intercept interna- challenges to intelligence agencies, which typi-
tional telegrams entering into and exiting from the cally need to process information and distinguish
United States, using the facilities of three major the “wheat from the chaff,” relevant information
telegraph companies. This surveillance program from noise. Social media publicize vast amounts
may well have been in contradiction of the First of essentially private information. This phenom-
and Fourth Amendments to the Constitution, enon redefines the boundaries between public
which respectively protect political freedoms and and private spheres. This societal evolution and
guard against unreasonable searches and seizures. the efforts of intelligence agencies to cope with
The revelations of the 1970s paved the way for it should prompt continuous scrutiny from intel-
the institutionalization of the congressional over- ligence overseers and activists.
sight of intelligence in the United States.
The Foreign Intelligence Act of 1978 put in Damien Van Puyvelde
place a process of judicial review that required University of Texas at El Paso
U.S. government agencies to obtain a warrant
from a special court in order to collect “foreign See Also: Carnivore; Domestic Surveillance and
intelligence information” between “foreign pow- Social Media; FinFisher; Freedom of the Press and
ers” and “agents of foreign powers” (the latter National Security; Pretty Good Privacy; Privacy;
category potentially includes U.S. citizens). Fur- Search and Scrape Capability; Terrorism; Tor.
ther procedures were instituted in subsequent
years to limit the acquisition and retention, or Further Readings
prohibit the dissemination, of certain types of Hager, Nicky. Secret Power—New Zealand’s Role
intercepts made by U.S. intelligence agencies, in in the International Spy Network. Nelson, New
order to safeguard the rights and privacy of U.S. Zealand: Craig Potton Publishing, 1996.
citizens. U.S. government agencies now operate Keefe, Patrick Radden. Chatter: Uncovering the
under a set of legal requirements when they inter- Echelon Surveillance Network and the Secret
cept communications involving U.S. citizens. This World of Global Eavesdropping. New York:
also applies to the ECHELON system. Random House, 2006.
However, the existence of a formal system of Omand, Sir David, Jamie Bartlett, and Carl
intelligence accountability does not ensure that Miller. “Introducing Social Media Intelligence
civil liberties are systematically respected, or that (SOCMINT).” Intelligence and National Security,
controversies will not emerge. For instance, in v.27/6 (2012).
2005, a controversy arose following media allega- Richelson, Jeffrey. “Desperately Seeking Signals.”
tions that, in the aftermath of the 9/11 attacks, the Bulletin of the Atomic Scientists, v.56/2 (2000).
Echo Chamber Phenomenon 427

Echo Chamber their Web sites. Jamieson and Cappella conclude


that the consistency and repetition of their conser-
Phenomenon vative message creates an ideological comfort space
for conservative audiences because the media’s
The concept of the “echo chamber phenome- opinions resonate with their existing beliefs.
non” emerged as a result of the rise of opinion-
ated and partisan media. In relation to political Social Media
media, the echo chamber phenomenon most com- The above example describes the audience as a
monly refers to the flow of information on the passive consumer of information in a media-dom-
Web and the information-seeking behaviors of inated echo chamber. However, audiences can
Internet users. The vast number of partisan Web also assume a more active role when they par-
sites and the proliferation of partisan voices on ticipate in content creation on interactive digital
social network sites create cavernous echo cham- venues. Using social network sites, personal Web
bers as people reiterate what others have already logs, and other Web platforms that encourage
said, an idea that is reminiscent of Gaye Tuch- audience interaction, individuals strengthen the
man’s notions of the “web of facticity” and the echo chambers by reposting media content and
“news net,” but practiced with political inten- offering supporting opinions.
tion, rather than as an unintentional by-product In particular, scholars and critics have acknowl-
of modern journalistic practice. The metaphor of edged the capacity for social network sites to
the echo chamber, which alludes to the idea of a amplify echoing effects as a result of their techni-
bounded enclosed communicative space that can cal structure and design. On social network sites,
potentially magnify messages and insulate them users seek out and maintain connections with oth-
from rebuttal, has been employed in varying ways ers with whom they share similar beliefs. Friends
to explain relationships between the media and and connections overlap in most networks, and
audiences. consequentially, users end up hearing the same
The echo chamber phenomenon has been used information over and over. Research has sug-
to explain the production and dissemination of gested that people who are repeatedly exposed to
information published among news media out- the same information delivered by diverse sources
lets. In an era when online journalist outlets are eventually accept the information as truth.
expected to publish content 24 hours a day, seven To exemplify this point, it is helpful to consider
days a week, information is consequentially recy- the blogosphere during the 2004 election, which
cled and reused as the same stories and opinions successfully convinced the mass media that presi-
tend to appear in multiple outlets at once. Large dential candidate Howard Dean had more traction
and established media companies, as well as in the campaign than he actually did. The echo-
smaller, alternative media outlets and Web logs, ing of support that reverberated throughout the
reference each other to support their material. In realm of digital Web logs suggested that Dean had
echoing each other’s news and opinions, each out- engendered a significant number of supporters,
let legitimizes the other. stimulating the media to report on his popularity
This premise was illustrated in a study of conser- among the electorate. However, it was eventually
vative media outlets and their audiences conducted recognized that the digital endorsement for Dean
by Kathleen Hill Jamieson and Joseph N. Cappella represented in the blogosphere did not translate
in 2008. They argued that three outlets in particu- to offline support, and therefore the online echo
lar—Rush Limbaugh’s radio talk show, Fox News, chambers had created a false depiction of reality.
and the editorial page of the Wall Street Journal— More recent uses of social network sites by activ-
constitute an echo chamber that effectively pro- ists and special interest groups have successfully
motes and defends conservative principles and the created a similar distortion of the truth, as the rep-
Republican Party. Not only do these three distinct etition of slogans and stories that travel through
media entities quote each other in their reporting, online social networks create the impression that a
they also create positive feedback loops for audi- given message has gained more visibility and pub-
ences by featuring links to each other’s content on lic acceptance than it actually has.
428 Economic and Social Justice

Audience Fragmentation and Polarization See Also: Audience Fragmentation/Segmentation;


Creating a false illusion of reality is just one nega- Blog for America; Blogosphere; Polarization, Political;
tive implication yielded by the echo chamber Social Media, Definition and Classes of.
phenomenon. Audience fragmentation and polar-
ization are additional problems that have been Further Readings
recognized when the echo chambers are fueled Boyd, D. “Can Social Network Sites Enable Political
by media and audience participation. Commu- Action?” International Journal of Media and
nication and social science research suggest that Cultural Politics, v.4/2 (2008).
audiences enter the political arena with exist- Jamieson, K. H. and J. N. Cappella. Echo Chamber:
ing attitudes and preferences that they wish to Rush Limbaugh and the Conservative Media
reinforce through their selection of compatible Establishment. New York: Oxford University
media. Internet technology empowers users to Press, 2008.
selectively expose themselves to certain content Sunstein, C. Republic.com. Princeton, NJ: Princeton
and opinions that resonate with their pre-existing University Press, 2001.
beliefs. Through this information-seeking pro- Tuchman, Gaye. Making News: A Study in the
cess, audiences guard themselves from informa- Construction of Social Reality. New York: Free
tion that challenges their beliefs, and ultimately Press, 1978.
their involvement in partisan echo chambers leads
individuals to adopt more extreme attitudes that
increase the polarization of political attitudes.
Some have suggested that the echo chamber
phenomenon and its polarizing effects continue to Economic and
intensify as a result of the advancement of techni-
cal and cultural characteristics of the Internet. For Social Justice
example, news organizations and political cam-
paigns are increasingly encouraging their online Combining elements of several key views of social
audiences to formulate social groups and discus- justice it is possible to generate a definition of social
sion forums surrounding topics of shared interest. justice. Social justice is a state of affairs in which
Researchers have claimed that this activity pro- (1) benefits and burdens are dispersed through a
duces social enclaves of like-minded people, which society based upon some principle(s); (2) political
ultimately prevent citizens from gaining exposure leaders and other integral decision makers protect
to diverse viewpoints and sharing of common the basic rights, liberties, and entitlements of indi-
experiences. Online social groups insulate them- viduals and groups by utilizing procedures, norms,
selves and their opinions from challenges, which and rules; and (3) authorities and other actors,
results in a widening of gulfs between extreme including citizens, treat all humans beings with
sides on public issues. dignity and respect. These three aspects of social
justice are closely aligned with distributive, proce-
Conclusion dural, and interactional justice.
Despite the widely discussed negative implica-
tions of the echo chamber phenomenon, some Rise of Social Media
have suggested that the repetition of information Access to information is critical for the func-
created by the echo chamber effect may allow tioning of a healthy democracy. As a result,
audiences to become more informed on political the role of the printing press during the rise of
issues. The echo chamber phenomenon represents American democracy was critically important.
an important theory that has significant impli- It was through the printing press that new ideas
cations for political communication, especially emerged and conversations could take place that
when conducted in a digital environment. refined and developed these ideas. In fact, during
George Washington’s administration the Federal-
Stephanie E. Bor ists, under the leadership of Alexander Hamilton,
University of Utah created the Gazette of the United States, causing
Economic and Social Justice 429

Republicans, led by Thomas Jefferson, to publish help increase the recognition of these events and
the National Gazette. These newspapers allowed generate a desire to ameliorate these injustices.
competing political views to further the inter-
ests and goals of the political parties. Access to Distributive Justice
information flourished during the 1840s after the At its core, distributive justice focuses on consid-
invention of the telegraph. News could immedi- erations of equity. Specifically, the point of con-
ately be sent from city to city. In the 1920s radio cern is on how to allocate scarce resources fairly
became available, and in the late 1940s television and appropriately. A frequent issue, however,
revolutionized the way many Americans received is that decision makers typically disagree about
information. Moreover, the advent of television what factors should be utilized to determine pro-
allowed politicians to speak directly to the Ameri- portional outcomes. Liberals and progressives, at
can citizenry. least in Western society, were quick to pick up the
The rise of modern social media presents a cause of social justice. Two traditions emerged:
new and exciting chapter for American democ- one focusing on utility and the other on the basis
racy. The Internet has connected people like never of basic individual rights. “The greatest happi-
before. Recent research from the Pew Research ness of the greatest number” reflects the founda-
Center found that more people receive news from tions of the utility approach. Essentially, then, a
online sources than through radio or newspapers just approach is one that satisfies the majority of
and, while television remains the most popular individuals. The focus of utilitarianism is on the
outlet, its audience consists mostly of older Amer- consequence of a decision. The basis of the wel-
icans. By mid-2012 over 2.4 billion people were fare state depends on the utility approach. That
using the Internet. In addition, by the end of 2012 is, redistributing valuable resources to assist those
there were 6.7 billion mobile subscriptions con- who need the assistance the most serves the com-
necting people throughout the world. mon good. However, there is certainly disagree-
Social media provides a means for individuals ment about whether this approach is just. For
to become informed about events and a means to instance, in a leaked recording from a private
connect people who share common concerns and fund-raising event, 2012 Republican presidential
interests. Social media allows individuals to work candidate Mitt Romney was recorded as saying
and be champions for their own political views as that 47 percent of Americans are “dependent on
well as to highlight issues important to them and government.” In effect, he was making the claim
work toward generating concern among other at a closed-door event that 47 percent of the
people as well. The 2008 U.S. presidential elec- country is unjustly using and relying on money
tion saw a significant increase in the use of social from wealthier Americans.
media to connect with potential voters. Senator Basic individual rights refer to a common
Barack Obama’s campaign in 2008 was much conception of universal principles that apply
more successful using social media than Sena- to everyone. This approach is often referred to
tor John McCain’s campaign. The role of social as deontological. Ultimately, the focus of deon-
media in the 2012 election was even greater. In tological approaches is not just on the conse-
fact, the second debate of the 2012 U.S. presiden- quences of human action, but on other consid-
tial election generated 12.24 million comments on erations as well, and requires a willingness of all
Twitter and Facebook, making it the top political people and institutions to abide by these princi-
event of all time in terms of such comments. Social ples. John Rawls famously claimed the more just
media provides individuals with the opportunity system is the one that would be selected by deci-
to share their thoughts, critiques, and agreements sion makers under a “veil of ignorance.” That
with political leaders. In addition, social media is, without having any knowledge about one’s
also presents a means for inequalities and inequi- own status or position in society, the system that
ties to become known. That is, social media pro- one would select without an awareness of his or
vides a way to remove the invisible barrier that her own position would be the most just system.
keeps injustices from being widely known and Interestingly, a voluminous amount of empiri-
recognized. Eliminating this invisible barrier can cal research has shown that making decisions
430 Economic and Social Justice

without considering individual life experiences, Why do people care about the procedures used
personal characteristics, and opinions is clearly in the decision-making process? One idea is that
impossible. The practicality of this approach to it ensures people have received a fair outcome.
justice has been called into question. In addition, the fairness of the decision-making
The concept of justice is often called into procedures communicates that people are valued,
question by political conservatives who view respected, and understood. That is, allowing peo-
the current social systems as perhaps not per- ple a voice in the process makes them feel appre-
fect, but certainly necessary. Recent research ciated as individuals and increases perceptions
has found political conservatism to be related to that other group members value their input and
two principles: traditionalism, or being resistant perspective. Perceptions of fairness are associated
to change, and the justification of inequality or with social comparison processes. As a result,
hierarchy. Not surprisingly, justice concerns that procedural fairness alleviates concerns about
often involve challenges to the status quo are one’s standing compared to relevant others. Social
concerning to conservatives. Political conserva- comparisons lead to perceptions of injustice when
tives do not disregard issues of justice, but they an individual has not had a role in decision-mak-
often prioritize other issues such as merit and ing processes.
personal freedom.
Interactional Justice
Procedural Justice It is has been proposed that perceptions of jus-
Concerns for justice often entail more than a con- tice can be affected not only by how people are
cern about the allocation of resources. Procedural treated by authority figures, but also how citizens
justice, for instance, focuses on the procedures treat one another. That is, individual experiences
or methods used in the decision-making process. of discrimination or the harboring of prejudiced
Research has found that the perceived fairness of attitudes can create unjust environments leading
the procedures used in the decision-making pro- to feelings of unfair interpersonal treatment. Four
cess influence not just the perception of the final aspects of an interaction impact interpersonal
outcome, but also the individual’s view of the justice: respect, truthfulness, justification, and
decision maker. Early procedural justice theorists propriety. Being treated with respect and engag-
suggested two processes are used in perceptions ing in honest, truthful interactions increase per-
of procedural fairness: process control and deci- ceptions of justice. Justification refers to receiving
sion control. Process control refers to whether quick and satisfactory explanations for decisions.
people have the opportunity to present evidence Finally, propriety refers to the avoidance of preju-
on their own behalf prior to a decision being dicial treatment. People desire justice not only in
made. The impact of being able to present evi- the allocation of resources and in decision-making
dence on one’s behalf has generated a great deal procedures but also in everyday interactions with
of research labeled the “voice effect.” Having a others. This is an often overlooked but important
voice in the process drastically increases percep- aspect of justice.
tions of procedural fairness. Moreover, having a
voice increases positive affect, decreases negative Social Media and Justice in Action
affect, and is associated with greater trust in deci- The Arab Spring is a term that has been used to
sion makers. Decision control refers to whether describe the protests, demonstrations, and revo-
individuals have a voice in the decision process lutionary actions that occurred in parts of the
itself. When individuals feel they have a voice in Middle East and northern Africa starting in 2010.
the process and will have some influence in the While the role of social media in the revolutions
decision-making process, people perceive proce- has been discussed at length, there seem to be two
dures to be fair and just. In contrast, when people important factors during the Arab Spring that were
are excluded from presenting evidence on their strongly impacted by social media. One, social
behalf and lack a voice in the decision-making media allowed information to spread and knowl-
process, perceptions of procedural fairness are edge about government abuses to become widely
negatively impacted. known. Two, social media allowed individuals to
Economic and Social Justice 431

In the United States, the Occupy Wall Street


movement, a movement aimed at confronting
the greed and corruption of the top 1 percent in
America, began with a Twitter message by the
magazine Adbusters suggesting a march in the
Lower Manhattan area. The message was spread
through various social media outlets (Twitter,
Facebook, YouTube, and more) and participants
used these outlets to provide real-time updates.
When protesters began to have confrontations
with law enforcement officials, many of these
altercations were recorded and uploaded to social
media outlets. The use of social media connects
individuals from across the nation and allows
local groups from different cities to stage united
demonstrations and protests.
In the United Kingdom (UK), social media has
presented a forum to address the growing con-
cern about bullying. In November 2012, during
National Anti-Bullying Week in the UK, Facebook
created an anti-bullying page as part of the Fam-
ily Safety Center. The emphasis of the page was
placed on conflict resolution and creating stronger
social networks to prevent and address bullying.
Young speakers at a rally for the creation of antibullying With parents feeling many school districts lack
legislation in the state of Michigan at the Michigan Capitol in the ability to adequately address bullying, social
Lansing on October 8, 2011. Social media campaigns have been media provides a means to address the issue with-
instrumental in bringing attention to social issues such as bullying. out the assistance of school districts. In March
2013 a father used Facebook to express his frus-
tration with bullying behavior at his son’s school.
In the Facebook post that father held a sign say-
connect with one another and organize protests ing “I stand behind my son in the fight against
and demonstrations. These networks connecting bullying!” Within a week the post had received
and working through social media became diffi- 453,000 “likes” and 466,000 shares.
cult to contain. Social media presents an exciting medium for
During the Egyptian uprising, activists provided connecting concerned citizens, mobilizing the
near real-time updates about protests and demon- disenfranchised, and bringing greater attention
strations. The instant access to information helped to economic and social justice violations both
create an atmosphere of revolution as a result. The domestically and around the world. Social media
impact of social media during these revolutions allows individuals access to information about
was critical. Moreover, the role of social media issues of inequality, as well as ways to take action
as a means for unifying people together in other to help ameliorate these issues.
political movements and protests will surely prove
a fruitful avenue for future research. For instance, Justin D. Hackett
Twitter has become a commonly used means for California University of Pennsylvania
dissent and criticism among citizens in Saudi Ara-
bia. In a country that did not experience issues See Also: Antibullying Campaigns; Antislavery
during the Arab Spring, many citizens have used Campaign and Social Media; Antiwar Protesting;
social media to connect and, perhaps for the first Arab Spring; Civil Rights; Disaster Relief; Ethics
time, criticize the Saudi government. of Social Media and Politics; Faith-Based Social
432 E-Democracy

Change; Hacktivism; Human Rights; Lesbian, Gay, have, significant influence on the functioning and
Bisexual, and Transgender Rights; Nongovernmental health of democratic political institutions and their
Organizations; Nonprofit Organizations; Occupy relationship with the citizenry through enhanced
Movement; Poverty; Quebec, Canada, 2012 Student opportunity to participate.
Protests; Seattle 1999 WTO Protests; Social Issues An expanding body of research focuses on the
Advocacy, Netroots Driven. Internet and democratic governance relation-
ship. Not surprisingly, opinions about the Inter-
Further Readings net’s effects on democracy are mixed and range
Ahonen, Tomi. “Latest Mobile Numbers for from those that foresee revolutionary changes
End of Year 2012.” Communities Dominate and a strengthening of democracy to those that
Brands. http://communities-dominate.blogs.com/ envisage no changes regarding the distribution of
brands/2012/12/latest-mobile-numbers-for-end power in society or a weakening of democracy.
-of-year-2012-this-is-getting-humongous.html With e-democracy defined as the ability of citi-
(Accessed May 2013). zens to electronically access governmental infor-
Goldberg, G. S. “Economic Inequality and Economic mation and services, interact with governmental
Crisis: A Challenge for Social Workers.” Social officials, and participate in governmental decision
Work, v.57 (2012). processes and elections, this entry focuses on the
Hamdy, N. and E. H. Gomaa. “Framing the context, practice, and assessment of e-democracy.
Egyptian Uprising in Arabic Language Newspapers
and Social Media.” Journal of Communication, Context
v.62 (2012). The scope of e-government emphasizes the dis-
Jost, J. T. and A. C. Kay. “Social Justice: History, semination of information, delivery of services,
Theory, and Research.” In Handbook of Social and provision of avenues for citizens to partici-
Psychology, 5th ed., S. T. Fiske, D. Gilbert, and G. pate in government decisions via the Internet.
Lindzey, eds. Hoboken, NJ: Wiley, 2010. These Internet features build the foundation for
Preston, J. “Protestors Look for Ways to Feed the the implementation of e-democracy, and in doing
Web.” New York Times (November 24, 2011). so, government Web sites are more than cyber-
Ray, T. “The ‘Story’ of Digital Excess in Revolutions space highways flanked by information-driven
of the Arab Spring.” Journal of Media Practice, billboards and a series of service stops along the
v.12 (2011). way. Based on the dissemination of government-
related information to provide both transparency
to citizens about political issues and check on the
government’s power, such sites offer interactive
online tools to enhance public space with dialogue
E-Democracy between citizens and their governments, such as
with the United Kingdom’s MySociety and the
Over the past two decades, innovations in digital Sunlight Foundation in the United States. Another
information technologies have contributed to the example is Meetup, which enables common-
emergence of electronic government, or e-gov- interest groups to set a time and place to orga-
ernment, designed to communicate information, nize locally, practicing their rights of assembly and
deliver services, and offer additional avenues to speech. Jared Duval finds that there are 6 million
interact with and participate in government across Meetup members and 2,000 meet ups daily world-
industrialized countries. Strikingly, this new tech- wide, while the SeeClickFix application facilitates
nology has revolutionized and empowered human citizens to report potholes, fallen trees, and so on.
interaction through a new, unmediated many-to- As these Internet innovations spread, they, accord-
many communication on a large scale through ing to S. Rho, facilitate an informed citizenry,
new forms outside the antiquated boundaries specifically addressing direct democracy through
of television, radio, and newspapers. These new openness and active participation. E-democracy is
forms, that is, e-mail, database software, and espe- providing creative solutions for transparency and
cially the Internet, have had, and will continue to accountability in government.
E-Democracy 433

Practice perceive the implementation of e-democracy as


John Stuart Mill wrote that local governments are running counter to a liberal democracy. Similar
“schools of democracy,” thereby affording greater to the argument about a decline in social connect-
potential for citizen–government interactions and edness through technology, critics claim that the
participatory opportunities than other levels of impersonal dialogue encouraged by e-government
government. Current research by T. Wohlers and undermines the participatory nature of a demo-
others reveals that local government Web sites cratic political system. Nevertheless, research
across industrialized countries are mostly limited points to promising advances made by local gov-
to providing a range of basic one-way services ernments in e-democracy.
rather than transactional services. Similarly, M.
Bräuer and T. Biewendt’s study of Germany’s 80 John R. Wood
largest cities suggests that they provide a variety Rose State College
of virtual ways to directly interact with city offi- Tony E. Wohlers
cials. However, J. K. Scott and others find that, Cameron University
while some cities have made great advances, only
a few facilitate meaningful, interactive forms of See Also: Digital Government; Open Source
participation. For example, L. S. Clift finds that Governance; OpenGovernment.org; Project Vote
St. Paul, Minnesota, offers an e-mail notification Smart; Sunlight Foundation; Transparency.
and personalization option, while the Village of
Hastings, New York, provides an online input Further Readings
system. Across the Atlantic, German cities like Bräuer, M. and T. Biewendt. “Elektronische
Esslingen and Ulm use the Internet as a tool to Bügerbeteiligung in Deutschen GroBstädten
elect the Municipal Youth Council and evaluate Zweites Website-Ranking der Initiative
public projects. eParticipation.” Initiative eParticipation (2005).
It has also been argued that, while the successful http://www.initiative-eparticipation.de (Accessed
facilitation of interactive online public dialogue January 2007).
and consultation with government remains rare, Clift, L. S. “E-Government and Democracy.
new digital information technology applications, Representation and Citizen Engagement in the
such as Web 2.0, have the potential to enhance Information Age” (2004). http://www.mail-archive
both direct and representative democracy. How- .com/do-wire@lists.umn.edu/msg00161.html
ever, several obstacles remain regarding the (Accessed September 2006).
implementation and growth of local e-democracy. Duval, Jared. Next Generation Democracy:
They include the lack of information technology What the Open Source Revolution Means
expertise to reduce errors and system tampering, for Power, Politics, and Change. New York:
lack of city administrator motivation to imple- Bloomsbury, 2010.
ment Internet-enhanced participatory structures, Johnson, J. “The Illiberal Culture of E-Democracy.”
limited access for the poor within the context of Journal of E-Government, v.3/4 (2006).
the digital divide, and uneven telecommunication Rho, S. “An Evaluation of Digital Deliberative
infrastructure availability nationwide. Moreover, Democracy in Local Government.” In Global
the prevailing ideology among citizens and policy E-Government: Theory, Applications and
makers, socioeconomic conditions, and the policy Benchmarking, L. Al-Hakim, ed. Hershey, PA:
entrepreneur presence either inhibit or facilitate IDEA, 2007.
policy innovation. Scott, J. K. “‘E’ the People: Do U.S. Municipal
Government Web Sites Support Public
Assessment Involvement?” Public Administration Review, v.66
Opinions about the merits of e-democracy are (May/June 2006).
mixed. Optimists, such as Clift, argue that the Wohlers, T. “The Digital World of Local Government:
Internet can be used to enhance direct democ- A Comparative Analysis of the United States and
racy with more community interaction with their Germany.” Journal of Information Technology &
respective governments. Others, like J. Johnson, Politics, v.6 (April/June 2009).
434 EdgeRank

EdgeRank clicking, liking, following, reading, listening, and


viewing. While Facebook continues to adjust
EdgeRank is the name given to a suite of algo- Edge­Rank’s parameters, certain activities have
rithms that optimize the news feed feature on the been consistently assigned more weight than oth-
Facebook social networking service. EdgeRank ers. In terms of content creation, posting an image
determines which news items to display and in has more weight than expressing a change of sta-
what order, thereby influencing the visibility and tus. In terms of content consumption, comment-
reach of user activity on the service. It structures a ing on content has more weight than merely view-
user’s capacity to disseminate information, his or ing it. Calculating weight also takes into account
her exposure to the activities of others, as well as the path that led to a user’s interaction. Click-
the capacity of groups to use Facebook for politi- ing through an ad is differentiated from clicking
cal and commercial purposes. While the particular through a fan page, for example; this approach
details concerning EdgeRank’s operations remain reflects Facebook’s overarching commercial strat-
confidential, its basic functionality was first pub- egies and goals.
licly outlined during Facebook’s third semiannual Time decay assigns a value to edges based on
F8 conference in April 2010. the time of their origin and the recency of engage-
Consistent with the algorithm’s origins in graph ment with them. It is calculated dynamically to
theory (an area of discrete mathematics), in Face- prioritize both newer edges and edges that have
book’s terminology, an edge represents a relation drawn recent engagement. In this way, older
or link between two relevant data points: one edges may still retain a high value if they continue
user’s activity compared with another’s news feed. to garner user interaction.
Every time a user logs into Facebook, Edge­Rank When deriving an overall score, EdgeRank also
derives a set of relevant edges (relations among takes into account whether the edge was produced
friends, fan pages, groups, and so on), which may by a member of some prioritized group. People in
include the posting of new Facebook objects (a a user’s basic close friends list feature, or those
change in status, a new photograph, video, or organized into custom smart lists built according
hyperlink), or recent interactions with already to a user’s preference, produce higher scores: Fam-
existing Facebook objects (the ongoing accumula- ily ties, work relations, and geographic location
tion of “likes” or comments). To differentiate and are common organizing criteria here. In general,
prioritize the sheer number of these daily interac- EdgeRank seems to be motivated by Facebook’s
tions into a useful news feed, EdgeRank scores commitment to populate a significant percentage
each edge according to three formal properties: of the news feed with organic (e.g., nonsponsored)
affinity score, weight, and time decay. content, as well as its desire to experiment with
Affinity score assigns a value to the social rela- and integrate new forms of relationality as pri-
tions between the user initiating the event (the edge oritization heuristics. With the introduction of the
creator) and those users who may view the event on GraphRank algorithm as a subset of EdgeRank
their news feeds. The more Users B and C interact in 2011, shared interest around cultural objects
with content contributed by User A, for example, (such as books and films) became a key example
the higher the affinity score of edges originating of such heuristics.
from User A will be. Affinity is a one-way relation: While the precise ratio of the elements used
it only considers the activities of news feed owners by EdgeRank to calculate an edge’s score is
(e.g., Users B and C) and not those of the origi- unknown, the algorithm tends to prioritize edges
nal edge creator. Taking this approach reduces the that either reflect a higher degree of engagement
potential for link spammers to game the algorithm by other users or those that entice users to be more
because the fact that other users engages with an engaged themselves. In other words, EdgeRank is
individual’s content does not necessarily mean that ultimately designed to draw users into becoming
the individual is close to them. more active and for longer periods of time. Using
Weight assigns a value to the kinds of activities prior activity around edges as a feedback mecha-
a user undertakes on a scale that reflects the depth nism for structuring present relevance has clear
of engagement represented by certain activities: implications for groups large and small: Everyday
Education, Issues in 435

users, professional associations, and civil society freedom of speech, digital citizenship, resources,
organizations all use Facebook to promote their and security remain ones that often divide parents,
events, causes, services, brands, and products. teachers, administrators, and students in terms
Because visibility on the service is determined by of policy and practice. However, it is no longer
the volume and depth of activity, EdgeRank moti- a matter of whether or not social media becomes
vates groups to contribute content that entices integrated into curricula and instruction; social
engagement so as to increase the likelihood that media are everywhere and will not be going away.
their content will persist and circulate on other Schools continue to grapple with safeguards and
users’ news feeds. limits, while teachers and students are forging
creative and rich spaces to build community and
Roy Bendor expand learning, despite the potential problems.
Simon Fraser University Teachers and administrators have become more
Neal Thomas comfortable with the use of social media in class-
University of North Carolina–Chapel Hill rooms. They have recognized that three aspects of
social media are becoming the norm: the immedi-
See Also: Algorithmic Authority; Engagement acy of information, formation of links and bonds
Features; Facebook; Fan Page. with individuals one may never meet in real life,
and opportunities for collaboration and partici-
Further Readings pation. Concerns regarding social media use in
Bucher, Taina. “Want to Be on the Top? Algorithmic education have also grown, as has the backlash
Power and the Threat of Invisibility on Facebook.” by administration and others. Four negative rami-
New Media & Society, v.14/7 (2012). fications have generally been cited as reasons for
Kincaid, Jason. “EdgeRank: The Secret Sauce prohibiting the use of social media in schools:
That Makes Facebook’s News Feed Tick.” inappropriate relationships between teachers and
Techcrunch (April 22, 2010). http://techcrunch students; peer-to-peer harassment or cyberbully-
.com/2010/04/22/facebook-edgerank (Accessed ing, in which a victim receives numerous nega-
December 2012). tive personal comments and continual derisive
Stinson Ross Michelle. “Facebook EdgeRank: and insulting communication; risk of connections
The Truth About Page Feed Reach and Promoted with sexual predators posing behind false identi-
Posts.” Search Engine Journal (November 8, ties; and student participation in illegal activities,
2012). http://www.searchenginejournal.com/ including pirating music and movies. Legislation
facebook-edgerank-page-feed-reach-promoted at federal and state levels, as well as acceptable
-posts/51348 (Accessed December 2012). use policy (AUP) adoption by individual schools
help safeguard minors and protect the institutions
yet allow for cautious and careful communication
and learning activities.

Education, Issues in Access and Limitations


Schools vary tremendously in technology, both
The intersection of social media and education in availability and use. Resource-rich districts
began with trepidation. Kindergarten through are often replete with digital devices as well as
12th-grade (K–12) schools and institutions of teachers who know how to use them. Schools
higher education were among the last organiza- in geographic areas of lesser socioeconomic lev-
tions to embrace this technology because of fac- els generally have less equipment, often older or
tors such as lack of access and training as well as with less capability, and may not have the luxury
fear of consequences of misuse. Within the last of professional development for faculty. This so-
five years, public and private schools at all levels called digital divide is a concern because skills and
have recognized the need to develop and main- knowledge associated with technology are becom-
tain a presence on sites such as Facebook, Twitter, ing requirements for active involvement in the
Tumblr, Wikispaces, and YouTube. Issues such as 21st century as an individual and as an employee.
436 Education, Issues in

more skilled with these outside of school than in


class. Smartphones have also dramatically changed
the situation. Schools are no longer able to control
access to the Internet as many individual students
and faculty have the ability to connect within their
pockets at all times. The result has been a com-
bination of safeguards and blocks, policies that
govern responsible use, and access and teaching
that assist students in learning 21st-century skills
related to ICT. Personal as well as professional
ICT use by students and faculty, even outside of
school, has become part of school policies.
Limitations of access to social media sites,
especially Facebook and YouTube, have become
a common way for schools to safeguard their stu-
dents. Many parents express concern that, with
too much freedom, students may knowingly or
inadvertently access material via social media
that is offensive or contains content that violates
their family standards of morality, religion, and
Schoolchildren playing an educational game together on a mobile decency. This type of community dialogue and
phone. Although social media and technology foster important consensus on acceptable limits is commonplace
skills, the ubiquity of smartphones has made monitoring Internet with regard to curricula and texts. However, the
access and online activity much more difficult for educators. openness and accessibility of social media presents
numerous potential problem situations. Schools
have been cautious with student, and even teacher,
access of social media during school hours and on
K–12 school settings often provide students with school equipment. Firewalls and other security
information and expertise that help them advance measures help control this to some degree, but
and which they would not gain outside of the these measures are criticized as limiting legitimate
classroom. Education has been a way for many educational uses of these sites.
individuals to rise above their current social and Two federal laws govern ICT use in schools. The
economic background. Without access to tools Children’s Internet Protection Act was passed in
and activities that are quickly becoming common- 2000 and requires schools to filter or block obscene
place in society and business, some students will visual depictions and material harmful to minors
remain at a disadvantage and may not be able to during computer use by minors. The law was
maintain or improve their lives. passed prior to Web 2.0 applications and does not
With the growth of Web 2.0, applications that specifically address social media. The Broadband
allow users to easily post content, images, and Data Improvement Act, passed in 2008, includes
videos and remix the same to create new mate- a section called Protecting Children in the 21st
rial have changed the way many schools approach Century. Schools are required to have an Internet
information and communications technology safety policy that teaches minors about appropri-
(ICT). Henry Jenkins and others describe the new ate online behavior, including interaction social
participatory culture that exists and outline new networking Web sites and cyberbullying aware-
and different skills necessary for full membership ness and response. Schools have learned to balance
in society. Competencies necessary for college, restriction with education for responsible use.
career, and citizenship in the 21st century have
been described as the 4Cs: communication, col- Promotion Versus Privacy
laboration, critical thinking, and creativity. Social Many schools’ first reaction to social media was
media fosters all four, and students often become avoidance. As social media use became the norm,
Education, Issues in 437

educational institutions realized that blogs, Face- critical. Some districts that are not used to either
book, Twitter, and other social media sites provide publicity-minded activities or social media do
a valuable mechanism for reaching stakeholders not utilize these sites, and may see little benefit,
and maintaining continuous, real-time communi- get discouraged, and quit. Clear objectives and
cation with the public as well as faculty, staff, and constant monitoring of statistics such as views,
students. Schools also need to ensure that they “likes,” and comments are necessary, accompa-
are controlling their own public images and are nied by strategic responses. Social media may
able to ensure that accurate and positive informa- feel inappropriate for some educators, yet many
tion is available to all. In an era of accountability schools recognize that lessons from business and
and standards, as well as competition and choice, entertainment can have benefits for organizations
social media can assist educational institutions in that traditionally kept low profiles.
creating and maintaining unique identities, simi- Privacy issues have grown to include the per-
lar to brands in business. sonal presence of individuals connected with the
In higher education, social media have become organization. Although teachers and administra-
the number one way to reach prospective and tors have the right to use social media for them-
current students and alumni. A majority of high selves outside of school, the impact of that use on
school students are using social media as tools in their jobs can be a concern. Teachers have been
their college selection processes. Colleges form fired, fined, or suspended for comments, activi-
social network groups for newly accepted students ties, or photographs posted on personal Face-
so that they can immediately feel connected to the book or Twitter accounts. Individuals have also
institution and others. While schools may have received sanctions for unprofessional comments
official Web sites that provide public personae, that were job-related, such as complaints or pejo-
there are also sites that allow current and past stu- rative terms used to describe students, colleagues,
dents to voice their opinions regarding all aspects or parents. While some have argued that teachers
of academic and campus life. The anonymity and school personnel have the same freedom of
allowed by the Internet creates problems because speech as any citizen, others acknowledge that,
individuals can post any negative comments with- by virtue of their responsibility as role models to
out identification or supporting evidence. Schools young people, they are held to higher standards
have countered this by creating their own Face- of appropriate actions and words. Online activi-
book pages and Twitter feeds that balance the pic- ties that are designed to hurt, defame, or harass
ture and respond to concerns immediately. others are part of cyberbullying or cyberstalk-
Promotion in school districts has become a ing. Cases have been documented that establish
necessary component in daily operations. School how this type of activity can push some individu-
choice in some areas allows parents to compare als to retaliate or seek escape through destructive
schools and select one for their child. Charter behavior, even suicide. Two types of cyberbully-
and private schools provide alternatives to local ing can involve direct messages, or use of proxy
schools. K–12 schools are vying for students in (someone else, or posing as someone else) to send
some cases much like colleges. Districts are turn- negative comments or altered images.
ing to social media to demonstrate their use of
innovative technology as well as to spread the Blurring Roles
word of their accomplishments. They recognize Teachers and professors who have embraced
that the opportunity for positive connections with social media for learning often find that students
their communities outweighs the potential prob- seek continual communication. The term friend
lems. One problem is time. Maintaining a pres- has become a verb used to describe linkage on
ence in social media outlets requires at least one Facebook and other social media sites. The
individual with dedicated time for creating, revis- question of whether or not to friend students is
ing, and repurposing content as well as monitor- a difficult one for some teachers. Teachers who
ing these sites and responding to unplanned com- would never consider students as friends in the
ments or situations. Using tags to connect with traditional sense are grappling with benefits ver-
other districts on similar issues has also become sus potential problems of connecting on social
438 Education, Issues in

media sites. This is especially true in higher edu- educate students in what it means to be a good
cation, where students are generally over 18 and citizen in the online world.
more independent. Four areas have become critical to social media
One of the most difficult aspects of social media in education. One is digital etiquette, or neti-
use by educators and students is perception. Unlike quette. This refers to electronic standards of con-
face-to-face communication, words stand alone duct. Teachers are used to teaching students what
without voice inflections and facial expressions to is appropriate for courtesy and civility in school
mediate the message. Communications are swift, and holding them accountable for unsuitable
public, able to be forwarded beyond the intended behavior or speech. The same instruction must
receiver, and open to interpretation by others. The occur for online interaction via social media.
question of which identity, personal or profes- Despite the freedom allowed in online environ-
sional, is used when posting becomes blurred. ments, students should be taught and expected
Educators have become entangled in situations to follow the same standards for behavior and
that have damaged their reputations through speech that they would in person. The second
unintended consequences of actions. When some- area, digital rights and responsibilities, extends
thing is shared on social media, it has the poten- this beyond mere courtesy. It refers to freedoms
tial to become public in many other arenas. Indi- extended to everyone in a digital world. Just as
viduals have been duped in many ways: Students teachers explain that rights such as freedom of
have posed as adults on dating sites, downloaded speech come with responsibilities, students must
questionable photos from teachers’ posted vaca- be instructed that freedom to post comments
tion albums, or caught teachers’ negative com- and thoughts online is not a license for profanity,
ments about colleagues or workplaces. In some harsh comments, or hate speech. This is particu-
cases, teachers have fallen into inappropriate sex- larly true of many polarizing issues that educators
ual or personal relationships with students that currently face. Teachers and students must learn
may never have happened in real life but result together how to disagree and debate in a manner
from the ease of sharing personal feelings through that is reasonable, even forceful, and yet civil.
social media. Schools are now taking precautions The first two areas of digital citizenship rely
to decrease potential problem situations by estab- on personal responsibility for one’s own behav-
lishing guidelines for personal as well as profes- ior. Two other areas that are somewhat more
sional use of social media by teachers. As many grounded in society are legal aspects and secu-
of these consequences and incidents are reported, rity. New laws are helping to shape when online
teachers are becoming more cautious and recog- behavior is not merely discourteous but illegal.
nize that anything posted is really public, despite For example, individuals can form accounts with
settings and attempts to keep it private. false names or the name of a real person and post
comments that are harmful and damage someone’s
Digital Citizenship reputation. Inappropriate comments and behav-
The Internet has broken through traditional class- iors on social media sites have been cited as par-
room walls and allowed students and teachers to tially responsible for serious results, damages, and
expand their learning globally. Connections with even teen suicides. Courts are defining where and
others in countries around the world, authentic how individuals are culpable for online comments
learning, and virtual field trips to otherwise out- and behavior. The fourth area of digital citizenship
of-reach locations are some of the ways that social that is related to social media is digital security.
media has provided learning that would have been This refers to electronic precautions to guarantee
impossible before. Students are taught to follow safety and self-protection. Students are often vic-
rules for behavior at home, in classrooms, in busi- tims of online scams and may provide personal
ness, and in various other social situations. They information that can lead to identity theft. Native
learn to vary speech and behavior in different applications, or apps, may contain code that mon-
situations. However, rules and norms for online itors and obtains digital information that can then
social interaction are being forged and revised be sent or sold to third parties. Staying logged
within the digital landscape. Teachers now must in can also give unwanted access. These safety
Egypt 439

features are different from security measures such the 21st Century. Chicago: The MacArthur
as firewalls utilized by schools at the institution Foundation, 2006.
level. Teachers must educate students regarding Kist, William. The Socially Networked Classroom:
the many cautions related to digital security that Teaching in the New Media Age. Thousand Oaks,
are especially important with social media. CA: Corwin, 2009.
Digital citizenship is not mandated in most cur- Ohler, Jason. Digital Community, Digital Citizen.
ricula. However, it is as crucial as mathematics Thousand Oaks, CA: Corwin, 2010.
and literacy in the global world. Schools, parents, Ribble, Mike. Digital Citizenship in Schools, 2nd
and teachers need to examine ways that knowl- ed. Washington, DC: International Society for
edge and skills related to social media and online Technology in Education, 2011.
behavior can become the subject of instruction at
all levels.

Conclusion
Schools need to find ways to continually respond Egypt
to issues associated with social media in schools.
In general, placing limitations on students tends On January 17, 2011, an Egyptian man set him-
to make something even more appealing; some self on fire outside of Egypt’s parliament build-
students will always find ways to circumnavigate ing to protest the government’s refusal to allow
the restrictions. Most schools have accepted these him access to inexpensive, subsidized bread
new spaces as a constant in students’ lives and for his restaurant. A mobile phone was used to
ones that are difficult to impossible to control. record and distribute, via the Internet, a closed-
They cautiously monitor new ICT tools in order circuit television image of the incident. This self-
to remain current and make careful selections and immolation, and at least two others the follow-
decisions that will provide quality education for ing day, sparked an 18-day uprising fueled by
students. Many educators have elected to teach social media that would end the three-decade
students about the potential dangers and prob- dictatorship of Hosni Mubarak. The protest that
lems and provide them with skills to make good began as a small youth movement drew ideas
choices for their words and actions. and strength from the successful uprising in
Social media use has become commonplace Tunisia in December 2010, which brought down
in classrooms, schools, and universities with the that country’s authoritarian president, Zine al-
ubiquitous nature of smartphones and tablets. Abidine Ben Ali.
Schools and educators must find their individual Following the Tunisian revolution, Egyptian
comfort levels with devices and spaces so that activists began to organize an uprising of their
they are conscientiously safeguarding those in own to protest Egypt’s high poverty and unem-
their care as well as embracing innovations that ployment rates, government and police corrup-
challenge, engage, teach, and connect. tion, and the almost constant state of emergency
that allowed Mubarak to censor the media, stop
Cathy Leogrande protests, and try civilians in military courts. Activ-
Le Moyne College ists, especially Wael Ghonim, the 30-year-old head
of Middle Eastern marketing for Google, and
See Also: Antibullying Campaigns; Digital Citizen; Asma Mahfouz, a 26-year-old female activist, uti-
Facebook; Schools4All; Youth Engagement. lized social media to help organize a Day of Rage
on January 25, 2011. January 25th was selected
Further Readings because it was a national holiday designed to
Consortium for School Networking. Acceptable Use honor Egyptian police. In addition, this national
Policies in a Web 2.0 Era: A Guide for School holiday had been used in the past by activists as a
Districts. Washington, DC: Author, 2011. day for protest marches.
Jenkins, Henry. Confronting the Challenges of In both the Tunisian and Egyptian uprisings,
Participatory Culture: Media Education for protesters used social media not only to organize
440 Egypt

their activities but also to globally distribute Posting under the pseudonym El Shaheed, or
information about their causes through a process the Martyr, Ghonim’s messages quickly spread
referred to as cyberactivism. Ironically, it was to other pages, such as We Are All Khaled Said.
the Egyptian government’s own efforts, begin- The Said page was created during the summer of
ning in 1999, to expand the availability and use 2010 in reference to a man who was taken from
of information technology that would create the an Internet café and beaten to death by police
cybernetworks used by the protesters. Mostly after he posted a video on the Internet showing
young, educated Egyptians formed the core of the police stealing drugs that they had just seized.
January uprising. Activism began with blogs, but Photos of his beaten body went viral, and a You-
quickly grew to include social media outlets, such Tube video about his death was seen by more
as Facebook, YouTube, and Twitter, that allowed than 500,000 people. The Facebook page itself
for widespread and immediate interconnectivity had more than 470,000 friends at one point,
of the protesters. which is significant, considering there were
In the days leading up to the beginning of the only approximately 21 million Facebook users
Egyptian protests on January 25th, Egyptian throughout Arab countries in 2010. While the
activists used the Internet to communicate with Said page originally began as a way to share
Tunisian protesters in order to learn how to pre- information surrounding Khaled Said’s case, it
pare themselves for demonstrations and clashes quickly became a space for broader political dis-
with police as well as how to counter the effects cussions about Mubarak’s regime.
of tear gas using cola and milk. Protest leaders On January 14, the day that Tunisia’s govern-
also discussed the safety advantages of protesting ment fell, Ghonim invited his more than 350,000
at night, the use of black spray paint to obscure Facebook followers to protest Egypt’s govern-
the windshields of police and military vehicles, ment on January 25. In less than three days, more
and how to utilize traditional media to add out- than 50,000 people replied yes to his invitation to
side pressure to the government. Egyptian activ- join a Day of Rage. During the days leading up
ists posted videos from the Tunisian protests to to January 25, Egyptian activists took to social
study and use as examples. media to discuss ideas such as how technology
In addition to the information learned from could be used to avoid surveillance and how to
Tunisia, protest leaders received assistance from set up effective barricades. In order to move the
activists who had been forced to leave Egypt. protest from the virtual world to the real world,
Omar Afifi, a former Egyptian police officer who additional activists used Facebook, Twitter, and
fled to the United States after his life was threat- YouTube to call people to Tahrir Square and other
ened because he wrote a book that discussed how sites around Egypt to begin the uprising.
to avoid police brutality, used YouTube, Face-
book, and Twitter to advise Egyptian protesters Asma Mahfouz
how to avoid arrest, what they should wear, and The activist Asma Mahfouz already possessed
how to engage in peaceful protest. experience in the use of social media for cyber-
activism. Mahfouz was one of the founders of the
Activists and Social Media April 6 Youth Movement that used Facebook in
Ghonim, working anonymously through a Face- March 2008 to support a planned strike by textile
book page created for Egyptian Nobel Peace Prize workers in the city of Mahalla. While the April
winner and opposition leader Mohamed ElBara- 6 protest was not successful, Mahfouz saw the
dei, began to distribute revolutionary ideas to the power of social media in the Tunisian revolution.
page’s followers. Facebook was seen as a crucial Using a Webcam, Mahfouz recorded a 15-min-
tool for cultivating support for a potential upris- ute video that helped to frame for Egypt and the
ing because, whenever someone friended the world the reasons for the protest. In the video,
page, it would show up on that person’s Face- posted January 18, she indicates that the protests
book wall as well. Such reposting allowed the are about basic human rights and that the men
messages to spread more quickly and to a much who set themselves on fire were not mentally ill as
larger audience. the government tried to portray.
Egypt 441

An Egyptian activist and labor leader, Kamal el-Fayoumi, using Twitter to stay in touch with his followers in April 2009. Like Asma
Mahfouz, el-Fayoumi had experience in organizing strikes in 2008 that were precursors to some of the events of the 2011 Egyptian
revolution. Egyptian activists also received advice from Tunisian protest leaders in early 2011.

Mahfouz said that she would march in Tahrir Through social media, female cyberactivists
Square on January 25, and she encouraged other coordinated how to prepare themselves for pub-
women to join her. Mahfouz also took advantage lic protests. They encouraged each other to wear
of Egypt’s patriarchal culture to encourage men to multiple layers of clothes, veils, and abayas, so if
come out to Tahrir Square, if for no other reason one layer was pulled off their bodies, they would
than to protect the women. Such posts helped to not be exposed. In addition, women as well as
diversify the ranks of the protesters from mainly men used social media, especially SOS tweets, to
young, well-educated members of the upper let others know when they were in danger, thus
classes to doctors, lawyers, members of the media, reducing the response time of aid givers. Such uses
Christians, and Muslims. of social media by female activists dramatically
Mahfouz’s video, originally posted on her Face- increased the number of women participating in
book page, quickly went viral. Under Mubarak’s the uprising. At the beginning, women accounted
government, women faced high illiteracy rates, for only 10 percent of protesters, but by the end,
harsh divorce laws, and abuse by police. Women that number increased to 50 percent.
were not allowed to meet publicly to discuss
reform under Mubarak’s regime. However, the Media Framing and Control
Internet provided women a safe space where they Social media, as well as traditional media, was
could gather and discuss controversial issues, also used by protesters to frame the uprising in
thus continuing Egyptian women’s long history of a way that was favorable. In an effort to sway
social activism. Mubarak’s foreign allies, cyberactivists flooded
442 Egypt

the Internet with transparent content that served in September but again refused to leave office. On
to counter the pro-Mubarak stories being pre- February 2, Internet services were restored after
sented by media outlets such as Al Jazeera Eng- five days, and Google improved its Speak2Tweet
lish. Such transparency was especially important technology for use by people in Egypt. Speak2­
for American media, as the American govern- Tweet allows users to tweet on Twitter by leaving
ment had been an ally of Mubarak and sup- voice messages on international phone numbers,
porter of the Egyptian economy through billions thus allowing social media use to continue even
of dollars of aid. when Internet services are unavailable.
At one point, when the Egyptian Museum Approximately a million protesters continued
was vandalized and artifacts were destroyed by to fill Tahrir Square, as foreign investors began
looters, media outlets began to describe Egypt to withdraw their capital from the country, and
as being in crisis and chaos. Egyptian reporters, foreign governments, including the United States,
such as Mona Eltahawy, encouraged the media began to issue statements indicating that it was
to instead use the terms uprising or revolution up to the people of Egypt to determine who their
to show that the movement had structure and leaders would be. Cyberactivists used the increas-
a common goal. In addition, traditional media ingly anti-Mubarak rhetoric to organize for a Day
followed closely the social media feeds com- of Departure on February 4. After seven addi-
ing from Egypt and rebroadcasted many of tional days of protests and violence, Mubarak
the images and messages. This was especially announced on February 11 that he would resign
important when media was banned from Tahrir as president and turn the government over to the
Square, but through social media, citizens were military. This paved the way for Egypt to hold
able to become journalists and continue the dis- its first truly democratic elections in more than
semination of information. 7,000 years.
The use of social media to organize and inflame
the uprising was so significant that the Egyptian Democratic Elections and
government on January 27 attempted to shut Continued Protests
down the Internet and block cellular phones as Elections to the People’s Assembly of Egypt,
activists were organizing more protests to begin which took place in three parts from November
after Friday prayers. Internet traffic dropped by 28, 2011, to January 11, 2012, occurred first.
approximately 90 percent as the few Internet During the electoral process, there was continued
access providers were told by the government to concern about who would control the Egyptian
halt services. In spite of the efforts to take Egypt government as well as whether the military would
off of the grid, activists were still able to share give up the powers given to it by Mubarak. Cyber-
information about how to access the Internet activists therefore continued to use the Internet to
using dial-up connections in other countries. inform the world of the atrocities still being faced
At the same time, however, protest leaders by Egyptians. For example, in December 2011,
began to be captured by the police, including Tahrir Square was filled once again by Egyptians
Ghonim. Google issued a statement saying that protesting that 17 women had been subjected
Ghonim was missing and asked for tips as to his to “virginity tests” by the military police after
whereabouts without mentioning his role in the Mubarak left office. One of the female protesters
uprising. Google’s statement went viral, and pro- was grabbed by the police, beaten, kicked in the
testers began referring to Ghonim as their leader, stomach, and dragged through the street with her
while Facebook pages titled “We Are All Wael bra exposed.
Ghonim” began to appear. He was released two The video of the beating of the girl in the blue
weeks later. bra went viral, and female activists took to social
In spite of the increasingly violent protests in media to organize yet another demonstration in
the streets, Mubarak refused to step down. He Tahrir Square for December 23, 2011. Thousands
did dismiss the government on January 28 and returned, with men forming a protective circle
his cabinet on January 29. On February 1, he around the female protesters. While the identity
announced that he would not run for re-election of the girl in the blue bra remains unknown, one
18DaysinEgypt.com 443

of the 17 women who suffered the virginity test 18DaysinEgypt.com


did come forward to sue the military police.
In spite of the continued protests, parliamen- 18DaysinEgypt.com is a collaborative, cross-
tary elections took place. The Democratic Alli- sourced documentary project and innovative
ance, a coalition of 11 parties led by the Freedom experience in social media. It is aimed at cap-
and Justice Party created by the Muslim Broth- turing the revolution lived in Egypt during the
erhood, secured approximately 45 percent of the 18 days of the uprising against the government
seats in Parliament with the Islamist Bloc party in 2011, which finished with president Hosni
receiving the next largest percentage of 25 per- Mubarak’s defeat and exile. The “18 days” refers
cent. The elections, however, were ruled uncon- to the period between January 25, when the Day
stitutional on June 14, 2012. After protests and of Rage march against the regime was promoted
rioting, the parliament was reinstated until a new through the Internet, to February 12, the first day
election could be held in September 2012. of the democratic transition.
The presidential elections were also marred by The project collects material related to the piv-
controversy, including a dramatic constitutional otal events that occurred during this period and
reform by the military police that stripped the were captured by cell phones, pictures, texts,
incoming president, Muslim Brotherhood candi- tweets, or messages on Facebook. These materials
date Mohamed Morsi, of many of his powers. It are uploaded in an interactive Web site open to
is yet to be determined if these reforms will stand. users even after the end of the events, and is con-
What is clear, however, is that Egyptians will con- tinuously evolving. 18DaysinEgypt.com enables
tinue to use social media as a tool for political participants to chronicle the Egyptian revolution.
discourse and reform. The Web site introduces the concept of streams,
collective narratives composed of social media
Pamela C. O’Brien snippets from multiple contributors. This innova-
Bowie State University tive approach allows for each story to be told from
multiple perspectives, giving the viewer an in-
See Also: Activists and Activism, Digital; Africa, depth look at personal moments and events of the
North; Al Jazeera Effect; Arab Spring; Bahrain; revolution. Streams featured on the site already
Countries Banning Social Media for Political Reasons; cover a broad range of topics from pictures of
Demonstrations, Organizing; 18DaysinEgypt.com; protesters’ humorous signs and art inspired by the
Facebook; Human Rights; International Intervention; revolution, to women chanting for freedom and
International Social Media and Politics; International songs about the revolutionary struggle.
Unrest and Revolution; Libya; Mosireen.org; Built by Egyptian software company Emerge
Speak2Tweet; Tunisia; Twitter. Technology, the platform allows users to explore
the stories and to build a community of wide-
Further Readings ranging narratives. 18DaysinEgypt.com is pow-
Eltantawy, Nahed and Julie B. Wiest. “Social Media ered by GroupStream, a program for group sto-
in the Egyptian Revolution: Reconsidering rytelling that fosters collaborative narratives told
Resource Mobilization Theory.” International together. It is also supported by the Ford Foun-
Journal of Communications, v.5 (2011). dation, Tribeca Film Institute, Sundance Institute,
Giglio, Mike. “The Facebook Freedom Fighter.” and the Brooklyn Law Incubator and Policy (Blip).
Newsweek (February 13, 2011). http:// The technological supply is a simple slideshow,
www.thedailybeast.com/newsweek/2011/02/13/ allowing instant access to stories. The Web site
the-facebook-freedom-fighter.html (Accessed 18DaysinEgypt.com solicits user-contributed sto-
April 2013). ries with a beta tool called Groupstre.am. 18Days
Mainwaring, Simon. “Exactly What Role Did Social inEgypt.com was originally created by documen-
Media Play in the Egyptian Revolution?” http:// tary filmmaker and journalist Jigar Mehta and
www.fastcompany.com/1727466/exactly-what interaction designer Yasmin Elayat. They worked
-role-did-social-media-play-egyptian-revolution together with the community manager of the proj-
(Accessed April 2013). ect Shadi Rahimi, a photographer and journalist
444 18DaysinEgypt.com

and cofounder of the media arts organization Sev- including the wish for a constitution and a refer-
enth Native American Generation (SNAG). The endum, hopes for Mohammed Morsi and Ahmed
clips always include the context and the date of Shafik as candidates in the elections and Omar
the story and extra graphs and data nodes, creat- Suleiman as Hosni Mubarak’s successor, the trials
ing a complex document that provides exhaustive of the military and civilians, the links with Syria
and thorough information to the user. and the Arab Spring, and the sexual harassment
The Web site organizes the material in four cat- that occurred among the population.
egories that help to associate similar users’ con-
tributions by: latest, recommended, popular, and Postrevolution Content
date. This material, pooled by fellows, has text Once the events of the Egyptian revolution were
cards to guide the user through the contents. It is finished, 18DaysinEgypt.com changed course
also available in two languages, English and Ara- and evolved from a different perspective. The
bic. Apart from this basic team, 18Daysin­Egypt subsequent material explored the implementa-
.com counts on a number of fellows to help set tion of real freedom after the overthrow of the
the tone of the project and value the stories that dictatorship and showed the struggle to achieve
work best on the site. The fellowship acts as a freedom beyond the revolution. The next contri-
bridge between the online platform and the butions turned into a number of reflections on
offline world, represented by Egyptians telling democracy and the Mubarak trial, as well as the
their stories. Moreover, the initiative has set out presidential election on May 23 and 24, won by
to raise at least $18,000 in order to fund 20 aspir- Mohammed Morsi.
ing or established Egyptian journalists to collect A change occurred on the platform after the
stories from eyewitnesses throughout Cairo. Six dramatic events of February 1, 2012, when a soc-
fellows were funded for six weeks to focus on cer match between the Al-Masry and Al-Ahly
stories in Cairo: Sara Elkamel, Nesma El Shazly, teams turned deadly in Port Said. The conflict was
Mostafaa Sheshtawy, Mohamed Abd El-Hamid, immediately politicized, as the Al-Ahly supporters
Carmel Delshad, and Dina Fergani. The project were allegedly involved in the uprising and Al-
was also supported by platforms like Kickstarter Marsy followers mostly sided with the former dic-
.com, a service to fund creative projects, which tator. Anti-Mubarak activists accused the Supreme
sent journalists to other Egyptian cities like Luxor, Council of the Armed Forces, still in the govern-
Aswan, Suez, and Alexandria. ment, of consenting and organizing the confronta-
The material hosted has a very eclectic and tion. The date also coincides with the first anni-
heterodox nature, from personal experiences in versary of the Battle of the Camel, when armed
Egypt to analysis and opinions all over the world. mercenaries stormed protesters in Tahrir Square.
Some of the clips are more traditionally narrative- The 18DaysinEgypt.com fellows gathered per-
driven, and others are just graphic or text mate- sonal interviews and collected firsthand resources
rial of personal experiences. Clicking on any of from on the ground to create a stream capturing
the bylines, the user can pull up a participant page little-known details of the Ahly Massacre. This
and see all the stories that one person has contrib- marked a turning point in the contributions to
uted. The process of reaching out to people to tell the platform after the revolution, as the deaths
stories is a multifaceted campaign: first, through originated a number of marches and demonstra-
a social media outreach, especially Facebook and tions and several protests against the action of
Twitter; second, students of the American Univer- the council. As the clashes continued, 18Days
sity in Cairo or nongovernmental organizations inEgypt.com focused on stories from the front-
who did work throughout the revolution and lines, including those about women, businesses
contributed actively to create stories; and finally, that stayed open despite being surrounded by
professional filmmakers who made films about violence, motorcycle ambulances, and the tough
the revolution. task of negotiating a truce.
Aside from the content related specifically to
the demonstrations and protests, some other sub- Manel Jiménez-Morales
jects were detailed once the conflict was over, Universitat Pompeu Fabra
Election Monitoring 445

See Also: Africa, North; Arab Spring; Egypt; News enhancing the efficiency of observation. Observers
Media; Social Networking Web Sites; Twitter. now have the opportunity to cover large samples
across large geographic areas, capture data from
Further Readings polling centers, and report observations to cen-
18daysinegypt.com. http://beta.18daysinegypt.com tral operations centers where the data is collected,
(Accessed April 2013). organized, analyzed, and followed by periodically
Howard, Philip N., et al. “Opening Closed Regimes: released public statements on the overall conduct
What Was the Role of Social Media During the of elections across a country.
Arab Spring?” Working Paper 2011.1. Project on New media and technologies may be widely
Information Technology & Political Islam (2011). applied in election monitoring, including blogs,
Khamis, Sahar and Katherine Vaughn. “Cyber­ social networking sites (Twitter, Facebook,
Activism in the Egyptian Revolution: How Civic Myspace), Google Maps, mobile phones (short
Engagement and Citizen Journalism Tilted the messaging service [SMS], multimedia messaging
Balance.” Arab Media and Society, v.13 (2011). service [MMS], mobile photos/videos), or Skype.
Pintak, Lawrence. The New Arab Journalist: Mission The new features of social media important for
and Identity in a Time of Turmoil. New York: I. B. successful election monitoring are the opportu-
Tauris, 2011. nity for two-way communication, the ability to
address people worldwide, the opportunity to get
the first stories of violations coming from citizens;
the capability to broadcast low-resolution con-
tent on high-definition media, and having content
Election Monitoring from ordinary people added to reports from pro-
fessional journalists. Challenges in using social
The role of trust in democracy, democratic gov- media for election monitoring include that it is
ernment, and political participation has been increasingly hard to ascertain the impartiality and
receiving more and more attention in political sci- accuracy of coverage, postdisaster communica-
ence and in the wider public recently. A particular tions can be unreliable and difficult, and infor-
concern among professional researchers and sci- mation on election violence may not indicate an
entists as well as experts in electoral public moods actual political party’s behavior.
lies in the declining level of democratic engage- The new technologies give voice to many citi-
ment in traditional politics exacerbated by media zens. New information should still be perceived in
reports of politicians’ untrustworthy behavior. a skeptical way, but the use of new media is push-
Therefore, election monitoring is a powerful tool ing and pulling content during an election. Media
in promoting democracy, political rights, and literacy is necessary for embracing new technolo-
good governance. Among the techniques being gies. Election reporting tool kits now include Rich
used to overcome these challenges is an attempt Site Summary (RSS), Web sites, Wikipedia, pod-
to use social media to monitor upcoming elec- casts, vodcasts, Google News alerts, and Alertnet
tions for irregularities and violence as well as to for pulling content, and vodcasts, podcasts, blogs,
inform the public about the electoral process. Flickr, SMS, and mobile photos/videos for pub-
Various activists and groups monitor election lishing the content. For both publishing and pull-
campaigns through social media activities in order ing content, YouTube, SMS and mobiles, Twitter,
to discover the level of support for each candidate, Facebook, and blogs are used.
to describe the general discourse, and to observe
reactions to candidates’ talks and debates. The Center for Monitoring Election Violence
resulting picture drawn from social media reac- One example of how a nongovernmental organi-
tions can make for interesting comparisons with zation has initiated and carried out election mon-
electoral public opinion surveys conducted by itoring using social media engines is the Center
research agencies and published in news media. for Monitoring Election Violence (CMEV) in Sri
The practice of election monitoring has been Lanka. It was established in 1997 by the Centre
developing over the years, and technology is key in for Policy Alternatives (CPA), the Free Media
446 Election Monitoring

Movement (FMM), and the Coalition Against monitors can also be done, and Ushahidi was
Political Violence as an independent and non- used in this way during the November 2009 elec-
partisan organization to monitor the incidence tions in Namibia and during the 2010 elections in
of election-related violence in Sri Lanka. Cur- Burundi.
rently, CMEV is made up of CPA, FMM, and the The developers of this platform emphasize the
INFORM Human Rights Documentation Centre. necessity of early planning if one aims to apply
In 2011, CMEV conducted the monitoring of Ushahidi to election monitoring. That is essential
elections in Sri Lanka using such social network- because disseminating information across an entire
ing sites such as Facebook and Twitter as well as country will take time. The ideal moment to start
online video on the official Web site. The maps using the platform is at least six months out, as
of incidents and violence were published on the it is for using it for monitoring something other
CMEV Web site using the Google Maps platform. than elections, such as monitoring traffic, crime, or
At the end of polling, CMEV had recorded 56 elec- corruption. The key is to have users familiar with
tion violations in the elections to the 91 local bod- the platform so they can see the added value well
ies it monitored. Of these 27 were major incidents before the elections take place. This will help to
and 29 were minor incidents. The major incidents expand buy-in in the lead up to the elections.
included one report of murder, a grenade attack, The next decision that initiators of the monitor-
seven incidents of assault, seven incidents of intim- ing need to make is whether the project will be open
idation including five reports of an intimidating so that anyone can report on election irregularities
presence around the polling station, the obstruc- or whether the group of monitoring initiators will
tion of polling agents and voters and election mon- mobilize trusted networks to do the reporting. Both
itors, as well as the chasing away of voters. options are possible, and that is what the develop-
In the elections conducted in Tunisia and Egypt ers recommend. The advantage of combining both
in 2012, young citizens and domestic election approaches is that this increases the possibility of
observation coalitions were increasingly relying on triangulating and validating incoming reports.
social media to inform the world about the devel- Before turning to sourcing and handling incom-
opments pertaining to the conduct of elections. The ing data, it is necessary to select the categories
world was able to read observations uploaded by that will be used for the monitoring. The develop-
active citizens who were collecting data and using ers suggest such examples as fraud, vote tamper-
Twitter and Facebook to share it with the world. ing, illegal campaigning, and removal of observ-
They protected the integrity of the election by try- ers. Considerations about incoming data raise the
ing to ensure that it was free and fair. following question: What combination of tech-
nologies will be used to carry out the reporting?
Ushahidi There are advantages and disadvantages to each
Ushahidi is a tool for election monitoring and that should be considered, including cost, usabil-
has been deployed in a number of countries for ity, security, and amount and quality of incoming
that purpose. It was developed by the nonprofit information. Ushahidi is usable on mobile phones
tech company of the same name that specializes and on e-mail/Web for online media monitoring.
in developing free and open source software for Using Ushahidi’s smartphone applications
information collection, visualization, and inter- makes the reporting free, more secure, and auto-
active mapping. The word ushahidi means “tes- matically geotagged. If SMS is used, one can either
timony” in Swahili, and it was a name of the set up a number using a service like Clickatell or
Web site initially developed to map reports of FrontlineSMS, or approach the country’s telecom
violence in Kenya after the postelection fallout at company to set up a “short code.” A short code is
the beginning of 2008; that Web site had 45,000 a three-to-four-digit number that can be made free
users in Kenya. Examples of crowdsourcing for users who text that number. One advantage of
(receiving reports from the general public) dur- using SMS is that it gives the opportunity to get
ing elections include India, Mexico, Afghanistan, a lot more individuals involved in the reporting.
and Lebanon, all in 2009, and Sudan and Togo However, there is a disadvantage: it will be neces-
in 2010. Data collection using trained election sary to map the events being reported based on
Election Monitoring 447

the location information provided in the incom- developers, it is an initiative that aims to high-
ing text messages, which can be time consuming. light the voice of ordinary citizens through citizen
Developers of Ushahidi also work on Swift River media to generate an alternate narrative of the
to automate the geo-location process whenever 2013 electoral contest. Using social media tools, it
possible. encourages openness through citizen participation
Election observers could also report on election and tries to provide timely and reliable informa-
violations by sending e-mails to a dedicated e-mail tion. The focus is to increase citizens’ ownership
address. These e-mails should include detailed of the democratic system. The innovative citizen
location information to make the mapping as journalism portal aims to empower the common
easy as possible. The same approach can be taken people to voice their opinion on the upcoming
using Twitter and a dedicated hashtag and/or elections; cite any code-of-conduct violations
Twitter feed. Customized Web forms can also be before, during, and after the upcoming elections;
created as part of the Ushahidi instance that will and report incidents of violence or rigging.
allow people to submit detailed reports, including As of 2013, the project has trained 40 field
geographic information and categorization. monitors from the most remote and most violence-
Online media monitoring is another question. prone areas around Pakistan. These field monitors
It is important to decide in advance whether one are reporting election problems in real time to the
wants to complement the on-the-ground moni- platform from remote regions, which might often
toring with online media monitoring. The latter be ignored by the mainstream media. The project
includes reading through official news, Twitter, can be followed on Facebook and on Twitter. All
blogs, and Facebook groups to find relevant elec- witnesses of violence in Pakistan can report it to
tion-related events that can be mapped. This is PakVotes. This platform allows Pakistani citizens
a time-consuming effort, however. The Ushahidi to learn about elections and the electoral process
developers recommend considering the option via social media in order to urge them to vote.
of recruiting volunteers to help in combining the The PakVoters site also provides information
news during the elections. This produces a rich and links for informed voting decisions, while
set of information when combined with reports offering the information in a neutral and apo-
coming in from the ground. It is possible to map litical way. This process does not begin and end
pictures and video footage as well. with elections—it is an ongoing endeavor and will
Reporting strategies using Ushahidi also vary. require constant and long-term engagement of
If one aims to proceed with traditional election Pakistanis to not only vote, but also remain active
monitoring at polling stations, it is necessary to after elections and hold the winners accountable
have trained and dedicated monitors deployed to to their mandate. Thus, the additional advantage
these stations in such a way that the data they gen- of using social media in the electoral monitoring
erate is statistically representative. If the group of process is in empowering citizens to take a more
activists is more interested in crowdsourcing the active role in voting and in engaging people in
election monitoring, then it is better to maximize maintaining democratic regimes in their countries.
the number of users who report on election viola-
tions. Both approaches can be combined. Tetiana Kostiuchenko
Carrying out of the steps listed above will dif- National University of Kyiv-Mohyla Academy
fer if the country in question is democratic versus
authoritarian. In the case of the latter, extra pre- See Also: Arab Spring; Citizen Journalism;
cautions should be taken to maximize the safety Civil Rights; Electronic Voting; E-Voter Institute;
of those who contribute to the election monitor- Forecasting Elections; Human Rights; Influence on
ing. This may mean using secure smartphone Elections; Push Polling; Transparency; Voter Apathy;
applications, or code when using SMS. Voting, Global Electronic.

PakVotes Further Readings


“PakVotes” is an election monitoring citizen Meier, Patrick and Kate Brodock. “Crisis Mapping
journalists’ platform in Pakistan. According to its Kenya’s Election Violence: Comparing Mainstream
448 Electronic Frontier Foundation

News, Citizen Journalism and Ushahidi.” Harvard the then-existing groups understood the technol-
Humanitarian Initiative. http://irevolution.net ogy well enough to appreciate fully the ramifica-
/2008/10/23/mapping-kenyas-election-violence tions of what had happened. Three people who
(Accessed May 2013). were part of another online community agreed
Mergel, Ines. “How Social Media Is Becoming to take on Jackson’s case, created the EFF, and
Essential for Election Monitoring.” (October 28, successfully filed suit in federal court against the
2012). http://gov20class.blogspot.de/2012/10/how Secret Service. This was one of the earliest cases to
-social-media-is-becoming-essential.html (Accessed begin creating a legal framework for digital media.
June 2013). Lawsuits challenging government and corporate
Norris, Pippa. Digital Divide? Civic Engagement, actions continue to be an important part of the
Information Poverty and the Internet Worldwide. EFF’s efforts.
Cambridge: Cambridge University Press, 2001. Current developments at the intersection of law
Schenker, Jennifer L. “Ushahidi Empowers Global and technology are chronicled on the EFF Web
Citizen Journalists.” Businessweek. http://www site, https://www.eff.org/. There is a general feed
.businessweek.com/globalbiz/content/dec2009 of information on the home page and more spe-
(Accessed May 2013). cific links of interest on each of the following top-
ics: free speech, fair use, innovation, privacy, and
international and transparency. EFF maintains its
Deeplinks blog, offering analysis of current events
as written by EFF staff. Staff members also write
Electronic Frontier more thorough analyses of important issues in the
form of white papers. The EFF Web site is one of
Foundation the major tools used to educate the public about
their rights. There are multiple projects the orga-
The Electronic Frontier Foundation (EFF) is a nization is highlighting. The projects that apply
donor-funded nonprofit organization that aims to most directly in the area of social media and poli-
protect the public interest regarding new technolo- tics are summarized briefly below:
gies. The EFF employs a mix of lawyers, policy
analysts, activists, and technologists. The staff • Bloggers’ Rights: EFF has created a legal
keeps track of current developments about tech- guide for bloggers in the United States
nology and the law, both in the United States and summarizing relevant issues such as
abroad; advocates for particular laws and poli- defamation law, intellectual property,
cies; and educates the public about these issues. In and privacy. EFF also reminds bloggers
recent years, much of the EFF’s work has centered of their rights to blog anonymously, to
on challenges to the public’s use of social network- engage in political speech, and for online
ing technologies such as Facebook and Twitter. The journalists to be treated the same way as
EFF monitors not only governmental actions but their offline peers.
also the policies and practices of corporate entities • Coders’ Rights: EFF defends the rights of
as they impinge on public use of technology. programmers and developers to explore
The EFF was founded in 1990 following the cutting-edge technology. There are sev-
U.S. Secret Service’s seizure of electronic equip- eral sets of frequently asked questions
ment from a small business, Steve Jackson Games. provided for different types of issues
Jackson’s business was severely impacted as the that may arise, particularly in the area of
equipment was kept four months for examination; security and encryption software.
upon return of the business’ computers, it was dis- • Free Speech Weak Links: This project
covered that e-mail sent in by nonemployees to the identifies and explains the intermediar-
company’s electronic bulletin board system had ies that stand between communicators
been accessed and deleted. Jackson searched for an and their audiences on the Internet: Web
organization willing to pursue what he felt were hosting services, upstream providers, the
serious violations of his civil liberties, but none of domain name system, Internet service
Electronic Privacy Information Center 449

providers, search engines, payment ser- Youmans, William Lafi and Jillian C. York. “Social
vice providers, and third-party platforms. Media and the Activist Toolkit: User Agreements,
It details the pressures that these entities Corporate Interests, and the Information
face and gives examples of how each has Infrastructure of Modern Social Movements.”
effectively censored expression in particu- Journal of Communication, v.62 (2012).
lar circumstances.
• Global Chokepoints: This project is
an international effort similar to Free
Speech Weak Links but with a particular
emphasis on global efforts to use Internet Electronic Privacy
intermediaries to enforce copyright.
• Open Wireless Movement: The EFF Information Center
advocates a system of open wireless con-
nections as a means of improving access The Electronic Privacy Information Center (EPIC)
but also as a way of lessening the ability is a nonprofit research center funded through
of any particular user to be tracked by foundation grants, individual donations, and sale
government or corporate interests. EFF is of its publications. The stated aim of the center
part of a coalition of volunteer engineers is “focusing public attention on emerging privacy
working to create technology that would and civil liberties issues.” Founded in 1994, the
allow users to open their wireless con- center serves as a clearinghouse of information
nections without sacrificing security or about privacy, government transparency, freedom
slowing their own service. of expression, and general civil liberties. EPIC has
• Surveillance Self-Defense: This project a particular emphasis on privacy issues raised by
seeks to inform members of the public new technologies and content forms, including
in the United States about the laws and social media.
technology used for government surveil- The center was created by lawyers Marc Roten-
lance of digital media. It also summarizes berg, Dave Banisar, and David L. Sobel, who
legal ways to protect oneself against such worked together at the Washington, D.C., offices
spying. of Computer Professionals for Social Responsibil-
• Transparency Project: Using primarily ity. Their initial backing came largely from the
Freedom of Information Act requests and Fund for Constitutional Government. The center
lawsuits, the EFF monitors and reports became an independent nonprofit in 2000. Ini-
on the government’s use of technologies tial projects focused on government surveillance
for law enforcement and national secu- and encryption, but the scope of its work quickly
rity. For example, EFF was instrumental expanded to encompass a range of privacy issues
in uncovering information about the posed by government and private entities.
use of unmanned drones for domestic EPIC directs public attention to privacy and
surveillance. civil liberties issues using several strategies. First,
it maintains an extensive Web site at epic.org. In
Jennifer L. Lambe conjunction with the group Privacy International,
University of Delaware it also provides content to privacy.org. Both sites
provide thorough summaries of current events and
See Also: Civil Rights; Electronic Privacy policy issues related to privacy. They also provide
Information Center; Privacy. links to other groups that address privacy issues and
information about practical privacy tools members
Further Readings of the public can use, for example, to protect their
Electronic Frontier Foundation. https://www.eff.org e-mail accounts against snooping, surf the Internet
(Accessed December 2012). anonymously, or establish firewalls.
Steve Jackson Games, Inc. v. United States Secret The group publishes an electronic newsletter
Service, 36 F.3d 457 (1994). every two weeks, the EPIC Alert. The newsletter
450 Electronic Privacy Information Center

has a readership of more than 17,000 and is government, to members of the public, to adver-
sent free of charge to subscribers’ e-mails. The tisers, and to third-party application developers.
newsletter includes updates of privacy-related Cloud computing is another identified topic on
developments in the United States and globally, EPIC’s radar. Cloud computing refers to software,
reviews of recent publications that address pri- data, or processing power that is stored on remote
vacy issues, and lists of events and conferences of servers and managed by a third party. The secu-
interest to subscribers. rity of that information varies depending on the
Conferences, invited presentations, and pub- techniques the service provider uses to protect it.
lications are other ways EPIC provides infor- Data stored in the cloud is, by statute, easier for
mation to interested parties. The group hosts law enforcement officials to have access to than
multiple conferences a year, and staff speak at if the same information was stored on a private
relevant events held by other organizations. EPIC computer.
produces publications summarized at its online Tracking of individuals’ movements in cyber-
bookstore and available for purchase through space and in real space are also matters of con-
Amazon.com. Examples of its works include cern to EPIC. Various methods can be used by
“Litigation Under the Federal Open Government companies and by the government to track online
Laws” (2010) and “Privacy and Human Rights sessions, including Web sites visited and terms
2006: An International Survey of Privacy Laws used in search engines. Some of this tracking is
and Developments.” done for the purpose of customizing content for
In addition to providing information, EPIC each user, targeting them with links and adver-
engages in advocacy to influence policy deci- tisements that reflect their interests. Agencies
sions and court cases and to enhance government of the government have also used tracking for
transparency. EPIC makes regular use of the Free- investigative purposes. An increasing number of
dom of Information Act (FOIA) to gain access mobile devices and applications track a person’s
to government records of agencies such as the geographic location in real time, which has mul-
Federal Trade Commission (FTC), the National tiple implications in terms of safety and freedom
Security Agency, and the Transportation Secu- of association.
rity Administration. The group also participates
in lawsuits regarding privacy issues, both in the Jennifer L. Lambe
role of primary counsel and by submitting friend- University of Delaware
of-the-court briefs. EPIC has identified more than
30 hot policy issues, which include a vast span See Also: Civil Rights; Cloud Computing; Privacy.
of privacy-related matters, from the use of full-
body scanners in airports to the privacy of medi- Further Readings
cal records and the use of unmanned drones in “EPIC to Argue for Location Privacy in NJ Supreme
domestic surveillance. Court.” Privacy.org. http://epic.org/2013/01/
At least a third of EPIC’s identified policy epic-to-argue-for-location-pri.html (Accessed
issues impact the use of social media for political January 2013).
purposes. The major concerns involve unauthor- Oreskovic, Alexei and Reuters. “Privacy Groups
ized collection of personal information by private Ask Facebook to Withdraw Proposed Policy
entities or the government and the vulnerability Changes.” Chicago Tribune (November 26,
of that private material to being shared with 2012). http://articles.chicagotribune.com/keyword/
third parties. electronic-privacy-information-center (Accessed
EPIC has, for example, filed complaints with January 2013).
the FTC against Facebook and against Google’s Smithson, S. “DHS Emergency Power Extended,
social network component, Buzz. EPIC argued Including Control of Private Telecom Systems.”
that the policies and practices of these social net- Washington Times (July 12, 2012). http://www
working sites are unfair and deceptive because .washingtontimes.com/news/2012/jul/12/dhs
the companies aren’t clear about what informa- -emergency-power-extended-including-control-of-
tion will be gathered and made available to the (Accessed January 2013).
Electronic Voting 451

Electronic Voting
In the finale of American Idol, season 10, 122.4
million votes were cast via varying electronic
means for finalists Scotty McCreery and Lauren
Alaina. Over the course of that season, more
than 730 million votes were generated by a wide
range of Americans using text messaging, call-in
numbers, Facebook, and an app. The same types
of numbers have emerged over all 12 seasons of
American Idol and have led to public questioning
of why politicians have not worked harder to find
a way to permit such convenient voting mecha-
nisms when a dramatic increase in participation
could occur. Advocates for moving toward social
media voting point to groups like Major League
Baseball (which uses online voting for a large por-
tion of all-star game selections) and online polls
and surveys as evidence of how turnout would
dramatically increase if voting was easier. Detrac-
tors, however, point to the same organizations
and polls for explanations on why not to make
voting that simple. Major League Baseball suf- These researchers in the vulnerability assessment team at
fered a ballot stuffing controversy in 1999, and Argonne National Laboratory were testing electronic voting
online polls are susceptible to repetitive voters machines for vulnerability to tampering in January 2012.
(once a user deletes cookies on his or her com-
puter). Decision makers will need to assess the
costs and benefits of bringing the American Idol
form of democracy to the selection of public offi- Electronic voting in the United States debuted
cials and votes for public policies. in the early 1960s with the advent of punch cards
There are various types and degrees of elec- that could be electronically counted instead of by
tronic voting that occur throughout the United hand—dramatically decreasing the time in which
States. It can involve casting an electronic ballot, results could be announced. It was first used in
or electronically counting ballots that have been the 1964 presidential election in a small number
cast through nonelectronic means. Electronic vot- of counties. Later, optical scan systems became
ing mechanisms that are presently used for govern- popular. After voters fill in the appropriate cir-
mental purposes across the United States include cle, the scanner can quickly tabulate results. The
optical scan systems, punched cards, and direct- most recent development—and the most techno-
recording electronic voting (electronic voting logically advanced and controversial—is direct
machines). Methods used in nonpolitical contexts recording electronic voting machines (DRE).
include voting by phone, computer networks, and These tools are universally utilized in several
the Internet. There are two main types of elec- countries and quite prominently in the United
tronic voting: one utilizing electronic means while States. In these systems, voters cast their ballots
still supervised by election representatives, and by using a touch screen to mark their selections.
one performed solely within the influence of the The votes are internally tabulated by the machine
voter. For example, a voter may touch a screen on and can be sent through a network to a central
a voting machine at an official polling location, location that allows for immediate tabulations.
or use a personal iPhone. While electronic voting Further, a paper audit trail can be printed for each
is largely viewed as more efficient and effective, it machine. DREs first became popular after 2002
comes with severe risk of fraud. when the Help America Vote Act required every
452 Electronic Voting

polling place to have an accessible system (and turnout so that polling stations do not run out
DRE is considered accessible). In 2004, statistics in any given jurisdiction. This guarantees waste,
show that over one in four voters in the United regardless of what occurs to used ballots. Elec-
States used some form of DRE. This compares to tronic voting (particularly DRE and Internet-
fewer than one in 10 from 1996. based) eliminates this concern.
Electronic voting also presents numerous ben-
Advantages efits related to accessibility. The most prominent
The first advantage is the efficiency offered by elec- way it does this is by offering opportunities for
tronic voting mechanisms. The 2012 presidential individuals with disabilities (which explains the
election had 126,226,713 votes cast across the initial growth of DREs in 2002). DREs permit
country; imagine the amount of time, effort, and those who are blind (the most problematic dis-
money it would take to hand-count each of those ability from a ballot perspective) to have instruc-
votes. Then, there would be the need to aggregate tions and ballots read to them via headphones.
votes across jurisdictions before arriving at state Further, the machines can be calibrated to assist
totals—the time required would be significant. those with limited mobility. Considering the grow-
Whether paying election workers or counting the ing diversity of the United States and the potential
number of hours volunteered to do the count- need for ballots in multiple languages, DREs can
ing, it is significantly cheaper to utilize electronic be loaded with various forms of the ballot, per-
means as compared to hand-counting ballots. mitting voters to be presented with their choices
Electronic voting is not only more efficient, but in the language most comfortable for them.
is also more effective. Further, the opportunities Perhaps the greatest advantage offered by elec-
for human error are clustered. Each time that the tronic voting through the Internet or other direct
votes per candidate are sent forward for aggre- means is what it means for democracy. While the
gation, there is a potential for error. The poten- United States has taken great efforts to ensure
tial for human error in miscounting a ballot is that everyone has an opportunity to participate in
quite large. Even more problematic, however, elections on the first Tuesday after the first Mon-
would be recount situations. Each individual bal- day in November, voting is still largely regarded
lot would need to be secured until all elections as an inconvenience by many potential voters.
for a jurisdiction were certified and not facing Voting occurs during the week, and is not recog-
legal challenges. In the time between a cast bal- nized as a holiday. Citizens must either take off
lot and the conclusion of legal proceedings, there from work or go before or after work. Despite
would again be numerous opportunities for a the technological revolution, there are still lines
single ballot to be misplaced or damaged, caus- (significant at times). Further, the sheer volume of
ing inaccurate results. When electronic voting is elections each year in the United States leads to
utilized, a machine is handling all counting and fatigue. If individuals could vote via the Internet,
ordering—largely eliminating many of these con- cell phone, or other self-controlled mechanism,
cerns. There are no concerns about misinterpret- participation would likely increase and would
ing what someone meant (e.g., Florida in 2000), benefit individuals who at present are considered
or of a misplaced ballot. disenfranchised because they are unable to get off
There is also a significant environmental ben- of work or access polling locations.
efit from the utilization of electronic voting. Two groups that could particularly benefit
When paper ballots are used for an election, fed- from more innovative electronic voting would be
eral law permits (but does not require) them to individuals who are deployed with the American
be destroyed 22 months after the date of the elec- military and those suffering natural disasters at
tion. Each state has protocols on this matter, but the time of an election. At present, deployed sol-
printed ballots are never recycled. They are either diers are only able to vote for federal offices and
destroyed or stored—both of which are environ- receive their ballot by mail, fax, or e-mail. They
mental drains because of the sheer volume. Even fill out the ballot and then send it back via mail,
more problematic is that the number of paper bal- needing it postmarked on or before Election Day
lots needed is significantly more than the expected and received by 4:00 pm on the Friday following
Electronic Voting 453

Election Day. Ballots cannot be returned elec- elections, the cost falls directly onto the already
tronically. If overseas military could vote through strapped budgets of this level of government.
electronic means, this would drastically cut back The most frequently cited concern of electronic
on the costs of ballots returned, reduce the hassle voting is susceptibility to fraud. Major League
for servicemen and -women when trying to vote, Baseball presents a great example. In 1999, with
and eliminate possible delays that could make Red Sox shortstop Nomar Garciaparra roughly
their votes go uncounted. In terms of disasters, 20,000 votes shy of Yankee shortstop Derek Jeter
electronic voting could have helped in November only three weeks from the All Star game, a com-
2012. In the wake of Hurricane Sandy, voters in puter programmer created a program that imme-
the New York City metro area (in both New Jer- diately gave him an additional 25,259 votes—
sey and New York) were able to walk into any netting him a starting spot in the game. While the
precinct they could access and request a ballot to online ballot program was fairly primitive and
vote at that location. If there are concerns about was not designed with any real intent to keep
voter fraud using the Internet, the same concerns hackers out, it exposes how dangerous online
could be voiced when voters are given free rein to voting can be. DREs can be equally concerning.
vote where they want. The difficult part of Hurri- Viruses, hacking, and physical tampering could
cane Sandy is that at the national level, it made no possibly influence the outcome of an election if
difference. Both New Jersey and New York were someone is successful in influencing the num-
solid Democratic states, meaning the potential bers within a DRE or the network between one
changes in venue did not necessarily matter. How- machine and the tabulation center. No matter
ever, at the state and local level it was complete how secure a network or machine seems to be,
chaos, heavily impacting lower-level races. With someone always seems able to get in. Likewise,
electronic voting available, the situation could there could just be unfortunate problems with
have been avoided. the machines (even in the absence of any activity
to cause the machines to produce errors).
Disadvantages From the world’s short history of electronic
There are three common objections most fre- voting there is already a collection of cautionary
quently raised to electronic voting: familiarity, tales about when new methods do not work out
cost, and fraud. The familiarity issue is especially as intended. In 2003, voters in Virginia noted that
pertinent with older voters who are accustomed to DRE machines would uncheck who they voted for
more traditional means of casting ballots. DREs after a few seconds. If the voters had not noticed,
and butterfly punch cards can be intimidating for no one would have caught the error. Even the best
individuals who are not familiar with the technol- audit of DREs can only describe what the machine
ogy. Likewise, asking these voters to cast a ballot entered, not what the voter actually intended. A
online from home may be impossible. Maybe they year later, after having nonfunctioning machines,
do not have a computer or Internet access. What Diebold (now Premier Election Solutions) was
electronic voting should not do, however, is scare sued by Alameda and San Diego Counties and
voters out of participating. had all of their machines decertified by the state
The cost of electronic voting is also frequently of California. They ultimately settled for $2.6
mentioned. Whereas printing paper ballots is not million. Electronic voting across the United States
environmentally friendly, purchasing the requi- was particularly rough in 2006. In three Florida
site number of DREs or scanners or online vot- jurisdictions, early tests showed calibration prob-
ing software is not budget friendly. These tools lems that led to misvotes by voters. Many voters
require a significant capital investment when pur- in Pennsylvania, Indiana, and Ohio were forced to
chased and incur maintenance costs throughout resort to paper ballots because of software prob-
their lives. Add in the cost of validating results lems; in Ohio, it was even worse around Cleve-
and performing the necessary audits, and the cost land when printers jammed in the DREs, mak-
of running an election can be roughly the same as ing paper copies of votes impossible to gather.
when using paper ballots. Since state governments In Arkansas, a mayoral candidate claimed that
are charged constitutionally with conducting there were serious errors when his home precinct
454 Ellison, Keith

showed him collecting zero votes (despite his con- those who did not trust electronic voting could
tinued assurance that he had in fact cast a ballot still participate through more traditional means.
for himself). In 2008, more errors occurred when The bill suggesting these changes, however, has
machines in three states (Tennessee, Texas, and yet to be voted on by either congressional body.
Virginia) all flipped votes. For example, a vote for In the end, the debate is as much theoretical as it
John Kerry would appear in the results as a vote is practical. Do Americans want to see voter par-
for George W. Bush, even though it looked right ticipation increase? Or do they worry too much
on the screen. Again, this error would never have about providing new avenues for fraud to jus-
been noticed by a voter. Other states had votes tify the addition of new voters to the electorate?
disappear, or Spanish ballots were not counted at Either way, there will continue to be incremental
all. Similar scenarios emerged in 2010 and 2012. movements toward more utilization of technol-
While all of these incidents may seem minor, they ogy and electronic voting.
are the sort of occurrences that shake citizen con-
fidence in the voting process and, consequently, William J. Miller
democracy as a whole. Flagler College
If these real-world examples were not enough to
sway voters against electronic voting, four major See Also: Voter Apathy; Voter Privacy; Voter
popular portrayals have emerged. Man of the Turnout; Voting, Global Electronic.
Year (a 2006 Robin Williams movie) highlights
a software error that causes voting machines to Further Readings
incorrectly tally votes. Runoff (2007) traces an Ace Project. “Focus on E-Voting.” http://aceproject
election in which a hacker is able to defeat secu- .org/ace-en/focus/e-voting (Accessed July 2013).
rity on e-voting to fix the numbers. The Campaign Brennan Center for Justice at New York University
(2012) traces a similar story and strongly implies School of Law. “The Machinery of Democracy”
that prominent backers of one candidate utilized (October 10, 2006). http://www.brennancenter.
voting machines to guarantee the desired out- org/publication/machinery-democracy (Accessed
come. And Hacking Democracy—a 2006 HBO July 2013).
documentary—looks at the actual anomalies and E-Voting.cc. http://db.e-voting.cc (Accessed July
irregularities experienced by voters in Volusia 2013).
County, Florida. The documentary’s most shock- Gross, Doug. “How Secure Is Your Electronic Vote?”
ing contribution, however, occurs when the film- CNN (November 3, 2012). http://www.cnn
makers successfully hack into an election system .com/2012/11/03/tech/innovation/electronic-vote
in Tallahassee. -security (Accessed July 2013).
There are both reasons to embrace and fear elec- National Institute of Standards and Technology.
tronic voting in the United States. While America “NST and the Help America Vote Act (HAVA).”
has embraced types of electronic voting that uti- http://www.nist.gov/itl/vote (Accessed July 2013).
lize electronic means while still supervising vot-
ing with election representatives, it has been less
open to forms that are performed solely within
the influence of the voter. Americans are skeptical
of DREs (possibly for good reason), but do not Ellison, Keith
accept online voting—at least for now. Congress
has pushed for greater security for any type of With just over 32,000 Twitter followers, Minne-
electronic voting, and the House of Representa- sota two-term Congressman Keith Ellison does
tives in 2008 went as far as to suggest reimbursing not actively cultivate a large social media audi-
states for the extra costs of having paper ballots ence. Despite Ellison’s relatively small number of
ready in case of a technology issue. Further, the followers, he nonetheless constitutes a significant
House bill called for states to be reimbursed the social media footprint largely maintained by a sig-
costs of paying auditors and hand counters that nificant number of conservative and oppositional
had to be hired. In doing so, the hope was that bloggers. Ellison is Minnesota’s first African
Ellison, Keith 455

American and the United States’ first Muslim Racism who allegedly claimed that Jewish indi-
member of Congress. Ellison’s history as a Cath- viduals are some of the most racist white peo-
olic-turned-Sunni Muslim activist concerned ple. He disavowed the director’s comments and
with human rights and voter disenfranchisement expressed regret over not properly scrutinizing
appealed to his ethnically and religiously diverse Farrakhan’s anti-Semitic and racist remarks.
constituents and helped him win a historically Minnesota’s 5th Congressional District cov-
Democratic district in the Minneapolis metropoli- ers the city of Minneapolis as well as the suburb
tan area. However, this same history—containing Saint Louis Park, which contains a strong Jewish
former ties to the Nation of Islam (NOI) and later community. As a result, Ellison’s background was
renunciations of those ties, with offering his polit- both uniquely suited for his district even as it pre-
ical support to someone offering less-than-flatter- sented significant hurdles to overcome.
ing insinuations about Jews and racism, and with
current allegations regarding “associations” with Controversy
the politically motivated Muslim Brotherhood Certain elements of Ellison’s history irked Jew-
organization—antagonizes political opponents ish and conservative bloggers the most during
who view him with deep suspicion because of his the 2006 Democratic primary: he only recently
professed Muslim faith. disavowed the militant and anti-U.S. government
Social media platforms—including Twitter and elements of Farrakhan’s rhetoric and his past
blogs—are especially adept at allowing users to dismissal of the anti-Semitism present in NOI
quickly circulate and respond to rumors. It is these messaging. Some Jewish and conservative voters
same platforms that enable oppositional social found Ellison’s expression of contrition to be dis-
media users to respond to and call into question ingenuous.
established television and print media coverage of Woodbury notes how the conservative blog
Ellison. Indeed, social media users keep Ellison a Power Line, Time magazine’s 2004 blog of the
very popular subject. year and the site whose coverage led to Dan Rath-
er’s dismissal at CBS, began to post letters Ellison
Activism wrote to the student newspaper while attending
Julie Woodbury has observed that Ellison’s his- the University of Minnesota. These letters sup-
tory of activism explains his current notoriety ported Farrakhan and reparations for African
among conservatives concerned about the influ- Americans and called for black nation within the
ences of radicalized Islam on U.S. life Accord- United States. Power Line’s coverage was among
ing to Woodbury, Ellison presented himself as the first uses of social media to portray Ellison as
an easy target for political opponents during a racist, anti-Semitic candidate outside the main-
his initial run for Congress. As a law student stream of Minnesota and U.S. politics.
at the University of Minnesota, Ellison penned Woodbury notes that, because of unflatter-
several articles supporting Louis Farrakhan, ing attention in local and the influential Power
minister and leader of the NOI. Because Ellison Line blogs, Ellison was the subject of withering
actively recruited members and other partici- criticism in the months leading to his election.
pants to attend the Million Man March in 1995, Oppositional bloggers were very effective at por-
he became identified as a formal member of the traying conventional media, especially the local
NOI, though he denies such claims. Woodbury newspapers, of not asking the tough questions of
noted that Ellison needed to distance himself Ellison’s past due to his being a racial and reli-
from the NOI and whatever involvement he had gious minority. Natch Greyes implies that just as
with the organization if he was going to avoid political figures can employ social media to fos-
alienating his Jewish voters. Disassociating from ter and deepen followers’ connections to cam-
the NOI was important for Ellison if he wanted paign messages, so too can savvy oppositional
to deny that it represented mainstream Islam. bloggers deepen the salience of a message when
In addition, Ellison needed to take back some it appears that message is being ignored or sup-
comments he made supporting a then-executive pressed by either the targeted political candidate
director of the Minneapolis Initiative Against or from some other media outlet. Most of the 5th
456 Ellison, Keith

congressional district of Minnesota identifies as and the increased visibility that accompanied his
diverse and politically progressive, so the effect being the first Muslim elected to Congress, Ellison
of oppositional, adversarial social media on the faced the option of downplaying this fact or cel-
district’s voters is hard to gauge, especially among ebrating it. The media-friendly Quran pledge was
Jewish voters. Woodbury reports that many in the an iconic image that for both Ellison’s support-
political blogosphere seemed to think that Elli- ers and detractors helped define him to this day.
son’s campaign got a significant boost when Mor- President Barack Obama referenced the event a
decai Spektor, publisher of the American Jewish few years later in an address to Muslims in Cairo,
World, a weekly newspaper serving Minnesota’s Egypt, telling his audience that Ellison’s act is
Jewish community, endorsed his candidacy. Spek­ proof that Muslims have a powerful and positive
tor’s endorsement did not reflect a significant influence in American affairs.
majority of the Jewish vote, but it did nonetheless Shortly after his swearing-in ceremony, and in
indicate to some that Ellison’s past affiliation with the middle of ongoing media attention to his now-
the NOI and subsequent renunciation of it and famous picture, Ellison appeared with conserva-
its anti-Semitic elements was a good-faith gesture tive commentator Glenn Beck on CNN Headline
worthy of supporting the candidate. News. Beck, by then an established radio per-
Ellison frequently downplays his religious faith, sonality, likely had some inclination as to how
claiming that it is not a “big deal” and has asserted the conservative blogosphere, the site for most
that he is not a religious leader of any kind. While oppositional positions that circulated about Elli-
those declarations were persuasive enough to son, reacted to Ellison’s use of Jefferson’s Quran
some of his concerned constituents, they were in his photo. Beck notably informed Ellison that
not credible enough to oppositional bloggers who he, like many Americans, especially those who
pointed to Ellison’s staged swearing-in ceremony formed the audience of his show, wanted Ellison
as proof of his continued devotion to a politically to prove that he was not sympathetic to radical
motivated version of Islam. All new representa- Islam, with its focus on Sharia law and jihad. In
tives to the U.S. House of Representatives take response, Ellison affirmed his patriotism and dis-
the oath of office together. The iconic pledge fea- avowed Muslim extremists. After the show’s tap-
turing a hand placed on a symbolically impor- ing, Ellison told the hometown Minneapolis Star
tant book is typical of judge swearing-in ceremo- Tribune (long a subject of scorn for its unwill-
nies. Regardless, Ellison decided to symbolically ingness to scrutinize Ellison’s past to the extent
reenact the swearing-in ceremony by placing his Power Line and other Minnesota-based blogs felt
hand on Thomas Jefferson’s copy of the Quran. was warranted) that he felt Beck’s questions were
Ellison’s stated purpose for staging the photo- outrageous. Conversely, bloggers from Power
graph was to celebrate religious tolerance and to Line and other conservative social media sites
celebrate the occasion of the first Muslim being thought differently.
elected to Congress. Because the act of staging the
picture was voluntary, oppositional bloggers saw Domestic Terrorism
it as a calculated attempt to demonstrate Ellison’s In 2011, New York Republican Representa-
true religiously motivated political commitments. tive Peter King, chair of the Homeland Security
Woodbury points out that, even though there Committee, convened hearings on the problems
were significant numbers of non-Christians in of radicalization among American Muslims and
Ellison’s class, including Jewish members, Bud- the potential resulting acts of domestic terror.
dhist, and even an agnostic, his decision to publi- The hearings were a timely response to the media
cize his swearing-in ceremony was bound to draw uproar that ensued a few months before regard-
critical attention from the blogosphere. Conser- ing the proposed mosque and cultural center to be
vative blogs extensively covered Ellison’s reen- built near the Ground Zero site of the fallen World
actment. Some Republican representatives took Trade Center towers. Ellison made an appearance
to Fox News to express that both they and their before the committee to tell the story of a Mus-
constituents were deeply concerned by the prec- lim medical technician, Muhamed Salman Ham-
edent set by Ellison. In the wake of his election, dani, who volunteered to help after the World
Ellison, Keith 457

Trade Center towers had been attacked. Sheryl King’s public denunciation of the Washington-
Gay Stolberg and Laurie Goodstein note that Elli- based advocacy group, the Council on American–
son broke into tears when describing Hamdani’s Islamic Relations (CAIR), reflected a concern first
bravery. When the body of Hamdani went miss- raised by conservative blogs during Ellison’s ini-
ing, some alleged he may have had something to tial campaign for Congress—namely, that CAIR
do with the terror plot against the World Trade is an organization linked by some government
Center. It was not until Hamdani’s remains were agencies to supporting terrorist organizations and
found before he was vindicated. whose members have donated to Ellison’s cam-
In response, the conservative Media Research paign. Another member of the Minnesota con-
Center decried Ellison’s actions as political theater. gressional delegation, Michele Bachmann, has
Other conservative oppositional blogs registered made public accusations against Huma Abedin,
similar reactions. Other more sympathetic blogs, a Muslim woman who served as deputy chief of
like the Huffington Post and Politico, registered staff for former Secretary of State Hillary Clin-
Ellison’s emotional display as truthful, heartfelt, ton, of having ties to the Muslim Brotherhood.
and sincere. Traditional media outlets, including The Muslim Brotherhood organization is more
the New York Times and the Minneapolis Star- familiar to most Americans as a result of Egypt’s
Tribune, and national television reports tried to Mohamed Morsi, a member of the brotherhood,
gauge the various reactions played out over social winning the presidency.
media channels to Ellison’s testimony to see how When bipartisan rejection of her claims fol-
it reflected how Americans were reacting to King’s lowed, Bachmann leveled similar charges against
hearing on domestic terrorism. Ellison. Taking to Glenn Beck’s radio show, Bach-
mann alleged that Ellison had and continues to
have associations with CAIR and with the Mus-
lim Brotherhood. Bachmann and notable opposi-
tion blogs like Power Line profess that such asso-
ciations invite suspicion and should entail official
investigation into Ellison’s allegiance to organi-
zations linked to terrorism. Beck used his radio
show as a platform to urge his listeners to remain
vigilant in pursuing the evidence of Islamist infil-
tration of American governmental agencies. Such
a move by Beck illustrates how traditional and
social media forms collaborate to generate and
circulate news stories. Social media news aggre-
gators could take to Beck’s exhortation as they
had been the ones who initially broke the story of
Ellison’s problematic associations in 2006.
While the Abedin controversy abated quickly,
amid a series of notable Republicans and a cho-
rus of Democrats denouncing guilt-by-association
allegations, the accusations persist against Ellison.
Long critiqued by oppositional blogs, Ellison insists
that the guilt-by-association tactics are unfounded
and misleading. Just as Michele Bachmann pre-
fers to speak almost exclusively with media out-
lets and blogs friendly to her position, so too does
Controversial Congressman Keith Ellison speaking at the Center Ellison. It is noteworthy, for example, that in the
for American Progress on March 2, 2011. Ellison was both the wake of Bachmann’s accusations against Ellison,
first African American to be elected to the House from the state he took to the Huffington Post to disavow any
of Minnesota and the first Muslim member of the U.S. Congress. affiliation with the Muslim Brotherhood and to
458 Ellmers, Renee

suggest that Bachmann simply wanted attention Further Readings


and was reflecting ongoing efforts to marginalize Greyes, Natch. “The Untapped Potential of Social
religious minorities. Woodbury observes that, even Media: A Primer for Savvy Campaigners.”
in 2006, Ellison’s campaign advisers were urging Campaigns and Elections (March 2011).
him to respond swiftly to misleading or false alle- Shear, Michael D. “Washington Fallout From
gations made against him. Ellison historically has Weiner’s Resignation.” New York Times Caucus
been reluctant to respond to allegations he believes (June 17, 2011). http://thecaucus.blogs.nytimes.
to be false. Woodbury explains that, because Elli- com/2011/06/17/washington-fallout-from-weiners-
son does not view himself as racist or extremist, he resignation (Accessed December 2012).
does not always see a compelling reason to respond Stolberg, Sheryl Gay and Laurie Goodstein.
to those who allege otherwise. As is evidenced by “Domestic Terrorism Hearing Opens With
his modest Twitter following and his preference for Contrasting Views on Dangers.” The New York
responding to blog-originated allegations to liberal- Times (March 10, 2011).
leaning blogs, Ellison does not readily target his Woodbury, Julie. “Dwelling Among the Righteous:
detractors—or, perhaps more important, ask his Keith Ellison: Demagogue or Demon?” In What
followers to do the same—through oppositional Democrats Talk About When They Talk About
tactics that social media make easy to employ. God, David Weiss, ed. Lanham, MD: Lexington,
In 2011, when Representative Anthony Weiner 2010.
resigned from Congress after tweeting compro-
mising pictures of himself to women who were not
his wife—the aforementioned target of Michele
Bachmann’s proposed investigation, Huma Abe-
din—some in Congress thought Ellison, a fellow Ellmers, Renee
member of the Congressional Progressive Cau-
cus, might be ready to assume Weiner’s leadership Renee Ellmers is a member of the U. S. House of
position. Michael Shear notes, however, that Elli- Representatives from the 2nd District of North
son lacks the charisma and brashness of Weiner, Carolina. She was first elected in November
and perhaps more tellingly, the ability or willing- 2010. She won re-election to a second term in the
ness to utilize Twitter to mobilize progressives November balloting in 2012 and began serving
behind common issues. her second term in the 113th Congress in Janu-
In possible attempts at humor, Ellison has in ary 2013. She has used social media effectively in
2012 retweeted a message calling the Republican her campaigns and in her service in the House of
presidential nominee a “heartless douchebag” Representatives.
and tweeted his amusement that a song by “coke- Congresswoman Ellmers was born Renee Jaci-
addicted” James Brown was played while Mitt sin on February 9, 1964, in Ironwood, Michigan.
Romney and his family said goodbye to the con- Her mother, Caroline Pauline (née Marshalek)
vention. In both instances, Ellison alleged that the Jacisin was of Croatian and Polish descent. Her
tweet in question was a mistake made by a staffer. father, LeRoy Francis Jacisin, was of Czech and
Regardless of his alleged Twitter command, Elli- French-Canadian descent. The family moved to
son is a much-discussed figure who, while not Madison Heights, Michigan, when she was a
presently employing social media to the fullest child in order for her father to better provide for
extent to expand his sphere of influence, remains the family as an automobile worker.
a controversial and ever-trending subject in the After graduating from Madison High School,
social media universe. she worked a variety of jobs in order to pay her
way through Oakland University in Oakland
Samuel Boerboom County, Michigan. She first received training as
Montana State University–Billings a medical assistant and then graduated in 1990
with a bachelor of science in nursing. She then
See Also: Activists and Activism, Digital; Bachmann, worked as a nurse in the intensive care unit of
Michele; Huffington Post; Politico. Beaumont Hospital in metropolitan Detroit.
Ellmers, Renee 459

While working at Beaumont Hospital, Renee owner and concerned citizen rather than a career
Jacisin met her husband Brent Ellmers, a surgeon. politician. This, he claimed, would enable him to
After the birth of their son, they moved to Dunn, understand the people because he was not gov-
North Carolina, in Harnett County where they erned by power brokers in Washington, D.C.
practiced medicine and nursing, respectively. She Frank Destrich was a newcomer to the dis-
also helped to manage the family’s small medical trict. After retiring from the Marine Corps, he
practice. had served in Nebraska as a district supervisor
In Dunn, she became the clinical director of for Nebraska’s Game and Parks Commission.
the Trinity Wound Care Center. She served as He used LinkedIn and allied with other bloggers
vice president of community development for the to gain an Internet presence. However, it was to
Dunn Chamber of Commerce and as president of no avail because Ellmers’s campaign was able to
the chamber. She served on the Dunn Planning raise and spend more money than her opponents,
Board of the Betsy Johnson Hospital Foundation which helped her to win the nomination.
and the Harnett County Nursing Home Commit-
tee and taught Sunday school in the Sacred Heart Bob Etheridge
Catholic Church in Dunn. Ellmers then proceeded to the general election
campaign against Bobby Ray “Bob” Etheridge. In
Political Career 1996, Etheridge had defeated Republican incum-
Ellmers had not been engaged in politics nor had bent David Funderburk for the North Carolina
she had any political ambitions until the politi- 2nd District Congressional seat. He then won
cal struggle that arose with the introduction of re-election in the subsequent elections in 1998,
the Patient Protection and Affordable Care Act 2000, 2002, 2004, 2006, and 2008 by well over
(PPACA), which was adopted on March 26, 50 percent of the vote as he defeated Republican
2010. It is known popularly as Obamacare. Her challengers. In 2010, the prospects for re-elec-
husband and she attended a town hall meeting on tion looked good against Republican challenger
President Barack Obama’s proposed health care Renee Ellmers and Libertarian nominee Tom
plan. What they heard was very distressing to Rose. However, on June 14, 2010, Etheridge was
them. It would, she believed, allow the govern- involved in an infamous incident.
ment to dictate patient’s rights to health care, and Two young men, who were traditional college
it would also punish small businesses. age, hailed and approached Congressman Ether-
As a nurse and the wife of a physician who idge on a sidewalk in Washington, D.C. They iden-
was intimately involved in health care delivery, tified themselves as student reporters working on a
she found her opposition to the bill required project. As they videotaped Etheridge, they asked
action. To oppose Obamacare, Ellmers became him if he “fully supported the Obama agenda.”
active in local Republican Party politics in the Instead of answering the question or perhaps dis-
summer of 2009. She also joined Americans for missing it, he repeatedly asked them, “Who are
Prosperity (AFP). A conservative public policy you?” Etheridge then grabbed one of the young
interest group, AFP helped many Republicans in men by the wrists, neck, and shirt (as shown in the
the 2010 election. Its advocacy is for free-market video) while repeatedly saying, “Who are you” as
solutions rather than government-imposed solu- the young man repeatedly asked to be let loose.
tions to most problems. Thereafter, she entered The incident went viral on many blogs as the You-
the Republican Party primary for the nomination Tube video quickly hit the Internet.
as its candidate for the 2010 election for the office Later Etheridge apologized for the “Who are
of representative in Congress. you” incident in a statement at a press confer-
In the Republican Party primary held on March ence. By the end of the next day, June 15, many
4, 2010, Ellmers defeated Todd Gailas, an auto- on the Internet were calling for Etheridge’s arrest
mobile salesman, and Frank Destrich, a retired for assault, although by engaging in physical con-
businessman. Gailas used Facebook during the tact, the appropriate charge would have been bat-
primary campaign to seek votes. On his Facebook tery. Soon, Democrats were defending him for his
page, he described himself as a small business actions, claiming that the youths were Grand Old
460 Ellmers, Renee

Party (GOP) operatives. The spin politicizing of campaign, pointing out that, if it had been a
the incident, much of it on blogs or other Internet teacher at a school where her children attended,
sites, gave Etheridge political cover. the teacher would be in serious trouble.
On June 18, 2010, a Mississippian, Brandon Tom Rose, the Libertarian Party candidate for
Leslie, gave a statement to the Southern Pines the congressional seat held by Etheridge, was also
Pilot that he had been assaulted in a similar quoted on the Internet in Current. He called for
manner as the two young reporters in 1996 by the Washington, D.C., police to arrest Congress-
Etheridge. At the time, Leslie was a student at man Etheridge. The fact that they had not, he
Pinecrest High School in Monroe County, North declared, was strange. Furthermore, when asked
Carolina, which then was part of the 2nd Con- if Etheridge appeared drunk during the assault,
gressional District. Etheridge, a first-time candi- he replied “drunk with power.” Rose used social
date for Congress, was the state superintendent of media to conduct his campaign. One program on
public instruction. When Etheridge came to one which he appeared was a blognet radio program
of the school’s football games, Leslie approached A Stranded Citizen.
him to ask about a particular education pro-
gram. After Etheridge did not answer the ques- 2010 Election
tion, Leslie repeated the question two more times. In the 2010 election, Ellmers defeated Democrat
Then Etheridge, according to Leslie, grabbed him Party incumbent Bob Etheridge. He had been
by the shoulders and shook him, saying that he expected to win by pundits as a seven-term incum-
should learn to respect his elders. Leslie found the bent of the House of Representatives despite
incident shocking. Ellmers’s support from the Tea Party and Sarah
Now 32 years of age and an attorney in Palin. Libertarian candidate Rose received only
Oxford, Mississippi, Leslie described himself as 1.8 percent of the vote, a total of 3,505 votes.
a Democrat who supported the Obama agenda. Etheridge received 48.7 percent (92,393 votes),
However, he said that watching the “Who are while Ellmers won with 49.5 percent (93,876
you” video evoked bad memories. Leslie’s claim votes). The election was close and ended with a
was dismissed by his retired high school principal victory of 1,489 votes after a recount.
on the grounds that Leslie had been in the wrong. In her first term in office, Ellmers was appointed
Many on the Internet found this insufficient and to the House Committees on Agriculture, Foreign
accepted the story as proof of a pattern of repeat Affairs, and Small Business as well as the Subcom-
offences by Etheridge, whose staff later claimed mittee on Healthcare and Technology, of which
the report was in error. she is the chair.
The “assault” by Etheridge was defended by Ellmers was elected in 2010 with Tea Party
MSNBC host Chris Matthews as justified because support; however, she has been a strong supporter
it was bad manners to ask a question of a law- of Speaker of the House John Boehner. This has
maker. Furthermore, opined Matthews, it was an not pleased Tea Party members, who see her as
ambush by a group of unknown activists. These inconsistent. Her committee assignments in the
remarks generated a flood of blogging as support- 112th Congress have enabled her to speak force-
ers of the students denounced Matthews. fully for her freshman class. Her guiding princi-
Etheridge’s behavior aided Ellmers’s campaign ples have been cutting wasteful spending, rolling
because it alarmed many people who viewed back harmful government regulations, and giving
his actions as arrogant behavior. However, over small businesses and entrepreneurs the ability to
the Internet, numerous negative comments were succeed and prosper.
made on blogs, Web sites, and other forms of In June 2012, Ellmers, as chair of the House
social media. The comments that defended the Small Business Committee’s Subcommittee on
congressman were usually vitriolic and extreme. Healthcare and Technology, requested that Kath-
Those that denounced his behavior pointed to leen Sebelius, secretary of the U.S. Department of
its character as warranting more than the state- Health and Human Services, send a status report
ment he had released, including arrest and forced on the agency’s health information technology
resignation. Ellmers used the video to boost her patient safety efforts. The request was to address
Embedding 461

recommendations in the Institute of Medicine getting a flag that was flown over the Capitol, or
(IOM) report of November 2011. any number of things, including helping children
learn about the American system of government.
2012 Election
In the 2012 election, Ellmers defeated two oppo- Andrew J. Waskey
nents. Steve Wilkings, a retired U.S. Army officer, Dalton State College
was her Democrat Party opponent. Her Libertar-
ian Party opponent was Brian Irving, a retired See Also: Bachmann, Michelle; Cantor, Eric;
U.S. Air Force officer. In this election, Ellmers Campaigns, Congressional (2010); Campaigns, 2012.
won with 55.9 percent to 41.4 percent for her
Democrat opponent and 2.7 percent for her Lib- Further Readings
ertarian opponent. Aaker, Jennifer and Andy Smith. The Dragonfly
Irving used some social media, including You- Effect: Quick, Effective, and Powerful Ways to Use
Tube, to wage his campaign. He was interviewed Social Media to Drive Social Change. Hoboken,
on some blogs but with very limited success. NJ: John Wiley & Sons, 2010.
Wilkins created his own Web page with links to Bamberger, Joanne C. PunditMom’s Mothers of
Facebook, LinkedIn, Flicker, YouTube, Twitter, Intention: How Women & Social Media Are
and e-mail. He also established a campaign blog Revolutionizing Politics in America. Houston, TX:
that was, in the end, not enough. Ellmers, like her Bright Sky, 2011.
opponents, created a campaign Web page and a Brander, Michael N. Social Media Use in the
blog and included Twitter, YouTube, Facebook, Federal Government. Hauppauge, NY: Nova
and media-streaming links. Science, 2012.
In the 113th Congress, Ellmers served on the O’Brien, Barbara. Blogging America: Political
House Energy and Commerce Committee Sub- Discourse in a Digital Nation. Portland, OR:
committees on Health, Communications and Franklin, Beedle & Associates, 2004.
Technology, and Oversight and Investigations. O’Connor, Rory. Friends, Followers and the Future:
Her Congressional office Web site has a num- How Social Media Are Changing Politics,
ber of links to other sites such as GOP.gov and Threatening Big Brands, and Killing Traditional
C-Span.org. Some of these are causes that she Media. San Francisco: City Lights, 2012.
supports, such as a balanced budget amendment Pole, Antoinette. Blogging the Political: Politics and
to the U.S. Constitution. Another is SmallBizO- Participation in a Networked Society. London:
PENmic, which is linked to the House Committee Taylor & Francis, 2009.
on Small Business.

Social Media
Ellmers regularly uses Twitter and encourages fol-
lowers to sign up to follow her. Her subcommit- Embedding
tee Web site has access to Facebook, Twitter, You-
Tube, and other links to social media. One links The concept of embeddedness, introduced by eco-
to video feeds. She can also be reached via e-mail. nomic sociologist Mark Granovetter in the 1980s,
Ellmers’s Facebook page has numerous posts is used to define to what extent individuals or
from thousands of people as well as numerous groups are entangled in a particular social environ-
links to other issues or supporters of her issues ment or network in its broad sense. Granovetter
of promoting small business, ending the crushing developed a sociological perspective on economic
public debt, ending high taxes, and reducing exces- actions focusing on the patterns of social relations
sive regulations. She can be found on a number as a way to reduce market uncertainty through
of blogs promoting her concerns and legislative embedding economic transactions into social struc-
issues. An important media link for her constitu- tures. Later, other scholars suggested differentiat-
ents is to constituent services. Here, her constitu- ing between embeddedness and embedding: The
ents can ask for help with a government agency, in first concept refers to the end state of embedding,
462 Embedding

while the second is the process as such. In other communities and groups matters for recruitment
words, embeddedness is more structure oriented, of new participants as well as for supporting con-
whereas embedding is dynamic, referring to the tinued participation among existing group mem-
process that is continually changing. bers, discouraging them to leave the community.
Scholars whose research interests and projects When talking about the process of embedding
lie within the application of social network analy- with regard to social media, one should con-
sis (SNA) suggest that embeddedness is a hierar- sider to what extent new forms of media become
chical nesting of cohesive structures. Moreover, embedded in people’s everyday lives. Hence,
they distinguish between the overall embedded- social media are saturated in contemporary life;
ness of the networks in larger communities or they have become a tool and a place for conflicts
societies that result in the prevalence of particular among a multitude of organized and autonomous
ego networks in a population and the network actors. New forms of media and news sources
embeddedness of individual actors into groups cause changes in politics of organization and
and organizations. changes in their self-representation online.
The positive aspect here is that social media
Social Media platforms eliminate the pure use of traditional
With the rapid development and expansion of advertising when communication is directed
social media in all forms of electronic communi- mostly from producers to consumers; instead,
cation (i.e., social networking sites), users receive social media platforms enable receiving easier and
opportunities to create online communities for faster feedback about the product or service that
sharing ideas, exchanging messages, and send- the provider can get from its customers. It results
ing content such as music or videos. Social media in embedding of more clients into the network of
allow for using Web-based technologies for com- a particular organization. Therefore, it becomes
munication in the form of interactive dialogue more crucial for the company to take care of its
through the variety of social media tools: social own reputation and image using social media plat-
networking sites, blogs, content communities, forms among other communication channels.
forums, podcasts, video and photo sharing sites, Social media serve as a free and open space for
and virtual games. the interaction of wide ranges of stakeholders who
Embedding of individuals in larger groups and aim to share comments about organizations or get
communities via social media leads to higher inclu- opinions alternative to the official statement from
sion of actors into various activities announced or an organization. Therefore, embedding of social
communicated through social media, either on media into the communication of stakeholders
purpose or spontaneously. Use of social media leads to lower domination of an organization in
platforms like Facebook, Twitter, or YouTube creating its image.
affects various spheres of human life, from mar- Embedding through social media occurs in vari-
keting and political actions to privacy and identity ous dimensions, specifically in relational, cognitive
construction. There is a growing range of stud- and emotional, cultural and political, and spatial
ies on how these platforms impact on contempo- and geographical spheres of one’s life. It is highly
rary life of people in different countries, where connected with how people perceive social media
one possible angle is to compare the use of social trustworthiness and to what extent they are media
media worldwide and across particular countries literate. A number of studies of Internet penetra-
for specific purposes. For instance, the embedding tion across countries, as well as across social cat-
of the Spanish citizens into the protest actions egories by age or income, have demonstrated that
during the last year happened mostly due to the different categories vary in their online visibility,
use of social media by public activists for citizens’ which might lead to asymmetrical power relations.
mobilization. Thus, social media can empower However, embedding of social media also leads to
actors who would remain powerless without these a blurring of public and private spheres.
modern tools. Marginalized social groups are able
to promote their agendas on free and easy-to-use Tetiana Kostiuchenko
platforms. Moreover, embedding in social media National University of Kyiv-Mohyla Academy
Engagement Advertising 463

See Also: Network Influentials; Privacy; Social of advertising rests on the basic assumptions that
Authority; Social Network Analysis; Topology of human beings are social animals and need to
Social Networks. communicate and interact. These interactions can
take place in the physical world and, more newly,
Further Readings through social media. The purpose of engaging
DiMaggio, Paul, Eszter Hargittai, W. Russell messages is to encourage long-term relationships
Neuman, and John P. Robinson. “Social rather than one-time demonstrations of support,
Implications of the Internet.” Annual Review of such as monetary donations. Political engaging
Sociology, v.27 (2001). messages ask supporters to go do something,
Granovetter, Mark. “Economic Action and Social such as watch a video and repost or share with
Structure: The Problem of Embeddedness.” friends. It is through an engaging action with the
American Journal of Sociology, v.91 (1985). brand that a long-term commitment is developed
Youngs, Gillian. “Blogging and Globalization: The between the public and the political entity.
Blurring of the Public/Private Spheres.” Aslib Ultimately, this form of advertising asks the
Proceedings, v.61/2 (2009). public to act in response to a communicated
message. Responses include volunteering for a
political cause, sharing information with friends
through various channels, or posting comments
on public message boards, digital profiles, and
Engagement social network spaces. These responses both ful-
fill the needs behind the original message and
Advertising encourage the public to take partial ownership
and control over the brand by being responsible
Engagement advertising is a form of marketing for the content associated with the entity. For
that encourages customers to coconstruct the example, a message asking supporters to like a
brand of a political entity such as a politician, candidate on Facebook not only increases the
group, issue, or campaign. Through engaging digital presence and status of the candidate but
with the brand’s digital presence, like a social net- also offers supporters a means of controlling
work profile, the consumer creates the political the candidate’s digital image. Further, the pub-
entity’s image by responding to existing informa- lic benefits from this action because the social
tion or adding content. Rather than conceptual- media site connects the two profiles and asso-
izing the consumer as passive, engagement adver- ciates them with each other. This multipronged
tisers propose a long-term, active, and meaningful relationship built between the political entity
relationship between the brand and its public. In and its public elicits increased feelings of support
return for the consumer’s engagement, the brand and loyalty between both sides.
helps to construct the identity of the consumer Engagement advertising encourages a pro-
by digitally linking with the individual and rep- longed relationship between a political entity and
resenting an interest or facet of that individual’s its public that increases communication long after
life. Through this engagement, advertisers hope the initial engagement campaign is complete.
the consumer becomes invested in the success of Cynthia M. Gibson advocates that, through digi-
the political entity, which will result in long-term tal engagement, the public can provide feedback
support. While engagement advertising comes in on a politician’s stances, policy creation, and issue
many forms, the affordances granted by social salience. This can further encourage transparency
networking sites have greatly changed the way between politicians and their publics as well as
engagement is conceptualized, measured, and offer control over the actions of elected officials.
implemented by political groups. Gibson also proposes that engagement advertis-
Engagement advertising encourages the par- ing encourages both top-down and bottom-up
ticipation of the public in the construction of a communication due to the initial communica-
branded image through digital interaction. Tomi T. tion by a political organization and the following
Ahonen and Alan Moore propose that this form encouragement of a response by the public.
464 Engagement Advertising

Studying Effectiveness focus groups or interviews to examine the reason-


Web 2.0 technologies and social media make ing behind a specific form of response.
engagement responses diverse. Through the use of Engagement advertising can be alternatively
blogs, live chat, and product ratings, the public is studied through neuroscience and psychology.
invited to not only engage with the organization Work on emotions in brand loyalty and consumer
presenting the message but also to engage with engagement suggests it is emotional appeals and
other consumers or members of the public. These not messages routed in logic that are most effective
Web 2.0 spaces can be managed by the political at engaging the public. Drew Westen found that
organization behind the original engaging mes- emotional television ads and campaign electronic
sage or are alternatively created and controlled by messages were more likely to encourage volun-
the public. Consider President Barack Obama’s teerism, fund-raising, and voting. Westen fur-
presence on Facebook. In addition to an official ther suggests engagement advertising should fea-
politician page run by the official Obama for ture the emotional appeals found in other media
America campaign, there is also a community and such as songs, newspaper articles, and movies to
fan page run by individual supporters. The many encourage the public to digitally interact with a
Web 2.0 spaces provide endless possibilities for political entity. For example, integrating the lyrics
the public to engage after observing or consum- of the popular song “Sweet Home Alabama” by
ing an engagement campaign. Thus, measuring all Lynyrd Skynyrd into today’s political campaigns
forms of engagement responses in all social media will draw on the brain’s preestablished emotional
is nearly impossible. To measure campaign suc- network that associates that song with previ-
cess, engagement advertisers must make desired ous mediated experiences. By drawing on these
outcomes of messages clear, specifying where and emotional networks, a campaign can encourage
when they want the public to respond. engagement with digital media by reinforcing its
The multitude of methods used to measure message with familiarity and a sense of commu-
effectiveness suggests that engagement adver- nity. To prolong these pleasant emotional connec-
tising can be studied through both qualitative tions, the public can go online to engage with sim-
and quantitative approaches. Researchers J. R. ilar-minded supporters of the political message,
Martin and P. R. R. White studied advertising thus finding unity not just in the politics but also
and identified two forms of engagement mes- in the emotions of the engagement advertisement.
sages. Because of the differences between these
two types, different methods and models are Alison N. Novak
required to study engagement. First, heteroglos- Ernest A. Hakanen
sic messages are present when the engaging cam- Drexel University
paign does not explicitly state a desired outcome
and the public is open to perform a variety of See Also: Campaigns, Digital; Candidate Image;
responses based upon their individual abilities, Crowdsourcing; Engagement Features; Secondhand
interests, and preestablished knowledge. Second, Political Engagement.
monoglossic messages occur when the engaging
campaign demands one single, correct response, Further Readings
such as liking a candidate, watching a video, or Ahonen, Tomi T. and Alan Moore. Communities
sharing content with friends. Dominate Brands: Business and Marketing
Monoglossic messages can be quantifiably Challenges for the 21st Century. London:
studied for effectiveness because of their single- Futuretext, 2005.
step cause-and-effect relationship. However, Gibson, Cynthia M. “Thinking Outside the (Ballot)
monoglossic messages are problematic because of Box: A Broader Political Engagement Strategy for
their limited demands of the public and failure to America’s Civic Organization.” National Civic
recognize alternative responses outside of the pre- Review (Summer 2004).
determined set of actions. Heteroglossic messages Martin, J. R. and P. R. R. White. Language of
can rely on models to determine effectiveness but Evaluation: Appraisal in English. New York:
may alternatively use qualitative methods such as Palgrave Macmillan, 2005.
Engagement Features 465

Westen, Drew. The Political Brain: The Role of participation in fund-raising ventures for charity.
Emotion in Deciding the Fate of the Nation. New As a complement to these activities, those who
York: PublicAffairs, 2007. are heavily civically engaged suggest that doing
the ethically and morally correct thing is more
important than following the exact letter of the
law, thus accounting for the activism tendencies
within this group.
Engagement Features Political engagement features emphasize regu-
lar voting; persuading others to vote; displaying
First defined by Sydney Verba, Kay Lehman buttons, signs, and stickers; financially contrib-
Schlozman, and Henry E. Brady, engagement is uting to a campaign; and volunteering for can-
an activity that is purposely done to influence gov- didates or political organizations. Traditional
ernment action through public policy or through political engagement demands a public that obeys
the election of those who create public policy. As the law and sees public engagement as obligatory.
the theorists note, engagement is a key under- Features of public voice engagement include
lying feature of an active public sphere. Rather contacting officials and media, protesting, peti-
than a singular activity, engagement takes many tioning, boycotting, buycotting, and canvass-
forms including voting, volunteering, campaign- ing. Zukin et al. contend boycotting and buy-
ing, digitally interacting with a brand’s social cotting (the opposite of boycotting) are two of
media presence, and voicing opinions. It is criti- the fastest growing and most popular forms of
cally important to study engagement because it engagement in the 21st century. These activities
is frequently the desired outcome of social media ask consumers to consider the ethical and moral
political campaigns. implications of purchases and the corporations
The features or indicators of engagement that produce the goods.
are broad and include civic, political, public Lastly, cognitive engagement features consist
voice, and cognitive indicators. Participation is of attending to coverage of government and pub-
best viewed as a continuum; defining others as lic affairs, talking with family and friends about
engaged or unengaged is problematic in consider- politics, political knowledge, and attention to
ing the full scope of the features of engagement. news media. This feature is viewed as critically
When studying the practices of a social group, all important to the potential of a group to orient
four sets of indicators must be taken into account and organize around a specific issue, politician,
to understand full democratic engagement. These policy, or group. Therefore, the features of cogni-
four sets of features are explained by Cliff Zukin tive engagement support the efforts of political,
and colleagues, who propose that, by interview- civic, and public voice ventures.
ing participants and asking questions from each
set, a comprehensive, quantitative assessment of Social Groups
the current state of public engagement can be Each of the four forms of engagement features is
achieved. Each set of indicators addresses various important to a well-rounded public sphere. While
activities performed by individuals. The frequency none are inherently more important than the oth-
of these activities suggests the intensity and lon- ers, civic and political engagement are viewed as
gevity of each type of engagement. Because of the most widely practiced and most divisive. A
this, it is possible for an individual to be mostly key difference between civic and political engage-
civically engaged and not politically, public voice, ment involves the social groups that primarily
or cognitively engaged. practice each. While older generations such as
Zukin and colleagues define civic engagement the G.I. Generation, Baby Boomers, and Gen-
as volunteerism directed at community problem- eration X practice traditional political engage-
solving and assisting others. Civic engagement ment, the Millennial Generation or DotNet Gen-
features include problem-solving, regularly vol- eration, born between 1980 and 2001, practice
unteering for nonelectoral organizations, active newly popular forms of civic engagement. Zukin
membership in groups or associations, and and colleagues propose the divide between the
466 Engagement Features

practitioners of political and civic engagement In general, this is a debate focused on the Mil-
creates a tension between the generations that lennial Generation. Because millennials are the
leads to intergenerational misunderstandings most frequent and primary users of social media
and miscalculations of the potential of the newer such as Facebook and Twitter, many researchers
generation. For example, because civic engage- such as Jean M. Twenge question if this is a true
ment does not prioritize voting, those practicing form of political or civic engagement. Twenge’s
political engagement see the newest generational argument asserts that social media use is passive
cohorts as contributing to the perceived down- and primarily focused on the individual rather
ward spiral of American politics. than the community or society aspects. Because
Beyond generational groups, other social groups of this, she deems millennial use of social media
emphasize each of the four forms of engagement. as an inferior form of political engagement.
For example, education is heavily related to civic However, not all researchers agree with this
engagement. Those with higher levels of educa- conclusion. Zukin et al. and Russel J. Dalton sug-
tion are more civically engaged. Interestingly, tele- gest that although political and civic engagement
vision watching and overall engagement is viewed are now primarily mediated through social media,
as a zero-sum relationship. Zukin and colleagues this does not take away from the political agency
suggest that the more an individual does of one, of the Millennial Generation. While engagement
the less the individual will do the other. All forms may take on a new form, it is still valuable and
of engagement strongly relate to being asked to capable of change and government influence.
participate. Across all social groups and genera-
tional cohorts, those who are asked to civically, Alison N. Novak
politically, public voice, or cognitively participate Ernest A. Hakanen
are more likely to do so. Drexel University

Benefits See Also: Activists and Activism, Digital; Age;


Engagement is an important indicator of overall Campaigns, Digital; Campaigns, Grassroots;
democratic health and individual life satisfaction. Candidate Image; Clicktivism; Engagement
Gail Pacheco and Thomas Lange found individu- Advertising; Facebook; Secondhand Political
als who heavily practice civic, political, public Engagement; Voter Apathy; Youth Engagement.
voice, and cognitive engagement are more likely
to have high levels of life satisfaction. As amounts Further Readings
of engagement went up, so did life satisfaction. Beasley, John C. “Imagining Public Engagement.”
Importantly, life satisfaction was related to those Public Understanding of Science, v.21/5 (2010).
who actually were engaged, not just those who Dalton, Russell J. The Good Citizen: How a Younger
lived in countries where engagement was possible. Generation Is Reshaping American Politics.
This is supported by John C. Beasley’s work that Washington, DC: CQ Press, 2009.
proposes life satisfaction is highest when there is Pacheco, Gail and Thomas Lange. “Political
a perception that democratic engagement is effec- Participation and Life Satisfaction: A Cross-
tive and accomplishes a goal. European Analysis.” International Journal of
Social Economics, v.37/9 (2010).
Critiques Twenge, Jean M. Generation Me. New York: Free
The traditional understandings of engagement Press, 2006.
become complicated by social media, in that a fre- Verba, Sidney, Kay Lehman Schlozman, and Henry
quent critique of social media is that it represents E. Brady. Voice and Equality: Civic Volunteerism
passive engagement, rather than active engage- in American Politics. Cambridge, MA: Harvard
ment. It is the notion of intentionality and activ- University Press, 1995.
ity that are intrinsically related to engagement Zukin, Cliff, et al. A New Engagement? Political
that provide a challenge for researchers. Is use of Participation, Civic Life, and the Changing
political social media an active or passive form of American Citizen. Oxford, UK: Oxford University
political and civic engagement? Press, 2006.
Environmental Issues 467

Environmental Issues to generate widespread concern and move the


subject into mainstream media, as was the case
Recent decades have seen two distinct but related with the Monsanto Protection Act early in 2013.
changes in environmental politics, both of which When President Barack Obama signed a spending
are attributable to the expansion of social media. package that prevented government shutdown,
First, information about the state of the environ- he also sparked outrage among food and environ-
ment has become more readily available for those mental activists. The source of their anger was a
with access to the Internet or other networked rider that allowed genetically engineered crops to
technology. Second, those who are concerned be distributed and cultivated despite any poten-
about environmental problems have begun to tial court injunctions. Nicknamed after biotech-
make use of various social media channels in their nology giant Monsanto (facing such a court case
organizing and mobilizing efforts. at the time), the provision was quickly denounced
The proliferation of social media channels has on Facebook and Twitter. Within weeks, the issue
promoted a shift in the way that many think of reached the mainstream media, including cover-
news and journalism. The lines between profes- age on The Daily Show.
sional journalism and user-created content are Further blurring the line between traditional
increasingly blurred as audiences gain access to news journalism and user-generated content, sev-
new communication technologies and journalists eral popular news sites have blogs devoted exclu-
take to Twitter and the blogosphere. As news con- sively to the environment. For example, the New
tent and social media converge, material about York Times Web site hosts the Dot Earth blog
environmental issues like global climate change, (dotearth.blogs.nytimes.com) and the popular
pollution, habitat destruction, and animal welfare news blog Huffington Post has a subsection called
is increasingly shared fluidly between the once-dis- HuffPost Green (huffingtonpost.com/green), both
tinct domains. For example, links to stories from of which provide digital space for environmental
more traditional news sources (such as newspa- issues to be presented and discussed. The blog
pers, newsmagazines, radio shows, and broadcast format allows writers to avoid some of the limita-
and cable news programs) about environmental tions of traditional print news by offering readers
issues and events may be posted on Facebook, more in-depth background information (particu-
tweeted, or become the subject of a blog entry. In larly important when it comes to complex topics
this way, news content becomes a part of social like climate change) and by giving them an oppor-
media, often with the addition of user reactions tunity to respond to entries in comments sections.
or commentary (however slim, this opportunity Other environmental issue blogs represent various
for participation is a hallmark of Web 2.0 tech- points of view that were largely unknown before
nology). Stories that may otherwise have gone rel- social media, like the conservative environmen-
atively unnoticed can be amplified (or “go viral”) talist voices at Rightwaytobegreen.com and the
when concerned media users pass them along to Daily Green’s Green Conservative blog.
their social network, and such extra attention Journalists and private citizens are not the
may even lead to citizens demanding accountabil- only parties who use social media to dissemi-
ity from business leaders or government officials nate information about the environment. On
for actions they deem to be eco-destructive. Mondays, environmentalists in the Twitterverse
On the other hand, mainstream news media use the hashtag #EcoMonday to suggest green
sometimes fail to cover an environmentally sig- tweeters and topics for other users to follow.
nificant event, such as an environmental protest With increasing frequency, politicians and cor-
or the passage of potentially damaging legisla- porate leaders are using channels like Twit-
tion. In these cases, social media users have many ter and Facebook to share their perspectives
different channels through which to disseminate on—and in some cases explain their involve-
the news, such as Twitter, Facebook, YouTube, ment with—environmental issues. For example,
and Tumblr (and other blogging platforms). Suc- immediately after the explosion on the Deepwa-
cessful social media campaigns may even keep ter Horizon oil drilling rig in the Gulf of Mexico,
an issue in the public’s awareness long enough BP (@BPGlobalPR) used Twitter to keep people
468 Environmental Issues

updated about events as they unfolded, carefully networking. Activists can now post information
sidestepping the issue of responsibility. about meetings and events on their Facebook
pages and make educational videos available on
Political Campaigns and Causes their YouTube channels. From small groups in the
The second change in environmental politics Midwest fighting the mining of sand for large-
has to do with the organization of campaigns scale hydraulic fracturing to larger networks
and mobilization of support for environmen- pushing a measure to label genetically engineered
tal causes. Social media have proven useful in food in California, environmental organizations
addressing environmental concerns, as a tool for have overwhelmingly embraced new digital tools
both grassroots and national activist organiza- in their campaigns.
tions. For decades, environmental activists spread Petition Web sites like Change.org and
information about their causes by reaching out MoveOn.org also offer new possibilities for
to supporters through the mail or by localized, environmental activism by lowering the barri-
face-to-face networking. They relied on tradi- ers to creating a successful petition. Rather than
tional news coverage to bring attention to their going door-to-door or circulating paper petitions
campaigns and events, and were restricted by its at meetings and rallies, concerned parties can
structure and limitations (e.g., events must coin- use these platforms to create an electronic peti-
cide neatly with the news cycle, be timely, and tion designed to target government or corporate
be sufficiently dramatic). However, social media interests. Invitations to sign are then distributed
technology has also allowed organizations to through e-mail, along with a hyperlink that
mobilize support for their causes through digital directs the recipient to the petition. Change.org

The Sea Shepherd Society is an example of an environmental group that has used social media extensively to spread its message.
These society members were engaged in a skirmish with a Japanese whaling ship north of the Ross Sea off Antarctica on February 2,
2009, as part of their 2008 and 2009 campaign against Antarctic whaling. The activists, backed by their own helicopter, countered
water cannons by flinging bottles of rancid butter toward the whalers in an effort to deter the ship from the hunt for whales.
Environmental Issues 469

and MoveOn.org petitions have addressed many been remarkably successful in getting informa-
different political issues, but environmental top- tion about the Sea Shepherd Society to the public.
ics have included the labeling of genetically modi- Along with a Web site, he has used Twitter and
fied organisms (GMOs), removing toxic materials YouTube to publicize its campaigns and achieve-
from consumer products, establishing limits on ments. News outlets often use material that has
the release of greenhouse gasses, and ending the been either produced or approved by Watson, giv-
controversial practice of natural gas extraction by ing him unique control over the type and tone of
hydraulic fracturing. coverage.
Digital communities have grown around Web
sites and blogs that focus on environmental issues, Challenges
often with a common goal of fund-raising. For While social media seems in many ways to have
example, green economist Bill McKibben founded expanded the reach of environmental activists
350.org (so named for the estimated safe level of by allowing them to draw attention to their
greenhouse gasses in the atmosphere, in parts per campaigns, mobilize support, and even level the
million). The site allows visitors to learn more political playing field somewhat, there are also
about the group’s current campaigns and sign up unique limitations and challenges to consider.
to receive more news via e-mail. Supporters can People who hear about environmental issues
also contribute to 350.org’s goal of decreasing fos- online may feel that they have done enough to
sil fuel use by making a financial donation with a address the problem by reading a blog post and
credit card or PayPal. McKibben also makes use of then signing an electronic petition or sharing
Twitter to inform and mobilize his followers (num- a link on their Twitter feed. However, in most
bering nearly 90,000 in 2013). Another green site, cases, such “clicktivism” is insufficient. Actual
Water.org, gathers microloans to fund water sani- volunteering or activism in the traditional sense
tation projects in less developed nations. of participating in rallies or boycotts is required
While 350.org and Water.org were both estab- to make substantial progress. Critics of digital
lished as online communities, many older envi- activism claim that real change relies on strong
ronmental organizations (e.g., Greenpeace, the commitment and personal relationships, which
Sierra Club, and World Wildlife Fund) have also may be lacking in online networks of people
made the transition to social media. Commonly, who do not interact offline.
their sites look much like the 350.org site, offer- Another challenge lies in ensuring that infor-
ing information about current campaigns, links mation about environmental issues reaches not
to connect via other social media channels like just those who are already concerned with the
Twitter and Facebook, and a secure portal for problem, but also those who may be unaware of
monetary contributions. These organizations it, yet are likely to be sympathetic. Social media
are large and well established, meaning that they are often considered to be very efficient because
have the necessary resources to present a polished users are able to select sources based on perceived
and user-friendly Web site to members and poten- relevance to their interests, rather than sifting
tial donors. Some have even released applications through content that they may find uninteresting.
for smartphones or tablets, like the Sierra Club’s However, when users are only exposed to voices
iPhone app that asks users to pledge to change with which they already agree, or only hear the
their behavior in ecofriendly ways. concerns of those who share their interests, the
Other groups have made social media a cor- result is an echo chamber that keeps dissenting
nerstone of their activism. One notable example ideas and new information out of view. Paradoxi-
is the anti-whaling group Sea Shepherd Society, cally, the efficiency of social media then becomes
which makes months-long voyages to the Antarc- a limitation.
tic in order to curtail whaling activity by Japanese A final challenge that may limit the ability of
fleets. Because the trips are lengthy and danger- social media to affect substantial environmental
ous, journalists rarely accompany the Shepherds change is the phenomenon known as astroturf-
and coverage by traditional news outlets is lim- ing, or the construction of fake grassroots cam-
ited. But Paul Watson, the group’s leader, has paigns. The problem is not a new one; polluting
470 Estrada, Joseph

or otherwise problematic industries have long Further Readings


employed the tactic of creating front groups Cox, Robert. Environmental Communication and the
or fake citizen organizations to counter claims Public Sphere. Thousand Oaks, CA: Sage, 2012.
advanced by environmentalists. The new reach Gladwell, Malcolm. “Why the Revolution Will Not
of social media has simply expanded the practice Be Tweeted.” New Yorker (October 4, 2010).
and allowed certain corporations or other parties Kamenetz, Anya. “Why Environmental Activists
with antienvironmental agendas to build Web sites Embrace Social Media.” Fast Company, v.149
that refute the arguments leveraged against them. (October 2010).
The U.S. coal industry used this tactic extensively Lester, Libby. Media & Environment. Cambridge,
during its push to rebrand its product as “clean UK: Polity Press, 2010.
coal,” establishing front groups and Web sites
like Americaspower.org and Cleancoalusa.org.
Content from such sites, which may be mislead-
ing or even deceptive, can then be distributed via
social networks, where its legitimacy often goes Estrada, Joseph
unchallenged (partially because of the existence of
digital echo chambers, and because users tend to Joseph Estrada was the 13th president of the
trust those who are in their social media circles). Philippines who was ousted among allegations
Another example of digital astroturfing is the 2006 of corruption in 2001. Social media was used to
YouTube video Al Gore’s Penguin Army, which coordinate large protests that demanded that the
made fun of the former vice president and his president be held accountable for his crimes and
documentary An Inconvenient Truth. The video that local media accurately report on the presi-
appeared amateurish, but was revealed to have dents’ crimes and trial. The social media–driven
been produced by the DCI Group, a conservative protests led to the ousting of President Estrada.
lobbying and public relations firm. On May 11, 1998, in the second set of general
The interactivity that characterizes Web 2.0 elections since Philippine democracy was restored
technology gives social media users the opportu- in 1986, 28 million voters went to the polls to
nity to participate in dialogs with those who are choose a president, a vice president, 12 senators,
geographically distant and those who are socially over 200 members of the House of Representa-
removed (e.g., figures who occupy positions of tives, and more than 17,000 local officials. Despite
economic or political power). News about the being called a complete circus, it was the freest,
environment can now spread quickly through fairest, and least violent election in Philippine his-
many digital channels. Eco-activists have taken tory. Joseph Estrada won the presidency by cam-
readily to digital technology, hoping to raise paigning to the lower classes with promises to nar-
awareness of environmental problems and to row the widening income gap between the rich and
organize and mobilize support for green causes. poor. Estrada, who previously served as vice presi-
Yet, while new cultural venues like Facebook and dent of the country, won the election with 40 per-
the blogosphere have perhaps created a more cent of the vote in a field of 11 candidates. Unlike
democratic space for political debate, these limi- most of his opponents, Estrada did not possess any
tations must be kept in mind when considering legal or military expertise, nor did he speak flu-
the overall utility of social media networking to ent English. The Robin Hood roles he played in
the environmental movement. his 33-year-long career as a film star enhanced his
image as a companion of the underprivileged. He
Alexandra Nutter Smith served as president from 1998 until 2001.
University of Washington–Tacoma In October 2000, Luis “Chavit” Singson, the
governor of a province in the Philippines and a
See Also: Activists and Activism, Digital; Advocacy close friend of the president, alleged that he had
Groups, Political Branding of; Al Gore’s Penguin given Estrada 400 million Philippine pesos (more
Army; Campaigns, Grassroots; Campaigns, Virtual; than $9 million) as a payoff from an illegal num-
Water.org. bers game commonly played in the Philippines, as
Estrada, Joseph 471

well as 180 million Philippine pesos (more than


$4 million) in a scandal involving the cover-up of
Singson’s alleged misuse of millions of pesos from
public funds. The allegations against Estrada
resulted in an impeachment suit brought against
him, in which he pled “not guilty.”
On the evening of January 16, 2001, the
impeachment court, composed primarily of sena-
tors, decided not to accept new evidence that
would incriminate the president on charges of
receiving millions in payoffs. That decision by the
Senate confirmed what many Filipinos were afraid
of—that the judges were leaning toward acquit-
ting Estrada. Within an hour after the court had
adjourned that night, citizens flooded the streets
in protest, demanding Estrada’s resignation. By
midnight, thousands of citizens had gathered on a
large road called Edsa (an acronym derived from
Epifanio de los Santos Avenue, a major high-
way connecting five cities in metro Manila) to
protest the Senate vote. Edsa was the site of the
1986 “people power” revolt against then-dictator
Ferdinand Marcos. The protests lasted January
17–20, 2001, ending after Estrada was forced to
resign when the Supreme Court declared that the
seat of the president was vacant.
Estrada maintained that he never resigned,
but the new government created a special court Former president of the Philippines Joseph Estrada (right) with
and arrested him in April 2001. Filipino sup- former U.S. Secretary of Defense William S. Cohen (left) at the U.S.
porters of Estrada marched on Edsa, demanding Pentagon in July 2000. Estrada was forced to resign in 2001 after
his release and reinstatement. However, this time large protests fueled in part by text messages and social media.
mobile phones and social media brought protest-
ers together. Short messaging service (SMS) mes-
sages were the key element in mobilizing protesters
and keeping them informed. Although traditional were abroad were able to be involved and up-to-
media such as newspapers, radio, and television date. In addition to disseminating information,
stations were covering the events, they could not the Internet was home to virtual rallies. Accord-
keep up with the speed in which information trav- ing to Sheila Coronel, it is estimated that as many
eled from person-to-person via SMS. Nor were the as 70 million messages were sent during the
traditional forms of media as interactive as SMS, weeklong protest, and it has been referred to as a
which has the ability to link individual users to “multimedia revolt.”
each other and present real time information about With the help of SMS and the Internet to rally
when and where the protests were occurring. participants, protesters eventually made their way
In addition to the SMS messages, the Inter- to the presidential palace, where police and the
net was a key element used in the protests. Web military responded with force. Violence erupted
sites and e-mail groups were set up, and organiz- and many protesters were badly injured and
ers used these to reach agreements on issues and arrested, including some politicians, before the
mobilize people to attend the rallies. Protesters protests came to an end. The uprising came to
continuously posted updates on the Web sites so be known as EDSA III, but did not result in the
that citizens who were unable to participate or release of Estrada. Instead, he was put on trial at a
472 Ethics of Social Media in Politics

special appellate court called the Sandiganbayan. update, wiki entry, and YouTube video can deter-
After a lengthy trial lasting from 2001 until 2007, mine how one is perceived. Social media make it
Estrada was found not guilty of perjury, but guilty possible for any user to act as a reporter, editor,
of plunder. He was sentenced to reclusión perpetua message creator, and distributor. This is a signifi-
(a replacement for the death penalty, synonymous cant change from the past, when a select group
with life imprisonment). All of the co-accused of trained media professionals had this power
were acquitted. Later in 2007, Estrada was par- and operated within an institutional environment
doned by President Gloria Macapagal-Arroyo and with clearly defined codes of ethical conduct.
released after almost seven years in prison. Ethics is broadly defined as moral principles
After being pardoned, Estrada made a state- that govern human behavior, in other words, a
ment to the Filipino people explaining that he system of values by which a person can determine
was once again willing and able to help improve what is fair, just, right, or wrong. Social media
the lives of citizens, especially the lower class. He have tested traditional theories of media ethics.
admitted that he had made errors while in office, They have challenged accepted notions of pri-
but again declared that he was innocent of any vacy, identity, authorship, and credibility; they
corruption. He then began touring the country, have blurred the distinctions between public and
thanking people for their support and distributing personal communications. These unique features
food, medicine, and clothing. In the 2004 Global of social media pose many ethical dilemmas and
Transparency Report, Estrada was listed 10th on prompt the question whether established ethical
the list of the World’s All-Time Most Corrupt standards are appropriate and adequate to address
Leaders in the World. However, that seemed to them. In terms of social media and their relation-
have little impact on public perception of Estrada, ship to politics, two distinct sets of issues must
who in May 2013 was elected mayor of Manila. be considered: The ethics of using social media to
further political agendas and to achieve political
Meghan R. Sobel ends, and the ethics governing news media cover-
University of North Carolina at Chapel Hill age of these same activities.

See Also: Actors and Social Media in Politics; Asia; Social Media for Political Activities
Indonesia; International Unrest and Revolution. For decades, political campaigns have looked
to new technology to reach voters and win elec-
Further Readings tions. The race for public office now includes viral
Coronel, Sheila. “New Media Played a Role in the e-mails and text messages, constant updates on
People’s Uprising.” Nieman Reports (2002). social networks such as Facebook and Twitter
Labrador, M. C. “The Philippines in 2001: High feeds, user-generated videos, YouTube debates,
Drama, a New President, and Setting the Stage for and creative online advertising strategies to gener-
Recovery.” Asian Survey, v.42/1 (2002). ate attention and raise funds. These media also act
Lande, C. “The Return of ‘People Power’ in the as trust filters for people who seek to manage the
Philippines.” Journal of Democracy, v.12/2 (2001). deluge of information and find credible sources.
Montinola, G. “Parties and Accountability in the Data from the Pew Research Center’s Internet
Philippines.” Journal of Democracy, v.10/1 (1999). and American Life Project show that 36 percent
of social networking site users say that such sites
are very important to them in keeping up with
political news, and 26 percent of site users find
them important avenues to recruit people to get
Ethics of Social Media involved in politics and to debate political issues.
Protests organized through the use of social
in Politics media in Iran, Ukraine, Moldova, Egypt, and in
other countries during the Arab Spring also high-
Politics has been reshaped in the era of social light the power and dangers inherent to social
media. Today, every tweet, blog post, Facebook media. In this environment, it is necessary to
Ethics of Social Media in Politics 473

revisit important questions of ethical conduct in of the golden mean based on the virtue of mod-
using social media for political activities. eration: When confronted with a moral choice,
When people post something online, try to pro- moderation between the extremes of excess and
vide an accurate report, blog a fair commentary, defect is ideal. Virtue ethics is the foundation for
edit video footage, or alter digital photographs, urging media professionals to provide fair and
they are involved in making choices about what balanced coverage of issues. Employing Aristot-
others will see or hear. While the moral nature of le’s virtue ethics framework, one could argue that
these choices may not always be apparent, ethical a virtuous individual should not lie or help con-
or unethical choices are inevitably made because ceal illegal acts for a political candidate, engage
some kind of ethical standards are being assumed, in deception online, or blog and tweet informa-
owned, applied, or avoided. Ethical conduct in tion that is misleading.
relation to social media covers a wide range of Instead of relying on virtuous character, theo-
issues such as privacy, surveillance, trustworthi- ries such as Kant’s categorical imperative, Ross’s
ness, and information rights. self-evident duties, and Rawls’s veil of ignorance
state that decisions should be made after consid-
Ethics in Communications ering one’s duties and the rights of others. Kant’s
Questions about the role of ethics in communi- categorical imperative asserts that there are invi-
cations date back centuries. Some of the earliest olable moral laws that are absolutely binding
discussions are found in Aristotle’s treatise on the regardless of personal interest or desire. Kant’s
role of morality, truth, and justice in rhetoric. Fol- framework requires people to ask themselves how
lowing in this tradition, it has been proposed that it would be if their rule of conduct became a col-
rhetoric involves a presentation of values. Over lective law. This would allow them to discover
the years, political and communication ethics their duty.
have drawn on a range of established philosophi- Ross agreed with Kant that ethics was a mat-
cal principles of ethics. ter of doing one’s duty. He assumed that people
Within philosophy, there are three broad areas of had an inborn standard of right and wrong and
ethics: meta-ethics, normative ethics, and applied identified six self-evident duties ranked in order
ethics. Meta-ethics encompasses discussions about of importance: fidelity (to do no harm to others),
the nature of ethics and moral reasoning. Norma- reparation (make amends to those one has hurt),
tive ethics involves theories that seek to provide gratitude (repay those who have helped one),
action guides for moral behavior and procedures justice (to treat people as well as they deserve),
to answer the practical question of what a person beneficence (to help others when possible), and
should do. Applied ethics is situated within spe- self-improvement (to better oneself). While Kant
cific disciplines such as business, bioethics, engi- claimed all duty was absolute, Ross regarded
neering, or communications. The Hutchins Com- duties as conditional and imagined times when,
mission’s social responsibility framework is an to fulfill one obligation, a person might have to
example of applied ethics that relies on multiple violate another. In such cases, he argued that a
perspectives and has been used to guide ethical person should act to fulfill the highest obligation.
conduct among journalists and other communi- Diverging from the above two approaches,
cation practitioners. Some of the most frequently Rawls held that moral acts are those that people
used frameworks in media ethics are normative would all agree to if they were unbiased. Rawls
theories such as Aristotle’s ideas about virtue assumed that, given a fair procedure for reach-
and the golden mean, Immanuel Kant’s categori- ing a decision, rational people would agree to give
cal imperative, William David Ross’s self-evident each other as much freedom as possible. In order
duties, John Rawls’s veil of ignorance, John Stuart to discover ethical rules that would promote such
Mill’s principle of utility, and the ethics of care. freedom, Rawls created the fiction of an ethical
Some theories such as virtue ethics have long discussion held before people enter the world.
histories; they have been advocated since the Everyone would be required to agree on bind-
time of Socrates. Virtue ethics emphasize charac- ing rules of behavior before they had any idea of
ter over conduct. Aristotle created his principle which place in society they would occupy.
474 Ethics of Social Media in Politics

Social Media and Journalism Weiner’s hacked Twitter account. In that case, the
Using Kant’s framework of duty without excep- public’s right to know was offered as a reason for
tion, it could be argued that journalists, individ- violating the privacy of a public official.
ual politicians, and their campaigns and staff are Finally, the framework of ethics of care is seen
bound by duty to be truthful, honest, and fair. as particularly relevant to moral conduct in the
Failure on their part to do so would destroy peo- use of social media. Ethics of care, or relational
ple’s trust in the entire information environment. ethics, asserts that morality arises out of the expe-
Political reporters have sometimes been advised riences of empathy and compassion and empha-
to use Ross’s category of duties to determine the sizes the importance of interdependence and
most ethical course of action when faced with eth- relationships in achieving ethical goals. In this
ical dilemmas. Professional codes of ethics pub- context, social media users have to exercise their
lished by the Society of Professional Journalists, moral imaginations and place themselves in the
the American Advertising Federation, the Public position of others to decide whether a particular
Relations Society of America, and the National course of conduct would be ethical.
Communication Association often draw on mul- Given the multiplicity of frameworks, there
tiple ethical theories to emphasize duties such as is disagreement about what constitutes ethi-
seek the truth, be honest, minimize harm, reject cal action in the context of social media. This is
improper influences, and be accountable. particularly true within the realm of using social
The Society of Professional Journalists guide- media for political activities. Some of the ethi-
lines, in particular, articulate a clear and compre- cal questions that arise in this context are these:
hensive set of requirements for what constitutes How can people balance the benefits and harms
ethical behavior in the professional press corps— that arise from technologies that allow rapid and
and which do not apply, obviously, to the penum- widespread sharing of information across net-
bra of new media nonprofessionals who populate works when inaccurate information and lack of
Twitter, Facebook, and the blogosphere. context is rampant? Do political figures have a
While these ethical theories and codes have right to privacy when they post images and infor-
traditionally been applied to mass media profes- mation voluntarily to public sites online? Do such
sionals, the rise of social media, the consequent rights exist if politicians post morally compro-
democratization of journalism, and the message mising information using quasi-public sites such
creation processes pose many challenges. The as Twitter? Is it ethical to hack into social media
central dilemma is how to hold nonprofessional accounts of such politicians to share informa-
social media users accountable to ethical stan- tion that one believes the public ought to know?
dards because they may not be familiar with or To what extent do public figures have a right to
have much regard for such principles. control the images and information available
To address this dilemma, consequentialist theo- about them online? If public figures can control
ries have been used to argue that the morality of information on social media, would this limit the
an action is contingent on the action’s outcome or information rights of others? Should legislative
result. Mill’s utilitarianism, which holds that an candidates be friended by lobbyists on social net-
action is right if it leads to the most happiness for works such as Facebook, and can they be fined
the greatest number of people, is one frequently for improper fund-raising tactics if it involves just
used consequentialist theory. The Hutchins Com- a link posted online? Popular protests organized
mission’s social responsibility ethics draw upon through the use of social media raise issues about
utilitarian arguments to argue that the media have the ethics of encouraging people to voice dissent
a moral obligation to consider the overall needs in an environment subject to state surveillance
of society when making journalistic decisions and the right of people to be able to choose how
in order to produce the greatest good. Based on to act after freely considering consequences.
utilitarianism, moral conduct in the use of social
media is identified as conduct that benefits the WikiLeaks
most number of people. This can be seen in justi- Some of the traditional tenets of ethical communi-
fications of cases such as Congressman Anthony cation, such as maintaining accuracy, not citing or
Ethics of Social Media in Politics 475

quoting something out of context, not distorting hard-hitting debate questions from YouTube users
by going beyond the facts, and not linking a person are changing the political scene, the ethical ratio-
or idea with something that may induce unwar- nale is shaky for YouTube videos of “gotcha”
ranted deprecation or loss of prestige, have been moments. There are many videos of politicians
upended in an age when every reader, listener, and speaking in unscripted moments that take on new
viewer can create mashups, link, like, forward, and life online.
retweet content to others. The case of WikiLeaks, From a utilitarian perspective, it can be argued
an online, international, not-for-profit organization that any views that public figures share should be
publishing secret information such as U.S. diplo- widely circulated because they serve the greater
matic cables, news leaks, and classified media from good of educating citizens, who have a right to
anonymous sources, has highlighted the challenges know the true views of their representatives.
of controlling information. WikiLeaks has released However, such acts do hurt the individuals fea-
a wide variety of information over the years, some tured in such videos; the ethic of benevolence
of it aimed at exposing important government demands that individuals respect the dignity of
cover-ups and others that have embarrassed gov- others and refrain from hurting them. Besides,
ernment officials and complicated diplomacy. The few creators of such videos are transparent about
sources that provided information to WikiLeaks the sources and context for such information or
have used utilitarian arguments to justify break- their purposes and motivations.
ing laws to circulate classified information. This Because social media users can create false
case also raises issues about who has the right to identities, the norms surrounding authorship and
control information and freedom of the press and taking responsibility for content are also chal-
what that means in the age of social media. lenged. It is difficult to hold someone account-
able when there is no real identifiable individual
Blogs or organization claiming ownership. It is possible
The need for revisiting and formulating new ethi- for journalists, bloggers, and fact-checkers to cor-
cal standards for accuracy, responsibility, and rect any mistakes through their own stories. How-
information rights is also highlighted in the case ever, there are many challenges to the established
of blogs. Blogs began as an online setting for per- norms of verifying accuracy and removing erro-
sonal logs but have evolved into public avenues neous content when such content can be instan-
for political news and commentary, among other taneously created and shared in an environment
things. The collective domain of blogs is called the with no editorial control, where people feel com-
blogosphere. Blogs offer an opportunity for people pelled to be fast and be the first to post something
who are not professional journalists to act as polit- online. Because such content exists for a long time
ical reporters and commenters. This open, uned- in the public sphere, future audiences may not be
ited blogosphere is just a link away from the public able to judge the credibility of the source; they
sphere of political news. In addition to issues of may not have the time or resources to assess the
journalistic ethics, blogs also raise the issue of who veracity and intent behind the messages.
is ethically responsible for comments made as blogs
offer readers the unique ability to interact and Text Messaging and Twitter
dialogue with authors. Should a blogger be held These ethical problems are also prevalent in text
responsible for libelous, plagiarized, or untruthful messages and tweets. Twitter limits users to 140
remarks made by commenters? If a blogger deletes characters per message. Though hashtags provide
these comments, is he or she restricting the free some context and the rich detail panes allow users
speech rights of the commenters? Should bloggers to add photos, videos, and other content, a single
be able to control this information? message does not allow users to add qualifiers,
express nuanced stances on political issues, offer
YouTube explanations, or develop arguments. This can lead
Sites such as YouTube have altered the ability to misunderstandings or misrepresentation of com-
of campaigns and candidates to control mes- ments. These issues were highlighted when CNN
sages. While unauthorized campaign videos and fired one of its Middle East political reporters,
476 Europe

Octavia Nasr, after she tweeted about the death of See Also: Blogs, Role in Politics; Facebook;
a Hezbollah leader. The limitations of Twitter as a International Social Media and Politics.
medium lead to questions about how ethical it is to
judge a message and its sender without adequate Further Readings
context, a basic tenet of media ethics. Ess, Charles. Digital Media Ethics. Malden, MA:
Polity Press, 2010.
Facebook Gordon, David, et al. Controversies in Media Ethics.
Social networking sites such as Facebook also New York: Routledge, Taylor & Francis, 2011.
pose many ethical dilemmas in relation to politi- Rainey, Lee and Aaron Smith. “Politics on Social
cal advertising, privacy, and fund-raising tac- Networking Sites.” http://www.pewinternet.org/
tics. Though social networking sites started as Data-Tools/Get-the-Latest-Statistics/Latest
tools to build and maintain relationships, they -Research.aspx (Accessed October 2012).
have evolved into political communication tools. Shirky, Clay. “The Political Power of Social Media.”
There have been ethical controversies about Foreign Affairs (January/February 2011).
online entities offering user registration informa-
tion to facilitate targeted political advertising.
Facebook has been at the center of these privacy-
related controversies.
Facebook allows campaigns to target adver- Europe
tisements on the basis of political beliefs reported
by users. Data mining, harvesting location-based Following innovative uses of social media plat-
information from mobile devices, and complex forms in recent election campaigns in the United
algorithms allow political campaigns to combine States, various individuals and groups have started
voter lists, factors not publicly available such as employing similar political communication tech-
income, and purchasing habits with anonymous nologies and techniques in Europe. Social media
cookies on particular users’ browsers to target is thus becoming increasingly important in the
voters online. This raises ethical issues about communication between political candidates and
informed consent, ability to opt out, and notify- the electorate, as well as between politicians and
ing users about tracking. their constituencies, in many European nations
Social networking also blurs lines between and at many levels of the European Union. How-
personal and public lives and challenges the rules ever, research shows that elections on the Euro-
governing them. Recently, two Kansas legislative pean continent are not becoming dominated by
candidates who had been friended by lobbyists Web 2.0 practices, as traditional media still play
on Facebook were fined for improperly post- the most significant role in conveying electoral
ing announcements about fund-raisers. Kansas messages. Moreover, studies document that while
prohibits elected officials and candidates from politicians across Europe are now relatively keen
soliciting campaign contributions from lobbyists to utilize social media, they often remain in a
while the legislature is in session. The legisla- broadcasting mode because social media is for
tors claimed they did not know that the people them a way to provide information to the public,
who friended them were lobbyists. Some cities rather than a means for engaging with the public.
now require officials such as mayors to maintain
three separate social media accounts: personal, United Kingdom
city hall, and a political campaign account. The In Great Britain, social media has been spreading
rapid evolution of social media and its expand- into political life. In March 2003, Tom Watson,
ing role in politics indicates that there will be a Labour Party member of Parliament, was the
more debates about ethical questions in the years first British politician to begin a blog to keep peo-
to come. ple informed about his legislative endeavors, and
subsequently blogs have become a relatively well-
Veena V. Raman established communication tool in the British
Pennsylvania State University political sphere. Meanwhile, political blogs have
Europe 477

become more dialogical, although some com- politicians are discovering the benefits of social
mentators assert that the interactive potential of media, and communication through social media
such blogs has not yet been fully realized, largely is becoming increasingly important in political
because: many bloggers do not allow readers to life. On the other hand, campaigning still takes
comment on their posts; those that permit com- place largely offline, much of it through television,
ments receive very few responses; and when pub- and politicians still turn to social media mostly in
lic comments are made or questions are asked, attempts to appeal to younger voters, often with
these are rarely acknowledged or answered. messages that do not have policy implications.
As Facebook has emerged as the most popu- In the 2005 Bundestag election campaigns in
lar social media platform of the globe, it has also Germany, approximately 300 political blogs were
been used with greater frequency for political pur- established by candidates, party organizations,
poses in the United Kingdom. In 2009, only under politically interested citizens, or journalists, and
a quarter of British members of Parliament were over half of the electorate in Germany accessed
active on Facebook, whereas the number grew to blogs. However, as in Great Britain, few of the
one-third in 2010 and over half in 2011. However, blogs allowed readers to comment, so they were
as in the case of blogs, some observers contend that active, rather than interactive. Additionally, as
British politicians mostly use Facebook for one- a 2007 study by S. Albrech, M. Lübcke, and R.
way communication, to inform the public, rather Hartig-Perschke found, a year after the elections,
than for two-way communication, to engage with only about 100 of these blogs were still functional,
the civil society. In March 2007, Alan Johnson, whereas the others had not been kept up-to-date
another Labor Party member of Parliament, was since the elections, or had been discontinued.
the first British politician to post on the microb- By the 2009 elections, German political par-
logging site Twitter, and the number of members ties and their candidates shifted their attention to
of Parliament posting on Twitter rose dramatically other social media platforms such as Facebook
from two at the end of 2008 to almost 100 by the and Twitter, the German portal StudiVZ, and
end of 2009 to over 200 by the end of 2010. professional networks LinkedIn and Xing. The
In 2011, the House of Commons voted to allow number of clicks that candidates’ social media
its members to tweet from inside its headquarters. profiles received soared, and Angela Merkel, who
In the 2010 elections in the United Kingdom, sev- was running for re-election as chancellor, led the
eral candidates did question and answer events field in social media popularity with over 15,000
on Twitter, and since then, many members of Par- friends on Facebook and almost 70,000 friends
liament, national and local public officials, and on StudiVZ, more than double as many as her
political advisors have followed. However, the challenger Frank-Walter Steinmeier.
utilization of Twitter by British political figures Market research showed that early in 2009,
has been criticized as much as their blogging or within the German population over 70 percent
Facebook activity. For example, in a 2012 report, were on Twitter at least once, but only 15 percent
Graeme Baxter and Rita Marcella affirmed that in were on Twitter over three times; whereas later
the 2010 election campaigns in the United King- in 2009 (close to the elections), Twitter activity
dom, many candidates appeared more interested intensified; and in the last six weeks before the
in discussing the weather than any important elections, over 100,000 tweets with political con-
national and local issues raised by voters on Twit- tent were published by candidates, their advisors,
ter and other social media, and stated that a large party representatives, and the general public.
portion of the electorate expect parliamentarians, Today, Angela Merkel has nearly 250,000
policy makers, and other political actors to have social media followers, she frequently sends text
more, and more meaningful, exchanges through and video messages on social media networks,
Twitter and other social media. and almost 90 percent of German parliamentar-
ians have a social media presence. A majority
Germany of politicians in Germany recognize that social
In Germany, social media and politics are also media provide important public communication
interrelated, with mixed results. On one hand, tools, yet some experts still doubt that intense
478 Europe

social media activity represents an indicator of said to have studied Barack Obama’s social media
political success. strategies and to have put approximately 10 per-
cent of his budget in his social media activity. This
France included social networking as an integral part of
In France, social media was still of little impor- campaign communication, frequent responses to
tance in the 2007 presidential elections in which social media supporters, and intense mobilization
conservative Nicolas Sarkozy defeated his social- appeals and fund-raising through social media.
ist opponent Ségolène Royal, with under 100 Hollande’s social media strategy, in correlation
political blogs maintained mostly by politi- with other strategies, played a role in his election
cal observers, and with most campaigning tak- as president of France.
ing place through television and to some extent
through candidates’ Web sites. Royal, for exam- Northern Europe
ple, launched her campaign by publishing on her Social networking through such platforms as
Web site 10 chapters of her political manifesto Facebook and Twitter is recording near explosive
Désirs d’avenir (Desires for the Future), whereas growth in northern European countries includ-
many of her opponents in the Socialist Party as ing Sweden, Denmark, Finland, Iceland, and
well as Sarkozy were reluctant to use the Internet Norway. People in these countries have quickly
in their campaigns. become accustomed to receiving and sharing
As president, Sarkozy went from declaring information about entertainment, sports, com-
social media as detrimental to democracy for mercial products, and job-related issues through
enabling infringements on intellectual property, social media. Major steps are also being taken
and proposing heavy government regulation on toward using social media like Facebook and
social media in terms of online copyright and Twitter as an integral part of public and politi-
privacy, to having close conversations with Face- cal communication. In February 2012, the first
book Chief Executive Officer Mark Zuckerberg picture of Sweden’s newborn princess was first
at the G-8 Summit in 2011, and starting a con- published on Facebook, rather than in a tradi-
jugated social media presence before announcing tional media outlet, creating a big buzz as within
his intention to run for re-election in early 2012. 24 hours it received almost 25,000 “likes” and
In February 2012, Facebook received pub- over 5,000 comments and it was shared tens of
lic disapproval in France for deliberately help- thousands of times.
ing Sarkozy boost his online image by creating In Denmark, according to the constitution, the
for him not only a brand new Facebook profile, prime minister can call the elections at any date,
but also the first ever, among French politicians, providing it is no later than four years from the
Facebook timeline. This timeline was extensive, previous elections, and in 2011, the Danish prime
with over 700 pictures dating back to Sarkozy’s minister shared the news about the election date
birth, but also with many notable omissions, on his Facebook profile before even announcing it
including the 2007 controversial visit to France live on television. Finland has the highest level of
at Sarkozy’s invitation of then Libyan dictator Internet penetration and usage among European
Muammar Qaddafi, Sarkozy’s 2007 speech in nations, and many Finnish political candidates
Dakar in which he stated that Africans had never in the 2012 elections employed communication
really entered history, his relationship with his through social media sites to reach broad audi-
former wife Cecelia Attias, and his romance with ences at costs lower than for campaigning through
his current wife Carla Bruni. traditional media. In the Finnish presidential
In February 2012, the new Twitter feed race in particular, as Tarja Halonen had already
@NicolasSarkozy was also broadly publicized by served her maximum of two terms as president
the Sarkozy campaign, but it provoked additional and all eight political parties represented in the
critiques after the campaign attempted to silence Parliament had nominated a candidate, campaign
spoof Twitter accounts, reminding the French pub- teams strived to make use of all available means,
lic of Sarkozy’s plans to censor social media. Mean- including a strong presence on social media net-
while, Sarkozy’s opponent François Hollande was works, to appeal to the electorate.
Europe 479

Pekka Haavisto of the Green League had an Futuro (Youth Without a Future), and NoLes-
especially savvy social media strategy, including Votes (Don’t Vote Them), employed social net-
coordinated messages, responses to followers’ working platforms such as Facebook and Twit-
questions, and fund-raising on social media plat- ter to mobilize Spaniards to protest against an
forms. This Obama-style strategy helped Haavisto unjust economic model which favors the rich, but
to surpass six other candidates and gain second in situations of economic crisis cuts opportuni-
place in the first election round (thus becoming ties for the poor, and an unfair political system in
the first ever candidate of the Green League to which governing parties are subordinated to eco-
make it to the second election round in Finland), nomic power. The movement, comparable with
but failed to lead to his success in the second those which prompted the Arab Spring, gathered
round, as Sauli Niinistö of the National Coalition an estimated 8 million people in street protests,
Party won the election. In both the 2009 and the and did not ask the electorate to vote one way
2013 elections in Norway, many candidates found or another, but rather called for manifestation
blogging as well as a presence on Facebook, Twit- of public distrust in the leaders of big parties
ter, and YouTube as useful tools in campaigning, and demand by the public of a true democracy
although some issues regarding the use of social beyond the electoral show.
media by politicians also arose, for example, the Following the Spanish model, an Indignant
rejection of a mayoral candidate by her party in Citizens Movement also emerged in Greece, orga-
2013 after she posted racist comments on her nizing across the country, with the aid of social
Facebook page about a Eurovision contestant. media networks, street demonstrations, and gen-
eral strikes to oppose social cuts imposed by the
Southern Europe government as measures against the economic cri-
Across southern Europe, social media network- sis and to protest the corruption of mainstream
ing is also making inroads into politics, although politicians focused on protecting the financial
doubt still remains about its contribution to elec- elites that provoked the crisis, rather than the
toral success. In Spain, where the law determines population affected by the crisis.
the dissemination of political content in tradi- In Italy, comedian and blogger Beppe Grillo
tional media during electoral campaigns, social launched the Movimento 5 Stelle (Five Star Move-
media have gained importance, especially for the ment) or M5S through a powerful presence on
representatives of new parties, regionalist parties, social media with his anti-establishment message
and minority parties. According to a study sup- and through rallies across the country prompted
ported by the Barcelona Media Foundation, in the through social media. Grillo announced through
2011 elections in Spain, parties with limited tra- social media and at rallies that traditional politi-
ditional media coverage such as United Left–the cal parties are dead because they are elitist, cor-
Greens (IU-LV) and Union, Progress, and Democ- rupt, and closed, and regular citizens do not trust
racy (UPyD) generated more social media con- them any longer. The M5S movement became a
tent and had higher content propagation within party with an electoral prospect, and in the 2010
social media than parties with greater coverage in regional elections it had four councilors elected,
mainstream media, especially the People’s Party whereas in the 2012 local elections it received the
(PP) and Spanish Socialist Workers’ Party (PSOE). third-highest number of votes overall and won
Although the two main Spanish parties (PP and the mayoral election for Parma. The party made
PSOE) won the largest number of votes, the third further gains, and in the 2013 general elections it
parties (IU-LV and UPyD) won more votes than in won over 25 percent of the vote for the chamber
past elections and are becoming established as a of deputies.
viable political alternative.
Most important, in the months before the Central and Eastern Europe
2011 elections in Spain, the 15M movement, In central and eastern Europe, social media activ-
or the Indignados movement, formed of vari- ity has also been included among the communica-
ous citizens’ associations including Democracia tion strategies of political figures and among the
Real Ya! (Real Democracy Now!), Juventud Sin means for political uprising. In recent elections
480 Europe

Protesters from the Spanish 15M, or Indignados, movement demonstrating in Valencia, Spain, on May 15, 2011. The movement,
which benefited greatly from online organizing like the Arab Spring, turned out an estimated 8 million people in street protests in
a manifestation of public distrust in the leaders of Spain’s largest political parties.

in Bulgaria in 2009 and 2013, Romania in 2009, raised criticism for using Twitter to congratulate
Hungary in 2010, and Poland in 2011, the global Arnold Schwarzenegger on his birthday, rather
trend of employing social media in political cam- than for answering questions from the public.
paigns has caught on. But in addition to the Most other officials in the region do not com-
social media presence of political candidates and municate directly through social media, but rather
their staff, publishing reports and speeches, and hire public relations professionals to manage their
appeals to donors and voters, there has been a social media presence. Such experts typically dis-
strong social media presence of election monitor- seminate uncontroversial messages, although there
ing groups aimed at offering access to statistics are exceptions, such as the message posted by the
and providing opportunities for debates. Politi- team of current president of Romania Traian Bas-
cians in the region are also active on social media escu, formerly Minister of Transportation and
after the election seasons. Most presidents and a marine officer, claiming that the Titanic would
prime ministers of the central and eastern Euro- not have sunk had Basescu been its captain. Few
pean countries that are members of the European officials in the region engage with citizens through
Union now have active Facebook and Twitter social media, yet there are some like Hungarian
accounts, as do the highest officials in Russia and President Viktor Orbán and Polish Prime Minister
Ukraine. Dmitry Medvedev’s 2 million Twitter Donald Tusk who have accustomed the public to
followers are hardly a match for Barack Obama’s holding “office hours” through Twitter. Some poli-
over 25 million Twitter followers, but nonethe- ticians have also used social media to direct public
less represent a record for the region. Medvedev sentiment against their adversaries, for example,
is said to tweet, both in Russian and in English, Serbia’s Minister of Economy and Finance Mladan
yet his tweets are mostly about state visits, and he Dinkic, who in 2012 tweeted a picture of the empty
Evolution of Social Media 481

benches of the opposition forces during parliamen- See Also: Campaigns, Digital; Campaigns, Virtual;
tary discussions about economic measures, which Digital Government; E-Democracy; International
led to civil society critiques of the opposition politi- Examples of Political Parties and Social Media;
cians but also to a more active involvement of the International Social Media and Politics; International
opposition in the economic discussions. Unrest and Revolution; Social Media, Adoption of;
Protests against political corruption and social Spanish 15M Movement.
injustice, inspired by the Arab Spring and the var-
ious movements in southern Europe, and mostly Further Readings
fueled through the Internet and social media Aragón, Pablo, Karolin Kappler, Andreas
platforms, have also gained momentum in east- Kaltenbrunner, Jessica G. Neff, David Laniado,
ern European countries. In Romania in 2012 and and Yana Volkovich. Tweeting the Campaign:
in Bulgaria in 2013, following social media calls Evaluation of the Strategies Performed by
to action by various activist groups, hundreds of Spanish Political Parties on Twitter for the 2011
thousands of people took to the streets in the cap- National Elections. Barcelona: Barcelona Media
itals and in other parts of these countries, raising Foundation, 2012.
their voices about the economic difficulties of the Baxter, Graeme and Rita Marcella. “Does Scotland
majority of the population and the corruption of ‘Like’ This? Social Media Use by Political Parties
many of the politicians. and Candidates in Scotland During the 2010 UK
The involvement of social media in European General Election Campaign.” Libri, v.62 (2012).
Union elections and administration is smaller than Ignatzi, Christian. “German Politicians Discover
in the elections and political processes of particu- Social Media.” Deutche Welle (May 8, 2013).
lar European nations. A recent study shows that Köker, Philipp. “Politics and Social Media: Why
under 30 percent of Euro parliamentarians partici- Eastern Europe’s Politicians Are All Atwitter.”
pate in online forums, whereas over 50 percent of UCL Research Blog. http://blogs.ucl.ac.uk/ssees/
them have Web sites, and over 75 percent of them 2013/02/13/politics-and-social-media-why-eastern
use the Internet for gathering information. While -europes-politicians-are-all-atwitter (Accessed
some European Union representatives and institu- February 2013).
tions keep Facebook and Twitter accounts, gener- Parisopoulos, Konstantinos, Efthimios Tambouris,
ally elected officials of the European Union engage and Konstantinos Tarabanis. “Facebook and Greek
much less with their constituencies on social media Elections: New Fad or Real Transformation?”
than elected officials of various nations of Europe, Technology and Society Magazine, v.31/3 (2012).
and people in Europe pay significantly less atten- Towner, Terri L. “Campaigns and Elections in a
tion to online developments in elections and politi- Web 2.0 World: Uses, Effects, and Implications
cal decision making at the level of the European for Democracy.” Public Administration and
Union than at the level of their particular nations. Information Technology, v.1 (2012).
Social media have grown in importance for
political processes in Europe, including for elec-
tion campaigns, communication of elected offi-
cials with their various stakeholders, and public
protests. However, while social media offer a Evolution of
cheap and flexible alternative to traditional media,
traditional media still maintain primacy in politi- Social Media
cal communication in Europe. Additionally, social
media presence often involves one-way communi- Social media are Internet-based applications that
cation from politicians to their followers, rather build on the ideological and technological foun-
than interactive two-way communication. dations of Web 2.0—the concept of the World
Wide Web used as a platform where content and
Sorin Nastasia applications are continuously modified by users
Southern Illinois University, Edwardsville in a participatory and collaborative manner.
Social media enables the creation and exchange
482 Evolution of Social Media

of user-generated content, or all forms of media newsgroups. It is mostly responsible for the devel-
content that are publicly accessible and created opment of newsreader clients, which are the pre-
by end users. The social media landscape today cursors to RSS (rich site summary or really simple
looks significantly different from its humble syndication) feed readers used to follow blogs and
beginnings; in the last few decades, it has under- news sites today. Discussions are threaded with
gone a marked evolution. modern news-reader software, though posts are
stored on the server sequentially.
1930s Usenet is distributed among a large, constantly
In 1935, new machines called Notificators, with changing conglomeration of servers that store
“robot” message boards, were installed in the and forward messages to one another in news
streets, stores, railroad stations, and other public feeds. Individual users read messages from and
places in London. These would aid persons who post messages to a local server operated by their
wished to make or cancel appointments or inform Internet service providers, universities, or employ-
friends of their whereabouts. Individuals could ers. Usenet has no centralized server or dedicated
leave messages for a small sum on these message administrator, setting it apart from most bulletin
boards, which appeared on a window for at least board systems (BBS).
two hours so that the person for whom it was The first electronic bulletin board system (BBS)
intended would have sufficient time to observe was developed and made accessible to the public
the note at the appointed place. Notificators are in the late 1970s by Ward Christensen. He coined
considered to be the first predecessor of Twitter. the term bulletin board system as a reference to
the traditional cork-and-pin bulletin board where
1950s people can post messages, advertisements, or
The social aspect of social media was born on community news. The first BBSs were small serv-
line, that is, on the phone. In the 1950s, tech- ers powered by personal computers attached to a
nophiles and information addicts used telephone telephone modem, where one person could dial in
networks as rogue ways to mass communicate, at a time and get access.
and the first podcasts took place on hijacked Until the mid-1990s, most BBSs were run free
corporate phone lines. These early social media of charge by the system operator, or SysOp, while
explorers built boxes, or homemade electronic other BBSs charged their users subscription fees
devices, that could generate tones, which allowed for access or were operated by businesses as a
them to make free calls and get access to the means of supporting their customers. The func-
experimental back end of the telephone system. tions included social discussions on message
They sniffed out telephone company test lines boards, community-contributed file downloads,
and conference circuits to host virtual seminars and online games. In the 1980s, the social media
and discussions. The first blogs and podcasts were scene acquired an underground flavor. A fair per-
a result of hacked corporate voice mail systems centage of bulletin boards had secret, adult, or
called codelines, where phone phreaks would pirate software rooms, and handles, or online
hack into unused mailboxes and set up shop until pseudonyms, were the norm. BBSs can be consid-
they were found and thrown out. Phone phreak- ered the first social communities connected online.
ing was not essentially motivated by fraud but
rather a telecom monopoly that made telephone 1980s and 1990s
use expensive. After BBSs came online services like Compu­
Serve and Prodigy, the first large-scale corpo-
1970s and 1980s rate attempts to bring interactive, social, online
Usenet is an online discussion system that was experience to the masses. These services rose to
conceived by Duke University graduate stu- popularity along with BBSs and catered to a more
dents Tom Truscott and Jim Ellis in 1979 and corporate and mainstream, home-user client.
was established in 1980. On Usenet, users read CompuServe was the first company to incorporate
and post messages, articles, or posts, collectively a chat program, CB Simulator, into its service in
termed news, to one or more categories known as 1980 but was infamous for its high charges of $6
Evolution of Social Media 483

per hour, plus long-distance telephone fees, add- for desktop computers. ICQ was quickly pur-
ing up to almost $30 per hour. Prodigy launched chased by AOL and became a mainstream hit. It
nationwide in 1990, growing quickly in popular- was partly responsible for the adoption of ava-
ity for its color interface and lower cost. tars, abbreviations such as LOL and BRB, and
America Online (AOL) started as an online ser- emoticons.
vice too and gained critical mass with aggressive Napster was a peer-to-peer (P2P) file sharing
compact disc (CD) promotions and direct-mail Internet service that emphasized sharing audio
campaigns. AOL also did one of the most epic files, typically music, encoded in MP3 format. It
product placements of all time in the 1998 film was cofounded by Shawn Fanning, John Fanning,
You’ve Got Mail, bringing social online culture and Sean Parker and went live in June 1999. Nap-
and romance into the Hollywood mainstream. ster transferred the power of distribution from
Although the Internet existed as a network since record companies to the consumer. Music started
the late 1960s, the World Wide Web became pub- to freely flow across the Internet, stripped of hype
licly available on August 6, 1991. Tim Berners- and payola.
Lee, an English computer scientist, is credited for Napster thrived through 1999 and 2000, until
developing this global information medium that it was declared illegal and was forced to filter
users can access through computers connected to out all the copyrighted content. Competing P2P
the Internet. The term is often mistakenly used applications like Limewire took Napster’s place
as a synonym for the Internet itself; rather, it is until BitTorrent technology arrived and provided
a service that operates over the Internet. At the a robust, centralized way to share files without
beginning of the 1990s, Internet access was avail- being blocked. BitTorrent was designed by pro-
able only to those with legitimate university, gov- grammer Bram Cohen. While the technology
ernment, or military connections, and to hackers. itself is perfectly legal, the legality of many of its
Around the mid-1990s, private Internet service uses is being litigated in courts worldwide.
providers (ISPs) started shop in most metropoli-
tan cities in the United States. This gave millions 1990s and Early 2000s
of home users a chance to enjoy unfiltered, unlim- SixDegrees was launched in 1997 and was the first
ited online experiences. Usenet became the pri- modern social network. It was named after the six
mary center for most high-end discussions. Also, degrees of separation concept—the idea that every-
the first online social media etiquette standards, or one is on average approximately six steps away, by
netiquette, were proposed to stop rampant flam- way of introduction, from any other person in the
ing—hostile and insulting interactions between world. MacroView, the company that developed
Internet users—and keep the online environment the site, was founded by Chief Executive Officer
civilized. By the late 1990s, Internet forums grew Andrew Weinreich. SixDegrees allowed users to
in popularity and began replacing Usenet and list friends, family members, and acquaintances
BBSs as the primary nexus for topical discussions. both on the site and externally; invitations were
In 1988, Internet relay chat (IRC) was devel- sent to external members to join the site. Users
oped by Jarkko Oikarinen. It is a protocol for could send messages and post items on a bulletin
real-time Internet text messaging and chat or syn- board for people in their first, second, and third
chronous conferencing. It is mainly designed for degrees, and see their connection to any other user
group communication in discussion forums called on the site. At its height, the site had around 1
channels. It also enables one-to-one communica- million fully registered members. In 2000, Youth-
tion via private messaging and is used for data Stream Media Networks paid $125 million to buy
transfer including file sharing. When IRC was Six­Degrees; it was around until 2001.
first made available, many people stayed logged LiveJournal was launched in 1999 by American
into it constantly, using it to share links and files programmer Brad Fitzpatrick. It took a different
and keep in touch with their global networks, approach to social networking from SixDegrees.
the same way Twitter is used today. In 1996, While SixDegrees allowed users to create a pre-
ICQ was developed by four Israeli technologists dominantly static profile or page, LiveJournal was
and was the first instant messenger (IM) system dynamic because it was built around constantly
484 Evolution of Social Media

updated blogs sharing the most recent thoughts 2003 and by 2006 had grown to be the most pop-
and acts. LiveJournal encouraged its users to ular social network in the world. It gained nov-
follow one another, create groups, and interact. elty by allowing users to completely customize
This could be considered the precursor to the live the look of their profiles. Users could post music
updates feature in advanced social networks. and embed videos from other sites on their pro-
Massively multiplayer online role-playing files. Originally, Myspace allowed communica-
games (MMORPGS) became popular in the tion through private messages, public comments
early 2000s and have become social networks in posted to a user’s profile, and bulletins sent out
their own right. They are a genre of role-playing to all friends of the user. In 2006, Myspace intro-
video games in which numerous players interact duced Myspace IM, an instant messaging client
with one another within a virtual game world. that enables users to chat with their friends.
The most famous of these is World of Warcraft Facebook was founded in 2004 by Mark Zuck-
(WoW). Here, players interact both in the game erberg with his Harvard University roommates.
world and on related forums and community The Web site’s membership was initially limited
sites. Social interaction within the game ranges to Harvard students, but it quickly expanded, and
from teams set up specifically for tactical reasons by 2006, almost everyone could join Facebook.
to friendships and romances. As of June 2012, Facebook had more than 955
million active users, most of whom access it on
2000s a mobile device. In order to be a user, one has to
Friendster was founded by Jonathan Abrams register; then one can create a personal profile,
and Rob Pazornik in 2002. It was one of the add other users as friends, exchange messages,
first social networking sites to attain more than and receive automatic notifications. Additionally,
1 million members at its peak. Friendster allowed users may join common-interest user groups and
users to contact other members, maintain those categorize friends based on degree of intimacy or
contacts, and share online content and media place of acquaintance. By 2005, the use of Face-
with those contacts. It was also used for dating book had become so ubiquitous that the generic
and discovering new events, bands, and hobbies. verb Facebooking was introduced to describe the
Users could share videos, photos, messages, and process of browsing others’ profiles or updating
comments with other members via their profiles one’s own.
and their networks. Friendster was acquired by
MOL Global in December 2009 for $26.4 mil- Other Social Networking Developments
lion. In May 2011, Friendster repositioned itself As social networking grew, niche sites were
as a social gaming site, discontinuing support for launched for specific interest groups. There are
existing users’ social data; its new focus is on pro- now social networks for virtually every hobby,
viding users with entertainment and fun. passion, interest, industry, and group. Ning is the
The first mainstream social network devoted to first widely used platform for creating niche social
professional networking, LinkedIn was founded networks. New users can either create social net-
in 2003. One significant purpose of the site is to works for any niche they choose or join any of
allow registered users to maintain a list of contact the existing networks. Ning’s biggest advantage
details belonging to people with whom they have is that it is user-friendly. A number of niche social
some level of relationship, called connections. networking sites have been developed by corpora-
LinkedIn can be used in a number of ways. Users tions; Autonomy is one example. It is a writers’
can upload their résumés or design their own network hosted by the United Kingdom division
profiles to showcase work and community expe- of HarperCollins that has attracted thousands of
riences; it can be used to find jobs, people, and hopeful writers from all over the globe. While
business opportunities recommended by someone some of these niche networks have active groups,
in one’s contact network; and employers can list many do not and end up being shut down due to
jobs and search for potential candidates. lack of activity.
Myspace is owned by Specific Media LLC and Sharing photos, videos, and other multimedia
pop star Justin Timberlake. It was founded in content is a popular social media activity. Some
Evolution of Social Media 485

important sites associated with media sharing are


Photobucket, Flickr, YouTube, and Revver. Pho-
tobucket was the first major photo-sharing site,
launched in 2003. Flickr has groups and photo
pools and allows users to create profiles, add
friends, and organize images and video into photo
sets or albums. It allows users to license their pho-
tos as well as retaining all copyrights. YouTube
was the first major video hosting and sharing site,
launched in 2005. YouTube’s major social fea-
tures include ratings, comments, and the option
to subscribe to the channels of a user’s favorite
video creators. Revver took a different approach
to video hosting and sharing. While other sites let
users post videos for free and did not pay con-
tent creators any of the advertising revenue their
videos generated, Revver shared revenue. It shut
down in 2011.
The mid-2000s witnessed the advent of social
news and bookmarking sites. Bookmarking is the
method by which Internet users organize, store,
manage, and search for bookmarks of news and
resources online. Delicious, or Del.icio.us, was
founded in 2003; it popularized the terms social
bookmarking and tagging. Tagging enables users The microblogging site Twitter, founded in 2006, takes
to organize their bookmarks in flexible ways and advantage of real-time Web technologies that have spread
develop shared vocabularies. Digg was founded in rapidly with the advent of the iPhone. The site had an estimated
2004; its users share links to anything online, and 500 million accounts and 200 million regular users as of 2013.
other users can vote the content up or down (or dig
or bury). The Digg Effect—when content makes it
to the front page, thereby sending a huge influx
of traffic to that site, overloading its servers—is a applications, turning it into more of a platform
well-known phenomenon today and is often frus- than a single service. Posterous is the newest major
trating to those unprepared for sudden popularity. microblogging application, started by Y Combi-
Real-time Web is a set of technologies and nator in May 2009. The content of a microblog is
practices that enable users to receive informa- typically smaller in both actual and aggregate file
tion in real time, as soon as it is published by its size than a blog.
authors, rather than requiring that they or their Tumblr, founded in 2007, is a cross between
software check a source periodically for updates. a lifestreaming application and a microblogging
There is no knowing when, or if, a response will platform. There are mobile applications avail-
be received. The information transmitted is often able for posting on Tumblr, making it ideal for
short messages, status updates, news alerts, or lifestreaming. In fact, the iPhone can be largely
links to longer documents. Some significant names credited for the rise in popularity of real-time
associated in this category are Twitter, Posterous, updates. There are social networks only available
and Tumblr. on the iPhone, such as iRovr, launched in 2007.
With the advent of Twitter in 2006, status In the context of social media, lifestreaming
updates became the new norm in social network- emphasizes the vast flows of personal information
ing. Twitter has developed a cult-like following and exchange created by social network services.
and has a number of celebrity users. Twitter has Lifecasting is a continual broadcast of events in
also spawned a number of third-party sites and a person’s life through digital media. Real-time
486 E-Voter Institute

updates have led to an increase in the number of Kietzmann, J. H., K. Hermkens, I. P. McCarthy,
people who are now lifestreaming or lifecasting and B. S. Silvestre. “Social Media? Get Serious!
virtually everything they do, while some opt to Understanding the Functional Building Blocks of
lifestream by aggregating their online activities in Social Media.” Business Horizons, v.54 (2011).
a single place. The Web site Ustream.tv, founded Kirkpatrick, David. The Facebook Effect: The Inside
in 2006, allows users to broadcast from the Web Story of the Company That Is Connecting the
site once logged in or from a mobile device using World. New York: Simon & Schuster, 2010.
Ustream’s mobile broadcasting application. Users MacNamara, Jim. The 21st Century Media
can watch streams live on the Web site and on (R)Evolution: Emergent Communication
the Ustream iPhone and Android applications. Practices. New York: Peter Lang, 2010.
It allows users to interact, such as vote in polls, Watts, Duncan J. Six Degrees: The Science of a
rate, and chat. Justin.tv is a streaming video host, Connected Age. New York: Vintage, 2003.
founded in October 2006, that lets lifecasters
and live show creators broadcast to numerous
Internet users. FriendFeed, launched in 2007 and
recently purchased by Facebook, allows integra-
tion of most of one’s online activities—Twitter, E-Voter Institute
RSS feeds, Flickr—in one place.
The E-Voter Institute, founded in 1999, is a non-
Conclusion partisan organization focused on helping political
This evolutionary account shows that social campaigns and advocacy organizations integrate
media has traveled far from its humble begin- online tools into broader campaign strategies. The
nings and intersects with nearly every aspect of institute conducts original research on voters and
people’s lives today. It has transformed human political consultants, develops resources for cam-
communication, human interaction, and the paigns and organizations on the most effective
human social experience. use of online technologies, and publishes materi-
als on the convergence of politics and the Inter-
Soumia Bardhan net. Through its Digital Politics Radio, campaign-
St. Cloud State University guidance resources, research, and publications,
the E-Voter Institute strives to help campaigns
See Also: Innovation and Technology; Instant and organizations effectively reach constituents
Messengers, IRC and ICQ; Internet Forums; through digital technologies.
Microblogging; Peer to Peer; Social Media, Adoption
of; Social Media, Definitions and Classes of; Social Digital Politics Radio
Media Sharing, P2P, Bit Torrent; Social Networking Launched in 2007, Digital Politics Radio is a
Web Sites; Social Worlds; User-Generated Content; weekly Web radio show that discusses current
Web 2.0; World Wide Web, History of the. and emerging trends related to politics and tech-
nology. The weekly show connects listeners with
Further Readings research trends, companies, Web sites, constitu-
Christakis, Nicholas A. and James H. Fowler. ent survey methods, products, and much more
Connected: The Surprising Power of Our Social that can potentially benefit political and orga-
Networks and How They Shape Our Lives. nizational campaigns. Guests of the show have
Boston: Little, Brown, 2009. included campaign strategists, policy and political
Huberman, Bernardo A. The Laws of the Web: trend researchers, media and political directors,
Patterns in the Ecology of Information. geospatial analysts, advertising specialists, mobile
Cambridge, MA: MIT Press, 2003. app and social media experts, and even stress-
Kaplan, Andreas M. and Michael Haenlein. management specialists. Weekly shows focus on
“Users of the World, Unite! The Challenges issues that resonate with campaigns, such as how
and Opportunities of Social Media.” Business to best target online advertising, how to increase
Horizons, v.53 (2010). the value of social media activities, how to develop
E-Voter Institute 487

and implement cross-media campaign strategies, apps and social media in campaigns. Critical
the expanding role of mobile devices, and how information is provided about using mobile apps
voter behaviors are changing. Listeners can sub- to recruit and organize volunteers, developing
scribe to weekly podcasts (digital media down- sharable content, creating viral success with You-
loaded through Web syndication or streamed Tube, using online ads to drive traffic, and meth-
through a computer or mobile device) and easily ods for reaching a critical audience mass. Other
connect to relevant topics through popular cat- prominent topics involve strategies for campaigns
egory tabs on the E-Voter Institute Web site. Digi- to engage in community building and citizen
tal Politics Radio brings a wide range of voices empowerment. This research includes informa-
into the conversation about politics and technol- tion on maintaining a prominent Web presence,
ogy, provides campaigns with cost-effective ways promoting electorate advocacy, and using social
to allocate resources, and helps to level the play- media to not only engage voters but also to form
ing field for smaller campaigns and organizations. transpartisan coalitions and voting blocs to influ-
ence agendas across party lines and geography.
E-Voter Research Other topics include information on the Federal
The E-Voter Institute conducts independent Election Commission (FEC) rules for online ads,
research and publicizes research conducted by background on super political action committees
other organizations. Annually, the institute pro- (PACs), and regulations for accepting campaign
duces a Survey of Voter Expectations. Data gen- contributions through mobile apps.
erated from this survey help to inform campaigns
of voters’ changing attitudes and of the nature Conclusion
of potential voters’ online activities and behav- The E-Voter Institute focuses on providing politi-
iors. Key topics that are discussed through this cal campaigns and organizations with informa-
research initiative include how the Internet has tion they need to be competitive in a developing
changed voter behaviors, where potential voters and evolving online environment. Through creat-
most likely get their news, how campaigns can ing resources, publicizing research, and hosting
get and retain voters’ attention, how to talk to Digital Politics Radio, the E-Voter Institute pro-
and with voters, and what trends are influenc- vides candidates, campaigns, and organizations
ing voters’ decisions. These topics are all geared with the tools necessary to be competitive in digi-
toward helping campaigns successfully navigate tal politics.
the online environment, reach the most potential
constituents, and make the most effective use of LaChrystal Ricke
campaign resources. Sam Houston State University
Other research accessible via the institute’s
Web site includes an array of information from See Also: Cyberculture; E-Democracy; Going Viral;
different organizations, Web sites, and advocacy Social Media Political Gaming.
groups. While the themes of available information
vary, the central goal of the publicized research is Further Readings
to give candidates, campaigns, and organizations Baker, Frank. Political Campaigns and Political
a thorough understanding of the digital politi- Advertising: A Media Literacy Guide. Santa
cal environment, the online options available to Barbara, CA: Greenwood, 2009.
them, and also the legalities of navigating online Creeber, Glen and Royston Martin. Digital Culture:
politics. The institute provides a wide range of Understanding New Media. New York: Open
research on important campaign topics, such as University Press, 2008.
the use of political humor to attract voters, micro- Jagoda, Karen. Crossing the River: The Coming
targeting voters, online fund-raising tips and tac- of Age of the Internet in Politics and Advocacy.
tics, and strategies for empowering and engaging Bloomington, IN: Xlibris, 2005.
voters through online technologies. Johnson, Dennis. Campaigning in the Twenty-First
Some of the most salient topics on the insti- Century: A Whole New Ballgame? New York:
tute’s Web site discuss strategies for using mobile Routledge, 2011.
ENCYCLOPEDIA OF

Social Media and Politics


ENCYCLOPEDIA OF

Social Media and Politics


Volume 2

Kerric Harvey
George Washington University
editor
F
Facebook Facebook first became involved in U.S. poli-
tics during the 2006 election, the same year that
Facebook is the most popular social network in Time magazine named “You” Person of the Year,
the world, ranked as the second-most visited Web in acknowledgement of the emergence of per-
site on Alexa.com (behind Google.com) and reg- sonalized media. Conventional wisdom holds
istering more than 1.11 billion users as of March that Barack Obama used Facebook to significant
2013. Facebook was launched by Mark Zucker- advantage in the 2008 election, although the evi-
berg and a group of fellow Harvard University dence is not complete. By 2012, Facebook was a
students in February 2004. The founding of the factor in every political campaign. Facebook has
company was dramatized in the 2010 Columbia also played a part in politics in other countries,
Pictures movie The Social Network; however, the and is often credited with contributing to the suc-
film’s story is not completely accurate. cess of the Arab Spring uprisings in 2011.
Facebook is designed to facilitate online com-
munities and reinforce social ties. Facebook’s Background
functionality is driven by personal profiles, which Facebook’s membership was initially limited to
include a user’s real name, employer, and other Harvard students, but soon expanded to other
identifying information. Studies show that users colleges in the Boston area, the Ivy League, and
of Facebook and other social networks tend to Stanford University. It gradually accepted stu-
congregate with individuals who share their tastes, dents at other universities before opening to high
values, and demographics, a characteristic that is school students. In September 2006, Facebook
sometimes referred to as homophily, which may became available to anyone aged 13 and older.
limit opportunities for citizens to be exposed to Facebook is often blocked in countries where
competing ideas. However, several scholars have the government controls citizen access to infor-
found that social media users may be compelled mation, such as the People’s Republic of China.
to be honest in their online self-representations However, the Chinese social network Renren
because their online identities are tied to their (meaning “everyone”), founded in 2005, offers
real-world identities. Others have found fewer similar functionality, and is popular with Chinese
incidents of flaming, or ad-hominem attacks, college students.
within Facebook discussions when compared to Personal profiling of real-life individual users
other online forums. is at the heart of the Facebook concept and its

489
490 Facebook

ongoing success, although this has also led to during the 2008 U.S. presidential election, which
the emergence of many serious privacy concerns has been called the first Facebook election. On
about Facebook usage. Fake profiles are forbid- January 5, 2008, Facebook cosponsored the
den by Facebook’s terms of use. The real-name Republican and Democratic primary debates with
aspect of Facebook has helped drive the popular- ABC News, and invited Facebook users to sub-
ity of Facebook Connect, an application that lets mit questions to the candidates. By Election Day
Facebook users log onto third-party Web sites 2008, Democratic candidate Barack Obama had
with their Facebook identities. Nick Bilton esti- 2.8 million Facebook supporters, Republican can-
mates that 9 million Web and mobile services use didate John McCain had 620,000 supporters, and
Facebook Connect. As of October 2012, more 5.8 million Facebook users posted status updates
than half of Facebook’s users accessed the site indicating that they had voted.
from mobile phones. Although technological con- Facebook created the U.S. Politics Page in
vergence with cellular telephony and with other 2009, where it now offers insights on how to use
social media significantly enhances Facebook’s the site for political campaigns, contains links
political clout by extending its reach in politi- to reports on social media and politics, and pro-
cal discourse, it has also raised serious questions vides information to voters. During the 2010
about the degree to which user identities may be U.S. midterm elections, Pew research found that
increasingly trackable through these social media, Americans who used Facebook were more politi-
which in turn raises concerns about dwindling cally engaged and more likely to vote than the
personal privacy. general population. In 2012, Facebook and CNN
On May 18, 2012, Facebook launched an ini- started measuring Facebook audience discussion
tial public offering (IPO) on the NASDAQ Stock of candidates Barack Obama and Mitt Romney,
Exchange (with the symbol FB) at an opening displaying political chatter by region and gender.
price of $38 per share. Uncertainty about the By 2012, Facebook was a standard plat-
company’s future, particularly about the future form for campaign communication, but it was
of advertising on Facebook, initially dogged the also effective at turning campaign events into
stock price, which fell below $20 during Octo- Internet memes. A page titled “Binders Full of
ber 2012. General Motors pulled its $10 million Women” generated hundreds of thousands of
Facebook advertising budget just days before the fans just hours after candidate Mitt Romney
IPO, citing uncertainty about the effectiveness of uttered the phrase during the second presiden-
Facebook ads. tial debate. His stance on women’s issues was
attacked online. Facebook communication was
Role in Politics also key in several noncampaign-related political
During the 2006 U.S. midterm elections, Facebook actions. For example, in 2012, Facebook chatter
gave all U.S. national political candidates Face- fueled protests against the cancer philanthropy
book pages that the candidates could use to reach Susan Komen for the Cure Foundation after the
potential voters. Most campaigns, uncomfortable organization withdrew funding from Planned
with ceding control of their campaign messages Parenthood. The protests led to the resignation
to the Facebook audience, used Facebook for of several Komen staffers, and ultimately to the
one-way communication with voters. However, reinstatement of funding.
some campaigns embraced the challenge, and In 2011, Facebook helped popularize the
saw Facebook as a way to engage younger voters. Occupy Wall Street movement and its many
Facebook also initiated a program called Election national and international spin offs. Facebook
Pulse, where users could see how popular candi- has been an effective tool for grassroots mobiliz-
dates were with other members of the Facebook ing of nonpolitical causes as well. For example,
audience. Election Pulse evolved into the Face- more than 500,000 users liked a page called
book Politics App during the 2008 election and “Betty White to Host SNL (Please),” urging
the U.S. Politics Page beginning in 2009. NBC to hire octogenarian actress Betty White to
Pew research estimates that 10 percent of Amer- host the popular late-night comedy show Satur-
icans used Facebook for political communication day Night Live in 2010.
Facebook 491

This giant iPhone apps window display in an Apple store in San Francisco in 2009 featured the mobile version of Facebook. By late
2012, over 50 percent of the 1 billion Facebook users worldwide used mobile phones to access the site. Facebook is the most popular
social networking site in the world, and has been a factor in U.S. presidential elections and popular uprisings in the Arab world.

Outside the United States the FARC” catalyzed the largest mass protests in
Facebook’s impact on international politics is the history of Colombia. In 2009, videos, pho-
most noted for the role it played in the Arab Spring tos, and textual accounts of clashes between Ira-
uprisings of 2011. The Facebook page “We Are nians protesting the outcome of the presidential
All Khaled Said,” named in honor of a 28-year- election and government forces were published
old man from Alexandria who was tortured to on Facebook and Twitter. In 2012, Iceland used
death by Egyptian police in front of witnesses, is Facebook to crowdsource ideas for its constitu-
credited with helping to mobilize forces against tion. Facebook carried photos, videos, and other
the Mubarak regime. Photos of Said’s disfigured reports of the conflict in Syria, which in 2012 was
corpse were distributed to online communities considered one of the most censored countries
in June 2010. Google employee Wael Ghonim in the world by the Committee to Protect Jour-
saw the photo and created the Facebook page, nalists. By 2012, politicians and governments all
which drew a lot of attention within Egypt and over the world used Facebook to communicate
from the international community. Internet pen- with citizens. Facebook also serves as an alterna-
etration was still relatively low in Tunisia, Egypt, tive news source in parts of the world where offi-
and other countries where Arab Spring protests cial information sources are not always reliable.
took place; therefore, Facebook was used mostly
by organizers to coordinate actions within Egypt Political Communication With Friends
and to make photos, videos, and up-to-date infor- Social networking sites make it easy for people
mation available to the international community. to seek out others with similar tastes and values,
Facebook has been part of political movements potentially increasing the polarization of politi-
in other parts of the world since at least 2008, cal discussion. Some research suggests that the
when a page called “A Million Voices Against Internet may be an “echo chamber” controlled
492 Facial Recognition Technology

by mainstream media, commercial interests, and Facial Recognition


powerful political forces. Political discussion on
Facebook increased during the 2012 U.S. presi- Technology
dential election season, and there was much dis-
cussion in the popular press about whether it was The uniqueness of the self, both physically and
proper Internet etiquette to post partisan politi- metaphysically, identifies only one specific per-
cal messages where friends of other persuasions son or thing. Biometrics, the automated method
might see them. However, Lee Rainie and Aaron of recognizing an individual based on measurable
Smith found that individuals who discuss politics biological and behavioral characteristics, is used
with friends on social networks may reconsider to distinguish one person from another based on
their opinions when they encounter someone who the unique features of each individual. Facial rec-
shares most of their values, but disagrees with ognition is the identification of a person by scan-
them on some issues, suggesting that social media ning his or her face and matching the captured
like Facebook may be useful for finding common image with a gallery of images stored in a data-
ground on contentious political issues. base. It was not until the latter part of the 20th
century, when modern automated recognition
Susan Jacobson systems began to be developed, that the face was
Florida International University employed as a key aspect of individual identity.
Facial recognition technology developed from its
See Also: Arab Spring; Banning Social Media for origins as crude police sketches to a sophisticated
Political Reasons; Fan Page; International Online computer-based face recognition system. Face
Communities; International Social Media and recognition systems help find missing persons and
Politics; Internet Forums; Myspace; Social Computing help safeguard communities by identifying crimi-
and Social Information Processing; Social Media, nals and terrorists who pose a significant threat to
Adoption of; Social Media, Definition and Classes the community. They can be used to monitor bor-
of; Social Media Strategies and Tactics in Political ders where illegal immigration, drugs, and drug-
Campaigns; Social Networking Web Sites; Web 2.0; related crimes proliferate.
Zuckerberg, Mark.
Historical Biometrics
Further Readings Biometric applications have their roots in the
Bilton, Nick. “BITS; Disruptions: Facebook’s 14th century when the Chinese used fingerprints
Real-Life ‘Spidey Sense.’” New York Times created by ink on parchment as a form of identifi-
(May 14, 2012). cation. During the 17th and 18th centuries, mod-
“Facebook.com Site Info.” Alexa.com. http://www ern countries developed police sketches as meth-
.alexa.com/siteinfo/facebook.com (Accessed ods of identifying criminals, where artists hired
October 2012). by police agencies would sketch the likenesses of
Hampton, Keith, Lauren Goulet, Lee Rainie, and criminals using a witness’ description of the indi-
Kristen Purcell. “Social Networking Sites and Our vidual. In the 1800s, India started using finger-
Lives.” Pew Internet and American Life Project prints as official seals on documents, and policing
(June 16, 2011). http://www.pewinternet.org/ agencies in modern countries around the world
Reports/2011/Technology-and-social-networks/ developed a “top most wanted list” that posted
Summary.aspx (Accessed October 2012). police sketches, and later, photographs of wanted
Rainie, Lee and Aaron Smith. “Politics on Social criminals and missing persons.
Networking Sites.” Pew Internet and American The first semi-automated system for face rec-
Life Project (September 4, 2012). http:// ognition was developed in the 1960s. This sys-
pewinternet.org/Reports/2012/Politics-on-SNS tem required an operator to locate the facial fea-
.aspx (Accessed October 2012). tures on a captured image of an individual, such
“U.S. Politics on Facebook.” Facebook.com. as the eyes, ears, nose, and mouth. After putting
https://www.facebook.com/uspolitics (Accessed this data into a computer system, distances and
October 2012). ratios were calculated between the facial features,
Facial Recognition Technology 493

and the findings were matched to a database of that affect face identification. For example, if the
recorded facial ratio data. The uniqueness of the target person wears eyeglasses, this can reduce
individual was evident in the distances between the accuracy of identification. Similarly, the accu-
facial features; that is, no two persons had the racy of identification is affected by lightning con-
same ratios. These automated systems allowed a ditions, the angle of the face pictured, the facial
facial image to be measured by 16 distinct fea- expression of the persons, the camera position,
tures: the eyebrow and chin vertices, the tip of the and the motion of a person’s face and head. The
nose and the eye, the lip corners, and the upper size of the database also affects the identification
and lower middle points. These facial points and rate. A test conducted by the National Institute
features, and the distances in relation to each of Standards and Technology (NIST) in 2006, for
other, could be translated into an algorithmic example, found that while the test for the best
data set and then used to identify the individual. face recognition system returned an 85 percent
In the 1970s, this earlier system was modified identification rate among the image gallery of 800
by adding extra distinct markers of the face, such people, it returned a correct rate for 83 percent of
as hair and eye color, and even lip thickness to 1,600 people images, and a rate of 73 percent for
more accurately indentify an individual. In 1988, about 37,000 images.
facial features were coded into broken down struc- Facial recognition has been an important tool
tures called “eigenfaces.” The eigenfaces were to combat and deter crime by identifying humans
then stored in a one-dimensional format, where at a distance. For example, facial recognition was
the image was compared against a gallery of data- a major component of the Human Identification
base images, using the distance ratios between at a Distance research program of the Pentagon’s
the facial features. The disadvantage of this sys- Defense Advanced Research Projects Agency
tem is that it requires a full frontal face image to (DARPA), put into place in 2000 and tested at
be captured, without which scans are poor and the 2001 Super Bowl in Tampa, Florida. Using
matches with the database may be inconclusive. the facial recognition system of Viisage Company,
In 1991, this technology was employed in closed- Tampa law enforcement officers scanned nearly
circuit surveillance cameras, providing data from 100,000 spectators’ faces at the Super Bowl to
face images to be collected in real time. Later, locate criminals. The facial recognition system
these facial features data were broken down into compared the scanned face images with the pho-
nodal points on the face that the computer used tos of criminals uploaded to the system by law
to reconstruct a three-dimensional representation enforcement officers, and detected the presence of
of the image. This meant that partial images of 19 criminals among the crowd.
the face captured by cameras did not yield a full Facial recognition systems can be useful for law
frontal image that could still be identified. enforcement agencies in their fight against crime;
however, there are some ethical concerns about
Modern Facial Recognition their use in public places. Philip E. Agre discusses
State-of-the-art face recognition systems devel- ethical questions concerning the use of facial rec-
oped in the 21st century are currently able to cap- ognition systems in public places. Agre believes
ture real-time faces in streaming video, and then that the use of facial recognition systems in public
convert the facial images into data templates that places should be outlawed because they can be
are sent to workstations where a facial match- too intrusive into people’s private lives and can
ing assessment is conducted. From workstations, to violate basic rights of privacy. Opponents of
alerts are made communicating the identification this thought, on the other hand, claim that the use
of an individual if a match exists, and nonmatch- of surveillance cameras does not violate privacy
ing images are discarded from the system. because there is no expectation of privacy in pub-
Although state-of-the-art face recognition sys- lic places. Another ethical concern is the accuracy
tems have overcome the problems associated with of face recognition systems and their tendency to
attaining effective face scanning in earlier systems, make false identifications.
a face match does not indicate a 100 percent cor- A study conducted by the National Institute
rect identification because there are many factors of Standards and Technology in 2000 found that
494 Facial Recognition Technology

A U.S. soldier in Logar Province, Afghanistan, uses a biometric device called handheld interagency identity detection equipment, or
HIIDE, to record information for a local man on May 9, 2011, to be added to a facial recognition system. Facial recognition systems
are improving, but are still subject to significant error. A 2006 review found that while the best facial recognition system returned an
85 percent identification rate for an image gallery of 800 people, this fell to 73 percent in a larger pool of 37,000 images.

facial recognition systems tested a 43 percent and secure national borders. Face recognition
false rejection rate for images of the same person systems could provide a more convenient and
taken one and a half years apart. In July 2001, safe world in the future.
in Tampa, Florida, a hidden government surveil-
lance camera equipped with a face recognition Hakan Aydogan
system captured the facial image of construction Emirhan Darcan
worker Rob Milliron. Milliron’s image was then Rutgers, The State University of New Jersey
misidentified for a criminal with child neglect
charges from Oklahoma. Milliron was arrested, See Also: Civil Rights; Domestic Surveillance and
but was released soon after it was learned of the Social Media; Electronic Privacy Information Center;
misidentification. Facebook; Privacy.
Face recognition systems are still an effec-
tive law-enforcement tool, despite their flaws Further Readings
in accuracy of identification. It is still a very Agre, Philip E. “Your Face Is Not a Bar Code:
new technology that is being developed, and Arguments Against Automatic Face Recognition in
researchers are constantly trying to optimize its Public Places.” Department of Information Studies.
efficiency in accurately identifying people. In University of California, Los Angeles, September
the future, face recognition systems may be per- 10, 2003.
fected and become more functional. They may Arca, Stefano, Paola Campadelli, and Rafaella
help find missing persons, track down fugitives, Lanzarotti. A Face Recognition System Based on
FactCheck.org 495

Automatically Determined Facial Fiducial Points. National Rifle Association CEO, incorrectly
Milan, Italy: University of Milan, 2003. claimed that President Obama had flip-flopped
Dice, Mark. Big Brother: The Orwellian Nightmare on his position toward guns. According to LaPi-
Come True. San Diego, CA: The Resistance, 2011. erre, Obama’s campaign promise was to not take
National Science and Technology Council. “Face away anyone’s guns, but once elected, he changed
Recognition” (August 7, 2006). Committees of to supporting an assault weapons ban. FactCheck
Technology & Homeland and National Security, pointed out that the president is not attempting
Subcommittee on Biometrics. http://biometrics.gov to take away anyone’s existing guns, and he has
(Accessed June 2010). consistently supported a reinstatement of the
Shan, Ting. “Reliable Face Recognition for Intelligent assault weapons ban that President Bush allowed
CCTV.” National ICT Australia, School of ITEE, to expire.
University of Queensland. http://itee.uq.edu The homepage features a rotating picture gallery
.au/~elec4600/elec4600_lectures/1perpage/Ting_ and the organization’s newest stories. In addition,
Presentation.pdf (Accessed July 2013). videos are embedded in the articles, and content is
available through an RSS feed. The “FactCheck”
mailbag presents readers’ comments, and a feature
called “Ask FactCheck” allows audience queries
for quick answers to recent rumors or misstate-
FactCheck.org ments. The “Viral Spiral” section features endless
viral rumors that are the subject of extensive rep-
FactCheck.org, a nonpartisan project of the etition; readers are given a summary of the facts
Annenberg Public Policy Center of the University and links to full articles. The Web site also offers
of Pennsylvania, describes itself as a nonprofit readers the opportunity to browse archived sto-
“consumer advocate” with the goal of monitor- ries by month, tag (topic), or section. The latter
ing factual accuracy in U.S. politics. The Web includes a variety of divisions that represent the
site, which combines journalistic and academic organization’s different elements, including party
elements, points out confusing or deceptive mes- lines (misleading talking points offered by politi-
sages in order to increase public understanding, cal parties) and spin detector spotlights.
and then presents evidence contradicting the Director Emeritus Brooks Jackson established
misinformation. Philanthropist Walter Annen- FactCheck.org in December 2003 after joining
berg provided an endowment that established the APPC. A journalist who had covered national
the Annenberg Public Policy Center (APPC) in politics for three decades for the Associated Press,
1993; his aim was to create space for a scholarly, Wall Street Journal, and CNN, Jackson has won
academic community that would focus on public several national awards. While at CNN, he cre-
policy issues at federal, state, and local levels. ated both the adwatch and factcheck genres,
FactCheck.org does not employ an evaluative reports that deconstruct false or misleading politi-
rating system, as do PolitiFact and other political cal statements. The current director, Eugene Kiely,
fact-checking sites. Instead, an article presents a is a government and political journalist who
misleading or deceptive statement or story, and has held posts at USA Today, the Philadelphia
then rectifies it. This is done by pointing out the Inquirer, and the Record (Hackensack, New Jer-
false information, partial evidence, or misrepre- sey). Managing Editor Lori Robertson, a journal-
sentation, and then providing the full original ist, editor, and writer for media watchdog Ameri-
statement or accurate evidence. For instance, can Journalism Review, joined FactCheck.org
in the 2012 election, a political action commit- in 2007. Dr. Kathleen Jamieson, Elizabeth Ware
tee (PAC) presented a radio ad featuring a state- Packard professor at the Annenberg School for
ment from Republican Mitt Romney. However, Communication at the University of Pennsylva-
the statement was taken out of context and did nia and director of the APPC, is a highly regarded
not include the entire statement, which cast a scholar in the area of political communication,
totally different perspective than the radio spot particularly on the press, politics, and campaigns.
suggested. In another example, Wayne LaPierre, Her pioneering research into deceptive political
496 Faith-Based Social Change

TV advertisements serves as the basis of adwatch DeLeo, Jennifer. “The 20 Best Political Web Sites.”
segments. Writers, researchers, and Web designers PC Magazine (August 28, 2008).
are also identified on the Web site. FactCheck.org. The Annenberg Public Policy Center
Until 2010, FactCheck.org was financially sup- and the University of Pennsylvania. http://www
ported by APPC funds, money from the Annen- .factcheck.org (Accessed April 2013).
berg Foundation, and grants from the Flora Fader, Carole. “Fact Check: So Who’s Checking
Family Foundation. A change in 2010 allowed the Fact-Finders? We Are.” Florida Times-Union
donations from individuals and instituted its (September 28, 2012).
first public appeal. In order to dispel any public Yahr, Emily. “Policing the Pols.” American Journalism
concerns over influence, FactCheck.org began to Review (December/January 2008).
publish its finances in detail, including identify-
ing those who give $1,000 or more. They do not
accept financial or other support from unions,
partisan or advocacy groups, or corporations.
FactCheck.org is the recipient of a number of Faith-Based
Webby Awards (known as the Internet Oscars),
presented by the International Academy of Digi- Social Change
tal Arts and Sciences, which honor Internet excel-
lence. From 2007 to 2010 and 2012 to 2013, Charles Taylor has argued that the West lives in
it received the most public votes, garnering the a “secular age.” Yet, as Taylor also points out,
Webby People’s Voice Prize in the politics category. this very claim—celebrated and lamented more
Time magazine named FactCheck one of its “25 than ever before—is ambiguous and often mis-
Sites We Can’t Live Without” in 2006, lauding leading. It leaves out much of the story. On the
it for its mission of picking apart speeches, press one hand, it is said that religion in the West has
releases, TV ads, and other public statements by lost its power to counter the epistemic authority
politicians to set the record straight. PC Maga- of modern science and the moral skepticism of the
zine called it one of the “20 Best Political Web- Enlightenment. From this angle, religion (seen as
sites” in 2008, noting that the media and the Web the relic of an undeveloped and naïve past) and
do not always provide the most accurate infor- new media technology (seen as the material and
mation. The article congratulated the extensive political counterpart of late, liberal capitalism)
research team’s efforts to squash political rumors come to seem antithetical. Whereas religion finds
and debunk myths. In particular, FactCheck was itself tied to the past, new media find themselves
praised for answering reader questions on current synonymous with change, progression, and the
policy and political issues. brink of modern and advanced thought—espe-
In addition, FactCheck won a 2009 Clarion cially when viewed through the lens of the digi-
Award for its 2008 presidential election cover- tal revolution. Following this perception, religion
age. FactCheck.org also won a 2010 Sigma Delta and technology become ideologically and even
Chi Award from the Society of Professional Jour- morally opposed to one another, binaries that
nalists for its coverage of deceptive claims made dwell at polar ends of the societal spectrum.
about health care legislation. On the other hand, this easy bifurcation proves
both historically dubious (religion and media
Beth M. Waggenspack technologies have been working hand-in-glove
Virginia Tech for centuries) and intellectually limiting when
it comes to grasping with complexity the cur-
See Also: Campaigns, 2012; Lobbyists; Online Smear rent state of affairs. Heidi Campbell has shown
Campaigns; Political Parties; Politico; PolitiFact.com. how this simple binary emerges in practice, and
how misleading it can be upon closer inspection.
Further Readings For example, when Pope Benedict XVI delivered
Buechner, Maryanne M. “25 Sites We Can’t Live his 2006 Message to the World, it was reported
Without.” Time (August 3, 2006). that he “[condemned] contemporary technology
Faith-Based Social Change 497

and [promoted] religion in its place.” Campbell facilitates the “spreadability of values,” and ulti-
argues not only that was this an incorrect por- mately contributes to social change.
trayal of the Pope’s message, but—more impor- Again, this is not a new story. Religion, like
tantly—she points out that the Catholic Church, any social formation, circulates meaning through
among countless other religious organizations, forms of intrapersonal, interpersonal, and com-
has long encouraged and supported the advance- munal interactivity. The many facets of religion
ment of communication technologies to spread (e.g., lay expression, prayer, ritual, faith, and
its message and mission. In other words, contra proselytization) are thus discursive acts that draw
assumptions that negatively correlate religious upon the available means of communication.
belief with technological and societal modern- Throughout the ages, technological advance-
ization, religion, and new media have always ment has brought new affordances to the acces-
intersected (and continue to intersect) in varying sibility, production, and consumption of informa-
ways that maintain and change communicative tion. Religion has always dealt in the nature and
practices embraced by millions. This holds true, use of information, both adopting and adapting
especially for the shape, character, and future of to media technologies that provide increasingly
the diversification of individual religious practices powerful and precise means of communication.
and forms of expression. As technology progresses, religions adjust to the
Thus, in light of the extent to which religious newest media, discovering new ways for praying,
followers have come to influence and be influ- expressing faith, and identifying within a reli-
enced by new media, religion has grown into an gious community. Not only does religion adopt
important and expanding field in the broader new technologies, but history also illustrates how
study of digital culture. Within this research, intertwined religion is to the journey of commu-
faith-based social change is a term that seeks to nicative innovation. The invention of the printing
both describe and make visible how changes in press, for example, made possible the circulation
religious communicative practices come to inter- and greater translation of ancient texts, marking
act with trends and changes in the relation of new the move from a Church-governed education to
media and society. Studying the traditional prac- secular-based institutions. It also enabled readers
tices of religion in new technologies and media, the chance to study the Bible individually and side-
scholars have started to explore the (re)shaping step religious authority. The trend toward more
of religion and spirituality as they emerge in digi- independent thinking led to the Reformation.
tal culture. During the Reformation, religion thrived, adjust-
ing to the new technologies, providing new means
Religion 2.0 for people to participate in spirituality. With each
Pauline Cheong and Charles Ess characterize new technology, religion maintained its presence
faith-based social change as “Religion 2.0,” or in society, adapting and influenced by new forms
“the manifold interactions between, on the one of communication. Radio, television, the Internet,
hand, diverse expressions and institutions affili- and digital media have each provided means for
ated with religious traditions and practices around useful and powerful modes of spiritual expression
the globe, and, on the other, the equally diverse and experience.
and rapidly changing affordances and possibilities For example, Cheong has examined blogging,
of Web 2.0.” Religion 2.0 is not merely confined microblogging, and associated channels of user-
to the notion of religion online, which provides generated content and social networking sites
information on Web sites regarding religious his- (SNS) to understand the perceptions and prac-
tories, theologies, and entities. Rather, it describes tices of modern modes of worship. She shows
the features of something more profound and how some view the Internet as a sacred space,
interesting: online religion, which encompasses suitable for “information seeking, worship, and
how religious practices and rituals function in vir- interaction with other believers.” Blogging and
tual sanctuaries. Cheong and Ess show how the microblogging allow individuals to express their
assimilation of new media into religious spheres interpretations of the Bible, and provide ministers
of storytelling, faith sharing, and symbolism a means to present doctrinal critiques of other
498 Faith-Based Social Change

credos to the public, patterns that are consistent Walker Cleaveland after he virtually expressed his
in the Protestant Reformation. Some bloggers faith in a condensed statement of 140 characters
revealed that they write as a form of documenting on Twitter. He then encouraged his Twitter fol-
personal spiritual journeys and religious experi- lowers to do the same, asking them to write their
ences. Others wish to share their faith, and feel a own “Twitter of Faith” in 140 characters with
sense of duty to inspire others and give dialogue the accompanying hashtag “#TOF.” This meme
to current political and religious issues. quickly spread as Twitter users or “tweeps”
Thus, while social media supports a trend responded to the call, providing condensations
toward religious individuality, this movement, as of theological truths or biblical passages. Tweeps
with the Reformation, is not uniform. For exam- were further encouraged to share the experiment
ple, social media enable the formation of com- on blogs or Facebook to continue the pattern of
munities of what might otherwise be disparate, expressing faith.
if like-minded individuals. Cheong found, in one Various Christian organizations now use digital
instance, that among those who have taken to the media to imitate traditional patterns of worship
Web to practice direct scriptural interpretation and follow scriptural admonitions in new and
are conservative Catholics. Because of the contin- innovative ways. Prayer chains—the Pentecostal
ued instantiations in the public sphere of scandals practice of unified congregational praying focused
connected to the Catholic Church, Cheong found toward particular persons or topics—have made
adherents entering into online conversations and their way into Twitter feeds. Church clergy and
producing an alternative site for advocacy in seek- members submit prayer requests and recommen-
ing change in the Church. dations that appear on prayer feeds, and written
prayers can be seen on a tweetgrid, enabling users
Social Media and the to “pray without ceasing” and “reinvent the cen-
Religious Experience tury-old practice of praying set prayers from the
Community and lay expression are an integral Bible, hymns, and devotionals.” Some churches
part of religion, and social media have also served have sanctuary screens that display congregants’
to extend and modify these facets of religious live tweets, allowing members to virtually partici-
practice. Twitter, for example, is an apt form of pate during sermons.
social media in which religious microbloggers As technologies continue to advance, the ways
are able to share faith-related content in a con- in which individuals and groups express their
cise and quick manner. While the act of blogging faith, form communities, and engage in religious
becomes a religious practice of finding spiritual rituals will expand. Given the continual move-
and sacred meaning in life experiences, tweeting ment of individualization that most noticeably
is a real-time form of ritual that can be under- began in the Reformation, it would be expedient
stood and lived as a religious experience. As users for scholars to continue exploring the tension
link to religious and nonreligious blogs, official and relationship between religious authority and
online church sites, secular resources, and other autonomy in light of new technologies. Simul-
sites of faith-based conversations and informa- taneously, the inclination to form communities
tion, networks among bloggers and microblog- online is an important area that requires fur-
gers establish identity, authority, community, and ther investigation, particularly as religious and
meaning, consequently fashioning a religious dig- nonreligious persons make sense of spirituality
ital culture. across political and cultural dimensions of soci-
The (re)circulation of faith-based mini-narra- ety. Furthermore, the perception and trends of
tives and messages has thus added to the devel- secularism and religiosity continue to raise ques-
opment of an online religious “participatory cul- tions regarding debates about the separation of
ture,” where believers prompt others to express church and state.
their faith and assess such expressions by way of
responding to, recirculating, or reconstructing Brian Heslop
the message. For example, the Twitter of Faith Antonio de Velasco
Challenge was created in 2008 by Minister Adam University of Memphis
Fan Page 499

See Also: Blogs; Christian Right; Islam and Social such as drawings or music videos. Other activi-
Media; Judaism and Social Media; Social Networking ties such as fan fiction, cosplays, or video games
Web Sites. can also occur but very rarely in relation to a
political figure.
Further Readings Antifan pages also exist to unite people
Campbell, Heidi. When Religion Meets New Media. through their hatred of a particular entity, often
London: Routledge, 2010. through the use of derision and criticism. Many
Cheong, Pauline H. Digital Religion, Social Media, comparable pages were, for instance, created by
and Culture: Perspectives, Practices, and Futures. fans during the French and American presiden-
New York: Peter Lang, 2012. tial campaigns of 2012 in the hope of discrediting
Cheong, Pauline H., Alexander Halavais, and the adversary and convincing followers of these
Kyounghee Kwon. “The Chronicles of Me: pages—as well as random viewers—to vote for
Understanding Blogging as a Religious Practice.” the other candidate.
Journal of Media and Religion, v.7/3 (2008). Here, the decision to create or follow a page
Farrell, Justin. “The Divine Online: Civic Organizing, either for or against a particular political figure
Identity Building, and Internet Fluency Among can be seen as the strong and visible expression of
Different Religious Groups.” Journal of Media and a political belief and an identity choice made by
Religion, v.10/2 (2011). the fans. The act of creating a fan page, however,
Taylor, Charles. A Secular Age. Cambridge, MA: goes beyond passively following an idea, and is
Belknap Press, 2007. an illustration of the level of conviction and com-
mitment among individuals sharing the same set
of values.
Besides offering the possibility to easily com-
municate with a vast number of people inter-
Fan Page ested in the subject—and content—of the page,
such profiles have a second function. The mere
Fan pages are Internet pages that are meant to presence of numerous followers on a Twitter fan
represent a person or a group of persons, a com- page or of many likes on Facebook vouches for
pany, a political party, a nongovernmental orga- the generated interest in—and, in case of a politi-
nization (NGO), or any other form of intellectual cal use, the agreement with the values of—the
entity, and are aimed at uniting fans or followers person, entity, or symbolic attribute represented
of that entity. Such pages are mostly utilized on by the fan page. This public and instantaneous
well-known and widely used social media plat- grading scale is therefore used to measure the
forms, such as Facebook and Twitter, where they collective infatuation for a given person: The
have become popular for both fans and market- higher it is, the more observers (whether they
ers. The use of fan pages in relation to politics, be, in this case, political commentators, political
both in official and unofficial manners, has grown activists, or just members of the population) will
exponentially within the past few years. believe that the views and persona of the indi-
There are two different types of fan pages: vidual portrayed in the fan page are supported
those made on behalf of the physical or intellec- by the people.
tual entity represented, and those made by the Furthermore, information such as fan page
person or entity’s fans. metrics (available on Facebook, but not on Twit-
Fan pages offer a variety of exclusive material ter, for instance), including the location of the
on their subjects, such as photographs, accounts followers or their demographic splits, may also
of recent events, notices of upcoming events, allow political parties or campaign managers to
opportunities to get discounts for related prod- have an idea of who and where their followers
ucts, and specifically for political or charitable are. Fan pages organized and maintained by fans,
use, instructions on how to become involved and however, will not provide access to this specific
help. Furthermore, unofficial fan pages can often information to official institutions, but still dem-
offer a wide range of creations made by fans, onstrate a certain level of interest in the subject.
500 Fax Machines and Tiananmen Square Crisis

Finally, one must be aware of the limits of fan trade schools and universities. Even high schools,
pages. More and more marketers are realizing the middle schools, and grammar schools were rep-
discrepancy between liking or following a page resented in the demonstrations as their faculty
and the actual level of interest or involvement chose to support the demonstrations. Employees
that fans may have, who may well be fans of the of more than 100 government agencies partici-
page without actually intending to become active pated, as did workers from hospitals, factories,
supporters or even to vote for the person. and retail businesses. In fact, approximately 15
percent of all Ministry of Culture personnel dem-
Benjamin W. L. Derhy Kurtz onstrated.
University of East Anglia By May 4, 1989, estimates of the numbers of
Melanie Bourdaa student demonstrators were as high as 100,000.
Université Bordeaux 3 Approximately 80,000 students converged on
Tiananmen Square for Mikhail Gorbachev’s May
See Also: Blogs; Campaigns, Digital; Campaigns, 15 visit. By the following day, the mass of demon-
Virtual; Facebook; International Online strators in the heart of Beijing grew to 300,000;
Communities; Pioneers in Social Media and Politics. and in the two days that followed, the square
teemed with more than 1 million students.
Further Readings
Aaker, Jennifer and Andy Smith. The Dragonfly Communications
Effect: Quick, Effective, and Powerful Ways to By summer 1989, China’s telecommunications
Use Social Media to Drive Social Change. San system had advanced just enough to include the
Francisco: Jossey-Bass, 2010. fax machine as a new technology. During and
Seib, Phillip. Real-Time Diplomacy: Politics and after the Tiananmen Square crisis, the Chinese
Power in the Social Media Era. New York: government blacked out most means of com-
Palgrave MacMillan, 2012. munications and forbade all foreign news cov-
Tobin, Jim. “Facebook Stats Analysis: Is Fan Page erage. The government halted satellite transmis-
Growth Slowing?” Mashable (January 17, 2012). sions and arrested noncompliant journalists.
http://mashable.com/2012/01/17/facebook-fan However, throughout these events, the fax as a
-page-slowing (Accessed January 2013). new mode of communication was overlooked.
Journalists evaded the ban as they transmitted
their accounts using early mobile telephones, but
these were not common.
Students and others in the prodemocracy camp
Fax Machines and maintained open lines of communication for news
with fax machines and e-mail. In a strange reversal
Tiananmen Square of information flow, Chinese citizens were depen-
Crisis dent on daily reports from Western news sources.
Photographs and reports of events unfolding in
The 1989 demonstrations for democracy in China China were faxed from outside China back to
took place in all 29 Chinese provinces and in 84 businesses, government offices, hospitals, and
cities. In excess of 2 million students participated schools in Chinese cities as part of an opposing
in these events and they represented more than viewpoint countering the local reports dissemi-
600 educational institutions across the coun- nated by the Chinese government.
try. Students from more than 80 distinct higher As the crisis deepened, blind faxes to strangers
learning centers gathered in Beijing’s Tiananmen were sent around the clock, particularly directed
Square to demonstrate. Not only college students at hotels and businesses inside China. Private busi-
demonstrated in Beijing: Citizens representing in nesses like copy shops ran their faxes incessantly,
excess of 700 separate organizations participated. sending news to anyone who could receive faxes.
Among the protestors were people from nontra- The hope was that information would leak out to
ditional adult learning centers and more than 100 the rest of the world through whatever channels
Fax Machines and Tiananmen Square Crisis 501

Impact
The impact of this development was felt all over
the world. At a 1991 conference in Prague spon-
sored by the American Foreign Policy Council,
attendees from then Soviet republics received a
“democracy kit” with great enthusiasm. This kit
was a package comprising, among other things, a
reproduction of the U.S. Constitution and a fax
machine, which at that time was only recently
affordable. Activists in the rest of the world had
watched Chinese activists use fax machines dur-
ing the Tiananmen Square events in 1989 to fight
control by the Chinese government and distribute
their accounts of the events to journalists abroad.
Passersby read a wall of protest posters outside of Tiananmen This new technology was filled with potential for
Square in Beijing, China, on June 2, 1989. News information social movements and played a role in other move-
transmitted by fax machines often appeared on posters like these. ments in the years immediately after the Tianan-
men crises because in large part of the example
set in Beijing.

proved to be available and willing. University Karla Lant


of Michigan students faxed American and other Northern Arizona University
Western news accounts to Chinese schools, hospi-
tals, universities, and even government offices. It See Also: Activists and Activism, Digital; Asia;
was in large part through the use of fax machines China; CNN Effect; Evolution of Social Media; Great
that protestors in Beijing knew that the world was Firewall of China; Human Rights.
watching and supporting them.
After the massacre, the Chinese government Further Readings
opened 15 controlled telephone lines specifically Ferguson, Yale H. and Richard W. Mansbach.
for members of the public to inform on student “Technology and the Transformation of Global
protestors and other leaders of the demonstra- Politics.” Geopolitics, v.4/3 (1999).
tions who had survived the violence and had gone Ganley, Gladys D. “Power to the People via Personal
into hiding. Chinese citizens studying in America Electronic Media.” Washington Quarterly, v.14/2
sought to foil this plan by flooding the informant (1991).
lines with calls; the numbers of the lines were Mason, T. David and Jonathan Clements.
passed all over the world via computer and fax “Tiananmen Square Thirteen Years After:
machines. The Prospects for Civil Unrest in China.” Asian
Fax machines also became one of the only Affairs: An American Review, v.29/3 (2002).
remaining conduits for news between China and Papp, Daniel S. “The Impacts of Advanced
the rest of the world. Press stories from American Information and Communication Technologies on
sources, Chinese-language sources in particular, International Actors and the International System.”
were transmitted via fax machine to citizens in Technology Analysis & Strategic Management,
China, while handwritten accounts of the events v.8/3 (1996).
were faxed out globally. Faxed photographs Smith, Jackie and Ronald Pagnucco. “Political
played an especially important role within China Process and the 1989 Chinese Student
given the problem of illiteracy, and multitudes of Movement.” Studies in Conflict & Terrorism,
copies of these faxed photographs were made and v.15/3 (1992).
distributed in the country. Posters papered walls Wong, Gerrit W. “Tiananmen: Causes and
throughout Chinese urban areas, and most of Consequences.” Washington Quarterly,
these were originally faxed. v.13/1 (1990).
502 Feb 17 voices

Feb 17 voices Darrat, a project manager and activist. The feed


quickly received support from the HOPE Lybian
Considered one of the few windows into what Relief Fund, an American nonprofit humanitar-
was happening in many places in Libya during ian organization devoted to easing the hardships
the Internet shutdown, Feb 17 voices is a social of the disadvantaged, displaced, and unfortunate
network experience to face information censor- people of different parts of the world.
ship via Twitter and an innovative experience in After considering that tweets did not give a full
social media. The initiative followed a precedent explanation of context and lost the truthfulness
called January 25 Voices, created by UCLA post- and strength of the voices, John Scott-Railton
graduate student John Scott-Railton. As a result of began posting audio of calls to the application,
the shutdown of the Internet accomplished by the sharing audio files via TwiTurm. Within a week,
Egyptian government on January 27, 2011, Scott- the audio had been listened to more than four
Railton built this project to tweet the information million times, which crashed the servers several
that he and his team received through a number times. Moreover, the project tweeted messages
of telephone calls. The uprising of the Egyptian and posted audio files through the application
revolution, two days before the start of January 25 AudioBoo, making it possible to listen to the
Voices, was covered thanks to the witnesses who telephone calls and other witnesses’ documents.
shared their experiences by telephone and pub- Posts were in English and Arabic, or in Arabic
lished them on Twitter and in real time. The action
kept up a steady flow of tweeted updates from the
ground, as well as updates on what was appearing
in Arabic-language print and TV news.
The same principle was applied by Scott-
Railton to create the feed Feb 17 voices. This
time, the account on Twitter was aimed to give
voice to Libyans and Libyan diaspora after the
events occurred. On this date, called the Day of
Rage, the uprising and civil war in Libya started.
Inspired by the Arab Spring, impelled by social
movements of the Egyptian and Tunisian revo-
lutions, the National Conference for the Libyan
Opposition made an appeal to all the opponents
of the Muammar Gaddafi regime to take part in
a demonstration. February 17 was the date of
the commemoration of marches for democracy
in Benghazi five years earlier. Protesters took the
streets throughout the country in cities like Ajd-
abiya, Benghazi, Bayda, Derna, and Zintan.
Previously, in 2008, the Gaddafi government
shut down the Internet in Libya through Eagle, a
software program created by an affiliate company
of Groupe Bull that allowed control of access to
the Internet in the entire country. In 2010, this
technology was improved, and access to media by
telephone was forbidden under threat of arrest.
John Scott-Railton decided to launch Feb 17
voices, adapted to Libyan circumstances, with the A protestor in a crowd of Libyan Americans takes a shoe to a
help of two Libyan American collaborators: Sarah poster of Gaddafi in Washington, D.C., on February 19, 2011,
Adurrahman, producer in the National Public two days after protests began in Libya to mark the five-year
Radio On the Media; and her husband Abdulla anniversary of suppressed democracy marches in Benghazi.
Feb 17 voices 503

with English voiceovers provided by Darrat and reproduced protesters’ chants or gunfights near
Abdurrahman. Other contributors helped to con- Gaddafi’s residence.
tact Libyan citizens by phone to obtain first-hand The comments echo other media like the
evidence of what they were living through, along Guardian, which published Al-Zahf al-Akdahr,
with inspiring stories of desperation, commit- a progovernment military officer, who asked for
ment, and courage. a violent response to protesters. It also quoted
Even the zones of coverage of the media were United Kingdom First Secretary of State William
reached, as the project progressed and the tweets Hague’s statement as “unacceptable and horrify-
and call files started to expand. A number of ing.” The feed focused extensively on the aerial
records were also translated and later tweeted by attack of the coalition forces and the missiles fired
volunteers and observers that followed the cov- by the U.S. Army on March 19, while some wit-
erage of Libya events offered by Al Jazeera Ara- nesses explained how protesters were shot by heli-
bic and Al Arabiya. All of this information was copters and airplane bullets, and a number of doc-
translated and tweeted to help provide context to tors were executed by the government. The day
non-Arabic speakers. As soon as the media con- after, some witnesses reported before and after
centrated their information on the actions that that the dictator’s son, Saif Gaddafi, spoke about
took place in Benghazi, Feb 17 voices paid atten- an expected resignation that did not happen.
tion to Western zones that were still affected by Feb 17 voices reached nearly 3,700 follow-
serious conflicts. This nonstop coverage provided ers from the beginning of the project to Muam-
daily updates and audio calls from Jebel Nafusa, mar Gaddafi’s death on October 20, 2011, and
the Western Mountains, with some witnesses in attracted approximately 10,500 followers. Gad-
Amazigh, the Siege of Misrata, the Battle for Trip- dafi’s execution was extensively reported through
oli and the final Siege of Sirte. videos, photos, and maps of his hideout. After
As the media explained how protesters torched the end of the conflict, a few more tweets were
a number of civil and government buildings, sent to the feed, especially to commemorate the
police stations, and security buildings and sacked events. The content of Feb 17 voices has been
public radio and television channels in Tripoli, widely forwarded to other sources and Web sites
Feb 17 voices gave voice to particular stories to and displayed on event-specific live blogs, such as
complete information that did not receive cover- Al Jazeera’s Libya Live Blog. It has been uploaded
age in the news. Some witnesses referred to how and disseminated via YouTube, sent out of Libya,
Libyan security forces fired live ammunition into and provided to news organizations and televi-
the protests, while the media focused on more sions, some of them streaming the documents live
massive events such as the attack and burning of as they were tweeted.
the Interior Ministry, the People’s Hall, and the
Revolutionary Committee offices. Manel Jiménez-Morales
The first tweet related to the uprising began on Universitat Pompeu Fabra
February 18, with the recording of a live phone
call. The document gave voice to a woman in See Also: Africa, North; Arab Spring; Libya; News
Tripoli, before joining the protests in Green Media; Social Networking Web Sites; Tunisia; Twitter.
Square. On the same day, police and army per-
sonnel withdrew from Benghazi after they were Further Readings
overwhelmed by protesters and joined them. Howard, Philip N. The Digital Origins of
Other tweets followed on the same date, explain- Dictatorship and Democracy. Oxford, UK: Oxford
ing the actions of the security forces in Benghazi, University Press, 2010.
who were completely overwhelmed by opposers, Oghia, Michael and Helen Indelicato. “Ruling the
lured the protesters in and then fired on them; Arab Internet: An Analysis of Internet Ownership
the violent measures of the regime, using for- Trends of Six Arab Countries.” Arab Media and
eigner mercenaries to stifle protesters; the camp- Society, v.13 (2011).
ing out of the demonstrators; and the filling up Shirky, Clay. “The Political Power of Social Media.”
of hospitals with casualties. More audio files Foreign Affairs, v.90/1 (2011).
504 Federal Privacy Act

Federal Privacy Act the Code of Fair Labor Practices). These princi-
ples became the foundation of privacy legislation
By the late 1960s and early 1970s, the U.S. gov- as conceived in the act and in federal, state, and
ernment increasingly relied on computer data- local privacy legislation thereafter. These codes
bases to track citizens’ activities and transactions. are: (1) there must be no secret personal-data
As a result, the Privacy Act of 1974 [Public Law recordkeeping systems; (2) there must be a way
93-579] was enacted because of the impact of for an individual to find out what information
incursions into individuals’ right to privacy and about him or her is in a record and how it is
free speech. The purpose of the Privacy Act of used; (3) there must be a way for an individual to
1974 is to balance an individual’s right to privacy prevent information about him or her obtained
and access to information culled by the govern- for one purpose from being used or made avail-
ment with the government’s need to collect, main- able for other purposes without his or her con-
tain, and use private information. sent; and (4) there must be a way for an individ-
The principal aim of the act is to safeguard ual to correct or amend a record of identifiable
privacy by instituting certain “procedural and information about him or her. After the release
substantive rights” in the government’s use of of this report, the Secretary’s Advisory Commit-
personal data. This includes requiring federal tee on Automated Data Systems recommended
agencies to follow particular principles, called that Congress enact a Code of Fair Information
“fair information practices,” which act as guide- practice for automated personal data systems.
lines when gathering and handling individuals’ The act was borne out of compromise between
data. The most important of these principles are: two bills: one from the House of Representatives
(1) requiring federal agencies to reveal to the [HR 16373], and one from the Senate [S 3418].
affected individual any records kept on him or Differences were significant, and a compromise
her; (2) restricting how agencies share individu- was devised. This compromise included: the cre-
als’ data with other entities; and (3) allowing indi- ation of the Privacy Protection Study Commis-
viduals to sue federal agencies for violating the sion; a stipulation that certain violations must
provisions set forth by the act. be deemed willful, arbitrary, or capricious before
In 1965, hearings were held by the U.S. House damages could be assessed; a guarantee that
of Representatives Special Subcommittee on Inva- affected individuals be entitled to recovery of
sion of Privacy. Congress was concerned with the at least $1,000 in damages; the inclusion of the
increasing use of computers to collect and retrieve House’s “routine use” exception regarding infor-
citizens’ personal information, especially the mation sharing (where the use of a record for a
social security number, as an identifier. Also, after purpose is compatible with the purpose for which
the Watergate Affair, Congress determined that it was collected); and finally, the inclusion of the
there was an urgent need to address illegal sur- Senate’s provision that an individual can appeal
veillance and investigation of individuals by fed- in federal district court a refusal by a government
eral officials. Numerous hearings were conducted, agency to amend a record. The act was passed by
and reports were generated on such disparate top- the Senate on December 17, 1974, passed by the
ics as commercial credit bureaus, national data House on December 18, 1974, and signed and
banks, and the effects of computers on personal enacted into law on December 31, 1974.
privacy. These concerns seeded the formation of
the act. Main Provisions
The act guards against misuse of individuals’
Creation of the Act records by the executive branch of the U.S. govern-
A significant influence on wording of the act was ment. This includes cabinet and military depart-
a report commissioned by the U.S. Department of ments, corporations controlled by the U.S. gov-
Health, Education and Welfare, Records, Com- ernment, independent regulatory agencies, other
puters, and the Rights of Citizens. At the heart branches or divisions of the executive branch, as
of this report were five basic principles called a well as agencies subject to the Freedom of Infor-
Code of Fair Information Practices (named after mation Act. Excluded are records maintained by
Federal Privacy Act 505

state and local governments and those in the pos- the act. In order to prevent the maintenance of
session of privately held organizations. Exemp- “secret record systems” (dossiers) and to pro-
tions from the act’s protections are allowed for mote transparency and good faith among the cit-
these agencies: (1) records maintained by the U.S. izenry, each federal agency must publish notices
Census Bureau, the U.S. Bureau of Labor Statis- of all “systems of records” it maintains. These
tics, and the U.S. Department of Homeland Secu- notices must include complete descriptions of
rity’s Arrival and Departure Information System; personal data recordkeeping policies, practices,
and (2) records kept for routine uses (referring and systems. Each federal agency must, to the
to external sharing of information outside the best of its ability, maintain individuals’ records
agency), archival purposes if the record has suffi- in good order insofar as such records are accu-
cient historical value, law enforcement purposes, rate, relevant, timely, and complete.
congressional investigations, and other adminis- Under the act, federal agencies are not permit-
trative purposes. ted to maintain information on citizens’ exercise
Only records that are maintained in a “sys- of those rights guaranteed under the First Amend-
tem of records” fall under the purview of the ment of the U.S. Constitution, unless that mainte-
act. Within the confines of the act, a record is nance is specifically by statute, by consent of the
defined as that which contains personally iden- individual, or relates to authorized law enforce-
tifiable information about an individual, up to ment activity. Federal agencies must abide by
and including information regarding the individ- rules set forth in the act for use and disclosure of
ual’s education, financial dealings, and medical, personal information.
criminal, or employment histories. A “system The act specifies that any information culled
of records” includes records where information for one purpose may not be used for another
may be retrieved by name, social security num- without notice to or consent of the affected indi-
ber, or other identifying symbols assigned to an vidual. Also, disclosure of individuals’ personal
individual. Information not kept in a system of information must be recorded and maintained by
records is not subject to the provisions of the that federal agency. An affected individual may
act, and may be accessed under the Freedom of seek through legal remedy enforcements of the
Information Act. rights guaranteed by the act. Also, any employee
All citizens of the United States may seek to of federal agencies may be subjected to criminal
gain access to most personal information main- penalties should they fail to comply with the act’s
tained on him or her and may seek redress in provisions.
case of errors in or misuse of such documents.
The act allows only aliens lawfully admitted for Privacy Protection Study Commission
permanent residence in the United States to seek A final provision of the act created the Privacy
and receive information regarding the collection, Protection Study Commission (PPSC), which in
maintenance, utilization, and dissemination of 1977 issued the report Personal Privacy in an
records kept by federal agencies of the U.S. gov- Information Society. This report noted that while
ernment. Nonresident foreign nationals are not the act represented a step forward in address-
eligible to use the act’s provisions, but may use the ing the increasing privacy concerns of the U.S.
Freedom of Information Act to request records government’s use of citizens’ data, the positive
about themselves. results intended by Congress did not material-
There are five requirements relevant to most ize, in part because of the opaque language of
citizens and aliens lawfully admitted for perma- the act, specifically regarding the act’s defini-
nent residence in the United States. Each federal tion of “systems of records.” The act’s defini-
agency must establish a set of procedures for tion of “systems of records” only encompassed
allowing individuals to examine their personal databases that retrieved records by name, social
records for omissions, timeliness, relevance, security number, or other individually identifi-
and completeness. Individuals must be allowed able information. This omits from the provisions
to copy their personal records and correct any of the act any database that does not index by
errors. This is the fundamental provision of these attributes.
506 Federal Shield Law, Bloggers and

The PPSC also noted that although publication Federal Shield Law,
of federal agencies’ personal data recordkeep-
ing policies, practices, and systems in the Fed- Bloggers and
eral Register was helpful, it is of limited impact
because of the citizenry’s lack of awareness of The proliferation of online publishing by citi-
such disclosures and the publication of the Fed- zen journalists and bloggers has had a signifi-
eral Register. Also, the PPSC noted that the infor- cant impact on the changing nature of journal-
mation disclosed in the Federal Registry lacked ism and news media, with mainstream media
detail about how systems are used internally by outlets not only encouraging such activities, but
federal agencies. actively incorporating information from citizen
The report also noted that, at the time, few journalists into their reports. The emergence of
individuals had made use of the act’s provisions Wikileaks and other various legal challenges to
(the only significant court case regarding a citizen journalistic privilege for bloggers has raised ques-
claiming protections under any of the provisions tions regarding the feasibility of federal (and in
of the act occurred in Doe v. Chao 540 U.S. 614, some cases state) shield laws that protect jour-
in 2004). The report attributed this to a lack of nalists from having to reveal their sources or
public awareness of the act and to the widerang- confidential information in court. The question
ing exceptions to the act’s provisions of large-scale of whether bloggers and citizen journalists are
and prominent government agencies like the CIA among the protected groups remains at the fore-
and law enforcement. Finally, the report iterated front of this debate.
that federal agencies were not applying consistent The Federal Shield Law (also known as the Free
standards for compliance to the act’s provisions, Flow of Information Act) was originally initiated
and attributed this lack of compliance to mis- in 1972 by Representatives Charles Whalen Jr.
understanding of the act’s provisions by federal (R-Ohio) and William Moorhead (D-Pennsylva-
agency personnel. nia), following the Branzburg v. Hayes case, when
the Supreme Court refused to recognize the privi-
Debra Glassco lege for journalists not to be compelled to reveal
Rutgers, The State University of New Jersey their sources or confidential information in court
proceedings. The original proposal sought to pro-
See Also: Digital Media Law Project; Electronic tect mass media outlets, their reporters, and free-
Frontier Foundation; Electronic Privacy Information lancers, stating that in order to force a journalist
Center; Freedom of the Press and National Security; to give up his or her sources or confidential infor-
National Center for Digital Government. mation, the federal government must convince
the judge that the information requested was of
Further Readings sufficient importance to outweigh the journalist’s
Electronic Privacy Information Center. “History need to protect the privacy of his or her sources.
of the Privacy Act of 1974.” http://epic.org/ Similar to lawyer/client privilege, reporter’s privi-
privacy/1974act (Accessed May 2013). lege attempts to facilitate the free flow of infor-
National Archives. “The Privacy Act of 1974.” mation because compelling reporters to reveal
http://www.archives.gov/about/laws/privacy sources or confidential information would make
-act-1974.html (Accessed May 2013). sources reluctant to provide information, thereby
Tennessee Criminal Law Defense Resources. compromising the ability of journalists to effec-
“A Citizen’s Guide on Using the Freedom tively do their jobs.
of Information Act and the Privacy Act of Numerous versions of the law have been intro-
1974 to Request Government Records.“ http:// duced and rejected over a 40-year period, with
www.tncrimlaw.com/foia/VII_A.html (Accessed the most recent version reintroduced by Repre-
May 2013). sentative Mike Pence (R-Indiana) in September
U.S. Department of Justice. “Overview of the Privacy 2011 as H.R. 2932, the Free Flow of Information
Act of 1974.” http://www.justice.gov/opcl/ Act of 2011 (also called the Federal Media Shield
privacyact1974.htm (Accessed May 2013). Bill). The previous versions of the bill passed the
Federal Shield Law, Bloggers and 507

House of Representatives in both 2007 and 2008, suggest that since they do not have to adhere to
only to be rejected by the Senate. The Free Flow of the same standards of ethical conduct expected
Information Act of 2011 (H.R. 2932) has stalled of professional journalists, they should not be
before the Senate Subcommittee on the Constitu- afforded the same legal protections. However, it
tion. Although a federal law has yet to be passed, has also been argued that bloggers and citizen
over half of the states have enacted shield laws, journalists are under the same threat of defama-
although state laws vary widely in their coverage tion and legal threats as professional journalists.
and the definition of covered journalists. Therefore, whether they formally recognize the
Critics of the shield law maintain that enacting standards of professional ethical conduct or not,
it will reduce the federal government’s ability to conscientious bloggers will follow general ethical
uphold national security, although the 2011 bill guidelines that require a focus on presenting accu-
includes special provisions for instances where rate facts.
the information is deemed necessary to maintain Currently, there is no consensus among the
national security, to prevent death or injury, or states regarding what constitutes a covered jour-
where the information is deemed vital to a crimi- nalist, with states defining journalists in a vari-
nal or civil case. Other critics suggest that the ety of ways, including official affiliation with an
existing law is too weak, pointing at the prob- established media organization, making a major-
lematic definition of covered journalists, which ity of their income from writing and or publish-
generally only covers those for whom a majority ing, and intent (where the information is gath-
of their income comes from regularly writing and ered with the sole purpose of disseminating it to
reporting—a definition that excludes many blog- the public).
gers and other citizen journalists who are not in a In 2011, the Oregon District Court ruled that
position to derive the majority of their livelihood bloggers are not covered by the state’s shield laws;
from writing. yet in 2012, an Illinois court found that according
As new communication technologies have been to their state shield law, bloggers were a covered
incorporated into mass media, state courts have class of journalist. This lack of consensus is not
necessarily expanded the original scope of their just an issue for citizen journalists and bloggers,
shield laws; however, many still define privileged but also for established media outlets that encour-
groups according to the medium for which they age and incorporate such journalistic products
publish. As a result, electronic publishing is cov- into their reports. For example, CNN, Fox News,
ered in some states, but not all. Some legal ana- and other news stations regularly solicit video,
lysts suggest that when the original intent of the audio, and other information on breaking news
shield law is considered, citizen journalists such from viewers. Under the existing interpretation of
as bloggers should have the same right to invoke the shield laws, these citizen journalists might not
the reporter’s privilege as reporters affiliated with be covered, but the news outlet might be, depend-
established media outlets. These analysts argue ing upon the interpretation of state shield laws.
that bloggers disseminate information to the pub-
lic in much the same way as traditional journal- Danielle Lawson
ists, and that they would benefit from the same Edinboro University of Pennsylvania
level of protection, provided the information was
obtained with the intent of disseminating the See Also: Blogs; Blogger Rights and Responsibilities;
information for public benefit and/or knowledge. Citizen Journalism; Freedom of the Press and
Depending upon its focus, blog content may be National Security.
used as a personal diary and opinion sounding-
board, or a news platform. This blurring of intent, Further Readings
function, and purpose is problematic in regard to Cartier, Curtis. “Judge: Oregon Shield Law Doesn’t
establishing shield law protection for bloggers Cover Blogger in Defamation Suit.” Seattle Weekly
because not all bloggers use their blogs solely as a News (December 6, 2011).
news platform. Furthermore, opponents to shield Layton, Laura Katherine. “Defining ‘Journalist’:
law protection for bloggers and citizen journalists Whether and How a Federal Reporter’s Shield Law
508 FightTheSmears.com

Should Apply to Bloggers.” National Law Review


(March 6, 2011).
Society of Professional Journalists. “Struggling to
Report: The Fight for a Federal Shield Law.”
http://www.spj.org/shieldlaw.asp (Accessed April
2013).

FightTheSmears.com
In response to widespread rumors about his
personal and political life during the 2008 elec-
tion, Barack Obama and his campaign launched
FightTheSmears.com to describe and refute sev-
eral accusations. The Web site was meant to give
Obama supporters ways to respond to such criti-
cism and help the news media reject lies about
the candidate. Though the Web site was effec-
tive in offering a line-by-line refutation of major
rumors—with supporting evidence—its overall
influence has been questioned by critics. Never-
theless, while FightTheSmears.com was limited
to the 2008 campaign, its power to track rumors In another example of the Obama campaign fighting one of the
driven by social media led to the development of smears against their candidate in novel ways, this mug featuring
similar sites used to manage the president’s image. an image of President Barack Obama’s birth certificate could be
From the early days of the 2008 Democratic ordered from the 2012 campaign Web site in fall 2011.
primary, Barack Obama faced several rumors.
In a variation of an e-mail titled “Who Is Barack
Obama?” he was accused of being a closeted
Muslim who attended a madrasa in his youth, The Web site FightTheSmears.com was
which although the literal translation is simply launched in June 2008 as an Internet-based rumor
“school,” is now commonly misunderstood as clearinghouse where the malicious stories about
a fundamentalist Muslim educational program Obama and his family could be identified, traced
that can serve as a training ground for future to their origins, and refuted with evidence. Break-
terrorists. Among other rumors were claims like ing from the traditional strategy of responding to
these: Obama refused to recite the pledge of alle- preposterous lies with silence, the Obama cam-
giance; he took his oath of office with a Koran paign addressed the rumors head on. In so doing,
after being elected to the U.S. Senate; he was not the campaign recognized what political commu-
a U.S. citizen; and he was a black nationalist sym- nication scholars like R. Kelly Garrett later con-
pathetic to communism. Like other candidates, firmed: Rumors circulating through social media
Obama initially ignored the rumors targeting his tend to have more power and need to be con-
campaign. His strategy eventually changed after fronted. The novel approach asked users to e-mail
rumors began circulating that a video existed of the campaign’s responses to popular rumors to
his wife Michelle ranting about “whitey” dur- their friends and to report any new rumors cir-
ing a talk at Trinity United Church of Christ in culating online. In response to the rumor about
Chicago. Although the video never surfaced, the Obama’s wife, the site called the claim a lie and
claim was widely discussed online and was even- cited news articles quoting reputable conserva-
tually repeated on radio and television. tives who considered the story ludicrous. The
Findability 509

rumor that Obama attended a madrasa was also See Also: Campaign Strategy; Campaigns,
called a falsehood, and links were provided to a Presidential (2008); Crowdsourcing; Health Care;
CNN story depicting his school in Indonesia as a Rumors; Truth Team.
regular elementary school. In response to rumors
that Obama was not born in the United States, the Further Readings
site provided a PDF copy of his birth certificate. DiFonzo, Nicholas. The Watercooler Effect:
While effective at providing Obama support- A Psychologist Explores the Extraordinary Power
ers and the news media appropriate responses to of Rumors. New York: Palgrave Macmillan, 2008.
rumors, FightTheSmears.com was also the subject Garrett, R. Kelly. “Troubling Consequences of Online
of significant criticism. According to some psy- Political Rumoring.” Human Communication
chologists, listing rumors and then rebutting them Research, v.37/2 (2011).
can often lead readers to remember the rumors as Waggenspack, Beth. “Deceptive Narratives in the
true. Thus, naming false accusations can some- 2008 Presidential Campaign.” In Studies of
times give such distortions credibility. Other crit- Identity in the 2008 Presidential Campaign,
ics complained that the Web site was often short Robert E. Denton, ed. Lanham, MD: Rowman &
on evidence, unlike the fact-checking portion of Littlefield, 2010.
Obama’s campaign Web site that preceded Fight-
TheSmears.com. Additionally, the site’s effective-
ness was further questioned because there was lit-
tle proof that users would actually forward links
to those who believed the rumors. Finally, many Findability
conservatives complained that Republicans were
too quickly blamed for spreading rumors that Though it has existed for years, findability in its
were actually started by Obama’s opponents in common usage today is a concept popularized by
the Democratic primary. Peter Morville in 2005 to refer to how easily a
FightTheSmears.com ceased to exist after the Web user can find online content using a search
2008 campaign, but it evolved into other Web engine or by navigating within a particular Web
sites used by the Obama administration. In August site. To be findable means that it is possible and
2009, the White House launched WhiteHouse.gov/ easy to locate online information known to exist
realitycheck to counter rumors about health insur- in a general place. In its simplest sense, findability
ance reform. The site listed and refuted several concerns how easy it is for people to find what
rumors—ranging from claims that the Affordable they are looking for online. Far from a simple con-
Care Act would lead to rationing of health care cept, though, findability calls upon Web designers
services to lies about “death panels”—and asked and information architects to conceptualize and
users to forward suspicious e-mails to flag@white organize Web content in a way that maximizes its
house.gov. In September 2011, the president’s cam- ability to be located, reached, and identified by
paign launched Attack Watch, along with a Twit- those looking for it either from within or outside
ter hashtag, to debunk misinformation about the the Web site where it is kept. These organizational
administration. Obama supporters were encour- choices may have political implications because
aged to submit reports on smears against the presi- depending upon one’s perspective, it is not always
dent, mostly by fact-checking Republican presi- desirable to make certain information easy to find.
dential candidates. By February 2012, the Obama On today’s Web, search engines play a power-
campaign launched a site for Truth Teams to fight ful role in directing Web users toward informa-
misinformation about the president. Linked to tion thought to be most relevant to a user’s search.
Obama’s campaign Web site, Truth Teams listed But search engines offer only limited attentiveness
information by issue and allowed groups of fact- to the nuance of what one may be seeking. Peter
checkers to organize in several swing states. Morville, for instance, writes that he was partly
inspired to think about findability after search-
Ryan Neville-Shepard ing online for information about his daughter’s
Indiana University–Purdue University Columbus peanut allergy, only to find that search engines
510 Findability

typically directed him toward overtly commercial Findability is not just practical; it can also be
Web sites or other marketing material selling nut- political. The concept’s political aspect becomes
free products, which was not the information he evident when considering that content providers
wanted. Findability is not just a matter of making do not always have a motivation to make their
it easy to find one’s way toward certain informa- content easy to find. Sometimes, a content provider
tion; it is also a matter of assuring the relevance has a vested interest to deliberately hide informa-
of the information toward which one is directed. tion or otherwise make it not readily findable. For
While search engine optimization techniques instance, disclaimers required by law, for example,
offer Web designers a way to increase the likeli- about the side effects of medications or the dangers
hood that their Web sites will appear more promi- of cigarettes might deter consumers from buying
nently in a search engine’s results, findability goes those products, even though the law demands such
further still. disclaimers. Similarly, Web designers may find it
For Morville, findability as a tenet of Web necessary for a Web site to include some content
design or information architecture is concerned that is unflattering, dry, uninteresting, or other-
with three primary questions: “(1) Can your users wise unappealing. In such instances, Web design-
find your Web site? (2) Can your users find their ers make decisions to privilege the visibility (and
way around your Web site? (3) Can your users the findability) of certain classes of information
find your products and content despite your Web over others in order to be more rhetorically effec-
site?” These three questions might respectively be tive. Though findability concerns the ease of find-
characterized as problems of locating, reaching, ing content or information, its corollary concerns
and identifying. In other words, ensuring maxi- the opposite drive to make information more dif-
mal findability means that a Web user can eas- ficult to find. Nevertheless, findability is not a finite
ily locate the Web site where desired information resource. The networked structure of the Web
or content exists, that the user can then navigate means that making some content findable does not
easily through the Web site to reach the specific necessarily make other content less findable. Stra-
place where this information is kept, and that a tegic decisions, however, can operate to emphasize
Web user can easily and accurately identify the the findability of certain content more than others,
pertinent information as such once he or she has and it is these decisions that bring findability into
located and reached it. the realm of the political.
This last entreaty is especially difficult in a Far from limited to virtual environments, find-
Web with organizational signposts structured ability in its broader sense also refers to the inter-
with semantic cues that usually amount to key vention of technology as an apparatus to help any
words intended to guide search engines toward wayfinding experience. For instance, handheld or
particular content. Key words, however, do not dashboard global position system (GPS) naviga-
always capture the complexity of the content tional systems, digital mapping of the real world
that one may wish to find. Moreover, a clumsy on smartphones, or through applications like
presentation of content on a Web site may unin- Google Earth all contribute to facilitating the ease
tentionally conceal the relevant information con- of making one’s way through the world. The con-
tained therein. That is, it sometimes happens that cept of findability aspires to make easier what can
Web users have arrived at the information they sometimes be an exasperating process of sorting
are looking for without realizing it. The desired through an information-saturated world to find
content may be poorly worded, it may be visu- exactly what one wants at any given time.
ally messy, or it may be hidden among long para-
graphs full of other information not relevant to Chris Ingraham
the user’s concerns. Any variety of reasons—aes- University of Colorado–Boulder
thetic, grammatical, or contextual—might make David Spiegel
desired content unidentifiable, even in plain sight. Institute for Advanced Study
Maximizing findability in part means ensuring
that information is identifiable for what it is, once See Also: Information Aggregation; Search and
a user has arrived at its door. Scrape Capability; Search Engine Optimization.
FinFisher 511

Further Readings and 2013, slivers of information regarding Fin-


Morville, Peter. Ambient Findability. Sebastopol, CA: Fisher products and their unique covert surveil-
O’Reilly Media, 2005. lance abilities found their way into several news-
Morville, Peter. “Ambient Findability: Libraries, paper stories on cyber security, bringing FinFisher
Serials, and the Internet of Things.” Serials technology into limited public view. For exam-
Librarian, v.58 (2010). ple, an analysis conducted by the University of
Thurow, Shari. “Findability, SEO, and the Searcher Toronto Munk School of Global Affairs’ Citizen
Experience.” Search Engine Land (January 21, Lab regarding five suspicious e-mail attachments
2011). http://searchengineland.com/findability obtained by Bloomberg News, which were sent to
-seo-and-the-searcher-experience-61038 (Accessed a Bahraini activist in 2012, exposed the name of
January 2013). FinFisher and its IT intrusion products.
The products that FinFisher provides can be
summarized into two groups: those that provide
tactical solutions, and those that provide remote
intrusion solutions. The term tactical refers to the
FinFisher use of equipment by law enforcement officers in
the area of operations. In a similar vein, tactical
The increasing pace of globalization and crime IT intrusion solutions produced by FinFisher are
requires more effective methods of intervention. used by law enforcement officers when they are in
Advances in technology offer opportunities for the vicinity of their targets, or when they have the
law enforcement agencies to fight crime within opportunity for physical access to the IT devices
national borders. For example, lawful intercep- of the targets. Remote IT intrusion tools consist
tion is a crucial method used by law enforcement of executable codes acting as a Trojan that can
agencies to fight crime. Lawful intervention is covertly access private and personal data of tar-
the legally sanctioned access of law enforcement gets and can send them to a remote location by
agencies of private communications. It provides taking remote control of their computers or smart-
crucial information regarding what criminal sus- phones. These executable codes are downloaded
pects are doing or are planning to do, and is one over the Internet without one’s knowledge upon
of the most important tools for law enforcement opening an e-mail attachment or text message, or
to fight crime. In some cases, after obtaining a by clicking a link on a Web site. Because they run
judicial warrant to enter the offices of suspects, in the background, they are not noticed by users,
law enforcement agencies may have to insert unless they are detected by an antivirus program;
an electronic transmitter called a “bug” into an however, these types of professional codes can
object belonging to suspects, especially when bypass many trusted antivirus programs.
they are otherwise unable to obtain valuable data These remote IT intrusion tools can secretly
about their operations from other sources. In record all the text written by the users of a com-
addition, officers often use safe houses or obser- puter or a mobile device as they are striking the
vation cars to receive what is transmitted by these keys of the keyboard, and can later send the
bugs. However, these traditional bugs began to recorded keystroke history data to a remote loca-
be less functional because of the increased use of tion. Furthermore, these tools can access private
computers, smartphones, and tablets. Thus, bugs data sections on the computers and mobile devices
began to be directly inserted into the devices of of the targets and transmit their private informa-
suspects or criminals. Intelligence and police offi- tion, documents, and files to a remote location. In
cers are currently able to obtain information from addition to taking remote control of the comput-
electronic devices using software or hardware- ers, these devices can also provide a means for
based information technology (IT) intrusion bugs turning on Web cams and microphones of the
to track suspects and criminals. computers from a remote location to monitor
FinFisher is a UK-based company, a branch of what the user is doing. Moreover, the smartphone
the Gamma Group, which provides IT intrusion version of the IT intrusion tool can record voice
solutions for law enforcement agencies. In 2012 calls and texts, and can track the geographical
512 Firewalling

location of the targets through built-in global officers have to use such new technologies after
positioning systems (GPS). obtaining a judicial warrant upon probable cause,
Citizen Lab has found a FinSpy malware com- especially when they are otherwise unable to
municating with a FinSpy command and control obtain data. Furthermore, it must be guaranteed
server in Ethiopia. According to Citizen Lab’s that these kinds of tools are only sold to the law
findings, when the FinSpy malware is activated, it enforcement agencies of democratic governments.
creates a JPG picture of members of the Ethiopian Otherwise, these tools can be a very dangerous
opposition group, Ginbot 7, with the same file weapon in the hands of totalitarian or repressive
name as the malware. Therefore, victims believe regimes, cyber criminals, identity thieves, or pri-
that the opened file is just a picture, not a mali- vacy invaders.
cious code. Furthermore, Citizen Lab has detected
the presence of FinSpy Mobile for Android mal- Hakan Aydogan
ware in Vietnam, which is capable of recording Rutgers, The State University of New Jersey
conversations and tracking the geographical loca-
tion of targets through built-in GPS. It was also See Also: Carnivore; Deep Packet Inspection;
found by two Egyptian activists that a FinFisher Domestic Surveillance and Social Media; Echelon;
quotation in Arabic letters was prepared for the Firewalling; Keystroke Logging; Privacy; Search and
Egyptian government regarding FinFisher prod- Scrape Capability.
ucts and their prices in 2010. As of March 2013,
Citizen Lab identified FinSpy command and con- Further Readings
trol servers operating in 25 countries. This global McVeigh, Karen. “British Firm Offered Spying
reach brings up ethical concerns about the use of Software to Egyptian Regime—Documents.”
such new technologies, which are aimed only for The Guardian (April 28, 2011).
monitoring criminals and terrorists. These publi- Muncaster, Phil. “FinFisher Spyware Goes
cized examples of the use of FinFisher show that Global, Mobile and Undercover.” Register
FinFisher was used against human rights activists (March 19, 2013).
and opposition groups, rather than criminals and Regan, Priscilla M. Legislating Privacy: Technology,
terrorist. Therefore, there is the risk of abusing Social Values, and Public Policy. Chapel Hill:
such technologies. University of North Carolina Press, 1995.
The use of new technologies is of utmost
importance in the fight against crime. Informa-
tion and communication technologies are always
changing; therefore, keeping up with these new
technologies is of high importance to law enforce- Firewalling
ment. Criminals, especially organized criminals,
are adept at following and using new technolo- Advances in information and communication
gies to a greater degree than governments and technologies have vastly improved the connectiv-
law enforcement agencies. FinFisher IT intrusion ity of individuals and organizations and flow of
tools can be useful for law enforcement agen- information around the world. The arrival of the
cies of governments in their fight against crime. Internet specifically provided an unimaginable
However, the use of such new technologies by law pace for advancing the process of globalization.
enforcement officers in investigations and opera- It has linked people around the world who have
tions must not violate the privacy of individuals. never seen one another. People communicate with
FinFisher IT intrusion tools have the poten- each other daily, for the most part without restric-
tial of invading individuals’ privacy. They can tions imposed by state sovereignty. However,
extract the private and personal data of individ- these advances have also paved the way for crimi-
uals, break into their e-mails or social network nals to commit crimes that are easier to carry out
accounts, intercept their conversations, and even than traditional crimes. Every step of technologi-
take surveillance of them by turning on Web cams cal progress has increased the use of technology
and microphones. Therefore, law enforcement as a weapon of crime. For example, just as the
Firewalling 513

Internet has contributed to globalization by pro- to harmful content from the blocked Web sites
viding a cheap and reliable form of communica- because the connection between a user’s computer
tion, it has opened the door to cyber crimes that and a targeted Web server is prevented before it
can severely damage computer systems. In paral- can be established.
lel with the extensive use of the Internet, cyber A firewall can also allow or block Internet traf-
crime is increasing each year. Individuals, organi- fic according to communication protocols such as
zations, and governments should take several pre- an Internet protocol (IP), which refers to a Web
cautions to ensure that they are protected from surfing process carried out by Web browsing, an
the actions of cyber criminals. Firewalling is one file transfer protocol (FTP), which is based on file
of the precautionary measures that can prevent transferring between computers over the Inter-
cyber attacks. net, and simple mail transfer protocol (SMTP),
A firewall is a computer software device or which is for e-mail trafficking. By filtering a FTP’s
piece of hardware that prevents cyber attacks access, for example, users can be prevented from
derived from the Internet such as Trojans, viruses, downloading programs or files to their comput-
and worms. They can prevent unwanted network ers that can be embedded with malicious codes or
packets from reaching their destination, and allow programs.
the desired packets to continue to their destina- Port blocking is another firewall filtering rule
tion according to filtering rules. In this respect, that can be defined by users. The Wi-Fi or LAN
firewalling can be regarded as a traffic control network cards of computers have about 65,000
device that decides what will pass, and what will different ports, or “paths” to establish data links
not. It ensures that computers are less vulnerable with other computer systems over the Internet.
to cyberattacks and that the data on computers For example, when a user opens a Web page
are more protected. using a Web browser, the 80th port of the net-
work device is used to reach this Web page. How-
Configuration ever, for secure Web browsing, the 443rd port is
Firewall filtering rules can be customized accord- used to reach an SSL certificated web page. In this
ing to IP addresses, domain names, keywords, or respect, a firewall rule can be defined, for exam-
phrases, ports, and protocols. In this respect, a ple, to block unsecured Web browsing by block-
firewall can block off certain IP addresses, it can ing the 80th port communication while allowing
restrict access to certain domain names or domain the 443rd port communication to remain open
name extensions such as .gov or .org, and it can for purposes of secure Web browsing.
block the data flow on the network if it contains
any keyword defined by the filtering rule. For Limits
instance, a person who is administering firewall- Although firewalling is an essential protection
ing can prepare a list of Web sites that users are method of cybersecurity, it does not guarantee full
not allowed to access. Apart from limiting access protection from cyberattacks. Firewalls cannot
to dangerous or malicious Web sites, a company prevent the transfer of malicious codes or pro-
can block its workers’ access to social network- grams. For example, if the access to a certain Web
ing sites such as Facebook, Twitter, LinkedIn, or site embedded with malware is allowed according
YouTube in order to prevent workers from wast- to the filtering rule, users can load the malware
ing their time. to their computers by unintentionally accessing
Similarly, a list of keywords or phrases can be this Web site. Second, hackers can masquerade
prepared as part of a firewall filtering rule in order as trusted users of a network secured by a fire-
to block access to Web sites containing those key- wall, and can bypass firewalling using the login
words or phrases. Thus, users’ access to harmful names and passwords belonging to trusted users.
or unwanted Web sites can be prevented. Users Third, firewalling controls data flow, but it does
can only see a message delivered by the firewall at not encrypt the data flowing through the firewall.
their Web browser saying that the Web site that Therefore, there is always the risk of compromis-
they are trying to access is blocked by a firewall. ing the crucial and confidential information sent
By this process, there is no available exposure over the firewall to the outside or sent between
514 Fiscal Cliff Crisis

the computers of a local network secured by a in part because of several Bush-era tax cuts and
firewall. Fourth, firewalls are configured accord- many other tax provisions. In order to prevent
ing to the filtering rules defined by trained users. the fiscal cliff crisis from happening, President
If there is a problem in configuration, then there Barack Obama and the U.S. government came up
is a problem with security. Last, the failure of a with plans to help the United States survive the
user in the network can threaten everybody in crisis. However, President Obama and Congress
the network, even if the network is protected by struggled to reach a compromise on this conten-
a firewall. tious issue.
In light of the escalating use of all forms of At the end of 2012, intense debate and media
online and social media platforms in virtually coverage about the fiscal cliff crisis drew public
every aspect of both candidate and issue-oriented attention throughout the country. The media paid
politics, the limits of firewalls suggest an entirely close attention to this battle. President Obama uti-
new type of threat to citizen privacy. These little- lized social media to propagate his fiscal cliff plan
known and often misunderstood limitations on the and drum up support from people. He called on
protections offered by firewalling combine with Americans to use social media to pressure Con-
overt tagging and tracking behaviors to further gress and support his plan. On Obama’s Facebook
erode citizen privacy, unwittingly increasing the page, there was the quote: “When the American
risk of malicious and/or destructive consequences people speak loudly enough, lo and behold, Con-
of participating in digital age engagements. gress listens.” This was what he had said earlier
at the White House in front of television cameras
Hakan Aydogan and a select group of middle-class taxpayers.
Rutgers, The State University of New Jersey In addition, Narwhal, an Internet marketing
system, was used by Obama to help shape the pub-
See Also: Deep Packet Inspection; FinFisher; Great lic debate over fiscal cliff negotiation. It was used
Firewall of China; Keystroke Logging; 100Reporters to coordinate e-mail lists, social media research,
Whistleblower Alley. and old-fashioned campaigning. President Obama
made full use of his campaign Web site, Obama
Further Readings for America, to send supporters e-mails that pro-
Regan, Priscilla M. Legislating Privacy: Technology, moted his stance on the fiscal cliff and encourage
Social Values, and Public Policy. Chapel Hill: recipients to spread the message. This e-mail listed
University of North Carolina Press, 1995. Obama’s fiscal cliff proposal: extending tax cuts
Stewart, James Michael. Network Security Firewalls for 98 percent of Americans and 97 percent of
and VPNs. Sudbury, MA: Jones & Bartlett small businesses, ending the tax cuts for the top 2
Learning, 2011. percent of Americans, and enacting more than $3
Whitman, Michael E. and Herbert J. Mattord. trillion in cuts. Obama emphasized that his plan
Principles of Information Security. 4th ed. Boston: concerned “what is the best for the middle class.”
Course Technology, 2012. The e-mail declared, “The president is fighting for
you,” and, “Your voice and action helped reelect
President Obama.”
Moreover, a series of infographics that illus-
trated Obama’s argument were displayed on the
Fiscal Cliff Crisis Obama for America Web site with large “share”
buttons, which people could click to “spread the
The fiscal cliff crisis refers to a series of policies word on Facebook and Twitter.”
in January 2013 that might have resulted in tax In a survey that the Obama for America cam-
increases and government spending cuts. The fis- paign conducted among its volunteers after the
cal cliff would have led the United States toward election, nearly 80 percent indicated that they
a mild economic recession and higher unemploy- would keep volunteering, especially around the
ment. It was named by Ben Bernanke, former Fed- president’s legislative agenda, so the administra-
eral Reserve Board chairman. This crisis occurred tion attempted to follow up on this promise and
Fiscal Cliff Crisis 515

on social media. The analysis about “what peo-


ple were saying and how they were expressing
their political opinions about the fiscal cliff and
the negotiation on Twitter” revealed that 22 per-
cent of the conversation mentioned the fiscal cliff
through jokes and wordplay, and 24 percent of
the social opinions were “based on strong nega-
tive emotions, including anger, disappointment,
and fear.” In 18 percent of the conversation, social
media users discussed their opinions about “who
had the right ideas about the country’s fiscal and
tax situation, and who is to blame for the failure
to meet the midnight deadline.” Emotions took
over during the fiscal cliff negotiation on social
media. Fiscal cliff even topped the list of words
that people wanted to ban in 2012 because it was
President Barack Obama writing a tweet beside Twitter overused by media outlets.
cofounder Jack Dorsey during the first Twitter Town Hall at the Ali Velshi, a CNN anchor, used the word
White House on July 6, 2011. President Obama later held Twitter embarrassment to describe the fiscal cliff negotia-
sessions in 2012 to built support during the fiscal cliff crisis. tion. This battle was well publicized throughout
the world. The coverage in foreign media not only
critiqued this crisis, but also viewed this crisis as a
sign of American decline. Although the fiscal cliff
keep supporters engaged through social media did not occur, and the U.S. Senate, U.S. House of
and other methods. Representatives, and President Barack Obama had
In a speech, Obama urged people to send a tweet achieved the consensus, the debt ceiling was not
to their congressmen to express their favor for his changed, and the budget sequestration was only
middle-class tax cuts plan. Later, in December delayed, which might bring more problems and
2012, Obama participated in a brief Twitter ques- debate in the future. President Obama received
tion-and-answer session. The keyword or hashtag his class-warfare trophy in this battle because his
for this session was My2K, which stood for “my social media weapons were powerful, but the fis-
$2,000.” This was the average amount of money cal cliff was just one battle in a long war.
that most people would have to pay if Bush-era
tax cuts policy expired. The My2K campaign per- Narissra Maria Punyanunt-Carter
sonalized a complicated fiscal debate. More than Iris Shuang Xia
a quarter of a million people used the hashtag and Texas Tech University
addressed their concern. Obama picked up eight
tweets to answer, such as the question: “What is See Also: Campaigns, 2012; Political Information
your opposition to taking away deductions for Opportunity Structures; Political Parties; Taxes.
the 2 percent rather than up the rate? Seems like a
reasonable compromise.” Most of the tweets and Further Readings
Obama’s answers reinforce his position on taxes Bomboy, S. “Obama’s Social Media Machine
and address concerns about losing tax deductions Focused on Fiscal Cliff.” Constitution Daily
in fiscal cliff negotiations. (November 23, 2012).
However, Obama’s use of social media as his Fisher, M. “The World Is Baffled by the ‘Fiscal Cliff,’
public relations machine was called into ques- See It as a Sign of American Decline.” Washington
tion. From people’s comments and opinions in Post (January 2, 2013).
social media, the fiscal cliff deadlock jeopardized Parsons, C. and L. Mascaro. “Obama Takes ‘Fiscal
people’s faith toward the government. Some news Cliff’ Battle to Social Media.” Los Angeles Times
reports pointed out the angry tone of many posts (November 28, 2012).
516 Flaming

Flaming appropriate turn taking. In a nonflaming interac-


tion, individuals almost naturally take turns talk-
Internet flaming is a phenomenon that has ing or exchanging messages. When one person
evolved with the emergence of the Internet in monopolizes the talk floor, the interaction loses
society’s communication. It is thought that the its balance. When imbalance is present regarding
term flaming first appeared in 1983 in the Hack- talk-floor regulation, individuals tend to feel less
ers Dictionary. It was defined as rapid and inces- satisfied with the interaction. Flamers appear to be
sant tangential communication, or speaking less aware of the social cues or are uninterested in
ridiculously. As the Internet’s presence grew, so responding to them.
did the scope of the behaviors considered as flam- The last noteworthy characteristic of flaming
ing. In general terms, flaming is deliberate, com- messages is the lack of civility that the interaction
puter-mediated messages that have the intent of creates. Communication creates and builds rela-
insulting an individual or group. Flaming is pro- tionships, as well as reshapes and destroys them.
vocative communication that is not intended to Flaming does not seek to build community. Flam-
be conversational. As the Internet has expanded ing thrives on negativity.
over the years and the use of technology has
increased, so has flaming. Flaming can be found Motivation and Types
on newsgroups, mailing lists, forums, text mes- The motivation behind flaming is unclear. Individ-
sages, Web sites, and other forms of mediated uals write flaming messages for various reasons;
communication. There are said to be several sometimes, flaming is the result of the degeneration
characteristics and types of flaming. of an emotionally charged topic. As in face-to-face
interactions, new members to Internet communi-
Characteristics ties can be hazed into the group via flaming. Some-
When thinking of flaming, the dominant feature times, a person is trying to get attention or pro-
is the strong emotional basis of the messages, voke angry responses from others, which is called
including their aggressive nature. Messages are trolling. Flame trolling occurs when one person
repetitive and usually insulting to the target. posts a particularly offensive and aggressive mes-
The tone of the messages is hostile. Scholars M. sage targeted at enraging a group. The initial mes-
Parks and K. Floyd, in 1996, described flaming sage that a troll posts is referred to as flame bait.
as “verbal aggression, blunt disclosure and non- The purpose of this message is to cause an intense
conforming behavior.” Because flaming is non- reaction among the targeted group members. It is
conforming behavior, it breaks the normative thought that the intention of trolls is to disrupt the
rules of discourse including appropriate use of group’s harmony and sense of civility.
language, expression of emotion, self-control, Trolls can often, but not always, start what is
turn-taking behaviors in regulating conversa- referred to as a flame war. When trolls are suc-
tion, and civility. cessful in creating discord, often infighting among
Flamers, or authors of flaming messages, often group members will emerge. Flaming is a particu-
feel uninhibited, and this allows them to use coarse larly destructive element in social media and online
and often profane language. Flamers exhibit hos- political discourse because it tends to polarize
tile emotions that are often expressed in great participants and/or shut down meaningful con-
intensity. Feelings are communicated unedited and versation altogether by belittling opposing opin-
unfiltered. Because of the emotionally charged ions and destroying the environment of respect
exchanges, flamers appear to lack self-control. required for mature political disagreement.
Communicative episodes are no longer conversa-
tional in tone. Diane M. Monahan
The original definition of flaming in 1983 makes Saint Leo University
mention of the tangential nature that flaming can
possess; this tangential nature marks the lack of See Also: Chat Rooms; Evolution of Social Media;
self-control to regulate interactions. An important FightTheSmears.com; Online Smear Campaigns;
aspect of healthy and effective communication is Writers and Social Media in Politics.
Flash Mobs as a Political Tactic 517

Further Readings unfair labor practices are just as commonplace


“The Art of Flaming.” Netiquette. http://www as those that sell a product. An example of a
.albion.com/bookNetiquette/0963702513p71.html political flash mob involved the retailer Target.
(Accessed January 2013). In 2010, Target came under attack when it was
Parks, M. and K. Floyd. “Making Friends in revealed that because of a Supreme Court deci-
Cyberspace.” Journal of Communication, sion known as Citizens United that allowed for
v.46/1 (1996). unregulated political spending by corporations,
Yale University Library. “The Phenomenon of the company donated $150,000 to an antigay
Flaming.” http://www.library.yale.edu/training/ and anti-labor-rights candidate for the state of
netiquette/flames.html (Accessed January 2013). Minnesota. Funded by the political action group
MoveOn.org, a flash mob converged on a Target
store, singing and dancing to the Depeche Mode–
inspired song “Target Ain’t People.”
Commercial advertisements that incorporate
Flash Mobs as a the use of flash mobs to promote their products
are increasing. A notable example involves the
Political Tactic T-Mobile dance, filmed at London’s Liverpool
Street subway station in the United Kingdom.
Flash mobs are a recent global, social phenom- A brainchild of the advertising firm Saatchi &
enon that involves the aggregation of people in a Saatchi, the T-Mobile dance flash mob was per-
predetermined public space for a brief period of formed by thousands of people at 11:00 a.m. on
time in order to commit a performative act that January 15, 2009, accompanied by a medley of
can include dancing, singing, or even nonsensical songs. Initially, a single male began dancing to
activities. the song “Shout” in the middle of the subway
Derived from smart mobs, wherein artists per- station. He was quickly joined by a few more
form to publicize their work or a particular cause individuals, and the number of dancers grew
they support, flash mobs are similarly intended to exponentially as bystanders appeared to sponta-
capture public attention and are typically enacted neously join in the dance for the duration of the
in nontraditional venues. The dependence of flash two-minute and 41-second advertisement. At its
mobs on social media and mobile technologies is peak, thousands of people of all ages actively par-
apparent because these events are predominantly took in the dance and significantly outnumbered
organized through various social media platforms the onlookers before quickly dispersing as the
and mobile devices, some in a very spontaneous music ended. The advertisement for T-Mobile, a
manner. In many instances, flash mobs are video European-based mobile communication service
recorded and posted online for posterity. provider, was subsequently shown on television
While some believe these acts to be random, and uploaded to YouTube.
many of the choreographed spectacles suggest As P. S. Grant, A. Bal, and M. Parent suggest,
that they have been previously rehearsed. Accord- flash mobs enhance connectedness, positive emo-
ing to Georgiana Gore, the first flash mob took tions, consumer arousal, and consumer-to-con-
place on June 2003 inside of Macy’s department sumer interaction. The popularity of T-Mobile’s
store in New York City. Organized by the senior advertisement should come as no surprise; as
editor of Harper’s Bazaar fashion magazine, the evidenced by well over 36 million views on You-
event consisted of more than 100 people gather- Tube, the T-Mobile dance clearly exhibits both
ing for 10 minutes around a carpet, which sold the cleverness of the advertisement and the appeal
for approximately $10,000, and before quickly of flash mobs.
dispersing, discussing among themselves and with Law enforcement officials are fairly unani-
the salespeople purchasing of the “love rug” for mous in their opposition to flash mobs, which
use at their free-love commune. is typical of the reaction other youth-inspired
Flash mobs range from the politically charged movements have elicited in the past. Appear-
to the commercial. Flash mobs that denounce ing disinterested in differentiating between flash
518 Flash Mobs as a Political Tactic

An example of a flash mob organized for political purposes on October 12, 2012. This group came together to dance in Dupont Circle in
Washington, D.C., as one of at least 19 simultaneous Dance for Obama flash mobs that gathered that day to support the 2012 Obama
presidential election campaign. Photographers then posted photos of the event like this one on the photo-sharing site Flickr.

mobs and flash robs—organized criminal acts of political purposes. As such, the political use of
shoplifting, stealing, and robbing both businesses flash mobs is equally well documented. In Janu-
and individuals that are perpetrated by groups of ary 2012, more than 250 Israeli women partici-
criminals—the language and descriptors used by pated in a flash mob to protest the segregation of
law enforcement officials to describe spectacles women in public spaces, taking over the Old Beit
of flash mobs include the newest crime wave, Shemesh city square and dancing to “Don’t Stop
criminal flash mobs, the dangers of flash mobs, Me Now” by the rock group Queen. Another
a concern for law enforcement agencies and local widely publicized flash mob occurred during the
governments. 2012 U.S. presidential election. Dance for Obama
In fact, partly as a response to the recent flash mobs spread across 19 cities on October 12,
increase in flash robs, law enforcement leaders 2012, when at exactly 3 p.m. Eastern Standard
are now using social media and communication time, supporters participated in a choreographed
technologies to respond to criminal activities and dance with music that incorporated the presi-
help assist in preventing crimes in their respec- dent’s campaign logo, “Forward.”
tive communities. Perhaps the response by law As these many examples illustrate, flash mobs
enforcement to flash mobs should not be surpris- are creative and energetic, bringing people
ing. As Tom Vanderbilt suggests, authorities and together to express political passions and protest
elites have had a longstanding distrust of crowds or to enjoy a comedic or farcical moment in pub-
and often equate these gatherings with panics lic spaces.
and other irrational behaviors.
However, most important is the understand- Rhon Teruelle
ing that flash mobs are meant to be nonviolent Leslie Regan Shade
spectacles that create publicity and awareness for University of Toronto
Fleming, John 519

See Also: Activists and Activism, Digital; Avaaz; graduating in 1973 with a B.S. degree. From early
Mobile/Smartphone Messaging; Social Media, childhood, Fleming had an interest in medicine.
Adoption of; Web Mapping and Online Politics. His grandmother was a hospital nurse who told
him stories from her nursing work. The stories
Further Readings were exciting and gave him a desire to learn medi-
Gore, G. “Flash Mob Dance and the Territorialisation cine. His questions to her and others were scien-
of Urban Movement.” Anthropological tific questions, such as why patients bled and how
Notebooks, v.16/3 (2010). doctors stopped the bleeding.
Grant, P. S., A. Bal, and M. Parent. “Operatic Flash
Mob. Consumer Arousal, Connectedness and Medical Career
Emotion.” Journal of Consumer Behaviour, Soon after graduating, Fleming entered the Uni-
v.11/3 (2012). versity of Mississippi School of Medicine in Jack-
Nicholson, J. “Flash! Mobs in the Age of Mobile son, Mississippi. In 1976, he was awarded an
Connectivity.” Fibreculture Journal, v.6 (2012). M.D. by the University of Mississippi. Between
http://journal.fibreculture.org/issue6 (Accessed graduation in 1976 and 1982, he served in the
November 2012). Navy Medical Corps as a medical officer. It
Smith, S. “Flash Mobs & Flash Robs: The Law proved a good experience for extending his medi-
Enforcement Response.” Law & Order, cal education.
v.60/4 (2012). Fleming’s medical service in the U.S. Navy
Vanderbilt, T. “Tom Vanderbilt on New-Model began at Camp Pendleton, California, where he
Flash Mobs.” Artforum, v.42/10 (2004). was the chief resident in family medicine. He also
Walker, R. A. “Badgering Big Brother: Spectacle, trained in drug and alcohol treatment at the Navy
Surveillance, and Politics in the Flash Mob.” Regional Medical Center at Long Beach, Califor-
Liminalities, v.7/2 (2011). http://liminalities nia. He then practiced military family medicine in
.net/7-2/flashmob.pdf (Accessed August 2012). Guam. Between 1979 and 1981, he served as the
chairman of the Navy’s Family Advocacy Com-
mittee. He also was the director of drug and alco-
hol treatment. Transferred to Charleston, South
Carolina, he performed similar duties in drug and
Fleming, John alcohol abuse treatment.
In 1978, John married Cynthia Bishop “Cindy”
Congressman John Fleming M.D. is a family phy- Fleming, with whom he had four children. All
sician from Minden, Louisiana. He is the repre- are now adults, and the couple has two grand-
sentative to the U.S. House of Representatives children. Cindy is associated with several family
from Louisiana’s Fourth Congressional District. businesses, including Bishop Properties, Fleming
The Fourth District covers much of northwestern Subway Restaurants, Fleming Postal Services,
Louisiana from Shreveport to Kinder, with the Fleming Franchise Development, Fleming Salons
Texas border at its western edge. Development, Fleming Dating Development, and
John Calvin Fleming, Jr., was born July 5, 1951, Fleming Leasing.
in Meridian, Mississippi. He grew up in a poor, After completing his service in the Navy, Flem-
working-class home in Lauderdale County. The ing moved to Minden, Louisiana, in 1982, where
family has deep American roots, which enabled he established his medical practice. The American
him to join the Sons of the American Revolution Board of Family Practice awarded him certifica-
and the Jamestowne Society. tion. He joined the staff of Minden Medical Cen-
While he was still quite young, his mother ter and the Louisiana Academy of Family Phy-
became disabled and was unable to work. His sicians. In the Minden Medical Center, Fleming
father died of a heart attack shortly before he worked with chemically dependent people in the
graduated from high school. Without family sup- New Beginnings program.
port, he had to work his way through college. He In 2006, Fleming published his book, Pre-
attended the University of Mississippi in Oxford, venting Addiction: What Parents Must Know to
520 Fleming, John

Immunize Their Kids Against Drug and Alcohol election that followed were delayed because of
Addiction. It discusses the progressive and incur- Hurricane Gustav. When the primary was held on
able nature of addiction. He offers hope that October 4, 2008, Fleming led with 14,500 votes
addiction can be treated, but recovery rates are (35.1 percent) over Jeff R. Thompson, a lawyer
very low, he concludes. So, prevention is the best from Bossier City, who had 12,693 votes (30.8
insurance against a life of drug addiction and its percent); and Chris Gorman, who got 14,072
associated family misery. Much of the focus of the votes (34.1 percent). The runoff primary election
book is on children and how to help them avoid was held at the same time as the national election
drug abuse. In 2007, he was named Louisiana on November 2, 2008, in which President Barack
Family Practice Physician of the Year by the Loui- Obama was elected.
siana Academy of Family Physicians. Fleming won the runoff election. His vote total
In addition to his medical practice, he has been was 43,012 votes (55.6 percent) to Gorman’s
involved with several nonmedical businesses. 34,405 votes (44.4 percent). His victory was solid
These businesses employ more than 500 people. because he carried 12 of the 13 parishes in the
Among his businesses are 33 Subway sandwich Fourth District.
shops, which are located in northern Louisiana. Managing Fleming’s campaign for the House of
He also owns Fleming Expansions LLC, which is Representatives seat was Dewey Lee Fletcher Jr.
a regional developer focused on building for the (1966–2009), a well-known political consultant.
UPS Store. An incident in one of Fleming’s Sub- He used a talk show host and blogger in nearby
way shops brought the accusation that a Muslim Monroe, Louisiana. He had previously been the
couple was refused service because of their reli- chief of staff for Congressman John Cooksey of
gion. A review of the surveillance tapes proved the Louisiana Fifth Congressional District.
the accusation to be false. The disruption caused by Hurricane Gustav in
Dr. Fleming is a member of the First Baptist late August and early September 2008 delayed
Church of Minden. He has served there as a dea- the campaign for the general election for the
con, Sunday school teacher, and school depart- House seat until December. This gave Fleming
ment director. time to receive support from powerful sources.
The Webster Parish Coroner Office is located Medical lobbying groups supported his cam-
in Minden, Louisiana. Between 1996 and 2000, paign. These included the Louisiana Academy
Fleming served as the Webster Parish coroner. It of Family Physicians and the American Academy
is an elective office. He had entered the race for of Family Physicians’ political action committee.
the coroner’s office in 1987 against incumbent Dr. In addition, Vice President Dick Cheney came
Charles Hancock. However, Fleming withdrew to Shreveport to support Fleming’s campaign by
when he found that it would require too much speaking at a fundraiser. On December 2, out-
time away from his medical practice. In 1995, going Congressman McCrery spoke in favor of
Dr. Carl A. Hines, the incumbent Webster Parish Fleming when he appeared on the Moon Griffon
coroner and a local Minden Democrat, decided Show radio program, syndicated across many
not to seek re-election. Fleming, running as a Louisiana media markets.
Republican, defeated Dr. Carlos A. Irizarry, who Campaign arguments used included the claim
was running as a nonpartisan. Fleming garnered that, if Fleming’s opponent won, his first vote
7,842 votes (60.6 percent) to 5,143 votes (39.6 would be for Nancy Pelosi (D-CA) to be speaker of
percent) for Irizarry. the House of Representatives. Fleming supported
the fair tax idea as a replacement for income tax.
House of Representatives The fair tax would raise revenue on consump-
In 2008, Fleming learned that Jim McCrery, the tion, with a top level of 23 percent. Overall, he
Louisiana Fourth District Representative to the sought a sound economic policy, sound energy
U.S. House of Representatives, announced his policy, and reduced taxes while upholding the
retirement. McCrery had held the seat for 21 U.S. Constitution.
years. Fleming entered the Republican primary, a In the general election held on December 6,
closed primary. Both the primary and the runoff 2008, Fleming defeated Democratic candidate
Fleming, John 521

Paul J. Carmouche. His concession statement was U.S. Navy and Marine Corps aviation programs
not delivered until December 10, 2008, because and the U.S. National Guard, Army, Air Force,
the race was close. Fleming received 44,141 votes and Marine Corps Reserve modernization and
(47.69 percent), and Carmouche polled 44,141 ammunition programs. He is also a member of
votes (47.69 percent), while two other candi- the Subcommittee on Strategic Forces with juris-
dates, Chester T. “Catfish” Kelly and Gerard J. diction over strategic weapons, space programs,
Bowen of Bossier City, received 3,245 votes and ballistic missile defense, national intelligence pro-
675 votes, respectively. The final tally gave Flem- grams, and Department of Energy national secu-
ing a district-wide margin of 356 votes. The vic- rity programs.
tory made Fleming the second Republican to be The House Committee on Natural Resources
elected in the district since Reconstruction. handles legislation about American energy, min-
In 2010, Fleming ran unopposed in the eral lands, mining, fisheries, wildlife, public lands,
Republican primary. In the general election, he and more. It is divided into five subcommit-
was opposed by the Democrat Party candidate, tees. Fleming is chairman of the House Natural
David R. Melville, a United Methodist minister Resources Subcommittee on Fisheries, Wildlife,
from Bossier City. Reverend Melville’s brother- Oceans, and Insular Affairs. This subcommittee
in-law is former Louisiana Governor Buddy is responsible for all issues pertaining to wildlife
Roemer. The independent candidate in the race resources, fisheries, oceanography, and insular
was a community organizer from Shreveport, areas. The insular areas of the United States are
Artis Cash. When the votes were counted, Flem- its island territories. Having served in Guam with
ing won re-election with 62.3 percent of the vote, the U.S. Navy, Dr. Fleming is well qualified to
while Melville won 32.4 percent, and Cash 5.3 encourage legislation benefiting the people as well
percent. Fleming, as a physician, ran strongly as insular matters of interest to the Navy as well
opposed to Obamacare. He promised voters that as to the people of the islands. The Subcommittee
he would work to repeal the Patient Protection on Fisheries, Wildlife, Oceans, and Insular Affairs
and Affordable Care Act. uses social media, including Facebook, Twitter,
Fleming won the 2012 race on November 6, YouTube, and e-mail.
2012. He had no opposition in the Republican Of importance to an oil and gas-producing state
Party primary, and in the general election was is Fleming’s assignment to the Subcommittee on
opposed by a Libertarian Party nominee, Randall Energy and Mineral Resources. This subcommittee
Lord of Shreveport, a former chiropractor and a has legislative jurisdiction over energy and mineral
psychology student at Louisiana State University. resources located on lands and waters owned or
Fleming carried the district with 187,790 votes managed by the federal government, including oil
(75.3 percent) to Lord’s 61,587 (24.7 percent). and gas leasing on lands in northwest Louisiana
and the outer continental shelf. In addition, the
Committees subcommittee is responsible for the supervision of
The standing committees are the little legislatures the government’s collection of energy and mineral
of Congress. They deal with permanent issues royalties. It also uses social media.
that the nation faces, from agriculture to defense.
Assignments are very important to members of Social Media
Congress and to their constituents. Fleming has Social media usage is a growing edge in Fleming’s
been assigned to the House Armed Services Com- political work. He uses his official congressional
mittee and the House Committee on Natural Web page (http://fleming.house.gov) as a base. It
Resources. has links to Facebook, Pinterest, Twitter, Linke-
Fleming is assigned to two of the subcommit- dIn, Digg, Tumblr, Reddit, and Stumbleupon.
tees of the Armed Services Committee. The Sub- Individual icons allow a visitor to use Really
committee on Tactical Air and Land Forces has Simple Syndication (RSS), YouTube, Flicker, and
jurisdiction over the majority of U.S. Army, Air Facebook. All of these links enable people join
Force, and Marine Corps acquisition programs. with Fleming, inform him of their views, and sup-
In addition, the subcommittee is responsible for port him in his legislative work. There is a search
522 Flickr

function for the Web site as well as a search func- Mergel, Ines and Bill Greeves. Social Media in
tion for legislation and e-mail contact. Another the Public Sector Field Guide: Designing and
link is to a news room. Beside it is a link to blogs, Implementing Strategies and Policies. Hoboken,
which is inactive. The news room link leads to NJ: John Wiley & Sons, 2012.
both news items and to blogs. E-mail is also avail- O’Brien, Barbara. Blogging America: Political
able. Photos and videos are also available via Discourse in a Digital Nation. Portland, OR:
links on the page. Franklin, Beedle, 2004.
Fleming’s official campaign Web page (http://
flemingforla.com) is also filled with social media
links. Besides e-mail and Twitter, Fleming’s cam-
paign Web page uses a survey link and invites
visitors to sign up to take action by volunteer- Flickr
ing, donating, getting information on events, and
e-mailing. There are videos available, and there Flickr is a photo-sharing Web site that was devel-
are news and issues links. oped and launched in 2004 by Caterina Fake and
Stewart Butterfield. Users upload photographs
Andrew J. Waskey that can then be privately or publicly shared. The
Dalton State College site was one of the early and important social
media and social networking sources. Users posted
See Also: Bachman, Michelle; Campaigns, photographs of major environmental disasters
Congressional (2010); Candidate Image; Forbes, and other public events to the site. In 2011, Flickr
J. Randy; Pence, Mike. announced that 6 billion photographs had been
uploaded since its founding. In recent years, other
Further Readings social networking platforms have also integrated
Aaker, Jennifer and Andy Smith. The Dragonfly photo sharing, providing competition to Flickr.
Effect: Quick, Effective, and Powerful Ways to Use The site was originally included as part of a
Social Media to Drive Social Change. Hoboken, massively multiplayer online role-playing game
NJ: John Wiley & Sons, 2010. (MMORG) that founders Fake and Butterfield
Bamberger, Joanne C. PunditMom’s Mothers of created, called Game Neverending. It was devel-
Intention: How Women & Social Media Are oped by Ludicorp in Vancouver, British Colum-
Revolutionizing Politics in America. Houston, TX: bia, Canada. They hoped that allowing game
Bright Sky, 2011. users to upload photographs would make the
Brander, Michael N. Social Media Use in the game more popular and raise money. The year
Federal Government. Hauppauge, NY: Nova of its development, 2002, was a difficult time for
Science, 2012. raising money in the technology industry. Fake
Davis, Aeron. Political Communication and Social states that they did no research on photo sharing,
Theory. London: Taylor & Francis, 2010. but benefitted from the simultaneous popularity
Davis, Richard. Typing Politics: The Role of Blogs in of camera phones. The first photograph on Flickr
American Politics. New York: Oxford University was a photo of Caterina Fake’s dog.
Press, 2009. Flickr was launched in February 2004 and
Fleming, John C. Preventing Addiction: What Parents started taking off later that year. The developers
Must Know to Immunize Their Kids Against intended the site to be a money-making venture.
Drug and Alcohol Addiction. Rockwall, TX: It was initially an instant message site, but vari-
CrossHouse, 2006. ous elements were added over the course of six
Gerbaudo, Paolo. Tweets and the Streets: Social months, including tagging, open APIs, Web 2.0,
Media and Contemporary Activism. London: gadgets, and the ability to blog posted photos. In
Pluto, 2012. 2005, Flickr was purchased by Yahoo! Inc. The
Gladwell, Malcolm. The Tipping Point: How Little site is free and supported by advertising, but also
Things Can Make a Big Difference. Boston: Little, has professional-level accounts for pay. Users
Brown, 2002. create accounts and now must use their Yahoo!
Flickr 523

login IDs to upload digital photographs to the


Web site. They create tags for each of their pho-
tographs. Photos are collected in sets, rather than
in albums.
Flickr was one of the first photo-sharing sites
where people could upload photographs in near
real time so that photographs of current events
and political and social activism might be shared
worldwide.
The new media scholar Clay Shirky devotes a
portion of his book Here Comes Everybody: The
Power of Organizing Without Organizations to
discussing the power of Flickr as a photo-sharing
Web site. He argues that it creates the possibil-
ity for people to connect horizontally, without
a top-down organizational structure. Because
users choose how to “tag the photographs they
upload, thereby creating entire categories of top-
ics that multiple users’ photographs will inhabit;
the structure of the site is an important change in
how organizing occurs. Older photo-sharing Web
sites such as Snapfish do not offer tagging, and
thus do not create aggregates of multiple users.
In its early years, Flickr served to make near
real-time photographs of important events avail- This photo from Flickr shows a man surveying damage from the
able to the public before traditional media out- 2004 Indian Ocean tsunami among ruined houses and flooded
lets could publish accounts of the events. On land in Aceh, Indonesia, on January 5, 2005.
December 26, 2004, dozens of photographs of
the Indian Ocean tsunami were posted to Flickr.
The tsunami was caused by the 9.0 Sumatra–
Andaman earthquake off Sumatra, Indonesia, under the London Bomb Blasts Community pool
and more than 150,000 people were missing or with tens of tags such as london77 (referencing
killed within the first day. Shirky says that the the July 7 date) or londonbombings.
way these photos were purposed illustrates that The Library of Congress has maintained
publicly sharing photographs through Flickr a Flickr site since 2007. It does so in order to
takes on multiple uses. They become a way to broaden the audience for its collection of pho-
share information with those affected and the tographs. The library shares photographs that
broader public—about missing people, available are high quality, that do not have restrictions
resources, damaged areas, as well as the overall placed on viewing, to gain additional identifying
impact of the disaster. Flickr is cross-embedded information on individual photographs from the
in other social media platforms such as blogging, public.
which also shares information more quickly than Although Flickr continues to be used as a
mass media outlets. photo-sharing site, its popularity has decreased as
Shirky notes that the July 7, 2005, London the social networking Web site Facebook has inte-
bombings of public transportation were captured grated photo sharing and as mobile phones have
by cell phone cameras and uploaded to Flickr. become more widely used. Facebook has a built-
Three underground (subway) trains and one bus in option for taking and uploading photographs,
were hit by bombs placed by four British men who and reports that its users upload more than 100
were members of fundamentalist Islamic groups. million photographs a day. Instagram is a mobile
The photos related to this event are aggregated phone application that allows users to apply
524 Flog

different filters to photographs to change the hue, A Flog might promote a spoof or parody or
shading, and tone of photos, and was purchased serve as a marketing tool, or it might have a larger
by Facebook in 2012. In 2012, a writer for the purpose to mislead others. Generally speaking,
technology blog Gizmodo questioned whether a flog is a blog pretending to be something that
Flickr might be dead. However, it continues to it is not. Some flogs focus on positive product
serve as an archive for larger sets of photographs reviews for companies. These flogs usually rave
and as a site for professionals to pay to host pho- about new products that do not warrant positive
tographs in large quantities. reviews and cause consumers to waste time and
money on products that do not work as intended.
Deborah Gambs Some flogs choose to use actual people’s names as
City University of New York pseudonyms to make the content more believable.
Some flogs are health related and focus on sup-
See Also: Aggregation; Disaster Relief; Facebook; plements, procedures, or other health enhance-
Infographic; Peer to Peer; Picasa; Web 2.0. ments that others could adopt to enhance their
lives. These flogs adopt astroturfing messages,
Further Readings which are public relations tactics through which
Davis, Harold. “Harnessing the Power of Flickr.” the real sponsor of the flog is not identified and
Photo.net (June 2011). http://photo.net/column/ the “blogger” appears generally disinterested in
harolddavis/finding-an-audience-for-your the content. Health-related flogs give testimonials
-photography/using-flickr-for-marketing (Accessed to the powers of supplements or procedures. They
January 2013). may even have fake comments asking if the asser-
“Flickr Commons Marks 5-Year Anniversary With tions are true, to which another “visitor” would
Galleries of Most-Viewed Pics.” DPreview be able to add his or her experience to the con-
(January 2013). http://www.dpreview.com/ versation. Assuming the identity of a competitor
news/2013/01/17/flickr-commons-celebrates to create a flog is also a form of brandjacking. An
(Accessed January 2013). example would be creating a flog for a political
Shirky, Clay. Here Comes Everybody: The Power of opponent and posting lewd pictures or posts to
Organizing Without Organizations. New York: mar the candidate’s brand.
Penguin Press, 2008. Flogs may have many posts, but a sure sign of
a flog is the one-post blog. Sites with no contact
info should be looked at with a critical eye. The
flogger may not spend much time customizing the
page, using standard templates with no person-
Flog alization. Fake blogs could also have viruses or
other malware.
A flog, or fake blog, may have the same interface
as a credible blog, but this blog’s purpose and its Legal and Ethical Implications
author(s) are usually dissimilar. The purposes of In the case of public relations, flogging violates
flogs range from promoting a product to discred- the tenets of the professional code set by the
iting a person or company. The authors of flogs Public Relations Society of America. As a profes-
might range from a company, marketing agency, sional standards advisory the group reminds its
public relations agency, or individuals who seek members that “open communication is essential
to discredit others. Flogs usually look like legiti- for informed decision-making in a democratic
mate blogs, but they might be registered to a ser- society.” Blogs promoting or endorsing a prod-
vice (discoverable through Whois), which hides uct are also subject to Federal Trade Commission
the domain owner. Sometimes, these flogs are mandates on disclosing whether or not they were
discovered and made accountable by actual blog- paid for their endorsements. Violating the terms
gers on the Web. When these flogs are found to of service from the hosting agent (like Google
be fraudulent, bloggers oust them on their social for Blogger and Blogspot) could result in suspen-
media platforms. sion of service. Google’s terms of service (as of
Flog 525

November 2012) state that the company may or campaign could be motivating factors for other
review content to determine if it violates Google kinds of fake political Web sites, or decoy sites,
policies or is illegal. possibly even operated by an opponent’s camp.
Free blog systems, which require no knowledge of
Famous Flogs coding, make it easier for someone with no Web
In 2008, an ad agency created a flog for Walmart skills to create a fake political Web site. For can-
titled Walmarting Across America. This flog high- didates, monitoring the digital landscape for such
lighted the pseudo adventures of a couple (Laura sites is necessary for reputation management.
and Jim), capturing stories about Walmart as they Political flogs and fake Web sites of national,
traveled across America in their recreational vehi- state, and local campaigns have long been popu-
cle. These “adventures” were actually created by lar on the Internet. The first famous fake Web
the company, and the real Laura and Jim never site in a national campaign appeared in 1996
actually left home. Laura was a freelance writer when Bob Dole ran for president. During his
hired by a public relations firm to create the flog, campaign, a Bob Dole Web site emerged dur-
and Jim was a photographer for the Washington ing his presidential bid. This was one of the first
Post. This flog was criticized for its lack of disclo- times that a political campaign had to use public
sure to the public. relations tactics to address a fake site focused on
Other well-known flogs include examples cre- a political candidate.
ated by McDonald’s and Coca-Cola. McDon- After the Bob Dole incident, flog-based Web
ald’s attempted to garner buzz for a French fry sites continue to emerge in various forms. These
that was discovered to have a surprisingly simi- flogs have been used in the political arena to pro-
lar appearance to President Abraham Lincoln’s vide fake information to the public in both candi-
face. Another flog focused on Coca-Cola’s sugar- date and advocacy-based politics.
free brand, Zero. This blog focused on the zero
moments of life and how life might be enhanced Microflogging
by consuming Zero. Flogs were generally created around 2005, but
In June 2011, a fake blog called A Gay Girl in the concept is becoming more popular across new
Damascus made CNN headlines when an Ameri- social media platforms like Twitter and Google+.
can man was found to be blogging as a Syrian– Twitter, a microblogging platform, is attracting
American lesbian. The man posted as “Amina,” a wealth of floggers who create pseudo accounts
and even posted that she had been abducted, start- for people such as President Barack Obama and
ing an international incident. Traditional media Texas Governor Rick Perry. These flogs are creat-
outlets picked up the story about the abducted ing a new movement known as microflogging.
blogger, and the U.S. State Department uncovered
the true identity of the blogger. Jennifer Edwards
Sarah Maben
Flogs and Fake Political Web Sites Tarleton State University
Flogs and fake political Web sites have a similar
aim: deceit. Sites like DemocraticNationalCom- See Also: Anonoblog; Astroturfing; Blogs;
mittee.org or RepublicanNationalCommittee.org Blogosphere; Decoy Campaign Web Sites; Ethics of
were set up by an individual with requests to sup- Social Media in Politics; Splogs; Twitter.
port the “candidate” financially. The sites looked
like an authentic site, complete with images of the Further Readings
presidential candidates. ABC reported that a fuel- Federal Trade Commission. “Federal Trade
truck deliveryman was operating the sites and Commission.” http://www.ftc.gov (Accessed
keeping any “campaign” donations submitted. January 2013).
Fine print disclosed that the site was “not con- Ford, Brian. “Samsung Hired a Marketing Agency
nected with any federal elections.” In this case, to Fake Blog About Its Products.” Newsvine.com
the sites appear to have been created for mone- (August 12, 2012). http://brianford.newsvine
tary gain. Smearing another candidate’s character .com/_news/2012/08/12/13234078-samsung
526 Focus Groups

-hired-a-marketing-agency-to-fake-blog-about-its mirrors to allow concealed observation, kitchens


-products (Accessed January 2013). to prepare new foods for taste-test discussions,
Public Relations Society of America. “Public and media exposure rooms to show films, ads, or
Relations Code of Ethics Professional Standards other media. Participants are usually paid a nomi-
Advisories.” http://www.prsa.org/aboutprsa/ nal incentive stipend for their opinions, and the
ethics/professionalstandardsadvisories (Accessed sessions typically last between 60 and 90 minutes.
January 2013).
Advantages
The primary advantage of focus groups over
other research methods is the emphasis on group
interaction. Because communication is a collab-
Focus Groups orative and social process, researchers can ben-
efit from observing the interaction and commu-
Focus groups are a qualitative research meth- nication occurring among the participants. The
odology in which a small group of participants group discussion can spark thoughts, memories,
are led through a focused group interview about or ideas in the participants, and researchers can
their attitudes, opinions, and perceptions of detect the vernacular language that the interview-
a message, product, service, idea, or concept. ees use to jointly construct a conversation.
Focus groups are used when group discus- Focus groups are considered a more naturalis-
sion might provide unique insights or data that tic approach than one-on-one interviews. Partici-
would not emerge in an individual interview or pants are able to see and test products and mes-
survey. Focus groups are common in advertising sages, and are able to express their opinions in
and message testing, product design and devel- a natural and in-depth manner. The method also
opment, political campaign research, problem allows researchers to probe for additional infor-
identification research, and academic research. mation and ask follow-up questions to clarify a
Robert K. Merton is credited with originating point. Focus groups are flexible and can be con-
the method when testing group reactions to war- ducted more quickly and inexpensively than other
time propaganda and military recruiting materi- forms of market or public opinion research.
als at the Bureau of Applied Social Research at Focus groups are often used early in the research
Columbia University. process to gather preliminary information or to
In a typical focus group, seven to 12 indi- explore gaps in knowledge at the onset of a study.
viduals are led by a single moderator through a They are well suited to identifying problems
series of questions and answers about a product, within organizations or campaigns and to gener-
advertisement, or idea. For example, as part of ate new product or service ideas by studying the
the product development cycle, a restaurant chain inadequacies of current offerings. Focus groups
may conduct a focus group with new menu items are often paired with quantitative surveys to fur-
where consumers can test and discuss a new prod- ther refine the conclusions derived from focus
uct before it is made available to the public. Mod- groups with large numbers of randomly sampled
erators usually work off a common set of ques- participants. In this way, focus groups often serve
tions, but are trained to keep the discussion open, as a source of preliminary data to develop a ques-
natural, and moving. tionnaire. Similarly, focus groups can work in tan-
Focus groups are dependent on a moderator dem with participant observation and individual
creating a permissive, nonthreatening environ- interviews, when appropriate. Furthermore, focus
ment within the group where the participants feel groups may also follow quantitative procedures
comfortable discussing their opinions openly and to help interpret quantitative results and suggest
without ridicule. Moderators may also use inter- avenues of future study.
view techniques such as free association, mind In marketing research, where the technique
mapping, product sorts, and visualization. While is common, focus groups are used to investigate
not a requirement, focus groups are often held in what people buy and why they buy; how con-
special focus group facilitates with double-sided sumers feel about brands, products, or product
Focus Groups 527

categories; and how products and services are focus groups after test drives of a new car model
used. More abstractly, focus groups are used to to see if the seats are comfortable, if the controls
study various lifestyle questions, such as how peo- are easy to use, and if the dashboard is logical.
ple spend their time, what makes people happy,
what are people worried about, and what goals Disadvantages
people have. Because the method is qualitative, There are several disadvantages of focus groups,
focus groups are appropriate for exploring issues and focus groups are susceptible to several exter-
related to memory, emotion, experience, and nal validity threats. The moderator may artifi-
imagery. In addition to examining what people cially influence the discussion, researchers may
think and how they think, focus groups can inves- be biased in their analysis of the group, partici-
tigate why people think the way they do about the pants may vulnerable to social desirability bias
topic. Focus groups are often called group depth and say what they believe the moderator or other
interviews because the method provides rich and participants want to hear, discussions may pro-
detailed insights and understandings of feelings, duce conformity of opinion or group think, and
thoughts, and perceptions. the results from a limited number of groups may
not be generalizable to other contexts. Like other
Political and Legal Focus Groups forms of market and social science research, focus
Focus groups have also become essential tools in groups are dependent on self-reported data, and
political campaigns. Political consultants rely on some topics are not feasible for group discussion.
focus groups to test lines of argument and attack; Among many designers and artists, focus groups
evaluate the effectiveness of speeches, ads, and are seen as antithetical to the artistic process. For
debate responses; and ascertain what voters are example, Steve Jobs, the cofounder, chairman,
looking for in a candidate. Republican pollster and chief executive officer of Apple, famously
Frank Luntz is known for using focus groups to said, “It’s really hard to design products by focus
develop words and phrases that help Republican groups. A lot of times, people don’t know what
candidates frame issues and move public opinion they want until you show it to them.”
to their advantage. Luntz advocates that Repub-
licans use focus group–developed language, such Virtual Focus Groups
as climate change instead of global warming, Virtual focus groups are now commonplace.
death tax over estate tax, and energy explora- With this approach, prescreened participants
tion in place of oil drilling. Luntz has received log onto teleconferencing software at a prede-
criticism for his efforts; for example, PolitiFact termined time to participate in an online focus
gave him the 2010 Lie of the Year award for his group. As with face-to-face groups, interview-
promotion of the phrase government takeover ees can see and hear each other and have a real-
to describe the health care reforms advocated by time discussion about the topic. Interviewees for
President Obama. online focus groups are usually recruited through
Focus groups are also used in other contexts. online panels, and the method allows organiz-
Lawyers hold pretrial mock juries with focus ers to easily gather qualified participants from
group participants matched to the profiles of around the world to match the desired research
potential jurors to discover what issues might criteria. This approach is normally less expensive
come up in the trial and which arguments and than traditional focus groups because modera-
pieces of evidence would be most persuasive to tors and facilitators are not required to travel to
eventual jurors. Focus groups can reveal deficien- the participants. Focus groups can also be held
cies in a case and allow lawyers to assess witness over social media platforms. Companies can cre-
testimony and other elements of the case. Packag- ate social media apps that allow them to survey
ing and product design is another common use of and interact with their customers. Facebook and
focus groups. Through usability testing and dis- Twitter posts can be mined to identify emerging
cussions of packaging characteristics, designers trends. This process, called social listening, is the
can better understand what product elements need next frontier of qualitative research, and is still
revision. For instance, a car maker may conduct under development.
528 Folksonomy

Dial Focus Groups Folksonomy


Another type of focus group is a dial focus group.
In a dial group, participants register their opin- Folksonomy refers to the ability of individuals
ions confidentially on wireless, handheld dials. to annotate and categorize content, particularly
Participant opinions can be electronically gath- Internet content. The term is a combination of
ered, aggregated, and instantly analyzed, after “folks,” an informal reference to people in gen-
which the moderator can use follow-up ques- eral, and “taxonomy,” the science of creating
tions to discuss why the group, or subsets of the categories. Also known as “social tagging,” the
group, responded the way they did. Dial focus creation of folksonomies is one of the central char-
groups are used for television, film, advertising, acteristics of many Web 2.0 services. Folksonomy
and other forms of media audience research. It refers to the complete body of user-created tags,
is rare for a movie or television studio to release but the word is also used to describe the act of
a film or television show without first evaluating users creating tags. Information architect Thomas
the program with a dial group. Researchers can Vander Wal is generally credited with first coining
track the audiences’ second-by-second evaluation the term in 2004.
of the message to see which elements receive a Folksonomies have been characterized as bot-
positive response and which sections are nega- tom-up, self-organizing systems that are idiosyn-
tively evaluated. cratic, rather than systematic. Empirical analyses
Additionally, dial focus groups are prominent of folksonomies find that shared vocabularies
features of political news. During the 2008 and emerge from popular categorization. However,
2012 U.S. presidential debates, CNN used dial social tagging has been criticized for its potential
focus groups to provide viewers a real-time, on- to introduce key words and Internet metadata of
screen reaction graphic showing undecided vot- doubtful quality that may inadvertently spread
ers’ reactions to the candidates. popular misconceptions.
Supporters state that folksonomies may increase
Dan Schill the capabilities of the Semantic Web, a project
Southern Methodist University by the World Wide Web Consortium (W3C) to
evolve the Web from a network of documents to
See Also: Advertising and Marketing; Digital a network of data by enabling systems of catego-
Cultures Research Center; Polling; Social Listening; rization based in social practice. To what extent
Survey Monkey. the emergent thesaurus qualities of social tagging
may replace or improve upon existing forms of
Further Readings classification remains to be seen.
Krueger, Richard A. and Mary Anne Casey. Focus The social bookmarking site Delicious and the
Groups: A Practical Guide for Applied Research. photo site Flickr were the first Web sites to pop-
Thousand Oaks, CA: Sage, 2008. ularize social tagging, which has since become a
Liamputtong, Pranee. Focus Group Methodology: standard feature on many sites with user-generated
Principle and Practice. Thousand Oaks, CA: content, including Facebook and YouTube.
Sage, 2011.
Morgan, David L. Focus Groups as Qualitative Uses of Social Tagging
Research. Thousand Oaks, CA: Sage, 1997. A tagging system is comprised of the interaction
Morgan, David L. and Richard A. Krueger. of three elements: the users, the objects that are
The Focus Group Kit. Thousand Oaks, CA: Sage, tagged, and the tagging key words. Social tag-
1997. ging systems are generally used in three ways:
Schill, Dan and Rita Kirk, “Applied Dial Testing: (1) as a tool for personal data organization, (2) as
Using Real-Time Response to Improve Media a platform for sharing information with friends
Coverage of Debates.” In Real Time Response and colleagues, and (3) as a method of crowd cat-
Measurement in the Social Sciences, J. Maier, M. egorization.
Maier, M. Maurer, V. Meyer, and C. Reinemann, Social tagging as a tool for personal data orga-
eds. Frankfurt, Germany: Peter Lang, 2009. nization is most evident in sites like Flickr and
Forbes, J. Randy 529

Delicious, where users tag photos and links with Forbes, J. Randy
keywords that are saved to be reviewed later. The
practice of tagging photographs with the names J. Randy Forbes is the Virginia Fourth Congres-
of friends on Facebook is a good example of using sional District representative to the U.S. House of
social tagging for sharing information with others Representatives. He is a Republican and is actively
in a social network. Professional or special-inter- connected to many Virginia political social media
est communities may use alternative spelling tags accounts.
to differentiate their use of a keyword term from James Randy Forbes was born February 17,
more casual uses. 1952, in Chesapeake, Virginia. He graduated
Crowd categorization occurs on sites where from Great Bridge High School in Chesapeake in
individuals may apply keywords to resources, 1970. He was valedictorian of his class at Ran-
resulting in a collective system of organization. For dolph–Macon College in 1974, graduating with
example, on Flickr and Delicious, users assign tags, a bachelor in political science. In 1977, he took a
or keywords, to photos they upload or links to J.D. degree from the University of Virginia School
interesting Web sites they want to save. On Flickr, of Law. He then worked in private law practice,
users may assign tags to photos taken by others, specializing in work with small and medium-size
broadening the keywords associated with a partic- firms. He eventually became a partner in a ranking
ular image. On Delicious, many users may submit law firm in Tidewater, Virginia.
links to the same sites, assigning tags that are simi- Forbes continues to make Chesapeake his
lar to or different from tags created by others. Deli- home with his wife Shirley. Together, they have
cious is a broad folksonomy because many people four children. He identifies himself as a Southern
tag the same items. Flickr is a narrow folksonomy Baptist. He attends Great Bridge Baptist Church,
because although many people engage in tagging, where he has taught adult Sunday school for more
individual photos are tagged by very few people. than 20 years. He is a member of the American
Social tagging has the potential to improve a Bar Association, Cancer Working Group, Chesa-
site’s search engine optimization as more indi- peake Bar Association, Chesapeake Farm Bureau,
viduals who tag an Internet resource also help Chesapeake Fraternal Order of Police Auxiliary,
define it. Search engine algorithms are generally Chesapeake Parent Teacher Association (PTA),
thought to give positive weight to social tag- Parents’ Council, James Madison University,
ging when calculating page ranks, particularly Mothers Against Drunk Driving, National Lead-
to resources that are referenced in social book- ership Council of the New Majority Council,
marking sites like Delicious. Omicron Delta Kappa, Phi Beta Kappa, and the
Virginia State Bar Association.
Susan Jacobson First elected to public office in 1990, Forbes
Florida International University won a seat in the Virginia House of Delegates,
which is the lower house of the Virginia General
See Also: Crowdsourcing; Delicious.com; Facebook; Assembly. He became one of 100 delegates meet-
Flickr; Geotagging; Search Engine Optimization; ing in the capitol building in Richmond, Virginia.
Social Bookmarking; StumbleUpon; Web 2.0. Members serve two-year terms and are elected in
odd-numbered years with inauguration occurring
Further Readings in the following even-numbered year. While in the
Lohnmann, Steffan. “Social Tagging and House, Forbes served seven years as the House
Folksonomies” (November 16, 2011). http://www Republican floor leader.
.socialtagging.org (Accessed October 2012). From 1997 until 2001, Forbes served in the Vir-
Panke, Stefanie and Birgit Gaiser. “‘With My Head ginia State Senate, where he became the Republi-
Up in the Clouds’: Using Social Tagging to can floor leader in his second year of service. He
Organize Knowledge.” Journal of Business and also served as the chairman of the Republican
Technical Communication, v.23/3 (2009). Party of Virginia from 1996 to 2001.
Terdiman, Daniel. “Folksonomies Tap People Power.” In 2001, Forbes won election to the U.S.
Wired Magazine (February 1, 2005). House of Representatives in the 107th Congress
530 Forbes, J. Randy

to fill the vacancy in the Fourth District. The


incumbent representative, Norman Sisisky, a
Democrat, died while in office on March 29,
2001. Sisisky was a very blue-dog Democrat. He
was possibly the most conservative Democrat in
the House at the time of his death.
In the special election to fill the unexpected
vacancy, Forbes faced Louise Lucas, a Democrat
serving in the Virginia Senate. He won with 52
percent of the vote to Lucas’s 48 percent. His
election was aided by campaigning in the district
election for him by Vice President Dick Cheney,
Barbara Bush, former first lady and the mother of
President George W. Bush. Bush and Cheney used
automated phoning as a campaign tool in order
to promote Forbes’s election. Forbes attributed
his victory to the aid provided by President Bush.

2002–2010 Elections
In 2002, he ran for a full term unopposed by a
Democrat. In 2004, he was opposed by Jonathan
R. Menefee, a young U.S. marine who had been
honorably discharged because of a service-related Representative J. Randy Forbes speaks with Chief of Naval
injury. Menefee was a 26-year-old law student Operations Admiral Gary Roughead prior to March 1, 2011,
in California when he attempted to capture his budget testimony before the House Armed Services Committee,
home district’s seat. He was an inexperienced on which Representative Forbes serves.
candidate whose stand on many issues ranged
from progressive to libertarian. A Democrat,
he was financially supported by the Chesapeake
Democratic Committee. Nottoway Democrats moving was to escape the corrupting influences in
also contributed to his campaign. He received Columbia, Maryland.
35 percent of the vote to Forbes’s 65 percent. Miller had some political experience as a mem-
After his defeat, he left the district and eventually ber of the Virginia Anti-War Network. She had
moved to Chicago. been a regional coordinator for Ohio Representa-
In 2006, Forbes was unopposed in his re- tive Dennis J. Kucinich’s campaign for the presi-
election. The Fourth District had been realigned dential nomination. In 2004, she worked as a
following the 2000 census, so it was more diffi- regional coordinator for MoveOn.org.
cult for a Democrat to win. In the run-up to the Campaigning on a liberal or progressive
election of 2008, Forbes raised nearly $1 million agenda by Virginia standards, she wanted Amer-
dollars for his campaign war chest. He defeated ican troops out of Iraq immediately, to block
Andrea Miller in the election of 2008. drilling for oil off the east coast and in Alaska.
Andrea Miller, who some characterized as a Universal health care and a living wage along
very liberal political unknown, was a 54-year- with limits on carbon and other greenhouse gas
old former college professor and a computer and emissions and an end to the USA PATRIOT Act
homeland-security consultant to governments in were part of her policy positions to be enacted
Northern Virginia, Maryland, and the District if elected. She would also promote developing
of Columbia. She was a newcomer to the Fourth and marketing alternative energy sources such
District who had moved into the Summerford as wind or solar to create jobs. She opined that
subdivision off Winterpock Road in Chesterfield southside Virginia agricultural wastes (tobacco,
County just two years earlier. Her reason for peanuts, corn, and other vegetation) could
Forbes, J. Randy 531

be used as fuels that would be renewable. She election. She had previously decisively won the
rejected the belief of Forbes that the federal gov- Democratic Party nomination in the primary elec-
ernment needed to institute an alternative energy tion by defeating Joe Elliot, an art teacher from
source Manhattan Project. South Chesterfield who was a first-time candi-
Miller had difficulty raising campaign funds. date. She was a retired teacher and administra-
She was so short of campaign funds that her tor. She had served as a Chesapeake City Council
campaign manager and her financial director member and as a state Board of Education mem-
both quit because they could not be paid. This ber for eight years. Her victory party celebrated
action attracted some media attention to her capturing 85 percent of the primary votes.
campaign. She had hopes that she would be able In 2012, the Fourth District had been realigned
to ride the coattails of presidential candidate following the census of 2010. It is a sprawling
Barack Obama and Democrat senatorial candi- district that stretches from the North Carolina
date Mark R. Warner. Even though she claimed border north to the suburbs of Richmond and
to be a computer specialist, she relied on tra- includes the Atlantic shore, the city of Chesa-
ditional campaigning tools—personal appear- peake, and much of Suffolk, as well as part of
ances, direct mailing, and door-to-door can- 13 other cities and counties as far west as Not-
vassing. She opened campaign offices in several taway. Specifically, it includes Chesapeake City,
places in the district. All was to no avail as she Isle of Wright, Sussex, Emporia City, Dinwiddie,
was defeated handily by Randy Forbes. Amelia, Powhatan, Chesterfield, Petersburg, and
In 2010, Wynne LeGrow challenged Forbes for Colonial Heights counties.
the Fourth District seat as the Democrat Party’s Many of the people in the district were not
nominee. LeGrow was a naturalized immigrant strongly devoted to either the Republican or
from Quebec, Canada. He had retired as a phy- Democratic Party. Participation in party races
sician specializing in nephrology who made his was often low. However, the issues of jobs and the
home in Emporia, Virginia. He supported letting economy were significantly important to many
the Bush tax cuts expire, declared global warm- voters. Others were concerned about the grow-
ing real and anthropogenically caused, and held ing national debt, not raising taxes, and the need
other positions that would be opposed by con- for less government regulation. These issues were
servatives. Forbes refused to engage in debates prominent in Forbes’s campaigning. In contrast,
or in a public forum on the issues. LeGrow was Ward focused on bringing in new jobs, improv-
able to raise $100,000 in campaign funds, but ing education, and not changing Social Security
was only able to get 38 percent of the vote to or Medicare, even if it required higher taxes or
Forbes’s 62 percent. increasing the national debt.
Forbes had a good campaign chest of more than
2012 Election $427,000 to start his campaign, compared with
In the 2012 election, Forbes had his first Republi- Ward’s $6,540. Ward had to deal with the fact
can opposition from Bonnie Girard. She had been that many Democrats did not want to contribute
an exchange student in China and was concerned until after the primary election. She also had to
about the growing Chinese influence in Washing- run a low-tech campaign with door-to-door cam-
ton, D.C. She had developed a consulting com- paigning. Act Blue was used as an online form of
pany in China, the China Channel Consultants, social media to recruit supporters and donors to
to aid American firms seeking to do business in her campaign. Only two signed up to contribute
China. She unsuccessfully tried to make an issue $1,000. She also gained support from WarIsaC-
of the defense contractors that had contributed to rime.org, an antiwar Web page. It castigated him
Forbes’s campaign. In the open primary voting, in for allegedly voting for the Bush agenda 98.8 per-
which anyone can vote by declaring themselves a cent of the time.
Republican, she only received 10 percent of the The progressive supporters of the page were
vote to Randy Forbes’s 90 percent. bothered by the fact that Randy Forbes had been
Running for his sixth term, Forbes faced Dem- the founder and was chairing the Congressional
ocrat Party candidate Ella Ward in the general Prayer Caucus, which encourages its members
532 Forbes, J. Randy

to sponsor initiatives to “protect religious free- The House page Randy Forbes uses (http://
dom in America and to preserve its rich spiritual forbes.house.gov/) is loaded with links to his life,
heritage.” to issues, to caucuses, and to news. It also pro-
vides a contact point for constituents to request
Committees constituent services. He has also used a campaign
Forbes has been an effective speaker on issues Web page, which give opportunities to join his
that come before the Subcommittee on Crime. campaign as a volunteer or as a contributor. Very
He has engaged in debates on issues of gangs prominent on his campaign Web page are vid-
and illegal immigration. He serves on the House eos, Facebook, and Twitter. A link to sign up for
Committee on Armed Services. He is a member e-mail news is also available.
to two of its subcommittees: the House Subcom-
mittee on Seapower and Projection Forces and Andrew J. Waskey
the House Subcommittee on Readiness. He is Dalton State College
also a member of the House Committee on Judi-
ciary and serves on two of its subcommittees: the See Also: Bachman, Michelle; Campaigns, 2012;
House Subcommittee on the Constitution and Fleming, John.
the House Subcommittee on Crime, Terrorism,
and Homeland Security. Further Readings
Besides founding the Congressional Prayer Aaker, Jennifer and Andy Smith. The Dragonfly
Caucus, Forbes also founded the Congressional Effect: Quick, Effective, and Powerful Ways to
China Caucus. He also belongs to the follow- Use Social Media to Drive Social Change.
ing caucuses: Army, Navy/Marine Corps, Coast Hoboken, NJ: John Wiley & Sons, 2010.
Guard, Special Operations Force, Children’s, Davis, Richard. Typing Politics: The Role of Blogs in
Congressional Modeling and Simulation, Con- American Politics. New York: Oxford University
gressional Pro-Life, Diabetes, Historic Preser- Press, 2009.
vation, House Republican Israel, Immigration Gerbaudo, Paolo. Tweets and the Streets: Social
Reform, International Conservation, Internet, Media and Contemporary Activism. London:
Military Retiree–Veterans, and the Missing and Pluto, 2012.
Exploited Children’s. He is also a member of the Hay, Deltina. The Social Media Survival Guide:
Alzheimer’s Task Force, Cancer Working Group, Strategies, Tactics, and Tools for Succeeding
Chesapeake Bay Watershed Task Force, and the in the Social Web. Fresno, CA: Quill Driver,
Judicial Activism Working Group. 2011.
Mergel, Ines and Bill Greeves. Social Media in
Social Media the Public Sector Field Guide: Designing and
Forbes has not had serious electoral competition Implementing Strategies and Policies. Hoboken,
since entering the House of Representatives; how- NJ: John Wiley & Sons, 2012.
ever, he understands the new media and is using O’Brien, Barbara. Blogging America: Political
it. His congressional Web page issues a weekly Discourse in a Digital Nation. Portland, OR:
newsletter to 85,000 subscribers. The Web site Franklin, Beedle, 2004.
has been recognized by the Congressional Man- O’Connor, Rory. Friends, Followers and the
agement Foundation as one of the best Web sites Future: How Social Media Are Changing
in Congress. The Richmond Times Dispatch has Politics, Threatening Big Brands, and Killing
recognized his Web site as commendable for its Traditional Media. San Francisco: City Lights,
openness and clarity of purpose. It uses social 2012.
media links to blogs, news sites, audio, video, and Pole, Antoinette. Blogging the Political: Politics and
the China and Prayer Caucuses. In addition, there Participation in a Networked Society. London:
are links to Facebook, Twitter, YouTube, and Taylor & Francis, 2009.
Instapoll. Blogs are linked. There is a search func- Safko, Lon. The Social Media Bible: Tactics, Tools
tion for the Web site as well as a search functions and Strategies for Business Success. 3rd ed.
for legislation and for issues. Hoboken, NJ: John Wiley & Sons, 2012.
Forecasting Elections 533

Forecasting Elections dependent variable comes from a rather neglected


item in national election studies: “Who do you
To forecast an election means to declare the out- think will be elected president in November?” is
come before it happens. Scientific approaches to the question that has been posed in presidential
election forecasting include polls, political stock pre-election surveys since 1956, and the answers
markets, and statistical models. Scientific fore- allow us to estimate how well the electorate fore-
casting offers estimates based on some scientific casted the winner in each of these presidential
procedure, such as a simulation, market analy- contests. What should we expect the estimates
sis, sample survey, or statistical model, provid- to look like? In some ways, the null hypothesis
ing information to leaders and followers about is most plausible; that is, citizens do not possess
a likely outcome, allowing them to make adjust- crystal balls, and therefore their guesses will be
ments they feel necessary. essentially random, with some having good luck
There are three main components to a forecast: and others having bad luck.
the raw information that is aggregated, the trans- In Western democracies, guessing who will win
formation of this information into probabilistic elections is a long-standing tradition, and statisti-
forecasts, and any bias that shifts the stated fore- cal forecasting models started to appear around
casts. The raw information used by the poll-based 1980. There are now many such models for U.S.
forecasts is public and hence should be in the elections, and a forecasting instrument should be
information set of Intrade investors, and beyond evaluated by four criteria: accuracy, lead, parsi-
this, prediction markets aggregate dispersed and mony, and reproducibility. In forecasting, a neces-
unpublished information. As to transformations, sary evaluation standard is accuracy. If a model
the poll-based forecasts have sophisticated meth- routinely produces inaccurate forecasts, it is not
ods for transforming information into probabili- good. However, accuracy is not a sufficient condi-
ties. In addition, it is now possible to correct for tion. Besides accuracy, a model must have lead;
biases in reporting or look past the biases for the that is, the forecast must be made before the event:
informational content of the forecast. The farther in advance a model produces accurate
Currently, there is considerable interest in forecasts, the better; little is gained from a model
election forecasting, and a common goal for that forecasts a few days before the election. Such
these studies is the development of a model inev- models may be theoretically tautological, not to
itably based on aggregate time-series data, which say empty, and lack the anticipatory feel expected
predicts election returns. The resulting models, from a true forecast.
some of which are quite accurate, can differ a A forecasting model should also be parsimo-
good deal in specification and estimation; also, nious, as in the principle of Ockham’s razor: A
they vary in complexity, making them more or few well-specified variables will work better than
less accessible to the engaged voter. Some fore- many questionable ones. The standard of parsi-
casters suggest that such models should be rela- mony bears on the last standard, that of repro-
tively easy to understand and use so that citizens ducibility. In general, parsimonious models are
can utilize them. easier to understand and are therefore easier to
Other things being equal, a model based on reproduce. The criterion of accuracy deserves spe-
sound electoral theory will perform better than cial attention. A model that fits better, forecasts
an empirically induced, atheoretical model. The better. For instance, in classical regression analy-
steps for constructing a forecasting model are sis, the two measures of goodness of fit are the
much the same as for any social scientific regres- R-squared (or adjusted R-squared) and the stan-
sion model: Consult theory, express the theory in dard error of estimate.
an equation, gather good data on the variables, Forecasting is widely used in economics and
estimate the equation, evaluate the estimates, marketing, for instance. Some models assume
and judge the fit. Special attention must be given, the time-series data follows a stationary, stochas-
then, to the question of model fit. Assuming that tic process, including the autoregressive (AR)
the model gives a good picture of the real world, model and autoregressive moving average pro-
the analyst can go on to forecast. Data on the cesses (ARMA) model, state researchers X. Jin, A.
534 Forecasting Elections

Gallagher, L. Cao, J. Luo, and J. Han. They con- of positive studies have been published praising
clude that models (e.g., AR_Flickr, SAR_Flickr, the goodness of relatively simple approaches to
and Bass_Flickr) extended to consider the Flickr sampling, opinion mining, and sentiment analy-
features can achieve overall lower prediction error sis. Gayo-Avello attempted to play devil’s advo-
compared with traditional models (AR, SAR, and cate by detailing a study in which such simple
Bass), which only consider sales history. In general, approaches largely overestimated Obama’s vic-
considering the Flickr features gives more robust tory in the 2008 U.S. presidential elections.
results, with comparable standard deviation with Twitter is a microblogging service, that is, a sys-
the SAR models and much lower standard devia- tem to publish short text messages, or tweets,
tion than the AR and Bass models. Social multime- which are shown to users who are following the
dia hosting and sharing Web sites such as Flickr, author. Many Twitter users decide not to pro-
Facebook, YouTube, Picasa, ImageShack, and tect their tweets, and hence, they appear in the
Photobucket, are increasingly popular around the so-called public timeline. Such tweets are acces-
globe. A major trend in current studies on social sible by means of Twitter’s application program-
multimedia is using social media sites as a source ming interface (API) and they are easy to collect.
of a huge amount of labeled data for solving large- Twitter’s original slogan “What are you doing?”
scale computer science problems in computer encouraged users to simply share updates about
vision, data mining, and multimedia. their daily activities with their friends; neverthe-
less, Twitter has since evolved into a complex
Twitter information dissemination platform, especially
For instance, the successful use of social media in during mass-convergence situations. Twitter
the U.S. presidential campaign of Barack Obama users not only provide information about them-
has established Twitter, Facebook, Myspace, and selves, but may also publish real-time updates on
other social media as integral parts of the politi- current events.
cal campaign toolbox, according to scholars A. Social networking is about people with simi-
Tumasjan, T. O. Sprenger, P. G. Sandner, and lar interests building a virtual community, and its
I. M. Welpe. While some political analysts are lynchpin is building trust that leads one to share
already turning to the Twittersphere as an indi- what is valuable, engaging others to move from
cator of political opinion, others have suggested taking value to adding value by participating,
that the majority of the messages are pointless thereby completing the cycle and creating true
babble, and their study is intended to answer collaboration. Social networking can be used by
the question whether microblogging messages agencies in a variety of ways, ranging from cre-
can actually inform about public opinion and ating cross-government coordination and knowl-
the political landscape in the offline world by edge management to recruitment activities and
exploring whether: (1) Twitter is used as a vehi- supporting event announcements to the public.
cle for political deliberation by looking at how Some scholars have found that Twitter is
people use microblogging to exchange informa- indeed used as a platform for political delibera-
tion about political issues, (2) Twitter messages tion. The mere number of tweets reflects voters’
reflect the political preferences and the political preferences and comes close to traditional elec-
landscape offline in a meaningful way, (3) indi- tion polls, while the sentiment of political Twitter
vidual accounts show evidence of party bias, and messages closely corresponds to the electorate’s
(4) the content of Twitter messages can be used to sentiment and evidence from media coverage of
forecast the election result. the campaign trail. However, the demographics
User-generated content has experienced an of Twitter users may raise concerns that samples
explosive growth both in the diversity of applica- may not be representative of the electorate. Politi-
tions and the volume of topics covered by users. cal heterogeneity and political disagreement are
Content published in microblogging systems like wholly distinct phenomena and within discussion
Twitter is thought to be feasibly data mined in networks they served dialectically opposing roles:
order to take the pulse of society, according to Disagreement leads to attitude change, while het-
scholar D. Gayo-Avello, and recently a number erogeneity discourages it. At the neighborhood
Forecasting Elections 535

level, however, the degree of heterogeneity serves discussion with peers. It is rather to reiterate that
as a heuristic for the electoral viability of candi- political discussion in new democracies is more
dates, with greater heterogeneity increasing the meaningful and politically consequential because
chances that citizens will change their minds. it can yield massive preference change during
Moreover, casual conversations among neighbors election campaigns that determines who governs.
are a crucial venue of informational exchange What does this suggest about the quality of citi-
about politics. Although a more definitive answer zenship in Brazil and other new democracies?
surely awaits future research, informal commu- Political behavior scholars often portray polit-
nications among neighbors and discussants may ical independents with volatile preferences, not
also play important roles in driving voter vola- as open-minded and inquisitive, but as unaware
tility and determining voter preferences in other and manipulable. Comparativists favor stable
new democracies where partisan cues and party institutions with deep societal roots. Social net-
roots in the electorate are weak. work theorists express concerns that delibera-
Informal discussion with close confidants, tion can cause group think, voter cascades with
casual acquaintances, and even complete strang- the blind leading the blind, herd behavior, or
ers is a wholly rational way for citizens to adapt to stampedes. The alternative model, the media
the lack of standing information in systems with- exposure thesis, paints an equally unimpressive
out long-established political institutions or, as in picture of atomized citizens who are politically
Brazil, where elites have created a highly complex manipulable by the media, a scenario reminis-
party system. This is not to deny, of course, that cent of the pessimistic mass society model that
citizens in established democracies do not learn or was in academic vogue a few decades ago. Dem-
gain exposure to persuasive information through ocratic theorists typically consider deliberation,

Members of the U.S. Navy watching the first 2012 presidential debate between President Barack Obama and former Massachusetts
Governor Mitt Romney on October 4, 2012. Beginning with the 2008 U.S. presidential election, election forecasting has begun to more
actively tap into the rich data provided by social media, especially such sites as Twitter and Flickr, with varying degrees of success.
536 Forecasting Elections

especially in heterogeneous settings, as a public sentiment. Little research has yet been conducted
good, improving the quality of citizenship and in this area, leaving many questions unresolved.
democracy by promoting political tolerance, Further research should test whether text analy-
engagement, and knowledge. Summarizing, the sis procedures, which are more closely tailored
use of Twitter users to predict the outcomes of to the political debate, reflecting both the specif-
elections is still a controversial topic. ics of microblogging and the political issues, can
As of December 2008, 11 percent of American produce even more meaningful results. Research-
adults online were using Twitter or analogous ers should also try to capture the context of a
services. While that is an important amount, the particular statement in a more comprehensive
vast majority of Internet users, not to mention manner, including threads of conversation and
people in general, are not using Twitter. Thus, links to information beyond the tweet.
Twitter users are just a sample and are prob-
ably a very biased one. In addition, another Social Multimedia Patterns
kind of bias permeates research: the tendency of Jin, Gallagher, Cao, Luo, and Han take a new
researchers to report positive results while sup- path to explore the global trends and sentiments
pressing negative ones. These so-called conclu- that can be drawn by analyzing the sharing pat-
sions from a few, selected positive experiments terns of uploaded and downloaded social multi-
can be straightforwardly applied to any other media. In a sense, each time an image or video is
conceivable scenario. uploaded or viewed, it constitutes an implicit vote
In short, the 2008 U.S. presidential elections for (or against) the subject of the image. This vote
could not have been accurately predicted from carries along with it a rich set of associated data,
Twitter by applying the most common current including time and (often) location information.
methods, says Gayo-Avello so the problem with By aggregating such votes across millions of Inter-
predicting the outcomes of these elections was net users, social multimedia may demonstrate its
not in the data collection. Instead, the problem usefulness in serving as an information platform
occurred in minimizing the importance of bias in for social science studies, such as politics, eco-
social media data and by ignoring how such data nomics, and marketing.
differs from the actual population. Until social They propose several Flickr features consider-
media becomes regularly used by the vast major- ing images, tags, and users for building predic-
ity of people, its users cannot be considered a tion models and monitoring trends; they studied
representative sample, thus forecasts from such the 2008 U.S. presidential election and showed
data will be of questionable value at best and that Flickr provided hints that indicated the win-
incorrect in many cases. ners of the party presidential primaries and the
Social media is not a representative and unbi- presidential election. Based on Flickr features,
ased sample of the voting population: Some they proposed the three new models (AR_Flickr,
strata are underrepresented, whereas others are SAR_Flickr, and Bass_Flickr) to extend widely
overrepresented in Twitter, and demographic used traditional prediction models in economics
bias should be acknowledged and predictions and marketing. Experiments on popular products
corrected on its basis, states Gayo-Avello. Sim- show that these models produce much better pre-
plistic sentiment analysis methods should be diction performance, both in terms of lower error
avoided, and political discourse is plagued with rate and higher robustness.
humor, double entendres, and sarcasm, and this The forecaster, in formulating a model of elec-
makes determining political preference of users tion outcomes, should include variables that are
hard and inferring voting intention even harder; well-measured proxies for individual voter deci-
remember, one cannot consistently predict elec- sions as they aggregate, and statistical modelers
tions from Twitter. compete among themselves and with pollsters
Other scholars argue that information on (and possibly other approaches) for the better
Twitter can be aggregated in a meaningful way. forecasting instruments, scholar M. S. Lewis-Beck
Their results demonstrate that Twitter can be states. Questions to be answered are the same as
seen as a valid, real-time indicator of political elsewhere. Which forecasting instrument, from
Foreign Policy 537

which approach, has more accuracy, lead, parsi- Foreign Policy


mony, and reproducibility?
In the world of forecasting, close attention is The rise of digital resources, particularly social
needed. Forecast is news, and as such, the media media, has had a profound impact upon the
may wish to manage it a bit. Says Lewis-Beck, practice of foreign policy, and has introduced a
number of issues that influence the policies of
Once, in France, a leading conservative daily nations in international affairs. New digital com-
declined to publish the article they had com- munication technologies have introduced a num-
missioned from me, because they did not like ber of new foreign policy considerations, includ-
its forecast of a Socialist win. It takes work to ing issues that relate to state sovereignty, the rise
explain to them that the forecast comes out of of nonstate actors, and the possibilities of cyber
the calculations in the model, not out of my warfare and increased surveillance. At the top of
own personal political calculations. the list, however, are considerations as to the pre-
sumed democratization function of social media,
Jaime Raúl Seixas Fonseca global Internet governance, and issues related to
Technical University of Lisbon state control of sensitive information, as embod-
ied in the Julian Assange/WikiLeaks controversy.
See Also: Audience Fragmentation/Segmentation; Early analysis of the Internet focused atten-
Data Mining; Evolution of Social Media; Focus tion on the supposed democratizing nature of
Groups; Innovation and Technology; Media and the Internet, and particularly the advent of recip-
Communications Policy; News Media; Polling; rocal, user-generated content. One of the first
Predictive Analytics. analysts to argue that electronic networks had
a democratizing effect was Christopher Kedzie,
Further Readings who wrote as early as 1993 about the “dicta-
Asur, S. and B. A. Huberman. “Predicting the Future tor’s dilemma,” or the choice that repressive
With Social Media.” arXiv, v.1 (March 29, 2010). governments faced when creating information
Dadashzadeh, M. “Social Media in Government: technology networks, which would spur eco-
From eGovernment to eGovernance.” Journal of nomic growth, but also create space for public
Business & Economics Research, v.8/11 (2010). criticism of the regime. Kedzie argued that the
Gayo-Avello, D. Don’t Turn Social Media Into reciprocity in e-mail, or the ability to respond to
Another ‘Literary Digest’ Poll. Department of messages easily via the same medium and to the
Computer Science, University of Oviedo, 2011. same audience created an inherent democratic
http://doi.acm.org/10.1145/2001269.2001297 virtue embedded within the technology, and that
(Accessed January 2013). this ability to rapidly send out messages would
Jin, X., A. Gallagher, L. Cao, J. Luo, and J. Han. The play the same role in challenging nondemocratic
Wisdom of Social Multimedia: Using Flickr For states as other types of information had played
Prediction and Forecast, 2010. http://www.cs.uiuc in the former Soviet Union.
.edu/homes/hanj/pdf/mm10_xjin.pdf (Accessed Later policymakers and analysts followed
January 2013). Kedzie’s lead, although with a broader under-
Lewis-Beck, M. S. “Election Forecasting: Principles standing of the development and potential of
and Practice.” British Journal of Politics and information technologies. U.S. Secretary of State
International Relations, v.7 (2006). Madeline Albright spoke of the difficulty in con-
Lewis-Beck, M. S. and A. Skalaban. Citizen trolling information networks, using the meta-
Forecasting: Can Voters See Into the Future? phor of “nailing Jell-o to the wall” to illustrate the
Cambridge, UK: Cambridge University Press, difficulties in controlling user-generated messages.
1989. This assumption carried through several U.S.
Tumasjan, A., T. O. Sprenger, P. G. Sandner, and I. M. administrations, including those of Bill Clinton,
Welpe. “Election Forecasts With Twitter: How 140 George W. Bush, and Barack Obama, although
Characters Reflect the Political Landscape.” Social the technologies and capacities of social media
Science Computer Review, v.29/4 2011. continued to change. In fact, the U.S. government,
538 Foreign Policy

through a number of agencies, gave significant constrained by national borders, one critical for-
funding to spur technological innovation aimed eign policy issue that arose around the develop-
at creating a safe space for Internet activists, par- ment of the Internet was that of Internet gover-
ticularly those from repressive regimes. nance, or the mechanisms and policies by which
During Barack Obama’s administration, the global technological networks are governed.
elevation of social media specifically continued This has created a significant foreign policy
as a focus of foreign policy. After she was named issue because governments and other organiza-
secretary of state, Hillary Clinton named Alec tions attempt to develop policies that give them a
J. Ross as senior advisor for innovation. Ross greater stake in the development and deployment
spearheaded the 21st Century Statecraft initia- of the Internet.
tive, which sought to adapt the practice and con- A number of nations argued that the United
sequences of statecraft by deploying information States’ almost exclusive control over the techni-
technology in innovative applications. In addition cal structure of the network wasn’t justified, given
to encouraging the adoption of social media in the global importance of the network. As a result,
public outreach, Ross also advocated the develop- there were calls for alternative models for gov-
ment of new technological tools to meet a variety ernance that would diminish the United States’
of political, developmental, and criminal prob- role, expressed primarily through its control of
lems. For example, Ross encouraged the leader- the Internet Corporation for Assigned Names and
ship of Twitter to delay an upgrade scheduled Numbers (ICANN). Attempts to generate global
immediately prior to the 2009 Iranian presiden- consensus on Internet governance structures,
tial election, which allowed Twitter users to use however, led to little progress. In 2005, the United
the service as a form of mass protest against the Nations sponsored the World Summit on Infor-
Iranian government. mation Society (WSIS), and in a series of subse-
Clinton’s emphasis on social media took on quent meetings, explored the possibility of devel-
two additional distinct dimensions that moved oping alternative modes of governance, involving
social media closer to the center of U.S. foreign institutions such as the International Telecom-
policy. The first was further engaging social media munications Union. Ongoing disagreements over
for enhanced public outreach, particularly to for- policy issues, such as whether Internet activists or
eign publics, or “digital diplomacy.” The second, nongovernmental organizations (NGOs) should
however, was Clinton’s Internet Freedom initia- be considered “stakeholders,” for example, kept
tive, which she articulated in a speech in early such a consensus from emerging.
2010. In her speech, Secretary Clinton argued Thus, there are a number of specific questions
that information technology networks were cre- that emerge from concerns over global gover-
ating a “new nervous system” for the globe, in nance. For example, should NGOs be considered
which information about global events is trans- legitimate stakeholders, thus putting them at the
lated in real time around the world. As part of level of nation-states issues of Internet gover-
the policy, Clinton committed the United States nance? Should the UN assert some authority over
to financing programs to further develop circum- the Internet, or should some global code of gov-
vention tools and training around the world for ernance be developed, governing not just techni-
social media activists to skirt official governmen- cal standards, but also allowable content? What
tal controls. Although freedom of information sanctions should exist for states that undermine
had long been a key plank of U.S. foreign policy, the laws of other states regarding the Internet?
Clinton’s extension of this to the specific technol- For example, U.S. attempts to create circum-
ogies of social media committed the U.S. govern- vention software that could be used by activ-
ment, some argued, to a technological utopianism ists in nations such as Cuba, China, and Iran
that was unrealistic. are viewed by those governments as illegitimate
and encroaching upon espionage. Likewise, the
Internet Governance United States encouraged the use of Twitter in the
Because the Internet and social media rely on 2009 Iranian election and the 2011 Arab Spring
international electronic networks that are not movement to undermine existing governments.
Foreign Policy 539

Given this example, should other states also use Clinton’s Internet Freedom agenda would sup-
social media to undermine other governments? port the rights of organizations such as WikiLe-
Should commercial enterprises, such as ICANN, aks, she and the U.S. government saw no contra-
be able to maintain the technical control over diction, and numerous commentators argued that
networks, which in theory, would allow them to her stand on Internet freedom was hypocritical.
cause widespread disruption to networks in spe- Arguments on the other side of the issue main-
cific nations? Who should assume responsibility tain that Clinton’s reaction was consistent with
over international hacking, such as the alleged the basic requirements of national security as it
hacking of the U.S. Defense Department by Chi- relates to the uncurated publication of sensitive
nese military interests? and classified material characterizing the WikiLe-
aks incident. Perhaps more than anything else, the
Control of Critical Information WikiLeaks episode illustrates the classic “double-
A third critical foreign policy controversy that edged sword” nature of the Internet in foreign
emerges from social media is that of crowd- affairs.
sourced social media formats that facilitate sen- It was not just the U.S. government, however,
sitive information, such as WikiLeaks. Although that saw WikiLeaks as a threat and took action.
WikiLeaks is not the only such disruptive site, the Governments such as China, Australia, Iceland,
issues raised by WikiLeaks illustrate the collision, and Thailand all reacted strongly to the organiza-
at least in the United States and western Europe, tion, and Assange was charged with rape in Swe-
between governmental commitment to an open den, a charge that many considered to be politically
Internet and social media networks, and the val- motivated, and intended only to keep Assange in
ues of state secrecy. Although WikiLeaks had been custody while the United States prepared prosecu-
releasing a variety of information, including cor- tion on espionage charges. As of May 2013, the
porate data, since its founding in 2006, it came to Assange case was unresolved. Controversies such
geopolitical importance with the release in 2010 as these highlight the policy issues associated with
of two sets of data: classified government and organizations such as WikiLeaks, which might
defense documents concerning the Afghan and be seen as a sort of crowdsourced intelligence
Iraq wars, and later that year, U.S. State Depart- agency. Another example occurred in early 2013,
ment diplomatic cables. when North Korea was made aware of the visit of
These two releases led to immediate condemna- a U.S. aircraft carrier to South Korea by amateur
tion from the U.S. government, which argued that photographers who posted the pictures of the car-
the release of the war documents might endanger rier to online photo sites. Governments continue
operational security and ultimately aid the enemy, to seek solutions to maintaining state secrecy
and that the release of the diplomatic cables while encouraging technological diffusion. Social
might endanger innocent lives and embarrass media’s impact on foreign policy has also affected
numerous governments. One allegation is that diplomatic practice.
the 2011 overthrow of the Tunisian government
was attributable at least in part to the corruption Digital Diplomacy
documented by the cables. Later releases included Digital diplomacy is a term that has come to refer
information that was considered embarrassing to to the practice of governments to directly engage
a variety of other governments, including Peru, foreign publics using social media technologies.
Russia, Syria, as well as the private global intel- There are several key perceived advantages in
ligence consultant Stratfor. developing digital diplomacy efforts. First, digital
U.S. Secretary of State Hillary Clinton prom- diplomacy provides a relatively cost-effective way
ised to ensure that such a breach (as the U.S. to develop connections with foreign publics within
diplomatic cables) would not happen again, and tighter budget environments, and is certainly less
severely criticized the organization for endanger- expensive than traditional outreach mechanisms.
ing innocent people and sabotaging the peace- Second, digital diplomacy also extends the reach
ful relations between nations, vowing to punish of diplomatic staff, who can effectively engage
those responsible. Although some argued that larger publics than would traditionally be reached
540 Foreign Policy

through normal diplomatic channels. Digital targeted Somalis in the UK and the Somali dias-
diplomacy is typically considered a form of public pora to follow and comment on the London Con-
diplomacy, which seeks to engage foreign publics, ference on Somalia via Storify and other social
rather than just political elites within a nation. media platforms. In following topical trends of
Finally, digital diplomacy allows diplomatic staff social media, posts are also outside of the policy
to better monitor public opinion toward a foreign or cultural exchange realms, featuring unrelated,
government, political leaders, and policies, in fun topics.
ways similar to the manner in which corporations With the rise in prominence of digital diplomacy
use social media to monitor public opinion. practices, one consistent struggle that states have
Given how new digital diplomacy efforts are, encountered is that of guaranteeing consistency of
there are few indicators of effectiveness beyond message. A tenet of diplomacy is the consistency
gross measurements of the activity of key officials of messaging released from the top of the organi-
and diplomats on social media platforms and the zation, senior level leadership (e.g., ambassadors),
number of followers those officials garner. The and lower-level staff. Doing so in a coordinated
practice of digital diplomacy typically involves fashion has been a fundamental part of the dis-
two primary activities: policy communication cussion of how social media is incorporated into
and cultural connection with key foreign pub- public diplomacy because the technologies intro-
lics. One of the primary activities that embassies duce greater potential for “rogue messaging,” or
engaged in digital diplomacy undertake is the inconsistent messages to foreign publics via social
communication of governmental policy to com- media. States have begun to create policies on con-
munities of foreign publics beyond traditional trol of information for both official governmental
audiences. This allows diplomats to effectively accounts and personal accounts. These policies
bypass the gatekeeping function of host govern- typically involve parameters for what types of
ments, press outlets, or other elites. Depending information can be posted without approval, and
upon the platform used, this can range from the types of information that should be posted in
tweeting key quotes from administration officials consultation with embassy leadership. Still, dis-
to videos of policy statements posted on plat- cretion is often left to the embassy in the posting
forms such as YouTube. This can be a valuable of content. Policies will likely continue to evolve
way to help contextualize key moments, such as because there have been instances in which embas-
state visits or question-and-answer sessions via sies have posted content that violate unwritten
Web chats to ambassadors or other key actors. rules concerning digital diplomatic engagement.
This might be particularly useful in situations For example, before, during, and after the Septem-
where a host government would openly oppose ber 11, 2012, attacks on U.S. facilities in Benghazi
a nation’s policies and limit the ability of diplo- and Cairo, diplomatic officers in Cairo tweeted
matic staff to adequately explain them. and posted to the embassy Facebook page a series
Fostering cultural understanding is a second of messages out of step with broader organiza-
focus of digital diplomacy practices, and it is ide- tional narrative about the attack, leading to sig-
ally suited to social media. Following the line of nificant criticism of the individual staffers and the
traditional public diplomacy activities, digital Department of State.
diplomacy is also concerned with enhancing the
appeal of one’s culture to foreign publics. For National Exemplars
example, Australian engagement with Indone- The United States has spearheaded digital diplo-
sia on Facebook has highlighted collaboration macy efforts, both through the creation of unique
between the two nations on key health initia- Web 2.0 platforms such as Exchanges Connect,
tives. Cultural exchange works in the reverse as and through traditional platforms such as Twit-
well, with descriptions of topics that are popular ter and Facebook. Similar to Facebook’s inter-
and relevant to local followers featured on social face, Exchanges Connect was designed to connect
media platforms. Exchange takes place digitally, potential participants in U.S.-coordinated cultural
eliciting participation from members of the com- exchange programs around the world. Initially,
munity. For example, the United Kingdom (UK) the State Department encouraged each embassy
Foreign Policy 541

to devote equal attention to creating virtual com- initiative is that of the Israeli government, which
munities across all of the dominant social media has engaged in social media efforts to make gov-
platforms. Increasingly, each embassy tailors its ernment-to-people connections to improve Israel’s
digital diplomacy strategy to the particularities image within the international community and
of Internet access in the region in which it seeks bypass institutions such as the United Nations.
to create engagement. For example, the Internet In order to capture the real-time dynamics and
is accessed in Southeast Asia primarily through change inherent in digital diplomacy efforts, the
mobile phones, thus embassies in the region focus AFP created an e-diplomacy hub, including rank-
digital diplomacy efforts more on Twitter than ings of relative influence and current issues under
on Facebook, which is more difficult to access on discussion via social media. As of May 2013, the
mobile phones in the area. United States’ influence far exceeded that of other
One interesting example of digital diplomacy nations, with approximately 68 million followers
was the development of Virtual Presence Posts of an index of officials and experts. Other nations
(VPPs) by the U.S. State Department to provide demonstrating significant influence were Turkey,
a low, but formal level of diplomatic engagement Egypt, and Saudi Arabia, each with between 15
with regions that could not be served by a physi- and 17 million followers.
cal location, such as an embassy or consulate. Although the term is often used in place of digi-
For example, the Beijing Embassy staff devel- tal diplomacy, “e-diplomacy” has been conceptu-
oped VPPs for important Chinese cities where it alized differently by the United States and other
was impractical to establish consulates, but still diplomatic communities. Whereas digital diplo-
wanted to be able to engage the public of those macy initiatives are targeted toward foreign pub-
cities on issues regarding U.S. policy. Other VPPs lics, e-diplomacy efforts are focused on using dig-
were developed to provide an outreach to coun- ital communication technologies to improve the
tries where there was no U.S. embassy, or to pro- daily workflow of diplomatic officers. Although
vide information for other U.S. government agen- e-diplomacy initiatives rely more on in-house plat-
cies working in a region. Many of these VPPs forms and servers designed to improve knowledge
were originally developed on Facebook, but were management within foreign ministries, there are
moved to servers maintained by the State Depart- also significant social media dimensions to these
ment, probably because these efforts have been efforts. These initiatives facilitate knowledge shar-
reclassified as e-diplomacy. ing (e.g., Diplopedia, the U.S. State Department’s
Other nations have followed suit in initiatives internal wiki), aggregate complex consular infor-
toward online diplomacy, using similar formats. mation in easy-to-access interfaces, and encour-
The United Kingdom has engaged in digital age diplomats to create blogs to share ideas and
diplomacy efforts designed to connect with spe- spark discussion with diplomats stationed around
cific publics of interest, focusing for example on the world.
Chinese publics in the UK and in China through
extensive use of the Chinese messaging service Randy Kluver
Weibo because Facebook and Twitter are cur- Jacquelyn Chinn
rently blocked within China. Russia has also Texas A&M University
begun to invest time into the creation of a robust
digital diplomacy campaign, reclaiming the term See Also: Digital Diplomacy; International
and calling it “innovative diplomacy.” Though Social Media and Politics; International Unrest
engaged extensively with soft power efforts on and Revolution; Twitter Diplomacy; WikiLeaks;
other media platforms, China has not adopted WikiLeaks/Arab Spring.
online diplomacy to the same extent that other
nations have. Further Readings
A number of smaller states have developed Agence France Press. “The E-Diplomacy Hub.” http://
significant digital diplomacy initiatives in an ediplomacy.afp.com/#! (Accessed May 2013).
attempt to gain more geopolitical influence, such Internet Governance Project. http://www
as Kuwait, Israel, and Singapore. One particular .internetgovernance.org (Accessed May 2013).
542 Foursquare

Kluver, Alan Randolph. “The Logic of New Media Foursquare also offers incentives related to the
in International Affairs.” New Media and Society, collection of points, prize badges, and “mayor-
v.4/4 (2002). ships.” Points are accumulated each time a user
Morozov, Evgeny. The Net Delusion: The Dark checks in to a new place; they earn from one to
Side of Internet Freedom. New York: Public five points. All points expire every Sunday at
Affairs, 2013. 11:59 p.m., so users can challenge each other to
get more points within a week’s timeframe.
Badges are also earned by checking into vari-
ous venues and serve as milestones for multiple
check-ins using Foursquare. For example, you can
Foursquare earn your Gym Rat badge for checking into the
gym at least 10 times in a 30-day period. The BFF
Foursquare is a location-based social media ser- (best friends forever) badge is earned when a user
vice that allows registered users to check into checks in 10 times to any location with the same
venues by selecting from a list of global position- person. The Swarm badge is earned when a user
ing system (GPS)-generated locations within close checks in with at least 50 other people at a loca-
proximity of a mobile device. In November 2012, tion. This badge is one of the most challenging
Foursquare reported that more than 25 million badges to obtain because the user has to have at
people worldwide were part of its user commu- least 50 people checking in at the same location at
nity. Founded in 2007, it now has had more than the same time. Swarm badges can be obtained by
2.5 billion check-ins. The primary use of Four- organizing a Swarm badge party focused on a com-
square is to check in and share location and opin- mon cause, issue, or politics. A SuperSwarm badge
ion information about specific venues. It is also party incorporates 250 or more people. These
used for collection of points, prize badges, and badges are displayed on the user’s profile to enable
coupons or discounts at businesses. Users can cre- others to know how many places the user visited.
ate to-do lists for their private use and add tips for A mayorship is awarded to a user who has
other users regarding specific venues or locations. checked into a venue on more days than anyone
Users can also browse their check-in histories, else in the previous 60 days. The mayor receives
which categorize visits by month, year, and other a badge to commemorate his or her achievement,
users they were with at the time. and this badge is displayed on the user’s page. In
addition to the badge, if the users have their Twit-
Incentives for Using Foursquare ter profiles linked to Foursquare, then both users
Foursquare has two strategies for encouraging will receive a message stating that one person has
users to check in. The first strategy is directly been ousted as mayor. Another user can take away
related to financial revenue (that is, the company a mayorship by checking in more times than the
partners with businesses to offer users coupons previous mayor. This mechanism has been used as
and specials for checking in and sharing informa- a way to promote businesses and events by giving
tion with their friends). For example, using the people an incentive to check in as often as possi-
Foursquare app, a user might see that, if she or ble. Some businesses like Pei Wei restaurant offer
he selects Chili’s for lunch and uses Foursquare free meals for their mayors.
to check in, free chips and salsa will be provided.
Likewise, companies like JC Penney’s offer their Foursquare and Politics
Foursquare customers discounts on merchandise Political candidates at the local, state, regional,
for a certain number of check-ins. In addition, and national level use Foursquare to check in
some check-ins are fund-raiser related and result during their campaigns. On a local level, some
in funds raised for local charities. Foursquare has politicians leave tips for others on discussion
effectively leveraged the power of local advertis- boards at various places in their jurisdictions.
ing with regard to the intersection of customer Some tips from local politicians usually include
interests and their readiness to purchase based on compliments for local merchants or items in their
physical location. shops, along with the politicians’ positions (for
Foursquare 543

Foursquare users in a real-time voting display.


Through this app, users discover the locations of
their local polling places and learn about the can-
didates and their political positions on the ballot,
potential forms of identification needed for voting,
and new or revised requirements for voting. This
Foursquare-based app was formed in a partnership
between the Pew Center for the State, Voting Infor-
mation Project, and Google.com.

2012 Presidential Election


During the 2012 presidential election, NBC Poli-
tics added three new badges to the Foursquare col-
lection: Political Wonk (one check-in), Campaign
Advisor (two check-ins), and Chief of Staff (three
check-ins). To earn one of these badges, users
had to follow NBC Politics on Foursquare and
check into political landmarks, debate halls, and
campaign hot spots. During time spent at the hot
spots, users had to complete tasks, like saying the
word vote out loud, to gain a badge. The locations
Foursquare pins, some modeled on the online badges users ranged from the Tampa Bay Times Forum and
earn, being given away along with temporary tattoos at the Hofstra University to Palm Beach County Con-
SXSW 2010 gathering in Austin, Texas. vention Center and University of North Carolina
at Chapel Hill. At each location, NBC Politics left
tips for the visiting users. Most locations featured
photos about the significance of the location to
example, candidate for state senate in District 1). either the Republican or Democratic parties.
In addition to posting tips, some local political Another prominent Foursquare partnership
candidates use social media to tell others about exists between the organization and Time mag-
the neighborhood where they personally canvass. azine. During each political convention, Time
Some politicians choose to post the names of the provided the attendees an opportunity to gain
neighborhoods instead of the actual street names. access to unique Time-based Foursquare badges
Other politicians choose to post follow-that- after checking in at the convention venue and sur-
candidate maps to let others know about their rounding venues. Convention attendees and fol-
physical positions and how they are traveling to lowers of Time gained access to a list of must-
their future positions. This might be important attend events and a list of event-related tips from
to the candidates’ constituents, supporters, and the team members from the Time political report-
the press. When politicians are elected to office, ing team. In addition to check-in tips, convention
some choose to maintain connections with their attendees also gained access to timely updates
constituents through Foursquare by letting them from reporters and others as they checked in on
know about town-hall meetings, conferences, or Foursquare. This method helped to contribute
fund-raising events. to social presence among in-person convention
attendees and virtual attendees.
Foursquare Voting App
In addition, through Foursquare, the public is pro- Jennifer Edwards
vided with opportunities to participate with one Sarah Maben
another in real time through a voting app. On Elec- Yvonne Mulhern
tion Day, users can use http://election.foursquare. Credence Baker
com/ to gain an “I Voted” badge and join the other Tarleton State University
544 Framing Theory, Social Media and

See Also: Geotagging; HootSuite.com; Instagram; process of the news outlet deciding what stories
Mobile Media User Data Collection and Privacy should receive the most attention, and what sto-
Protection; Social Media Political Gaming; Twitter; ries should be minimized or left out.
Ushahidi; Web Mapping and Online Politics. Framing is often called a theory of media effects
because of the constructed information’s influ-
Further Readings ence on a reader. Dietram A. Sheufele argues that
“About Foursquare.” https://foursquare.com/about media frames influence public opinion through
(Accessed January 2013). telling the viewer what topics are important and
“Business Insider—How 11 Startups With Billion- what they should know about each topic. Frames
Dollar Valuations Actually Make Money.” http:// serve as independent variables, meaning that they
www.businessinsider.com/how-do-all-those exert influence on the opinions and knowledge of
-billion-dollar-startups-make-money-2011-8? the audience. Further, because the news media is
op=1 (Accessed January 2013). often one of the only sources the public has on
“Foursquare Badges: The Ultimate Guide (Pictures).” many topics, the way information is presented in
http://www.huffingtonpost.com/2010/04/19/ the media is a primary contributor to the public’s
foursquare-badges_n_542985.html#s82329&title awareness. This gives the news media a powerful
=Beginner_Badges (Accessed January 2013). role in influencing public opinion.
William Gamson and Andre Modigliani inves-
tigate the institutional approach to framing the-
ory, advocating that the presentation of infor-
mation requires the source to engage in frame
Framing Theory, building. Rather than focus on issue salience,
frame building requires the consideration of how
Social Media and a message is constructed. When analyzing the
way information is framed, a researcher can con-
Framing is the process of selecting, organizing, sider the way frames are built, such as the types
and editing information for distribution through of language, tone, and evidence used to convey
a medium. Framing theory is based on the idea information. Robert Entman argues that framing
that how information is presented can influence analysis should have four goals. First, researchers
the way an audience perceives, interprets, and should identify the frames throughout a publica-
reacts to it. Traditionally, framing theory refers to tion. Second, researchers should study the insti-
the way the news media organizes a news story, tutional conditions that produce frames. Third,
but starting in the 2000s, the idea was expanded researchers should look at how the audience or
to include the way that information and opinions reader interacts with the frames. Finally, research-
are presented by users in social networks. Framing ers should look at how frames affect public opin-
theory is important in the realm of social media ion or policy.
and politics because the way information is pre- David Russell Brake studies the way that social
sented influences public opinion and knowledge. media users frame online postings in Web 2.0
Framing theory is based on the idea of issue technology such as blogs, Facebook, and Twitter.
salience and priming, concepts described by Max- He has found that bloggers frame topics very sim-
well E. McCombs and Donald Shaws’s work on ilarly to news organizations, designing messages
the mass media and agenda setting. Issue salience by tailoring them to appeal to specific audiences.
and priming suggests that the public’s knowledge Topics written about most frequently or given the
and perception of a topic’s importance is influ- most space are deemed by readers of more impor-
enced by the media’s treatment of that topic. For tance. Additionally, bloggers design messages to
example, a news story that appears on the front convey a specific tone by using language, exam-
page of a newspaper or a story that receives the ples (including images and video), or metaphors.
most space or time in a news broadcast is gen- Readers who see information presented similarly
erally of greater importance than the rest of across many blogs are most likely to adopt a simi-
news content in that publication. Framing is the lar orientation to a topic.
Franken, Al 545

Jackie M. Street and colleagues emphasize that See Also: Blogs; Campaigns, Presidential (2004);
frames are most powerful and exert the most News Media; Twitter; Web 2.0.
influence on the audience when they are repeated
across many sources. In social media or Web 2.0 Further Reading
commercial media outputs, topics are deemed the Bichard, Shannon L. “Building Blogs: A Multi-
most important when they are discussed by many Dimensional Analysis of the Distribution of Frames
participants. Further, when a topic is similarly on the 2004 Presidential Candidate’s Websites.”
framed by many participants, onlookers are most Journalism and Mass Communication Quarterly,
likely to adopt similar frames. The scholars sug- v.83/2 (2006).
gest this is because of the illusion of congruency Brake, David Russell. “Who Do They Think
and consensus generated when a topic is addressed They’re Talking to? Framings of the Audience
by many people in a similar way. Onlookers will by Social Media Users.” International Journal of
adopt prevalent attitudes surrounding the topic Communication, v.6 (2012).
because of the perceived popularity of the frame. Meraz, Sharon and Zizi Papacharissi. “Networked
Shannon L. Bishard’s study of John Kerry and Gatekeeping and Networked Framing on
President George W. Bush campaigns’ framing of #Egypt.” International Journal of Press/Politics,
issues on official blogs found that consistency is v.18/2 (2013).
vital in social media and Web 2.0 strategy. Over Street, Jackie M. et al. “News and Social Media:
time, candidates strive to consistently frame issues Windows Into Community Perspectives on
with their platforms, recent speeches, and debate Disinvestment.” International Journal of
performances. The study also concludes that the Technology Assessment in Health Care,
majority of content framed on candidates’ Web v.27/4 (2011).
sites and official blogs focus on current issues,
rather than on the past or future. Similarly, the
study’s conclusions also demonstrate the use of
framing to create the illusion of closeness between
the candidate and the reader. Postings are framed Franken, Al
as personal communication, using words such as a
“you.” Because of the frequency of this tactic, Bis- In 2008, former Saturday Night Live writer and
hard concludes that this is an important element to performer Al Franken narrowly defeated incum-
both candidates’ social media strategy. bent Norm Coleman for Minnesota’s second seat
Sharon Meraz and Zizi Papacharissi examined in the U.S. Senate. Coleman triumphed in 2002
tweet frames during the Egyptian uprisings in 2011. when his opponent, popular two-term Minnesota
The study found evidence of networked framing, progressive Paul Wellstone, unexpectedly died in
or the negotiation of frames between cultural gate- a plane crash right before the election. Concerned
keepers (those who produce an original tweet) and about being taken as an erstwhile politician, Fran-
the public (those who retweet content produced by ken, like Wellstone before him, campaigned on
gatekeepers). While gatekeepers framed the events worker and consumer rights. Franken’s brief ten-
of the Egyptian protests using many frames, the ure in the U.S. Senate is notable for his involve-
public tended to only retweet content that was con- ment with social media and privacy issues while
sistent with framing the protests as a citizen upris- serving as chair on the Privacy, Technology, and
ing of righteous protesters. The study reveals that the Law Subcommittee of the Senate Judiciary
frame negotiation exists in social media between Committee. What is perhaps most noteworthy
gatekeepers and the public. While gatekeepers cre- about Franken’s involvement with social media is
ate the frames, the public decides which frames not how he uses them to promote his celebrity
become popular and well known. backstory. In fact, Franken does not cultivate a
following by force of personality, much like fellow
Alison N. Novak Minnesotan politician Michele Bachmann. Fran-
Ernest A. Hakenan ken does not even personally post to or update
Drexel University his Twitter and Facebook accounts. Among social
546 Franken, Al

media scholars, Franken is best regarded for the Minnesotans who searched for information on
innovative way he used social media platforms to gas prices or hybrid cars encountered ads detailing
target and mobilize voters during his Senate elec- Franken’s plan for lowering gas prices. Franken’s
tion campaign. campaign identified several keywords that might
Democratic strategist and social media advi- be used by Minnesotans in order to strategically
sor Natch Greyes observes that too often politi- place advertisements outlining Franken’s specific
cal campaigns fail to effectively target niche audi- plan regarding that issue. In this way, the Franken
ences through social media. Instead, campaigns campaign tapped into existing niche audiences
overlook social media’s ability to target and that shared an identity around a particular social
interact with micro-audiences, and instead try to or political concern. Greyes notes how an online
import one-way messaging strategies typical of niche audience tends to circulate a candidate’s
telephones, e-mail, and snail mail communica- message to friends and allies on other new media
tion onto social media platforms. Social media sites. In a nutshell, nano-targeting relies upon a
users are not a mass, undifferentiated audience. successfully targeted, small-niche audience to do
Greyes points out that social media users who the work of reaching increasingly larger targets
follow political campaigns and elected officials through recirculation of a strategic campaign
are accustomed to receiving personalized com- message.
munications, not impersonal messages addressed Not only is nano-targeting highly effective at
to a wide audience. Such broad messages—com- using social media platforms to help circulate a
mon to expensive radio and television spots—are message, but it is significantly cheaper than adver-
expensive and offer diminishing returns. In part tising through direct-mail campaigns, television,
because he lacked the resources available to an or radio. Though digital advertising that relies
incumbent, and because he was not a fixture of upon social media will not replace effective televi-
the Minnesota Democratic Farmer Labor Party, sion ads, it will likely continue to serve as a pow-
a state affiliate of the Democratic Party, Franken erful tool for campaigns that need to strategically
needed to employ a highly efficient means of tar- manage resources to compete with traditional
geting voters. Franken’s team calculated that the media advertising. Josh Koster notes that Fran-
best way to target voters was by issue, not by ken’s Google search strategy (which was only a
demographic. The key for the Franken campaign part of his campaign’s larger social media nano-
was not to form new networks, or coalitions targeting strategy) cost the campaign less than
of likely voters, but instead to tap into existing $20,000 for 20,000 individuals to read campaign
online networks formed around particular issues literature, more than 5,000 to join a campaign
that overlapped—or could be made to appear e-mail list, and more than 2,000 individuals to
to overlap—with Franken’s overall message and donate directly to the campaign. The return on
campaign theme. investment, reports Koster, was “staggering.”
Franken’s long-tail strategy worked because an
Long-Tail Nano-Targeting Internet audience is highly fragmented. Nano-tar-
New media advertising expert and Franken cam- geting works to collect small niches into a larger
paign consultant Josh Koster termed Franken’s coalition. Koster observes that “universally per-
strategy “long-tail nano-targeting.” The Franken suasive” messages do not resonate like they used
campaign strategically advertised using Google to with audiences familiar with digital and social
AdSense in order to target many online groups—or media. In this way, it is difficult and inefficient
niches—instead of broadcasting a large campaign to target a wide audience. The long-tail strategy
ad targeting a general, unknown, unidimensional focuses on isolating issues and nano-targeting
audience. These advertisements targeted users them to the right online niche that already has
based on keywords in their Google searches. The formed a small coalition around the issue. Fran-
Franken campaign bought certain keywords— ken’s strategy linked those values, positions, and
words and names—and when users searched for commitments that already inhabited a niche and
those words or names, their searches triggered invited those nano-targets to identify their com-
an associated Franken ad. Greyes explains that mitments with his campaign. Franken did not
Franken, Al 547

build a coalition so much as he sutured very small is known, however, it that the long-tail strategy
coalitions together through digital and social relies as much on targeting as it does on targets
media targeting practices. subsequently targeting other potentially allied
Koster explains that Franken’s strategy involved voters within their already-formed networks.
identifying and targeting two different kinds of With this strategy, Franken assembled a large-
niches: persuasion and acquisition. When target- enough coalition to win a tightly contested Senate
ing a persuasion niche, a campaign team identifies seat, initially by less than 400 votes.
the most persuasive content they have available,
such as video of a key endorsement, a carefully Online Privacy
choreographed image or tableau, or a support- Franken’s focus in his first term in the Senate has
ive news article, and then try to determine who been on consumer advocacy, especially on the issue
might be persuaded by that content. Koster notes of consumer privacy and control over user-sub-
that potential voters who searched for a particular mitted online content on social media sites. Facial
union or a particular newspaper would trigger an recognition technology is an issue that has caught
ad reflecting content directly related to the search. the attention of Franken in his role as chair of
Franken’s campaign generated keywords that peo- the Privacy, Technology, and Law Subcommittee.
ple might enter and that could be easily linked to In a committee hearing named “What Facial Rec-
targeted content. The campaign carefully moni- ognition Technology Means for Privacy and Civil
tored which keywords were the most popular and Liberties,” Franken, well established as a critic of
accordingly updated and bolstered their content. Facebook privacy policies, led the Senate com-
In addition to targeting persuasion niches, mittee members in questioning Facebook privacy
Franken’s campaign also appealed to acquisi- manager Rob Sherman about the potential issues
tion niches. Campaigns target acquisition niches of facial recognition software. Franken brought
by identifying the types of voters they want to to light the issue of Facebook’s privacy settings
recruit and trying to locate them in the virtual document, which he claimed, makes it difficult
world of digital and social media. If campaigns to opt out of facial recognition. Facebook’s facial
target persuasion niches to bring content to par- recognition technology recommends the identi-
ticular voters, they reverse course when targeting ties of people who a user has classified as a friend
acquisition niches. According to Koster, Franken in a photo. Facebook’s competitor, Google Plus,
wanted to target skeptical Democratic donors, has their facial recognition turned off by default.
activists, and college students. By “advertising Users have to voluntarily elect to have a faceprint
to the long tail,” Franken’s campaign extended made of themselves, whereas Facebook automati-
their possible donor and voter base. Anyone on cally generates faceprints.
Twitter who used topical liberal hashtags—a Jeffrey Rosen has noted that Franken’s public
word, acronym, or abbreviation included at the concern with Facebook and user privacy is timely
end of a tweet to signal its topic—is a relatively because it draws attention to how difficult facial
easy target for a Democratic candidate. Twitter recognition technology makes reputation man-
users use hashtags to indicate niche affiliation. agement in a digital age. Rosen notes how Face-
This allows campaigns to target donors from out- book permits applications that employ facial rec-
side the contested district to contribute campaign ognition software to allow a user to locate any
funds. Franken’s campaign piggybacked off the photo of him- or herself or a friend, regardless of
Obama campaign inasmuch as they parsed key whether that photo was tagged by the user. Rosen
staff members associated with Obama and linked points out that people will be able to record video
their ads to those names in Google and Gmail, its or photos of anyone, run them through Google,
affiliated e-mail service. With long-tail nano-tar- and in so doing, access all the photos that exist
geting, it is easy to measure where audiences are of the person on the Web. In part because of the
accessing content and which keywords are trig- negative attention gained during Franken’s com-
gering those exposures. It is more difficult to mea- mittee hearing, Facebook soon after amended its
sure how many and to what extent nano-targeted privacy policy, making it simpler and easier to
voters then recirculate campaign content. What navigate.
548 Franken, Al

Franken’s questioning of Sherman, in addition


to his interrogation of law enforcement leaders
and an FBI director, brought attention to the issue
of how facial recognition software might lead to
unwanted violations of privacy and civil liberties
by making it easy for political organizations, law
enforcement agencies, and even stalkers to use
facial recognition to access personal information
like a user’s address, friends, and affiliated groups
on social media sites. Kashmir Hill notes that
Franken’s questioning brought up key free speech
questions regarding whether police could use
facial recognition technology to identify people
involved in protests or rallies, despite pledges to
only maintain databases of mug shots of known A screenshot of Al Franken’s 2008 Senate campaign Web site.
criminals. Franken used innovative methods to build a base of supporters,
Franken has also established himself as a con- including long-tail nano-targeting. In the Senate he has acted as
sumer advocate concerned with protecting online both a consumer advocate and online privacy advocate.
consumers from businesses that want to market
their personal data. To this effect, Franken helped
stop a partnership between popular video stream-
ing Web site Netflix and Facebook in early 2012. of Intellectual Property Act (PIPA) as a way to
The two media companies wanted to be able to protect creative copyright and curtail infringed
share user data, but are legally unable to do so content like bootlegged movies and software. It
because of the Video Privacy Protection Act that is not surprising that Franken, a former comedian
requires a video company to gain a customer’s and author, supported legislation to protect cre-
written consent in order to share that client’s ative copyright. Franken addressed his progres-
personal information. Franken noted that the sive skeptics by noting that much union labor
proposed bill to permit consumers to give a one- goes into the production of creative properties,
time blanket permission for a video company to and that data that infringes on the copyrights of
share their information (presently a user needs to those creative properties must be prevented from
give written approval) weakens consumers’ abil- circulating freely and openly on the Web. Fran-
ity to control information collected about them, ken insisted that protections for intellectual prop-
even as it enables companies’ increased access to erty offered by PIPA protect millions of jobs. The
consumer information, viewing habits, and so point of PIPA, he contended, was not to protect
on. Though music-streaming services can partner corporate influence, but to preserve American
with Facebook, video services cannot. At issue creative labor from piracy. PIPA, and its House
are a user’s viewing habits, which some privacy version, the Stop Online Piracy Act (SOPA), were
advocates argue reveal more about a person’s per- relatively obscure until the blogosphere and the
sonality, sexuality, and values than music or any social media world caught wind of them. Franken
other media form. As a result of Franken’s and noted that most of his Minnesota constituents
other committee members’ privacy stance, the who contacted him did so through social media
United States remains the only country in which sites like Twitter and Facebook. Consideration
Netflix cannot share user data with Facebook. for both PIPA and SOPA was suspended due to
Franken is noteworthy for his defense of net outcry from Web advocates concerned about how
neutrality, the notion that service providers each might threaten net neutrality.
should not be able to privilege the accessing of Franken’s cutting-edge election strategy mini-
certain content over others. Somewhat contro- mized costs while successfully nano-targeting
versially, Franken supported the Protecting Real niches through digital and social media in ways
Online Threats to Economic Creativity and Theft never before attempted. It is noteworthy that
Freedom of the Press and National Security 549

Franken, after relying so heavily on social media may not limit political speech. It holds that
strategies to get elected, would be one of its great- “Congress shall make no law . . . abridging the
est critics—at least of Facebook and its privacy freedom of speech, or of the press.” In the view
policies—as subcommittee chair in the Senate. of the founders, the press would serve as an
The implied Franken ideal—empowering media additional check on elected officials, promoting
users while limiting social media’s ability to unde- transparency and accountability.
tectably exploit user data—suggests a grassroots, The First Amendment has resulted in two types
user-centric model of using social media for social of legal protections for the press. First, courts have
and political expression. generally granted journalists broad freedom to
publish information on foreign and security policy,
Samuel Boerboom even if the government deems that information a
Montana State University–Billings threat to national security. With the exception of
different levels of legal action against journalists
See Also: Actors and Social Media in Politics; occurring during times of war, or relative to espio-
Audience Fragmentation/Segmentation; Campaigns, nage, sedition, terrorism, or treasonous acts or
Digital; Facial Recognition Technology; Hashtag; affiliations, since the post-Reconstruction era, no
Long-Tail Nano-Targeting; Saturday Night Live; American journalist or news organization has been
Social Media, Adoption of; Twitter. criminally prosecuted for publishing government
information on national security policy. Moreover,
Further Readings courts have rejected government demands for per-
Greyes, Natch. “The Untapped Potential of Social manent injunctions to prevent the publication of
Media: A Primer for Savvy Campaigners.” news stories that may damage national security;
Campaigns & Elections (March 17, 2011). this is termed “prior restraint.” In such cases,
Hill, Kashmir. “Sen. Al Franken Grills Facebook courts have put the burden of proof on the U.S.
and the FBI Over Their Use of Facial Recognition government, requiring officials to identify a “com-
Technology.” Forbes (July 18, 2012). pelling interest” in stopping publication, and fur-
Koster, Josh. “Long-Tail Nanotargeting.” Campaigns ther demonstrate that the restriction is “narrowly
& Elections (February 1, 2009). tailored” to advance that interest, without unduly
Rosen, Jeffrey. “The Web Means the End of compromising freedom of the press.
Forgetting.” New York Times (July 21, 2010). In addition to protections for members of the
press, sources for news stories have generally
enjoyed protection from criminal prosecution. As
legal scholar Jonathan Peters notes, there is no
one law that makes it a criminal act to disclose
Freedom of the Press or disseminate classified information, although
there have been sporadic government attempts
and National Security to implement criminal punishments for leaking
information. The 1917 Espionage Act represents
The First Amendment to the U.S. Constitution the clearest legislative attempt at this; passed in
guarantees that the press has the right to oper- the run-up to U.S. participation in World War I,
ate without government interference. However, the broadly worded act made it a crime to dis-
in wartime, there are often calls by both elected seminate information that could harm U.S. secu-
officials and the public to suppress the publica- rity or aid U.S. enemies.
tion of information that may damage national Despite the ostensibly broad scope of the
security endeavors. Generally, U.S. courts have Espionage Act, the government has only success-
broadly interpreted the First Amendment, reject- fully prosecuted a handful of leakers; in addi-
ing the ability of the government to restrict the tion, the government has declined to prosecute
press in wartime. At times, national security any journalists, even though the act makes it a
and press freedom come into conflict. The First criminal offense to receive classified information.
Amendment guarantees that the U.S. government Although it remains theoretically possible for the
550 Freedom of the Press and National Security

government to pass and enforce additional laws case for prior restraint. The justices noted that the
punishing both journalists and their sources, there government had not established any evidence of
has been little sustained effort by elected officials concrete harm to U.S. security interests. Ellsberg
in this area. and another individual who assisted him, how-
ever, were charged under the Espionage Act; the
Pentagon Papers Case charges were eventually dismissed. Nixon’s sub-
The dispute over the New York Times publication sequent attempts to discredit Ellsberg, including
of classified information about the Vietnam War breaking into his psychiatrist’s office, were a com-
led to one of the most famous Supreme Court cases ponent of the Watergate scandal, which resulted
on press freedom. The conflict began when Daniel in Nixon’s resignation in 1974.
Ellsberg, a researcher at the RAND Corporation,
gained access to a top-secret report commissioned Progressive and the H-Bomb
by former Defense Secretary Robert McNamara In the wake of the Pentagon papers case, the deci-
in 1967; the 47-volume report was titled His- sion by a Wisconsin-based magazine to publish
tory of U.S. Deicisionmaking on Vietnam Policy. a controversial story on thermonuclear weapons
Although Ellsberg had been a supporter of the led to a second case of a court injunction against
war, he became disillusioned with the conflict, the publication of national security information.
and decided to publically release the papers in an In April 1979, the Progressive, a small left-wing
attempt to expose the misperceptions characteriz- publication, gathered enough publically avail-
ing past Vietnam policy. After photocopying and able information to provide a detailed overview
smuggling the report out of his office, he turned of the construction of a hydrogen bomb; at the
the report over to the Times; in June 1971, the time, only five countries possessed the weapon.
paper used the nearly 4,000 pages of documents All of the information had been obtained legally,
as source material for a series of front-page sto- and was supplemented by expert interviews. The
ries about past Vietnam policy. magazine took an antinuclear stance; in publish-
Although the news stories did not contain any ing the story, the Progressive’s editors hoped to
classified information about the Nixon adminis- spur public debate about the necessity of thermo-
tration’s policy, and did not disclose any ongoing nuclear weapons.
military actions, after the first story appeared on In a bid to generate interest in the story, prior
June 13, Nixon’s Justice Department requested to publication, the editors of the Progressive
that the paper terminate publication of the arti- sent a copy to the Department of Energy; sub-
cle series. When the Times refused, the attorney sequently, the U.S. government requested that
general obtained an injunction from a district the magazine halt publication until any classified
court to prevent the publication of any addi- information could be excised from the story. The
tional articles that were sourced from the Penta- government relied on the 1954 Atomic Energy
gon papers. The Times, along with the Washing- Act; this act contained a clause making it a crime
ton Post, challenged the district court’s decision, to receive and publish any information about
appealing to the Supreme Court. The core issue the construction of a nuclear weapon. The Pro-
in the case was prior restraint, with the admin- gressive, however, refused to stop publication;
istration asserting that the publication of addi- at the request of the Carter administration, a
tional stories would cause damage to U.S. secu- Wisconsin judge granted an injunction against
rity interests. The Times countered by arguing publication, citing the dire consequences of
that the Pentagon papers provided a valuable nuclear proliferation. In this instance, although
contribution to the ongoing public debate about the government asserted that publication of the
the Vietnam War. story would aid U.S. enemies in gaining a ther-
On June 30, 1971, the Supreme Court handed monuclear weapon, the magazine countered that
down the decision in New York Times v. United all of the source material was already publically
States. By a vote of 6 to 3, the justices held that the available, and thus the injunction was invalid.
Times had the right to publish the information, The government dropped the case after another
and that the government had failed to make the news outlet published the information.
Freedom of the Press and National Security 551

Washington Post and Ivy Bells judicial oversight. The program was implemented
Although the relationship between the govern- by executive order and was designed to circum-
ment and the press is often seen as adversarial, vent existing federal laws prohibiting the gov-
there are instances when journalists have vol- ernment from monitoring phone conversations
untarily refrained from publishing stories in the inside the United States. Risen and Lichtblau
name of the national security. One such instance also discovered that the implementation of the
occurred in the early 1980s, when Bob Wood- program had provoked intense debate inside the
ward, one of the Washington Post reporters Bush administration, with several top legal advi-
responsible for breaking the Watergate scan- sors questioning the constitutionality of domestic
dal, gained information on a secret government wiretapping.
intelligence-gathering program dating from the Prior to publication, Lichtblau and his editor,
1970s. The program was code named Ivy Bells, Bill Keller, met with White House officials, who
and was designed to tap undersea Soviet com- attempted to dissuade them from publishing the
munication cables. story. Members of the administration cautioned
Initially, Woodward and his editor, Ben Bradlee, that if the Times exposed the program, the admin-
decided not to publish the story, fearing that publi- istration would have to terminate a valuable intel-
cation would jeopardize an important intelligence- ligence-gathering operation. Although the paper
gathering operation. In 1986, however, Wood- held back the story for more than a year, eventually
ward learned that the Soviets had discovered and Keller decided to publish the piece; it appeared on
disabled the program in 1981. At this point, the the front page on December 16, 2005. In 2006,
Post informed the Reagan administration that it Risen and Lichtblau received a Pulitzer Prize for
would proceed with publication. the story. The second dispute occurred in 2006.
The paper encountered strong resistance from At this point, Risen and Lichtblau discovered the
top Reagan officials, who offered an array of existence of the SWIFT Banking Program, devel-
arguments against disclosing the now-defunct oped jointly by the CIA and the Department of
program. In an effort to assuage the government, Treasury. The program monitored international
Woodward and his editors had more than 20 banking transactions through a Brussels-based
conversations with Reagan officials; moreover, clearinghouse in an effort to detect and terminate
multiple officials, including the National Security funding sources for Al Qaeda.
Agency (NSA) director, the secretary of state, and For several months prior to publication, the
sectary of defense, reviewed a draft of the article. Bush administration lobbied the Times to with-
Prior to publication, Reagan contacted Katherine hold the story. In conversations with the Times,
Graham, the CEO of the Post, and implored her the administration argued that the program had
to stop publication. Ultimately, in the midst of resulted in the successful detection of funding for
these deliberations, on 21 May 1986, NBC aired terrorism, and if disclosed, would become inef-
a report on the Ivy Bells operation, and the Post fective. Keller did not believe the program was
published its story soon after. illegal because it enjoyed congressional oversight;
he asserted, however, that the public’s right to
New York Times and the War on Terror know about this expansion of executive power
Tensions between the press and the government justified the Times’ decision to publish. On April
continued during the U.S. War on Terror. Most 22, 2006, the story appeared on the front page
notably, the New York Times and the George of the paper. The reaction from elected officials
W. Bush administration came into conflict on was overwhelmingly negative; the president and
two separate occasions, with the paper rejecting vice president publicly castigated the paper for
the administration’s requests to withhold stories disclosing the program, and the House of Repre-
about clandestine antiterror programs. The first sentatives passed a condemnatory resolution.
conflict occurred in 2005, when two reporters at
the paper, James Risen and Eric Lichtblau, gained WikiLeaks
information about a NSA program that allowed In 2010, the Web site WikiLeaks released more
the government to wiretap U.S. citizens without than 400,000 classified U.S. national security
552 Freedom of the Press and National Security

documents. The ensuing debate over the release


raised many questions about freedom of the press
in an age when the Internet has changed the
nature and boundaries of journalism.
Julian Assange, an Australian national with a
background in computer programming, founded
WikiLeaks in 2006. Assange’s stated goal was
to use the site to publish classified material in
order to promote transparency in government.
During its first years, WikiLeaks released a vari-
ety of documents, even garnering an award from
Amnesty International for disclosing extrajudi-
cial killings by the Kenyan government. Begin-
ning in 2010, WikiLeaks engaged in the dissemi-
nation of controversial material on U.S. national
security; this included a classified video and the
release of several caches of documents. This
information was obtained from Private Bradley
Manning, a U.S. Army intelligence analyst who
held top secret security clearance.
In April, WikiLeaks posted a video titled
Collateral Murder; it showed several individu-
als, including Reuters journalists, being killed
in 2007 airstrikes in Baghdad. In July, Assange
released 77,000 documents on the war in Afghan-
istan, granting exclusive access to the New York
Times, Der Spiegel, and the Guardian. Subse- Julian Assange preparing to deliver a statement on August 19,
quently, WikiLeaks released more than 400,000 2012, from a balcony in the Ecuadoran embassy in London
documents on the Iraq war. Finally, in Novem- where he has been allowed to stay to avoid extradition.
ber 2010, WikiLeaks released more than 250,000
cables transmitted from U.S. embassies. The U.S.
government’s reaction to the final release was
overwhelmingly negative. Vice President Biden For his part in releasing the documents, Manning
and Secretary of State Clinton claimed that the was charged with multiple offenses under the
release of the cables undermined U.S. alliances. Espionage Act and the Uniform Code of Military
Members of Congress initiated hearings, and Justice. In February 2013, he pled guilty to 10 of
several Senators proposed the Securing Human the 22 charges against him; he is awaiting trial.
Intelligence and Enforcing Lawful Dissemination Although the relationship between the press
(Shield) Act; this act would amend the Espionage and the government is inherently conflictual,
Act, criminalizing not just the leaking of informa- when national security interests are involved,
tion gained from human intelligence, but also the both sides face a complex set of calculations.
publication of it. Despite the fact that many members of the media
Although the Justice Department initiated take an absolutist view of the First Amendment,
an investigation, Assange has not been charged the historical record demonstrates that journal-
with any criminal offense. He is, however, facing ists are acutely aware of the potential conse-
extradition to Sweden on sexual assault changes. quences of publishing classified national security
Assange claims that the charges are politically information. As such, decisions to publish stories
motivated, and in 2012, the Ecuadorian govern- sourced from classified material are often pre-
ment granted him political asylum; he currently ceded by months of deliberation, with members
resides inside the Ecuadorian embassy in London. of the press actively consulting with government
FreeRepublic.com 553

officials. For its part, the government has also newspapers against the site was an early battle in
evidenced discretion. While elected officials have the Internet copyright wars. Free Republic has all
often vociferously objected to the publication of the hallmarks of “thick” community as described
stories on national security, this has rarely been by Bruce Bimber and others, employing inside
accompanied by legal proceedings against news jokes, longstanding traditions, and celebrating a
outlets or their sources. In addition, in the rare shared history. In the early days of the discus-
cases where the government has sought a legal sion forum, the site attracted participants who
injunction, courts have placed the onus on the were influential actors in the Bill Clinton/Monica
government, setting a high bar for restricting Lewinsky scandal, including Lucianne Goldberg,
press freedom in the name of national security. who is credited with coining the term Freepers to
refer to members of the community. Free Repub-
Kelly McHugh lic was also linked from the front page of the
Florida Southern College Drudge report during that site’s rise in influence
among conservatives.
See Also: International Social Media and Politics; As the community gained a measure of public-
Media and Communications Policy; Press Freedom ity, it also attracted the attention of two major
and Online/Social Media Security; WikiLeaks; World newspapers, the Los Angeles Times and the
Press Freedom Index. Washington Post. The practice of copying and
pasting articles from major media Web sites into
Further Readings Free Republic prompted a lawsuit by the newspa-
Peter, Jonathan. “WikiLeaks, the First Amendments, pers, which ultimately established a precedent in
and the Press” Harvard Law and Policy Review copyright law and the Internet (L.A. Times v. Free
(April 24, 2011). http://hlpronline.com/2011/04/ Republic, 1999). After the lawsuit, Free Republic
wikileaks-the-first-amendment-and-the-press agreed to impose rules for excerpting and linking
(Accessed 30 March 2013). articles. More recently, members of Free Republic
Ross, Gary. Who Watches the Watchmen?: were involved in challenging Dan Rather’s cred-
The Conflict Between National Security and ibility during the George W. Bush National Guard
Freedom of the Press. Washington, DC: National controversy. The charge of “forged documents”
Intelligence University, 2011. ultimately led to Rather’s exit from the anchor
Schoenfeld, Gabriel. Necessary Secretes: National position at CBS in 2004.
Security, the Media, and the Rule of Law. New The Web site was founded and is still owned
York: W. W. Norton and Co., 2010. by Jim Robinson of Fresno, California, a pri-
Stone, Geoffrey R. “Government Secrecy vs. Freedom vate citizen who operates the site as a sole pro-
of the Press.” Harvard Law and Policy Review, prietorship with assistance from his brother and
v.185/1 (2007). a small number of paid moderators. He accepts
no advertising, but conducts quarterly fundrais-
ing campaigns. In 2013, the “Freepathon” goal
was approximately $85,000. In 2008, the quar-
terly goal was $70,000. In appearance and in
FreeRepublic.com technical affordances, the site has remained virtu-
ally unchanged for more than a decade. Person-
Free Republic is one of the best known and earli- alizing homepages and posting images on Free
est manifestations of political community online, Republic requires a rudimentary grasp of HTML.
as well as one of the most influential conserva- There is a sidebar featuring “breaking news”
tive voices on the Web. A discussion forum that with other categories that can be customized by
originally emerged in 1996, the site has played the user. Behind the public channels of commu-
a role in political scandals, including the Clin- nication, participants are also provided with an
ton impeachment scandal and the controversy e-mail feature, and use this feature to create “ping
involving CBS and Dan Rather during the 2004 lists.” The ping lists notify a group of subscribers
presidential campaign. A lawsuit by major when a thread is posted in a particular category.
554 Friendster

For example, longtime participant “wagglebee” this issue in a thread posted January 19, 2011.
maintains a “moral absolutes” ping list. Topics In his essay, he vowed to hold the line against
include homosexuality, abortion, and euthanasia. “homosexualists, abortionists, big spenders, big
On all posts, hovering over the screen name taxers, big government solutions advocates, gun
of the poster generates a pop-up that reveals the grabbers, pacifists, isolationists, environmental-
account sign-up date. This information is used as ists, open-borders lobbyists, etc.” The evolu-
a kind of hierarchy, especially to challenge “new- tion of Free Republic over almost two decades
bies” who post messages that are not in line with online reflects a growing dissatisfaction among
the ideology of the site. Failure to meet conser- some conservative citizens with the elected offi-
vative standards results in “zotting,” the Freeper cials who represent them. During the campaigns
term for suspension of a user’s account. Modera- of John McCain and Mitt Romney, members of
tion at Free Republic is quite strict. New members Free Republic were reluctant supporters of the
go through a probationary period, during which Republican nominees, declaring them “RINOs”
moderators must approve their posts before they (Republican in Name Only). Still, despite purges
appear on the site. If a particular story gener- and often contentious discussions, Free Republic
ates a raucous, relatively risqué, and/or conten- is also evidence of the power of Web-based polit-
tious conversation, or has a provocative title, it ical communities to endure over time and influ-
is often moved to the “Smoky Backroom.” Some ence both mainstream media and online political
examples from this category include “Study finds discourse.
woman (sic) have thicker skulls,” and “Paraple-
gic man dumped in gutter sues L.A. hospital.” Jeanette Castillo
Regularly posted threads such as the “Freeper Ball State University
Canteen” and the “Sunday Morning Talk Show
Thread” provide a sense of continuity and are See Also: Huffington Post; Influence on Elections;
faithfully maintained by long-term members of Onion, The; Political Parties.
the community.
Posting conventions are strictly enforced. Further Readings
Threads that contain links must be titled exactly Bimber, Bruce. “The Internet and Political
as they are in the original source, although post- Transformation: Populism, Community, and
ers will sometimes add comments as parenthetical Accelerated Pluralism.” Polity, v.31/1 (1998).
statements. These statements are expected when Downing, John D. H. Encyclopedia of Social
a story features a positive angle on the oppos- Movement Media. Thousand Oaks, CA:
ing ideology. In these cases, participants include Sage, 2011.
a parenthetical warning in the form of a “barf Robinson, Jim. “Who Reads FR? How Many
alert” or “mega barf alert” or some other varia- Accounts on FR? What Does FR Stand For? Where
tion. The parenthetical “Dinosaur Media Death Is FR Going?” (2011). FreeRepublic.com. http://
WatchTM” accompanies stories about declines in www.freerepublic.com/focus/f-news/2659748/
newspaper readership or low ratings for broad- posts?page=1 (Accessed July 2013).
cast media. Posts that do not contain a link to an
external source, but are instead entirely the work
of a member of the site, are labeled “Vanity,” and
are rarely posted in “News/Activism.”
In recent years, the number of participants at Friendster
Free Republic has decreased, as during each elec-
tion cycle members of the community who sup- Friendster was one of the original social network-
port candidates who are not considered conserva- ing sites. It was a free site that allowed users to
tive enough are purged. During 2008, supporters interact with friends and to use those friends to
of Rudolph Giuliani were purged. Early in the meet new people. The concept was based on a
2012 primary season, some supporters of Mitt social networking technique used in networking
Romney were purged. Jim Robinson addressed virtual communities called Circle of Friends. This
Friendster 555

allowed people to reach out and meet other peo- after its launch. It was so successful that Google
ple with whom their friends were linked. As users offered to buy the site for $30 million in 2003.
became acquainted with more people, they could The site declined this offer, a move that many
add them to their circles and expand their net- critics still believe was a major mistake. The site
works. This allowed for social networking within was so successful that it maintained its position as
relatively safe communities because of shared the number one social networking site until April
connections. 2004, when it was surpassed by Myspace in num-
Friendster was founded in March 2002, in ber of page views.
Mountain View, California, by Jonathan Abrams,
Peter Chin, and Dave Lee. The name Friendster Competition and Acquisition
was based the popular peer-to-peer file-sharing Myspace and Facebook were both able to take
site Napster. As one of the first social network- users away from Friendster. One reason for this
ing sites, Friendster is often credited with open- was Friendster’s status as a pioneer; the latecom-
ing doors to other popular social networking sites ers were able to improve on the weaknesses of
such as MySpace, which launched in 2003; and Friendster. Whereas the focus of Friendster was
Facebook, which launched in 2004. Friendster’s one’s individual profile, the competitors created
contribution to social media and politics is that it sites that were more interactive. The competitors
broke ground for these later organizations, which were also able to offer more functionality and
continue to play an escalating role in the digital- cleaner pages.
age political arena. While other sites surpassed Friendster in terms
The founders envisioned the site as a safe envi- of popularity in the United States, Friendster
ronment in which users could make new connec- was able to build a strong presence in Asia. Tap-
tions, both online and in the real world. A pri- ping into this market allowed Friendster to reach
mary premise of the site was to establish dating peak popularity in 2008, when it tallied 115 mil-
connections by focusing on extended social cir- lion members. By 2009, it was available in 11
cles. It was assumed that friends of friends offered languages and allowed users to enter content in
better romantic partners than strangers. any language. Friendster became the first global
The focus on Friendster was the individual online social network to support Asian and other
profile. Within the individual profiles, users could languages on a single domain, which made it pos-
install widgets and customize the layout of their sible for people from all over the world to com-
pages. Profiles also featured photo albums and municate with each other.
video sections and allowed for the use of ava- Friendster also found success with the venture
tars and the creation of blogs. Users were able to capital community. It launched with an initial
contact other users and share online content and round of $12 million from Kleiner Perkins Cau-
media with their contacts. field and Byers, Benchmark Capital, and private
Profiles included tags that provided hyperlinks investors. These investors increased their support
to others with similar interests. Originally, users by providing an additional $3 million in 2006.
could connect with other members who were Friendster received another round of funding
separated by no more than four degrees. Thus, later in 2006, securing $10 million in a round led
users could connect with friends of friends of by DAG Ventures. This was followed by another
friends of friends. Some users sought to expand round of funding in 2008, in which the com-
beyond these four degrees of separation by creat- pany sought to raise $20 million in a round led
ing Fakesters. Fakesters were made-up personas, by IDG Ventures. Finally, in 2009, Friendster was
usually centered on fictional characters or broad acquired by MOL Global, Asia’s largest Internet
topics. In this way, a user could create a profile company, for $26.4 million.
for Harry Potter, and then fans of the book could An often-overlooked strength of Friendster
connect with other fans, even though they had no was the wealth of patents the company held.
other association. Because it was a pioneer in social networking,
The site found quick success and achieved more it developed a vast array of patents related to
than 3 million users in less than three months this growing industry, including technology that
556 Friend-to-Friend Strategies

gauges similarities between users, compatibil- Mjos, Ole J. Music, Social Media and Global
ity scoring, storage of social data relationships, Mobility: MySpace, Facebook, YouTube. New
content management, and the web-of-friends York: Routledge, 2011.
programming that allows one to see connections
between friends. Friendster sold many of these
patents in 2010. At this time, it was rumored
that Facebook bought 18 of these patents for an
estimated $39.5 million. Friend-to-Friend
The acquisition by MOL Global solidified
Friendster’s focus on Asian markets. Now, the Strategies
vast majority of Friendster users come from Asia,
where its two biggest markets are the Philippines Friend-to-friend and peer-to-peer networks form
and Indonesia. In June 2011, Friendster transi- distinct topologies of exchange on the Internet
tioned to a social gaming platform with a new based on the distribution of activities, tasks, and
slogan of “Living the Game.” While accounts resources among the members of a relational
remained active and retained contact lists, this community. Usually, all members are assigned the
transition resulting in the removal of user profiles. same role, and they have the same power and priv-
This included removing all photos, messages, ileges. On the other hand, each participant shares
blog posts, user forums, and groups. Although part of his or her resources, and they contribute at
the company announced the move and provided the same time as suppliers and consumers.
tools to export content, the change was met with Both friend-to-friend and peer-to-peer topolo-
a great deal of controversy. gies are examples of network decentralization
Now based in Kuala Lumpur, Malaysia, the dynamics, a type of social media communication
new focus of the site is on entertainment and paradigm that is of growing interest in both can-
games as Friendster seeks to reposition itself from didate and advocacy politics. From social net-
a competitor to a complementary service to sites work theory, centralization refers to the degree to
such as Facebook. The site is now working with which a network adjusts to a star graph topology.
game developers and publishers to create content. A star graph is the most centralized model of a
By combining this content with MOL’s payment network, in which all members of the network
channels, the company hopes to monetize Friend- exchange information or resources through a cen-
ster’s user base. tral node. Taking the example of the Internet, the
central node could be a server or the administra-
Carolyn Popp Garrity tor of a forum.
Birmingham-Southern College On the other hand, the maximum level of
decentralization takes place in a network where
See Also: Asia; Facebook; Myspace; Social all the nodes are connected to each other. In this
Networking Web Sites. case, information can flow between members,
without the restriction of necessarily passing
Further Readings through a central node. All members are simul-
boyd, danah m. “Friendster and Publicly Articulated taneously sending and receiving information and
Social Networking.” Paper presented in resources, deploying equivalent roles and posi-
Proceedings of the Conference on Human Factors tions. Although the maximum level of central-
and Computing Systems, 2004. ization/decentralization is infrequent in real net-
boyd, danah m. and Nicole B. Ellison. “Social works, friend-to-friend topologies are more akin
Network Sites: Definition, History, and to the second model.
Scholarship.” IEEE Engineering Management Friend-to-friend networks are based on a col-
Review, v.38/3 (2010). laborative exchange strategy within a relatively
Kirkpatrick, David. The Facebook Effect: The Inside bounded network. This topology has been the
Story of the Company That Is Connecting the base for file sharing, information exchange, docu-
World. New York: Simon and Schuster, 2011. ment editing, and Wiki collaborative work, among
Friend-to-Friend Strategies 557

other activities through the Internet. Friend-to- successfully used for optimizing information
friend strategies are frequently based on peer-to- spread in the network. Additionally, effective
peer computing networks, and have been applied campaigns are able to reach a critical mass, or
to research, marketing campaigns, crowdfunding, “tipping point,” in the terminology popularized
and fundraising activities. by Malcolm Gladwell.
In 2000, Dan Bricklin differentiated between Keller and Berry proposed six rules for devel-
friend-to-friend and peer-to-peer networks. Large oping an influential strategy and achieving a
peer-to-peer networks frequently suffer from multiplier effect: (1) to target media that is infor-
spam, invasion of privacy, and other trust prob- mation oriented; (2) to listen and to be reactive
lems that are common in environments without to consumers that complain, as far as influential
a central authority or administrator. Bricklin individuals tend to criticize; (3) to support local
contributed to the creation of smaller networks, causes, addressing community needs; (4) to focus
where a higher portion of the members knew on practical services; (5) to take into account spe-
each other, which were called “friend to friend cial products; and (6) to take advantage of loyalty
networks” because they were based on strong to the brand. The main approach for marketing
relationships between participants. The result- campaigns consists of identifying local opinion
ing structures are usually more flexible, and more leaders and promoting network diffusion dynam-
easily allow for the introduction of changes in ics in the community.
access and operating models. However, Bricklin Some electronic applications, such as Wrapp,
observed that some problems of trust and inva- are inspired by friend-to-friend strategies.
sion of privacy could still arise when connecting Wrapp offers free or paid gift cards that are
with friends of a friend, anticipating some of the sponsored by brands, which people can use in
difficulties currently observed in social network- their everyday communications with friends by
ing Web sites. adding those gift cards to their messages, mainly
on social networking Web sites. This way, com-
Applications for Marketing panies gain a presence in thousands of commu-
Recently, friend-to-friend structures of social nications and information exchanges that occur
networking Web sites have been used to spread daily on Facebook. Consequently, brands are
marketing messages by brands. For instance, part of the contents of the interactions among
brand “likes” on Facebook may be useful to users of social networking Web sites. Although
reach a high number of potential consumers, these strategies are based on traditional word-of-
with the expectation that recommendations mouth processes, they take advantage of social
coming from a friend can have more impact than media for augmenting and accelerating the dif-
direct messages from the brand to the consumer. fusion process.
People who like some brands and publicly share
their opinion are potential recommenders of Fundraising
those brands to their friends and could become Crowdfunding is an application of a friend-to-
staunch brand advocates. friend strategy for fundraising. Traditionally,
Viral marketing is also an example of friend- organizations engaged supporters to raise funds
to-friend strategies. Companies and organiza- through their personal networks of friends, fam-
tions use this approach to increase brand visibil- ily, and colleagues. At present, certain organiza-
ity or to introduce a product in the market. For tions use social media tools to raise funds. For
this purpose, marketing campaigns are based instance, organizations may create donation
on word-of-mouth dynamics. Network topolo- Web sites or widgets located in personal blogs to
gies are used to understand the passing of infor- directly reach family, friends, and acquaintances
mation from person to person and to design of engaged members and volunteers.
an effective diffusion process. The spread will Through friend-to-friend dynamics, nongov-
be faster if the key players in the network are ernmental organizations access the networks
reached; these are the most or better connected of their partners, supporters, or sympathizers
individuals. For instance, centrality has been to more easily raise funds and resources. Some
558 Functionality

online tools used for this purpose include: Razoo, Functionality


Firstgiving, Amicus, and CauseVox.
Finally, grid computing consists of a distrib- In general terms, “functionality” refers to what
uted system of computer resources from differ- hardware and software can do for a prototypi-
ent locations with a common goal. This has been cal user. Functionality in the context of social
widely used in research projects that require a media, can be said to refer to a set of functions
large storage and processing capacity, as in the or capabilities associated with a particular social
case of cryptography, physics, astronomy, math- networking service. Thus, when elaborating on
ematics, and artificial intelligence. Individuals functionality, it becomes important to recognize
and institutions share their computing capacity that it has a substructure consisting of self-con-
in peer-to-peer networks to participate in ambi- tained units of computational code, or functions.
tious research projects. In computer science, a function is an independent
One of the earliest and more famous examples part of a program’s entire code that instructs the
of grid computing is the SETI project, which seeks computer to perform a specific assignment.
evidence of extraterrestrial life analyzing radio Functions can be standardized to a certain
frequencies coming from space. SETI uses more degree because many functions will be reusable
than 200,000 interconnected computer units throughout an entire program or service. The idea
around the world. behind this reusability is, apart from reducing the
Friend-to-friend strategies are interventions intellectual effort of programmers, also a reduc-
that are based in exchange dynamics that take tion of redundancy, that is, to make the program
place in decentralized networks. Trust, reciproc- as small and effective as possible. As Derek Rob-
ity, and personal relationships facilitate fundrais- inson explains, functions are usually designed to
ing, brand dissemination, scientific research, and perform a delimited task as efficiently as possible.
the change of social norms. The identification of As such, a small function is logical and determin-
key players, application of friend-based recom- istic—it always produces a predictable result.
mendation systems, and promotion of network However, a complex program will consist of
diffusion processes are effective strategies to many functions. As mentioned, this larger aggre-
achieve a multiplier effect, to reach the tipping gated set of functions is what can be referred to
point for change at the community level. as functionality.
Additionally, in order to provide overview and
Isidro Maya-Jariego control of functionality, a graphical user inter-
Daniel Holgado Ramos face is usually necessary. So, while functions are
Universidad de Sevilla mechanic in the sense that they must generate a
consistent result when invoked, a complex pro-
See Also: Crowdfunding; Going Viral; Network gram or service can be used and experienced
Influentials; Peer to Peer; Social Networking Web rather differently depending on the user, task, and
Sites; Viral Marketing. context. Thus, when discussing functionality, it is
necessary to also widen the perspective to include
Further Readings concepts from interaction design and user-experi-
Bricklin, D. “Friend to Friend Networks” (2000). ence research.
http://www.bricklin.com/f2f.htm (Accessed An abstract model of functionality can consist
July 2013). of a code layer, feature layer, and user experi-
Keller, E. and J. Berry. The Influential: One American ence layer. The code layer entails a source code
in Ten Tells the Other Nine How to Vote, Where in some form. The source code has been ordered
to Eat, and What to Buy. New York: Free Press, into processes, operations, and functions that
2003. instruct a machine to perform in a certain way.
Mahe, N. “Security in Friend-to-Friend Networks.” Inbetween the code layer (which is an underlying
In Proceedings of the Seminar on Network Security, structure usually hidden from the user) and the
S. Tarkoma and J. Heikkinen, eds. Helsinki, user-experience layer (stories, feelings, and values
Finland: Helsinki University of Technology, 2008. connected to the use of a certain product, system,
Fundly 559

or service), there is the feature level. A feature is Berry, David. M. The Philosophy of Software:
made up of a general function and its interface Code and Mediation in the Digital Age.
instantiation. The reason these two concepts need Basingstoke, UK: Palgrave MacMillan, 2011.
to be connected is that a function can be instanti- Kitchin, Rob and Martin Dodge. Code/Space:
ated in many different ways in an actual interface Software and Everyday Life. Cambridge, MA:
(and the interface is an important part of the user MIT Press, 2011.
experience). The feature is often the level refer- Robinson, Derek. “Function.” In Software Studies:
enced by users when communicating about or A Lexicon, Matthew Fuller, ed. Cambridge, MA:
referring to specific aspects of a certain software MIT Press, 2008.
package or online service.
On a pragmatic level, users may refer to both
the material aspects of information technolo-
gies as well as the more humanistic or experien-
tial aspects (what it does and how it looks). As Fundly
such, the feature level is a material and discur-
sive composite that shows how code can come to The recent increased popularity of crowdfund-
form meaningful abstractions that are then used, ing—a way for organizations or individuals to
interpreted, and referred to by everyday users. share their ideas with communities to garner
The user-experience layer entails the full range support in the form of donations and invest-
of aggregated features and how these work (or ments—is generating distinct modifications in
do not work) together in a product, system, or the way that individuals and organizations relate
service. It also includes the way users feel, make to donors.
meaning of, and value aspects of the human– Fundly is leading this fundraising renaissance
machine interaction, including user perceptions with its unique SaaS based platform, which ren-
of the general utility, ease of use, and efficiency of ders potential donors 10 times more likely to
the product, system, or service. donate than with other fundraising platforms.
With many different crowdfunding platforms
Conclusion available, Fundly sought a unique edge—the
In summary, functionality in social media refers use of social media and highly integrated soft-
to the interaction between the user and the social ware. Unlike many other crowdfunding Web
networking service, particularly with reference sites, Fundly supports a simple java-based plat-
to the performance of this interaction. An analy- form that allows donors to give directly from the
sis of functionality can be performed on several organization’s or individual’s Web site, instead
levels, including the code level, feature level, and of being redirected to an entirely different Web
user-experience level or ideally, as an intersection page to donate.
of all these levels. This simplifies the donation process. Fundly
also offers members the option of creating a new
Jörgen Skågeby page if they do not already have a Web site. Once
Stockholm University donors have given to the organization or indi-
vidual through Fundly, they are then prompted
See Also: Platform; Social Media, Adoption to tell their friends via Facebook, Twitter, e-mail,
of; Social Networking Web Sites; Technological or other form of social media. The concept of
Determinism; Technological Relativism; Topology of friends asking friends for support gives Fundly
Social Networks; Value. its edge among other online fundraising plat-
forms. Fundly has become an important fundrais-
Further Readings ing tool, employed by political figures during the
Beer, David. “Power Through the Algorithm? most recent elections, and likely will continue to
Participatory Web Cultures and the Technological provide greater fundraising potential for candi-
Unconscious.” New Media & Society, dates who decide to utilize Fundly’s potential in
v.11/6 (2009). future elections.
560 Fundly

Fundly has been dubbed the world’s number $305 million in donations. While the organization
one crowdfunding platform for social good. has already made great strides toward its mission
The fundraising platform allows individu- of “helping more people give more,” it continues
als and organizations to leverage the power of to develop partnerships that will further increase
their social networks and the social networks of the fundraising potential of its clients.
their supporters to broaden their donation base. Two of these recent partnerships have been
Combining peer-to-peer interaction with online with Charity Dynamics and Bloomerang. Char-
fundraising creates a sense of community sup- ity Dynamics, a leading online marketing agency,
port around giving. This system of connections will assist Fundly clients in creating and launch-
leads to the success that clients experience when ing customized crowdfunding campaigns. Bloo-
using Fundly. Fundly keeps the connection going merang, a customer relationship management
by automatically notifying others in the donor’s software company, will provide Fundly’s clients
network when they make a donation, and by with advice and tools for increasing donor reten-
keeping them up-to-date on the latest news or tion and loyalty. This partnership will also help
milestones surrounding the cause. This process resolve any hassle currently associated with data
of friends asking friends to donate is believed to transfers and information sharing between Fundly
be more effective, generating up to 52 percent and donor-related software. These unique part-
higher funds than traditional cold calling. nerships will now combat common fundraising
The “social multiplier effect” that Fundly cre- problems of both donor acquisition and retention
ates combats the “one and done” mentality that through social media. Fundly allows organiza-
accompanies online giving by making contribu- tions and individuals to collect all donated funds,
tors feel that they are connected to the cause. whether or not the fundraising goal has been met.
Instead of just a name and donation amount that This places responsibility on the individual
an organization would typically receive from an or organization to ensure that a project is com-
offline donation, they receive far more informa- pleted. This makes it easier for organizations
tion from Fundly. Receiving this additional infor- and individuals to receive their funds, but could
mation, such as an e-mail address and social media potentially create problems for funders who want
connections, allows causes to keep connections reassurance that the cause they are funding will
going with their funders. A supporter gives to a be completed. Fundly takes 4.9 percent of each
cause because they believe in it, so they will want transaction, generally less than other crowd-
to share this cause with others in a simple, quick funding platforms. This is ideal for individuals
way. People are becoming increasingly attached or small organization because it allows them to
to social media, so they can connect with donors begin fundraising online with no start-up costs.
through the sites they use most. Fundly also offers fundraising packages, includ-
Online fundraising is still relatively new, with ing online support and additional resources that
only 13 percent of donations provided over the may appeal to larger organizations willing to pay
Web in 2009. This lack of utilization was one a monthly fee. Fundly appeals to organizations of
of the driving forces behind the development of all sizes as well as individual campaigns with its
Fundly. For people to give online, the process diverse fundraising options that fit the needs of
must be simple, quick, and secure—three of the heterogeneous groups.
key characteristics of Fundly. Fundly entered the Fundly has helped a variety of individuals and
world of online giving in 2009, under the name organizations fundraise since its launch, includ-
BlueSwarm, but began to see increased popularity ing the Red Cross, Teach for America, the Uni-
in 2010 when it relocated its headquarters to Cal- versity of Massachusetts Amherst, and politi-
ifornia after receiving new investment capital and cal figures such as Meg Whitman. During her
changed its name to Fundly. David Boyce, CEO of 2010 campaign for governor of California, Meg
Fundly, knew that he was onto something when Whitman raised over $20 million using Fundly’s
online charitable giving grew by 55 percent in online donation system. The ability of her sup-
2010. Since their launch, Fundly has helped over porters to share her cause with friends via social
30,000 individuals and organizations collect over media expanded her donation base, allowing her
Fund-Raising 561

to reach a higher fundraising potential. Fundly to drive traffic to specific donation Web sites,
and crowdfunding will never replace traditional repost e-mail messages, or quickly communi-
fundraising plans, but it offers an innovative tool cate to users the importance of fund-raising as
in expanding online donations for both organi- an expression of commitment to a candidate or
zations and individuals. issue. The use of social media for this purpose
has led to the development of fund-raising mech-
R. Bruce Anderson anisms that have empowered previously disad-
Florida Southern College vantaged candidates and organizations.
Charlotte Garraway Two important themes provide a foundation
Texas A&M University for understanding this topic: What are the tech-
niques with which social media have been har-
See Also: Campaigns, Grassroots; Crowdfunding; nessed for fund-raising purposes? What groups
Friend-to-Friend Strategies; Fund-Raising. are the most effective at using this fund-raising
technique?
Further Readings There is mixed evidence on the adoption of
Empson, Rip. “Social Fundraising Site Fundly Raises social media fund-raising techniques, depending
$2 Million of Its Own” (February 24, 2011). on the type of organization in question. Three
TechCrunch. http://techcrunch.com/2011/02/24/ important types of political groups use social
social-fundraising-site-fundly-raises-2-million-of media and related fund-raising techniques: can-
-its-own (Accessed June 2013). didate-supporting organizations, nonprofit advo-
Kanani, Rahim. “Fundly.com Is Transforming Online cacy organizations, and political campaigns.
Philanthropic, Political and Individual Giving” These three types of organizations together rep-
(April 7, 2012). Forbes. http://www.forbes.com/ resent the large number of ways that social media
sites/rahimkanani/2012/04/07/fundly-com-is have allowed citizens to participate in the politi-
-transforming-online-philanthropic-political-and cal process.
-individual-giving/2 (Accessed June 2012).
Keller, E. and J. Berry. The Influential: One Candidate-Supporting Organizations
American in Ten Tells the Other Nine How to Among independent, candidate-supporting orga-
Vote, Where to Eat, and What to Buy. New York: nizations, left-leaning and progressive causes in
Free Press, 2003. the United States have benefited from the use of
social media for fund-raising purposes. DailyKos
.com, a major political blog, has demonstrated
considerable influence in raising funds for liberal
Democratic candidates endorsed by the site. In
Fund-Raising the 2006 midterm election, the blog raised funds
for 17 candidates. This effort resulted in more
Social media have changed the political land- funds raised for five candidates than the official
scape in the United States and globally with Democratic Party. These funds helped nearly half
their power to organize new types of civic and of the Kos slate gain election.
political participation. Social media fund-raising By far, one of the most influential advocacy
can be defined as funds donated in response to organizations in terms of social media fund-rais-
a solicitation sent via at least one social media ing is MoveOn.org. This organization has suc-
outlet. Fund-raising by political campaigns and cessfully mobilized fund-raising and grassroots
advocacy organizations through social media action in the United States for both political
applications is an increasingly important com- candidates and political issues. MoveOn’s online
ponent of these groups’ overall strategies for communications blend Web site and social media
mobilizing new pockets of donors and support- formats and seamlessly combine the mobilization
ers online. Social media fund-raising differs from of local groups (or councils) with coordinated
earlier Web site-based fund-raising because of fund-raising appeals. Most importantly, MoveOn
the ways that social media messages can be used has demonstrated a sustained ability to financially
562 Fund-Raising

support the election of candidates friendly to its funds and volunteers for advocacy. This finding
policy positions. seems to apply across different types of nonprofit
However, the social media fund-raising sphere advocacy organizations.
is not without some important conservative exam-
ples. More recently, the Tea Party movement also Political Campaigns
reflected an ability to use social media to harness With the well-known role of the Triple O online
decentralized social networks in order to mobilize fund-raising team of Barack Obama, the study of
support (volunteer and financial) for endorsed social media fund-raising in political campaigns
candidates. Additionally, J. McNutt and others has become a topic of serious practical impor-
have found that there is no meaningful, consistent tance. In reality, however, the use of social media
partisan difference in the use of social media by in political campaigns began at the end of the
Republican and Democratic legislators and their 20th century. The fund-raising aspect of these
constituent relations networks. uses has become more sophisticated than among
most advocacy organizations, but the pattern of
Nonprofit Advocacy Organizations use closely coincides with that of advocacy orga-
Social media fund-raising is not limited to orga- nizations. Social media fund-raising plays a role
nizations that support candidates. Issue advo- in political campaigns at all levels, but for the
cacy organizations, such as environmental groups sake of simplicity, examples in this section will be
and organizations that engage in both charitable limited to American presidential campaigns.
work and advocacy activities, such as organiza- George W. Bush and John McCain both
tions that serve the disabled or other target popu- received attention for accepting donations online
lations, also use social media for fund-raising in during the 2000 presidential campaign. President
conjunction with community-building messages Bush became most widely known for encouraging
and content. online donations after the September 11 attacks.
Only recently have scholars begun to under- In terms of fund-raising for election, however, the
stand exactly how political advocacy groups use Republican strategy remained connected to its
social media to advance their agendas. In one traditional grassroots networks.
study, Chao Guo and Gregory Saxton analyzed The first point at which the use of social media
the Twitter messages of 188 501(c) 3 nonprofit fund-raising became a topic of mainstream dis-
advocacy groups in the United States. They found cussion was the success of the Howard Dean
that messages requesting donations were among presidential campaign online in the 2004 presi-
the least common types of messages, which they dential election cycle. More than half of Dean’s
interpret as a natural result of the fact because cer- fund-raising was from small donations (under
tain relationships must be in place before action $200) online. This phenomenon led to a dramatic
can reasonably be requested. change in the role of small donors in the political
Despite the difficulty of specifying an exact fund-raising process. Conventional wisdom had
number of organizations that use social media held that only large donors could have a sustained
for fund-raising purposes, some research suggests influence on elections. Dean’s use of social media
that the use of social media may differ across helped his campaign, but in the longer run, it
type of issue advocacy organization. D. S. Bortree demonstrated the influence that ordinary citizens
and T. Seltzer find that environmental organiza- could have on a national election.
tions do not make great use of social media other The 2008 campaigns were a milestone and
than to share information. H. R. Edwards and R. perhaps a permanent turning point in the use of
Hoefer argue that social work advocacy groups social media for political fund-raising. It has been
are still struggling to adequately get beyond the well documented that Barack Obama and his
information stage with their Web sites, and have team raised around $500 million online. It is esti-
not begun to systematically adopt social media mated that around one-third to one-half of these
technologies. In general researchers have found donations were from small donors.
that most nonprofit use of social media focuses on During the same election cycle, in stark organi-
conveying information, rather than on mobilizing zational contrast, U.S. Representative Ron Paul’s
Fund-Raising 563

2008 presidential campaign produced a netroots


fund-raising effort surpassed in grassroots influ-
ence only by President Barack Obama’s. One dis-
tinct difference, however, was the relative lack of
influence exerted by Representative Paul’s offi-
cial campaign on this social media-based move-
ment. Unofficial campaign logos and unsanc-
tioned social media–based fund-raising events
became the norm for activists. The term money­
bomb was first used to describe agreed-upon
dates when these activists would coordinate
their donations. Despite the vast difference in the
total amounts raised (only tens of millions for
Paul, versus hundreds of millions for Obama),
both cases demonstrate the relationship between
community-building activities and fund-raising
in the social media arena.
The sustained influence of Obama’s online
organization was evident in the 2012 re-election
campaign. The Triple O operation undertook
sophisticated message-targeting efforts. This cul-
minated in the claim that, with amounts unspeci-
fied by the campaign, October 17, 2012, was
the most lucrative single day of fund-raising in
Obama campaign history. This result was fueled
entirely by online donations. This result came
on the heels of September 2012, when Obama
and the Democratic Party raised $181 million, Supporters of Ron Paul’s presidential campaign on November
the largest month of fund-raising in presidential 25, 2007. Some of Paul’s donors created grassroots fund-raising
history. campaigns in which many small donors would contribute
simultaneously in a so-called moneybomb.
Social Media to Raise Funds
The Pew Internet and American Life Project has
documented, through years of polling, that the
number of people who donate online has con- organizations. These authors suggest that the
sistently grown over the last two decades, as has content of social media and other online commu-
the number of political campaigns and advocacy nications be categorized as information, commu-
groups that have developed online fund-raising nity, and action. As the names imply, information
mechanisms. While earlier research focused on messages share information about the organiza-
how much these organizations used social media, tion, its activities, or matters of potential interest
more recent research has turned to the impor- to stakeholders; community entails messages that
tant question of how and for what purpose these aim at fostering relationships with stakeholders,
media are used. In the same vein, the emphasis of creating networks, and building communities;
this research is on the dynamics of organizational and action messages give stakeholders the chance
communication, rather than on the specifics of to participate in the cause, either through some
current social media because these technologies type of action or through donations.
are constantly evolving. Guo and Saxton further argue that these three
K. Lovejoy and R. D. Saxton identify three types of social media communication should be
key communicative functions that are reflected viewed as dependent upon each other. Extend-
in social media messages sent by nonprofit ing the information–community–action typology,
564 Fund-Raising

they propose a three-step pyramid model of social invested in the social network of the organization
media–based advocacy. The first step is to reach before contributing funds to a cause.
out to stakeholders and communicate the mes- In order to raise support from followers and
sage of the organization. The second step is to friends on social media, organizational commu-
deepen the knowledge of stakeholders and sustain nication needs to do more than simply provide
their interest in the organization. The third step information. The general relationship between
is to mobilize engagement in the organization’s community-building and action-motivated com-
cause. This pyramid model follows the general munications on social media applies to both
framework of traditional political and nonprofit advocacy organizations and political campaigns.
fund-raising. The unique aspect of social media It is likely that the role of social media fund-rais-
is the way that short messages on Twitter, online ing will only increase as more organizations begin
petitions, and hyperlinking can be used to create to understand and harness the financial power of
engagement opportunities unique to cyberspace. these media.
These engagement activities can then be linked
directly to donation requests. Michael Hammer
While the three-step framework has not been University of Georgia
explicitly applied to political campaigns in schol- Chao Guo
arly research, studies of the behavior of candidate Indiana University–Purdue University Indianapolis
campaigns and online campaign activities clearly
demonstrate that the same phenomenon is at See Also: Campaign, Presidential (2008);
work. As a result, the information, community, Campaigns, 2012; Clickable Calls to Action;
and action categories can be used to study social MoveOn Effect; MoveOn.org.
media messages across different types of organiza-
tions. It is also useful because it can help one inter- Further Readings
pret the relative importance of social media fund- Bortree, D. S. and T. Seltzer. “Dialogic Strategies
raising (action) messages within an organization. and Outcomes: An Analysis of Environmental
In practice, this framework is consistent with Advocacy Groups’ Facebook Profiles.” Public
the finding that organizations and movements that Relations Review, v.35/3 (2009).
adequately build online communities are the most Edwards, H. R. and R. Hoefer. “Are Social Work
effective at social media fund-raising. Specifically, Advocacy Groups Using Web 2.0 Effectively?”
the lasting influence of social media fund-raising Journal of Policy Practice, v.9 (2010).
has been to allow small donors to be counted in Guo, Chao and Gregory Saxton. Twittering Social
the political process. A small donation to a politi- Change: How Social Media Are Changing
cal campaign or issue advocacy group allows an Nonprofit Advocacy, in press.
ordinary citizen to join with other like-minded Karpf, David. The MoveOn Effect: The
persons in a way that has a tangible influence Unexpected Transformation of American
on the political process. In particular, the 2008 Political Advocacy. New York: Oxford
presidential campaign demonstrated that small University Press, 2012.
donors were no longer negligible. Additionally, as Lovejoy, K., R. D. Waters, and G. D. Saxton.
Guo and Saxton suggest, one lasting influence of “Engaging Stakeholders Through Twitter: How
social media is the ability of advocacy groups and Nonprofit Organizations Are Getting More Out
campaigns to cultivate an active network of sup- of 140 Characters or Less.” Public Relations
porters who feel connected to the mission of the Review, v.38/2 (2012).
organization to a degree out of proportion to the McNutt, J. “Social Networking and Constituent
amount of funds donated. Relationships at the State Level: Connecting
Government to Citizens in a Time of Crisis.” Paper
Conclusion presented at the Northeast Conference on Public
Social media fund-raising follows a common pat- Administration (NECoPA), Newark, NJ, October
tern of requiring that constituents be adequately 22–23, 2010.
G
Gate Keeping Theory politics, gate keepers are individuals who can
control the access to powerful positions and regu-
and Social Media late information flow, and thus control political
influence. Many companies have precise poli-
Gate keeping theory is often related to mass media cies for disclosing information that set specific
and organizations, explaining why certain stories guidelines on what should be communicated to
are selected and become news, and others are not. external publics, and those policies function as
The concept of “gate keeping” was, however, not gate keepers. Google uses algorithms to select the
primarily conceptualized to explain a phenom- news items that readers can view in the dedicated
enon pertaining to communication and media news section of Google’s Web site, and this pro-
studies. It was created in 1947 by Kurt Lewin, cess is considered gate keeping.
a psychologist and pioneer in social psychology, Since the 1950s, gate keeping theory became
who was interested in studying leadership and one of the milestones of subsequent studies in
group dynamics. Lewin observed that certain indi- communication and media fields. The theory pro-
viduals retain positions that allow them to decide vides a framework for analyzing, assessing, and
what to pass to a group of people through each knowing how news selection occurs, and why cer-
gate section, of which, in any process, there are tain elements are selected or rejected. Most people
several. These powerful individuals are known as rely on journalists to transform information into a
gate keepers, or the “guards of the gate.” Based manageable set of sound bites. Journalists’ selec-
on personal or social influences, the gate keepers tion of information contributes to the construc-
select and pass only certain commodities—mate- tion of social reality. Because gaining information
rials, goods, and information—that they believe often means gaining knowledge, and knowledge
can help individuals to make sound decisions and is power, gate keepers are considered very influ-
secure social order. ential and powerful. It is therefore important to
Today, the concept of gate keeper has an understand journalists’ processes of news selection
extended meaning. Individuals, bloggers, media, to understand what people consume and how this
political institutions, professional codes of con- may eventually affect their opinion on social real-
duct, company policies, and even computer ity. The first pioneer in using this concept in mass
algorithms can be considered gate keepers when communication was David Manning White, who
they have control over diffusing information. In applied Lewin’s gate keeping idea to newspapers’

565
566 Gate Keeping Theory and Social Media

processes of news selection. White observed that The event of Internet and digital media has,
journalists often filter unwanted, sensible, and/ however, substantially changed the identity and
or controversial information, and publish only role of gate keepers, as well as the process of gate
information that conforms to the journal’s edi- keeping. The Internet has made information more
torial standards and agenda, and/or information easily and readily available, which means that
that is not against the news organization’s policy. time has become a great restraint for checking
Because of this, White considered journalists the truth and accuracy of the information reported.
gate keepers of information. Additionally, in democratic societies, the control-
The process of gate keeping in a news organiza- ling and/ or blocking of information is limited to
tion can occur at different stages of news produc- specific online contents, for instance, pertaining
tion. At the initial stage, gate keeping takes place child pornography, hate speech, defamation, or
when news gatherers, such as reporters, writers, theft of intellectual property. The new digital era
and local editors block certain messages coming has also introduced a new stage in the gate keep-
from the external news environment and allow ing process, whereby digital audiences participate
others to enter the news room; the role of news as secondary gate keepers on the Internet.
gatherers is to select certain stories and discharge Today, bloggers and digital citizens are increas-
others, not letting them pass the “gate.” Journal- ingly the gate keepers of world news. Multiple
ists receive a large amount of stories and informa- news stories about events are available online,
tion on events by numerous organizations, insti- and the credibility of the source posting that
tutions, companies, and politicians. They need to content has become a major issue in online news
select what it is relevant from what is not, before reporting. Critics of citizen journalism point out
transforming the selected stories into news copy. that such journalism undermines the essential role
Gate keeping does not only occur within the of journalists as organizers and makers of sense of
newspaper environment, in the news room, but what is happing around the world. While newer
it can also happen at an early stage when report- communication technologies have facilitated the
ers collect stories on the street. At the final stage, creation and diffusion of online content, the con-
news processors, such as editors, copyreaders, and tent offered may be biased and/or unrestricted
translators modify and integrate news copies and from judgments, and thus can deteriorate the
decide how it should be transmitted to the audi- quality of news. On the other hand, the presence
ence. This process is also gate keeping because of information gate keepers outside news rooms
news processors are in the position to filter, shape, has put pressure on journalists to be more trans-
and change the priority and format of the stories parent in their news selection processes, and indi-
that they want to transmit to their audience. rectly this is positive because it reduces the power
Studies concerning the gate keeping role of of media organizations in setting public agendas.
news media have initially focused on the decision
process for selecting the news events to publish— Chiara Valentini
what to include or exclude. Later, scholars became Aarhus University
more interested in understanding other variables
related to the selection procedures, for instance, See Also: Citizen Journalism; Digital Citizen;
the processes of decisions related to the time/space Framing Theory, Social Media and; News Media.
allotted to a news event, the number of graphics
and stories about the event, where the news event Further Readings
was placed within a publication or program, and McQuail, Dennis. McQuail’s Reader in Mass
to which extent the event was covered by subse- Communication Theory. 6th ed. London:
quent news stories, also called “news circularity.” Sage, 2010.
Gate keeping theory contributed to the develop- Rosenberry, Jack and Burton St. John III. Public
ment of successive theories, such as agenda set- Journalism 2.0: The Promise and Reality of a
ting and framing theories. Several scholars believe Citizen Engaged Press. New York: Routledge, 2009.
that the concept of gate keeping is vital in any Shoemaker, Pamela J. and Timothy Vos. Gatekeeping
type of communication planning. Theory. New York: Routledge, 2009.
Gender 567

Shoemaker, Pamela J., Timothy J. Vos, and Stephen That leads to another aspect of interconnection
D. Reese. “Journalists as Gatekeepers.” In The between gender and social media, the actual repre-
Handbook of Journalism Studies, K. Wahl- sentation of various individuals and groups using
Jorgensen and Thomas Hanitzsch, eds. New York: social media engines. This becomes essential when
Routledge, 2008. the profiles and activities of politicians are stud-
ied. Also, gender minorities such as lesbian, gay,
bisexual, and transgender (LGBT) groups should
be considered when analyzing the representation
and activity of minorities in social media. For the
Gender latter, it becomes even more crucial when it is nec-
essary to provide wide audiences with up-to-date
When speaking about gender as a socially con- information about LGBT politics to disseminate
structed phenomenon, one usually refers to the news and generate discussion.
duality of two major social categories: women and
men. Sociologists differentiate between more than Gender Differences in Using Social Media
two gender identities, though it is still a rather When social networking sites spread in the Inter-
common stage of analysis in the social sciences to net, women as well as men quickly adopted the
discover whether any significant differences exist new type of mediated communication. Results
between the behavioral patterns, opinions, value of a recent study by Kimbrough and colleagues
orientations, and intentions between female and in 2012 indicate that women, compared to men,
male respondents. A similar approach might be are generally more frequent mediated communi-
applied to the sphere of social media: gender par- cation users. Women prefer and more frequently
ticularities in the use of Facebook, Twitter, You- use text messaging, social media, and online video
Tube and other platforms. People of any gender calls. They also use Facebook more for maintain-
identity use social media for different reasons: for ing existing relationships, whereas men follow
making and keeping social contacts, supporting an agentic pattern, using the sites more for mak-
informal learning practices, reflecting on daily life ing new relationships and finding job leads. The
events, and sharing and discussing the continu- authors also refer to a study from 2008 that found
ously increasing body of information available equal shares of men and women among Facebook
over the Internet. However, recent studies dis- users, and to a 2009 study, which demonstrated
cover that women and men demonstrate slightly that 57 percent of Facebook users were women
different patterns of using social media. and 43 percent were men. This change could be
When studying male–female performance because of the rapid growth that occurred between
in social media, it is necessary to consider that 2007 and 2009, from 50 to 300 million Facebook
gender identity is not predetermined from birth, users. During this period, women over 40 years
but is (re)constructed in representing oneself and old were the fastest growing demographic on
interpreting others according to time, place, and social networking sites.
audience, in ways that are influenced by commu- In a study conducted by the Center for the
nity. Within this approach, construction of gen- Digital Future, nearly half of young women
der is an interactive process in which individuals reported having met offline with an online com-
are both objects and subjects of gender definition munity contact, whereas barely a third of young
through their physical and textual performances. men reported having done so. A global study
The character and influence of an individual’s conducted by ComScore Inc. in 2010 found that
contribution within this interaction process are social networking sites are used by a higher per-
affected both by available cultural representa- centage of online women (76 percent) than online
tions that compose the sources of meaning-mak- men (70 percent). A study of college students in
ing, and by existing power structures. Therefore, the United Kingdom conducted in 2010 revealed
social media can be considered a potential agent that the driving factors behind joining a social net-
of social change with respect to gender oppres- work differ substantially by gender, with female
sion and discrimination on different levels. participants joining to be generally sociable and
568 Gender

A Haitian woman works with Twitter during a technology training session on September 10, 2011, with a local rape crisis center
called KOFAVIV (Commission for Women Victims for Victims) and an independent U.S. nonprofit called Digital Democracy. The training
was part of preparations for the launch of a free hotline to allow women in Port-au-Prince to report rapes and other violence.

keep in touch with friends, and male participants compared to men who were “heavy” Facebook
joining based on peer pressure from friends and users (more than one hour per day) and in the
to make new friends. Another survey conducted minutes spent daily examining others’ Facebook
among U.S. university undergraduates in 2012 profiles (females: 24 minutes; males: 10 minutes).
aimed to explore gender differences in social net- It is possible that males utilize social networking
working, particularly for Facebook use. sites other than Facebook, and females are pri-
According to the findings of the survey, 80 marily drawn to Facebook.
percent of respondents reported that Facebook Another nationwide survey of 600 adults (296
was a part of their everyday activities. Almost 9 men and 304 women) in the United States about
of 10 undergraduate women “strongly agreed” social media site use was conducted by United
or “agreed” with this survey item (females: 88 Sample Inc. (uSamp). Among the top findings,
percent “strongly agree” and “agree”; males: uSamp found that “striking differences” exist
71 percent “strongly agree” and “agree”). The between men and women when it comes to sharing
study findings also proved that both genders use personal information on sites such as Facebook
social media, but women far exceed men in the (used by 81 percent of respondents), YouTube
time they spend on social media. In other results, (46 percent), Twitter (33 percent), and Myspace
females reported spending almost 62 percent of (32 percent). While almost three-quarters of
their Internet time on Facebook, compared to men and women were willing to share their rela-
44 percent for males. Furthermore, there were tionship status—and 62 percent were willing to
significant differences in the share of women share their religious affiliation—only 20 percent
Gender 569

of women would share their location, compared experience an enhanced sense of expressive auton-
to 35 percent of men, reports uSamp. In addi- omy. More broadly, widespread dissemination of
tion, 55 percent of men say they wouldn’t mind diverse and multiple narratives about female lives
revealing their e-mail address, but just 41 percent written by girls might begin to trouble dominant,
of women would do so. In all, just 8 percent of stereotypical definitions of “girl” and gender-
respondents were willing to share their physical based constraints that inhibit the achievement of
address. Among the segments by age, those aged social equality.
between 18 and 24 are the most active, with 86 However, the narrow presentation of “woman”
percent of men and 86 percent of women visiting as sexually self-objectifying and focused on looks
social media sites daily. in order to “get a man” is widely spread in all
Gender differences observed using social net- forms of mass media and advertising, and a num-
working sites are also found in other online envi- ber of scholars argue that such media stereotypes
ronments. In Second Life, a virtual online com- powerfully influence the self-formative processes
munity, people behaved according to traditional of youngsters. Since girls and young women tend
gender role expectations. Specifically, the results to use the mainstream corporate sites that con-
of the study indicated that women were engaged tain high levels of advertising on their pages, these
in more communal activities, such as meet- same stereotypes are deeply embedded in social
ing people and shopping, while men reportedly media platforms. Some studies reveal that girls
engaged in more agentic activities, such as build- spend a great deal of time selecting pictures of
ing things and owning property. Thus, even when themselves that make them “look good” accord-
men and women have the freedom to behave in ing to media standards of female beauty for fur-
any way they want, they still prefer to behave in ther posting in social media.
a way that is consistent with social gender role The use of “glamour shots” is common because
expectations. it facilitates the presentation of an idealized self as
sexually attractive. Some studies of female ava-
Constructing and Reproducing tars found seductively posed, partially undressed
Gender Identities representations of girls are common on teen chat
There are also a number of studies of how social sites, and that sexualized images of girls are per-
media can impact construction of gender identi- vasive on Myspace. Other studies argue that the
ties and reproduction of gender stereotypes. First, vast majority of female profiles feature pictures
it was hoped that a multiplicity of widely distrib- of them partially clad and seductively posed
utable first-person performances might enable with their heads tilted, bodies angled sideways,
the destruction or destabilization of constrain- and eyes looking up or at the camera, mirroring
ing accounts of gendered identity and undermine the shots common in printed magazines. Schol-
the regime of shame used to enforce them. It was ars conclude that such positioning of the self
also supposed that social media would empower as always “up for it” and the “performance of
young women to counter mainstream media ste- confident sexual agency” has shifted to become
reotypes and provide them with the discursive a key regulative dimension of idealized feminin-
power to intentionally construct new and more ity across mainstream media and advertising, and
vibrant definitions of what it means to be a “girl.” that there is now a visual rule for young women
Social media have been theorized as a space for to display a sexy self on social networking sites.
female users to expand not only the scope of their The research conducted by Bailey and colleagues
engagement and influence, but also the strength and published in 2013 indicates that stereotypical
of their influence on constraining understandings representations of girls as sexualized objects seek-
of gender. ing male attention are commonly found in social
Women are not only better enabled to exchange networking sites. The authors present the results
comments, build relationships, and exchange of a qualitative study that examined how young
social capital via social media, but they are women “read” these stereotypes. Respondents
also empowered to engage in discussions telling understood social networking sites as a commod-
their personal stories. As a result, women could itized environment in which stereotypical kinds
570 Gender

of self-exposure by girls are markers of social Representation of Female Politicians


success and popularity. As such, these images are Female candidates and politicians ought to attract
“socially facilitative” for women. more attention and become more visible within
However, the gendered risks of judgment the social media so that affirmative measures such
according to familiar stereotypical norms are as quotas may positively affect women’s involve-
heightened by the intense surveillance enabled by ment in politics and change women’s role mod-
social networking sites. While the respondents els. This concerns the role of elite communication
indicated that celebrity culture inculcates girls in shaping and changing public opinion. In par-
with messages that they must be attractive, have ticular, in the modern media-dependent society,
a boyfriend, and be part of the party scene, girls a great responsibility is entrusted to the media
are much more likely than boys to be harshly system because coverage of women politicians (or
judged for emphasizing these elements in their the absence of coverage) has the potential of chal-
online profiles. Girls are also open to harsh criti- lenging or reinforcing women’s marginalization
cism for their degree of publicness. The risk of in public life. One of the obstacles that women
being called a “slut” for having an open profile, politicians perceive as the hardest to cope with is
too many friends, or posting too much infor- their restricted access to the media.
mation suggests that continuing discriminatory Recent studies of social media and electoral
standards around public participation may effec- campaigns of male and female candidates discov-
tively police girls’ capacity to fully participate ered the relationship between using digital media
online and complicate their ability to participate in a candidate’s political campaign strategy and
in defiant gender performances. voter support factors such as a candidate’s use
Finally, another form of reproducing stereotypes of the Web and social networking sites in con-
and dominating feminine identities is blogshops, junction with other traditional influences such
online sites in which young women model and as candidate gender. Having a robust Web pres-
sell apparel via social media that have exploded ence and using social media, holding other fac-
in many countries. As an extremely popular form tors constant, can be a significant contribution
of e-commerce, blogshops have catapulted their to the popularity of a candidate on the day of
owners and blogshop models to wealth and fame. election. Tactics of active social media represen-
The success of blogshops trades on commercial tation might be specifically beneficial to tradi-
intimacies cultivated by blogshop models and the tionally disadvantaged candidates in bridging the
involvement of blogshop consumers in practices gap of their under-representation in national and
which some scholars also identify as “value (co-) regional political institutions.
creation.” Researchers who study this phenom- The importance of studying female politicians’
enon of blogshops consider value (co-)creation as representation in social media is especially strik-
not focused on products. ing, taking into consideration the recent research
Rather, it takes place around the online results on the successes of male candidates in
“micro-celebrity” of blogshop models and senses presidential elections because of active campaigns
of homosocial intimacy between the persona of in social media. Additionally, social media plays
models and their audience of readers-cum-con- an important role in outlining a politician’s activ-
sumers. This focus on blogshop models’ per- ity after the election. A good example is the active
sona implicates both models and consumers in a use of social media by 2008 presidential candi-
homosocial discourse around emphasized femi- date and U.S. Secretary of State Hillary Clinton.
ninities, in which women’s bodies are subjected to However, there is a gap in available case studies
a refracted male attention carried out by women that focus attention on female candidates, despite
in the absence of men. This discourse within the the numerous studies of male politicians’ repre-
commercial sphere produces powerful and disci- sentation in Facebook or Twitter.
plining effects for both blogshop consumers and
the models, thus highlighting deeply gendered Gender Minorities’ Representation
intersections of femininity and commerce in The expansion of technological access has led to
online processes of value (co-)creation. substantial shifting in opportunities to connect
Gender 571

geographically dispersed members of margin- communities ignored or criticized in traditional


alized groups. Social media engines offer less media channels. Finally, the Internet in general
powerful individuals access to challenging the and social media in particular cannot end conten-
social order. They address the central problems tious regional debates over political practice, but
impeding the effectiveness of organizing gender they provide new possibilities for communication
minority groups: isolation, repression, resource within and across national boundaries.
restriction, and lack of community cohesion. According to some scholars, the benefits of
The relatively inexpensive social media offer a social media include the expansion of queer com-
virtual public sphere open to a wide range of munities within and across national boundaries.
actors and expressions. This range is restricted Whereas homophobia and political subjugation
by traditional sources of exclusion, such as race have isolated LGBT individuals from others in
and ethnicity, gender, class, and geographical their societies, and geography and politics have
location. But the increasing accessibility of travel kept them separated from others, social media
within cyberspace helps to mediate restrictions. enable an emancipatory and community-build-
As a result, the Internet and social media spe- ing realm that transcends international borders.
cifically can be especially important to marginal This potential globalization of communication
groups with limited finances or expectation of and connection may allow a virtual escape from
mainstream support for their views. the repression and rejection of real-time interac-
Studies from various countries demonstrate tions into a place of acceptance and solidarity.
that the Internet and social media are used to
overcome the social isolation of homosexuals Tetiana Kostiuchenko
because they can express the behavior patterns Tamara Martsenyuk
that can be socially labeled as deviant and fulfill National University of Kyiv-Mohyla Academy
personal and political needs online.
One comparison of LGBT Web sites in the See Also: Actors and Social Media in Politics;
United States, Germany, China, and Japan Age; Avatars; Clinton, Hillary; Economic and Social
claimed that “there is no other forum in which so Justice; Human Rights; Lesbian, Gay, Bisexual, and
many people of so many different backgrounds Transgender Rights.
have safely disclosed, and felt comfortable dis-
closing, their sexual identities.” Cyberspace is Further Readings
crucial for sexual minorities, according to legal Bailey, Jane, Valerie Steeves, Jackuelyn Burkell,
scholar Edward Stein, because of social and legal and Priscilla Regan. “Negotiating With Gender
discrimination that either compels them to be Stereotypes on Social Networking Sites:
closeted, or punishes them should they emerge. From ‘Bicycle Face’ to Facebook.” Journal of
In sharp contrast to mainstream society, cyber- Communication Inquiry, v.37/2 (2013).
space is an ideal environment and a “virtual Clipson, Timothy W., S. Ann Wilson, and Debbie D.
lifeline.” DuFrene. “The Social Networking Arena: Battle
Scholars who have studied the lesbian com- of the Sexes.” Business Communication Quarterly,
munity and its representation in Latin America v.75/1 (2012).
emphasize that lesbians can find each other via ComScore. “Women on the Web: How Women
the Internet, even if they are isolated in their daily Are Shaping the Internet” (June 2010). http://
lives; and if they can find a reasonably private www.comscore.com/Press_Events/Presentations_
place to go online, they can be “out” without fear Whitepapers/2010/Women_on_the_Web_How_
of stigma or violence. Compared to the often-tran- Women_are_Shaping_the_Internet (Accessed
sient spaces of “women’s nights” at bars or cafés, August 2013).
or the expense of keeping up an office, Web sites Kimbrough, Amanda M., Rosanna E. Guadagno,
offer a more stable and inexpensive platform for Nicole L. Muscanell, and Janeann Dill. “Gender
socializing and activism. E-mail, distribution lists, Differences in Mediated Communication: Women
and social media are relatively accessible sources Connect More Than Do Men.” Computers in
of alternative information, and are crucial for Human Behavior, v.29 (2013).
572 Geo-Locational Enabling

Geo-Locational application suite named Earth Viewer, re-emerged


in 2005 as Google Earth. Other Keyhole Inc. soft-
Enabling ware developments survive in Google services
such as the Keyhole Markup Language, Google
Geo-location enabling has received growing Maps, and Google Mobile. Since that time, given
attention by political campaign strategists, par- the widespread use of Web-delivered applications
ticularly in the past decade. Collaborative inter- such as Google Earth and NASA World Wind,
active online tools that track the geographical geospatial data and geo-locational enabling have
nature of information, most notably demographic been used extensively in a diverse array of appli-
data and voting trends, have numerous practical cations and topical areas, ranging from entertain-
applications in political campaign strategy. Geo- ment to education.
location enabling has been used by political cam-
paign strategists to identity and target potential Elections
voters in very specific geographic locations and One year after the launch of Google Earth,
encourage them to vote, to track candidates’ cam- Google released the Google Earth Election Guide,
paign trails, and to analyze how national and a resource that was designed in preparation for
international issues and concerns have local con- the November 2006 elections. The Google Earth
sequences for political campaigns. Election Guide was conceptualized and designed
by Google Earth engineers who found it chal-
History lenging to seek aggregated election information
While geo-locational enabling strategies have online. The guide provided geo-specific election
been used with increasing intensity in political information, including voter registration, voting
campaigns, most notably since the 2008 U.S. pres- locations, and campaign financing statistics from
idential election, researchers and experts in the the Center for Responsive Politics and Federal
area of spatially aware mobile applications have Election Commission. An interactive element to
recognized for decades that nearly all information the guide allowed users to click on each of the
relates to or can be traced back to specific places. 435 U.S. Congressional districts that link to infor-
Security and intelligence specialists have focused mation and live feeds from Google Web, Image,
their information and communication technol- and News Search for each district’s candidates.
ogy development efforts on location-specific data The years following the launch of the Google
gathering to enhance the national security efforts Earth Election Guide saw a vast increase in the
of government bureaus such as the U.S. Central use of Web-enabled mobile communications for
Intelligence Agency and Federal Bureau of Inves- political campaigning, issues awareness-raising
tigation, the French Direction Centrale du Ren- and other political topics. A survey conducted
seignement Intérieur, China’s Ministry of State by the Pew Internet and American Life Project
Security, and the security and intelligence services reported that during the 2010 U.S. mid-term elec-
of the United Kingdom Home and Foreign and tions, 26 percent of U.S. citizens used their cell
Commonwealth Offices, commonly known as phones to find out where to vote, follow cam-
MI5 and MI6, respectively. paign developments, get polling results, and on
Since the turn of the new millennium, soft- election night, get election results as quickly as
ware developments in geospatial data visualiza- they were determined and announced.
tion have increased attention to location-specific The Pew survey also found that 12 percent
information and communication for many other of respondents reported using their cell phones
practical applications than national security and to keep abreast of election news coverage, 10
intelligence. A major breakthrough in geo-loca- percent sent texts related to the election to per-
tion enabling occurred in 2001, with the found- sonal contacts, 6 percent used their cell phones
ing of the geospatial data visualization company to receive information about voting locations and
Keyhole Inc. After Keyhole Inc. was acquired by “voting conditions,” 1 percent relied on mobile
Google in 2004, the company’s most promis- delivered applications related to the election, and
ing software development, the satellite mapping 1 percent made financial donations to various
Geo-Locational Enabling 573

rights groups, the American Civil Liberties Union,


and the Federal Trade Commission have called
for guidelines about how online marketers, appli-
cation developers, and even law enforcement
authorities collect and share individuals’ geospa-
tial data that they can retrieve from GPS-enabled
mobile devices.
In August 2012, the ACLU filed a lawsuit
under the Freedom of Information Act that would
require the FBI to reveal its use of geo-locational
enabling devices. One result was the U.S. Con-
gress’ consideration of the Geolocation Privacy
and Surveillance Act, which would require law
enforcement to obtain a warrant in order to
access citizen’s geospatial location data through
cellphone and other geo-locational enabling
device tracking.

Lara Lengel
Bowling Green State University

See Also: Campaigns, Congressional (2010);


Campaigns, Presidential (2008); Campaigns,
2012; Data Mining; Microtargeting; Mobile Apps;
Google Maps on a mobile phone in 2006, the year after the Mobile Connectivity, Trends in Politics; Selective
launch of Google Earth. By 2010, 88 percent of Americans who Exposure; Social Media Strategies and Tactics;
registered to vote owned cell phones, and 26 percent of U.S. Voter Identification; Voter Privacy; Voter Turnout;
citizens were using their phones to find information about voting. VoterVault.com; Web Mapping and Online Politics.

Further Readings
Bhattacharya, Sourav. “Preference Monotonicity
political candidates and political causes through and Information Aggregation in Elections.”
text messaging applications. Econometrica, v.81/3 (2013).
By 2012 geo-locational enabling was touted as Dale, Allison and Aaron Strauss. “Don’t Forget to
the “game-changer” for the U.S. presidential elec- Vote: Text Message Reminders as a Mobilization
tion. Given that at the time of the 2010 Pew sur- Tool.” American Journal of Political Science,
vey, 88 percent of registered voters in the United v.53/4 (2009).
States had a cell phone and of those more than Good, Chris. “Walking Edge: Canvassing With
half were smart phones, mobile-delivered infor- GPS.” http://www.theatlantic.com/politics/
mation generally and geo-locational enabling spe- archive/2010/01/walking-edge-canvassing-with
cifically offered immense prospects for political -gps/33802 (Accessed July 2013).
campaign strategy. Strategists used geo-location Jeffrey, Robin and Assa Doron. “Mobile-izing:
enabling to contact people within a one-to-two- Democracy, Organization and India’s First ‘Mass
mile radius of specific events like campaign rallies Mobile Phone’ Elections.” Journal of Asian
with targeted, mobile-delivered advertisements Studies, v.71/1 (2012).
and candidate updates. Kamber, Kate. “Cell Phones for GOTV: Voter
Mobilization Methods on Election Day.” http://
Privacy Concerns www.epolitics.com/2012/10/16/cell-phones-for
With the increase of geo-locational enabled appli- -gotv-voter-mobilization-methods-on-election-day
cations, privacy advocates, legislators, consumer (Accessed July 2013).
574 Geotagging

Rainie, Lee and Aaron Smith. “Politics Goes Mobile: geotag information can be read by several media
26 Percent of Americans Used Their Cell Phones systems. The main options of geotagging systems
to Connect to the 2010 Elections.” Pew Research are the capture of GPS information at the time of
Center Internet and American Life Project (2010). publication or local position added by the user.
West, Darrell M. “M-Campaigning: Mobile Location-based services have different approaches
Technology and Public Outreach.” Issues in to privacy, but most present default settings.
Technology Innovation, v.15 (2012). There are no industry standards. However,
there are a variety of techniques implemented by
diverse services with different purposes includ-
ing to (1) propagate to friends a specific location;
(2) suggest commercial and cultural information
Geotagging based on local position; (3) locate discount cou-
pons for stores in the user’s geographical area;
Tagging is one of the defining characteristics of (4) aggregate data for a location; and (5) provide
Web 2.0 services and platforms. Tagging tech- real-time, location-based searches. There are also
niques allow users to collectively annotate, classify, several other geotagging applications in differ-
and categorize content. Social tagging systems are ent contexts and business, such as event or object
a mix of two standards: one based on user actions, recognition, geolocation, media visualization, ser-
and another based on the system architecture that vices and products recommendations, social net-
defines the rules and relationships between users working, and mapping.
and resource tags. Geotagging is a feature that The adoption of geospatial features allows
is presented individually to users. The users can tracking content or users by associating it with
share locations and add geolocated data to con- GPS. The presence of geographically relevant
tent. Adding geographical identification metadata metadata can help users to find a variety of loca-
to an information resource attaches value to the tion-specific information, which generates geo-
content by making it more searchable. awareness across the Web repository and within
Geotagging is the process of adding metadata computer-mediated communication. Geotagging-
with geographical identification to content. It is enabled information services can be used to find
also defined as a form of geospatial metadata. location-based resources on news Web sites,
The geotagging process derived from global posi- multimedia content, and other platforms. Social
tion systems (GPS), which are based on a latitude media platforms often present content relevant to
and longitude coordinates model. Thus, the posi- a given location.
tions assumed by geotagging-enabled information Geotagging systems have complex dynamics
services stem from this pattern. to present content-derived location informa-
Geotagging enables the spatial indexing of con- tion. Proximity and sibling features are the most
tent. Therefore, it is a process of recognized geo- common, and are used to present places based
graphic locations that enhances the development on geographic distance and similar places and
of geographical databases, geo-referenced Web points of interest that share a parent in a geo-
resources, and geo-referenced multimedia con- graphic hierarchy.
tent. Consequently, geotagging is a practice that There are several social media platforms with
completely modifies how the user interacts with tag-based systems, such as Flickr and Facebook,
content and other users in digital space. Systems which enable content to be found through a loca-
with geotagging features usually add to media tion search. These platforms allow users to add
content latitude and longitude coordinates, dis- metadata to an information resource in an auto-
tance, and place names. The data added consists matic or manual procedure.
of textual and visual features. Content indexation through geographic com-
Geotagging standards in electronic file formats ponents emphasizes the location argument. The
are embedded in the information in metadata. variety of geo-enabled features allows location-
However, for each type of media, there are different based, personalized information services target-
protocols to attach geospatial information because ing regional publics. Mobile applications and
Get Out the Vote Drives 575

social platforms can benefit from the use of geo- turnout in elections. These drives are carried
graphical information, which is based on a GPS out by a variety of political organizations, both
and Wi-Fi triangulation. Several online services partisan and nonpartisan. Some focus solely on
collect, provide, and analyze geo-information as a voter identification and registration; others aim to
business. Geo-information is an important value mobilize these voters, getting them to cast early,
for corporations, and it can be a market opportu- absentee, or Election Day ballots. GOTV efforts
nity for business, for example, the social platform have traditionally included activities like canvass-
Foursquare. The business model of various mobile ing, phoning, and mailing campaign literature. In
applications and Internet services is based on geo- recent years, campaigns have incorporated a vari-
tagging. Such features have also been the basis of ety of new media strategies in their GOTV drives.
the evolution of communication and interaction Political parties, specific campaign organi-
in the context of the social Web. zations, and other partisan groups are chiefly
The practice of geotagging is a technique of responsible for GOTV efforts during each cam-
managing information on the social Web and an paign cycle. Especially in the thousands of local
example of collective intelligence that provides elections held each year, these organizations opt
insight into human social structures. Technologi- for a more personal, scaled-back approach to
cal innovation in recent years and the prolifera- mobilizing voters. National elections are more
tion of the Internet, GPS devices, smartphones, likely to see increased involvement of nonpar-
and tablets suggest that the availability of geo- tisan organizations like Rock the Vote and the
tagged content will continue to expand. League of Women Voters. Although each orga-
nization varies in partisanship and intent, they
Inês Amaral hold some of the same goals: identify, register,
University of Minho and mobilize voters.
Regardless of the method chosen for mobilizing
See Also: Data Mining; Folksonomy; Foursquare; voters, the first step in a GOTV effort is always
Geo-Locational Enabling. identifying potential voters. First-time voter
programs and organizations like Rock the Vote
Further Readings identify and target young voters. Other organiza-
Lieberman, Michael, Hanan Samet, and Jagan tions specifically target women, minorities, reli-
Sankaranayananan. “Geotagging: Using Proximity, gious groups, and others according to a variety
Sibling, and Prominence Clues to Understand of demographic traits. Campaigns will typically
Comma Groups.” Proceedings of the 6th Workshop identify several populations to target as poten-
on Geographic Information Retrieval, v.6 (2010). tial voters. They may compile lists of potential
Luo, Jiebo, Dhiraj Joshi, Jie Yu, and Andrew voters from registered voter lists by reaching out
Gallagher. “Geotagging in Multimedia and to other organizations (e.g., churches and civic
Computer Vision—A Survey.” Multimedia Tools organizations), or through other means. Cam-
Applications Journal, v.51/1 (2011). paigns can then refine those lists by seeking fur-
Smith, Gene. Tagging: People-Powered Metadata ther information on individuals. As technology
for the Social Web. Upper Saddle River, NJ: has progressed, some companies have merged
Pearson Education, 2008. voter data with commercially obtained informa-
tion to create comprehensive voter databases.
When resources allow, campaign organizations
may use these databases to reach very specific
target audiences.
Get Out the Vote Donald P. Green and Alan S. Gerber found
that more personal approaches to mobilizing vot-
Drives ers are typically more successful than the imper-
sonal. Personal interactions like door-to-door
Political organizations often use get out the vote canvassing are more likely to turn out voters than
(GOTV) drives in an effort to increase voter impersonal strategies like prerecorded phone
576 Get Out the Vote Drives

calls and mass e-mails. However, each GOTV Organizations with the aim of turning out vot-
strategy has advantages and disadvantages for ers also frequently turn to phone banks. Less per-
campaigns based on cost, time, efficiency, and sonal than door-to-door canvassing, phone calls
available resources. can still be effective if the caller comes across as
conversational and authentic. Meanwhile, callers
Strategies who hurry through scripts are unable to make a
Door-to-door campaigning is a traditional and personal connection with the potential voter and
popular form of getting out the vote. Local par- are less likely to influence that individual’s deci-
ties, limited in financial and other resources, sion to vote. Robocalls, or prerecorded messages
still tend to favor this strategy. Canvassing may from candidates or key supporters, also fail to
be done by volunteers, paid staff workers, allied make personal connections; however, Green and
group members, or candidates. During a visit, a Gerber note that some voters may enjoy receiv-
canvasser talks to a potential voter and may also ing a phone message from a favorite politician or
distribute campaign materials, such as a yard sign celebrity. Robocalls can also easily be specifically
or pamphlet. Door-to-door canvassing is effective tailored and sent to certain audiences. The over-
because it helps potential voters make personal, use of phone calls from campaigns, telemarketers,
qualitative connections to a campaign. and others make this GOTV method bothersome
However, this GOTV strategy also entails for many potential voters. The increased number
certain risks, and can quickly consume an orga- of cell phones and decreased number of land-
nization’s time and resources. In addition to lines, the prevalence of caller ID technology, new
potential weather and safety concerns facing regulations on do-not-call lists, and other related
the canvassers, a campaign risks losing control issues make the future of phone campaigns com-
of its message through this form of voter mobi- plicated and uncertain. However, Lisa Garcia
lization. Untrained volunteers or representatives Bedolla and Melissa R. Michelson conducted an
of supportive organizations may not be depend- extensive experimental analysis, concluding that
able messengers for a candidate’s positions or a the use of phone banks, like the use of door-to-
campaign’s central theme. National campaigns, door and other interpersonal methods of voter
seeking standardization of their messages, often mobilization, were likely to change people from
shy away from this campaign form because of its low-propensity voters to regular voters.
decentralized nature. Additionally, the time- and Another traditional GOTV material is the cir-
resource-consuming nature of door-to-door can- cular, distributed either by mail or canvassing.
vassing leads organizations to favor other meth- Easier and less time consuming than having door-
ods that require fewer workers and less time. to-door conversations, circulars are also less likely
Other GOTV strategies similarly engage to have great effect on potential voters because of
potential voters in direct, face-to-face, personal their impersonal nature. Campaigns may choose
interactions. Candidates meeting individuals at to distribute door hangers, flyers, and pamphlets
campaign events, at local stores and restaurants, to different houses when they want to reach a
and at other events and locations may be another wide audience in a short amount of time. Direct
simple way to influence voter turnout. Similarly, mail makes it easier for campaigns to target cer-
campaigns holding rallies, forums, debates, and tain populations because they may send specific
seminars may also encourage voter turnout. material to certain sets of voters.
People at campaign events are sometimes even GOTV drives also employ radio, television,
encouraged to register or take part in early vot- and newspaper advertisements and appearances.
ing on the spot. Organizations may register vot- The abundance of negative television advertise-
ers, bus people to early voting locations, or direct ments are often designed to suppress voter turn-
them toward absentee ballots. Barack Obama’s out from those who might support a candidate’s
2012 presidential campaign did much to encour- opponent. Other advertisements that highlight
age early voting in states like Ohio, with the can- the importance of upcoming elections have a
didate calling on supporters to leave his rallies more positive effect in turning out the vote. A
and vote. 2012 Obama campaign ad did this by recalling
Get Out the Vote Drives 577

the 2000 presidential race in Florida, where a Campaign supporters’ abilities to share statuses
537-vote difference determined the outcome of and updates on Facebook, to retweet messages
the election. Representatives of campaigns and on Twitter, and to similarly promote messages
other GOTV organizations also appear or seek on blogs, Web sites, and other social networks is
coverage from traditional media sources in order also an advantage for campaigns relying on new
to influence potential voters. On Election Day, media. Supporters have an easy way of involv-
candidates and their families often gain media ing themselves in campaigns, and can easily pass
attention by voting and saying words of encour- along GOTV messages to those they are connected
agement for the viewing audience to do the to online. It has never been easier for individuals
same. Obama became the first major candidate to publicly express their support for a candidate
to cast his vote early in the 2012 elections, and or to encourage others to vote. Simply liking a
gained media attention that day for encouraging status, sharing a video, or retweeting a com-
viewers to do the same. Comprehensive GOTV ment can turn someone into an important GOTV
campaigns also use interviews and a variety of campaign tool. Unfortunately, little research has
other media appearances to communicate their been done concerning the effectiveness of social
messages. media GOTV efforts so far. Unfortunately also,
many limitations exist on how GOTV messages
Social Media might be received. A campaign is unable to con-
While GOTV campaigns are still reliant on long- trol its message once out in social media—it has
established methods and traditional media, tech- little control over which meme becomes popular
nological advancements are drastically altering or how people disseminate their messages. Also,
the ways these campaigns operate. E-mail allows while social networks continue to grow, there
organizations to reach a large number of people remains a portion of the population that is not
at a very low cost. Organizations can be flexible reachable through this channel. Others on social
with the content of their e-mails and can also networks may ignore or respond negatively to
choose how many to send out. As with direct political messages. Finally, there are many who
mailings and robocalls, organizations may also share privacy concerns over how campaigns may
send specific messages to certain target groups access and use their personal information. GOTV
with e-mails. E-mail recipients can easily for- campaigns could risk alienating potential voters
ward these messages to friends and families, by using too much of their gathered data.
making e-mail an even more attractive GOTV In summary, GOTV efforts will continue to
campaign form. Unfortunately for GOTV cam- grow and expand in numerous, unpredictable
paigns, e-mails may often be discarded as spam ways. Political campaigns and other GOTV orga-
and junk mail by recipients or by some e-mail nizations will continue to use social media in
servers. People may not always read their e-mails, order to gather information and mobilize voters.
and may become annoyed by an organization’s Some of these ways will be entirely new, while
overuse of the channel. others will supplement more traditional GOTV
The constantly evolving landscape of social methods. Meanwhile, traditional methods like
media can also play a prominent role in GOTV canvassing and telephoning will likely continue
efforts. First, many new media tools are used to to thrive as campaigns attempt to reach poten-
supplement more traditional methods of turn- tial voters with personal messages and through as
ing out the vote. Phone apps have been used to many channels as possible.
help campaign volunteers register voters and
participate in door-to-door canvassing. Inter- Jefferson Walker
ested viewers can watch television advertise- Jason Edward Black
ments on YouTube and other video-sharing Web University of Alabama
sites. Political campaigns can collect information
about potential voters from Facebook and other See Also: Campaigns, Organizing; HeadCount.org;
social network sites in order to aid their micro- Nonprofit Organizations; Rock the Vote;
targeting efforts. Voter Turnout; Youth Engagement.
578 GetUp.org.au

Further Readings As their first campaign, GetUp! encouraged


Friedenberg, Robert V. Communication Consultants Australians to send e-mails to senators and rep-
in Political Campaigns: Ballot Box Warriors. resentatives in the Howard coalition government
Westport, CT: Praeger, 1997. to remind them that the public was watching and
Garcia Bedolla, Lisa and Melissa R. Michelson. would hold them accountable for their campaign
Mobilizing Inclusion: Transforming the Electorate promises and the decisions they made while in
Through Get-Out-the-Vote Campaigns. New office. Since then, the organization and its mem-
Haven, CT: Yale University Press, 2012. bers have supported a variety of campaigns since
Green, Donald P. and Alan S. Gerber. Get Out the 2005, including issues both within Australia
Vote: How to Increase Voter Turnout. 2nd ed. and of international importance. It lobbied the
Washington, DC: Brookings Institution, 2008. Howard government to push the American gov-
ernment for the unconditional release of David
Hicks (an Australian who had been detained in
Guantanamo Bay after taking combat training
at al Farouq, an Al Qaeda–affiliated training
GetUp.org.au camp in Afghanistan); it opposed Rudd govern-
ment efforts to implement Internet censorship; it
GetUp.org.au is a nonprofit Australian Web site took out advertisements in support of WikiLeaks
that facilitates grassroots community advocacy. founder Julian Assange; it stood against China’s
Fashioned after the U.S. site MoveOn.org, GetUp! treatment of Tibet; and it has spent many years
Action Australia seeks to give average Australians campaigning for marriage equality legislation in
the ability to have their voice heard within the Australia.
Australian political scene while holding politi- GetUp! does not support any particular
cians accountable on issues that are important to Australian political party, taking as its goal to
Australians. The core functions of the organiza- broadly hold politicians accountable for its deci-
tion are based on its Web site, which allows mem- sions. While it accept donations from the gen-
bers to post petitions, virtually sign petitions, and eral public, private organizations, unions, and
send pro forma e-mail letters to members of par- community groups, it does not accept donations
liament. In addition to its Internet-based activi- or funding from political parties or the Austra-
ties, GetUp! also promotes causes important to lian government. Although its campaigns have
members through participating in relevant events, generated positive feedback from the Australian
releasing television advertisements and radio public for the impact that it has had upon gov-
announcements. ernmental policy, GetUp! has garnered a signifi-
As a nonprofit organization, GetUp! does not cant amount of criticism leveled at its motives,
support any specific Australian political party. questionable facts and figures, and its selective
GetUp!-oriented campaigns are varied, and include campaign processes.
social justice issues, economic fairness, and cam- In August 2005, GetUp! was criticized by
paigning for sustainable environmental policies. Andrew Robb, an Australian Liberal Party poli-
Although GetUp! has had a significant impact on tician, who claimed that the site was partisan
Australian politics, it has received widespread crit- because of its outspoken opposition to key Lib-
icism for its motives and methods. Launched by eral Party policies and legislation. When speaking
Jeremy Heimans and David Madden on August on The 7:30 Report, an Australian current affairs
1, 2005, GetUp.org.au combined Internet advo- television program on the Australian Broadcast-
cacy with television advertisements in a bid to ing Corporation, Robb accused GetUp! of being
encourage voters to “keep the Howard Govern- a front for the Labor Party, suggesting that it
ment accountable,” in reference to John Howard was not upfront and honest about its motives or
and the coalition government of Australia, when political affiliation. The organization repeatedly
the Liberal-National coalition assumed control of rejected the idea, pointing to a number of its cam-
both houses of parliament in August 2005, some- paigns that criticized the Labor Party as well as
thing that had not happened since 1981. the Liberal Party.
Ghost Blogging 579

Following from this, Australian Special Minis- Further Readings


ter of State Eric Abetz petitioned for the Australian Dubecki, Larissa. “The Mouse-Click That Roared.”
Competition and Consumer Commission (ACCC) The Age (February 24, 2007).
and the Australian Electoral Commission (AEC) GetUp! http://www.getup.org.au (Accessed August
to investigate GetUp! to determine whether there 2013).
was a conflict of interest regarding donations and “Hicks May Face Two-Year Delay: Mori.” Sydney
its affiliation with political parties. Abetz’s petition Morning Herald (August 23, 2006).
was rejected by the AEC for a lack of sufficient evi-
dence supporting a full enquiry.
The organization has also met criticism for the
use of questionable facts and figures. For instance,
GetUp! maintains that it has over 600,000 mem- Ghost Blogging
bers; however, this number is questioned because
anyone who signs a petition on the site is auto- Political figures can use blogs to develop a per-
matically considered a member, whether they have sonal sense of connection with supporters and
officially joined the site or not. Additionally, the engage in conversations with them. Blog readers
membership application process is open to manip- enjoy a behind-the-scenes view from the politi-
ulation and falsification. In addition to claims of cal figure’s perspective and a sense of getting to
exaggerated membership numbers, GetUp! has know the person. Reporters also follow political
been accused of overestimating attendance num- figures’ blogs as sources for news. Blogs, however,
bers at its rallies. At a rally for gay marriage in are time consuming to write and require strong
2011, then Director Simon Sheikh said that there writing skills. Given these constraints, there is
were tens of thousands of people in attendance, substantial debate about whether political figures
while police estimated that no more than 5,000 should engage in ghost blogging. In the context
people attended. At a 2011 rally regarding the of politics, ghost blogging occurs when a staff
proposed carbon tax, GetUp! claimed that over member writes blog posts on behalf of a political
8,000 people attended, while others put the atten- figure who is stated as the author. There is sub-
dance at no more than 4,000. stantial debate about the ethics and effectiveness
In 2012, the group was criticized again, this of ghost blogging.
time for presenting misleading facts in their No The ethical question regarding ghost blogging is
Harvey No campaign. No Harvey No campaign whether it should occur without a disclosure state-
materials claimed that the timber used in manu- ment that explains how the blog is written. A dis-
facturing the furniture sold by Australian furni- closure statement could explain, for example, that
ture retailer Harvey Norman was contributing the political figure shares his or her thoughts each
to the deforestation of Australia’s native forests. week with a particular staff person (who would
The campaign was met with criticism by both the be named) for the blog, and this person writes the
Furniture Industry Association of Australia and blog based on these conversations. The disclosure
then Minister for Manufacturing Kim Carr, both statement could also include that the political fig-
of whom argued that the group was discourag- ure reads each blog post and makes it his or her
ing people from purchasing Australian-made fur- own before publication, and this person responds
niture and supporting Australian jobs, when the to comments personally. The idea that a political
timber came from sustainably harvested Austra- figure would have assistance with editing a blog for
lian native forests. grammar and spelling is not controversial because
these types of changes are not considered impor-
Danielle Lawson tant to the authenticity of the communication.
Edinboro University Although ghost blogging with disclosure is a
rare practice, some politicians adopt a philosophy
See Also: Activists and Activism, Digital; Advocacy of radical transparency. This philosophy refers
Groups, Political Branding of; Campaigns, to unprecedented amounts of disclosure, and is
Grassroots; Transparency. commonly used to build trust. An example of a
580 Gillibrand, Kirsten

radical transparency practice is a disclosure state- Further Readings


ment on a Twitter profile. Barrack Obama’s Twit- Gallicano, T. D., K. Brett, and T. Hopp. “Is Ghost
ter profile explains that tweets written by Obama Blogging Like Speechwriting? A Survey of
are signed “-bo.” Practitioners About the Ethics of Ghost Blogging.”
Critics of ghost blogging without disclosure Proceedings of the International Public Relations
argue that there are heightened expectations Research Conference, March 2012. http://iprrc
for authenticity in social media; however, advo- .org/docs/IPRRC_15_Proceedings.pdf (Accessed
cates counter that audiences today are savvy January 2013).
enough to believe that a political figure is not the Gallicano, T. D., Y. Y. Cho, and T. H. Bivins. “What
actual author of his or her blog. T. D. Gallicano, Do Blog Readers Think? A Survey to Assess
Y. Y. Cho, and T. H. Bivins conducted a national Ghost Blog/ging and Ghost Commenting.” Paper
study of 500 readers of politicians’ blogs and presented at the meeting of the Association
found that a little more than half of the read- for Education in Journalism and Mass
ers believed that a staff person drafts blog posts Communication, Chicago, August 2012.
for politicians, about a third of the readers were Howard, Joshua. “What Is Ghost Blogging?”
unsure, and the remaining respondents expected InstantShift (November 29, 2011). http://www
that politicians wrote their own blogs. .instantshift.com/2011/11/29/what-is-ghost
The effectiveness of ghost blogging can be -blogging (Accessed January 2013).
assessed based on whether blog readers approve
of the practice. Gallicano, Cho, and Bivins asked
readers of politicians’ blogs whether it was accept-
able for a politician to have someone else write the
blog posts, provided that the content came from Gillibrand, Kirsten
the politician and the politician gave final approval
of the blog posts before they were published. A Kirsten Elizabeth Rutnik Gillibrand has been New
little less than a third of the readers of politicians’ York’s junior U.S. senator since the start of 2009;
blogs expressed approval of ghost blogging, less she replaced Hillary Rodham Clinton in that
than a quarter were not sure, and a little less than position when Clinton became secretary of state
half of the readers did not approve of the practice. under Barack Obama. Gillibrand is a member of
Based on this research, respondents were more the Democratic Party and formerly represented
likely to expect ghost blogging than to approve of the 20th Congressional District of New York in
it. Also, T. D. Gallicano, K. Brett, and T. Hopp the United States House of Representatives.
found in their survey of approximately 300 com- Gillibrand was appointed to the Senate seat she
munications professionals that more than two- now holds initially, according to New York law,
thirds of respondents thought that ghost blogging by the governor. In 2010, she was required to run
was acceptable, provided that the content came for the position in a special election, which she
from the stated author and the stated author gave easily won with about 63 percent of the vote. In
final approval of each blog post. 2012, she was re-elected for her first full, six-year
Alternatives to ghost blogging include having term, and in that election, Gillibrand garnered the
a blog that is written and publicly authored by highest margin of any New York statewide candi-
one or more staff members of the political figure. date in history—72 percent of the vote.
Another option would be to use only social media
that the political figure has time for, such as a Early Career
microblogging site (for example, Twitter). Upon graduating from law school in 1991, Gil-
librand began her practice as an associate with
Tiffany Derville Gallicano David Polk & Wardwell in New York. In 1992,
University of Oregon she took leave in order to be Judge Roger Miner’s
law clerk in Albany in the U.S. Second Circuit
See Also: Blogs; Blogs, Role in Politics; Campaigns, Court of Appeals. Back at David Polk after her
Digital; Ethics of Social Media in Politics. clerkship, Gillibrand represented Philip Morris
Gillibrand, Kirsten 581

Tobacco for purposes of both the civil lawsuits Gillibrand ran on the Democratic and working
involving the company and in the racketeering families party lines; Sweeney ran on Republican,
investigations launched by the U.S. Department conservative, and independence party lines. The
of Justice. During the tenure of this representa- Republican Party had an advantage of more than
tion, she was promoted to senior associate within 82,000 enrolled voters at the outset of the cam-
the firm. paign. During a race that saw Gillibrand stand
Gillibrand’s work with Philip Morris has somewhat more to the right on certain issues
proven controversial for her, especially given her than she would later do, and that saw Sweeney
liberal leanings. During her representation of accused of domestic violence, Gillibrand eventu-
the tobacco interest, she also represented abused ally won. Gillibrand was also reelected in 2008
women and their children in pro bono cases, as when she was challenged by former secretary of
well as tenants in lead-paint housing cases. Also state for New York Sandy Treadwell. Gillibrand
during her time at David Polk, Gillibrand became won by a margin of 24 points, significantly more
a leading member of the Democratic National than in 2006.
Committee’s Women’s Leadership Forum. At the outset of her congressional tenure, Gil-
After leaving Davis Polk & Wardwell during librand published her official schedule for each
the Clinton presidency, Gillibrand worked for day, including who she met with, alongside her
Housing and Urban Development (HUD) for personal financial statement and all earmark
Secretary Andrew Cuomo as his special counsel. requests she made. Gillibrand called this dossier
In that position, she worked on labor and new of information the Sunlight Report, and she was
markets initiatives for HUD. She also worked the first member of Congress to publish such a
toward strengthening enforcement of the Davis- statement. During her first year in office, Gilli-
Bacon Act. brand opened the earmarking process to the New
Beginning in 1999, Gillibrand worked for the York Times. Also, during her years in Congress,
2000 U.S. Senate campaign of Hillary Clinton. Gillibrand voted against the Immigration Reform
Her efforts on the campaign centered upon work- Act of 2007 and the Wall Street bailout proposed
ing with young women to enlist them in the cam- by George W. Bush.
paign effort. Many of these women would later In December 2008, Barack Obama chose Hill-
become active in Gillibrand’s campaigns. Clinton ary Rodham Clinton, then New York’s junior U.S.
became a mentor to Gillibrand during these years, senator, to fill the role of secretary of state. When
and Gillibrand has personally donated to Clin- she accepted, the duty of appointing her replace-
ton’s campaigns. ment fell to Governor Paterson of New York—an
In 2001, Gillibrand moved to New York’s appointment that by law would be followed by
Boies, Schiller & Flexner as a partner, where she a special election in 2010 for the duration of the
represented the Altria Group, the parent company full term. Paterson chose Gillibrand in January
of Philip Morris. In 2002, she moved from the 2009 after she lobbied for the position, among
Manhattan office to the Albany office and noti- others. She was 42 years old when sworn in that
fied the firm of her interest in running for office. month and was thus the youngest senator in the
In 2005, she left the firm in order to launch her 111th Congress.
2006 congressional campaign. Once she was appointed to the Senate, Gilli-
brand’s positions reflected the more progressive
Public Office bent of New York State as a whole, compared to
Her first campaign in 2006 was against John Swee- her more moderate positions for her representa-
ney, a four-term congressman and member of the tion of the conservative 20th District. On April
Republican Party. The 20th Congressional Dis- 9, 2009, Gillibrand, along with Chuck Schumer,
trict in New York was traditionally conservative issued a press release lending strong support to
and had elected almost exclusively Republican the nomination of a Latino to the Supreme Court
candidates since 1913. Sweeney himself had been upon the next vacancy. They proposed their first
quoted asserting that the Republican Party could choice, Sonia Sotomayor, and introduced her at
never lose the 20th District. During this race, the July Senate confirmation hearing.
582 Gillibrand, Kirsten

of legislation intended to fight theft of intellec-


tual property and illegal downloading. IPA was
attacked by many critics and free-speech scholars
who argued that it allotted far too much censor-
ship power to the federal government. Ultimately,
PIPA and its counterpart in the House, the Stop
Online Piracy Act (SOPA), were stopped.
Gillibrand has been an advocate for educa-
tional reform and received an “A” from the
National Education Association (NEA). She
voted in favor of expansion of the Head Start pro-
gram and opposed vouchers for private schools,
instead advocating for better public-school fund-
ing. Gillibrand authored the Keep Our Educators
Senator Kirsten Gillibrand drew the ire of Internet freedom Working Act, which didn’t get past the commit-
activists when she cosponsored the Stop Online Piracy Act (SOPA) tee stage, and also the Undergraduate Scholar-
and Protect IP Act (PIPA) bills. These protestors stood outside of ships Awards in Science, Technology, Engineering
Gillibrand’s office in New York City on January 18, 2012. and Mathematics Act (US STEM), which made
it to committee. US STEM would award 2,500
full-tuition grants to undergraduates through
the National Science Foundation (NSF) for their
Before the special election in 2010, Gillibrand last two years of school. Gillibrand also voted to
faced only Gail Goode, a New York City lawyer, reform the No Child Left Behind Act. Gillibrand
in the primary and won easily with 76 percent of supported numerous other educational initiatives
the vote. In the 2010 election, Gillibrand faced and increased funding for Pell Grant scholarships.
former congressman and Republican Joseph Dio-
Guardi. Although the election was at the outset 2012 Election
predicted to be a close race, in the end Gillibrand In the 2012 election, Gillibrand was challenged
took 54 of the 62 counties in New York. Those by Republican Wendy E. Long, an attorney. Long
counties that Gillibrand lost were carried by Dio- also ran on the Conservative Party platform,
Guardi by margins of 10 percent or less. This was while Gillibrand ran on the Democratic platform
her first statewide election, and it gave her the with the backing of the New York Times and the
Senate office until January 2013. Democrat and Chronicle. The 2012 election was
Gillibrand was a supporter of the James Zad- a major victory for Gillibrand, who took 72 per-
roga 9/11 Health and Compensation Act and cent of the vote—the largest margin of victory in
fought to repeal the “Don’t Ask, Don’t Tell” mili- the history of New York.
tary policy. These were probably her two most Gillibrand is a liberal, particularly in the realm
notable achievements during this latter half of the of social issues. At the end of 2012, she supported
111th session. In the aftermath of the 2011 shoot- same-sex marriage and gun control, receiving a
ing of Congresswoman Giffords in Tucson, Ari- 0 percent rating from the NRA in 2012. In the
zona, Gillibrand visited Giffords in the hospital. area of health care, Gillibrand supported reform,
The two were friends, and Giffords opened her a public option, a Medicare-for-all system, and
eyes for the first time during the visit. publicly funded abortion. An ongoing advocate
In 2011, the National Journal announced that for transparency in government operations, Gil-
Gillibrand, tied with Jeff Merkley, was one of librand continues to publish significantly more
the two most liberal members of the U.S. Senate. financial, personal, and scheduling information
Only one year earlier, in 2010, the National Jour- than most of her peers. In 2012, Gillibrand was
nal ranked her 10th, tied with Chuck Schumer. rated 8 percent by the American Conservative
In early 2012, Gillibrand was the cosponsor of Union and 90 percent from the American Civil
the Protect IP Act (PIPA), a controversial piece Liberties Union (ACLU).
Glee 583

Social Media Use profile/4f549ff218065b2bd30015a4/kirsten-


Kirsten Gillibrand is known in part for her social gillibrand (Accessed December 2012).
media presence. With nearly 55,000 followers and “The 10 Most Liberal Senators: 2011.” National
a Klout score of 85 (ranked 14th in the Senate), she Journal (2012). http://www.nationaljournal.com/
has a considerable online presence. Social media is pictures-video/the-10-most-liberal-senators-2011
of special import to the Gillibrand campaign and -vote-ratings-pictures-20120221 (Accessed
office because, as a very liberal Senator, her con- December 2012).
stituency is younger than average in the United
States. Social media use among voters increases
as age decreases, so maintaining an active online
profile is crucial for Gillibrand’s reach toward the
voters who will support her issues. Glee
As the StarCount page on Gillibrand demon-
strates, in any given day, there will be several The Fox Network musical comedy Glee is an
Facebook posts and tweets on her profiles. Gil- example of the successful integration of old and
librand also maintains a YouTube channel and new media and the use of social media to sell mass
liberally posts her video appearances. This works media to younger generations. From its debut in
especially well for her, given that her appearance the fall 2009 season, Glee has supplemented its
and attractiveness are common topics of discus- marketing with social media aimed at reaching a
sion among her peers and in the media. According target audience of teens and young adults.
to Socialbakers, Gillibrand gains approximately The network has innovated and popularized
700 fans on Facebook each month. new media tactics, including cross-platform loy-
alty games that reward points for fan activity on
Karla Lant different networks including Facebook, Twitter,
Northern Arizona University and Myspace. This type of integration lever-
ages television viewers’ increasing preference for
Further Reading using multiple screens at one time, rather than
Gillibrand, K. “I Support the Public Option.” focusing on a single activity. Created by promi-
Daily Kos (2009). http://www.dailykos.com/ nent television writer and outspoken gay rights
story/2009/05/11/730233/-I-Support-The-Public advocate Ryan Murphy, the program is also
-Option# (Accessed December 2012). notable for its self-conscious social commentary
“Kirsten Gillibrand.” Social Bakers (2012). http:// and equitable depictions of a gay teenage roman-
www.socialbakers.com/facebook-pages/ tic relationship in a way that parallels its por-
6820348410-kirsten-gillibrand/last-2-weeks trayal of straight couples.
(Accessed December 2012).
“Kirsten Gillibrand: U.S. Senator From New Television Audiences and Social Media
York” Poleet (2012). http://www.poleet.com/ Glee’s integrated old and new media strategies
SenGillibrand (Accessed December 2012). exemplify best practices in response to larger
Schumer, C. and K. Gillibrand. “Schumer, Gillibrand trends. Cross-platform media use has become
Make Direct Appeal to President Obama increasingly common, according to the Pew Inter-
Recommending He Nominate the First Ever Latino net and American Life Project. In 2012, 20 per-
to the Supreme Court Should a Vacancy Occur cent of Pew survey respondents said that they had
During His Term.” Press release (2009). http:// visited a Web site that they had seen mentioned
www.schumer.senate.gov/new_website/record on screen. An even larger proportion, 38 percent,
.cfm?id=311344 (Accessed December 2012). reported using their mobile phones during com-
Senator Kirsten Gillibrand. Roll Call (2012). http:// mercial breaks. Rather than suffering the ongoing
www.rollcall.com/members/25687.html (Accessed loss of viewers and divided attention, this type of
December 2012). social marketing engages TV viewers, using on-
StarCount. “Social Highlights From Kirsten screen prompts that invite them to join real-time
Gillibrand” (2012). http://www.starcount.com/ online discussions about the show on the most
584 Global Center for Journalism and Democracy

popular social networks, take polls, answer trivia the Center offers training programs for journalists
questions, and check into the experience via apps at all levels, from students to citizen journalists
like Foursquare and GetGlue. As a result, rather and beat reporters. GCJD staff, and its partners,”
than losing the audience to competing media, according to the Center Web site, “. . . also work
while people are watching Glee, they are inter- with political parties, law enforcement officials,
acting with a community of fellow fans (or even corrections officers and civil organizations in an
antifans) and other people watching on a variety effort to assist them in understanding the role of
of connected devices from mobile phones to lap- the press in a civil, democratic society, and how to
tops and iPads. In one contest, Glee fans vie to be develop more effective and productive communi-
named Gleek of the Week, a title that comes with cation relationships with mass media.”
on-air and online recognition. In 2011, Glee’s cre- Founded at Sam Houston State University
ators employed a similarly integrated campaign to (Huntsville, Texas) in 2012 by former CNN jus-
successfully launch the competition spin-off pro- tice correspondent Kelli Arena, the Global Center
gram The Glee Project on an even greater number for Journalism and Democracy the mission state-
of social media networks, including Tumblr, Face- ment for the Center is to “. . . provide resources
book, Twitter, and GetGlue. and training to journalists from around the world,
in addition to working with governments, organi-
Carole V. Bell zations and associations to help them better under-
Northeastern University stand the role of journalists and how to build better
working relationships with the press.” Addition-
See Also: Actors and Social Media in Politics; ally, the GCJD offers specialized training programs
Clicktivism; Musicians and Social Media in Politics; for journalists across a range of topics, including:
Television and Social Media. interactional and criminal justice, gender equity,
health, politics and elections, energy issues, and
Further Readings public health concerns. The GCJD also offers spe-
Rawski, Kristin. “Social Media Meets Traditional cialized assistance and mentoring for female jour-
Media in ‘Glee.’” Ignite (September 22, 2009). nalists and journalists in areas of conflict.
http://www.ignitesocialmedia.com/lifestyle/social The global training activities of the GCJD are
-media-glee (Accessed December 2012). also used as a means of providing opportunities
Smith, Aaron and Jan Lauren Boyles. “The Rise of for Sam Houston State University mass commu-
the ‘Connected Viewer.’” Pew Research Center nication students to travel, gaining both interna-
Pew Internet and American Life Project, 2012. tional and training experience. In addition to the
Wood, M. M. and L. Baughman. “Glee Fandom and travel opportunities available through the GCJD,
Twitter: Something New, or More of the Same Old the center also offers students internship opportu-
Thing?” Communication Studies, v.63/3 (2012). nities. Additionally, as part of its mission to foster
healthy press relationships on a global scale, the
GCJD brings international journalists and experts
across a range of topics to the campus to speak
to students about issues related to press freedom,
Global Center for and political and controversial issue reporting.
The GCJD has developed working partner-
Journalism and ships with a range of organizations, including:
Democracy the National Democratic Institute, Samir Kassir
SKeyes Center for Media and Cultural Freedom
The Global Center for Journalism and Democracy in Beruit, and UPI Next. In addition to offering
(GCJD) promotes the free press by working with training, the GCJD is committed to identifying
journalists, governments, organizations, and asso- appropriate cutting-edge communication tech-
ciations to foster healthy working “. . . relation- nologies that can help journalists communicate in
ships. Being housed within the Mass Communica- complex situations. The organization promotes
tion department at Sam Houston State University, the use of social media platforms like Facebook,
Global Voices 585

Twitter, and YouTube as useful tools for journal- and Society, a Harvard University research cen-
ists to share information, even in situations where ter. The idea for Global Voices grew out of an
communication is difficult. international blogger’s conference in 2004 at
Harvard. Before joining the Berkman Center,
Danielle Lawson MacKinnon was the Beijing and Tokyo bureau
Edinboro University chief for CNN. Zuckerman helped found Tripod
.com, an early online community Web site, and
See Also: Gender; Human Rights; International Geekcorps, a nonprofit that sent Internet tech-
Intervention; News Media; Press Freedom and nology experts to help companies in developing
Online/Social Media Security; Syria. countries. Zuckerman, now the director of the
Center for Civic Media at MIT; and MacKinnon,
Further Readings now a fellow at the New American Foundation
Global Center for Journalism and Democracy. http:// in Washington, D.C., both remain on the Global
shsu.edu/global-journalism (Accessed August Voices board of directors.
2013). The Global Voices community consists of a
Hallin, Dan C. and Paolo Mancini. Comparing Media board of directors, a group of advisors, project
Systems: Three Models of Media and Politics. directors, part-time editors, and volunteer authors.
Cambridge, UK: Cambridge University Press, 2004. The group of advisors is made up of activists, tech-
Levy, Leonard W., ed. Freedom of the Press From nology experts, and writers, including technology
Zenger to Jefferson. Durham, NC: Carolina journalist Xeni Jardin and John Palfrey, the direc-
Academic Press, 1996. tor of Berkman Center. The day-to-day work is
handled by the management team of project direc-
tors, editors, and authors. Project directors lead
special projects, for example, in free speech advo-
cacy and citizen journalism training. Subject edi-
Global Voices tors manage stories related to such subjects, for
example, sports. Regional editors manage stories
Global Voices is an online community of over from nine regions, ranging from the Caribbean to
800 volunteer authors and part-time editors who sub-Saharan Africa. Language editors work with
aggregate, translate, and amplify the online work volunteer authors to translate stories from their
of citizen journalists from around the globe. respective languages into English.
Global Voices is different from citizen journalism Lingua editors work with a group of more than
sites like Ground Report and Indymedia because 600 translators to then translate English-language
it does not post first-hand accounts. Instead, its stories into various other languages. Volunteer
editors and authors aggregate, contextualize, authors, who often blog about events in their
summarize, and link to first-hand accounts found countries, serve an important role. Many help
on Web sites, blogs, microblogs, podcasts, and bridge the gap between cultures. Most blogging
online videos. Global Voices focuses on stories is done intraculturally, written by a member of
from countries other than North America and a cultural group for other members of that cul-
Europe, especially developing countries. Often, tural group. What allows Global Voices to work
stories from these countries receive little or no well are bloggers who work interculturally; they
coverage in international mainstream media, and write about what is happening in their culture for
Global Voices seeks to change that. Global Voices’ an outside audience in the language of the out-
primary goals are to call attention to important side audience. For example, a Chinese blogger in
stories by citizen journalists to facilitate citizen China will write in English for his or her audience
journalism by providing needed training and tools in English-speaking countries.
and to advocate for free speech around the globe. Before a news story appears on the Global
Global Voices was founded in 2005 by Rebecca Voices Web site, there is a process. The process
MacKinnon and Ethan Zuckerman while both begins with a news event in a country, for example,
were fellows at the Berkman Center for Internet a national revolution or a sporting event. Citizen
586 Global Warming and Climate Change

journalists in the country blog, tweet, and post See Also: Berkman Center; Blogs; Citizen
video about the event. Volunteer authors, and Journalism; Developing Nations.
Global Voice editors, monitor the posts, aggre-
gate, summarize, link to first-hand accounts, and Further Readings
post the stories in English on the Global Voices MacKinnon, Rebecca.”Blogging, Journalism and
site. Interested readers can access the stories via Credibility: The Future of Global Participatory
RSS feeds, e-mail, Twitter, or Facebook. Lingua Media.” In On Global Communication, Yoshikuni
editors may select some of these stories for trans- Ono, ed. Kyoto, Japan: Seikai Shisosya, 2007.
lation into other languages. Zuckerman, Ethan. “Meet the Bridgebloggers.”
In addition to the Global Voices Web site that Public Choice, v.134 (2008).
calls attention to citizen journalism from around Zuckerman, Ethan. “A Small World After All?”
the world, Global Voices has other Web sites Wilson Quarterly, v.36 (2012).
and projects that address other goals. The Rais-
ing Voices project addresses Global Voices’ sec-
ond goal, to provide citizen journalism training
and tools. Raising Voices, launched in 2007, aims
to empower underrepresented communities by Global Warming and
awarding microgrants, developing tutorials on
citizen journalism, and cultivating a network of Climate Change
citizen journalism activists. The Global Voices
Advocacy project addresses Global Voices’ third The term global warming refers to the gradual
goal, to advocate for free speech around the globe. increase of the average temperature of the Earth’s
The advocacy project seeks to raise awareness atmosphere and oceans. It is an expression of sea-
about online freedom of speech issues, includ- sonal changes in the weather patterns of the Earth
ing censorship by governments. The project also as a whole or of its individual regions, which lead
maintains databases of past and current abuses of to a statistically significant deviation in the values
online rights around the world. of long-term weather parameters. The periods of
In a 2012 article by Zuckerman, he laments that reference for climate change range from decades
while Global Voices has gained recognition, it has to  millions of years. Most frequently, the term
had “only modest success” in gaining an audience. global warming is used in reference to the phe-
The truly interconnected, postnational world has nomenon observed in the 20th and 21st centuries.
not come about as predicted. The Internet greatly The term climate change is used in narrow and
aids in communication, but as Zukerman notes, wide senses. In its narrow sense, it refers restric-
Internet users often communicate online with peo- tively to climate change taking place in the pres-
ple they already know in their community. Zucker- ent, and in this use, it is synonymous to global
man’s research shows that 95 percent of the news warming. In the wide sense, it also includes the
consumed by Internet users in the United States is phases of global cooling and changes in precipi-
published in the United States. To push for a more tation patterns. The United Nations Framework
interconnected world, Zuckerman calls for design- Convention on Climate Change (UNFCCC) uses
ers of the next generation of online tools to help the term climate change in its narrow sense and
connect disparate voices from around the world. mainly in reference to anthropogenic climate
As Zuckerman notes, Facebook notifies users change, reserving the term climate variation for
when they have not friended a high school class- climate changes generated by natural causes. In
mate; Facebook and other social media companies some cases, in order to refer specifically to cli-
could possibly connect people to new friends on mate change caused by human activity, the term
the other side of the globe. anthropogenic climate change is used.
In referring to climate change and global
William Hart warming, politicians and the media often use
Norfolk State University the scientific data or explanations and hypoth-
eses supplied by scientists in order to support a
Global Warming and Climate Change 587

political stance on the problem. The scientific extinction of indigenous species of the coastal
approach to climate change must consider issues areas and islands that are now endangered.
relevant to many different scientific fields, such However, some scholars believe global warm-
as meteorology, physics, oceanography, chemis- ing to be a myth, whereas some researchers rec-
try, astronomy, geography, geology, and biology, ognize climate change, but reject the possibility
as well as many interdisciplinary branches. The of human influence on this process. There are sci-
issues related to climate change have profound entists who do not deny the fact of warming and
influences on society, which mainly confront its its anthropogenic nature, but do not agree with
economic and political aspects. its particular aspects, such as the notion that the
According to scientific assessment by the Inter- greatest impact on climate results from industrial
governmental Panel on Climate Change (IPCC), emissions of greenhouse gases.
supported by the national academies of science of
the Group of Eight, the average temperature on Global Warming and Traditional Media
Earth has risen by 1.26 degrees Fahrenheit (0.7 Over the past five years, global warming has
degrees C) since the beginning of the Industrial consistently been one of the most debated and
Revolution in the middle of the 18th century, and divisive subjects in social media, particularly in
a large proportion of observed climate warming the blogosphere. However, the importance of
over the last 50 years is attributable to human media in developing public awareness and con-
activities, specifically the emission of gases such cern with global warming and climate change has
as carbon dioxide (CO2) and methane (CH4), been evolving over the decades. Global warm-
which causes the greenhouse effect. According to ing began as a topic of scientific inquiry in the
the Natural Resources Defense Council (NRDC), 1960s, but it was not widely recognized until the
the United States is the largest source of global 1980s, the warmest decade on record, when seri-
warming pollution because with only 4 percent of ous journalistic and political interests were drawn
world’s population, it produces 25 percent of the to the weather conditions and climate. Journal-
carbon dioxide pollution from fossil fuel burning, ists reporting on global warming and related
thus emitting more carbon dioxide than China, issues cultivated the growth of public awareness.
India, and Japan combined. A study found that in 1981, only 38 percent of
Estimates obtained from the climate models Americans had heard of global warming; by 1987,
in the IPCC Assessment Report of 2007 indicate this number increased to 41 percent; and by 1990
that by the beginning of the 22nd century, the to 86 percent. Another study examined opinion
average global temperature of the Earth’s sur- trends in global warming in the past 20 years,
face might rise by 3.24 to 6.12 degrees F (1.8 to and found a strong correlation between patterns
3.4 degrees C), with a possible slight decrease of media coverage of global warming and changes
of temperature in some regions. In addition to in public opinion concerning the issue. The con-
the rise of sea level, the increase in global tem- nection is clearest between media attention and
perature will cause changes in the amount and public awareness of global warming as a prob-
distribution of precipitation. This might result in lem. In 1990 and 1992, two large groups of scien-
an increased frequency and magnitude of natu- tists received prominent news coverage when they
ral disasters such as floods, droughts, and hurri- petitioned President George H. W. Bush to take
canes. Among other possible consequences of the action to prevent global warming.
increase in global temperatures is the decrease The issue of global warming received renewed
of crop yields in the less-developed countries of political impetus in 2006 from the documentary
Africa, Asia, and Latin America; and increased film An Inconvenient Truth, directed by Davis
yields in developed countries because of the Guggenheim, featuring former U.S. Vice Presi-
increase in carbon dioxide concentration and dent Al Gore’s campaign to educate citizens about
longer growing seasons. The warming of the cli- global warming via a comprehensive slide show.
mate will probably lead to a shift in the areas The creators of the film do not intend to provide
populated by plant and animal species toward new or previously unknown information, but
the polar zones, and increase the probability of rather to popularize scientific knowledge that was
588 Global Warming and Climate Change

previously established by scholars. In the film, while social media keep proliferating with a
Al Gore explains in accessible terms the anthro- variety of opinions and calls for action based on
pogenic aspects of climate change that are com- the recognition of global warming as a human-
monly believed among scientists, as well as the generated phenomenon. This divergence between
scientific and political aspects of global warming mainstream and social media about global warm-
and its consequences in the near future if the car- ing may reflect the shifts in public opinion in
bon dioxide emissions caused by human activity the larger context of growing skepticism toward
are not limited. The film also contains a narrative both authorities and U.S. environmentalists, who
of Gore’s life. His story about the tragic death of have suffered several devastating losses in their
his sister, who was suffering from cancer, serves decades-long political struggle against global
as a metaphor for the possible fate of humanity warming. Lack of progress in domestic legislation
if the short-sighted exploitation of nature con- to cap greenhouse gas emission found its exter-
tinues. An Inconvenient Truth was first released nal expression in the lack of political will of the
in New York and Los Angeles on May 22, 2006, United States in the world arena. In May 2012, the
and by November, its revenues exceeded $20 mil- United States, together with Japan, Russia, and
lion, which is unusual for a documentary. The Canada, indicated that it would not sign a second
film received many accolades, including the 2007 period of the Kyoto Protocol to the UNFCCC, an
Academy Award for Documentary Feature. In the international treaty that sets binding obligations
same year, Al Gore was awarded the Nobel Peace on industrialized countries to reduce emissions of
Prize (together with the IPCC) for studying the greenhouse gases.
effects of global climate change caused by human In light of their failing diplomatic and legisla-
activity and the development of measures to pre- tive efforts, U.S. environmentalists try to refo-
vent them. cus on grassroots activism that lies at the core of
social media, thus making the latter an important
Global Warming and Social Media medium in their environmental efforts. One of the
The rapidly developing social media of today pro- most prominent examples of a successful imple-
vide more options for social marketing campaigns mentation of social media in spreading the mes-
aiming at the promotion of the awareness of global sage of anthropogenic climate change and cam-
warming and climate change. Social media have paigning against global warming is 350.org, an
been widely used in dealing with questions of cli- international environmental organization with
mate change, global warming, and related issues goals to build a global grassroots movement
as a platform for both information exchange and that raises awareness of anthropogenic climate
opinion dissemination. They serve as a main plat- change, to confront climate change denial and cut
form in debates between climate change believers emissions of one of the greenhouse gases, carbon
and skeptics. The engagement of the social media dioxide, in order to slow the rate of global warm-
in this and many other polarizing issues can be ing. The mission statement of 350.org reflects the
explained by the perceived grassroots nature of role of social media: “to organize in a new way—
social media that stand in opposition to main- everywhere at once, using online tools to facilitate
stream media because the powers that be pre- strategic offline action.” 350.org positions itself as
sumably have less control over the former. Social a science-based, single-issue organization. It takes
media are also a very flexible and fast means for its name from the research of Goddard Institute
disseminating an idea and gathering supporters. for Space Studies scientist James E. Hansen, who
The powerful means offered by social media are posited in a 2007 paper that 350 parts-per-mil-
used by both nonconformist environmental activ- lion of CO2 in the atmosphere is a safe upper limit
ists and well-established environmentalist groups to avoid triggering catastrophic climate change.
such as Greenpeace. 350.org emerged after the environmentalist
In some instances, social media can stand in author Bill McKibben and a group of Middlebury
opposition to mainstream media, such as when the College graduates organized the 2007 Step It Up
traditional media become more skeptical toward campaign directed to climate protection, where
the theory of anthropogenic global warming, they collaborated with existing environmental
Global Warming and Climate Change 589

organizations such as Greenpeace. The campaign In the wake of the Copenhagen Summit of
was conceived as the “first open source, web- 2009, another social media–driven event with
based day of action dedicated to stopping climate strong political repercussions occurred. An
change” and proved to be successful in reaching a unknown hacker attacked a server of the Cli-
wide audience. On April 14, 2007, tens of thou- matic Research Unit (CRU) at the University
sands of Americans held simultaneous rallies in of East Anglia (UEA), which led to surfacing of
some 1,400 places across the country, telling Con- thousands of computer files, including e-mails
gress to “step it up” and reduce carbon emissions pertaining to scientific aspects of climate change.
80 percent by 2050. This leak was immediately popularized by cli-
After the success of this campaign, 350.org mate change critics on their blogs that named the
was created. Since then, it has been active in an event Climate­gate. According to the critics of the
established Web presence and social media. Social global warming issue and deniers of anthropo-
media such as Skype, chat, and text messaging, genic climate change, the spilled files contained
as well as previously established activist networks e-mails evidencing that global warming was a sci-
such as change.org, were essential in organiz- entific conspiracy in which scientists had allegedly
ing the International Day of Climate Action on manipulated climate data with the purpose of sup-
October 24, 2009, in the wake of the 2009 United pressing critics. These accusations were rejected
Nations Climate Change Conference, commonly by the CRU, which stated that the e-mails had
known as the Copenhagen Summit. The group been taken out of context and merely reflected an
350.org claims to have mobilized over 5,200 honest exchange of ideas. Both mainstream and
actions in 181 countries. social media were actively involved in covering the

A Boston-area group creating one of 350.org’s approximately 5,200 actions that have spread to 181 countries, largely
through an extensive social media presence. This event was organized by Occupy Boston’s Climate Action, Sustainability, and
Environmental
Justice Working Group; its protestors filled the bandstand on Boston Common on May 5, 2012.
590 Going Viral

story, which had an impact on the development of to describe the rapid spread of nonmaterial enti-
the negotiations over climate change mitigation ties through communicative channels. Information
in Copenhagen. In response to the controversy can spread via a directed or broadcast message sys-
and to its development in the media, U.S. scien- tem, meaning that one can send the information to
tific organizations released statements reaffirming a group of designated people, or simply post the
the scientific consensus that global warming is a information to a location that many other people
growing threat to society. Rapidly evolving social can access. In either case, a piece of information
media, with its mobility of information exchange, can very rapidly spread through entire popula-
increasing accessibility, and attentiveness to cur- tions of people. The viral spread of information
rent events will continue to play a major role as a was catalyzed by the increased use and speed of
communication and action platform for different information and communication technologies
opinions concerning the issues of global warming (ICT). Many forms of information have been able
and climate change. to go viral, from videos to rumors, and the speed
at which people can access and share information
Alexander E. Pichugin via ICTs is directly related to the speed by which
Rutgers, The State University of New Jersey something can go viral.
The phenomena known as “going viral” is, at
See Also: Activists and Activism, Digital; Al Gore’s its core, an element of social networks. A social
Penguin Army; Cause-Marketing Campaigns; network is a series of individuals connected to
Environmental Issues; World Without Oil. each other via some phenomena, which can be
material or nonmaterial. Because people are con-
Further Readings nected to other individuals in their social networks
Boykoff, Maxwell T. Who Speaks for the via several different forms of media, there are
Climate?: Making Sense of Media Reporting many channels through which information can
on Climate Change. New York: Oxford spread to reach other people. Additionally, social
University Press, 2011. networks tend to overlap, so there are redundant
Dryzek, John S., Richard B. Norgaard, and David ties or connections to other people. When an
Schlosberg, eds. The Oxford Handbook of Climate individual shares information with other people
Change and Society. New York: Oxford University or posts something to a publicly viewable Inter-
Press, 2011. net site, that piece of information can then dif-
Wheeler, Stephen M. Climate Change and Social fuse through the social networks of anyone who
Ecology: A New Perspective on the Climate has access to the information. Tony Sampson has
Challenge. New York: Routledge, 2012. discussed the spread of information through net-
Whitmarsh, Lorraine, Irene Lorenzoni, and Saffron works as a form of contagion, and expresses the
O’Neill, eds. Engaging the Public With Climate deep connection between the connected age and
Change: Behaviour Change and Communication. network contagion.
London: Earthscan, 2011. Preferential attachment and information cas-
cades are two of the ways that a piece of informa-
tion can go viral. Some analysts have discussed
preferential attachment as a rich-get-richer type of
phenomenon, where the more popular the infor-
Going Viral mation becomes (e.g., how frequently an online
video is viewed), the more likely that informa-
Much like the viral spread of diseases, when some- tion will continue to become more popular or go
thing goes viral, it spreads throughout a popula- viral. The trajectory of the original popularity can
tion very quickly in near-exponential fashion. The stem from a number of sources. One such source
viral phenomenon is made possible when a piece that has frequently been the start of something
of information can be replicated, reproduced, or going viral is when an opinion leader, such as a
spread by individuals to other individuals. The famous or important public figure, draws atten-
advent of the Internet has led to the use of “viral” tion to some form of information, which then can
Google AdWords/AdSense in Campaign Strategy 591

be extensively shared through social networks. Further Readings


Once the information begins to attract increasing Rainie, Lee and Barry Wellman. Networked: The
attention, it can then appear as most viewed or New Social Operating System. Cambridge, MA:
trending on a particular Internet site, thus attract- MIT Press, 2012.
ing increasing attention. Sampson, Tony D. Virality: Contagion Theory in
Information cascades, on the other hand, don’t the Age of Networks. Minneapolis: University of
necessarily require an opinion leader to start Minnesota Press, 2012.
the viral spread of information. Duncan Watts Watts, Duncan. J. Six Degrees. New York: W. W.
explains information cascades in that anyone can Norton, 2003.
be a key player in a cascade because anyone can
be connected to others who are willing to be influ-
enced, and with the ease of sharing information
via ICTs, the threshold of willingness can be fairly
low. In a social network, each person has a set of Google AdWords/
connections that they pay attention to and a set
that pays attention to them, and this variability is AdSense in Campaign
important for something to go viral in an infor-
mation cascade.
Strategy
One form of ICT that has amplified the speed AdWords is a Google service for buying advertise-
at which something can go viral is social media. ments that are placed on Google or other sites in
Social media allow people to share information Google’s content network. One of the company’s
with a large group of other individuals very easily; major revenue streams, AdWords brought in the
social networking Web sites support the sharing bulk of Google’s $42.5 billion income in 2012.
of information with one’s social network, where AdSense, Google’s contextual advertising pro-
microblogging and social tagging Web sites allow gram, matches advertisers in the Google Display
for a more broadcast form of propagation. Fur- Network (GDN) with consumers based on their
ther, the richness of social media allows users to search keywords and phrases. Unlike traditional
either share or embed media-rich artifacts such as advertising in which advertisers pay a flat fee
videos very easily. As a result of the ease of shar- regardless of whether or not viewers see ads, and
ing a variety of media with anyone who is con- hope for exposure to those who happen to come
nected to the Internet, information can go viral across their Web site while searching for some-
very quickly. thing, however related or unrelated, contextual
Although there are several ways that informa- advertising is a type of targeted advertising that
tion can go viral, the predictability or creation displays ads relevant to users’ interests.
of viral phenomena remains one of its most elu- AdSense differs from AdWords in that, while
sive characteristics. Unexpectedness is one of the advertisers pay to run their ads through AdWords,
trademarks of the viral spread of information, Web site owners/publishers with an AdSense
and as such, there has been little success in forc- account do not. Rather, Google pays AdSense
ing or harnessing the ability to go viral. account holders for each click originating from
An example of a video going viral is the “Kony its Web sites.
2012” video, which was viewed 34 million times When people visit AdSense-activated Web sites
on the first day that it was uploaded, and 94 mil- they see square- or rectangular-shaped advertise-
lion times within eight months. ments deemed relevant to their interests, usually
located on Web sites’ sidebars or at the bottom
Devan Rosen of blog posts. Ad content is controlled by several
Ithaca College criteria, including the geophysical location of the
person visiting the Web site and users’ individual
See Also: Social Network Analysis; Strong-Tie Social browsing histories.
Connections Versus Weak-Tie Social Connections; Web site owners apply for an AdSense account
Trending Topic; Viral Marketing. for their site(s). Upon approval by Google, a
592 Google AdWords/AdSense in Campaign Strategy

“pay-on-performance,” or “pay-per-click,” agree- orientation/gender identity, or veteran status).


ment is instituted, whereby Google compen- The policy articulated Google’s commitment
sates AdSense account holders for the number of to fairly promote advertisements for all politi-
clicks placed on GDN advertisements appearing cal candidates regardless of political affiliation
on owners’/publishers’ Web sites. Once AdSense or viewpoint. The policy also necessitates state-
account holders determine the types of GDN ads ments that donations for political candidates or
they would like displayed on their sites, a Javas- parties are not tax deductible; forbids misleading
cript that routinely finds and displays GDN adver- ads, such as those claiming to be for an opposing
tisements determined relevant by account holders candidate; and prohibits attacks on candidates’
is added to their sites’ HTML code. Through an personal lives.
Internet Protocol address exclusion, holders can
exclude specific GDN advertisements, topics, Policy Challenges, Surges, and
individuals, or organizations they consider unfa- Negative Campaigning
vorable to their sites. Thereafter, GDN advertise- Google’s political advertising policy has been
ments, in the form of text, image, video, or rich challenged on several occasions. An example
media, appear on Web sites enrolled in AdSense. involving issue advocacy emerged in May 2011,
Account holders track performance statistics on when Google cancelled the AdWord advertise-
AdSense’s Web site. ment purchased by the Dublin-based sex worker
rights group, “Turn Off the Blue Light” (TOBL).
Use of AdWords and AdSense for Erroneously assuming that TOBL’s AdWord pur-
Elections and Issue Advocacy chase was for “selling adult sexual services,”
Although AdSense was launched in 2003, it Google rejected the purchase, saying that it was
wasn’t until the lead-up to the 2008 elections an “egregious violation” of its advertisement
that many political campaign strategists discov- policy. Although TOBL responded to clarify that
ered its potential. By late 2007, political strategy the ad was to raise awareness about sex worker
bloggers called AdWords and AdSense the “new rights, Google didn’t budge. Two months later,
political battle field.” Perhaps the most intense TOBL members organized a protest at Google’s
battle occurred shortly before election day in European headquarters in Dublin, after which
November 2008, when numerous Web sites that time Google conceded, and after determining its
had no connection to politics or marriage equality content to be advocating a political position, ran
debates were inundated with AdSense-generated TOBL’s advertisement.
ads encouraging voters to vote for Proposition 8, The following year, during the lead-up to the
which would eliminate the right for gay couples July 12, 2012, byelection for the state seat of
to marry in California. Responding to objec- Melbourne, an upstart political party in Austra-
tions by Google users and equality advocates, lia made a formal complaint to the U.S. Depart-
Google’s founder, Sergey Brin, CEO Eric Schmidt, ment of Justice (DOJ) against Google. Invok-
and other Silicon Valley illuminaries took out a ing the DOJ’s Foreign Corrupt Practices Act,
full-page ad in the San Jose Mercury newspaper the Australian Sex Party claimed that Google
urging readers to vote no on Proposition 8. The engaged in “unlawful interference in the con-
following week, on the company’s public policy duct of a state election in Victoria with corrupt
blog, the Google Elections and Issue Advocacy intent.” The complaint was lodged after the Aus-
Team attempted to defuse the “Prop 8 AdSense tralian Sex Party’s AdWords account application
debacle” with a reminder of Google’s political was rejected by Google on the grounds that the
advertisement policy. party’s Web site neglected to exhibit language
The policy requires political ads to meet the regarding its tax-exempt status, which was
same editorial guidelines as all other AdSense required in order to solicit donations.
advertisements: no copyright violations, and no The party amended the Web site to include
promotion of violence against anyone or advo- the required language; however, Google contin-
cacy against a protected group (including, but ued to ban its advertisements. On the eve of the
not limited to, ethnic or national origin, sexual election the party’s ads were reinstated, likely the
Googlearchy and Politics 593

result of media reports that the party was plan- cycle, Mitt Romney’s ads appeared on Gay.com
ning on taking Google to U.S. federal court. and PlanetOut, to the dismay of his strategists.
Despite the protection of Google’s political
advertisement policy, some strategists are con- Lara Lengel
cerned about the vulnerability to negative cam- Bowling Green State University
paign tactics from their opposition because even Ann Warmuth
the appearance of an opponent or a competing AVM Design and Multimedia Studio
cause would be problematic to a political cam-
paign. This is particularly the case with a strategy See Also: Campaign Strategy; Campaigns,
known as a Google Surge, Google Blast, or Net- Congressional 2010; Campaigns, Presidential 2008;
work Blast, a large marketing expenditure that Campaigns, 2012; Campaigns, Digital; Campaigns,
aims to create a substantial amount of targeted Virtual; Data Mining; Get Out The Vote Drives;
short-term advertising, “the Google equivalent of Google+; Identity Politics; Microtargeting; Online
putting a campaign sign in every yard in the city,” Smear Campaigns; Web Mapping and Online Politics.
as stated by Cristian Guasch. The first widely
reported political campaign surge occurred in Further Readings
March 2009, just before a special election for New Bassik, M. “What John Kerry Taught Us About
York’s 20th Congressional District. Democrat Online Advertising.” Campaigns and Elections,
Scott Murphy’s campaign ads flooded AdSense- v.25/10 (2004).
enrolled Web sites targeted to his district’s voters. Cornfield, Michael and Kate Kaye. “Online
Surges are also used for issue advocacy. For Political Advertising.” In Politicking Online:
example, the Daily Kos launched a weeklong The Transformation of Election Campaign
surge campaign calling attention to the “crony- Communications, Costas Panagopoulos, ed. New
ism and hypocrisy” in the hiring of 26-year-old Brunswick, NJ: Rutgers University Press, 2009.
Republican aide, Valerie Cass. On February 7, Guasch, Cristian. “What’s the Effectiveness of a
2011, Cass, identified by Alysia Hopper as the GDN Blast?” http://senkailabs.com/optimizers/
mistress of her husband, Wisconsin State Senator effectiveness-google-blast (Accessed July 2013).
Randy Hopper, was hired on the recommenda- New Media Congress. “Why Do I Keep Seeing the
tion of Wisconsin Governor Scott Walker’s cabi- Same Political Ad?” http://www.newmediacongress
net, at a 36 percent raise compared to her pre- .com/2011/07/political-remarketing-cookies
decessor. Four days later, claiming that the state -campaign.html (Accessed July 2013).
was broke, Walker released his budget repair
bill that enacted major layoffs, cut benefits, and
eliminated nearly all collective bargaining rights
for public workers.
Some political campaign strategists avoid Googlearchy and
AdSense, arguing that it is confusing at least,
damaging at worst, if a problematic GDN adver- Politics
tisement would appear on their campaign sites.
Further, they suggest that AdSense revenue is not As the Internet has continued to grow in usage
worth the potential exposure to unfavorable mes- and capability, political scientists have hypoth-
sages. Such strategists prefer the relative control esized that the ready availability of news would
of buying and placing AdWords ads. Nevertheless, lower the cost of political information and reduce
AdWords ads may appear on sites disagreeable inequalities of attention for less-attentive Ameri-
to strategists. For example, a John McCain cam- cans. Computer scientists, on the other hand,
paign strategist reported that a 2008 AdWords believe the opposite. Their research has sug-
purchase resulted in McCain ads featuring the gested that the Internet is actually antiegalitar-
statement, “Surrender Is Not an Option on Iraq” ian. Rather than equalizing opportunity, there
to appear on the Daily Kos, resulting in negative is instead a winner-take-all power distribution,
impact to the campaign. In the following election where a very small number of popular sites
594 Googlearchy and Politics

receive a disproportionate share of traffic. In a Googlearchy and the Average Citizen


departure from this general paradigm, however, Hindman argues that people actually have a sig-
political scientist Matthew Hindman, in The nificantly smaller public sphere on the Internet.
Myth of Digital Democracy, writes about the When the digital world narrows political dis-
idea of Googlearchy. Hindman argues that there course, it results in Googlearchy. Hindman is not
is a strong search engine bias that directs Inter- a hopeless optimist who believes that the Inter-
net users to certain sites far more often than oth- net has the capability of entirely transforming
ers. Hindman bases his work on a large survey of governance. Instead, he notes that the average
political content available online. His study uses American is far more likely to check the weather
“iterative crawling away from political sites eas- or a sports score than to closely follow politics.
ily accessible through popular online search tools, This, Hindman argues, is caused by the inability
and it uses sophisticated automated methods to of search engines to return rich, flavorful political
categorize site content.” He finds that, in every Web sites that are less well known or regarded by
category examined, a small handful of Web sites search engine optimizers. Political blogs are huge
dominate. While the Internet may lower the cost on the Internet—especially ones related to Ameri-
of finding some information on a topic, it actually can politics. Yet, the only way to find them is
limits the impact of the vast majority of political typically from word of mouth. These blogs thrive
Web sites. In short, the Googlearchy determines because of the boring and editorially narrow foci
what one is exposed to. of mainstream American media.
The Myth of Digital Democracy was published Even if an average citizen happens to stumble
in 2008 by Hindman, and contends that the belief upon a provocative blog online, odds are that it
that the Internet is democratizing politics is wrong. is written by someone with an advanced degree
He focuses on two main myths: that the Internet and trained under the traditional institutions
has extended political voice to previously voiceless of media. The top 30 blog sites (measured by
precincts, and that it has facilitated deliberation. daily hits), for example, are dominated by those
To examine his points, he focuses on five careful who have advanced degrees from elite educa-
categories of limits of online politics in the Ameri- tional institutions, even more so than was true
can context. First, Hindman’s research reminds a decade ago. Hindman shows that only about a
readers that political traffic is only a miniscule por- third of op-ed columnists have advanced degrees,
tion of Internet usage. He points out that pornog- whereas 75 percent of the top 30 bloggers have
raphy has well over 100 times more Internet traffic advanced degrees. The powerful drive even the
than political Web sites. Second, Hindman points allegedly egalitarian Internet. Whether these sites
out that the link structure of the Internet limits are the best at what they do is a different ques-
what citizens are exposed to. Users are taken to tion, but people keep coming back to them. Part
the most popular sites, which tend to only link to of the reason is a general lack of sophistication.
themselves or to other equally popular sites. Third, Most search engine users fail to ever click past
search engine use is particularly shallow. Consum- the initial page of results. It is likely that they
ers are taken to the most familiar sites, rather than never select a result not listed in the top three
those that are best or the most relevant. Further, slots. This shows why search engines play such
sites are able to purchase the ability to be listed an important role in determining whether the
higher through search engine optimization or paid Internet is truly equal.
ads. Fourth, Hindman discusses the expense of Hindman’s study suggests clear impacts on
digital content. While it is relatively cheap to have American politics. Online search browsers pro-
an online presence, successful marketing, capacity, vide users with a point of entry to the Internet,
and software development are all quite costly. As but if users continually select only the first or
a result, those who have been on the Internet the second options, they are missing other poten-
longest tend to dominate. Fifth, social hierarchies tial sources—sources that could in fact be better
quickly emerge. Once someone is established as a suited to their needs. The high degree of overlap
blogger or subject expert, he or she quickly gains between the results obtained with the Yahoo!
near monopoly power. and Google seed sets, particularly among heavily
Google+ 595

linked sites, underlines this point. Any site that is to travel to government, government is accessible
more than three clicks away from any of the top through a home computer. Hindman fails to speak
200 Google or Yahoo! results on a given topic is to this point. Matt Bai argues that Hindman’s data
off the beaten track and highly unlikely to have is old, and “the political impact of the Internet is
any substantial impact on mass politics. Google’s spreading so quickly that it’s almost impossible to
“I’m Feeling Lucky” button only makes this more capture and quantify.” He disparages Hindman’s
so. Now, consumers do not need to consider graphs and equations and prefers anecdotes about
which site to go to. Google will allow its private Internet activists from modest backgrounds. And
algorithm to decide for the consumer and then Manuel Castells points to the power of the Inter-
automatically open that page. net generally in helping citizens at the point where
people look to “take matters into their own hands,
Social Media engaging in collective action outside the prescribed
Social media has inserted a new variable into Hind- institutional channels, to defend their demands
man’s idea of Googlearchy. Now, with any individ- and, eventually, to change the rulers and even the
ual having the ability to publicize his or her views rules shaping their lives.”
or beliefs, some argue that the Internet has reached
a state of complete openness. Yet, the approach of William J. Miller
social media suggests that this is not the case. While Flagler College
one can post a political message on Facebook, it
will only be visible to friends. A Google search will See Also: Blogosphere; Google+; Search Engine
not return the message. The same is true for Twit- Optimization.
ter or any other social media site. One may have an
audience, but it is entirely composed of individuals Further Readings
who have self-selected to read one’s work. It is not Castells, Manuel. Networks of Outrage and Hope:
available for anyone to stumble upon. In this sense, Social Movements in the Internet Age. New York:
social media is in many ways even less democratic Polity Press, 2012.
than the traditional Internet. Hindman, Mathew. The Myth of Digital Democracy.
Hindman’s theory has not been met with univer- Princeton, NJ: Princeton University Press, 2008.
sal acceptance. Micah Sifry has made the most com- Mencer, Fillipo, Santo Fortunato, Alessandro
prehensive set of arguments against Hindman— Flammini, and Alessandro Vespgnani.
most notably during the 2009 Digital Democracy “Googlearchy or Googlocracy?” IEEE Spectrum
Debate at Yale. Sifry argues that while access may (February 2006).
not be entirely equal, it is no longer fully depen- Timmer, John. “Is There a Googlearchy?” Ars
dent on having money or connections. Anyone Technica (August 17, 2006).
can have a blog, Web site, or Twitter account, and
grow an audience. Blogs in particular, Sifry claims,
are equalizing because bloggers have a continual
conversation with readers. Bloggers may be more
educated, but that does not mean that their readers Google+
are. While Hindman tries to claim that the Web,
as a whole, emphasizes sound bites far too much, Google+ is a social network launched by Google
he neglects the many ways that content is directly in summer 2011. During its initial soft launch it
rewarded. No one—Sifry claims—seems to notice used a user-to-user or an invitation-only basis.
that the second most popular Obama video on Then in fall 2012, Google opened Google+ to
YouTube is 37 minutes in length. everyone, and the Web site quickly became one
Clay Shirky (backed by Evgeny Morozov) adds of the most popular social networking Web sites
another point of contention with Hindman by after Facebook and Twitter. Google+ can be
stating that when political data becomes avail- accessed on a computer or on iOS or Android
able online, it actually shifts the information bal- mobile device through apps. The site has attracted
ance toward ordinary citizens. Instead of having more than 400 million accounts, with more than
596 Google+

359 million active users in May 2013. Individu- customers in their area. Local takes advantage of
als over age 18 with Google accounts can become the Zagat rating system. Colleges and universities
users of Google+. These users can follow people can use pages to interact with current students
and organizations of interest and group these and recruit prospective students. Professors can
individuals and organizations into circles. Google create pages for their classes and host office hours
users have the ability to organize other users in or record lectures with Google+ Hangouts.
one or more circles. These circles can be public or
private, and certain circles can receive specific con- Google+ and Politics
tent. Google+ has a variety of features, including Google+ was utilized in the 2012 presidential
Google+ Hangouts and Google+ Events. campaign by President Obama. He used Google+
Google+ Hangouts allows users to communi- Hangouts to communicate with the public through
cate synchronously using audio and video. Users the White House Google+ Hangout event. This
can share and view Google Docs or watch You- event was automatically streamed to YouTube,
Tube videos within the hangout. A maximum of and viewers could interact directly with the presi-
10 users can participate in a Google+ Hangout. dent. The White House Google+ Hangout was the
Hangouts can be recorded (Hangouts on Air). first virtual presidential interview held in the White
Hangouts on Air are streamed to YouTube. Oth- House. This event provided viewers with oppor-
ers can watch the YouTube stream synchronously tunities to ask very candid questions focused on
or asynchronously. The link to the YouTube video the National Defense Authorization Act (NDAA),
can be embedded in a post on Google+, so users Stop Online Piracy Act (SOPA), and Anti-Coun-
can watch the stream synchronously or asynchro- terfeiting Trade Agreement (ACTA). Through this
nously in Google+. social media Web site, Obama received questions
Google+ Events can be used to schedule events from viewers across the nation, and one viewer
inside or outside of Google+. Google+ Events are provided Obama with an opportunity to find her
synced with users’ Google Calendars. Users can husband a job because he was out of work.
create an event to schedule a hangout or an event During the 2002 presidential election, a Google
when the users will be at the same location. Users Politics and Elections 2012 page was launched on
can also share photos associated with an event. Google+. Using the hashtag #googlepolitics, the
Google+ page focused on politics featured info-
Communication on Google+ graphics such as the top five rising search terms
Google+ users can communicate their interest in in the United States. This infographic featured
content across the Internet by the +1 button or the following most popular search terms: Popu-
Share button. When a user utilizes the +1 button, lar Vote 2012, FL Election Results, Stock Market,
this click represents an endorsement for news or Diane Sawyer Drunk, and Puerto Rico Statehood.
controversial articles. The share button is gener- Viewers were encouraged to provide comments
ally utilized for news articles, videos, and so on. on each infographic through a text window on
Google+ is integrated with other Google the right-hand side of the screen. During the final
products. For example, YouTube videos can be presidential debate, Google+ published an info-
embedded into posts or viewed by all members graphic titled The Top 4 Search Terms During the
of a Google+ Hangout. Users can share and view Final Presidential Debate. This infographic was
Google Docs within a hangout. Users can employ divided by the following terms: With Obama and
Google Messenger to chat with other users. With Romney. The four top search terms under
Google+ users can use hangouts within Gmail to With Obama were: Apology Tour, Bin Laden,
chat with other users. Google+ users can post pic- 2008, and Horses/Bayonets. The four top search
tures in Picasa Web albums in Google+. Google+ terms under With Romney were Auto Bailout,
can be integrated with Blogger. What Is on Flag Pin, Budget Plan, and What Kind
Users can also create pages for organizations. of Car Does Mitt Drive. Seventy-six Google+
For example, businesses can use pages to inter- users gave the infographic a +1 (endorsement), 19
act with customers. Small businesses can take Google+ users forwarded the article, and 34 peo-
advantage of the Local features to interact with ple provided comments below the infographic.
Grassley, Chuck 597

Google+ provided infographics related to search and whistleblower protection. He sits on a num-
terms during and after each presidential debate. ber of committees including those for judiciary
During the weeks leading up to the election, and finance. His hometown newspaper, the Des
Google+ created a Voter Information Tool and Moines Register, recently ranked him the member
Civic Information API. These tools were uti- of the Iowa delegation with the most political pull.
lized to find voter ID requirements, early voting Charles Grassley was born September 17, 1933,
sites, sample ballots, and polling places. More in Iowa. He attended the University of Northern
than 600 Web sites embedded the tool into their Iowa, where he received a bachelor’s degree in
sites, including the Huffington Post, CNN, the political science in 1955. Grassley continued at
Democratic Congressional Campaign Commit- the University of Northern Iowa, where he gradu-
tee, and the Republican Congressional Campaign ated with a master’s degree in political science. He
Committee. Following the presidential election, began, but did not finish, a Ph.D. in political sci-
Google+ made plans to provide the same service ence at the University of Iowa. In 1958, he was
for other countries, including Italy, Kenya, the elected to the Iowa State Legislature, where he
Czech Republic, and Ghana. served until 1975. In 1974, Grassley won election
to the House of Representatives, serving there
Jennifer Edwards until 1981. While serving in the Iowa State Leg-
Anthony C. Edwards islature, he also farmed and worked in a factory.
Tarleton State University
U.S. Senate
See Also: Campaigns, 2012; Facebook; Networks, In 1980, Grassley challenged and subsequently
Political; Social Networking Web Sites. beat incumbent John Culver (D) from Iowa for a
seat in the U.S. Senate. In election after election,
Further Readings Grassley won re-election by comfortable margins.
Fox, Zoe. “Google+ Launches Guide for Politicians Since 1980, he has received at least 60 percent
and Candidates.” Mashable (November 28, 2011). of the vote in his re-election bids. Most recently,
http://mashable.com/2011/11/28/google-plus Grassley was reelected in 2010, easily defeating
-politicians-candidates (Accessed January 2013). his opponent, Roxanne Conlon. Many attribute
Google. “Google Politics and Elections 2012.” https:// Grassley’s political success to his work ethic. Over
plus.google.com/+GooglePolitics/posts (Accessed the years, he has repeatedly visited Iowa’s 99
January 2013). counties. Almost every weekend, Grassley returns
“Google+ Hangouts: Becoming a Social Norm to Iowa and holds meetings with his constitu-
for Politics and a First Go in United States ents. Grassley’s constituents also appreciate the
Congressional Hearings.” Daily Flux (May 12, fact that he has not missed a vote since 1993 (the
2012). http://www.dailyflux.com/google-hangouts only vote he missed was because of inspecting the
-social-norm-politics-united-states-congressional damage from a flood in Iowa that year).
-hearings (Accessed January 2013). Grassley also portrays himself as an unassum-
ing, down-to-earth Iowan. He likes to portray
himself as just another Iowan who still works on
his farm with his family when he travels home
every weekend.
Grassley, Chuck In the 1980s, Grassley demonstrated his inde-
pendence from the policies of Ronald Reagan.
Charles (Chuck) Grassley is a Republican sena- Throughout the decade, he voted against the
tor from Iowa. Grassley has served in the U.S. Reagan administration’s farm policies, which
Senate since first he was elected in 1980. He is were unpopular in Iowa. Throughout his Sen-
known for his low-key style, work ethic, and abil- ate tenure, agriculture has been one of Grass-
ity to work across partisan lines. In the Senate, ley priority issues. He has championed aid to
Grassley has advocated cracking down on gov- farmers throughout his Senate career. In 1996,
ernment waste, more government accountability, he supported the Freedom to Farm Act, which
598 Grassley, Chuck

reformed agriculture policy. In the Senate, Grass-


ley has unsuccessfully sought to limit farm subsi-
dies to smaller farmers. For example, in 2002, he
failed to put into a farm bill a measure limiting
farm subsidies to farmers making no more than
$275,000. Grassley has also supported ethanol
subsidies for farmers.
An issue where Grassley departs from many of
his Republican colleagues in the Senate is defense.
He is a frequent critic of defense spending and
often highlights cases of Pentagon waste. Grass-
ley stood out from the rest of his Republican col-
leagues by voting against the Gulf War in 1991.
He has established a reputation for being a dove
on defense issues. On the other hand, Grassley
voted to authorize the use of force in Iraq in 2002.
Throughout his career, Grassley has been pas-
sionate about exposing waste and fraud in gov-
ernment agencies. Grassley has exposed fraud
and waste in the Defense Department, the Securi-
ties and Exchange Commission, and many other
government agencies. He has supported legisla- Senator Chuck Grassley talks with Federal Emergency
tion protecting whistleblowers who reveal waste Management Agency Congressional Representative Jodi
and fraud in government agencies. Grassley suc- Bruckner before attending a town hall meeting in Waverly, Iowa,
ceeded in passing legislation that required that to hear from local residents affected by a severe flood in 2008.
Congress follow the same laws that it passed.
More recently, Grassley has criticized the Bureau
of Alcohol, Tobacco, and Firearms for Operation
Fast and Furious—an undercover operation that appeared that the duo would forge a compromise
provided guns to Mexican drug dealers and led to on health care, but the negotiations ultimately
the death of a border patrol agent. collapsed.

Committees Obama Administration


Grassley has served on a number of committees In recent years, Grassley has been criticized for
in the Senate including agriculture, judiciary, and taking a more partisan tone. He voted against
finance. From 2003 to 2007, he was chair of the President Obama’s stimulus plan in 2009, and the
finance and judiciary committees. Today, he is the Affordable Care Act in 2010. Grassley was con-
senior-ranking member on these committees. demned for alleging that there were death pan-
Over the years, Grassley acquired the reputa- els in President Obama’s health care bill and for
tion as a politician willing to work across party walking away from health care negotiations. On
lines to achieve his goals. While considered a con- the other hand, Grassley contends that President
servative, he is not perceived as a confrontational Obama and the Democrats walked away from
figure in the Senate. For example, he was known health care negotiations. In addition, Grassley has
for his close working relationship with Senator voted against many of President Obama’s judicial
Max Baucus of Montana. Baucus is currently the nominees and has blasted the attacks on the U.S.
chair of the Finance Committee, and from 2003 consulate in Benghazi and the botched Operation
to 2007 he was the ranking committee member Fast and Furious.
when Grassley was the chair. Grassley and Baucus Critics also note Grassley’s use of cutting-edge
worked together on a number of issues, including media to attack the Obama administration. Over
tax cuts, tax reform, and health care. In 2009, it the last few years, he has utilized Twitter to send
Great Firewall of China 599

short, pithy tweets criticizing President Obama Jacobs, Jenifer. “Math Problem Solved: How to
and his policies. Best Do the Full Grassley in Iowa’s 99 Counties.”
Critics see political opportunism in Grass- Des Moines Register (December 22, 2011).
ley’s attack on President Obama pointing to the Jacobs, Jenifer. “Profile: Sen. Charles Grassley.”
rise of a strong Tea Party movement in Iowa. Des Moines Register (May 5, 2012).
Grassley’s supporters reject this charge, arguing Jacobs, Jenifer and Jeff Eckhoff. “U.S. Senate:
that Grassley is merely upholding longstanding Chuck Grassley Cruises Past Roxanne Conlin.”
values in opposing President Obama’s policies. Des Moines Register (November 3, 2010).
They argue that President Obama’s taxing and Malone, Noreen. “Id of the Senate: How Twitter
spending policies clash with the fiscal conserva- Unleashed Charles Grassley.” New Republic
tism of Grassley. (November 19, 2012).
In his career in the Senate, Grassley has a con- Noble, Jason. “New Congressional Report,
servative voting record of 86 percent. He fre- Guided by Iowa Sen. Chuck Grassley, Blasts
quently votes with Republicans on issues such as Operation Fast and Furious.” Des Moines Register
the budget, tax cuts, and abortion. On the other (July 31, 2012).
hand, he has broken from his party in his oppo- Petroski, William. “Grassley Calls Killing of
sition to the Gulf War and his support for alter- U.S. Ambassador in Libya an ‘Act of War,’
native energy. While accumulating a conservative Criticizes Obama.” Des Moines Register
record, Grassley has won over independents and (September 12, 1012).
Democrats in the state of Iowa. This has primar- “Roxanne Conlin Laments Ad Spending by
ily been because of his pleasant demeanor, work Chuck Grassley.” Des Moines Register (October
ethic, and perception that he is a bipartisan politi- 12, 2010).
cal figure (though that image has been challenged “Sen. Charles Grassley (R).” National Journal
by critics since 2009). Grassley is one of the lon- (June 22, 2005).
gest-serving senators in Iowa history, and with re- “U.S. Sen. Chuck Grassley’s Questionnaire.”
election in 2016, he may have the distinction of Des Moines Register (May 5, 2012).
being Iowa’s longest-serving senator.

Jason Roberts
Quincy College
Great Firewall of China
See Also: Bachman, Michelle; Campaigns,
Congressional 2010; Coburn, Tom. The “Great Firewall of China” (GFW or GFC) is
a phrase coined by Charles R. Smith in 2002 to
Further Readings describe Internet censorship in China, where for-
Beaumont, Thomas. “Grassley, Harkin Approval eign “harmful” ideas are prevented from invading
Ratings Decline Amid Health Talks.” Des Moines the authoritarian state to safeguard its one-party
Register (September 19, 2009). rule through filtering content as well as monitor-
Bell, Deborah. “10 Things You Didn’t Know About ing users online. The metaphoric term draws par-
Chuck Grassley.” US News & World Report allels between the world’s most complex Internet
(September 9, 2009). control system and the Great Wall, a magnificent
Doering, Christopher, “Grassley Casts His 11,000th ancient fortification built to protect China proper
Senate Vote.” Des Moines Register (November from intrusions by nomadic groups. A firewall is
14, 2012). a network security system that controls the flow
Grassley, Charles Earnest. Biographical Directory of information that travels through a node. A
of the United States Congress. http://bioguide common interpretation of the GFW refers nar-
.congress.gov/scripts/biodisplay.pl?index=g000386 rowly to the inspecting, filtering, and blocking
(Accessed January 2013). technologies deployed in the international gate-
“Grassley: Iowa’s Formidable Presence.” Des Moines ways of Chinese Internet service providers (ISPs).
Register (October 22, 2010). Nevertheless, some use the term loosely to imply
600 Great Firewall of China

the whole set of legal, regulatory, and technical The general philosophy of Internet control in
measures China has put in place for Internet cen- China is to territorialize domestic computer net-
sorship and control. works into a large national intranet with connec-
tions to the rest of the world funneled through a
CNCERT/CC few major Internet service providers. The inter-
The GFW is operated by the National Computer national gateways are located in three metropol-
Network Emergency Response Technical Team itan areas: Beijing, Shanghai, and Guangzhou.
Coordination Center of China (CNCERT/CC) The largest two Chinese ISPs are CHINANET
under the Ministry of Industry and Information and CNCGROUP, owned by China Telecom and
Technology (MIIT). The chief designer of the China Unicom, respectively. According to find-
project, Binxing Fang, dubbed as the father of the ings from a series of empirical testing conducted
GFW by Chinese Internet users, is the president by researchers from University of Michigan in
of Beijing University and a professor of posts and 2011, CHINANET possesses 79.4 percent of the
telecommunications. The GFW is often confused filtering interfaces, and CNCGROUP possesses
with the Golden Shield Project (GSP), a public 17.4 percent.
security information technology project aiming CHINANET has a mature filtering capabil-
to establish a nationwide computer application ity, whereas CNCGROUP has continuously
and communication system for the police force. strengthening its infrastructure. Most of the fil-
Both projects started in late 1990s, but the GFW tering devices are concentrated at border rout-
is a tool of ideology control, whereas the GSP is ers, but a small proportion are internal autono-
primarily used for crime prevention and investi- mous systems. This leads observers to suspect
gation by the Ministry of Public Security (MPS). that the GFW also has the capability to monitor
Because Internet crime investigation and monitor- and filter domestic traffic. CNCGROUP places
ing constitute a part of the GSP, it is possible that most of its filtering devices in the backbone, but
the GFW and the GSP overlap to a certain degree, the majority of CHINANET’s filtering devices
but the relationship remains ambiguous. belong to provincial networks.
While CNCERT/CC oversees the daily opera-
tion of the GFW, CNCERT/CC is merely a tech- Targeted Content
nical and research organization that has little Legislation has been introduced since the mid-
influence over censorship decisions. Orders of 1990s to restrict the flow of Web content that
censorship (for example, which Web site to could endanger the rule of the Chinese Com-
block, which keyword to filter) primarily come munist Party. The claimed purposes of Internet
from government institutions that wield stronger censorship in China are always vague and broad.
political power, such as: the Central Propaganda Laws and regulations prohibit the production and
Department, the State Council Information Office dissemination of information containing content
(SCIO), and the Public Information Network that endangers national security, divulges state
Security Supervision Department of MPS. secrets, subverts the government, undermines
The hardware of the GFW is mainly produced national unification, harms the honor and inter-
by domestic information technology compa- ests of the state, defames government agencies,
nies such as Sugon (Shuguang) and Huawei to instigates ethnic hatred, preaches cults or feudal
ensure information security and to protect state superstitions, disturbs social order, encourages
secrets. However, quite a few American compa- gambling, and shows pornography and violence.
nies, including Sun Microsystems, Cisco, Nortel In practice, the blocked Web sites roughly fall
Networks, 3COM, Websense, and Bay networks into eight categories: foreign social media plat-
of California have all been implicated in sales forms; foreign news sites; file sharing sites; over-
of Web filtering and monitoring technologies seas Chinese portal sites and discussion forums;
to China. The OpenNet Initiative’s 2004–05 dissident, prodemocracy, and human rights sites;
report on Chinese Internet filtering claims that circumvention and anonymizer tools sites; sites
the backbone of China’s Internet relies on Cisco maintained by Falun Gong; and pornography and
technology. gambling sites.
Great Firewall of China 601

The most heavily censored keywords are the (assuming the site is not banned through DNS
names of top leaders and dissidents, Falun Gong, manipulation) until the Chinese authorities spot
and the 1989 Tiananmen Square crackdown. The the new IP address and update their list.
blocked sites and filtered keywords are not fixed, Most people visit a Web site through typ-
and tend to vary across time. For example, during ing its domain name into an Internet browser,
the 2008 Beijing Olympics, the government loos- and few would remember its IP address. The
ened Internet control by unblocking a number of domain name system (DNS) is a database used to
sites, including China Times, Mingpao, Wikipe- translate textual hostnames (for example, www
dia, and BBC. In contrast, during politically sen- .facebook.com) into IP addresses (for example,
sitive periods such as the “two meetings” (the 173.252.110.27). In addition to the IP address
annual meetings of the National People’s Con- list, the GFW maintains a list of banned domain
gress and Chinese People’s Political Consultative names. When a router detects any predefined
Conference), the government tends to tighten up domain name queries passing through network
the control. traffic, the GFW will inject a forged IP address
so that users will not be able reach the desired
Technical Measures Web site or will be redirected to a wrong site.
To control the domestic network, the govern- Almost all the DNS servers in China are polluted.
ment has a large variety of legal and administra-
tive measures at its disposal, including promot-
ing self-regulation, deploying human censors and
Internet police force, recruiting paid commen-
tators, or even shutting down regional Internet
connections when needed. Nonetheless, when it
comes to dealing with content from international
Web sites, blocking and filtering are the only fea-
sible choices. The Chinese authorities have never
publicized any technical details of the GFW, but
researchers worldwide have conducted various
empirical and technical studies of the GFW. The
most frequently mentioned techniques are Inter-
net protocol (IP) blocking, DNS manipulation,
URL filtering, and keyword filtering.
IP blocking is the earliest form of filtering
mechanism used in China. All international gate-
ways of the Chinese network are configured with
a list of banned IP addresses—numerical labels
assigned to computers connected to the Internet to
indicate where the computers are located. When
users try to access a blacklisted address, the pack-
ets will be routed to a black hole server, which
then ignores the connection request. IP blocking
is easy to implement, adding only a tiny work-
load to the gateway routers; however, it tends to
“over-block” innocent Web sites. When a target
is hosted on a server with multiple sites, all Web
sites will be blocked because they share the same
IP address. However, if a banned Web site moves
or copies its content to another server with a dif- Some computer users in China have found ways around the
ferent IP address and keeps the domain name Great Firewall. These bloggers were visiting social media sites at
unchanged, the blocking can be circumvented the November 2008 Chinese Blogger conference in Guangzhou.
602 Great Firewall of China

When Google’s search engine service was blocked (e.g., FreeGate, GoAgent, GTunnel, Ultrasurf, Psi-
in 2002, domestic requests to access Google.com phon, and Tor) relies on open, free proxies, but
were directed to Baidu.com. A uniform resource VPN and SSH use private hosts outside of China.
locator (URL) is a string of characters represent- Only a small fraction of tech-savvy Chinese users
ing a Web address, which usually consists of a know how to climb to the other side of the GFW.
protocol name, a domain name or IP address, According to a nonrepresentative online survey
and a path (for example, https://en.wikipedia.org/ conducted in 2010, Internet users who use circum-
wiki/Falun_Gong). A requested URL string can vention tools were predominantly young males
be scanned for blacklisted keywords. with high levels of education, and FreeGate, Ultra-
Keyword filtering (packet filtering), which surf, and Psiphon were most popular in China
occurs at the protocol level, rather than at the because of their nontechnical features.
network level, is more technically complex. Circumvention tools are not invulnerable. The
When a connection between two computers is GFW can detect and block proxy servers used
established through a three-way handshaking for circumvention via analyzing Internet traffic;
process, information wrapped in TCP segments and recently, more sophisticated technologies
will flow through a series of routers to reach have enabled the GFW to recognize encrypted
its destination. Routers use intrusion detection protocols. Thus, all circumvention tools have
system (IDS) technology to inspect content con- to seek technology innovation to stay up-to-
tained in TCP packets for predefined keywords. date. The tug of war between Tor and the GFW
When blacklisted keywords are spotted, multiple serves as a good example. Tor started as an
forged TCP reset packets (RST flag) will be sent anonymous communication tool in 2002, and
to both ends to terminate the connection. Once was used for circumvention by many Chinese
activated, the blocking can last for a few minutes Internet users. Tor used a centralized directory
to an hour. server, which maintains a list of proxy nodes.
Relying upon a set of keywords, packet filter- However, when the IP address of the directory
ing is more flexible than other measures because server was blocked by the GFW, Tor became use-
it can dynamically cut out a connection without less, and lost its Chinese users. Tor came back to
locating the originations of the information (e.g., life through developing hidden “bridge” nodes
domain name, IP address, or URL) or blocking that are not listed in the directory server, but the
the whole Web site, regardless of the content on GFW learned the way to block hidden private
individual pages. For example, both English and bridge nodes in 2011.
Chinese Wikipedia homepages are accessible in In 2012, Tor launched a new product named
China. However, when one tries to access the obfsproxy, which can transform Tor traffic into
page of Wikipedia entry for Falun Gong, it takes innocent-looking traffic so that the GFW cannot
a long time to load a part of the page. When the differentiate the use of Tor from other Internet
“refresh” or “reload” button is clicked, the con- activities. It is possible that the GFW will soon
nection is terminated. find a way to defeat obfsproxy. The arms race
between blocking and circumvention will not
Circumvention and Countermeasures end until China aborts the mission of Internet
Despite its technical sophistication, the Great Fire- censorship.
wall is not invincible. The two basic requirements
to bypass the GFW are reliable proxy servers and Fei Shen
encryption. A proxy can serve as an intermediary City University of Hong Kong
to relay information from the otherwise blocked
sites and filtered pages to end users, while encryp- See Also: Artists and Social Media in Politics;
tion keeps keyword filtering from identifying Asia; China; Countries Banning Social Media for
“harmful” content in traffic streams. The com- Political Reasons; Deep Packet Inspection; FinFisher;
mon tools of circumvention include anticensor- Firewalling; Gate Keeping Theory and Social Media;
ship software, virtual private networks (VPN), and indexoncensorship.org; Iran; Syria; Tor; Virtual
secure shells (SSH). Most anticensorship software Private Networks; Weibo.
Gun Control 603

Further Readings manufacturers, gun enthusiasts, and politicians


Anderson, D. “Splinternet Behind the Great Firewall who support the NRA agenda. With a Facebook
of China.” Queue—Web Security, v.10/11 (2012). page boasting more than two million follow-
Clayton, R., S. J. Murdoch, and R. N. M. Watson. ers, they are the dominant voice in the debate.
“Ignoring the Great Firewall of China.” Privacy Another, albeit smaller organization, Gun Own-
Enhancing Technologies: Lecture Notes in ers of America (GOA), was founded in 1975 by a
Computer Science, v.4258 (2006). former NRA board member, and positions itself
Xu, X., Z. M. Mao, and J. A. Halderman. “Internet to the right of the NRA. GOA proudly features an
Censorship in China: Where Does the Filtering endorsement by Ron Paul on several of their social
Occur?” Passive and Active Measurement: Lecture media profiles that reads: “The only no-compro-
Notes in Computer Science, v.6579 (2011). mise gun lobby in Washington.” This group has
Zittrain, J. and B. Edelman. “Internet Filtering in fewer members, but is quite active in lobbying
China.” Internet Computing IEEE, v.7/2 (2003). Congress, and has a frequent presence on political
television talk shows when the topic is gun con-
trol, clips they proudly feature on their YouTube
channel. Within the network are large industries
that manufacture firearms and accessories.
Gun Control Proponents of gun control are present in a more
disbursed network, which includes large organi-
Gun control is an issue that regularly rises to the zations such as the Brady Campaign to End Gun
top of the public agenda in the United States. Violence and other organizations formed by fami-
Since the mass shooting in Columbine, Colorado, lies and allies of victims. The Newtown Action
in 1999, similar incidents have reignited the dis- Alliance emerged after the 2012 school shootings
cussion of gun control. Social media provide an in Sandy Hook, Connecticut. Another group that
outlet for immediate reaction to these events, as quickly gained a relatively high level of support is
well as a venue for actors on both sides of the Americans for Responsible Solutions, the organi-
debate to maintain a level of constant surveillance zation formed by Congresswoman Gabrielle Gif-
and awareness. Gun control advocates monitor fords, who was seriously injured in a mass shoot-
incidents involving mass or accidental shoot- ing in Tuscon, Arizona, in January 2011. Other
ings, whereas gun control opponents monitor and groups in the network include Moms Demand
share stories about laws and proposals to restrict Action, which is organized at the state level, as
gun ownership. Existing Internet memes, as well well as groups with religious affiliations that cam-
as events, both expected and unexpected, provide paign against violence.
points of synthesis for advocates on both sides, Another longstanding and very active organi-
tying the issue of gun control to issues of race zation is Mayors Against Illegal Guns, founded
and immigration. Misinformation and exploita- by Mayor Michael Bloomberg of New York with
tion are also part of the public discourse. The net- hundreds of other U.S. mayors. During the 2012
works of actors in the debate are distinctly differ- legislative battle over background checks on gun
ent in structure and in the rhetorical substance of purchases, Mayors Against Illegal Guns set up a
their arguments. Web site at DemandAction.org to encourage citi-
The social media presence of pro-gun forces zens to put pressure on congressional represen-
is both centralized and prominent across social tatives, calling on them to support the Manchin-
media platforms. By contrast, citizens and orga- Toomey bill. Despite their efforts, the bill was
nizations who support stronger gun control regu- ultimately defeated in the U.S. Senate on April 17,
lations are disbursed across numerous organiza- 2013, prompting the establishment of ShameOn-
tions, both gun focused and not. While many are Congress.org.
joining in on the conversation, few maintain a
singular focus in the manner of pro-gun forces. Facebook
The National Rifle Association (NRA) pro- Beyond its homepage on Facebook, the NRA
vides a centralized hub that connects gun maintains other Facebook pages targeted to
604 Gun Control

specific demographics such as veterans, women, The #NRA hashtag has been appropriated by
youth, and sportsmen. These related pages often the organization’s opponents, although some-
have subscribers numbering in the tens of thou- times #guncontrol is also used. Other hashtags
sands. The official NRA page “likes” all these trend when incidents make news headlines (e.g.,
pages, as well as a number of politicians and #SandyHook, #Aurora, and #NOLA). #Demand­
firearms manufacturers, establishing a large net- Action was used by Mayor Michael Bloomberg’s
work of individual enthusiasts, corporations, and group to bring pressure on behalf of gun control
politicians. The homepage also promotes meet- legislation in Congress. Gun enthusiasts use the
ings of the Friends of NRA through the Facebook “right to keep and bear arms” (#RKBA) hashtag,
“Events” feature, and facilitates online donations as well as other conservative hashtags (e.g., #2a
through a quick link to their membership enroll- #tcot, and #tgdn). They also use #molonlabe, a
ment page. “Profile Badges” allow other Face- term popular with gun enthusiasts that trans-
book users to affiliate themselves with the NRA lates to “come and get it.” Most notably, gun
brand through a downloadable profile image. enthusiasts who are motivated by a mistrust of
Gun Owners of America maintains a Facebook government have adopted this term, which can
page with almost 240,000 subscribers. A lobby- be found on numerous social media Web sites
ing organization, in May 2013, it partnered with and blogs. Within this community of interest,
Congressman Steve Stockman, the recipient of the keywords and hashtags are used to sell mer-
campaign donations from GOA, in promoting chandise as well as to share links and informa-
the giveaway of an AR-15 rifle, which it billed as tion of interest. The same connection can be
“the Gun (sic) Obama doesn’t want you to have!” seen with “shit hits the fan” (#shtf), a hashtag
Other pages such as “Women Against Gun Con- used by gun manufacturers and other marketers
trol” share blueprints for weapons and an image to reach out to “preppers” who purchase and
of an attractive woman with a gun accompanied stockpile goods in preparation for an anticipated
by the text, “Random Fact: Shooting a gun causes societal collapse.
the same chemical reaction in the brain as a pas- A phenomenon that appears in both pro-gun
sionate kiss.” and anti-gun networks on Twitter is the mainte-
In contrast to the two major pro-gun orga- nance of a low level of surveillance at all times,
nizations, none of the organizations working interrupted by spikes in activity and trends in
to restrict access to firearms have a comparable response to larger-scale events. For those who
number of subscribers on Facebook. The Brady support gun control, daily monitoring of deaths
Campaign to End Gun Violence has a little over from gun violence or accidental shootings, along
50,000 subscribers, and Americans for Respon- with tallies of the number of gun deaths since the
sible Solutions has more than 80,000. The last mass shooting, are common. The progress of
congresswoman’s personal page, however, has legislation restricting gun ownership is also moni-
almost 180,000 subscribers, an indication of tored. As for gun enthusiasts, they monitor stories
the diffuse nature of the network of gun control they regard as evidence of infringement on their
supporters. Second Amendment rights, such as any legisla-
tion limiting ownership or requiring background
Twitter checks for gun purchases.
The advantage that pro-gun organizations enjoy
on Facebook is not as prominent on Twitter. The Tumblr
@NRA Twitter account has slightly more than Tumblr is primarily a visual microblogging site
160,000 followers, whereas Congresswoman Gif- that is popular among the younger demographic
ford’s account has nearly 130,000 followers. The of digital natives. Animated GIFs are a common
account for the Brady Campaign has far fewer form of content, and many users curate threads
followers, but a search reveals that many other that use the “scrolling” affordance of Web pages
Twitter users tweet news about their legislative as the primary storytelling technique. While
and legal activities in the form of press releases content by both pro-gun and anti-gun activists is
and other publications. present on Tumblr, it is less well organized, and
Gun Control 605

search results turn up messages from both sides, media and the Internet. The argument has contin-
as well as numerous visuals without comment, ued on social media, which allow for a constant
including still-life arrangements of guns and level of awareness and surveillance. Gun manu-
ammunition and images of attractive women facturers, related industries, and organizations
posing with various types of weapons. There such as the NRA have a well-established, highly
are also messages in support of gun control in centralized, extensive network of social media
the form of text, editorial cartoons, and links to accounts.
external content. True to its name, Tumblr pres- These accounts have only two purposes: to
ents a mash up of the sexualization, deliberation, oppose restrictions on gun ownership, and to
moralization, and celebration of U.S. gun culture market guns and gun-related products to sports-
and weapons, with some messages that present men, enthusiasts, and survivalists. On the pro-gun
clear opinions on the issue, whereas others are side of the argument, the messages often associate
marked by ambiguity. guns with sexual attractiveness, masculinity, per-
sonal independence, “American family values,”
Pinterest achievement, and patriotism.
Although it is a relatively new site in the social Among supporters of gun control, there are no
media genre, Pinterest has quickly attracted a large groups currently arguing for legislation beyond
following. Like Tumblr, the site is image focused, limitations on the capacity of certain weapons or
with users “pinning” images to “boards” based restrictions on access to certain groups via back-
on various themes. It is a popular site for home ground checks. The network of pro-gun control
improvement do-it-yourselfers, recipe exchang- advocates is highly diffuse, disbursed among a
ers, and those interested in fashion. Many retail- large number of organizations, none of them with
ers are successfully using Pinterest as a market- the reach of the NRA. They are primarily organi-
ing tool, with links directly to pages that allow zations founded by the families of victims, or in
users to purchase the “pinned” item. The NRA the case of Gabrielle Giffords, the victims them-
has created a network of organizations that selves. These groups may be at a disadvantage in
pin their interest groups and consumer groups a medium that prefers positive messages, as indi-
together. Large online gun retailers are found cated in a study conducted by the Pew Research
on Pinterest via links from the NRA homepage, Center on the tone of social media.
and these companies prominently feature prod- There was an outcry among the public for
ucts and organizations that represent outreach to more restrictions on gun ownership after the
women interested in sports, self-defense, and gun Newtown, Connecticut, elementary school
fashion. Gun Owners of America is not officially shootings. In December 2012, an online petition
present on Pinterest, but a search for its name to the White House calling for restrictions on gun
reveals other users pinning their logo and memes ownership set a record for support, and public
to boards with names such as “We the People,” opinion polls consistently recorded 90 percent
and “Self Defense.” support for increasing requirements for back-
Advocates of restrictions on gun control are ground checks.
difficult to find on Pinterest. The Brady Campaign After the failure of the Manchin-Toomey leg-
has a board that has seen very little activity. Con- islation, one Bloomberg News writer wrote a
gresswoman Gifford’s organization is not present, story with the headline: “The Internet Declares
except through pins posted by other users. May- War on the NRA.” Despite the hurricane of tra-
ors Against Illegal Guns is also present, only as ditional coverage and social media conversation
content pinned by individual users to boards with on both sides of the issue, in April 2013, the
names such as “issues, causes, etc.” and “gun U.S. Senate rejected a compromise gun control
control issues.” Gun control content primarily bill that would have prohibited private own-
takes the form of infographics and other visual/ ership of some types of military-style assault
text combinations. weapons and expanded the federal requirement
Arguments about gun control and restrictions for background checks on firearms sales. In the
on ownership of guns predate the rise of social absence of meaningful national legislation, the
606 Gutiérrez, Luis

gun control debate continues to be thrashed out City Political Career


on state and local levels. Gutiérrez, a teacher and social worker by training,
left his position with the Department of Children
Jeanette Castillo and Family Services of Illinois in 1983 to run for
Ball State University office. In order to fund his campaign, he drove a
taxi for seven 14-hour days a week; this gave him
See Also: Documentaries, Social Media, and Social $6,000 for his challenge of Dan Rostenkowski for
Change; Facebook; Gillibrand, Kirsten; Lobbyists; the 32nd Ward Democratic committee position.
Pinterest; Special Interest Campaigns; Tumblr; With a campaign staff of friends and family sup-
Twitter; We the People. porting him, Gutiérrez personally collected more
than 75 percent of the 2,200 signatures that his
Further Readings qualification demanded. Rostenkowski defeated
Castells, Manuel. Networks of Outrage and Hope: Gutiérrez by a strong margin.
Social Movements in the Internet Age. New York: In 1984, Gutiérrez went on to help establish
Polity Press, 2012. the Cook County Coalition for New Politics, a
Hindman, Mathew. The Myth of Digital Democracy. grassroots means for a progressive, multiracial
Princeton, NJ: Princeton University Press, 2008. challenge to the traditional Democratic Party
Pew Internet. “The Tone of Life on Social in Chicago. Gutiérrez’s activist work made him
Networking Sites.” http://www.pewinternet.org a new and impressive leader for Latinos in Chi-
(Accessed August 2013). cago, and this was noted by Chicago Mayor Har-
Wilkinson, Francis. “The Internet Declares War on old Washington. Washington was the first African
the NRA” (May 9, 2013). Bloomberg News. American mayor of the city, and he appointed
http://www.bloomberg.com/news/2013-05-09/ Gutiérrez deputy superintendent for the Depart-
the-internet-will-declare-war-on-the-nra.html ment of Streets and Sanitation in 1984. Gutiér-
(Accessed August 2013). rez accepted that role and served on the Mayoral
Committee on Infrastructure when he became an
administrative assistant to Mayor Washington.
In autumn 1984, the Gutiérrez home was
firebombed with a Molotov cocktail. The fam-
Gutiérrez, Luis ily stayed in hotels for several months, but the
attackers were never caught. In an effort to gen-
Luis Vicente Gutiérrez is the U.S. representative for erate political reform in concert with the efforts
the 4th Congressional District of Illinois; he has of Mayor Washington, Gutiérrez created the
served in that office since 1993, when he became 26th Ward Independent Political Organization
the first Latino to represent a midwest constitu- (IPO) in 1985. Another grassroots effort includ-
ency in Congress. Gutiérrez represented the 26th ing citizens of many races, the organization
Ward of Chicago on the city council from 1986 raised $5,000 and signed on 100 new members
until he was elected to Congress. He belongs to the at its first event.
Democratic Party and the Congressional Progres- In 1985, the wards of Chicago were remapped,
sive Caucus. An outspoken champion of immigra- creating a new Latino majority district, the 26th
tion reform, Gutiérrez entered the 113th Congress Ward. This ward and six others were the subjects
in 2012 as the Illinois House delegation dean. of a special election ordered by a district court
Gutierrez is a supporter of many liberal political judge. The existing alderman in Ward 26 chose
causes. Of Puerto Rican ethnicity, he supports not to run for the spot, and Gutiérrez announced
independence for Puerto Rico. A major advo- his candidacy with the endorsement of Mayor
cate on behalf of rights for workers, women, and Washington. This one space on the city council
gay, lesbian, bisexual, and transgendered (GLBT) would change the balance of power in favor of
rights, Gutiérrez’s biting oration and strong sup- the mayor if Gutiérrez was successful, and oppo-
port for the disenfranchised have earned him the sition to Washington in Chicago was still vehe-
nickname El Gallito, the little fighting rooster. ment. As a result, the race was heated.
Gutiérrez, Luis 607

The vote between Gutiérrez and his opponent, on the Immigration, Citizenship, Refugees, Bor-
Torres, went to a runoff based on the closeness der Security, and International Law Subcommit-
of the initial vote. Their final debate aired on tee. Gutiérrez has also worked to assist immi-
Spanish-language television, and Gutiérrez chose grants in his district to access English-language
to debate partly in Spanish in contrast to Torres, programs and to become U.S. citizens.
who used only English. Gutiérrez’s grassroots Gutiérrez was the first in Congress to spon-
approach and his use of Spanish are generally sor the Development, Relief and Education for
thought to have won the vote for him. Alien Minors (DREAM) Act in its first incarna-
Gutiérrez quickly became a leader on the floor tion in 2001. The DREAM Act was designed to
and among Latinos on the council. He was a allow undocumented minors brought illegally
primary supporter of the gay rights ordinance to the United States a means to gain citizen-
of 1986 banning sexual orientation-based dis- ship. Gutiérrez introduced the Comprehensive
crimination. Gutiérrez also promoted affordable Immigration Reform for America’s Security and
housing and local development. In 1987, Gutiér- Prosperity Act (CIR-ASAP) in 2009 as a means
rez was reelected to his seat over five opponents. for undocumented immigrants without criminal
Upon Mayor Daley’s 1989 election, Gutiérrez records to gain U.S. citizenship. CIR-ASAP was
became city council president pro tempore and defeated, and Gutiérrez backed the latest incar-
chair of the Housing, Land Acquisition, Disposi- nation of the DREAM Act in 2012, which was
tion and Leases Committee. ultimately passed.
In addition to his legislative activity for immi-
Congressional Career grants, Gutiérrez also partook in two separate
In 1990, a new Latino majority congressional nonviolent demonstrations outside the White
district was formed by court order. Gutiérrez House. The first took place in 2010 in response to
ran for Congress in this district in 1992 with Arizona’s SB 1070, allowing police to engage in
the endorsement of Mayor Daley and defeated racial profiling to enforce immigration laws at the
his Mexican American opponent in the Demo- state level. Gutierrez made a speech and marched
cratic primary, Juan Soliz, despite the majority with other activists that day, refusing to leave
Mexican American population of the district. until President Obama acted or he was arrested;
Gutiérrez went on to defeat Republican candi- like other activists, he was arrested that day.
date Hildegarde Rodriguez-Schieman in the gen- In 2011, the number of deportations during
eral election of 1992, and began his tenure in the Obama administration’s tenure reached 1 mil-
Congress in 1993. lion, a record. In response to this and Obama’s
Gutiérrez was reelected in 1994 with 75 per- refusal to extend the DREAM Act to covered
cent of the vote. This was the lowest general elec- youth, Gutiérrez was arrested outside the White
tion winning percentage Gutiérrez ever showed. House along with 11 other leaders, with more
From 1996 through 2008, Gutiérrez was contin- than 2,500 supporters looking on in solidarity.
ually reelected, never with less than 80 percent During Gutiérrez’s time on the Veterans’
of the vote. In 2010, he was reelected again, this Affairs Committee, he introduced legislation pro-
time with 77 percent of the vote, technically a viding sexual trauma victims with counseling and
low percentage for him, albeit a remarkably large treatment. He also fought to extend health insur-
number generally speaking. ance coverage to veterans exposed to radiation
and Agent Orange during service. Gutiérrez also
Issues and Advocacy helped disabled veterans access more funds for
Gutiérrez has been a consistent and outspoken health care and prosthetics.
advocate for immigrants’ rights and immigration Gutiérrez also advocated for consumer rights
reform. Nancy Pelosi appointed him chair of the by backing the creation of the U.S. Consumer
Democratic Caucus Immigration Task Force in Protection Bureau and striving to stop preda-
2009, and was also the chair of the Congressio- tory lending by capping annual percentage rates
nal Hispanic Caucus Immigration Task Force in (APRs) on payday loans. As chair of the Financial
2012. He also served on the Judiciary Committee Services Subcommittee on Financial Institutions
608 Gutiérrez, Luis

and Consumer Credit, Gutiérrez helps to over- With the hot-button issue of immigration as
see all financial regulators, including the Fed- one of his most important battlegrounds, social
eral Deposit Insurance Corporation (FDIC), media provide the right place for Gutiérrez to
the Federal Reserve (the Fed), the Office of the reach those who are passionate about the issue.
Comptroller of the Currency, the Office of Thrift Social media also provides a forum for opposing
Supervision, and the National Credit Union viewpoints and, therefore, a crucial window into
Administration (NCUA). the anti-immigration perspective.
Gutiérrez has a record of advocacy on behalf As an activist and spirited debater, Gutiér-
of Puerto Ricans. He was very active in the fight rez is a natural for the video clip in the social
to stop the U.S. military from using Vieques, a media universe. Footage of his arrests on behalf
populated island, as a testing ground for bomb- of political causes garnered a huge amount of
ing, and in 2000 was arrested for refusing to attention and made his work feel more immedi-
leave the bombing range. In 2011, Gutiérrez was ate and relevant to activists struggling all over
a vocal advocate on behalf of students victimized the United States.
by police brutality as they protested government Gutiérrez has mastered the Internet meme.
restriction of freedom of speech. He also opposed His sense of humor and lack of fear have caused
a planned pipeline as an environmental danger at least one clip of his debate tactics to go viral.
and physical hazard to residents of the island. When he compared photographs of Justin Bieber
An advocate for workers’ rights, Gutiérrez has and Selena Gomez, who were dating at the time of
assisted labor unions with sit-ins and negotia- Arizona’s SB 1070, and asked on the floor of the
tions. He voted against the North American Free House rhetorically which of them was more likely
Trade Agreement (NAFTA) because of its failure to be profiled and stopped in Arizona, that image
to protect jobs and rights on both sides of the spawned several memes. The example of Bieber,
border. a white immigrant from Canada and Gomez,
a Latina born in America, reflected criticism of
Use of Social Media the Arizona legislation. This act gained national
Luis Gutiérrez is widely recognized as one of the fame in the social media realm, as did the offshoot
most effective users of social media in Congress. memes that arose comparing William Shatner
First introduced to social media by his daughters, (Canada) and Edward James Olmos (America)
the younger of whom was in college at the time, and Geraldo Rivera (America) and Ted Koppel (a
the Congressman quickly appreciated the ways British-born naturalized American citizen).
that social media were bringing people together OhMyGov gives Gutiérrez a media power
politically and socially. rank of 58th among his 541 congressional peers.
Soon after discovering Facebook and Twitter, According to that site and others, he gener-
Gutiérrez started a social media profile, and his ates around 800 tweets in a typical week. Poleet
online presence began to grow. Although he does reports Gutiérrez’s Klout score as 54.
not maintain his own profiles or post on them Gutiérrez also reacts to the social media actions
himself, he is very attentive to the sites and pays of others. He called for the immediate dismissal
close attention to the interactions in those spaces. of Puerto Rican official Heidi Wys for her racist
He considers them an excellent resource for con- birther tweet in response to a photo of First Lady
necting with his constituency. Michelle Obama in which she directed President
In many ways, Gutiérrez is a natural for use of Obama to take his wife to his “homeland” of
social media. With his advocacy on behalf of lib- Kenya for her birthday.
eral goals and on behalf of Latino people, social
media provides an ideal place for him to gain Karla Lant
leverage. Latinos in the United States are heavy Northern Arizona University
users of social media, and the Latino population
in the United States is youthful. In addition, lib- See Also: Campaigns, Grassroots; Civil Rights;
eral voting trends toward younger voters regard- Immigration; Klout Score; Lesbian, Gay, Bisexual,
less of ethnicity. and Transgender Rights.
Gutiérrez, Luis 609

Further Readings OhMyGov Inc. “Luis Gutiérrez” (2012). http://


“Congressman Luis V. Gutiérrez.” http://gutierrez ohmygov.com/accounts/Person/164-luis-gutierrez/
.house.gov/about-me/full-biography (Accessed summary (Accessed December 2012).
December 2012). Poleet. “Luis V. Gutiérrez: U.S. Congressman for the
Fremon, D. Chicago Politics, Ward by Ward. Indiana 4th District of Illinois” (2012). http://www.poleet
University Press, 1988. .com/RepGutierrez (Accessed December 2012).
Gutiérrez, Luis. “Social Media.” http://gutierrez Project Vote Smart. “Representative Luis V.
.house.gov/media-center/social-media (Accessed Gutiérrez’s Biography” (2012). http://votesmart
December 2012). .org/candidate/biography/26841/luis-gutierrez#
Media Center. “Congressman Luis V. Gutiérrez” .UMmD_5PjmNw (Accessed December 2012).
(2012). http://gutierrez.house.gov/media-center Ross, J. “Luis Gutiérrez Calls on Puerto Rico
(Accessed December 2012). to Remove Adviser After Racist Birther
Office of the Clerk, U.S. House of Representatives. Tweet.” Huffington Post (2012). http://www
“Election Statistics” (2010). http://clerk.house.gov/ .huffingtonpost.com/2012/08/03/luis-gutierrez
member_info/electioninfo/index.aspx (Accessed -puerto-rico-heidi-wys_n_1734580.html (Accessed
December 2012). December 2012).
H
Hacktivism of the United States’ civil rights movement. Like
many traditional forms of civil disobedience,
Hacktivism is a portmanteau of “hacking” and many hacktivist activities are illegal.
“activism” that describes the use of computers
and computer and online networks as a means of History
activism or protest. The term is attributed to a The first known use of a DoS attack for politi-
collective known as Cult of the Dead Cow, where cal means occurred when, in an effort to oppose
it was reportedly first used on a mailing list in the United Kingdom’s (UK’s) Criminal Justice and
1996 as a tongue-in-cheek way to describe the Public Order Act of 1994, a San Francisco–based
group’s activities. group sent huge volumes of e-mails in an effort to
Hacktivism is commonly used to refer to a overwhelm UK government servers. Their act was
number of specific hacking methods for social or effective and resulted in government Web sites
political means, including Web site defacements being unavailable for more than a week.
(whereby one obtains unauthorized access to a Another early prominent example occurred in
Web server and replaces or alters a Web page to 1998, when a group known as the Electronic Dis-
convey a different message); denial of service (DoS) turbance Theater conducted DoS attacks on the
or distributed denial of service (DDoS) attacks Web sites of the Pentagon and the Mexican gov-
(whereby a server is intentionally overloaded by ernment to bring attention to indigenous rights in
saturating the machine with requests using one of the Mexican state of Chiapas.
several methods); uniform resource locator (URL) More recently, Anonymous—a collective of
redirects (whereby a user is redirected to a differ- loosely associated hacktivists—brought hacktiv-
ent site than the one they intended to access); and ism to the fore of mainstream discussion with
information theft. a series of activities targeting a range of actors.
Among the collective’s numerous targets are
Techniques and Methods the San Francisco Bay Area Rapid Transit Sys-
The various techniques used by hacktivists are tem (targeted for its perpetuation of a telecom-
often compared to traditional, offline forms of munications ban amid local protests); the Tuni-
civil disobedience. For example, Web site deface- sian and Egyptian governments during the Arab
ment is compared to graffiti, while DoS attacks Spring protests; payment processors Visa and
have been compared to the lunch counter sit-ins MasterCard (for enacting a blockade on financial

611
612 Hagan, Kay

transactions to WikiLeaks); and U.S. government resulting in a retaliatory attack against the com-
Web sites (on several occasions). Anonymous is pany, destroying its business.
often associated with WikiLeaks, though the two Those who are supportive of hacktivist tactics
groups are separate. typically frame them as civil disobedience in an
Anonymous has also claimed responsibility electronic environment, comparing online tac-
for developing a tool known as Low Orbit Ion tics with traditional, offline ones. Some support-
Cannon (LOIC), which enables individuals to ers have argued for changes in laws to separate
conduct a DoS attack without much technical malicious forms of hacking from those associated
skill or knowledge. with political protest.

Law Jillian C. York


In Europe and the United States, hacktivist Independent Scholar
activities typically fall under laws pertaining to
cybercrime. In Europe, the relevant statutes fall See Also: Activists and Activism, Digital;
under the European Convention on Cybercrime, Anonymous; Arab Spring; Clicktivism; Cyber-
whereas in the United States, the Computer Fraud Vigilantism; Internet Gathering; Tor; United States;
and Abuse Act of 2006 (CFAA) governs cyber- WikiLeaks; WikiLeaks/Arab Spring.
crime. A number of other countries also have
laws dealing with cybercrime. Further Readings
Individuals engaged in hacktivism have been Coleman, E. Gabriella. Coding Freedom: The
prosecuted in several countries. Raids resulting in Ethics and Aesthetics of Hacking. Princeton, NJ:
the arrest of individuals associated with Anony- Princeton University Press, 2012.
mous and similar groups have been conducted European Digital Rights. “Frankfurt Appellate Court
in countries including Spain, Argentina, Chile, Says Online Demonstration Is Not Coercion.”
Colombia, the United States, and France. EDRI-gram, v.4–11 (2006). http://www.edri.org/
In one known instance, a court ruled that in the edrigram/number4.11/demonstration (Accessed
context in which it was conducted, a DoS attack December 2012).
was legal. In 2001, several groups coordinated Ludlow, Peter. “WikiLeaks and the Hacktivist
an attack against the German airline Lufthansa Culture.” The Nation (October 4, 2010).
to protest the company’s participation in deport- Morozov, Evgeny. “In Defense of DDoS.” Slate
ing asylum seekers. The first criminal chamber (December 13, 2010). http://www.slate.com/
of the Frankfurt appellate court later ruled that articles/technology/technology/2010/12/in_
the demonstration was targeted at influencing defense_of_ddos.html (Accessed November
public opinion, and its perpetrators could there- 2012).
fore not be charged with coercion, according to
EDRI-gram.

Controversy
The tactics of hacktivists are a matter of debate Hagan, Kay
among academic, hacker, and digital rights–pro-
moting communities. Critics argue that certain Kay Ruthven Hagan, who was born on May
tactics, such as DoS attacks, are in fact attacks 26, 1953, is the junior senator (Democratic) for
on free speech. Methods used by hacktivists for North Carolina. Considered a political centrist,
political means are also used for other means; for she is a member of four Senate Committees for:
example, during the conflict in Syria that began in Armed Services; Banking, Housing, and Urban
2011, a group calling itself the Syrian Electronic Affairs; Health, Education, Labor, and Pensions;
Army hacked and defaced numerous Web sites and Small Business and Entrepreneurship. As
perceived to be in support of the Syrian opposi- the chair of the Senate Armed Services Emerg-
tion. In 2006, a company known as Blue Security ing Threats and Capabilities Subcommittee, her
used DoS in an attempt to rid itself of spammers, priority has been to ensure that federal policies
Hagan, Kay 613

work for active-duty military, veterans, and their In February 2013, Hagan released a free con-
families, including the issues of veterans’ health stituent services app, which allows North Caro-
care and employment. linians additional easy contact with her offices
In recognition of the extensive military pres- (she maintains five local offices), video and photo
ence in North Carolina, Senator Hagan has trav- feeds, and real-time social media updates. All of
eled to Iraq, Afghanistan, Pakistan, and Kuwait to this social media activity allows Hagan to extend
meet with military personnel. Senator Hagan, the constituent content in a daily, up-to-the-moment,
mother of two daughters, also cosponsored the personal way that may not be covered on the eve-
Lilly Ledbetter Fair Pay Act, which reestablished ning news or front page of local papers.
a fair rule for filing claims of pay discrimination
based on race, national origin, gender, religion, Policy Positions
age, or disability. Senator Hagan has articulated several key policy
positions. The Senate Committee on Health, Edu-
Constituent Services and Social Media cation, Labor and Pensions, on which she serves,
Since her Senate tenure began, Senator Hagan has come up with a public option—the commu-
has made constituent services a trademark of nity health insurance option—that assures that
her office. She opened five offices across North people with pre-existing conditions can still get
Carolina to serve constituents and hosts in-per- access to health insurance.
son “Conversations with Kay” town halls across She supports a balanced budget, favoring the
the state. Each Wednesday, when the Senate is pay-as-you-go principle, which requires that any
in session, she hosts North Carolinians in her increased spending be paid for, rather than bur-
Washington office for “Carolina Coffee,” where dening future generations for current spending.
constituents can discuss concerns and issues with She has advocated the creation of a bipartisan def-
Senator Hagan and her staff over coffee and icit commission. As a member of the Health, Edu-
Krispy Kreme doughnuts. cation, Labor, and Pensions (HELP) Committee,
According to press secretary Chris Moyer, she is working on the Financial Literacy for Stu-
Hagan extensively utilizes Twitter, Facebook, dents Act, educational reform that provides states
Instagram, and YouTube on a regular basis to incentives to incorporate financial literacy into
provide her constituents with legislative updates, grade 6–12 curriculums. This bill reflects similar
personal insights, and behind-the-scenes visual work she successfully passed in North Carolina.
content that might not be available elsewhere. She has supported an increase in Pell grants for
She has used Twitter to post breaking news, higher education, as well as increased investments
such as her votes on upcoming bills or nomina- in historically black colleges and universities. She
tion confirmations. Hagan’s support of marriage is a cosponsor of both the Safe Schools Improve-
equality was announced on her Facebook page, ment Act and the Student Nondiscrimination Act,
which also features other means of engaging her both designed to promote safe schools and pre-
constituents, such as asking for feedback on top- vent student discrimination.
ics such as “Who was your favorite teacher?” to A member of the congressional National Guard
daily updates on Senate work, to inviting viewers Caucus, Senator Hagan is working to provide
to her Senate offices. support and training of citizen soldiers. As vice
She has held “Twitter Town Halls,” with the chair of the congressional Sportsmen’s Caucus,
first in June 2012 focusing on North Carolina she works to protect the interests of America’s
jobs and the economy, and one in April 2013 hunters, anglers, and trappers, including wildlife
centering on military affairs. Anyone follow- management. Hagan voted for the controver-
ing @SenatorHagan can submit questions by sial Republican-created amendment that would
including #AskKay with their tweet. Hagan’s have mandated the Keystone oil pipeline. The
Senate Web site has added a badge designed to amendment failed to pass the Senate after heavy
link veterans to the eBenefits Web site, providing lobbying by the White House. Senator Hagan
them easy access to information about military is a co-chair of the new Clean Energy Innova-
benefits. tion Project, which is supporting research and
614 Hagan, Kay

development investments in focusing on building The 2008 U.S. Senate race pitted Hagan
a clean energy economy. She has also supported against heavily favored, one-term incumbent
legislation that would require all registered sex Senator Elizabeth Dole (R), the first woman
offenders to register all of their Internet aliases elected to the Senate from North Carolina, a
with a federal database that would link with state that did not ratify the Nineteenth Amend-
social networking sites. ment giving women the right to vote until 1971.
Early on, there were no strong Democratic
Career candidates to challenge Dole, and it appeared
Before entering politics, Hagan worked for 10 that she would win handily. Former Clinton
years at North Carolina National Bank (a prede- White House Chief of Staff Erskine Bowles, who
cessor of Bank of America), rising to the vice pres- had lost two previous Senate races, Democratic
idency of the estates and trust division. She left Governor Michel Easley, Representative Brad
the bank after the birth of her first child, becom- Miller, and Attorney General Roy Cooper all
ing involved in local charities and active in Guil- chose not to run.
ford County (NC) Democratic politics. Hagan In early October 2007, Hagan announced
directed Governor Jim Hunt’s (D) local guberna- that she would not run; however, later in the
torial campaigns in 1992 and 1996. month, she reversed her announcement because
Prior to her U.S. Senate run, Hagan was a of the urging of Hunt and Democratic Senatorial
member of the North Carolina State Senate from Campaign Committee Chair Charles Schumer
1999 to 2008. In 1998, Hagan was elected to (D-NY). In the five-way May 2007 primary, she
the State Senate from the 32nd District, defeat- was the only candidate who ran ads, and she
ing the incumbent. Because of redistricting, she won with 60 percent of the vote. Supported by
later represented the 27th Senate District, with former Governor Jim Hunt and then Governor
Democratic Senate President Marc Basnight as Mike Easley, along with other establishment
her mentor. Hagan secured money for several Democrats, she was also endorsed by the state
projects in her district, including funding for the chapter of the American Federation of Labor
International Civil Rights Museum, the Interna- and Congress of Industrial Organizations
tional Furnishings Market, and Center City Park. (AFL-CIO), EMILY’s List, the Winston-Salem
She cast votes in favor of a state lottery, a two- Journal and Charlotte Observer, the Durham’s
year moratorium on executions, and financial People’s Alliance, and the North Carolina Asso-
incentives for corporations to create new jobs. ciation of Educators.
Her opposition to a constitutional amendment to With the two major party candidates now
ban same-sex marriage was based in her belief set, Dole was the early favorite, with a much
that there was already a state law in place against larger fund-raising effort and greater visibility
it. She co-chaired the Budget Committee, where and name recognition. However, Dole had also
she helped to generate five balanced state budgets. been gone from the state as chair of the National
Hagan’s five two-year terms were exemplified Republican Senatorial Committee for 2005
by the creation of economic development tools and 2006, supporting Grand Old Party (GOP)
and predatory lending laws and the filling of gaps candidates.
in underfunded federal homeland security and Hagan attacked her for spending so little time
law enforcement programs. Under her leadership, in North Carolina, accusing her of being a Wash-
North Carolina extended health insurance to ington insider because of her husband’s (former
uninsured children, expanded preventive and pri- Republican senator and presidential candidate
mary care for uninsured patients in rural North Bob Dole) connections, saying that Dole was in
Carolina, and fought to end insurance discrimi- the pocket of big oil companies because of their
nation against mental health care. She provided financial contributions, and too closely aligned
strong support for the military, and was named by with the Bush administration.
the nonpartisan North Carolina Center for Public Attack ads by both sides played important
Policy Research as one of North Carolina’s Ten roles. The national Democratic Senate cam-
Most Effective Senators three times in a row. paign ran an ad with two elderly men seemingly
Hagan, Kay 615

debating Dole’s age (72); they were actually Early Life


debating whether she was a 92 (her voting per- Hagan’s public service passion was impacted
centage for Bush positions) or 93 (her Senate by her early life. Her maternal uncle is Lawton
effectiveness ranking according to Congress.org.) Chiles, the former Florida governor (two terms)
With a not-too-subtle age issue, the ad stuck. and U.S. senator (three terms). According to
At the same time, Dole attacked Hagan, calling various reports, Hagan has many early political
her “Fibber Kay,” a pawn of national Democrats memories placing bumper stickers on cars in sup-
(the Democratic party spent more on Hagan’s port of her uncle’s campaigns. In the 1970s, as a
senatorial campaign than any other in the 2008 Senate intern, Kay Hagan operated the elevator
cycle) and accusing her of supporting higher that carried senators to the chamber. She also has
taxes. In the final week, Dole ran an attack ad deep military roots, her husband is a U.S. Navy
that asserted Hagan had attended a Massachu- Vietnam veteran, her father-in-law was a two-
setts fund-raiser in the home of a leader of the star Marine general, her father and brother both
“Godless American Political Action Committee,” served in the U.S. Navy, and two nephews have
which was a group that opposed declaring Christ- served in Iraq and Afghanistan.
mas a national holiday. The ad questioned Hagan Senator Hagan earned her B.A. in American
for taking “Godless” money, and wondered what studies from Florida State University (1975) and
promises she had made to the Godless Americans. her J.D. from Wake Forest University (1978). She
In retort, Hagan, a Presbyterian elder and is married to Charles Tilden “Chip” Hagan III,
Sunday school teacher, chided Dole for bearing and is the mother of three children (Jeannette, Til-
false witness against a fellow Christian, and that don, and Carrie).
said she should be ashamed for allowing such an
ad to run. The Dole ad resulted in an increase of 2014 Campaign
more than 3,000 people contributing to Hagan’s In November 2012, Senator Hagan announced
campaign. Dole, initially favored, ran a contro- that she would seek re-election in what is pro-
versial campaign that was marked by a nega- jected to be a hard-fought campaign, given the
tive association with the Bush White House and changing tenor of state politics. North Carolina
advertisements that falsely questioned Hagan’s shifted its 15 electoral votes to Republican Mitt
Christian faith. Hagan enjoyed a lead in Octo- Romney rather than Democrat Barack Obama in
ber, which she never lost. the 2012 presidential election, despite the Dem-
Hagan was also positively impacted by Presi- ocratic National Convention being held in the
dent Obama’s strong statewide appeal. The large state. It was only one of two states that switched
increase of younger voters and African American back to Republican after supporting Obama in
voters, prompted by Obama’s campaign contrib- 2008. Since the 2008 campaign, North Carolin-
uted, but Hagan garnered a larger percentage of ians have elected Republican governors and three
votes than the majority of North Carolina Demo- members of the House of Representatives. Just
cratic candidates. Kay Hagan was elected to the prior to the November election, the Democratic
U.S. Senate, winning by an unexpectedly strong polling group Public Policy Polling reported that
margin of 53 percent to 44 percent. Hagan also only 35 percent of Democrats approved of the job
garnered 100,000 more votes than President that Hagan was doing, but in December, that had
Barack Obama, running 3 percent ahead of his risen to 40 percent.
total. She won 71 percent of voters under 30. Crossroads GPS ran radio spots following the
Dole won 67 percent of white evangelicals, but 7 election that targeted potentially vulnerable Dem-
percent less than McCain within the same group. ocratic Senators up for re-election in 2014 in five
The Washington Post called Hagan’s the best states, including Hagan. The ads—all running
Senate campaign in that cycle, noting that she in states President Obama eventually lost—hit
entered the race a virtual unknown who had cha- the president on “massive tax increases,” “even
risma, a no-nonsense approach to what needed more debt,” and a “one-sided plan” on the fis-
to be done to beat Dole, and the ability to stay cal cliff before telling listeners to call their sena-
on message despite attacks. tors and tell them “Washington needs to stop the
616 Hard Place Theater

spending and give us a balanced plan.” Political Hard Place Theater


science professor and pundit Larry Sabato also
noted that, in North Carolina, incumbency does The brainchild of Clay Shirky, Hard Place Theater
not mean much; the Senate seat has a history of was a New York City theater company designed
going back and forth between parties. However, as a vehicle for Shirky’s unique projects. Each
in late 2012, Public Policy Polling showed Hagan piece produced by Hard Place Theater was non-
with a lead of 46 to 34 percent over potential fiction and composed entirely from actual, found
leading candidate and North Carolina Speaker historical materials. Government documents, cul-
of the House Thom Tillis (R). tural records, and transcripts from a wide variety
of official proceedings were all fair game for Hard
Beth M. Waggenspack Place Theater productions.
Virginia Tech Clay Shirky graduated from Yale University in
1986, with a bachelor of fine arts. He then moved
See Also: Campaign Strategy; Campaigns, to New York City, and in the 1990s, he estab-
Congressional 2008; Campaigns, Presidential 2008; lished Hard Place Theater. At that time, Shirky
Campaigns, 2012; Candidate Image; Influence on also served as vice president of the New York
Elections; Polling. chapter of the Electronic Frontier Foundation;
this organization provided legal assistance in the
Further Readings realm of consumer rights, free speech, innovation,
“Florida and North Carolina Going Down to and privacy.
the Wire.” Public Policy Polling (November Perhaps the best-known piece produced by
5, 2012). http://www.publicpolicypolling.com/ Hard Place Theater was “Excerpts From the
main/2012/11/florida-and-north-carolina-going Attorney General’s Report on Pornography,”
-down-to-the-wire.html#more (Accessed January which used the 1986 Meese Commission Report
2013). authored by the U.S. Department of Justice. This
“Kay Hagan at the 2012 Democratic National six-actor show depicted the congressional hear-
Convention.” C-SPAN Campaign Hub, DNC ing with its listing of bawdy, obscene pornogra-
Convention. http://www.c-span.org/DNC/ phy titles (more than 2,300 were documented in
Events/Kay-Hagan-at-the-2012-Democratic- the actual commission) and testimony.
National-Convention/C3873552 (Accessed Presentation of the nonfiction text ranged from
November 2012). straightforward delivery to emotional, ironic,
“North Carolina Senator Kay Hagan.” On the Issues. and humorous interpretive deliveries. Actors
http://www.ontheissues.org/senate/kay_hagan.htm often spoke over each other, and the overall focus
(Accessed January 2013). was on the questions raised in the report, more
Participatory Politics Foundation. “Voting With than any answers given. Testimony on rape, vio-
Party.” Open Congress. http://www.opencongress lence, pedophilia, and free speech mingled as the
.org/people/votes_with_party/senate/democrat polar nature of American society was emphasized
(Accessed December 2012). throughout.
Senate.gov. “Kay Hagan.” http://www.hagan.senate The script (funded by the Justice Department,
.gov (Accessed November 2012). at least in its original form) interspersed testi-
“Senator Kay R. Hagan’s Biography.” Project Vote mony from rape victims and religious figures with
Smart. One Common Ground. http://votesmart titles of pornographic films. The frame-by-frame
.org/candidate/biography/21082#.UJKHooXbb8s breakdown of Deep Throat from the report fig-
(Accessed November 2012). ured prominently in the stage production, and
“UVA’s Larry Sabato: Sen. Kay Hagan Vulnerable the show saw actors using dolls to reenact the
In 2014 Race.” SGR Today (December 3, 2012). breakdown.
http://www.stategovernmentradio.com/categories/ Shirky went on to become the first profes-
the-campaign-trail/3127-uvas-larry-sabato-sen sor of new media at Hunter College, a fellow
-kay-hagan-vulnerable-in-2014-race.html (Accessed at the Berkman Center for Internet and Society,
January 2013). an associate arts professor within the Interactive
Hashtag 617

See Also: Berkman Center; Cognitive Surplus;


Electronic Frontier Foundation; Electronic Privacy
Information Center; i-docs.org; Privacy.

Further Reading
Class Blog, J201 Section 310. “Research Report: Clay
Shirky and Here Comes Everybody” (2012). http://
j201-310.blogspot.com (Accessed January 2013).
Smith, S. “‘Excerpts’ Indicts Pornographer, Sex
Criminal and Censor.” Chicago Tribune (1991).
http://articles.chicagotribune.com/1991-07-12/
news/9103190060_1_enactment-testimony
-dirty-jokes (Accessed January 2013).
Weiss, H. “Hard Place Takes Porno Report to
Stage.” Chicago Sun-Times (1991). http://business
.highbeam.com/392330/article-1P2-4062926/
hard-place-takes-porno-report-stage (Accessed
January 2013).
Williams, A. “Excerpts From the Attorney General’s
Report on Pornography.” Chicago Reader (1991).
http://www.chicagoreader.com/chicago/excerpts
-from-the-attorney-generals-report-on-
pornography/Content?oid=877931 (Accessed
January 2013).

Hard Place Theater’s Clay Shirky at a rally for Internet freedom on


January 18, 2012, in New York City. Shirky is now an influential
scholar of issues related to social media and the Internet. Hashtag
A hashtag is a symbol used to categorize, high-
light, or tag topics and keywords contained in a
Telecommunications Program (ITP), and a dis- single tweet on Twitter. A hashtag is signified by
tinguished writer in residence in New York Uni- the use of the pound sign (#), called a hashtag
versity’s Journalism Department. He also taught on Twitter, followed by the word or words
new media and public action as the Edward R. being tagged. For example, a tweet about Presi-
Murrow visiting lecturer at Harvard University dent Barak Obama might contain the hashtag
in 2010. #Obama. Hashtags have become increasingly
A generally acknowledged authority on the useful as a way to organize tweets about a spe-
effects of Internet and social media on society, cific topic, event, person, and so on. Event orga-
Shirky is a devoted social media user and par- nizers, politicians, celebrities, and other Twitter
ticipant as well as a researcher. He published the users will select unique hashtags for their events
book, Here Comes Everybody: The Power of or topics and encourage Twitter users to include
Organizing Without Organizations, in 2008. He the hashtags in their tweets (such as #GOP2012
pursues interactions between people and social for the 2012 Republican National Convention).
media in his 2010 book, Cognitive Surplus: Cre- The most popular hashtags, in terms of the num-
ativity and Generosity in a Connected Age. ber of uses, become trending topics.
Anyone can create a hashtag on Twitter. To
Karla Lant create a hashtag, a person simply types # fol-
Northern Arizona University lowed by a word or words (with no spaces
618 Hashtag

between words). Numerical characters are also tweets with the Grand Old Party (GOP) conven-
allowed. Tweets can contain multiple hashtags, tion as a topic.
but they typically contain no more than three Event organizers can also use hashtags to inter-
hashtags. For instance, a tweet about President act with an audience during a live event. Televi-
Barack Obama’s speech at the 2012 Democratic sion news personalities often ask users to tweet
National Convention might use the hashtags feedback and thoughts using a particular hashtag.
#Obama and #DNC2012. Twitter users can easily move political dialogue
Event organizers who know the value of social toward various topics by using hashtags and
media will often create a hashtag prior to an event encouraging others to use them. Politicians and
and ask all participants to include the hashtag in political parties also use hashtags to advance a
their tweets. The more tweets using a hashtag, particular agenda and highlight a candidate or
the more exposure for an event, person, or topic. event. The success of the #GOP2012 hashtag is
Users can search for a specific hashtag and find one example.
all of the tweets that have included this tag. A Hashtags are used to encourage a meetup, an
person with interest in the Iowa caucuses could online or offline gathering of people. The Occupy
search for the hashtag #IACaucus and see all of Wall Street movement is one example of using
the tweets using the hashtag. a hashtag, #OccupyWallstreet, to encourage
Anyone can use any hashtag in a tweet, even a offline gatherings. U.S. President Barack Obama
hashtag that is unrelated to the tweet. Hashtags has used Twitter hashtags to connect with the
are also not proprietary, meaning that anyone public in online gatherings, sometimes called
can use a hashtag for their event, even if it has a “tweet-up.” In partnership with Twitter, the
been used previously or is currently being used White House held the first Twitter @Townhall
in another context. For example, two organiza- at the White House. Using the hashtag #AskO-
tions with the abbreviation ABC might both use bama, users submitted questions that were then
the hashtag #ABC in their tweets. Twitter users answered by President Obama.
searching for tweets about the American Broad- The general public, more specifically those
casting Company using #ABC might find unre- who use Twitter, can voice their concerns and
lated tweets because others are using the hashtag thoughts via tweets and classify them using
for different purposes. For that reason, hashtag hashtags. Policymakers and politicians who hope
creators should search for unique hashtags to to gain a better understanding of the sentiments
use. The more a hashtag is used, and the more of the public can monitor the cumulative effect of
specific its defining parameters, the less likely it those tweets by examining the hashtags.
will be used by others.
Although created for and primarily used Jenifer L. Lewis
within Twitter, hashtags are also not exclusive to Nazarbayev University
Twitter. Other online outlets also use hashtags,
including Instagram and Google+. With the use See Also: Campaigns, Digital; Debate; Facebook;
of services that automatically posts tweets to Going Viral; Trending Topic; Twitter.
Facebook profiles, hashtags are also showing up
on Facebook, one of the world’s most popular Further Readings
social networking sites. Blog.Twitter.com. “A Four Million Tweet
The use of hashtags has allowed politicians, Convention: That’s a Wrap for #GOP2012.” http://
political movement leaders, news outlets, and blog.twitter.com/2012/08/a-four-million-tweet
the general public to direct political dialogue -convention-thats.html (Accessed September 2012).
toward topics of interest. Hashtags also high- Blog.Twitter.com. “A New Barometer for the
light topics that many people are discussing. For Election.” https://election.twitter.com (Accessed
example, the Twitter blog reported more than 4 September 2012).
million tweets using the hashtag #GOP2012 at Hashtags.org. “What Is a (#) Hashtag?” http://www
the close of the 2012 Republican National Con- .hashtags.org/how-to/history/what-is-a-hashtag
vention. This indicates at least 4 million unique (Accessed September 2012).
Hatch, Orrin 619

Hashtags.org. “Why Use Hashtags? Guide to three-term incumbent, Democrat Frank Moss, by
the Micro-Blogging Universe.” http://www a nine percent margin of victory in 1976. He has
.hashtags.org/platforms/twitter/why-use-hashtags won re-election six times, with an average winning
-guide-to-the-micro-blogging-universe (Accessed margin of 35 percent. In 2012, Hatch defeated the
September 2012). first serious challenger to his Senate seat, a Tea
Twitter.com. “What Are Hashtags (‘#’ Symbols)?” Party insurgent in the Utah Republican Senate pri-
https://support.twitter.com/articles/49309-what mary, and returned to the Senate in 2013 to start
-are-hashtags-symbols (Accessed September 2012). his seventh and final (he says) term of office.
While in the Senate, Hatch was considered as
a possible nominee to the Supreme Court dur-
ing the Ronald Reagan and George W. Bush
presidencies. He made a short-lived bid for the
Hatch, Orrin Republican presidential nomination in 2000.
Hatch has served as the chair or the ranking
Orrin Grant Hatch is the senior senator from minority member on the Senate Judiciary Com-
Utah, and in 2013, he became the longest-serving mittee, and is the ranking Republican member of
Republican in the current U.S. Senate. Although the Senate Finance Committee, perhaps the most
Hatch came to the Senate a quarter of a century powerful committee in the Senate. He will serve
before the founding of social media sites, the sen- as the chair of this committee, and will become
ator and his staff are among the most active users the president pro tempore of the Senate if the
and advocates of new social media technologies Republicans win a majority of the Senate in the
in politics. Orrin Hatch was born in Pittsburgh, 2014 election. The president pro tempore is third
Pennsylvania, in 1934. He attended public high in succession to the office of the president, after
school, lettering in basketball and boxing. He was the vice president and the speaker of the House
the first in his family to attend college, graduating of Representatives, and presides over the Senate
from Brigham Young University in 1959. in the absence of the vice president.
Hatch paid his way through law school, work- Hatch has been a champion of conservative
ing as a janitor, lathe plasterer, and college resi- nominations to the federal judiciary during his
dence hall monitor, receiving his degree from the membership on the Senate Judiciary Committee.
University of Pittsburgh Law School in 1962. He As the longest-serving member of the committee,
was a dues-paying member of the Wood, Wire, Hatch maneuvered the controversial Clarence
and Metal Lathers Union. Senator Hatch is a Thomas confirmation to the Supreme Court. The
Mormon. His ancestors were early converts to senator voted to confirm, however, liberal nomi-
this faith. Hatch served as a Mormon mission- nees he believed to be worthy candidates, includ-
ary in the American midwest and has held a vari- ing Ruth Bader Ginsburg and Stephen Breyer. He
ety of positions in his church, including bishop. has participated in the confirmation of all the cur-
Hatch is the best-known Mormon public figure rent justices of the Supreme Court. Hatch helped
in America, after Mitt Romney. He and his wife, to form the Federalist Society, the nation’s leading
Elaine, have 6 children, 23 grandchildren, and 10 association of conservative lawyers. Hatch also
great-grandchildren. serves on the Senate Select Committee on Intel-
After running a successful private law practice ligence and the Joint Committee on Taxation. He
in Pittsburgh, Hatch moved to Salt Lake City in is a director of the Holocaust Memorial Museum
1969. His autobiography, Square Peg: The Confes- in Washington, D.C. Harvard University’s Center
sions of a Citizen-Senator, recounts how he joined for Public Leadership and U.S. News & World
the Reagan revolution during the mid-1970s when Reports ranked Hatch as one of America’s top
evangelical Christians and Mormons began to leaders in 2009.
flock to the Republican Party’s pro-life agenda.
Hatch was one of the first members in this move- Legislation
ment to be elected to the Senate. A political nov- Hatch’s 36 years in the Senate have put him at
ice and antiestablishment figure, Hatch defeated a the forefront of several important legislative
620 Hatch, Orrin

initiatives. He coauthored one of the first signif- He coauthored a bill limiting the regulation of
icant antiterrorism bills in reaction to the 1995 dietary supplements with Democratic Senator
bombing of the Oklahoma City Federal Building. Tom Harkin (Iowa) in 1994. Utah is the center
He won the extension of the Foreign Intelligence of the dietary supplement industry in the United
Surveillance Act in 2008, a law criticized by the States. Hatch was also a long-term friend of lib-
American Civil Liberties Union as a threat to civil eral Democratic Senator Ted Kennedy (Massa-
liberties. He supported the Bush administration’s chusetts), partnering with Kennedy in passing
Economic Stabilization Act and the Troubled the State Children’s Health Insurance Program
Asset Relief Program (TARP) acts of 2008, but (SCHIP), guaranteeing health coverage for low-
says that he now regrets his vote for TARP. Hatch income children in 1997.
has proposed a balanced budget amendment to OpenCongress.org, a nonpartisan Web site
the U.S. Constitution 17 times. The amendment that tracks how often members of Congress vote
would cap federal spending as a percentage of with their party, ranked Hatch 26 among the
the nation’s gross domestic product and require a 47 current Republican senators. He voted with
two-thirds vote in Congress to raise taxes, unless his fellow Republicans 90 percent of the time in
there is a formal declaration of war. Congress 2012. Hatch’s life outside of the Senate is as inter-
came within one vote of approving the amend- esting as his service within it. He is an accom-
ment in 1997. Hatch opposed President Obama’s plished piano, organ, and violin player. He is
health care proposal, the first senator to challenge also a songwriter and recording artist of religious
the constitutionality of the individual health insur- music, including a song celebrating Hanukkah.
ance mandate. He believes that it exceeds Con- He appeared in a cameo role in the 2000 Oscar-
gress’ interstate commerce power. The Supreme winning film, Traffic.
Court agreed with Hatch in National Federa-
tion of Independent Business v. Sebelius (2012), Social Media Use
although a majority of the court upheld the man- While 2004 is considered the Internet’s breakout
date under Congress’ taxing powers. year in presidential elections, after Howard Dean’s
The senator was a leading champion of the successful use of his Web site for online fundrais-
Medicare prescription drug benefit known as ing, the first overt political use of the Internet may
Medicare Part D, which was enacted in 2003. He be Usenet, the online network that began in 1979.
helped win passage of the Ryan White Acquired By 1986, political groups began to intensively use
Immune Deficiency Syndrome (AIDS) Care Act e-mail and Internet bulletin boards. Both major
of 1990. He joined Democratic Senator Richard parties and at least two of the minor party presi-
Durbin (IL) in an unsuccessful effort to pass the dential candidates had campaign Web sites in the
Development, Relief, and Education for Alien 1996 election. Most congressional candidates also
Minors (DREAM) Act in 2001. The act would had Web sites. However, these Web sites tended
have established a process to give the children of to be little more than digital brochures describ-
undocumented immigrants access to American ing candidates’ backgrounds and issue positions.
citizenship if they graduated from an American Hatch was elected to the Senate before the rise
high school or served in the U.S. military. He of the Internet. He has become, however, one of
was also instrumental in authoring the Violence the most fervent champions of these new tech-
Against Women Law, a bill designed to protect nologies in today’s Senate. His Web site (hatch
women and children against domestic assault, .senate.gov) was one of the first established by a
and the law establishing the America’s Missing: senator. During his 2000 run for the Republican
Broadcasting Emergency Response (AMBER) nomination for president, Hatch highlighted his
alert system. campaign’s prowess in its use of the Internet dur-
Hatch is a supporter of stem cell research, ing a primary debate. This was probably the first
bills to strengthen state powers under the Tenth time that any presidential candidate has made the
Amendment, and congressional statutes that use of the Internet a campaign issue.
seek to overturn Supreme Court decisions that Hatch’s Facebook page (www.facebook.com/
Hatch fears infringe on the freedom of religion. OrrinHatch) became active in 2008, and has more
Hatch, Orrin 621

than 23,000 “likes.” He was an early adopter of The message was more likely to result in higher
social networking sites, and he helped orchestrate voter turnout the closer the poster’s relationship
the Republican gains in the Senate during the 2010 was to the viewer. It is not only elected officehold-
congressional campaign through traditional and ers and political candidates who seek to advance
social media techniques. Hatch’s state and Senate their agendas on social media sites. Hatch and
offices are two of the most effective social media Republican Senator Jerry Moran (Kansas) chas-
operations in Congress. The senator interviewed tised Treasury Secretary Timothy Geithner for
Facebook founder and CEO Mark Zuckerman in using Facebook and Twitter to encourage mem-
an interactive discussion about the emergence and bers of the public to pressure their representatives
impact of social media on innovation and pub- in Congress to increase funding for the Security
lic policy in 2011. Hatch invited Zuckerman in and Exchange Commission in 2012. The Treasury
Hatch’s role as the chair of the Senate Republi- Department had placed several posts on Twitter,
can High Tech Task Force, but also, journalists YouTube, Flickr, Facebook, and the department’s
suggest, as a way to enlist young people’s support blog championing more funding for important
during a tough 2012 re-election campaign. He government financial agencies.
has chaired this taskforce since 2009, and serves Hatch’s early adoption of Internet and social
as the liaison between his party in the Senate and media technologies can be traced to Utah’s role as
the technology industry. one of the nation’s most technologically advanced
Hatch’s career in the Senate shows how new regions. The Salt Lake City area is called the Sili-
social media technologies have affected cam- con Slopes in recognition of the more than 4,000
paign politics. Reddit and Twitter “wars” broke information technology firms, employing more
out during his 2012 Utah Republican Senate pri- than 66,000 people in the state. Animation film
mary campaign, and continued during the gen- company Pixar, home video gaming pioneer Atari,
eral election. Social media services such as Red- Adobe Systems, Novel, WordPerfect, and Iomega
dit are social networking sites that permit their were all founded in the state.
members to sponsor forums on any topic. Sup-
porters and opponents of Hatch flooded the sites Conclusion
with their accusations, complaints, and com- Senator Hatch’s willingness to adopt these new
ments. The senator recognized early what others technologies demonstrates how a long-serving
are now confirming. Adult users of social media senator appreciates the value of cutting-edge elec-
tend to be more engaged in political activity than toral and communication technologies. He uses
adult nonusers. A 2012 Pew Report on the Inter- social media to solicit donations, remind sup-
net found that almost two-thirds of adult users porters of campaign events, and share and post
reported that they used social networking to videos portraying his positions. His staff uses Ins-
express their political views, promoted materi- tagram and Flickr as digital scrapbooks to high-
als on social issues, or followed political candi- light events on the campaign trail and in the Sen-
dates and public officials on Facebook, Twitter, ate. His office employs the biggest sites, such as
and other social media sites. Google reports that Facebook and Twitter, to canvass large numbers
more voters use their mobile devices for political of constituents. Senator Hatch and his staff fol-
news than they use traditional print media such low Twitter tweets and Facebook posts to gauge
as magazines and newspapers. public response to campaign activities and legisla-
Social media and networking sites not only tive initiatives. Senator Hatch’s reliance on social
offer public officials easier access to the politically media and networking will increase as his con-
connected population, but can also serve to push stituents become more accustomed to using social
voters to the ballot booth. Facebook messages media and networking to communicate their con-
moved more than a third of a million people to cerns and preferences and hold their elected offi-
vote in the 2010 election, according to a study cials accountable.
published in Nature. A nonpartisan social mes-
sage urging people to vote and post that they had Timothy J. O’Neill
voted appeared on Facebook on Election Day. Southwestern University
622 Hate Speech, Online and Social Media

See Also: Campaigns, Congressional 2010; Chaffetz, and anonymity. Popular culture, including both
Jason; OpenCongress.org; Pew Internet and American fiction and music, is also a key part of modern
Life Project. White Supremacy movement, and the Internet
has helped create new avenues for sales and
Further Readings distribution of music espousing separatist and
Bond, Robert M., et al. “A 61-Million Person supremacist beliefs.
Experiment in Social Influence and Political Despite this organizational activity, online hate
Mobilization.” Nature, v.489/7415 (2012). speech is difficult to define because the concept
Hatch, Orrin. Square Peg: Confessions of a Citizen- encompasses a broad range of communication,
Senator. New York: Basic Books, 2003. much of which is not connected to any particu-
Rainie, Lee and Aaron Smith. “Politics on Social lar organization, and dissent and freedom of even
Networking Sites” (2012). Pew Internet. http:// unpopular expression are firmly entrenched in
pewinternet.org/Reports/2012/Politics-on-SNS American law and culture. Hate speech is lan-
.aspx (Accessed June 2013). guage that disparages or attacks a group of people
Stromer-Galley, Jennifer, et al. “What Citizens Want, based on a primary aspect of social identity such
Where They Went, and What They Got Online in as race, religion, ethnicity, gender, sexual orienta-
the U.S. Election 2000.” In Elections in the Age tion, or disability. Speech codes are controversial
of the Internet: Lessons from the United States, and hard to enforce, even in the private sector.
Stephen Coleman, ed. London: Hansard Society, Freedom of speech is enshrined in the Constitu-
2001. tion and is central to national identity.
Political speech is the most highly protected cat-
egory, even when that speech conflicts with other
American values of tolerance and equality. In
keeping with that principle, there can be no legal
Hate Speech, Online restriction on speech that is considered political in
nature, and in the United States, the courts have
and Social Media tended to interpret “political” in broad terms.
This sets the United States apart from countries in
Hate groups, defined as extremist organizations Europe, which have enacted restrictions on speech
that espouse prejudice and separation based on in reaction to concerns about the role of commu-
race, religion, gender, or sexual identity, were nication in the rise of fascism in the World War II
early and enthusiastic adopters of the Internet era. In Germany and Austria, for example, deny-
as a tool of organizing and communication. ing the existence of the Holocaust is considered
White supremacist groups have used the Inter- hate speech, is illegal, and is grounds for denial of
net since 1985, when White Aryan Resistance an entry visa.
leader Thomas Metzger founded an electronic As a result of this tension between the desire to
bulletin board service that rallied against blacks protect the rights of women and minorities and
and Jews. Since that time, organized extremist the desire to protect free speech, hate speech is
groups have primarily used the Internet for three largely defined by the different organizations that
main activities: to openly express their view- represent the types of people most often stigma-
points without the opposition or consequences tized by extremist groups. The most prominent
they would encounter elsewhere, raise money, groups involved in this type of advocacy include
and grow their organizations by recruiting new the Anti-Defamation League, with the mission
members. As with any affinity group, the Inter- to combat offenses against the Jewish people
net appeals to these groups because it allows and monitor anti-Semitic speech; the Southern
members to connect across legal and geographic Poverty Law Center, which polices race-based
boundaries, finding common ground, regardless speech and hate crimes; the National Organiza-
of where they live. For those engaged in activities tion for Women (NOW), which advances gender
that violate widely accepted social norms, the equality and monitors offenses against women;
Internet and social media also provide privacy and the Human Rights Campaign (HRC), which
Hate Speech, Online and Social Media 623

A protester holds a rainbow-lettered sign meaning “end hate” in HTML at a November 2008 Dallas, Texas, protest against the
passage of Proposition 8 banning same-sex marriage in California. Online hate groups are difficult to define and count, but a
Southern Poverty Law Center report found a sharp increase in extremist antigovernment groups in the United States, from 149 in
2008 to 1,360 in 2012, or a change of 813 percent, corresponding to President Barack Obama’s first term in office.

advocates on the behalf of gay, lesbian, bisexual, maintain a certain environment on the site that
and transgender Americans. is a reflection of the company’s brand, but some-
times conflicts with the idea of the Internet as a
Responses and Remedies new public sphere. Public opinion surveys show
The Internet presents new challenges and oppor- that most Americans agree that the Constitution
tunities for responding to hate speech. With First affords the Ku Klux Klan the right to assemble
Amendment protections and the borderless nature and speak. Even those who find their views repug-
of the Internet, legal remedies against hate speech nant may defend their right to express them in
would be difficult to legislate and impossible to the town square. Online, however, the private
enforce. As a result, rather than seeking legal rem- companies that own and operate social networks
edies to minimize hate speech online, groups like require conformity to certain codes of conduct.
the ADL and NOW apply pressure to companies These corporations impose standards that pro-
that host sites associated with hate groups or hate tect their image and reflect the expectations of the
speech. Though not illegal, the types of speech community.
that these organizations target may violate a com- Another remedy that some advocates have
pany’s individual terms of service agreements, sought is to pressure advertisers to decline to place
the document outlining the rules of the road for their marketing on pages that contain content
a particular social network or community. On they consider hate speech. Advocacy organiza-
social sites like Twitter, Facebook, and media sites tions have successfully applied pressure for com-
that host comments, users often agree to conform panies to withdraw from shows that they believe
to certain rules when they join a community or include hate speech through campaigns like Stop
register to post comments. These policies help to Beck, aimed at Glenn Beck; and Stop Rush, aimed
624 Hate Speech, Online and Social Media

at Rush Limbaugh. In 2013, Fox News executives other types of speech highly depend on the histor-
admitted that the Stop Beck campaign had cost ical and social context. Ideas that are considered
them significant amounts of advertising revenue repugnant in 2013 may have been mainstream
and contributed to their decision to discontinue just a few decades ago, and much of the speech
Beck’s contract. In 2013, women’s groups coordi- identified as hate speech by these groups reflects
nated a campaign criticizing Facebook for hosting reactions to the social movements and change of
pages that promote sex trafficking and violence the 1960s and 1970s. For example, the concept
against women. When Facebook responded that of homophobia is fairly modern. Although racial
the pages in question did not violate their terms of and religious defamation has attracted the most
service, these women’s groups placed more focus attention historically, in the 21st century, hate
on appeals to advertisers. speech directed at sexual orientation and gender
has generated a great deal of attention. This is
Cyberhate in a Postracial Era also the source of some debate because these lat-
Hate groups have flourished online. By 2000, ter categories of identity do not enjoy the same
HateWatch had identified 400 Web sites linked legal protections as race and religion, public opin-
to organizations they designated as hate groups, ion on these issues is greatly in flux, and religious
and leaders of organizations openly acknowl- groups argue that expansion of antidiscrimina-
edged the integral role that online community tion protections to sexual matters would violate
and communication play in their organizations. their religious freedom.
An analysis of messages posted on these sites Several scholars, including Jessie Daniels,
characterized much of these communications as have explored the idea that hate speech is not
congenial. They focus on community building, so isolated from mainstream discourse around
pride, identity, and the prestige of their member- race and gender. Consistent with feminist and
ship, rather than exclusively the core tenets of anti-racist scholars like Jackson Katz, these writ-
the organizations. ers find thematic continuities between what is
In addition to facilitating the distribution of defined as hate speech aimed at sexual, religious,
hate speech cross-border organization among and racial minorities and more mainstream con-
hate groups, the Internet also enables more effec- servative political discourse around race, gender,
tive measurement of these types of activities. and sexual orientation.
Based on Web site traffic, researchers believe In the United States, extreme and more main-
that the election of the United States’s first black stream political rhetoric on the right share the
president helped to reenergize the backlash that view that social movements like feminism, the
had already been in progress for decades. Traf- civil rights, and the lesbian, gay, bisexual, and
fic to the white separatist site Stormfront.org, in transsexual (LGBT) movements have expanded
particular, increased so dramatically following the rights of minorities by infringing upon those
Obama’s election that its servers crashed. A simi- of the majority. Hate groups capture these rather
lar “Obama effect” occurred in 2012 after Presi- widespread resentments and sense of grievance
dent Obama’s re-election. and situate them within rhetoric of zero-sum
The topics and loci of American hate speech in gain group competition, warfare, and violence.
the 21st century are illustrated in the Geography Though the speech is protected, these groups
of Hate, a large-scale content-analysis project that promote activities that fit the federal guidelines
maps the geographic origins and prevalence of hate for hate crime. The Federal Bureau of Investiga-
speech on Twitter. Automatic coding identified tion uses Congress’ definition of a hate crime as
tweets containing at least one hate word related an offense involving group bias against a reli-
to race, disability, or sexual orientation. Human gion, gender, disability, ethnic origin, or sexual
coders then reviewed each of the resulting tweets orientation.
to determine whether the tweet was negative. The fluidity of the barriers between hate speech
Complicating matters, as one can see in the and other political discourse is also demonstrated
Geography of Hate research project and Stop in the activities of antigovernment groups, which
Beck campaigns, distinctions between hate and aim their violence and activism at the perceived
HeadCount.org 625

excesses of the federal administration. While HeadCount.org


hate crimes have decreased or remained roughly
stable, online discourse and other activity among HeadCount.org is a nonprofit, nonpartisan voter
groups that fit the broader definition of extrem- registration organization aimed at music lovers.
ism related to government authority multiplied The New York City–based group connects musi-
eight-fold from 2008 to 2012. These groups tend cians with its purpose of encouraging those who
to believe that the federal government wants to are eligible to participate in the experience of
curtail their rights. For them, President Obama American democracy, and its goal to add names
serves as a primary manifestation of that. on the rolls. HeadCount was founded in 2004 by
Similarly, under Obama, hardcore groups Marc Brownstein, bass player for the band Disco
now number 1,000, but extremist antigovern- Biscuits and Andy Bernstein, a journalist, music
ment groups have dramatically grown. Accord- lover, and an author of the Phish guidebook,
ing to the Southern Poverty Law Center (SPLC), The Pharmer’s Almanac. Along with a team of
“The number of Patriot groups, including armed volunteers, the two located their work with this
militias, has grown 813 percent since of the project at physical sites where they often crossed
Obama was elected—from 149 in 2008 to 1,360 paths with unregistered voters: on parking lots,
in 2012.” Even these statistics, however, are dis- in vendor aisles, and at beverage tents. They sim-
putable because conservative groups take issue ilarly utilized virtual venues popular with that
with SPLC’s definitions and argue that they seek particular demographic via Facebook, Twitter,
to marginalize or even criminalize organizations Instagram, and other social networking plat-
engaged in normal political debate about the forms. In cooperation with partner musicians,
proper size and role of government. HeadCount members distributed information,
held raffles for autographed memorabilia or VIP
Carole V. Bell music experiences, and drew upon the identifica-
Northeastern University tion audiences have with the people who play
the music they love, all in service of greater voter
See Also: Civil Rights; Economic and Social Justice; participation.
Freedom of the Press and National Security; Gender; This approach proved successful, and in the
Human Rights; Immigration; Lesbian, Gay, Bisexual, following years, HeadCount registered hundreds
and Transgender Rights; Online Smear Campaigns; of thousands of live music fans across the coun-
Race/Ethnicity. try. While the organization began in the jam band
scene, the scope of artists and acts among its
Further Readings 80-plus partner musicians ranges within a variety
Burris, Val, Emery Smith, and Ann Strahm. of tastes and tones, including Blues Traveler, Bon-
“White Supremacist Networks on the Internet.” nie Raitt, The Decemberists, Greensky Bluegrass,
Sociological Focus, v.33/2 (2000). Jay-Z, John Mayer, Maroon 5, My Morning
Daniels, Jessie. Cyber Racism: White Supremacy Jacket, Neil Young, Pearl Jam, Phish, and Wilco.
Online and the New Attack on Civil Rights, These collaborations foster existing relationships
Perspectives on a Multiracial America with fans, create new audiences for bands, and
Series. Lanham, MD: Rowman & Littlefield provide publicity for causes and artists alike.
Publishers, 2009. HeadCount also employs their partner artists’
Levin, Brian. “Cyberhate: A Legal and Historical e-mail lists to distribute pertinent materials so
Analysis of Extremists’ Use of Computer that any given campaign can reach more than 1
Networks in America.” American Behavioral million in-boxes.
Scientist, v.45/6 (2002). A network of helpers is crucial to the success
McNamee, Lacy G., Brittany L. Peterson, and Jorge of HeadCount, with dozens of people volunteer-
Pen. “A Call to Educate, Participate, Invoke ing as regional coordinators or team leaders and
and Indict: Understanding the Communication working in artists relations or new media. Many of
of Online Hate Groups.” Communication these individuals engage in particular projects on
Monographs, v.77/2 (2010). the Web, and they remain connected, organized,
626 Health Care

and energized with one another via social media. recalls an issue of Rolling Stone in its coverage of
These are the channels through which the organi- prominent musicians, industry leaders, and activ-
zation maintains awareness, energy, and the fund- ists like Bob Weir of the Grateful Dead and Fur-
ing needed to flourish. ther, John McCrea of CAKE, Stefani Scamardo of
Many of the most successful HeadCount cam- Hard Head Management, and Peter Bahouth of
paigns have been deployed via the Web and social the U.S. Climate Action Network. A list of festi-
media platforms, including one that occurred vals and promoters affiliated with HeadCount is
during the first full election cycle after the orga- equally diverse, and includes Austin City Limits,
nization launched. On November 3, 2008, Head- Bonnaroo, High Sierra Music Festivals, Horning’s
Count hosted musicians such as Joss Stone, Phil Hideout, Mountain Jam, Outside Lands, and
Lesh, Robert Randolph, and Questlove for a Get PDX Pop Now!
Out the Vote Party at the Highline Ballroom.
Webcast live nationwide via iClips, this was the Jennifer Jeanne Richardson
first event of its kind to combine live audio and State UNY Potsdam
video streams to produce a national voter aware-
ness and registration event, one with the poten- See Also: Get Out the Vote Drives; Nonprofit
tial to move thousands of people to the polls on Organizations; Rock the Vote; Voter Apathy; Voter
the next day. Turnout; Youth Engagement.
In 2012, HeadCount registered at least 103,340
voters at more than 1,170 events in more than 70 Further Readings
cities, marking its most successful year to date. Bernstein, Andy and Christopher Gaspar. A Call
One element of its national campaign around the to Action. Documentary (2008). http://www
November elections was the Clipboard Project, .iclips.net/watch/a-call-to-action (Accessed
which took photographs of roughly 200 music December 2012).
and entertainment stars holding HeadCount’s HeadCount.org. http://www.headcount.org (Accessed
Register to Vote clipboard. These images were December 2012).
then tweeted, Facebooked, and linked to the offi- “HeadCount.org Releases Voter ID Requirements
cial Web site to be pinned, Tumblr’ed, recom- Map for Election.” PR Newswire (November 6,
mended on Google, StumbleUpon’ed, shared on 2012). http://www.prnewswire.com/news-releases/
Digg or Reddit, or otherwise circulated. 50 Cent, headcountorg-releases-voter-id-requirements
BB King, Cyndi Lauper, Edward Norton, John -map-for-election-177527351.html (Accessed
Legend, Ke$ha, Lewis Black, Marlon Wayans, January 2013).
Sarah Silverman, Stephen Colbert, Susan Saran-
don, Tenacious D, and Warren Haynes represent a
cross-section of the celebrities who participated in
the project. Facebook posts from Dave Matthews
and Linkin Park garnered more than 18,000 and Health Care
100,000 “likes,” respectively.
HeadCount’s Web site also hosts a current blog In 2010, President Obama signed into law the
where volunteers, staffers, board members, and Patient Protection and Affordable Care Act, often
partner artists can post content to share with view- referred to as ACA, which many believe is the
ers far and wide, allowing information to quickly most significant social policy enacted in decades.
circulate on the virtual music scene. Between After an overview of the legislature and its histor-
elections, it discusses current issues of interest to ical and political significance, the entry explores
its members, such as food and farm policy, Gulf the role social media played throughout the health
Coast recovery, human rights, and sustainability care reform between 2007 and 2012.
and climate change.
Bernstein and Brownstein still serve as Head- Affordable Care Act
Count cochairs and as members of the board of The overall goals of the health care reform are to
directors, the latter of which boasts a roster that expand health insurance coverage to millions of
Health Care 627

uninsured Americans, to improve access to and Social Media Events


quality of care, and to ultimately control rising From the early days of the law’s inception, key
health care costs. Some of the law’s major provi- turning events in health care reform have been
sions include the following: shaped by social media events. The “death panel”
controversy that significantly threatened the law,
• Requiring that most U.S. citizens and for instance, took momentum with a 316-word
legal residents have health insurance Facebook post by Sarah Palin, former governor
by 2014, also known as the individual of Alaska.
mandate. Betsy McCaughey, a former lieutenant gover-
• Creation of state-based exchanges nor of New York, first brought attention to this
through which individuals can purchase issue in mid-July 2009, claiming that the ACA
coverage, with subsidies available to would require Medicare patients to have counsel-
lower-income individuals. ing sessions that would tell them how to end their
• A major expansion of the Medicaid pro- lives sooner. Though the American Association
gram to cover all non-Medicare-eligible of Retired Persons (AARP, a nongovernmental,
individuals with incomes up to 133 per- nonprofit organization for the elderly) as well as
cent of federal poverty level (FPL). other sources debunked the claim, opponents of
• Requiring insurance plans to provide the law continued the discourse in their attacks
coverage, regardless of pre-existing of the ACA. However, the general public only
conditions. started to take note of the controversy after
• Closing the Medicare prescription Sarah Palin’s August 7 Facebook post, in which
“donut hole.” the term death panel was first used. Her mes-
sage that neither her parents nor her baby with
ACA aims to provide health coverage to more Down syndrome should have to stand in front of
than 30 million uninsured Americans beginning a “death panel” where bureaucrats would get to
in January 2014. It is the biggest overhaul of the decide whether they were worthy of health care
$2.8 trillion U.S. health care system since the ini- certainly struck an emotional cord with the gen-
tiation of Medicaid and Medicare in the 1960s. eral public.
To say that it has been a challenging process to Though later voted on Truth-O-Meter (now
get the law passed and implemented is a gross PolitiFact.com) as the biggest political lie of the
understatement. year, this controversy took hold: A Google search
Health care reform became a point of conten- with the term generated 275 million results in
tion in the 2007 Democratic primary election November 2012; the top 50 newspapers across
when the candidates presented different plans the nation published more than 700 articles on
for achieving universal coverage. In November the claim in the five weeks after Palin’s post. Bren-
2008, newly elected president Barack Obama dan Nyhan reported a 2010 poll, which showed
started to push for a major overhaul of the health that after it spread, about 85 percent of Americans
care industry, an effort that would lead to his sig- were familiar with the “death panel” charge, and
nature legislature, the ACA. In 2009 there were about 30 percent of those who knew of the attack
many controversies and complications, and even thought it was true. The section of the bill Palin
though the president signed the ACA into law was referring to, which would have paid physi-
in March 2010, the tumultuous saga continued. cians for providing voluntary end-of-life counsel-
Debates over the legality of ACA and the states’ ing to Medicare patients, was removed and not
decisions to participate in the Medicaid expan- included in the final law.
sion or opt out of this key component of the law, The June 2012 Supreme Court ruling on the
for instance, are some examples of the complica- ACA, another monumental event in the health
tions that confused the public during the imple- care reform saga, was connected to another
mentation stage. Social media have provided a social networking medium, Twitter. Shortly after
platform for public information and engagement the court’s ruling that the law was constitu-
throughout this process. tional, Twitter volume peaked at 13,000 tweets
628 Health Care

per minute, which more than tripled from the Malcolm Gladwell’s commentary in The New
record-breaking Twitter activity in March 2010 Yorker was critical of social media doing little
when the U.S. House passed the legislation. Both more than establishing weak ties, which may
campaigns used the opportunity to engage sup- bring a million people to a Facebook page, but
porters on Twitter during this key moment. Mitt fail to mobilize 1,000 people to the streets and
Romney’s tweet tied to the ruling—“If we want effect real change.
to get rid of Obamacare, we’re going to have to
replace @BarackObama”—was one of the big- White House Social Media
gest tweets of the day, which generated more President Obama has benefited from its engage-
than 4,000 retweets. These statistics would pale ment with the public via social media since his
in comparison to the Twitter activity that the first election campaign and continued to use
nation later saw on Election Day 2012, when social media to communicate about his key pol-
more than 300,000 tweets were sent per min- icy endeavors, including health care reform. An
ute at the height of the site’s traffic. This is yet analysis of social media platforms that Obama
another poignant example of the ever-evolving and Romney used in early June 2012 found that
role that social media play in shaping political the Obama campaign posted nearly four times
events and redefining civic engagement. as much content as the Romney campaign, and
was active on nearly twice as many platforms.
Advocacy Organizations The author of the study, the PEW Research Cen-
Various constituency organizations saw the health ter’s Project for Excellence in Journalism (PEJ),
care reform as an opportunity for advancing their pointed out that both candidates utilized social
agendas through policy advocacy, and social media outlets such as Twitter, Facebook, and
media provided a forum for such efforts. YouTube, not so much for the social function,
On health care reform, women are both key also known as responding to voters or retweet-
targets for campaign messages and potential mes- ing others, but mainly for direct digital messag-
sengers. Momsrising is an online advocacy orga- ing. The study concludes that, in 2012, voters
nization, which according to its Web site, “takes were more actively involved in helping to shape
on the most critical issues facing women, moth- campaign messages, whereas the traditional news
ers, and families, by mobilizing massive grass- media saw their authority lessen.
roots actions,” using its interactive online forum. To promote ACA and to win re-election, the
To defend and promote ACA, the Web site asked president’s campaign used social media in sev-
its millions of followers for personal stories about eral specific ways. First, the Obama re-election
how the new law was helping their families. campaign Web site had visitors join 18 constitu-
Dawn Josephson, a mother from Florida, shared ency groups, such as women and veterans, which
her story about how, for the first time, her insur- allowed for direct messaging with targeted con-
ance did not exclude her son’s pre-existing eye tent to different constituencies. This targeted
condition, referring to one of ACA’s more popu- messaging strategy was not a feature in Romney’s
lar clauses. The White House picked up Dawn’s social media strategy. Second, the administration
story, as did the major media outlets. She shared used social media messaging to debunk myths
her story in person with President Obama, an about ACA. The White House launched a Real-
event that received extensive media coverage via ity Check Web site to dispute popular criticisms
traditional outlets such as the Washington Post of the new policies, such as tax dollars used to
and CNN. fund abortions. The well-designed site matches
Proponents of social media’s democratizing myths with facts, contains video testimony from
function laud its ability to empower and connect, patients and experts, and is media rich with fea-
giving an unprecedented advantage to historically tures such as interactive maps. A few hours after
disenfranchised groups. However, skeptics such the White House blasting the Web site packet to
as David Karpf caution that there is a difference its hundreds of thousands of followers on Face-
between real civic engagement through social book and Twitter, users of the social news site
media and merely slacktivism and clicktivism. Digg voted Reality Check to the site’s homepage,
Health Care 629

President Barack Obama at an “Open for Questions” online townhall event in March 2009. While the White House and the Obama
administration have pioneered the use of social media such as YouTube and Web sites such as Reality Check to address major policy
issues like health care reform, some critics suggest that the potential for truly interactive communication has not been fully realized.

indicating a tremendous success in reaching and Stuart Bretschneider and Ines Mergel saw this
mobilizing its base. as a new wave of social networking technologies
adopted by government and the public sector,
Open Government Initiative and argued that when compared with the pre-
and Government 2.0 vious wave of e-government application, social
In 2009, and immediately after his inauguration, media technologies offer one unique feature:
President Obama started an Open Government They allow for real bidirectional exchanges, or
Initiative and subsequently released a memo to real-time exchanges of content, while reaching
federal agencies with a call to engage in trans- more diverse and potentially more-engaged audi-
parent, participatory, and collaborative gover- ences. The feature of cocreation of content, Mer-
nance. The memo specifically called for inno- gel argues, is “inherently collaborative and par-
vative tools and strategies to make government ticipatory and can help build online communities
initiatives easily accessible for the public, to offer of interest around specific issues” and the above-
venues for citizens and government agencies, to mentioned Momsrising.com case illustrates this
become cocreators of ideas, and to facilitate pub- function and the community-building potential
lic engagement. Social media outlets seemed to well. In a 2010 analysis, Rebecca Lapaze focused
offer a solution because to achieve Government on social media messaging by four federal agen-
2.0, Web 2.0 social technologies must be adopted. cies, including the Department of Homeland
Government agencies and political figures started Security and the White House; the author cau-
to embrace social media messaging. The White tions that simply adopting a social media strat-
House, for instance, was among the first govern- egy does not automatically guarantee true civic
ment agencies to use its YouTube channel for vir- engagement and participation that embodies
tual townhall meetings. Web 2.0 principles. A key Web 2.0 principle,
630 Homophily

according to Mergel, concerns the directionality Further Readings


of information sharing and the extent to which Bretschneider, Stuart and Ines Mergel. “Technology
citizens are able to “reuse, reshare, and discuss and Public Management Information Systems:
the content” provided and authorized by the Where Have We Been and Where Are We Going?”
government. In The State of Public Administration: Issues,
An early poll by Nationaljournal.com in 2009 Problems and Challenges, D. C. Menzel and H. J.
with new media experts from across the politi- White, eds. New York: Sharpe, 2010.
cal spectrum reported that the administration’s Bryer, Thomas. “Online Public Engagement in the
use of sites like WhiteHouse.gov warranted an Obama Administration: Building a Democracy
average grade of C+. The main criticism was that Bubble?” Policy & Internet, v.3/4 (2011).
the sites remained one-way forums with mostly Gladwell, Malcolm. “Small Change: Why the
top-down messaging, whereas the interactive fea- Revolution Will Not Be Tweeted.” The New
tures, such as the “Open for Questions” feature, Yorker (October 4, 2010).
were underutilized. In a 2009 memo, Peter Swire, Karpf, David. “Online Political Mobilization From
former counsel to the Change.gov New Media the Advocacy Group’s Perspective: Looking
Team, recognized the key limitations imposed Beyond Clicktivism.” Policy & Internet, v.2/4
within the federal government, which might (2010).
explain the lower-than-expected performance LaPaze, Rebecca. Friending the Government: Why
of its Web 2.0 applications. The issues of scale U.S. Government Social Media Websites Do Not
were discussed, also known as engaging millions Function as Public Spheres and What Can Be
of motivated individuals using limited resources, Done to Promote Civic Participation. M.A. thesis.
and a complicated clearance process necessitated Mason Archival Repository Service, 2011.
by the fact that a short Facebook post might be Mergel, Ines. Social Media in the Public Sector:
construed as official government policy. A Guide to Participation, Collaboration and
Thomas Bryer offers an analysis of participa- Transparency in the Networked World. San
tory venues, such as social media used in poli- Francisco: Jossey-Bass/Wiley, 2012.
tics and governance, focusing on the alignment Nyhan, Brendan. “Why the ‘Death Panel’ Myth
between government actions and citizen expec- Wouldn’t Die: Misinformation in the Health Care
tations. In this framework, the democratic equi- Reform Debate.” The Forum, v.8/1 (2010).
librium and the preferred position are the points
where citizens have high access to participatory
venues (mainly social media forums), and their
expectations for civic engagement and govern-
ment actions are well aligned. To achieve such Homophily
a position, Web 2.0 principles such as direction-
ality of information are essential for ensuring Individuals are more likely to have a connection
true transparency, participation, and collabora- if they have common attributes. The homoph-
tion. As can be seen throughout the health care ily principle shows that relationships tend to be
reform saga, the role and potential of social distributed according to the characteristics of the
media as forums of civic engagement and politi- actors (whether persons, organizations, or other
cal discourse continues to be negotiated. entities). People who share gender, ethnicity, lan-
guage, class, values, or nationality tend to cluster
Min Liu in social networks. For instance, there is strong
Southern Illinois University Edwardsville empirical evidence showing that girls tend to asso-
Jina Yoo ciate and become friends with other girls at pri-
University of Missouri St. Louis mary school, whereas boys are more likely to be
connected with other boys. This is one example of
See Also: AARP; Age; Change.gov; Clicktivism; a homophile process.
Medicare; MomsRising.org; Palin Phenomenon; Two different mechanisms seem to underlie
Social Security; Web 2.0. homophile dynamics: selection and influence.
Homophily 631

Social selection brings together individuals with small subset of the list of contacts, usually with
common attributes. On the other hand, peer influ- strong relationships (confidents, friends, and fam-
ence is the process by which the behavior of the ily relations) to which they typically share several
individual is altered because of continuous inter- common characteristics. Family and close friends
action with significant others. Both processes, with usually constitute the core of personal networks
different prominence, may be present in the same on Facebook. Users maintain passive communi-
homophile dynamic. For instance, selection and cation patterns with a long list of contacts. Edu-
influence contribute to the similarity of substance cational institutions and the workplace are two
use patterns among friends. Following a social relevant areas to establish Facebook’s contacts.
selection mechanism, adolescents who smoke tend
to associate with more probability with smoking Other Social Media
than nonsmoking friends. At the same time, social Homophile dynamics are present both in the
norms toward smoking in small friendship groups access of users to different social networking
influence the behavior of individual members. Web sites (SNWs), as well as in the distribution
Peer influence is an essential mechanism to initiate of personal contacts between online networking
smoking behavior. platforms. SNWs differ in the social and demo-
Homophily has also been documented in online graphic profile of their members. For instance,
social networks. One example is the network in Spain, adolescents tend to use Tuenti, a Spain-
of consumption patterns of political books on based SNW, whereas adults are more represented
Amazon. From 2004 onward, Valdis Krebs ana- in Facebook. Meanwhile, Twitter has predomi-
lyzed the “customers who bought this item also nantly young users, inbetween Tuenti and Face-
bought . . .” network for political books during book. In the same vein, SNWs have dissimilar
American presidential elections. Results showed penetration in different countries: Orkut is widely
a dynamic of political polarization: Books with used in Brazil, Hi5 is extensive in Mexico, and
a Republican orientation were usually bought by QQ in China. Similarly, SNWs attract people
the same customers, whereas Democratic litera- with similar interests, as when they are look-
ture was purchased by a different group of readers. ing for professional networking on LinkedIn or
Very few books played a “broker” role, acting as a dating on Meetic. Therefore, there is a selection
bridge between Republican and Democrat arenas. process based on age, language, nationality, and
professional profile contributing to homophile
Facebook networks on SNWs. So, when an individual
Most evidence of homophily has focused on pat- accesses the pool of contacts of a SNW, he or
terns of interaction on social networking Web she is not connecting to a representative sample
sites. Facebook friends often conform to homo- of the population, but to a self-selected network
phile clusters, where individuals share common of people sharing demographics as well as social,
characteristics. Students who share certain tastes economic, and personal characteristics.
in music and movies have a higher probability to Individuals distribute personal contacts in dif-
establish a connection in Facebook, following a ferent online networking platforms. Some users
selection process. However, there is less evidence choose one platform as the main reference,
for peer influence processes in this case. Patterns of whereas others combine several SNWs simulta-
racial homophily were documented on Facebook neously. Some users are very active, while others
friendship networks. However, co-residence and are passive. Individuals may separate personal
other forms of homophily below ethnic relation- and professional contacts, or try to congregate
ships seem to have a significant influence in the relationships in the same social space. As a con-
racial homophily effect. In fact, reciprocity and sequence, homophile dynamics are first affecting
the tendency to be a friend of the friends of your the access to a particular networking Web site;
friends (that is, transitivity) amplify the effects of and second, contributing to the formation of
racial homophily on Facebook networks. friendship clusters among people who share simi-
Facebook users have an average of 120 friends. lar characteristics. From this point of view, merg-
However, they actively communicate with only a ing two SNWs is more than just summing up two
632 Honeycomb Framework

pools of contacts, insofar as it can alter the struc- Network.” Proceedings of the National Academy
ture of online personal networks. of Science, v.109 (2012).
Homophile processes are observed even when Steglich, C. E. G., T. A. B. Snijders, and M.
SNWs were designed without taking into account Pearson. “Dynamic Networks and Behavior:
the distribution of personal relationships in differ- Separating Selection From Influence.” Sociological
ent social circles. Facebook tends to congregate Methodology, v.40 (2010).
people who may originally come from different Wimmer, A. and K. Lewis. “Beyond and Below Racial
social circles in face-to-face interaction. However, Homophily: ERG Models of a Friendship Network
even in this context of open interaction, homophile Documented on Facebook.” American Journal of
processes seem to predominate. During the last Sociology, v.116/2 (2010).
decade, SNWs have gained relevance as a context
for political involvement and debate. For instance,
according to the Pew Research Center’s Internet
and American Life Project, “39% of all American
adults took part in some sort of political activity Honeycomb
on a social networking site during the 2012 cam-
paign.” In this context, homophily on online net- Framework
works may have important political consequences.
Homophile dynamics on online networks can The honeycomb framework is a visual structure
contribute to political polarization. Studies of composed of several blocks in interdependence
opinion formation processes have shown that proposed by Jan Kietzmann, Kristopher Herm-
greater interaction between like-minded individu- kens, Ian McCarthy, and Bruno Silvestre to help
als results in polarization. Similarly, the clusters scholars and professionals understand how social
of followers in Twitter are normally politically media can be used as part of a communication
homogeneous, and as a consequence, users are strategy. This model emphasizes the functionality
unlikely to be exposed to cross-ideological con- of Web social media, and may serve to understand
tent. Network dynamics seem to be relevant for the better way to include these instruments in a
political mobilization. A strongly connected voter communication strategy showing comprehension
network enables a politician to win an election, with the ways that Web users use social media in
according to evidence from simulation studies. their lives. The honeycomb framework presented
Also, political conversations with other mem- by these scholars is based on the ideas of several
bers of the network predict political mobilization bloggers, namely Stewart Butterfield, Peter Mor-
and community involvement. Within voluntary ville, and Gene Smith, who developed and com-
associations, homophily of political behavior is bined ideas discussed by Matt Webb.
observed. The political orientations of individu- In nature, honeycomb cells in beehives are an
als are reinforced through interaction with simi- example of geometric efficiency because the shape
lar others, leading to behavioral involvement and of the cells allows two opposing honeycomb layers
political participation. to nest into each other, with each facet of the closed
ends being shared by opposing cells. Applying
Isidro Maya-Jariego this metaphor to Web social media and consider-
Daniel Holgado Ramos ing seven main attributes, Kietzmann, Hermkens,
Universidad de Sevilla McCarthy, and Silvestre have defined functional
blocks in interdependence. These blocks are:
See Also: Evolution of Social Media; Friend-to-
Friend Strategies; Social Network Analysis; Social • Identity: Related to the information pro-
Networking Web Sites. vided to identify users, and that reveals
themselves or a constructed self. This self-
Further Readings disclosure may include data about sex,
Lewis, K., M. González, and J. Kaufman. “Social age, occupation, or preferences on a real
Selection and Peer Influence in an Online Social or deceptive basis (to assure anonymity).
HootSuite.com 633

• Conversations: Concerning the channels it helps to define priorities, supports a modular


used to promote dialogue between users, approach to social media, and can serve as a look-
that is, with means that allow talking in ing glass, transforming how people see things and
real or deferred time. enabling new explorations.
• Sharing: Linked to the exchange, dis- The functionality of social media tools focuses
tribution, and reception of meaningful on a combination of these blocks. For example,
content by participants. Sharing may lead Facebook favors relationships, identity, and repu-
users to start conversations and establish tation, whereas channels of video sharing (like
relationships, depending on the function- YouTube or Vimeo) promote sharing and group
ality of the social media platform. formation. Knowing the tools, their functionalities,
• Presence: Related to ways of know- reputations, and presence of the same users, orga-
ing who is available in the social media nizations can define their communication strate-
platform. gies, which will depend on the market context.
• Relationships: Concerned with the infor-
mation provided about the bonds that Sónia Pedro Sebastião
individuals form with each other (e.g., Technical University of Lisbon
family and friends), through which they
feel connected and exchange meaning. See Also: Campaign Strategy; Campaigns, Digital;
• Reputation: Related to the appreciation Functionality; Social Networking Web Sites.
and trust of users to the social stand-
ing of participants and content, usually Further Readings
expressed in opinions. Butterfield, Stewart. “An Article Complaining About
• Groups: Linked to the possibility that Social Software” (2003). http://www.sylloge.com/
digital channels have to provide the personal/2003_03_01_s.html#91273866 (Accessed
creation of communities of users with November 2012).
common interests. Kietzmann, Jan H., Kristopher Hermkens, Ian P.
McCarthy, and Bruno Silvestre. “Social Media?
These functional building blocks are neither Get Serious! Understanding the Functional
mutually exclusive nor present in all social media Building Blocks of Social Media.” Business
activity because they are constructs that show Horizons, v.54 (2011).
how different levels of social media functional- Morville, Peter. “User Experience Design” (June 21,
ity can be configured. The authors’ proposition 2004). http://semanticstudios.com/publications/
is motivated by the need to comprehend how citi- semantics/000029.php (Accessed November 2012).
zens are consuming the Web and how its use is Smith, Gene. “Social Software Building Blocks”
maturing, evolving, and changing through time (April 4, 2007). http://nform.ca/publications/
thanks to the new communication landscape and social-software-building-block (Accessed
broadening exposure to it. November 2012).
Presently, a multiplicity of social media that Webb, Matt. “On Social Software Consultancy”
differs in terms of scope and functionality may (April 28, 2004). http://interconnected.org/home/
be found: Some are more massive, while others 2004/04/28/on_social_software (Accessed
are more focused on a target, function, or pur- November 2012).
pose. This diversity may lead to reluctance or the
inability to use social media in a strategic com-
munication campaign and promote an effective
engagement between the political actor and users
(citizens or constituents). The honeycomb frame- HootSuite.com
work allows a systematic view of social media and
illustrates the more suitable platforms according HootSuite.com is the most known social media
to the objectives of a communication campaign. It management program. It is an application that
is a tool that serves several purposes; for example, can be used for synchronizing all desired social
634 HootSuite.com

profiles. It provides advantages both for time accounts such as Google+, LinkedIn, Foursquare,
management and to become organized. For Twitter, and WordPress. One must open a new
example, if an individual wants to share some- account by registering. There are both free and
thing on all of their profiles, one can choose paid versions. There are many limitations on
all desired profiles and share them all synchro- free versions, but they provide good services for
nously by using HootSuite, rather than logging small companies and individual users. It allows
into these profiles one by one. Another feature only five different social media networks for free
of HootSuite is that it allows creating scheduled accounts, but allows unlimited social media net-
content. tweets and profile posts can be sched- work management for paid accounts. It supports
uled and published at the desired dates and many social media such as Twitter, Facebook,
times. It decreases the time spent in social plat- Foursquare, LinkedIn, Google+, Myspace, Word-
forms and provides an opportunity to increase Press, Mixi, Tumblr, and YouTube. HootSuite
time efficiency. HootSuite is a tool providing may soon be a complete social center. Users will
proper solutions for corporate companies that be able to share and display all content in social
attach importance mainly to digital marketing. platforms such as Reddit, StumbleUpon, Scoop.it,
With its goal of “primarily gathering the streams CMP.LY, and Nexalogy through HootSuite. The
in social networks,” the target of HootSuite is total number of platforms supported by Hoot-
defined as “dominating also the fields of cus- Suite is 35. Three new names, Evernote, Storify,
tomer services, CRM and publishing by taking and Zendesk, were added and supported by the
the new functionalism to a step further.” Vancouver-centric HootSuite in August 2012.
HootSuite is an external application through HootSuite, founded in 2008, bought its com-
which one can manage multiple social network petitor Seesmic, which performed a similar func-
tion for platforms since 2007, in September 2012.
HootSuite was chosen the best social media tool
of the year of 2010 at the Mashable Awards,
which is one of the most prestigious awards of
social media.

Twitter and HootSuite Cooperation


This method was implemented to increase Twit-
ter ad revenues and to reach those who attract
interest with promotion codes. Twitter wants to
put this method, which Google frequently uses
with AdWords, into practice, and joined forces
with HootSuite, which is one of the most popular
third-party tools. HootSuite, in this case, provides
the most appropriate solutions for corporate
companies that mainly employ digital marketing.
Twitter began to give $100 advertising coupons
as gifts to convert these companies into advertis-
ers after partnering with HootSuite. Twitter is the
lead brand in social media. Their tools, used by
companies monitoring consumer trends via social
networks, have vital importance. The most used
Twitter tool is HootSuite, with a usage rate of
29 percent, according to the research carried out
by Pingdom. One of the most important features
A sample screen showing HootSuite’s mobile app for Android of HootSuite is its comprehensive social media
phones in early 2012. HootSuite is one of the leading tools used measurement skills. Facebook and Twitter analy-
to manage social media accounts, especially Twitter. sis and Google analytics are the most important
HopeLab 635

social media measurements offered by the Hoot- to improve physical and mental health. Although
Suite. In addition, this tool offers draft reports HopeLab is located within the medical and pediat-
and allows one to choose the most appropriate ric health arena, it also represents an entirely new
report among more than 40 modules. HootSuite approach to “social technology,” a potent hybrid
is a Web-based application addressing users who of social media and online gaming techniques that
want to use Twitter for business purposes. in 2013 was just beginning to pique the imagina-
One does not need to install HootSuite appli- tion of forward-thinking political strategists on
cation on each computer separately when more the lookout for ways of making advocacy content
than one computer is used in Web-based Twitter even more ubiquitous in the everyday media mix.
applications. HootSuite has some extra features, Sometimes called “gamification,” HopeLab’s
such as “send later.” User information can also innovative conceptual approach to information
be easily displayed by clicking on user names via release and reconfiguring is, to some extent, mir-
the HootSuite application. This feature of Hoot- rored in groundbreaking issues and advocacy sites
Suite, which responds to the continuous updating like World Without Oil and Water.org, which are
demands of companies via Ping.fm, also applies beginning to utilize similar techniques in the ser-
to other social networks besides Twitter. The last vice of a social change agenda.
advantage of HootSuite is that it uses a universal HopeLab created Re-Mission, a free online
resource locator (URL) shortener. Users can use video game, to help young cancer patients kill
short URLs by means of Ow.ly or a third-party video cancer cells and improve their health.
URL shortening service like Bit.ly. HopeLab released Re-Mission2 to provide more
gaming options. HopeLab developed Zamzee, a
Sule Yüksel Özmen portable tracker paired with a motivational, gam-
Karadeniz Technical University ing, and tracking Web site to help youth become
more physically active; activity earns users
See Also: Google+; Klout Score; Predictive Analytics; redeemable reward points. HopeLab’s Resilience
Social Media Optimization; Twitter; Web Metrics. Initiative, scheduled for development in 2014,
aims to use mobile applications and social media
Further Readings to boost humans’ biological and psychological
Berthiaume, Dan. “HootSuite Connects More Social resilience. Studies have assessed the outcomes
Apps: Videos, Polls, Twitter Analysis.” CMS Wire and impacts of HopeLab products. HopeLab is
(August 28, 2012). http://www.cmswire.com/cms/ part of the philanthropic foundation the Omidyar
customer-experience/hootsuite-connects-more- Group, cofounded by Pam Omidyar and her hus-
social-apps-videos-polls-twitter-analysis-017161 band Pierre Omidyar, who also founded eBay.
.php (Accessed January 2013). Pam Omidyar, born in 1967, earned a B.S.
Gray, Ian Anderson. “7 Reasons NOT to Use in biology from Tufts University in 1989, and
HootSuite.” http://iag.me/socialmedia/reviews/7- attended the University of California, Santa Cruz,
reasons-not-to-use-hootsuite (Accessed January to study molecular genetics. In the late 1980s,
2013). Omidyar was a research assistant in an immu-
Indvik, Lauren. “20% of Top Brands Use HootSuite.” nology lab who spent many hours viewing can-
http://mashable.com/2012/08/09/twitter-clients- cer cells under a microscope. Omidyar would
brands (Accessed January 2013). unwind from her research by playing videogames
with her husband Pierre, a software engineer who
eventually founded eBay. The juxtaposition of
these two activities gave Pam Omidyar the idea
to develop a video game that would allow young
HopeLab cancer patients to kill cancer cells and ultimately
improve their health. She founded HopeLab in
HopeLab is a nonprofit organization founded 2001, where she developed Re-Mission in 2006.
by Pam Omidyar in 2001 to produce technol- Re-Mission has players drive a robot named
ogy (e.g., games, applications, and social media) Roxxi through simulated cancer patients’ bodies
636 HopeLab

while killing cancer cells and battling treatment study participants used the Zamzee activity meter
side effects. HopeLab sponsored an international without the Web site, and the other half used it
study of Re-Mission that reported improved with the Web site. The latter group reported a 59
health outcomes for young cancer patients and percent increase in moderate to vigorous activ-
was published by Pediatrics in 2008. Re-Mis- ity, saw reduced gains in bad cholesterol, and
sion encourages and motivates healthy behavior improved their blood sugar control. Users earn
(e.g., taking antibiotics consistently) that in turn points for physical activity that they can redeem
enhances the effectiveness of medical treatment. for rewards, including gift cards, charitable
The study focused on the role of both behav- donations, and iPods. Zamzee is now marketed
ioral and psychological factors (e.g., acquiring through a business that continues to work with
medical knowledge and increased sense of con- HopeLab on the prosocial mission of the product.
trol over cancer) in successful cancer treatment. HopeLab is currently planning a resilience ini-
This study is said to be the largest randomized, tiative that will develop technology to bolster bio-
controlled study of a video game intervention. logical and psychological resilience to adversity
It tracked the cancer treatment of 375 teens and using mobile technology and applications because
young adults at 34 medical centers in the United of their pervasive presence in most people’s lives.
States, Canada, and Australia over three months. HopeLab has identified factors in human resil-
Re-Mission was made available online for free, ience through studying the scientific literature.
and was reportedly downloaded over 100,000 Factors include a sense of healthy social connec-
times by fall 2007. tion, purpose in life, and control over one’s des-
In April 2013, HopeLab released Re-Mission2 tiny. HopeLab hopes to enhance each of these
as a collection of six games focused on differ- experiences in people’s everyday lives with its
ent aspects of cancer treatment (e.g., Leukemia technology, with a goal of having people live out
and Stem Cell Defender), with possible game their core values in everyday life.
levels varying from 11 to 25. Nerdook Produc-
tions, Tinime Games, Borne Games, and Nova- Omidyar Group
leaf Game Studios developed these games. Game HopeLab is part of the Omidyar Group, an
research and development was carried out with extension of which is the Omidyar Network,
a group of 120 youths. The games are available where Pam Omidyar is a board member. She is
for free online to clinics, hospitals, patients, their also a board member of Tisch College of Citizen-
families, clinicians, and caregivers. This set of ship and Public Service (Tufts University), and is
games incorporates data from research studies director of the Ulupono Initiative. For her phil-
of Re-Mission, takes user data into account, and anthropic and health initiatives, Pam Omidyar
provides a variety of game-playing options. Like was deemed one of “The Top Givers” by Business
the original version of Re-Mission, the new game Week in 2003–08, “The 25 Best Givers” by Bar-
places players inside the simulated body of a can- ron’s in 2009–10, and “The World’s 7 Most Pow-
cer patient and has them apply real-life strategies erful Philanthropists” by Forbes in 2011. In 2011,
and cancer treatments. she was awarded the Carnegie Medal of Philan-
In 2010, HopeLab launched Zamzee, a pocket- thropy and an Honorary Doctor of Public Service
sized activity meter that connects young users to (Tufts University). Omidyar resides in Hawai‘i.
a motivational game-based Web site. Zamzee was HopeLab had released more than 200,000 cop-
the subject of a study cosponsored by HopeLab ies of Re-Mission to over 80 countries by 2013,
and the Robert Wood Johnson Foundation, the and has offices in Palo Alto and Redwood City,
results of which were announced at the 2012 California.
Obesity Society Annual Meeting in San Anto-
nio, Texas. Again using a randomized, controlled Gordon Alley-Young
study, HopeLab evaluated the effects of Zamzee Kingsborough Community College
across a diverse sample of 448 middle-school stu-
dents coming from urban, suburban, and rural See Also: Health Care; Nonprofit Organizations;
locations across the United States. Half of the Social Media Political Gaming; Youth Engagement.
Hoyer, Steny 637

Further Readings In 1981, the office of Gladys Spellman, con-


HopeLab. http://www.hopelab.org (Accessed gresswoman for Maryland’s Fifth District, was
August 2013). declared vacant because of her ongoing illness.
Kato, Pamela, Steve Cole, Andrew Bradlyn, Hoyer won the primary election for this position
and Brad Pollock. “A Video Game Improves by a small margin, and then went on to defeat his
Behavioral Outcomes in Adolescents and Young Republican opponent, Audrey Scott, although he
Adults With Cancer: A Randomized Trial.” was outfunded. This first election also won him
Pediatrics, v.122 (2008). the nickname “Boy Wonder.” Since his second
Tate, Richard, Jana Haritatos, and Steve Cole. election in 1982, he has consistently been reelected
“HopeLab’s Approach to Re-Mission.” to his position in the House, usually with a com-
International Journal of Learning and Media, fortable margin. Hoyer has served longer than any
v.1/1 (2009). other southern Maryland House member.
Hoyer has a long history of service to the
Democratic Party and the House of Represen-
tatives. He functioned as deputy majority whip
in the House from 1987 to 1989. From 1989 to
Hoyer, Steny 1994, Hoyer served the Democratic Caucus as
chair; this position is ranked fourth in the ech-
Steny Hamilton Hoyer represents the Fifth Con- elon of House of Representatives Democrats.
gressional District of Maryland in the U.S. House Hoyer is also a member of the Democratic Steer-
of Representatives. He has served in this office ing Committee, and served as cochair in previous
since 1981. Hoyer’s district is located southeast years. Between 1995 and 2000, Hoyer was the
of Washington, D.C., and includes mostly rural chief recruiter of candidates for Democrats in the
and suburban areas. A member of the Democratic House of Representatives.
Party, Hoyer was first elected in 1981. From 2003 Hoyer ran for minority whip in 2002, but
to 2007 and again from 2011 through 2012, he Nancy Pelosi won that position. Next, Pelosi ran
served as House minority whip; from 2007 to for minority leader after the midterm elections in
2011, he was the House majority leader. As of 2002. At that point, Hoyer was elected as House
2012, he was the second-highest-ranking member majority whip, the second-highest-ranking Dem-
of the Democratic leadership of the House and ocratic position in the House. He served in that
had been since 2003. role from 2003 to 2007. Pelosi took on the role
of speaker of the House in 2007, and Hoyer was
Career elected to be House majority leader during the
Steny Hoyer geared up for public office while tenure of Democratic majority in the House from
serving as a staff member for U.S. Senator Dan- 2007 to 2011. He was the first Maryland repre-
iel Brewster of Maryland from 1962 to 1966. sentative in this position.
During that time, he worked with fellow staffer In 2010, the Democratic Party lost control of
Nancy Pelosi, who would later become speaker the House. Pelosi took the minority leader posi-
of the House, her position in 2012. In 1966, tion, and Hoyer became minority whip once
Hoyer won an office representing the 26th Senate again. In 2012, he was still in that position.
District of Maryland in the state senate. Hoyer
was then elected president of the State Senate of Issues
Maryland in 1975; this made him the youngest In 2010, Hoyer took the position that middle-class
president in the history of the Maryland state tax cuts should only be temporary in that other-
senate. wise they would prove too costly. He identifies as
In 1978, Hoyer made an unsuccessful bid for pro-choice and, in 2003, he voted against the bill
the nomination for lieutenant governor of Mary- on partial birth abortion. Hoyer votes in favor of
land. That year, he accepted an appointment to affirmative action and gay rights. He receives an
the Maryland Board of Higher Education; he held “F” from the National Rifle Association based on
that post until 1981. his record of voting in favor of gun control.
638 Hoyer, Steny

The issue of immunity for telecommunications account of Hoyer’s, rather than a phony or hacked
companies that engaged in warrantless wiretap- account. His actual account was “@WhipHoyer,”
ping at the behest of George W. Bush after the and as of late 2012, that account remained active.
9/11 terrorist attacks has been a hot one for It was speculated that, when Hoyer returned to
Hoyer. After being exposed in the press, the wire- the House minority whip position, he modified his
tapping program was sued by privacy rights advo- Twitter account name to reflect the change. This
cacy group the Electronic Frontier Foundation. left the older “@LeaderHoyer” account open, and
Nevertheless, Hoyer introduced a bill to extend this account was taken up by a different user in
wiretapping privileges and extend immunity for January 2011, days before the tweeting prank.
telecommunications companies that engaged in The prankster waited until the State of the
wiretapping, receiving criticism from many sides. Union address to tweet, and unfortunately, the
Hoyer was instrumental in the 1990 passage congressman’s Web site still had a link to the old
of the historic Americans with Disabilities Act account when it happened. Within hours of the
(ADA), and later the 2008 ADA Amendments tweets, the link was down. Hoyer does use his
Act, which bolstered the existing law. He spon- actual Twitter account liberally, and had more
sored the Help America Vote Act of 2002, and in than 20,000 followers in 2012.
2010, Hoyer played a role in ending the “Don’t June 2012, Hoyer continued to build up his
Ask, Don’t Tell” policy. presence in the social media world as he joined
Hoyer is a major fund-raiser for Democratic Google+, Instagram, and Pinterest, in addition
officials and candidates. During the 2006 and to his existing Facebook, Twitter, and YouTube
2008 elections, he donated in excess of $1 mil- accounts. At the time he joined those three, he
lion to different Democratic candidates and to was reportedly the only member of the leadership
the party. This has been a source of controversy of the House of Representatives who was on all
at times; in March 2007, the Center for Public of these networks.
Integrity reported that Hoyer raised the money Hoyer distinguished himself by joining Pinter-
he donated during the 2006 elections by “exploit- est in because most male legislators, especially
ing . . . a legal loophole.” However, as various Democrats, have not begun to use Pinterest in
commentators, including the Federal Election any numbers, which reflect the site’s popularity.
Commission, pointed out, Hoyer’s actions were Pinterest, which is traditionally heavily domi-
legal, and his methods were transparent. nated by female users, is relatively new ground
for lawmakers. Given the number of female vot-
Social Media Use ers in 2012, it was probably a strategic move
Poleet reported in December 2012 that Hoyer had for Hoyer to join. Hoyer had nine pin boards of
25,000 followers and a Klout score of 82. OhMy- images on Pinterest in 2012, ranging from Hoyer
Gov reported in December 2012 that Hoyer had History, covering his years in office, to In Mary-
a Media Power Rank of 20th out of his 541 peers. land’s Fifth District, which Hoyer represents.
It also showed that he had received more than Hoyer appears to be using Instagram in the style
1,100 social media mentions in the past week, a that is de rigueur for the site, sharing more casual
typical result for him in 2012. behind-the-scenes photos, accompanied by back-
Although his social media presence is strong, ground trivia.
in January 2011, Hoyer was the target of a social In keeping with his voter rights positions,
media attack in which his official Web site was Hoyer created a video in October 2012, urging
linked to the wrong Twitter account. As a result, young people to register to vote and be heard in
it appeared for a short time that he was tweeting the November 2012 election. The video was part
comments including “Look how Republicans fell of an ongoing educational campaign from non-
for this bi-partisan seating crap,” and “This is what profit OurTime.org, designed to maximize voter
happens when political offices pay for high-priced, turnout in the face of recent voter identification
money-sucking ‘social media’ firms that have no laws. Hoyer stated in the video that he feels many
clue what they are doing.” The attack Twitter of these laws were enacted specifically to discour-
account was “@LeaderHoyer,” reportedly an old age voter turnout from certain groups. He urged
Huffington Post 639

young people to vote, saying that they had the www.zdnet.com/blog/security/congressman-steny


“biggest stake” in the election. The video remains -hoyer-twitter-impersonation-attack/7983
on Hoyer’s YouTube channel and in other places (Accessed December 2012).
on the Web. Hoyer’s channel had more than 400 OhMyGov. “Steny Hoyer” (2012). http://ohmygov
subscribers in 2012. .com/accounts/Person/189-steny-hoyer/summary
In July of 2012, Hoyer announced the third (Accessed December 2012).
annual Member Online All-Star Competition for Poleet. “Steny Hoyer” (2012). http://www.poleet
Democrats in the House. Similar to the Repub- .com/WhipHoyer (Accessed December 2012).
lican New Media Challenge, the three-week Project Vote Smart. “Representative Steny H. Hoyer’s
competition is a friendly challenge designed to Biography” (2012). http://votesmart.org/candidate/
encourage online interactions with constituents. biography/26890/steny-hoyer#.UMnKXJPjmNw
The winner each year gains the most new Face- (Accessed December 2012).
book “likes,” Twitter followers, and YouTube Read, M. “Steny Hoyer’s ‘Money-Sucking Social
subscribers during the three-week contest period. Media Firm’ Has ‘No Clue.’” Gawker (2011).
All House Democratic caucus members are auto- http://gawker.com/5743484/steny-hoyers
matically entered in the competition, and anyone -money+sucking-social-media-firm-has-no-clue
except those in leadership positions can win. (Accessed December 2012).
Hoyer pointed out that, with more than 50 per- “Steny Hoyer Urges Young People to Vote.”
cent of American adults active on Facebook and Huffington Post. http://www.huffingtonpost
more than 15 percent on Twitter, social media is .com/2012/10/16/steny-hoyer-voter-registration
crucial for lawmakers. Hoyer asked his constitu- _n_1971787.html (Accessed December 2012).
ents to follow him on his social media networks, if
they did not already, and to share his profiles with
their friends. He also announced a contest in which
visitors to his Facebook site could enter their “high
quality Maryland photos” for a chance to have Huffington Post
theirs grace his page as the cover photo—making
use of the format change to timeline to stay current The Huffington Post is a news Web site cover-
with followers. Hoyer posted entries on his page ing politics, business, entertainment, technology,
and eventually chose a winner. In 2012, Hoyer’s style, media, and global news. It also has local
Facebook page had more than 6,000 “likes.” versions in many major American cities, as well
as international editions for Canada, France, and
Karla Lant the United Kingdom, with Germany and Spain in
Northern Arizona University development.
The site was founded in May 2005 by author,
See Also: Facebook; Fund-Raising; Instagram; journalist, political analyst, and entrepreneur Ari-
Pelosi, Nancy; Pinterest; Twitter. anna Huffington, former America Online (AOL)
executive Kenneth Lerer, and Jonah Perretti, a
Further Readings graduate of the Media Lab at the Massachusetts
Cohn, A. “Rep. Hoyer Extends Social-Media Use.” Institute of Technology. It was initially intended
The Hill’s Twitter Room. The Hill (2012). http:// to be a liberal voice on the Web in specific opposi-
thehill.com/blogs/twitter-room/other-news/233729 tion to Matt Drudge’s Drudge Report, which is
-rep-hoyer-expands-social-media-use- (Accessed very conservative in nature.
December 2012). The Huffington Post began its existence as a
Hoyer, S. “Message From Congressman Steny H. blog that aggregated content from other publish-
Hoyer” (2012). http://hoyer.congressnewsletter ers across a wide variety of topics. It now employs
.net/common/mailings/index.cfm?id=138 a news staff to create original content in addition
(Accessed December 2012). to featuring stories from external sources. It has
Kennedy, D. “Congressman Steny Hoyer Twitter several content-sharing partnerships that allow it
Impersonation Attack.” ZDNet (2011). http:// to publish articles and posts from print and online
640 Huffington Post

severe injuries. The Pulitzer Prize is considered to


be journalism’s highest award.
It has recently enjoyed the position of the top
political Web site in the United States by eBizMBA-
Rank, which compiles its rankings based on traffic
data provided by Quantcast and Compete. Statis-
tics from November 2013 indicated that it enjoyed
more than 19 million page views a day and had
more than 89 million unique visitors that month.
Like the majority of news sites, there is no fee
for use. The business model relies on advertis-
ing for its revenue stream. The site is known for
its innovative strategies at driving readership.
Through careful analytics, the site is able to
constantly monitor which stories on its sites are
performing well, and which are not, and modify
positioning and placement on the home page
accordingly.
The site is also particularly savvy in its use
of social media. It was one of the first sites that
allowed users to “like” and follow not only specific
reporters and contributors, but also larger topics so
that stories about that subject or from that author
would automatically be pushed into individuals’
Arianna Huffington, cofounder of the Pulitzer Prize–winning news feeds on their specified social media.
Huffington Post, at the 2010 Webby Awards in New York City. With the proliferation of blog sites like the
The Huffington Post, which makes use of more than 1,000 Huffington Post, mainstream media is becoming
unpaid bloggers, sold to AOL for $315 million in February 2011. more influenced by their content. Though tra-
ditional journalists still view sites like this with
skepticism, the readership does not, and as a
result, increasingly more mainstream publications
ventures such as TMZ.com, People, Rolling use blog-heavy sites like the Huffington Post as
Stone, and Variety. In addition to its news staff, it source material for their work.
also boasts more than 1,000 unpaid bloggers who
contribute to the site. OffTheBus
One of its competitive advantages is that, in OffTheBus is a spin-off of the Huffington Post
addition to its multitude of unpaid bloggers, it with a unique twist. It allows citizen journalists
also lists a number of celebrities across a variety to populate the site as watchdogs on candidates in
of industries as contributors. Posts from promi- the running for political office across the United
nent figures from television, medicine, film, edu- States. Its title refers to the controversial novel The
cation, politics, sports, and other A-list bloggers Boys on the Bus by Timothy Crouse, who posited
ensure steady traffic to the site, which gener- that reporters who were assigned to cover politi-
ates traffic to the advertisers that pay to be seen cal campaigns had difficulty remaining objective
alongside them. because of spending inordinate amounts of time
The site is the first commercially run digital so close to the candidates.
media initiative to win a Pulitzer Prize, which was
awarded in 2011 to military correspondent David Merger With AOL
Wood, whose series “Beyond the Battlefield” In February 2011, AOL, a global Web site com-
chronicled the lives of wounded warriors, veter- pany, announced its intention to purchase Huff-
ans who returned from Afghanistan and Iraq with ington Post for $315 million. As a result of this
Human Rights 641

purchase, the Huffington Post Media Group was Messner, Marcus and Bruce Garrison. “Study
created. The media group is the umbrella organi- Shows Some Blogs Affect Traditional News
zation for existing AOL properties such as Mov- Media Agendas.” Newspaper Research Journal,
iefone, Black Voices, MapQuest, and PopEater, v.32/3 (2011).
in addition to the Huffington Post. Peters, Jeremy and Verne G. Kopytoff. “Betting
on News, AOL Is Buying the Huffington Post.”
Arianna Huffington New York Times (February 7, 2011). http://www
Arianna Huffington is the cofounder, president, .nytimes.com/2011/02/07/business/media/07aol
and editor-in-chief of the Huffington Post. Born .html (Accessed September 2012).
in Greece, Huffington was educated in the UK Silver, Nate. “The Economics of Blogging and The
and spent her young adulthood there, where she Huffington Post.” New York Times (February 12,
became an author for the first time with her book 2011). http://fivethirtyeight.blogs.nytimes.com/
The Female Woman, which decried women’s lib- 2011/02/12/the-economics-of-blogging-and-the
eration. She has 11 books to her credit. -huffington-post (Accessed September 2012).
She came to the United States in the 1980s
and became more prominent when her husband
Michael unsuccessfully ran for the Senate in Cali-
fornia in 1994. She developed a reputation as a
conservative and partnered with former Saturday Human Rights
Night Live player and noted liberal Al Franken as
a counterpart in “Strange Bedfellows” for Com- Human rights and politics have been inextricably
edy Central’s 1996 coverage of the U.S. presiden- intertwined throughout history, tracing back to
tial election. the religious, philosophical, and historical origins
She experienced further notoriety during the of the modern concept of human rights. Human
Clinton administration through her creation of rights are both justifiable moral claims and con-
Resignation.com, a Web site that focused on the tested political realities. Examples of modern
call for the president to step down during Clinton’s social and political movements advocating human
impeachment crisis. Over the years, her political rights include abolitionist movements; women’s
leanings have shifted from conservative to more suffrage; civil rights; antiwar movements; worker
of a liberal perspective. She has dabbled in acting, and labor rights; immigration rights; lesbian, gay,
appearing on a number of television programs, bisexual, and transgender (LGBT) rights, and
and even a few movies. She was named among more. Many organizations and individuals have
the “Most Influential Women in the Media” by worked to create social change in the wake of
Forbes magazine in 2009. repressive government rule or social, cultural, and
political inequality.
John Dolan The advancement of technology and the Inter-
Pennsylvania State University net have facilitated the dissemination of human
rights activism globally. The advent of social
See Also: Alpha Blogger; Blogs; Citizen Journalism; media, or Web- and mobile-based applications
Drudge Report; Franken, Al; News Media. that facilitate the exchange of information and
interactive dialogue, have allowed for informa-
Further Readings tion to be published and accessed by anyone,
EBizMBA. “Top 15 Most Popular Political Websites.” and circulated to a broader audience. Examin-
http://www.ebizmba.com/articles/political-websites ing the concept of human rights and its link to
(Accessed September 2012). politics through historical movements and social
Gaffney, Adrienne. “One Day With Arianna networks provides a basis for the understanding
Huffington.” Wall Street Journal (June 28, 2012). of modern-day human rights movements and the
http://online.wsj.com/article/SB100014240527023 implications of social media for human rights
04765304577482563192366538.html#ixzz activism today, as well as the threats that social
284uSzCvp (Accessed September 2012). media can pose to the exercise of human rights.
642 Human Rights

Origins Westphalia established a new system of politi-


Human rights are the rights one has by virtue of cal order in Europe, emphasizing sovereignty of
being a human being. Such rights are thought to states and self-determination. The concept of a
be inalienable, unable to be taken or given away, social contract by which individuals gained rights
and universal, equally claimed for all. Historical in society by subjecting oneself to civil governance
concepts linked to human rights, such as progres- emerged through the views of Thomas Hobbes in
sive punishment and justice, can be traced back the 17th century, and was further expanded upon
to the Code of Hammurabi in ancient Babylon; by John Locke in his belief that the purpose of law
Hindu and Buddhist essential freedoms and vir- was to preserve freedoms and rights of individu-
tues; Confucianism’s emphasis on education, self- als. Early political expressions of this concept of
actualization, and commitment to a social unit or human rights can be found in the American Dec-
community; and natural law extending beyond laration of Independence, the French Declaration
rights of citizenship and the individual’s capacity of the Rights of Man and of the Citizen, and the
to reason in ancient Greece and Rome. English Bill of Rights. Emerging from the English,
Based on the views of Plato and Aristotle, French, and American revolutions, these docu-
Cicero advanced the idea of stoicism and rea- ments codified ideas of human rights in political
son possessed by all. Religion also played a large discourse, tying the language of rights to political
part in advancing ideas of moral equality for all revolution and transition.
human beings in the teachings of Christianity, The establishment of the International Com-
solidarity and justice in Islam, and laws protect- mittee of the Red Cross, as well as the adoption of
ing rights and outlining duties in Judaism. Medi- the Geneva and Hague conventions, subsequently
eval Christian philosophers such as St. Thomas laid the foundations of international humanitar-
Aquinas promoted the idea of natural law as con- ian law. After World War I, the League of Nations
nected to the law of God, with reason bestowed was established during negotiations over the
to all human beings to allow individuals to act in Treaty of Versailles in order to promote collective
accordance with universal values. security, peace, global welfare, and to settle dis-
Philosophers and political theorists such as putes through diplomacy and negotiation. After
Hugo Grotius, John Locke, Thomas Hobbes, World War II, the Allied powers agreed to replace
and Jean-Jacques Rousseau contributed to the the League of Nations with the United Nations
idea that natural law can be conceptualized inde- (UN), providing a basis for the protection of
pendently from God. Historical developments human rights in the UN Charter.
such as the Reformation and the English, French, Human rights were further codified in the Uni-
and American revolutions contributed to the versal Declaration of Human Rights, the Inter-
secularization of the universal ethics of rights. national Covenant on Civil and Political Rights,
The Enlightenment ushered in a new discourse and the International Covenant on Economic,
of rights relating to individual reason and free- Social, and Cultural Rights. The Universal Dec-
dom of choice, with the emerging nation–state to laration of Human Rights, passed by the UN
advance such ideals of human rights. General Assembly in 1948, was the first interna-
tional legal effort to limit the behavior of states
Human Rights and Politics through obligations and duties to their citizens,
Human rights are exercised when their enjoyment outlining basic rights to which all human beings
is questioned, threatened, or denied. Human are entitled. The social and political movements
rights are linked to natural and legal rights, both leading up to and following World War II laid the
nationally and internationally. Human rights groundwork for modern human rights discourse
seek to fuse moral vision and political practice by and activism.
establishing limits and requirements of social and
state action. Historical Activism and Social Networks
The Magna Carta of 1215 was the first instance Political movements are organized around a set
in England of a group of subjects limiting the of issues or shared concerns of a social group.
powers of a king by law. In 1648, the Peace of Movements can be local, regional, national, or
Human Rights 643

global in scope. Some aim to influence govern- U.S. Supreme Court ruled the doctrine uncon-
ment policy, while others have aimed to establish stitutional with respect to separate educational
or broaden the rights of subordinate or subaltern facilities for black and white students in its land-
groups. Some have represented class interests, mark judgment for the case of Brown v. Board
while others have expressed national aspirations. of Education. Rosa Parks and Dr. Martin Luther
Political movements can also involve struggles to King, Jr., became known as leaders of the civil
decentralize or centralize state control. rights movement in the United States through
Human rights campaigns have been launched their protests, boycotts, and practice of civil dis-
throughout history in efforts to advance various obedience. Sit-ins, marches, demonstrations, and
social and political movements, including national boycotts continued throughout the United States,
liberation movements, the abolition of slavery and were propelled by activists across the country
through the Underground Railroad network, advocating for equal rights.
the civil rights movement, the women’s suffrage Other movements that utilized human rights
movement, and LGBT rights movement, among networks to advance their causes include the
many others. Activists formed political parties, women’s rights, LGBT rights, and immigrant
community organizations, and social groups to rights movements. The women’s rights movement
advocate their causes through word of mouth, grew out of advocacy for the right to vote, fol-
public speeches, protests, and printed materials. lowed by the Equal Rights Amendment of 1923.
Efforts of movements advocating human rights The 1964 Civil Rights Act served as a vehicle for
resulted in various amendments to the U.S. Con- addressing gender inequality and the formation of
stitution, including the Thirteenth Amendment the National Organization for Women (NOW).
banning slavery, the Fourteenth Amendment on This grew into a global campaign for women’s
citizenship and civil rights, the Fifteenth Amend- rights, including reproductive health. Similarly,
ment guaranteeing African Americans the right LGBT groups have advocated for equal rights
to vote, and the Nineteenth Amendment granting under the law. Campaigns for same-sex marriage,
women the right to vote. reports on human rights violations against LGBT
During World War II, underground social net- communities, and advocacy efforts for basic rights
works and resistance groups such as the Polish to housing, contracts, employment, and child cus-
Home Army, organized against the Nazi occu- tody have become central to many LGBT activ-
pation. Organizations and networks in France ist groups. Social movements and networks have
provided intelligence to the Allies and helped also helped push for immigrant rights, and have
escaping Allied servicemen. Many worked to hide aided in promoting advocacy for documentation,
families or provide temporary refuge from perse- employment, housing, health care, and legal ser-
cution. Similarly, local populations in Denmark vices for immigrant populations.
organized to help people from Jewish communi-
ties escape to Sweden. Technology and the Internet
Mohandas Gandhi applied the practice of non- Many human rights organizations have begun to
violent civil disobedience to grassroots organizing build a presence on the Internet to promote their
of human rights movements. Gandhi protested activities and campaigns and to increase advocacy
racist policies in South Africa of British colo- by mobilizing networks of local volunteers. Local
nial powers against the Indian minority popula- chapters of international organizations use their
tion, using economic boycotts to effect political Web sites to provide information and organize
change. Nelson Mandela later evolved as a leader advocacy efforts. Radio Free Europe/Radio Lib-
in the fight against racism and apartheid in South erty uses the radio and Internet to broadcast news
Africa, becoming the first president of a demo- to countries where free press is not endorsed by
cratic South Africa after he was imprisoned for the government. Using social media tools such as
27 years for his advocacy efforts. Similarly, in the YouTube, Twitter, and Facebook, within minutes
United States, the modern civil rights movement of an event, anyone with access to the Internet
stemmed from the doctrine of separate but equal can view messages and videos. Organizations
used to segregate blacks and whites. In 1954, the such as Amnesty International and Human Rights
644 Human Rights

Watch have utilized these methods, in addition to disseminate information advocating a human
their Web sites, to promote fact finding, impartial rights initiative within minutes.
reporting of human rights abuses, and targeted Social media is an important new tool for pro-
advocacy efforts. Technology, such as camera moting social and political change. Social media
phones and mobile Web browsing, in addition to allows eyewitness accounts to be made widely
social media platforms on the Internet, have made available and expands access to information.
it easy to reach a large international audience in a Reporting is no longer confined to traditional
matter of minutes to promote human rights activ- sources of journalism. Through social media,
ism and advocacy. information has spread faster and farther, avail-
able now to local, regional, and global audiences.
Promoting Human Rights Via Social Media In the context of human rights movements, this
Social media can refer to a range of Internet-based element of spreading messages and bringing
applications that allow for the exchange of user- attention to a cause is crucial. Such attention to
generated content through interactive participa- local activists also means that a human rights
tion by users. Types of social media can include defender’s disappearance is more likely to be
collaborative projects, virtual worlds, blogs, con- noticed and reported. Furthermore, social media
tent communities, and social networking. Wiki- allows access to evidence of human rights abuses
pedia provides the most prevalent example of col- beyond the limitations of mainstream media
laborative projects, or people working together sources and boundaries of nongovernmental
to assemble content. Online collaboration proj- organizations. The availability of mobile media,
ects can allow people to share documents, such including camera phones, allows such informa-
as political strategies, through platforms such as tion to be documented and disseminated almost
Google Docs used in the Egyptian revolution in instantaneously. Access to this type of informa-
2011. Blogs allow for the creation of online con- tion through social media also facilitates conver-
tent on topic of the author’s choice, enabling com- sation and debate through which political opin-
menting by individuals. Video blogs, or “vlogs,” ions are formed.
allow for streaming video content to be accessed Mobile communications have continued to be
by the Internet community. This allows for an utilized to promote political activism and social
accessible alternative to mainstream media. Con- protest throughout the world. Social media and
tent community Web sites such as Flickr, You- networking sites played a major role in student
Tube, and Instagram allow for sharing of content human rights protests in Moldova in 2009 and in
such as photos and videos, which can be invalu- Iran the same year, following presidential elections.
able in exposing human rights abuses to the inter- The term Twitter Revolution has been used to
national community. describe the protests in Moldova and Iran, as well
Social networking sites such as Facebook and as the Tunisian and Egyptian uprisings in 2011.
Twitter enable users to share information by cre- The effect of protests and movements advocat-
ating profile pages with virtual friends. Attracting ing for human rights fueled by social media have
only a fraction of the users on Facebook, Twit- had a profound impact on the political sphere.
ter is becoming an influential source of real-time Examples of recent efforts to galvanize the masses
news. Allowing members to post brief messages, to political activism through social media include
or tweets, Twitter has created a mobile informa- the Save Darfur campaign, WikiLeaks, the Arab
tion network that allows communications to be Spring, Occupy Wall Street, and “Kony 2012.”
posted and made available to the public instan-
taneously. Such social media sites provide free Save Darfur
and widely accessible information across socio- The Save Darfur Coalition is a U.S.-based advo-
economic groups. Mobile phones with Internet, cacy group that was organized in 2004 in response
video, and photographic capabilities have also to the atrocities in the Darfur region of Sudan. The
become crucial to the documentation of human coalition is comprised of more than 180 organi-
rights abuses. Coupled with social media out- zations that have campaigned for a response to
lets, mobile phones can be used to record and human rights violations that have occurred in the
Human Rights 645

Marchers filling the streets and impeding traffic during a street protest in Tehran, Iran, four days after the contested presidential election
results of June 12, 2009. The protests, which continued into early 2010, became known as the Iranian Green Movement, which sought to
improve human rights and encourage political change. Activists around the world marched in support of the Iranian protesters.

western region of Sudan. According to its Web between Arabs versus blacks, when the popula-
site, Save Darfur inspires action, raises awareness, tion in Darfur is predominantly African Muslim.
speaks the truth on behalf of the people of Darfur, The movement has also been criticized for the use
and works with world leaders to demand an end of its funds and allocation of financial resources
to the genocide. By compelling everyday citizens used for lobbying the U.S. government to inter-
to join the movement, the Save Darfur Coalition vene, rather than to help the people in Darfur,
has worked to build a political movement, orga- advocating for military aggression, rather than
nizing more than 350 rallies in 41 countries. The for a political settlement.
coalition houses a network of more than 1 million Additionally, the composition of the Save Dar-
online activists. fur movement has been characterized as well-con-
The Save Darfur movement has received criti- nected and well-funded U.S. foreign policy elite
cism for presenting a one-sided picture of an and celebrity supporters. Others have accused the
ongoing civil war as a campaign of genocide by movement of being a U.S. government-supported
the Sudanese government-supported Janjaweed propaganda campaign to target the Sudanese gov-
militia against defenseless civilians, without con- ernment with anti-Arab prejudice. Save Darfur’s
textualizing the violence or presenting details on advocacy efforts, while raising awareness through
the complexity of the conflict and ongoing civil social media such as Facebook, YouTube, and
war. The movement has been accused of dis- Twitter, have also caused problems in Darfur, with
torting the conflict by presenting a dichotomy coalition members focused primarily on lobbying
646 Human Rights

as opposed to providing humanitarian aid, even provided an outlet for citizen journalism to spread
after violence in the region declined. the word of the uprisings. Facebook groups were
created to promote advocacy for social change,
WikiLeaks and Twitter users began to spread messages of
WikiLeaks emerged in 2006 as a Web site pub- solidarity with protesters. Youth movements in
lishing secret information, news leaks, and clas- Egypt took notice of the events in Tunisia, and
sified media from a database of more than 1.2 began calling people to attend rallies and protests
million documents from anonymous sources from in Tahrir Square in January 2011. This momen-
within governments, corporations, and organi- tum resulted in 17 days of massive demonstrations
zations. Among its notable developments, Wiki that ultimately forced the resignation of President
Leaks has published video footage of the Baghdad Hosni Mubarak on February 11, 2011.
airstrike in 2007, in which Iraqi journalists were Other countries that subsequently experienced
killed by an Apache helicopter (“Collateral Mur- political change and civil uprisings include Libya,
der” video), the Afghan War Diary of documents Yemen, Bahrain, Syria, Algeria, Iraq, Jordan,
not previously available to the public, the Iraq Kuwait, Morocco, Sudan, and others. In Sep-
War Logs mapping deaths in insurgent attacks not tember 2012, social protests in the Palestinian
previously reported or published, and secret files Authority demanded and resulted in the resig-
relating to prisoners in Guantanamo Bay. In 2010 nation of Prime Minister Fayyad. Techniques of
and 2011, in collaboration with news media in civil resistance have been implemented in these
the United States and Europe, WikiLeaks released ongoing campaigns of demonstrations, protests,
large amounts of classified information allegedly marches, and rallies by utilizing social media to
leaked by a soldier in the U.S. Army, including organize and advocate for social change. Many
military documents from Afghanistan and Iraq, uprisings have met violent resistance from
as well as thousands of State Department cables. progovernment forces and counterdemonstrators.
Detractors claim that WikiLeaks represents a seri- Mainstream media such as Al Jazeera integrated
ous threat to national security and both collec- traditional services of news coverage with social
tive and individual privacy. WikiLeaks supporters media to use citizen journalists on the ground to
maintain that, intended as a Web site to bring news inform syndicated stories. This was important in
and information to the public through original spreading news of protests and uprisings in Tuni-
source material, the WikiLeaks model has posed a sia regionally and globally.
significant challenge to the privacy and confiden-
tiality of government and corporate information. Occupy Wall Street
In the United States, similar protest movements
Arab Spring began in September 2011, in response to social
The Arab Spring is a wave of revolutionary dem- and economic inequality, corruption, and the
onstrations and protests in the Arab world that perceived influence of corporations on the gov-
began in December 2010 due to mass dissatis- ernment. The movement was called Occupy Wall
faction with corruption and oppression by gov- Street, and began on September 17, 2011, in Zuc-
ernments. The first uprisings occurred in Tunisia cotti Park, located in New York City’s Wall Street
in the town of Sidi Bou Zid in December 2010. financial district. The slogan “We Are the 99 Per-
Street vendor Mohamed Bouazizi set himself on cent” refers to the growing income inequality and
fire in protest of harassment and humiliation by wealth distribution between the wealthiest 1 per-
municipal officials, which resulted in massive pro- cent and the rest of the population.
tests and uprisings against state repression and Protesters were forced to vacate Zuccotti Park
corruption, and eventually, the ousting of Presi- on November 15, 2011, turning their focus to
dent Zine al-Abidine Ben Ali. protesting at banks, corporations, and university
Videos of protests were uploaded to Facebook, campuses. Like the Arab Spring protests, Occupy
one of the only video-sharing sites in Tunisia that Wall Street relied on social media and the Internet
was not censored. Because print and broadcast in order to spread its message and galvanize peo-
media were controlled within Tunisia, social media ple to fight for their social and economic rights.
Human Rights 647

Kony 2012 as e-mail or text messages; information from


Kony 2012 is a short Internet video released on Web pages, blogs, Twitter posts or other social
March 5, 2012, that was created by the organi- media; text files, word processing documents, or
zation Invisible Children. The film was made in spreadsheets; database records; records of transac-
order to promote the organization’s Stop Kony tions; court records and testimonies; and scanned
movement to raise awareness and advocacy to images, digitized audio or video, and so on. Efforts
bring Ugandan war criminal and Lord’s Resis- by organizations such as WITNESS show ways in
tance Army (LRA) leader Joseph Kony to justice. which human rights activists can use digital tech-
The organization has promoted its campaign nology for evidence collection and crisis response,
through posters, T-shirts, buttons, stickers, and as well as human rights advocacy campaigns.
bracelets. Invisible Children has focused on HURIDOC’s OpenEvsys project provides human
obtaining support for its campaign from high-pro- rights organizations with software to document
file individuals and celebrities, including George and manage data on human rights violations. Such
Clooney, Angelina Jolie, Oprah Winfrey, Taylor efforts for documentation can contribute to creat-
Swift, Ryan Seacrest, Rihanna, Nicki Minaj, Kim ing historical records; pursuing accountability for
Kardashian, Bill Gates, former President George human rights violations; advocating for transi-
W. Bush, Condoleezza Rice, and John Kerry, tional justice, such as truth commissions, prosecu-
among others. By September 2012, the film had tions, reparations, and so on; and affecting policy
more than 92 million views on YouTube and 16 change at local, national, and international levels.
million views on Vimeo. On April 5, 2012, Invis-
ible Children released a follow-up video titled Criticisms of Social Media
Kony 2012: Part II—Beyond Famous. Skeptics have argued that true social change can
The film has been criticized for its manipulation only occur through meaningful, on-the-ground
and oversimplification of facts regarding LRA activism characterized by strong group identity
violence for strategic purposes by its black-and- and cohesion. Critics such as Malcolm Gladwell
white portrayal of Kony. Critics refer to this type argue that social media promotes slacktivism, or
of activism as “slacktivism.” Portraying Kony feel-good measures in support of a cause with little
as a global celebrity embodying evil, as opposed to no practical effect, aside from personal satis-
to an actor in a complex regional conflict, has faction. Social media present a low-cost, minimal
contributed to misinformation and a misleading effort option that many have begun to substitute
impression regarding the location and activities for substantive action. Such efforts include signing
of Kony’s LRA forces. This becomes problematic online petitions, joining Facebook groups, liking a
not only in its impact on global activism, but also cause on Facebook, posting or retweeting copied
in its impact on regional and international politics statuses or messages, sharing YouTube videos, or
because the video calls for military intervention. updating one’s profile to reflect support of causes.
Also known as clicktivism, the phenomenon of
Fact-Finding and Documentation clicking a button to indicate support is argued to
The collection, creation, and dissemination of doc- reduce social action to what is essentially no more
umentation and reports of violence are central to than a list of names, as opposed to engaged activists.
human rights advocacy. Although this technique Gladwell argues that successful activism requires
has been used for decades, the recent surge in hierarchies and allocation of tasks with centralized
communication technologies and social media has leadership, and that social media makes it easier
facilitated the dissemination of digital materials by for activists to express their views, but harder for
advocacy groups. Electronic evidence can be cre- such expression to have any real impact.
ated or stored digitally on computers, cell phones,
and cameras, and may involve first-person record- Propaganda and Hate Speech
ings of events or testimony, news articles, videos, In addition to contributing to positive social
or forensic evidence. According to the Center for change through human rights documentation and
Research Libraries, this may include digital images, advocacy, social and traditional media can also
audio, or video; networked communications such be used to communicate inaccurate information,
648 Human Rights

leading to negative change. Media have been used Guardian, Al Jazeera, and CNN. Governments
to escalate violent conflict through hate speech, in Tunisia, Bahrain, Libya, Syria, and Yemen
dating back to cases of Nazi propaganda cam- also began to shut down social media platforms
paigns through print and radio media. that were used for mobilization for protests dur-
In 1994, popular radio stations in Rwanda were ing the Arab Spring uprisings.
used to broadcast messages inciting people to exter- It is difficult, however, for states to shut down
minate the Tutsi population. The most popular sta- popular Web sites where most people engage
tion, Radio Television des Milles Collines (RTLM), in trivial activities unrelated to social activism.
preached messages of Hutu supremacy to its lis- According to the cute cat theory of digital activ-
teners. Within minutes of the shooting down of ism, shutting down popular social media sites can
Rwandan President Habyarimana’s plane, RTLM aggravate those who were previously apathetic,
accused Belgian peacekeeping troops in Rwanda causing people to become politicized. Although
of shooting down the plane, resulting in the brutal social media facilitates interaction among users,
deaths of Belgian soldiers and the withdrawal of content is mediated by private, intermediary
UN forces. RTLM then gave the signal to begin the companies. Content can therefore be censored
massacre of Tutsis and moderate Hutus. In addi- both by local governments and social media
tion to its role in promoting activism and social companies.
change, social media were also used in the Arab Although one might be able to challenge state
Spring in 2011 to incite violence. The debate over censorship in a court of law, there are few rem-
media censorship to curb ethnic tensions and hate edies if a private social media company chooses
media has been ongoing in Bosnia as well. Organi- to take down someone’s page. The concept of
zations such as al-Qaeda also utilize social media net neutrality suggests that the Internet should
and the Internet to spread their ideologies. be free of censorship by governments or service
providers. Such ideas harken back to the prin-
Censorship and Freedom of Expression ciples outlined in the Universal Declaration of
The role of social media sites in promoting human Human Rights to include the right to free speech,
rights advocacy, as well as propaganda, has free association, and the right to privacy.
resulted in censorship by several governments.
After the presidential election riots in 2009 in The Right to Privacy
Iran, the government blocked many Web sites and The right to privacy has become a concern with
increased surveillance of Internet users. Similar respect to various social media sites. Such sites
issues exist in China. Internet companies that oper- collect personal user information that can be uti-
ate in China are bound by the government’s strict lized in personalized Internet searches. Facebook
censorship policies. The organization Reporters has been criticized for altering its interface and
Without Borders highlights that, according to its platform in ways that undermine user privacy.
Press Freedom Index for 2011 and 2012, repres- Although users can change their privacy settings,
sive media censorship and regulations are most oftentimes they do not realize that such settings
prevalent in Eritrea, North Korea, and Turkmeni- have been affected because of the new platform,
stan, followed by Syria, Iran, and China. and can consequently be sharing more infor-
The Internet has served as a key factor in pro- mation than intended. Such social media sites
moting civic participation in political processes. essentially constitute searchable databases of
The Egyptian revolution, beginning online volunteered personal information. There is also
through social media sites such as Facebook and the danger of access to such private information
Twitter, faced government Internet blackouts by governments or law enforcement agencies. In
aimed at silencing the masses of online activists. 2011, for example, the United States subpoenaed
People used short messaging service (SMS) text Twitter for information on users associated with
messages through mobile phone networks and WikiLeaks. This battle for the right to privacy
dial-up Internet connections to post updates to is one indication of ways in which social media
Twitter, which were then picked up by interna- can infringe upon human rights while promoting
tional media such as the New York Times, the advocacy for rights in other ways.
Human Rights 649

Conclusion Media in Politics; Arab Spring; Civil Rights;


The relationship between human rights, politics, Economic and Social Justice; Internet Gathering;
and social media has served as the nexus for analy- Nongovernmental Organizations; Occupy Movement;
sis of many modern social movements. Dating back WikiLeaks/Arab Spring.
to philosophical and historical origins in religious
and secular texts, human rights can be applied to Further Readings
both political realities on the ground and moral Donnelly, Jack. Universal Human Rights in Theory
claims to such rights. Modern human rights move- and Practice. 2nd ed. Ithaca, NY: Cornell
ments have advocated for social change through University Press, 2003.
technology and social media. These tools have Gladwell, Malcolm. “Small Change,” New Yorker
made it easier for information to be spread world- (October. 4, 2010).
wide at the click of a button, allowing for mes- Hayden, Patrick. The Philosophy of Human Rights.
sages of advocacy to reach a wide audience with St. Paul, MN: Paragon House, 2001.
ease. It is important, however, to also acknowl- Ishay, Micheline R. The History of Human Rights:
edge the potential for the spread of propaganda From Ancient Times to the Globalization Era.
through such instruments. In addition to tracking Berkeley: University of California Press, 2008.
and profiling dissidents, the Internet can be used to Joseph, Sarah. “Social Media, Political Change, and
promote the views of those dissidents. Therefore, Human Rights.” Boston College International and
one must also take caution when promoting social Comparative Law Review, v.35 (2012).
media as an instrument of progressive political Lorber, Kim and Adele Weiner. “Human Rights
change. As easy as it is for positive messages to be Networks.” In Encyclopedia of Social
circulated to a global audience, it is equally pos- Networks, George A. Barnett, ed. Thousand Oaks,
sible for false or negative campaigns to be spread CA: Sage, 2011.
through the Web. Organisation for Economic Co-operation and
The fact that most popular social media tools Development. Participative Web and User-Created
are run by large, for-profit corporations also pres- Content: Web 2.0, Wikis, and Social Networking,
ents a threat to freedom of speech and censorship v.18 (2007).
based on the agendas of such companies and their Reporters Without Borders. Press Freedom Index
relationships to potentially repressive government 2011–2012. http://en.rsf.org/press-freedom
bodies. Social media today has created unprece- -index-2011-2012,1043.html (Accessed
dented access to information, voices, and connec- September 2012).
tions globally, allowing for the dissemination of Shirky, Clay. “The Political Power of Social Media:
human rights and activism, which has shaped the Technology, the Public Sphere, and Political
future of modern human rights campaigning and Change.” Foreign Affairs (January/February 2011).
advocacy throughout the world. Simon, James T., Sarah Van Deusen Phillips, and
Marie Waltz. “Human Rights and Electronic
Carla De Ycaza Media: a CRL Study.” Focus on Global Resources,
New York University v.31/2 (Winter 2012). Center for Research
Libraries, Global Resources Network. http://
See Also: Africa, north; Africa, sub-Saharan; www.crl.edu/focus/article/7498 Accessed
Activists and Activism, Digital; Actors and Social September 2012).
I
I Am Gonna Be Your In 2011, the drought and famine were widely
reported to be the worst to strike east Africa in
Friend Campaign decades. Reuters estimates the total number
of people affected at 12 million in the Horn of
“I Am Gonna Be Your Friend” is a line taken Africa, which includes Somalia, Ethiopia, and
from the 1973 song “High Tide or Low Tide” by Kenya. The problem was important enough for
Bob Marley and the Wailers to name a Save the the United Nations Food Agency to call for high-
Children–affiliated campaign to fight starvation level talks to tackle the crisis and discuss rebuild-
in east Africa. The campaign’s name evokes the ing agriculture in the area. In 2011, Save the
convention of friending people on social media. Children projected that 1 million Somali children
The campaign urges celebrities’ social media fol- would die without aid.
lowers ( friends) to disseminate director Kevin McDonald’s video ends with a black-and-white
McDonald’s film about child starvation in east photograph of Marley, over which an appeal to
Africa set to Marley’s song. Donations are then help east Africa’s children and a Web link for the
made directly to the campaign (www.imgonna- I’m Gonna Be Your Friend campaign donation
beyourfriend.org) and by purchasing the charity page are superimposed. The campaign is affiliated
single version of “High Tide or Low Tide.” with the global charity Save the Children, which
Kevin McDonald is a filmmaker and docu- delivers food, water, and medicine to children in
mentarian, best known for his Oscar-recognized need. The campaign has celebrities use their social
documentary One Day in September (1999) and media networks (for example, Facebook or Twit-
feature film The Last King of Scotland (2006). In ter) to disseminate information about the cam-
2011, while working on the documentary, Marley paign and urge their followers to purchase Mar-
(2012), about reggae artist Bob Marley, McDon- ley’s rereleased-for-charity single or to directly
ald uncovered the connection that Marley felt for donate to the campaign through their donation
Africa and African people. As a result, McDon- page or that of Save the Children.
ald created a short video about the devastating Celebrities, artists, athletes, entertainers, and
drought and famine affecting east Africa set to singers used their social media networks to dis-
Bob Marley’s song “High Tide or Low Tide.” The seminate the video, news of the plight of east
three-minute video focuses on children suffering Africa, and fundraising appeals to their fans.
from severe malnourishment and dehydration. Participating individuals included Eminem, Lady

651
652 I Am Second Movement

Gaga, Jay Z, David Beckham, Bono, Beyoncé, Further Readings


Muhammad Ali, Jennifer Lopez, Elton John, Kearney, Christine. “Music Stars Campaign to
Lewis Hamilton, Bruno Mars, Robert Plant, End Hunger Crisis in Africa.” http://www
Kanye West, Madonna, Christiano Ronaldo, Jus- .reuters.com/article/2011/08/09/us-famine
tin Bieber, Brian May, and Sting. It is estimated -idUSTRE7785EZ20110809 (Accessed
that a total of 150 stars communicated the cam- December 2012).
paign to an estimated 700,000 million online Save the Children. “Bob Marley Campaign to Support
followers. The campaign announced a goal of East Africa Appeal.” http://www.savethechildren
reaching a billion people globally with the mes- .org.uk/news-and-comment/news/2011-08/bob
sage. Google featured the campaign and links to -marley-campaign-support-east-africa-appeal
its video on its homepage on August 18, 2011. At (Accessed December 2012)
the time, Save the Children applauded the move,
noting that over a billion Google searches are
made each day.
Several celebrities visited affected areas to draw
attention to the campaign. Somali-born model, I Am Second
actress, and entrepreneur Iman visited Somalia’s
capital of Mogadishu in 2011 under the auspices Movement
of Save the Children, and she described the devas-
tation and human suffering that she witnessed. In The I Am Second online ministry movement was
the same year, Somali-Canadian singer K’Naan, conceived from the Bible verse John 12:32: “Lift
whose hit “Waving Flag” was the 2010 World up Christ so that He might draw the people of His
Cup anthem, used his international celebrity to city to Jesus.” Essentially Web-based, I Am Sec-
bring attention to the food crisis when he visited ond aspires to provoke change by providing nar-
Somalia. Also, U.S. rapper, actor, and entrepre- ratives about finding a sense of purpose in Jesus,
neur 50 Cent visited Doolow district in the Gedo putting the individual second. Norm Miller, chair
region of Somalia in 2012, where he met with of Dallas-based Interstate Batteries, believed that
men, women, and children living in displaced per- there was a need for an organization that would
sons’ camps for civilian victims of civil strife. The put these words into action. He took the idea to
experience led the artist to tweet that he wanted e3 Partners, an evangelical 501(c)(3) organiza-
to feed a billion people in Africa five years from tion that he had partnered with in prior ministry
the time of his visit. endeavors. On December 2, 2008, they launched
Rita Marley, the widow of Bob Marley, lent a billboard campaign in the Dallas area featur-
her name to the campaign on behalf of her hus- ing the photo of an athlete, entertainer, leader, or
band, who died in 1981 from cancer. Bob Mar- “regular” person with the phrase “I Am Second”
ley’s daughter, fashion designer Cedella Marley, and the group’s Web site on a stark, black back-
has also used her celebrity to promote her fam- ground. The campaign now extends through print
ily’s 1 Love Charity program that, in addition to advertisements, television, films, events, speakers,
the I Am Gonna Be Your Friend campaign, has and social networking sites, as well as small sup-
included third-world water relief, and earthquake port group meetings.
relief in Japan. As a result of the campaign, Bob E3 Partners manages Web content production
Marley’s Facebook following grew from 18 mil- and distribution. In 2009, the I Am Second Web
lion to more than 30 million people. site was selected as a finalist in the Activist and
People’s Choice categories of the South by South-
Gordon Alley-Young west Web Awards. The Web content centers on
City University of New York video testimonials from Seconds recounting their
struggles, showing how these were overcome
See Also: Activists and Activism, Digital; Africa, when the Second put him- or herself second to
sub-Saharan; Disaster Relief; Facebook; Musicians Jesus. Subjects range from death, divorce, and
and Social Media in Politics. drug and alcohol abuse to satisfaction and finding
I Am Second Movement 653

a purpose in life. The belief is that testimonies of Second groups may be found in cities worldwide.
those changed by God are strong arguments for In 2012, the Web site debuted the I Am Second
faith. By December 2012, the 83 videos, which run church campaign kit, which includes a copy of the
from five to eight minutes, were plainly produced, book I Am Second, the I Am Second conversation
featuring a person dressed in a black t-shirt, sit- guide, and the I Am Second DVD-based study, film
ting in a white chair lit by an overhead fixture. clips, sermons, and outreach tools.
One of the original and most famous testimonials The Web site has further expanded from its
is from former Korn band member Brian Welch, original video narrative content. It also provides
who relates how his crystal meth habit was over- the opportunity to chat, e-mail, or call a hotline
come by establishing a relationship with Christ. 24/7. I Am Second expeditions promote missions
In another, author Anne Rice (The Vampire around the world, and have recently put special
Chronicles) describes herself as a “Christ-haunted emphasis on school and university groups. I Am
atheist” whose early writings were reflections of Second is in more than 212 countries and boasts
her struggle with faith. more than 7 million hits on its Web site. In Octo-
Other celebrity Seconds include American Idol ber 2011, it launched a speaker’s bureau that fea-
Season 10 winner Scotty McCreery, who wore the tures personalities (people featured on the Web
black I Am Second wristband in his appearances; site), spokespeople (those involved with ministry
Olympian and cancer survivor Scott Hamilton; philosophy, biblical issues, and outreach strat-
Bethany Hamilton, champion surfer; fashion egy), and ambassadors (speakers formally affili-
blogger Lauren Scruggs, who nearly lost her life ated with I Am Second).
in 2011 when she walked into a spinning plane In January 2012, Thomas Nelson published
propeller; actor Steven Baldwin; former football I Am Second: Real Stories. Changing Lives, by
coaches Tony Dungy and Joe Gibbs; National Doug Bender and Dave Sterrett. The book con-
Football League quarterbacks Sam Bradford and tains extended testimony of 22 people, all fea-
Colt McCoy; and National Association for Stock tured on the Web site. I Am Second began a year-
Car Auto Racing (NASCAR) champion Trevor long association with NASCAR with an outreach
Bayne. Its Web site describes the narratives as event in February 2012 at Daytona Beach, where
ones “that give hope to the lonely and the hurt- it premiered a new I Am Second film featuring six
ing, help from destructive lifestyles, and inspira- NASCAR drivers. I Am Second may be found on
tion to the unfulfilled.” Twitter and Facebook, and is mentioned at con-
The Web site is not limited to Seconds video certs and other events throughout the country.
testimonials as it also offers a large number of
resources to spread its ideas. Devoid of denomi- Beth M. Waggenspack
national influence, the resources offered may be Virginia Tech
used in church services, workplaces, or community
groups. I Am Second provides extensive informa- See Also: Campaigns, Digital; Campaigns,
tion, training, and free resources, as well as oppor- Virtual; Facebook; Nonprofit Organizations; Youth
tunities to engage in I Am Second lead labs. Based Engagement; YouTube.
on a discuss-and-discover model, these lead labs
offer leadership training that fuses scripture with Further Readings
individual commitment and discipleship. Partici- Bender, Doug and Dave Sterrett. I Am Second: Real
pants experience developing discussion groups that Stories. Changing Lives. Nashville, TN: Thomas
are Bible-centered, yet individually focused. Lead- Nelson, 2012.
ers discover how to act as disciples, sharing with Caruana, Marisa. “I Am Second.” The Good News.
others what they’ve experienced and helping mem- http://goodnewsfl.org/christian-news/i_am_second
bers toward individual commitments. These lead- (Accessed November 2012).
ers return to their communities to create I Am Sec- e3 Partners. http://www.e3partners.org/about-e3
ond support groups, which are unlike traditional (Accessed November 2012).
Bible studies, by encouraging people to contribute I Am Second. http://www.iamsecond.com (Accessed
through questions and scriptural discussion. I Am November 2012).
654 Identity Politics

“‘I Am Second’ Project Aims to Transpire Spiritual politics is the attempt to discern what it means to
Revolution” (October 2012) http://thesop.org/ be a particular kind of person at a particular time
story/20121008/i-am-second-project-aims-to and place. Identity politics is an investigation into
-transpire-spiritual-revolution.html (Accessed the ways in which the categories—the identities—
November 2012). that people claim, or are assumed to be, influence
Meyers, Jessica. “‘I Am Second’ Billboards in what they are able to say and do, as well as how
Texas Impacting People Worldwide” (December others might evaluate them. Most often, identity
2008). http://www.breakingchristiannews.com/ politics focuses on how some kinds of people in
articles/display_art.html?ID=6188 (Accessed some contexts are treated in humane and privi-
November 2012). leged ways, whereas other kinds of people are
“Norm Miller.” The 700 Club. http://www.cbn.com/ silenced, disregarded, or abused in the same (or
700club/guests/bios/Norman_Miller_040412.aspx similar) context.
(Accessed November 2012).
Searching for Equality
A person interested in identity politics may inves-
tigate obvious discussions of identities, such as
when politicians try to court the vote of particu-
Identity Politics lar populations (for example, Hispanics), or when
male legislators try to determine the reproductive
In social life, one is held accountable for being, or rights of women. A person interested in identity
assuming to be, a particular kind of person—of a politics may also investigate more everyday situ-
particular race and ethnicity, sex, gender, ability, ations in which identities matter, such as when a
sexuality, religion, age, and nationality. Many use disabled man, thought of as intellectually inept
these categories to understand oneself and others because he happens to be physically disabled, is
(for example, if a person identifies as Mormon, talked to with a childlike voice or is addressed
others may have some ideas about the person’s indirectly through other members of his party, or
religious practices). when a Muslim girl is not allowed to wear her reli-
Identities can be avowed (self-claimed), or gious garb (for example, a hijab) at school because
ascribed to a person by others; sometimes, one such clothing may make other people uncomfort-
may not know the categories for which others able. A person interested in identity politics may
may hold one accountable. Further, the identities also investigate the sense of community that iden-
that a person claims, or are assumed to be, can tities cultivate, especially the traditions, cultural
influence what the person can do, what the person practices, and ways of speaking that comprise a
can and should say, and how others may evaluate particular group, as well as the rules about who
the person. In other words, identity is a social and can (insiders) and who cannot (outsiders) say dis-
cultural construction shaped by way of public paraging words. A person interested in identity
policies that not only dictate what the experience politics may investigate the media representations
of a particular kind of person is, but also restrict of particular kinds of people, as well as who is, or
how this kind of person interacts with others. is not, able to speak on behalf of these groups. For
For example, identities have influenced who instance, does a person who is disabled (visually
people can love and marry (for example, relational impaired) have any right to speak for or about
and legal prohibitions against interracial, interre- someone who is also visually impaired, or differ-
ligious, and same-sex marriages), as well as if and ently disabled (hearing impaired)?
where a person can work, eat, or attend school In many instances, identity politics indicate a
(for example, relegating women to the home or quest for equality by offering strategies that par-
toward careers in nursing or teaching, rather than ticular kinds of people can use to work against
math or engineering). When these kinds of restric- cultural structures that do not recognize them.
tions and evaluations happen, made possible by For example, when certain groups seek protec-
the existence and understanding of particular tions from discrimination in the workplace, this
identities, this is called identity politics. Identity is often done with the hope that everyone will be
Identity Politics 655

given a fair chance to succeed. Or, if a group wants to assemble quickly, efficiently, en masse, with-
to make government buildings or Web sites more out the presence of media gatekeepers in order to
accessible, this is done with the intent to increase change harmful beliefs and practices, and influ-
the ability for everyone to equally participate in ence—and possibly even overthrow—problematic
social life. Or, if a group wants to fight for the legal cultural authorities and political regimes. Social
right to marry, this is a move toward legal fairness media now allow people to create and partici-
for them. However, in such instances, dominant pate in niche virtual communities, thus allowing
groups may not perceive such issues as quests for “underground” resistances and identities to come
equality, but instead as threats to social order. together, interact, and take action, without hav-
For example, a woman wanting to join the ing to participate in public protests or rely on a
military may want to be treated like the men, but physical meeting space.
men in the military may not only feel threatened However, in order for people to engage in these
by the woman’s presence, but may also not allow uses of social media, they must have access to
her to participate in certain tasks (for example, and knowledge of how these media work. For
flying aircraft or fighting on the front battle lines). instance, in order for a person to join a (under-
Or, an able-bodied business owner may feel as ground) virtual community, the person must have
though the need to make a building more acces- access to and knowledge of a computer or a smart-
sible is unnecessary, and that structural changes phone, the virtual location of the community, and
will tax financial resources. Or, a religious organi- the time to interact with community members. If
zation may feel as though the legal recognition of a person wants to create cultural change, then the
same-sex marriages violates religious freedoms. person must find ways, by way of social media,
Some identity politics indicate a quest for supe- to employ change-related strategies with commit-
riority. For instance, with racial purification and ted, like-minded others who may not reside in the
racial cleansing, certain populations were assumed same physical location. Or, if a person—maybe a
to be better (for example, the Aryan race). Thus, politician—wants to appeal to a particular group,
by eradicating the “inferior” populations, the the politician should recognize that his or her mes-
(perceived) superiority of one group could be sage, among dense social media environments,
maintained. In the United States, the perceived may spread quickly, and possibly even errone-
superiority of races was also a significant rationale ously, and that it may incite immediate action by
for the ban against interracial marriages because active participants in these environments.
outlawing the legal ability for people of different New areas of research have emerged within
races to marry protected the dominant, perceived- academic contexts, all tied to the study of particu-
to-be purer race from genetic “contamination.” lar identities. Scholars must continue to focus on
the workings of identities in everyday discourse
Social Media and to make attempts to understand—and pos-
The emergence and rampant use of social media sibly challenge—what it means to be particular
also complicates identity politics. With social kinds of people in particular places, at particu-
media, people can more easily and explicitly lar times, and by way of particular technologies.
mark, manage, and manipulate their identities. Situations in which people are singled out, not
However, they can become reluctant targets of recognized, and told that they do not matter are
tailored messages, and possibly even victims of encouraged to come together, in solidarity, as a
identity theft or cyberbullying (that is, online member of a group.
harassment for identifying in a particular way).
Social media can re-energize specific groups that, Rafal Rybak
before these media, were weakening in power and Tony E. Adams
social influence (for example, the Ku Klux Klan); Northeastern Illinois University
social media can also strengthen groups that,
before these media, were not known to exist, or See Also: Activists and Activism, Digital;
did not have much social clout (for example, the Civil Rights; Human Rights; Psychographics;
Tea Party). Social media can allow certain groups Race/Ethnicity.
656 Idlenomore.ca

Further Readings
Loury, G. C. “The Call of the Tribe: The Role of
Identity in Our Politics and Our Lives.” National
Civic Review, v.98 (2009).
Putnam, M. “Conceptualizing Disability.” Journal of
Disability Policy Studies, v.16 (2005).
Wetherell, M. and C. T. Mohanty, eds. The SAGE
Handbook of Identities. Thousand Oaks, CA:
Sage, 2010.
Yoshino, K. Covering: The Hidden Assault on Our
Civil Rights. New York: Random House, 2006.

Idlenomore.ca
Idle No More (INM) is a grassroots indigenous
protest movement that originated in Canada and
gained momentum primarily through digital and
online activism. The movement, born in social
media, helped to unite First Nations people and
foster an awareness of the plight of indigenous
peoples in North America. INM has also gained
international prominence, with committed activ-
ists employing user-generated Web content as a
tool to spread their movement’s message. The
vision of INM includes fostering sovereignty and Idle No More supporters from the San Francisco Bay Area
nationhood for First Nations, pressuring indus- displaying a banner at the city’s 43rd annual Pride Celebration
tries and the government to protect the envi- and Parade on June 30, 2013. Idle No More’s Facebook page,
ronment (for example, demanding sustainable begun in late 2012, had 110,000 likes by 2013.
development), and building allies to reframe the
nation-to-nation relationship through the inclu-
sion of grassroots perspectives.
The INM movement rapidly spread online and videos, and other relevant media. Not long after-
offline across Canada around October 2012. Dur- ward, the movement went viral, and similar meet-
ing that time, the country’s federal government, ings were organized in the region around Canada.
led by Prime Minister Stephen Harper, introduced Among Bill C-45’s provisions that most con-
Bill C-45. Activists argued that the bill posed cerned First Nations communities were the Indian
major threats to the environment. The introduc- Act, the Navigation Protection Act, and the Envi-
tion of Bill C-45 prompted four women in Sas- ronmental Assessment Act. INM argued that the
katchewan, Canada—Jessica Gordon, Sylvia Indian Act would allow for the easier privatiza-
McAdam, Sheelah Mclean, and Nina Wilson—to tion of designated reserve lands and treaty terri-
organize an event, which they had scheduled for tory because it would change the way that First
November 2012. They created a page on Face- Nations communities approved the leasing and
book and called it Idle No More to help publicize surrender of these areas. According to INM, pre-
this event. Supporters of the INM movement also viously, a majority of eligible voters were required
employed Twitter to spread the word, using the to approve such leases and surrenders. However,
campaign’s hashtag #IdleNoMore, and tweeting C-45 allowed approval to occur after a meeting for
comments and links to news items, blogs, photos, such purpose was called, and irrespective of how
Idlenomore.ca 657

many people attended the meeting, the majority AFN had scheduled to hold a major treaty meet-
of attendees voted to approve the lease or surren- ing in Vancouver, British Columbia. This meeting
der. On the other hand, through the Navigation culminated in a 13-point declaration spearheaded
Protection Act, companies that planned to build by Spence, which sought, among other things, to
oil pipelines and power lines in Canada would implement and follow through the commitments
only be required to prove that their projects were made by the Prime Minister Harper in the January
harmless to lakes and rivers if such waterways 11 meeting.
were on a “protected” list prepared by Canada’s INM provides an excellent case of how social
transportation minister. INM argued that because media united an indigenous resistance movement.
of amendments to this list, the number of pro- Mark Gollum, a senior writer with the Canadian
tected lakes and rivers would drop by 99 percent, Broadcasting Corporation, equated the movement
making most waterways vulnerable to environ- to the Occupy Wall Street protests that occurred
mental damage. In a similar vein, the Environ- in the United States in 2011, having a campaign
mental Assessment Act reduced the number of that was also largely diffused via social media.
projects that required environmental assessments. Gollum quoted Canada-based sociologist Jeffrey
Denis, who described the INM movement as dif-
2012 Protests fused with no organizing structure, much like the
INM supporters vigorously used social media Occupy movement. Yet, the protest movements’
to mobilize and organize an offline and online tactics differ in a number of aspects. In particular,
National Day of Action, which they scheduled while Occupy groups chose to indefinitely occupy
for December 10, 2012. Corresponding with this spaces, activists participating in the INM protests
event, Theresa Spence, chief of the Attawapiskat primarily used temporary, flashmob-type events.
First Nation, who would later become the face of These included round dances, teach-ins, ceremo-
the INM movement, declared a hunger strike on nies, and prayers in shopping malls and city cen-
December 11, 2012. Spence intended to use her ters. Activists supporting INM also employed
liquid-only fast to bring public awareness to con- direct action tactics, such as the use of blockades
cerns over Bill C-45 and the plight of the INM to disrupt major rail lines and highways across
movement, and to increase support for the rights Canada. Various First Nation peoples, including
of First Nations peoples. Spence vowed not end the founders of INM, have questioned these direct
her hunger strike until Prime Minister Harper action tactics for their aggressiveness. However,
would agree to speak with First Nations leaders to proponents of these direction action tactics have
discuss Canada’s treaty relationship. She called for argued that they are necessary as a means to resist
a day of protest to occur on December 30, 2012. the loss of native rights.
Harper then agreed to meet with 20 chiefs of
the Assembly of First Nations (AFN), a group of 2013 Protests
leaders who represented the First Nations in Can- INM has gained worldwide attention. Around the
ada. The meeting took place on January 11, 2013, end of January 2013, INM called for a worldwide
and on that day, INM organized a number of pro- day of action, and mass mobilizations occurred in
tests across major cities in Canada. The outcome a number of cities in Canada, the United States,
of the meeting led Prime Minister Harper to vow a France, and the United Kingdom. Amnesty Inter-
renewed focus on treaty relationships and claims. national and the United Nations have issued state-
Although National Chief of the AFN Shawn Atleo ments in support of INM. In 2013, the INM Face-
declared the outcome of the meeting as an achieve- book page showed close to 110,000 “likes,” and
ment, other First Nations leaders, such as Spence, an app called Makook, which tracks information
held that the meeting fell short of what should have on tweets, showed that close to 700,000 tweets
been accomplished. These differing stances illus- had used the #IdleNoMore hashtag. While most
trate the division among First Nations groups at of these tweets originated from North America,
the time, because some groups did not support the the app showed that some came from as far as
stances of INM. Spence ended her hunger strike Madagascar and Kazakhstan. Indigenous groups
on January 24, 2013—the day that chiefs of the and other historically marginalized communities
658 I-Docs.org

continue to use social media as a resistance tool. blog. Posts fall under several categories, includ-
INM is an exemplar of the power of social media ing activism, collaboration, locative, play, tax-
in spurring on social change. onomies, technologies, transmediality, and news.
Written by site editors and guests, posts explore
Francis Dalisay questions such as handling narrative order, using
University of Hawai‘i at Manoa social media, using new creation tools, and engag-
ing audiences. Other posts highlight the presence
See Also: Canada; Quebec, Canada, 2012 Student of interactive documentaries at film festivals, such
Protests; Race/Ethnicity; Social Issues Advocacy, as Sheffield Film Festival.
Netroots Driven. In addition to the posts, the news section cov-
ers conferences and research calls related to inter-
Further Readings active documentary. The site also offers references
Alia, V. The New Media Nation: Indigenous Peoples to academic and other sources related to interac-
and Global Communication. New York: Berghan tive documentaries, as well as a listing of currently
Books, 2012. available ones. Along with the main site, editors
Gollom, Mark. “Is Idle No More the New Occupy at i-Docs.org also maintain other social media
Wall Street? Aboriginal Movement Compared to presences, such as on microblogging site Twitter
2011 Grassroots Protests That Sprang Up Across and photosharing site Flickr.
the Globe” (January 7, 2013). CBC. http://www A key activity of the site’s founders is to define,
.cbc.ca/news/canada/story/2013/01/07/f-idle-no theorize, and explore the implications of the
-more-occupy-wall-street.html (Accessed April interactive documentary toward understanding
2013). applications, possibilities, and limitations. An
Wilson, P. Global Indigenous Media: Cultures, interactive documentary refers to a documentary
Poetics, and Politics. Durham, NC: Duke that incorporates multimedia tools such as short
University Press, 2008. video, hyperlinked pages, clickable maps, and
chat functions in its representations of reality.
This grounding in reality is considered the foun-
dation of the documentary form, distinguishing
it from fiction. Digital technologies are used not
I-Docs.org only in creating interactive documentaries, but
also in distributing them to audiences. Unlike
i-Docs.org is a Web site and symposium dedicated cinematic or television documentaries, interac-
to the production and study of interactive docu- tive ones unfold according to how the audiences
mentary. Though in development since the 1980s, direct them, such as through a mouse, keyboard,
interactive documentaries have recently gained or even a microphone.
attention for their abilities to harness digital Interactive documentaries change how political
technologies, address political issues, and engage messages reach audiences. Instead of just present-
audiences. Judith Aston and Sandra Gaudenzi ing these messages through voiceovers and inter-
founded the Web site, while Arnau Gifreu and views within a linear, time-based construction,
Mandy Rose serve as contributing editors. All interactive documentaries offer the opportunity
four are European scholar-practitioners with to bring audiences into these messages and their
experience in creating interactive documentaries, creation, making them into interactors, collabo-
either independently or within media organiza- rators, and even contributors. For example, in
tions, and in studying them. The Web site receives addition to watching, audiences might click on
support from the Digital Cultures Research Cen- maps or objects, watch short videos, offer com-
ter, which is connected with the University of ments, or even upload content. The ranges of
West England, and with the Pervasive Media Stu- audience experiences expand with the number of
dio, both located in Bristol. options they can pursue, and overall meaning cre-
To encourage discussion of the emerging genre, ation becomes more actively shared. At the same
the i-Docs.org Web site primarily consists of a time, though, the interactive documentary maker
Immersive Journalism 659

loses control over how audiences experience the See Also: Activists and Activism, Digital; Brave
text, and thus how audiences receive the political New Films; Documentaries, Social Media, and Social
messages. Yet, political interactive documentaries Change; Interactive Documentary.
about social issues regularly appear, such as Here
at Home: In Search of the Real Cost of Homeless, Further Readings
GDP, and Bear71 from the National Film Board Endangered Languages Project. http://www.endanger
of Canada. The British Broadcasting Corporation edlanguages.com (Accessed January 2013).
also has an interactive documentary division. Global Lives Project. http://globallives.org (Accessed
Some of i-Docs.org’s posts specifically address January 2013).
interactive documentaries and political questions, Great Primate Handshake. http://www.primate
such as through defining key issues, making inter- handshake.org/about (Accessed January 2013).
active documentaries effective, and determining Journey to the End of Coal. http://www.honkytonk
their impacts. They address not only technologies .fr/index.php/webdoc (Accessed January 2013).
that become part of interactive documentary pro- National Film Board of Canada Interactive
duction, but they also address how people engage Documentaries. http://www.nfb.ca/interactive
with them. For example, one post delves into (Accessed January 2013).
the issues of collaborative production within the
Global Lives project, wherein 10 filmmakers from
around the world record their days. The editing
and other project decisions get made as a group
toward the goal of showing these global realities Immersive Journalism
and hopefully enlightening audiences about dif-
ferences. Another post examines the “docugame,” Immersive journalism is a recently introduced
wherein serious, reality-based subjects become re- alternative form of journalism that allows the
envisioned as interactive games. production and consumption of news in a form
The Web site’s founders also organized two in which people can gain first-person experiences
conferences addressing interactive documentary of the events or a situation described in news sto-
in 2011 and 2012. The 2012 conference built ries. This is achieved by integrating virtual reality
on the 2011 conference in focusing on four key into journalistic stories and by employing various
issues: user participation, space, activism, and technological applications, such as gaming, 3-D
open source technologies. Several presentations audio and video, haptic technology, and digital
addressed the possibilities for interactive docu- avatars. It uses already existing virtual words,
mentaries and political issues, analyzing titles such as Second Life, to create a space in which
such as Journey to the End of Coal, the Endan- news consumers can interact through simulated
gered Languages Project, and The Great Primate environments and activities. The simulation is
Handshake. These presentations addressed the achieved by using head-tracked or head-mounted
reach and effectiveness of these campaigns. The display systems (HMDs), lightweight helmets that
site’s founders anticipate convening another con- cover the eyes and track head movements in order
ference in the future. to create a sensation of having a virtual body in a
Also available is a specially themed issue of the virtual location.
prestigious international journal Studies in Doc- Immersive journalism does not aim solely to
umentary Film. The winter 2012 edition of the present the facts, but rather to create an oppor-
journal offers a wealth of articles discussing prac- tunity to experience the facts. It is inspired by
tical applications of the i-Docs concept as well as the immateriality of digital media, but also by a
presenting original academic research on this and larger, ontological state of being that is luminal,
related themes, which were explored at previous emergent, and transcendent. Immersive journal-
i-Docs symposia. ism appears to its supporters as a profoundly
different way to experience the news, and to
Heather McIntosh understand it in a way that is otherwise impos-
Boston College sible without really being there. This new form
660 Immersive Journalism

of journalism poses a great challenge to the long- an experience in which the user is participating,
established mainstream and traditional journalis- whereas the latter is about playing a game. News
tic practice by promising and envisaging complete games follow gaming protocols in the sense that
user control over the experience of a news story. the player undertakes a task or pursues a goal and
The foundations of immersive journalism lie is constrained by rules, while the progress is mea-
in the idea that the news experience of a person sured by levels or points. On the contrary, a par-
is enhanced by his or her virtual involvement (as ticipant in immersive journalism is involved in an
a digital avatar) in a digitally recreated scenario experience in which he or she is taking part and
representing the news story. This way, the person is affected by events, but may or may not have
transcends his or her news experience as a reader/ the possibility to change a situation following the
viewer/listener/user by his or her evolvement news narrative.
through 3D gaming (video gaming or online vir-
tual worlds) and immersive technologies to a vir- Examples
tual witness/participant in the story, thus creating The most notable and pioneering work on
a sense of “being there” and of direct engagement immersive journalism is undertaken by Nonny
in the news report. This way, news experiencing de la Peña, a U.S. journalist and producer and
enables the participant to have a direct, unmedi- cofounder of Stroome.com (a collaborative video
ated, and first-person experience to the visuals, editing and sharing Web site) and senior research
sounds, feelings, and emotions that accompany fellow in immersive journalism at the University
news reports and documentary films. of Southern California (USC) Annenberg School
Immersive journalism belongs to the various for Communication and Journalism. De la Peña
approaches of interactive presentation of news in integrates the modern technology of virtual real-
which the participant is entering the news scene ity with journalistic stories in order to depict real-
either as himself or herself or as a subject in the life events. Her goal is to go a step beyond the
narrative process of the reporting. He or she can third-party experience of learning about an event
enter the news story as himself or herself as a visi- and allow the public to actually step into the event
tor, gaining first-hand access to a virtual version and participate in it. With her work, she aims to
of the location where the story is occurring, or reinstitute the audience’s emotional involvement
through the perspective of a character depicted in in current news events.
the news story. Some of the most notable immersive journal-
Immersive journalism utilizes video and ism projects include the following:
online gaming platforms as well as virtual envi-
ronments to give a first-person dimension to • The project Gone Gitmo is a virtual
news, documentary, and other nonfiction stories. installation of Guantanamo Bay Prison
Visual and audio primary source material from in Second Life as a collaborative project
the physical world reinforce the concept that between Nonny de la Peña and Peggy
participants are experiencing a nonfiction story, Weil.
with the video, sounds, or photographs acting on • The project Hunger in L.A. developed
the narrative. For example, video that triggers by Nonny de la Peña focuses on calling
at key points in the virtual landscape reminds attention to the growing issue of hun-
a participant that the computer-generated envi- ger in the United States by recreating an
ronment is grounded in the physical world. eyewitness account of a crisis on a food-
Scripted events that create a first-person inter- bank line at the First Unitarian Church.
action with the reporting can also help create • Condition ONE is an immersive video
a feeling of being there. Also, participants can player for the iPad, which allows users to
query or interact with the elements around them simulate being in another environment,
to learn more about the details or context of the not quite virtual, but more a world that
news story. was captured using real video footage
The main difference between immersive jour- from a cameraman’s first-person perspec-
nalism and news games is that the former involves tive (e.g., video footage depicting soldiers
Immigration 661

in battle and the Occupy Movement Pew Research Center found that 72 percent of
protests). Hispanic Internet users are active on social media
sites, while only 58 percent of all American inter-
Dimitra Dimitrakopoulou net users state the same. Similarly, Nielsen’s 2012
Aristotle University of Thessaloniki Hispanic Market Imperative report found that
Hispanic Americans outpace the American aver-
See Also: Avatars; Documentaries, Social Media, age in their engagement with smartphones, social
and Social Change; Interactive Documentary; networking, e-mail, text messaging, online video,
News Media; Second Life; Virtual Environment and television.
Technology, Immersive. While historically, immigrants have typically
consumed media consumed in their home country
Further Readings or in their native language by fellow immigrants,
de la Peña, Nonny, et al. “Immersive Journalism: the Internet has changed this and has encouraged
Immersive Virtual Reality for the First Person immigrants to turn increasingly to the media of
Experience of News.” Presence: Teleoperators and their host country in the form of social networks,
Virtual Environments, v.19/4 (2010). Web sites, and online video. Further, while immi-
de la Peña, Nonny. “Physical World News in Virtual grants have typically primarily formed social ties
Spaces. Representation and Embodiment in with other immigrants until becoming well-estab-
Immersive Nonfiction.” Media Fields Journal, lished in their new home, in the 21st century we
v.3 (2011). are finding immigrants becoming online contacts
Nolan, Sybil. “Journalism Online: The Search for with native-born Americans very readily. Such
Narrative Form in a Multilinear World.” http:// online acquaintances help with language skills
hypertext.rmit.edu.au/dac/papers/Nolan.pdf and cultural proficiency, as well as with political
(Accessed February 2013). awareness and clout.
Immersivejournalism.com. “Immersive Journalism: Hispanics were early adopters in using social
Using Virtual Reality and 3D Environments to media for political activism and vote drives.
Convey the Sights, Sounds, and Feelings of the VotoLatino.com was founded in 2004 (in an
News.” http://www.immersivejournalism.com attempt to defeat George W. Bush’s re-election
(Accessed February 2013). bid) by Maria Terese Kumar, who created the
site on a laptop in a Starbucks coffee shop, with
the goal of organizing voter registration efforts
and encouraging communication among young
Hispanic voters.
Immigration With the help of actress Rosario Dawson,
Kumar sought out Hispanic Americans on
Social media have become important parts of Myspace, which at the time was the most promi-
grassroots activism across many issues, but nent online social network. In the lead-up to the
have been especially transformative in the area 2012 presidential election, social media played
of immigration reform, in part because of their its largest role to date in registering Hispanic
exceptional popularity among immigrants. In voters in support of incumbent Barack Obama.
2006, when immigration reformers gathered for The large turnout rate of Hispanics, and the
a mass demonstration, the message was transmit- inability of the Republican Party to effectively
ted largely by Spanish-language radio announc- outreach to Hispanic Americans, was widely
ers. Seven years later, a similar demonstration was cited as one of the critical factors not only in the
organized by Twitter, e-mail, and text message. 2012 results but is thought that it will influence
Hispanics are not only the fastest-growing presidential elections in the near future. While
group in the United States and the largest immi- there are many reasons for Hispanics to be alien-
grant group, they are—thanks to the population ated by the Republican platform, immigration
growth that makes them younger on average— reform and the anti-immigrant stance of the Tea
the group most likely to use social media. The Party are certainly high on the list.
662 Immigration

In 2009, Latins in Social Media (soon renamed than 100 cities, including a 5,000-person march
LATISM.org) was founded to foster social media across the Brooklyn Bridge.
use, making cultural connections, and enhance The immigrant community and their allies
political awareness in the Latin American com- have also used social media to spread key infor-
munity, including immigrants. The #LATISM mation and identify solutions to community
hashtag is now viewed by more than 1 million problems. Undocumented immigrants use social
people a week on Twitter. media and text messaging to network with
The supporters of the Dream Act include a large friends in order to stay apprised of police check-
number of young and tech-savvy immigrants and points, an increasing danger at a time when
children of immigrants. A small group of undoc- immigration-motivated checkpoints have been
umented students among them formed Dream doubled in some parts of the country; the state
activist.org, which originated as an online discus- of Arizona has even encouraged racial profiling
sion forum for Dream Act supporters and young in its attempt to weed out illegal immigrants.
undocumented immigrants, and has become a Facebook and Twitter are instrumental in the
deft public relations site for the act, highlighting drive to sign students up for the deferred action
individual stories. Journalist and undocumented program for undocumented immigrants and those
Filipino immigrant Jose Antonio Vargas similarly with expired visas, for instance, which results in
founded Defineamerican.com to highlight the a two-year reprieve from deportation. The use of
stories of immigrants and break down the stereo- GPS data of users on platforms like Facebook and
types of the “illegal Mexican.” Foursquare has also been used to provide evidence
of residency and length thereof. Many activists
Organized Movements cite the famous case of Walter Lara, who opened
In May 2013, a 48-hour virtual iMarch on Wash- a Twitter account during his deportation proceed-
ington was held on Twitter in the name of immi- ings in order to reach out to anyone who could
gration reform, resulting in thousands of tweets help. His first tweet was “I am being deported,” in
directed at numerous recipients, for a total of more 2009. A childhood friend started a Facebook page
than 500 million “landings.” The name iMarch organizing help for Lara, who had been brought
was both a play on Apple’s branding (social media to the United States illegally from Argentina by his
being as associated now with iPhones and other parents when he was 3, and was now 25. Over-
mobile devices as with computers) and an invita- night, there were 400 responses offering help and
tion to offer a personal testimonial in support of advice, and Lara soon obtained a year-long depor-
immigration reform. The event was part of a larger tation deferment, which was renewed repeatedly.
effort by Latino activists and allies on both sides Lara was also able to find legal employment.
of the aisle, not only to mobilize their supporters,
but to rally the political leverage of undocumented Political Use
immigrants. Support was tweeted by prominent Politicians also rely on social media to court immi-
political and celebrity allies, including President grant voters. Because the bulk of immigrants living
Obama; Cory Booker, New Jersey senator and in the United States are Hispanic and the Repub-
former mayor of Newark; Arnold Schwarzeneg- lican Party has lost significant amounts of support
ger; and former president Bill Clinton. in the Hispanic community, Democratic candi-
The iMarch was organized by the Michael dates have had greater success. Despite research by
Bloomberg–founded Partnership for a New political scientist George Hawley that found that
American Economy, a New York City–based pro-immigration Republicans fare no better with
immigration reform group. The iMarch pro- Hispanic voters than other Republicans, Republi-
vided a template for targeting members of Con- cans who are part of the bipartisan push for liberal-
gress that the group continues to use. Social ized immigration reform have nevertheless turned
media was again used to organize an in-person to Facebook, Twitter, blogs, and other means to
demonstration later in 2013, when a nationwide network with immigrant groups and promote their
immigration reform rally was held on October alliance. Elsewhere, in districts with large immi-
5, 2013. Demonstrations were held in more grant populations, politicians often make a point
Independent Media Center 663

of noting on Facebook, Twitter, and other social Independent Media


media the celebrations and issues important to
their immigrant constituents, such as celebrating Center
Chinese New Year or observing the anniversary
of India’s independence. In this case, social media November 30, 1999, was one of the birthdays
has extended the tradition of the “photo op,” in of social media and their political uses. Coincid-
which a politician takes a small amount of time ing with protests against a meeting of the World
out of their day in order to make an appearance Trade Organization (WTO) in Seattle, media
connected to a group or issue. activists, community journalists, and alternative
media practitioners came together to start the first
Bill Kte’pi Independent Media Center (IMC, often referred
Independent Scholar to as Indymedia), a collaborative media operation
with the goal to represent demonstrators’ per-
See Also: Advocacy Groups; Arab Spring; spectives and provide a different account of the
Asia; Digital Citizen; Identity Politics; Diaspora/ protests. They created not only a daily newspaper,
Migration; Economic and Social Justice; International a radio broadcast, and video reports, but also a
Intervention; International Unrest and Revolution; Web site that was open for anyone with Internet
Middle East; Race/Ethnicity. access to upload text, images, audio, and video.
Through this open publishing system, not only
Further Readings the media activists at the center, but potentially
Castles, Stephen and Mark J. Miller. The Age of all protesters and concerned citizens could post
Migration, International Population Movements in reports and commentary to a global audience.
the Modern World. New York: Guilford, 2009. And that audience read, watched, and listened:
Fassmann, Heinz, Max Haller, and David Lane, the site registered over one million hits during the
eds. Migration and Mobility in Europe. Trends, days of the protest.
Patterns and Control. Cheltenham, UK: Edward The Indymedia concept rapidly spread around
Elgar, 2009. the globe. A total of 150 local IMCs had been
King, Russell. People on the Move. An Atlas of created by 2004, a global network of citizen
Migration. Berkeley: University of California journalism. Some were national groups, others
Press, 2010. were city based; some were created by coalitions
Kumlin, Staffan and Bo Rothstein. “Questioning of existing alternative media groups, others by
the New Liberal Dilemma: Immigrants, new media geeks; some were set up for reporting
Social Networks, and Institutional Fairness.” large protest events, others for regular local news
Comparative Politics, v.43/1 (October 2010). coverage. Yet, all of the local Web sites included
Moses, Jonathon W. International Migration. an open posting mechanism that allowed mem-
Globalizations, Last Frontier. London: Zeds, 2006. bers of the public to publish their stories, and
Nichols, Bill. Representing Reality. Bloomington: typically featured an open newswire on the right
Indiana University Press, 1991. side of the page. The local groups were con-
Portes, Alejandro, ed. The Economic Sociology of nected through a common set of principles on
Immigration. Essays on Networks, Ethnicity, openness and nonprofit alternative journalism,
and Entrepreneurship. New York: Russell Sage the shared use of technical resources, and the
Foundation, 1995. collaborative ethos of the Free and Open Source
Simmel, Georg. “The Stranger.” In On Individuality Software (FLOSS) movement.
and Social Forms, Donald N. Levine, ed. Chicago: They benefitted from transnational techni-
University of Chicago Press, 1971. cal support, contributed to the global Indyme-
Wallerstein, Immanuell. “After Developmentalism dia Web site that served as aggregator of local
and Globalization, What?” Social Forces, stories, and participated in discussions and deci-
v.83/3 (2005). sion-making structures via network-wide e-mail
Weber, Max Wirtschaft und Gesellschaft, Tübingen, lists. Spanning across a variety of topics, from
Germany: C. C. B. Mohr, 1972. finance to gender, and involving hundreds of
664 Independent Media Center

There were 150 Independent Media Centers around the world by 2004. This banner hanging on a building in Amsterdam in the
Netherlands featured an Indymedia Netherlands Web site address while expressing support for strikers in Oaxaca, Mexico, who
suffered from a violent crackdown by police in summer 2006. The text translates as “Mexico murders/Oaxaca is everywhere.”

IMC activists, these openly archived lists con- experimented with different levels of moderation,
stituted a rich online public sphere and space and if necessary, censorship of their open post-
for complex participatory and democratic deci- ing newswires, leading to more regulated forms
sion making. IMCs also expanded to the offline of openness. Yet, they continued to advocate two
world, for example, by building technical infra- characteristics that became key components of
structure for protest camps and creating public the new citizen journalism sphere: a radical sub-
access points in the middle of demonstrations. jectivity that breaks with the attempts of objec-
Computers and other equipment were shipped tivity and impartiality of traditional journalism,
to partner groups in the global south (e.g., in and is instead explicit about its vantage point;
Latin America and Africa) in practical attempts and a crowd-based journalism that seeks the
to bridge digital divides. truth through a multitude of voices, eyes, and
As an early form, as well as one of the more comments, similar to the practices of open source
politicized versions of civic journalism, the IMC software and Wikipedia.
network was confronted with many of the new In the mid-2000s, the steep rise of Indyme-
challenges of this emerging field. Its open plat- dia was stopped and reversed. Its organizational
form and politically motivated approach led model, based on online exchanges and volun-
to questions regarding its trustworthiness, and teer labor, met increasing challenges; the wave of
opened doors for rumors and false information, transnational protests that had carried the IMCs
and the quality of articles widely varied. Several was in decline, and attacks from hostile govern-
times, government agencies seized IMC servers, ments added pressure. Perhaps most significantly,
demonstrating both the threats and vulnerabili- the rise of commercial social media platforms
ties of open online platforms. In response, IMCs provided new opportunities for users to post their
Indexoncensorship.org 665

stories and eclipsed Indymedia as the platform Indexoncensorship.org


of protest and user-generated content. A new
generation of activists now posts their videos to Indexoncensorship.org is a Web site for a publishing
YouTube, stories are shared on Facebook, and and campaigning nonprofit organization dedicated
pictures are posted on Flickr. Some local IMCs to promotion of freedom of expression around the
continue successfully, some are idle, and some world. Index on Censorship was founded in 1972
have closed. in London as a quarterly magazine with a circula-
Despite its uncertain future, the IMC has been tion of 10,000 by poet and critic Stephen Spender.
significant as a starting point for online citizen At its inception, the magazine provided space for
journalism, an early experiment of social media dissident writers and thinkers from the other side
and a milestone toward Web 2.0—without the of the Iron Curtain to publish their work and voice
startup capital of the more recent social media their opinions. Focused on the issue of global free-
enterprises, and organized in a decentralized, dom of expression, the organization monitors and
democratic way. It served as a key example for reports all forms of free speech violations around
crowd-based peer production of content, and the world, including political, literary, religious,
it has been one of the most prominent cases of sexual, and ethnically motivated censorship and
Internet use by social and political activists. As silencing. Among the original goals of the organiza-
a global hub of alternative media, it challenged tion was to publish censored and “unpublishable”
established mainstream media at an unprec- literature. At different points of time, the Index
edented scale, and it built bridges between cit- on Censorship published underground newsletters
izen-based old and new media practices, from from Tehran in Iranian Bulletins, short stories by
community radio and video documentaries to Russian writer and dissident Alexandr Solzhenit-
online innovations. syn, prose by Burmese political activist Aung San
The IMC’s decline highlights the challenges to Suu Kyi, and commentary by controversial British
collectivist alternative media by new and more Indian writer Salman Rushdie. The magazine also
individualist forms of social media, but also the extensively covers instances of censorship in the
successful mainstreaming of the classic goal of cinema, visual arts, and music.
alternative media—to turn the consumer into a The magazine is published in three languages:
producer. As concerns over online surveillance English, Russian, and Arabic. Russian publication
and the filtering practices of social media compa- Dosie na Cenzuru was launched in 1997 with the
nies are increasing, the IMC serves as a reminder financial support of Index on Censorship and the
that nonprofit models of social networking based Glasnost Defense Foundation, a Moscow-based
on anonymity and user privacy are possible. human rights nongovernmental organization. Ini-
tially, Index on Censorship provided some of the
Arne Hintz copy for the Russian edition, but the two publi-
Cardiff University cations now operate independently. Currently, an
Arabic language edition of Index on Censorship
See Also: Activists and Activism, Digital; Content is in the works.
Communities; 18daysinegypt.com; Feb 17 voices; The organizations’ Web site was initially
Seattle 1999 WTO Protests. launched in 1997 as a blog, and relaunched in
2000 as a full-fledged online platform to sup-
Further Readings port Index on Censorship’s print publication
Downing, John D. H. Encyclopedia of Social and extend the organization’s online presence.
Movement Media. Thousand Oaks, CA: The Web site serves as a hub for all of organiza-
Sage, 2011. tion’s reporting and campaigning activities, and
Howard, Philip N. The Digital Origins of hosts all of Index on Censorship’s writing, includ-
Dictatorship and Democracy. Oxford, UK: Oxford ing some content from their quarterly magazine
University Press, 2010. Index on Censorship published by Sage, such as
Independent Media Center. https://indymedia.org/or/ originally commissioned articles, news reports,
index.shtml (Accessed August 2013). analyses, commentaries, and blogs on free
666 Indexoncensorship.org

expression issues. The content is organized by Amnesty International for coverage of media
geographic region, covering Africa, the Americas, reform in Russia.
Asia Pacific, Europe, the Middle East, and north Closely associated with the charitable work of
Africa and around free expression issues such as the Writers and Scholars Educational Trust, Index
access to freedom of expression, authoritarian on Censorship is actively involved in campaigns
states that attack freedom of expression, freedom and advocacy efforts in defense of free expres-
of expression in the digital world, challenges to sion. Index hosts an annual Freedom of Expres-
freedom of expression in democratic societies, sion Awards, organizes debates in universities,
and challenges for free speech created by religious and implements training programs for media
and cultural beliefs. workers to teach monitoring, publishing, training,
Index on Censorship also publishes Index and advocacy in freedom of expression in Africa,
Index, a country-by-country chronicle of free Central Asia, Eastern Europe, and the Middle
speech violations. Part of the publication from its East. For this reason, the organization’s Web site
inception, Index Index presents a summary of free dedicates a significant portion of its space to cam-
speech–related news items from nearly 100 nations paigning and advocating for different aspects of
monitored by Index on Censorship. In addition, freedom of expression around the world.
indexoncensorship.org has a searchable database An active member of the Global Network Initia-
of reports, commentaries, and analyses on issues tive, Index on Censorship also champions Internet
of expression that goes back as far as 1997. For and social media freedom. Index on Censorship
example, the Web site carries an extensive archive CEO Kirsty Hughes is known for harshly criticiz-
of coverage of protests and subsequent arrests of ing the UK’s proposed regulations of news-related
the controversial punk rock band Pussy Riot in blogs on the Internet, arguing that it introduces a
Russia, attacks on freedom of expression in Iran, layer of undesirable political control on free expres-
controversy surrounding the publication of a car- sion in the digital world. Other current campaigns
toon depicting Muhammad by Danish newspaper include the Libel Reform Campaign, advocating
Jyllands-Posten, and many landmark cases from for free expression in Tunisia, Bahrain, Burma, and
around the world on Internet censorship. Azerbaijan, and campaigning against censorship in
Index on Censorship is not just a magazine and Europe’s last dictatorship, Belarus.
a Web site. Combining traditional journalism and
campaigning practices, the organization uses its Anna Klyueva
magazine Index on Censorship and online pub- University of Oregon
lication indexoncensorship.org to create a “noise
of publicity” around issues that threaten freedom See Also: Nongovernmental Organizations;
of expression and create censorship and oppres- Nonprofit Organizations; Reporters Committee for
sion for journalists, writers, social media users, Freedom of the Press; World Press Freedom Index.
bloggers, artists, politicians, scientists, academ-
ics, activists, and citizens. This is done through Further Readings
extensive reporting, first-hand accounts, analyses, Berens, C. “Index on Censorship-Minority Rights:
and commentary. In this way, Index on Censor- Overview.” In Encyclopedia of Human Rights,
ship and indexoncensorship.org provide space D. Forsythe, ed. New York: Oxford University
for stories that do not receive adequate atten- Press, 2009.
tion in the mainstream international media and a Index on Censorship. http://www.indexoncensorship
forum for creative thought and action in defense .org (Accessed August 2013).
of free speech. For example, in the 1990s, Index Smith, S. A. “Index on Censorship: British Magazine
on Censorship was among the first to report on Founded in 1972.” In Censorship: A World
fatal attacks against Russian journalists, which Encyclopedia, D. Jones, ed. London: Fitzroy
attracted the much-needed international atten- Dearborn Publishers, 2000.
tion and resources to combat the matter. As a Webb, W. L. and R. Bell. An Embarrassment of
result of its extraordinary efforts, in 2008, Index Tyrannies: Twenty-Five Years of Index on
on Censorship magazine received an award from Censorship. London: Gollancz, 1997.
India 667

India The legislature, executive, judiciary, and press


are the four pillars of Indian democracy. Article
India is a culturally diverse country. Diversity of 19 (A) of Indian Constitution provides freedom of
the people exists at many levels, including: geo- expression to its citizens, with some restrictions.
graphical location, language and dialect, socio- Both public and private media organizations in
cultural patterns and practice, and socioeconomic India play important roles in information dissemi-
and education status. India is the second-most nation. After economic liberation in 1990, the
populous country in the world, with a higher Indian market is open for foreign channels and
percentage of youngsters. Diversity makes Indian private organizations. In recent years, the Indian
culture different from other cultures. Sometimes, media industry has shown progress, and analysts
this creates social imbalance and unrest, which claim that it will grow quickly in the coming years.
not only affects the basic social order, but also
overall growth. Social media are the popular Social Media
media among youth. Like other countries, social In India, social media have emerged as medi-
media in India are gradually affecting sociopo- ums of the masses in the last two to three years.
litical selection and the political system. People They have played an important role in recent
belonging to the 15 to 35 age group take part in protests and have depicted social unrest. Social
social media conversations and write what they media were used in mobilizing people, mostly
think about issues. People’s views reflect the social youth, in the anticorruption movement in 2011
condition of the society. In the last two years, and 2012. The anticorruption movement, mobi-
people have shared their anger and frustration in lized by social media, was started in the wake of
the form of debates, conversations, and messages two major political scams: the Commonwealth
on Web sites, converting into protests on roads Games in New Delhi, and the allocation of cell
against the political class and governing system. phone licenses. Around 12 million people regis-
India is a democratic country, and follows a tered their support for the cause. The movement
political setup that allows the citizens of India to was started under the leadership of Anna Haz-
elect the government, a federal government. The are, a 72-year-old activist. Their demand was to
central government has greater power in com- bring the Jan lokpal bill (Citizens Ombudsman
parison to states. India has 35 states, including Bill) to remove corruption from Indian political
seven union territories. These states show much and governing system. This was a revolutionary
diversity in their sociopolitical, geographical, and change in the history of protests in India, when
cultural setup. They have different political agen- thousands of people gathered to show their anger
das, which create differences between central gov- and frustration against political corruption and a
ernment policies and state priorities. At present, faulty system.
the United Progressive Alliance (UPA) is in power; India witnessed another public revolt mobi-
this is the second term of the UPA. India is wit- lized by social media in December 2012. This pro-
nessing major changes and challenges in its politi- test was against gang rape in New Delhi. People
cal setup and system. Regional politics are more demanded strong laws to punish the culprits and
effective and altering national politics. This new to give full protection to women by improving the
trend has given birth to coalition politics in India. system. People expressed their anger by writing
A coalition government has been in place in India on social media Web sites and blogs. Organizers
since 1995, and has weakened the sociopolitical of the protest used social media as tools to mobi-
and governing system. It has created imbalances lize people and to garner their support.
in power and has expanded differences between India is a big market for Internet and mobile
central and state governments. Corruption, pov- phone users. According to a report of the Inter-
erty, high prices, and unemployment are the major net and Mobile Association of India (IAMAI)
problems that common people are facing while and Indian Market Research Bureau (IMRB),
communal violence, terrorism, and casteism are the number of social media users in urban India
some of the major issues affecting the integrity reached 62 million by December 2012, and it
and security of India. was estimated to reach 66 million by June 2013.
668 India

Facebook, Twitter, and YouTube are commonly After this incident, the government is planning
used social media network sites in India, apart to make policies for social media. As a democratic
from a large number of people who also write country, regulation will be difficult. In India, pub-
blogs. Generally, those in the 15-to-35-year-old lic broadcasting services are run by the govern-
age group use social media on a daily basis. ment and work as a mouthpiece of government,
Unlike other countries, social media are not while it has been observed that private or main-
popular, and are not used very effectively by stream media work mostly on selected agenda’s
political parties for obtaining votes in elections and for monetary and business gains. Social media
or to keep people updated and informed about have given voice to the common people and are
different government policies and programs. not biased. People feel empowered by expressing
Few politicians and representatives of political their views and opinions on social media.
parties are active on social media Web sites like To control cybercrime and cyberbullying,
Facebook and microblogging network Twitter. India passed the Information Technology (IT)
After recent agitations and protests mobilized Act in 2000. It was passed again by Lok Sabha
by social media, the government has realized the (the parliamentary body) in 2008, after amend-
potential of social media and planning to include ments were made to the original act. Some of the
them in their outreach activities and to use them
to reach to the people. Certain political parties
have social media cells, which they use to write
against rival parties.
In 2012, there was an ethnic conflict in India’s
northeast state of Assam. The conflict erupted
between two communities, the Bodo native
tribe of Assam and Muslims. According to news
sources, most of the Muslims living in Assam are
migrants from neighboring Bangladesh. Com-
munal violence erupted after the murder of three
Bodos by Muslims. For retaliation, both the par-
ties started killing people; and from fear, thou-
sands of people left their villages and homes and
took shelter in refugee camps.
The Muslim community living in other parts
of the country opposed the killing of Muslims
in Assam, and started protests in major cities of
India. Some of the protests turned violent and
killed civilians. Northeast people living in other
parts of the country received threat messages
through social media. Doctored messages and
images were sent through social media to provoke
people to take revenge against northeast people.
In reaction, thousands of northeast people started
going back to their home states. This mass exodus
created panic, fear, and chaos. The government
banned Facebook, YouTube, and other social
media Web sites, and blamed Pakistan for upload-
ing and sending doctored images and messages to
provoke people and create communal tension. In
this incident, social media was used to disturb the A student protester climbs a lamppost during a protest against
communal harmony, law and order, and sociopo- the 2012 gang rape case and violence against women on
litical system in India. December 22, 2012, in New Delhi, India.
Indonesia 669

sections of the IT Act 2008 are implemented to Indonesia


control and filter out social media content. Sec-
tion 69 of the IT Act empowers the central gov- The Republic of Indonesia is a diverse country
ernment/state government to intercept, monitor, located near the equator between the Indian
or decrypt any information generated, transmit- and Pacific oceans in southeast Asia. Indonesia
ted, received, or stored in any computer resource is an archipelago with over 17,000 islands, of
if it is in the interest of the sovereignty or integ- which 5,000 to 6,000 are inhabited. There are 34
rity of India, defense of India, security of the provinces. With around 240 million people, it is
state, friendly relations with foreign states, pub- ranked the fourth most populated country in the
lic order, for preventing incitement to the com- world after China, India, and the United States.
mission of any cognizable offence, or for investi- Indonesia also ranks as one of the largest democ-
gation of any offense. racies in the world.
In time, people in India will use technologically Between 80 and 90 percent of the population
updated communication devices and advanced self-identifies as Muslim, which makes Indonesia
information-sharing networks and platforms. the largest Muslim-majority country in the world.
Different political sections are mapping existing It has almost 13 percent of the world’s Muslims.
possibilities of social media to reach urban youth Indonesia is within the top 20 of the world’s econ-
and attain their votes in parliamentary elections omies for gross domestic product (purchasing
in 2014. The ruling party and opposition in the power parity), but is still often called a developing
center are also looking at different options for country because of challenges related to poverty,
utilizing social media to make their presence unemployment, infrastructure, political and eco-
on social media Web sites to counter political nomic instability, corruption, public health, edu-
propaganda. Social media connect people and cation, and the environment.
keep them updated; they start a thought process. One particular area of rapid growth and devel-
Open dialogues motivate people to think differ- opment, however, is communication technology.
ently—this initially creates a feeling of unrest Indonesia is currently experiencing a “digital
and frustration, but brings major changes. In jump,” whereby the country’s population is shift-
India, social media will help in bringing changes ing from the building of traditional infrastructure,
to the political and governing system. such as telephone landlines, to mobile devices.
Close to 40 million Indonesians use a mainline
Swati Bute telephone, while mobile phone penetration is
Amity University close to 100 percent, and is expected to surpass
that percentage within the next few years. Hav-
See Also: Asia; Blogs; Economic and Social Justice; ing a phone does not necessarily mean full access
Education, Issues in; Political Parties; Poverty; to the Internet, though. Statistics vary, but esti-
Unemployment. mates are that from 45 to 50 million, or around
20 percent of Indonesians, are Internet users.
Further Readings These numbers are expected to surge as more
Baym, Nancy K. Personal Connections in the Digital mobile devices offer online access and companies
Age: Digital Media and Society Series. London: provide more affordable communication options.
Polity, 2010. This phenomenon has significant implications for
Morozov, Evgeny. The Net Delusion: The Dark social networking, business, and politics.
Side of Internet Freedom. New York: Public The Indonesian telecommunication industry is
Affairs, 2013. very competitive. The three major telecommuni-
“Social Media Users in Urban India to Reach 66 cation companies in Indonesia are Telkom (semi-
Million by June 2013.” Economic Times (March privatized, majority-state owned), Indosat (par-
12, 2013). http://articles.economictimes.indiatimes tially state owned, mostly foreign shares), and
.com/2013-03-12/news/37651511_1_social XL Axiata (privatized and foreign sharehold-
-media-active-internet-users-internet-and-mobile ings included). There are also other smaller tele-
-association (Accessed April 2013). communication competitors in the sector. Since
670 Indonesia

1999, deregulation and strong market rivalries entertainment, business (e.g., brands), and poli-
have contributed to affordable mobile services tics (e.g., mobilization, critics, and education).
and contracts for many Indonesians. Inexpensive
phones or handsets, especially from China, facili- Social Networking
tate mobile access. Personal computers are not as Indonesians use both Facebook and Twitter to
common as mobile devices. All of the telecommu- connect with their family, friends, acquaintances,
nication companies pay close attention to price and coworkers. Both platforms provide users
points, network coverage, call quality, and speed the ability to update one’s community about a
to stay competitive and avoid losing their share range of topics and personal interests. Examples
of the market. Telkom currently holds between include everyday behavior, special events, hob-
50 and 60 percent of the market share, while bies, travels, sports, celebrities, television shows
Indosat and XL Axiata are more closely matched or movies, music, religion, political preferences,
around 20 percent each, and retain the remaining current news, and questions or requests for assis-
market share. tance. Indonesians tend to use Facebook and
Most mobile device and Internet users are Twitter to keep in touch, share memories, learn
young, under 40 years old. The overwhelming new things, promote oneself, maintain friend-
majority of mobile phone customers use prepaid ships, and have fun.
or “pay-as-you-go” services, especially among Facebook users can create profiles, upload
the 15-to-20-year-old set. There is high prefer- photos, list contact details, send private or public
ence for free to use services like chat applications messages, chat in real time, create or join groups,
and low-cost options like texting. This preference link to other Web sites, play games, and show
has led to the popularity of Research in Motion’s support for others by clicking “like” on a post or
Blackberry brand. While Blackberry use has sig- page, signing a petition or some other action item,
nificantly declined in other parts of the world, and sharing or forwarding material to others in
Indonesian customers continue to be loyal to the their online networks. Twitter has less variety
brand. The youth market is also quick to adopt than Facebook regarding program functions; it
or experiment with new services and applications. primarily focuses on brief commentary and build-
This openness has translated into high rates of ing a following, or subscribers, to a particular
social media usage. Analysts anticipate these rates person’s account. Twitter users can update their
to increase further as more Web-enabled phone profiles with their mobile phones via text messag-
plan options enter the market. ing or special applications on select smartphones.
The most popular platforms for social media in
Indonesia today are Facebook and Twitter. Indo- Business
nesia consistently makes the top-five list for most Indonesian entrepreneurs and businesses utilize
Facebook users globally. At last count, over 47 social media to build and advertise their brands.
million Indonesians were active Facebook users. Large businesses such as Yamaha Motor Indo-
Indonesia is also one of the top-five countries for nesia, Surfer Girl, Blackberry Indonesia, Choco-
Twitter, with around 29 million users. Jakarta, the latos, and Axe Indonesia each have between 1
capital of Indonesia, recently ranked number one and 3 million Facebook fans. These companies
on a list of the top-20 cities in the world by num- post information about their products, spon-
ber of posted tweets. Online media monitoring sor contests, experiment with applications, and
companies such as Brand24, Semiocast, Social- encourage interaction with consumers by solic-
bakers, and Mediabistro have found that Twitter iting comments, photos, and videos. Occasion-
users in Jakarta posted more than two percent ally, Facebook users will post a criticism or con-
of the 10.6 billion public tweets posted world- cern, which may or may not be addressed by
wide. Bandung, another sizeable metropolitan the company. Depending on the company and
area in Indonesia, ranked number six worldwide type of campaign, there may be cross-postings
for posted tweets. The social media landscape in or overlap between Facebook and Twitter. Busi-
Indonesia can be divided into three main subject nesses of all sizes adapt to their consumer base’s
areas: social networking or communication and demographic backgrounds. They emphasize
Indonesia 671

culturally and linguistically appropriate con- along with YouTube to post videos of official
tent. For instance, many brands make a point to meetings in an effort to demonstrate government
observe religious holidays. They also self-censor transparency. While some analysts attribute Joko
their quotes and pictures to fall within expected Widodo’s success to a unique, tech-savvy media
norms or boundaries. campaign, tracing a causal relationship between
While brands are able to spread the word about being a “fan” of political candidates or parties on
their identities and products via social media, Facebook or following them on Twitter and actu-
there are obstacles for converting such public- ally winning office is still relatively tenuous.
ity into profits. Indonesia is still predominantly While there appear to be several benefits from
a cash-based economy. Limited credit card usage social media in Indonesia, there may also be dis-
and online bank accounts make it hard for indi- advantages. As with any new technology, much
viduals and businesses to make financial trans- depends on who is using the medium and for what
actions easily or regularly via mobile phones. purpose. Scientists do not yet know the precise
Although e-commerce is still in its infancy in the boundaries or limits of virtual movements. People
country, there are firms interested in identify- do not necessarily have a clear picture of how to
ing growth opportunities. Test markets in other translate discussions via social media into real
developing countries suggest that online retail policies, reforms, or political participation, like
and microtransaction markets could be possible voting and protests. Facebook and Twitter users
and potentially lucrative in Indonesia. may also be self-presenting in “biased” ways,
which could obstruct change, progress, or democ-
Politics racy. Furthermore, quantitative and qualitative
Indonesians make use of social media for political data are currently limited about issues such as
purposes. Topics covered on Facebook and Twit- illegal activities, culturally sensitive material, and
ter include public policy debates, social causes, possible or actual security breaches and threats.
campaigns, and elections at the local, provincial, As businesses, governments, and researchers con-
and national levels. Political candidates and par- tinue to explore and analyze the development and
ties, nonprofit organizations, activist groups, and use of social media, it will become more evident
others are increasingly turning to social media to how and to what extent mobile devices and the
disseminate information, educate, critique, and Internet are helping or hindering the nation’s
mobilize Indonesian “netizens.” Facebook and people and institutions. As more research think
Twitter are often perceived as public platforms tanks and online or social media monitoring firms
for free speech, deliberation, and possible activ- emerge and grow, social scientists will be in a bet-
ism. Underrepresented and marginalized groups ter position to accurately and efficiently measure
such as women and lesbian, gay, bisexual, and Indonesian public opinion, political behavior, eco-
transsexual communities have used social media nomic matters, and cultural shifts in the future.
to combat prejudice and discrimination and gen-
erate solidarity. Social media has also been used Jennifer Epley
to facilitate government accountability. In early Texas A&M University, Corpus Christi
2012, for example, the Indonesian Students Asso-
ciation turned to Facebook and Twitter to report See Also: Asia; Facebook; Mobile Connectivity,
on the perceived financial waste of certain law- Trends in Politics and; Twitter.
makers who went shopping in Berlin. There was
a public outcry about using government business Further Readings
as an excuse for a paid holiday vacation. Central Intelligence Agency. “Indonesia.” The World
Politicians also make use of social media. Joko Factbook. https://www.cia.gov/library/publications/
Widodo used Facebook heavily during the Sep- the-world-factbook/geos/id.html (Accessed
tember 2012 gubernatorial elections in Jakarta. February 2013).
His strategy involved online posts and commen- Global Business Guide Indonesia. “An Overview of
tary, a music video, and organizing a flash mob. Indonesia’s Telecommunication Sector.” http://
He continues to use Facebook after winning, www.gbgindonesia.com/en/services/article/2012/
672 Inferring Sentiment

an_overview_of_indonesia_s_telecommunication_ as regional sentiment toward the 2009 hotel


sector.php (Accessed April 2013). bombings in Jakarta. In the political arena, sen-
Inside Indonesia. “New Social Media as a Tool for timent analysis is on its way to becoming a rou-
Activism—Edition 110: Oct–Dec 2012.” http:// tine and necessary feature of a variety of politi-
www.insideindonesia.org/feature-editions/past cal endeavors. User-generated text in political
-editions/edition-110-oct-dec-2012 (Accessed and news blogs and posts to news forums and
February 2013). politically oriented Web sites provide a plethora
Telkom. “Overview of Telecom Industry in of data sources for inferring sentiments about
Indonesia—Annual Report Telkom 2009.” political positions, candidates, and policies.
http://www.telkom.co.id/UHI/assets/pdf/EN/03_ The use of social media analysis by President
Overview%20of%20Telecom%20Industry%20 Obama’s re-election campaign has been credited
in%20Indonesia.pdf (Accessed April 2013). with providing him with a critical advantage
over his opponents. Sentiment analysis then can
be used to discern such things as what constitu-
ents desire, what legislation or social policies are
likely to be supported by the general public, and
Inferring Sentiment public reaction to how policies are framed and
how politicians present themselves.
In 2006, Google developed quality scores to quan- A critical component of success for businesses
tify the degree to which their search engine was these days is the utilization of sentiment analy-
meeting users’ needs. This is believed to have been sis to monitor consumer preferences and product
the first step toward the application of sentiment reviews offered online because of the potential
analysis to social media. Inferring sentiment is the impact that such independent evaluations of their
systematic analysis of social media content, such products could have, given the unprecedented
as the text of blogs and forum posts, in order to number of people from around the world who
discern the attitudes expressed in them. As a rela- can readily access such reviews. As with con-
tively new endeavor, methods for inferring senti- sumer product reviews, social media allow for the
ment from social media continue to evolve. In its possible inclusion of everyone’s sentiments about
simplest form, sentiment is inferred from the num- political policies and candidates. The potential
ber of positive and negative expressions in selected circulation of such sentiments to a wide audience,
online user-generated texts addressing specific outside of the control of politicians and their
matters of interest, such as the viability of a politi- carefully crafted messages, means that politicians
cal idea or the likability of a political candidate. might do well to follow the lead of businesses
Positive and negative sentiments are determined in assessing and monitoring such sentiments in
using generic lists of positive and negative words order to keep abreast of how their constituents,
or lists of words and phrases developed specifi- opponents, and the general public are responding
cally for particular content areas. Other filtering to dynamic political developments. The reverse is
mechanisms and machine learning processes are possible as well. Readily available political wid-
also employed to differentiate positive and nega- gets track candidate sentiments on many topics,
tive sentiments from neutral and unrelated text including controversial social issues, domestic
and to discern sarcasm, casual language, and other and foreign affairs, and military involvement and
language complexities that increase error. Typi- budget allocations.
cally, the goal of sentiment analysis is to gauge
aggregate sentiment. Benefits and Challenges
Inferring sentiment from social media content The benefits of inferring sentiment from Internet
is becoming a highly valued and widely used content in comparison to traditional opinion poll-
resource. Businesses are prolific users of senti- ing include its low cost, the availability of vast
ment analysis, and intelligence agencies have amounts of diverse Internet content to analyze,
used sentiment analysis to identify action plans and the speed with which such analysis can be
of extremists and to help determine such things accomplished. Sentiment analysis can also capture
Influence on Elections 673

how aggregate sentiments evolve over time, and Influence on Elections


dramatic changes in sentiment because of unfold-
ing events, with sentiment results generated as In a democracy, elections are the moment in which
they happen. citizens, through the vote, declare their consent to
Challenges with sentiment analysis are the sub- a candidate, political party, or even a whole polit-
ject of much current research. One problem with ical system. They can also declare opposition to
inferring sentiment from social media content is those, for example, through abstention, or what
that people self-select themselves for participation political scholars call the “protest vote.” For this
by deciding to post their views online, and people reason, issues about the influence of social media
with more extreme views are more likely to posts on election turnout need to be discussed in the
their thoughts. Moreover, people often vary their framework of media and social theories.
posts based on the audience of a particular venue They assign to social media a specific impor-
and based on what others have already posted tance for the democratic process, because they
on that venue about the subject. The difficulty in are mediated public spaces for the exchange
sampling Internet content in a manner that effec- of information, constitution of relationships,
tively attends to representativeness is a weakness expression of thought and organization among
of sentiment analysis. Despite these challenges, citizens, and serve political or civic purposes.
inferring sentiment from social media content is Therefore, asking questions about social media
likely to expand, and even more sophisticated influence on elections also implies taking into
questions about what people think and feel are account theories concerning the deeper process
likely to be addressed. The systematic mining of of building consent, which is specific to political
sentiment in social media has just begun. and social studies.
The focus of those studies is on the construc-
Mel Moore tion of relations between political representatives
University of Northern Colorado and citizens, also in social media environments,
in a context of ideological dealignment, perma-
See Also: Data Mining; Internet Forums; Pioneers nent campaigns, and disintermediation processes.
in Social Media and Politics; Polling; Proxy In addition to that, an account of the most recent
Measurements; Sentiment Analysis. electoral campaigns’ practices through social
media will be necessary. Since the earliest studies
Further Readings about social media’s role in the electoral process
Das, Sanjiv R. and Mike Y. Chen. “Yahoo! For (around the first half of 1990s), much attention
Amazon: Sentiment Extraction From Small Talk on has been paid to the efficacy of Internet-based
the Web.” Management Science, v.53/9 (2007). electoral campaigns, especially on the possibili-
Glass, Kristin and Richard Colbaugh. “Estimating ties of translating corporate marketing strategies
the Sentiment of Social Media Content for Security into the political domain. This perspective helps
Informatics Applications.” Security Informatics, to highlight the horizontal logic behind social
v.1/3 (2012). media and the possibilities to mobilize users for
Mullen, Tony and Robert Malouf. “Taking Sides: political action, evaluate the performance of the
User Classification for Informal Online Political campaign, and predict electoral turnout.
Discourse.” Internet Research, v.18 (2008).
O’Connor, Brendan, et al. “From Tweets to Polls: Political Activism
Linking Text Sentiment to Public Opinion Despite what many have been claiming about the
Time Series.” Proceedings of the International “Internet elections” or “social media elections”
Association for the Advancement of Artificial since 2000, data from advanced democracies’
Intelligence Conference on Weblogs and Social elections show an increasing, but still marginal
Media, Washington, DC, 2010. diffusion of Internet and social media usage by
Pang, Bo and Lillian Lee. “Opinion Mining and citizens who are seeking information about the
Sentiment Analysis.” Foundations and Trends in candidates or engaging in online discussions
Information Retrieval, v.2/1–2 (2008). about politics and electoral campaigns. For
674 Influence on Elections

example, during the last U.S. presidential elec- known as Arab Spring is a perfect example of
tions campaign, which saw the broadest digital the need to cross the boundaries of disciplines
activism ever seen, 39 percent of the American to better understand the phenomenon of online
adult population used social media to conduct activism and its relationship with offline activism.
at least one political or civic activity. The prob- Media and political scholars are both facing the
lem is that those activities widely vary in their challenge of new trends in political participation
importance for the public debate and in levels and democratization.
of engagement needed, from clicktivism, which One can use expressions such as “networked
identifies the simple “like” or “follow” in social politics” or “digital democracy” to point out the
networking sites, to digital activism repertoire possibilities of social media for democratic func-
and more traditional ways of participating trans- tioning, also concerning elections. The democratic
posed online, such as signing petitions and active value of social media is controversial, and it is a
campaigning (encouraging people to vote and current convention to divide positions into cyber-
organizing groups and meetings). optimistic and cyberpessimistic (or cyberskeptic)
International surveys highlight instead that accounts. Cyberoptimists describe the Internet as
social media and the Internet are only a part, having high democratic potential because it pro-
even if increasingly consistent, of overall media vides more access to information and a space to
consumption. Social media are not a world apart express opinions, which in a deliberative democ-
from real life: they are embedded in everyday life racy perspective is believed to be positively linked
activities and other media, like television. Media
scholars talk about the “mediascape” or “media-
sphere” when referring to the complex interre-
lations among all media and between them and
the overall culture—the shared collective values,
practices, and images—of a nation (or even the
world). For that reason, it would be very hard to
isolate the power or the influence of social media
on electoral behavior or on elections, as much as
it would be for any other medium. The tempta-
tion to assign media a power of direct influence
upon opinions and behaviors is old, but it has
never been proven. On the contrary, media have
a role in the day-by-day construction of opin-
ions and consent, played in their interaction with
the social, institutional, political, economic, and
cultural context of each person. Thus, studying
media and social media’s influence on elections
means taking into account all of the variables in
play, in each country, at every moment.
At the same time, data from several studies
point out that online political activism (however
it is defined and articulated) does not necessar-
ily overcome or replace offline activism, and it is
still unclear whether or not the former can posi-
tively influence the latter. Scholars and media pro-
fessionals are constantly trying to detect cases of
online activism to vouch for social media’s role A man takes pictures with an iPhone while using an iPad to
in participation in democratic processes, not display a collection of photographs of the Mubarak regime’s
only during electoral campaigns. The north Afri- brutality during a January 29, 2011, march held in San
can and Middle East uprising in 2010 and 2011 Francisco, California, in solidarity with the Egyptian uprising.
Influence on Elections 675

to a healthy and active engagement in public issues. political marketing helps to understand media’s,
Cyberpessimists emphasize what they consider the and in this case social media’s, role in the political
dark side of the Internet, apparently neverending process.
memory, winking to the Orwellian Big Brother
when describing the surveillance society and the Influence on Electoral Campaigns
perils for privacy. It is now commonly accepted Social media’s influence on elections can be read
and confirmed by data that social media can rein- from the point of view of electoral campaign
force involvement in political and civic affairs in organizers. Social media are contributing to the
subjects who are already involved in public life; design and creation of contemporary campaign-
however, social media is not the real engine for ing repertoire, as the proliferation of digital, new
new involvement. media, or social media divisions of electoral com-
The interest in analyzing public engage- mittees suggests (at least in the United States, the
ment, and its role in democracy’s health, has to United Kingdom, and more recently in France).
be contextualized in a situation typical of most When facing social media environments, cam-
advanced democracies, in which political legiti- paigners first tried to import expertise, methods,
macy is undermined and needs are continuously and techniques from public relations and corpo-
reaffirmed. Abstention is increasing, in parallel rate marketing. The result has been a combination
with a trend that assigns to oligarchies the role of tools with a specific orientation to create rela-
of managing political decisions. Voters are no tionships between candidate and citizens, involve
longer tied to ideological belonging and party them, and promote their action and mobilization
membership. Media have a specific role in influ- through social networking practices.
encing political communication practices through It can be useful then to read the complexity of a
offering a mainstream popular culture imagina- campaign through the lens of political marketing.
tion, specific in each country, but with some com- Political marketing has been defined as the use of
mon elements, in a videocracy. Political scholars marketing strategies, philosophies, and tools by
use the term dealignment to identify the process political parties to raise interest and consent from
of disanchorage of voters from historical party voters. The four “Ps” of the corporate marketing
belonging, which produces relatively new catego- mix can be applied to the political realm as fol-
ries of floating subjects such as “the young,” “the lows: the product is the party, or the candidate, or
non-voters,” and “the disappointed,” who have even the policy that is to be sold; promotion and
to be persuaded to vote each time. place concern all communicational and organiza-
The media influence this process of dealign- tional aspects of a campaign; last, the price is the
ment, building new forms of relationships among vote, which is given in exchange for the promises
politicians and the electorate, which appear more made by parties and leaders about what they are
direct and disintermediated. Disintermediation is going to do when elected.
the answer to a political demand from citizens, In this framework, social media may influence
who are asking to bypass the traditional interme- electoral campaigns by working on the first of
diaries in public affairs, first of all political parties the marketing mix, the product. In the construc-
and unions. Social media seem to particularly fit tion of the message, social media and new media
in this model of relationship, and they contributed in general can be used as a symbol for an alter-
to build it: Through them, citizens can directly native style of communication, in opposition to
dialogue with politicians and other citizens easier traditional media outlets, and this opposition
than before. Media are also influencing the politi- can in turn conceptually be linked to alternative
cal context by setting up standards to evaluate political methods, far from the centers of power
political performance, and scholars have pointed and institutional rigidity, closer to common peo-
out that those standards are closely related to ple’s real lives and spontaneity. This link lies on a
those for choosing products to purchase. Some sort of ideological position, claiming the Internet
call “Americanization” the process of translating as providing a nonmediated space and resources
every aspects of life, including politics, in terms for direct democracy, as in ancient Greece. How-
of consumption. That is why the perspective of ever, despite the rhetorical use of social media
676 Influence on Elections

for electoral purposes, on many occasions, the strategy, and reach potential voters through a
Internet truly represented the only available plat- mixture of traditional and unconventional tech-
form to reach the audience and to try to influ- niques. Social media provide analysts and market-
ence the public debate. When traditional media ers with a huge amount of data, called “big data.”
are inaccessible because of power issues, or pro- When people sign into a social network site, they
hibitive because of high cost, insurgent subjects cede pieces of information about themselves: once
such as social movements, independent politi- ceded, those data about consumers’ and voters’
cians, or new candidates have used digital media interests, tastes, and relations can be extracted
to compensate. In fact, social media can provide and analyzed through software, helping market-
candidates a platform for fundraising, by col- ers or political strategists to know the audience of
lecting microdonations from supporters (which consumers/voters and get in touch with them. In
cannot replace corporate sponsor and party sup- this perspective, social media are most of all pow-
port, but can contribute to finance the campaign erful and cheap tools used to acquire data about
and raise the sense of belonging). Most of all, citizens’ contacts, habits, and preferences, and to
social media can help insurgent candidates who sell them a product, the politician, by manufac-
can try to exploit the viral potential of spreading turing the most effective message or by placing
pieces of information through social networking it in the right network. Some argue that Barack
practices when traditional media pay them no or Obama’s victory in the 2008 presidential elections
little attention. was partly because of the great database built
Social media influence on elections can thus during Howard Dean’s run in 2004: In this data-
be studied as the influence of social media on the base, the names, addresses, and e-mail contacts of
promotion and place elements of the marketing Democrat voters were contained, so it was easy
mix. Networking practices are the main element for Obama’s staff to reach and mobilize them.
of this influence: Supporters can actively seek for Another way in which social media intervene
more supporters among their friends and contacts in the design of an electoral campaign is in the
in social networking sites, involving them in the attempt to measure consent prior to the elections,
campaign, inviting them to do the same, organiz- as in polls. Social media monitoring is the com-
ing meetings or joining already formed groups plex activity of listening to and analyzing social
in the surroundings. This allows campaigners to media data in order to capture the general trends
reduce the budget for online promotion activities of a brand’s reputation and detect possible crisis.
such as advertising, and this is also the reason Like polls, the aim of those activities is to describe
for the increasing interest in promoting online people’s attitudes and perceptions with regard to
engagement and activism. the candidate, but unlike the first, social media
Following the principle of viral marketing, once monitoring is less expensive and time consum-
the network of affiliation is created, campaigners ing, although it is not representative of the entire
have to seed information, trying to reach the most population (at least as long as a digital divide is
influential subjects first (individuals who have the in place). The focus on analyzing consent through
largest number of connections) in order to make social media has raised questions about how to
information visible to the largest possible num- measure it, probably along the lines of the need
ber of people. Disseminated supporters in almost for calculating the return on the increasing eco-
every corner of the Web can also function as ears nomic investments in social media strategies.
and eyes for campaigners, helping them to detect To answer those questions, a quantitative
ongoing negative campaigning and providing an approach has been developed, relying upon Web
instant fact-checking service. metrics such as Twitter “followers” and/or Face-
book “likes” counts, but also sentiment trends
Electoral Data detected in textual corpuses. The consent for the
Social media are mostly used in political campaigns politician in social media is then planned, calcu-
as low-cost sources of information about voters lated, analyzed, and even predicted, as for every
in order to segment the electorate, position the kind of brand, because parameters and met-
candidate, identify the target of communication rics employed to evaluate the success of online
Infographic 677

corporate marketing campaigns have also been which people build their sense of belonging and
adopted to evaluate the effectiveness of online networking is put into practice. The success of an
political marketing campaigns. electoral turnout cannot be ascribed only to com-
Although most research shows no significant municative aspects, which are important, but are
correlation between social media metrics and combined with other elements such as political
voter turnout, some scholars, journalists, and pol- context and culture, social and economic condi-
iticians still continue to superimpose the concepts tions, and the institutional framework.
of efficacy of online political marketing strategies
and influence of social media on elections. Social Donatella Selva
media are used as alternative tools to traditional Emiliana De Blasio
polls in order to observe and predict the consent Luiss University of Rome
for a candidate or a party. This (theoretical) link is
not free of consequences: in particular, this vision See Also: Campaign Strategy; Campaigns, 2012;
of social media recalls deterministic information E-Democracy; Election Monitoring; Electronic
theories, according to which exposure to a mes- Voting; Forecasting Elections; Voter Turnout.
sage would have an effect on people’s thoughts
and behaviors. Social media do not have a natural Further Readings
and necessary power to influence voters’ percep- Chadwick, Andrew and Philip Howard, eds.
tions and behavior. Social networking practices Routledge Handbook of Internet Politics.
can be planned and carried out following previ- New York: Routledge, 2008.
ous cases of successful campaigns, but it would be Kreiss, Daniel. Taking Our Country Back:
better not to evaluate this success only in terms of The Crafting of the Networked Politics From
election turnout because there are many examples Howard Dean to Barack Obama. Oxford, UK:
of perfect social media campaigns, where candi- Oxford University Press, 2012.
dates eventually lost the elections. Lilleker, Darren. Key Concepts in Political
Social media’s influence on the “price,” or the Communication. London: Sage, 2006.
vote, is a difficult stance. It would be better to McNair, Brian. Introduction to Political
examine the role of the Internet as an infrastruc- Communication. New York: Routledge, 2011.
ture for data transmission. In democracies where Norris, Pippa. Digital Divide? Civic Engagement,
voter registration is needed, such as in the United Information Poverty and the Internet
States, the Internet has been used to provide vot- Worldwide. Cambridge, UK: Cambridge
ers the possibility to register and find the near- University Press, 2001.
est polls. The Internet represents a facility for Pew Internet. “Social Media and Political
citizens in terms of speed and immediacy, and it Engagement.” http://pewinternet.org/Reports/
can hinder abstaining, which is one of the major 2012/Political-engagement.aspx (Accessed
problems in contemporary advanced democ- April 2013).
racies. Although it is not a specific function of
social media, e-voting or electronic vote systems
are already used in different countries, even if
they are still experimental (e.g., in primaries or
in administrative elections, not yet in political or Infographic
general consultations).
Most scholars agree that candidates never won Infographic, a contraction of information graphic,
an election solely by designing the perfect online is a means of conveying complex, quantitative or
campaign or by crafting the perfect communica- categorical data in visual form. The terms info-
tion strategy. Electoral campaigns are as much graphic and data visualization are sometimes
field and territory operations as media events and interchangeably used. As the use of statistical
social media presence: conventions, meetings, information has grown in the study of politics,
and groups, even organized through social media, so has the need to find methods by which that
are still important moments in electoral runs, in complex information can be easily and intelligibly
678 Infographic

conveyed. Infographics provide the essential mes- that a well-designed chart can convey a quantity
sages behind numerical patterns in manners that of information that would require substantially
popular audiences can grasp without needing to greater page space if expressed in the form of
understand the finer details of how that informa- numerical tables. Tufte also argues that the ben-
tion was collected or analyzed. Because of the efits of well-displayed data can provide critical
visual relationships they create among geographic, advantages in decision making; as an example of
temporal, and other kids of data, infographics this, he describes how charts mapping tempera-
also allow more sophisticated analysts to observe ture with O-ring failure might have prevented the
patterns that they might otherwise miss. Finally, 1986 space shuttle Challenger disaster. Tufte’s
cognitive psychologists have demonstrated that intellectual forbears include William Playfair, the
visual representations of data aid comprehension 18th- to 19th-century economist and inventor of
and memory. Infographics thus provide differ- the major graph forms (including the line graph,
ent audiences with meaningful access to densely bar graph, and pie chart), and semiologist Jacques
numerical or wordy information that they might Bertin, who systematized a set of retinal variables
otherwise incompletely interpret or recall. (shape, orientation, size, color, value, texture, and
position) that help convey specific kinds of infor-
Edward Tufte mation to audiences of visual data.
Historians of data visualization identify ancient
geographic and astronomical maps as among the Web Infographics
first infographics. With their graphical representa- While Tufte’s insistence on visual economy
tion of complex geographical information, maps remains one important reason for researchers to
perform data visualization’s essential task by pro- convey data in visual form, infographics have also
viding a selection of simplified essential details become more prominent as the audience for sci-
in information-rich, but intelligible visual forms. entific information has broadened. While tradi-
In The Visual Display of Statistical Information, tional publications remain important, the Internet
statistician and political scientist Edward Tufte allows researchers ever greater ability to dissemi-
observes the ways that geographic mapmakers nate information through institutional Web sites,
paved the way for others to later merge geography personal blogs, and multimedia Web features on
with other forms of data. The 19th century con- journalistic Web sites. The information offered
tains a number of important examples of the evo- through these broadly accessible portals must be
lution of data visualization. Effectively conveying easy for a wide array of people to interpret, and
the futility of Napoleon’s 1812 march on Russia, infographics provide one easy and visually appeal-
in 1869, Charles Minard displayed the number ing way to achieve that goal. Cognitive psycholo-
of surviving French soldiers as a steadily narrow- gist Stephen Kosslyn has developed a series of
ing stream along their geographic path between eight psychological principles for the creation of
the Polish–Russian border and Moscow. Simi- effective graphics, which he argues encourage the
larly, Dr. John Snow’s 1854 mapping of the num- quickest learning and easiest retention. Attention
ber of cholera deaths in central London revealed to these principles—relevance, appropriate knowl-
the geographic centrality of a single public water edge, salience, discriminability, perceptual organi-
pump that Snow was then able to identify as a zation, compatibility, informative changes, and
likely source of the infection. capacity limitations—allows infographic designers
Tufte, who remains political science’s most to effectively connect with their audiences and to
cited authority on the aesthetics of infographic promote comprehension and retention.
design, argues for the principle of high “data–ink While some work on infographics describes best
ratios,” and increasing the amount of information practices for visual communication, scholars have
available per inch of graphic. Good infographics also expressed caution regarding the potential for
should maximize the amount of information by data visualization to confuse—or even actively
removing unnecessary graph lines, labels, and dis- manipulate—audiences. Geographer Mark Mon-
tractions. Ideally, by using each recorded point monier has pointed out how the simplification of
to convey multiple measurements, Tufte argues graphics allows for active advocacy and deception,
Information Abundance 679

distorting rather than enhancing a balanced view audiences find themselves in a situation of cog-
of complex information. By disregarding logics of nitive challenge. The information-age consumer
scale, poorly conceived infographics can convey has to rely on technologies and collaboration in
messages at odds with the numbers they ostensibly an attempt to sort through and make sense of
represent: for example, an object that is doubled in immense amounts of information that is now at
length along a horizontal axis may be quadrupled his or her fingertips.
in perceived volume, creating the visual impres- Technology, which created the information
sion of a much larger numerical difference than is abundance in the first place, becomes the neces-
truly the case. sary tool of functioning in an information-abun-
dant world. Some argue that such dependence on
Emily Shaw technology in information seeking and processing
Thomas College limits users’ cognitive development. A relatively
easy and aided process, information seeking in a
See Also: Data Mining; Information Aggregation; situation of abundance reinforces adherence to
Social Computing and Social Information Processing; the principal of least effort in audiences. Having
Web Mapping and Online Politics. to deal with tremendous amounts of information
may be changing the ways in which people pro-
Further Readings cess incoming messages and assess their credibil-
Bertin, Jacques. The Semiology of Graphics: ity. Heuristic, as opposed to systematic, ways of
Diagrams, Networks, Maps. William J. Berg, trans. sorting through vast amounts of data are making
Madison: University of Wisconsin Press, 1983. way into user’s preferences, discouraging mental
Kosslyn, Stephen M. Graph Design for the Eye and effort. The other side of the argument, however,
Mind. Oxford, UK: Oxford University Press, 2006. supported by research and speculation alike, illus-
Monmonier, Mark and H. J. de Blij. How to Lie trates lack of evidence for such claims.
With Maps. 2nd ed. Chicago: Chicago University One of the arguments in relation to information
Press, 1996. abundance states that emerging new technologies,
Tufte, Edward R. The Visual Display of Quantitative instead of enriching information markets and
Information. 2nd ed. Cheshire, CT: Graphics contributing to the pluralism of opinions, facili-
Press, 2001. tate imbalance and serve as an engine for Western
cultural and political domination in the world.
Control over design and production of communi-
cation technologies, and ownership of databases,
expertise, and experience (determined in large part
Information by accessibility of education) provide more devel-
oped Western countries, as well as private com-
Abundance panies based in those countries, with greater abil-
ity to make use of and benefit from information
The term information abundance refers to the technologies. On the other hand, the phenomenon
idea of ever-increasing amounts of information of information abundance arguably levels the field
on a wide variety of topics that becomes accessi- by providing cheaper, easier access to information,
ble to people via growing number of channels and resulting in further education and expertise. The
from increasing number of sources. Technologi- idea of information abundance is closely related
cally determined by its dependence on informa- to the phenomenon of information overload,
tion storage capacities and communication chan- researched mostly within the fields of psychol-
nels’ capabilities, as well as availability in terms ogy and organizational sociology. While testing
of price and penetration, the phenomenon is of the influence of plentiful and excessive informa-
current interest in the age of the World Wide Web. tion on human capability and decision making,
While the gap between information supply and researchers tend to agree that scarcity of time, not
demand for it grows exponentially, accelerated the excess of information, usually becomes the key
significantly by the introduction of the Internet, impairing factor in decision making.
680 Information Aggregation

In the era of information abundance, the infor- Information


mation supplier (media) loses control over the
audience’s agenda. Researchers suggest that the Aggregation
process of news editors essentially telling the
audience what is important is being reversed with The World Wide Web has changed dramatically
the help of new technologies (such as new search in recent years, not just in sheer number of users,
engines on the Internet). Instead of receiving and but, in particular, in the new forms of participa-
sorting through the information pushed on them tion it offers. Web 2.0 technologies now make
by traditional media, the news consumer pulls it potentially possible for every Internet user to
(with the help of technology) the information that have a voice and a worldwide audience—linking
he or she needs from the vast supply. While gener- people from around the world in an unforeseen
ating fair amounts of controversy about possible way—and have been hailed as a new paradigm in
adverse effects on society, development of com- Internet communication.
munication technologies and resulting informa- The rise of social media sites, such as blogs,
tion abundance find appraisal in making citizen wikis, Digg, and Flickr, among others, under-
science and citizen journalism possible, giving scores the transformation of the Web to a partici-
voice to greater numbers of people, simplifying patory medium in which users are collaboratively
access to knowledge and education for the under- creating, evaluating, and distributing informa-
privileged. The notion of information abundance tion. Social media sites share four characteristics:
did not appear with the development of the Inter- (1) Users create or contribute content in a variety
net and emergence of social media. The latest of media types; (2) users annotate content with
advances in technology, however, provided an tags; (3) users evaluate content actively by vot-
unprecedented acceleration in rates of accumula- ing or passively by using content; and (4) users
tion and distribution of information. New groups create social networks by designating other users
gain access to information and produce unique with similar interests as contacts or friends. This
messages that become available to the public. entry is to present the basic ideas of information
While ill-researched at the moment, the effects aggregation.
of information abundance are yet to demonstrate Social media not only allow public rela-
themselves fully. tions practitioners to reach out to and engage
their publics in conversation but also provide
Dzmitry Yuran an avenue to strengthen media relations. More
University of Tennessee, Knoxville advanced users have a greater feeling that social
media have been integrated widely into the
See Also: Cognitive Surplus; Framing Theory, industry than those who are using more common
Social Media and; Gate Keeping Theory and Social tools. Information aggregation is a formal frame-
Media; Information Aggregation; Informationalized work in which are expressed means and tools
Nations Versus Industrialized Nations; Technological for the alliance of information originating from
Determinism. different sources. It has been stated that a group
of individuals who have to choose one of two
Further Readings alternatives by expressing their individual opin-
Boczkowski, Pablo J. News at Work: Imitation in ions, with the final verdict determined according
an Age of Information Abundance. Chicago: to simple majority rule based on these opinions,
University of Chicago Press, 2010. would likely make the correct choice. Moreover,
Metzger, Miriam J., Andrew J. Flanagin, and Ryan as J. Paroush states, this likelihood would tend
B. Medders. “Social and Heuristic Approaches to become a complete certainty if the number of
to Credibility Evaluation Online.” Journal of members of this group tends to infinity, and this
Communication, v.60/3 (September 2010). statement lays the foundations of the ideology of
Neuman, W. Russell. “Appraising Information the democratic regime, providing the theoretical
Abundance.” Chronicle of Higher Education, justification of democratic participation in public
v.56/21 (2010). affairs and in social choice.
Information Aggregation 681

Condorcet Jury Theorem aggregation. A central role of elections is the aggre-


The Condorcet jury theorem gives certain condi- gation of information dispersed within a popula-
tions under which majority rule is superior to dic- tion. T. Feddersen and W. Pesendorfer explain that
tatorship for a society composed of individuals elections have two distinct roles in society. First,
with identical preferences, but diverse informa- they serve as a mechanism to decide policies when
tion. A precursor of the statistical fact known as individuals disagree about appropriate action.
the “law of large numbers” shows that the deci- Second, they aggregate information dispersed in
sions made under majority rule are asymptoti- the population.
cally perfect as the population of voters becomes Why are policies influenced by polls? One pos-
large. A. McLennan believes it is generally the sibility is that polls aggregate information dis-
case that the probability of making the optimal persed among affected constituents. Policymakers
choice converges to one, as the number of voters are often reluctant to say that this purpose guides
goes to infinity. policy at all. President Kennedy, for instance,
The formal framework is explicitly based on famously kept his polling numbers locked away
the idea that political institutions have a con- in a safe in his brother’s house, rather than admit
structive role to play in order to allow for an to using them. President Reagan, as stated by J.
efficient aggregation of all the socially useful Green, was often viewed as making policy based
information that is dispersed among individu- mainly on his ideology, polled obsessively, tak-
als. T. Piketty believes that it states under which ing polls “prior to his inauguration, while he
conditions majority-rule voting yields efficient was being inaugurated, and the day after he was
information aggregation. inaugurated.”
The Condorcet jury theorem provides a theo-
retical basis for democracy, describes K. K. Ladha, Jaime Raúl Seixas Fonseca
assuming that a population of size n has to choose Technical University of Lisbon
between two possible policies P = A or B, and that
all agents have the same state-dependent utility See Also: Audience Fragmentation/Segmentation;
function U(P/s): If the state of the world s is equal Data Mining; Evolution of Social Media; Innovation
to sX, they all prefer policy X to policy Y, U(A/sX) and Technology; Media and Communications Policy;
> U(B/sX), and conversely, if s=sY, U(B/sY) > U(A/ News Media; Polling.
sY); further assume that all agents have the same
initial prior beliefs about the state of the world Further Readings
m0(sX) = m0(sY) = 1/2 and that they all receive a sig- Feddersen, T. and W. Pesendorfer. “Elections,
nal s = sX or sY drawn from the same conditional Information Aggregation, and Strategic Voting.”
distribution, such that Prob (s = sX/s = sX) = Prob Proceedings of the National Academy of Sciences,
(s = sY/s = sY) = p > 1/2. Then, the Condorcet jury v.96 (1999).
theorem simply states that if free elections are Green, J. “The Other War Room.” Washington
held, then the probability that the efficient policy Monthly (April 2002).
(X in state sX and Y in state sY) wins a majority Ladha, K. K. “The Condorcet Jury Theorem, Free
of the vote tends to 1 as n goes to + ∞. In other Speech, and Correlated Votes.” American Journal
words, majority-rule voting allows efficient infor- of Political Science, v.36/3 (1992).
mation aggregation, and nobody would prefer to McLennan, A. “Consequences of the Condorcet Jury
be a dictator. Piketty observes that this result is a Theorem for Beneficial Information Aggregation
trivial consequence of the law of large numbers, by Rational Agents.” American Political Science
but it is powerful. Review, v.92/2 (June 1998).
Paroush, J. “Stay Away From Fair Coins: A
Role of Elections Condorcet Jury Theorem.” Social Choice Welfare,
Concerning political institutions, Piketty proposes v.15 (1998).
that electoral systems need to be complemented by Piketty, T. “The Information-Aggregation Approach
nonvoting institutions, and in particular by politi- to Political Institutions.” European Economic
cal parties, in order to achieve efficient information Review, v.43 (1999).
682 Informationalized Nations Versus Industrialized Nations

Informationalized In this respect, there are two aspects of the


debate, respectively, as the cases altering the
Nations Versus industrialization process and the cases chal-
Industrialized Nations lenging the industrialization process, which
seem more salient while explaining the dilemma
between the informationalized nations and indus-
The progress of human civilization, as explained trialized nations.
by A. Toffler, includes three periodical phenom-
ena: agriculturalization, industrialization, and Information-Based Cases Altering
informationalization. Apart from a few tiny, the Industrialization Process
agrarian tribal populations in the world, the In accordance with the Schumpeterian perspec-
agriculturalization era, which was mostly seen tive emphasizing the importance of innovation,
between 8000 b.c.e. and 1750 c.e., has been firms and states profit when they innovate. One
totally exhausted. can claim that using information technologies in
However, the industrialization process, which industries is of utmost importance. For example,
has revolutionized life in many parts of the world J. A. Cantwell argues that Asian countries, such as
for the last three centuries, is still in effect due Japan and Korea, entered global competition later
to the fact that, as the economic growth of many than the United States; however, they concentrated
countries continues, some are at their early stages on innovation more than the United States.
of industrialization, and they are in pursuit of Instrumentation, which is designed for scientific
industrialization like the United States, United purposes, has a broad range of applications within
Kingdom, France, Germany, and Japan. Infor- industrial technologies. As suggested by N. Rosen-
mationalization has begun with the technologic berg, instrumentation and techniques have shifted
and scientific revolution of the post–World War from one scientific field to another. There have
II era. This period is also known as the space age, been interactions among different areas of science.
information age, electronic era, or global village, The electron microscope (EM) and nuclear mag-
thus indicating the shift from the industrialization netic resonance (NMR) can be given as examples
process toward informationalization. for scientific instrumentation that have been trans-
Informationalization is the new technologi- ferred from one field to another. The EM was first
cal paradigm of the 21st century, to the point designed to examine atomic structure, but it later
where Kerric Harvey argues that a nation’s level became a useful instrument in medical research. In
of informationalization is now more economi- the same vein, NMR was first designed to measure
cally, politically, and culturally significant than the magnetic moments of atomic nuclei, but it was
its relative degree of industrialization. Contrary later used in analytical chemistry and biology.
to the material-based production of industrializa- The semiconductor industry is hardly unique
tion dating back to the 19th and 20th centuries, in its experience of transferring research instru-
informationalization refers to the production of mentation, as opposed to transferring knowl-
immaterial goods. edge derived from research, from the university
There has been recent development in infor- laboratory to the factory level. For example,
mation and communication technologies, such ion implementation was first designed for high-
as computers, mobile devices, and the Internet, energy particle physics by academic scientists,
which can contribute to the rapid flow of money but it was later used as an alternative deposition
and information. These technological revolu- technique in the semiconductor industry. In the
tions have eroded physical boundaries in politics, same way, the scanning electron microscope has
economics, and other aspects of world affairs. become an important measurement tool in the
Therefore, there is a technological change from production of microelectronic elements because
the conventional notion of industrialization to of its higher zoom capability, which cannot be
the involvement of information, knowledge, and obtained by optical microscopes.
communication in production and marketing Similarly, the invention of the laser resulted in a
industries. beginning of basic research in the fields of optics
Informationalized Nations Versus Industrialized Nations 683

for the purpose of using lasers in fiber optic trans- become a matter of debate. Thus, the 1992 Earth
mission. The invention of the transistor in 1947 Summit also drew attention to this issue and high-
can be considered one of the most prominent lighted the link between environmental problems
milestones in microelectronics, thereby leading to and economic development. There are two core
the production of the first personal computer in arguments as to whether industrialization is posi-
the 1980s. Therefore, one can claim that science tive for the environment or not.
and information retain dynamic features, thus Proponents of industrialization argue that
giving an impetus for transferring and diversify- economic growth and wealth contribute to fund
ing industries. environmental protection needs, to develop
There have been crucial changes for many higher environmental standards, and to adapt
other industrial products as well. For example, environmental technology used for the protection
today’s automobiles are manufactured with data and prevention of environmental problems. How-
information and communication units that can ever, opponents of free trade have concerns about
mediate their basic functions, including accelera- the preservation of nature due to the impact of
tion, breaking, and steering. In terms of industry industrialization policies. They argue that indus-
on household appliances, a new washing machine trial activities will lead to increased pollution (as
has a microcomputer with controlling and infor- a result of overconsumption and transportation)
mation systems, instead of the mechanical ones and the extravagant use of resources. In addition
of the 1980s and 1990s. Moreover, a primitive to these concerns, countries’ reluctance to sign
1990s cell phone, which was capable of making environmental agreements because of their indus-
only basic phone calls, later transformed into trial policies will inevitably result in environmen-
smartphones comprising navigation, wireless tal problems.
data communication (Edge, 3G, LTE, bluetooth The information-based conflicts around envi-
and Wi-Fi), digital cameras, digital compasses, ronmental issues take place in two specific areas,
accelerometers, and light sensor units. With the respectively, known as ozone layer depletion and
inclusion of new features, smartphone usage has climate change.
dramatically increased.
Along with advances in communication tech- The Depletion of the Ozone Layer
nologies, the information revolution boomed The ozone layer plays a critical role in protect-
especially in late 1990s because of the rising ing human life on Earth by absorbing harmful
number of personal computers and Internet ultraviolet radiation from the sun. In 1974, two
usage. Increasing speed and mobility of wireless American scientists suggested that the ozone layer
communication networks such as 3G, LTE, and was being depleted by anthropogenic chemicals,
Wi-Fi further accelerated the use of the Internet notably chlorofluorocarbons (CFCs). In 1977,
around the world. Therefore, the Internet has the United Nations Environment Programme
had the lion’s share of marketing and purchas- (UNEP) organized a conference attended mostly
ing in the world for the last two decades. Thus, by scientists from 32 countries, and the output
advances in information technologies have led to of the conference was a world plan of action
the occurrence of a highly developed, informa- aiming to coordinate future research on ozone
tionalized society, and it has also contributed to layer depletion.
the emergence of alternative marketing and pur- However, all these efforts did not create a sig-
chasing industries. nificant result until a hole in the ozone layer was
discovered above Antarctica in 1985. In 1988,
Information-Based Cases Challenging scientists from around the world reached a con-
the Industrialization Process sensus that CFCs and other synthetic chemicals
Informationalized nations have challenged indus- were the primary cause for ozone layer depletion,
trialized nations over environmental issues. The and this fact was declared in the Ozone Trends
dilemma between industrialization and the pro- Panel in 1988.
motion of environmental protection in accor- Meanwhile, in 1977, the United States, Can-
dance with scientific information has hitherto ada, Norway, Sweden, and Finland (subsequently
684 Informationalized Nations Versus Industrialized Nations

known as the Toronto Group) pushed the UNEP Therefore, it can be claimed that implementing
for remedial action. Members of the European policies in accordance with the findings of the sci-
Community, which accounted for 45 percent of entific community has become crucial.
the world’s CFC production, strongly resisted For example, the 1997 Kyoto Protocol, which
such an action. The Toronto Group proposed reinforces the United Nations Framework Con-
a complete ban of nonessential production and vention on Climate Change, commits developed
usage of CFCs, while the European Community countries to reducing their collective emissions of
advocated only limiting production. The UNEP’s six key greenhouse gases (GHSs) by at least 5 per-
endeavors led to an international convention in cent below 1990 levels from 2008 to 2012. Fur-
Vienna in 1985. thermore, the Climate Change Conference, which
Two years later, the resistance of the European was held in Denmark, offers a framework for the
Community and Japan was removed, and the alleviation of climate change beyond 2012. How-
Montreal Protocol was signed in September 1987, ever, what is apparent is that the climate change is
aiming to reduce CFC production by 50 percent of still on the agenda, and its main provisions wait
1986 levels by 1999 and freeze halon production to be collectively adopted.
at 1986 levels by 1992. This was a success for the Some countries are reluctant to agree with
UNEP because the states had signed the protocol the provisions of the Kyoto Protocol because of
without any firm scientific evidence that proved the fact that it leads to the creation of ecotaxes
the causality between ozone layer depletion and that would provoke public hostility. On the
CFC production. Several months after the Mon- other hand, provisions on reducing gas emissions
treal Protocol was signed, scientists proposed sci- would influence powerful energy producers and
entific evidence that linked CFC production and car manufacturers.
ozone layer depletion at the Ozone Trends Panel Moreover, enacting legislation on climate
at the beginning of 1988. change can trigger energy lobbyists and split
Industrialized countries were responsible for them in accordance to their industrial interests.
almost 90 percent of CFC consumption, although According to J. Broder and J. Mouawad, produc-
they represented only 25 percent of the world’s ers of natural gas are battling with the oil com-
population. Therefore, it seems that the environ- panies. Electrical companies are fighting over the
mental regime on ozone layer depletion was suc- use of coal and emphasizing wind power or other
cessful. However, there are new problems that renewable energy resources. Coal companies are
have occurred in the last two decades. Emerging combatting against natural gas firms.
global economic players like China, India, and Therefore, climate change is vitally important,
Brazil consume ozone-depleting substances in and there is a need to take precautionary measures
refrigeration and air-conditioning systems that before it causes unsolvable problems. However,
will increase with further industrialization. They today’s individual states are not willing to adopt
may ask incentives from developed countries in and implement internationally acknowledged sci-
order to develop substitutes to replace CFC and entific provisions on climate change due to their
halon. Developed countries’ resistance would own industrial interests.
jeopardize the future of the protocol.
Conclusion
Climate Change One can argue that there has been a rapid flow of
Besides ozone layer depletion, the other strik- information, thus giving way to the development
ing environmental problem that the world faces of new technologies and diversifying industries
is related to climate change. Climate change with information-based ones. However, infor-
engrosses not only the scientific community, but mation technologies do not always go well with
also policymakers. In the international arena, industries. Nations adherent to the principles of
there have been some initiatives to draw attention scientific information can challenge nations mak-
to this problem. Scientific conferences, panels, ing profits from conventional industries.
protocols, and global institutions all played roles Informationalized nations defy industrialized
in addressing the climate change phenomenon. nations through diverse industrial activities and
Innocence of Muslims, The 685

their scientific standpoints in dealing with envi- Slotten, H. R. “Satellite Communications,


ronmental problems, which emerged as a result Globalization, and the Cold War.” Technology and
of industrial activities. Henceforth, information- Culture, v.43/2 (2002).
alized nations will be on the agenda of the world Toffler, A. The Third Wave. New York: Bantam
politics for some time due to the fact that they Books, 1980.
will continue to shape industrial and environmen- United Nations Environment Programme.
tal policies and challenge nations dependent on “Backgrounder; Basic Facts and Data on the
conventional industries. Science and Politics of Ozone Depletion” (2008).
http://ozone.unep.org/Events/ozone_day_2009/
Ahmet Kaya press_backgrounder.pdf (Accessed April 2013).
Independent Scholar
Hakan Aydogan
Independent Scholar

See Also: Al Gore’s Penguin Army; Developing Innocence of Muslims,


Nations; Global Warming and Climate Change;
International Examples of Political Parties and The
Social Media.
The Innocence of Muslims is a trailer for a film,
Further Readings supposedly about the life of Muhammad, which
Broder, J. and J. Mouawad. “Energy Firms Find appeared on YouTube in July 2012. It was posted
No Unity on Climate Bill.” New York Times by a man using the alias Sam Bacile, and turned
(2009). out to have been produced by Nakoula Basseley
Cantwell, J. A. “Innovation as the Principal Source Nakoula, an Egyptian Copt living in the United
of Growth in the Global Economy.” In Innovation States. It came to prominence in September of that
Policy in a Global Economy, D. Archibugi, same year, after it was dubbed into Arabic and
J. Howells, and J. Michie, eds. New York: shared among anti-Muslim communities, eventu-
Cambridge University Press, 1999. ally coming to the attention of Egyptian television
Carter, N. The Politics of the Environment: Ideas, station Al-Nas, where it was presented as a popu-
Activism, Policy. New York: Cambridge University lar American film that denigrated the Prophet of
Press, 2007. Islam. The true notoriety associated with this short
Hardt, M. and A. Negri. Empire. Cambridge, MA: 14-minute clip occurred when protests against the
Harvard University Press, 2000. film broke out on September 11, 2012. Aside from
Harvey, Kerric. “Quantifying Culture: New the associations of the date with the 9/11 terrorist
Methods for Measuring Media Content as a attacks on the United States, these protests were
Social Mapping Technique.” International significant because they occurred in a variety of
Journal of Interdisciplinary Social Sciences, Arab Spring states, including Egypt, and were ini-
v.5/4 (2010). tially, erroneously, tied to the attack on the U.S.
Langhorne, R. The Essentials of Global Politics. Consulate in Benghazi, Libya.
London: Hodder Arnold, 2006. The Innocence of Muslims and its producer are
O’Rourke, K. “Europe and the Causes of indicative of a couple of much wider social media
Globalization, 1790 to 2000.” In Europe and trends. Many people claim that there has been
Globalization, H. Kierzkowski, ed. New York: a significant rise in Islamophobia since the 9/11
Palgrave Macmillan, 2002. attacks, and that the Internet provides a means
Ritzer, G. Wiley-Blackwell Encyclopedia of for people to vent hatred or prejudice against
Globalization. New York: Wiley, 2012. Muslims with relatively little fear of reprisal.
Rosenberg, N. Scientific Instrumentation and Alternatively, the methods used to generate inter-
University Research in Exploring the Black Box: est in the film and the likely motives behind its
Technology, Economics, and History. New York: distribution could be seen as an example of online
Cambridge University Press, 1994. “trolls” at work.
686 Innocence of Muslims, The

Film Content new. The portrait painted of both Muhammad


The claims of Islamophobia in regard to this film and Islam is meant to provoke a reaction because
are based largely on its themes. In the space of it touches upon things that are generally consid-
only 14 minutes, the film makes a rather large ered taboo in Islam, such as depicting an image
number of points about the character and actions of Muhammad, pedophilia, homosexuality, and
of Muhammad and their relationship to Islam questioning the origin and validity of the Koran.
as a whole, nearly all of which would be deeply The pattern of provocation is not only seen in
offensive to the general public, and especially to the material in the clip, but also in the actors who
Muslims. Muhammad as a man is depicted as ensured its distribution, including Florida pastor
a hybrid of domineering master and effeminate Terry Jones, who is famous for such things as want-
vacillator. As master, he marries various women, ing to host an International Burn the Koran Day.
some of them forcefully, and is depicted forcing In the world of online social media, this practice
sex upon them and upon their slaves or women he is known as “trolling,” and those who go about
has conquered in battle. There are also mentions provoking reactions are called “trolls.” These
of him marrying a child and approving of his individuals promoted this YouTube clip from utter
troops sexually abusing children from conquered obscurity to center stage in an international pro-
territories. As the indecisive, effeminate prophet, test movement. In the past, there were plenty of
Muhammad’s angelic visions are linked to placing people with strong and even hateful views who
his head between a woman’s thighs. would publish their beliefs. However, distribution
He is shown being especially dependent upon required access to significant amounts of money
the support of Kadijah and submissive to her. or influence because publishing was expensive and
Another scene shows his men discussing him and often subject to state control.
asking whether he is gay. This is followed up by Presently, though states often still attempt to
a further question of whether he is dominant or regulate speech and media, they are generally ren-
submissive in these acts, to which a resounding dered unable to comprehensively prohibit material
answer of “both” is given. Still other scenes show because there are countless people committed to
Muhammad interacting with non-Muslims. These ensuring that they can slip information past fire-
involve him demanding conversion or payment of walls and other technological barriers. Trolls are
“extortion” money, which is a reference to the even harder to control because much of their work
traditional tax on non-Muslim monotheists called is simply done by sharing offensive links or state-
the jizya. Refusal to obey leads to declarations of ments in the comments section of articles or Web
war, murdering men in front of their wives before sites that are commonly accessed, and which often
mutilating their corpses, and admonitions to give bear no relationship to the topic of their hatred.
up all their goods and flee. Once the material enters the mainstream, links
Apart from these depictions of Muhammad, the are quickly replicated and shared, and it is nearly
short film also makes a host of claims about Islam. impossible to stop the spread of information.
The opening of the clip involves the destruction
of a Christian library or church by Muslim mobs Political Ramifications
while police stand by and watch. Then, Christians The Innocence of Muslims is a case study of social
are shown discussing how they have been tortured threat posed by the potent combination of hate
and forced to confess to crimes against their peo- speech, easy access to distribution channels, the
ple that they did not commit. At several points, it lack of context and accountability on upload
shows Muhammad or Muslim soldiers referring sites, and the actions of provocateurs who seek to
to the Koran and calling it perfect and gracious create social unrest or reactions. In this case, not
and holy, but always after making claims regard- only the film’s maker and its promoters are respon-
ing the sexual liberties or killing that it allows. It sible for stoking reactions, but also the inaccurate
is also depicted as having been written by some- representation of the clip on Egyptian television
one else entirely, who states outright that it will as a proper film with some level of U.S. govern-
be a mixture of Jewish scripture and the New ment approval or involvement. It has been argued
Testament, but done in a way to look somehow that conflating protests expressing displeasure at
Innocence of Muslims, The 687

were spontaneous protests in response to the film.


It soon came to light that this was not the case, and
the Obama administration was accused, chiefly
although not exclusively by its conservative oppo-
nents, of downplaying a terror attack for political
reasons, a politically charged accusation. Given
that these accusations reached their zenith in the
contested period just prior to the 2012 presiden-
tial election, there has been some commentary
regarding possible over-playing of the incident
by conservatives for strategic purposes. There
has been an ongoing series of hearings about the
sequence of events in Benghazi, and much of the
focus remains on the press releases and public
statements regarding the supposed connection to
The Innocence of Muslims.
The confluence of events that led to The Inno-
cence of Muslims going from a nearly invisible
YouTube clip to the spark of violent international
protests and political scandal at the highest level
of U.S. politics is unprecedented. To a certain
degree, the volatility of social media because of
its ability to quickly go viral and the ease with
which information can be completely misrepre-
sented is unsurprising.
The explosive nature of these events was fur-
ther stoked by the way in which the clip played
into stereotypes of Muslims as uncivilized, vio-
lent, and overly sexualized, while confirming the
suspicions of some in the Middle East that the
Protesters on September 20, 2012, in Sydney, Australia, display West is anti-Muslim and morally degenerate.
their anger about the controversial film The Innocence of The fallout from this incident is known to have
Muslims. The film trailer was supposedly about the Prophet included not just protests, but also deaths, and
Muhammad. political ramifications for the U.S. government
are yet to be determined. At the very least, the
inability of governments to restrict potentially
inflammatory material and the tension between
the film with attacks by terror groups on the U.S. free and responsible speech were brought into
Consulate and CIA facility in Benghazi, Libya, stark relief by this incident.
made the film even more notorious. These attacks
led to the first killing of a U.S. ambassador in Jeremy Kleidosty
decades, J. Christopher Stevens, ambassador to University of St. Andrews
Libya, and three other embassy staff.
Further muddying the waters was the timing of See Also: Africa, north; Al Jazeera Effect; Arab
the events in the last stages of the U.S. presidential Spring; Hate Speech, Online and Social Media; Islam
election. In an effort to prohibit a rush to judg- and Social Media; Middle East.
ment and to encourage calm, President Obama’s
ambassador to the United Nations, Susan Rice, Further Readings
subsequently appeared on several political talk Gross, Michael. “Disaster Movie.” Vanity Fair, v.27
shows, and suggested that the attacks in Libya (December 2012).
688 Innovation and Technology

MacKinnon, Rebecca and Ethan Zuckerman. would later become known as Project Gutenberg.
“Don’t Feed the Trolls.” Index on Censorship, ARPA leadership demanded that users of the net-
v.41/4 (2012). work communicate electronically, leading to the
Seib, Philip. “Religious Freedom and U.S. Public development of protocols that allowed users to
Diplomacy.” Review of Faith & International collaborate in groups.
Affairs, v.11/1 (2013). USENET, or what was sometimes called the
“poor person’s ARPANet,” was developed in
1979, based on a protocol for communication
between Unix mainframes. USENET relied on
periodic connections between mainframes, usu-
Innovation and ally over telephone lines, to distribute messages.
The first connections were to support computer
Technology users between Duke Medical School, Duke Uni-
versity, and the University of North Carolina
The technology of social media depends on mech- at Chapel Hill. Because any user could create a
anisms that allow users to contribute content. In group to foster a conversation between individu-
this way, as described by Tim O’Reilly, companies als with a mutual interest, USENET communities
no longer offer products for consumers to buy, but quickly grew. The network was helped by Bell
platforms for users to exchange information. The Labs’ sponsorship of a cross-country link in the
incredible proliferation of social media technolo- early days of the network. Michael Hauben, an
gies since 2000 is, in large part, from the shared early USENET user and an eloquent spokesper-
set of resources that they can use to create their son for its potential, coined the term “netizen” to
services. Many of the technologies behind social refer to the new medium that was controlled by
media were developed for other purposes, and its audience.
almost all social media depend on infrastructures Outside the United States, a French service
that they did not create (such as the World Wide known as Minitel brought many online services to
Web and cell phone networks), so the innovation the wider public, demonstrating how users would
of social media companies is as much in how to embrace this kind of service. First demonstrated
harness the efforts of users for a social media plat- in 1980 and available for users in 1983, Mini-
form as they are to develop new techniques for tel was a small household terminal developed
enabling public participation. to replace the paper phone book, and promised
It could be argued that computer technology to provide businesses with commercial listings.
was social after the introduction of time-sharing Soon, additional services were added: library
computers in the 1960s. This method of sharing catalogs, transportation schedules and ticketing,
access to centralized mainframe computers meant USENET information, e-mail, chat, and newspa-
that users were no longer in competition for scarce pers. One of the most used (and most infamous)
resources, and were encouraged to support each services was Minitel Rose, an online sex chat that
other by leaving files in common storage areas for in peak periods of usage threatened to overwhelm
other users, a practice that would be developed the system.
into e-mail. The development of the ARPANet In the United States, bulletin board systems
encouraged users to share information between (BBSs) allowed users to dial into a mainframe
dispersed geographic locations, and researchers computer and share messages (and sometimes
developed several conventions for group commu- chat or explore virtual worlds) with other users.
nication that are familiar today. Michael Hart, at The first of these were available in the late 1970s,
the University of Illinois Material Research Lab, but one of the best known of these was the Well,
desiring to pay back the expensive computing created when Stewart Brand brought his Whole
resources he was given for free, decided to make Earth Catalog online. This service was first prof-
the full text of the U.S. Declaration of Indepen- itable in 1987, and had a user base of 2,000.
dence available to users of the network on July 4, Other consumer dialup services were available at
1971. This was the first e-text of a collection that this time; Compuserv, which had begun in 1969
Innovation and Technology 689

as a subsidiary of Golden United Life Insurance, push short notifications to potential customers
was spun off as a separate service in 1975, and who had subscribed to their RSS feeds. By sub-
allowed users access to e-mail and other online scribing, the notifications would show up in the
services. Steve Case, who had been inspired by user’s Web browser when he or she started the
connecting to computer users all over the coun- application. This idea was borrowed by Face-
try, started a service in 1985 that would become book and other services that encourage users to
America Online (AOL). sign back often to see updates from friends, col-
A mechanism to bring these different services leagues, or companies that interested them.
together through one interface was developed by
Tim Berners-Lee in the early 1990s. Berners-Lee Rise of Social Media
developed the hypertext transfer protocol (HTTP) One of the first platforms to take advantage of
so that applications like his WorldWideWeb the insight that users would donate their time and
could share pages that were formatted accord- expertise to a project that would serve a social
ing to the hypertext markup language (HTML), need was Wikipedia. Other encyclopedias had
which standardized the way that information was begun to appear online, but these were based on
stored. Although the first Web browsers, software publishing enterprises and an expert-based mode
to access the World Wide Web, were available in of creating content. In January 2001, the organiz-
1992, search engines were not yet in use. Some ers of a project to generate a free encyclopedia,
users, in an effort to be helpful, created lists of Nupedia, went online with the intention of rap-
interesting and useful Web sites that they discov- idly iterating the drafting, review, and publishing
ered. These Web logs came to be known as blogs. process. Although Nupedia had only created a
Using HTML, many different types of docu- dozen articles, in a few months, Wikipedia had
ments were easily made available, but the inter- over 8,000; after its first year of operation, there
active capabilities of the Web (however rudi- were more than 20,000. The first international
mentary) allowed for input from users. In 1994, Wikipedias appeared that same year, even though
Ward Cunningham developed software to allow about 90 percent of the first Wikipedia articles
computer programmers to share their research were written in English.
using interactive Web pages as part of the Port- The technical infrastructure for Wikipedia is
land Pattern Repository. Based in part on hyper- remarkably simple to use. Based on Ward Cun-
text applications that were readily available for ningham’s WikiWikiWeb concept, users can
single users, Cunningham’s insight was to deploy quickly begin editing the text of encyclopedia
a distributed hypertext that was available over entries without knowing anything about Web
the Web that users could quickly and easily edit. programming or database management. Instead,
He made the software available on his personal users may edit pages with intuitive tags that the
Web site in 1995, calling it WikiWikiWeb, a con- platform then converts into styles and links. In
ceptualization of Tim Berners-Lee’s application this way, the power and the flexibility of the World
WorldWideWeb, “wiki” being a Hawai‘ian word Wide Web ensure that a wide variety of users have
for “fast.” His software allowed his community access to the pages of the encyclopedia, while the
to quickly collaborate. WikiWikiWeb conventions allow users with vary-
The browser wars of the 1990s, where com- ing degrees of computing expertise to participate
peting companies gave away browser software in the creation of pages.
to access the Web and earned money by selling However, deciding to use this flexible, intuitive
proprietary services, led to browsers with features platform was not the main contribution of Wiki-
that helped companies enrich their online pres- pedia. Giving users the capability to create and edit
ence. One of the protocols was known as real pages does not in itself generate a usable resource.
simple syndication (RSS). The idea behind RSS From the beginning, the encyclopedia announced
was that instead of expecting customers to visit a clear guidelines for its users on what the expec-
Web site—what was known as a “pull”—it would tations of the overall project were. For instance,
be better to “push” information out to those who the convention of the “neutral point of view” for
might be interested. RSS allowed companies to articles was announced in the first year, requiring
690 Innovation and Technology

that users do not present articles from a parti- on what users do, and then profit from it. The one
san position, but instead consider how different company that has maximized the use of data gen-
people will consider the topic. The international erated by users is Google. Steven Levy has docu-
community involved in the project has taken this mented the rise of Google from its humble origins
policy in interesting directions: for instance, the in a Stanford University dorm room to a multina-
objectivity of the article on the launch of Sputnik tional corporation, explaining along the way how
in 1957 was questioned because it referred to the Google has studied what its users do and has used
“Sputnik scare.” Although this is a typical way that information to innovate new ways of helping
of thinking of the aftermath of the launch, when them to do it better.
Americans were concerned that they were falling For instance, in order to improve search results,
behind in the quest for space, readers pointed out Google studied what users were looking for and
that this phrase only applied to people within the identified which terms were likely to be searched
United States. together. The word bio, Levy points out, could
In 2003, when the encyclopedia contained mean “biography” or “biological.” By study-
more than 100,000 pages, the basic structure of ing which other words go along with the search,
the arbitration system was codified. A number of Google can understand the difference: When
trusted users were given administrative privileges, Gandhi is in the search box, the word must mean
allowing them to resolve conflicts regarding the “biography”; but when warfare is in the search
encyclopedia, and a dispute policy was announced box, the word must mean “biological.” Similarly,
that explained what would happen when differ- Google has used typing errors to help improve
ent users of the site disagreed about its contents. search results. By noticing what corrections users
These developments helped develop the project make in successive searches (e.g., looking first for
because contributors made the editorial poli- enterpenurial, and then entrepreneurial), Google
cies of the site transparent, but they had another can help bypass user error and direct them to
important effect. By distributing the authority for what they are looking for sooner.
maintaining the platform, much in the same way User information is also helpful in creating
that AOL and other content providers had done some of Google’s key products, such as advertis-
in the previous generation of services, Wikipedia ing. While other search engines had sold preferred
ensured that devoted users had a stake in the proj- placement in search results, Google decided early
ect. In this way, the most motivated and respected on that it wanted to provide a reliable service for
contributors to the encyclopedia were awarded its competitors. Instead, the company decided
for their contributions, giving them the sensation that it would sell advertising space based on what
of pride that encouraged them to continue work- its customers were looking for and interested in.
ing on the project. Other awards and roles were Google’s AdWords service allows companies to
developed that continued to respect the contribu- bid on specific words, tying their advertisement
tions of Wikipedia users. to a selected number of times that a word appears
China blocked Wikpedia in 2004 several times, in search results. This allowed smaller companies
and continued to block the site periodically in to gain access to Google’s customers; in televi-
following years. In 2005, when there were more sion advertising, in contrast, only the largest
that 750,000 English pages alone, Wikipedia and corporations have access to the most profitable
other social media began to appear in the main- consumers.
stream media. The article about John Seigenthaler,
a journalist, was vandalized to accuse him of con- Criticisms of Social Media Technology
spiracy in the Kennedy assassinations. The incor- Social media have provided meaningful ways for
rect information was not detected for months. In users to collaborate, share, and access informa-
addition to harnessing the creative power of their tion in ways that go beyond the resources that
users, another way that social media technologies any single company could have developed by
profit from their customers is by mobilizing infor- paying employees. These services, however, are
mation about them; as described by Tim O’Reilly, not without their critics. Privacy drives many of
the key to a Web 2.0 company is to collect data the concerns from users. Although Wikipedia
Innovation and Technology 691

and other services can be credited for providing has pointed out, what is possible to find on Wiki-
a usable mechanism for large numbers of people pedia is slanted. One critic pointed out that the
to donate their time, this means that many peo- article on Hurricane Francis is five times as long
ple are working without compensation. Trebor as the one on Chinese art. This is not to say that
Scholz edited a volume titled Digital Labor about resources developed by traditional media are free
concerns over possible exploitation because users from this kind of bias; some scholars have argued
contribute their creative effort to social media, that encyclopedias and scholarly work in gen-
and companies use that content to turn a profit. eral are always conditioned by an unconscious
These critics consider whether the contributions pressure toward what the creators think is the
from netizens, who have made many billion dol- most important. In order to address topics that
lar companies, are so different from Harry Potter have been underrepresented on Wikipedia, some
or Star Trek fans, who add to the depth of media groups have organized editing brigades, such as
corporations’ holdings. the March 2013 Feminists Engage Wikipedia.
Another issue is what has come to be known as Given the way that international protest move-
content that is developed according to “geek pri- ments have relied on social media to organize
orities.” Although social media have been used to themselves, social media has been criticized by
develop what seem to be comprehensive resources human rights organizations because their poli-
for the study of culture, society, and even history, cies, geared toward an American audience, do not
the development has been directed by the interests consider their responsibilities toward people in
of users who tend to be white, male, in younger other countries. For instance, Facebook’s policy
demographics, and American. As Roy Rosenzweig that individuals and not groups may create their
pages—and the policy that users have only one
account and use their legal names—is inhibiting
to those who wish to use Facebook to organize.
As documented in Access Controlled, for instance,
YouTube’s prohibition of violence in user contri-
butions has led to documentary evidence about
police brutality to be deleted by savvy regimes
that seek to remain in power. It might be too
much to ask organizations to respect the human
rights of individuals when they make their poli-
cies, but it could also be said that companies that
seek to profit from social media technology have
a responsibility to those who use it in contexts
outside of the United States.

Christopher Leslie
New York University

See Also: Digital Revolution; Web 2.0; Wikipedia


Misuse; Wikis and Collaborative Project Web Sites;
World Wide Web, History of the.

Further Readings
Deibert, Ronald, et al. Access Controlled: The
Shaping of Power, Rights, and Rule in Cyberspace.
Cambridge, MA: MIT Press, 2010.
A female editor working on Wikipedia content to address the Deibert, Ronald, et al. Access Denied: The Practice
site’s gender imbalance at a WikiWomen’s Edit-a-Thon held and Policy of Global Internet Filtering. Cambridge,
during the Wikimania 2012 gathering in Washington, D.C. MA: MIT Press, 2008.
692 Inouye, Dan

Kessler, Jack. “The French Minitel: Is There Digital In April 1945, Inouye was seriously wounded in
Life Outside of the ‘US ASCII’ Internet? A Italy as he led his platoon. Shot in the stomach, he
Challenge or Convergence?” D-Lib Magazine proceeded to attack, and even refused treatment
(December 1995). in favor of rallying his troops to destroy a second
O’Reilly, Tim. “What Is Web 2.0? Design Patterns enemy gunning position. He personally advanced
and Business Models for the Next Generation of to within 10 yards of his next target, and as he
Software” (September 30, 2005). O’Reilly Media. had with the first, destroyed it using grenades and
http://oreilly.com/web2/archive/what-is-web-20 his machine gun. At that point, his right arm was
.html (Accessed May 2013). severed at the elbow and left him next to his own
Rosenzweig, Roy. “Can History Be Open Source? primed grenade; he called back his own troops in
Wikipedia and the Future of the Past.” Journal case he lost control of his severed arm, removed
of American History, v.93/1 (2006). the grenade from his right hand, and threw it at
Scholz, Trebor. Digital Labor: The Internet as his target with his left hand. He managed one last
Playground and Factory. New York: Routledge, burst of fire before he was wounded again, this
2013. time in the leg, collapsing from blood loss and
shock. Inouye endured the amputation of the
remainder of his right arm without proper anes-
thesia. In the hospital, Inouye met and became
friends with Bob Dole, also a patient. The two
Inouye, Dan maintained their friendship after that time.
Despite these trials, Inouye remained in the
Daniel “Dan” Ken Inouye was, until December military until 1947, and left with the rank of
2012, Hawai‘i’s senior U.S. senator. A lifelong captain. He was honorably discharged with the
member of the Democratic Party, his service as Bronze Star, two Purple Hearts, the Distinguished
president pro tempore of the Senate made him Service Cross, and 12 other citations. The Distin-
the Asian American with the highest rank in the guished Service Cross was upgraded to the Medal
history of American politics in 2012, and third of Honor in 2000 by President Clinton, alongside
in line of succession to the presidency after the 19 other Nisei veterans; these men were initially
vice president. Until his death in December 2012, believed to have been denied proper recognition
Inouye served the Committee on Appropriations based on their race.
of the U.S. Senate as chair. In 2000, the emperor of Japan awarded the
Grand Cordon of the Order of the Rising Sun to
Military Career and Education Inouye for his career in public service. In 2006,
Dan Inouye witnessed the attack on Pearl Harbor the U.S. Navy Memorial bestowed the Naval
in 1941, where he was a medical volunteer. The Heritage Award on Inouye in recognition of his
U.S. Army ended the ban on Japanese American support of the U.S. Navy and his military ser-
soldiers in 1943, prompting Inouye to postpone his vice. In 2007, French President Nicolas Sarkozy
educational plans and enrollment at the University inducted Inouye as a Chevalier of the Legion of
of Hawai‘i, where he was a premedical student, and Honor as a living veteran of World War II who
enlist in the Army. He was a volunteer member of had served on French soil. In 2011, in honor
the Nisei 442nd Regimental Combat Team, a unit of his work on behalf of Japanese and Ameri-
almost entirely comprised of Japanese Americans. can goodwill, Inouye received the highest Japa-
In his first year of military service, Inouye attained nese honor available to a foreigner not a head
the rank of sergeant and led his platoon. His regi- of state: the Grand Cordon of the Order of the
ment served abroad in Italy and France starting Paulownia Flowers. He was the seventh Ameri-
in 1944, and he was promoted to second lieuten- can to receive the honor, and the first Japanese
ant for his two-week stint in battle, attempting to American to do so.
relieve the surrounded Lost Battalion. He was shot Forced by his disability to change intended
in the chest during these weeks, but was saved by career—he had originally planned to be a sur-
two silver dollars he had in his shirt pocket. geon—Inouye returned to the University of
Inouye, Dan 693

Hawai‘i using the GI Bill and studied political sci- He also served on the Defense Appropriations
ence. He graduated in 1950 with his bachelor of Subcommittee within the Senate until his death.
arts degree and went on to earn his juris doctor- At the time of his passing, Inouye was also the
ate from Washington, D.C.’s George Washington Commerce, Science & Transportation Commit-
Law School in 1953. tee’s ranking Democrat, and he was on the Indian
Affairs Committee. Inouye also served on the
Political Career Rules Committee at the time of his death.
Senator Inouye first ran for office in 1954. That If Inouye had remained in office until June 29,
year, he was elected to join Hawai‘i’s Territorial 2014, he would have been the United States’s
House of Representatives and selected to be the longest-serving senator in history; instead, he
Democratic majority leader. In 1958, he joined was the second-longest after Robert Byrd. Inouye
the Territorial Senate on the eve of statehood for announced in 2012 that he intended to campaign
Hawai‘i. When Hawai‘i was granted statehood for a 10th Senate term in 2016, a record num-
in 1959, Inouye was elected to represent Hawai‘i ber of terms; at that point, he would have been
in the U.S. House of Representatives and served 92 years old. Senator Inouye entered the hospital
there until 1962; that year, he went to the Senate, on December 5, 2012, needing his oxygen intake
and until his death in late 2012, he remained there, monitored, and remained there until he died on
serving his ninth term in a row. Inouye was the December 17, 2012, of respiratory issues.
first Japanese American elected to the U.S. House
of Representatives and the U.S. Senate. Social Media Use
Inouye was the keynote speaker in Chicago at Senator Inouye had a Starscore of 43,279 as of
1968’s tumultuous Democratic National Con- December 2012. He was number 53,171 on the
vention. In the 1970s, Inouye was a member of Global Social Media Chart on December 13,
the Watergate Committee, and this investiga- 2012. Inouye’s Media Power Rank was 51 of
tory role was reprised many times in his political 541 on that same date. As of December 2012, he
career. Inouye was the chair of the Select Com- enjoyed almost 5,400 YouTube views, more than
mittee on Intelligence from 1975 until 1979. In 5,500 Facebook fans, and more than 8,300 Twit-
the 1980s, Inouye was the Senate Democratic ter followers.
Central America Study Group chair and the At least one opponent, Republican Cam
National Bipartisan Commission on Central Cavasso, saw Inouye’s social media presence as
America’s senior counselor. a weak point for attack at election time. Cavas-
Inouye was perhaps most well known for his so’s primary strategy in the 2010 election was to
role as the Iran–Contra Committee chair. It was launch a social media–based campaign. Cavasso
during the exchange with Lt. Colonel Oliver used Facebook, Flickr, Foursquare, and Twitter
North that he referred to the Nuremberg trials to attempt to reach younger and more techno-
with counsel for North taking great umbrage to philic votes. Ultimately, this proved unsuccessful
the reference. His service during the Iran–Contra as Inouye won with almost 75 percent of the vote.
affair gave rise to his now-famous description of
the “secret government”; Karla Lant
Northern Arizona University
There exists a shadowy Government with its
own Air Force, its own Navy, its own fund- See Also: Coburn, Tom; Cornyn, John; Ellison,
raising mechanism, and the ability to pursue Keith; Transparency.
its own ideas of the national interest, free
from all checks and balances, and free from Further Readings
the law itself. Adverderada, R. “Doing the Impossible: Can Anyone
Beat Daniel Inouye?” Examiner (2010). http://
In 2009, Inouye replaced Robert Byrd as www.examiner.com/article/doing-the-impossible
chair of the Appropriations Committee, where -can-anyone-beat-daniel-inouye (Accessed
he remained until his death in December 2012. December 2012).
694 Instagram

C-SPAN. “Oral Histories: U.S. Senator Daniel


Inouye.” American History TV (2012).
http://www.c-span.org/Events/Oral-Histories-US
-Senator-Daniel-Inouye/10737433850 (Accessed
December 2012).
OhMyGov. “Daniel Inouye” (2012). http://ohmygov
.com/accounts/Person/499-daniel-inouye/summary
(Accessed December 2012).
On the Issues. “Hawaii Senator Daniel Inouye”
(2012). http://www.ontheissues.org/senate/daniel_
inouye.htm (Accessed December 2012).
Project Vote Smart. “Senator Daniel K. Inouye’s
Voting Record” (2012). http://votesmart.org/
candidate/key-votes/53285/daniel-inouye#.
UMpgSZPjmNw (Accessed December 2012).
Real Clear Politics. “Hawaii Senate: Cavasso vs.
Inouye” (2010). http://www.realclearpolitics.com/
epolls/2010/senate/hi/hawaii_senate_cavasso_vs_
inouye-1726.html (Accessed December 2012). A collection of Instagram photos showing four different types of
Smith, L. Beyond Glory: Medal of Honor filters and varied borders. The Instagram site rapidly grew from
Heroes in Their Own Words. New York: W. W. 1 million users in December 2010 to 100 million by April 2012.
Norton, 2004.
StarCount. “Daniel Inouye” (2012). http://www
.starcount.com/profile/502dbae018065b6bf70001
da/daniel-inouye (Accessed December 2012). photo sharing. The name was designed to refer-
Twitter. “Daniel K. Inouye” (2012). https://twitter ence the idea that Instagram is a form of instant
.com/TeamDanInouye/followers (Accessed telegram service.
December 2012). Instagram’s mobile applications lets users
upload and share photographs on the Instragram
network and on other social networking sites
such as Twitter, Facebook, Tumblr, Flickr, and
Foursquare. All photos uploaded to the Internet
Instagram via Instagram are converted to a standardized
square shape. Users are also given the option of
Instagram is a popular social networking platform applying a filter to the image that transforms the
that allows users to share digital photographs. The photograph’s appearance. Many of the filters alter
service was created by Kevin Systrom and Mike the lighting and tone of an image so that it looks
Krieger in October 2010, and was sold to Face- dated. Available filters include Amaro, Mayfair,
book Inc. in April 2012. Political candidates and Rise, Hudson, Valencia, X-Pro II, Sierra, Wil-
political organizations use the application to con- low, Lo-Fi, Earlybird, Sutro, Toaster, Brannan,
nect with various relevant audiences, perhaps the Inkwell, Walden, Hefe, Nashville, 1977, and Kel-
most important of which is voters. Instagram was vin. However, many users still choose to upload a
founded in San Francisco, California, when Kevin photo in normal mode, without a filter. Users also
Systrom began work on an application that aimed have the option of adding a border to their photo-
to combine the best characteristics of other popu- graph. In addition to posting their photographs,
lar social networking applications such as Mafia Instagram users can browse others’ photographs,
Wars and Foursquare. The original application comment on them, and “like” them. Users can
was called Burbn, but the name was later changed “follow” their friends and their favorite Insta-
to Instagram when Mike Krieger joined the proj- gram users. Images can be organized via hashtags
ect and the upstart began focusing exclusively on so that content is more searchable. Photo maps
Instagram 695

organize images according to the geographi- politicians with a concise, direct method of shar-
cal location where they were taken. Competing ing their message and enhancing their image, and
platforms such as Hipstamatic, Camera+, and how it helps citizens feel personally connected to
Tadaa, offer many of the same photo-sharing and government and its leaders.
photo-filtering features as Instagram, but are not Elected officials have come to rely on Instagram
as popular. for documenting their activities. For instance, New
Instagram officially launched on October 6, York City Mayor Michael Bloomberg’s office used
2010. By December of the same year, they had Instagram to document Hurricane Sandy relief
over 1 million registered users. By April 2012, the efforts. Former Newark Mayor Cory Booker used
site boasted over 100 million users. Because Ins- Instagram to share his experience when he vol-
tagram has always been free to users, and because unteered to live on food stamps for a week. The
the company was initially reluctant to incorporate Independent Voter Network, an organization dedi-
paid advertising into its site, Instagram’s popular- cated to encouraging political discourse through
ity did not translate into immediate financial suc- new media, listed Representative Kevin McCar-
cess. However, the upstart’s founders and financial thy (R-CA), President Barack Obama, Senator
supporters reaped financial rewards when Face- Elizabeth Warren (D-MA), Representative Steny
book Inc. bought Instagram for an estimated $1 Hoyer (D-MD), and Representative John Boehner
billion in cash and stock in April 2012. When the (R-OH) as the top five politicians on Instagram.
deal was finalized in September 2012, the actual Political news organizations such as CNN, as well
price tag was closer to $741 million. In December as political think tanks such as the Heritage Foun-
2012, Instagram incurred the ire of many users dation, also maintain Instagram accounts.
because it amended its terms of service. Specifi- Instagram may be more useful for helping
cally, a new clause gave Instagram permission to politicians and political organizations connect
use users’ likeness, photos, and other informa- with citizens who already support them, than
tion in Instagram’s commercials and other pro- for converting people to new political positions.
motional materials, without any compensation to Users may only see the images from users (in
the Instagram user. Other critics noted that the this instance, politicians) who they have already
agreement expanded Instagram’s ability to collect agreed to follow. Therefore, Instagram may be
and share personal information about users with more useful for reinforcing views about politics
potential advertisers. Instagram has since back- and politicians than changing those views. In
tracked on many of the proposed changes to the addition to political actors’ use of Instagram to
user agreement. influence audiences, the Pittsburgh Post-Gazette
has noted that many citizens used Instagram to
Political Use document and share their Election Day experi-
Just like other social networking tools, Instagram ences in 2012. The popular hashtag “#vote”
has been put to use by political candidates and aided in this process. Prevalent themes among
political organizations. In the 2012 U.S. presi- Election Day images included pictures of citizens’
dential campaign, both major party candidates, “I Voted” stickers, pictures of voters’ individual
Democrat Barack Obama and Republican Mitt ballots, and pictures of the lines at polling places.
Romney, operated Instagram accounts. In addi-
tion to images of candidates speaking at cam- Mark Glantz
paign rallies, meeting political supporters, and St. Norbert College
spending time with their families, these accounts
often featured candidates in more candid, behind- See Also: Candidate Image; Facebook; Flickr;
the-scenes situations. Barack Obama’s Instagram Foursquare; Hashtag; Picasa; Twitter.
account also encouraged supporters to use the
hashtag #Obama2012 to share their political Further Readings
images with the campaign. The praise that Ins- Perlroth, Nicole and Jenna Wortham. “Instagram
tagram has received as a political communica- Makes About-Face on Ads.” New York Times
tion tool has tended to focus on how it provides (December 21, 2012).
696 Instant Messengers, IRC, and ICQ

Sciullo, Maria. “Facebook, Twitter, Instagram Part providers [ISPs]) was not censored, allowing
of Political Landscape.” Pittsburgh Post-Gazette alternative information to be circulated among
(November 7, 2012). the Soviet people and the outside world, which in
Wortham, Jenna. “Facebook to Buy Mobile Start-Up turn assisted Gorbachev to regain authority. Sim-
for $1 Billion.” New York Times (April 10, 2012). ilarly, IRC was used to circulate bottom-up citi-
zen perspectives on events such as the 1992 U.S.
presidential election, the 1995 Oklahoma City
bombing, Gulf War events, and the 1994 earth-
quake in California, according to Ibiblio. Besides
Instant Messengers, political and everyday use, IRC is known to be
used for terrorist recruitment, criminal activities,
IRC, and ICQ and the dissemination of pirated and illicit sexual
materials through private messages. By virtue of
Instant Messengers (IM), Internet Relay Chat its decentralized workings, the intelligence com-
(IRC), and ICQ are all protocols or software munity has difficulties in proactively monitoring
clients enabling online chat. As predecessors to all chat sessions. Furthermore, IRC chat is prone
social media platforms, these forms of Internet to hacker attacks, because exchanges are often
communication enable users to engage in real- collective and unencrypted, and activity typically
time, text-based discussions. IRC is the Internet’s spans long time periods.
first chat network, developed in 1988 in response
to the popularity of online discussions on Bulle- ICQ
tin Board Systems (BBSs) in the 1970s and 1980s. ICQ was the first IM client, launched in 1996
BBSs only allowed asynchronous communication. by the Israeli company Mirablis. IM is a social
Blossoming in the 1990s, the IRC network cur- media technology that allows users to privately
rently still operates from more than 2,000 serv- exchange written messages in real time. Users
ers worldwide, and the top 100 networks serve can add people to their personal lists of contacts.
500,000 people at any given time, according to Besides one-on-one communication, one-to-
Netsplit. IRC, accessible through clients or Inter- many communication consists of the broadcast-
net browsers, enables real-time conversations. ing of personalized screen names to the audi-
IRC is mostly collective, taking place in channels. ence of fellow users added to the contact list. In
Invisible to fellow users, one-to-one exchanges 1998, ICQ was acquired by the America Online
are also possible in private mode. (AOL), and in April 2010, it was bought by the
Moscow-based investment group Digital Sky
Political Role of IRC Technologies (DST).
Little attention is given to how IRC was used The client has fallen out of fashion among users
for political purposes among citizens, similar to in the United States, but its popularity continues
contemporary social media applications. IRC is across eastern Europe and Russia (with 50 million
a historical predecessor of today’s use of Twit- active users in 2010). The transfer of servers to
ter, Facebook, and YouTube for airing dissident Russia that resulted from the latest transaction is
voices (e.g., by Occupy or Arab Spring protest- feared to hinder U.S. law enforcement monitoring
ers). When Communist Party hard-liners sought and investigations of user activities. Furthermore,
to overthrow the Soviet government led by pro- the Russian Federal Security Service has achieved
reform president Mikhail Gorbachev during the a greater stronghold over ICQ activities because
Soviet coup d’état attempt (August 19 to 21, it has rightful access to user data in the event of
1991), IRC played a key role in circulating infor- suspected security threats. Unlike other IM cli-
mation within the Soviet Union and beyond. A ents, on ICQ, only a five-digit unified identifica-
media blackout affected traditional media and tion number is permanent; other details such as
communication networks, including newspapers, personal information, display name, and contact
TV, radio, and telephone. However, RELCOM details can be altered without having to reregister.
(one of the Soviet Union’s first Internet service This feature allows users great influence over their
Institute for Public Diplomacy and Global Communication 697

privacy; great anonymity simultaneously provides Institute for Public


increased opportunity for malevolent use.
Diplomacy and Global
Other Instant Messengers
Other prominent IM clients are Windows Live Communication
Messenger (formerly Microsoft Messenger, or
MSN) with an active user base of 330 million in The Institute for Public Diplomacy and Global
2009, Apple’s iMessage with 140 million active Communication (IPDGC) at George Washington
users in 2012, AOL Instant Messenger (AOL) that University (GWU) examines public diplomacy on
dominated the U.S. market but diminished to 4 a global scale in the 21st century. IPDGC is a new
million active users in 2012, and the Chinese Ten- vehicle for public diplomacy to connect with for-
cent QQ with an estimated 440 million active users eign publics. By combining the power of social
in 2011. Recent additions to IM are the inclusion media with leading U.S. and global political fig-
of voice and video chat and casual games. ures, the institute has established itself as a center
IM remains relatively understudied because to both inform and influence the global dialogue.
data gathering within this private space is not As the institute’s director Sean Aday notes, the
straightforward; users control who they let into lines between public diplomacy and diplomacy
their networks, and exchanges are not stored in a and that of the people and those in power are
publicly accessible environment online, but mostly now blurred.
on the computers of users. On the level of identity Established in 2001, the institute lies within the
politics of everyday use, it should be noted that School of Media and Public Affairs of the Colum-
text-based digital interaction was initially cel- bian College of Arts and Science, and the Elliot
ebrated by scholars for its theoretical potential for School of International Affairs, in collaboration
sustaining disembodied identity, including gender, with the University’s Public Diplomacy Council.
race, and looks. Separated from the offline physi- It is part of the university’s global communication
cal world, IRC, IM, and ICQ, by virtue of their master’s program and is led by Sean Aday. Aday
disembodiment, would be equalizing, democra- joined the university’s School of Media and Public
tizing, and empowering. Recent scholarship has, Affairs in 2000, and focuses his work on the inter-
however, proven that offline power relations also section of the press, politics, and public opinion.
pervade online written interaction. The institute has five primary core focus areas:
new media, security, and public diplomacy; the
Koen Leurs role of women and gender in security, communi-
Utrecht University cation, and diplomacy; 21st-century U.S. foreign
policy priorities, such as China, Iran, and Africa;
See Also: Activists and Activism, Digital; Chat “whole of government,” interagency challenges,
Rooms; Evolution of Social Media; Identity Politics; particularly in the areas of public diplomacy and
Platform; World Wide Web, History of the. strategic communication; and global perspectives
and approaches to public diplomacy.
Further Readings It studies how fast information moves, how
Atlas, Amelia. “Team Obama Told to Ditch people connect with one another, and the impact
Instant Messaging.” Newser (January 18, 2009). of mass communications. Through conferences,
http://www.newser.com/story/48239/team-obama panels, research talks, and workshops, the insti-
-told-to-ditch-instant-messaging.html (Accessed tute seeks to advance public diplomacy through
January 2013). scholarship, research, consultation, and profes-
Ibiblio. “Logs of Major Events in the Online sional services.
Community.” http://www.ibiblio.org/pub/ IPDGC has welcomed leading scholars, lead-
academic/communications/logs (Accessed ers, practitioners, and undersecretaries of state
December 2012). through its doors, and has offered training for
Netsplit. “Internet Relay Chat.” http://irc.netsplit.de nongovernmental organizations and embassies.
(Accessed December 2012). Diplomatic officials from around the globe have
698 Institution for Social and Policy Studies

visited the institute to connect and discuss press- the Syrian crisis. Throughout the day, discussions
ing and topical issues with students. were held on how user-generated images, videos,
Dr. Abdul Hakim Asher is the director of the and stories stream in every day from the nation
Government Media and Information Centre for of Syria, documenting the country’s instability.
the Islamic Republic of Afghanistan. Dr. Asher The group provided analysis and insight into the
visited George Washington University as a visit- influence of new media in the crisis, specifically
ing scholar in 2012 through May 2013 to work on three types of actors: activists on the ground,
on a book, participate in events at the School journalists and media-makers who are reporting
of Media and Public Affairs, and connect with on the crisis, and policymakers around the world.
scholars and students. On December 3, 2012, the institute hosted
In November 2011, the institute welcomed two an event on the Role of Social Media in Ending
delegates from the People’s Republic of China. Violence Against Women. The crux of the discus-
The delegates, scholars from IPDGC, lawyers, sion, which included social media strategists and
and former and current government officials held women advocates, was how social media offers
discussions on the strengths and challenges of the unprecedented opportunities to raise awareness
American political structure, public affairs, and around violence against women and girls, to help
Internet policy. users stay safe, and to inspire people to engage in
social activism. Simultaneously, social media blur
Social Media Presence the lines between journalism and activism.
The media play a critical role in public diplomacy
in influencing opinion and thought. IPDGC lever- Marion Jean Herbert
ages the power of the media through means such Independent Scholar
as Twitter, YouTube, and Facebook. In this man-
ner, global conversations are driver by users, and See Also: Center for Innovative Media; International
feedback on the dialogue is instant. Examples of Political Parties and Social Media;
IPDGC has a YouTube channel to share its lec- International Social Media and Politics.
tures and conferences. In March 2012, the institute
hosted a symposium, Hip Hop Diplomacy: Con- Further Readings
necting Through Culture, to discuss cultural diplo- George Washington University. “Institute for Public
macy in an intriguing and interesting manner. As Diplomacy and Global Communication.” http://
Aday notes at the event, the Obama administration www.gwu.edu/~ipdgc/index.cfm (Accessed
brought about a revolution in public diplomacy December 2012).
because it focuses just as much on the people as Mainwaring, Simon. We First: How Brands and
those in power. Mass communications play a large Consumers Use Social Media to Build a Better
role in how the United States presents itself and World. Basingstoke, UK: Palgrave Macmillan, 2011.
how diverse audiences and stakeholders behave. Takefiveblog.org. “Take Five.” http://takefiveblog.org
The IPDGC Twitter account, @IPDGC, pres- (Accessed December 2012).
ents itself as a hub for state affairs, new media, YouTube.com. “IPDGCvideos.” http://www.youtube
and important domestic and international news. .com/user/IPDGCvideos?blend=1&ob=video
The institute also features a blog, Take Five, -mustangbase (Accessed December 2012).
which seeks to invigorate the public diplomacy
discussion with contributions from a wide range
of authors offering fresh ideas about the way that
America conducts its diplomatic relations abroad
and about the impact of current policies. Institution for Social
Many of IPDGC’s events aim to analyze the
role of social media in current affairs. In one and Policy Studies
event, which partnered with the U.S. Institute of
Peace, a panel of journalists and political leaders The Institution for Social and Policy Studies (ISPS)
discussed the role of new media, technology, and was founded at Yale in 1968. Its aims are to foster
Institution for Social and Policy Studies 699

interdisciplinary social science research, and its roundtables, and visiting scholars on topics
outputs draw upon scholarship from several dif- related to American politics. Its more unique
ferent faculties. The organization’s tagline is: offerings include short courses for faculty of
“Advancing Research, Shaping Policy, Develop- other departments, which aim to give advanced
ing Leaders.” These functions are served through specialist training and knowledge on particu-
hosting academic conferences on a wide variety lar special interests. The staff structure of ISPS
of social science topics, funding and publishing reflects its interdisciplinary focus. Its current
original research, hosting academics from the director, James Hacker, is a professor of political
postgraduate to the professorial level engaged in science. Other members of the leadership include
interdisciplinary work, advocating specific policy professors from sociology, psychology, law, eco-
positions that reflect its prodemocracy and pro- nomics and management, and health policy and
academic values, participating in public policy administration.
debates, and offering degree programs for under-
graduate students. Advocacy
The ISPS could be characterized as generally
Areas of Study progressive in its policy recommendations and
The ISPS has 25 recognized areas of study in its advocacy activities. Much of this advocacy sim-
research and publication remit. Of these, at least ply takes the form of convening experts in vari-
four have direct relevance to social media and ous fields to discuss political topics and making
politics. These include: civil society and the state, the proceedings available to the public through
governance and democratic process, political a variety of social media platforms. Examples of
behavior, and science and technology. recent topics have included gun violence and gun
The vast majority of its publications and control, the role of money and power in gain-
research in these fields is in the form of aca- ing a political voice, climate change and pressure
demic journal articles, with a significant number on scientists to keep their findings quiet, and the
of book chapters, and the occasional academic idea that scholarship/scholars should take politi-
monograph. Many of these articles are published cal positions and be politically engaged.
in the most prestigious journals, demonstrating The political engagement of scholars can be
not only the publishing success, but also the problematic for an academic discipline such as
intellectual rigor and innovation involved in its political science, which purports at least a degree
work. In particular, the institution has a repu- of objectivity by inclusion of the word science.
tation for excellence in field experimentation, There have been issues with government fund-
which is a method of research that involves the ing of political research, especially when that
use of randomized variables introduced into per- research is used to advocate positions that are not
sonal or institutional political processes, which in agreement with the governing party or parties
can then be studied for their effects. Studies of that appropriate the funds.
this type have assessed the role of constitutional The ISPS was part of an effort to lobby the
education in generating support for civil rights U.S. Congress to continue funding political sci-
and tax policy. Many eminent political thinkers ence research through the National Science
and social activists have participated in the insti- Foundation, but this effort failed, with politi-
tution’s events, including open information and cians acknowledging that they objected to the
technology advocate Lawrence Lessig. type of research and its implications. The institu-
The ISPS has three semi-autonomous study tion has been particularly forceful in advocating
or research centers under its umbrella, in addi- for open access to research and academic publi-
tion to its other projects. These are the Center cations as part of its commitment to creating a
for the Study of American Politics (CSAP), the better-informed voting public and citizenry.
Program in Agrarian Studies, and the Interdisci- This commitment is evidenced not only in
plinary Center for Bioethics. The center is heav- its statements and research outputs, but also in
ily engaged in the U.S. political science commu- the availability of its research database, which
nity, and frequently hosts conferences, seminars, allows open access to view primary source
700 Institutional Cabling

datasets, published papers, and journal articles, Institutional Cabling


and even book chapters from its various schol-
ars. Given that it has to negotiate numerous As the Internet and other technological advances
copyright obstacles in order to allow this level have become more reliable and common in
of access, this demonstrates a genuine commit- schools, nonprofit organizations, hospitals, and
ment to the open access to information cause. other institutions, social media have become an
Much of this information will remain practically area of interest, especially with regard to the
inaccessible to the general public because of its extent that they allow the creation and exchange
academic language and specialization; however, of user-created content. To permit such a change,
the center also makes lectures and roundtable however, institutions must have the infrastruc-
discussions from its functions available online ture, such as cabling or wireless technologies, that
for public viewing. permit the use of Web- or mobile-based technolo-
gies to foster such communication. Infrastruc-
Social Media ture improvement has been a keen concern of
In order to disseminate its work as widely as pos- these leading institutions, although even wealthy
sible and to fulfill its role as an advocacy orga- organizations have sometimes found the cost of
nization, the institution maintains a presence on installing cabling or wireless access to be pro-
several of the major social networking and media hibitively expensive. This is perhaps related to a
platforms. It has a Facebook page, and is espe- colloquial understanding of the term institutional
cially active on Twitter. Its tweets link to articles cabling, in which those industry sectors perceived
and videos, and frequently refers to political hot to have both the need for a new technology and
topics using hashtags. the means to pay for it are likely to be at the top
This allows its research to quickly enter the of the installation and diffusion list. A variety
mainstream political discourse. It also has a You- of public and government-sponsored initiatives,
Tube channel with over 30,000 subscribers and however, had greatly assisted with this endeavor.
a library of roughly 20 videos. The International Although discussions regarding social media
Political Science Association lists its Web site as commonly refer to the Internet, in reality, an
among the most important political science Web extensive range of information services and
sites in the world. Through the medium of eBooks resources are used to connect millions of private,
and hardcopy books, the institution also pub- public, commercial, institutional, and govern-
lishes a book series, showcasing the work of its ment networks. These information services and
scholars, often offering assessments of public pol- resources include the World Wide Web, which
icy and prescriptions for making it work better. consists of a series of interlinked hypertext docu-
ments accessed by means of the Internet, as well
Jeremy Kleidosty as the infrastructure necessary to support this
University of St. Andrews information transfer. Sometimes referred to as
information infrastructure, it is comprised of
See Also: Campaigns, Digital; Campaigns, facilities, people, processes, and technology that
Grassroots; Campaigns, Virtual; Cause-Marketing are used to create, use, transport, and store infor-
Campaigns; Privacy. mation. During the 1990s, information infra-
structure first came to the public’s attention as
Further Readings a result of a political initiative by Vice President
Institution for Social and Policy Studies. http://www Al Gore to assist nonprofit institutions, especially
.isps.yale.edu (Accessed May 2013). schools, to install the cabling necessary to con-
International Political Science Association. “Top 300 nect to the Internet.
Websites for Political Science.” http://ipsaportal In 1991, then-Senator Al Gore introduced
.unina.it/?p=140 (Accessed June 2013). what became known as the High-Performance
Tapscott, D. Grown Up Digital: How the Net Computing Act (HPCA). Although the HPCA
Generation Is Changing Your World. New York: had a variety of goals, the creation of a National
McGraw-Hill, 2009. Information Infrastructure and the funding of the
Interactive Advertising Bureau 701

National Research and Education Network had As technology advanced, however, fiberoptic
important ramifications for institutions seeking to and twisted pair cables came to be favored for
create the high-speed computer networks neces- use in wiring institutions. As wireless local area
sary to efficiently access the Internet. This infor- networks have grown in popularity, many insti-
mation superhighway would permit the devel- tutions have experimented with switching to a
opment of digital communication systems that Wi-Fi system that allows electronic devices to
ultimately led to the creation and advancement of exchange data using radio waves over a computer
social media tools common today. network. Wi-Fi can be used by many devices,
Building upon developments begun by the including personal computers, tablets, smart-
military during the 1960s, and refined for edu- phones, and digital audio players. The switch to
cational and commercial use with funding from Wi-Fi requires the installation of access points,
the National Science Foundation (NSF) during sometimes called hotspots, every 65 feet within a
the 1980s, HPCA sought to bring the use of the structure. As the price of this technology declines,
Internet to the general public. To this end, HPCA it seems likely to continue to replace traditional
helped to fund the National Center for Supercom- cabling in institutions.
puting Applications (NCSA) at the University of
Illinois at Champaign/Urbana. Work at NCSA Stephen T. Schroth
led to the development of Mosaic in 1993, an Knox College
early Web browser that helped to spur the Inter-
net boom because of its use of a graphical user See Also: Al Gore’s Penguin Army; Campaigns,
interface (GUI) and reliable and easily understood Grassroots; Campaigns, Presidential (2000);
experience. While the HPCA provided funding Nonprofit Organizations; Schools4All; Social Media,
for the cabling of schools, the attention this drew Adoption of.
also led to state, local, and municipal govern-
ments funding this initiative, as well as volunteer Further Readings
initiatives designed to ensure that all students had Aaker, J. and A. Smith. The Dragonfly Effect: Quick,
access to the Internet. Effective, and Powerful Ways to Use Social Media
In 1995, the chief science officer at Sun Micro- to Drive Social Change. San Francisco: Jossey-
systems, John Gage, established NetDay as a way Bass, 2010.
for high-tech companies and organizations to Qualman, E. Socialnomics: How Social Media
assist clinics, libraries, and schools in connecting Transforms the Way We Live and Do Business.
to the Internet. The first official NetDay, held on Hoboken, NJ: John Wiley & Sons, 2011.
March 9, 1996, received a great deal of publicity
because of the participation of President Bill Clin-
ton and Vice President Gore, along with 20,000
other volunteers. Clinton and Gore spent NetDay
1996 at Ygnacio Valley High School in Concord, Interactive Advertising
California, as part of an initiative to install cable
in 20 percent of California schools so that they Bureau
would be able to connect to the Internet. NetDay
continued to be an annual event through 2004, The Interactive Advertising Bureau (IAB) is an
with the program eventually merging into Proj- organization founded in the United States in 1996,
ect Tomorrow, another initiative that seeks to with the primary objective of encouraging invest-
encourage and improve science and mathematics ment in interactive advertising, and thus in digital
education. media. This supranational organization has two
Evolving technology has changed the mate- main divisions in the United States and Europe
rials used for institutional cabling. In the early that looks for specific purposes in their operation
1990s, short coaxial cables were commonly used areas. The North American division of the IAB is
for implementing Ethernet networks, which is composed of more than 500 telecommunication
the standard for local area networks (LANs). companies and media that account for 86 percent
702 Interactive Advertising Bureau

of the country’s interactive advertising invest- systems in the network. Lack of standardization is
ment. Its headquarters is located in New York the major barrier to advertisers. The 27 European
City, and it has a public policy office in Washing- countries that have headquarters of the IAB are:
ton, D.C. The power of this association lies in its Portugal, Spain, the United Kingdom, Ireland,
members, including: general members, companies Germany, Austria, Belgium, Bulgaria, Croatia,
with turnover that is significantly based on the Denmark, Slovakia, Slovenia, Finland, France,
sale of interactive advertising inventory; associ- Greece, Holland, Hungary, Italy, Luxembourg,
ate members, companies that support the sale of Norway, Poland, the Czech Republic, Romania,
interactive advertising inventory but are not qual- Serbia, Switzerland, Sweden, and the Ukraine.
ified to be in the previous membership; and long
tail members, composed of independent sites and Goals
corporations that act as publishers (selling indi- The Internet is so far the only medium that com-
rectly, through a network, or directly) and have bines three key channel capabilities in marketing:
incomes above $1 million a year. communication, transaction and distribution; and
The current president and CEO of the Ameri- the vertical integration of marketing communica-
can division of the IAB is Randall Rothenberg. He tions, including advertising, public relations, pro-
was elected president in 2007, and served as such motion, and direct marketing. In the early days
until 2010, when he left the office to join Time of Internet advertising, editors of traditional mass
Inc. as executive vice president and chief digital media feared a loss of investment to online media.
officer. Later in 2011, he was rehired by the IAB as This did not happen, and the launch has been very
president and CEO. Before working for the IAB, slow, mainly because of the lack of standards for
Rothenberg worked for 10 years as marketing and audience measurement, which is one of the rea-
media columnist for Advertising Age. Then, he sons why the IAB was created. According to its
worked for six years for the New York Times as statutes, the fundamental objective of the IAB is
technology editor and politics editor of the Sunday to promote interactive advertising, supporting its
magazine, daily advertising columnist, and media members to improve their position on the market.
and marketing reporter. Prior to his IAB role, Mr. The main goals of both divisions are: establish
Rothenberg was the senior director of intellectual guidelines for audience measurement in digital
capital of Booz Allen Hamilton, the international media and promote standards to unify the mar-
strategy and technology consulting firm. ket; share best practices that result in business
growth; and generate research regarding this area,
Members demonstrating the growth of the online industry.
IAB Europe represents more than 5,500 organi- IAB Europe publishes the following reports: Adex
zations from 27 countries across the continent. Benchmark, the definitive guide to the European
IAB Europe includes not only the mature mar- online ad market, covering 25 country clubs in
kets of western Europe, but also countries such 2012; Mediascope Europe, the industry stan-
as Russia, Macedonia, Croatia, and Slovakia. dard, an average European consumption study;
Members fall into two main categories, corporate Regional Reports, including EEC, the Nordic
and national. The 54 corporate members include countries, the Middle East, and the big seven
“a variety of European, Russian and American markets in Europe; and Consumer Benefit Study,
companies acting in Europe throughout different calculating the value of the free Internet, the eco-
digital platforms, technologies and disciplines.” nomic value of the digital industry highlighting
Their role within the organization is supporting the digital creation of employment and trade for
expertise and funding so that the association can the regions, and protection against adverse leg-
achieve its objectives. islation and regulation, which can influence the
The association also brings together 27 development of this market.
national members that conduct regional studies To achieve these goals, the IAB proposed estab-
about advertising investment in interactive media. lishing a system of councils and committees spe-
They are responsible for developing ethical codes cialized thematically, and through its work, cre-
for the sector and to unify audience measurement ated added value to members. Committees are
Interactive Documentary 703

advertising, platform-based groups open to all these possibilities. Interactive documentary has
members of the IAB. Councils are based on job a strong link to the theme of politics and social
role or industry initiative, and are open only to media because it can help facilitate participation
members of the IAB General. Associate members by breaking down boundaries between produc-
may be invited to councils on a case-by-case basis. ers, audiences, and documentary subjects.
Both councils and committees are agenda-setting Early examples of interactive documentary
groups of senior executives. They spin off work- presented multimedia recordings organized as
ing groups made up of subject matter experts from a closed database of clips that the user could
member companies to focus on personal projects. explore via a hyperlink interface. An example of
this was Moss Landing, produced by the Apple
Natalia Abuín Vences Multimedia Lab in 1989, which used multiple
Raquel Vinader Segura cameras to record the life of the inhabitants of
Complutense University of Madrid Moss Landing over the period of one day. This
logic of hypertext documentary was subsequently
See Also: Advertising and Marketing; Campaigns, applied to pioneering work produced by the Voy-
Virtual; Europe. ager Company, such as the Stravinsky’s Rite of
Spring CD-ROM and BBC Interactive Television,
Further Readings such as the Domesday Videodisc Project. These
Howard, Philip N. The Digital Origins of works tended to focus on the point-and-click
Dictatorship and Democracy. Oxford, UK: Oxford style of navigation that was prevalent at the time,
University Press, 2010. through which users could take multiple routes
Li, H., and J. Bukovac. “Cognitive Impact of Banner through an organized database of recordings.
Ad Characteristics: An Experimental Study.” By the mid-1990s, it had become evident that
Journalism and Mass Communication Quarterly, this approach to interactive documentary was
v.76/2 (1999). failing to deliver an immersive experience for
Interactive Advertising Bureau. http://www.iab.net the user, and the suggestion was made that more
(Accessed August 2013). subtle forms of interaction based on simulation
and spatial metaphor held much greater promise
for the future. The term interactive documentary
fell largely dormant, and the focus shifted away
from representation toward the development of
Interactive networked computing. However, by 2005, high-
speed broadband had enabled a new form of
Documentary convergence, bringing together computing, televi-
sion, and the telecommunications industry. This
Interactive documentary is a term used to led to a renaissance of the term interactive docu-
describe the new possibilities for both the con- mentary and a flurry of activity. While networked
struction and representation of reality brought computing has been key to these developments,
about by the human–computer interface. For a it is not the sole driver. Other factors, such as the
documentary to be interactive in this context, a development of more immersive interfaces and an
physical action needs to take place between the increasing desire to combine documentary record-
human and the computer. This physical action ings with live performance, are also at play.
can include many different types of interactiv- In 2011, i-Docs was convened as the world’s
ity, such as mouse clicking through Web sites, first conference dedicated to interactive docu-
tapping on multitouch tablet screens, activating mentary. Taking an expansive view of interactive
censors in gallery installations, and using smart- documentary, the conference incorporated possi-
phones to call up locative media. As comput- bilities afforded by a wide range of technologies,
ers become ever more embedded into everyday and placed debates around intent and purpose at
life, the possibilities of interactive documentary the center of the discussions. A follow-up confer-
continue to evolve, with the understanding of ence was convened in 2012, and the i-Docs.org
704 International Examples of Political Parties and Social Media

Web hub was set up for ongoing discussion and downloaded and repurposed to create new inter-
debate. Central to the endeavor was the idea to pretations. In addition to this, the open source
engage a community of practitioners and theo- community is actively developing free software to
rists in open-ended dialogue driven by a spirit of facilitate access to interactive documentary mak-
collaboration and exchange. Discussion around ing. This participatory promise must not be taken
the politics of participation and associated ethical as a given. As interactive documentary making is
issues continues to be an important theme within becomes ever-more mainstream, viable business
this developing community. Interactive documen- models are emerging. This brings well-rehearsed
tary making has subsequently become more rec- debates around access and ownership to the fore,
ognized within the mainstream documentary cir- placing the genre within a much broader contin-
cuit, as can be seen by its increased exposure at uum of practice.
festivals and conferences around the world.
Current debates around interactive docu- Judith Aston
mentary are focused on different approaches to University of the West of England
authorship within a fluid and interdisciplinary
field of practice. The creators of these new forms See Also: Citizen Journalism; Crowdsourcing;
may be professional storytellers communicat- Documentaries, Social Media, and Social Change;
ing expert knowledge, artists communicating 18daysinegypt.com; i-Docs.org; Immersive
personal visions, or activists working to engage Journalism; Open Source Politics; Remix, Political.
disenfranchised communities in an active pro-
cess of making. By 2011, the current focus for Further Readings
interactive documentary making was in coun- Aston, J., J. Dovey, and S. Gaudenzi, eds. “Special
tries such as Canada and France, where there is Issue on Interactive Documentary.” Studies in
a long-standing tradition of government subsidy Documentary Film, v.6/2 (2012).
for such endeavors. However, interactive docu- Davenport, G. “ConText: Towards the Evolving
mentaries are becoming ever more global in their Documentary.” ACM Multimedia Electronic
reach. Projects such as 18 Days in Egypt have Proceedings, 1995.
crowdsourced peoples’ recordings of the events Documentary Network. Documentary and New
leading up to the 2011 uprising, and the data- Digital Platforms: An Ecosystem in Transition.
base of documentary recordings from the Indian Montreal, Canada: Quebec, 2011.
subcontinent found on the Pad.ma Web site has Murray, J. Inventing the Medium. Principles
grown exponentially. 18 Days in Egypt, in par- of Interaction Design as a Cultural Practice.
ticular, is a good example of the multiple ways in Cambridge, MA: MIT Press, 2012.
which interactive documentary as a new media Whitby, M. “Is Interactive Dead?” Wired, v.1.01
storytelling genre can—and often does—not just (1993).
incorporate, but often capitalize on social media
as a source of content nontraditional distribution
strategies.
The interactive documentary holds the poten-
tial to facilitate political engagement by encour- International Examples
aging users to become participants in the active
construction of a reality. This potential is playing of Political Parties and
out in a variety of contexts, from requiring par-
ticipants to make active decisions through role-
Social Media
play and simulation, through increasing people’s Social media offer much to democracy and politi-
access to government information, to empower- cal engagement; therefore, much research has
ing people to create interactive documentaries been devoted to examining how political parties
in response to the world around them. Remix and candidates use these platforms. Political par-
culture is also a key factor in the world of inter- ties are arguably the lifeblood of democracies.
active documentary because recordings can be Traditionally, political parties form around a set
International Examples of Political Parties and Social Media 705

of ideological values and precepts. Recent trends


have seen many parties shedding their ideological
constraints to instead offer a manifesto of policies
that appeal to a postideological electorate. These
have been described as catch-all parties, designed
to appeal to the largest number of voters possible.
Within this postideological context, electioneer-
ing becomes more about positioning the party
elite and leader as the best management team
than selling a value-laden perspective of society.
Political parties perform a number of functions
within democracies. First, parties provide rep-
resentation for individuals and groups. Second,
they provide mechanisms for political socializa-
tion through meetings, social clubs, and societies
and encourage participation by mobilizing their
members. Third, they articulate the interests of
those they represent and aggregate those interests
to formulate policy. Fourth, they provide leader-
ship to form governments or coalitions; power is
dispersed among the elite and across the member-
ship who elect the leader.
These demonstrators gathered outside BBC Television in London
The Potential of Social Media to protest the network’s invitation to the leader of a neofascist
Theoretically, the first three functions of political party to a television interview. Opponents of the British National
parties may be supported through the use of social Party also attacked the party on its Facebook page.
media. The demand for responsive representation
necessitates greater emphasis on communication.
Mass media are increasingly unlikely to provide
space for parties to inform citizens about their Political parties can use social media platforms to
representative activities. Web sites have, for over create spaces for members, activists, supporters,
a decade, been spaces for unmediated informa- and those with a general interest in the policies or
tion from political parties; however, longitudinal fortunes of the party to congregate virtually. The
studies by the U.S.-based Pew Research Center, act of joining gives the party permission to con-
the United Kingdom (UK) Hansard Society, and tact individuals within that community, therefore
the French Mediapolis Project show that no more enhancing the informational link.
than 12 percent of people visit party Web sites. However, and more importantly, parties are
Weblogs, microblogs, the use of Twitter or Face- also able to mobilize their supporters to extend
book as news feeds, or picture or video sharing the reach of their messages, support their cam-
platforms offer more engaging ways of reaching paigns using e-petitions, for example, and engage
citizens. Furthermore, due to platform function- in some form of offline activism. But, political
ality permitting content sharing, social media use party use of social media need not stop at build-
can extend the reach of the party beyond their ing a community of members that will work for
immediate followers, via those followers to a the party; the party can also work with members
broader online diaspora. Informing remains a of the community. Social media can be used to
core element of political parties’ communication; solicit the views of community members, gain-
however, the second and third functions may be ing data regarding policy priorities and cocre-
best served using social media. ate policy. These activities evoke a somewhat
Social media facilitate the creation of com- optimistic view of how political parties may use
munities that connect around shared interests. social media.
706 International Examples of Political Parties and Social Media

Social Political Parties? However, parties remain absent from conversa-


Political parties were initially slow to incorporate tions that take place. Parties do not encourage
social media into their communication strategies. discussion by asking questions or requesting con-
The U.S. campaigns of Jesse Ventura in 1998, tent cocreation. They do not respond publicly to
the innovative use of Weblogs and Meetup.org questions asked by community members (e.g.,
by Howard Dean in 2003 and 2004, and Barack YouTube channels comments are disabled to pre-
Obama’s 2008 campaign showed the potential vent the party message from becoming distorted.
the Internet offered for building and mobilizing a What appears within the political party profiles
grassroots movement. The use of the MyBO site on social media platforms is a form of graffiti. Vis-
to build a community, mobilize supporters online itors place comments and slogans on the walls of
and offline, and, in a limited way cocreate policy social media profiles of the parties that require no
priorities following his victory, led to his tactics response, and the graffiti writer does not return
being mirrored in elections across the world, from to check for responses. The majority of this graf-
Portugal to Israel and the UK. However, take up fiti is supportive. The Facebook profiles of par-
of social media mostly just mirrored the look of ties during election campaigns in the UK, Poland,
the Obama campaign, rather than replicating the and France largely had favorable comments from
social strategy in its entirety. supporters happy to publicly advertise their sup-
Studies of elections in advanced democracies port. However, opponents also use these spaces
where a critical mass of citizens has access to the to attack parties. The UK Labour Party launched
Internet show that the majority of parties create a campaign called Change We See, asking sup-
profiles on the most popular social media plat- porters to upload pictures demonstrating what
forms in their respective countries. The global the Labour governments from 1997 to 2010 had
dominance of YouTube, Twitter, and Facebook achieved. One activist uploaded pictures depict-
has seen them equally dominate the sphere of ing urban decay to subvert the campaign.
political communication. YouTube plays the role A blunter example saw Facebook users
of a personal television channel, allowing parties become fans of the British National Party, a
to place their videos online for continual viewing; right-wing neofascist organization, long enough
this is particularly useful in nations where political to post comments such as “fascist scum.” How-
advertising is not permitted by law. Twitter plays ever, political parties universally encourage one
the role of a news feed, transmitting information, form of interaction, activities that extend the
often including links to the party Web site or its reach of the party. Hence, social media is seen as
YouTube channel. Facebook is largely used for a a tool for political parties to promote themselves,
similar function. A Facebook feed is often linked using the free labor of supporters, as opposed to
to Twitter, but with scope for embedding pictures a space for communities to work with parties to
and videos. These social media platforms are often develop policy.
complemented by multimedia Web sites that offer Promotion is not the only use made of the
news feeds allowing visitors to leave comments. Internet, and so, social media spaces that per-
These uses of social media all support the repre- mit interaction but are not public need to be
sentative function of political parties by providing considered. The German Christian Democratic
spaces where information can be delivered directly Union and Social Democratic Party created pri-
to interested supporters and the wider citizenry. vate spaces within StudiVZ, which could only
The byproduct of this usage, even when it is not be accessed by approved members. More com-
always the intention, is to facilitate a more interac- mon, however, is to have a social space within
tive mode of political communication. a party Intranet system. Here, debate can take
The use of Facebook in particular, by default, place to determine policy, but this is open only
creates a community to whom the party can com- to party members. Party strategists argue that if
municate, and that can communicate back to the parties were to open up decision making, then it
party. The community is also able to communi- would undermine two key principles that under-
cate with one another, discussing any aspect of pin the principles on which parties operate. First,
the party’s communication or political program. political parties should sell solutions, not simply
International Examples of Political Parties and Social Media 707

follow public opinion, retaining the role for val- significant amount of data can be gleaned about
ues and utilitarianism. Second, parties with an party supporters from platforms like Facebook.
internal democratic structure must involve mem- Insights into their interests, the causes they sup-
bers in policymaking, not the broader citizenry. port, their occupations, education levels, and
Hence, the use of social media is limited; pub- other personal details can be learned and then
lic communication is allowed, but interaction is used for targeting further communication. How-
designed to mobilize supporters into activism, ever, resources determine whether data mining
not to contribute to policymaking. Political com- can be effectively conducted.
munication on social media largely adheres to the
norms of persuasion. Caution and Cost: Barriers to Usage
Two issues constrain political parties embrac-
The Challenge of Reach ing social media, beyond those raised relating to
The assumption was that social media provided wider issues of external and internal democracy.
the means to reach young people, those least First are those relating to loss of control. Because
likely to be interested in party politics, to engage of the practices of trolling, control over commu-
with elections or vote. While young people are nication can be lost.
among those who follow parties on social media, Criticism on social media is likely to be public
according to surveys, the majority are 30 years and so becomes part of the overall online pres-
old or older and have an existing high interest ence of the party. Furthermore, parties can be
in politics. These data suggest that the only way drawn into in-depth discussion about policy that
for social media to fulfill the potential to gain they ordinarily avoid. Particularly in the context
support among new demographics relies on net- of elections, but also possibly when the opposi-
work effect, that online supporters of the politi- tion develops critiques of government policy, par-
cal party share messages with their networks, ties tend to eschew specifics in favor of broader
facilitating messages to reach those who would political statements.
perhaps never consider seeking political infor- Second, there are practical reasons that social
mation online. media are not used to their full potential by
Social media usage, however, not only facili- political parties: finances. To effectively manage
tates reaching new demographics, but also deliv- a social media presence requires personnel to
ering information to individuals and groups who create content, answer questions, and moderate
may extend the reach of a party by dint of their comments; resources are also required to effec-
professions and interests. This group includes tively use data that can be gleaned from social
party activists, but more importantly, journalists, media. Few parties outside of the United States
issue activists, and Webloggers. Party use of Twit- have the resources for these demands; hence,
ter, for example, seems far more likely to be tar- social media tend to be used for promotional
geted at journalists. But, parties have the problem purposes only.
that they are unsure what voice to use on social
media. Corporate brands can build a following Darren G. Lilleker
using special offers. Individual politicians, presi- Bournemouth University
dential candidates, party leaders, or local repre-
sentatives can present a more engaging experience See Also: Campaign Strategy; Campaigns, 2012;
for followers by using a mixture of political and Ethics of Social Media in Politics; Networks, Political;
personal insights. Local representatives can also Secondhand Political Engagement.
address specific local issues that are of interest
to their constituents. Political parties are unable Further Readings
to personalize their communication, have no Gibson, Rachel. The Internet and Politics:
products to entice supporters, and can offer little Citizens, Voters and Activists. London: Taylor &
beyond a news feed. Francis, 2007.
Social media offer one further opportunity Lilleker, Darren G. and Nigel Jackson. Political
for political parties: the collection of data. A Campaigning, Elections and the Internet:
708 International Intervention

Comparing the US, UK, France and Germany. or commenting upon developments in political
London: Routledge, 2011. crises.
Mair, Peter, Wolfgang Muller, and Fritz Plasser. Along this continuum, traditional diplomacy
Political Parties and Electoral Change: Party ranks at the base of the scale, where social media
Responses to Electoral Markets. London: can best be used to communicate intentions from
Sage, 2004. one government to another in a public setting.
Social media have also played roles in revealing
private, diplomatic communications that might
benefit one faction or another. For example, the
Tunisian uprisings beginning in December 2010
International spawned a number of organizations, such as tunile-
aks.org and OpenTunisia.org, with their stated
Intervention purpose to publicize diplomatic correspondence
about the Zine al-Abidine Ben Ali regime, spread-
Interventions are intentional actions taken by ing their messages through social media networks.
an actor from one state in the affairs of another. Public diplomacy and advocacy follow tradi-
Historically, intervention has been viewed as tional diplomacy in using social media to commu-
state actions in the domestic affairs of other nicate intentions, demands, and support directly
states. Today, augmented by social media, non- to affected groups, bypassing official governmen-
state actors are also able to effect interventions tal channels. Communicating intentions from one
across state borders. In countries where domes- government directly to people in another country
tic political conflicts have potential international has the objective of countering, reinforcing, or
consequences, or where domestic factions are contradicting messages by adversaries. Messages
supported or opposed from the outside, various that condemn provocative or violent actions or
types of intervention can occur. expose human rights violations, for example,
Electronic social media have provided new can be linked from press releases on official Web
methods and channels for carrying out interven- sites to social media services, and thus have a
tion. Social media are used to inject new infor- large, ready audience receiving such messages
mation into political conflicts from outside a simultaneously.
country’s borders, and social networks can be During the Egyptian conflicts of January 2011,
deployed for political mobilization and opposi- social media sites were extensively used to obtain
tion. Especially where political conflicts reach a real-time changes in support for the Mubarak
crisis level, social media provide a critical instru- regime in other countries. Likewise, running com-
ment in foreign policy to influence the outcomes mentaries on official policy statements can be
of domestic contests for political power. aggregated and used as an indicator of support or
opposition. Knowing this fact, the security agen-
Forms of Intervention cies in Egypt for a time injected individual mes-
Intervention, as it applies to social media, can be sages of alleged support for Mubarak as a way
viewed along a continuum of discrete actions of of tempering opposition and perhaps to confound
increasing escalation. In the social media context, foreign social media analyses.
interventions include official government-spon- Novel ways to sustain intervention occurred
sored messaging, messaging by nongovernmen- during Iran’s Green Revolution following presi-
tal organizations (NGOs) outside and inside the dential elections in 2009. Internal groups orga-
country, messaging by political factions or oppo- nized around the defeated political parties in ways
sition groups in the country for internal and exter- that amplified their influence through social media,
nal consumption, and individuals—wherever they and they soon had support from Iranian diaspora
are located—participating in a political contest. groups and other sympathizers. The momentum
The messaging can be strategic, in terms of com- and size of these groups grew and began to use
municating objectives, threats, and intentions or social media effectively for both organization and
tactical in terms of organizing particular events tactical mobilization in the streets of Iran’s major
International Intervention 709

cities. To sustain pressure on the Iranian govern- disadvantage. It is also very difficult to deter-
ment, U.S. authorities persuaded Twitter to defer mine the source of such actions becasue social
maintenance on its site so that Iranians could con- media services cannot always prevent pseudony-
tinue to use the service. When the Iranian govern- mous identities or messages. Attribution becomes
ment began to block social media sites, individuals obscure: Groups may claim credit through social
outside Iran provided methods for circumventing media for certain actions, without any indepen-
such censorship, and continued to monitor Iranian dent means of verification.
networks for signs of interference. While one of When intervention reaches the point of military
these circumvention tools was later proven inef- action, social media can be employed to aid certain
fective, rapid, real-time actions from outside Iran operations. In the July 2006 war between Israel
were able to assist social networks inside the coun- and Hezbollah, incursions by Israeli forces or
try actively and were able to get information in coordinated air strikes were preceded by SMSs and
and out of the country, overcoming Iranian gov- texting broadcast messages to thousands of Leba-
ernment interference. Thus, both governments nese numbers. These broadcast text messages were
and organized groups can monitor the activities of effective in evacuating noncombatants from cer-
opposition groups during a political conflict and tain areas or compelling opposing forces to move,
take measures to sustain and secure their activities thereby disclosing their positions. Future conflicts
or attempt to close them down.
Intervention can also extend to selective com-
munications-related sanctions against one coun-
try by another or by a coalition of governments
seeking to alter the dynamics of a political con-
flict. In the case of Syria, for example, in 2012,
the United States and other sympathetic countries
embargoed hardware and software that can block
Web sites or enable surveillance of mobile tex-
ting and short messaging services (SMSs). At the
same time, communications equipment, software,
and training were made available to opposition
groups by governments and private sources. This
type of assistance has been used in social net-
works for warning the population in a given area
of impending actions by the Syrian government
and for better organizing groups inside Syria to
report and document human rights abuses.
Intervention using social media also takes the
form of covert actions and the use of proxy actors.
Certain groups may not want to disclose the iden-
tity of their members for security reasons. Some
groups and governments may desire to inject dis-
information and rumor into a political conflict
anonymously or in a false name. These uses of
social media are only beginning to be understood
because it is difficult to obtain systematic, reliable
data about covert or clandestine media opera-
tions. Yet, when the stakes in a political crisis
are high, and especially when such intervention
promises to increase turmoil and disorder, incen- Local members of the International Committee of the Red Cross
tives are strong to use social media to complicate and Red Crescent unloading food with the help of city residents
the landscape or distract certain groups to their in the Al-Ghuta neighborhood of Homs, Syria, in February 2012.
710 International Online Communities

can expect social media to play similar roles of Further Readings


warning and response. Opposing forces that want Aday, Sean and Steven Livingston. “Taking the
to restrict communications can also be expected to State Out of State-Media Relations Theory: How
shut down or impede social media services of an Transnational Advocacy Networks Are Rewriting
adversary to gain operational advantage. (Some of) the Rules About What We Think We
Know About News and Politics.” Media, War, and
Norms of Intervention Conflict, v.1 (2008).
International relations scholars generally agree Bennett, W. Lance. “New Media Power: The Internet
that all forms of intervention have been increas- and Global Activism.” In Contesting Media Power,
ing along the entire continuum in the past two Nick Couldry and James Curran, eds. Oxford:
decades and will likely continue. Yet, scholars dis- Rowman & Littlefield, 2003.
agree whether such evidence of intervention indi- D’Amato, Anthony. “There Is No Norm of
cates an emerging norm in international behavior, Intervention or Non-Intervention in International
and they disagree about the desirability of social Law.” Northwestern University School of
media to play an increasingly significant role in Law, Scholarly Commons, Faculty Working
international intervention. In normative terms, Papers, 2010.
many forays in media freedom, the free flow of Howard, Philip N. and M. M. Hussain. “Digital
information, and similar concepts feed directly Media and the Arab Spring.” Journal of
into arguments that promote human rights, dem- Democracy, v.22 (2011).
ocratic reform, and the development of healthy Hurd, Ian. “Is Humanitarian Intervention Legal? The
civil society. Yet, it remains to be demonstrated Rule of Law in an Incoherent World.” Ethics and
whether foreign intervention in a domestic politi- International Affairs, v.25/3 (2011).
cal conflict can induce desired results or be con- Morozov, Evgeny. The Net Delusion. New York:
trolled once ignited. Social media initially appear Public Affairs Press, 2011.
to be neutral or benign channels for distributing Shirky, Clay. “The Political Power of Social Media.”
news, information, and for organizing political Foreign Affairs, v.90 (2011).
groups. Yet, its power for social mobilization Wilson, Christopher and Alexandra Dunn. “Digital
appears strong. Once unleashed, these media may Media in the Egyptian Revolution: Descriptive
take on characteristics beyond the control of their Analysis From the Tahrir Data Sets.” International
initial source. Journal of Communication, v.5 (2011).
Even in a humanitarian response, social media Youmans, William Lafi and Jillian C. York. “Social
may not always be used as intended by aid and Media and the Activist Toolkit: User Agreements,
relief agencies. Such observations should not be Corporate Interests, and the Information
taken as arguments to curtail the value of social Infrastructure of Modern Social Movements.”
messaging in these situations. Yet, governments Journal of Communication, v.62 (2012).
and nongovernmental organizations will need to
understand that, when they intervene in a politi-
cal conflict, their ability to control the outcomes
of events may be more limited than desired. Con-
versely, the effects of social media in political con- International Online
flicts show that information is power, and as such,
political actors will seek to control and manipulate Communities
it for their ends whenever they are able.
The Internet, by its boundary-crossing nature, has
Eric J. Novotny been able to support the development of a num-
American University ber of communities at an unprecedented interna-
tional level. The definition of “community” is in
See Also: Arab Spring; Disaster Relief; Egypt; Iran; itself a fluid concept, but for the purposes of this
Libya; Public Diplomacy Institute; Spanish 15M entry, it will involve an analysis of groups that
Movement; Tunisia.  come together online across a number of different
International Online Communities 711

countries with a shared interest or aim. These Online initially developed as an anime-focused
communities can be facilitated through any form community site, but has significantly grown to
of online interaction, from video chat to bulletin encompass social networking and forum-based
boards, and can be open access or closed to a interactions. It had more than 26 million regis-
specific group. Furthermore, online communities tered users in 2012, and developed currency, Gai-
can differ from real-world communities in that aCash, which can be gained as a reward for com-
they can connect not only individuals, but also munity participation. In a similar manner to Gai
organizations working in relation to a common Online, 4Chan is a Web site that initially devel-
purpose or interest. oped in order to discuss anime, but has grown
Research into real-world communities high- into something much more all encompassing, and
lights the development and existence of norms no issue is off limits. It has a focus on the posting
of behavior, and while international online com- of images and a policy of anonymous registration.
munities follow certain social structures, the use Due to these policies and the grassroots devel-
of technology has led to the development of new opment of community group standards, 4Chan
behavioral norms and methods of internal regu- users have created numerous Internet memes and
lation. Whereas some communities, for example are rumored to be at the center of high-profile
Virtual Sunderland in the United Kingdom, link instances of online activism and pranks.
to particular physical locations, a large num- The development of content is the key driver
ber of online communities have developed at an for the international online communities that have
international level. grown on a wiki basis. The first user-generated
wiki site was WikiWikiWeb, which acts as an
Types idea-sharing forum to bring people with shared
International online communities are difficult interests together. Wikipedia is the largest wiki
to categorize because of their differing origins, Web site, with approximately 365 million global
aims, and regulations. Some develop through a users. It is a user-generated and edited online ency-
focus on entertainment and interactions relating clopedia that supports a large, international com-
to specific genres. Something Awful is a discus- munity of contributors and interactions in order
sion-board Web site based upon the sharing of to achieve a consensus on the shared information.
comedy-related content. Its pay-to-register forum Its multilingual format supports the international
has a large, international user base that has con- nature of its community-building resources.
tributed to the development of a number of nota- Certain online international communities
ble Internet memes. In a similar vein, IGN is an encourage global interaction through immersion
entertainment-focused community Web site that in virtual worlds. These allow users to interact
not only addresses video games, but also films with others through the online interaction of ava-
and television programs. While most of the inter- tars. The international nature of these Web sites
action focuses on entertainment, it also has active facilitate community development on a global
general discussion and community areas. scale, where users can find others with similar
Certain international communities develop interests and share information using related
through an initial focus upon a particular interest chat, forums, and blogs. Second Life is an immer-
or issue. Vault Network is a large, international sive online environment with more than 20 mil-
community focused on roleplaying and massively lion registered users that allows those over the
multiplayer online role-playing games (MMOR- age of 16 to interact as avatars in a sophisticated
PGs). It includes a wiki and a very active forum, virtual world.
with a heavy emphasis on user-directed topic International online communities can build
development. Buddy Pic has developed into an up around the interactive features supporting
online community and had more than 74 million commercial Web sites. EBay is a consumer-to-
posts as of 2012; these often have a focus on rat- consumer Web site that allows users to list items
ing users’ photographs on the basis of their attrac- for immediate or auction-based sale. Its attached
tiveness. This is then underpinned by a number of community allows global users to use discussion
forums, including general discussion topics. Gaia boards and videos and to join groups. In a similar
712 International Social Media and Politics

manner, Amazon is a large e-commerce selling Porter, C. “A Typology of Virtual Communities:


platform that includes community-building fea- A Multi-Disciplinary Foundation for Future
tures, which allow registered users to rate and dis- Research.” Journal of Computer-Mediated
cuss products and to interact via its forums. The Communication, v.10/1 (November 2004).
development of a virtual community attached http://jcmc.indiana.edu/vol10/issue1/porter.html
to a commercial enterprise is a powerful way (Accessed November 2012).
to expand online businesses. The community in Song, F. Virtual Communities (Digital Formations).
which users can interact and support each other New York: Peter Lang, 2009.
both attracts potential customers and aids the
retention of existing ones.

Social Networking
Some of the largest international online com- International Social
munities have built up around social network-
ing platforms. These will generally allow users Media and Politics
a space upon which to post information and
images; this is then complemented by chat facili- Social media began to emerge as a widespread
ties, games, and group spaces. Facebook is one tool for political change at the turn of the 21st
of the largest social networking communities, century, alongside the development of the social
and in 2012, its number of active users surpassed Web. Globally, popular social media platforms
1 billion. Another example of a social network- such as Facebook, YouTube, and Twitter have
ing-based international community is Myspace, had a strong impact on the development of
which developed with a focus on pop music tactics for online organizing, while local plat-
and culture, but has recently seen a downturn forms often play significant roles in the delivery
in active unique users. Other similar platforms of local political messages. Older social media,
include Hi5, which has a large, international such as short message service (SMS) play signifi-
user base outside the United States; and Linke- cant roles in organizing, particularly in countries
dIn, which seeks to create an international com- where mobile penetration is higher than Internet
munity of professional contacts. penetration.
International virtual communities have also Among the earliest examples of social media
been created in order to facilitate the sharing of use to influence politics occurred in 2001 in the
research at a global level. The interaction provided Philippines, where upon a congressional vote to
through these communities allows for an unprec- set aside key evidence against President Joseph
edented level of participation and collaboration Estrada in his impeachment trial, thousands of
across existing and new networks. The European Filipinos quickly organized in protest, in part by
Union’s Lisbon Strategy includes a focus upon forwarding a text message with instructions on
developing these online communities through ini- where to meet and what to wear. Their protest
tiatives such as GEANT and the e-Science Grids. was effective in changing legislators’ minds: The
evidence was allowed, and Estrada was sentenced.
Catherine Easton Similarly, after Spanish Prime Minister José
Lancaster University Maria Aznar inaccurately blamed the March 11,
2004, Madrid train bombings on Basque separat-
See Also: Facebook; Internet Forums; Second Life; ists, demonstrations organized by text messaging
Social Media, Definition and Classes of. led to Aznar losing the elections several days later.
Researcher Michael McFaul has suggested that
Further Readings Ukraine’s 2004 Orange Revolution “may have
Goodin, Dan. “The EBay of Content.” CNN Tech been the first in history to be organized largely
(February 6, 2000). http://articles.cnn.com/2000 online.” Activists coordinated protests using
-02-16/tech/lots.of.content.idg_1_ebay-mp3-com SMS, while Web site discussion boards for report-
-promise?_s=PM:TECH (Accessed January 2013). ing election fraud were quickly developed and
International Social Media and Politics 713

disseminated. Additionally, the relative increase time, the effect was less of political change, and
in Internet access—3.5 percent of Ukrainians more toward ensuring that the world was watch-
had access in 2004, compared to 1.25 percent in ing. The government, nevertheless, responded by
2001—allowed for newly developed independent shutting down the country’s Internet and mobile
and citizen media to reach a larger constituency. phone connections for nearly two weeks.
One year later what may be the first large-scale
Social Media and Political Movements protest organized in part on Facebook occurred.
The launch of dedicated social media platforms In Al Mahalla al Kubra, Egypt, workers respond-
such as Facebook (2004), YouTube (2005), and ing to low wages and rising food costs organized
Twitter (2006) greatly improved the ability of a general strike on April 6, 2008, just two days
politicians, activists, and other organizers to com- before municipal elections. Their strike was picked
municate to the masses. Whereas blogs and other up and promoted on Facebook, blogs, SMS, and
Web sites enable individuals and organizations through word of mouth by activists. One Face-
to broadcast information, these platforms enable book group, dubbed the April 6 Youth Move-
one-to-one communication, and coupled with the ment, attracted more than 64,000 members. As
proliferation of smartphones, allow anyone to a result of the strike, several bloggers and online
quickly distribute text, images, and video. activists who participated in the calls to action
While these tools have had significant impacts were arrested. The 2008 movement is often cited
on the structure of both political campaigns and as having contributed to the 2011 protests that
grassroots political organizing, they have been ousted then-president Hosni Mubarak.
slow—or, in some cases, have yet—to eclipse Facebook also featured prominently in what
older social media such as SMS in countries may have been the largest demonstration in
where Internet penetration remains low. For Colombia’s history. On February 4, 2008, more
example, unrest triggered in January 2008 by than a million Colombians—as well as smaller
Kenya’s contested presidential elections quickly groups in dozens of major cities worldwide—took
turned to violence because of the viral spread to the streets to demonstrate against the Revolu-
of SMS urging violent retribution against the tionary Armed Forces of Colombia (FARC). The
Kikuyu ethnic group. call for demonstration originated with Oscar
This prompted the development of a tool to Morales, a young engineer who set up a Face-
track incidents of violence by a group of Kenyans book group called One Million Voices Against
located in the country and throughout the dias- the FARC in an effort to influence public senti-
pora. Dubbed Ushahidi, the tool blends the use ment during a period of hostage negotiations.
of Google maps with a tool for users, via mobile Morales’s Facebook efforts received considerable
phone or Internet browser, to report incidents of international attention, and may have influenced
violence and add photos, video, and text docu- future use of the platform.
mentation. Ushahidi, later developed and made
publicly available as a tracking tool for political Twitter Revolutions
and humanitarian purposes, helped draw atten- The use of Twitter in a political movement first
tion to Kenya’s political unrest and later restore came into play in April 2009 in Moldova, where
order to the country. more than 10,000 protesters were reported by
Although it also relied heavily on the use of the New York Times to have materialized, as
SMS for organizing, Burma’s 2007 Saffron Revo- Ellen Barry describes, from “seemingly out of
lution was among the first political movements nowhere.” Utilizing Twitter’s format of 140 char-
to utilize Web-based social media tools. Using acters or fewer, activists used the hashtag #pman
mobile phones, Burmese citizens took pictures (short for Piata Marii Adunari Nationale, or
and videos that they then uploaded from Internet the name of Moldovan capital Chisinau’s main
cafes or sent across the border to Thailand to be square) to encourage citizens to join the protests
uploaded. Although it is impossible to determine and report on events, leading scholar Evgeny
the intent of such widespread action, with Internet Morozov to dub the protests a Twitter revolution,
penetration in Burma well below 1 percent at the the first documented use of the term.
714 International Social Media and Politics

Although the Moldovan uprising failed as a Iranian authorities also demonstrated their
revolution, it succeeded in drawing attention to ability to use social networks to identify, harass,
the use of social media as a protest tool. Mol- and otherwise intimidate protesters, a harbinger
dova’s Internet penetration—about 30 percent of what would later occur in countries throughout
of the population in 2009—may have hindered the Middle East. While their tactics were report-
Twitter’s role in organizing, but given the global edly rudimentary, relying on manually identifying
popularity of Twitter at the time, its use greatly faces in images and videos, their strategy nonethe-
contributed to global awareness of the Moldovan less served to intimidate Iranian citizens.
protests, partly because of the ability of activists In March 2010, Thailand’s United Front for
to hijack existing conversation threads on Twitter Democracy Against Dictatorship (UDD), whose
in an effort to increase international attention. supporters are commonly known as Red Shirts,
A second uprising in 2009 cemented Twitter’s organized demonstrations to demand that the
utility as a tool for political movements when, fol- prime minister dissolve parliament and hold elec-
lowing Iran’s contested presidential election, pro- tions earlier than scheduled. After negotiations
testers took to the streets to protest Ahmadinejad’s between the UDD and the government failed, the
win and used Twitter to ensure that the world was protests escalated into violence, with more than
watching. At the time of the protests, many news 80 civilian deaths and 6 police deaths in a period
sources—including the New York Times and TIME of two months.
Magazine—immediately dubbed the uprising a Amid the protests, media researchers docu-
“Twitter revolution”; however others, including mented a significant rise in Facebook users: an
Evgeny Morozov, were skeptical, questioning the increase of nearly 1 million between April and
number of Iranians actually using Twitter within May 2010. At the same time, Thailand’s Deputy
the country. Whereas thousands of tweets utilizing Prime Minister Suthep Thaugsuban reportedly
the #iranelection hashtag were documented, it is ordered the blocking of television and commu-
not clear how many of those missives came from nity radio stations and Web sites that broadcast
within the country; discerning location was made “subversive” stories. The blocking of news Web
more difficult by the fact that many Twitter users sites and blogs may have contributed to the rise
changed the location field of their user profiles to in Facebook users: The platform may have served
Tehran as an act of solidarity, obscuring their true as a central location for information sharing at
locations. The perceived importance of Twitter was a time when popular sites were blocked. Twitter,
increased by a request from the U.S. Department which remained unblocked, also served to spread
of State on June 12 to Twitter to delay a network information, as well as serving as a guide for jour-
upgrade in order to ensure that Iranian protesters nalists to locate sources amid the demonstrators.
using the site could access it during the day. Thailand’s Internet penetration in 2010 was
YouTube also played a prominent role in the roughly 22 percent, or 14 million users, roughly
2009 Iranian uprising after the death of a passerby, comparable to the number of users in Iran a year
Neda Agha-Soltan, was recorded and uploaded to prior. At first glance, the two scenarios are quite
the site, turning Agha-Soltan’s death into “prob- similar: social media–fuelled protests lasting a
ably the most widely witnessed death in human period of several months, followed by an eventual
history,” according to Krista Mahr. Although in crackdown by authorities. What distinguishes
the aftermath, the utility of Twitter as an orga- these two scenarios from one another is not
nizing tool of the 2009 Iranian protests remains related to technology; it is the political environ-
hotly debated, Twitter’s importance in garnering ments, the demands from protesters, and other
international attention for a political cause is not. cultural and sociopolitical barriers.
However, while the Iranian government blocked
access to Facebook amid the protests, presumably Analysis
because they felt the platform presented a demon- In analyzing the role of social media in political
strable threat to their stability; they did not block movements, popular media has often focused on
access to Twitter, which may have contributed to the use of social media among members inter-
its heavy use. nally, particularly for the purpose of organizing.
International Social Media and Politics 715

Meanwhile, scholars such as Zeynep Tufekci commons license, which meant that it could all
and Christopher Wilson have demonstrated that be freely shared, resulting in the creation of sev-
social media allow for information sharing that eral similar Web sites, including Segosphere.net, a
is beyond the control of governments, and can be Web site for young supporters of Royal.
crucial for individual decision making about par- Although Royal lost in 2007, she continued
ticipation. New network configurations enabled to make use of social media, tweeting alongside
by social media often allow for previously dis- activists during debates in the 2012 French elec-
connected publics to unite, thus enabling the rise tions during which her former romantic part-
of new political ideas and identities. In authori- ner, François Hollande, was a candidate. Royal,
tarian countries, these connections are particu- however, also blamed Twitter as the reason for
larly important because they may be the only tol- her loss in the 2012 French parliamentary elec-
erated means by which individuals organize. Still tion, demonstrating the influence of social media
others have looked to the role that social media in French politics: Hollande’s new girlfriend, Val-
play in information dissemination and in inform- erie Trierweiler, sent a tweet wishing good luck
ing popular media. to Royal’s rival, which Royal reportedly believes
resulted in her loss.
Social Media and Politicians In the 2009 Iranian presidential elections, all
While the use of social media by political opposi- four approved candidates utilized social media.
tion movements has been a popular topic in the Opposition frontrunner Mir Hussein Mousavi’s
media, mainstream and incumbent politicians supporters conducted digital interviews, including
have found effective uses for social media plat- with Mousavi backer and former Iranian presi-
forms, as have authoritarian dictators. dent Mohamad Khatami. Interview questions
An early example of social media used in a were submitted through social media, includ-
political campaign comes from the United States, ing Twitter, Facebook, and Yahoo! Messenger.
where in 2004, presidential hopeful Howard Dean Another candidate, Mehdi Karroubi, also devel-
was lauded for his campaign’s use of the Internet, oped a social media strategy, perhaps influenced
built with a dedicated director of Internet out- by his advisor, former president Mohammad
reach. Just three years later, during France’s 2007 Ali Abtahi, an active blogger. A third candidate,
election in which incumbent president Nicolas Mohsen Revai, used his Web site to list bloggers
Sarkozy faced off against Ségolène Royal, a mem- who were supportive of his candidacy.
ber of the French Socialist Party, social media The campaign of incumbent candidate Mah-
once again became a point of discussion, as both moud Ahmadinejad, whose blog was launched in
campaigns developed innovative online tactics. 2006, developed the most comprehensive online
Sarkozy’s party, the Union pour un Mouvement strategy, listing more than 100 bloggers support-
Populaire, or Union for a Popular Movement ive of his candidacy on a campaign Web site, cre-
(UMP), dedicated 1.5 million euros to its digital ating blog badges for fans to place on their sites,
strategy, which included sending short messag- and utilizing Twitter, Facebook, and other social
ing service (SMS) to party members in advance of media to send updates and links to videos about
Sarkozy’s television appearances, keeping French the president.
video-sharing site DailyMotion updated with vid- Venezuelan president Hugo Chavez has claimed
eos of the candidate, and purchasing sponsored that nearly 20 percent of the messages he receives
links on other sites. on Twitter are hostile, reports the BBC News.
Royal’s campaign, on the other hand, created The Latin American politician also claimed that
and launched a Web site called Désirs d’avenir in 2010, he hired a staff of 200 to help him deal
in February 2006, which served as a social net- with the influx of responses he received on social
work throughout her campaign and beyond. At media sites.
the start of her campaign, Royal declared that 50 Social media was also picked up by candidates
percent of its initiatives would take place online, in India’s general election in 2009. Dr. Shashi
establishing her as an innovator. All of the content Tharoor, the former undersecretary for Commu-
on Désirs d’avenir was released under a creative nications and Public Information to the United
716 International Social Media and Politics

Nations and the 2009 Congress Party candidate with local affairs. In response, Thapa and the con-
in the general election, utilized Twitter through- gress were criticized by young bloggers for not
out his campaign, and just a few months after understanding how social media works.
losing the elections, became the first Indian politi- Across sub-Saharan Africa, Internet penetra-
cian to reach 100,000 followers. tion remains low, but social media is nonetheless a
Other Indian politicians, such as Narendra feature of politics in many countries. In Tanzania,
Modi, chief minister of the state of Gujarat, have traditional political campaigning involves hand-
kept on top of social media developments, uti- ing out merchandise, but politicians—including
lizing newer tools such as Google+. Modi, who the president, who tweets as @jmkikwete and
was outspoken against his state congress’s silenc- parliamentarian Zitto Kabwe, who tweets as
ing of journalists who were critical on Twitter, @zittokabwe—have recognized the importance
became the first Indian politician to host a live of social media in reaching young constituents.
chat using Google+’s Hangout feature in August Kabwe, notably, tweets mainly in English, but
2012. On the day of the Hangout, the Twitter also maintains a blog in Swahili.
hashtag #ModiHangout became the top trending Amid the crisis following Côte d’Ivoire’s 2010
topic in India, while the hashtag #VoteOutModi, elections, two politicians—Prime Minister Guil-
created by Modi’s opponents, came in third on laume Soro and Minister of Youth Development
the list of trending topics that day, demonstrat- Alain Lobognon tweeted using pseudonyms, both
ing the widespread use of social media by India’s later creating accounts in their real names after
politically savvy.
In neighboring Pakistan, where Facebook and
Twitter rank highest among social media plat-
forms, social media became an integral part of
politics in 2009, the year that both former presi-
dent Pervez Musharraf and presidential hopeful
Imran Khan created Facebook pages.
Although Internet penetration in Pakistan is
fairly low—approximately 10 percent, or 17 mil-
lion users—social media is central to the strategy
of Imran Khan’s political party, Tehreek-e-Insaf
(PTI). In addition to Facebook, the PTI has used
YouTube and Twitter to reach out to the public in
advance of the 2013 Pakistani elections. Its vari-
ous Twitter accounts, including @ImranKhanPTI,
@ptiUK, @PTIOfficial, cumulatively have more
than 500,000 followers, while videos on its offi-
cial YouTube account have been viewed more
than 5 million times. The party also has an
account on Livestream, where it regularly streams
live speeches and rallies.
Nepal is another south Asian country in which
social media has become vital for politicians. In
May 2011, using Facebook and other social net-
working sites, young Nepalese launched a cam-
paign to pressure political parties to draw a new
constitution for Nepal. By contrast, a December
2011 political incident to which the U.S. ambas- A Liberian user logs into Ushahidi, which was initially developed
sador responded on Facebook prompted the leader as a means of tracking incidents of violence during political
of the Nepali Congress, Gagan Thapa, to proclaim unrest in Kenya. It has since been used worldwide during
that the ambassador was unnecessarily meddling political events and natural disasters.
International Social Media and Politics 717

the elections were sorted. Both men, particularly One of the potential pitfalls of social media for
Soro, are prolific on Twitter, interacting with citi- politicians is the ability of content to immediately
zens frequently. go viral, or spread quickly, offering no chance for
In South Africa, which has the third-highest backtracking. Just as the U.S. Embassy caught the
Internet penetration in sub-Saharan Africa (after Muslim Brotherhood in a lie on Twitter, Estonian
Kenya and Nigeria), opposition parties and can- President Toomas Hendrik Ilves—disappointed by
didates have directly engaged with constituents one of the New York Times journalist’s columns—
on social media, signaling a shift in approach took to the social media platform to call out Paul
for the nation’s politics. For example, the Demo- Krugman for being “patronizing” in a piece he
cratic Alliance, a leading party in South Africa, wrote about Estonia. Ilves vented his anger across
has hosted Twitter town halls and discussions on several tweets containing profanities (which he
local social networking site MXit. censored with an asterisk) and American jargon.
In the Middle East, few major politicians have
picked up social media, with notable exceptions. Social Media and Diplomacy
Jordan’s Queen Rania and Queen Noor (the queen Conceived by the U.S. Department of State,
dowager) were both early adopters of Twitter, 21st-century statecraft is a concept that involves
and Queen Rania’s YouTube channel is popular “complementing traditional foreign policy tools”
throughout the region. Bahrain’s government runs with new, digital tools that “fully leverage the
several official accounts (such as @moi_bahrain, networks, technologies, and demographics of
representing the Ministry of Interior), but only its our interconnected world.” In its efforts to pro-
Foreign Minister Khalid Alkhalifa utilizes the site mote 21st-century statecraft, the Obama admin-
to converse with admirers and detractors alike. istration has adopted social media, presumably
Several prominent Lebanese politicians, includ- encouraging other departments to follow; this has
ing former Prime Minister Saad Hariri and Prime resulted in the use of Twitter and Facebook by
Minister Najib Mikati (@Najib_Mikati), utilize embassies, consulates, and other officials.
Twitter. While Lebanese politicians on Twitter The concept has been championed by some,
generally interact with their own citizens, most such as former state official and current Google
are multilingual and tweet in Arabic, English, and Ideas Director Jared Cohen and Google Chair Eric
sometimes French. In December 2012, a contro- Schmidt, who have argued that governments that
versy erupted after Lebanese security agencies fail to engage online will be caught off guard by
demanded the social media passwords and other rebellious citizens “armed with virtually nothing
data of Lebanese citizens for the purpose of inves- but cell phones.” Scholar Philip Seib has argued
tigating the October 2012 assassination of the that the lagging response by the United States to
head of the country’s information services. Leba- the Arab Spring was a “failure to appreciate the
non’s Minister of Telecommunications Nicolas importance of social media in modern politics,”
Sehnaoui took to Twitter to protest the request, and that traditional diplomacy efforts were “left
using the hashtag #ProtectPrivacy, and encour- behind” in the midst of the uprisings.
aging citizens to tweet: “As a Lebanese Citizen Others, such as Evgeny Morozov, have criti-
I refuse to give up on my Internet Privacy.” cized 21st-century statecraft, stating that the U.S.
More than a year after the uprising that ousted government is “showing too much admiration”
President Hosni Mubarak, Egypt’s political par- for Facebook and Twitter, which he argues have
ties have learned to adapt to the social media era. “questionable ethics.”
@IkhwanWeb, the Twitter account for the Mus-
lim Brotherhood—the party of President Moham- The Impact of Social Media on Politics
med Morsy—tweets frequently, and has notably Given the rapidly changing nature of social
traded jabs with the Twitter account of the U.S. media, it is difficult to assess the impact of social
Embassy in Cairo. Social media also continues media on politics around the world. For the
to be important for political movements, possi- same reason, it is difficult to predict future impli-
bly helping to instigate protests against Morsy’s cations of social media’s impact on the interna-
presidential decree in November 2012. tional realm.
718 International Unrest and Revolution

One important factor is the Internet penetra- McFaul, Michael. “Transitions From
tion rate, or number of Internet users, in a given PostCommunism,” Journal of Democracy, v.16
country. In France, where the use of social media (July 2005).
in politics is widespread and arguably influential, Morozov, Evgeny. “Moldova’s Twitter Revolution.”
Internet penetration exceeds 80 percent; in Leb- Foreign Policy (April 7, 2009).
anon, just over half of the population uses the Morozov, Evgeny. “The 20th Century Roots of
Internet. In some countries, mobile penetration 21st Century Statecraft.” Foreign Policy
rates are a greater indicator of potential social (September 7, 2010).
media engagement. In India, for example, only Mungiu-Pippidi, Alina and Igor Munteanu.
10 percent of citizens have access to the Internet, “Moldova’s ‘Twitter Revolution.’” Journal of
but 72 percent have access to mobile phones. In Democracy, v.20/3 (2009).
Libya, mobile penetration is more than 150 per- Schmidt, Eric and Jared Cohen. “The Digital
cent (meaning, generally, that some citizens have Disruption: Connectivity and Diffusion of Power.”
more than one mobile phone), but Internet pen- Foreign Affairs (November/December 2010).
etration rests below 20 percent. Numerous fac- Seib, Philip. Real-Time Diplomacy. New York:
tors unrelated to technology may affect its suc- Palgrave Macmillan, 2012.
cessful use for political means, including the form Shirky, Clay. “The Political Power of Social Media:
of government in a country and the politicization Technology, the Public Sphere, and Political
of a populace. Change.” Foreign Affairs (January/February 2011).
Tufekci, Zeynep and Christopher Wilson. “Social
Jillian C. York Media and the Decision to Participate in Political
Independent Scholar Protest: Observations From Tahrir Square.”
Journal of Communication, v.62 (2012).
See Also: Activists and Activism, Digital; Africa, “U.S. Ambassador’s ‘Facebook Politics’ Draws
north; Africa, sub-Saharan; Arab Spring; Asia; Criticism in Nepal” Telegraph Nepal (December
Bahrain; Egypt; Facebook; India; International Unrest 21, 2011).
and Revolution; Iran; Syria; Tunisia; Twitter; United U.S. Department of State. “21st Century Statecraft.”
States; Ushahidi; YouTube. http://www.state.gov/statecraft/index.htm
(Accessed December 2012).
Further Readings
Castells, Manuel. Communication Power. Oxford,
UK: Oxford University Press, 2011.
“Chavez Tops Twitter in Venezuela” BBC News
(May 9, 2010). http://news.bbc.co.uk/2/hi/ International Unrest
americas/8671581.stm (Accessed April 2013).
Chowdhury, Mridul. “The Role of the Internet in and Revolution
Burma’s Saffron Revolution.” The Berkman Center
for Internet & Society’s Internet and Democracy At age 11, Malala Yousufzai began writing, using
Case Study Series (September 2008). a pseudonym, a blog for the BBC about living
Goldstein, Joshua and Juliana Rotich. “Digitally conditions under the Taliban in the Swat Valley
Networked Technology in Kenya’s 2007–2008 of Pakistan where she lived. A great deal of what
Post-Election Crisis.” The Berkman Center for she wrote involved the difficulties of attaining an
Internet & Society’s Internet & Democracy Case education, including the Taliban’s destruction of
Study Series (2008). 172 schools. In 2009, after the Taliban issued an
Howard, Philip N. and Malcolm R. Parks. “Social edict that all girls in northwestern Pakistan be
Media and Political Change: Capacity, Constraint, banned from school, Yousufzai began publicly
and Consequence.” Journal of Communication, speaking out through her blog and other media
v.62/2 (2012). outlets about the need for girls to receive a quality
Mahr, Krista. “Top 10 Heroes [of 2009]: Neda education. Her father, an educator whose school
Agha-Soltan.” Time (December 8, 2009). refused to honor the edict, had raised her to stand
International Unrest and Revolution 719

up for what she believed in. For her work, Paki- significant access to communication channels has
stan bestowed upon her its highest civilian honor been seen as a crucial component in the creation
for bravery. However, the media attention also and success of social or political activism through-
attracted Taliban militants, who shot Yousufzai out history, especially in modern times.
in the head and neck on October 9, 2012, as she
came home from school. The militants stopped Communication Technologies
the van that the 14 year old was riding in, and In looking at revolutions from a historical per-
demanded that the children identify Yousufzai. spective, communication technologies have played
When they did, she was shot, along with two a role as platforms for public speech. During the
other girls. As threats against her continued, she Reformation in Europe, the printing press allowed
was airlifted to Britain to receive specialized care. for a wider distribution of revolutionary thought,
While Yousufzai has recovered and returned to although it was limited by high illiteracy rates.
school in Britain, her story illustrates the benefits Throughout the period leading up to the Ameri-
and dangers of communication in a global media can Revolution, the postal system designed by
environment. Social networking/media, inter- Benjamin Franklin carried revolutionary materi-
national cable channels, blogs, and mobile and als to all the 13 colonies. The Vietnam War was
citizen journalism have given increasingly more brought into American living rooms via television,
groups of people a chance to not only tell their and the images shown decreased support for the
stories, but also hear the stories of others. Many war effort. Live images of the collapse of the Twin
of those stories are coming from voices that did Towers in New York City on September 11 height-
not have a platform from which to speak until ened the intensity of feelings about the responsible
the development of social media. Recent inter- terrorists. However, technology is only one piece
national protests have shown that social media of each of these events, and it was not technology
can be a tool used by these dissident or minor- alone that caused them. Technology must be used
ity groups to spark and sustain revolutions. The appropriately by human agents in order to have an
use of social media sites does not require a high impact. Therefore, communication technology on
level of computer proficiency or a large amount of its own is not enough to cause change, but it can
expensive equipment. All that is really required is help coordinate and organize it.
a smartphone that permits the user to place his or Social media allows protesters to organize their
her posts across a range of interconnected social activities during all stages of activism. During
media platforms. In this way, anyone can become this process, communities and collective identi-
the voice of a revolution. However, it is overly ties are formed that provide strength and cohesion
simplistic to say that social media were the cause to people who have often started as marginalized
of or the sole reason for success of the interna- groups. It does not matter if these activist groups
tional revolutions seen in the 2000s. There are have large amounts of resources because few
many other factors that must come together to resources are needed if the organization is occur-
make a protest succeed. ring in cyberspace. Activists do not need to spend
In order for there to be a revolution, regardless large amounts of money printing pamphlets or
of what communication tools are available to fuel posters, nor do they need the resources necessary
it, there must be a group of people who share a to own a mass media entity. Mass media allow
common goal or passion. That passion must be so for the broad dissemination of information about
strong that it allows participants to overcome the a cause, but social media allow for not just that,
fear of personal reprisals or harm. Whether these but also for the ability to recruit and organize new
conversations occur in the salons of France or on a members, as well as to coordinate activities and
Facebook wall, revolution is born from discussions craft new messages. In other words, social media
of shared concerns and desires. Communication create a space for two-way communication that is
and communication networks are vitally impor- outside of government-controlled media channels.
tant for protest movements to not only grow, but Social media can also keep the issues that
also to gauge when the time is correct to ignite and fuel the revolution in front of potential protest-
spread. Therefore, controlling, or at least having ers and the world 24 hours a day, rather than on
720 International Unrest and Revolution

an occasional news report. Keeping the issues in and how to dress. The Egyptian protesters were
front of as large a group as possible increases the extremely organized and knew how to frame the
chance that more people will join or support the protests and mobilize the necessary resources. In
movement, and increases its opportunities for suc- the recent international revolutions that were suc-
cess. Unlike mass media, social media also allow cessful, the activists were well organized and the
for an instantaneous dialogue between activists organization transcended just one group or form
and outsiders that works to increase the realism of communication. While there were leaders in
of events as they can be observed in real time, the organization that allowed for clear channels
and without the perception of having been edited of communication, the leadership was spread out
by an authoritative or corporate group. Finally, among members of the organization, rather than
social media bring back some of the interpersonal concentrated in one person.
dimension of face-to-face communication, which While organization is crucial, it is not the only
is why social media interactions can have stron- factor necessary for successful cyberactivism. Pro-
ger levels of influence over behavior. However, testers must also use social media to frame how
all computer-mediated communication has the the world is seeing the revolution. As with any
potential for misinterpretation or the feeling of media, the stories presented in social media are
impersonality, so the impact in terms of influenc- not always an objective reflection of reality.
ing behavior can be tempered. The camera only has so much range in front
An additional advantage of social media for of its lens, and the perspective of the camera
disseminating revolutionary discourse is the dis- operator will determine what parts of a scene
solution of space and time barriers. Communica- the camera sees or that the edited story contains.
tion through social media is both instantaneous The person who is controlling this framing, either
and repeatable around the world. Broadcast sig- the state or the protester, will control how events
nals or publication runs have significant limits in are perceived by the larger public. In traditional
terms of reach to a potential audience. Theoreti- media, there is little chance for a group that is
cally, the Internet can reach anywhere, thus giv- not in power to have access to the media. Social
ing it the broadest possible influence. In reality, media, however, changes that power dynamic.
the reach is not so absolute or universal. While Anyone with Internet access can capture an event
it can be one communication form, it cannot be in such a way that the story supports their point
the only one if the revolution is to succeed. The of view.
greatest hindrances for distributing information Framing is especially important because mem-
or organizing cyberactivism in social media are bers of the protest group try to bring others into
lack of open Internet access, access to equipment, the growing revolution. In order to maintain con-
and user knowledge. sistency of messaging, organizers need to try to
control slogans, speeches, and videos that present
Limits of Social Media the ideas of the revolutionary group in a context
While social media allow for networking, there that can be understand by people within the coun-
is concern that the ties built in social media are try, but also by individuals outside of the country.
not strong enough to sustain cohesion through- In Egypt, there was a concerted effort made by
out the often lengthy and dangerous process of supporters of the revolution to convince Western
social change. Once there is organization through media to describe the uprising as a revolution,
social media, there has to be enough spirit to put rather than a riot. Such terminology framed what
the plans into action and take to the streets to was occurring in Egypt as an organized move-
call for political or social change. For example, ment to enact change, rather than as disorganized
in Egypt, the protests were supported by strikes acts of vandalism and looting carried out by ran-
of bus drivers, laborers, and even profession- dom individuals. Videos and comments can be
als such as doctors. In addition, protesters cre- easily and instantaneously shared with the world
ated a pamphlet, distributed online and in paper to show how a group is mobilized around a cen-
form in Arabic, which informed potential activ- tral cause, and they encourage others to support
ists where and when to protest, escape routes, the movement.
International Unrest and Revolution 721

Social movements require three key factors to protesters gathered in front of government offices
succeed: organization, resource mobilization, and in the capital, and the next day they were joined
framing. Having just one or two of these three by opposition leaders.
key factors is often not enough. Social media pro- In 24 hours, the size of the protest grew from
vides a platform where all three can be utilized to 10,000 to 30,000 as a result of real-time dissemi-
bring like-minded individuals together around a nation of stories and pictures via social media. The
common narrative that can then be disseminated official media of Moldova, however, did not carry
to large numbers of people. In addition, social any information about the protests. In spite of the
media can provide crucial on-the-ground infor- international attention that was then focused on
mation, such as where and when protests or meet- the protests, no political change occurred. How-
ings will occur, or directing aid to protesters who ever, the Moldova protests demonstrated that
are wounded or trapped. Mass social movements social media could be used as a source of political
are not unique to the digital era, but computer- protest in the face of media censorship or govern-
mediated communication technology assists in ment control of mainstream media.
the development of such movements and the dis- This potential of social media was quickly
semination of the movement’s ideology to a global tested in June 2009, in Iran. The unrest began, as
audience. Nowhere is this better seen than in the it did in Moldova, after Iran’s presidential elec-
many protest movements of the early 2000s. tion was called into question. Protests broke out
June 13, 2009, when opposition leader Mir Hos-
Political Use of Social Media sein Moussavi asked for vote counting to stop
The first political movement to successfully utilize because of violations. The government, however,
social media occurred on January 17, 2001, in the declared incumbent Mahmoud Ahmadinejad the
Philippines. President Joseph Estrada was engaged winner. Seven days of increasing protests fol-
in an impeachment trial for allegedly receiving lowed as Moussavi continued to call for a new
bribes, and on January 17, the Philippines Con- round of voting. The protests were the largest
gress voted to set aside key evidence in that trial. seen in the country since the 1979 revolution.
In just two hours, a large protest was organized Images and accounts of the protest were spread
at a crossroads in Manila through the forward- around social media sites, but primarily through
ing of text messages. By the end of the week, Twitter. Twitter brought the story to the West-
over seven million text messages had resulted in ern media after journalists were removed from
a protest group of over 1 million people. The size the country, but also allowed Iranian protesters
and swiftness of the protest caused Congress to to organize because their communication could
reverse its decision, and Estrada resigned on Janu- occur outside of government detection. At this
ary 20. Similar use of text messaging resulted in time, social media were so new that governments
the removal of Jose Maria Aznar as Spain’s prime were not aware of all of the ways in which activ-
minister in 2004. ists were able to use them for organization or
While the cases of Estrada and Aznar could framing purposes. The U.S. State Department,
be seen as the first instance of a political leader however, saw the importance of Twitter during
being ousted by social media, text messaging this uprising, and asked Twitter to postpone an
does not possess all of the characteristics associ- upgrade in order to allow protesters continued
ated with social media. Social media requires the access to the site. Twitter delayed the upgrade,
creation of online communities where users can which is one of the reasons the Iranian uprising
create and share content, as well as post personal is often referred to as the “Twitter Revolution.”
messages. It was not until 2009 that social media The protests in Iran continued and steadily
was used as a true device for political revolution. grew. Then, on June 20, a young woman, Neda
Activists in Moldova, a former Soviet republic, Agha-Soltan, was driving and got out of her car
used Facebook, Twitter, YouTube, and LiveJour- after becoming stuck in traffic. As she walked,
nal, an electronic diary service, to publicize the she was shot and killed by an unknown sniper;
political unrest in the region that followed the protesters said she was killed by a member of
disputed general elections. On April 6, 2009, the militia, and the killing was captured by a cell
722 International Unrest and Revolution

phone. The video went viral, and Agha-Soltan that was subsequently borrowed by the leaders of
became a martyr for the protest movement. In a similar uprising in China that enjoyed far less
spite of Iran’s strict media censorship, the video, success), sparked similar uprisings in countries
also picked up by mainstream American media, around the Middle East and Africa. Next to fol-
became a symbol for antigovernment protests. low was Egypt, where Google marketing execu-
The government also made claims that protesters tive Wael Ghonim worked under a pseudonym to
actually shot Agha-Soltan, and then altered the build an organized network of activities that were
video to make it appear that she was killed by a connected through computer-mediated commu-
member of a government-sponsored group. It is nication. Ghonim’s primary Facebook page was
unclear if protesters were using social media at titled, “We are all Khaled Said,” a reference to an
this time to organize their protests, or to simply Egyptian who was beaten to death by police. Pho-
report what was happening within the country, tos of Khaled Said, taken in the morgue, worked
which is perhaps why the 2009 protests did not to undermine the government’s official explana-
lead to any political change within Iran. The pro- tion for how he had died. Social media allowed
test movement, however, is still prevalent within protesters to organize events in Tahrir Square,
the country. and they were aided by a military force that was
Many experts point to the Iranian uprising as unwilling to turn against the protesters. Govern-
the foundation for what has come to be known ment censorship of the Internet was unsuccess-
as the Arab Spring, or the Facebook Revolutions. ful because Egyptian protesters, and the world,
In December 2012, a young man in Tunisia, had learned from Tunisian’s revolutionaries how
Mohammed Bouazizi, set himself on fire to pro- to work around such blockages. A total of 18
test the police’s repeated fines that resulted from days of protest resulted in Prime Minister Hosni
his not having a license to sell vegetables, his only Mubarak’s resignation on February 11, 2011.
source of income. The self-immolation, an act The Arab Spring then spread to countries such
that would be seen again in the Egyptian upris- as Lebanon, Syria, Yemen, and Libya as activists
ings, was captured on YouTube and other social gained knowledge and enthusiasm from successes
media sites. Mass protests followed his funeral, in neighboring countries. For example, in Libya,
and those images were shared via social media. the civil war resulted in the end of Muammar Qad-
Tunisia, as well as many of the other countries dafi’s regime, but it took eight months, rather than
involved in the Arab Spring, have citizens who are weeks, to occur. Libya was a much more closed off
well educated and focused on activism. In addi- and authoritarian regime than those seen in Tuni-
tion, Arab countries have a large pool of young sia or Egypt. The protesters in Libya were not as
adults who are technically savvy. In Arab coun- well prepared to use social media. That changed
tries, almost 70 percent of the population is under as the Libyan government increasingly lost control
30 years old, as compared to 50 percent in the of its citizens. Social media also helped to keep the
rest of the world. ongoing war in front of the world. Lebanon and
In spite of heavy social media censorship, over Syria also experienced protests, but there has not
a third of Tunisia’s population had a presence on yet been a resolution to the unrest.
social media. Tunisia’s north African neighbor,
Egypt, began to send text messages and posting Problems in Protest and Social Activism
videos to show their support for the Tunisian What is learned in these instances is that access
activists. Perhaps the government did not go far to social media is not always a guarantee of suc-
enough to block the Internet during the uprising cess. While social media provides a significant
because advocates were able to use private net- opportunity for individuals who normally have
works to continue to spread their messages, in limited access to communication to assert resis-
spite of YouTube being blocked. As a result, the tance to political control, the end results are not
protesters were able to oust Tunisian President always what was intended. In Egypt, women
Zine al-Abidine Ben Ali on January 14, 2011. joined the revolution in the hopes of gaining more
The success of the Tunisian Revolution, also rights. However, they had to use social media to
referred to as the Jasmine Revolution (a moniker encourage other women to come out to protest,
International Unrest and Revolution 723

something that women are not normally allowed social media and the Internet. Russians who are
to do. Female activists knew that if women were connected spend more time online than the citi-
to see any gains from the revolution, they had to zens of any other country. Social media played a
leave the safety of their homes and computers and prominent role in the uprisings the country expe-
take to the streets with the men. For these women rienced beginning in December 2011. Even after
in Egypt and Tunisia, however, the revolution has the Cold War, Russians received their news from
not brought them greater freedoms. In fact, many state-run media, but social media has leveled that
women’s groups are still struggling to gain any of playing field. After participating in elections that
the advancements the revolution promised. many felt were fraudulent, especially for Vladi-
Lack of progress for women speaks to the lack mir Putin’s candidacy for prime minister, Rus-
of common goals for all members of a protest. sian protesters created videos to distribute on the
Any division or sectarianism among the protest- Internet that criticized and satirized the govern-
ers significantly hampers the ability of the pro- ment. Following the videos, social media were
tests to grow and succeed in the long term. In used by activists to organize the largest demon-
Iran, the populace did not have a very strong his- strations in the country since 1991. On December
tory of activism, and there was general apathy 24, 2011, close to 100,000 protesters descended
among the citizens over both the election and the on Moscow.
candidates. It was therefore difficult to tap into Russian activists have access to Yandex, the
a common interest to unify the activists. Also, if Russian version of Google, where they not only
the government is more totalitarian and milita- shared information about the protests, but also
ristic, as in Iran and Syria, then there is a greater organized pages to gather monetary contribu-
chance that the military and/or police will work tions. The protests culminated prior to Putin’s
to violently stop the revolution. This possibility inauguration. On May 6, 2012, protesters orga-
was seen in Thailand’s Red Shirt uprising in 2010, nized a “March of Millions” event in Bolotnaya
where social media were used to organize the pro- Square in Moscow. While the protesters were
test, but the government swiftly moved in and marching toward the square, they clashed with
killed dozens. The protest was not strong enough police, who responded violently. More than 250
to keep activists together after the killings. How- people were arrested, including three leaders of
ever, the presence of cell phone cameras during the protest, and police put down smaller dem-
these crackdowns makes it easier for protesters onstrations throughout the city. In spite of the
to record the government’s action and share the protests, Vladimir Putin was sworn in for a third
videos with the world. term, and new laws were enacted in an attempt to
Finally, as the use of social media as a protest stop opposition, including a penalty of $9,000 for
tool grows, governments become more technolog- unauthorized demonstrations.
ically savvy and learn new ways to block access to In addition, the government tried to take con-
social media sites or the Internet in general. There trol of Russian social media. In April 2013, Vkon-
are downsides to blocking the Internet. Govern- takte, Russia’s Facebook, had its offices searched
ments are beginning to experience that shutting and its ownership structure altered. Vkontakte’s
down access to the Internet can actually work to owner, Pavel Durov, refused to stop antigovern-
fuel dissidents, as well as bring worldwide atten- ment protest pages. After being accused of involve-
tion to the protests, rather than stop the activism. ment in a traffic incident, two other cofounders
Perhaps more importantly, preventing access to sold their shares in the company to a fund owned
the Internet can also harm a country’s economy by a board member of a state-owned oil company.
because the Internet is so essential for interna- This gave the government de facto control over
tional business. the site. In spite of the turmoil in Russian social
media, it allowed for the protests to continue to
Russia disseminate their public history. One year after
The dichotomy of social media as a revolutionary the protests, social media helped to organize and
tool is seen in the protest movement in Russia. globally publicize the anniversary of the May
Russia is experiencing rapid growth in the use of 2012 clash.
724 International Unrest and Revolution

Demonstrators confront riot police in Taksim Gezi Park in Istanbul, Turkey, on June 11, 2013. Protesters shared photos like this on
social media and photo-sharing sites like Flickr and used Twitter extensively, often employing the hashtag #occupygezi. On a single
afternoon, more than 2 million tweets were sent in Turkey, and even after midnight, over 3,000 appeared in only one minute.

Turkey and Jordan uprising. Citizens in Turkey turned the word


Protests begun in June 2013 in Turkey and Jor- into a new verb, capulling, which they defined as
dan also serve as case studies to help clarify “protesting.”
social media’s potential for organizing and fram- Facebook users changed their status to “I’m
ing international revolutions. In Turkey, a pro- capulling today.” In addition, protesters used
test that began June 1, 2013, was not started by social media to share photos. As the uprising
social media, but used social media to report on continued, both protesters and the government
what was occurring and to keep the protest atmo- took to Twitter to try and frame how the out-
sphere alive. The protests began over the govern- side world perceived what was occurring. In one
ment’s plan to tear down trees in the main square afternoon, over two million tweets were sent
of Istanbul in order to build a shopping mall, but in Turkey, and even after midnight, over 3,000
it became much more than that very quickly. The were published in one minute. At the same time,
protest brought to the surface concerns over the the Turkish newspaper Sabah did not feature a
actions of Turkey’s Prime Minister Recep Tayyip story regarding the demonstrations on its front
Erdogan, who many protesters perceive as arro- page. Instead, the newspaper attempted to frame
gant. Protesters used social media to repurpose what was occurring in the country by report-
a word, capulcu, which means “looter,” which ing on stories of the president and prime min-
the government used in a derogatory manner ister receiving a gift of a horse or an award for
to describe protesters in the early days of the a piece of antismoking legislation, respectively.
Internet Forums 725

Similar discrepancies between traditional mass to lasting change or serve as a blueprint for other
media and social media were also seen in the types of protests.
coverage of protests in Jordan during the same
time period. In both countries, protesters were Pamela C. O’Brien
met with extreme violence. The protesters and Bowie State University
government in Turkey and Jordan have posted
accounts of what occurred in an effort to control See Also: Arab Spring; Countries Banning Social
global perception of the ongoing crises. Media for Political Reasons; Egypt; Middle East;
Monarchies, Social Media, and Politics.
Conclusion
While social media is a tool for potential revo- Further Readings
lution and social activism, the presence of com- Eltantawy, Nahed and Julie Wiest. “Social Media in
puter-mediated communication is by no means a the Egyptian Revolution: Reconsidering Resource
guarantee of success. Even the founder of Face- Mobilization Theory.” International Journal of
book, Mark Zuckerberg, downplayed the role of Communications, v.5 (2011).
or need for Facebook in the recent revolutions. It Myers, Daniel J. “Media, Communications
is very possible that all of the uprisings discussed Technology, and Protest Waves.” University of
would have occurred without the presence of Notre Dame. http://www3.nd.edu/~dmyers/
social media, but social media enabled organiza- lomond/myers.pdf (Accessed May 2013).
tion of the protest movements as well as discus- Safranek, Rita. “The Emerging Role of Social Media
sion of the movements throughout the world. Yet, in Political and Regime Change” (March 2012).
certain aspects of social media are fleeting and ProQuest Discovery Guides. http://www.csa.com/
limiting. Tweets are not archived, and therefore discoveryguides/social_media/review.php (Accessed
must be retweeted to keep those messages alive. February 2013).
Social media tends to be utilized by young pro- Shirky, Clay. “The Political Power of Social Media:
fessionals who are well educated. That limits the Technology, the Public Sphere, and Political
narrative from spreading outside of large cities, Change.” Foreign Affairs (January/February 2011).
which is why organizers need to think of alterna- Tusa, Felix. “How Social Media Can Shape a Protest
tive means of message distribution. Movement: The Case of Egypt in 2011 and Iran in
However, the potential for social media to be uti- 2009.” Arab Media & Society (Winter 2013).
lized as an organizing and framing tool for political
activism is apparent. It is for this reason that the
U.S. State Department is working to ensure global
Internet freedom, where governments would be
prevented from restricting citizen’s access to out- Internet Forums
side Internet sites such as Google, YouTube, and
newspapers. This approach does nothing to protect An Internet forum provides a place for sharing
conversations between individuals, which is where information and discussion about certain topics.
much of the political organizing occurs. There has It lowers temporal, spatial, and cost barriers that
also not been enough time elapsed to see what the exist in face-to-face meetings and consequently
true impact of the revolutions will be in each of increases participation in forums. Examples of its
the countries. New governments are still being earlier forms are bulletin board systems (BBSs),
formed to fill the power vacuums that resulted electronic mailing lists (listservs), community net-
from the revolutions. In some countries, including works on Freenet, and newsgroups on Usenet,
Egypt and Tunisia, there is already concern that which enabled users to post messages on public
the new governments will be no better than the old message boards and exchange messages and e-mails
governments in terms of solving the problems that with other users. Different from these services,
originally led to the uprisings. What remains to be which were forms of two-way communication but
seen is if the movements started by social media, not very interactive, in the Web 2.0 era, Internet
through digital activism or cyberactivism, can lead forums became more synchronous based on social
726 Internet Forums

media such as Facebook and Twitter, and more specific topics or with specific participants. Face-
mobile based on software such as bbPress.org and book groups and Twitaddons.com are examples.
fluxbb.org. Recently, for the U.S. presidential elec- Although social media can exacerbate selective
tion of 2012, the Obama camp launched mobile exposure to congenial ideas through receiving
applications that promoted interaction with voters information that is highly personalized by one’s
by providing information on campaigns and poli- like-minded friends, they can also provide a chance
cies and receiving feedback and responses. Along to be exposed to dissimilar opinions by facilitat-
with the increased usability and sociability of the ing contact with a population larger than a circle
technology, the importance of Internet forums is of one’s acquaintances. Several studies have found
growing in a political context, which leads to the that not only selective exposure to similar opin-
discussion the positive and negative sides of Inter- ions, but also inadvertent encounters with conflict-
net forums. Social media are used as a venue for ing opinions coexist in Internet forums.
political discussion, and play a role in civil society. In addition, political discussions shared in social
Based on the technological affordance for social network sites might not be deliberative, but the
interaction, Internet forums facilitate many-to- discussion can foster civic cultures more attentive
many interactions and draw much more partici- to politics. Horizontal communication with fellow
pants than offline forums. In Internet forums, citizens and symbolic expressions such as parody
people can revisit and respond to other citizens’ and humor help people feel higher political efficacy
opinions with fewer barriers of time and space and and to be more engaged in politics. In addition, the
traverse diverse modes of communication such viral capability of social media such as the retweet
as reading news and joining discussions. Access activity in Twitter allows discussions to extend out-
to government information is also facilitated on side the forum and generate social repercussions.
the Internet. Moreover, people with poor politi- Furthermore, the boundary of forums is not con-
cal resources can express their voices on Inter- fined to written texts, but is broadened to audiovi-
net forums. Sometimes, Internet forums develop sual content, as observed in YouTube, where many
into virtual communities by having shared inter- people reply with self-produced video clips on cer-
ests and returning participants. However, despite tain political and social issues.
these advantages, Internet forums are susceptible
to several problems. Given that the systematic, Conclusion
individualized filtering of information is pos- In the context of civil society, a frequently raised
sible on the Internet, Internet forums can be echo question about Internet forums is whether they
chambers of like-minded people. Despite the tech- constitute a public sphere where rational and delib-
nological feasibility of many-to-many communi- erative discourse takes place, or simply a public
cation, a small number of people actually garner space where anyone can express themselves. Some
attention in the fragmented online environment. people reject this dichotomy, and suggest that Inter-
In addition, discussions in Internet forums are net forums are a networked public sphere where
likely to be far from rational critical discourse, as social mediation takes place, diverse modes of
found by empirical studies. The negligible atten- communication exist, and lively discussions occur.
tion to Internet forums from policy decision mak- Considering that online political discussions are
ers is also one of the limitations. found to increase political knowledge and partici-
Recently, social media have opened up another pation, the importance of Internet forums should
opportunity as people are becoming increasingly not be overlooked, despite their mixed possibili-
engaged in seeking information and discussing ties as a public sphere. As social media permeates
politics on social network sites. While earlier forms everyday life, Internet forums could serve a role as
of Internet forums were geared to asynchronous, a barometer of public opinion.
bulletin board–style postings, social media pro-
mote livelier discussions with larger numbers of Sujin Choi
participants and increased responsiveness to each University of Texas at Austin
other’s opinions. People can also create groups Han Woo Park
in social network sites and share discussions on Yeungnam University
Internet Gathering 727

See Also: Blogosphere; Digital Citizen; Social Internet Gathering


Networking Web Sites
Online protests are virtual activities where the
Further Readings Internet is both the site of and the means for col-
Benkler, Yochai. The Wealth of Networks: lective action. These activities range from online
How Social Production Transforms Markets petitions, e-mail campaigns, virtual sit-ins, online
and Freedom. New Haven, CT: Yale University meet-ups, and rallies to hacking, e-mail bombings,
Press, 2006. boycotts, and netstrikes (or denial-of-service [DoS]
Brundidge, Jennifer. “Political Discussion and News attacks). The creative use of computer and infor-
Use in the Contemporary Public Sphere: The mation technologies facilitates online protesters’
‘Accessibility’ and ‘Traversability’ of the Internet.” ability to perform civil disobedience in cyberspace,
Javnost–The Public, v.17 (2010). and even disrupt the flow of information. Such
Castells, Manuel. “Communication, Power and virtual protest activities are increasingly popular,
Counter-Power in the Network Society.” especially among younger populations more famil-
International Journal of Communication, iar with digital media. Also, while the Internet is
v.1 (2007). increasingly the site of protests, such online gather-
Dahlgren, Peter. “The Internet, Public Spheres, ings do not necessarily have to relate to political
and Political Communication: Dispersion and or civic activism. Indeed, Jennifer Earl and Katrina
Deliberation.” Political Communication, Kimport, for instance, have studied the rise of so-
v.22 (2005). called fan activisms, where protest tactics—includ-
Eveland, William. P., et al. “Beyond Deliberation: ing e-tactics, such as e-mail campaigns—are used
New Directions for the Study of Informal Political to demand nonpolitical claims, such as entertain-
Conversation From a Communication Perspective.” ment-based and sports-related petitions.
Journal of Communication, v.61 (2011). Internet gatherings rely on the use of the Web
Friedland, Lewis A., et al. “The Networked Public as a direct expression of protest—not just as a
Sphere.” Javnost-The Public, v.13 (2006). means to call for and organize collective action.
Kim, Minjeong and Han Woo Park. “Measuring Thus, the Internet not only facilitates mobilization
Twitter-Based Political Participation and and participation in traditional forms of protests
Deliberation in the South Korean Context by Using (e.g., street demonstrations), but it is also chang-
Social Network and Triple Helix Indicators.” ing the way in which activists communicate, col-
Scientometrics, v.90 (2012). laborate, and demonstrate. Online protests take
Mutz, Diana C. and Lori Young. “Communication advantage of the Internet’s power to foster collab-
and Public Opinion: Plus Ça Change?” The Public oration and participation beyond time and space
Opinion Quarterly, v.75 (2011). constraints. Unlike offline mobilization, Internet
Papacharissi, Zizi. “The Virtual Sphere 2.0: gatherings are not limited by the spatiotemporal
The Internet, the Public Sphere and Beyond.” copresence of actors, which gives them a more
In Routledge Handbook of Internet Politics, transnational character and augments a protest
P. N. H. Andrew Chadwick, ed. New York: movement’s reach because strangers from around
Routledge, 2009. the globe can simultaneously participate in any
Purcell, Kristen, et al. “Understanding the virtual activity.
Participatory News Consumer: How Internet Along these lines, Christian Fuchs describes the
and Cell Phone Users Have Turned News Into a Internet as more than a global computer network,
Social Experience.” Pew Internet and American seeing it as a social system that is brought alive
Life Project, 2010. http://www.pewinternet.org/~/ by the human activities and social relationships
media//Files/Reports/2010/PIP_Understanding_ that occur on the Web. In his view, online protests
the_Participatory_News_Consumer.pdf (Accessed expand the scope of different movements around
January 2013). the world. Because of the Internet, net citizens
Wojcieszak, Magdalena E. and Diana C. Mutz. attain voices in a community of hundreds of mil-
“Online Groups and Political Discourse.” Journal lions of people, and information and communi-
of Communication, v.59 (2009). cation technologies enable individuals to gather
728 Internet Gathering

online, to challenge government policy and cor- of former President of South Korea Roh Moo
porate businesses, and to promote social change. Hyon in 2004. Clearly, then, the Internet offers
No longer working in isolation from each other, the means for massive online gatherings aimed at
net citizens are brought together into a global social change.
community via the Internet. Besides disrupting online sites of real-world
Such community-building capabilities are governments or businesses, online protests also
important for the success of any mobilization are convened in virtual worlds. In 2007, Italian
because protest activity needs both strong and IBM workers organized a strike via the 3-D vir-
weak ties, or connections, that evoke a sense of tual world of Second Life. Roughly 2,000 people
belonging and the trust required to sustain mobi- showed up for the online protest, and eventually
lization. The architecture of the World Wide Web the company responded to union demands. Other
allows for a local conflict to trespass boundar- examples include the violent sit-ins and takeovers
ies—even national ones—and be carried out by aggravated users of online games, such as
globally by new forms of online communities. World of Warcraft and Ultima Online.
Via Internet communication, protesters share
meanings, collective identities, and practices in Impact
a global, digital public sphere. Not surprisingly, While increasingly popular, Internet-based dem-
then, Internet gatherings can unite geographi- onstrations and e-tactics of collective actions
cally dispersed individuals with specific problems have not replaced older, traditional forms of pro-
and travails into a densely connected community. testing. Some authors argue that, rather than a
Online protests take advantage of the fact that substitution, online protests complement offline
the Internet in particular, and spaces generated by actions. Oftentimes Internet gatherings incorpo-
information and communication technologies in rate parallel offline actions in order to reinforce
general, can be the site of civil disobedience by and extend the impact of online protests. Like-
attracting masses of people and mobilizing global wise, scholars have found that the Internet not
public opinion. only has created online modes of existing offline
protest actions, but it also has created a new rep-
Examples ertoire of online actions.
Examples of these kinds of virtual protests Collective action also does not have to remain
abound, from the United Kingdom (UK)-based either online or offline. Rather, research indi-
hacktivist group Electrohippies’ action against cates that the more individuals engage in offline
the computer network servicing the 1999 World activities, the more likely they are to also par-
Trade Organization (WTO) meeting in Seattle, ticipate in online activities. Casting doubt on the
Washington, to the so called Stop Online Piracy assumption that online actions are somehow less
Act (SOPA) strike in January 2012, in opposi- valuable (e.g., the notion of slacktivism), stud-
tion to the law proposed in the U.S. Congress. ies increasingly are demonstrating that protest
The largest online protest to date, with more activities that begin online then move offline,
than 100,000 Web sites in the United States and with the potential for real-world impacts. In fact,
abroad joining the strike by going dark and post- some scholars argue that perhaps distinctions
ing anti-SOPA messages on their home pages, the should no longer be made between offline and
SOPA strike resulted in the controversial bill being online actions because both are part of today’s
shelved in Congress. Other examples include the definition of activism. For example, scholars and
2007 nurse-in organized by the Mothers Inter- media pundits alike point to the way the Internet,
national Lactation Campaign against Facebook particularly social media, played critical roles in
policies that censored breastfeeding photos for the Arab Spring and the Occupy Movement—
being deemed as obscene content, a 2003 virtual both serving as examples of the way offline and
march on the U.S. Congress organized by the online activism converged.
Web-based platform MoveOn.org that resulted In addition to the online–offline comparison,
in blocked telephone lines for hours, and massive online protests bring other potential pros and
online protests in opposition to the impeachment cons. On the one hand, Internet protesters can be
Internet Society, The 729

mobilized faster and in a territorially expanded have documented the way that nondemocratic
space thanks to the Internet’s global presence. Par- regimes have successfully blocked online gather-
ticipation rates of online actions are often higher ings or have used the Internet itself to monitor
than those of comparable offline protests. In addi- and then track down and arrest online protesters
tion, online protests seem to offer a new way to in detriment to the promise of cyber-democracy
engage segments of the population that tradition- and the expressive power of the Internet in coun-
ally have been disenfranchised from politics, such tries like China, Iran, or Indonesia.
as young people or minorities. Empirical evidence
from different countries supports the importance Ingrid Bachmann
of online collective action to engage people in pub- Pontifical Catholic University of Chile
lic affairs. This does not mean that the technology Summer Harlow
is a mobilizing force, but that users have found University of Texas at Austin
a way to use the Internet to express themselves
and share information about their problems and See Also: Activists and Activism, Digital; Arab
concerns, thus helping mobilize users both online Spring; Cloud Protesting; Hacktivism; Occupy
and offline. Movement; Youth Engagement
Further, Internet gatherings allow individuals
to join and leave causes and sites at will, avoid- Further Readings
ing formal involvement or commitment. While Bimber, Bruce, Andrew Flanagin, and Cinthya
this might be empowering in terms of enabling Stohl. “Reconceptualizing Collective Action
civic or even political participation—such was the in the Contemporary Media Environment.”
case during the elections in Iran—it also under- Communication Theory, v.15/4 (2005).
scores the fact that Internet-based movements can Earl, Jennifer and Katrina Kimport. Digitally Enabled
be loose and less collective, and thus short-lived. Social Change: Activism in the Internet Age.
Further, the anonymity that is usually present Cambridge, MA: MIT Press, 2011.
in online protests can translate into less collec- Fuchs, Christian. “The Self-Organization of
tive trust than that of similar offline actions, also Cyberprotest.” In The Internet Society II:
limiting a movement’s sustainability. The lack of Advances in Education, Commerce & Governance,
physical presence may also be a sign that individ- K. Morgan, C. A. Brebbia, and J. M. Spector, eds.
uals are joining online protests just to say they are Southampton: WIT, 2006.
part of a movement, instead of actually commit-
ting to being a part of the movement. The relative
ease and lower costs and risks of online activism
in comparison with offline activism often lead to
the perception that online collective action does Internet Society, The
not generate the same levels of impact as offline
activism. Online protesters have been criticized The Internet Society is an international, nonprofit
for being slacktivists or clicktivists, whose collec- organization founded in 1992 in Washington,
tive action is limited to clicking a link to support a D.C., with its main purpose to “promote the open
cause. According to this argument, changing one’s development, evolution, and use of the Inter-
social media profile avatar to show support for a net for the benefit of all people throughout the
group or cause does little to nothing to provoke world.” The Internet is considered an important
social change. platform for fostering and sharing knowledge and
In addition, given that various social patterns— promoting an information society, thus the ulti-
including social inequalities—are reflected to mate mission of the Internet Society is to favor
some extent on the Internet, the power of online its development. Especially during the last 20
protests and Web-based movements is mostly years, developments in information technology
limited to those individuals with Internet access have made the Internet one of the most important
and know-how, potentially excluding the bulk of and most used “containers” of information and
the world’s population. Moreover, several studies knowledge. The possibility of posting, sharing,
730 Internet Society, The

and seeking content online has turned the Inter- member organizations’ dues. Revenues are also
net into an extremely cheap and fast platform for obtained through direct sponsorships to the orga-
the production, distribution, and consumption of nization’s different initiatives. Sources of support
knowledge. The Internet Society’s main scope is and funding are corporations, different regional,
thus to “provide assistance and support to groups national, and international organizations, and
and organizations involved in the use, operation, Internet administrative infrastructures such as
and evolution of the Internet,” including provi- IAB, IETF, Internet Research Task Force (IRTF),
sion of “forums in which technical and opera- Internet Assigned Numbers Authority (IANA),
tional questions can be discussed and provide and Internet Corporation for Assigned Names
mechanisms through which interested parties can and Numbers (ICANN).
be informed and educated about the Internet, its
function, use, operation, and the interests of its Activities
constituents.” For the past 20 years, the priority policies of the
Internet Society have been Internet access and
Organization development, digital content and innovation,
The Internet Society is sustained by the Internet human rights and rule of law, Internet gover-
Architecture Board (IAB), which is a commit- nance and trust, and privacy and security. The
tee initially created by the U.S. Department of Internet is considered the engine for cultural,
Defense in 1979 for supervising the technical and social, and economic development, and the orga-
engineering development of the Internet, and later nization tries to promote its use and knowledge.
became an international, public entity. It is the The organization works with the IETF, IRTF,
institutional home for Internet standard operat- and the World Wide Web Consortium (W3C) to
ing processes, such as transmission control pro- stimulate research and assist the advancement of
tocol/Internet protocol (TCP/IP), or Internet pro- the TCP/IP protocol suite and the integration of
tocol. The nonprofit organization was founded new protocol suites, for example OSI, into the
by a group of Internet pioneers from the Inter- Internet architecture.
net Engineering Task Force (IETF), who needed The activities of the Internet society can be
an institutional framework for collecting funds grouped in three main areas: policy and standard
to support their activities for the protocol devel- advocacy, education, and development and rec-
opment. Today, the Internet Society comprises a ognition. Through its engagement in discussions
network of 65,000 individual members, over 90 on Internet policy, governance, development, and
chapters, and 145 organization members around technology, the Internet Society tries to facilitate
the world, and has offices in Reston, Vancouver; and support the development of standards, pro-
and Genève, Switzerland. tocols, administration, and the technical infra-
Eight executive senior managers, five regional structure of the Internet. The organization is an
bureau directors representing each continent, and advocate for Internet development and works
a board of trustees manage the Internet Society. with governments, national and international
The board of trustees is the actual governing organizations, civil society, and the private sector
body, and comprises people elected or appointed to promote policies about the Internet that con-
by chapters or regional bureau directors for a form to its core values. It plays a key role in Inter-
three-year mandate. The senior management net governance discussions, including significant
and the board of trustees are supported by an involvement in the World Summit on the Infor-
advisory council, whose main task is to provide mation Society (WSIS) and Internet Governance
advice on different matters related to global Inter- Forum (IGF).
net and users. Members of the advisory council The Internet Society promotes knowledge on
include service and equipment suppliers, academ- technology, use, and application of the Internet,
ics, researchers, representatives from public inter- and supports online education and collaboration
est groups and international organizations, and among organizations. In developing countries,
governments. The Internet Society is primarily training workshops on educational opportunities
supported by individual member donations and about the Internet are also provided. The Internet
Iran 731

Society offers community and ICT innovation Internet Society. http://www.internetsociety.org


grants to initiatives aiming at humanitarian, edu- (Accessed on April 2013).
cational, and societal contexts of online connec- Marsden, Christopher T. Regulating the Global
tivity; and individual fellowships to cover costs Information Society. London: Routledge, 2000.
related to coursework, practical experiences, and
mentorships of young professionals from around
the world. The Internet Society offers three
awards: the Jonathan B. Postel Service Award
for an individual or organization who has made Iran
outstanding contributions to the data commu-
nications community, the Applied Networking In the Islamic Republic of Iran, social media are
Research Prize for applied networking research significant political tools. This was most apparent
results, and the Itojun Service Award for individu- during the country’s 2009 presidential election
als or groups who have made outstanding contri- and its aftermath. Following a contentious out-
butions to the IPv6 community. come that returned far-right conservative Mah-
One of the biggest challenges of the Internet moud Ahmadinejad to office for a second term,
Society is to overcome the digital divide problem, both the opposition Green Movement and mil-
the inequality between groups of people around lions of Iranians who contested Ahmadinejad’s
the world in terms of access to, use of, or knowl- re-election, and the conservative government and
edge of the Internet and other digital technologies. other supporters of the official results used social
While the Internet is widely used and diffused in media heavily. Whether to spread information,
the northern part of the hemisphere and across organize demonstrations, conduct surveillance,
rich regions, the southern hemisphere and poorer or sway public opinion, they were used in a vari-
regions are lagging behind both in terms of avail- ety of ways that drove political developments and
ability of technological infrastructures that allow contributed to shaping Iran’s political landscape.
for the diffusion of the Internet and support for The intensive use of social media during the
specific policies. Part of the digital divide problem 2009 presidential election period stemmed from
is related to differences in Internet governance. an already widespread base of Internet users
The Internet Society is actively trying to foster the in Iran, the anonymity that Twitter and blogs
development and application of shared principles, offered, and the well-established popularity of
procedures, and programs for the Internet across these interactive services. While this trend peaked
the world, which should help in removing some with the elections, it had begun in Iran well before
of the barriers for more equal use and diffusion then and continues today.
of the Internet. Iran’s information environment flourished
under the presidency of Mohammad Khatami,
Chiara Valentini who held office from 1997 to 2005. His govern-
Aarhus University ment significantly relaxed censorship and allowed
numerous reformist newspapers and journals to
See Also: Association of Internet Researchers; operate in relative freedom. The Internet also
Center for Internet Studies; Internet Forums; World became an important means of communica-
Wide Web, History of the. tion. Several newspapers and journals developed
online presences, and Persian language blogs
Further Readings proliferated. Some of these blogs were devoted
Abbate, Jenet. Inventing the Internet, Cambridge, to news and political discussions, whereas oth-
MA: MIT Press, 1999. ers provided outlets for individual viewpoints
Benedek, Wolfgang, Veronika Bauer, and Matthias and experiences of thousands of Iranians. When
C. Kettemann. Internet Governance and the Mahmoud Ahmadinejad first came to power in
Information Society: Global Perspectives August 2005, he reversed Khatami’s liberalization
and European Dimensions. Utrecht: Eleven of most media. Under his leadership, the Iranian
International Publishing, 2008. government took tight control of radio, television,
732 Iran

and print outlets, and made decisive steps to curb The Green Movement relied heavily on Twitter,
use of the Internet. In March 2009, Reporters Facebook, text messaging, and the thousands
Without Borders placed Iran among the world’s of blogs created by ordinary Iranians to quickly
12 top countries known for effectively censoring organize and coordinate opposition efforts and
news and information and systematically repress- public demonstrations, as well as to disseminate
ing Internet users. doctrine and political manifestos. The relatively
modest equipment needed to use social media
The Green Movement helped enormously; Facebook, Twitter, blogs, and
On June 12, 2009, Islamic Republic–controlled text messages could be accessed through portable,
media announced a surprise landslide re-election handheld devices. These social media tools played
victory for Ahmadinejad, only hours after the a pivotal role in the drive to circumvent govern-
polls closed. Thousands of Iranians took to the ment censorship and secure broad support from
streets to stage mass protests. The Green Move- different, often conflicting strata within the Ira-
ment was born directly from this opposition to nian populace.
Ahmadinejad’s re-election. The two reformist Specifically, Twitter had scheduled mainte-
presidential candidates, former Prime Minister nance that would render the service unavail-
Mir Hussein Mousavi and former Parliament able on June 16, 2009, between 9:15 and 10:45
Speaker Mehdi Karroubi, emerged as its leaders. a.m. in Tehran. Users created a viral campaign
to pressure Twitter to reschedule the work.
Using hashtags such as #NoMaintenance and
#Twitter­StayUp, the campaign called for Twitter
to perform the maintenance at 4:00 a.m. Teh-
ran time, instead, to allow the streams of cor-
respondence between Iran-based Twitter users to
continue uninterrupted. By 5:00 p.m. on June 15,
2009, Twitter announced that it would change
its upgrade time. Six days after the presiden-
tial election, Facebook released a beta version
of its entire site in Persian. YouTube helped by
loosening its usual prohibitions against graphi-
cally violent videos. As a result, videos of the
Iranian upheaval were extensively broadcast on
YouTube, capturing the attention of its massive,
international user base.
One example is the video associated with the
death of Neda Agha-Soltan. On June 20, 2009,
Neda was shot by a member of the Basij militia—
a paramilitary volunteer militia that takes orders
from the Iranian Revolutionary Guard Corps
(IRGC), a branch of Iran’s military intended to
protect the country’s Islamic system. This hap-
pened during an antigovernment protest follow-
ing the disputed presidential election, and Neda
died on the street amid a crowd of demonstra-
tors. Her death was captured as amateur video
on mobile phones. These videos quickly spread
across the world, eventually harnessing the atten-
A woman dressed entirely in green joins in a protest against the tion of mainstream media and grabbing head-
Iranian election of 2009 and in solidarity with the Iranian people lines on CNN and the New York Times. Soon,
in Union Square, San Francisco, California, on June 18, 2009. Neda Agha-Soltan became an icon of the Iranian
Iran 733

struggle against the government. In addition, the networking sites so that it could use a practice
hashtag #Neda went viral on Twitter by the end called deep packet inspection to collect informa-
of that day. When the regime prohibited her fam- tion about users and to monitor mobile phone
ily from holding a public funeral, Karroubi used communications.
a Facebook post to call for public mourning of These measures did not deter the support-
Neda Agha-Soltan’s death. ers of the Green Movement. In June and July
The global nature of social media and the 2009, supporters in and outside Iran initiated
inability of observers to distinguish Iran-based multiple Internet-based campaigns to take down
users from users elsewhere also helped the the Gerdab Web site. Leaders affiliated with the
Green Movement. With Twitter, for instance, Green Movement engaged in social media pub-
in the days immediately following the election, licly, maintaining personal blogs, despite intimi-
appeals spread throughout the world: “Change dation and threats of physical violence. However,
your location on Twitter to Tehran, Iran.” By most Iranians in the opposition attempted to
multiplying the number of Twitter users who remain anonymous through the use of computer
appeared to be in Iran, these appeals made it dif- proxy servers or digital safe houses that could
ficult for state operatives to identify and detain strip out identifying information and allow view-
individuals tweeting against the establishment. ing of blocked Web sites.
The ability provided by social media to remain Twitter was particularly important during
in touch with the Iranian diaspora and the rest this tumultuous period. In contrast to blogs and
of the world became especially important when Facebook, use of Twitter was difficult to extin-
the regime banned, and sometimes jailed, foreign guish because the technology has several points
journalists covering the election. of access and does not require individuals to have
Internet access in order to post tweets. Cost also
Response played an important role also; whereas handheld
Anticipating the role that effective communica- devices with Internet access could be expensive
tion and networking could play in organizing for many, basic mobile phones were inexpensive
demonstrations, the government cut off mobile and a standard item for the urban Iranian popula-
phone and text messaging services before the tion. People could use their phones to post tweets
polls opened election morning, and service via text messages.
remained unavailable the day after the election. As members of the opposition looked for ways
In the weeks and then months after the election, to evade government retribution, the regime
the Iranian information environment became pro- expanded its efforts. The IRGC’s Center for
gressively more repressive; for instance, the gov- Investigating Organized Cyber Crimes took on
ernment drastically cut Internet traffic within Iran a heightened role. Originally founded in 2007,
in the early postelection weeks. The Web site of a partly to investigate and confront social and eco-
program produced by the IRGC for state televi- nomic offenses on the Internet, the center became
sion called Gerdab—originally aimed at exposing increasingly important over the course of 2009
the “immorality” of bloggers—started posting as the regime combated the opposition’s online
photographs of Iranian protesters and requesting activities. The government also extended these
visitors to the site to identify them. measures to Iranians living abroad in the form of
Also, the emergence of Neda Agha-Soltan’s threats and intimidating correspondence target-
death video flew in the face of Iran’s strong media ing emigrants against the regime.
censorship. It forced a move by the ruling gov- By dominating traditional media and infiltrat-
ernment to exploit the same digital interfaces that ing the same social media that it had systemati-
were used against it. The government posted erro- cally repressed, the Iranian establishment under
neous information about protest meeting times President Ahmadinejad succeeded in consolidat-
and locations on social networking sites, and ing considerable power over the information envi-
unsuspecting citizens were met by baton-wield- ronment in the nine months following the presi-
ing militia forces. The regime started intention- dential election. The Green Movement, however,
ally permitting Internet traffic to and from social gradually lost momentum. Its broad, fractious
734 Islam, Nation of

nature proved a liability, and its leaders came cut off access to Google, but was forced to restore
under increasing pressure from the regime. As this access to Gmail after public outcry.
happened, Iranians in the opposition began to use Since 2009, the Iranian establishment has taken
social media for different purposes. Twitter and several measures to control the information envi-
Facebook no longer served solely to unify and ronment in Iran. How successful a halal Internet
coordinate. Instead, Iranians began to increas- and these measures would be remains to be seen.
ingly use these tools to express dissatisfaction with Fortunately, creative strategies and social media
both the Green Movement and the international have allowed Iranians to find novel ways around
leadership for their perceived failure to meaning- restrictions and make their voices heard.
fully change the fate of the Iranian people. They
also continued to communicate a multipronged Soumia Bardhan
message regarding the authoritarian nature of the St. Cloud State University
Iranian regime and the importance of reform, and
to show that the movement was still alive despite See Also: Activists and Activism, Digital; Arab
the lack of overt protests. One year after the elec- Spring; Bahrain; Egypt; International Unrest and
tion, Mousavi’s Web site Kalemeh.com, though it Revolution; Libya; Middle East; Russia; Syria;
operated outside Iran, remained a key channel of Tunisia; United States.
communication for the opposition leader.
Further Readings
Demonstrations in 2011 and 2012 Cashmore, Pete. “Iran Blocks Facebook to Silence
The revolutionary wave of demonstrations and presidential Rival.” Mashable. http://mashable
protests in the Arab world that began on Decem- .com/2009/05/23/iran-blocks-facebook (Accessed
ber 18, 2010, eventually leading authoritarian October 2012).
rulers to be forced out of power by the people in Kelly, John and Bruce Etling. Mapping Iran’s
several countries in the Middle East, influenced a Online Public: Politics and Culture in the Persian
series of demonstrations across Iran from 2011 Blogosphere. Cambridge, MA: Harvard University
to 2012. These began on February 14, 2011, and Press, 2008.
in essence followed the 2009 and 2010 Iranian Milani, Abbas. “Iran Primer: The Green Movement.”
election protests. In the days leading up to the Tehran Bureau. http://www.pbs.org/wgbh/pages/
protests, Internet access to specific sites, such as frontline/tehranbureau/2010/10/iran-primer-the
Facebook and Twitter, along with e-mail access, -green-movement.html (Accessed October 2012).
was blocked throughout Iran. The sites were
replaced with a message reading, “According to
computer crime regulations, access to this Web
site is denied.” A number of Iranian bloggers
feared that this outage was a precursor to the Islam, Nation of
implementation of the halal (permissable accord-
ing to Islamic law) Internet. In the United States, religious organizations have
benefitted from the growth of new technologies
Halal Internet since the 1990s, and have embraced these forms
The fifth Iranian five-year plan, beginning in 2010, of communication to reinforce their religious mes-
called for the creation of the halal Internet, an inter- sage and various theologies. In the first decade of
nal network that would contain only religiously the 21st century, Muslims in America accounted
acceptable material and promote Islamic values. It for the majority of producers and consumers of
is feared that the Iranian government would use this “virtual Islam.” Therefore, English is an important
to slowly throttle access to all outside sites, making language for the spread of a contemporary vernac-
them unusably slow and forcing users to settle for ular Islam via YouTube and other forms of social
the national network. For instance, consequent to media. Although organizations such as the Council
the incendiary anti-Islamic The Innocence of Mus- of American Islamic Relations (CAIR) and others
lims video uploaded on YouTube in July 2012, Iran play an important role in the projection of the faith
Islam, Nation of 735

in the United States, older Muslim formations in longer in circulation. However, in the late 1970s,
the country have also played important historical Louis Farrakhan reestablished the newspaper as
roles in regard to social media. Of particular inter- the Final Call.
est is the growing attraction of Muslim identity
within several subgroups of the African American Social Media
population. The Nation of Islam’s utilization of The Final Call online Web site was developed in
media in various forms, from newspaper to con- 1995 by black Muslim college students to pro-
temporary social media, is the product of unique mote the Million Man March. Since 1995, it has
set of societal forces that impact African Ameri- promoted subsequent marches, and now oper-
cans to include cultural politics, social media, and ates as an arm of its newspaper and promotes
emerging Muslim trends in social media. itself as an alternative to mainstream media for
The cultural politics of the 1960s included black consumers in the Americas, the Carib-
opposition to the Vietnam War, the Black Power bean, Africa, and Europe. Since 1995, Final Call
movement, the Black Arts movement, and the online has expanded into news coverage in several
United States’ most vocal critic, Malcolm X. Two areas, ranging from entertainment, athletics, busi-
figures who would impact the national popular ness, health, and international affairs. Final Call
culture and consciousness were Muhammad Ali kept up with developments in social media and
and Amiri Baraka, both Muslim converts influ- joined Facebook in 2009, followed by Twitter and
enced by the teachings of Malcolm X. However, Google+, and extensively utilizes YouTube. Final
the medium that would introduce them to a wider Call online revealed that the U.S. Department of
audience, especially Ali, was the Muslim newspa- Homeland Security distributed intelligence infor-
per Muhammad Speaks. With the emergence of mation on the organization as part of domestic
its first issue of Muhammad Speaks, the Nation of operations, concerned with the Nation of Islam’s
Islam established itself as an alternative voice to leadership succession. A lawsuit filed by the Elec-
mainstream civil rights news of the African Ameri- tronic Frontier Foundation and American Civil
can community. Its first issue came out in October Liberties Union (ACLU) uncovered the operation,
1961, and its circulation rapidly grew in response and federal officials with the Homeland Security
to discontent within the African American commu- agency’s Department of Intelligence and Analysis
nity. Developed by Malcolm X to be the Nation on October 12, 2007, admitted that they had the
of Islam’s official news organ, it communicated organization under observation.
the ideology and concepts of its brand of Islam as However, the Nation of Islam expanded its use
articulated by its leader Elijah Muhammad, and of social media to project its message via a #Ask
grew into a circulation of 900,000 per week. Farrakhan social media Q&A at a September 26,
Founded as a religious and social movement, 2012, town hall meeting at its headquarters. Far-
the Nation of Islam (NOI) was an offshoot of the rakhan fielded questions from around the world
Moorish Science Temple of America in the 1930s, via Twitter, Facebook, YouTube, and e-mail to
and both organizations drew deeply upon prin- address various issues of concern or interest. Addi-
ciples developed by Marcus Garvey and the Pan tionally, the Nation of Islam has conducted classes
African Garvey movement. Primary among these on the advantages and disadvantages of social
ideas were that African Americans must psycho- media and networks at events like its annual Sav-
logically and physically defend themselves against iors Day convention. For example, Muslims are
white supremacy by developing and maintaining admonished not to stop being or acting like proper
communities and worship deities in their image. Muslims simply because they are engaged with
Muhammad Speaks grew even quicker when one social media technology. Yet, members are also
of Malcolm X’s pupil’s and NOI convert heavy- encouraged to embrace and leverage the power of
weight champion Cassius Clay changed his name social media and networking to conduct business,
to Muhammad Ali, and was featured prominently branding opportunities, and promote their art and
on the cover of its paper. Following the assassi- other creative forms. Finally, the importance of
nation of Malcolm X and Elijah Muhammad’s social media to members of the Nation of Islam
death in the 1970s, Muhammad Speaks was no was evident when a conflict arose over the drop
736 Islam and Social Media

in Twitter followers for their leader Louis Farra- Further Readings


khan, and a minor investigation was conducted McAlister, M. “One Black Allah: The Middle East
to examine or explain the sudden loss in follow- in the Cultural Politics of African American
ers. However, during the advent of social media Liberation.” American Quarterly, v.52/3 (1999).
in the United States and globally, other Muslim Smith, M. “Muhammad Speaks and Muhammad Ali:
groups have emerged to compete with the Nation Intersections of the Nation of Islam and Sport in the
of Islam to project the faith and politics of Islam, 1960s.” International Sports Studies, v.22/1 (2000).
both domestically and abroad. Zaman S. “From Imam to Cyber-Mufti: Consuming
For example, the Muslim American Public Identity in Muslim America.” Muslim World,
Affairs Council (MAPAC) is a Muslim political v.98 (2008).
advocacy group headquartered in Raleigh, North
Carolina. The mission of MAPAC is in the area of
political affairs; it collaborates with other media
to promote a Muslim viewpoint. Moreover, it is
involved with political and public policy to influ- Islam and Social Media
ence the local or national political process in order
to defend the rights of Muslims. This behavior is in Islam is the fastest-growing religion in the world.
contrast to the Nation of Islam, which will primar- It is especially popular among young people who
ily defend the rights of Muslims and African Amer- are connected to social media platforms. Digital
icans. However, this also represents the diversity of platforms have markedly impacted the social life
viewpoints within the Muslim community. Yet, this of Muslims, including their religious practices,
perspective is often obfuscated by claims of other religiosity, preaching, issuing fatwas (religious
media that tend to singularly focus on the tensions decrees), and building virtual communities in the
between the Nation of Islam and select members Muslim majority countries or in diasporas. Just
of the American media or Jewish civic community. as other regions, the Muslim majority countries
Nowhere does this tension emerge more than in have recently witnessed a rapid diffusion and
the area of international or foreign affairs. adoption of social media platforms such as Face-
book, Twitter, and YouTube. In the Arab world,
International Issues Facebook is the leading social networking Web
The impact of the role of social media influencing site, with 45,194,452 users. Twitter follows with
the Arab uprisings in 2011 is still in dispute. While 2,099,706 users. The Arab region is second to
mainstream media encourages a broad under- the United States when it comes to the number
standing of a grassroots social media narrative, of YouTube daily views. With 90 million video
the Nation of Islam, among others, promotes and views per day, Saudi Arabia has the world’s high-
downplays the role of social media, and focuses on est number of YouTube views per Internet user.
the realpolitik of the Middle East and Africa and The popularity of social media platforms in the
the role that Western governments have played to Arab world has led some scholars to expect that
destabilize the region. Evidence suggests that there its impact on religious life is likely to rise. The
was massive involvement from the average Mus- common argument is that social media have the
lim citizen utilizing social media in relation to the potential to change people’s religiosity and prac-
protests, and it also demonstrated how the Nation tices of piety. The impact of social media on reli-
of Islam, through its social media, remains heavily gious behaviors of individuals and communities
engaged in foreign policy developments. in environments characterized by conservatism
and traditionalism, it is argued, will be even more
Reynaldo Anderson profound than in environments characterized by
Latisha Smith liberalism and openness.
Harris-Stowe State University As for the followers of other book-based reli-
gions in the Abrahamic tradition, communicating
See Also: Arab Spring; Civil Rights; Islam and Social and winning the hearts and minds of believers
Media; Nation of Islam Movement. and non-believers through dawa (proselytism)
Islam and Social Media 737

is a central commitment for many Muslims and Islamic scholars at 600,000. Famous preachers
Islamic preachers and leaders. Social media have like Tareq Al Suwaidan and Amr Khaled even
become an invaluable means to pursue the path reach 1 million when it comes to Facebook fans
of dawa and the dissemination of the Koran. and “likes.” Ironically, some star religious schol-
Only very few voices condemn the use of the new ars have social media accounts, even if they died
digital media as incompatible with Islamic prac- decades ago, yet their religious and intellectual
tices. For instance, Abdul Aziz Al Shaikh, Grand followers have aspired to reach new generations
Mufti in Saudi Arabia, advances a critical stance of digital natives and followers by creating Face-
toward social media platforms such as Facebook book pages, Twitter streams, and YouTube chan-
and Twitter because, as he says, they disseminate nels. Social media are an increasingly important
lies and may destroy established relationships and source of religious information for many people
Muslim families in the offline real world. In a in the Muslim world. As a result, a new media
similar line, religious authorities in some Islamic culture is emerging that is having a significant
countries issued fatwas against the use of social impact on global Muslim consciousness.
media like Twitter, arguing for its incompatibil- The use of social media is not limited to reli-
ity with Sharia (Islamic law) because of trading gious leaders, but is also used by normal Mus-
accusations and promoting lies. While some lims who started tweeting Koranic verses and
Islamic religious leaders advise their followers not ahadith, or “prophetic sayings.” The dissemi-
to use social media platforms, the overwhelming nation of religious content regularly reaches its
majority of scholars and preachers capitalize on peak during Ramadan, when the degree of reli-
the effectiveness and efficiency of social media in giosity increases. The Ramadan Aperture, when
engaging with the community of believers and Muslims are internally and externally motivated
enhancing their fidelity and loyalty. to receive and process religious content in form
In the first generation of the Internet, there of tweets, is a new phenomenon that changes the
were some traditional Web sites like Online Islam way the Islamic faith is promoted among believ-
that acted as “one-stop shopping” for religious ers and nonbelievers. The very nature of a tweet,
information and comprehensive services to the with its 140 characters, designed especially for
Islamic community, the ummah. These digital ease of use and memorability, is a perfect tool
platforms led to the emergence of what some call for memorizing the Koran and the Prophet’s say-
“Facebook fatwas,” or “F-fatwas.” They intro- ings. Tweeting Koranic verses and sayings from
duced a new paradigm to the practice of religious the Prophet have become a part of Ramadan
instructions in the way they were formulated, religious rituals and habits. On the occasion of
issued, disseminated, received, and acted upon. Haj, the pilgrimage to Mecca, pilgrims tweet
The mushrooming of digital platforms during feeds, offering a sense of virtual spirituality to
the second era of the Internet, Web 2.0, led to a their families like a vignette for the sacredness
process of undermining the monopolistic nature and presence of the holy place. Other pilgrims
of religious orthodoxies. For many, social media upload photos and clips from sacred places to
have become the ideal platform, the new mosque share the rituals and spiritual experience. These
or madrasa for the dissemination of the Islamic practices contribute to the enhancement of co-
belief. F-fatwas spark commentary and feedback religiousness and co-piety of the Islamic ummah
among many sectors of Muslim societies, includ- (community).
ing religious authorities, Islamist intellectuals, Social media have become integrated in the
young urban or secularized Muslims, and ordi- habit of not only spreading the word of Allah,
nary believers. but also safeguarding Islam against critics from
the outside. For example, Muslims created Face-
Proselytization book pages to defend the prophet Muhammad
One type of Islamic use of social media plat- from attacks. The Web site “Social Media and
forms is proselytization, which is widely popu- Islam,” for example, is a page that “promotes
lar among Islamic preachers. Some estimates the message of Islam on social media.” Social
put the number of Twitter followers for some media also created an Islamic popular diplomacy.
738 Islam and Social Media

Yemeni women undergoing computer training at a women’s center in the city of Taiz, Yemen, in 2002. In 2013, there were more than
45 million Facebook users and 2 million Twitter users in the Arab world, and the region was second only to the United States in daily
YouTube views. Saudi Arabia had the highest number of YouTube views per Internet user in the world, at 90 million views a day.

This involves the global mobilization of believers appear; yet, their adoption rate is still very low.
through virtual platforms in case of individual The recent SalamWorld has sought endorsements
or group attacks on the Prophet or the Koran. from Saudi and salafi scholars (puritans). This
Prominent examples are the plan of a U.S. pas- social networking Web site filters what it views
tor to burn copies of the Koran in 2010, and the as harmful content, like pornography, terrorist
dissemination of the anti-Islam video clip Inno- activity, or human rights violations. Its mission is
cence of Muslims. These incidents have triggered the respect of the values of Islam.
a global mobilization of Muslim protests by Social media have opened up the opportunity,
means of social media platforms. Countries such especially for young Muslims, to engage with
as Pakistan, Jordan, and Egypt asked YouTube their faith and communicate to co-believers in
to delete the film from its platform. a manner that their parents could never have
Some conservative leaders called for the cre- imagined. Where once the ummah was a spiri-
ation and launch of halal (permissible accord- tual notion, with Muslim communities separated
ing to Islamic law) social media platforms. As a by language and geography, social media have
response to these calls, a number of digital initia- broken down barriers and enabled young Mus-
tives and projects were carried out. Islam-centered lims to connect, irrespective of where they are.
alternatives to Facebook, such as Muslimsocial It allows them to discuss what it means to be
.com, Muxlim.com, and SalamWorld started to Muslim in the 21st century, especially for those
Islam and Social Media 739

living in the Western Hemisphere. Teenagers and the spiritual master, or sheikh, which is still a
young adults of second- and third-generation key moment to the Sufi experience.
Muslims living in western Europe and North
America have become engaged in digital discus- Terrorism
sions and debates concerning religious issues and In addition to the Sufi and other soft versions
identities. of Islam, there are also violent manifestations of
For some hyperdigital activists, social media Islam found in the blogosphere, enacted as Al
provide the means for reuniting the ummah in a Qaeda, Hamas, and Hizballah. The emergence
form of e-ummah. Digital social platforms, they of e-jihad in forms of digital activism, hacking
hope, can contribute to the creation of virtual activities, and cyberattacks has turned the blogo-
communities that may pave the way for even- sphere as a realm of civic use of social media
tual physical communities, and thus support the into “Blogistan,” where aggressiveness and vio-
global cohesion of believers by weaving links lence are prominent. The strongest manifesta-
between community members of the different tions of the use of social media for political or
countries worldwide. In some urban centers in even militant Islamic movements are the recent
North America and Western Europe, Islamic Arab revolutions. The Arab Spring brought
social media Web sites have contributed to the Islamist movements and political parties to
spread of Islamic icons, indexes, and symbols power in many Islamic countries. Because they
among members of the Muslim diaspora. Recent were denied access to the public sphere, they
research has shown that young Muslims in turned to digital platforms as an efficient tool
Western societies are more receptive to religious for creating and distributing political messages,
beliefs and values. One indication of their reli- and for mobilizing followers and supporters for
giosity is that they are likely to attend mosques demonstrations. For instance, during the mobili-
more frequently. In the Islamic communities in zation of protests in the Egyptian streets, social
the northern hemisphere, proselytizing efforts media–savvy activists used Facebook to schedule
have been exceptionally successful. In Europe the protests, Twitter to coordinate, and YouTube
and the United States, non-Muslims accept invi- to tell the world.
tations to convert to Islam. The personal videos The recent return and rise of Islam is spectacu-
of converters are broadcast on YouTube and lar. It has been argued that the synergy of small
discussed in virtual chat rooms. Young Muslims media and social media have helped Islam to gain
have uploaded a great number of videos that dis- or regain a place in the contemporary complex
cuss issues related to the creation of the universe. social life. The continuous digitization of Islam
For instance, there are about 70,000 YouTube and the Islamization of the digital world repre-
videos on the “Scientific Miracles of Quran,” an sents both a blessing and challenge to the reli-
indication of their special popularity. gion of Islam in the 21st century, where closed
Like mysticism, Sufism is a way of inner and systems are resisting the openness of instantly
mystical practices of Islam. The ritual-mystical constant transparency and WikiLeaks effects.
practice is based on a master–disciple relation- For centuries, interpretations of the Koran were
ship. Adherents of Sufism are traditionally not kept a reserved domain for a tiny minority of
interested in technology because spirituality ulama, or “scholars of religion.” Social network-
is about silence and stillness, whereas digital ing Web sites, microblogging platforms, and
social networking platforms are agile and rest- mobile social apps have become profane avenues
less. However, in recent times, even Sufi move- for disseminating sacred interpretations. Reli-
ments have made use of social media to practice gious authorities on digital platforms are in the
their spiritual purification in the virtual world. process of being undermined. The blossoming of
It is remarkable that the applications of social digital fatwas is an indication of the splintering
media have led to an extension of Sufi spiritual of orthodoxies and the emergence of heresies.
sphere of influence and followers. The challenge The traditional concept of religious authority
for these Sufi groups is to adequately address the has come under attack, and has been shaken in
need for a direct and physical relationship with many forms. Consequently, religious authority
740 Israeli–Palestinian Conflict

has become a contested domain, rather than an public opinion, control coverage of mainstream
accepted reality, for the uneducated masses. media, and directly target their adversaries. At
times of escalated conflict and violence, social
Mohammed Ibahrine media have been gradually implemented as a strate-
American University of Sharjah gic tool for advancing informational war. With the
rise of social media, Web campaigns related to the
See Also: Africa, north; Arab Spring; Asia; Cyber- Israeli–Palestinian conflict have been decentralized
Jihad; Indonesia; Innocence of Muslims, The; Islam, and adapted to the unique characteristics of each
Nation of; Israeli–Palestinian Conflict; Middle East; platform. The long dispute over the recognition of
Nation of Islam Movement; Terrorism. Palestine as a state and of Israel’s unofficial borders
has also migrated to social media platforms, where
Further Readings users from both sides of the conflict complained
Bunt, Gary. iMuslims: Rewiring the House of that platforms misrepresent their country.
Islam. Chapel Hill: University of North Carolina
Press, 2009. Social Media on the Battle Field
Dubai School of Government. “Arab Social Media Between 2006 and 2013, the Palestinian–Israeli
Report.” http://www.arabsocialmediareport.com conflict was marked by four periods of escalated
(Accessed April 2013). conflict and military operations: the Hezbollah–
Howard, Philip. The Digital Origins of Dictatorship Israeli war in the summer of 2006 (also dubbed the
and Democracy: Information Technology and Second Lebanon War); Israel’s military operation
Political Islam. Oxford: Oxford University in Gaza in January 2009 (also dubbed Operation
Press, 2010. Cast Lead, or the War on Gaza), Israel’s attack
of the Turkish flotilla Mavi Marmara in May
2010, and the conflict between Israel and Hamas
in November 2012 (also dubbed Operation Pillar
of Defense). During these years and around these
Israeli–Palestinian events, Israel, Hezbollah, and Hamas have signifi-
cantly increased and elaborated their use of social
Conflict media as a strategic warfare tool.
In 2006, Hezbollah used the advantage of real-
Advocacy of causes related to the Israeli–Palestin- time Internet press and social media as a tactical
ian conflict on the Web were already highly used tool to bypass mainstream media coverage and to
before the rise of social media. Grassroots Web decrease Israeli public morale, whereas Israel was
campaigns related to the conflict reached their still relying on traditional informational tools such
peak during the first half of the 2000s, from the as targeting Lebanese combatants and civilians
outbreak of the Second Intifada until the Israeli with push text messages and airborne leaflets. For
disengagement from the Gaza Strip in 2005. As example, on July 14, 2006, Hezbollah attacked the
with political campaigns elsewhere on the Web Israeli naval ship Hanit near the coast of Beirut,
during that time, most campaigns related to the killing four Israeli marine soldiers. Within hours
conflict were led by international and local non- of the attack, Hezbollah posted footage of the mis-
governmental organizations (NGOs) and aimed siles hitting the ship on YouTube. The footage had
at resonating in mainstream international and already circulated widely in social and mainstream
local media, a high rank in search engine results media before Israel officially confirmed the event.
and a dense network of hyperlinked Web sites. It is also reported that Hezbollah monitored social
While the turn to social media as platforms for media to determine the precise location of the
online advocacy related to the Israeli–Palestinian rocket attacks on northern Israel.
conflict has engaged larger publics and individual
users, governments and officials from both sides of Media Strategy
the conflict have developed a top-down approach To learn the lessons from the war with Hezbol-
to social media in order to shape international lah, Israel established the National Information
Israeli–Palestinian Conflict 741

Directorate to control and unify Israeli propa- Mainstream media also made use of a collec-
ganda and public relations across different media tion of tapes released online by Al Jazeera under
outlets. By December 2008, Israel’s launch of a Creative Commons license. Al Jazeera also
Operation Cast Lead in Gaza was accompanied implemented the crisis mapping code released
by a massive and concerted informational cam- by the nonprofit company Ushahidi, which dis-
paign that combined traditional media, new played user reports made through a Web site or
media, and diplomacy. Israel gained full control mobile phones.
on information coming out from the Gaza Strip In June 2010, Israel’s media strategy was fur-
by enforcing a media blackout that banned for- ther implemented in the events that unfolded
eign journalists from entering Gaza. At the same after the IDF’s raid on a flotilla of six ships
time, the Israel Defense Forces (IDF) Spokeper- carrying activists and humanitarian assistance
son’s Unit launched a YouTube channel, which to Gaza. On May 31, 2010, Israeli naval com-
given the media blackout, was the only source mando soldiers boarded the six ships in inter-
that journalists and mainstream media could national waters of the Mediterranean, but faced
report on. The IDF YouTube channel was viewed resistance from the activists on board the MV
by millions, either on social media platforms or Mavi Marmara. A violent struggle unfolded,
through mainstream media. leaving nine activists dead and 10 soldiers
The Israeli Consulate in New York also held a wounded. The IDF detained the passengers and
press briefing on Twitter, but journalists ridiculed confiscated all cameras and footage obtained
the statements, made in an abbreviated form to from the activists on board. As with the media
match Twitter’s 140-character limit, as a gim- blackout during Operation Cast Lead, the IDF
mick. On the civic front, the Israeli foreign minis- posted a video on its official YouTube channel,
try recruited immigrants to blog in favor of Israel claimed to be taken by the soldiers on board, to
in its native language. The Intidisciplinary Center serve as evidence that the soldiers were forced to
in Hertzlia recruited students to spread positive shoot in self-defense because the activists were
messages justifying Israel’s military operation in armed and prepared for battle.
social networking platforms and to post com- Critics of Israel claimed that the low-resolution
ments in Israel’s favor on influential blogs. Hamas videos might have been manipulated; yet, with
posted footage on PalTube.com, a video-sharing all other media confiscated, Israel did not allow
platform affiliated with the organization. Despite for other evidence to counter their claim. As with
the media and electricity blackout, citizens from the media blackout in Gaza, over time, the pho-
Gaza managed to send tweets, videos, and images tos and footage taken by activists appeared on
with mobile phones. Gradually, information various social media outlets, countered the Israeli
started to leak from Gaza. Palestinian journal- narrative, and ignited heated debates from both
ists based in Gaza gave interviews by phone and sides of the conflict.
Skype to international mainstream media outlets, By November 2012, social media had been
and used social media such as blogs and Flickr fully integrated by Israel and its opponents, to
accounts to report on the unfolding events. Out- the extent that operation Pillar of Defense has
side Gaza, thousands of supporters of Palestin- been launched in Gaza, together with the IDF
ians used the Qassam Count bot, a social media spokesperson’s declaration of war on Hamas
utility that automatically updated their status to on Twitter. On November 8, 2012, the IDF
report the real-time events on the ground. Spokesperson Unit tweeted: “We recommend
Mainstream media reporting had to accus- that no Hamas operatives, whether low level or
tom itself to the media blackout and incorporate senior leaders, show their faces above ground in
social media as a primary source for covering the the days ahead.” In response, the Al Aqsa Bri-
war. This included footage from the IDF chan- gade posted a counter­tweet, directly address-
nel, live video feeds streamed from Gaza news ing the IDF spokesperson’s Twitter account:
agencies, and Google maps to display the places “@idfspokesperson Our blessed hands will
of Israel’s airstrikes and infantry incursion in reach your leaders and soldiers wherever they
Gaza, or the Israeli cities hit by Hamas rockets. are (You Opened Hell Gates on Yourselves).” In
742 Israeli–Palestinian Conflict

2012, Twitter had become a platform for official Recognition of Statehood and
real-time reporting of each side’s successes and Representation of Borders
adversaries’ failures, while attempting to actively In 2010, the West Bank administration launched
engage followers by asking them to retweet if a diplomatic campaign in preparation for a bid
they found their claims to be right. for United Nations (UN) recognition of the Pal-
estinian state around the 1967 borders. Many
Grassroots Campaigns governments expressed their support of the West
Even before Palestinian and Israeli officials Bank government, declaring their recognition
turned to social media as tools for informational of the Palestinian state. In dismissing this dip-
warfare, social media were already widely used lomatic move, Israeli Deputy Foreign Minister
by grassroots organizations and individuals to commented that the recognition of Palestine by
advocate Palestinian and Israeli causes related to foreign countries is similar to clicking “like” on
the conflict. Before the rise of social networking Facebook. Palestinian Prime Minister Fayyad, in
sites such as Facebook and Twitter, the blogo- return, commented that Palestinians are seeking
sphere was the main platform for online grass- more than a “Facebook state.” While other plat-
roots advocacy. Most Palestinian and Israeli forms used various naming conventions, such as
blogs are written in English in order to appeal to separate entries for West Bank and Gaza, Pales-
international publics. Alternative media outlets tinian Territory or Occupied Palestinian Territory,
such as Electronic Intifada or Social Israel TV Facebook was the first social media platform to
have gained popularity as authoritative sources add Palestine to its country list. Facebook’s recog-
that challenge mainstream media reporting of nition of Palestine as a country was an outcome
the conflict. Social media have also been used of fierce user activity organized around groups
to mobilize dissident activities within Israeli and that petitioned for adding or removing Pales-
Palestinian societies. The Boycott, Divestments tine from the platform’s country list. Upon user
and Sanctions movement, for example, has requests, Palestine was first added to Facebook’s
gained popularity worldwide and has created a country list, then delisted, and eventually relisted.
dense network of activists that use social media In 2008, Israeli settlers also protested against
to mobilize support of Palestinian rights and Facebook for identifying their addresses as living
criticize the West Bank administration’s efforts in Palestine. Facebook eventually allowed settlers
to receive recognition of the Palestinian state living in three large settlements to choose either
around the 1967 borders. Israel or Palestine as their home country.
Israeli activists have used social media to orga- Social media platforms that display geographic
nize demonstrations against the Israeli occupa- information such as Google Maps and Flickr were
tion. In Gaza, the Gaza Youth Breaks Out is an also sites of continuous dispute around the place-
example of a social movement that started as a ment or nonplacement of the Palestinian Terri-
Facebook group critical of both Israel and Hamas. tories, and around misrepresentations of Israel’s
Dissident voices have not always been welcomed borders. In 2008, Google Maps displayed the
by social media platforms, which at times have Palestinian Territories as a grey area that did not
suspended their accounts. Facebook, for exam- contain any geocoded data. Although it is unclear
ple, removed a page that called for a third inti- whether Google changed its policy based on
fada against Israel. Before it was removed, the user protests, by January 2009, the missing data
group attracted over 300,000 fans and mobilized appeared, and most international media sources
a march of Palestinians from Syria to cross the relied on mash-ups building on top of Google
border with Israel in May 2011. Pro-Palestinian Maps to report the Israeli military’s operation
and pro-Israeli activists have also edited and re- in Gaza, and Hamas’ rocket fire into southern
edited Wikipedia entries related to the conflict. In Israeli cities. As with Facebook, complaints were
most cases, such as with the entry “Gaza Flotilla also made by Israelis that the localization service
Raid,” Wikipedia adds a notice at the beginning of Google AdWords did not show Israeli ads in
of the article claiming that the entry might be sub- areas outside the Green Line boundary, such as
ject to dispute or impartiality. the Golan Heights, East Jerusalem, and the Jewish
Issa, Darrell 743

Settlements in the West Bank. In November 2012, army in 1980, and entered the private sector. He
the UN granted recognition of Palestine as a non- became a millionaire by the 1990s because of the
member state. Following the UN recognition, on success of his company, Directed Technologies,
May 1, 2013, Google officially changed its nam- which sold antitheft auto devices. In 1998, Issa
ing convention from “Palestinian Territories” to unsuccessfully ran for a seat in the U.S. Senate
“Palestine” across all of its platforms. from California. However, two years later, he was
elected to a seat in the U.S. House of Representa-
Anat Ben-David tives from the 49th District. Issa easily won re-
University of Amsterdam election in 2002, 2004, 2006, 2008, and 2012.
He usually received more than 60 percent of the
See Also: Conflict Resolution, Social Media and; vote in his re-election bids.
Cyber-Jihad; Middle East; Third Palestinian Intifada; In the House of Representatives, Issa was a
Web Mapping and Online Politics. staunch economic and social conservative. On
the issue of abortion, the National Right to Life
Further Readings Committee gave Issa a 100 percent rating. On
Allan, Diana and Curtis Brown. “The Mavi Marmara economic issues, he tended to vote for tax cuts
at the Frontlines of Web 2.0.” Journal of Palestine and spending cuts, and against government spend-
Studies, v.40/1 (2010). ing programs. Issa voted against the TARP bail-
Ben-David, A. “Palestine’s Virtual Borders 2.0: From out in 2008, President Obama’s stimulus plan in
a Non-Place to a User Generated Space.” Réseaux, 2009, and the Affordable Care Act in 2010. Issa
v.1/159 (2010). was such a strong supporter of business that he
Caldwell, I. V., et al. Learning to Leverage New received a 100 percent rating from the National
Media: The Israeli Defense Forces in Recent Association of Manufacturers (NAM). On envi-
Conflicts. Fort Leavensworth, KS: Army Combined ronmental issues, Issa proclaims himself a strong
Arms Center, 2009. supporter of alternative energies. However, critics
Ward, Will. “Social Media in the Gaza Conflict.” noted that Issa voted against President Obama’s
Arab Media & Society, v.7 (2009). cap and trade bill in 2009.
Darrell Issa entered the public spotlight in 2010
when Republicans gained control of the House of
Representatives. Issa, who was a member of the
House Oversight and Government Reform Com-
Issa, Darrell mittee, became its chair. As chairman, Issa began
aggressively investigating the Obama administra-
Darrel Issa serves as a congressman in the U.S. tion. The most famous example was Issa’s investi-
House of Representatives from the 49th District gation into Operation Fast and Furious, a federal
(formerly the 48th District) in California (R). He government sting operation that put guns into
is currently the chairman of the House Oversight the hands of Mexican drug dealers and led to the
and Government Reform Committee. To his sup- murder of a border patrol agent. Issa demanded
porters, Issa is a dedicated watchdog, seeking the answers and documentation from President
truth on topics from Operation Fast and Furious Obama’s Justice Department, even subpoenaing
to the attack on the U.S. Consulate in Libya. To Attorney General Eric Holder to testify before
his critics, Issa is a partisan zealot desperately his committee. To Issa’s defenders, he was merely
seeking to embarrass and undermine President trying to determine the truth about a disastrous
Barack Obama’s administration. operation that was possibly covered up by the
Darrell Issa was born in 1953 in Cleveland, Obama administration. To Issa’s critics, he was a
Ohio. After graduating from high school, Issa partisan Republican, using his committee’s powers
enlisted in the U.S. Army. While in the U.S. Army, to embarrass and undermine President Obama.
he received a business degree from Sienna Heights Issa also investigated President Obama’s han-
University. By the time he left the army in 1980, dling of the attack on the U.S. consulate in Libya
Issa became a captain in the army. Issa left the on September 11, 2012. Issa aroused controversy
744 Issa, Darrell

when his committee released documents pertain- uses social media, such as Twitter, to communi-
ing to the attack. Senate Democrats condemned cate with his constituents. As long as Republicans
the release, claiming that vital national secu- control the House of Representatives, Issa will
rity information was leaked by publicizing the continue to play a significant role, to the delight
documents. On the other hand, Issa’s defenders of his supporters and the chagrin of his critics.
insisted that Issa was merely trying to determine
the facts of the matter, and that no vital national Jason Roberts
security documents were leaked from the docu- Quincy College
ment release.
Issa has had a combative relationship with the See Also: Online Smear Campaigns; Political
press. For example, Issa challenged a New York Information Opportunity Structures; Political Parties.
Times profile that claimed that he had enriched
himself while serving in Congress. He responded Further Readings
that the article contained many factual inaccura- Cheredar, Tom. “Rep. Darrell Issa Introduces a
cies. Contrary to the New York Times profile, Issa ‘Don’t Mess With the Internet for Two Years’ Bill.”
contended that he actually lost money on invest- Washington Post (November 28, 2012).
ments while in Congress. Issa is a controversial Flock, Elizabeth. “The Internet Is Skeptical of Darrell
political figure who frequently uses the media Issa’s New Law to Protect the Web.” US News &
to get his message out to the public. He ofetn World Report (November 28, 2012).
appears as a guest on the Sunday news shows to Gordon, Michael R. “Official Tells Panel a Request
discuss his investigations into Fast and Furious, for Libya Was Denied.” New York Times (October
the IRS, and Benghazi. In addition, Issa regularly 10, 2012).
J
James K. Batten Award College, Batten began working for a Knight­-
Ridder newspaper, the Charlotte Observer, in
Named after a prominent newspaper executive, 1957, and moved to Knight-Ridder’s Washing-
the James K. Batten Award began as a recogni- ton, D.C., bureau eight years later, where he
tion of excellence in civic journalism in 1995. became known for covering the civil rights move-
After eight years, the award was transformed ment. After later serving as the city editor of
into a prize celebrating innovations in journalism, the Detroit Free Press, Batten moved into man-
becoming known as the Knight Batten Awards. agement at Knight-Ridder’s corporate offices,
Sponsored by the Pew Center for Civic Jour- becoming company president in 1982, and chair-
nalism, the James K. Batten Award worked to man of the board in 1989.
acknowledge the efforts of those print or elec- In 1995, Batten died at the age of 59 of a malig-
tronic journalists whose work encouraged indi- nant brain tumor. In his honor, the James K. Bat-
viduals’ participation in and contributions to ten Award for Excellence in Civic Journalism was
the life of their communities. The Knight Batten created and first awarded in 1995. The first award
Awards, which focused on new media and inter- was given posthumously to Batten in honor of
active and participatory journalism, helped to his lifelong commitment to making journalism a
acknowledge the growing power of social media building block to invigorating citizenship while
in political and other matters affecting commu- adhering to a mission of accurately reporting dif-
nities. After 2011, the Knight Batten Awards, ficult and discomforting facts.
which had been sponsored by the Knight Foun- Batten’s work to ensure that journalists were
dation, were ended. connected with the communities that they served
culminated in the creation of what has become
James K. Batten known as civic journalism. This term is taken
James K. Batten, born in 1936, served as chair- from a speech Batten gave to students at the Uni-
man of the board of directors and chief execu- versity of California, Riverside, about the need
tive officer (CEO) of Knight-Ridder Inc., a media for journalists to adhere to an ethos that empha-
conglomerate that included daily and weekly sizes connections with those they serve. Before his
newspapers, television stations, and other com- death, Batten assisted the Pew Charitable Trusts
panies that focused on the electronic transfer of in establishing the Pew Center for Civic Journal-
news and data. Upon graduation from Davidson ism. Batten used his extensive connections with

745
746 James K. Batten Award

news organizations around the globe to assist in the definition of what constituted the news, and
the formation of the Pew Center for Civic Jour- helped to create new ways by which useful infor-
nalism, and upon his death, the Pew Charitable mation was disseminated, distributed, and deliv-
Trusts established the James K. Batten Award for ered. To that end, the Knight Batten Awards were
Excellence in Civic Journalism with annual prizes highly successful.
totalling $25,000. In addition to the awards cer- Following a process similar to the previous
emony, a symposium occurred, where issues fac- honors, the Knight Batten Awards combined
ing those interested in civic journalism could be recognition of digital engagement that grappled
addressed. with public issues with a series of symposia
The James K. Batten Awards for Civic Jour- intended to focus attention upon emerging media
nalism were given between 1995 and 2002. The and forms of communication. As they broadened
location of each year’s awards ceremony and the conceptions of what constitutes the news, the
accompanying symposium moved annually, and Knight Batten Awards encouraged a variety of
took place at locations such as the University of new forms of creative thinking. These forms of
Minnesota, Boston University, Kent State Univer- out-of-the-box approaches to the news included
sity, and the University of North Carolina at Cha- creative use of mobile devices such as cell phones
pel Hill. Topics covered by the symposia included or global positioning system (GPS) tools, data-
new media, new journalism, race and civic jour- mining schemes, innovative initiatives encourag-
nalism, and the legacy of journalism. ing citizen-led media, news games, networked
Beginning in 2003, the awards became the journalism projects that combined “old” and
Batten Awards for Innovations in Journalism, “new” media, online applications, and social net-
later called the Knight Batten Awards. Although working approaches to gathering or disseminat-
funding for the Knight Batten Awards ended ing information.
following the announcement of the 2011 win- Symposia that followed the awards explored
ners, the new format of the recognition process how news gathering connects with and fosters
greatly expanded perceptions of how social connections between communities, how new
media contributed to and could become journal- media such as blogs have affected both local and
ism. The broader focus of the awards helped to national political races, digital delivery systems
improve perceptions of new media in the eyes of and how they will evolve, and how new institu-
the public. tions such as the “newseum” are changing how
society thinks about both news and community.
Knight Batten Awards
The Knight Batten Awards sought out new Stephen T. Schroth
advances in interactive or participatory journal- Nathaniel T. Rosenberg
ism, which included social media in ways that the Knox College
James K. Batten Awards had not. This change was
intentional, because the Knight Batten Awards See Also: Blogs; Campaigns, Grassroots; Global
were intended to increase attention on approaches Center for Journalism and Democracy; MIT Center
that spurred wider audience engagement, encour- for Civic Media; News Media; Pew Internet and
aged innovative forms of information sharing, American Life Project.
and nurtured nontraditional dealings between
different groups that had a positive impact on Further Readings
communities. The Knight Batten Awards were Merritt, W. D. Knightfall: Knight Ridder and
administered by the J-Lab, a research center of How the Erosion of Newspaper Journalism
the School of Communications at American Uni- Is Putting Democracy at Risk. New York:
versity in Washington, D.C. Amacon Books, 2005.
Over the eight years the Knight Batten Awards Meyer, P. The Vanishing Newspaper: Saving
were given, they helped to foster deeper dialogue Journalism in the Information Age. 2nd ed.
between news providers and the audiences that Columbia: University of Missouri Press,
they served. The new prizes also helped to change 2009.
John Aubuchon Press Freedom Award 747

John Aubuchon The 2008 award for a domestic journalist went


to USA Today reporter Toni Locy, for her cover-
Press Freedom Award age of the 2001 anthrax attacks. In 2008, Locy
was held in contempt by a federal judge and fined
Each year, the National Press Club (NPC) gives after she refused to reveal the sources for her story.
the John Aubuchon Press Freedom Award. The The 2008 international winner was Chinese
award honors at least one U.S. journalist and at journalist Qi Chonghuai; he was recognized for
least one international journalist who “embody his coverage of Communist Party corruption in
the struggle to advance press freedom and open Shandong Province. In 2008, the Chinese gov-
government.” Recipients have included print ernment charged him with “extortion and black-
journalists, broadcast journalists, and bloggers. mail,” and sentenced him to four years in prison.
In 2009, the domestic winner of the award
The Award was David Rohde, a journalist for the New York
The John Aubuchon Press Award was established Times. Rohde, who had previously received a
in memory of John R. Aubuchon, the 95th presi- Pulitzer Prize for his coverage of the war in Bos-
dent of the NPC, who died in 2003 at the age of nia, was honored for his reporting on the war in
57. Prior to heading the NPC, Aubuchon had a Afghanistan. While in Afghanistan, he was kid-
career in broadcast journalism that spanned more napped by the Taliban and held in Pakistan for
than three decades, and included stints at UPI, seven months before escaping.
CNN, and Maryland Public Television. During Also in 2009, the NPC honored Sri Lankan
his career, Aubuchon was a staunch advocate of journalist Lasantha Wickrematunge posthu-
press freedom. mously. He was the founder and editor of the
The National Press Club, which sponsors the Sunday Leader, a paper that was highly critical
award, is located in Washington, D.C., and serves of government corruption. Wickrematunge, who
as a social and professional organization for jour- had previously survived an assassination attempt,
nalists. It has more than 3,500 members, and was shot and killed in January 2009. Before his
hosts approximately 2,000 events each year. death, Wickrematunge had written an editorial
Typically, the Aubuchon award committee rec- about his fear of government plots against him; it
ognizes an individual or individuals who typify was published posthumously.
a broader class of journalists who are suffering In 2010, Charles N. Davis, a former journalist
from government prosecution or enduring other and associate professor at the Missouri School of
hardships. In addition, many of the awardees Journalism, received the domestic award. From
have reported from war zones, and some have 2005 to 2010, David ran the National Freedom of
suffered physical injuries or have died while cov- Information Coalition, an organization devoted
ering these conflicts. to promoting open government.
That same year, the NPC chose imprisoned Ira-
Award Recipients nian blogger and human rights activist Kouhyar
In 2007, the domestic award was given to Pete Goudarzi as the recipient of the international
Weitzel, a former editor of the Miami Herald, award. In December 2009, the Iranian govern-
for his work as a press freedom advocate. Weit- ment arrested him for the third time, and sub-
zel worked with several nonprofits, including jected him to harsh interrogations. In the press
the Florida First Amendment Foundation, the release announcing the award, the NPC called
National Freedom of Information Coalition, and attention to the fact that in the aftermath of the
the Coalition of Journalists for Open Govern- disputed 2009 election in Iran, the country held
ment. Also honored that year was Anna Politkovs- more journalists in prison than any other nation.
kaya, a Russian journalist who was assassinated In 2011, Lara Logan, the chief foreign affairs
in 2006. The NPC honored her posthumously correspondent for CBS News and a contribu-
with the international Aubuchon Award, citing tor to 60 Minutes, received the domestic award.
her critical coverage of Russian military opera- Logan was honored for her reporting on the pro-
tions during the war in Chechnya. tests during the 2011 uprising in Egypt. While in
748 Judaism and Social Media

In 2013, the NPC did not award the domes-


tic prize to an individual; for the first time, it
gave the award to a general category of people,
namely “The Whistleblower.” Specifically, the
NPC sought to honor those who have served as
anonymous sources for journalists; as the NPC
press release noted, “without sources, reporters
can’t do their jobs and our democracy can’t prop-
erly function.”
That year, the international award went to
Zeynep Kuray, a Turkish journalist who spent
almost 18 months in prison after writing stories
critical of the Turkish government. In the press
release announcing the award, the NPC noted
that Turkey had now become the country with the
most journalists in prison, surpassing both Iran
and China.

Kelly McHugh
Florida Southern College

See Also: Committee to Protect Journalists; Freedom


of the Press and National Security; National Press
Anthony Shadid at the National Press Club in Washington, Club; News Media; Press Freedom and Online/Social
D.C., on March 1, 2007. Shadid won two Pulitzer Prizes and Media Security.
was posthumously awarded the John Aubuchon Press Freedom
Award after his death in Syria on February 16, 2012. Further Readings
Donnelly, John M. “National Press Club Announces
Press Freedom Award Winners for 2013.” http://
press.org/news-multimedia/news/national-press
Egypt, Logan was sexually assaulted by a mob in -club-announces-press-freedom-award-winners
Cairo, and spoke publicly about her experience. -2013 (Accessed May 2013).
Also honored in 2011 was Al Jazeera’s Doro- National Press Club. http://press.org (Accessed
thy Parvez. The NPC recognized her for her cov- May 2013).
erage of the Arab Spring protests; while reporting
in Syria, she was detained by the Syrian Govern-
ment for 19 days, and shared a jail with many
political prisoners.
In 2012, James Risen, a reporter for the New Judaism and
York Times, won the domestic award. The NPC
honored him for his coverage of national security Social Media
affairs, including his reporting on domestic wire-
tapping by the Bush administration, as well as his Social media have been embraced by most Judaic
stories about U.S. sabotage operations against organizations because they have been heralded as
Iran. For the 2012 international award, the NPC key mechanisms by which Judaism will be passed
honored three journalists who died while cov- on to the next generation. These technological
ering the civil war in Syria. The honorees were advances in communication and their popular-
Anthony Shadid of the New York Times, Marie ity, especially among youth, offer relief to those
Colvin of the Sunday Times of London, and free- who worry about the dwindling number of Judaic
lance photo­journalist Remi Ochlik. devotees with each new generation.
Judaism and Social Media 749

The tremendous power of social media’s vari- offer more representative and thoughtful presen-
ous formats and forums are being harnessed to tations of Judaism. This, though, is true of any
bring Judaism to any who desire it. One no lon- subject matter available through social media.
ger needs to find a Jewish neighborhood or attend Just as the proliferation of Judaic-focused social
religious services to learn about Judaism or to media makes accessing Judaism easier than it has
commune with Jews. Judaic charitable and social ever been before, social media are also likely to
groups were the first and are the most prolific users include inaccurate, superficial, and trivializing
of social media in the Jewish community. They representations of Judaism.
led the way in assimilating the latest communica- Judaism is so prevalent in social media that it is
tion forms into their campaigns for new members represented in all social media genres, and includes
and donors. Now, many rabbis post their sermons active daily participation by thousands of people,
on their temples’ Web sites, and some rabbis use including well-known and relatively unknown
Twitter to send a daily message from the Torah rabbis, life-long orthodox Jews, reformed Jews,
to their Twitter followers, or to direct attention non-Jews, teenagers, and people considering con-
to relevant events happening locally, in Israel, or version to Judaism.
elsewhere in the world. Upon posting their sermons to their local tem-
ple Web sites, well-known rabbis often receive
Participation responses to their sermons from people around
Social media also allow for dynamic and two-way the world. Their messages are available to people
conversations in real time that can involve a wide well beyond local attendees, and those who have
variety of participants from virtually any locale. been a part of a local temple can continue to con-
This is a substantial and pervasive alternative to nect with that group on social media, no matter
the usual top-down communication of Judaic how far away or how many times they may move.
principles and practices. Many Judaic forums Anyone can experience an active and vital Jewish
and bloggers have large followings with religious community, even if one does not live in a Jew-
discussions of all kinds among participants who ish neighborhood because there are thousands of
sometimes vary widely in their degree of devo- large and thriving Jewish communities that can be
tion to Judaism and a Jewish identity. Participants found and exist exclusively online.
may also have great differences in terms of age,
socioeconomic status, and geographical location. Forms
Moreover, a vast array of Judaic discussions can be One of the most popular and active Jewish blogs
found every day and at all times of the day online. is Jewlicious. As quickly as Jewish bloggers make
Although most welcome social media as a posts on this site, dynamic conversations about
crucial mechanism for enhancing contemporary those posts ensue and often include a wide vari-
Judaic participation, a few concerns persist. Some ety of participants. In fact, the founder of this
worry that the focus on popularity in social media blog, David Abitbol, resides in Jerusalem, while
with continual counts of “likes” and “hits” has his colleagues who blog on Jewlicious.com are
and will create Jewish “personalities,” and these scattered about in Canada, Los Angeles, and
personalities may focus on self-promotion and New York.
their personal popularity, to the exclusion or det- Although Facebook is not yet 10 years old,
riment of effective Judaic messages and represen- nearly 1,600 Jewish and Israeli Facebook groups
tations. Indeed, extensive self-focus is problematic and fan pages exist. One fairly representative
because it contradicts the more introspective and example of these groups on Facebook is IMPACT,
community-centered approach reflective of Judaic an organization in Baltimore that creates and
principles. In addition, such personalities may reports volunteer and leadership opportunities
offer or encourage especially provocative and rad- for the local Jewish community and those inter-
ical positions on Judaic issues in order to enhance ested in Jewish communities in and around Balti-
their popularity. In turn, by definition because of more. On its Facebook page, a message board is
their popularity, more people are exposed to their available for people seeking contact with Jews in
messages than the messages of others, who may Baltimore. People may be seeking assistance with
750 Judaism and Social Media

such things as finding a roommate, employment, York City ranked second on the list. Their Twit-
or housing. The page also includes current Judaic- ter account (@IsraelinNewYork) is a live feed of
related events around Baltimore, and discussion the everyday activities at the consulate in New
boards on topics that sometimes lead to signifi- York. Twitter followers can ask questions and
cant opportunities for participants with respect to make comments about activity there in real time,
education, business, and socializing. with dialogues about consulate activity occur-
Even Twitter, which allows only 140 charac- ring at the same time that the activity is happen-
ters per message, offers opportunities to advance ing. This is a new dynamic as Twitter followers
Judaism in meaningful ways. For example, Rabbi of this group have the opportunity to contribute
Moshe Goldberger answers questions about the to and participate in the work of the consulate.
Torah and includes links to Judaic-related news This is citizen participation in government well
stories from around the world in daily tweets beyond what people could have imagined just a
from @GemsofTorah. Others tweet links to ser- few decades ago.
mons of popular rabbis or embed links to Judaic-
related videos. Conclusion
Because social media is already a part of the lives
Influencers of so many young people, creating a substantial
The Judaic presence on social media is so large Judaic presence on social media has been viewed
and well developed that national Judaic organi- as essential and has been successful in increasing
zations offer annual conferences centered exclu- membership and participation in Judaic religious,
sively on the use of social media, and some orga- educational, and social organizations. In addi-
nizations celebrate individuals who have excelled tion, social media has been a tool for enhancing
in their Judaic presence on or contributions to relationships between Judaic groups and fostering
social media. a vibrant Jewish community because of the large
In 2012, the National Jewish Outreach Pro- number and availability of such communities
gram announced its inaugural recipients of the online. It has also changed the nature of Judaic
Jewish Treats: Top Ten Jewish Influencer Awards. education and participation for many who are
Top on this list was Rabbi Yonah Bookstein, the now able to engage in a two-way, active debate
executive director of an organization in Los Ange- and discussion about Judaism, an incredibly pow-
les designed for young Jews to become spiritually erful, dynamic change that is thought to be espe-
connected to something larger than themselves. cially attractive to youth. Social media has been a
He is also a popular blogger for Jew­licious and uniting, educational, and social facilitation force
the Huffington Post. with respect to advancing the principles of and
The second person on this top 10 list was Lisa participation in Judaism.
Colton, who founded Darim Online, a nonprofit
devoted to helping Jewish organizations and lead- Mel Moore
ers maximize their use of social media to achieve University of Northern Colorado
their goals. Goals typically include such things as
community building, education, and fundraising. See Also: Catholic Church and Social Media; Islam
Others on the list tweeted insights about hap- and Social Media; Israeli–Palestinian Conflict; Middle
penings in the larger Jewish community, and one East; Race/Ethnicity; Youth Engagement.
was a recent recipient of the New York Jewish
Week list of “36 Under 36.” Another created the Further Readings
popular Web site “Jew in the City,” designed to Chen, Yoel. God, Jews and the Media: Religion and
create a positive view of orthodox Jews. Israel Media. New York: Routledge Press, 2012.
There are even rankings of the most influ- Colton, Lisa and Miriam Brosseau. Social Media
ential Jewish organizations on Twitter in the Policy Workbook for Jewish Organizations.
United States. The Holocaust Memorial Museum Charlottesville, VA: Darim Online, 2012.
(@Holocaust­Museum) in Washington, D.C., Jewlicious.com. “Jewlicious THE Jewish Blog.”
ranked first and the Israeli Consulate in New http://www.jewlicious.com (Accessed July 2013).
K
Keystroke Logging by pressing a secret key combination on the key-
board. The user who is administering keystroke
The keyboard, which is an important input device logging on the computer can reach the secret and
for computers, smartphones, and tablets, is also encrypted data file holding keystroke logs and
of high importance in terms of privacy. This is view what the other users of the computer typed.
because identity thieves, cybercriminals, hack- For mobile devices, software is first installed
ers, or others can monitor confidential writings, into a device accessed physically. After it is locally
e-mails, chat conversations, and other forms of activated, it starts logging keystrokes, and sends
communication as users strike the keys of the key- the logs to the person administering the keystroke
board. In 2008, 76 percent of identity thefts were logging process, either by e-mail or file transfer
performed by keystroke logging. Keystroke log- protocol (FTP). Later, the keystroke logging pro-
ging involves the secret monitoring of the activi- cess can be activated or deactivated by remotely
ties of a keyboard as its keys are struck, regardless accessing the device using the remote control
of whether it is a hardware keyboard connected panel of the software.
to a laptop or desktop computer, or a virtual key- The second kind of keystroke logger software
board that is part of the software of smartphones is downloaded over the Internet without a user’s
and tablets. knowledge when they open an e-mail attachment
or click a link on a Web site. It runs in the back-
Keystroke Logger Software ground and collects the user’s private informa-
Keystroke logger software are programs that run tion and correspondence as they are typing on the
in the background and secretly record all the text keyboard. Later, it periodically sends the recorded
written by the users of a computer or mobile keystroke history data to the identity thieves by
device. The recorded data can be accessed locally e-mail or FTP.
or remotely according to the keystroke logger The presence of any form of keystroke logger
software type. In general, there are two kinds of software usually cannot be detected, and remains
keystroke logger software. invisible to users unless found by antivirus software.
The first kind of keystroke logger software
is installed into a computer that is physically Keystroke Logger Hardware
accessed. After installation, keystroke logging A keystroke logger, as a hardware device, is com-
can be activated and deactivated by a local user monly attached to one of the USB or PS/2 (for

751
752 Klout Score

older computers) ports of a computer. It is the IKeyMonitor. “Keylogger for iPhone, Keylogger
size of an ordinary USB flash memory device and for iPad, Keylogger for iPod Touch.” http://
resembles a keyboard cable or a keyboard cable ikeymonitor.com (Accessed April 2013).
connector between the keyboard and computer. Keyghost. “What is a Hardware Keylogger?” http://
When a user of the computer to which a keystroke keyghost.com/hardware-keylogger.htm (Accessed
logger device is attached starts to write something, April 2013).
the device secretly saves the key strikes of the key- Kim, David and Michael Solomon. Fundamentals of
board to a text file on its internal memory, which Information Systems Security. Sudbury, MA: Jones
is not accessible from the target computer. Later, & Bartlett Learning, 2011.
the saved data on its memory can be reached by Symantec. “What the Latest Symantec Threat Report
physically removing the keystroke logger device Means to SMBs.” http://www.symantec.com/
from the target computer and installing it onto solutions/article.jsp?aid=20090512_what_the_
another computer. Special software is then used latest_symc_threat_report_means_to_smbs
to access the keystroke logger’s internal memory. (Accessed April 2013).
Keystroke logger devices cannot be detected by
antivirus software because they are physically out
of the computer system, and therefore, they are
inaccessible to the computer’s operating system.
Because keyboard cable connectors are generally Klout Score
located to the back of computers, keystroke log-
ger devices attached between the computer and A Klout score is a single number that represents an
the keyboard may not be seen at first glance by a aggregation of multiple pieces of data used to mea-
user. However, it is possible to detect these devices sure a social media user’s influence across his or
by means of a physical inspection. her preferred social networks. Klout, the company
Keystroke loggers are an important tool of that creates Klout scores, analyzes data from Twit-
cybercriminals, hackers, or identity thieves, but in ter, Facebook, Google+, LinkedIn, Foursquare,
some cases, a parent who wants to track a child’s YouTube, Instagram, Tumblr, Blogger, WordPress,
activities, for example, may also use this kind of Last.fm, and Flickr, and uses the data to craft an
software or hardware device. In order to be pro- individualized, numerical score for each user of
tected from keystroke logging, computer users their service. In creating Klout scores, Klout mea-
should use antivirus software and firewall pre- sures the amount of personal contacts in a net-
ventive strategies and frequently check whether work and the regularity of content creation, and
these are up to date. Second, they should think analyzes the interaction that content receives from
twice before opening e-mails from unknown or other users. Klout provides a score range from one
untrustworthy senders, or clicking unknown to 100, with 100 representing the highest amount
links. Finally, they should check whether there is of possible influence.
an extra device attached between their computer Klout assesses a variety of variables in crafting
and their keyboard connector. its algorithm, but does not publicly share its exact
process of arriving at the Klout score. Responding
Hakan Aydogan to the question of how scores are derived, Klout
Rutgers, The State University of New Jersey says that it sees influence as the ability to drive
people to action, thus making replies and retweets
See Also: Carnivore; Deep Packet Inspection; the most important factors in high Klout scores.
Domestic Surveillance and Social Media; Echelon; Historically, Klout scores have been represented
FinFisher; Firewalling. using three pillars, which Klout has referenced as
true reach, amplification, and network impact.
Further Readings True reach references the number of people
Ciampa, Mark. Security+ Guide to Network Security the social media user influences. Klout filters out
Fundamentals. 4th ed. Independence, KY: Cengage spam and false placeholder accounts to focus on
Learning, 2012. the people who are acting on the shared content.
Klout Score 753

When users post messages and people tend to Your Influential Topics are represented by key-
respond to the information, users tend to have words around which the Klout user’s main social
higher scores. Amplification is how much a social media interactions revolve. The cumulative focus
media user influences other users. When a mes- on Your Moments, Your Influencers, and Your
sage is posted this category, the analysis looks Influential Topics is meant as a tool to increase
at how many people respond to it or further participation in Klout, understand how users can
spread it. If people act upon users’ content, they better utilize social media, and provide ways for
often have a higher amplification score. Network users to increase their Klout scores.
impact references the influence of the people in
the users’ true reach, or how often top influencers Commercial Applications
share and respond to content created by a user. Klout scores and associated Klout influencers
The more highly influential members that share a have become tools for businesses and companies
user’s content, the higher the corresponding net- to seek out Klout users to whom they wish to
work impact score. provide incentives, or Klout perks. Klout perks
involve opportunities for Klout users with spe-
Methodology Changes cific Klout scores to have access to certain expe-
Since Klout launched in September 2009, the riences and products and to receive discounts
company has had many objections raised toward from businesses. Leveraging Klout scores for
the methodology of crafting Klout scores. Specifi- business purposes is increasingly on the rise. The
cally, critics like Alyson Shontell, who writes for automotive company Audi invited top design,
Businesinsider.com, have pointed out that Klout technology, and luxury influencers to test drive
scores are not representative of the influence that the new Audi A8 at exclusive Klout-directed
a person really possesses. Shontell highlighted events, with some Klout perk members receiv-
that Barack Obama, president of the United ing all-expense-paid weekend trips with the car.
States, had a lower influence score than a num- Similarly, Universal Pictures invited top Klout
ber of bloggers. In August 2012, Klout changed entertainment influencers to screen the movie
how it accumulates the data, and now President Adjustment Bureau before it was released in the-
Obama commands a 99 Klout score. Klout has aters. Hewlett Packard offered Klout top film
switched from originally assessing 100 variables influencers HP laptops preloaded with the top
to now looking at more than 400 criteria in evalu- films from the Cinequest film festival.
ating the assigned score. Overall, Klout currently As Klout scores become more widely accepted
assesses more than 12 billion data points per day and utilized by an increasing range of compa-
across the seven social networks to apply score nies such as hotels, call centers, and department
ratings to all social media users. More than 100 stores, the importance of this numerical repre-
million users had Klout scores as of 2012. sentation is bolstered.
Klout’s remaking of the Klout score formula Many companies and customer service orga-
removed the longstanding breakdown of true nizations are integrating Klout scores in their
reach, amplification, and network impact, and service protocols to determine how specific and
created the concept of Your Moments. The detailed their approaches to serving the individ-
Your Moments feature within Klout allows spe- ual customer should be. Klout scores are already
cific engaging social media activities to be high- thought to possibly create shorter call wait times
lighted. Your Moments allows users to view to speak with customer service, nicer hotel rooms,
their own and other users’ social media impact and better deals on clothing, all of which center
and interactions. Klout also introduced a direct around companies wanting to provide powerful
list of Your Influencers. Your Influencers looks Klout score holders, who are thought to have a
at social media users who are leading conversa- more powerful digital presence, a positive experi-
tions in areas where the Klout user specifically ence. The integration of Klout scores with social
interacts. Finally, Klout introduced the concept media services and aggregators such as HootSuite
of Your Influential Topics to provide concise and TweetDeck, which are used by nearly all 100
understanding of main areas of conversation. of the top Fortune 500 companies, have made
754 Klout Score

the experience of utilizing the scores much more Lyon, E. “Differing Approaches to Social Influence”
prominent and easy to conduct on a large scale. (2009). http://sparxoo.com/2009/10/01/differing
Also, as Facebook and Twitter are increasingly -approaches-to-social-influence (Accessed January
used to sign on or into other digital services, the 2013).
ability to track and have access to a digital user’s Olanoff, Drew. “Klout Would Like Potential
complete social media profile, and in turn, his or Employers to Consider Your Score Before Hiring
her Klout score, is easier to manage. You. And That’s Stupid.” TechCrunch (September
29, 2012). http://techcrunch.com/2012/09/29/
Jason Schmitt klout-would-like-potential-employers-to-consider
Green Mountain College -your-score-before-hiring-you-and-thats-stupid
(Accessed January 2013).
See Also: Data Mining; Information Aggregation; Robles, P. “Twitter Isn’t Very Social: Study” (2011).
Social Media Career Wreckers. http://econsultancy.com/uk/blog/7335-twitter-isn-t
-very-social-study (Accessed January 2013).
Further Readings Shontell, Alyson. “The TRUTH About Your Klout
Anger, I. and C. Kittl. “Measuring Influence on Score: How Your Phony Number Is Calculated.”
Twitter.” i-KNOW 2011 Proceedings of the BusinessInsider (December 2, 2011). http://www
11th International Conference on Knowledge .businessinsider.com/the-truth-about-your-klout
Management and Knowledge Technologies, Article -score-the-math-behind-how-your-phony-number
31. New York City: 2011. -is-mesasured-2011-12 (Accessed January 2013).
L
Latin America confirm important democratic deficits in most of
these countries, considering that a media system
Citizenship participation in Latin America is defined by a low level of newspaper circulation
through social media is the result of a long and and a high dependency on the television system.
continuous process of social alienation of com- A continuous private and oligarchic implementa-
munication technologies. This has marked strug- tion of journalistic information remains, and the
gles for the region’s democracy because of a lack government makes use of public media, while
of visible channels of a proper system and some- press reporters experience a limited development
times because of the monopoly of the analog and of professional autonomy. It is within this frame-
digital media mainstream. The dominance of the work that social media reach their projection and
private sector and the integration of audiovisual importance as alternative informative media or
media controlled by the major transnational tele- channels.
communications operators map a media scheme Manuel Castells dates the centrality of these
that is not favorable to the interests of the popula- emergent political communications, typical of
tion and to open channels for a public and repre- the new society network, in 1994, from the Zap-
sentative dialogue. atista Army of National Liberation’s (EZLN’s)
Though in the past decade, the change in the Zapatista uprising in Chiapas, Mexico, to rep-
regional political map has brought about the resent a double split, both symbolic and media-
development of public media and access to certain related; however, two events coincided. On the
rights for citizens, the common pattern is the lack one hand, the North American Free Trade Agree-
of a democratic public sphere and a sufficiently ment (NAFTA) came into force, an antagonist
solid institutional system, eventually weakening critique to the economic and trade integration
the continuous efforts of some states to develop model; on the other hand, the reality of the indig-
and intensify cultural democracy. This is to a large enous population was made visible to the Mexi-
extent the result of the sociopolitical structure of can media space, the former historically excluded
corporatism and underdevelopment that have from the cathodic mirror, despite the revolution-
dragged down the national history of most Latin ary imaginary that inspired the Constitution of
American countries. In this regard, United Nations the United Mexican States in the early 1900s. In
Educational, Scientific and Cultural Organization addition, the war in Chiapas was not actually an
(UNESCO) pluralism and democracy indicators Internet war.

755
756 Latin America

The era of social networks and political bat- involve the process of accelerated modernization
tles in cyberspace took place in the region from that Brazil is going through with the Internet and
that date, as the EZLN later organized the First social networks. On the other hand, initiatives
Intercontinental Encounter for Humanity Against such as the REDISTIC network and the MISTICA
Neoliberalism (1996). It set up for the first time project, as well as the Communication and Citi-
in the public agenda of global movements in the zenship Forum, have highlighted the emergence
region the role of social media and resistance of new processes for access and participation with
levels against capitalistic globalization. From new technologies from a peripheral and alterna-
Seattle until today, the Zapatista effect projects tive approach, aimed at building both a commu-
with the mobilization of Mexican youth’s Yo Soy nity and citizenship.
132. They engage in new practices and ways of Thus, the broad experience accumulated in the
political citizen articulation against authoritarian region from the 1960s in terms of participative
regimes form a new perspective of the McBride communication and local development drive the
spirit and the cultural rights of the Latin Ameri- processes of empowerment in the digital culture
can cultural citizenship, matching the configura- of social media, whether by means of telecenters
tion and nature of the new ecosystem of dispersed or battles for the land of indigenous movements.
information and knowledge networks devised Technological innovations and the resourceful
from the south and from the bottom. Internet as a system of communication for social
From 1994 until today, the new social media change constitute a constant factor throughout
not only have strengthened community integra- the subcontinent today, as several reports com-
tion schemes and mobilization in the subconti- piled by the Latin American Information Agency
nent, they have also widened the forms and extent have proven. In its study “Theory and Practice of
of citizenship participation within the population. Research and Intervention in Social Communities
These interactive networks have contributed to and Organizations,” Eduardo Vizer documents
radically transform methods of sociability, and the proliferation of numerous processes of cre-
have also gradually deepened the institutional ativity and political struggle in cyberspace in the
basis of the centralizing and hierarchical mediation past decade. Likewise, the project The Internet,
model of social representation of companies, such Digital Culture and Hegemonic Culture of the
as Televisa (Mexico) and Globo (Brazil), archetyp- Gino Germani Institute at the University of Bue-
ical models of the hierarchical system of control of nos Aires illustrates how the Internet is today’s
images and public speeches in the region. main venue for struggle for political actors in the
region, proving significant transformations in the
Political Ramifications of Social Media strategies, political intervention, and construction
As a result, from the memory of practices and of new subjectivities to generate collective identi-
experiences of cultural subversion and resistance, ties in the digital era.
social movements and progressive political forces Despite this, however, Latin American coun-
in countries such as Mexico, Chile, and Colombia tries live immersed in the analog era, with audio-
have experienced new social mediation processes visual media communicative structures highly
led by new generations of digital citizens willing concentrated and still determinant, which in prac-
to alienate social networks and challenge the hege- tice can be interpreted as an economy of cultural
monic place of traditional information media. As industries totally dependent on consumerism and
such, the motivation of productive know-how for the conditions defined by the international divi-
the use and alienation of new technologies has sion of cultural labor. Few comparative studies
encouraged in the past years new transformation regarding the information structure in countries
processes of the public sphere that permeate and of the subcontinent show the persistence of an
question the agenda setting of mainstream media. oligopolic, restrictive, and unbalanced structure
For example, civil organizations Brasil Menor and of communication, with little or null margin for
Brasil Vivo link their emancipating willingness political, ideological, and cultural plurality. This
to movements such as Los Indignados in Spain, explains to some extent the destabilizing con-
stating how Occupy Rio or Occupy São Paulo sequences of regulation processes in the region,
Latin America 757

from a media coup d’etat (Venezuela, Grupo Cis- . . . mediatic communication has become
neros), to the pressure and campaign of discredit a really political battlefield where different
(Argentina, Grupo Clarín), to the judicial process actors fight for the construction of hegemonic
and black propaganda against the presidency of directions over the model of the state and
the government (Ecuador, El Universo). The latter democracy. Actually, in recent years and in
illustrates the regulation process that has taken different countries, the open disputes between
over two and a half years, confronting the lobby media companies and national governments
of the private journal industry that dominates the have become one of the most important issues
national market. of political conflict within the context of
The social communication bill, for the first time reformed states.
in the history of Ecuador, puts forward a demo-
cratic model for equal distribution of frequencies The paradox of this situation, therefore, apart
(33 percent for public media, 33 percent for the from reediting what has been experienced with
private sector, and 34 percent for the third sec- the McBride report in most of the Latin American
tor and community media). It has been subject countries, is that above all, the processes of democ-
to criticism from private operators, whose biased ratization remain focused on journal content. This
claims state that the proposal is a raid against free- ignores the cyberculture sphere of autonomy and
dom of expression, with various arguments that citizen empowerment processes on the network,
range from considering community media as pro- while the colonization of virtual space, the cloud,
governmental, to identifying the regulating state by Google, Apple, Microsoft, and the nearly abso-
media council as an a priori censorship court. lute control of the telecommunications networks
They also defend the private rights of the conces- by quasimonopolistic companies takes place, as
sionary companies that will have to renounce a occurs in Mexico with Carlos Slim.
portion of their assets to fulfill the new structure Meanwhile, the network requires both a pro-
of distribution in radio frequencies. The bill, one tagonist role in electoral processes, as in the last
of the most advanced of its type, along with the presidential campaign in Mexico, or in the pro-
Argentinean regulation, will rebalance the voices jection of revolutionary figures such as Hugo
and actors that access the public space, reinforc- Chavez or Rafael Correa. The example of global
ing the production of local content (40 percent of projection of the Chilean students’ movement in
the production must be national, and 10 percent media and platforms such as @Movilized2011
independent) and suppressing private monopolies show the practices and importance attributed to
common in some parts of the country. Because of new political actors in the region. An example
the paradoxical situation of mediation within the in this regard is the process experienced by the
sector, the initiative has even become the axis of indigenous movement.
the struggle for law and hegemony during past
legislature, in an environment full of national Cultural Diversity
political confrontation. Latin American culture is made up of a symbio-
Traditional journalism is at a crossroads in sis and diverse colonization processes, migrations,
most Latin American countries. The fact that pro- and mestizo races that determine a conflictive, but
gressive governments took office in certain coun- liberatory political framework of cultural diversity
tries in the region in the early years of the 21st in media. In communication intervention prac-
century steps out of the box in terms of configur- tices, the wealth and contributions, both material
ing the relation of forces. In this process, private and symbolic, of this common history nourish dif-
communication media, already distant from the ferent cultures and identities. These are also origi-
mere role of a controller of democratic institu- nal because they open the door to communication
tions, strongly embraced their political perfor- channels with other civilizations, and are poten-
mance, using highly propagandistic and corpora- tially autonomous in their capability of projecting
tivist speeches, and were eager to take the political new content and codes of representation, and of
word from various national governments. Thus, politicizing access to the world of minorities, such
according to Orlando, as indigenous peoples. The original syncretism
758 Latin America

that has imprinted the local histories of the sub- ways of change and organization of the sym-
continent and that is the result of diverse mobili- bolic capital in cyberspace. Hence, in the era of
ties and long historic changes thus evidences an creative economy, the value of diversity has been
insufficiently explored potential in the public built on condition of an expansion and contem-
policy agenda. This includes understanding the porary economic development, on the foundation
confluence and crossroads of pre-Columbian and to generate immaterial and intangible values for
migrant cultures, the production of multiple medi- the sustainability of native cultural economies
ations and creative hybridizations in the rise of a and ecosystems. Despite progress on the regula-
possibly different modernity that is sensitive to tion of the informative system and the right of
this rich diversity, even more important in the era access of indigenous minorities, the political and
of proliferating crowds that continue to emerge regional public agenda marginalizes the role of a
with the use of digital networks. public stakeholder of the native peoples when dis-
The difference would constitute a social capi- cussing modernization processes in the Internet
tal of indispensable reference in the creation of galaxy. In some cases, this situation, as in Colom-
a constitutional power and the possibilities of bia, Chile, or Mexico, is unsustainable, but new
regional development when articulating new spaces and changing times have been envisioned

Indigenous children from Isla del Sol in Lake Titicaca in Bolivia in 2005. Indigenous people have the potential to affect the ways in
which Latin American cultures use social media. The average consumption of social networks in Latin America, at 7.5 hours a month,
is already higher than that of North America (with nearly six hours per month), and the European Union (at seven hours per month).
Latin America 759

in the past two decades, which continue inspiring Envisioning a new framework of displacement
the need to rethink contemporary ways of politi- and discursive and representational transitions
cal communication. assumes the emergence of a new political cul-
From Chiapas to Temuco, from the Pampas to ture that evidences the process of constitution of
the Amazon, from the Intercontinental Encounter a new subjectivity, of a new citizenship open to
Against Neoliberalism to the Second Continental dialogue and debate, to the collective discussion
Summit of Indigenous Communication of Oax- and decision with more capabilities of autonomy
aca in Abya Yala (2013), the indigenous peoples’ and empowerment. New generations, and in part
movement of struggle has gained strength and women and minority groups, tend to develop
articulating power in its fight for the land and new ways of articulation and public projection
culture. The example of the Mapuche people as stakeholders in Latin America. Therefore, the
in Chile is illustrative in this process of cultural digital revolution aims at a new logic of interac-
challenge and resistance that today contributes tion that correspondingly demands new policies
to legal recognition in the informative system in in everyday life. School and family are impor-
most of the Latin American countries of social tant, and there are still unsolved problems usu-
media managed by citizen organizations. Because ally ignored by experts when talking about the
of its historic weight and importance in the public socialization of new technologies and their social
function of regional communication, these com- appropriation. These include the inexistence of
munitarian channels constitute a relevant political public policies adapted to emergent ways of orga-
stakeholder in the new landscape of transforma- nization to then continue to new ways of repre-
tion of the political and communication system in sentation and assemblage of domestic culture, and
Latin America. It links audiences with the public other circuits of social representation and produc-
sector, fueling the innovation and development tion, despite the propaganda of projects such as
cycle, and giving support to supranational proj- the Digital Agenda (Chile), Edusat (Mexico), or
ects, as is the case of Telesur. Online Government (Colombia).
This virtuous circle begins to be projected in Moreover, the Association for the Progress of
policies such as the Culture Spots Program in Communication has supported projects such as
Brazil that opens new logics of empowerment COMUNICA to implement social networks seen
and citizen participation on a local basis. One of as citizen convergence platforms with a view to
the advantages of Latin American countries in influence public policies in countries like Ecuador,
their alienation of information and communica- Peru, or Uruguay. In order to do so, the demand
tion technology is the population pyramid. The of new politics in communication stresses the
average consumption of social networks in the need of new governance in terms of the Internet in
region surpasses that of Africa, the Middle East, the region. Since democratic progress in the digi-
Europe, and North America. Therefore, while in tal culture is facing the private boundaries, block-
Latin America average consumption is 7.5 hours ades, and alienation of a cultural policy limited by
a month, in North America it is nearly 6 hours, the transnational interest to manage intellectual
and 7 hours in the European Union. In the era of property rights.
TV screens, Latin American youngsters, as shown
by studies on migration, develop creative ways Conclusion
to alienate digital culture. In spite of the persis- If the problem of communication and culture is
tence of important generational gaps that affect fighting for the code, the alienation of the imma-
schools, governmental institutions, and/or family terial for the common cultural heritage that is
life, phenomena such as the Yo Soy 132 move- also subject to intense exchange, the recognition
ment or the March of the Penguins (Chile) lead of self-examination and of the diverse forms of
to the emergence of new modes of consumption self-production (the favelas, the informal tertiary
and representation that should be considered in sector, of the freedom to circulate online, claimed
the analysis and understanding of the political by new political actors in the region), it may guar-
transformations that countries such as Mexico antee a public sphere that recognizes the produc-
and Chile experience. tive dimensions of citizens and collective interests
760 Legacy Media/Old Media

in front of the traditional model of accumulation media a “fourth estate,” with stature equivalent
and alienation of cultural assets. Beyond the state in the social order to the “three estates of the
and the market, not questioning the patent sys- realm”: clergy, nobility, and common people.
tem and intellectual property rights is detrimen- In the United States, the founding fathers
tal to the possibility of a social contract neces- believed that the power of the press was so essen-
sary to exercise cultural rights in the region. Most tial a guarantee in fostering a democratic society
Latin American countries have not devised politi- and helping citizens to curtail abuses from the
cal alternatives in their strategies of positioning; powerful that they added the right to a free and
instead, they have fulfilled the demands of the open press in the Bill of Rights in the First Amend-
WTO and Anglo-American standards of trade ment of the U.S. Constitution in 1791. Thomas
exploitation in the digital network sector, even Jefferson said,
though they are against their interests.
Our first object should therefore be, to leave
Francisco Sierra Caballero open to him all the avenues of truth. The most
Tommaso Gravante effectual hitherto found, is freedom of the
University of Seville press. It is therefore, the first shut up by those
who fear the investigation of their actions.
See Also: Activists and Activism, Digital; Digital
Revolution; Polarization, Political; Political Economy. Today, the media are considered informally
as a fourth branch of society with the president,
Further Readings Congress, and courts, whose history has been
Alfaro, Rosa María. Innovaciones en comunicación intertwined with politics since the founding of
y desarrollo. Otra brújula. Lima, Peru: Calandra, the United States. In the 19th century, pamphlets
2006. and newspapers were often raw, partisan politi-
César, Bolaño, Guillermo Mastrini, and Francisco cal tools supported by the wealthy, literate elite
Sierra. Political Economy, Communication and who took out subscriptions and made donations
Knowledge: A Latin American Perspective. New to support like-minded publishers. Historians cite
York: Hampton Press, 2012. Thomas Jefferson’s successful presidential run in
“Ciudadanía y ciberdemocracia. Experiencias 1800 as the first modern political campaign. He
y políticas públicas en Iberoamérica.” Revista personally underwrote several newspapers during
Diálogos de la Comunicación. http://www his race against John Adams. The news reports
.dialogosfelafacs.net/secciones/86 (Accessed were as rough and tumble as any modern cam-
March 2013). paign, with issues of race, religion, and sexual
Lago, Silvia, ed. Ciberespacio y resistencias. indiscretion, along with political issues of the day.
Exploración en la cultura digital. Buenos Aires, The 19th-century inventions of the high-speed
Argentina: Hekht, 2012. press, typewriter, linotype, photography, pho-
Orlando, Rocío. Medios privados y nuevos gobiernos toengraving, and telegraph helped improve the
en Ecuador y Argentina. Quito, Ecuador: presentation and delivery of newspapers and pro-
FLACSO, 2012. pelled them into a modern mass medium. An out-
growth of this innovation was the penny press,
cheap newspapers, filled with populist, sensational
fare that drew a large working-class audience.
Advances in printing presses and improvements in
Legacy Media/ photoengraving and photography allowed news-
papers to easily incorporate visuals, which also
Old Media helped spur the evolution of the advertising indus-
try and the craft of photojournalism. The invention
Edmund Burke, an 18th-century British parlia- of the telegraph led to a cooperative of newspapers
mentarian, is cited as the first to acknowledge to share reporting resources and the development
the power of the press when he deemed the news of the Associated Press.
Legacy Media/Old Media 761

Rise of Mass Media newspapers began to experiment with innova-


Legacy, or old media, are defined as newspapers, tive interactive communications technology, such
radio, television, magazines, and books. Some as videotext and the use of modems to transmit
would also include movie and music studios, as information. The rise of America Online (AOL)
well as the advertising industry. The daily newspa- in 1989 heralded the influence of the Internet
per began to face competition when radio became and the pressures that would disrupt traditional
popular in the 1920s, and television in the 1950s. media. As one of the first Internet service provid-
The spread of radio coincided with the political ers (ISP), AOL grew from 200,000 to 6 million
fortunes of President Franklin Delano Roosevelt subscribers from 1992 to 1996. At its height, the
in the 1930s, who used it as his bully pulpit to service had 30 million subscribers. In 2000, it
rally a nation battered by the Great Depression. acquired old-media titan Time Warner in a disas-
The four-term president used the new technology trous merger that precipitated the decline of the
to conduct nearly 1,000 fireside chats. Roosevelt’s fourth estate.
relationship with the press was so close that, even Amid this climate, the traditional role of the
though many news editors were aware of his journalist became marginalized by the prolifera-
physical limitations and health problems, they tion of “pseudo-journalism,” according to John
never reported on his infirmities. S. Carroll, a former editor of the Los Angeles
By the 1950s, television was becoming the most Times. Carroll called the spread of faux journal-
popular medium for news and information. This ism a troubling development because people who
led to increased competition for the advertising resembled journalists were manipulating, rather
business. Because newspaper publishing and distri- than informing the audience. Politicians have
bution were expensive, and paid subscriptions did taken advantage of this new era to bypass what
little to cover the costs of publishing, not only were former President George W. Bush once called “the
newspapers competing against television for audi- filter.” In addition, financial and other pressures
ence, but they were also competing for advertising at some news organizations resulted in ethical and
when some advertisers realized that television was professional lapses—plagiarism and falsehoods in
more effective in delivering their messages. At the reporting—that heaped scorn on the profession,
same time, television became the primary medium sapping its credibility and creating a more cynical
for political ads. By 1960, nearly 90 percent of U.S. readership.
households had televisions, which allowed then Subsequently, people have become more skepti-
presidential candidate John F. Kennedy to use tele- cal about what is reported in the news. In fact, the
vision to politically devastating effect against his Pew Research Center for the People and the Press
rival Richard Nixon in a series of widely watched, said that only about one-third of people say they
televised debates. Kennedy was also helped by a believe what is reported by the 14 largest news
multimillion-dollar advertising campaign that tai- organizations. The perception does not bode well
lored his ads for a television audience. for traditional media as more people are willing
The rise in television presaged the newspaper to go elsewhere for news deemed more reliable,
circulation declines in the 1970s, while changes even it means that they must create it themselves
in monopoly law led to a greater concentration through blogs and social media.
of ownership in both print and broadcast media Blogging, first introduced in the late 1990s, was
outlets. In 1972, the laissez-faire relationship a tool for personal journaling. Now, the availabil-
between presidents and the press came to a dra- ity of easy-to-use blogging software has meant
matic end when the Washington Post covered a that bloggers are covering their communities and
break-in at the Democratic National Committee fact-checking professional journalists.
headquarters in the Watergate Hotel, which led to The Internet began to play a bigger role in
the resignation of President Richard Nixon. political campaigns. For example, Democratic
Senator Diane Feinstein of California was cred-
New Media ited with launching the first campaign Web site in
By the late 1980s, all media began undergoing 1994. John McCain was among the first to use the
changes as a result of the rise of the Internet. Some Internet to raise money in online donations. By
762 Legacy Media/Old Media

the 21st century, technology has made publishers full-time reporter who covers Capitol Hill. Despite
of anyone with a computer. By 2002, more vot- the perceived decline of legacy media, a 2011 Uni-
ers turned to the Internet to find political infor- versity of South Carolina Annenberg/Los Angeles
mation. In 2004, social networking sites began Times poll on politics and the press found that
launching, and political campaigns began to rec- most voters still turn to traditional sources—tele-
ognize the growing clout of bloggers. For the first vision news and newspapers—for information.
time, many were issued credentials to cover the Also, traditional media remains more trusted
Democratic and Republican conventions. than blogs, late-night comedy shows, and social
The 2004 presidential bid of former Vermont media networks.
Governor Howard Dean set the stage for the
strategies adopted by Senator Barack Obama in Ingrid Sturgis
his presidential run in 2008. Dean encouraged Howard University
bloggers to generate voter interest, as well as to
recruit and to motivate volunteers. Despite a lack See Also: Blogosphere; Blogs; Campaign Strategy;
of sufficient funding, Dean’s strategy of Internet- Campaigns, Presidential 2008; Campaigns, 2012;
based fundraising and grassroots organizing revo- Citizen Journalism; News Media; Social Media
lutionized the political campaign. Optimization.
By 2008, the number of people getting their
news and information from social media more Further Readings
than doubled, according to a Pew study. More Dutton, W. H. “The Fifth Estate: Democratic Social
politicians began incorporating the use of social Accountability Through the Emerging Network
media tools like Facebook, Twitter, YouTube of Networks.” Social Science Research Networks
channels, and blogs to connect with their con- (2008). http://ssrn.com/abstract=1167502
stituents and to challenge opponents. Financial (Accessed January 2013).
pressures began to weaken not just print news Jefferson, T. The Writings of Thomas Jefferson, vol.
organizations, but also the broadcast-centered 2. Washington, DC: Thomas Jefferson Memorial
model of political communication. Following Association of the United States, 1904.
Dean’s example, Barack Obama, a former com- Laracey, M. “The Presidential Newspaper as an
munity organizer, bypassed traditional press Engine of Early American Political Development:
to develop a database with millions of names, The Case of Thomas Jefferson and the Election of
e-mail addresses, and phone numbers of peo- 1800.” Rhetoric & Public Affairs, v.11/1 (2008).
ple who could instantaneously be reached and Lineberry, R. L., G. C. Edwards, and M. P.
engaged. At the time, Obama had nearly 2.4 mil- Wattenberg. Government in America: People,
lion supporters on Facebook. His rival, Senator Politics, and Policy. Boston: Little, Brown, 1986.
John McCain, had 620,000. On Twitter, Obama Pear, Robert. “Buying of News by Bush’s Aides
had about 112,000 followers to McCain’s 4,600. Is Ruled Illegal.” New York Times (October 1,
On YouTube, there were more than 18 million 2005). http://www.nytimes.com/2005/10/01/
channel views for Obama, compared to 2 mil- politics/01educ.html?pagewanted=all (Accessed
lion channel views for McCain, according Pew. May 2013).
In 2012, Obama’s database and a strong get- Rainey, J. “Voters Still Tuned in to Traditional News
out-the-vote campaign led many in the press to Media, Poll Finds.” Los Angeles Times (August
underestimate the strength of his support against 24, 2011). http://articles.latimes.com/2012/aug/24/
Republican challenger Mitt Romney. nation/la-na-media-poll-20120824 (Accessed
However, some scholars say the retreat of leg- January 2013).
acy media has had a detrimental impact on the “Times Editor Carroll on Pseudo-Journalism.” Los
democratic process. In the recent past, newspa- Angeles Times (May 18, 2004). http://articles
pers would reprint the entire text of important .latimes.com/2004/may/18/opinion/le-carroll18.1
political speeches. Today, the New York Times (Accessed January 2013).
is one of the last newspapers to do so. Declining Usher, Nikki. “Professional Journalists—Hands Off!
news coverage has resulted in 25 states having no Citizen Journalism as Civic Responsibility.” In Will
Lesbian, Gay, Bisexual, and Transgender Rights 763

The Last Reporter Please Turn Out the Lights?:


The Collapse of Journalism and What Can Be
Done to Fix It, Robert McChesney and Victor
Pickard, eds. New York: The New Press, 2011.

Lesbian, Gay,
Bisexual, and
Transgender Rights
Social media can best be defined as forms of elec-
tronic communication such as social networking
and microblogging Web sites that are used to
create online communities that share informa-
tion, videos, and personal messages, and have
become increasingly influential for a worldwide
audience.
Some of the most influential and best utilized
include Facebook, Twitter, YouTube, Myspace,
Skype, LinkedIn, and Tumblr. More than 50
percent of people learn about breaking news via
social media versus traditional news venues. This
growing forum for information, play, and politi-
cal advocacy yields a powerful source of influ-
ence, with significant relevance to lesbian, gay, College students brought together by the Soulforce Foundation
bisexual, and transgender (LGBT) issues. protest the “Don’t Ask, Don’t Tell” policy by holding a sit-in
LGBT rights are a source of controversy among outside of the U.S. Armed Forces recruiting office in Times
those who are personally included within this Square in New York City, September 2006.
group, are supportive of LGBT people, or are
against anything beyond traditional gender roles
and sexual orientation. Social media allows any-
one to support or denounce anything, simply by Alliance Against Defamation (GLAAD) pre-
posting, reposting, or commenting using venues sented Facebook with a Special Recognition
like Facebook. This is the primary news source for Award related to bullying prevention and LGBT
many about issues related to federal, state, local, inclusiveness. Twitter, an online social network-
international, religious, psychological, medical, ing and microblogging site, allows individuals
spiritual, and natural disaster news and resulting to send messages to followers in 140-character
policies of social acceptance or rejection. tweets. Twitter supports self-expression and
Facebook now counts over 800 million active does not censor its members. This means that
users (11.5 percent of the global population). It the variety of LGBT feeds (accounts) and tweets
tracked 71.7 million U.S. Election Day–related (messages) can range from the most support-
comments in 2012. Facebook has a safety page, ive to the polar opposite about any issue, each
which went purple on Safety Day, October 12, side potentially misinforming or enlightening
2012, when millions wore purple to speak out followers. Twitter is often the first social media
against bullying in support of LGBT youth. This source to broadcast immediate news, such as
Facebook initiative is “liked” by 907,273 mem- the U.S. Supreme Court’s decision, on Decem-
bers. On June 3, 2012, the Gay and Lesbian ber 5, 2012, to rule on two gay marriage cases.
764 Lesbian, Gay, Bisexual, and Transgender Rights

Lightening-swift Twitter communication spreads news sources. While this Facebook status change
across the Twitterverse. pleases members, it also added political weight to
LGBT youth, vulnerable to social and family important issues in a changing political and social
pressures, can become overwhelmed, resulting in realm. LGBT consulting organizations involved
self-harm, attempted suicide, or death. A Social in these changes included: HRC; the Gay, Les-
Outlet provides LGBT youth with connections bian, and Straight Education Network; and the
to virtually every social media type, offering vali- Gay and Lesbian Alliance Against Defamation.
dation and linkages between isolated and at-risk Facebook’s participation in the expansion of one’s
young people who feel no reason to live, giving ability to define relationship status was on the
assurance of their value and supportive social side of expanding gay rights.
resources. An increasing number of organiza- Christina Sirabella notes the impact of increased
tions are using social relationships on Facebook issue exposure via social media. The more a social
to involve increasing numbers of members who issue is discussed, the more awareness individuals
support social issues to engage others to fundraise have regarding relevance within an evolving soci-
and vote. ety. Such opportunities provide individuals with
Global Voices provides a forum for interna- private and unique forums through which they
tional bloggers and includes an English-language can explore different opinions. Social media pro-
resource regarding gay rights. Postings promote vide mechanisms for the support and effective-
awareness of LGBT issues across the globe. ness of LGBT organizations, including HRC, the
Amicus, Latin for “friend,” assists organizations NOH8 Campaign, and the Trevor Project. Sira-
in expanding its member base using the Amicus bella provides examples from YouTube that allow
link to have supporters invite friends to learn individuals to be themselves, at whatever stage
about and act on behalf of causes. Friends and in their self-identity/disclosure process, including
family are more likely to respond to personal, ver- supportive forums for allies to share messages on
sus random e-mailings or advertisements. Various the It Gets Better Project. Facebook and Emoji
LGBT organizations, including the Human Rights have created icons for same-sex couples.
Campaign (HRC), have used Amicus with great Federal law provides 1,138 rights and protec-
success. The Bilerico Project is the Internet’s larg- tions based on marital status. These rights are not
est lesbian, gay, bisexual, transgender, queer, and available to couples in same-sex marriages. The
gender queer blog site, with a host of carefully HRC is using social media to make this infor-
selected bloggers who are leaders and experts mation known. Some key rights denied married
providing unique perspectives, news, and/or per- same-sex spouses include Social Security recog-
sonal commentaries. nition, family eligibility survivor benefits, inheri-
tance taxes, as well as taxes on employer-provided
Social Media Evolution and LGBT Rights health benefits. The idea behind these campaigns
Delia Lloyd highlighted important social changes is to eliminate the perpetuation of different classes
regarding relationship status on Facebook, of social rights, which is contradictory to the U.S.
already creative beyond the scope of traditional Constitution and human rights according to the
U.S. census categories, with the inclusion of “In a United Nations’ bylaws.
Relationship” and “It’s Complicated.” “In a Civil
Union” and “In a Domestic Partnership” were Social Media Advocacy
added in 2012. Such changes allow couples, in Social media has provided an almost instantaneous
particular homosexual unions, to be represented venue for any type of social movement and mes-
with specificity in ways not previously available sage. Consider the Chick-fil-A backlash when the
on this or any other social forum, as far-reach- company president offered his support of families
ing geographically and by membership scope. as those defined by the Bible. Offended custom-
These Facebook postings allow friends to identify ers and observers took to Twitter, Facebook, and
LGBT connections with relevant news about legal YouTube to encourage social awareness, pressure
challenges and limited rights reserved for het- for change, and a boycott of the fast food chain.
erosexual married couples via postings or other North Carolina endured a media blitz before,
Lesbian, Gay, Bisexual, and Transgender Rights 765

during, and following the May 2012 passage of (“we must kill all gays”), following months of
Amendment One (a gay marriage ban). All Out conservative opposition. Printemps Français
is an international LGBT rights movement that (French Spring) has a Facebook group supporting
utilizes many social media tools. This group, led anti-gay marriage demonstrations. Blogs, news
by brave individuals risking their lives in differ- sources, and other social media provide updates
ent countries, has mobilized many through social about Printemps Français, which is also linked
media to create social awareness to protect LGBT with fascist and other splinter groups.
communities from government-sanctioned vio- On May 17, 2013, thousands of anti-gay activ-
lence, and even death. Since establishing itself one ists in Georgia attacked peaceful participants of
and a half years ago, All Out has organized efforts an International Day Against Homophobia and
in 50 countries. Friendfactor.org is an organiza- Transphobia. The disruption was led by clerics,
tion for family and friends of gay individuals who and 30 people were injured. As a result, an anti-
can provide support in a method similar to the gay game went viral on Facebook. The goal of
“like” function of Facebook. Friendfactor.org is Call of Taburetka is to maneuver a priest to wield
considered a contributor to the success of legal- a stool against LGBT activists, as happened on
izing gay marriage in New York State. Anyone that day. As of May 29, 2013, the game received
can start a page, gay or straight, to engage friends 26 Facebook “likes” and many critical comments.
to support issues important to them. If someone
receives a personal request, Friendfactor offers an Social Change
easy mechanism to provide the state legislator’s California’s 2008 Proposition 8, anti-gay mar-
contact information, as well as a recommended riage amendment, would have been minimally
script regarding the specific issue. known beyond state borders, absent the social
media frenzy that brought much attention. It
Opponents of LGBT Rights was supported by a state vote, amending Califor-
While social media has been used to advance the nia’s Constitution by defining marriage as only
rights of the LGBT community, many opponents between a man and a woman. The amendment
similarly advance their agendas. Westboro Baptist was in response to the California Supreme Court’s
Church (WBC), via its Web site and Twitter, pro- early ruling that same-sex couples have a consti-
motes its anti-gay agenda. Among other protest tutional right to marry. During this window of
issues, WBC has demonstrated at the funerals of on-again/off-again permissions, some same-sex
gays, churches that perform same sex marriages, couples married, and these marriages were left
and many other LGBT events. Dave Agema, standing, even after the passage of Proposition 8.
Michigan’s Republican National committeeman, The power of this representative case, in one of
posted a copy of an online article on his Facebook the most progressive U.S. states, led to the 2010
page: “Everyone Should Know These Statistics on U.S. District Court’s ruling to overturn Proposi-
Homosexuals.” A strong social media showing by tion 8 based on the lack of due process and equal
Michigan Republicans condemned the outdated protection under the U.S. Constitution.
1970s statistics that suggested that gays and les- The Ninth Circuit Court of Appeals supported
bians are dangerous. Republicans throughout the this decision upon appeal; the case is now up for
state, while reiterating their support of traditional consideration by the U.S. Supreme Court. If the
marriage, found that the article promoted hate U.S. Supreme Court takes on the case, it will face
and discrimination, which was not a party value. the scrutiny of public opinion and awareness of
Agema was encouraged to resign, while others in the changing climate in a more accepting society
his party worked to distance themselves from him that elected President Barack Obama for a sec-
and his positions. ond term, whose platform included support of
France legalized gay marriage on April 23, 2013; gay marriage. Social media outlets will provide
the move, while celebrated by many also met with much food for thought to the higher Court and
homophobic backlash. By that evening, Twitter others regarding the balance between interpreta-
was used to protest with hashtags #MortAuxGay tion of the U.S. Constitution and the values of a
(“death to gays”) and #ilfauttuerleshomosexuels living and breathing society that voted to permit
766 Liberation Technology

gay marriage in three additional states during this Politics Daily. http://www.politicsdaily.com/
same election cycle. 2011/02/18/facebook-gay-rights-and-the-new-pol
All Out campaigns included mobilizing 20,000 itics-of-social-media (Accessed December 2012).
in several hours in Sofia, Bulgaria, in 2012, to Rosenberg, T. “On Gay Rights, Moving Real-Life
counter a church-sanctioned call to stone gay pride Friends to Action.” New York Times (July 7, 2011).
parade celebrants. In Uganda, 500,000 online sig- Scolla, Nancy. “The Social-Network Effect That
natures contributed to enormous global pressure Is Helping Legalize Gay Marriage.” Atlantic
to stall a national bill to “Kill the Gays.” A ram- (November 30, 2012).
pant online campaign to gather 250,000 signa- Sirabella, Christina. “Social Media and the LGBT
tures stopped a “gay gag rule” in St. Petersberg. Rights Movement.” What’s the Buzz? http://
The Fédération Internationale de Football Associ- thebuzzbuilders.tumblr.com/post/28129000448/
ation (FIFA), the governing body of international social-media-and-the-lgbt-rights-movement
soccer, opened an investigation into the Nigerian (Accessed December 2012).
Football Federation’s commitment to kick out any
suspected lesbians from the national team. All Out
exceeded its 40,000 online petition signature goal
by nearly 10,000. In Iraq, All Out collaborated
with the Iraqi Refugee Assistance Program via Liberation Technology
online petition and fundraising efforts to smuggle
to safety young gay women and “emo” men who Lying at the intersection of social science, computer
were experiencing brutality, and often death. science, and engineering, the Program on Libera-
Social media addresses political issues affect- tion Technology at Stanford University examines
ing people; it helps instantly identify the will of how information and communication technologies
the masses through online petitions, fundraising, (ICTs)—including mobile phones, text messag-
mass demonstrations, and protests, determining ing or short message service (SMS), the Internet,
who will get the lion’s share regarding rights or blogging, global positioning systems (GPSs), and
benefits, and who will live or die. LGBT lives have other forms of digital technology—are used to
been saved in Iraq, and celebrants have been saved promote freedom and democracy, defend human
in Bulgaria from church-condoned stoning at a rights, improve governance, foster development,
parade. Legislation is monitored by an increasingly and pursue a variety of other social goods. The
informed and demanding public regarding LGBT program is hosted by the Center on Democracy,
civil rights as social rights. Those who feel aban- Development, and the Rule of Law at the Freeman
doned or isolated, like LGBT youth, can reach out Spogli Institute, in collaboration with the Program
to someone like themselves, or an ally who can on Global Justice, the Hasso Plattner Institute of
offer a supportive hand, via a social media site. Design (d.school), Stanford Institute for Innova-
These are some reasons why social media and their tion in Developing Economies (SEED), and indi-
effects on the politics of LGBTs are so vital. viduals from a variety of schools and academic
departments at Stanford.
Kim Lorber The Program on Liberation Technology at
Ramapo College of New Jersey Stanford University is motivated by the explo-
Adele Weiner sive growth in ICT usage to nurture grassroots
Metropolitan College of New York activism, fight corruption, deter electoral fraud,
expose government wrongdoing, empower the
See Also: Activists and Activism, Digital; Economic poor, protect the environment, educate consum-
and Social Justice; Hate Speech, Online and Social ers, and improve public health, among others. The
Media; Human Rights; Identity Politics. program examines the technical, legal, political,
and social obstacles to the wider and more effec-
Further Readings tive use of liberation technologies, and how these
Lloyd, Delia. “Facebook, Gay Rights, and the New obstacles can be overcome. It also tries to evalu-
Politics of Social Media” (February 18, 2011). ate (through experimental and other empirical
Libya 767

methods) which technologies and applications Further Readings


are having the greatest success, how those suc- Cohen, Joshua. “Mobile for Development—
cesses can be replicated, and how less-successful Global Justice.” http://www2.lse.ac.uk/
technologies and applications can be improved to newsAndMedia/videoAndAudio/channels/
deliver real economic, social, and political benefit. publicLecturesAndEvents/player.aspx?id=1479
There are two key dimensions to the program: (Accessed November 2012).
creating a nurturing space for projects with a prac- Cohen, Joshua. “Mobile for Development Meets
tical relevance, and creating a space for scholarship Human-Centred Design.” http://www2.lse.ac
and learning. Faculty, staff, and students lead the .uk/newsAndMedia/videoAndAudio/channels/
research projects. Currently, the program is initiat- publicLecturesAndEvents/player.aspx?id=1476
ing in-house research on using basic mobile phones (Accessed November 2012).
to monitor governments and combat corruption Companys, Yosem. “The Emergence of Netroots
and an incubation space for technology-based Activism via Clark Draft Organizing.” Doctoral
activist projects from around the globe. A d.school Dissertation, Stanford University, Stanford,
course on Designing Liberation Technologies has CA, 2013.
led to the development of Stanford student-initi- Diamond, Larry and Marc F. Plattner. Liberation
ated projects, where students work closely with Technology: Social Media and the Struggle for
Kenyan nongovernmental organizations to design Democracy. Baltimore, MD: Johns Hopkins
mobile phone applications for real-life issues such University Press, 2012.
as finding clean water, safety, and health education. Jeon, Sangick, et al. “Mobile Water Project: Mobile-
Partner organizations have adopted the projects, for-Development Meets Human-Centered Design.”
with some receiving seed money from collaborat- In Arguing About Justice: Essays for Philippe Van
ing Stanford schools and departments. Parijs. Louvain-la-Neuve, Axel Gosseries and
As a learning space, the program runs research Yannick Vanderborght, eds. Leuven, Belgium:
seminars where leading scholars and practitioners Presses Universitaires de Louvain, 2011.
of liberation technologies report on what they
are learning and doing. These seminars result in
reports, working papers, and academic publica-
tions that inform the program’s community of
affiliated scholars about the latest developments Libya
in the field. The program also hosts postdoctoral
fellows, who enrich the program’s research and The history of Libya parallels that of other previ-
design activities with their cutting-edge work. Each ously colonized nations. The country now suffers
year, the program brings one fellow with a special- from economic, class, gender, religious, and eth-
ization in law or social science, and another spe- nic inequalities. Libya gained independence from
cialized in computer science or some other area of Italy in 1951, becoming the United Kingdom of
engineering. The program supports undergraduate Libya, a constitutional and hereditary monarchy.
research and conferences, student-initiated courses, After the discovery of oil reserves and growing
and small-scale student conferences exploring the income from petroleum sales, Libya became a
use and development of liberation technology. wealthy nation. However, discontent arose with
the concentration of the country’s wealth and
Joshua Cohen power in the hands of a few.
Yosem Companys In September 1969, a group of military officers
Larry Diamond led by Muammar Qadhafi launched the Libyan
Jeremy Weinstein Revolution and deposed King Idris. The constitu-
Terry Winograd tion was abolished and policies were outlined in
Stanford University the Green Book, a proposal of Qadhafi to improve
and develop the country. Keeping Libya debt
See Also: Berkman Center; Center for Civic Media; free, the government increased per-capita income
Center for Innovative Media; MIT Media Lab. and improved the ranking of the country in the
768 Libya

Human Development Index for Africa. However, the Internet as a political platform and as a tool to
beginning in the 1970s, most oil profits were mobilize people for change.
spent on arms and supporting terrorist groups. The use of platforms such as Facebook and
Without any democratic elections, in 1977, Libya Twitter highlighted the shift from social tools to
became the Great Socialist People’s Libyan Arab political tools, not only in the Arab world, but
Jamahiriya, and Qadhafi gained unlimited power. also in the larger Arab diaspora. Through social
In 1986, there was a failed assassination attempt media, diasporas have been instrumental to
against Qadhafi, and shortly thereafter, Libya was change. However, broadcast media have not been
sanctioned by the United Nations (UN). redundant in the revolutionary processes. The
The “Permanent Revolution” of Qadhafi has roles of the Al Jazeera and Al Arabiya television
been characterized by its brutality and extrava- networks were also significant.
gance. The dictator prohibited private ownership Because the Libyan regime was based in a soci-
and retail trade, banned the press, controlled the ety fractured into clan and regional networks,
military, implemented Sharia (Islamic) law, and armed rebels ignited the protests first within the
pursued dissidents. Libya’s decades of interna- eastern provinces. The first manifestations in
tional isolation left the country without politi- Libya began on February 15, 2011, and in the fol-
cal alliances or national organizations of any lowing days, more than a dozen protesters were
kind. Libyan society had been fractured, and was killed in confrontations with pro-Qadhafi tribes
divided along kinship and regional lines. In his and secret police. Protests of government intran-
later years, Qadhafi changed from an anti-Western sigence and brutal repression of demonstrators
terrorist dictator to a something of a Western ally grew into a revolt that rapidly spread through the
in the global war against terrorism and fundamen- eastern part of the country, which had tradition-
talist Islamism. ally been opposed to Qadhafi.
In April 2011, the New York Times reported
The Arab Spring that two sons of Qadhafi had attempted to artic-
At the beginning of 2011, revolutions in several ulate a transition to a constitutional democracy
Arab countries were highlighted in the worldwide that would include their father stepping down.
media. Social media played an important role in The transition was to have been conducted by
these political changes. The Arab Spring, as it one of Qadhafi’s sons, Saif al-Islam Qadhafi. The
became known, reached Tunisia, Egypt, Bahrain, rebels, however, rejected the proposal. The North
Syria, Libya, Jordan, Morocco, Algeria, Yemen, Atlantic Treaty Organization (NATO) took com-
Oman, and Djibouti. Social media applications mand of military operations in Libya. The deci-
such as Facebook, Twitter, YouTube, and Flickr sion was unanimously made by member states of
were key to this revolution. These platforms were the organization after several days of tough nego-
the epicenter of Arab regional social media inno- tiations on NATO’s role and its ability to perform
vation and helped build new communities. The air strikes on ground targets.
terms Twitter revolution and Facebook revolution Even with a defeat of pro-Qadhafi forces
appeared in many newspaper headlines. However, declared, and complete occupation of the terri-
demographic issues as well as social and political tories, Saif al-Islam Qadhafi remained in hiding
patterns among countries were diverse. in the south of the country until his capture in
Comparisons of substantially different econo- November 2011. In addition, members of the for-
mies and cultures became habitual, although this mer government escaped to Niger despite encoun-
led to fallacies. Activists used technology to share tering violence when they were detected by troops
ideas and disseminate their messages. Neverthe- from that country.
less, the main issue is that these uses resonated in
different ways in local contexts and in the global Role of Social Media
sphere. Therefore, were social media facilitators Although digital migration is still in its early
of the revolution? There is no consensus. Yet, it years in Libya, the use of social media for exter-
became clear that political developments in the nal dissemination of protests revealed the tribal
Arab world demonstrated that youth were using and regional cleavages in the country. In Libya,
Libya 769

Families belonging to the Libyan diaspora in Dublin, Ireland, protesting against the regime of Muammar Qadhafi on March 19,
2011. During the Libyan uprising, the diaspora became a source of information about what was happening inside the country for
international audiences. Libyan youth in the diaspora also helped popularize the movement’s now iconic Twitter hashtag of #feb17.

the Internet penetration rate was quite low: Only arrests. Word spread through independent social
5.4 percent of the population had access in June media in the diaspora, resulting in an increase in
2010; and in March 2011, only 1.1 percent had citizen engagement. Social media became watch-
created accounts on Facebook. These numbers dogs of the official Libyan press and dissemi-
demonstrate that it is not possible to argue that nated information to the Western world. Several
social media was the main driver behind the Twitter campaigns were directed to public figures
uprising in Libya. From an internal perspective, and against political actors in Libya. The Libyan
the numbers demystify the idea of the Facebook government tried to respond, and became partic-
or Twitter revolution. ularly active on Twitter. Saif al-Islam also tried
Numerous Facebook pages and hundreds to use social media to spread his message to the
of thousands of tweets supported the protest. international community and express his deter-
Moreover, mobile devices were used for both mination to govern Libya and move the country
messaging and conveying information. On toward democracy.
February 18, the regime disabled the Internet, As the revolution had several social and politi-
hoping to smother the protests. Nevertheless, cal actors, it became clear that many had appro-
they increased, culminating in bloody clashes priated social media as methods of propaganda.
between rebels and those loyal to Qadhafi. As The “YouTube war” exposed the uses of social
social media facilitated free expression, Qad- media platforms for the purposes of political
hafi’s regime replied with brutal repression and dissident and activist organizations. There were
770 Libya

many questions about the content published, networks, and led the rebels to impose severe
and confirmation of information was increas- punishments on critics. What seemed like a revo-
ingly difficult, with armed rebels on the ground lution for democracy began to raise questions in
hindering the work of media professionals. The social networks and in the Libyan youth move-
propaganda war became evident in video con- ment in the diaspora.
tent, fake pages created on Facebook, and false
information disseminated on Twitter. The dif- Conclusion
ferent streams in social media provoked many After five months of being blocked, by August
questions about what was actually happening in 2011, the Internet was again available to the Lib-
the country. yan public. The capture of Qadhafi and his death
Journalists and bloggers faced serious reper- at the hands of the rebels seemed to put an end to
cussions for expressing independent opinions civil war in October 2011. Although Libya is cur-
and publishing information. Several social media rently undergoing political reconstruction, wide-
campaigns demanded rights for Internet users, spread corruption and scarcity of basic goods still
journalists, citizen journalists, and bloggers. The occur. The main issue is state formation, not just
Qadhafi regime severely repressed digital dis- democratization. The 6.4 million people in Libya
sidents. The imprisonments were emblematic of are still living in fear of another war, and are still
control of digital space. Hence, the Libyan dias- divided along provincial lines.
pora became an important source of information Social media is still used to expose what is hap-
about what was happening inside the country for pening in the country. As media professionals
international audiences. In fact, the Libyan youth have begun to redirect attention to Syria, social
movement in the diaspora directly reported on platforms have become one of the only media
Twitter and Facebook, and tagged their messages to disseminate information on the real situation
with the hashtag #feb17. in Libya. Some youth from the diaspora have
As Tripoli collapsed into a civil war, social returned, and are playing an important role in
media were used to empower the revolution as confronting the disillusionment that followed the
well as to place the messages into a transnational fall of Tripoli to the rebels.
sphere. On Twitter, users from around the world The opposition members who took power
began tagging tweets with #feb17 in an interna- after Qadhafi understood the role of social media.
tional demonstration of solidarity for the pro­ Attempts to limit Internet access were frustrated
democracy protests. Media professionals directly because users could get to Twitter via SMS and
dialogued with users through these streams and virtual private networks and proxy servers that
relied on the techniques of semantic classification allow secure remote access to external networks.
to remain at the forefront of publishing content Limiting communications with the outside world
and attracting audiences. not only failed, but also highlighted the need for
The new tools implemented different (sim- additional change.
ple and simultaneously complex) social objects Social media continued to play an impor-
that promoted new practices: to subscribe, like, tant role at this stage. After the elections in July
retweet, Digg, or share. This means that users’ 2012, the new leaders of the country had diffi-
online behavior could be studied as activities. culty imposing their authority over the rebel bri-
Therefore, social practices could be identified as gades who fought the Qadhafi regime in 2011.
leading to social action and interaction. The role Some militias believed that their legitimacy was
of hashtags in the Libyan revolution were relevant greater than that of elected officials. The popu-
because they promoted adherence to social and lation responded by organizing demonstrations,
political movements, ensured information streams, and managed to oust Islamist groups. Amnesty
indexed messages to contents, and disseminated International reported that although most
information by communication channels that pro- human rights violations had been committed by
mote collective action through social interactions. the forces of the deposed regime, supporters of
The NATO intervention in Libya was also the new regime had also been involved in torture
an issue that has been much discussed in social and murder.
Lieberman, Joe 771

Facebook pages and Twitter continue to have Lieberman, Joe


a significant impact on the disclosure of infor-
mation from the country, often surpassing media Joseph Isadore “Joe” Lieberman is a former four-
professionals and television networks. However, term U.S. Senator from Connecticut, nationally
bloggers and citizen journalists continue to be well known for his roles in the 2000 and 2008
harassed, and Internet access is still controlled presidential campaigns. Lieberman, who spent
by the authorities and militias, according to most of his political career as a Democrat, earned
both Reporters Without Borders and Amnesty the party’s vice presidential nomination in 2000,
International. becoming the first Jewish candidate on one of the
The critical mass of Twitter, mostly Western, major party’s presidential tickets. A leader who
considers this kind of pressure on citizens unac- often reached across the political aisle to find
ceptable, and also condemned the way in which common ground, Lieberman became an indepen-
Qadhafi was executed. The trial of the son of dent in 2006, and further broke away from his
the dictator and imprisonments and repression party during the 2008 presidential campaign to
of digital dissidents are now the most discussed become a chief surrogate for Republican candi-
topics in social media concerned with the situa- date John McCain. Lieberman is also known for
tion in Libya. The hashtag #feb17 continues to his sometimes controversial legislative agenda
be used to index content on the Libyan revolu- that included issues such as lesbian, gay, bisexual,
tion and its aftermath. and transgender (LGBT) rights, homeland secu-
The use of social media cannot be interpreted rity, and cybersecurity.
as a direct cause of changes in Libya. Cyber- Born in Stamford, Connecticut, on Febru-
space was the link between different networks ary 24, 1942, Lieberman is twice married with
and established new public spheres for debate. three children, one stepchild, and 12 grandchil-
Digital media has individualized, localized, and dren. Lieberman married his first wife, Betty
structured a collective consciousness. Within this Haas, when he was a student at Yale Law School
emerging news ecosystem, political uses of social in 1965. After divorcing in 1981, Lieberman
media were also exposed. Social media do not met his second wife, Hadassah Freilich Tucker,
generate revolutions, but may facilitate them and the child of Holocaust survivors who fled to the
aid political actors in transforming their public United States. Still married to Hadassah, the two
image. Nevertheless, social media can change the describe themselves as “observant” Jews. Lieber-
nature of news, just as Arab satellite channels man’s faith brought him attention throughout his
helped to broadcast the revolution. career, but especially when he was selected as Al
Gore’s running mate in the 2000 presidential elec-
Inês Amaral tion. Speculation over whether Lieberman’s faith
University of Minho would pose a problem for the Gore campaign died
down after the election, when Gore and Lieber-
See Also: Africa, North; Al Jazeera Effect; Arab man lost the electoral college, but received over
Spring; Facebook; Feb 17 Voices; International Unrest half a million more votes than their Republican
and Revolution; Syria; Tunisia; Twitter; WikiLeaks/ opponents George W. Bush and Dick Cheney.
Arab Spring; YouTube War, The.
Career
Further Readings Before becoming the Democratic Party’s vice
Anderson, Lisa. “Demystifying the Arab Spring.” presidential candidate, Lieberman served for 10
Foreign Affairs, v.90/3 (2011). years in the Connecticut Senate, six years as the
Ghannam, Jeffrey. “Social Media in the Arab Connecticut attorney general, and 14 years in
World: Leading up to the Uprisings of 2011.” the U.S. Senate. Although he served those years
Washington, DC: Center for International Media in the Senate as a Democrat, Lieberman often
Assistance, 2011. could have been described as a political maverick
Harb, Zahera. “Arab Revolutions and the Social at that point in his tenure. Lieberman often sided
Media Effect.” M/C Journal, v.12/2 (2011). with mainstream Democrats, agreeing with their
772 Lieberman, Joe

Former Senator Joe Lieberman in conversation with General David H. Petraeus at the International Security Assistance Force
Headquarters in Afghanistan. Senator Lieberman was taking part in a congressional delegation tour in November 2010, and was
accompanied by several other senators, including John McCain, for whom he campaigned during the presidential election of 2008.

positions on issues like abortion, gun control, and Security and Governmental Affairs Committee,
the environment. Lieberman was a strong propo- and was a leader in efforts to create the Depart-
nent of environmental legislation, helping negoti- ment of Homeland Security. Lieberman supported
ate the Clean Air Act Amendments of 1990, vot- the wars in Afghanistan and Iraq, and became a
ing to ban drilling in the Arctic National Wildlife target of criticism from the left for his continued
Refuge in Alaska, and authoring bills to combat support of both military operations. In an inter-
climate change. However, Lieberman often sided view with FOX News anchor Chris Wallace,
with Republicans on foreign policy, and also Lieberman would later admit that he identified as
angered many in his party by being the first prom- a Democrat on the majority of domestic issues, but
inent Democrat to publicly reprimand President largely sided with Republicans on foreign policy.
Bill Clinton during the Monica Lewinsky scandal. Lieberman’s support for the Iraq War, along
Lieberman’s run for vice president coincided with his other conservative positions on a vari-
with his campaign for re-election to the Senate. ety of issues, did him no favors when he sought
Although Gore and Lieberman ultimately lost the the Democratic nomination as a candidate in the
presidential contest, Lieberman easily maintained 2004 presidential election. Lieberman’s former
his seat in the Senate, winning 64 percent of the running mate Al Gore snubbed Lieberman with
vote over his Republican opponent. As a Senator, his endorsement of Howard Dean in December
Lieberman soon became chair of the Homeland 2003. Lieberman withdrew from the race on
Lieberman, Joe 773

February 3, 2004, after failing to win a single supporters on the campaign trail. In June 2008,
primary or caucus. Ultimately, Lieberman found Lieberman launched Citizens for McCain in an
himself on the losing end behind six other can- effort to attract moderates and disaffected Demo-
didates, including Reverend Al Sharpton, retired crats to the candidate’s side. The effort primarily
General Wesley Clark, Ohio Representative Den- targeted former Clinton supporters who may have
nis Kucinich, former Vermont Governor Howard been reluctant to support Obama. In September
Dean, North Carolina Senator John Edwards, 2008, Lieberman assumed a key speaking role at
and the eventual nominee Massachusetts Senator the Republican National Convention, where he
John Kerry. argued that McCain’s experience (and Obama’s
As fewer and fewer prominent Democrats lack thereof) made the Republican ticket better
supported the Iraq War, Lieberman again found qualified to serve the nation.
himself out of favor with many in his party as Lieberman’s close relationship with McCain
he campaigned for re-election to the Senate in kept the media speculating over possible cabi-
the 2006 Democratic primary. While Lieberman net appointments for the Connecticut senator
received the support of some Democrats in his in a McCain White House. Many believed that
primary battle, he went on to lose the party’s McCain wanted to select Lieberman as his vice
nomination to antiwar candidate Ned Lamont. presidential running mate, but others thought
After losing the primary, Lieberman ran as an that selection would anger the more conserva-
independent candidate on the newly formed Con- tive wings of the Republican base. When McCain
necticut for Lieberman Party’s ticket. Running announced Alaska Governor Sarah Palin as his
against Lamont and Republican Alan Schlesinger, choice for vice presidential nominee, the media
Lieberman became a divisive figure to his Demo- began to speculate more about Lieberman serving
cratic colleagues in the Senate. Most, including in other positions, like secretary of state.
notable names like Democratic Minority Leader Instead of assuming a high-level cabinet posi-
Harry Reid and New York Senator Hillary Clin- tion, Lieberman saw McCain lose the election in
ton, expressed their support for Lamont; only a landslide defeat, and then faced an angry Dem-
five Democratic senators endorsed Lieberman. ocratic Senate majority that threatened to take
Meanwhile, Republicans largely expressed their away his chair on the Committee on Homeland
support for Lieberman over their candidate. Security and Governmental Affairs. Although
Lieberman racked up notable endorsements from Senate Minority Leader Mitch McConnell
Republicans like former House Speaker Newt approached Lieberman about caucusing with the
Gingrich, former New York Mayor Rudy Giu- Republicans, Lieberman decided to stay with the
liani, and Maine Senator Susan Collins. Lieber- Senate Democrats after Obama convinced Sen-
man eventually won the race and returned to the ate Majority Leader Harry Reid to let Lieberman
Senate to caucus with the Democrats, giving the keep his chair. Lieberman was instead stripped of
party a 51–49 seat majority. his membership for the Environmental and Public
Works Committee as punishment for supporting
Citizens for McCain McCain during the election.
Although he continued to caucus with the Demo-
crats, Lieberman endorsed Republican Arizona Health Care
Senator John McCain for president on Decem- Since the 2008 campaign, Lieberman has con-
ber 17, 2007, when the Democratic field of can- tinued to be an independent voice in the Senate.
didates still included eventual nominee Barack During debates on health care legislation, Lieber-
Obama, as well as Hillary Clinton, John Edwards, man came out against any plan that included a
Dennis Kucinich, Delaware Senator Joe Biden, public option, and threatened to join Republicans
New Mexico Governor Bill Richardson, former in a filibuster if any such plan should come to the
Alaska Senator Mike Gravel, and fellow Con- floor. Lieberman opposed plans including govern-
necticut Senator Chris Dodd. Citing his support ment-run insurance programs because of the bur-
for McCain’s foreign policy positions, Lieber- den he claimed it would put on taxpayers and the
man became one of the candidate’s most visible national debt.
774 Lieberman, Joe

Lieberman was one of the most vocal critics of was criticized on freedom-of-speech grounds, but
the public option, and helped force Democrats remained persistent with his call for censorship,
into pulling the feature from their legislation. and in June 2010, he introduced the Protecting
With that disagreement out of the way, in Decem- Cyberspace as a National Asset Act of 2010, a bill
ber 2009, Lieberman sided with the Democrats he coauthored with Susan Collins and Democrat
and was one of 60 senators who voted for the Thomas Carper of Delaware. Lieberman claimed
Patient Protection and Affordable Care Act, com- that the bill would give the president authority to
monly known as Obamacare. respond to cyberterrorist attacks on government
infrastructure. Vocal opponents labeled the legis-
LGBT Rights lation the “Kill Switch Bill” and alleged that it
Lieberman regained some favor with Democrats would give the president unprecedented authority
as an out-front spokesperson for the repeal of to take over or shut down the Internet.
“Don’t Ask, Don’t Tell.” Lieberman had sup- Lieberman also came under fire for actions
ported the initial passage of the policy prohibit- related to WikiLeaks, an organization that pub-
ing gay, lesbian, and bisexual troops from openly lishes secret and classified information from
serving in the military; however, he believed the anonymous sources. Lieberman directed his staff
policy was outdated and discriminatory by 2010, to make inquiries into Internet companies like
and pledged to work toward its repeal. Amazon.com, which provided service to the con-
Along with Susan Collins, Lieberman intro- troversial WikiLeaks. With Senators John Ensign
duced a bill repealing the policy, which passed the and Scott Brown, Lieberman then introduced
House of Representatives in a vote of 250–175, legislation to amend the Espionage Act in order
and the Senate in a vote of 65–31. Before the Sen- to affect WikiLeaks and similar Internet sources
ate vote, Lieberman gave the final argument for that leaked classified information. Again, Lieber-
the legislation’s passage, while his friend and col- man’s call for censorship drew criticism from
league John McCain argued against repeal. Presi- those insisting that such legislation hinders the
dent Obama signed the bill into law on December free speech rights of both new and traditional
22, 2010. media sources.
Cybersecurity legislation has continually
National Security proved controversial, and has failed to receive
While Lieberman opposed McCain and many con- the 60 votes needed for the Senate to take up the
servatives on the issue of gays openly serving in issue. In December 2012, Lieberman lamented
the military, he remained hawkish on other issues that “cybersecurity is a goner and I’m really disap-
of national security. In January 2012, Lieberman pointed about it.” Lieberman continues to believe
cosponsored the Enemy Expatriation Act with that the nation is unprepared for a cyberterrorist
Senator Scott Brown and Representatives Char- attack that he claims could be more devastating
lie Dent and Jason Altmire. This controversial bill than the 9/11 terrorist attacks. While Lieberman
was designed to allow the federal government to campaigned against Internet security threats, he
strip U.S. citizens of their citizenship if they par- also recognized the communicative advantages
ticipated in certain terrorist activities. provided by social media, and maintained an
active presence on sites including Facebook, Twit-
Internet Freedom and Cybersecurity ter, and YouTube. Lieberman often posted pic-
In recent years, Lieberman has taken on the con- tures and videos, as well as links to articles about
troversial issues of Internet freedom and cyber- himself and the issues he championed.
security. In 2008, Lieberman’s Senate Commit-
tee, viewing the Internet as a potential vehicle for Retirement
terrorist threats, issued a report titled “Violent In January 2011, Lieberman announced that he
Islamist Extremism, the Internet, and the Home- would retire from the Senate at the expiration
grown Terrorist Threat.” Lieberman also called of his fourth term. With credible opponents on
on YouTube to take down hundreds of videos pro- both sides of the aisle, like Republican Linda
duced by Islamic terrorist supporters. Lieberman McMahon and his eventual successor Democrat
LinkedIn 775

Chris Murphy, some pundits questioned whether LinkedIn


Lieberman had a realistic pathway to re-election
if he had chosen to run again. Lieberman dis- LinkedIn is a publicly held social-networking
counted such criticism, and served the remainder Internet company tailored toward professionals
of his term relatively quietly. Lieberman refrained across all industries. Founders Reid Hoffman,
from endorsing a candidate in the 2012 presiden- Allen Blue, Konstantin Guericke, Eric Ly, and
tial contest, and presented himself as a voice of Jean-Luc Vaillant established LinkedIn in Decem-
reason on the “fiscal cliff,” encouraging compro- ber 2002, and launched the site on May 5, 2003.
mise between Democrats and Republicans on the The CEO of LinkedIn is Jeff Weiner. Headquar-
issues of taxes and the national debt. Lieberman ters are located in Mountain View, California,
also spent his final days in the Senate, campaign- with offices throughout the United States, includ-
ing for an end to the filibuster, a tool he had both ing Chicago, Los Angeles, New York, Omaha,
utilized and criticized in the past. and San Francisco, and 20 international offices
Since retiring, Lieberman has somewhat with- spanning the globe. In 2010, LinkedIn opened a
drawn from public view, not updating his Face- European headquarters in Dublin, Ireland.
book or Twitter accounts since December 2012. Hoffman argues that many people are not
However, he remains a steadfast advocate for equipped with the skills to effectively remain
many positions, and recently joined the Ameri- mobile so that they can grow professionally, and
can Enterprise Institute, a conservative think tank he believes that it is LinkedIn’s job to assist pro-
aiming to build consensus around various foreign fessionals in making connections. The intention
policy issues. Lieberman may be remembered of LinkedIn, according to Hoffman, is to assist
negatively by some as a controversial figure, members to create, manage, and share their pro-
and by others positively as the rare independent fessional identities online while strengthening
in Washington, unafraid to compromise across their professional connections through social
party lines. As the first Jew on a major presiden- networking.
tial ticket and a central surrogate and supporter LinkedIn has a diversified business model.
of John McCain’s 2008 White House bid, Lieber- Revenue is generated from hiring, marketing,
man has also secured himself a place in national advertising products, and premium subscrip-
political memory. tions. The company receives most of its revenue,
about 42 percent, from LinkedInJobs, which
Jefferson Walker generates more than $102 million a year. Linke-
Jason Edward Black dIn Corporate Solutions are tools that aid busi-
University of Alabama nesses in locating qualified candidates for posi-
tions, whereas LinkedInJobs allows businesses
See Also: Campaigns, Presidential 2000; to advertise open positions on the site. Premium
Campaigns, Presidential 2008; Cyber-Jihad; Lesbian, subscriptions only account for 25 percent of
Gay, Bisexual, and Transgender Rights; WikiLeaks. annual revenue for the company.
The remaining annual revenue, approximately
Further Readings $79 million, is generated from advertising. Linke-
Cohen, Jeffrey E. “The Polls: Religion and the 2000 dIn Ads is a self-service option that allows adver-
Presidential Election: Public Attitudes Toward tisers to build and target their advertisements to
Joseph Lieberman.” Presidential Studies Quarterly, LinkedIn members. LinkedIn offers additional
v.35/2 (2005). services for businesses through LinkedIn Ads for
“Joe Lieberman, Would-Be Censor.” New York Times Enterprise, which handles large-scale market-
(May 25, 2008). ing and advertising accounts. LinkedIn’s busi-
Kellman, Steven G. “Just a Jew Named Joe.” Shofar: ness model has it collecting money directly from
An Interdisciplinary Journal of Jewish Studies, individuals and businesses. The company has its
v.25/2 (2007). feet firmly planted in the service industry and the
Rubin, Jennifer. “Going After Joe Lieberman.” technology field. LinkedIn has more than 2,860
Commentary, v.129/3 (2010). employees globally.
776 LinkedIn

Much has changed since the day LinkedIn was over 1.2 million LinkedIn Groups, with the larg-
started in Hoffman’s living room in 2002; namely, est category being professional and career issues.
growth. By the end of the first month, LinkedIn Academic and corporate alumni groups account
had 4,500 members; in June 2013, there were for more than 120,000 of the LinkedIn Groups.
more than 225 million members globally, with The openness of groups can vary from private to
more than 60 percent living outside the United open to all Internet users.
States. The top five countries with the most LinkedIn offered some new features in 2011,
LinkedIn small business membership accounts many intended for companies or enterprises.
include the United States, the United Kingdom, Companies can create free banner advertisements
India, the Netherlands, and Canada. LinkedIn is linking back to content. Companies benefit from
available in 19 languages. LinkedIn reports that this added tool because it allows them to bridge
the rate of membership growth is estimated at LinkedIn with other social media. LinkedIn sup-
two members per second. The fastest-growing ports video content on pages, allowing compa-
membership group is college students and recent nies to add videos about products or services.
college graduates. LinkedIn is considered the Recommendations are all offered by LinkedIn,
world’s largest business social networking site. where recommendations are shown based on
Members range from college students to top busi- connections in a network. Much like Facebook,
ness executives. Executives from every Fortune LinkedIn has a “follow us” button that can be
500 company have a LinkedIn account, making added to a Web site, blog, or other social media
this network as deep as it is broad. platform. By means of HTML code, LinkedIn can
connect a company’s Web site with its LinkedIn
Site Features page; visitors to a company’s Web site can click a
To assist professionals to effectively create, build, “recommend” button that connects to the com-
and maintain business networks, LinkedIn uses pany’s LinkedIn page. LinkedIn, similar to Face-
a registered membership model, where every book, has a “share” button.
user must create an account and register with LinkedIn is a social networking site that focuses
LinkedIn. Accounts exist on a continuum, ranging on the business side of effectively building pro-
from free to premium. Users create their accounts fessional connections. The goal of LinkedIn is to
by adding professional histories and information, aid individuals, companies, and groups in access-
including résumés. It is against LinkedIn policies ing shared knowledge and insights and locating
to create a solely personal profile page; that is, advantageous business opportunities.
all individual pages must be career-life focused.
Professional networks are built by adding connec- Diane M. Monahan
tions with fellow LinkedIn users. Accounts can be Saint Leo University
personalized as users post photos and showcase
their work and community service activities. See Also: Facebook; Foursquare; Google+;
Networks are established by inviting people International Online Communities; Social
into one’s network. Connections can be first Networking Web Sites; Unemployment.
degree, where the person has a direct professional
association with the person, such as being cur- Further Readings
rent or past colleagues at a company. A second- Kowalski, Mark. “Why LinkedIn Is Different in
degree connection is a relationship by means of Social Media and Why That Still Doesn’t Justify
a mutual association, such as a former colleague Its Price.” Seeking Alpha (November 14, 2012).
of a current coworker. Connecting via a second- http://seekingalpha.com/article/1005601-why
degree connection is called a third-degree connec- -linkedin-is-different-in-social-media-and-why
tion. Third-degree connections can be beneficial -that-still-doesn-t-justify-its-price (Accessed
in helping to establish a connection with someone January 2013).
to whom you may wish to be introduced. In addi- Lacter, Mark. “Reid Hoffman.” LinkedIn, v.31/4
tion to individual membership accounts, LinkedIn (May 2009).
offers groups for special interests. There are well
Lobbyists 777

Slutsky, Irina. “Why LinkedIn Is the Social Network can be defined as “an intermediate sphere of vol-
That Will Never Die.” Advertising Age, v.81/43 untary association and activity standing between
(December 6, 2010). the individual and the state.”
The number of civil society organizations
(CSOs) has grown exponentially, and they have
expanded their scope, from aiming at specific
targets like slavery or prisoners of conscience, to
Lobbyists fundamental matters of global governance. Such
an increase suggests that lobbyists will play a cru-
By definition, lobbyists can be described as a cial role in the political arena, where the modern
group of persons engaged in conducting activi- state system faces severe challenges.
ties aimed at influencing public officials and the There are several factors playing a role in
activities of governmental agencies. The term is encouraging the growth of lobbyists since the
widened with the inclusion of anyone who tries 1970s: the result of globalization and the emer-
to impact governmental activities, including the gence of interdependency issues around the globe,
legislative process. In this context, one can argue United Nations (UN) sponsored global confer-
that lobbyists target to impact policymaking, ences, advances in communication and infor-
decision-making, or decision-taking processes of mation technologies, the end of the Cold War,
states and organizations other than states. There- and the spread of democracy. Pluralist thought
fore, lobbyists are perceived as the person who also argues that openness of the political system
can impact the cited processes that are concerned leads to the creation of an environment for other
with their purposes and interests. stakeholders. For example, there are a number of
Lobbies are becoming increasingly significant actors other than governments and citizens such
in the 21st century. There are a number of fac- as social networks, advocacy groups, and lobby-
tors that have contributed to the rise of lobbies. ists, who have shared interests and seek to influ-
They may include the media, advances in new ence policymaking processes within governmen-
technologies, globalization, democratization, tal agencies.
human rights, and the rule of law. In this sense, Lobbyists have transcended national and
cited factors have facilitated collective action, regional borders with the processes of globaliza-
mass participation, involvement of third parties, tion, and have become a part of the global system.
mobilizing resources or structures, and increasing Today’s lobbyists cannot only be considered as a
political opportunities, which contribute to politi- simple social polity crossing national borders, but
cal change and strategic outcomes. also as important social actors within structural
forms ranging from organized nongovernmental
Civil Society and Lobbyism organizations (NGOs) for public benefit and asso-
The concept of civil society has existed for cen- ciations for member benefits, to faith-based orga-
turies. Its meaning has varied across time, place, nizations, Internet-based pressure groups, and
theoretical perspective, and political persuasion. antiwar or antiglobalization protestors. Social
The term civil signifies a measure of good faith associations, NGOs, citizen movements, student
and respect for law. As an ancient term, societas bodies, environmental groups, feminist networks,
civilis refers to the rule of law and active partici- human rights advocacy chains, epistemic com-
pation of citizens in public life. Liberal theorists munities, and so forth, are principal members of
explain civil society as groups of citizens who global civil society that can act and perform lobby
emerge and associate spontaneously and freely. activities around the world. To give an example,
As an outcome of liberal assumptions, relations Greenpeace, Doctors Without Borders, Initiatives
among private individuals, groups, and societies of Change, and International Campaign to Ban
that can produce important consequences for the Landmines are considered well-known lobbyists.
course of events have also supplemented interna- Originally, lobbying activities were targeting
tional relations among governments. In broadly legislative and decision-making processes within
accepted terminology, the concept of civil society states. As time passed, lobbying has included
778 Lobbyists

intergovernmental phenomena such as lobbying indigenous people, women, and working classes
legislative processes in the European Union and have all sought social changes as a result of their
the UN. Thus, lobbyists have played a crucial role transformist views. In this sense, lobbyism can be
in all forms of agenda setting, including at the defined as a sustained campaign of claim making,
national and supranational level. Therefore, one using repeated performances that advertise claims
can claim that the context of lobbying activities based on organizations, networks, traditions, and
has shifted into a global sphere with the involve- solidarities that can sustain these activities.
ment of social media, as compared to the old Scholar Mary Kaldor classifies activities of lob-
sense of lobbyism used to refer to national drives byists as “old” and “new.” Old lobby activities
and conventional tactics. tend to be labor movements, national movements,
To make an overall definition, lobbyists can be self-determination movements, or anticolonial
viewed as the field of action and thought occupied movements. Contemporary lobby activities, how-
by individual and collective citizen initiatives, of ever, retain global features such as international
a voluntary nonprofit character, both within and human rights activists, global environmental
among states. However, the term lobbyists has groups, or groups defending women’s rights.
undergone dramatic transformations. The old Flows of information have facilitated the emer-
sense of the word encompassed the wining-and- gence of transnational advocacy networks and
dining era when lobbyists were financing cocktail transnational lobby activities. As communication
parties and social activities and benefiting from technologies have become decentralized, cheaper,
organizing pressure on elected or governmen- and more accessible, the ability of states to con-
tal officials over specific social, economic, and trol communications has diminished.
political issues. In contrast, lobbying in the con- The boom in information and communica-
temporary era requires new strategies, informa- tion technologies has formed the infrastructure
tion-based initiatives, and social media coverage, of globalization in finance, capital mobility and
thereby changing the conventional definition of export-oriented business activity, transnational
lobbyists. Additionally, the emergence of diverse communication, migration, and travel, as well
social media tools has profoundly accelerated the as civil society interactions. There has been an
rise of lobbyists. unprecedented compression of time and space,
One question behind these definitions is how a as individuals, groups, and governments increas-
lobbyist can accomplish desired ends. Utilities or ingly integrate political, economic, and social
services designed for realizing the purposes and processes across national boundaries. Transna-
interests of lobbyists are primarily concentrating tional movements of lobbyists, moreover, have
on information and persuasion. Information and displaced domestic contention; they will deacti-
persuasion can be considered valuable assets that vate the boundaries between states and activate
a lobbyist can benefit from while influencing deci- new boundaries that can lead to the formation
sion-making or policymaking processes. There- of lobbyists.
fore, with the help of these tactics and strategies,
lobbyists can generate a power that can ensure Social Media Coverage
the achievement of individual purposes and inter- Lobby activities within states and regions have
ests regarding the decision-making and decision- reached a broader sphere of influence. The
taking processes. Lobbyists, therefore, can be description of certain lobbies as “transnational”
acknowledged as key actors in the democratic has been increasingly common. The primary goal
system; they perform a vital function in raising of these lobbies is to create, strengthen, imple-
awareness about important issues. ment, and monitor international norms. States or
political systems violating these rights have been
Transnational Lobbying Activities countered by lobbyists in the international arena.
As one of the policy responses to contempo- Such lobbyists have been so powerful that they
rary globalization, transformism sees lobbyists have generated significant changes in political
as a source of fundamental social change. Thus, systems. The “color revolutions” of former Soviet
the lobbyists of worldwide peasant activists, republics in eastern Europe and Central Asia,
Lobbyists 779

which took place in past decades, are the most thereby ensuring new strategies and tactics for
significant indicators of the power of global civil lobbyists.
society and transnational lobby activities.
In this era, social and political problems in a Conclusion
certain society do not stay within the borders of The impact of lobbyists and civil society in this
that individual state, but can attract global aware- century has been more salient than before. The
ness through transnational networks of lobbyists. globalization process, advances in new technolo-
For example, the Danish cartoon crisis in 2005 gies, the development of international values and
represents the impact of lobbyists on the behavior norms, as well as calls for human rights are the
of political actors. Several strategies and tactics, paramount factors that promote lobbying activi-
including media coverage, transnational visits ties and initiatives of global civil society, which in
and trips of interfaith communities to the other turn lead to the creation of political changes and
countries, peaceful demonstrations, and boycotts strategic outcomes.
led to both the Danish prime minister and edi- One of the challenges of the globalization pro-
tor-in-chief of the newspaper that published the cess for the future is considered to be the legiti-
cartoons expressing their regrets about offending macy of the system. The participation of civil
Muslims. society in world politics and providing NGOs
Consequently, the examples of color revolu- and lobbyists access to global governance activi-
tions and the case of the Danish cartoon crisis ties will contribute to overcome the challenges
demonstrate that social and political problems that global governance has been facing. Addi-
are no longer national or regional. There is a tionally, a larger and higher quality of lobbyists’
noticeably rapid flow of information among the involvement in worldwide issues could signifi-
members of global civil society and lobbyists. cantly improve public education, public debate,
Thanks to the rapid flow of information, lob- public accountability, and public participation in
byists are now able to simultaneously react. By the issues of international affairs. It is apparent
the increase of nationally defined close-minded from the developments over the past few decades
interests, they have contributed to the creation that the rising importance of lobbyists continues
of long-term social ties. Building connections not only within states, but also at the interna-
and improving joint solutions, activists have been tional level.
exposed to a diverse coalition of viewpoints and However, lobbying activities have shifted
concerns, thereby contributing to the engendering over the course of the time. Initially, they were
of mutual understanding and trust as a basis for concerned with policy- and decision-making
future cooperation. For instance, a group of 1,500 processes within states. Now, they have begun
citizen organizations from 89 different countries to impact policymaking processes of intergov-
have called on governments to adopt a suspen- ernmental organizations, such as the European
sion on any new issues that expand the scope and Union and the UN. Furthermore, in the old sense
power of the World Trade Organization, in the of the word, lobbyists used to host cocktail par-
so-called Battle in Seattle. ties and finance social activities in order to gain
Social media coverage now plays a crucial role influence. By contrast, the approach that lobby-
in the activities of lobbyists. There has been a ists implement today is more related to employ-
dramatic increase in the amount of social media ing social media tools, thus aiming to influence
tools, digital media technologies, and social plat- decision-making mechanisms both in states and
forms, including Twitter, Facebook, and blogs, at the international level.
which are strategically employed by lobbyists in Irrespective of shifting strategies over time, the
order to affect policymaking mechanisms. This main goal of lobbyists, which has not changed,
does not mean that conventional strategies and continues to be influencing government activities
tactics have been eroded and social media tools through information and persuasion. The emer-
are the only means that lobbyists would resort gence of a global civil society and lobbyists has
to. However, diverse social media tools have con- been crucial now that technological and political
tributed to the enrichment of lobbying activities, changes have produced notable impacts around
780 London School of Economics Public Policy Group

the world. Furthermore, these changes will con- Pieterse, J. N. Globalization and Culture:
tinue as globalization proceeds and social media Global Melange. Lanham, MD: Rowman &
tools further spread. Therefore, the importance of Littlefield, 2009.
global civil society and lobbyists will also likely Schock, K. Unarmed Insurrections: People Power
increase in the future. Movements in Nondemocracies. Minneapolis:
University of Minnesota Press, 2005.
Ahmet Kaya Tilly, C. and J. W. Lesley. Social Movements,
Independent Scholar 1768–2008. 2nd ed. Boulder, CO: Paradigm
Publishers, 2009.
See Also: Activists and Activism; Campaigns, Walker, J. W. St. G. and A. S. Thompson. Critical
Grassroots; Nongovernmental Organizations; Special Mass: The Emergence of Global Civil Society.
Interest Campaigns. Ontario: Wilfrid Laurier University Press, 2008.

Further Readings
Clark, J. D. “The Globalization of Civil Society.”
In Critical Mass: The Emergence of Global
Civil Society, J. W. St. G. Walker and A. S. London School
Thompson, eds. Ontario, Canada: Wilfrid Laurier
University Press, 2008. of Economics
Cohen, R. and S. M. Rai. “Global Social Movements:
Towards a Cosmopolitan Politics.” In Global
Public Policy Group
Social Movements, R. Cohen and S. M. Rai, eds. The London School of Economics Public Policy
New Brunswick: The Athlone Press, 2000. Group (LSEPPG) is a university think tank that
Eterovic, I. and J. Smith. “From Altruism to a New supplies consultation and recommendations for a
Transnationalism?: A Look at Transnational Social variety of clients in the public sphere and private
Movements.” In Political Altruism: Solidarity sector. The group conducts empirical research in
Movements in International Perspective, M. the social sciences, provides detailed analysis of
Giugni and F. Passy, eds. Oxford, UK: Rowman & policymaking, and serves as an interface between
Littlefield Publishers, 1999. academia, the private, public, and “third” sector.
Falk, R. Predatory Globalization: A Critique. It operates four blogs on politics, policy, and the
Malden, MA: Blackwell Publishers, 1999. social sciences. In its role as a university think
Freedman, D. “Dynamics of Power in Contemporary tank, the LSEPPG conducts pure and applied
Media Policy-Making.” Media, Culture & Society, research and offers policy intervention and con-
v.28/6 (2006). sultation to a diverse group of governmental
Gregersen, N. H. “On Taboos: The Danish Cartoon entities, international organizations, and major
Crisis 2005–2008.” In Dialog: A Journal of corporations active in the fields of public sector
Theology, v.48/1 (Spring 2009). innovation and productivity, citizen redress, pol-
Kaldor, M. Global Civil Society: An Answer to War. icy evaluation, public engagement, building and
Malden, MA: Blackwell Publishing, 2003. audit, and e-government, survey and focus group
Karns, M. P. and K. A. Mingst. International research, public opinion, and the design of elec-
Organizations: The Politics and Processes of tion systems.
Global Governance. 2nd ed. Boulder, CO: Lynne The group is housed at the LSE Department of
Rienner, 2004. Government, where it is one of the research units
Khagram, S., J. V. Riker, and K. Sikkink. “From in the department. The group was honored with
Santiago to Seattle: Transnational Advocacy an award by the United Kingdom’s (UK’s) Times
Groups Restructuring World Politic.” In Higher Education for best knowledge exchange
Restructuring World Politics: Transnational Social initiative in higher education during 2011. The
Movements, Networks, and Norms, S. Khagram, LSEPPG is ranked among the world’s most influ-
J. V. Riker, and K. Sikkink, eds. Minneapolis: ential think tanks. The group was jointly named
University of Minnesota Press, 2002. the world’s fourth-best university think tank in a
London School of Economics Public Policy Group 781

global survey. The PPG podcasts its public events reaching from topics in European governance, eco-
and makes them available on its blogs. Some of nomics, and politics to cultural and social issues,
the group’s conference topics engage online media both at the EU and nation-state levels. It posts
and present it in the context of policy issues, two articles each day of the week, a Brussels blog
such as whether social security should be moved roundup, and weekly academic book reviews. A
online. The PPG uses Twitter hashtags to promote primary and strategic function of EUROPP within
its events held at LSE, and encourages partici- PPG as an entity is to commence a knowledge
pants to tweet using the hashtags while at event exchange. The blog aims to convey insights from
proceedings and conferences. academia to policymakers and citizens. Another of
its goals is to bring to academic and wider atten-
Blogs tion the research and evidence generated by non-
The group’s dynamic string of academic blogs governmental organization, pressure groups, and a
has found new ways of stimulating interest in the wider range of organizations researching on Euro-
social sciences and politics in the UK and beyond. pean politics and policy themes. EUROPP encour-
The four blogs that the PPG runs are British Poli- ages the submission of material that can improve
tics and Policy (BPP) at LSE, European Politics the evidence base for public debate on any aspect
and Policy (EUROPP), LSE Review of Books, and of European politics and policy.
The Impact of the Social Sciences. All four blogs The Impact of Social Sciences blog, run by the
bring together expertise from academics, policy- LSEPPG, is part of a larger research initiative,
makers, and analysts in order to promote social the Impact of Social Sciences research project. A
science debate, expressed through the writing and joint project between LSE, Imperial College Lon-
editing of research scholars at LSE. Social media don, and the University of Leeds, the Impact of
that the LSEPPG incorporates on its academic Social Sciences research initiative aims to inves-
blogs include Twitter, Facebook, RSS Feeds, and tigate the impact of academic work in the social
Pinterest. The blogs employ Google Analytics sciences on government and policymaking, busi-
that track the number of unique visitors and are ness, and civil society. Another aim of the project
licensed under Creative Commons. They feature is to demonstrate how academic research in the
links to related LSE Podcasts of PPG events. social sciences achieves public policy impacts,
The BPP at LSE is the top-ranked university contributes to economic prosperity, and informs
blog in the UK, according to Times Higher Edu- public understanding of policy issues and eco-
cation, and is the second most read econom- nomic and social change. The project has made
ics blog there. The aims of BBP at LSE are to publications available to download on its blog.
increase public understanding of the social sci- The blog functions as the main site for dissemi-
ences in the context of UK government, facilitate nating the research findings from any of the part-
the sharing and exchange of knowledge between ners working on the project, as well as its publi-
experts within and outside universities, and open cations, such as handbooks. It is updated daily
up academic research to increase its impact. BPP with news articles and comment pieces on impact
draws primarily on the community and research- in the UK and abroad.
ers at LSE, but the blog welcomes contributors The LSE Impact blog has its own twitter han-
from UK and overseas universities and other dle, and its Tweets are also embedded in its blog
research organizations. It encourages submission page. Impact of Social Science and the LSEPPG-
of material that focuses on substantive insights produced guides are available as downloadable
or research as it pertains to any aspect of British and printable computer files and focus on social
politics and policy. media topics such as how to use Twitter in univer-
The primary goal of EUROPP is to maximize sity research, teaching, and impact activities. The
public understanding of social science in the con- Twitter guide was designed for use by academ-
texts of European governance and policymaking, ics and researchers, authored by LSE faculty, and
both at the level of the European Union, the coun- made available in the public domain with Creative
tries across Europe, and within its neighborhood. Commons licensing. The PPG and Impact also
The blog focuses on multidisciplinary themes published a handbook that instructed academics
782 Long-Tail Nano-Targeting

on how to set up a single or multiauthor blog. responsive niche of voters. It is part of a proces-
LSE’s Impact blog curates a public list on Twitter sion of techniques adapted from the commercial
of social science tweeters. marketing industry that have contributed in the
On the LSE Review of Books blog, additional last 40 years to the marketization of political and
social media embraced includes Soundcloud and advocacy campaigning. Utilizing knowledge of
Storify, and each blog post features a link to a audience attributes and characteristics such as
reviewed book’s page on Amazon’s UK Web site, race, religion, income, voting history, credit card
including to its Kindle edition. It won the Euro- purchases, lifestyles, spending habits, group mem-
pean Podcast award, finishing first for 2012 UK berships, ethnicity, class, and cultural groups, the
Academic Podcast, and fifth in the UK Non-Profit concept of long-tail nano-targeting, like most tar-
category that year. The LSE Review of Books has geting, rests upon the idea that audiences can be
a Twitter handle, and its tweets are embedded separated into small online niches of voters, and
in the blog page. The blog’s posts are Google+ that messages can be tailored to those voters’ par-
sharable. The review has a Facebook page that ticular interests. These voting blocs are targeted
is available to “like” on the blog’s main page. online and in a much more finely tuned manner
Selections of book reviewers’ tweets are shared than with traditional targeting or micro-targeting
on the blog. (both of which include other media such as radio,
television, mail, and door-to-door canvassing).
Dustin Bradley Garlitz There are various forms of targeting as it
Earl Conteh-Morgan relates to political and advocacy campaigning:
University of South Florida micro-targeting, hyper-targeting, and nano-tar-
geting. In long-tail nano-targeting, “long-tail”
See Also: Europe; International Examples of refers to the way that niche marketing strategies
Political Parties and Social Media; International are formulated on the Internet. In marketing, it
Social Media and Politics. enables retailers to inexpensively locate and mar-
ket specialized or obscure products to individu-
Further Readings als, regardless of geographical locale, who have
London School of Economics Public Policy Group. an interest in purchasing those products. Cor-
http://www.lse.ac.uk/home.aspx (Accessed respondingly, the concept of nano-targeting has
August 2013). emerged from a long procession of marketing
Tapscott, D. Grown Up Digital: How the Net techniques that have been applied to voter target-
Generation Is Changing Your World. New York: ing in political and advocacy campaigning.
McGraw-Hill, 2009. Voter targeting spans back to the 1970s and
Towner, Terri L. “Campaigns and Elections in a 1980s during the campaigns of Presidents Carter
Web 2.0 World: Uses, Effects, and Implications and Reagan. Utilizing consumer databases to gen-
for Democracy.” Public Administration and erate suitable mailing lists, campaign operatives
Information Technology, v.1 (2012). sent tailored appeals to narrow, tightly selected
members of the electorate on a wide-scale basis.
The availability of more comprehensive and accu-
rate voter databases has been key to the success
of voter targeting in general. In the United States,
Long-Tail both Republican and Democratic parties have
amassed databases with information on practi-
Nano-Targeting cally every voter in the country. These databases
integrate information culled from various pub-
First used by Jeff Koster to describe targeting strat- lic and private sources (e.g., telephone numbers,
egies used during Democratic Senator Al Franken’s age, marital status, voting history, race, religious
campaign for Minnesota senator in 2008, long-tail denomination, income, and other demographic
nano-targeting is a type of online political market- information culled from survey data, direct mar-
ing that targets persuasive messages to the most keting companies, credit reporting agencies,
Long-Tail Nano-Targeting 783

group membership rosters, consumer databases, It has been extensively used by both Democratic
and social media sites) to create a highly detailed and Republican candidates and a host of advo-
picture of each voter. cacy groups. However, the campaign of Barack
These databases, along with the development Obama set the standard for the use of long-tail
of sophisticated technological tools and processes nano-targeting in a political campaign. Dur-
and widespread public accommodation of Web ing the course of his 2008 and 2012 campaigns,
technologies, transformed the simple voter target- Obama’s team collected millions of pieces of data
ing of the 1970s, 1980s, and 1990s into the 21st that it fed into Democratic voter databases. This
century. Republican Mitt Romney’s use of micro- information, culled from disparate sources, but
and nano-targeting not only helped him prevail in especially from online activities, concerned voter
his 2002 bid for Massachusetts governor, but also preferences about location and online activi-
set the stage for adaptation of these techniques in ties. Later, using data mining, an applied statis-
major political campaigns like George W. Bush’s tical technique that is used to extract meaning-
2004 re-election campaign, where the first exten- ful intelligence or knowledge from the patterns
sive use of micro-targeting as a voter identifica- that emerge within a database, voter information
tion tool occurred. was sorted, analyzed, processed, and subjected
Long-tail nano-targeting is not unique to any to predictive analytic techniques. A voter model
particular political party, organization, or group. or profile was then created for the purposes of
categorizing voters, based upon particular attri-
butes and interests. In this way, specific messages
could be targeted to small groups of voters with
the reasonable certainty that the message would
be relevant to that group of voters. Because it is
Web-based, long-tail nano-targeting allows for
ever-smaller groups of voters to be segmented,
based upon their prior online actions (down to
the individual level).
Summarily, the core idea of long-tail nano-tar-
geting is that the nature of the Internet allows indi-
viduals to be transient, never residing in one place
for very long. Long-tail nano-targeting enables
political campaigns and advocacy groups to place
persuasive and tightly targeted messages (to the
most responsive individuals) everywhere that the
specified individual travels on the Internet. Highly
relevant messages tailored to the voters’ whims,
preferences, and indulgences, are placed on Web
sites that they visit, which when clicked on, direct
those voters to the relevant portion of a candidate
or organization’s Web site.
As with any tool, long-tail nano-targeting can
also be used as a tool of marginalization, discrim-
ination, or privacy invasion. There are serious
privacy and surveillance issues that have arisen.
The purchases one makes, the Web sites on which
one comments, and the videos one watches all
can be, unbeknownst to the voter, harvested, ana-
A Barack Obama supporter reading the program at a campaign lyzed, and sold to anyone with enough money.
fundraising event specifically for potential lesbian, gay, bisexual, The personal information of millions of individu-
and transgender donors in New York City in June 2011. als is compiled, analyzed, and disseminated, often
784 Luddite

without their knowledge or consent. Voters are sabotaging industrial machinery that threatened
compiled into clusters or segments based upon their jobs. Although not themselves technopho-
sometimes dubious or incorrect data in order to bic, the term Luddite has since been appropriated
paint a picture of what is believed to be their pref- as a pejorative to dismiss the objections of some-
erences. There is no need for direct contact with one who does not like, has difficulty using, or is
the voter. otherwise hostile toward technology or its propo-
Critics of the excessive use of nano-targeting in nents. It can also refer to skeptics or cynics of new
political campaigns have argued that, by its very technology generally, an increasingly sympathetic
nature, the process is exclusionary and contributes position amid rapid development of technolo-
to not only unjustifiable segmentation and polar- gies like the Internet, genetic engineering, mobile
ization of the electorate, but also self-segmenta- phones, and surveillance cameras. Most of these
tion. In such an environment, voters have every contemporary actors practice nonviolent, theo-
incentive to only seek content that is congruent retical forms of resistance rooted in objections to
with their political preferences. In this way, the narratives that link technological innovation to
opportunity for voters to encounter and engage notions of “progress.”
issues that are unplanned and unanticipated—
which is central to the notion of healthy demo- History
cratic engagement (especially regarding points By the time the Luddites cohered in 1811, the
of view that voters find incongruent with their English Industrial Revolution was well under-
own)—is greatly diminished. Excessive applica- way. In the preceding decades, the government
tion of technologies like long-tail nano-targeting had reoriented its laws and economic priorities
may limit voters’ exposure to the randomness in support of for-profit enterprise, regardless of
that builds understanding and empathy for dif- the toll on individual workers. Technological
ferent worldviews. The result may be that voters unemployment and the replacement of artisans
may become more entrenched than ever in their with unskilled labor became increasingly com-
positioning and loyalty to particular policies, ide- mon occurrences. After the Combination Act
ologies, candidates, and worldviews. banned trade unions in 1799, employees were
left with little recourse.
D. Elisabeth Glassco In the burgeoning textiles industry, machine
Rutgers, The State University of New Jersey breaking emerged as a strategy to substitute for
collective bargaining, somewhat successfully
See Also: Data Mining; Franken, Al; Predictive and simultaneously causing losses of capital for
Analytics; VoteBuilder.com; VoterVault.com. employers and ensuring their own necessity.
Though scattered, the Luddites held a unified
Further Readings identity by writing letters to their employers and
Anderson, Chris. “The Long Tail.” Wired Magazine, signing the name Ned Ludd, a folkloric figure
v.12/10 (2004). who was said to have broken his father’s knitting
Howard, Philip. New Media Campaigns and machine in a fit of rebellious rage.
the Managed Citizen. New York: Cambridge Noting the movement’s frequency and spread,
University Press, 2006. and the public sympathy it enjoyed, the proin-
Koster, Josh. “Long-Tail Nano-Targeting.” Campaigns dustry English government quickly passed a
& Elections Magazine (February 1, 2009). law in 1812 making machine breaking a capital
offense, leading to a series of trials and hangings
in the years that followed. Although the Lud-
dites did not halt the implementation of labor-
saving machinery, they did delay its introduction
Luddite in certain areas, and although their motivations
were entirely practical, their actions demanded
A Luddite was a member of one of several groups consideration of the negative aspects of techno-
of 19th-century English craftspeople known for logical adoption.
Luddite 785

Neo-Luddites with technology, but the article was able to capi-


Luddites of the 21st century, sometimes called talize on the connotations of Luddism by pointing
neo-Luddites, hold concerns that span industri- to the effects that price regulation could have on
alization, computerization, automation, cloning, biotechnology companies.
privacy, deskilling, environmental impact, sepa- The relationships between jobs, economics,
ration from nature, artificial intelligence, loss of and technology remain complicated and con-
humanity, loss of community, loss of individual- troversial, but the immediately practical raison
ization, and effects of new technologies gener- d’être of 19th-century workers has been dis-
ally. Sabotage remains a viable strategy for some placed by two opposing senses of the name. Lud-
activist groups like the Earth Liberation Front, dism serves simultaneously as a rhetorical device
People for the Ethical Treatment of Animals, and to call a particular position “anti-progress,”
Earth First!, but the destructive acts have been and an ideological orientation that challenges
given new labels like ecoterrorism or monkey the very association between quality of life and
wrenching. technological complexity. Authors like Nicholas
Contemporary Luddites are defined less by Carr and Sherry Turkle, for example, attract con-
breaking machines than by some form of opposi- troversy and derogatory accusations of Luddism
tion to “technological progress” as linear, inevita- when they criticize the extent to which people use
ble, objective, desirable, or otherwise independent services like Google and Facebook. That neither
of the society from which it emerges. For them, advocates destroying or even abstaining from
every technological object has its own scrutable, using computers illustrates the way deceptively
ideological imprint and prescriptions for its use, moderate calls for caution or temperance some-
which result from being created by people with how appear radical within the binary context of
particular values in a particular cultural context. being for or against “progress.”
Few have ever self-identified as Luddites or
neo-Luddites. After the machine breakers were Ryan McGrady
banished, hanged, or otherwise deterred by the Jeremy Packer
harsh new laws, their true motivations were swal- North Carolina State University
lowed up and obscured by the grand mythology
of the Industrial Revolution. To be a Luddite was See Also: Military-Industrial Complex; Snowball
to be stubbornly old fashioned or to fight a hope- Effect; Social Media, Adoption of; Technological
less battle against powerful forces of change. In Determinism; Ubicomp.
economics, the Luddite fallacy attributes to them
the argument that technological advancement Further Readings
does not adequately make up for the jobs it elimi- Carr, Nicholas. The Shallows: What the Internet Is
nates. In politics, pundits have accused Green Doing to Our Brains. New York: W. W. Norton,
Party members of being Luddites for their objec- 2010.
tions to technology that might pose threats to the Jones, Steven E. Against Technology: From
environment, animal rights, or human rights. An the Luddites to Neo-Luddism. New York:
article in a 2000 issue of the National Review Routledge, 2006.
even wielded the term to attack Al Gore when he Turkle, Sherry. Alone Together: Why We Expect
challenged drug companies’ pricing policies. The More From Technology and Less From Each
former vice president’s position had little to do Other. New York: Basic Books, 2011.
M
Mamfakinch identity as insiders or outsiders to their advan-
tage, arguing that they are better suited to the
Mamfakinch (Moroccan Citizen Journalism Col- goals of advocacy because in the spirit of the Arab
lective), or “we won’t give up” in Arabic, is an Spring, they are a part of the people. They there-
award-winning Moroccan citizen media orga- fore do not consider Mamfakinch a newspaper,
nization started in 2011 as part of the youth-led at least not in a manner akin to what Moroccan
February 20th movement’s efforts to reform the journalism has come to symbolically represent, “a
Makzhen ruling class under King Mohammed forum for oversight and distortion of key issues.”
VI’s leadership. Mamfakinch provides alternative Therefore, they attempt to reform the established
information largely unavailable in the Moroc- professional media from the outside. Its members,
can press to give voice to underreported issues. or those formerly known as the Moroccan audi-
Whether its efforts are having any impact has not ence, do so as a mobilized audience. They have
been causally linked (nor necessarily empirically moved beyond the active media paradigm to now
researched). Nevertheless, owed to its presumed participate directly in producing media. They do
influence, in 2012, the Moroccan state alleg- so not simply by responding to journalism (e.g.,
edly infected its computer systems with spyware. by writing letters to editors), but by producing
According to its Facebook page, Mamfakinch is user-generated youth media.
the “Moroccan Leading Citizen Media Portal.” As a social movement operating in an age of
As a citizen media organization, it operates out of mediated politics, they report not out of an inter-
a social movement, rather than a journalism para- est in the practice of journalism, but on behalf of
digm. Like civic journalists, its members pursue their cause. As part of the February 20th youth-
an advocacy agenda. They do not pursue a gate- led movement, and like similar social movements
keeper role guided by norms of professionalism, at operating across north Africa, the Middle East,
least as measured by the goal of achieving objec- and Gulf during the Arab Spring, they began
tive news coverage. Instead, they aim to cover using media to protest. In their case, February
and advocate on behalf of issues that are under- 20th leaders led protests against the Makhzen
reported or not reported at all. state governing authorities and elites under King
Unlike professional journalists, its staff is not Mohammed VI’s leadership, mainly in pursuit of
professionally trained. Like other citizen or com- reform. Mamfakinch members regard journal-
munity media organizations, they construct their ism, or information more broadly, as a necessary

787
788 Mamfakinch

means to achieving such ends. Therefore, and spe- monetary fines and/or other adverse reactions to
cifically to foster democracy, freedom, and human critical coverage. Since then, some authors, like
rights, they advocate on behalf of the human right cofounder Hisham Almiraat, have begun person-
to information, rather than endorsing a specific ally signing their bylines.
political platform. By contrast, the right to infor- In terms of channeling, Mamfakinch’s pres-
mation is not clearly enshrined in Moroccan law. ence includes two Web sites, two Facebook pages,
a blog site, a YouTube channel, a “Mamcast”
Democratization podcast, a Twitter account, a Tumblr account,
By arguing on behalf of the right to information, an RSS feed, and an e-mail listserv. Its main Web
Mamfakinch situates itself in relation to corol- portal emphasizes news and commentary that is
lary data asserting that democracy and freedom self-produced or culled from the Moroccan inde-
of expression cannot exist without one another. pendent media and other independent or citizen
However, Morocco is not a democracy, but an media sources. The Web site blends Arabic with
anocracy (a middling autocratic-democratic sys- French, per the normative bilingual form Darija
tem). As part of larger reform and liberaliza- (Moroccan colloquial) Arabic assumes, in this
tion efforts, King Mohammed VI embarked on case, by alternating between Arabic and French
a process of transforming the kingdom’s subjects articles, rather than translating the two. In addi-
into citizens, democratizing from above. Citi- tion, it includes a streamlined English section.
zen media, on the other hand, seek to democra- Its other Web site, called “Mamfakinch 24/24”
tize from below. Unlike civic media profession- No Concessions, emphasizes information about
als, community-based citizen organizations like Mamfakinch, the February 20th movement, and
Mamfakinch do not seek to provide the public links to its more overtly activist side, including its
with the tools necessary to become “good citi- “Open Makhzen” Facebook initiative. The lat-
zens,” according to a state’s predefined notion of ter was created in conjunction with a protest that
citizenship. Rather, they seek to define citizenship Mamfakinch organized to help combat rampant
on their terms and use their participation in media state corruption.
(and their products) to engage with and reshape Mamfakinch supports domestic causes like
the state, including by establishing and routiniz- reform, anticorruption, transparency, democrati-
ing democracy. zation, and the rights of women and the Amazigh
Through the processes of such engagement, (otherwise pejoratively known as Berbers), and
Mamfakinch in turn is trying to create not just a international causes like Palestinian statehood. Its
self-empowered citizenry, but an actual citizenry. reporting and advocacy orientation concerning
To create this citizenry, along with systemic change, these and other domestic issues are underscored
Mamfakinch provides the public with information by a theme that, despite changes made by the state
otherwise unavailable. It does so by forging alli- since the Arab Spring, these are in fact only cos-
ances with civic journalists, and specifically with metic, making Morocco appear more progressive
members of the independent or alternative press than it is in reality. At the same time, however, its
(e.g., Lakome and TelQuel), which also provides reform agenda and critique of the state operate
information not otherwise available in Morocco largely without crossing Morocco’s “red lines.”
(whether through its largely party-affiliated media They do not transmit (or at least write) informa-
system, or government-controlled sources). tion critical of the king, to the point of suggesting
In the beginning, Mamfakinch staff, comprised that he should be overthrown (instead focusing
of volunteers who refer to themselves as activists on his need to reform his governing apparatus),
and bloggers, began signing articles with the byline or Islam. While they include articles referencing
“Mamfakinch” or “Arab Spring.” Presumably, Morocco and Saharawi competing claims over
they did so to prevent the Makhzen from infiltrat- Western Sahara, these tend to respond to an offi-
ing the organization, to maintain staff personal cially driven agenda, are limited in their framing
security, and to continue expressing their voices, of relevant actors and viewpoints and stop short
in spite of statewide censorship, and self-censor- of practicing peace journalism to advocate com-
ship in response to presumed government arrest, promise on this intractable conflict.
Mashable 789

Impact? used by governments to investigate political activ-


Whether Mamfakinch has had any impact with ity. Meanwhile, in this case, Marquis-Boire tracked
respect to (1) empowering and transforming the originating source of Hacking Team’s malware
its members into citizens through the process to the Moroccan capital of Rabat.
of learning to create and manage its volunteer Thus, given that Hacking Team only sells to
organization, (2) (re-)setting mainstream media governments, and that the Moroccan state cri-
agendas and frames to open new spaces for pub- tiques and harasses citizen activists and journal-
lic discourse, (3) influencing Moroccan elite and ists, according to many scholars and activists,
popular opinions, and (4) impacting policy pro- it is likely that the government made use of this
cesses to bring about systemic change, is unclear. software not to safeguard national security, but
Mamfakinch received the 2012 joint Google and rather to hamper individual liberties. Namely, it
Global Voices Breaking Borders Award. However, hampered Mamfakinch’s members’ right to freely
whether winning that award or achieving other report about and attempt to reform the existing
ends has empowered its volunteers, and as part of anocratic system. Such allegations in turn are a
that, what their chosen organizational structure concern to those invested in social media prac-
has come to assume, has not been studied to make tice and the potential impact that such practices
any empirical statements to any ends. Moreover, might have on reforming and redefining future
while members of the independent press follow state-based citizenship rights globally.
them on Twitter, to what extent such uses, or
Mamfakinch’s overall practices have influenced Yael Warshel
discourse and in turn change, is neither clear. As University of California, Los Angeles
Mamfakinch has noted, despite the cosmetic con-
stitutional revision, real change in Morocco fol- See Also: Arab Spring; Citizen Journalism; Middle
lowing the Arab Spring has not yet been achieved. East; Press Freedom and Online/Social Media
As is the case with any media source, especially Security; Youth Engagement.
those that have received critical acclaim, fear of
Mamfakinch’s impact, rather than its real impact, Further Readings
has created concern. Likewise, its exposure demon- Mamfakinch. http://www.mamfakinch.com (Accessed
strates that supposed technologies of freedom, in August 2013).
this case new digital networking tools, can be used Marquis-Boire, M. “Backdoors Are Forever: Hacking
by those seeking to further social justice just as Team and the Targeting of Dissent.” Citizen Lab
easily as they can by those seeking to repress free- Research Brief 12. Munk School of Global Affairs,
dom of expression. To that end, hackers attacked University of Toronto, 2012.
Mamfakinch’s computers on July 13, 2012.
According to its staff and as confirmed by the
San Francisco–based Electronic Frontier Founda-
tion, the organization received a message, which
when opened, loaded eavesdropping spyware onto Mashable
its computers. According to research conducted by
Marquis-Boire at the University of Toronto’s Citi- Mashable is an online news portal for digital devel-
zen Lab, the downloaded remote control systems’ opments and social media. It was founded in 2005
Trojan malware was manufactured by the Italian- by Pete Cashmore as a blog when he was only 19
based Hacking Team. Hacking Team reports that years old. The Web site attracted 20 million unique
they supply their malware to government law visitors per year as of November 2012. The main
enforcement and intelligence agencies to inves- headquarters for the company is located in New
tigate crime. However, as in other cases reported York City, and an additional office is located in San
by political activists (whether or not these activ- Francisco. Mashable estimates that over 60 arti-
ists were arguably defined as legitimate criminals cles are tweeted per minute, and the writers cover
or terror operatives), commercial-grade tracking such topics as social media advances and trends
and monitoring malware have nevertheless been and how-to articles focused on various topics.
790 Mashable

Designers also make sense of data through image- Battle for Your Vote.” This report compiled infor-
heavy infographics. The Web site showcases new mation resulting from 13 different articles (result-
tech and review gadgets, apps, and software. In ing in 20,000 words) focused on politics from a
addition, Mashable publishes business news from digital point of view. Two of the articles in this
large tech companies to start-ups, as well as lifestyle series were titled “How Close Are We to Internet
and entertainment stories related to social media Voting,” and “How Social Media Can Safeguard
and technology. It is a multimedia mix of news Your Vote.” During this campaign season, Mash-
with videos, blogs, news stories, and infograph- able proved its importance in digital campaign
ics. A new feature, Mashable Follow, is the site’s marketing, voter turnout efforts, and the impor-
content feed that lets users pick topics. In addition, tance of mobile devices in political campaigns.
Mashable Follow enables users to discover and fol- Through this campaign report Web site, users can
low their favorite topics, share stories with ease, read each article and send a tweet about it, “like”
follow social media friends and others who share the article on Facebook, recommend the article on
their interests, customize their news feeds, and earn Google+, or share the article on LinkedIn.
badges. These badges range from the “double rain- In addition to political campaigns in the United
bow,” which focuses on connecting with two net- States, Mashable also covers political campaigns
works to “laughing baby,” which highlights that a around the world. Mashable also published the 13
user follows five topics. Additional badges include virtual articles in its political report in an eBook
hamster dance, early adopter, grade school, honey of the same name. Users who purchase this eBook
badger, I like turtles, I’ma let you finish, LOL cat, automatically gain access to four exclusive inter-
sad Keanu, and sneezing panda. views. These interviews range from Adam Sharp
The Mashable Web site features the following (Twitter’s senior manager of government, news,
links: top stories, trending topics, people, jobs, and social innovation) to Dana Chisnell (ballot
and events. In addition to the aforementioned design and usability expert).
links, Mashable categorizes news stories into the Each year, Mashable, the 92nd Street Y, the
following types: social media, tech, business, life- United Nations (UN) Foundation, Ericsson, the
style, watercooler, entertainment, U.S. and world, Bill and Melinda Gates Foundation, and the UN
and videos. The following companies are global Development Programme host a Social Good
syndication partners: ABC News, CNN, Metro, Summit. Through this three-day event, more than
and Yahoo!. Mashable is focused on maintaining 300 attendees from various countries participate
a specific voice on the Web with their social media in dialogues focused on problem solving through
users. Through Cashmore’s vision, Mashable social media and mobile technologies. This con-
maintains a limited scope to perpetuate creativity. ference approaches social media and social good
Cashmore is focused on the quality of social media from a broader context: mobile technologies, spir-
content, instead of merely the quantity. ituality, women and economic empowerment, citi-
In late 2012, Mashable announced a rede- zen journalism, global health, and kindness. The
sign of its Web site. This redesign incorporated event enables attendees and nonattendees to take
cutting-edge technology and innovative techno- part in the action by creating a Mashable Meetup
logical designs to make the Web site more appeal- called “Take Action.” Speakers for the event range
ing in the social media atmosphere. A predictive from Kathy Calvin (ceo of the UN Foundation)
engine called Mashable Velocity identifies content and Helen Clark (administrator of the UN Devel-
that is projected to go viral. To appeal to those opment Programme) to Larry Irving (cofounder
who may use a variety of platforms (including of the Mobile Alliance for Global Good) to Todd
cell phones, tablets, and computers), Mashable Park (chief technology officer of the United States).
utilizes an adaptive and responsive design.
In 2012, Mashable played a sizable part in the Jennifer Edwards
U.S. presidential election, publishing political arti- Yvonne Mulhern
cles and videos on a daily basis. During the 2012 Credence Baker
presidential campaign season, Mashable created a Sarah Maben
report titled “Politics Transformed: The High Tech Tarleton State University
McCarthy, Kevin 791

See Also: Digerati; Earned Media; HootSuite.com; all electoral districts so that neither Democrats nor
Huffington Post; News Media; Social Good Summit; Republicans had a political margin greater than 7
Social Media Week. percent among registered voters.
McCarthy served only two terms, or a total
Further Readings of four years, in the California Assembly. When
Jacques, A. “Internet Week Recap.” Public Relations Bill Thompson announced his retirement in 2006,
Tactics, v.19/6 (2012). after 28 years in the House representing Califor-
Mashable. “About Us.” http://mashable.com/about nia’s 22nd District, it was just four days before
(Accessed May 2013). the candidacy filing deadline. This gave possible
Mashable. Politics Transformed: The High Tech opponents very little time to organize and launch
Battle for Your Vote. New York: Mashable, 2012. a campaign. Thompson endorsed Kevin McCar-
thy for the seat he was vacating in Congress after
McCarthy announced that he was entering the
race. McCarthy easily defeated the opposition in
the Republican primary, and then faced Sharon
McCarthy, Kevin Beery, the Democrat Party nominee.
Beery was a newcomer to an election. She
Kevin McCarthy is a Republican and the majority had been a Kucinich for President organizer in
whip in the U.S. House of Representatives. He has the central coastal region of California. She had
represented the 22nd District of California, but now been an educator, teaching for 22 years, and also
represents the 23rd District. Kevin Owen McCar- a businesswoman. She won the endorsement of
thy was born in Bakersfield, California, on January the California State Democratic Party, the Cali-
26, 1965, the fourth generation of his family to be fornia Democratic Council, and the personal
born in Kern County. When McCarthy was 19, he endorsement of State Senator Dean Flores. She
opened a deli called Kevin O’s in order to achieve also gained the endorsement of ImpeachPAC, a
his goal of attending California State University in federal PAC that funded candidates for Congress
Bakersfield, from which he earned a B.S. in market- who would seek the impeachment of President
ing in 1989. In 1994, he earned an M.B.A. degree. George W. Bush, Vice President Dick Cheney,
While in college, McCarthy became the chairman and others. Beery advocated bringing American
of the California Young Republicans. He was later troops home from Iraq immediately. She wanted
chosen chairman of the National Young Repub- to institute universal health care for all Americans
licans organization (1999–2001). After complet- and to stop the endless testing in the No Child
ing his advanced degree, McCarthy ran several Left Behind law. To promote her issues, she used a
small businesses. McCarthy still makes his home Web site that explained her positions on the issues
in Bakersfield, the ninth-largest city in California. in several languages. Her campaign also used
In 1992 McCarthy married Judy Wages, and they Twitter, Facebook, Linkedin, and e-mails.
have two children. He identifies himself as a Bap- McCarthy won with 70.7 percent of the vote
tist and is of Irish ancestry. to Sharon Beery’s 29.3 percent. The victory was
impressive because the election of 2006 was very
Political Career favorable to Democrats. In the election of 2008
Beginning in the late 1980s McCarthy served as the that swept Barack Obama into the White House,
district director for U.S. Congressman Bill Thomp- McCarthy had no opposition. In the 2010 elec-
son. He remained in the post until 2002, when he tion, he received 98.8 percent of the vote, with the
was elected to the California State Assembly to rep- remainder going to a write-in candidate.
resent the 32nd Assembly District. In 2002, Arnold
Schwarzenegger also won the election for gover- Majority Whip and “WhipCast”
nor following the recall election that forced Gov- In 2011, McCarthy was chosen the majority whip
ernor Gray Davis from office. McCarthy served by his Republican colleagues. The whip is a party
on the transition team, and later worked closely official who is responsible for ensuring that the
with Schwarzenegger. One project was to redraw party rank and file will vote as the party leadership
792 McCarthy, Kevin

wishes. The term comes from fox hunting, in Committee and Other Memberships
which the individual who whips the dogs back McCarthy is a member of the National Council for
into the pack to keep them in the hunt is known a New America, which formed in 2009. The Coun-
as a “whipper in.” The whip will get to know cil is composed of Republican Party members who
the members of the party, offering inducements are seeking to change the negative image of the
and threatening punishments to ensure particular party. They believe that Democrats have been suc-
votes. The most important role is to see that mem- cessful in branding the Republicans as the party of
bers are in attendance on important votes. “no.” The group was created by Eric Cantor and
In 2012, the official majority whip Web site other party leaders. It uses social media formats
began advertising a new social media app called such as YouTube in order to spread its message.
WhipCast. It connects members of Congress, In the 112th Congress, McCarthy served on
staff, and the public with new information and the House Committee on Financial Services. He
real-time updates on current affairs in Congress. is a member of two subcommittees: the Subcom-
The WhipCast mobile app is available for Black- mittee on Capital Markets, Insurance, and Gov-
berry, iPhone and Droid phones. The majority ernment-Sponsored Enterprises and the Subcom-
whip Web site also features a “newsroom,” blog, mittee on Financial Institutions and Consumer
and WhipCast connections. Credit. In the 110th and 111th Congresses he
also served on the House Committee on House
2012 Election Administration. The committee and the subcom-
The election of 2012 presented new and serious mittees use a variety of social media, including
challenges for McCarthy because it was the first RSS (Really Simple Syndication) feeds, Twitter,
election in which California used its new Top Two YouTube, Facebook, and live Web casts.
Candidates Open Primary Act. The law forces all
candidates to run in one blanket primary. The two Other Social Media Use
top vote-getters then run in the general election in Congressman McCarthy’s official Web site uses
November. The law was the result of a California links to videos. It also has links to Twitter, Face-
proposition. The claim of the supporters was that book, YouTube, and Flickr. There are links to a
it would produce a more centrist result, with more “Help Center,” “Biography,” “Media,” the “Dis-
moderates winning. More voters did participate, trict,” and other links including “Share.” There
but the effect was to produce a super majority is an area in which visitors can sign up to get
of Democrats in the California State Assembly. It “Washington Updates.” Some of the statements
also increased campaign spending, and with it the can be downloaded. There is also a link that takes
power of special interests. In seven of the congres- the viewer on a virtual tour of Washington, D.C.
sional districts, there were Democrats battling each McCarthy’s official congressional Web page
other after the primary in the general election. also has a reading list, including such current
Following the 2010 census, McCarthy’s dis- works as The Forgotten Man: A New History of
trict had been realigned when it was reappor- the Great Depression, Lincoln on Leadership:
tioned. The realignment caused him to be dis- Executive Strategies for Tough Times, and presi-
placed from the 22nd District. He then ran in the dential Courage: Brave Leaders and How They
23rd District to represent California in the House Changed America 1789–1989. The page can be
of Representatives. He replaced incumbent Lois shared via Facebook, Pinterest, Twitter, LinkedIn,
Capps, who had been elected in 1998 in a special Digg, Tumblr, Reddit, and StumbleUpon, and a
election on March 10, 1998, to fill the vacancy large number of other social media links from
caused by the death of her husband, Congress- Blogger to Evernote and Myspace.
man Walter Capps. She was displaced by the
redistricting from the 23rd District to the 24th Andrew J. Waskey
District, which she won. McCarthy remained the Dalton State College
incumbent in the 22nd District until January 3,
2013, when he was sworn in as the representa- See Also: Cantor, Eric; Cornyn, John; Hoyer, Steny;
tive for the 23rd District. McConnell, Mitch; Pelosi, Nancy.
McCaskill, Claire 793

Further Readings When asked in a radio interview if women who


Brander, Michael N. Social Media Use in the Federal are raped should have the option of abortion,
Government. Hauppauge, NY: Nova Science Akin replied that,
Publishers, 2012.
Davis, Aeron. Political Communication And Social Well you know, people always want to try to
Theory. London: Taylor & Francis, 2010. make that as one of those things, well how do
Davis, Richard. Typing Politics: The Role of Blogs in you, how do you slice this particularly tough
American Politics. New York: Oxford University sort of ethical question. First of all, from what
Press, 2009. I understand from doctors, that’s really rare. If
Gladwell, Malcolm. The Tipping Point: How Little it’s a legitimate rape, the female body has ways
Things Can Make a Big Difference. Boston: Little, to try to shut that whole thing down. But let’s
Brown & Company, 2002. assume that maybe that didn’t work or some-
Mergel, Ines and Bill Greeves. Social Media in thing. I think there should be some punish-
the Public Sector Field Guide: Designing and ment, but the punishment ought to be on the
Implementing Strategies and Policies. Hoboken, rapist and not attacking the child.
NJ: John Wiley & Sons, 2012.
O’Brien, Barbara. Blogging America: Political The Akin campaign went south shortly thereafter,
Discourse in a Digital Nation. Portland, OR: and permitted McCaskill—who had been largely
Franklin, Beedle & Associates, 2004. assumed to be one of the most vulnerable incum-
O’Connor, Rory. Friends, Followers and the bents in 2012—to claim a 15 point victory and a
Future: How Social Media Are Changing second six-year term. Throughout the campaign,
Politics, Threatening Big Brands, and Killing McCaskill remained one of the most prolific uti-
Traditional Media. San Francisco: City Lights lizers of social media in Congress.
Books, 2012. McCaskill has served six years in the U.S. Sen-
Pole, Antoinette. Blogging the Political: Politics and ate as a Democrat, and has been senior senator
Participation in a Networked Society. London: for the state since 2010. She defeated incumbent
Taylor & Francis, 2009. Jim Talent during Obama’s presidential election.
Prior to the Senate, she was a member of the
Missouri House and Jackson County Prosecutor
before serving two terms as state auditor. In 2004,
she ran a failed bid for the governorship. An early
McCaskill, Claire adopter, McCaskill has been recognized as one
of Congress’s most effective social media users.
In her recent re-election campaign, Missouri What makes her social media presence so appeal-
Senator Claire McCaskill was frequently stuck ing is her regular inclusion of everyday items into
between a rock and a hard place. As a moder- her messages; she does not simply use new tech-
ate Democrat in a state where the Tea Party has nologies to disseminate official messages.
a rather strong following, McCaskill needed to Northwestern University’s Medill School of
separate herself from the policies of President Journalism rated McCaskill as one of the four
Barack Obama. At the same time, as a Demo- most effective users of social media in Congress.
cratic Senator in a red-leaning state, Obama was Experienced with both Twitter and Facebook,
likely to frequently call on her to attend rallies McCaskill regularly talks about items of com-
with him and aid in his fundraising efforts. As the mon interest, along with serious political matters.
Republican primary season raged on (with mul- Perhaps most impressively, the senator is per-
tiple strong Republicans in the Missouri race), sonally responsible for all of her messages, and
McCaskill began setting her sights on U.S. Rep- personally responds to posts and tweets. Staff do
resentative Todd Akin. She identified him as the not have access. When thinking about the more
most beatable of her potential opponents, and serious realm, McCaskill writes in a way that is
ran ads discussing Akin’s true conservative values. relatable for average Americans and regularly
Then Akin won—and opened his mouth. portrays her as any other human being. She sent
794 McCaskill, Claire

Senator Claire McCaskill shakes hands with Chairman of the Joint Chiefs of Staff General Martin E. Dempsey on April 17, 2013, at the
Senate Hart Office Building in Washington, D.C. Senator McCaskill is one of the more effective members of Congress on social media;
she was named one of the Top 10 Notable People on Twitter by Time magazine.

this tweet before a lengthy debt ceiling session: or impactful. She is formal and professional. As
“Taking a blanket and pillow to the Capitol. a result, many have overtly wondered how she
#neveragoodsign.” managed to master one vehicle while struggling
Researchers have taken to using McCaskill as so heavily with another.
an example of what good social media politicians McCaskill’s social media prowess is statisti-
look like. Yet, McCaskill on Twitter is quite dif- cally supported. OhMyGov rates McCaskill 37th
ferent than the personality she presents on Face- in its social media power ranking. This ranking
book. On Twitter, McCaskill is informal, down- is calculated using her 88,000 Twitter follow-
to-earth, and even folksy; on Facebook, she is ers, 14,000 Facebook fans, 3,500 tweets, and
policy driven and formal. This appears to relate 1,300 mentions per week. With a Klout score of
to her personal preference in platform. McCaskill, 81, average citizens are likely to be exposed to
from the beginning, has always seemed to pre- McCaskill’s words. However, it is how she uses
fer Twitter. She is one of Time magazine’s Top social media that allows her to be seen as suc-
10 Notable People on Twitter, and has success- cessful. McCaskill’s most memorable utilization
fully intermixed politics and personality in the of Twitter was in May 2011. It did not involve
character limit. She uses it as a personal outlet, politics, policy, or even the country. Instead, it
rather than a campaign tool. As a result, when involved her weight. McCaskill tweeted that:
she mentions politics, she’s seen as genuine. On “Maybe talking about it publicly will keep me
Facebook, however, she is by no means colloquial on track as I try to be more disciplined. Off to
McConnell, Mitch 795

the gym.” After meeting her goal, she tweeted the conflict with other conservatives. He is an effec-
news. Hundreds of individuals offered encourage- tive fundraiser for himself and his party, and is
ment throughout the process. an opponent of most campaign finance reform
While she did not attract them for her politics, (opposing McCain-Feingold, for example).
she has connected with them, meaning that they McConnell’s first campaign for the Senate,
are significantly more likely to read whatever she against incumbent Walter “Dee” Huddleston
chooses to send out politically. Rather than forc- (D-KY), was hard fought and narrowly success-
ing politics on people, McCaskill has successfully ful. That campaign exemplified the power of tra-
shown how social media can be used to bridge ditional media as McConnell’s “Bloodhounds”
relationships, which opens doors for political commercials were seen as effective attack ads:
conversations later on. they made hard-hitting political points in a
humorous way. In one commercial, bloodhounds
William J. Miller are tracking Huddleston, who appears not to be
Flagler College on the job, but rather picking up checks from spe-
cial interest groups in exotic locations. In another,
See Also: Facebook; Pro-Choice and Pro-Life; Tea Huddleston is portrayed as running away from
Party Movement; Twitter. his record before being treed by the bloodhounds.

Further Readings Social Media Use


CBS News. “Mo. Senator Lost 50 Pounds With As the media world has changed, though, McCo-
Twitter’s Help” (October 19, 2011). http://www nnell has changed with it. McConnell has a pres-
.cbsnews.com/stories/2011/10/19/earlyshow/ ence on Facebook, YouTube, and Twitter. He also
main20122470.shtml (Accessed August 2013). has a traditional Web site, and uses e-mail to send
Kimbrough, Amanda M., Rosanna E. Guadagno, regular newsletters to those who subscribe. As the
Nicole L. Muscanell, and Janeann Dill. “Gender minority leader, he also plays a role in coordinat-
Differences in Mediated Communication: Women ing messaging among Republicans.
Connect More Than Do Men.” Computers in McConnell’s official Senate Web site is attrac-
Human Behavior, v.29 (2013). tive and traditional. It has a general red, white,
OhMyGov Inc. “Claire McCaskill.” http://www and blue color scheme with a bright red cardinal,
.ohmygov.com/accounts/Person/518-claire the Kentucky state bird, in the upper left-hand
-mccaskill/summary (Accessed August 2013). corner, and McConnell’s picture prominently
displayed in the center. Links are also promi-
nently featured to provide access to a variety of
constituent services, including flag requests, help
for those visiting Washington, D.C., and federal
McConnell, Mitch casework.
Links on McConnell’s Web site will also take
Mitch McConnell was elected to the U.S. Senate in one to his comments on select issues, biographi-
1984 as a Republican from the Commonwealth of cal information, and a page that details the
Kentucky. In 2006, he became the minority leader Republican Senate leadership. There are also
of the U.S. Senate, and has served continuously in links that will take visitors to audio, video, and
that role through the 113th Congress. Like most photo content.
Senate leaders, McConnell is considered highly One prominent difference between McCon-
partisan; his comment that the single most impor- nell’s Web site and that of most senators is that
tant thing for Senate Republicans to achieve dur- his page highlights some leadership issues. In late
ing President Barack Obama’s first term would be 2012, for example, McConnell included com-
to ensure that Obama served only one term was ments on Majority Leader Harry Reid’s (D-NV)
largely seen as a polarizing comment. McConnell plan to change the filibuster rule, and a call on
is a strong conservative, but is not a Tea Party President Obama to provide leadership regarding
favorite, and periodically casts votes that are in the impending “fiscal cliff.”
796 McConnell, Mitch

The Web site, while reflecting Republican talk- a smaller number of other videos dealing with
ing points, is primarily aimed at constituents, and miscellaneous events, such as comments made
promotes the roles of McConnell as a representa- during a ceremony bestowing a Congressional
tive of the citizens of Kentucky and a vote-seeker Gold Medal to Burmese opposition leader Daw
from those constituents. Aung San Suu Kyi.
McConnell was not quick to take up Face- McConnell’s Twitter account is labeled as run
book. He joined Facebook in June 2010, and his by his press office; he has no evident personal
Facebook page uses a standard layout to attract account from which he personally tweets. As of
modest traffic and nearly 10,000 “likes.” If one the start of 2013, McConnell’s office had tweeted
is keeping score, Majority Leader Harry Reid about 1,600 times, with about 6,700 followers. In
(D-NV) has almost four times as many likes. comparison, Reid had about the same number of
McConnell’s Facebook page has content similar tweets, but about 74,000 followers. Reid tends to
to his official Senate Web page—some discus- comment on issues of the day, whereas McCon-
sion of Senate leadership and partisan issues, as nell has been more likely to comment on issues of
well as some policy comments—but it also has interest to his state, such as where he is appear-
content that is more casual and reflects his home ing and his support of the University of Louisville
state interests. Also different is that it lacks the joining the Atlantic Coast Conference. His issue
systematic attempt to reach out to constituents content seems to be increasing over time.
with offers to provide services (e.g., providing McConnell also e-mails a newsletter every two
flags flown over the Capitol Building, or help weeks to those who are on his mailing list. The
with federal agencies). newsletter generally lacks issue content, and tends
What is also distinctive about McConnell’s to talk about personal appearances in the Com-
Facebook page is the large number of negative monwealth of Kentucky or recent nonpolitical
comments on the page. Those comments are not events. The newsletters have links to his official
notably different from that of other congressional Senate Web site, as well as to his Facebook and
leaders, but reflect the terrain that political lead- YouTube pages and his Twitter account.
ers (and anyone else) must navigate when using Additionally, McConnell has both an indepen-
social media, particularly Facebook. When nega- dent Web site and a separate Twitter account for
tive comments are made, do you allow them to his campaign. His campaign site is more politi-
stand? Removing them subjects the page holder cal, and has links to enable one to easily contrib-
to cries of censorship, and seems to undermine the ute money or to volunteer. His campaign Twitter
purpose of the page to engage in social or politi- account had about 300 tweets and 2,000 follow-
cal interactions with others, in this case the pub- ers recorded at the beginning of 2013.
lic. Leaving negative comments posted, though, Overall, McConnell has a presence across social
can make a negative impression. While there is media, but is not a heavy user, and his use seems
no articulated policy on McConnell’s Facebook to be narrow in purpose. They do not form what
page regarding what content is left and what is seems to be a primary means of waging political
removed (in contrast to Reid, who articulates his battle. Maybe that limited use can be attributed to
policy in an obvious way), it appears that McCo- the fact that as minority leader of the Senate, he
nnell allows the bulk of negative comments to has plenty of other venues. It should not be sur-
remain posted. prising that the most content-heavy medium he
McConnell created his YouTube channel in uses is YouTube, where he routinely uploads floor
January 2009. He uploads on a reasonably regu- comments. Since he is a regular presence on the
lar basis, having about 400 videos online at the Senate floor, he has many opportunities to do so.
beginning of 2013. At that same time, he had
about 850 subscribers, and the videos had about Social Media and the Fiscal Cliff Issue
300,000 views. The vast majority of the videos It is not clear that McConnell differentiates
are Senate floor comments made by McConnell, among the various social media venues. An anal-
but there are also a small number of interviews ysis of his social media activity on the two big
with traditional news media posted. There is also issues following the 2012 elections may provide
McConnell, Mitch 797

some insight. One issue was how Congress and change the filibuster rule in the U.S. Senate. Many
the president would deal with what was labeled experts believe that when the Senate adopts its
the “fiscal cliff,” a key policy issue, and the other rules on the first day of a new session, the change
was the threat by Majority Leader Reid to change could be made by a simple majority vote. While
the filibuster rule, a key institutional issue critical changing the rule is controversial and support
to McConnell’s role as minority leader. often depends on whether one is in the majority
The so-called fiscal cliff issue was a result of or the minority, many people see the Senate as too
the inability of Congress to deal with the large cumbersome on important matters, and that some
federal deficit in any systematic manner. In 2011, change would be beneficial to the ability of the
Congress struggled to pass legislation to extend Senate to conduct its business. Whether changing
the debt ceiling. As part of the efforts to deal with the time-honored tradition of the filibuster would
that issue, as well as the large deficits, Congress be a positive step in that direction and whether
passed and the president signed the Budget Con- the rights of the minority could be preserved was
trol Act of 2011. The act created what was called the debate.
the Super Committee, a joint select committee, In the end, the outcome of both issues depend
with the mandate to propose a plan that would on the votes of the nation’s elected officials, but
reduce the deficit by $1.2 trillion over 10 years. If there were important public components to both
it failed to do so, a number of fiscal actions would discussions, and the ability to frame the way the
automatically take place beginning in 2013. The issues would be perceived was important.
failure of the committee to develop an acceptable Analysis of McConnell’s Senate Web site, Face-
plan left the nation facing consequences virtu- book, YouTube, and Twitter activity shows that
ally no one saw as desirable. Among the actions both issues were clearly on McConnell’s mind. He
that were to take effect were the expiration of the was frequently quoted in the traditional media on
Bush tax cuts and cuts in a wide range of domes- those issues, and was actively engaged in discus-
tic and defense spending programs. Congress and sions on both. It was also clear that social media
the president, then, spent the time between the were not central to his public approach to these
election of 2012 and the start of 2013 trying to issues. The general pattern McConnell followed
develop an alternative. when he wanted to publicly share something was
Immediately after the election, President to make a statement on the Senate floor, issue a
Obama claimed that his victory meant that he had traditional press release of those comments, and
a mandate for his plan. However, shortly after the then post either the video or the press release to his
election, McConnell posted on his various social various social media. For example, on November
media a link to a Wall Street Journal story where 29, 2012, McConnell issued a press release sum-
he said that he and other Republicans thought marizing his floor comments, called “Raising Tax
that they had a mandate to not raise taxes. Battle Rates During Job Crisis is ‘Last Thing We Want
lines were drawn, and after the president’s success to Do.’” Video of those floor comments were put
with various social media, it would be reasonable on his YouTube page, and the press release was
to expect that the social media would play a role also put on McConnell’s official Web site, his
in this debate. Indeed, the White House got a lot Facebook page, and tweeted. He also broke with
of play out of asking Americans to tweet what his normal pattern and posted the same material
they would do with the $2,000 they would not in his e-mailed newsletter.
lose if Congress immediately extended tax cuts McConnell made no effort to target the con-
for everyone but the wealthy. McConnell’s use tent of his comments on either issue by modifying
of social media, though, was minimal and uncre- the presentation of his views, either by style or
ative by comparison. substance. There is no evidence that he differen-
tiates among issues or his audiences, but rather
Social Media and the Filibuster Issue sees them through the same eyes. He seems to
The filibuster issue arose when, immediately after use these social media because they are there and
the 2012 election, Majority Leader Reid indicated available, but they do not seem to serve any stra-
that he was willing to use the “nuclear option” to tegic purpose.
798 McCotter, Thaddeus

Conclusion YouTube.com “Senate Republican Leader Mitch


In sum, McConnell has a presence across the most McConnell YouTube Channel.” http://www
popular social media, but he is not a major partici- .youtube.com/RepublicanLeader (Accessed
pant. As a summary of his social media presence, May 2013).
McConnell’s Klout score is a modest 45. As com-
parisons, Majority Leader Reid’s is 53, and Sena-
tor Al Franken (D-MN) has a score of 82. McCon-
nell’s use of social media seems to arise from the
necessity of using them, rather than as central to McCotter, Thaddeus
any political strategy. There is never any sense that
McConnell is personally involved in any messag- Republican Thaddeus McCotter served as the
ing. In fact, it seems that the use of the social media Representative from Michigan’s 11th Congressio-
is driven by McConnell’s focus on traditional nal District to the U.S. House of Representatives
media. Nor is there anything particularly creative from 2003 until July 2012, when he abruptly
about his use. He certainly has never done a Red- retired from Congress following a major scandal
dit “Ask Me Anything.” As a Senate leader, he has involving his staff.
good access to the traditional media, and has been Thaddeus “Thad” George McCotter was born
more likely to rely on them rather than to develop August 22, 1965, in Detroit, Michigan. His father,
an independent social media strategy. a public school teacher, died when he was just 13
years old. He attended Detroit Catholic Central
Gary Copeland High School, graduating in 1983. He then gradu-
University of Oklahoma ated summa cum laude from the University of
Detroit in 1987, with a B.A. In 1990, he gradu-
See Also: Boehner, John; Coburn, Tom; Cornyn, ated from the University of Detroit with a J.D.
John; DeMint, Jim; Fiscal Cliff Crisis; Pelosi, Nancy. McCotter entered private law practice after grad-
uation from law school. His wife, Rita Michel
Further Readings McCotter, is a practicing nurse. They have three
Brander, Michael N. Social Media Use in the Federal children and live in Lavonia, Michigan. The fam-
Government. Hauppauge, NY: Nova Science ily is Roman Catholic.
Publishers, 2012.
Facebook.com. “Senator Mitch McConnell.” https:// Political Career
www.facebook.com/mitchmcconnell (Accessed In 1992 McCotter was elected to the Wayne
May 2013). County Commission, which is responsible for
O’Connor, Rory. Friends, Followers and the administering the county government and its
Future: How Social Media Are Changing local services. He served on the commission until
Politics, Threatening Big Brands, and Killing 1998. During his service, he sought to change
Traditional Media. San Francisco: City Lights the county charter to protect taxpayers. His goal
Books, 2012. was to require new taxes be allowed only with an
Senate.gov. “U.S. Senate Republican Leader Mitch approval of two-thirds of the commissioners and
McConnell.” http://www.mcconnell.senate.gov/ 60 percent of the voters. In 1998, McCotter won
public (Accessed May 2013). election to the Michigan State Senate. He served
Teammitch.com. “A Kentucky Story: Team Mitch.” there for four years. Following the 2000 census, he
http://www.teammitch.com (Accessed May 2013). helped to redraw the legislative districts in Michi-
Twitter.com “Senator Harry Reid on Twitter.” https:// gan, including the 11th Congressional District.
twitter.com/SenatorReid (Accessed May 2013). McCotter won the Michigan 11th Congressio-
Twitter.com. “Sen. McConnell Press on Twitter.” nal District seat to the House of Representatives.
https://twitter.com/McConnellPress (Accessed May The district covers Detroit’s northwest suburbs
2013). and includes Livonia, Westland, and Novi. He
Twitter.com. “Team Mitch on Twitter.” https://twitter entered office in 2003, and served until July 6,
.com/Team_Mitch (Accessed May 2013). 2012, when he resigned.
McCotter, Thaddeus 799

Traditional Media Sovereignty Caucus (cofounder), The Interna-


McCotter’s appearances in traditional media tional Conservation Caucus, and the Sportsmen’s
include guest spots on a variety of television and Caucus. The Congressional COPD Caucus is
radio shows. He was a regular on the television focused on chronic obstructive pulmonary dis-
show Red Eye with Greg Gutfeld, and radio talk ease (COPD). The Caucus is linked with the U.S.
show host and comic Dennis Miller hosted him COPD Coalition. The Coalition uses Facebook
on his show numerous times. and is linked to Drive4COPD, which uses a num-
McCotter authored the book Seize Freedom!: ber of social media.
American Truths and Renewal in a Chaotic Age, The House Sovereignty Caucus was founded
which was published by the Intercollegiate Stud- by McCotter, along with another member of
ies Institute. He also wrote for the American Congress. Their goal was to inhibit some in the
Spectator, the Detroit News, Human Events, and government from engaging in agreements with
Andrew Breitbart’s site Big Hollywood, as well as foreign powers that would reduce the sovereignty
many other publications and partisan Web sites. of the United States. The Caucus Web site uses a
number of social media links.
Committees and Subcommittees The International Conservation Caucus is com-
In Congress, McCotter was assigned to the House posed of members of Congress who believe that
Committee on Financial Services. He was a mem- the United States should promote conservation of
ber of three of its subcommittees: the Subcommit- natural resources. The mission of the Caucus is
tee on Capital Markets, Insurance, and Govern- to provide strong American leadership in order
ment-Sponsored Enterprises; the Subcommittee to conserve biologically rich and diverse places
on Financial Institutions and Consumer Credit; around the world. The caucus uses hot links on its
and the Subcommittee on International Monetary site, but does not use any social media.
Policy and Trade. With over 300 members from both the House
The Subcommittee on Capital Markets, Insur- and the Senate, the bipartisan Congressional
ance, and Government-Sponsored Enterprises in Sportsmen’s Caucus (CSC) is one of the largest
the 112th Congress was focused on the financial and most effective caucuses in the Congress. Its
difficulties of the federal lending agencies, Fannie members are from most of the 50 states. The CSC
Mae and Freddie Mac, which were still embroiled has a site with links to commercial sporting out-
in the subprime lending crisis. More specifically, fitters such as Cabela’s. The CSC can be followed
the goal of the Republicans, including McCotter on Twitter and Facebook.
while he served in 2012, was to deal with bailouts McCotter was also a member of the Republi-
for troubled federal agencies. All three subcom- can Main Street Partnership, which is considered
mittees use social media extensively. Besides vid- a moderate group. It uses Facebook, Twitter,
eos, e-mail, and blogs they also use Really Simple and other media. He was also a member of the
Syndication (RSS) feeds, Twitter, YouTube, Face- Republican Study Committee, which is a conser-
book, and live Web casts. vative group. It uses RSS, Twitter, Facebook, and
In addition, there is a link on the official Com- YouTube.
mittee on Financial Services Web site to a “Minor-
ity Site,” which is hosted by the Democrats. Their Campaigns and Elections
site has numerous links, but it does not have as In the 2004 elections, McCotter defeated Demo-
many social media features as the site for the crat Phillip S. Truran from Novi, Michigan. Tru-
majority. The most important social media link is ran was president of the Communications Workers
the RSS link. RSS allows readers such as Google of America Local 4013. He had won the Demo-
Reader or Bloglines to be used to display feeds crat Party Primary with 68.9 percent of the vote,
from multiple Web sites. defeating Mario Fundarski. In the 2006 election
McCotter did not have any Republican opposi-
Caucuses tion to face in the primary. In the general election,
Caucuses to which McCotter belonged included he faced Democrat Tony Trupiano. A progressive
the Congressional COPD Caucus, the House radio talk show host from Dearborn Heights,
800 McCotter, Thaddeus

Twitter, Facebook, RSS, and YouTube. Election as


chairman made McCotter a top-ranking House
Republican. It was a position sought by Congress-
man Darrell Issa of southern California.
In the election of 2008, the Democrat challenger
was Joseph Larkin. He also had to defeat the Green
Party candidate Erik Shelley and the Libertarian
Party candidate John Tatar. He had defeated Tatar
in the 2006 election. McCotter received 51 per-
cent of the vote, which was much better than the
opposition’s fragmented voting returns.
In the election of 2010, Natalie Mosher, a
Democrat, was McCotter’s opponent. She was a
nonprofit organization management consultant
and contractor. She was the first woman to run for
Congress in the 11th District. Her campaign made
extensive use of Twitter. It also used ActBlue,
LinkedIn, and GoDaddy.com. McCotter defeated
her with 59 percent of the vote to her 39 percent.
In May 2011, McCotter made a run for the
Republican nomination for the 2012 presiden-
tial election. A surrogate paid the $18,000 fee to
allow him to enter the Ames Straw Poll auction
in Iowa. On July 2, he announced his presidential
candidacy in Whitmore Lake, Michigan, at a rock
Thaddeus McCotter speaking at the Iowa State Fair in Des music festival.
Moines, Iowa, on August 12, 2011. He lost the Ames Straw Poll, From the beginning of his campaign, McCot-
held the next day, garnering only 0.2 percent of the vote. ter was unable to mount significant interest in his
campaign because of his lack of name recognition.
When the Ames Straw Poll was held in August
2011, he came in last, with less than 1 percent of
Trupiano was not the challenger. John Tatar was the vote. Ending his campaign for the presidential
the Libertarian Party nominee, and Charles Tack- nomination on September 22, 2011, he said that
ett was the U.S. Taxpayers Party nominee. The his candidacy had been hurt by his exclusion from
candidates met for debate at a League of Women the presidential debates and media inattention.
Voters forum in the middle of October. McCotter
won the election with 55 percent of the vote. Social Media Use
The election of 2006 was costly for the Repub- McCotter made extensive use of social media
licans; however, McCotter was confident that he in order to proclaim a conservative message on
would win his re-election. He made a $250,000 issues important to conservatives. He unwaver-
contribution to the National Republican Con- ingly articulated conservative views in every avail-
gressional Committee. After the elections, with able medium via Facebook, Twitter, and Red Eye,
many losses for the Republicans across the coun- as well as traditional media such as Fox News.
try, they found that they were the minority party His 2012 campaign Web site had links to Digg,
in the House of Representatives. McCotter was Facebook, StumbleUpon, Reddit, Twitter, Linke-
elected chairman of the Republican House Policy dIn, Newsvine, Pinterest, Google+, and more.
Committee. The Policy Committee is the princi-
pal forum for Republicans to develop forward- 2012 Scandal
looking and principled policy solutions. Its Web On May 25, 2012, while McCotter was on a con-
site makes extensive use of social media such as gressional trip to Taiwan, Michigan Secretary of
Media and Communication Policy 801

State Ruth Johnson announced that he had failed Media and


to qualify for the Republican primary to be held
on August 7. It was the first time that a sitting Communication Policy
member of Congress had not qualified for his par-
ty’s primary since the 1940s. Communication policies are developed by the gov-
In Michigan, a candidate for a congressional ernment to achieve a specific goal in media indus-
seat has to submit a petition with at least 1,000 tries. They are the result of interactions between
signatures of voters in order to qualify for their government and industry, and reflect the devel-
party primary. McCotter’s 11th District office opment of media technologies. As new forms of
staff had failed him. They had not gathered the media have developed throughout history, so have
necessary signatures, so they had forged or dupli- the ways in which media are regulated.
cated those that were needed. This left McCotter Historian of American media Christopher Ster-
with the option of running as a write-in candi- ling suggests that American communications pol-
date in the primary. As the scandal unfolded, four icy includes private sector ownership and opera-
of McCotter’s district office aides were arrested tion, and public sector regulation and control. He
and charged with multiple counts of voter fraud. proposes that the basic foundation for commu-
Subsequent research found fraudulent names on nications policy in the United States entails two
qualifying petitions for earlier elections. parts of the U.S. Constitution: Article 1 Section 8
On June 2, 2012, McCotter announced that (1789), which gives Congress the power “to regu-
he was not going to seek re-election, but would late Commerce with foreign Nations, and among
complete his term of office. Then, on July 6, he the several States”; and the First Amendment
abruptly announced his resignation from office (1791), which defined government control over
and withdrew to private life. communication content (freedom of speech or of
the press). These areas of the Constitution have
Andrew J. Waskey laid the foundation for media policy in the United
Dalton State College States by defining government regulatory structure
over technology and communication content.
See Also: Bachmann, Michele; Campaigns,
Congressional (2000); Campaigns, Congressional Media Policy Phases
(2010); Campaigns, 2012. Communication policies in the United States can
be defined by three phases. The first phase of
Further Readings media policy was developed to regulate emerg-
Davis, Aeron. Political Communication and Social ing media technologies, such as the telegraph,
Theory. London: Taylor & Francis, 2010. telephony, and wireless communications. Sterling
McCotter, Thaddeus George. Seize Freedom!: suggests that initial legislation on telecommuni-
American Truths and Renewal in a Chaotic cations was concerned with “maritime applica-
Age. Wilmington, DE: Intercollegiate Studies tions of wireless.” These provisions established
Institute, 2011 the requirement for federal licenses to access the
Mergel, Ines and Bill Greeves. Social Media in spectrum. With little regulation, media industries
the Public Sector Field Guide: Designing and developed to form a private monopoly. The gov-
Implementing Strategies and Policies. Hoboken, ernment’s response to this activity was to support
NJ: John Wiley & Sons, 2012. communication policies that enforced an anti-
O’Connor, Rory. Friends, Followers and the trust environment and advance industry compe-
Future: How Social Media Are Changing tition and profitability. As industries developed,
Politics, Threatening Big Brands, and Killing emerging legislation and regulation of the radio
Traditional Media. San Francisco: City Lights during the 1920s and 1930s helped to usher in
Books, 2012. a new form of control where the public’s inter-
Pole, Antoinette. Blogging the Political: Politics and est was prioritized over commercial interests (e.g.,
Participation in a Networked Society. London: the Radio Act of 1912 and the Communications
Taylor & Francis, 2009. Act of 1934).
802 Media and Communication Policy

The second phase of media policy was char- The Internet and Social Media
acterized by sociopolitical concerns, and was Countries around the world have been faced with
influenced by postwar social reform. Concerns the challenge of creating communication policies
over freedom of the press, diversity of voices, to regulate the ways in which the Internet and
providing trustworthy information, and quality social media are being applied for collaborative
programming were all supported by government and personal use. Government regulation of the
regulation. The Federal Communication Com- Internet has dealt with concerns over access to
mission (FCC) made attempts to regulate these information, rights of copyright holders, por-
concerns by reminding broadcasters of their com- nography, privacy, cybercrime, piracy, and ille-
mitment to serving the public (e.g., the 1946 FCC gal downloading, among others. The FCC and
Blue Book). Congress are under pressure to address these
Sterling suggests that from 1956 to 1969 the issues and other concerns that impact the ways in
federal courts and the FCC made a number of which content is used and shared over the Inter-
amendments that impacted these issues, such net (e.g., the 1998 Digital Millennium Copyright
as common carrier regulation. These series of Act [DMCA]).
decisions led to the separation of monopoly-reg- Recently, there has been an increased effort to
ulated services that hindered competitive com- control online activity. The U.S. House of Rep-
petition. Politics of the 1980s in conjunction to resentatives has introduced two bills, the Stop
such rulings later prompted deregulation during Online Piracy Act (SOPA) and the accompanying
the 1990s. The domination of centralized media legislation in the Senate, Preventing Real Online
industries, fragmented audiences, and new com- Threats to Economic Creativity and Theft of Intel-
munication technologies, which defined the lectual Property Act (PIPA). The intent of both
media policy landscape of the 1980s and 1990s, legislations is to combat the sale and distribution
have led to emerging concerns for new commu- of pirated copyright material via the Internet,
nications policy. such as music and movies. However, the bills have
The new communications policy phase is been met with controversy and resistance from
defined by changing social, political, and eco- online creators. Such legislation could eliminate
nomic advances in American society and abroad. sharing and collaboration, which fuel innovation
Technological advances have led the government on the Internet. These debates point to issues of
and industry to be concerned with new interna- censorship and blocking the free flow of informa-
tional markets and economic interests. Global- tion that the Internet provides.
ization has impacted media policy in that it has As social media continue to develop in their
opened the boundaries to share and receive media application and use by individuals, it will become
in different ways. Additionally, the convergence imperative to ensure that policies geared toward
of media has also impacted the ways in which the new medium will be able to delineate the
policy has been defined. The Telecommunications issues of control, censorship, piracy, freedom of
Act of 1996 reflects the growing concern to foster information flow, and diversity of voices. The pol-
competition by deregulating the industry. icy debates will continue as social media provide
Sterling suggests that the government and new common spaces that collapse the traditional
industry now face new concerns with the devel- and new media in reconfigured forms.
opment of new media technologies. The policy
concerns in essence remain the same to the extent Dominique Harrison
to which the government is to ensure the quality Camille Walfall
of services in privately owned and operating digi- Yong Jin Park
tal platforms. The Internet and social media have Howard University
developed in the absence of any regulatory frame-
work; however, emerging concerns over national See Also: Freedom of the Press and National
security, confidentiality, and copyright infringe- Security; Office of Government Information Services;
ment have sparked debates about if and how to Press Freedom and Online/Social Media Security;
regulate the Internet and social media. Social Media and Freedom of Information Act.
Media Research Center 803

Further Readings coverage on a daily basis to detect examples of


Sterling, Christopher H. “Communications Policy.” In bias; the Business and Media Institute, which uses
Encyclopedia of Policy Studies, Stuart Nagel, ed. financial data to promote a free enterprise culture;
New York: Marcel Dekker, 1994. the Culture and Media Institute, which promotes
Sterling, Christopher H., Phyllis Bernt, and Martin B. what are described as “traditional American val-
H. Weiss. Shaping American Telecommunications: ues”; and its Cybercast News Service (CNSNews.
A History of Technology, Policy, and Economics. com), which distributes news programming from
Mahwah, NJ: Lawrence Erlbaum Associates, 2006. a right-leaning perspective.
Van Cuilenburg, Jan and Dennis McQuail. “Media Bozell, who first gained national recognition
Policy Paradigm Shifts.” European Journal of in the early 1980s by working with the National
Communication, v.18/2 (2003). Conservative Political Action Committee, is a
frequent television and talk show guest, where
the conversation usually revolves around media
bias. After developing some political clout by
advancing the Barry Goldwater/Ronald Reagan
Media Research Center movement, Bozell turned to media criticism and
started the MRC in October 1987. In an effort
The Media Research Center (MRC) is a watch- to bring light to the ongoing debate regarding a
dog advocacy group that uses its multiple divi- left-wing bias in the media, Bozell and his team
sions to research and report on cases of possible became pioneers in supporting their claims about
liberal bias in the news media. Founded in 1987 an oft-debated issue with credible and reliable
by L. Brent Bozell III, the MRC has gained noto- scientific data falling within established margins
riety by its extensive quantitative and qualita- of error.
tive research projects that commonly analyze the Supporting his claims with data has not pre-
newscasts of major broadcast and cable news net- vented numerous news media operations and
works. MRC researchers often employ content other left-wing advocacy groups from lambast-
analysis, looking for examples of bias in the news ing Bozell as also having biases. That criticism
media through the selection of stories, sources, from the left, however, is what helped Bozell
and reporters’ word choices, among many other turn his former grassroots operation into an
aspects of their coverage. influential Washington political force. In 1995,
Newspapers and their online companions, the Bozell once again became a lightning rod of criti-
New York Times in particular, are also frequent cism when he parlayed his growing status in the
targets of the MRC’s pursuit of exposing a left- media to found the Parents Television Council
wing agenda in newsrooms across the country. (PTC). This group, a joint effort with the Catho-
While many journalists and academics contend lic League, gained attention for castigating the
that there is no liberal bias, the MRC backs its landscape of broadcast television programming
claims with research that it displays on its Web as less than family friendly.
site and distributes through numerous social Syndicated radio host Rush Limbaugh often
media platforms. The Alexandria, Virginia, based references Bozell and the MRC’s research when
organization has effectively used the Web and he criticizes the left-wing establishment. Other
social media to bypass the many traditional media conservative media figures such as Ann Coulter,
outlets it routinely critiques. The MRC’s popular Mark Levin, and William Bennett routinely laud
Twitter account @newsbusters, with over 68,000 the MRC’s work on radio, television, and the
followers, tweets numerous links a day that illus- Web. Bozell is also a frequent commentator on
trate examples of biased media coverage. It also FOX News, the highly rated Sean Hannity pro-
employs e-mail blasts and e-newsletters to drive gram in particular. FOX programming provides
traffic to its Web site. Bozell and other MRC representatives an outlet
Structurally, the MRC is broken into multiple to identify examples of mainstream media mem-
divisions, including: the News Analysis Divi- bers acting in a manner sympathetic to the liberal
sion, which monitors print and electronic media point of view. According to the MRC, a common
804 Medicare

perpetrator of using a liberal agenda in the guise to become a key figure in the partisan wars of
of objective reporting is NBC and its cable com- today’s media culture. In less than 30 years, it has
panion MSNBC. evolved into one of the country’s most recognized
Aiming its criticism at MSNBC, in turn, has political think tanks and advocacy groups.
given Bozell and the MRC plenty of attention
on FOX’s rival network. MSNBC often bases its Aaron J. Moore
criticism of Bozell and the MRC as just mouth- Rider University
pieces of conservative ideology with flawed
research methods. Other vociferous opponents See Also: Association of Internet Researchers;
of the MRC include left-wing groups such as Citizen Journalism; Ethics of Social Media in Politics.
Media Matters and FAIR (a similar organization
that researches media content). Liberal publica- Further Readings
tions, including Mother Jones and the Huffing- Bozell, Brent L. Weapons of Mass Distortion: The
ton Post, contend that Bozell’s research methods Coming Meltdown of the Liberal Media. New
are skewed in order to represent that a liberal York: Three Rivers Press, 2005.
bias exists. D’Allessio, Dave and Mike Allen. “Media Bias in
In spring 2013, the trial of Dr. Kermit Gos- presidential Elections: A Meta-Analysis.” Journal
nell, a Philadelphia-based doctor who performed of Communication, v.50/4 (2000).
numerous late-term abortions, served as a focal Groseclose, Tim and Jeffrey Milyo. “A Measure of
point of the MRC’s contentions of a biased Media Bias.” Quarterly Journal of Economics,
news media. Bozell contributed to a letter writ- v.120/4 (2005).
ten to the broadcast networks, calling on them
to “stop censoring coverage of the trial.” The
MRC’s research demonstrated that ABC’s Good
Morning America and World News Tonight gave
the sensational Gosnell story a blackout of news Medicare
coverage, while CBS and NBC awarded it minis-
cule coverage. In particular, MRC research found Medicare is the federal health insurance program
that Good Morning America devoted 109 min- for people who are 65 or older, those under 65
utes over a 42-day period to other sensational with certain disabilities, and people with end-
trails occurring at the time, including the one of stage renal disease. Since its implementation in
Amanda Knox, but absolutely zero time for the 1965 under Title XVIII of the Social Security
controversial Gosnell case. The MRC contends Act, Medicare has become a social insurance pro-
that the networks avoided the gruesome details gram that provides health and financial security
of the Gosnell trail in order to protect the liberal for vulnerable members of the population. Espe-
narrative regarding abortion that they prefer to cially considering the fact that roughly half of
provide viewers. all seniors did not have medical insurance prior
A year prior to the Gosnell case, the MRC used to 1965, it is no exaggeration to state that the
the Trayvon Martin case to identify flawed main- Medicare program dramatically improved access
stream news coverage regarding racial issues. In to medical care for a vulnerable and underserved
April 2012, the MRC called upon Congress to: population. Medicare provided health insurance
coverage to 47 million people in 2010, includ-
. . . investigate Comcast/NBC News for the ing virtually all seniors (39 million), as well as
intentional editing of the George Zimmerman 8 million people under age 65 with permanent
audio that was broadcast multiple times and disabilities.
subsequently flamed the fires of racial hatred
and animosity. Overview
The current Medicare program covers a range
Applauded by the right while chastised by the of health care services, including hospitaliza-
left, the MRC has received the attention it needs tions (Medicare Part A, hospital insurance),
Medicare 805

outpatient physician services (Medicare Part a heated discussion between conservative and
B, medical insurance), and prescription drugs liberal bloggers. The New Media Index from the
(Medicare Part C, prescription drug coverage). Pew Research Center’s Project for Excellence in
Medicare is primarily financed through general Journalism indicates that the debate over the Lie
revenues, payroll tax revenues, premiums paid of the Year for 2011 was one of the most dis-
by beneficiaries, and other sources. Medicare has cussed topics in social media platforms.
been generally well received by the public, while Estimated to cost $617 billion in 2015, Medi-
facing real changes of rising cost and funding care influences millions of beneficiaries and is a
limits. Due to increasing health care costs and key payer in the U.S. health care system. Needless
a rapidly aging U.S. population, total Medicare to say, many constituency groups have a vested
spending is projected to be a much larger part of interest in Medicare reform and are active on
the federal budget, increasing from $523 billion social media. KBM Group, a research and con-
in 2010 to $932 billion by 2020. Indeed, the Pew sulting organization, issued a Listening Report
Research Center released a 2006 report stating of Medicare-related activities on social media,
that 62 percent of the public said addressing which found that the majority of conversations
Medicare’s financial problems should be a high are made by Medicare experts, followed by lay-
priority for the government. persons wanting more information. There are also
Besides the financial issues, Medicare and its professional bloggers and journalists, who use
operation are controversial topics among many social media forums to publish opinions on the
citizens. The Medicare Part D coverage gap, also topic. The most frequently used social media sites
known as the Medicare donut hole, was one of include Twitter and Facebook, which account for
the most problematic parts of the Medicare pro- nearly half of the Medicare-related conversations
gram. The coverage gap is a temporary limit on on social media.
what the drug plan will cover. The Patient Pro- Currently, a wide range of Medicare interest
tection and Affordable Care Act (ACA)’s pro- groups are active on social media outlets. AARP,
posal was to gradually offer coverage to those a nonprofit organization for the elderly, has been
affected by the donut hole, starting in 2010, and active in the ACA and Medicare debates and
to completely close it by 2020. As a result of offers interactive features on its Web site, includ-
this measure, Medicare beneficiaries had saved ing a donut hole calculator. Its earnedasay.org
$4.1 billion on prescription drugs as of August Web site is a one-stop resource where the public
2012, making it a strong selling point of the new can voice their opinions through questionnaires
legislature. and discussion boards and see arguments for and
against changes considered for Medicare. With
Role of Social Media interactive features such as fact maps, videos, and
On the issue of Medicare, social media are often links to state-specific information on Medicare,
used to reflect public opinions or concerns. Espe- the site gives a voice in Medicare’s future to the
cially since the ACA passed in 2010, Internet elderly group who are relatively new to the social
users have been voicing their support or frustra- media world.
tion on blogs, Twitter, and Facebook. For exam- It is projected that Medicare beneficiaries are
ple, when Republican Paul Ryan of Wisconsin more likely than ever before to take an active role
offered a 2011 budget proposal titled “The Path in their health care, and are using social media
to Prosperity,” which would keep Medicare intact as tools for empowerment and engagement. A
for people 55 or older but make dramatic changes Pew research report indicated that 32 percent of
on the program for everyone else by privatizing the Medicare population turned to social media
it and providing government subsides, Democrats for health care purposes in 2011. Seniors are
responded with the statement that “Republicans often engaged with social media to search for
voted to end Medicare.” When this Democratic advice on Medicare and share their experiences.
Party’s claim was named the “Lie of the Year” According to the KBM Group’s report on Medi-
for 2011 by the PolitiFact.com Web site, a Pulit- care consumers, prescription coverage (Part D)
zer Prize­–winning fact-checking site, it triggered and Medicare Advantage (Part C) are the most
806 Medicare

Twitter accounts, offering features such as edu-


cational workshops. However, these social media
activities mostly rely on a one-way and top-down
communication style, and may fall short of facili-
tating public participation and social interactions.
For instance, the official Medicare blog site cur-
rently does not allow users to comment on posts.
The official UnitedHealthCare group’s Medicare
Facebook does not allow Facebook users to cre-
ate original posts, and when users respond to a
post, they usually do not receive comments from
the page.

Conclusion
Social media have the potential for facilitating civic
engagement, thanks to their collaborative and par-
ticipatory nature. If social interaction is limited or
nonexistant, the potential cannot become a real-
ity. Social media are not merely marketing or
educational tools anymore; they are evolving into
social interaction tools that encompass a range of
services. As stated by Ann Sherry, senior director
of Kaiser Permanente’s Internet services, people
“want and need different tools and different inter-
actions. To say we are going to have a social media
Secretary of the U.S. Department of Health and Human strategy would not be enough—it’s much more
Services Kathleen Sebelius personally greeting senior citizens in than media, it’s a social strategy.”
Washington, D.C., during an information session on Medicare
coverage and open enrollment in November 2010. Min Liu
Southern Illinois University Edwardsville
Jina Yoo
University of Missouri–St. Louis
prevalent topics discussed among seniors on
social media sites. See Also: AARP; Age; Health Care;
To comply with President Obama’s open gov- OpenGovernment.org; Social Security; Taxes.
ernment initiative, which focuses on implement-
ing the principles of transparency, participation, Further Readings
and collaboration, many federal agencies started Kaiser Family Foundation. “Medicare: A Primer”
leveraging social media tools. The Centers for (2010). http://www.kff.org/medicare/upload/7615
Medicare and Medicaid Services also adopted -03.pdf (Accessed December 2012).
various forms of social media platforms includ- KBM Group. “The Medicare Consumer Online:
ing their official Web site (http://www.medicare. Listening to the Conversation.” http://www.kbmg
gov/), blog (http://blog.medicare.gov/), official .com/wpcontent/uploads/2011/11/KBMG_listening
YouTube page (http://www.youtube.com/user/ _report_102520111.pdf (Accessed December
cmshhsgov), and official Twitter account (https:// 2012).
twitter.com/CMSGov). PwC Health Research Institute. “Social Media ‘Likes’
Private organizations are also responding to Healthcare: From Marketing to Social Business”
the trend of being present and accessible on social (2012). http://www.pwc.se/sv_SE/se/bioteknik/
media. The UnitedHealthCare group launched a assets/social-media-healthcare.pdf (Accessed
blog, as well as official Facebook, YouTube, and December 2012).
Meetup.com 807

Meetup.com can search for 19 local meetups around all kinds


of interests, including outdoor activities, games,
Meetup.com provides an opportunity to find and languages, animals, and technology. Meetups
join local groups of people who are interested in take place in thousands of cities at bookstores,
meeting to discuss common interests. A meetup is cafés, restaurants, pubs, and other settings. To
a group of people that come together in the physi- ensure the privacy of participants, Meetup gath-
cal, rather than the virtual environment to social- ers no data about individuals’ demographics, and
ize around a common interest. Meetup.com is a Meetup managers do not actually know precisely
for-profit Internet company launched in summer who attends what meetups.
2002 to enable users to find others nearby who Meetup can be said to be important in two
want to meet monthly about any one of a myriad dimensions: first, through the meetups themselves,
of potential common interests. Meetup.com does participants might expand their social networks,
not decide what the list of potential topics will sometimes in ways that cut across race, class and
be, and is willing to add any meeting topic that local geography; second, either directly or indi-
is not pornographic, hate-based, or promoting rectly, it is possible that through the meetups,
illegal activity. Users enter their ZIP code or their participants may take collective action or increase
city and the topic they want to meet about, and their political power by aggregating their interests.
the Web site helps them arrange a place and time An early use of Meetup in political campaigns
to meet. Topic listings are also available for users was in the 2004 presidential primary campaign
who only enter a location. of Democrat Howard Dean. However, meetups
were not envisioned as political. As founder Hei-
Background ferman commented, “We never thought it would
The idea for Meetup.com has an interesting his- be used for politics. We figured that we would
tory, and came about in the months following attract Lord of the Rings geeks and poodle own-
the terrorist attacks of September 11, 2001. Scott ers.” Some speculated that political Meetups
Heiferman, cofounder of Meetup.com, lived a would not continue after the ill-fated Dean cam-
few miles away from the World Trade Center in paign ended, but the number of meetups has con-
New York at the time, and he noticed a change in tinued to grow, albeit unevenly. Political meetups
the people around him in the months after 9/11. accounted for less than 15 percent of all meetups
He found himself talking to neighbors and people by February 2005, but Heiferman claims that the
around the city more than ever before. Prior to Tea Party was born on the site.
this, he did not place a high value on face-to-face Out of the 2012 presidential candidates, only
interaction, because he felt the Internet provided Ron Paul inspired a great number of meetups.
enough opportunity for interaction through infor- Three things seem especially interesting about
mation sharing and communication. He noticed political meetups: these meetups tend to be left-
an important change in the feeling of the city, and leaning, political meetups tend to be dissimilar to
thought this terrible event, 9/11, could be the cat- other meetups, and meetups are not as candidate-
alyst for bringing people together. Heiferman was specific as may be expected.
also motivated to start Meetup.com after reading
Robert Putnam’s Bowling Alone, since he thought Sule Yüksel Özmen
he had a technological answer for how to use the Karadeniz Technical University
Internet to build more social capital. The Web site
was launched a few months later. The stated mis- See Also: Campaigns, Grassroots; Campaigns,
sion of Meetup is to “revitalize local community Presidential (2004); Social Networking Web Sites;
and help people around the world self organize.” Tea Party Movement.

Influence Further Readings


Meetup boasted 13.4 million members in April Butterfield, Adam D. Ethnographic Assessment of
2013, organized into 105,000 groups in 45,000 Quantified Self Meetup Groups. San Jose, CA: San
cities around the world. On Meetup.com, anyone Jose State University, 2012
808 Membership Communications Project

Conners, Joan. Meetup, Blogs, and Online mundane mobilization tools, but instead were
Involvement: U.S. Senate Campaign Websites concentrated on emerging technologies utilized in
of 2004. The Annual Meeting of the American mobilization efforts such as blogs, YouTube, and
Political Science Association, Washington, DC, social networking sites.
Panel 1–4. September 4, 2005. Karpf also realized that the only extant empiri-
Kelsey, Todd. Social Networking Spaces: From cal analysis of e-mail communication related to
Facebook to Twitter and Everything Between. New activist groups, namely Stuart Schulman’s “The
York: Apress, 2010. Case Against Mass E-Mails,” published in Pol-
Meetup Official Web Site. “About Meetup” http:// icy and Internet in 2009, was in fact a dismissal
www.meetup.com (Accessed November 2012). of e-mobilization via e-mail. Schulman reviewed
Sander, Thomas H. E-Associations? Using Technology hundreds of thousands of comments submitted by
to Connect Citizens: The Case of Meetup.com. MoveOn.org in federal agency rulemaking pro-
The Annual Meeting of the American Political cesses related to environmental issues, and evalu-
Science Association, Washington, DC, Panel 40-3. ated the comments gathered by this activist group
September 4, 2005. from the general public as mostly redundant and
Sifry, Micah, “From Howard Dean to the Tea Party: overwhelmingly insubstantial. Based on this data,
The Power of Meetup.com.” http://edition.cnn Schulman asserted that mass e-mail campaigns
.com/2011/11/07/tech/web/meetup-2012-campaing to collect public remarks for influencing decision
-sifry/index.html (Accessed November 2012). makers constituted a clicktivism that by soliciting
quick online activity was killing traditional activ-
ism grounded in collective action.
Based on his experience as national campaign
director for the Sierra Student Coalition (the stu-
Membership dent-run arm of the Sierra Club) at the end of the
1990s, Karpf agreed with Schulman’s assessment
Communications that comments collected by advocacy groups were
Project high-volume and low-quality, but disagreed with
Schulman’s statement that such comments had
David Karpf developed the Membership Commu- negative consequences for citizen engagement.
nications Project (MCP) to provide the research Karpf had two arguments for rebutting Schul-
community with an open data resource useful man’s theory: He viewed e-comments gathered by
for understanding how advocacy groups utilize groups like MoveOn.org in recent years as differ-
e-mail in communicating with their memberships. ent in degree, but not in kind, from photocopied
Karpf, currently an assistant professor in the and faxed petitions and postcards collected by
School of Media and Public Affairs at the George groups like the Sierra Student Coalition several
Washington University, created the MCP dataset decades ago; and he considered a high-volume
in 2010, when he was a postdoctoral research and low-quality action (either offline or online) as
associate at Brown University’s Taubman Center a single tactic in the strategic repertoire of advo-
for Public Policy and American Institutions. cacy groups, rather than an entire campaign orga-
While working on his doctoral dissertation at nized by any advocacy group.
the University of Pennsylvania in 2009, Karpf Karpf’s research was aimed both at shifting
noted that despite the centrality of e-mail com- scholarly attention from technologies for mobi-
munication to the work of advocacy groups, there lization to tools of e-mobilization, and at provid-
was little systematic analysis in the research lit- ing empirical evidence for his counterarguments
erature of how such groups employ the medium. to Schulman. Karpf’s doctoral dissertation, titled
Karpf also discovered that, although advocacy “Unexpected Transformations: The Internet’s
professionals had cultivated a set of best prac- Effect on Political Associations in American Poli-
tices in the areas of list building, e-mail fundrais- tics,” was a qualitative study of advocacy groups’
ing, and online-to-offline engagement, academic usage of e-mail as part of their campaigns, pro-
researchers were not focused on any of these viding an initial set of evidence and an initial
Membership Communications Project 809

analysis. However, during his postdoctoral stud- between organizations and their membership,
ies, Karpf decided to pursue a quantitative test of because organizations segment their lists in vari-
his previous qualitative observations, and as such ous ways.
he started the data aggregation project that has The first dataset of the Membership Commu-
come to be known as the Membership Communi- nications Project was collected during the six
cations Project. months from January to July 2010, and is com-
On January 21, 2010, Karpf created an e-mail posed of 2,161 e-mails sent by 70 advocacy orga-
account via Gmail. He also identified a network nizations. This first dataset was utilized by Karpf
of 70 prominent leftwing advocacy organiza- as evidence for his article “Online Political Mobi-
tions, visited their Web sites, and signed up for lization from the Advocacy Group’s Perspective:
e-mail lists or outreach efforts provided through Looking Beyond Clicktivism,” published in Policy
those sites. This was meant to answer the ques- and Internet in 2010, as well as for his book The
tion: “What do groups actually ask their online MoveOn Effect: The Unexpected Transformation
supporters to do?” For the first two weeks of data of American Political Advocacy, published by
collection, Karpf used a broad descriptive classifi- Oxford University Press in 2012.
cation scheme, then refined it to a set of categories Meanwhile, the Membership Communica-
based on commonalities between e-mails. The cod- tions Project has become an ongoing effort that
ing scheme resulting from this process included: gathers mass membership e-mails sent by the
date, organization, topic, digest/commentary/e- selected organizations. As Karpf stated in the
newsletter, action ask, fundraising ask, request for article “Social Science Research Methods in
member input, and media agenda link. Internet Time,” published in Information, Com-
Karpf encountered three hurdles in design- munication, and Society in 2012, the project pro-
ing the dataset: identification of an appropriate vides valuable data not only to its creator, but
sample of advocacy groups; deciding what to do also to scholars who want to know how advo-
about conservative groups; and accounting for cacy groups mobilized around Obama’s Health
limitations created by proprietary data. Because Care Reform bill or reacted to the Gulf Oil Spill.
he was interested in organizations seeking to Such data was public because it arrived on a
mobilize public pressure to affect policy deci- daily basis in tens of millions of inboxes around
sions out of concern for the public good, Karpf the world, but would have disappeared from the
understood that sampling from directories of Web, had it not been saved in this dataset.
Washington lobbying organizations and politi-
cal action committees would not help because Sorin Nastasia
these represented businesses and other private Southern Illinois University Edwardsville
interests.
To create a relevant sample, Karpf included See Also: Activists and Activism, Digital;
49 groups from a list provided by Elizabeth Clicktivism; E-Democracy; Fund-Raising.
Payne, former director of the Democracy Alli-
ance, in her book The Practical Progressive, and Further Readings
21 groups of well-known members of the politi- Karpf, David. “Advocacy Group Communications
cal left, human rights groups, and environmental in the New Media Environment.” Presentation
organizations. However, when making the selec- at the Political Communication Preconference
tion, Karpf left out advocacy groups representing of the American Political Science Association,
the political right because he found these to have Washington, DC, September 2010.
little connection with human and environmen- Karpf, David. The MoveOn Effect: The Unexpected
tal advocates, and to have vertical rather than Transformation of American Political Advocacy.
horizontal structures. Critics of Karpf’s work New York: Oxford University Press, 2012.
have suggested that this is a significant oversight. Karpf, David. “Online Political Mobilization From
Additionally, when collecting the data, Karpf the Advocacy Group’s Perspective: Looking
remained aware that such a dataset could not Beyond Clicktivism.” Policy and Internet,
offer an exhaustive list of e-mail communication v.4/2 (2010).
810 Meme Mapping

Karpf, David. Unexpected Transformations: The


Internet’s Effect on Political Associations in
American Politics (unpublished dissertation).
Philadelphia: University of Pennsylvania, 2009.
Nielsen, Rasmus Kleis, “Mundane Internet Tools,
Mobilizing Practices, and the Coproduction of
Citizenship in Political Campaigns.” New Media
and Society, v.13/5 (2011).
Payne, Erica. The Practical Progressive: How to Build
a Twenty-First Century Political Movement. New
York: PublicAffairs, 2008.
Schulman, Stuart. “The Case Against Mass E-mails.”
Policy and Internet, v.1/1 (2009).

Meme Mapping
In 1976, Richard Dawkins proposed that the term
meme be used to describe pieces of information or
elements of a culture that travel through networks
in different forms. Online memes, like lyrics from a
popular song, behaviors, pranks, or part of a pop- President Barack Obama joins in on a meme in this November 15,
ular dance, travel through human and online net- 2012, photograph at the White House with U.S. Olympic gymnast
works via online videos, static images with words, McKayla Maroney as they both make her “not impressed” facial
sequences of animated GIFs displaying the lyrics, expression, which went viral during the 2012 Olympics.
or videos that use the lyrics. Memes also include
slight changes to the tune, tone, dance, and style
to convey new meanings as the spread of the origi-
nal meme increases over time. Memes are also fre- meme. This process is also useful for understand-
quently created by users to express their reactions ing how some memes travel through different
to political campaigns, party platforms, candidate cultures or regions more readily than others. For
impressions, and some memes “go viral,” spread- example, during the 2012 U.S. Republican Party
ing to larger online user communities. convention, Hollywood movie star Clint East-
Memes travel like viruses, spreading and chang- wood enacted a scene involving a conversation
ing as online users adapt and display them on a with an empty chair. During the television broad-
number of social media sites. When memes are cast of the event, the term Eastwooding began cir-
uploaded to the Internet, users can share and for- culating on social media sites like Twitter, Reddit,
ward the memes to one another, further propagat- and Facebook. Eastwooding, a meme that came to
ing the cultural idea within the image, audio, text, be understood as speaking or scolding an empty
or video. John Paull outlined meme mapping as a chair, quickly became viral.
process whereby the origins and spread of a meme In order to trace the spread of a meme to create
might be traced in order to understand how the a meme map and understand the development of
cultural elements move through different com- the example above, the point of origin would first
munities and change over time. Paull describes his be entered into any computer program or online
process as one that aids researchers in the ability tool that creates graphic, visual displays of plot
to trace not only the spread of the meme through pointed information. Researchers search online
the Internet, but also aids in the identification of for the meme using several keywords or search
the events that may have led up to the birth of the terms related to the meme in order to trace the
Menendez, Robert 811

popularity of the trend over time. For example, Salingaros, Nikos. A. A Theory of Architecture.
several online programs can be used to enter Solingen, Germany: Umbau-Verlag, 2008.
multiple search terms in order to trace the terms’
popularity based upon regional locations and
time ranges. This information can be used to plot
points on the visual meme map to display the ori-
gin of the specific meme, its spread over time, and Menendez, Robert
any spikes in popularity during particular dates
or times. This information also can be used to dis- Robert “Bob” Menendez is the junior U.S. Sena-
play the particular sites through which the meme tor from New Jersey. A Democrat, he entered the
traveled and provide insights into the particular Senate by gubernatorial appointment in January
cultural element’s spread through specific online 2006 to complete the term of Jon Corzine, who
communities or regions. had resigned with one year of his term unfinished.
While itis may not be possible to trace the entire In the general election of November 2006 Menen-
spread of a meme through the Internet, it is feasible dez won a full six-year term. In 2012, he was re-
to trace how the meme travels and changes over elected.
time in order to gain a broader understanding of Menendez was born on January 1, 1954, in
the reach of the element and popularity of spread New York City. His father Mario Menendez was a
through particular platforms. In the example carpenter, and his mother Evangelina was a seam-
above, similar to the structure of a virus, the base stress. His parents had left Cuba in 1953, just a
element of a person speaking to an empty chair few months before his birth. The family eventually
was shared, and users then created pictures of moved to Union City, New Jersey, where he grew
themselves scolding chairs, fake Twitter accounts up. He was the student body president at Union
for the chair, live streaming events of empty chairs, Hill High School. After graduating from Union
built toy representations of the event, and other Hill, he entered Saint Peter’s College in Jersey City.
visual representations of this unique cultural ele- While in college, he joined Lambda Theta Phi Latin
ment. These are just a few examples of how one Fraternity. He graduated with a bachelor’s degree
cultural element circulates online and changes in political science. In 1979 he was awarded a J.D.
through subsequent user interactions. from Rutgers School of Law. In 1980, Menendez
Meme mapping enables researchers to trace was admitted to the New Jersey Bar.
such changes, and provides a broader understand- In 1973, Menendez led a petition drive against
ing of how cultures share information with one the Union City Mayor, William V. “Billy” Musto
another and between cultures. The visualization of (1917–2006). Menendez was still a student at
the spread of the cultural element, traced through Saint Peter’s College and just 19 years old; how-
a meme map, provides a visually dynamic way to ever, his petition drive was successful. The peti-
understand a meme’s growth over time and the tion’s goal was the reform of the Union City
popularity of particular meme variants. board of education. Even though he had opposed
Mayor Musto, this did not end their mentor-
Jennifer Ware ing relationship because Menendez served as a
University of North Carolina at Chapel Hill mayor’s aide. Menendez married Jane Jacobsen
in 1976; she was a teacher with the Union City
See Also: Artists and Social Media in Politics; Data Board of Education. They had two children, but
Mining; Going Viral; Trending Topic. divorced in 2005.

Further Readings Political Career


Dawkins, Richard. The Selfish Gene. Oxford, UK: In 1978, Menendez supported Mayor Musto
Oxford University Press, 1976. when he ran for re-election to the New Jersey
Paull, John. “Meme Maps: A Tool for Configuring Senate. In 1982, he unsuccessfully ran against
Memes in Time and Space.” European Journal of Mayor Musto, who was such a popular politi-
Scientific Research, v.31/1 (2009). cian that on the day he was sentenced to federal
812 Menendez, Robert

prison for racketeering, he was re-elected mayor. Menendez the sixth Hispanic to serve in the Sen-
Musto had simultaneously been mayor of Union ate. The appointment was to fill the remaining
City and a New Jersey legislator. In New Jersey, year of Corzine’s unexpired term. The Senate seat
election to the New Jersey General Assembly was open for election for a full six years in the
while holding another office such as mayor has 2006 general election. In that contest, Menendez
been a common practice. In 1986, Menendez defeated Republican Thomas Kean, Jr. Kean was
again ran against Musto for the office of mayor the minority whip in the New Jersey Senate. He
of Union City; this time, Menendez won. He was also the son of a former governor of New
served as mayor until 1992. Jersey, Thomas Kean.
Menendez served in the New Jersey General During the campaign, Menendez became
Assembly from 1987 until 1991. In 1991, he embroiled in a controversy over a house that he
was elected to the New Jersey Senate to fill the had once owned and lived in with his family in the
vacancy caused by the death of Christopher Jack- two stories above the ground floor where he had
son. He served until 1993, when he moved to the his law practice. This was the same arrangement
U.S. House of Representatives. used by a physician who was the previous owner
Congressman Frank Guarini of New Jersey’s of the house. When the family moved to another
14th District to the U.S. House of Representatives house, Menendez rented it to a nonprofit agency.
decided in 1992 to retire. In the realignment of Since the terms of the lease allowed Menendez to
districts following the 1990 census, the old 14th receive a percentage of the federal funding that
District was eliminated. Its territory was placed was received by the North Hudson Community
into a new 13th District. The reapportionment Action Corporation, there was the appearance of
of the district changed its demographics into a impropriety. A federal investigation began to see
majority Hispanic district. if he had improperly profited at taxpayer expense.
In the Democratic Party primary in 1992, While Menendez had profited, there was insuffi-
Menendez defeated Robert Haney, Jr. The vote cient evidence of wrongdoing to bring charges.
was 68 percent for Menendez to Haney’s 32 Despite the controversy over the rental prop-
percent. In the November general election, he erty, Menendez was helped in his campaign by the
won 64 percent of the vote. In the subsequent endorsement of the New York Times, the Phila-
elections in 1994, 1996, 1998, 2000, 2002, and delphia Inquirer, and other newspapers. The vote
2004, he won re-election with 71 percent or in the 2006 general election was 53 percent for
more of the vote. Menendez and 45 percent for Kean.
In 1995, Menendez had considered running for
the U.S. Senate following the retirement of Sena- 2012 Election
tor Bill Bradley, a Democrat. He decided not to In 2012, Menendez ran unopposed in the Dem-
resign his seat in the House of Representatives, ocrat Party primary. However, the Republican
and instead supported the senatorial campaign primary was wide open. The Republicans fielded
of Robert Torricelli, also a Democrat. In 1999 a large number of potential candidates includ-
Menendez again considered running for the office ing Diane Allen, New Jersey state senator; Chris
as a senator from New Jersey to the U.S. Sen- Christie, governor of New Jersey; John Crowley,
ate. The occasion was the retirement of Senator a biotech company executive; Michael Doherty,
Frank R. Lautenberg, also a Democrat. Again, he New Jersey state senator; Tim Smith, financial ser-
decided that the time was not right for making vices executive; and Jay Webber, New Jersey state
this race for office. assemblyman. All declined to enter the race. This
was despite speculation by the New York Times
U.S. Senate that Governor Christie, who was guiding a newly
In January 2006, Menendez was appointed to energized New Jersey Republican Party, could do
the U.S. Senate by Jon Corzine, who was vacat- well in the race because early polling suggested
ing the seat to become governor of New Jersey. that Menendez could be vulnerable.
The appointment was well received by a num- Ian Linker, a lawyer; and Anna Little, the
ber of Latino groups. The appointment made former mayor of Highlands, New Jersey, both
Menendez, Robert 813

withdrew from the race. David Brown, an inven- Minor party candidate Daryl Mikell Brooks
tor; Joseph Kryillos, a New Jersey state senator (Reform Nation) had a thin candidate’s Web site
from the 13th District; Bader Qarmout, a busi- without any obvious social media. The American
nessman; and Joseph Rullo, also a businessman, First Party candidate, Inder “Andy” Soni, did not
all engaged in the primary process on the Repub- use social media, although he did post an adver-
lican Party side. The winner of the Republican tisement on TeaPartyCheer.com.
primary was Joseph Kryillos. In the general elec- Some independent candidates used social
tion on November 6, 2012, Menendez defeated media; whereas others used it sparingly if at all.
Republican Party opponent Joseph Kryillos and a Totally Independent candidate J. David Dran-
small host of minor party candidates. ikoff used a Twitter account for campaigning.
He was featured on the news site njspotlight
Social Media Use .com. Independent Eugene Martin Lavergne had
During the 2012 campaign, Menendez engaged a personal Facebook page, but did not seem to
in three debates with the other candidates. The use any social media, other than also advertis-
first debate was at Montclair State University. It ing on TeaPartyCheer.com, which costs $500 per
was held on October 4, 2012, with only Menen- month. Robert “Turk” Turkavage established a
dez and Kyrillos debating. The second debate campaign Web site. He allowed followers to post
was held on October 10, 2012, at the New Jer- replies, follow him on Twitter and Facebook, and
sey 101.5 (WKXW) radio station at Ewing near use RSS feeds.
Trenton. The third debate was on October 17, at Menendez was able to outstrip his opponents
Mercer County Community College. in fundraising by better than $3 to their $1. He
While the debates were traditional forms of had over $10 million, compared to Kyrillos’s $3
campaigning from which the minor party can- million. The minor party candidates had only a
didates had been excluded, Menendez also used few thousand dollars at most. Menendez won
social media for campaigning. His 2012 campaign a second term in the Senate, with 58.4 percent
Web site used both Facebook and Twitter. His site of the vote compared with Joseph Kyrillos’ 39.9
offered forms for those wishing to volunteer or percent. The minor party candidates captured the
for donors to use a credit card to give. The site remaining 2 percent of the vote.
was also available in Spanish. The Senate Web page for Menendez uses Face-
Joseph Kryillos, Menendez’s Republican oppo- book and Twitter. It also has a “Press Kit” link
nent, used more social media than Menendez. that goes to a “share” link with hundreds of social
Kryillos’s site used Twitter, Facebook, RSS, and media and other links available.
e-mail. His site allowed volunteering and dona- Menendez is on three Senate standing commit-
tions. Over 8,000 donors contributed to his tees. The Banking, Housing and Urban Affairs
campaign, which was hurt by the disruption and Committee does not use social media, nor does the
destruction caused by Hurricane Sandy. Subcommittee on Housing, Transportation, and
Some minor (third) party candidates also used Community Development, of which he is the chair-
social media. Libertarian Party candidate Ken- man. He also serves as a member of three subcom-
neth R. Kaplan used social media links on his mittees of the Senate Finance Committee, which
campaign site. Besides Facebook and Twitter, also does not use social media on its page. The
there were links to Google, Kaplan’s biography on Senate Foreign Relations Committee has four sub-
Wikipedia, and the Libertarian Party’s Web site. committees on which Menendez serves. This com-
Socialist Party candidate Gregory Pason used the mittee also does not use social media, nor do any
same social media links of Facebook and Twitter of the subcommittees on which Menendez serves.
on the Socialist Party site. Menendez belongs to several Senate caucuses.
The Green Party candidate, Ken Wolski, used The Congressional Armenian Caucus does not
Facebook on his candidate’s site. It also had links have a Web site, but is discussed in a number of
to RSS and other media. Gwen Diakos, candidate online sites. The Congressional Autism Caucus
of the Jersey Strong Independents, used YouTube site is run by Mike Doyle (D-PA). It uses social
on her site. media—Facebook, Twitter, YouTube, and RSS
814 Microblogging

Feeds. The International Conservation Caucus other interested observers. It also allows users to
uses Flickr, Twitter, YouTube, RSS feeds, and exchange small elements of content, such as indi-
Facebook. The Human Rights Caucus is now vidual images and video links, and these small
called the Tom Lantos Human Rights Commis- messages are also sometimes called microposts.
sion. It has been renamed in honor of the late A microblog differs from a traditional blog
Congressman (D-CA) Thomas Peter “Tom” Lan- in that its content is often smaller in both actual
tos (1928–2008) and uses Flickr, Twitter, You- and aggregate file size, and provides a lightweight
Tube, RSS feeds, and Facebook. The Senate Cau- easy form of communication that allows users
cus on International Narcotics Control does not to broadcast and share information about their
use social media, but does have a Skype link. activities, opinions, and status. It is therefore con-
sidered a miniature version of the regular blog.
Andrew J. Waskey In addition, compared to traditional blogging,
Dalton State College microblogging fulfills the need for a faster mode
of communication. By encouraging shorter posts,
See Also: Campaigns, 2012; Daily Caller; Facebook; microblogging reduces users’ requirement of time
Twitter. investment for content generation. Another dif-
ference concerns the frequency of updates among
Further Readings microbloggers. While on average, prolific blog-
Gerbaudo, Paolo. Tweets and the Streets: Social gers may update their blogs once every few days,
Media and Contemporary Activism. London: Pluto some microbloggers post several updates a day.
Press, 2012. One of the most popular microblogging tools
Harfoush, Rahaf. Yes We Did! An Inside Look is Twitter. Since its launch in October 2006, it
at How Social Media Built the Obama Brand. has experienced significant growth around the
Berkeley, CA: New Riders, 2009. world. Within eight months of its launch, Twit-
Mergel, Ines and Bill Greeves. Social Media in ter had about 94,000 users, and users of Twitter
the Public Sector Field Guide: Designing and can publish short messages, or “tweets,” which
Implementing Strategies and Policies. Hoboken, are visible on a public message board of the Web
NJ: John Wiley & Sons, 2012. site. While tweets are usually directed toward a
O’Connor, Rory. Friends, Followers and the Future: general audience, if users want to direct a tweet
How Social Media Are Changing Politics, to another user or send it as a response to an ear-
Threatening Big Brands, and Killing Traditional lier tweet, they may add the “@” symbol to the
Media. San Francisco: City Lights Books, 2012. intended user’s name. “RT,” or “retweet,” means
Pole, Antoinette. Blogging the Political: Politics and that a previous tweet is being sent again by a user.
Participation in a Networked Society. London: Topics of these tweets range from daily life to cur-
Taylor & Francis, 2009. rent events, news stories, and political opinions.
Because of its popularity, microblogging has
revolutionized the ways in which information is
delivered, circulated, and consumed around the
world. It has also empowered citizens to act as
Microblogging sensors or sources of data, which could eventu-
ally become important pieces of information.
Microblogging is one of the most popular Web Since many people are keen on sharing informa-
2.0 applications, and is a relatively new phenom- tion about events and their opinions about certain
enon in online social networks. It is often used topics, including government policies and politi-
as a broadcast medium in the form of blogging, cal issues, microblogs have become an increas-
whereby users describe their current status in ingly important source of information.
short posts distributed by instant messages, mobile While the original idea behind microblogging
phones, e-mail, or the Web. Microblogging allows was to provide personal status updates online,
users to write brief text updates (usually less than microblogging has had an important impact
140 characters) and send them to their friends and on the political scene in the United States. In
Microblogging 815

particular, it has been widely used for political of the service. A recent study found that parlia-
deliberation, and such deliberation is often seen mentary members tweeted primarily to dissemi-
as reflecting the political landscape of the offline nate information, often providing URLs to news
world. For example, many politicians make use articles about themselves or to their blog posts.
of microblogging to communicate with the elec- Congresspeople also reported on their daily activ-
torate and mobilize their supporters. Some poli- ities on Twitter. While these updates did not pro-
ticians use Twitter as a vehicle to promote their vide insights into the political process or improve
political agenda, tweeting about economics and transparency, some of the tweets can be seen
providing general information to their people. In as vehicles for self-promotion and for express-
addition, some politicians use Twitter to enhance ing their opinions concerning various political
their popularity, exposing the public to informa- and social topics, indicating a mode of use that
tion about their meetings, speeches, interviews, is aimed at one-way, top-down communication,
pictures, and videos. One reason for the popular rather than actually engaging with the citizenry.
use of microblogging among politicians is that In other words, while microblogging in general
it provides a channel that is not filtered by local has evolved toward becoming more conversa-
or national media, so that they are able to con- tional and collaborative, such use was rather lim-
vey their political agendas without censorship or ited among parliamentary members.
filtration. Moreover, microblogging is an important
One prominent example of the use of micro- predictor of online political participation. For
blogging in the political arena was the U.S. example, in a recent study, researchers found
presidential elections in 2008. Both presidential that microblogging provides alternatives to main-
candidates, John Edwards and Barack Obama, stream media outlets to influence public opin-
integrated microblogging into their campaigns ion about politics. It has also been claimed that
for the Democratic Party presidential primaries Twitter is a valid real-time indicator of political
in 2008. Both of them used different platforms sentiment.
of microblogging to reach voters and other stake- Another recent study revealed that Twitter has
holders, and to keep their Twitter followers abreast been exploited as a powerful platform for politi-
of upcoming appearances. In particular, the suc- cal deliberation. For example, it was found that
cessful use of microblogging in the U.S. presiden- the number of tweets reflects voter preferences
tial campaign of Barack Obama has established and comes close to traditional election polls; and
Twitter, Facebook, Myspace, and other social the sentiment of Twitter messages closely corre-
media as integral parts of the political campaign sponds to the political programs, candidate pro-
toolbox. It also suggests that microblogging pro- files, and other reports from the media coverage
vides new opportunities for online campaigning of the campaign. However, while some research-
and electorate engagement, thereby showing the ers view the “Twittersphere” as an indicator of
importance of microblogging as a key tool for political opinion, others have suggested that the
public relations in organizing the election cam- majority of the messages on Twitter are instead
paign and political marketing. Some researchers pointless babble.
even attribute Obama’s victory to a large extent
to his online strategy. Obama’s social-networking Chit Cheung Matthew Sung
Web site helped him set records in terms of dona- Lancaster University
tions and grassroot mobilization. Shortly after
his successful election as president of the United See Also: Blogs; Moblogging; Moblog.net; Twitter;
States, Obama used Twitter to let the Web com- Twitter Archiving Project, Library of Congress;
munity know how he felt: “This is history.” As a Twitter Diplomacy.
result of the 2008 campaign, Twitter has become
a powerful and legitimate communication chan- Further Readings
nel in the political arena. Aharony, Noa. “Twitter Use by Three Political
There have also been some studies on politi- Leaders: An Exploratory Analysis.” Online
cal Twitter use that focus on parliamentary uses Information Review, v.36/4 (2012).
816 Microfinance Initiatives

Chi, Feng and Nathan Yang. “Twitter Adoption Microfinance initiatives, however, are not neces-
in Congress.” Review of Network Economics, sarily founded and funded by locals because global
v.10/1 (2011). multilateral institutions such as the World Bank
Parmelee, John H. and Shannon L. Bichard. Politics and the Inter-American Development Bank have
and the Twitter Revolution: How Tweets Influence been supportive of national policies to enhance
the Relationship Between Political Leaders and the access to financial services or “bancarization” of
Public. Lanham, MD: Lexington Books, 2011. poor or underserved communities. In short, com-
plementary or alternative currency systems may
result from bottom-up, autonomous community
projects, or from policy-led, governmental and
multilateral institutional build-up supported by
Microfinance private and public banking systems. The World
Bank estimates that 160 million people in devel-
Initiatives oping countries are served by microfinance.
Both local and global initiatives favoring micro-
The creation and circulation of community-based finance share an underlying perspective that favors
monetary and credit relations is the essence of social fund and community-driven development
any financial transaction, either in a local neigh- projects. These initiatives are not necessarily pro
borhood or in the international community of bono or not-for-profit and oftentimes microfi-
nations. In other words, all exchanges and pric- nance initiatives are seen as the “exit door” for
ing practices exist only insofar as confidence in low-income, low-revenue entrepreneurs to scale
a specific representation of value is shared by a up into small and medium projects and enter-
community through iconic objects such as coins, prises. Social businesses are also part of microfi-
notes, badges, and other expressions of worthi- nance toolkits that start with grants for individual
ness. Microfinancing can play an important role or family income-generating activities in emer-
in bringing new media technologies to tradition- gency or post-conflict situations.
ally undercapitalized populations, especially in Microfinance provides basic financial services,
international environments where social media such as credit and deposit-taking, on a very small
communications, in particular, can affect the kind scale, to historically marginalized populations
and level of political participation those popula- that do not meet the criteria to do business with
tions can enjoy. conventional banking institutions. This covers
people who do not qualify for credit because of
Overview their lack of access to collateral.
Local, community, peer-to-peer, or neighborhood- According to the United Nation’s (UN’s) Capi-
based financial exchanges are older than money tal Development Fund, microfinance helps very
and may be a permanent, underlying force in any poor households meet basic needs and protect
transaction, market, and financial system. Fidu- against risks, while the use of financial services
ciary money is an expression of fiducia, a Latin by low-income households is associated with
word for trust and the root of the word confi- improvements in household economic welfare
dence. In order to express and enhance the fidu- and enterprise stability or growth. Moreover,
ciary essence of any currency, coins have always by supporting women’s economic participation,
been minted with images of kings and queens, so microfinance helps to empower women, thus pro-
that protection of the kingdom’s money equals moting gender equity and improving household
respect for the sovereign. In local and commu- wellbeing.
nity currencies and credit systems, other icons
are often socially selected in order to make the Microfinance and Microcredit
underlying social confidence visible to the trad- Microfinance is associated with long-term proj-
ers. In other words, every currency is an economic ects, whereas microcredit is usually a short-term
expression of social communication. Money is operation. The long-term return of microfinance
(social) media. initiatives is associated with the power to generate
Microfinance Initiatives 817

economic returns while improving grassroots Theoretical and empirical studies have demon-
political and social involvement. strated that a greater “depth of the financial mar-
However, grants and social transfers are not kets” (the ratio of key financial aggregates such
seen by multilateral institutions as a sustainable as credit or bank deposits to gross domestic prod-
mechanism for the economic development of a uct) enhances economic growth potential. These
community, while individual and family-owned findings have resulted in policy recommendations
businesses that are privately financed are seen as that target “access to financial services,” defined
more prone to success. Local initiatives are led by as the percentage of the population that can freely
microfinance institutions (MFIs), such as financial use financial services, and the reduction of pov-
cooperative/credit union networks that are inter- erty and inequality. On the other hand, the fragil-
ested in broadening their outreach to geographi- ity of underserved communities is also a major
cally underserved areas and in deepening their source of difficulties with respect to data collec-
outreach to the poor. tion and analysis, so that empirical studies about
Community-based, bottom-up initiatives are access do not give conclusive results with respect
favored when commercial banks are not present, to the causes and consequences of low access to
and may start building informal or semi-formal financial services.
community financial institutions that may grad- Another important area for microfinance initia-
ually link to the formal financial sector, either tives has been associated with the global flow of
directly or through the creation of federations. migrant workers. The issue of remittances and the
The microfinance toolkit goes beyond micro- vital role that they play in the lives of migrant pop-
credit to include savings, insurance, payment ulations has been of particular interest to policy-
services, and most critically, technical assistance makers both in national and multilateral spheres.
given the low literacy of poor and underserved Private transfers from migrant workers who are
communities. considered residents of the host country to recipi-
ents in the workers’ country of origin have been
Initiatives and Community Dynamics targeted as yet another frontier for bancariza-
The creation of social, local, or community cur- tion and microfinance. In this perspective, poli-
rencies (also known as complementary curren- cymakers are mostly concerned with fiscal policy
cies) also constitute the base for bottom-up micro- issues—worldwide remittance flows are estimated
finance initiatives. As a matter of fact, people to have exceeded $440 billion in 2010, of which
have always traded or bartered with each other, developing countries received $325 billion. New
using different tools and materials to represent digital media and interfaces such as mobile phones
and store value in various kinds of transactions, in Africa have become a major tool for remit-
including trade, investment, consumption, pro- tances because prepaid phone credits have become
duction, marriage, kinship, and sacrifice. an informal framework for transfers.
In complex urban and global capitalist soci- Empirical research has consistently produced
eties, money expands the potential for growth evidence that shared codes, religious beliefs, and
and accumulation while creating new forms of ethnicity—in short, cultural proximity and com-
wealth and power concentration, regulated by munication patterns—between lenders and bor-
central banks, which are more responsive to the rowers improves the efficiency of credit alloca-
interests of private, commercial banks as well tion. In other words, microfinance initiatives are
as multilateral organizations. Microfinance ini- very close to social media dynamics as long as the
tiatives anchored in community or complemen- depth of financial services is associated to cul-
tary currencies offer an alternative solution for tural commonalities. Religion and caste of bank
local markets deprived or unserved by global or officers and borrowers in India induces financial
national currencies. During financial crises such matching between officers and borrowers. Cul-
as with the euro or the Argentinean peso, these tural proximity increases lending and improves
initiatives have been the only way out of total repayment performance. Further, cultural prox-
unemployment and the lack of social services in imity increases loan dispersion and reduces loan
local communities. to collateral ratios. Cultural proximity mitigates
818 Microfinance Initiatives

informational problems that adversely affect lend- their homes and in their communities, is elevated
ing, which in turn relaxes financial constraints when they are responsible for managing loans
and improves access to finance. and savings. The ability to generate and control
However, the effect on financial efficiency of their income can further empower poor women.
cultural proximity between transacting parties Research shows that credit extended to women
is ambiguous. While members of a group tend has a significant impact on their families’ qual-
to do business with one another, this may lead ity of life, especially their children, while women’s
to discrimination or favoritism, thus resulting in commitment to repayment is outstanding, so they
the misallocation of resources. Alternatively, if tend to have the best credit ratings. In Bangla-
cultural proximity reduces the cost of communi- desh, for example, women have shown to default
cation or contract enforcement, in-group trans- on loans far less often than men.
actions may be more efficient. The relationship
between communication and cultural proxim- History
ity on financial efficiency remains an empirical The history of microfinance initiatives dates
question. back to 1959, when Akhtar Hameed Khan
launched microcredit for a rural development
Gender initiative that evolved into the Bangladesh Acad-
Last, but not least, gender issues have proven to emy for Rural Development (BRAC), one of the
be a major source of inspiration for microfinance first microfinance institutions. He began lending
initiatives. Poor women in particular benefit from small sums to entrepreneurs in the slums of Paki-
microfinance services. Women’s status, both in stan, and established one of the earliest models
for microlending.
In 1973, ACCION International, a volunteer
organization providing infrastructure services
to the poor, initiated a new program in Brazil,
where it began making small loans to the poor
for income-generating businesses, instead of
offering free services. The loans allowed people
to establish self-sustaining businesses that helped
stabilize their financial status and lift them out
of the cycle of poverty.
The potential of the poor as economically
active agents is at the origin of the microfi-
nance philosophical framework as promoted by
Mohammed Yunus, founder of Grameen Bank
and Nobel Peace Prize winner in 2006. In 1976,
during visits to the poor households in the vil-
lage of Jobra near Chittagong University, Yunus
realized that very small loans could make a dis-
proportionate difference to a poor person after
lending $27 from his own pocket to 42 women
who made bamboo furniture. They made a net
profit of $0.02 each on the loan. Thus, he came
to the conclusion that their use of very limited
resources was extremely effective. The challenge
was to translate poor people’s economic activ-
ism into an entrepreneurial spirit. Based on his
A Filipina woman using a mobile phone in 2012 to access observation that the poor (especially women)
banking services for a USAID microenterprise program that are hardworking and industrious, Yunus became
offered loans to small business owners in the Philippines. an icon of policies that take the poor not as
Microtargeting 819

“unbankable,” but only overlooked by conven- Fisman, R., D. Paravisini, and V. Vig. “Cultural
tional banking institutions because they lacked Proximity and Loan Outcomes.” NBER Working
material collateral. Paper Series, 18096 (2012). http://www.nber.org/
papers/w18096 (Accessed November 2012).
Conclusion Schuler, Douglas. Liberating Voices: A Pattern
Microfinance initiatives result from the adoption Language for Communication Revolution.
of core principles for alternative banking and Cambridge, MA: MIT Press, 2008.
social inclusion. There must be a commitment to Women’s Microfinance Initiative. “What Is
end capital starvation, rather than rely on charity Microfinance?” http://wmionline.org/aboutus/
or grants. The main goal is to promote access to whatmicro/whatmicro.html (Accessed November
and use of banking and financial services by all 2012).
through new technologies and distribution chan-
nels to capitalize assets among the poor, usually
stressing cultural or gender-related dimensions of
social organization.
While microfinance is keen on alternative Microtargeting
banking, it seeks to work within regulations,
guidelines, and best practices recommended by Political parties and election campaigns have
domestic monetary authorities and international begun utilizing datamining techniques previ-
regulatory institutions such as the Bank for Inter- ously honed by direct marketing experts to seg-
national Settlement Basel II Capital Risk Guide- ment potential voters based on a myriad of fac-
lines, the World Bank, and the Inter-American tors. After using market information to determine
Development Bank. Bancarization also wishes political leaning and likelihood of voting, the
to integrate corporate social responsibility into parties use various campaign techniques (includ-
down-market business strategies and institu- ing direct mail, phone calls, television ads, radio
tions of representation and democratization. The ads, Internet advertising, and e-mails) to deliver
promotion of financial education to encourage personally crafted messages intended to speak
responsible banking and finance and avert preda- to them as directly as possible. The key tactic is
tory lending and unethical practices is also part of to tailor the message to particular subgroups in
the microfinance ethos, which has proven to be order to best activate them to support a particular
open to a diversity of local development models party or candidate and to vote. For example, at
for the benefit of either bottom-up or universal the most basic level, if an individual is a National
top-down financial inclusion policies. Rifle Association member, ads will be targeted to
gun issues because the market research suggests
Gilson Schwartz that this issue is of importance to that voter.
University of São Paulo While political campaigns have long bor-
rowed ideas and strategies from private sector
See Also: Nongovernmental Organizations; ONE marketing, microtargeting has been one of the
Campaign; Poverty; Water.org. most important developments for strategists
since it first garnered national attention during
Further Readings the 2004 election cycle. Without large, sophisti-
Alternative Banking and Social Inclusion Project. cated databases, however, microtargeting would
“Principles for Alternative Banking and Social not be possible. In a similar way to how credit
Inclusion.” http://alternativebankingandsocial card companies or grocery stores track spend-
inclusion.wikispaces.com/Principles+for+Altern ing habits, voter databases contain information
ative+Banking+and+Social+inclusion (Accessed about the voter (like party identification, voting
November 2012). turnout, campaign contributions, and volunteer-
Consultative Group to Assist the Poor (CGAP). ism), along with other activities purchased from
“About CGAP.” http://www.cgap.org/about vendors such as Acxiom and Experian Americas.
(Accessed November 2012). Democrats rely on a database called VoteBuilder,
820 Microtargeting

while Republicans use Voter Vault. Aristotle is and his wife talking about his mother’s struggle
the leading nonpartisan database company. with breast cancer. It ends with him attacking
Once purchased, the databases are mined to Corzine for trying to scare voters. The ad was
identify what issues are likely to matter to which aimed at Republican voters searching for infor-
voters, along with likelihood of party affiliation mation on breast cancer, and attempted to assure
and turnout. After combining political and con- them that Corzine’s attacks were not correct.
sumer information, voters are grouped together Social media has made the ability to microtar-
based on their preferences and assigned labels get even easier. Campaigns can pull information
(such as “Soccer Moms”). from a person’s Facebook profile (or even those
Computer modeling is used to assure that pre- of their friends) to determine what messages are
conceived notions of campaign workers do not most likely to appeal. They can similarly analyze
sway group classifications. Once the groups are someone’s tweets and create hyperspecific mes-
established, tailored messages can be created sages. Social media is largely held as responsible
and then sent through varying means—assuring for the increase in distinct bits of data available
that voters receive information that seems like on each voter. In 2004, there were approximately
it was customized especially to them. No longer 300 such pieces available on average, whereas
are single ads created and spread to all individ- today there are more than 900.
uals. This was a wasteful approach given that Despite microtargeting’s popularity with cam-
the ad could equally dissuade some voters as it paigns, the American public does not seem to be
persuaded others, based on the subject and the as thrilled with its existence. In a 2009 survey, 86
beliefs of individual voters. Now, there may be percent of Americans indicated that such collec-
dozens of variations of each, with certain seg- tions of data are an invasion of privacy, and that
ments or aspects highlighted in order to reach a they would prefer it to stop. Given the success
targeted group of voters. campaigns have experienced with the tool, how-
In this way, microtargeting allows campaigns ever, microtargeting is likey to continue.
to put a specific message in front of a specific
voter. As increasingly more data has become William J. Miller
available, the level of microtargeting has become Flagler College
more sophisticated. The process for microtarget-
ing has also become easier, with continued devel- See Also: Data Mining; VoteBuilder.com; Voter
opments in the Internet and social media. First, Demographics; VoterVault.com.
a cookie is placed on a user’s computer after
visiting a Web site. Next, the profile is matched Further Reading:
with offline data that is available (like type of car McCoy, Terrence. “The Creepiness Factor: How
driven, credit cards used, or typical purchases Obama and Romney Are Getting to Know You.”
made). Then, political consultants match this The Atlantic (April 10, 2012). http://www
data with voting records that are publicly avail- .theatlantic.com/politics/archive/2012/04/
able, including party registration and when they the-creepiness-factor-how-obama-and-romney
have voted or not voted. Voters are tagged with -are-getting-to-know-you/255499/#slide4
codes to guarantee anonymity as best as possi- (Accessed December 2012).
ble, but the effect is typically the same. Instead Vega, Tanzina. “Online Data Helping Campaigns
of simply buying an ad and hoping that the tar- Customize Ads,” New York Times (February 21,
geted group stumbles upon it, campaigns can 2012). http://www.nytimes.com/2012/02/21/us/
buy the audience and then present the ad. politics/campaigns-use-microtargeting-to-attract
In 2009, Chris Christie ran for governor of -supporters.html?pagewanted=all (Accessed
New Jersey. Governor Jon Corzine accused December 2012).
Christie throughout the campaign of supporting Verini, James. “Big Brother Inc.” Vanity Fair
cuts in health care coverage, including mammo- (December 2007). http://www.vanityfair.com/
grams. By working with a targeting strategist, politics/features/2007/12/aristotle200712
Christie was able to create a video showing him (Accessed December 2012).
Middle East 821

Middle East country-by-country indicators for 2012. Uses to


which people in these regions are putting these
Across the Middle East, north Africa, and Persian/ services, including the forms and contents chan-
Arabian Gulf, beginning in the late 1990s, and neled through them, range drastically.
in particular over the last several years, military Across the Middle East, north Africa, and Gulf,
personnel, researchers, civil society members, and governments and/or individual politicians have
governments alike have moved their network- turned to social media predominantly to estab-
ing online. In doing so, they have followed in the lish profile pages, open government sites, tweet
footsteps of the early adopters of offline precur- about their policies, and/or create virtual states.
sor BitNet and GulfNet e-mail systems in use in With respect to government profile pages, these
the 1980s for private, personal, or closed data are ubiquitous, and even extend to include pages
exchanges among limited members of military established by spouses and children of governing
and research communities. royal elites, aiming to provide mediated face-to-
Over the years, governments moved online, face exchanges with their respective populations.
largely in an effort to inform and typically speak Illustrative are the sites of Jordanian Queen Rania
at (rather than engage with) their subjects and/or Al Abdullah and Saudi Princess Basmah Bint Saud,
citizens, thereby cosmetically replicating trans- respectively. Their official Web sites are in Arabic
parent two-way communication mechanisms and include mirror sites in English for networking
normatively considered essential for democrati- beyond the region, including through their “my
zation and healthy governance by international Rania” and “contact [us]” pages, respectively.
organizations. Civil society members, on the other Where individual political parties or movements
hand, moved online as part and parcel of wider are concerned, online presence, however, varies
cultural expression practices they previously drastically. In Egypt, the Muslim Brotherhood
channeled through older media technologies like serves as an example notable for its large online
audiocassettes or performance. This trend has presence, using sleek marketing techniques and
largely been led by young people, with the aim of designs to attract younger users like ikhwantube
airing grievances from varying political vantage (paralleling YouTube).
points and bringing about change to the mili- Open government networking that goes beyond
tary, political, economic, and social structures in not just communicating at but with publics have
place. In their case, young people moved to these been especially rare. One notable exception is
channels because public space was and remains the mygov.il site established by Israel in 2006. It
circumscribed across much of these regions, and includes portals in Hebrew, Arabic, and English,
older and/or more mainstream media remain each targeted to different audiences in an effort to
largely controlled and/or co-opted. Thus, young provide on-demand political, cultural ,and busi-
people have taken the lead as early adopters of ness related-information. Second, and more nota-
newer social media services to express, network, bly, it enables citizens to set up an online account
and organize. in order to engage in government transactions.
Regionally, users access online social media Thus, for example, those seeking to renew driving
via platforms like computers, tablets, and espe- licenses, order a phonebook or pay bills begin at, or
cially mobile phones, and offline via face-to- are directed by the other two portals, to a Hebrew
face exchange of mobile phone SIM cards. They page to make their transactions. The unique choice
access these platforms in stationary locations like by Israel to move governance online in this case
homes, schools, and where neither is available naturally paralleled high online penetration rates
to them, telecenters, or simply on the go. Today, by a majority of 73 percent of the population.
regional Internet penetration rates have skyrock- Consequently, that rate is the fourth highest, fol-
eted to 88 percent at their highest (in both Bah- lowing the United Arab Emirates (at 85 percent).
rain and Qatar), inching up to the current world Finally, governments of non-state political
leader at 96 percent (in Iceland), but start at institutions and/or non-self governing territories
just 5 percent (in Iraq), according to remaining have, likewise, used social media, in their case,
International Telecommunication Union (ITU) to establish virtual states in the absence of literal
822 Middle East

or physically existing states. Examples of these against Palestinians filmed by Palestinians, Israe-
include the Facebook page establishing the vir- lis or international observers.
tual Saharawi Arab Democratic Republic state, Notably, and controversially, such examples of
separate of Morocco, or its television station, non-vetted footage, while on the one hand, play-
operated by the Saharawi political leadership, ing an incredibly vital role, cannot, on the other,
the Polisario. A second example is the Palestinian necessarily be corroborated (whether according
National Authority and later updated, Palestine to the acts seen in the footage, or the causation
Ministry of Foreign Affairs portals, updated to attributed to them). Moreover, in some instances,
reflect the UN vote recognizing the change from they have been doctored, and yet in others, recy-
the observer status of Palestine to the observer cled from one conflict context or time period and
status of the State of Palestine. The former portal claimed to have occurred in another. As a result,
notably and nevertheless, already operated under a controversy exists over whether such footage
ownership of a cyber state domain name, namely, serves as a legitimate source for testimonial for
“ps.” Therefore, since its online origins, despite counting of and reporting on human rights vio-
not literally controlling a state in “real” space, lations. For the sake of accuracy and objectivity,
Palestine has nevertheless administered a state in now more than ever, the speed at which these are
cyberspace. produced and distributed, therefore, implore the
Popular users, mainly young people who need to scrutinize contents deeply and quickly
represent not just the larger amount of people and prior to press or posting.
online today but the more diverse uses to which A third example of using social media to docu-
social media are being put, have been the most ment violence includes the writing of war blogs
prolific where public exchange of data is con- like Bagdad Burning, which Riverbend began in
cerned. In the last several years, they have both 2003. In the blog, the author chronicles everyday
participated by responding to and commenting life as an Iraqi citizen and life in a war zone, includ-
on social media forms and messages and them- ing from a woman’s perspective. Written in Eng-
selves produced both, through news and enter- lish, she largely directs her blog toward an inter-
tainment forms. With respect to producing their national audience (including to attract more than
own political expressions via the underground the only 7 percent of the Iraqi population that is
options social media afford, these span efforts online) out of the hopes of garnering intervention.
that bear witness to events, cover underreported An example of citizen journalism is Mam-
issues through citizen- and civil-journalism, fakinch. Its Twitter account is @Mamfakinch.
engage with intergroup and foreign relations, to Begun in 2011, it was created in connection with
advocating and networking on behalf of state the youth-led February Twentieth activist move-
reforms or specific causes germane to women’s ment’s efforts to spark reform in Morocco during
and underrepresented ethnopolitical minority the Arab Spring. The organization’s social media
and nationalist group rights, among others. presence serves to provide alternative information
largely unavailable in the Moroccan press in an
Alternative News Sources effort to give voice to and advocate on behalf of
Social media have been employed to document underreported issues of reform and rights. A sec-
and serve as witness to protests (common dur- ond example is FSNN, the United Syrian News
ing the Arab Spring) and acts of violence. With Network, also created in 2011, by Syrian youth
respect to witnessing violence, uses include film- whom, likewise were concerned with agendas and
ing and unvetted uploading of videos like those frames set by mainstream media sources. In their
famously sneaked out of Libya during the Jas- case, however, their viewpoint differed. They
mine Revolution, as for example footage in Feb- argued that the government, namely the perspec-
ruary 2011 of soldiers purportedly murdered tive of the Bashar al-Assad regime, and to some
at leader Muammar Qaddafi’s orders for refus- extent, also the dominant ethnopolitical group’s
ing to shoot at protesters. A second example narrative, the Alawi, have become marginalized.
includes documentation of acts of harassment Therefore, they strive to report in a manner that
and/or physical violence by Jewish-Israeli settlers provides the regime with a voice.
Middle East 823

Like citizen journalists, professional jour-


nalists have turned to social media to establish
civic journalism organizations. To that end, they
have created blogs and/or made use of Twitter
to provide more detail and/or opinion about the
news that they cover. Typically, they do so inde-
pendently of the organizations for which they
work. Examples of the former include Palestinian
Daoud Kuttab’s online independent radio station
managed by the Community Media Network in
Jordan, Amman Net, and the Moroccan Lakome
news Web site created by Aboubakr Jamai.
Examples of the latter include Twitter accounts
by both journalists, as well as an extensive list of
others like independent Lebanese journalist with
Now., Hanin Ghadar, or those who are employed
by global media organizations like the BBC, as in
the case of previous Arab Affairs Analyst Magdi
Abdelhadi in Egypt. A third use of social media,
Twitter, provides journalists with a new tool for Egyptian blogger and director of the Cairo office of the
following leads; for example, Al-Jazeera’s Ayman American Islamic Congress Dalia Ziada. The American Islamic
Mohyeldin did during his coverage of Jasmine Congress is a grassroots organization that works to encourage
Revolution events in Egypt. young people to advocate for civil liberties in the Middle East.

Foreign and Domestic Policy


Apart from news purposes, social media are also
popularly being used in the region for intergroup photograph of himself and his daughter with the
and/or foreign policy relations. To that end, headline, “Iranians, we love you. We will never
users have made use of social media to engage bomb your country.” Edry posted the image in an
in conflict as for example, during the so-called effort to bypass the state amid escalating tensions
Twitter War that transpired in November 2012 between Israel and Iran. At the time, concerned
between official Israeli and Palestinian Twitter over the threat the continued development of
accounts in the context of an escalation in lit- the Iranian nuclear program could pose to Israel
eral conflict. During that time, Twitter was used (if nuclear weapons were developed), and Isra-
in real time by the accounts owned by Israel’s el’s threat to preemptively bomb Iran’s nuclear
@IDF Spokesperson (as part of it’s military opera- enrichment facilities, Prime Minister Benjamin
tion “Pillar of Defense” in Gaza) and Hamas’s Netanyahu and President Ahmadinejad pursued
military wing’s @Alqassam Brigade. Both used an escalating war of words. In response to Edry’s
their accounts to threaten and announce incoming posts, Iranians replied with their photographs,
military strikes, and confirm hits, to the end result which they accompanied with headlines like, “We
that their live-tweets entered the real theatre of love you Israeli people.” The campaign developed
war. Alongside those, per time and location-stamp and today continues under, “Not ready to die in
data social media updates provide, a potential your war.”
existed that data posted by members of the Israeli In other cases, social media have been popularly
and Palestinian public could also be used to more used to advocate on behalf of statewide reforms,
“effectively” plan offline physical attacks. and critique state leaders, governing appara-
In other cases, users have turned to social media tuses, and associated policies. In efforts express-
to prevent conflict, as with the people-to-people ing such critiques, there is a trend whereby users
“Israel Loves Iran” campaign. Begun by Israeli have moved from covertly protesting via a pseud-
Ronny Edry in March 2012, he posted an online onym to overtly doing so by using their names. An
824 Middle East

example of the latter is the ongoing blogging by services for more widely and efficiently dissemi-
activist and North Africa Bureau Director of the nating politically themed music. This is impor-
American Islamic Congress Dalia Ziada. From the tant, given that (as historian Mark LeVine has
beginning, Ziada blogged using her name, advo- written) music (in particular, rap and heavy
cating for change on the part of President Hosni metal), have played important roles in providing
Mubarak’s regime. As part of her encouraging vehicles for the dissemination of expressions of
Egyptians to adopt nonviolent action methods, she popular protest across these regions.
garnered international attention after translating
the story of American Martin Luther King, Jr.’s, Women, Ethnopolitical Minorities,
nonviolent protest movement into Arabic in 2007. Nationalist Group
Second to the above trend, there has also been a In yet other examples, rights-based organizations
move from the use of social media to disseminate across these regions are using social media to advo-
indirect to directly critical messages. Examples of cate on behalf of specific causes like gender-based
the former can be found in lyrics to music on Face- rights. One example is Meydaan, with a Web site
book and YouTube like that shared by fans of the that partners Iranians in Iran with those living in
Egyptian singer, Hamza Namira. His song, “Dream exile and/or the diaspora to campaign on behalf of
With Me,” officially released in January 2009, women’s rights. A second example makes use of
read as an allegory (or at least was attributed by music to advocate on behalf of women. It involved
fans as such). In the video for the song, the dreams fans sharing the song by the Palestinian-Israeli
of a boy coming of age are depicted, while Namira band DAM via YouTube, “If I Could Go Back
sang about tomorrow, explaining that “if it doesn’t in Time” featuring Arab/Palestinian-Israeli singer
come . . . we will bring it ourselves.” On the face Amal Murkus. The song critiqued honor crime-
of it, the song could therefore pass as addressing based violence against Palestinian women. Paren-
micro socioeconomic and human development- thetically, the song itself was criticized as neocolo-
based growing concerns. His fans, however, read nial, and moreover, if framed in regional statistics
it as an allegory about the need for the Egyptian establishing that the majority of regional crimes
masses to rise up against Mubarak’s state appara- against woman are, in fact, not honor based, also
tus if the state did not reform itself. illustrated cultural stereotyping about existing
On the opposite extreme, the sharing of overtly gender crimes. Nevertheless, the song provides an
critical lyrics, is the song “President, the Home- important example of uses of social media for the
land,” sung by Tunisian rap artist El Général. In discussion of gender issues, including limits set on
the song, El Général directly criticizes President women’s rights and opportunities.
Zine al-Abidine Ben Ali, addressing his words to Other popular rights-based uses to which social
“Mr. President” and referring to the state’s leader- media have been put in these regions extend to
ship and Ben-Ali’s wife’s family, the Trabelsi elite, the sharing of forms advocating on behalf of an
as “sons of bitches” who “steal in broad day- expansion of the rights of state minorities and/or
light, confiscate property, and own the land” and nationalist groups seeking expanded rights, self
who have “robbed, dismembered, kidnapped and autonomy, and/or statehood. One example is the
would not give up the seats [of power].” Continu- circulation of the song ”Born Here,” also by the
ing with his rhyme, he adds, “there is no one to Palestinian-Israeli band DAM. The song, which
tell them the word ‘stop,’ even the law that’s in garnered the band international fame and was
the constitution.” widely circulated, voiced Palestinian-Israeli state
In an effort to bypass censorship, El Général minority and Palestinian nationalist grievances in
clandestinely “published” this song on Novem- pursuit of equality and independence.
ber 7, 2010, directly to Facebook. Thus, through A second and technologically noteworthy
the use of social media, he was able to dissemi- example in this category is the sharing by (once)
nate the song and work to build a fan base and seminomadic Tuareg diaspora of their nationalist-
the associated discourse around his music’s themed music by blending older with newer social
politically minded themes. As both these exam- networking tools. Spread across Mali, Algeria,
ples suggest, social media serve as important Libya, Burkina Faso, and Niger, and historically
Middle East 825

having migrated through and across each of these aims summarize debates over the naming of the
states, as Baz Lecocq has described, the Tuareg Middle Eastern Gulf.
developed a hybrid musical genre known as al-
Guitara. Al-Guitara blends Dire Straights and Social Media Networking Impact?
Hendrix-styled rock guitar with Tuareg, in par- Whether all these examples are creating regional
ticular Algerian cultural styles, into a form most change is, however, unclear. The Project on
famously associated with the Malian Tuareg band Information Technology and Political Islam at
Tinariwen. Tinariwen’s songs express Tuareg con- the University of Washington, directed by Phil-
sternation with the presumed dichotomies and lip N. Howard, hosts data demonstrating corre-
foreign policies of both Arabs and the West, and lations between online and offline networking.
the feeling of displacement by the two, in particu- For example, it found that blogs discussing Ben
lar in Mali. They expressed a desire to reunite and Ali’s leadership and “revolution,” and to a lesser
liberate themselves from both. Their music par- extent, “liberty” and “economics,” peaked with
allels the 2012 self-declared independence of the an increase in the size of street demonstrations in
state of Azawad in northern Mali. Tunisia during the Jasmine Revolution. Likewise,
Importantly, such hybrid al-guitara music tweet flows that transmitted a “freedom meme”
circulates via hand-delivered mobile-to-mobile in which people adapted the meaning of the rev-
phone SIM card exchanges. That is, via the com- olutionary successes from Tunisia and Egypt to
bination of “old” face-to-face networking and their experiences, increased across states in paral-
data uploaded and stored to SIM cards, Tuareg lel with the contagion in street protests. Whether
musical protests are exchanged in and across the relationship was causal is a separate matter.
vast stretches of the Sahara desert where Wi-Fi Notably, bread-based street protests across these
capability is unavailable. The result is that the regions transpired long before social media ever
construction and circulation of this musical style came into existence.
preserves, stores and archives Tuareg culture, and However, the uses of social media have, never-
provides the soundtrack for their political protest. theless, stirred fears of change. As a result, gov-
Most notably, it illustrates both a genre and form ernments and concerned others have responded
that it powerful enough to transcend the very by creating legal and/or technological firewalls to
erection of Saharan imposed state borders. That stifle the channeling of expression and/or protest
is, it has cut across state borders and politics to through them. States have expanded their press
the end of having reconfigured the very meaning laws to include online legal firewalls. Thus, in one
of the so-called MENA or Middle East and north example, a 2012 Jordanian law now requires all
African regions. As a result, it necessarily alters news Web site owners to obtain accreditation,
discussion of just what is meant by politics in the and holds them responsible for content posted to
MENA and Gulf, thereby calling into question a their sites, including externally posted user com-
need to include the borderlands region between ments. The law, requiring them to vet all opinions
North and sub-Saharan Africa, or the Saharan and commentaries, brings reporting via social
region into such discussions. media in line with already existing restrictions on
Lastly, two gamers partnered together to create legacy news reporting. Second, it stipulates that
the first ever Arab-themed browser-based mas- non-Jordanian-based news sites that do not abide
sively multiplayer online game (MMOG). They did by these laws could be banned from the country.
so, according to the two, to educate and engage in The Jordanian online community has, as a result,
pan-Arab and global networking. The two gamers, expressed concern about how widely and exten-
Vince Ghossoub and Radwan Kasmiya, of Leba- sively this law will be applied.
nese and Syrian heritage, respectively, and based More broadly, another concern for those reli-
in China, created the critically acclaimed MMOG, ant on social media to freely express themselves
Knights of Glory. Knights of Glory serves to bring is the widespread existence of morality laws
the online gaming community together to educate across the MENA and Gulf. As one case in point,
players about Arab history, and in particular Arab in March 2012, the judge for a case involving
conquest of the Persian and Byzantine empires. Its the Facebook posting by Tunisians Jaebur Mejri
826 Middle East

and Ghazi Bej of naked caricatures of the Islamic society members of Anonymous hactivists hacked
Prophet Mohammed handed out the maximum into the Israel Defense Forces Web site, taking
penalty allowed under Tunisian law, namely a down a blog page as part of Anonymous’s denial-
total of seven and a half years imprisonment. of-service hacking program. In that instance, they
The two were sentenced for “violating morality” did so as part of the escalation in conflict between
and “disturbing public order.” Regionally, such Israelis and Palestinians in November of 2012.
legalities concerning morality versus freedom Likewise, states have presumably targeted one
of expression are situated at opposite ends of a another, as in the case of the Stuxnet virus that
debate in a manner that parallels debates else- disrupted Iran’s Natanz nuclear facilities opera-
where regarding what content constitutes incite- tions. According to many media reports, Stuxnet
ment, and is, therefore, not permissible under was created by the United States as part of its
freedom of expression safeguards. Olympic Games cyberweapons program, together
In other cases, states have shut down online with Israel. Media sources further reported that,
access by closing off individual parts of a coun- in order to upload the program the two combined
try, or by shutting down specific sites and/or their newer digital networking capabilities with
simply shutting down access to the World Wide old hand-to-hand sociality, namely by making
Web altogether. As examples, following the post- use of a person with a USB thumb drive. Once
ing of the YouTube film The Innocence of Mus- uploaded, the worm’s end-result, however, was
lims, Egyptian state courts ruled that the film not just virtual. Stuxnet physically disabled the
breached morality laws for defaming the Prophet Iranian facility’s centrifuge operations, thereby
Mohammed, and depicting Islam negatively. As slowing down Iran’s nuclear program.
a result, they asked Google to remove the film. At the same time, targets of these disruptions,
Since Google declined, the courts ruled that You- whether governments, activists, or just audiences
Tube should be banned. As a result, YouTube was in pursuit of entertainment, manage to circumvent
closed for one month in Egypt. In another case, social media use limits. As one example, using
on November 29, 2012, rather than cutting off technical knowhow, Iranian fans of the Iranian
a specific site or section of the country, Syria cut American television show Parazit found ways
off all access to the Internet, in effect removing to bypass the state and tune into the otherwise
the Syrian state from existence in cyberspace for blocked and widely popular series. Parazit, pro-
two days (along with the 23 percent of its online duced by Voice of America (VOA)–based opera-
population). Concerned about the leak of infor- tions in Washington, D.C., and created by Iranian
mation critical of the regime during the ongoing expats Kambiz Hosseini and Saman Arbabi in
civil war, the state chose this option, and closed 2008, aimed to foster democratization and mock
all phone services to at least try to retain control Iranian state politics by making fun of President
over the media front of the war. Ahmadinejad and other members of the Iranian
In other cases, rather than restricting access to political elite, like the Green Movement.
the Internet or specific sights, governments have Following unrest surrounding the 2009 presi-
maintained site or networking viability in order dential elections dissemination platforms for the
to track and monitor activists’ movements. One series evaporated. The state confiscated satellite
example was the alleged use by the United Arab dishes on which the series could be viewed. Addi-
Emirates’ government of the FinFisher Trojan tionally, it used smart filters to shut down Web
spyware to track Emirati rights activist Ahmed sites critical of it, including that of the VOA’s Per-
Mansoor on his mobile phone. Mansour was sian News Network, otherwise accessible to the
thereafter physically assaulted, potentially in con- 21 percent of Iran’s online population. Unable to
nection with his movements having been revealed tune in, fans instead tuned in via proxy servers,
by FinFisher. for example via Facebook. When the state, how-
It is not only state authorities who have closed ever, also shutdown Facebook (as it has, on again
or hacked social networking sites, or civil soci- and off again), fans simply skipped around via a
ety members who have been their targets. For cat-and-mouse-like game to continue to upload
example, the loosely affiliated and assumedly civil and download via new proxy locations.
Military-Industrial Complex 827

Whether the above outlined efforts are having Israeli Government. https://my.gov.il/Pages/
a direct impact on regional politics or not remains Application/Login.aspx (Accessed September 2013).
unclear. The majority of the peoples of these regions Lecocq, B. “Unemployed Intellectuals in the Sahara:
remain offline, with many of these efforts instead The Teshumara Nationalist Movement and the
being targeted to international audiences (whether Revolutions in Tuareg Society.” International
by their choice to opt for social over older media, Review of Social History, v.49/S12 (2004).
whose penetration rates remain higher, and/or LeVine, M. Heavy Metal Islam. New York: Three
by choosing to use English over local languages). Rivers Press, 2008.
Therefore, it may be more useful to consider the Palestine Ministry of Foreign Affairs. http://www
expression channeled through social media as a .mofa.gov.ps/new (Accessed September 2013).
barometer of regional public opinion. That is, Palestinian National Authority. http://www.mofa.pna
since most regional public social networking today .ps (Accessed September 2013).
is operated by young people, and demographi- Perlroth, N. “Anonymous Attacks Israeli Web Sites.”
cally they represent the majority of the population New York Times (Nov. 15, 2012).
in most states, and in some, even a vast majority, RASD-TV. http://www.rasd-tv.com (Accessed
their expressions provide key insights into regional September 2013).
political opinion. Moreover, since young people Saharawi Arab Democratic Republic State. http://www
under the age of 18 are not counted, neither in .facebook.com/pages/Sahrawi-Arab-Democratic
so-called public opinion polls or elections, and -Republic/80453345145 (Accessed September 2013).
regardless of however circumscribed an impact Sanger, D. E. “Obama Order Sped up Wave of
elections arguably have on governance in what is Cyberattacks Against Iran.” New York Times (June
the most common form of government in existence 1, 2012).
across these regions, namely anocracies (middling World Bank. “Internet Users.” http://data.worldbank
autocratic-democratic systems), the contents chan- .org/indicator/IT.NET.USER.P2 (Accessed
neled through social media today, therefore, prove September 2013).
invaluable for illuminating and understanding
Middle Eastern, north African, and Gulf popular
opinion and politics, together with the very defini-
tion of where these regions begin and end.
Military-Industrial
Yael Warshel
University of California, Los Angeles Complex
See Also: Activists and Activism, Digital; Africa, President Dwight D. Eisenhower warned against
north; Arab Spring; Artists and Social Media in the military-industrial complex in his 1961 fare-
Politics; Countries Banning Social Media for Political well address, perhaps the most famous such
Reasons; Digital Diplomacy; Innocence of Muslims, address since George Washington’s. Eisenhower
The; Mamfakinch; Press Freedom and Online/Social feared that the mounting costs of the Cold War
Media Security. threatened America’s future. He saw the emer-
gence of a cozy alliance of defense contractors,
Further Readings military leaders, federally funded scientists and
Howard, P. N., et al. “Opening Closed Regimes: universities, and congressional members who
What Was the Role of Social Media During the used the Cold War as a justification for military
Arab Spring.” Working Paper 2011.1 Project expenditures not essential to national security.
on Information Technology and Political Islam, Eisenhower acknowledged the need for strong
University of Washington. defense, but he also saw that vital social programs
International Telecommunication Union. “Time Series such as education and medical care might lose out
by Country (2000–2011),” ITU. http://www.itu.int/ to the demands of the war industry.
en/ITU-D/Statistics/Pages/stat/default.aspx Eisenhower urged the nation to recognize that its
(Accessed August 2013). economic strength was as vital as its military might
828 Military-Industrial Complex

to national defense. The military-industrial com- ask for additions or modifications that would
plex could undermine democracy. He did not fear generate large profits. Members of Congress
the existence of the military-industrial complex, resisted cutbacks to such programs because jobs
but the possibility that it would abuse its power. It in their districts or states might also be cut. The
might become so strong that it would resist civil- procurement and development process stretches
ian control. Eisenhower’s speech was at least in over so many years that programs such as the
part a reaction to the election of John F. Kennedy, V-22 Osprey vertical takeoff aircraft stayed alive,
who had promised to significantly increase defense despite efforts to close them, because they became
expenditures and strengthen America’s nuclear too big to allow to fail, a perfect example of invest-
deterrence during the 1960 presidential campaign. ment expectation in action. Defenders of these
programs responded that the Soviet threat was
Modern Industrialized Warfare genuine, and that only a robust military, equipped
The need for a permanent defense industry did not with the best arms available, would deter Soviet
emerge until the late 19th century, when weap- aggression. While acknowledging that defense
onry became so complex that it needed an indus- spending may aggravate Cold War tensions, they
trial base for development and production. Once insisted that such spending neither caused nor
President Theodore Roosevelt decided to create prevented resolving the tensions. Justifications for
a global navy, a separate defense industrial plant a permanent war industry also used the language
was required. Complex weapon systems needed of economic stimulus to argue that funding such
specialized skills, knowledge, and equipment to programs increased employment and prosperity.
manufacture them. Civilian factories no longer
could be expected to ramp up to production in Today’s Military-Industrial Complex
time to meet the demands of modern warfare. Concerns about the military-industrial complex
The technologies, industrial plants, and formal ebbed as defense expenditures slowly dropped
coordination of planning between civilian and from 10 percent of the gross national prod-
military leaders necessitated ongoing programs. uct during the 1950s to 3 percent in the 2000s.
President Harry S. Truman’s doctrine of com- There has been, however, a significant increase
munist containment after World War II prompted in defense and intelligence expenditures since the
the Department of Defense to develop nuclear and 9/11 terrorist attacks on the United States. Dur-
conventional arms capable of deterring the Soviet ing President Barack Obama’s first term (2009–
Union and its communist allies. The Cold War was 13), expenditures for national defense and intel-
a 45-year era of tension between the United States ligence more than doubled. The United States is
and the Soviet Union. The two superpowers some- the world’s leading exporter of military systems,
times tested each other, occasionally threatened each selling tanks, aircraft, missiles, and the support
other, and were always posed for the outbreak of programs necessary to maintain them.
war. Some critics of the military-industrial complex The interlocking interests of large corpora-
were concerned that Cold War fears were elevated tions, high-ranking military officers, and mem-
by those who thought they would reap the ben- bers of Congress help explain the persistence of
efits of increased defense expenditures, heighten- the military-industrial complex. The rise of think
ing Cold War tensions between the superpowers, tanks such as the Rand Corporation and corpo-
rather than reducing them. Others feared that the rations focused almost exclusively on serving the
undue emphasis on empire building through weap- military’s needs, such as Lockheed Martin and
ons programs would distort the professionalism of Raytheon, created another set of economic inter-
the military, tempting officers to focus on advanc- ests that promoted investments in defense. They
ing their careers through big weapons projects. sought to persuade members of Congress to sup-
Many critics pointed to the practice of “cost- port defense spending through campaign contri-
plus” contracts as the cause of defense overspend- butions and lobbying. They located their plants
ing. Corporations allegedly offered to produce a to maximize their leverage with members of Con-
weapon at a cost significantly lower than it would gress representing those locations. The building
cost to produce, confident that the military would or expansion of military bases in key states such
Military-Industrial Complex 829

they once occupied. For example, the Defense


Advanced Research Projects Agency (DARPA)
funds a Lockheed Martin project to make battle-
field intelligence faster and more reliable. The
Social Security Administration paid the com-
pany to modernize the processing of disability
claims. Lockheed Martin is still the nation’s larg-
est weapons contractor, receiving roughly $1 out
of every $10 spent by the Pentagon.
The second significant change is the privatiza-
tion of combat and support represented by such
firms as Blackwater (now Xe) and Halliburton.
Companies now supply skills and services that
once were the domain of national militaries. They
provide trained combat squads, security details,
and strategic advice to generals in the field. Sup-
port firms such as Brown and Root build and
maintain military installations, provide expert
consultants for training programs, and furnish
other specialized military services.
The final change is the erosion of the sharp divide
between civilian and military manufacturing. Mili-
The U.S. Navy’s “America’s Navy” iPhone application was tary research and development programs helped
released in August 2010. It was created through the work of the to create leading-edge software and components
Navy Recruiting Command and the advertising and marketing that, through mass production, become embed-
agency Campbell E-Wald. ded in civilian products such as the cell phone, the
Internet, and global positioning systems. Military
technology also successfully landed a man on the
moon and helped develop modern digital comput-
as California and Texas, and the intentional dis- ers. Now, the defense system depends on the same
tribution of defense contracts in many congres- civilian industries that produce microprocessors
sional districts, produced vested interests in Con- and chips for the civilian market to manufacture
gress supporting and defending a large military the components that power high-tech weaponry
budget. They donated to research institutes that such as smart bombs and drones.
then advocated policies such as regime change in
Iraq that benefited company sales. Military–Industrial–Social Media Complex?
These coalitions of mutually interested groups Defense contractors and Pentagon media bureaus
create a “revolving door” employment system, work with their personnel and friendly journal-
where military and public officials move into ists in the outside media to protect the dependent
jobs in the defense industry while members of the relationship between the nation’s industries and
industry move into the government’s bureaucracy. the military. Businesses offer defense contractors
A high percentage of retired military colonels and the ability to use social media, not only to recruit
generals work in the very defense industries they employees and gain business, but also to rebut
once supervised as officers. critics and stimulate support for increased mili-
Three striking changes in the military-indus- tary spending. The armed services and the Defense
trial complex occurred in the late 20th century. Department have outsourced some of their social
The first was the transformation of leading media monitoring to private contractors.
defense corporations such as Lockheed Martin The U.S. Army and Air Force have been espe-
into intelligence and security companies, mov- cially effective in using social media such as
ing away from the military aerospace niche Facebook, Twitter, YouTube, and Pinterest to
830 Minimal Effects Theory

champion their causes. They have been adept at Army private allegedly sent classified diplomatic
posting content appropriate to each forum, such documents to WikiLeaks, and WikiLeaks in
as hard news on Twitter, heroic military action turn released them to news agencies and on the
photos on Flickr, recruiting videos on YouTube, Internet.
and even pastry recipes on Pinterest. They know Members of the military-industrial complex
how to strategically add new content so as not to aggressively use social media to gain entry into
overload or bore followers. sites that criticize it; however, entry comes with
The official U.S. Army social media guide states a cost. Social media can open the complex to
that social media have become an integral part of the scrutiny of suspicious users such as WikiLe-
all the branches of the Defense Department. The aks. Just as modern technology is changing the
third edition of the guide discusses the appropri- military-industrial complex, social media may
ate use of missing-in-action and killed-in-action begin to change it as well.
notices posted on social media, security concerns
about social networking, and how to use Face- Timothy J. O’Neill
book and social media sites to present the U.S. Southwestern University
Army’s official position on issues. The U.S. Army
has 124,000 followers on Twitter, almost 1.2 See Also: Cyber-Jihad; Freedom of the Press and
million likes on Facebook, and over 2,500 sub- National Security; Pentagon Digital Engagement
scribers on YouTube. The U.S. Air Force has a Team; Sockpuppets; Spending and Debt, Government;
prominent social media presence. It experienced United States; U.S. Pentagon Social Media in Strategic
a 140,000 increase in Facebook fans in March Communications Program; WikiLeaks.
2012. Its Twitter account recorded over 90,000
fans in one month in 2012. Further Reading:
The Pentagon is concerned about how real or Bacevich, Andrew J. “The Tyranny of Defense Inc.”
potential enemies may use social media to wage The Atlantic (January 2011). http://www
a propaganda war against the United States. Its .theatlantic.com/magazine/archive/2011/01/
social media in strategic communication program the-tyranny-of-defense-inc/308342 (Accessed
seeks to monitor social media conversations in real September 2012).
time in order to protect troops deployed in war Dunne, J. Paul and Elisabeth Skons. “The Changing
zones. Such programs counter enemy propaganda Military Industrial Complex.” (2011). http://ideas
by using multiple accounts with different aliases, .repec.org/s/uwe/wpaper.html (Accessed September
so-called sockpuppets, to make online contacts 2012).
on Facebook, Myspace, Twitter, and other social Hartung, William D. “Eisenhower’s Warning: The
media sites used in Afghanistan and Iraq. Military-Industrial Complex Forty Years Later.”
The U.S. Navy granted Lockheed Martin a World Policy Journal, v.18/1 (2001).
three-year contract in 2012 to monitor social McNaugher, Thomas L. New Weapons, Old
media in order to gauge public sentiment. Lock- Politics: America’s Military Procurement Muddle.
heed Martin’s Advanced Technology Lab tracks Washington, DC: Brookings Institution, 1998.
and analyzes tweets to monitor social disorder
and conflict. The Pentagon’s Digital Engagement
Team challenges militant messages on Facebook,
Twitter, blogs, and online news sites by placing
false articles intended to mislead readers on Ara- Minimal Effects
bic social media sites. Apparently Defense Intel-
ligence Agency analysts have been unknowingly Theory
passed on as real news to the White House false
articles planted by other U.S. agencies. The minimal effects hypothesis states that politi-
In December 2011, new sources revealed that cal campaigns only marginally persuade and
the Defense Department used software to moni- convert voters. The hypothesis was formulated
tor Twitter discussions about WikiLeaks. A U.S. during early research into electoral behavior
Minimal Effects Theory 831

between the 1940s and the 1960s. The hypoth- through new theories, better measurement tools,
esis seemed solid and was associated with the and improved methodological designs. Various
general assumption that voters had clear posi- scholars, such as McCombs and Shaw, hypoth-
tions on issues and knew where candidates stood esized “not so minimal effects,” or demonstrated
on these issues. Since then, the minimal effects that if the media could not tell you what to think,
hypothesis has been criticized and empirical they were “stunningly successful in telling its
research since the 1980s has suggested that vot- readers what to think about.”
ers have uncertainties about candidates’ posi- The polarity between minimal effects and
tions, and these uncertainties influence voters’ big effects continued as a central thematic, but
decisions. These findings have led to renewed it gradually lost its appeal by the early 1970s.
interest in research into the effects of campaigns, Current media research has upended the mini-
with recent published research appearing both mal effects theory through the identification of a
for and against the minimal effects hypothesis. broader scope of possible effects, such as influence
Although research into social media is not exten- on attitude and knowledge. Iyengar and Simon
sive, recent studies confirm the legitimacy of the identify distinct roles of the media that influence
minimal effects theory when testing social media the audience. These media effects are now widely
during presidential campaigns. addressed in the communication, public opinion,
Paul Lazarsfeld and his collaborators at Colum- and political science literature under general head-
bia University opened a new era of thinking by ings such as information dissemination, priming,
rejecting the old hypothesis that the media have agenda setting, and framing.
great power. The minimal-effects terminology Social media services, such as Facebook, Twit-
comes from the seminal review and summariza- ter, LinkedIn, FourSquare, Youtube, or Flickr,
tion of research to date: The Effects of Mass Com- provide a platform to create online communi-
munication, published in 1960 by Lazarsfeld’s ties to connect people and share information.
student, Joseph Klapper. Although Klapper never Because they are also driving forces for trans-
used the phrase “minimal effects” in the book, the forming citizens, data, and government models,
key findings were that only a tiny fraction of vot- Hong and Nadler undertook an empirical study
ers actually change their vote intentions during an of measuring the impact of social media use in
election campaign, that audience motivation and presidential candidates.
prior beliefs influence the interpretation of per- They tested two competing theories of media’s
suasive messages, and that messages are often dis- effect—the “minimal effects hypothesis,” which
cussed among opinion leaders and friends, leading claims that the competitive edge of a media or
to mediation via two-step flow, as the narrative is technology is minimized as adoptions spread, and
told, reinforcing this minimal-effects conclusion. the other hypothesis where the media can control,
Assuming that people are more detached from frame, or influence public opinions. They defined
social institutions that used to provide shared the concept of “candidate salience” as the extent
interpretative context, and that information chan- to which candidates are discussed online by the
nels proliferated and became more individualized, public in an election campaign. They quantified
media effects on people’s opinions are minimized this salience by counting the number of mentions
and dependent on a largely unknown set of fac- that presidential candidates receive on the Twitter
tors. As receivers exercise greater choice over social media site. The results showed that high lev-
both the content of messages and media sources, els of social media activity on the part of presiden-
effects become increasingly difficult to produce tial candidates (candidates’ level of engagement)
and measure in the aggregate, creating new chal- show the minimal effects theory on the amount of
lenges for theory and research. public attention they receive online, even though
Before Lazarsfeld’s study, the idea was that social media substantially expand the possible
media overwhelms people and causes people to modes and methods of election campaigning.
withdraw from issues. After his contribution, a
new generation of scholars sought to justify the Marco Morini
discipline and to demonstrate significant effects Macquarie University
832 MIT Center for Civic Media

See Also: Communication; Network Influentials; knowledge, experience, and expertise, CCM is an
News Media; Opinion Leader Theory. international hub of new media research, design,
and practice.
Further Readings The original motivation for establishing CCM
Doan, A., R. Ramakrishnan, and A. Halevy. is multifaceted and founded on the lessons learned
“Crowdsourcing Systems on the World-Wide about the power of Internet-based political dis-
Web.” Communications of the ACM, v.54/4 course and grassroots activities during the 2006
(2011). election season. The disembodied communication
Hampton, K., L. S. Goulet, L. Rainie, and K. that the Internet facilitated during the 2006 elec-
Purcell. Social Networking Sites and Our Lives. tion attested to the global transformative nature
Washington, DC: Pew Internet and American Life of such communication and accompanying vir-
Project, 2011. tual communities it established. To better under-
Neuman, W. R. and L. Guggenheim. “The Evolution stand, harness, and develop such activities and the
of Effects Theory: A Six Stage Model of tools that facilitated them, the CCM (so named
Cumulative Research.” Communication Theory, to denote an emphasis on any communication
v.21/2 (2011). practices that strengthen social bonds among and
between community members) was envisioned as
providing a space in which collaborations between
scholars, practitioners, students, and communities
would take place in an effort to do the following:
MIT Center for
• Revitalize citizen-driven engagement with
Civic Media their governments and with each other,
utilizing new media.
Originally proposed by Henry Jenkins (director of • Assist professional journalists in devel-
the MIT Comparative Media Studies Program), oping contemporary new media–driven
Mitchel Resnick (professor of learning research communication models in service of their
at the MIT Media Laboratory), and Chris Csik- local constituency.
szentmihályi (Muriel R. Cooper Associate Profes- • Provide local communities with a chance
sor of Media Arts and Science), and located on to learn about and deploy new forms
the campus of Massachusetts Institute of Technol- of civic media that rely on collaborative
ogy (MIT), the Center for Civic Media (CCM) is partnerships between citizens and public
the product of a joint endeavor between the MIT and private bodies.
Media Lab and the Comparative Media Studies
(CMS) Program. To realize these goals, a threefold plan of
Seen as a bridge between the Media Lab (which action currently undergirds the activities of
focuses on the development of future technolo- CCM. Through engagement of select communi-
gies), and CMS (which focuses on the identifica- ties with MIT faculty, postdoctoral students, an
tion and critical assessment of technical and social administrator, and select group of undergradu-
systems that provide the infrastructure of globally ates, three main deliverables drive the center’s
and domestically dispersed communities, that is, daily practices. Specifically, the deliverables are
virtual communities), the CCM provides a space as follows:
for the investigation and engagement of civic
journalism tools and practices as they pertain to • Develop new media technologies to
a variety of diverse populations. Operating from support and facilitate civic journalism.
a platform that is bolstered by the fusion of the • Serve as an international hub for critical
ideal of transforming civic knowledge into social study and discussion of civic media tools
action via new media technologies, and the con- and practices.
cept of a fifth estate, defined as a space in which • Organize community-based “test-
all have equal opportunity to share and exchange beds” (i.e., development of innovative
MIT Media Lab 833

technology-driven models of commu- MIT Media Lab


nity outreach, communication, and
engagement). The Massachusetts Institute of Technology (MIT)
Media Lab was founded in 1985 by Professor
As a product of collaboration between the Nicholas Negroponte and Jerome Wiesner, pro-
world leaders of citizen-empowered political fessor and the science advisor to President John
technologies, MIT’s CCM has evolved into a cen- F. Kennedy. The Media Lab is a degree-granting
ter responsible for developing, critically assessing, program within the School of Architecture and
and documenting emerging technologies that aid Planning at MIT in Cambridge, Massachusetts.
in both facilitating civic journalism and actuat- It offers a degree in media arts and science, and
ing grassroots political movements and activity. is also a stand-alone research program. The lab
Through the use of a variety of channels (including originally developed from the Machine Group
forums and presentations), resources, and experi- within the School of Architecture.
mentation, CCM actively engages with local com- The current director of the lab, Joichi Ito, was
munities via a “hand-in-hand” approach, with appointed in 2012. The annual operating budget is
the goal of community partnerships that result in approximately $35 million. Funding for the Media
facilitating what it calls the “creat[ion], design, Lab comes from more than 70 corporate sponsors
deploy[ment], and assess[ment]” of innovative, at three different levels. It offers masters and doc-
technology-rich tools and practices that continu- toral degrees, but undergraduate students also par-
ously emerge and affect contemporary society. ticipate through a research opportunity program.
For example, the CCM has experimented with There are 26 different research groups. As of 2012,
technologies involved with civil disobedience and research is focused on autism and communication
phone texting, both of which have a high impact technology, the Center for Civic Media, the Center
on daily social activities. Such experimentation for Mobile Learning, the Center for Future Story-
fuels a fusion between the creation of theoretical telling, and Consumer Electronics 2.0.
frameworks and practical application, which is The idea for the Media Lab was conceived
evidenced in the curriculum, activities, and com- in 1980 by cofounder Negroponte. It is known
munication models generated and documented by for its interdisciplinary, even antidisciplinary
the center to date. approach to technology, computing, robotics,
and machines. Participants are encouraged to
Nicole E. Snell draw from any and all areas of interest. In its
Bentley University first decade, research at the Media Lab focused
on the digital, specifically in terms of cognition
See Also: Citizen Journalism; Legacy Media/Old and learning, electronic music, and holography
Media; MIT Media Lab; News Media; Oxford as they related to computing. During the 1990s,
Internet Institute. the lab’s work was particularly well known, and
it profited from the technology boom. The focus
Further Readings was on how computing had become part of every-
Knight Foundation Proposal for Funding of the day life, how bits of the digital are embedded into
Center of Civic Media. “MIT Center for Future the physical world, such as: wearable computing,
Civic Media: Engineering the Fifth Estate.” http:// wireless communications, machines with com-
civic.mit.edu/sites/civic.mit.edu/files/C4-Knight mon sense, new forms of artistic expression, and
-foundation-proposal.pdf (Accessed May 2013) new approaches to how children learn.
MIT Center for Civic Media (MITC4CM). http:// Approximately 130 start-ups and companies
civic.mit.edu (Accessed May 2013). have developed and spun off from the MIT Media
Rosen, J. A Most Useful Definition of Citizen Lab. Some key inventions that developed from
Journalism. PressThink (2008). http://journalism Media Lab research include the electronic ink
.nyu.edu/pubzone/weblogs/pressthink/2008/ technology used by electronic readers such as the
07/14/a_most_useful_d.html (Accessed Amazon Kindle, Sony Reader, or Barnes & Noble
December 2012). nook; One Laptop Per Child; the game Guitar
834 MIT Media Lab

might be used for protests, civil disobedience,


or instant voting. Members of the Civic Media
Team publish academic articles on media and
social movements focusing on regions around
the world. Publications focus on issues such as
Oaxacan peoples’ movements, the Occupy move-
ment, same-sex marriage, youth social move-
ments, and immigrants’ rights. The center also
offers six courses, including those focused on:
news and participatory media, networked social
movements, and social television.
Nicholas Negroponte (director from 1985 to
2000), professor of media arts and sciences, grad-
uated from MIT, and has been a faculty member
there since 1966. He is also the founder and chair
of One Laptop Per Child, a nonprofit association
that provides children in developing countries
with a durable and very affordable laptop that can
connect to the Internet while using limited power.
Negroponte is author of Being Digital (1995), a
compilation of 18 articles he originally wrote as
columns for Wired magazine, of which he was the
first investor. Walter Bender (director from 2000
to 2006) was a founding member of the Media
Children in a school in Peru in 2008 experiment with a laptop Lab and the head of MIT Media Lab’s Electronic
from the One Laptop Per Child program, which benefitted from Publishing Group, founded in 1978. He held the
technology originally developed at the MIT Media Lab. Alexander W. Dreyfoos Chair and was a profes-
sor in the Architecture Machine Group. He also
founded Sugar Labs, which developed the learn-
ing platform for One Laptop Per Child, but runs
Hero; LEGO Mindstorms; CityCar, a foldable, on most computers as an alternative to traditional
stackable electric car branded as the Hiriko in office desktop software.
Spain; and BiOM, the first bionic lower-leg sys- Frank Moss (director from 2006 to 2011) is
tem for amputees. Researchers who are full mem- professor of the practice of media arts and sciences
bers of the Media Lab can share in its intellectual at MIT. He expanded the lab’s reputation for doing
property without paying a license or royalty fee. practical work, researching ways that technology
Nonmembers may use developments two years could be applied to help manage health and cope
after the patent or copyright has been filed. with illness, disability, and the aging process. Dur-
The Center for Civic Media is a joint effort ing his tenure, the lab also drew on the work of
with the MIT Comparative Media Studies Pro- product designers, nanotechnologists, and data
gram. It is currently directed by Ethan Zucker- visualization work. Joi Ito (current director since
man, author of Rewire: Digital Cosmopolitans 2012) is the fourth director of the Media Lab, and
in the Age of Connection (2013). It defines is a Japanese venture capitalist. He briefly studied
civic media as any type of communication that computer science at Tufts University, and physics
strengthens the social connections within a com- at the University of Chicago, but does not have an
munity or develops a sense of civic engagement academic degree. Ito has served as a board member
among the residents of the community. They sug- of the Internet Corporation for Assigned Names
gest that transforming civic knowledge into civic and Numbers (ICANN), and has invested in tech-
action is a necessary part of democracy, so they nology start-up companies such as Flickr and Twit-
research and experiment with technologies that ter. He assisted in developing the first commercial
Mobile Apps 835

Internet service provider in Japan, and is the The Windows phone marketplace is a service pro-
cofounder and chair of Creative Commons. vided by Microsoft for its Windows 7 platform.
The Nokia store is an app store primarily for the
Deborah Gambs Nokia phone. It was launched in May 2009, and
City University of New York uses the Windows Phone 7 operating system. The
seven leading mobile platforms include Apple,
See Also: Education, Issues in; MIT Center for Civic Android, Research in Motion, Microsoft, Nokia/
Media; Technology Diffusion Paradigm. Intellisync, Sybase, and Java Platform in Micro
Edition. Research in Motion both develops and
Further Readings produces the Blackberry.
Brand, Stewart. The Media Lab: Inventing the Future
at M.I.T. New York: Penguin Books, 1988. Social Media Apps
Moss, Frank. The Sorcerers and Their Apprentices: The apps for Facebook, Twitter, Google+, and
How the Digital Magicians of the MIT Media Lab Myspace have become a conduit for discussing
Are Creating the Innovative Technologies That Will politics, both nationally and internationally. Poli-
Transform Our Lives. New York: Crown, 2011. ticians use social media to remain visible to con-
Negroponte, Nicholas. Being Digital. New York: stituents and build support. Voters can support
Knopf, 1995. their favorite candidate through text messaging,
instant messaging, and e-mail. Fundraising can
also be initiated through text messaging, Face-
book, and Twitter. Candidates use Twitter for
broadcasting messages to their constituents, and
Mobile Apps sometimes for challenging an opponent. Social
media apps for mobile phones have changed tra-
Mobile apps, or mobile applications, are applica- ditional patterns in American politics, allowing
tion software designed to run on smartphones, campaigning to be done online.
computer tablet, or laptop computers. They may Facebook and Twitter are also important to
be preinstalled during the manufacturing process, political movements in the Arab world. Social
or can be downloaded from various application media have played a central role in allowing activ-
distribution platforms. Apps assist with specific ists to organize protests, promote rebellion, and
user tasks such as reading e-mail, the newspaper, attempt to overthrow dictatorships. Facebook
e-books, playing games, or making contact on has been used to create an interactive relation-
social networking sites. ship with the masses and to voice protest against
Some apps are free, whereas others are costly. authoritarian regimes.
For apps that cost money, 20 to 30 percent of the In Syria, three months after the citizens were
revenue goes to the distributor of the app, such granted open access to the Internet and social
as iTunes. The remainder goes to the producer of media, the government attempted to restrict
the app, such as Google. Apps may purchased, it again. It was discovered that these sites were
downloaded, or updated through the following being used to promote rebellion. After the mili-
distributors: the Apple app store, Google Play, tary crackdown, social media sites were used to
the Blackberry app world, the Amazon appstore, draw attention to the situation. In Tunisia and
the Android market, the Windows phone market Egypt, social media apps were used to organize
place and the Nokia Store. The Apple app store and sustain demonstrations meant to overthrow
offers downloads from the Apple iTunes Web site. an authoritarian regime. They were particularly
The Amazon app store sells apps for the Google effective in attracting droves of young people.
Android operating system. Google Play is an online Mobile apps have made it easier for dissidents
store available internationally. It sells apps devel- to communicate because instead of using a full-
oped by Google specifically for Android devices. fledged computer, one can use a low-cost portable
Blackberry app world sells apps for Blackberry device such as a mobile phone or tablet in con-
mobile phones, including third-party applications. junction with apps customized for these devices.
836 Mobile Connectivity, Trends in Politics and

Social media apps have also changed the way Motorola engineer Dr. Martin Cooper shaped
in which people access information. Due to the mobile telephony history on April 3, 1973, when
opt-in nature of social media, users receive infor- he made a call on the world’s first handheld mobile
mation from people they know and see as trusted telephone. Forty years later Mr. Cooper, now aged
sources. Thus, the information obtained through 84, is one of 6 billion cellphone owners, millions
social media applications might have more of an of whom use cellphones and other mobile devices
impact than the same information obtained from in all areas of politics, from fundraising for politi-
the traditional media. Users feel closer to, and cal candidates to monitoring election results.
thus place more trust in, the opinions of those in Some of the earliest examples of mobile con-
their network, rather than messages from govern- nectivity in U.S. political campaigns occurred in
ment leaders. This might contribute to the power the lead-up to the 2004 elections. Because the
of social media use in helping topple authoritar- uptake of cellphones at that time was greatest
ian regimes. As a result, social media applications among young adults, grassroots groups such as
have revolutionized politics, both abroad and in Rock the Vote targeted 18 to 25 year olds with
the United States. text messages to inform them about voter regis-
tration procedures and deadlines, engage them in
Shirley Crawley political issues that affected them, and mobilize
Western Connecticut University them to volunteer for campaigns of their chosen
candidates and causes.
See Also: Arab Spring; HootSuite.com; Mobile/ In the following two years, Working Assets
Smartphone Messaging; Obama for America iPhone and Mobile Voter, and their affiliate organization
Application; Platform; Siri; Skype. govote.org, conducted text-based voter registra-
tion campaigns. Student Public Interest Research
Further Readings Groups (PIRGs), nonpartisan organizations that
Gerbaudo, Paolo. Tweets and the Streets: Social address concerns related to the environment, con-
Media and Contemporary Activism. London: sumer protection, and government reform con-
Pluto Press, 2012. ducted face-to-face on-campus, online, and text
Klofstad, Casey A. “Talk Leads to Recruitment: How campaigns that resulted in 75,000 young adults
Discussion About Politics and Current Events registering to vote in the 2006 elections. Follow-
Increase Civic Participation.” Political Research up research indicated that a text message from
Quarterly, v.60/2 (2007). Working Assets and Student PIRGs on Election
Rao, Leena. “Apple’s App Store Crosses 15B App Day in 2006 increased the likelihood that young
Downloads, Adds 18 Downloads in Past Month.” adults would vote by approximately 3 percent-
TechCrunch (July 7, 2011). http://techcrunch age points, and during the 2008 primaries, young
.com/2011/07/07/apples-app-store-crosses-15b people were 4 percentage points more likely to
-app-downloads-adds-1b-downloads-in-past turn in voter registration forms after receiving a
-month (Accessed May 2013). text message reminder from Rock the Vote.
Wilcox, John. “iPhone Finish Line.” eWeek, v.24/24 Engaging young voters also had early successes
(2009). abroad as well. In one of the first examples of
young people creatively using mobile phones in
an election period, a ringtone made from a clip
of an intercepted wiretapped telephone conversa-
tion between Filipino President Gloria Macapagal
Mobile Connectivity, Arroyo and an electoral commissioner, brought
widespread attention to the president’s attempts
Trends in Politics and to influence results of the 2004 election. Also
that year, in the general election in Spain, a text
Inspired by his vision of humankind as “funda- message campaign encouraging young adults to
mentally, inherently mobile,” and by Captain vote for the Spanish Socialist Labor Party was
Kirk’s gold flip-top “communicator” on Star Trek, likely the key catalyst for the party’s surprise
Mobile Connectivity, Trends in Politics and 837

victory. Peer-to-peer text messaging has also cooperate with Brahmins by using cellphones to
been extremely influential in mobilizing political directly communicate with voters who had his-
causes, from the Arab Spring citizen uprisings in torically been influenced by a hostile mainstream
Tunisia, Egypt, and elsewhere in the Middle East media. The party used mobile telephony to reach
and north Africa to flash mobs and protest rallies a constituency of poorer voters who were limited
in Korea and China. in their ability to travel or receive information.
By 2005, mobile delivery of news had grown In Haiti, where 75 percent of citizens use cell-
tremendously. United Kingdom (UK) mobile phones, voters use their phones to obtain loca-
phone customers accessing news services doubled tion-specific campaign and polling information
from 2004 to 2005, by which time 5 million pages and confirm their voter registration status. Use
of news and information were being accessed in of mobile telephony was particularly helpful in
the UK each week through mobile devices. The organizing the November elections following the
BBC established a text news update service in January 12, 2010, earthquake that killed a quar-
April 2005 for the May election. ter of a million people, displaced 1.5 million, and
From then on, mobile-delivered political news left the capital Port-au-Prince in ruins and the
offered an immediacy previously unseen, particu- Haitian government in disarray.
larly on election night. In the 2010 midterm U.S.
elections, the first iPhone app for local TV news Political Accountability
stations was released. Preparing for the 2012 elec- Along with new ways to engage citizens in elec-
tion, news organizations consulted mobile app tions, mobile communication is also beneficial
experts to determine how to best optimize elec- to enhance political accountability and reduce
tion news content to maximize users’ experience election fraud in the global south. Citizens with
through push notifications and interactive results camera cellphones now monitor elections outside
maps. Mobile page views of 2012 election results, voting locations, scrutinize conduct of persons
compared to those during election night 2010, entering and leaving voting sites to detect possible
increased by 350 percent. theft of ballots, take pictures of posted local elec-
tion results, and submit the images to watchdog
Mobile Trends in the Global South groups and analysts.
While these figures illustrate substantial mobile Across the African continent, where mobile
growth in the United States and western Europe, adoption increased by 550 percent between 2004
mobile trends are the most remarkable in emerg- and 2009, the cellphone market is the fastest
ing regions. In most newly industrializing regions, growing in the world. Given the estimated 732
cellphones are far easier and cheaper to obtain million subscribers in 2012 in Africa, mobile tele-
and use, and, often more pervasive than Internet phony across the continent and in other emerg-
access. Many areas in the global south that are ing regions, provides opportunities to reach the
now covered by cellphone networks were never broadest number of citizens during electoral
connected to landlines; thus, cellphones are the periods. Researchers found cellphone usage in
only means for one-on-one communication. Fur- Mozambique and Namibia enhanced voter educa-
ther, given vast increases in mobile broadband tion and participation in provincial and national
expansion, defined as high-speed access to the politics, improved electoral processes, augmented
Internet and other data services over mobile net- demand for reducing corruption, and increased
works, mobile communication is changing poli- political accountability. New research has found
tics throughout the global south. challenges, however. Whereas the vast uptake of
In what is considered the first “mass mobile mobile telephony can improve political account-
phone” elections in India, the 2007 state elec- ability, it can also facilitate politicized violence.
tions in Uttar Pradesh saw a shift in caste iden-
tity negotiations. The Bahujan (meaning “people Future Trends
in majority”) Samaj Party (BSP) that has histori- There have been numerous demands for mobile vot-
cally drawn a loyal voter base from the Dalit (the ing. In the Czech Republic, for example, research
ex-Untouchable, or Scheduled caste), was able to reported that 55 percent of Czech nonvoters say
838 Mobile Media User Data Collection and Privacy Protection

they would cast a ballot if they could vote via Mobile Phone’ Elections.” Journal of Asian
mobile phones, which would add 500,000 voters Studies, v.71/1 (2012).
in Czech elections. Numerous municipalities have Pierskalla, Jan and Florian Hollenbach. “Technology
used Internet voting in municipal elections in Can- and Collective Action: The Effect of Cell Phone
ada. Estonia, where citizens hold national smart- Coverage on Political Violence in Africa.”
card IDs, has offered online voting since 2007. American Political Science Review, v.107/2 (2013).
Anonymous routing protocols, called shuffles, Suárez, Sandra. “Mobile Democracy: Text Messages,
are currently in development for possible e-vot- Voter Turnout and the 2004 Spanish General
ing in the future. Through the protocol, voters Election.” Representation, v.42/2 (2006).
encrypt their ballots and submit the encrypted Thurlow, Crispin, Lara Lengel, and Alice Tomic.
ciphertexts to one of a team of vote talliers who Computer Mediated Communication. 2nd ed.
then set up an anonymous network, shuffle London: Sage, forthcoming.
encrypted votes, decrypt ciphertexts, and recover United Nations Development Programme. “Haiti
votes. E-voting confidentially would be guaran- Elections: Cell Phones and Internet to Facilitate
teed because at least one member of the tallying Voter Turnout.” http://www.undp.org/content/
team conceals the permutation used in the shuf- undp/en/home/presscenter/articles/2011/03/18/
fling process, eliminating chances of ballots being haiti-elections-cell-phones-and-internet-to
traced back to specific voters. -facilitate-voter-turnout (Accessed July 2013).
Given, as of May 2013, the Pew Internet and West, Darrell M. “M-Campaigning: Mobile
American Life Project reports 91 percent of U.S. Technology and Public Outreach.” Issues in
adults have a cellphone and 56 percent have a Technology Innovation, v.15 (2012).
smartphone, mobile voting will see increasing
demand. However, with 4,600 voting jurisdictions
in the United States, diverse election methods and
procedures, and concerns of voter validation, e-vot-
ing technology may well be in place long before Mobile Media User
mobile voting policies would be implemented.
Data Collection and
Lara Lengel
Bowling Green State University
Privacy Protection
Both commercial and political decisions increas-
See Also: Campaigns, Presidential (2004); ingly rest on data analytics and predictive algo-
Campaigns, Presidential (2008); Campaigns, (2012); rithms provided by mining increasingly large
Developing Nations; Geo-Locational Enabling; databases of user-generated data. Mobile data
Get Out The Vote Drives; Mobile Apps; Mobile/ collection raises privacy concerns that are to a
Smartphone Messaging; Obama for America iPhone certain extent common to those prompted by
Application; Poverty; Rock the Vote; Voter Turnout; data collection in online environments, but are
Youth Engagement. also medium-specific. However, debates about the
nature of harm derived from privacy violations
Further Readings run counter to the claim that users willingly give
Aker, Jenny C., Paul Collier, and Pedro C. Vincente. Is up personal information in return for benefits,
Information Power? Using Cell Phones During an such as free access to social media platforms. The
Election in Mozambique. Washington, DC: Center new privacy landscape is yet unsettled, although
for Global Development, 2011. it is not expected to depart significantly from the
Dale, Allison and Aaron Strauss. “Don’t Forget to traditional “notice and choice” approach com-
Vote: Text Message Reminders as a Mobilization mon to privacy regulations in both the United
Tool.” American Journal of Political Science, States and the European Union.
v.53/4 (2009). In both online and mobile environments, phe-
Jeffrey, Robin and Assa Doron. “Mobile-izing: nomena such as behavioral advertising (the tar-
Democracy, Organization and India’s First ‘Mass geting of consumers based on the recording and
Mobile Media User Data Collection and Privacy Protection 839

analysis of their past behavior, including com- ability of certain mobile apps to access users’ con-
binations of Internet-based, mobile, and offline tact lists, photos, and other personal utilities on
behaviors) or large-platform user data collection mobile devices without users’ knowledge, and the
and third-party data sharing have prompted con- use of unique device identifiers (UDID) by mobile
cerns about (1) the meaning of personally iden- applications in combination with location or
tifiable information (PII), given that de-identified other demographic data.
user behavior data may be re-identified with the
addition of, for example, location information Children’s Online Privacy Protection Act
collected by mobile devices or their unique hard- Because of the mass adoption of mobile devices,
ware identifiers; (2) the transparency of data col- the privacy regulatory landscape is shifting in
lection practices, given both the lack of standard- both the United States and the European Union,
ized, readable privacy policies on Web sites, the although these developments continue the “notice
difficulty of reading privacy policies on a small and choice” approach that puts the onus on the
mobile screen, and the fact that only a small user to self-manage privacy preferences. In the
percentage of users actually read these policies; United States, the regulatory framework con-
(3) the form and manner of data collection dis- sists of: applications of existing privacy laws to
closures, including for example at what point in the mobile environment, most notably the Chil-
a transaction a Web site or mobile app should dren’s Online Privacy Protection Act (COPPA);
display the warning that user data are being col- Federal Trade Commission (FTC) recommenda-
lected; (4) the conditions when user consent for tions regarding best privacy practices in online
data collection is required and the nature of the and mobile environments; and enforceable and
consent, for example, whether the consent should voluntary industry self-regulations. Additionally,
be explicit or implicit; (5) the availability and current legislative initiatives in Congress, as well
form of user means of signaling data collection local legislative instruments, for example the Cali-
preferences, for example, whether the user is able fornia Online Privacy Protection Act (OPPA), will
to opt out of the data collection process without potentially influence the establishment of national
loss of site or app functionality, or whether the privacy standards.
user is able to modify or delete personal data COPPA, enacted in 1998, requires the FTC
already collected; (6) the distribution of responsi- to formulate and enforce regulations concern-
bility for protecting user privacy among various- ing children’s online privacy. COPPA applies to
stakeholders, given the increasing complexity of operators of commercial Web sites and online
the personal data ecosystem; and (7) the nature services (including mobile apps) that collect, use,
of such privacy protections, for example whether or disclose personal information from children
privacy protection should be achieved via legal under the age of 13, or have actual knowledge
instruments or industry self-regulation. that they are using that kind of data from third-
These concerns are magnified in the mobile party sources. COPPA requires operators of such
environment because of the volume and nature of services to maintain the confidentiality and secu-
the mobile data collected by various players in the rity of the personal information collected from
mobile ecosystem, which includes mobile carriers, children, to retain such information only for as
operating systems, mobile application developers, long as necessary to fulfill the purpose for which
mobile delivery platforms, advertising and mar- the information was collected and delete it after-
keting agencies, advertising exchanges, or adver- wards, and make their privacy policies trans-
tising networks. Certain types of mobile data col- parent by posting notices, obtaining verifiable
lection practices have prompted added privacy parental consent before collecting information
concerns because of their increased potential for from children and giving parents access to their
user identification. These data collection prac- children’s personal information. An amendment
tices include the mobile collection and display to COPPA rules that went into effect on July 1,
of location information (considered particularly 2013, applies directly to mobile data because
sensitive because it presents added opportunities it extends the definition of personal informa-
for harm, such as stalking or identity theft), the tion to include persistent identifiers that serve
840 Mobile Media User Data Collection and Privacy Protection

to recognize users over time and across screens, technology that enables online users to opt out
including: geolocation information sufficient of third-party Web tracking. The DMA agreed
to identify a child’s address, photographs, and to honor the Do Not Track system, and the most
video and audio files that contain a child’s image recent versions of browsers such as Mozilla’s
or voice. The FTC applied the COPPA standards Firefox, Microsoft’s Internet Explorer, Apple’s
against a mobile operator, W3 Innovations, for Safari, and Google’s Chrome also provide support
the first time in 2011. for this option. In the mobile environment, Firefox
The FTC privacy recommendations, in a series for Android was the first browser to support the
of 2012 and 2013 reports, outline a comprehen- Do Not Track feature, and Mozilla is currently
sive privacy framework applicable to both online developing an open source mobile operating sys-
and mobile data collection: privacy by design, tem implementing the Do Not Track standard.
simplified consumer choice, and transparency of Apple has adopted a Do Not Track framework
consumer data collection and sharing, including for iOS6, which gives the user a single control to
consumer education. Privacy by design, a concept turn on or off tracking through ads, with Google
developed by Information and Privacy Commis- said to honor this option. The main criticism of
sioner of Ontario Dr. Ann Cavoukian, recom- this initiative is the fact that it relies on compa-
mends that organizations think proactively about nies’ voluntary (nonenforceable) commitment to
implementing privacy safeguards at the techno- honor user preferences, thus its effectiveness is
logical design stage and throughout the lifecycle questionable.
of the data collection and use process. Recom- In the European Union, the main legal instru-
mendations pertaining to simplified consumer ment applicable to mobile privacy is the ePrivacy
choice cover the conditions when companies need directive adopted in 2002 and amended in 2009,
to provide privacy choices for their customers. which regulates the processing of personal data in
Companies need not provide additional pri- the EU digital communication sector. The ePrivacy
vacy choices when they engage in activities con- directive requires EU Web site owners to obtain
sistent with the context of transaction that a cus- affirmative consent from users before installing
tomer already accepted; in contrast, third-party and running cookies or other user data collection
data sharing or “retargeting” (the practice of technologies on devices. Other privacy policies,
delivering personalized ads on third-party Web such as the General Data Protection Regulation
sites based on a customer’s history of online (2012), also known as the Right to Be Forgotten,
activity) would require additional privacy disclo- may also be applicable.
sures. Finally, the FTC recommended increased
transparency in regard to data collection prac- Mihaela Popescu
tices, increased consumer access to personal data California State University, San Bernardino
thus collected, standardization of privacy notices,
and better consumer education. In particular, See Also: Big Data; Data Mining; Foursquare;
the FTC recommended the creation of a central- Google AdWords/AdSense in Campaign Strategy;
ized Web site where data brokers would identify Google+; Platform; Predictive Analytics.
themselves and allow customers to access their
personal data. Further Readings
de Souza e Silva, Adriana and Jordan Frith. Mobile
Industry Self-Regulation Interfaces in Public Spaces: Locational Privacy,
Several industry trade associations, such as the Control, and Urban Sociability. New York:
Direct Marketing Association (DMA), have Routledge, 2012.
enforceable self-regulatory standards regarding Solove, Daniel. “Privacy Self-Management and
user privacy in the mobile environment that are the Consent Paradox.” (Harvard Law Review,
applicable to any joining member. A notable vol- forthcoming).
untary self-regulatory mechanism is the Do-Not- Tama, Julia Kernochan. “Mobile Data Privacy:
Track policy proposal introduced by the World Snapshot of an Evolving Landscape.” Journal of
Wide Web Consortium (W3C), which provides Internet Law, v.16 (2012).
Mobile/Smartphone Messaging 841

Turow, Joseph. The Daily You: How the New


Advertising Industry Is Defining Your Identity
and Your Worth. New Haven, CT: Yale University
Press, 2011.

Mobile/Smartphone
Messaging
One of the key technologies to facilitate and
revolutionize protest movements in the last five
years has been mobile phone messaging. Texting
has always offered a quick, portable, and mostly
secret way of organizing events in real time.
The arrival of smartphones has taken this kind
of organizing and information dissemination to
a new level. Videos shot on mobile phones have
been key tools in the hands of people seeking to
change the world. The introduction of free mes-
saging apps on smartphone and real-time video
chat is pushing the envelope even further. Mourners at a funeral of a protester use phones and cameras
Mobile phones have gone from being a luxury to record a speech in Bahrain on February 18, 2011. Along with
to a necessity over the last decade. While ini- texting, Arab Spring protesters posted content from their phones
tially, cell phones were valued for their ability to directly to social media networks, including Facebook and Twitter.
deliver wireless calling, gradually text messaging
has become a predominant use. Text messaging
appeals to users because of its low cost compared
to calling. However, as with any app, users have
been able to extend the usefulness of text messag- Research In Motion (RIM) transformed
ing far beyond a call replacement app. This is par- mobile messaging through the introduction of
ticularly true of younger people, who have come its BlackBerry messaging service, or BBM. The
to use text messaging as a primary form of com- distinctive feature of BBM was that it allowed
munication, going so far as to create an entire syn- messaging with other Blackberry users anywhere
tax to facilitate rapid texting. The original forms in the world for free. Users were able to create
of mobile messaging are SMS and MMS. SMS profiles on the BlackBerry network, and even if
stands for short messaging service, as the name they changed their numbers, their BBM identity
signifies users are allowed to exchange short mes- remained unchanged. This opened up a new kind
sages, generally around 160 words. MMS stands of messaging. Not only were users able to reap
for multimedia messaging service, and allows large savings by avoiding carrier charges, but the
users to append photos, video, and audio files Blackberry network also offered them privacy.
to text messages. Both these forms can be found This meant that people could instantaneously
on even the most basic of mobile phones. Users send and receive messages from anyplace for free
are charged for both sending and receiving texts and without scrutiny.
over the service provider’s network; however, low- The arrival of the next generation of smart-
cost bundles are usually available. The pricing for phones, heralded by Apple’s iPhone, has given
international text messaging is generally much birth to a whole new industry of messaging
higher than for local or domestic texting. called over-the-top (OTT) phone services. Free
842 Mobile/Smartphone Messaging

messaging services like BBM are the most popu- organizations have been able to use SMS mailing
lar OTT apps. Apps like Skype, WhatsApp, and lists to call people to action, update audiences on
Viber allow users to send and receive messages for meetings, and disseminate the latest news.
free. Users still incur data charges from carriers, The success of SMS has led to many governments
but this can be avoided by using Wi-Fi services. seeking to censor and repress the use of mobile mes-
These services go even further than BBM, in that saging. Recognizing the ability of mobile messag-
they allow users to exchange videos as well as ing to spread information quickly, more and more
make VOIP calls from their phones. In addition, governments have sought to restrict the use of SMS
popular social networking sites such as Facebook and social networks during times of unrest. Recent
and Twitter also have apps that allow users to examples include countries such as Iran, Pakistan,
post updates from their smartphones. India, China, and Sri Lanka. Some countries, such
as Pakistan, have even sought to permanently cen-
Influence sor certain words from being transmitted through
The power of mobile messaging has been recog- mobile messaging.
nized by politicians and citizens alike. In 2008,
then presidential candidate Barack Obama Conclusion
announced the name of his running mate Mobile messaging is one of the oldest of the mass
through a text message. In 2012, shortly after social media used in politics and protest. How-
winning the election, Obama posted an update ever, the introduction of smartphones and OTT
on Twitter, through a smartphone, that was services has pushed the envelope further. Recent
shared by half a million people. However, the years have shown the flexibility and utility of
use of mobile messaging for campaigning goes mobile messaging across the globe. However, as
beyond major announcements; it has become an with other social media, there continues to be a
integral part of communication strategy. A study struggle between citizen effort to use this technol-
by the Brookings Institute identified three ways ogy and government attempts to contain the per-
in which mobile phones were used in campaigns: ceived threat from this technology
to organize activists, to get the message out, and
for fundraising. Saman Talib
The power of mobile messaging can also be seen Humber College
from recent international events, such as the Arab
Spring. During the Arab Spring, particularly in See Also: Arab Spring; Campaigns, Digital;
Egypt, protesters were able to use mobile messages Demonstrations, Organizing; Flash Mobs as a
to organize themselves in real time. In other cases, Political Tactic; Mobile Apps.
text messages are used to organize flashmobs.
Beyond merely texting, protesters have been able Further Readings
to use smartphones to record video and directly Batty, D. “Arab Spring Leads Surge in Events
share it from their phones. These videos eventually Captured on Cameraphones.” The Guardian
became the primary way that the world was able (December 29, 2011).
to watch the Arab Spring unfold. Particularly with Damodar, A. “The Rise of ‘Great Potential.’”
the introduction of OTT services, mobile phone Harvard International Review, v.34/2 (2012).
users are able to post messages directly onto social DeLuca, K., S. Lawson, and Y. Sun. “Occupy Wall
networking sites such as Twitter and Facebook. Street on the Public Screens of Social Media:
Instead of reaching a few hundred, now messages The Many Framings of the Birth of a Protest
can instantly be broadcast to thousands of viewers. Movement.” Communication, Culture & Critique,
Mobile phone messaging has not only been v.5/4 (2012).
instrumental in organizing protests, but has also Lai, E. “Why Text Messaging Still Thrives Despite
been widely and effectively used in advocacy Smartphones, Twitter and WhatsApp.” Forbes
movements. SMS is a widely used tool of informa- (November 9, 2012).
tion dissemination in developing countries where Peritz, I. “From One Small Text, a World
mass media is not highly developed. Various Transformed.” The Globe and Mail (December 1,
Moblogging 843

2012). http://search.proquest.com/docview/122 to/following another’s blog no longer required the


0958325?accountid=11530 (Accessed December user to be positioned at a desktop computer; thus,
2012). moblogging was popularized.
“Spreading the M-Word; Smart Campaigning.” There are two major types of moblogs. Mac-
The Economist, v.402 (March 3, 2012). roblogs are where writers can write at length
Wait, P. “Election 2012: How Voters Play about a topic and can include other content such
Smartphone Politics.” Informationweek Online. as images and/or video. Macroblogs are mob-
http://search.proquest.com/docview/1112332175?a logs when they are created and/or updated using
ccountid=11530 (Accessed December 2012). mobile technology, though Internet users tend to
associate this blog format with desktop comput-
ing because of the time that the longer format
takes to create.
Microblogs, by comparison, tend to consist of
Moblogging short status updates, facts, opinions, and trivia
with other content such as images and/or video.
The term moblogging combines the words mobile Some popular formats for microblogging include
and blogging to indicate a blog maintained using a Twitter and Facebook. Though microblogging can
mobile device. Before moblogging, bloggers would be done via desktop computing or mobile devices,
have to update their blogs from a desktop com- it is more associated with moblogging because of
puter; early blogs were limited in the ways in which its short format (e.g., Twitter restricts users to 140
users could participate in and/or respond to con- character postings) makes it easier to compose
tent. English dictionaries have recognized “mob- when mobile, and because the popularity of micro-
log” as a term since at least 2003, though both the blogging formats increased with the popularity of
term and the practice existed before this date. mobile communication technology. Other moblog-
Canadian Professor Steve Mann is credited ging tools include BlogPress, Tumblr, TypePad, and
with creating moblogging’s forerunner when he BlogWriter.
invented his wearable Wearcam computer in 1980. One criticism of micromoblogging is that it is
Joi Ito, the director of the MIT Media Lab, notes more self-centered in its content. This is perhaps
that in February 1995, Mann began uploading due to the fact that the short form of writing that
Wearcam pictures to wearcam.org as he walked is encouraged does not allow users to engage sig-
through the streets interacting with people. This nificant topics, and is a function of mobile com-
event is arguably the first moblog post, though the munication technology that encourages personal
actual term was not coined until November 2002. communication by and about the self. Macro-
American Information Architecture expert Adam moblogs are thought to be better for detailed anal-
Greenfield is credited with coining the term, and ysis of more substantive social issues and more
was an early practitioner of moblogging. in-depth user discussion. Critics also point to the
Moblogging was made possible on a mass scale heavy commercialization of moblogging because
as a result of Web 2.0 and mobile communication of its ability to reach consumers on the go.
technology. Web 2.0 is the term used to describe Many celebrities consider moblogging a key
how the Internet shifted from a passive and static aspect of their marketing strategies as they can cre-
process, whereby users would read unchanging ate, promote, maintain, and extend their particular
content on fixed Web pages, to a dynamic and brand(s) by giving mass groups of fans access to
social practice, where Internet users could col- personal details of their daily lives. Several celebri-
laborate in online communities to create, post, ties have also damaged their personal brands by
and follow ever-changing Web page content via moblogging racist, sexist, homophobic, and other-
online dialogue and interaction. Some of the first wise discriminatory content to fans, only to later
examples of Web 2.0 were seen in wikis and inter- apologize for these views via moblogging. Critics
active blogs. With the increased popularity and also argue that moblogging is a contributing cause
functionality of mobile communication devices to the growing phenomenon of nomophobia,
and networks updating one’s blog or contributing whereby individuals report feeling anxiety when
844 Moblog.net

they are without mobile technology because it con- combination of the above.” Moblog.net offers a
stitutes an experience of severe social isolation. platform for this user-generated content. Users
On the other hand, moblogging technology has have the ability to upload pictures on the go with
also been used to advance prosocial goals and their cellphones to the Internet via the Moblog.net
causes. Moblogging has been used to foster col- Web site. Users create a moblog via Moblog.net
laborative learning and social interaction oppor- and can share their photos with users following
tunities in virtual classrooms for subjects ranging similar content on the site. As with other forms
from philosophy to foreign language study. Also, of social media, Moblog.net is instantaneous, and
moblogging played a pivotal role in communicat- users can upload images and videos to influence
ing news of protests, organized opposition, and and shape activists, mainstream journalism, cam-
human rights abuses to the world during events paigns, voters, and political culture.
such as the Arab Spring and the Syrian civil war Although moblogs today are sent from cellu-
when governments attempted to stay in power by lar phones or tablet computers, it is believed the
shutting down or controlling mainstream media first moblog post was sent by Steve Mann in 1995
channels (such as radio, television, or newspa- from a “wearable computer” at the University of
pers). In this way, mobloggers have blurred the Toronto. The device was less of a computer, and
line between citizens and journalists. more of a photographic device intended to take
undercover pictures of dangerous situations for
Gordon Alley-Young human rights workers. On February 22, 1995,
City University of New York Mann posted text from his wearable computer to
his server with an image.
See Also: Blogs; Microblogging; Mobile/Smartphone Moblog.net and the act of mobile blogging
Messaging; Moblog.net; Tumblr; Web 2.0. became widespread as the popularity of cellular
phones enabled with cellular, video, and wire-
Further Readings less technology grew. In 2012, it was estimated
Byrne, Tony. “Blogs Are Dead! Long Live Blogging!” that 114 million Americans used smartphones,
EContent, v.32/1 (2009). according to Comscore. The vast majority of
Pole, Antoinette. Blogging the Political: Politics and adults between the ages of 18 and 54 own smart-
Participation in a Networked Society. London: phones; the overall market is more than 50 per-
Taylor & Francis, 2009. cent penetrated.
Yueh-Min, Huang, Jeng Yu-Lin, and Huang Tien-
Chi. “An Educational Mobile Blogging System for Influencing Citizen Journalism
Supporting Collaborative Learning.” Journal of The rise of mobile blogging via Moblog.net has
Educational Technology & Society, v.94/2 (2009). simultaneously influenced the rise of citizen jour-
nalism, in which public citizens—not professional
journalists—share and collect news and informa-
tion. Citizen journalists do not always seek out
stories. Often, they are in the right place at the
Moblog.net right time, and can snap pictures of images that
tell stories of the political climate from around
The term moblog was coined by Adam Greenfield the world. Some images go viral, with millions
in 2002 to describe the practice of mobile blog- of users viewing them, and they become part of
ging. Greenfield helped coordinate the First Inter- mainstream media. The ability to capture footage
national Moblogging Conference held in Tokyo and images and send them to newspapers, both
in 2002, where organizers defined moblogging as, online and print, and broadcasters alters the bal-
“a blanket term that covers a variety of related ance between traditional media outlets and citi-
practices. At its simplest, moblogging is merely zen media.
the use of a phone or other mobile device to pub- Moblog.net allows users to search images
lish content to the World Wide Web, whether based on keywords with which the images are
that content be text, images, media files, or some tagged. One example of popular political content
MOMocrats 845

on Moblog.net is a user by the name of “kom- See Also: Blogs; Geotagging; Microblogging; Mobile
bizz.” The user has a profile, and describes him- Apps; Mobile/Smartphone Messaging; Moblogging;
or herself as someone who grew up in Iran and Tumblr; Twitter.
fell in love with photography. One image taken
by Kombizz was taken in January 2012 outside Further Readings
the U.S. Embassy in London where demonstra- Kline, David, Daniel Burstein, Arne J. De Keijzer,
tors, organized by the Stop the War Coalition, and Paul Berger. Blog! How the Newest Media
gathered against Western intervention in Iran and Revolution Is Changing Politics, Business, and
Syria. A woman holding a sign reading “Choose Culture. New York: CDS Books, 2005.
Peace” was pictured sitting next to Tony Benn, Mesarosh, Sally. “The Making of a Moblog.”
president of the Stop the War Coalition. Other http://www.peachpit.com/articles/article
images posted from the protests include citizens .aspx?p=342890&seqNum=2 (Accessed
carrying signs with the message “Don’t Attack December 2012).
Iran.” Another user, “taniwha,” posted images of Moblog.net. “Moblog: Camera Phone Mobile
military drones, unmanned aerial vehicles, over Blogging Community.” http://moblog.net/home
common land. This post was tagged as one of the (Accessed December 2012).
most popular posts across Moblog.net between
July and December 2012. Kombizz and taniwha,
like many users, posts images that spark conver-
sation and dialogue among followers.
MOMocrats
Special Features
Moblog.net users can further influence political MOMocrats is a national online organization
and popular culture dialogue through the use of that hosts political blogs written by progres-
geotagging. Many cellular phones are enabled sive mothers, supports progressive candidates,
with geotagging features to automatically detect and urges women to become more engaged in
the user’s location. Moblog.net also allows users politics. Their slogan is “Progressive Moms: The
to pinpoint their location on a map. This helps Revolution Begins at Home.” MOMocrats was
detect where images are taken. Moblog.net also founded in 2007 by “mombloggers” Stefania
includes a feature that allows for other users to Pomponi Butler, Beth Blecherman, and Glennia
add tags to posts. For instance, if an image or post Campbell, who invited other prominent women
is tagged as “American Embassy,” another user bloggers such as Joanne Bamberger (Pundit-
may include the tag “UK” to provide additional Mom), Stephanie Himel-Nelson (Lawyermama)
specificity to the post. Moblog.net has also inte- and Jen (oneplustwo) to join them. MOMocrats
grated groups for shared moblogs. has been discussed in print media outlets such
In addition to Moblog.net, other platforms ded- as the New York Times, the St. Louis Post-Dis-
icated to mobile blogging, or blogging platforms patch, and the San Jose Mercury News.
that support mobile devices, include Jaiku.com, On July 27, 2008, MOMocrats was featured as
BusyThumbs, Mobypicture, NowThen, Utterz, a San Francisco Chronicle blog of the week. Inter-
Treemo, Twitter, Facebook, and Tumblr. net sites such as Daily Kos, Politico, the Huffing-
Moblog.net’s overall popularity has waned ton Post, and Fem 2.0 have covered MOMocrats,
since the evolution of applications on iOS and and their writers have been featured on CNN,
Android smartphones. Applications now allow NBC, and CSPAN. They contribute to the Huff-
for instantaneous uploading to popular sites such ington Post’s “Off the Bus” feature. During the
as Twitter and Facebook. However, the site still 2008 presidential campaign, MOMocrats was
retains users who have established image feeds among the 124 blogs credentialed to cover the
and followers. Democratic National Convention. A reader sur-
vey conducted in 2011 indicated that 99 percent
Marion Jean Herbert of MOMocrats readers were female, and 86 per-
Independent Scholar cent were “Caucasian/white.”
846 MomsRising.org

Online Presence MomsRising.org; Twitter; Project Vote Smart; Writers


MOMocrats has developed a broad online pres- and Social Media in Politics.
ence. In addition to their primary Web site,
MOMocrats maintains a Facebook page, a Further Readings
“MOMochat” podcast, MOMocrats Messenger, Anderson, K.V. and J. Stewart. “Politics and the
and a Twitter account, where they use the popular Single Woman: The ‘Sex and the City Voter’ in
hashtag “SheVotes.” In October 2012, the organi- Campaign 2004.” Rhetoric & Public Affairs,
zation had 2,028 Twitter followers. MOMocrats v.8/4 (2005).
has participated in new media conferences such as Bamberger, J. C. PunditMom’s Mothers of Intention:
BlogHer and Blog World Expo. Women & Social Media Are Revolutionizing
Politics in America. Houston, TX: Bright Sky
Campaign Involvement Press, 2011.
MOMocrats actively promotes progressive politi- MacDougall, R. C. “Podcasting and Political Life.”
cal candidates. Its “Run, Mama Run” interactive American Behavioral Scientist, v.55/6 (2011).
tool (MOMocrats.com/run-mama-run) allows Meraz, Sharon. “The Fight for ‘How to Think’:
voters to identify local, state, and national Demo- Traditional Media, Social Networks, and Issue
cratic women candidates and contribute to their Interpretation.” Journalism, v.12/1 (2011).
campaigns. MOMocrats also supports progres- Metzgar, E. and A. Maruggi. “Social Media and the
sive male candidates. During the 2008 Democratic 2008 U.S. presidential Election.” Journal of New
presidential primary, it backed John Edwards. In Communications Research, v.4/1 (2009).
2012 they endorsed Barack Obama and linked to Parmelee, J. H. and S. L. Bichard. Politics and the
the Obama campaign’s gottaregister.com voter Twitter Revolution: How Tweets Influence the
registration tool on its Web site. Relationship Between Political Leaders and the
A number of prominent female political figures Public. Lanham, MD: Lexington Books, 2012.
have blogged for MOMocrats and/or appeared “Portrait of a MOMocrat: Reader Survey Results”
on their MOMochat podcast, including First (August 21, 2011). http://momocrats.com/
Lady Michelle Obama, U.S. Senator Kirsten Gil- legacy/2011/08/portrait-of-a-momocrat.html
librand, Kansas City Mayor Kay Barnes, Con- (Accessed October 2012).
gresswoman Allyson Schwartz, Congresswoman Vavrus, M. D. “From Women of the Year to ‘Soccer
Carolyn Maloney, NARAL Pro-Choice America Moms’: The Case of the Incredible Shrinking
President Nancy Keenan, and MomsRising.org Women.” Political Communication, v.17/2 (2000).
cofounder Kristen Rowe-Finkbeiner.
MOMocrats has supported issues such as pay
equity, reproductive choice, public education,
fair trade, environmentalism and green entrepre-
neurism, expanded access to and public funding MomsRising.org
for women’s health care, and antibullying. It has
opposed conservative budget proposals, questioned MomsRising.org was founded by Joan Blades and
the wars in Iraq and Afghanistan, and criticized a Kristin Rowe-Finkbeiner. Prior to founding Moms­
number of conservative political figures. Despite its Rising, Joan Blades and her husband, Wes Boyd,
partisan perspective, however, it objected to sex- were also cofounders of MoveOn.org, a Web site
ist coverage of congressmember and Republican that began in 1988 to oppose the impeachment of
presidential hopeful Michele Bachmann during the President Clinton. Despite its predecessor, Moms­
2012 Republican primary campaign. Rising.org is defined as a nonprofit, nonparti-
san advocacy organization. With a social media
Karrin Vasby Anderson reach of more than 3 million people, MomsRising
Colorado State University .org is focused on a more family-friendly Amer-
ica. This Web site is sustained by the content gen-
See Also: Blogs; Bachmann, Michele; Campaigns, eration efforts of 700 bloggers, who write about
Presidential (2008); Gender; Gillibrand, Kristen; the following campaigns: maternity and paternity
MomsRising.org 847

leave, open flexible work, toxic free families, friends. To supplement the documentary portion
health care for all, early care and education, real- of the viewing party, hosts are also supplied with
istic and fair wages, and sick leave (paid). These a discussion guide to spark conversation about
are collectively called MOTHERS campaigns. the content in the documentary. The official pre-
One of the primary ways that the MomsRis- miere of the documentary was held in Washing-
ing organization communicates with others about ton, D.C., in the Senate office building. Senators
maternity and paternity leave is through a travel- Ted Kennedy, Chris Dodd, Barack Obama, and
ing display of onesies (one-piece baby outfits) that Hillary Clinton cosponsored the premiere, and
are decorated and mailed from moms (and sup- numerous senators attended the event.
porters) across the nation. This ONEsie campaign The primary blog entries on the MomsRising
serves as a reminder to state and national leaders Web site are contributed by MomsRising read-
that lives are positively and negatively affected ers, ranging from politicians and governmental
by family policies. In addition to the ONEsie administrators to full-time and part-time moth-
campaign, MomsRising.org also promotes open ers focused on the MOTHERS campaigns. Each
flexible work policies through a guide, titled of the blog entries features a Twitter button and
“The Custom-Fit Workplace: Choose WHEN, a Facebook “like” button to share the stories
WHERE, and HOW to Work and BOOST YOUR with others on social media networks. Mom-
BOTTOM LINE.” To focus on the issues regard- sRising has a robust presence on Twitter, with
ing toxic free families/households, MomRising. more than 23,600 tweets, following over 12,500
org urges its members to send a persuasive letter people, and 24,200 followers.
Congress focused on fixing the Toxic Substances One of the ways that MomsRising engages its
Control Act and eliminating the usage of BPA in followers is through smaller social media cam-
household items. paigns such as National Women’s Health Week
To encourage members to advocate for national Bingo. Participants share their process on their
health care programs (i.e., the Child Health Insur- personal bingo cards throughout the week, and
ance Program (CHIP) and Medicaid), MomsRis- the first 50 people who are participants in this
ing emphasizes the importance of writing mem- event win a prize from the MomsRising group.
bers of Congress about health issues. Early care MomsRising has over 26,600 “likes” on Face-
and education is another issue promoted by book. Most of the organization’s posts are pic-
MomsRising, which encourages members to share ture based (memes). The organization’s Face-
their child care search experiences and their opin- book messages reinforce Facebook campaigns
ions regarding affordability of child care services and messages to extend the organization’s reach
with members of Congress. To promote realis- on social media.
tic and fair wages, MomsRising.org urges mem- MomsRising has almost 40 boards, slightly
bers to communicate with members of Congress under 900 pins, and almost 100 “likes” on Pin-
about the importance of the American Jobs and terest. The organization’s boards range from “Pin
the Paycheck Fairness Acts. Finally, MomsRising Your Made in the USA Finds” and “Books Worth
promotes paid sick leave for women through the Reading” to “Paid Family Leave” and “Brilliant
support of the Healthy Families Act. Famous Women.” With slightly over 1,200 fol-
Upon joining the Web site, each new member is lowers, this organization has an active presence
sent an e-mail requesting him or her to invite five on one of the newest social media Web sites.
family and friends to become members. To reiter- Since July 2008, MomsRising has maintained a
ate this grassroots membership strategy, Moms- social media presence on YouTube. With over 110
Rising often sends a holiday-themed “High Five” subscribers and almost 143,000 views, this organi-
e-mail to recruit five individuals to join the Web zation posts almost four videos and playlist contri-
site. To communicate with its members about the butions per month. These videos range from “Get
importance of women-themed political issues in Your Groove On, Mom—and Go Vote!” to “First
an alternative fashion, members are encouraged Lady Michelle Obama Addresses MomsRising
to host house parties to show a documentary titled .org’s Food Power Conference.” To focus on addi-
“The Motherhood Manifesto” to their family and tional women’s issues and concerns, MomsRising
848 Monarchies, Social Media, and Politics

features a comprehensive Blog Roll consisting of and effective paradigm for how to integrate these
numerous individual and organizational blogs intensely democratic communication structures
focused on women’s issues and concerns. These within a monarchial context.
blogs range from “A Better Balance” to “The Cali-
fornia Work and Family Coalition” blog. Queen Rania
Born in Kuwait, Queen Rania has a background
Jennifer Edwards in marketing, and worked for Apple’s marketing
Sarah Maben department prior to her marriage in 1993. She is a
Tarleton State University global fashion figure, respected by Western media,
and she uses her global visibility to champion the
See Also: Blogosphere; Blogs; Campaigns, rights of women and children, encourage broad-
Grassroots; Gender; MOMocrats. band interconnectivity, and promote the need for
education, which she believes is key to improving
Further Readings the economic and living conditions of Jordanians.
Blades, Joan and Kristen Rowe-Finkbeiner. The Within Jordan, however, she is often perceived as
Motherhood Manifesto. New York: Nation Books, having too great an influence over her husband’s
2006. monarchy. Because of her marketing and technol-
Gehl, Laura. “The Mother Lode.” Stanford Social ogy background, Queen Rania understands how
Innovation Review, v.6/2 (2008). to leverage the power of the Internet to bring
Rowe-Finkbeiner, Kristen. The F-Word: Feminism in about change. This is especially important because
Jeapordy. Emeryville, CA: Seal Press, 2004. there are no Internet restrictions in Jordan. There-
fore, she is extremely active on social media and
the Internet, using it to communicate with her four
children when she is away. Her Twitter account,
@QueenRania, is followed by more than 2.5 mil-
Monarchies, Social lion people, and she uses the tag line “A mum and
a wife with a really cool day job.”
Media, and Politics Queen Rania has a Web site, Facebook
page, YouTube channel, and Flickr and Twit-
The need to communicate over vast empires is not ter accounts, all of which are actively updated
unique to modern monarchies. Poor or abstract (appearing to make some of the posts herself)
communication is cited as a reason for the fall with news of her causes, as well as stories about
of empires from Rome to Britain. Monarchs in the royal family. She will also conduct interviews
the digital age, however, have an unprecedented via social media. Queen Rania believes that being
array of communication tools that can dissemi- a virtual queen allows her subjects to be closer to
nate information with subjects while creating an her and fosters cross-cultural understanding and
appearance of approachability. Rulers who have equal rights. As a result, she was selected in 2010
embraced digital media as a political or social as the third most influential leader in social media,
advocacy platform have experienced both the behind Barak Obama and 10 Downing Street. At
benefits and disadvantages of digital accessibility. that time, only one in five leaders were utilizing
Although the use of the Web, Twitter, Facebook, social media, according to a Digital Policy Coun-
and similar platforms as links between the Crown cil study. In 2012, she was ranked fourth, but the
and its public is becoming an increasingly fre- number of world leaders using social media had
quent phenomenon, two cases in particular stand increased to three out of four.
out as models of ways in which social media can While social media has created an international
be adopted by modern-day monarchies. Queen platform for potential change, Queen Rania has
Rania al Abdullah of the Hashemite Kingdom experienced increased scrutiny because of her
of Jordan and the British royal family are differ- global visibility. On her 40th birthday in 2010,
ent from one another culturally, religiously, and she flew guests in from around the world for a
historically; yet, each has developed an extensive luxurious birthday celebration in the desert
Monarchies, Social Media, and Politics 849

Queen Rania of Jordan, center, stands between Microsoft Chairman Bill Gates and Prime Minister of the United Kingdom Gordon
Brown at the annual meeting of the World Economic Forum in Davos, Switzerland, on January 25, 2008. Others pictured include the
musician Bono, President of Nigeria Yar’ Adua, and Secretary General of the United Nations Ban Ki- Moon.

canyon of Wadi Rum. Coverage of this event led her reign. In 1957, the queen’s first televised
to widespread criticism of the monarchy’s lavish Christmas message, which had the theme of tech-
lifestyle. As a result, Queen Rania was advised nology, expressed a hope that the new medium
to scale back her activities in order to improve would allow her messages to be more personal
her reputation and demonstrate that she does not and direct. The 2012 Christmas message was
play a prominent role in ruling the country. Plans delivered for the first time in 3D. Queen Eliza-
for a Queen Rania Foundation have been halted, beth also makes personal use of a BlackBerry and
in spite of a social media design logo contest, and an iPod. However, the British royal social media
her appearances, especially in the Jordanian press, channels, unlike those of Queen Rania, are not
have been minimized. Such curtailment is cru- designed to provide personal access to the monar-
cial because criticism of her husband’s reign has chy, but to create professionally produced images
grown since 2011. There is a sense that her global of a hard-working and caring royal family.
connectivity and Western appearance disconnect Embracing Flickr in April 2010, the first photo
her from Jordanians, especially traditional Bed- was of the queen visiting a cancer clinic. The offi-
ouins. It is a Catch-22 that many leaders face with cial royal Web site features links to the British
social media and international outreach. monarch’s royal YouTube channel, and Facebook,
Twitter, and Flickr pages, as well as links to other
Queen Elizabeth II government sites. The queen was Google’s first royal
Queen Elizabeth II of England has navigated the client in 2007, and the YouTube channel had more
pros and cons of new technology usage throughout visitors than the White House channel in its first
850 Morozov Principle

two days. In 2008, it had twice as many subscrib- International Unrest and Revolution; Middle East;
ers as Queen Rania’s YouTube channel. The first Television Personalities and Social Media in Politics.
royal tweet occurred in 2009 (now over 400,000
followers), and the Facebook page launched on Further Readings
November 7, 2010 (over 630,000 “likes”). All of Barnett, Emma. “Queen Rania, Jordan’s Virtual
the social media sites are maintained by a public Queen.” Telegraph (December 18, 2009).
relations firm, which may explain the low numbers Black, Ian. “Queen Rania: Too Prominent for the
of “likes” and followers. Monarchy.” The Guardian (May 12, 2012).
Reporting on the daily activities on the monar- Williams, Martin. “One Is Out Inspecting the Realm
chy is not new; George III started the practice in ... the Queen Joins Facebook.” Sunday Herald
1803, but Queen Elizabeth was an early adopter (November 7, 2010).
of technology. In 1976, before the Internet was
commonly used, she sent her first e-mail using a
British Army computer. The use of social media
by the monarchy, while creating new levels of
protocol, is designed to not only communicate Morozov Principle
with the broad public, but also to help manage
perception and create engagement by answering Based on the writings of academic and frequent
questions and testing ideas. The ultimate goal is media commentator Evgeny Morozov, the Moro-
to increase confidence in the royal family. zov principle encapsulates the necessity of exam-
Scandals have marred that attempt. In 1980, ining both the advantages and disadvantages of
Prince Philip was the victim of a hacking contro- the political role of social media, particularly in
versy when two journalists gained access to his the context of prodemocracy movements that aim
e-mail account. More recently, in September 2012, to destabilize authoritarian states. The Morozov
Prince Harry learned the dangers of allowing cell principle operates in response to the flurry of opti-
phone cameras too close when he was photo- mism that frequently accompanies accounts of
graphed naked during a Las Vegas vacation. The social media’s role in various political contexts—
women who had been invited to his suite to play including the 2009 Moldova and Iranian protests
strip poker allegedly took the pictures with their and the 2011 uprisings in Tunisia and Egypt (part
cell phones and then sold them to the TMZ Web of the Arab Spring) that were hailed as Twitter
site. While British journalists were asked not to and Facebook revolutions in the Western media.
print the pictures, Rupert Murdoch’s Sun decided Morozov argues that perspectives hinging upon
that it would because the pictures had already optimistic assumptions about the use of social
been distributed on the Internet. Following the media that ignore disadvantages must be aban-
Vegas scandal, Prince Harry deleted his personal doned to better contextualize the nature of geo-
400-friend Facebook page that was maintained political conflicts and work toward formulating
under the pseudonym Spike Wells. Prince Harry, more effective means of employing technology
like other royals, is a member of the millennial gen- and aiding local civil society groups in the service
eration, which is well connected via social media. of democracy.
Such issues reflect the reason that official social
media channels tend to be well controlled and lim- Cyberutopianism and Internet-Centrism
ited in the type of information that is disseminated. Morozov specifies two ways in which many com-
However, as Queen Rania has shown, social media mentators fall prey to privileging the advanta-
can be useful for monarchies as a tool for advocacy. geous role of social media for democratization
while often entirely ignoring the disadvantageous
Pamela C. O’Brien role. First, “cyberutopianism” refers to “a naïve
Bowie State University belief in the emancipatory nature of online com-
munication that rests on a stubborn refusal to
See Also: Actors and Social Media in Politics; acknowledge its downside.” Cyberutopianism
Countries Banning Social Media for Political Reasons; fails to examine the underlying assumptions that
Morozov Principle 851

engender the belief that social media (and the based on a love of books, Iranians used it to
Internet more generally) predominantly offers a establish a safe(r) space for political discussion.
wealth of opportunities for democratization—
from the ability to find information online that Social Media and Authoritarian Regimes
discredits repressive regimes to the ability to coor- The Morozov principle not only emphasizes the
dinate activities and voice dissent within decen- need to consider both advantages and disadvan-
tralized spaces. Their assumptions tip the scale tages of social media’s role in politics, but also
toward advantages while avoiding consideration implores the public to consider whether the nega-
of the opportunities that these digital tools offer tive may outweigh the positive. This leads Moro-
authoritarian states wishing to maintain their zov to detail the many ways in which authoritar-
dominance. Morozov remains unconvinced that ian governments have been effectively using social
the Internet is inherently more useful for obtain- media and other new technologies to advance
ing the truth about a repressive regime than for their goals and quell attempts by the opposition
the same regime to repackage their propaganda to build support. Strategies include surveillance
tools and effectively employ them online. activities, counter-insurgency tactics, censor-
Second, “Internet-centrism” refers to “a phi- ship, and shutting down connectivity (entirely or
losophy of action” that unquestioningly places within strategic regions). Iranian authorities have
the Internet at the forefront of strategies designed used Facebook to gather intelligence about the
to achieve or promote democratization. These organizational strategies of Iranian activists.
approaches are fundamentally flawed because While Iranian activists were praised in West-
they prioritize “the tool over the environment” ern media for documenting their protests and
and in doing so remain ignorant of “social, cul- responses by police, the authorities not only com-
tural, and political subtleties and indetermina- piled their own documentation but also used the
cies.” Morozov argues that Cold War triumpha- images collected and shared by activists to later
lism has prompted and helped to entrench such ask the public to identify individuals who were
technologically deterministic perspectives, with then arrested. Attempts to censor information
many Western leaders and thinkers erroneously have been used to varying degrees by repressive
elevating the role of information and communi- regimes, but many have recognized the difficulty
cation technologies (such as faxes and radio) in and even impossibility of preventing the spread
the peaceful dissolution of the Soviet Union. This of information. In fact, the “Streisand effect”
emphasis omits the role of structural factors and refers to the increased publicity that information
political-economic conditions that contributed can often acquire as an unintended consequence
to the fall of state socialism, instead highlighting of censorship practices. Instead, Morovoz argues
technology as the vital, lethal weapon. that spin is now preferred by many authoritar-
Morozov also points out that adherence to ian states, a concept he calls “spinternet.” For
cyber-utopian perspectives can be irresponsible, instance, China financially employs citizens to
leading to further negative consequences for the promote ideologically appropriate messages
citizens of authoritarian states. For example, the online, opting to engage in online discourses.
New York Times’ emphasis on the Obama admin- Morozov also points out that there is no rea-
istration’s request that Twitter delay site mainte- son to believe that the Internet is only useful for
nance in order to avoid impeding the use of the prodemocracy groups. This point illuminates the
service by Iranian dissidents likely contributed to complexity of the geopolitical regions that cyber-
the Iranian government’s belief in the power of utopian writers (and Western media in general)
Twitter and subsequent efforts toward tracking too often ignore. Morozov details the existence
down and arresting online dissidents. Morozov and in some cases strong persistence of groups
also describes how a Los Angeles Times article who support authoritarian regimes or represent
inadvertently made dissidents visible to Iranian perspectives antithetical to the goals of democratic
authorities through a description of their appro- movements. These groups have equal access to
priation of a social-networking service called social media tools to coordinate, collaborate, and
Goodreads. Designed for community-building promote their views, as well as take action against
852 Mosireen.org

prodemocracy groups and other dissidents by sur- contextual factors relating to the particular social,
veilling their activities and requesting that social cultural, political, and economic circumstances of
media services remove dissident material. Egypt’s each geopolitical region while seeking to empower
extremist Muslim Brotherhood, Russia’s extreme dissident groups on the ground.
right-wing Movement Against Illegal Immigration
group, and Mexico’s criminal gangs all use social Rena Bivens
media tools to, respectively, campaign for release Carleton University
of fellow extremists, employ Google Maps to root
out ethnic minorities, and upload gruesome and See Also: Activists and Activism, Digital; Arab
violent videos to YouTube to intimidate and rein- Spring; Demonstrations, Organizing; Digital
force their power. Al Qaeda is another group with Revolution; Hacktivism; International Social Media
a sophisticated online presence, using new media and Politics; International Unrest and Revolution;
tools to their advantage, yet this disadvantageous Technological Determinism.
side of the social media and politics story is rarely
dissected or even mentioned in Western media. Further Readings
Morozov, Evgeny. The Dark Side of Internet
iPod Liberalism Freedom: The Net Delusion. New York:
Moreover, the Internet can also be seen as yet PublicAffairs, 2011.
another “opiate of the masses,” offering numbing Morozov, Evgeny. “How Dictators Watch Us on the
entertainment and distraction that occupies the Web.” Prospect (November 18, 2009). http://www
minds of the public, deterring them from critique .prospectmagazine.co.uk/magazine/how-dictators
and participation in dissident activities. Morozov -watch-us-on-the-web (Accessed November 2012).
offers examples of authoritarian governments Morozov, Evgeny. “How the Net Aids Dictatorships.”
actively encouraging the use of the Internet as an TED Talk (July 2009). http://www.ted.com/talks/
opiate by, for instance, providing “dedicated serv- evgeny_morozov_is_the_internet_what_orwell
ers full of pirated digital goodies” for free down- _feared.html (Accessed November 2012).
load and consumption. From this framework, the
availability of social media tools does not entail or
enable political consciousness or even the motiva-
tion to seek out information about the immorality
of their government that is now available to many Mosireen.org
citizens of authoritarian states. Morozov calls this
“iPod liberalism,” and questions why cyberuto- Mosireen is an Egyptian media collective with
pianism is accompanied by the assumption that a presence in multiple social media outlets. The
all people who own a particular technology are group’s name is a combination of the Arabic
likely to share liberal values. In the same vein, words for “determination” and “Egypt.” It was
cyberactivism is commonly heralded in Western formed during the 2011 Egyptian uprising, and
media, but cyberhedonism is rarely emphasized. used footage gathered by citizen journalists to
Many Internet users may become “digital cap- counter propaganda from state-run media. The
tives,” downloading pornography and playing group continued to provide a critical perspective
World of Warcraft, or simply use the Internet for during the rule of the interim military govern-
a variety of benign, social motivations, instead ment, and it posted content critical of the current
of actively seeking out critical information and government, which is dominated by the Muslim
activist groups to join. Brotherhood. Four activists founded the organiza-
The Morozov principle incorporates both posi- tion during the Egyptian revolution. As described
tive and negative political uses of social media, by their Web site, the collective was “born out of
and in doing so does not conclude that all efforts the explosion of citizen media and cultural activ-
toward digital democracy be aborted. Instead, ism in Egypt during the revolution,” and aims at
Morozov aims to improve these efforts through “wrong-footing censorship and empowering the
a cyber-realist approach that incorporates wider voice of a street-level perspective.”
Mosireen.org 853

After the fall of President Hosni Mubarak, the Mosireen media collective continued to promote the collection of footage related to the
2011 revolution and to the ongoing abuse of power by military forces. This woman was setting up a video camera in order to record
the testimony of victims of torture by Egypt’s Mubarak regime on November 17, 2011, in a Mosireen workspace near Cairo, Egypt.

In January 2011, thousands of Egyptians gath- to July 2012, as well as the Muslim Brotherhood–
ered in Tahrir Square to protest against political dominated government of President Mohamed
oppression and economic stagnation. In Febru- Morsi, who took office in July 2012.
ary 2011, after weeks of violent clashes between The group functions as a media collective, and
police and protesters, President Hosni Mubarak according to its Web site, focuses on “supporting
announced that he would step down after 30 citizen media of all kind.” It operates on the prin-
years in power. ciple of crowdsourcing; it does not employ pro-
The founders of Mosireen were initially fessional journalists, but instead relies on footage
involved with the Tahrir Square media tent; dur- from amateur activists, often taken using smart-
ing the January 2011 protests, the tent served as phones. To this end, the group maintains a collec-
a hub where activists could bring video footage tive space in downtown Cairo, with sound, light-
of government attacks on protesters and have it ing, and editing equipment; citizen journalists are
quickly edited and uploaded to an online archive. welcome to use the facility to create or edit videos
After Mubarak stepped down, Mosireen con- for upload. Mosireen also runs a program to train
tinued its activism; as its Web site notes, “Egypt’s potential citizen journalists; the program operates
march toward the future its millions demanded on a pay-what-you-can basis.
did not end with Mubarak leaving power, it During the protests to overthrow Mubarak,
began.” In accordance with this, the organization the four founders of Mosireen concentrated on
posted critical videos during both the rule of the gathering footage of government brutality against
interim military government, from February 2011 protesters and disseminating it both inside and
854 MoveOn Effect, The

outside of Egypt. In an interview, Salma Said, one of uploading videos to the site, Mosireen became
of the founders, noted that in the aftermath of the most watched nonprofit channel inside of
the revolution, the group decided to continue its Egypt. As of May 2013, Mosireen had uploaded
efforts to ensure that the post-Mubarak regime 255 videos to the site. One of its most popular
followed through on its promises to implement videos is Victory to the Martyrs; the 10-minute
a more democratic government. In accordance film contains footage compiled by hundreds of
with this, during the nearly 17 months of military activists, and documents the killing of protesters
rule under the transitional government, Mosireen between January and November 2011. The film
continued to upload footage documenting army had garnered more than 118,000 views by 2013.
abuses of power, including a massacre of Cop- The group has also relied on social media to
tic Christians and an attack on activists engag- raise funds for its activities and training programs.
ing in a sit-in outside of Parliament. In addition, In 2012, using the Web site Indiegogo, the group
while filming, Said was shot with bird shot by the managed to raised more than $40,000 to support
police; when the interior minister denied that the its operations. This use of crowdfunding, soliciting
police ever fired upon unarmed citizens, Mosireen many small donations of no more than $1,000, has
posted footage of Said discussing her injuries, as allowed Mosireen to retain its editorial indepen-
well as x-rays from her hospital visit. dence and turn down funding from nongovernmen-
In the months leading up to the one-year anni- tal organizations and the Egyptian government.
versary of the revolution, Mosireen launched the
Tahrir Cinema initiative; here, the group set up Kelly McHugh
film screenings in Tahrir Square, showing footage Florida Southern College
from the 2011 protests. The aim was to remind
viewers of the goals of the revolution and to fight See Also: Arab Spring; Egypt; 18daysinegypt.com.
political apathy. The group also helped individu-
als set up street screenings of the footage; Said esti- Further Readings
mated that Mosireen distributed 10 to 20 DVDs Khamis, Sahar and Katherine Vaughn.
of the footage each day for nearly two months, “Cyberactivism in the Egyptian Revolution:
allowing individuals to host private screening in How Civic Engagement and Citizen Journalism
their homes. Tilted the Balance.” Arab Media and Society,
Since July 2013, Mosireen has been highly criti- v.13 (2011).
cal of the elected government of Mohamed Morsi. Mackey, Robert. “Crowdfunding Citizen Journalism
Mosireen’s main Web site contains a section titled in Cairo” New York Times (November 4, 2012).
“Know Their Constitution”; it features videos http://thelede.blogs.nytimes.com/2012/11/04/
critical of the new constitution that were writ- crowdfunding-citizen-journalism-in-cairo
ten by the Muslim Brotherhood, and urges view- (Accessed May 2013).
ers not to support it. In addition, on its YouTube Mosireen. http://mosireen.org (Accessed May 2013).
page, Mosireen posted multiple videos highlighting
the Morsi government’s corruption and abuses of
civil rights. The page also features videos focused
on Morsi’s failure to deal with basic public service
issues, such as the garbage problem in Egypt. MoveOn Effect, The
Mosireen maintains a Web site that contains
information about the group’s mission, political The MoveOn Effect is the title of a book authored
activities, and educational opportunities. It also by David Karpf and published by Oxford Univer-
has a Twitter account with 49,000 followers, and sity Press in 2012 (the full title is The MoveOn
Said maintains a separate Twitter account that has Effect: The Unexpected Transformation of Ameri-
nearly 99,000 followers. Mosireen has a Flicker can Political Advocacy). The term refers not to
account to post photos, and a Facebook page with the direct effectiveness of MoveOn.org, but to
more than 11,000 “likes.” Its main Web platform, the indirect effect of netroots-driven innovations
however, is its YouTube page. Within three months on the broader ecology of the political advocacy
MoveOn Effect, The 855

system. In particular, the MoveOn effect is found they merit the term. Membership has been rede-
in two trends: changes in organizational member- fined by the organization, not by the members.
ship regimes, and changes in organizational fund- Any recipient of MoveOn.org’s e-mail messages
raising regimes. These two changes, in turn, give (or virtually any other “netroots” organization’s)
rise to a generational shift in organizational struc- is classified a member, whether they provided a
tures, networks, and tactics, while simultaneously donation, took regular actions (online or offline),
disrupting longstanding advocacy organizations. or simple clicked once on an e-petition.
The central argument is that these second-order Both of these changes in membership regimes
effects have a larger impact on political activism are rooted in technological affordances. The pre-
than the direct affordances offered by individual vious medium of direct mail allowed organiza-
social media tools. Rather than organizing with- tions to “prospect” far and wide for small donors.
out organizations, the MoveOn effect implies that Each additional piece of direct mail carries a mar-
the Internet’s greater impact is through organizing ginal cost, though (stamps, physical paper, and
with different organizations. printing). The marginal cost of physical mail cre-
ates an incentive for single-issue organizations
Membership Regimes with member lists made up of supporters who
Organizational membership regimes change in are likely to donate. Membership has to be tied
response to available communications technolo- to donations so that an organization does not go
gies. In the 1970s, the decreased costs of data- broke through member communications.
base management brought about by revolutions The marginal costs of e-mail, by comparison,
in mainframe computing allowed nonprofit civil are approximately zero. The cost of adding one
society organizations to redefine membership from additional person to an e-mail distribution list
face-to-face participation to check-writing by mail. (10,000 recipients versus 10,001) is nonexistent.
In prior decades, membership was defined through The lack of marginal costs for online communi-
large, federated membership structures. To be a cation creates an incentive for the development
member of the Rotary Club, the Elks Club, or the of multi-issue organizations with member lists
Sierra Club meant attending local meetings, build- made up of all individuals who might donate their
ing strong social ties, and developing an identity money or time under some circumstances. This
as a “Rotarian,” an “Elk,” or a “Sierran.” These redefinition of membership is central to all other
strong ties had many social benefits, but they also elements of the MoveOn effect. Altering the rela-
demanded substantial time commitments from tionship between an organization and its member-
members and substantial support resources from stakeholders creates ripples in how an organiza-
the organization. With the rise of direct-mail fund- tion builds a stable funding base, what issues it
raising, organizations were instead able to connect works on, and how it works on those issues.
with supporters individually without that local Netroots organizations take a “sedimentary”
infrastructure. In exchange for a calendar, a maga- approach to building a broad membership. Typi-
zine, or some other participatory incentives, orga- cally, they focus on high-profile issue campaigns,
nizations built their ranks of “armchair activists” offering a productive outlet for partisan outrage
who participated by mail but did little else. This over the latest political controversy. Timely appeals
innovation enabled the “interest group explosion” are more likely to “go viral,” spreading beyond the
of the 1970s, giving rise to a wave of single-issue, most frequent participants to their broader peer
professionally managed advocacy groups based in networks. Once the controversy ends, the organi-
Washington, D.C. zation is left with a list of new member/supporters
Beginning in 1998, MoveOn.org redefined as a sedimentary residue of sorts.
membership a second time, from check-writing
to online membership. While check-writing mem- Fundraising Regimes
bers are sometimes disparagingly called “armchair Organized advocacy groups require stable rev-
activists,” Internet-based members are sometimes enue streams in order to plan and execute long-
disparagingly labeled “clicktivists.” Interestingly, term strategic information and influence cam-
many of these members do not even realize that paigns. In rejecting the direct-mail model of
856 MoveOn Effect, The

membership through small donations, the “net- A/B testing of e-mail messages. The organization
roots” generation of advocacy organizations sends out multiple test versions of an e-mail to
must identify replacement funding mechanisms. randomized segments of its member list. By track-
MoveOn.org again acted as the innovator in this ing e-mail open rates, e-mail clickthrough rates,
area, and peer organizations have followed suit. donation rates, and action rates, the organization
In the area of fundraising, the MoveOn effect is able to determine the issue topics, issue frames,
consists of a transition from annual general-use and action requests that its membership prefers.
member donations to rapid-response, targeted Since success in online fundraising is a direct
online member donations. This fundraising tran- function of message popularity, these netroots
sition advantages novel tactical repertoires and organizations cannot stray too far from the will
organizational structures. of the membership. A direct-mail-funded organi-
A central feature of targeted online fundrais- zation has much more leeway to ignore member
ing is headline chasing. Unlike direct mail funding sentiment and act on the preferences of staff and
appeals, which must be planned weeks in advance patron donors. A targeted online-funded organi-
and therefore cannot be tied to the current news zation has weaker ties to its small donor-support-
cycle, online funding and action appeals can be tied ers, but also cultivates much richer member com-
to the issue of the moment. The timeliness of the munication practices.
medium enables more specific action requests— The drawback of headline chasing is that its
commonly, MoveOn will develop a campaign com- rapid-response nature can crowd out longer-term
mercial capitalizing on the latest news controversy, organizational priorities. Targeted online fund-
inviting supporters to watch the commercial and raising works best when focused on the day’s
donate $10 to help put it on the air. The specificity headlines, and when devoted to specialized tactics
and timeliness of these appeals allow for far more like television commercials. Online fundraising for
effective fundraising. Netroots organizations like volunteer training events, deliberative processes,
MoveOn have been known to raise $500,000 or office space, or community organizer salaries is
more around a timely tactic in a single day. far less successful. Whereas direct mail fundrais-
Headline chasing is particularly well suited to ing provides general revenue that could be turned
the daily churn of the social media landscape. to any organizational goal, the targeted nature
News cycles move faster in the social media age of most online fundraising restricts the uses of
than they did in the broadcast or cable news eras. those dollars can be applied to—if you fundraise
This is a function of the “news hole,” the amount for a commercial, you are required to spend that
of time and space that news operations fill daily. money on the commercial. In the absence of addi-
When news occupied 30 evening minutes per tional revenue streams—either through patron
day, along with the morning paper and the news donors, foundations, government grants, or mer-
weeklies, stories moved slowly. Now that news is chandising—advocacy organizations run the risk
disseminated and dissected through blogs, Twit- of over-reliance on short-term actions that feed
ter, and Facebook (with the active participation on controversy, without moving toward broader
of news organizations), controversies flow more strategic goals.
quickly through the system. This is one advantage
that netroots organizations have over their legacy Partisan Orientation
peer organizations: Having been built around The MoveOn effect is found almost entirely among
e-mail and Web-based communication, they are organizations in the Progressive/Democratic party
better situated to leverage the technological affor- coalition in the United States. Across the globe,
dances of those systems. MoveOn-like organizations have appeared inter-
A second benefit of the change in fundrais- nationally (Avaaz.org) and in a number of coun-
ing regimes is that it forces organizations to tries (38Degrees.org.uk and getup.org.au). These
play closer attention to the actual interests of global organizations are also left-aligned. Conser-
members. Groups like MoveOn have developed vative advocacy leaders have frequently attempted
sophisticated mechanisms for obtaining “passive to build equivalent organizations, but have con-
democratic feedback.” One such mechanism is sistently failed in doing so. There are multiple
MoveOn.org 857

competing theoretical explanations for this parti- however. The shift in fundraising regimes advan-
san divide. One theory, “ideological congruence,” tages virtually networked organizations with few
argues that there is something inherently horizon- staff and slim office space. Organizations founded
tal/progressive about the end-to-end architecture during the direct-mail era built up large staff and
of the Internet. Another theory, “outparty inno- physical resources, and this remains a comparative
vation incentives,” mutes the power of ideology, advantage for such organizations. They have orga-
and instead argues that the party out of power nizers, lobbyists, and policy experts that the new
has a range of positive incentives encouraging the groups do not have and cannot support through
adoption of new technologies and experimenta- targeted online fundraising. This is a cause for
tion with new organizational forms. In essence, concern. Online communication is more efficient
the “team” that is losing in domestic politics is than older communications media, but the inef-
more likely to “fire the coaches” and try some- ficiency of those media offered some benefits. As
thing new. A third theory, augmenting the other civil society organizations adapt to the new mem-
two, “merry pranksters” holds that the low trans- bership and fundraising practices of the Internet
action costs of online communication allow large age, there is reason to worry that a few important
partisan groups to disrupt the institutional devel- social functions will be unintentionally lost.
opment of opposing competitors during their for-
mative stages. David A. Karpf
In all likelihood, each of these theories is par- Rutgers, The State University of New Jersey
tially correct. In The MoveOn Effect, Karpf argues
that the strongest evidence is in favor of the out- See Also: Avaaz.org; Clicktivism; Fund-Raising;
party innovation incentives explanation. Advo- GetUp.org.au; MoveOn.org; Social Issues Advocacy,
cacy organizations traditionally gain membership Net-Roots Driven; 38Degrees.org.uk.
when the opposing party holds power. Major
donor networks look to redirect their spending in Further Reading
response to electoral failures. Talented campaign Bimber, Bruce. Information and American
staffers who, if victorious, would have taken jobs Democracy. New York: Cambridge University
in the administration, instead look for alternate Press, 2003.
opportunities. It is simpler to mobilize partisan Karpf, David. The MoveOn Effect: The Unexpected
outrage to stop programmatic changes to the sta- Transformation of American Political Advocacy.
tus quo than it is to organize support for the long, New York: Oxford University Press, 2012.
messy process of achieving new policy victories. Skocpol. Theda. Diminished Democracy: From
This argument holds that, had Al Gore claimed Membership to Management in American
the presidency in 2000, MoveOn.org would have Civic Life. Norman: University of Oklahoma
lacked the circumstances that let it develop a mass Press, 2003.
membership. Conservative peer organizations, on
the other hand, would have had ample organiz-
ing opportunities, producing a far different com-
plexion for the online advocacy universe today. It
is also noteworthy that international and cross- MoveOn.org
national equivalents of MoveOn have all been
launched under outparty circumstances, and with MoveOn.org is an Internet-mediated political
advice and training from MoveOn alumni. advocacy organization. Founded in 1998 by soft-
ware entrepreneurs Wes Boyd and Joan Blades, the
Disruption and the Loss of organization is credited with multiple substantial
Beneficial Inefficiencies innovations within the realm of online politics.
The MoveOn effect holds the promise of new With over 7 million members, MoveOn is one
opportunities for organizations, members, and of the largest advocacy groups in contemporary
social movement tactics. It sounds a foreboding American politics. During the Bush administra-
tone for longstanding advocacy organizations, tion, the group became a central organizing point
858 MoveOn.org

for antiwar protests. It also pioneered a new reper- adding its substantial outreach capacity to a host
toire of responsive issue-based organizing, mobiliz- of issues as they ripened on the political/media
ing online membership in reaction to Bush admin- agenda.
istration policy priorities. Former staff have played In June 2003, six months before the Iowa cau-
key roles in launching similar organizations, both cuses, MoveOn held an “online primary” to deter-
nationally (ColorofChange.org, MomsRising.org) mine whether and who to endorse. Howard Dean
and internationally (Avaaz.org, 38Degrees.org.uk, received a plurality of votes, but failed to cross
getup.org.au). The group remains iconic among the 50 percent threshold, thus the organization
online political advocacy experts. withheld its official endorsement. The MoveOn
primary captured significant news attention, serv-
History ing as an early measure of Democratic partisan
MoveOn began as an online petition in response enthusiasm in the lean-news months before the
to the Clinton impeachment hearings. Boyd and primaries. The organization spent over $20 mil-
Blades, a married couple, launched a Web site lion in that election, mostly raised through online
with an online petition urging congress to “cen- contributions from small donors.
sure Clinton and move on.” The petition went In the 2008 election, MoveOn members
viral, eventually attracting 500,000 signatures. donated $88 million to help elect President Barack
After these signatures failed to persuade Congress, Obama. MoveOn endorsed Obama in the days
Boyd and Blades extended their efforts to citizen prior to the “Super Tuesday” primary elections—
lobbying and other pressure tactics, treating all of much earlier than most other advocacy group
the petition signers as though they were members. endorsements. Nearly 1 million MoveOn mem-
The new organization attracted substantial media bers also devoted over 20 million hours to help-
attention in these early days, primarily as evidence ing elect the president in that cycle. MoveOn’s
of the Internet’s nascent impact on American pol- robust electoral work spurred further member-
itics. Though online petitions existed elsewhere, ship growth. The organization then diverted its
MoveOn’s practice of treating petition signers as energies toward supporting major progressive
members was new. The small staff and low over- policy priorities, including an initiative titled
head costs meant that MoveOn could develop as “The Other 98 Percent” that took on the same
a new organization, rather than dissipate after the problems of economic disparity that inspired the
initial reason for organizing had ended. Occupy Wall Street movement one year later.
Indeed, through the remainder of the Clinton
Presidency, MoveOn remained a relatively small Noteworthy Innovations
part of the organized American left. During the MoveOn’s largest innovations come in the areas
Bush presidency, MoveOn’s membership grew of membership relations, fund-raising, and orga-
substantially. In the aftermath of September 11, nizational structure. These have been emulated by
2001, recent college graduate Eli Pariser launched a host of other online advocacy groups. MoveOn
a Web site calling for a peaceful response to the successfully redefined membership from check-
attacks. That petition also went viral, and Boyd writing to online engagement. It demonstrated
and Blades invited Pariser to join their organiza- that engaged online member support could rapidly
tion and merge the lists. From there, MoveOn translate into massive, reliable fundraising for tar-
went on to serve as the mainstream hub of the geted efforts. It also borrowed a practice of “radi-
burgeoning peace movement. Pariser became the cal decentralization” from Boyd and Blades’s for-
organization’s second executive director in 2004. mer tech firm. The organization has a few dozen
Throughout this time period, MoveOn’s mem- staff and no office. These low overhead costs keep
bership swelled to 3.2 million people. Its online the organization nimble and responsive.
membership reacted swiftly, not only to antiwar MoveOn has been a pioneer in e-mail-based
messages, but also to a wide variety of progres- activism. It remains primarily an e-mail-driven
sive issues. Those members took action offline organization, with intentionally less engagement
and online. MoveOn thus became a central actor on social media platforms like Facebook and Twit-
among progressive advocacy organizations, ter. The organization uses A/B testing of e-mails to
Multiple Leveraging 859

identify popular issue topics, frames, and action Interest group critics, meanwhile, laud MoveOn
requests among its membership. The “culture of for its rapid-response activism, but also worry
testing” they have developed is taught to other that the organization’s niche leaves little room for
advocacy groups through a series of workshops longer-term community organizing efforts. This
offered via the New Organizing Institute. brand of critique is less concerned with MoveOn’s
In 2004, MoveOn launched the first-ever user- activities than with the broader organizational
generated ad contest. Titled “Bush in 30 Sec- ecology of social movement organizations in the
onds,” it allowed MoveOn members to develop, digital age. MoveOn.org is emblematic of some
submit, and vote on commercials. The winning of the best practices in online advocacy, but its
commercial was then aired on national television. organizational limitations also point to some of
Controversy around overly harsh language in two the possible broader limitations of 21st-century
of the unselected commercials dampened enthu- social movements.
siasm for this tactic and demonstrated that high-
profile user-generated content required active fil- David A. Karpf
tering and clear rules and norms. MoveOn held a Rutgers, The State University of New Jersey
similar contest in the 2008 election cycle.
The organization also pioneered online–offline See Also: Campaigns, Presidential (2004);
event management tools, including the successful Campaigns, Presidential (2008); Clicktivism; Digital
spread of MoveOn “house parties” and “Bake Activism; Fund-Raising; MoveOn Effect, The; Social
Back America” fundraiser bake sales in the 2004 Issues Advocacy, Net-Roots Driven.
election cycle. MoveOn has partnered with docu-
mentarian Michael Moore to promote attendance Further Reading
to his films, planning online–offline film events as Bai, Matthew. The Argument: Billionaires, Bloggers,
well. MoveOn has also partnered with celebrities and the Battle to Remake Democratic Politics.
and comedians to produce commercials and viral New York: Penguin Press, 2007.
videos around election cycles. Bimber, Bruce. Information and American
In 2011, MoveOn launched SignOn.org, a Democracy. New York: Cambridge University
hosting service for Internet petitions. Similar in Press, 2003.
structure to Change.org and PetitionOnline.com, Karpf, David. The MoveOn Effect: The Unexpected
SignOn allows any MoveOn member to create Transformation of American Political Advocacy.
and circulate a petition. High-traffic petitions can New York: Oxford University Press, 2012.
then be elevated to the entire national member- Packer, George. “Smart-Mobbing the War,”
ship, creating a bottom-up mechanism for issue New York Times Magazine (March 9,
selection and exposure. MoveOn’s staff structure 2003). http://www.nytimes.com/2003/03/09/
includes a “MoveOn Labs” section that works to magazine/09ANTIWAR.html?pagewanted=all
develop innovations of this sort. (Accessed September 2012).
White, Micah. “Clicktivism is Ruining Leftist
Criticism Activism.” The Guardian (August 12, 2010).
Criticism of the organization has come from http://www.guardian.co.uk/commentisfree/2010/
three directions. Conservative critics hold that aug/12/clicktivism-ruining-leftist-activism
MoveOn is part of the radical left, labeling the (Accessed September 2012).
organization as socialist or as a George Soros
front group. Soros donated to the organization’s
2004 electoral efforts. After that election, they
ceased accepting donations from Soros and other
major donors. Radical leftist critics charge that Multiple Leveraging
MoveOn cheapens left-wing activism by reduc-
ing it to “clicktivism,” and introducing market- The term multiple leveraging refers to the coor-
ing concepts into protest movements that would dinated use of multiple forms of social media
otherwise be anticonsumerist in nature. to increase one’s ability to engage and influence
860 Multiple Leveraging

people online. The goal of multiple leveraging is relatively steady throughout the last several centu-
to increase online presence and influence by deliv- ries, as politicians and political organizations have
ering content to as many people as possible, and tried to reach the same types of broad or targeted
in turn, motivating political support or action. political communication goals. Broad political
This goal is commonly accomplished through communication is the simultaneous broadcasting
social media as content that is shared through of political messages to large numbers of people
one channel, such as a Facebook post, and can or groups. This would include activities aimed
easily be forwarded within that medium (through at creating and disseminating information and
“shares” and “likes”) as well as repackaged and attempting to influence the political agenda. Tar-
disseminated in various forms though other social geted political communication is the delivery of
media such as Twitter, Web sites, or blogs. Thus, a specialized messages directed at particular indi-
fine-tuned social media strategy can leverage mul- viduals or members of groups asking for some type
tiple forms of social media in order to maximize of political action. Targeted political communica-
the reach and effectiveness of political content. tion can include efforts to recruit supporters to join
There are numerous Internet-based social media an interest group or campaign, raise money and
that can be leveraged together. Facebook, the dom- resources, and/or mobilize political action.
inant social networking site; and Twitter, the most While these goals have remained consistent,
popular microblogging site, have become standard the strategies used by political actors to achieve
elements in social media strategies, along with them have become much more sophisticated with
YouTube, the Internet’s most popular video shar- the advent of multiple new information and com-
ing site. Multiple leveraging can also include dis- munication technologies (ICTs) and the innova-
seminating information through a blog, targeted tive use of these political communication tools.
Web advertising, and e-mail lists. It is increasingly Social media is the latest and most sophisticated
important to also leverage more visual ways of addition to the tool kit that political actors and
packaging content such as Flickr, Tumblr, Pinter- organizations can use toward these long-held
est, and Instagram, and video sites like YouTube. goals. Multiple leveraging refers to using as many
In addition, many political groups simultaneously of these tools as cohesively as possible to reach as
leverage any number of social-networking sites large an audience as possible and achieve broad
across the globe that target specific subsets of the and targeted political communication goals. It is
population (such as migegente.com, designed for used to maximize the synergistic nature of social
Latinos; and blackplanet.com, targeting African media content and exponentially increase the
Americans). Additionally, there are a growing online influence of political actors. There are hun-
number of popular social-networking sites that dreds of articles, blog posts, and Web sites that
are heavily used in particular geographic regions offer tips on how to leverage content most effec-
(e.g., RenRen, QZone, and Sina Weibo in China; tively. Most suggest having a centralized source
Badoo in Europe; and Cyworld in South Korea), of information, generally a Web page, more nar-
which can be effectively incorporated into interna- rowly designed microsite, or blog with easy-to-
tional social media leveraging strategies. Finally, share information, images, and video. In order to
political organizations are interested in mobilizing use multiple leveraging to increase online pres-
people on the ground, so leveraging social net- ence and influence, an organization, campaign, or
working sites like Foursquare and Meetup.com politician must regularly provide new interesting
that involve the locations and activities of users is content that can be shared.
becoming central to bringing like-minded people
together offline to coordinate political activity. 2008 Presidential Campaign
The best example of strategically leveraging mul-
Strategies tiple social media platforms for political purposes
The goals of multiple leveraging are not new; how- was the online campaign of Barack Obama in
ever, the strategies used to accomplish these goals 2008. While it was far from the first Internet cam-
are unique to the evolving social media landscape. paign, the Obama campaign integrated social net-
Political communication goals have remained working into its entire Web strategy, linking online
Musicians and Social Media in Politics 861

networks to offline campaign activity by lever- the Obama campaign built on its dominance in
aging multiple social networking sites together. 2008, and used social media more effectively than
Meanwhile, the campaign maintained the Web the Romney campaign. But how dominant was
site my.barackobama.com (or “My BO”), a cen- the Obama campaign? A quick look at Klout
tralized source of information that doubled as a shows that on Election Day, Obama’s Klout score
fully integrated social-networking and political- was 99 out of 100, the highest score at that time,
action site. As with other social networking sites, compared with 92 for Romney. Furthermore,
users could personalize this site by creating pro- Mitt Romney’s most effective piece of content
files, posting pictures, and writing blogs, and they was a tweet that engaged over 15,000 people,
were given the tools to take political action, such while Barack Obama’s most effective piece of
as making campaign calls from home and creating content was a photo that engaged over 750,000
personal fundraising pages. The Obama campaign people through many different social media sites,
set a new benchmark for successfully leveraging 50 times as many people as the Romney tweet.
multiple social media, and these methods were
quickly adopted by major political organizations Ben Epstein
and campaigns to compete in the current social DePaul University
media landscape.
See Also: Blogs; Campaigns, Presidential (2008);
Measurement Evolution of Social Media; Klout Score; Social Media
One constant challenge of maintaining a cohesive Optimization.
and effective social media strategy is determining
how much leverage or influence one gains through Further Readings
current strategies. It is not enough to simply iden- Harfoush, Rahaf. Yes We Did: An Inside Look
tify how many people might view a particular at How Social Media Built the Obama Brand.
message by counting Facebook friends or Twitter Berkeley, CA: New Riders Press, 2009.
followers, for instance. These numerical measure- Klout.com. “What is Klout?” http://klout.com/#/corp/
ments merely quantify how many people may see what_is_klout (Accessed December 2012).
a message, rather than clarify what types of mes- Plouffe, David. The Audacity to Win: How Obama
sages are most effective, or how political content Won and How We Can Beat the Party of
did or did not precipitate a change in political Limbaugh, Beck, and Palin. New York: Penguin
attitudes or motivate action. Press, 2010.
There are a growing number of companies
offering services designed to measure, increase,
and effectively utilize online influence. Among
these various companies, Klout is arguably the
most sophisticated and by far the most popular. Musicians and Social
Klout provides users with a Klout score, a num-
ber from one to 100 that represents the aggrega- Media in Politics
tion of multiple pieces of data, or signals, about
a person’s social network activity. These signals With the rise of social media, musicians have
include any online action taken in response to increasingly come to use these platforms as strate-
Web content that is created or shared. gic tools for political activism. In the presidential
Currently Klout’s model incorporates informa- elections of 2008 and 2012, musical celebrities
tion from over 400 signals, derived from seven from nearly all popular genres used social media
different social sites. It can be used to not only to express political beliefs about campaigns, and
determine how successful current efforts to lever- more importantly, to endorse presidential and vice
age multiple social media tools are, but also to presidential candidates. A prominent example of
provide concrete measurements of individual endorsement is hip-hop mogul Jay-Z’s support of
pieces of content. For instance, most observers of Barack Obama on YouTube in the 2012 presiden-
the 2012 presidential election would agree that tial election.
862 Musicians and Social Media in Politics

Along with creating three videos supporting the 2008 Barack Obama campaign, which were distributed on YouTube, rapper Jay-Z also
hosted this rally for the candidate in Philadelphia, Pennsylvania, on November 3, 2008, the day before the election. Also in attendance
at the rally were fellow musicians and singers Mary J. Blige, P. Diddy, and Jay-Z’s wife, Beyoncé.

In addition to YouTube, platforms such as was conceived in the United States over 20 years
Facebook, Flickr, and Twitter have been broadly ago when a Virgin Records executive teamed with
used to promote candidates and celebrate victo- an electoral campaign worker who was also expe-
ries, representing the most recent iteration of pop- rienced in political fundraising. It was founded in
ular musicians’ traditional role as disseminators response to perceived threats to freedom of speech
of political ideology and modelers of civic engage- and political expression among major label art-
ment, especially among younger audiences. Even ists, and as part of a broader plan to politically
during nonelection years, musicians continue to engage younger citizens by using the promotional
use social media to express their opinions across power of the entertainment industry. It quickly
the political spectrum, from conservative musi- established itself as an important organization,
cian Ted Nugent on Twitter to liberal alternative helping younger audiences connect politics and
rock band Cake on Facebook, and there are sig- popular culture. To date, Rock the Vote has reg-
nificant economic consequences for these musi- istered more than 5 million young people to vote.
cians who take sides in contentious political dis- The Rock the Vote organization has employed
putes. Beyond elections, the subjects addressed by social media in a variety of contexts, including the
politically engaged musicians on social media run 2010 Tweet the Vote Campaign , which partnered
the gamut from health care reform to fiscal policy. with musicians including Faith Hill, Tim McGraw,
Proactive campaign-oriented examples of Maroon 5, and Pink. These musicians tweeted
social activism by musicians include Rock the during the midterm elections that year, directing
Vote, Rap the Vote, and Tweet the Vote, the last eligible young voters to a Web page on which they
of which occurs entirely via social media. A non- could register to vote. This social media campaign
partisan, nonprofit organization, Rock the Vote generated over nine million impressions in the
Musicians and Social Media in Politics 863

course of the election cycle. Rock the Vote and also involved renting billboard space in a dozen
its affiliate organization Rap the Vote have also global cities positioning war (and peace) as a
employed social media via specialized Twitter choice made by citizens, rather than by govern-
hashtags, specifically targeting black and urban ments. This strategic coordination of Lennon and
youth for political engagement. Musicians such Ono’s images, text, and music, deployed across
as Akon participated in Rap the Vote during the a range of mass media platforms, was the direct
2012 presidential election cycle, appearing in its antecedent of today’s social media music activism.
YouTube videos recorded throughout the Atlanta A more recent example of reactive social activ-
Metropolitan Area, which were then shared as ism by musicians is Occupy Musicians, a group
content to users of Facebook and Myspace. Rock affiliated with the Occupy Wall Street movement
the Vote, Tweet the Vote, and Rap the Vote have beginning in 2011. Musicians including Lou
all been covered in MTV’s broadcast and interac- Reed, John Zorn, Talib Kweli, Tom Morello, Ian
tive channels. Rock the Vote has also employed MacKaye, Joan Baez, and Saul Williams partici-
a variety of additional social media platforms, pated in the demonstrations. Occupy Musicians
including YouTube, Myspace, Facebook, and enabled such contributions by creating a Web site
even Flickr. that served as a space to organize performances
In 2012, Rock the Vote expanded its social at Occupy Musicians events, host songs and
media initiative to mobile devices with its Scan music videos, and connect musicians to Occupy
to Vote campaign. In recognition of the grow- Musicians locations and fundraisers. Occupy
ing popularity and influence of mobile applica- Musicians also created a Twitter handle and a
tions, the organization’s new campaign involved Facebook page, and live performances of songs
designing and dispensing t-shirts that were at protests were shared, both officially and unof-
embroidered with QR codes, devised as part of ficially, via social media such as Vimeo and You-
a youth voter registration drive. Shirt wearers Tube. Media organizations such as Village Voice
functioned as voter registration hotspots, direct- Media, Huffington Post, and Politico also helped
ing voters’ smartphones to a Rock the Vote Web to promote this content. Musician and activist
site, where they were able to register to vote via Stephen Said was central to this process after he
the mobile Web. To help spread the word, Rock was called upon by the Occupy Musicians move-
the Vote encouraged supporters to send tweets ment in its first week to help bring artists to the
using the #scantovote hashtag. Musicians who movement’s Zuccotti Park headquarters near
used this new hashtag in their tweets included Wall Street, and to develop its social media strat-
Christina Aguilera, Maroon 5, Neon Trees, and egy, as well as the movement’s music distribution
major labels Def Jam Records, Mercury Records, arms, Occupy Records and Occupy Music. The
and Island Records. The campaign began in April Occupy Wall Street movement and Occupy Music
of that election year, with Aguilera’s use of the also developed an Occupy Musicians Solidarity
hashtag in her tweets regarding the annual House Council, and Occupy Music Education, both of
Budget announcements in Washington, D.C. which had prescriptive advice for political action
Reactive examples of musicians’ social activism that was distributed via social-media platforms
often come in the form of demonstrations and pro- such as Facebook and Twitter.
tests. Historically, these have included John Len-
non and Yoko Ono’s War is Over campaign, and History of Campaign-Oriented
Bob Dylan’s performance at the 1963 March on Musical Activism
Washington. John Lennon and Yoko Ono’s social Campaign-oriented social activism by American
activism included writing an antiwar anthem, musicians dates back at least to the presidential
released during the 1971 holiday season, titled election of 1840. “Tippecanoe and Tyler Too”
“Happy Xmas.” The song, which featured the was the campaign song for Whig party candi-
Harlem Community Choir, was the culmination date William Henry Harrison and running mate
of more than two years of peace activism under- John Tyler that election cycle. Harrison was
taken by Lennon and Ono. This activism entailed known as Old Tippecanoe for an early career
a larger, transnational multimedia campaign that military victory over a Native American chief
864 Musicians and Social Media in Politics

at the Battle of Tippecanoe of 1811. Harrison’s that year. Their political intentions were two-fold.
nom de guerre re-emerged in his 1840 presiden- First, they hoped the Vote for Change tour would
tial campaign song. The song, which set lyrics encourage Democrats in these swings states to
by Alexander Coffman Ross to a popular min- make it to the polls and vote. Second, the political
strel melody, was witty and catchy, and became strategists of the Kerry campaign were ambitious
widely popular. It played a role in convincing a enough to attempt to reach out to Republican fans
majority of voters to elect Harrison to the presi- of Springsteen and REM in these swing states,
dency. Harrison’s “Tippecanoe and Tyler Too” where they hoped the artists’ pro-Kerry messages
campaign song represented the first stirrings of in the Vote for Change tour would help influence
modern campaigning, complete with the dynam- them to vote for Kerry, rather than for Republi-
ics of political spectacle, multimedia branding, can incumbent George W. Bush. Employing social
spin, and hyperbole. These elements have con- media as a political tool was a vital element in
tinued to play a key role in more recent national the Kerry campaign strategists’ plan. At that time,
and international political campaigns as mass Myspace was the dominant social platform for
media and then social media have become domi- music-related activism, and the Vote for Change
nant channels for information sharing. tour was featured on Springsteen and REM’s
artist pages on that site. Springsteen and REM’s
2000 Presidential Campaigns fans and friends on Myspace received updates on
The rock band Rage Against the Machine per- tour dates, and were able to comment on recent
formed a protest concert outside the doors of the developments posted as related to the tours and
2000 Democratic National Convention in Los support of Kerry’s campaign. The multistate tour
Angeles, California. By holding the concert in had representation on Myspace, with an account
that location, the band aimed to express its dis- that gave information about and linked to Kerry’s
content with the two-party political system in the campaign, Springsteen and REM’s artist data, and
United States. In anticipation of unrest and vio- details of planned concerts.
lence, the band and concert attendees were met
by heightened security measures from the Los 2008 Presidential Campaigns
Angeles Police Department, which arrived armed During the 2008 presidential election, three videos
with riot gear. At the time, these extreme mea- featuring Jay-Z’s political activism and support for
sures at a protest event evoked the recent chaos the Democratic Party candidate Barack Obama
and social unrest of the Seattle 1999 WTO Pro- were distributed online via YouTube by the cam-
tests. Recorded footage of the protest at the Rage paign’s social media team, and soon went viral.
Against the Machine DNC concert was featured The first video featured footage of Jay-Z’s poem
online, along with a widely viewed MTV News about the legacy of African American leaders and
report on the incident. The online coverage was activists, including Rosa Parks, Dr. Martin Luther
included as a supplement in one of the band’s live King Jr., and Obama. The second video posted
concert performance DVDs. The protest event by the Obama campaign featured a segment of
was extensively promoted and discussed in online Obama using a hand gesture that Jay-Z had made
chat rooms, many of which focused on contem- famous in the music video and lyrics to his song
porary music, radical politics, social activism, and “Dirt off Your Shoulders,” in order to show his
counterculture issues. lack of concern about Republican critics. The
third YouTube video that Jay-Z starred in for the
2004 Presidential Campaigns Obama campaign provided a detailed briefing on
In the 2004 presidential election cycle, Bruce voter-ID rules for Michigan voters. This video, like
Springsteen and REM teamed to headline a Vote the others, was specifically intended to mobilize
for Change tour, aimed at electing Democratic the youth, urban, and minority vote. As a result
candidate John Kerry as president. Tour organiz- of these videos and other endeavors, the Obama
ers, working with the DNC, intended to help pro- campaign was widely recognized for its novel and
mote the Kerry vote in key swing states that were aggressive use of new social media platforms as a
identified by the campaign’s political strategists low-cost method of targeted messaging, in contrast
Musicians and Social Media in Politics 865

to more traditional mass media and direct media cycle by performing at a number of his rallies in
approaches used by rivals and earlier campaigns. key swing states toward the end of the campaign.
Rage Against the Machine attempted to hold His Facebook and Twitter accounts were also
protest concerts twice in Minnesota during the employed to support the Romney-Ryan campaign.
2008 Republican National Convention. In an Earlier during the GOP primaries, Tom Petty had
echo of the band’s reception at the 2000 DNC, it clashed with Republican candidate Michele Bach-
was met in St. Paul by police equipped with riot mann over the usage of his song “American Girl”
gear. Band member Tom Morello told an inter- at her rallies. News of the dispute was spread via
viewer that his band was threatened with arrest social media such as Twitter, Facebook, and via
by the authorities if they approached the stage. blogs such as Politico. Petty’s agent published a
Morello’s description of the proceedings was then press release threatening legal action if his song
shared via social media such as Twitter by the continued to be employed in this fashion. This
interviewer. Other details of the event’s proceed- raised a relatively new issue in the ongoing dia-
ings were shared by first-hand witnesses via social- logue between musicians and political actors, the
media platforms such as Facebook and Myspace. question of whether the use of a song within a
The band played a full protest concert in Minne- social media campaign should be construed as an
apolis on the following day, which was followed endorsement. A related question surrounded the
by political demonstrations. More than 100 dem- legal ramifications of music usage by campaigns
onstrators were arrested as police equipped with without permission. Historically, such use is legal
riot gear thwarted the gathering outside the arena at a live event, but not in a broadcast context;
where the protest concert was held. Details and by splitting the difference between the two, social
photos of the post-concert demonstrations were media highlighted the changing nature of public
covered and shared on Facebook, Myspace, and political communications.
YouTube. In the 2012 election cycle that would
follow, the GOP’s use of social media in its presi- Role of Musicians in Local Elections
dential campaign was marked by an abrupt change During the 2012 congressional campaigns, Texas
from musician-based protest of the party. GOP Congressman Steve Stockman held a live
YouTube chat with conservative musician Ted
2012 Presidential Campaigns Nugent. Nugent had previously considered run-
Jay-Z made another YouTube video for the Obama ning for governor of Michigan in 2008, during
campaign during the height of the 2012 presiden- which time he repeatedly singled out high-profile
tial election cycle. The video posted to YouTube Democratic politicians for criticism via social-
by the Obama campaign was more conservative media platforms such as Facebook and YouTube.
in its presentation, featuring the hip-hop record- Even earlier, during the 2004 congressional cam-
ing artist sitting down in a suit and tie advocat- paign cycle, there was widespread speculation
ing for Obama’s re-election. Additional support- that Nugent was under consideration by the Illi-
ers of Obama in 2012 included pop singers Katy nois Republican Party as its candidate in that
Perry and Lady Gaga, who tweeted messages of state’s Senate race. Even at that time, he had been
support for the campaign throughout the election especially active and vocal in supporting conser-
cycle. Perry also sang at Obama rallies in Wis- vative political views on Myspace, promoting his
consin, Nevada, and California. After Obama’s views and his recorded music.
victory was announced on election night, musi- In 2010, conservative musician Ray Stevens,
cians such as Perry and Lady Gaga continued to who has shared his political conservative views
proclaim their affiliations with the campaign by via social media platforms such as YouTube, was
tweeting congratulations and expressing their endorsed for Congress by the Republican Party of
satisfaction. These messages were retweeted by Lee County, North Carolina. His YouTube video
some of their thousands of followers and shared Come to the USA was embedded in the official
on other social media. Web page of that county’s Republican Party, with
Kid Rock supported Republican presidential a message above it urging viewers to vote for the
candidate Mitt Romney during the 2012 election musician. Stevens was already a popular YouTube
866 Myspace

performer, having released videos for some of his political views through music, and when they
songs exclusively on that social media platform. damage their reputation through hate speech or
rhetoric of a controversially political nature that
Economic Costs to Musicians is broadcast over social media.
The economic costs to musicians of picking sides
in political debates on social media have been Dustin Bradley Garlitz
exemplified by California alternative rock band University of South Florida
Cake. Guitarist Xan McCurdy posted a message Aram Sinnreich
to the band’s Facebook artist page in 2011, asking Rutgers, The State University of New Jersey
whether Republicans were intentionally damag-
ing the U.S. economy in order to prevent Obama’s See Also: Activists and Activism, Digital; Facebook;
re-election the following year. Facebook users left Myspace; Occupy Movement; Rock the Vote; Twitter;
over 600 comments expressing varying degrees of YouTube.
outrage or approval. This was hardly an excep-
tion for the band, which had excoriated GOP vice Further Readings
presidential hopeful Sarah Palin on its Web site Bauder, David. “Occupy Wall Street: Music Central
in 2008. The band’s lead vocalist, John McCrea, to Protest” (November 13, 2011) AP/Huffington
acknowledged in 2010 that many of its fans were Post. http://www.huffingtonpost.com/2011/11/13/
conservatives, including Tea Party members, and occupy-wall-street-music_n_1091176.html
he described how this constituency was upset with (Accessed May 2013).
the band’s enthusiastic embrace of liberal political Norton, Quinn. “Beyond ‘Blownin’ in the Wind’:
dogma. McCrea claimed that, as a form of politi- The Music of Occupy Wall Street” (December
cal retaliation, some critical fans had threatened 30, 2011). Wired. http://www.wired.com/
to illegally download the band’s songs, rather threatlevel/2011/12/occupy-wall-street-music
than purchasing them via sanctioned distributors (Accessed May 2013).
such as Apple’s iTunes store. Pedelty, Mark and Kristine Weglarz, eds. Political
On the conservative side of the political spec- Rock. Burlington, VT: Ashgate, 2013.
trum, Ted Nugent has been a vocal supporter Peedie, Ian. The Resisting Muse: Popular Music and
of the U.S. Republican Party and conservative Social Protest. Burlington, VT: Ashgate, 2006.
political views throughout his career. In 2012, Randall, Annie J., ed. Music, Power, and Politics.
Nugent endorsed Mitt Romney for president, a New York: Routledge, 2004.
position he reiterated and promoted via social Street, John. Music and Politics. Malden, MA:
media numerous times during that year’s elec- Polity, 2012.
tion cycle. Following the re-election of President “Ted Nugent: Obama Comments Were Metaphors,
Obama, Nugent shared his passionate hatred of Not Threats” (April 19, 2012). Huffington Post.
the president via Twitter and other social media http://www.huffingtonpost.com/2012/04/19/
channels. Even more controversially, Nugent has teg-nugent-obama-comments-metaphors_n
made repeated threats to kill Obama via Twitter, _1439009.html (Accessed July 2013).
although in several media interviews following
his subsequent investigation by the Secret Service,
he later described these threats as “metaphori-
cal.” They were, however, retweeted aggressively
by supporters and pundits. As far back as 2007, Myspace
he publicly threatened to kill both Barack Obama
and Hillary Clinton. Self-described as “a place for friends,” Myspace
Musicians’ political views shared via social was once the world’s most popular social net-
media can drastically alter their reputation in the working Web site. With features including cus-
entertainment industry and the public at large. tomizable profile designs, mood-indicating
Their political thoughts can directly equate to emoticons, profile songs, and a user comment
economic costs, both when they channel their section, Myspace was the first Web site to make
Myspace 867

online social networking a part of mainstream its launch, thousands of users had friended lead-
popular culture. ing candidates.
Building on the online social networking con- In addition to fostering a sense of political fan-
cept pioneered by Six Degrees and Friendster, an dom, social networking Web sites offered a new
early version of Myspace was created by eUni- way to organize a campaign, and encouraged the
verse (later renamed Intermix Media) employees growth of grassroots political movements. Further,
Chris DeWolfe and Tom Anderson in 2003, and because the most frequent users of Myspace were
was officially launched in January 2004. With in the 18 to 24 age range, the social-networking
DeWolfe serving as Myspace CEO and Anderson Web site provided a platform to connect with
serving as president, Myspace reached 1 million younger voters who played a key role in deciding
users within its first month, and over 5 million the 2008 election.
users by the end of its first year. To further involve younger users in politics,
The quick growth of Myspace led to a high Myspace also partnered with MyDebates.org
profile, $580 million acquisition by News Corp. to offer live streams of presidential campaign
in July 2005. Underscoring the cultural relevance debates, and provide a forum for users to submit
of Myspace in the media landscape of the time, questions to a town hall debate.
the acquisition was intended to provide a social While Myspace was helpful for some candi-
media centerpiece that would connect the diverse dates and elected officials, it proved troublesome
holdings of News Corp.’s newly formed Fox for others. The first Myspace political scandal
Interactive Media division. surfaced in March 2008, when New York Gov-
Profitable and continuing to grow, Myspace ernor Eliot Spitzer was accused of employing
added its 100 millionth user account in August the services of Emperors Club VIP escort Ashley
2006, and surpassed Google search and Yahoo! Dupré. Photos posted on Dupré’s Myspace page
Mail to become the most visited Web site in the were quickly publicized by reporters and circu-
United States. The growth continued for the next lated around the Web, drawing even more atten-
two years, eventually reaching its peak usage in tion to the scandal, and making Dupré an over-
December 2008, with 75.9 million unique visitors night Internet celebrity. The importance of online
in the United States and 110 million active users. social networking in political campaigns grew in
the years that followed. However, the relevance
Influence of Myspace in the political world quickly dimin-
The height of Myspace’s popularity corre- ished as the site’s popularity faded among the gen-
sponded with the 2006 and 2008 election cycles. eral public.
While Web sites and blogs had been a part of
political campaigns since the mid-1990s, online Decline
social networking was first adopted as a political Despite its early growth and dominance, lim-
tool during the 2006 and 2008 campaigns. The ited innovation, an outdated platform, and
development was slow at first. In the 2006 mid- competition from other social networking sites
term elections, only a small minority of candi- such as Facebook and Twitter ultimately eroded
dates running for state or national office created Myspace’s popularity. While Facebook was devel-
and maintained profile pages. However, by the oping a streamlined social networking experience
start of the 2008 presidential primary campaign based around creating an online connection with
season, the relevance of social networking was real-world friends, Myspace was earning a repu-
clear, and all candidates for both the Democratic tation for amateurish profile designs, cluttered
and Republican nominations had established advertising, and spam.
Myspace profiles. The social networking Web The decline of Myspace started internation-
site encouraged this development by launching ally, and eventually spread to the U.S. market.
Myspace Impact, a site that featured pages for In May 2008, Facebook’s global popularity deci-
presidential candidates and made it possible for sively surpassed that of Myspace, with Facebook
visitors to register to vote, volunteer for cam- attracting 123.9 million unique visitors and
paigns, and make donations. Within one day of 50.6 billion pageviews, compared to Myspace’s
868 Myth of Digital Democracy

114.6 million unique visitors and 45.4 billion Winograd, Morley and Michael D. Hais. Millennial
pageviews. As Facebook continued growing, Makeover: MySpace, YouTube, and the Future of
visits to Myspace dropped off. A year later, American Politics. New Brunswick, NJ: Rutgers
Myspace also slipped behind Facebook within University Press, 2008.
its home market. In May 2009, Facebook sur-
passed Myspace domestically, with 70.278 mil-
lion unique visitors in the United States, com-
pared to Myspace’s 70.237 million.
While the margin was narrow at first—just Myth of Digital
41,000 monthly visitors—it quickly widened as
Myspace lost users and the accompanying adver- Democracy
tising revenue. In January 2011, Myspace laid
off nearly half of its employees, and by February The Internet’s influence on political life and other
2011, with unique visitors totaling just 62 million democratic processes has sown strong hopes for
worldwide and 37 million in the United States, a new phase of democratic governance. Huge
News Corp. announced its intention to sell the numbers of previously inactive citizens are paying
social networking site. The sale was completed in closer attention to elections, as evidenced by the
June 2011, when Myspace was sold to the adver- proliferation of political blogs and their successful
tising network company Specific Media for $35 political mobilization through the Web. In North
million, just 6 percent of what News Corp. had America, some look to the 2004 U.S. presidential
paid for the Web site six years prior. elections and how candidate Howard Dean’s cam-
By 2012, Myspace had essentially ceded its paign succeeded in funding its operations through
status as a relevant social-networking Web site small donations, a feat that President Barack
to rivals Facebook, Twitter, and LinkedIn, and Obama’s 2008 campaign successfully emulated.
rebranded itself as a “social entertainment des- The political ascendancy of blogging and other
tination.” Moving away from its previous social social media and new communication technolo-
networking model, the company retooled the gies are ushering in an age of digital democracy
Web site as a music and entertainment hub, offer- and digital citizens. In a Wired essay, Jon Katz
ing audio and video content, and providing tools was among the first to argue that the culture of
for bands to create Web pages. cyberspace has led to the birth of a digital nation.
This digital community espouses a “postpoliti-
Hans C. Schmidt cal” philosophy that blends “the humanism of
Pennsylvania State University, Brandywine liberalism, the economic opportunity of conserva-
tism, plus a strong sense of personal responsibility
See Also: Cyberculture; Evolution of Social Media; and a passion for freedom.” Katz describes these
Facebook; Friendster; LinkedIn; Social Networking American digital citizens as “knowledgeable, tol-
Web Sites; Twitter; YouTube. erant, civic-minded, and radically committed to
change.” They embrace the power of technology
Further Readings to foster a “participatory” culture and contribute
Ancu, Monica and Raluca Cozma. “MySpace to the political process.
Politics: Uses and Gratifications of Befriending Against this optimistic background, Hindman’s
Candidates.” Journal of Broadcasting & Electronic Myth of Digital Democracy offers a rare excep-
Media, v.53/4 (2009). tion to this unconditional embrace and glorifica-
boyd, danah m. and Nicole B. Ellison. “Social tion of Internet-based politics. Two intertwined
Network Sites: Definition, History, and claims have been central to the proponents of dig-
Scholarship.” IEEE Engineering Management ital democracy: that the Internet fosters political
Review, v.38/3 (2010). participation, and its diffused infrastructure levels
Mjos, Ole J. Music, Social Media and Global the political playing field. The first central prom-
Mobility: MySpace, Facebook, YouTube. New ise of the Internet lies in its capacity to enhance
York: Routledge, 2011. citizens’ participation in the political process,
Myth of Digital Democracy 869

granting different political voices an equal foot- Moreover, as Hindman argues, the Web is
ing in the networked public sphere. For Hind- experiencing “Googlearchy,” that is, dominance
man, this claim remains more of a promise, and of the most heavily linked Web sites. Empirically,
less supported by empirical data. While acknowl- a Web site’s visibility and prominence remain
edging the fact that the Internet allows people to determined by the number of links pointing to
speak freely online, there is a difference between the site. That makes search engines and online
who speaks and who is heard. The political blogo- searches a shallow process because they yield only
sphere in the United States shows that those who the most linked or familiar sites, but not neces-
are heard remain far below the number of those sarily the best sites. Since digital content is not
who speak. Only a very small number of politi- cheap to produce, few companies own the larg-
cal blogs, both liberal and conservative, receive est and most popular sites, further constraining
a level of influence and reach to be meaningfully the purported diversity of the Web. Hindman’s
heard and influence the political discourse. Hind- Googlearchy theory posits that “online concen-
man’s analysis of the U.S. political blogosphere, tration comes from the sheer size of the medium
its resemblance to traditional media elites, chal- and the inability of any citizen, no matter how
lenges some assertions that the blogosphere sophisticated and civic-minded, to cover it all.”
threatens the old media monopoly and empow- When factoring in the fact that political traffic
ers citizens in the marketplace of ideas. Lack of constitutes a small fraction of overall Web usage,
gender and ethnic diversity among top political the political impact of the Web is much in doubt.
U.S. bloggers only emphasizes this gap between Digital democracy is more of a pipedream, a
rhetoric and reality. myth that does not withstand empirical scrutiny.
This position may thus perpetuate the perennial
Nature of the Internet debate/tensions surrounding the advent of new
The diffused nature of the Internet’s infrastruc- communication technologies, particularly their
ture lends credence to the claim that the Web pro- sociopolitical transformational impact. As sev-
vides a level playing field. The current ownership eral critics and book reviewers have observed, the
structure means that the monopolistic corporate impressive empirical case that Hindman assem-
control dominating traditional U.S. media’s land- bles does not fully account for the tangible effects
scape disenfranchises large sections of the Ameri- of the Internet on quotidian politics. The Internet
can people by limiting access and filtering the has effectively challenged the power of the politi-
news. Moreover, corporate control makes it nearly cal class to control the message. Social media
impossible for new entrants to compete and set channels like Twitter and blogs offer myriad ways
up media outlets, unless they have large financial of interacting and fact-checking partisan propa-
resources. Negroponte’s Being Digital and similar ganda. As to extending political voice, the Inter-
books vehemently argue that the Internet’s techno- net has made the marketplace of ideas something
logical infrastructure lowers the barriers for entry, within reach because new entrants can still create
thus enabling politicians and regular citizens to content and compete. While regular citizens may
compete against corporations. This communica- volunteer, vote, and organize online, the Web’s
tion technology promises to further eviscerate cor- net effect has mobilized more people, as small
porate control because online users can search for donations attested in Obama’s campaigns.
whatever they want, and retrieve the information
they like, without the filter of corporate control. Myth Versus Reality
Hindman’s scrutiny concludes that the Internet’s Hindman fails to account for and empirically
architecture, specifically hyperlinking, has failed to analyze the larger effects of the Internet on the
truly weaken the power of corporate gatekeepers. political ecosystem, to bust the mythical construc-
Rather than being equal, search engine algorithms, tion of Internet-based politics. In Digital Citi-
and inequalities in link structure and traffic, create zenship, the Internet, Society and Participation,
a “winner-takes-all” pattern: Only a few successful Mossberger, Tolbert, and McNeal conducted such
political sites dominate the political communities analyses of the Internet’s impact on U.S. politics,
to which they belong. using data from two Pew Internet and American
870 Myth of Digital Democracy

Life surveys from the 2002 congressional elec- Hindman’s work along these lines articulates
tions of 2002 and the 2004 U.S. presidential elec- an importantly unsettling view of Google’s role
tions. Their results confirmed the positive role of in the “New Democracy.” It also raises new and
the Internet in politics, leading them to conclude crucial questions about how to study the political
that the Internet enhances civic engagement and implications of online and social media in general,
political participation. focusing on the need for a sound empirical basis
The Internet’s effects on political life in other to support the host of political “game-changer”
parts of the world challenge Hindman’s asser- claims currently attributed to them.
tions. Social media tools, including blogs, Twit-
ter, and Facebook, have been indispensable to Aziz Douai
activists fighting for political change, from Burma University of Ontario Institute of Technology
and Ukraine to Egypt and Iran. During the Arab
Spring uprisings, social media helped activists See Also: Crowdsourcing; Digital Citizen;
and citizens spread dissenting information, share Flash Mobs as a Political Tactic; Googlearchy and
news that countered authoritarian regimes’ nar- Politics.
rative, and mobilize the populace. Digital democ-
racy does not mean, nor should it herald the end Further Readings
of, collective action and offline political life. In Gaffney, D. “#iranElection: Quantifying Online
tempering any assessment of new media’s political Activism.” Proceedings of the WebSci10:
effects, a more balanced perspective would rec- Extending the Frontiers of Society On-Line,
ognize that digital democracy does not necessar- April 26–27, 2010, Raleigh, NC. http://journal
ily need to translate into an egalitarian, utopian .webscience.org/295/2/websci10_submission_6.pdf
ideal, and that Googlearchy remains a legitimate (Accessed August 2013).
threat. While it is warranted, a solid critique of the Hindman, M. The Myth of Digital Democracy.
unconditional embrace of the new digital democ- Princeton, NJ: Princeton University Press,
racy ethos should also propose ways of address- 2008.
ing the democratic risks entailed in the concentra- Morozov, E. The Net Delusion: The Dark Side
tion and monopolization of the Web. A balanced of Internet Freedom. New York: Public
critique thus needs to suggest means of safeguard- Affairs, 2010.
ing the openness of the Internet, combating the Mossberger, Karen, Caroline J. Tolbert, and
fragmentation of the public sphere, and ensuring Ramona S. McNeal. Digital Citizenship, the
that online public space remains accessible and Internet, Society and Participation. Cambridge,
democratic. MA: MIT Press, 2007.
N
Nation of Islam the Muslims Want” and “What the Muslims
Believe”—and covers religious and political values
Movement as well as public policy preferences. The Web site
also describes the background of key leaders such
Around 1930, Wallace Fard Muhammad founded as Elijah Muhammad, who succeeded Wallace
the Nation of Islam in Detroit, Michigan. The Fard Muhammad in 1934; and Louis Farrakhan,
Nation of Islam is known as a religion, empower- who in 1978 reoriented/revived the organization
ment organization, new religious movement, or according to Elijah Muhammad’s teachings as a
black nationalist/separatist group, depending on shift from changes made by Warith Deen Moham-
the speaker and audience. The Nation of Islam med. Additionally, official Nation of Islam state-
primarily focuses on the needs and interests of ments on a range of topics like education, service
African Americans. Statistics vary widely for for- projects, support for political allies, and commen-
mal membership and number of lay followers: tary on current events, along with live Web casts
19,000 on the low end to 60,000 or more on the every Sunday morning at 10 a.m. central time and
high end. Members of the Nation of Islam typi- a video archive of past speeches, are on the site.
cally engage with each other in person at different Three separate sites are linked to the main Web
venues and online via social media. The organi- site. The first is “The Final Call Online Edition,”
zation’s Web presence in particular has several which is the online companion to the Final Call
purposes: education, recruitment, publicity, and newspaper. Both papers cover national and inter-
debates. The communications that occur under national news. More multimedia material from
these categories contain both religious and politi- the Final Call can be found on its YouTube Chan-
cal content. nel, which had over 6,000 subscribers and over
4.8 million video views as of December 2012. The
Web Sites second link is for the “Nation of Islam Research
The official Web site of the Nation of Islam serves Group,” a site containing blog posts, newsletter
as an educational repository, recruitment tool, contributions, books and DVDs/CDs for pur-
publicity device, and debate forum. The Web site chase, and multimedia (such as video, audio, and
has information about the origins of the organi- photographs).
zation and its official platform titled “The Mus- These two Web sites frequently function as
lim Program,” which has two parts—”What spaces to engage members, observers, and critics

871
872 Nation of Islam Movement

Social Media
The Nation of Islam utilizes other forms of
social media besides Web sites. Current leader
and minister Louis Farrakhan uses Twitter to
inform, counsel, recruit, and publicize events.
As of December 2012, there were over 120,000
followers for his Twitter feed. Followers can
ask questions of Farrakhan, and he responds
to clarify and justify particular religious and
political positions. The official Nation of Islam
Twitter account has almost 3,000 followers. It
is mostly used for publicity purposes. The Final
Call newspaper account has over 12,000 follow-
ers. It directs readers to full-length articles and
promotes Nation of Islam activities such as the
annual Saviours’ Day Convention.
The Nation of Islam also uses Facebook as a
technological instrument to advance its religious
and political programs. The Final Call newspa-
A Nation of Islam member offers the Final Call newspaper at per has a Facebook page, as do multiple indi-
a Notting Hill street fair in London, England, in August 2011. viduals, local groups, and mosques affiliated
The Final Call now has an online edition and Twitter, YouTube, with the Nation of Islam. Facebook users share
and Facebook accounts. news, links, images, videos, and commentary of
interest. Facebook is interactive in that it permits
users to demonstrate support via a “like” icon,
and there is space to share opinions. Although
on a variety of controversial issues. Examples specific statistics for the frequency and range of
include denying the charges of anti-Semitism and online participation are unavailable, it appears
racism by the Anti-Defamation League and other that Facebook and Twitter are more supplemen-
groups, especially concerning the two-volume tal than core modes of communication for the
work The Secret Relationship Between Blacks and organization.
Jews; drawing attention to political and economic The Nation of Islam understands the role of
inequalities between racial groups in the United social media in religion and politics. It strategi-
States; challenging the label of “hate group” by cally makes use of different platforms to support
the Southern Poverty Law Center; and taking cer- followers and attempts to change other groups’
tain stances in foreign policy debates centered on common misconceptions or stereotypes about the
countries like Israel and Libya. organization. Critics of the Nation of Islam con-
The third Web site linked from the Nation of tinue to employ social media to question and dis-
Islam’s main site is for the “Millions More Move- credit the organization. Time will tell if technol-
ment.” An extension of the 1995 Million Man ogy will contribute to the strength and stability
March in Washington, D.C., the Millions More of the organization or if technology will hasten
Movement consists of local organizing commit- its decline.
tees across the United States that mobilize vol-
unteers to support the advancement of African Jennifer Epley
Americans in the areas of unity, spiritual val- Texas A&M University–Corpus Christi
ues, education, economic development, political
power, reparations, prison issues, health, artistic/ See Also: Activists and Activism, Digital; Civil
cultural development, and peace. Most of these Rights; Economic and Social Justice; Faith-Based
online resources are free and open to Nation of Social Change; Islam, Nation of; Islam and Social
Islam members and the general public. Media; Race and Ethnicity.
National Center for Digital Government 873

Further Readings science (University of Michigan); his primary


Anti-Defamation League. “Nation of Islam.” http:// research interests included the role of social net-
www.adl.org/main_Nation_of_Islam/default.htm works in governance and the use of technology
(Accessed December 2012). within the criminal justice system, particularly the
Nation of Islam. http://www.noi.org (Accessed use of DNA analysis.
December 2012). Since 2005, Dr. Fountain and the NCDG have
Southern Poverty Law Center. “Nation of been based at the University of Massachusetts,
Islam.” http://www.splcenter.org/get-informed/ Amherst. Its successor program at Harvard, the
intelligence-files/groups/nation-of-islam (Accessed Program on Networked Governance (PNG),
December 2012). also supported by the NSF, was founded by Dr.
Twitter.com. “Louis Farrakhan.” https://twitter.com/ David Lazer. Together, these centers have greatly
LouisFarrakhan (Accessed December 2012). expanded the scope and reach of the social sci-
Twitter.com. “Nation of Islam.” https://twitter.com/@ entific research, training, and applications of
officialNOI (Accessed December 2012). information technology and communications
YouTube.com. “Official Page for The FinalCall.com originally funded in 2002 to produce a global
News Network.” http://www.youtube.com/FCNN network linking scientists, researchers, and prac-
(Accessed December 2012). titioners with governing bodies, civic communi-
ties, and institutions. Related programs within
Harvard’s Kennedy School of Government are
the Belfer Center for Science and International
Affairs, and the Taubman Center for State and
National Center for Local Government.
Originally established as a relatively simple
Digital Government research network, the focus and influence of
the NCDG rapidly expanded. The first activity
The National Center for Digital Government of the NCDG was a foundational workshop on
Research and Practice (NCDG) was originally Developing a Basic Research Program for Digital
established by Dr. Jane Fountain in June 2002, Government, held from May 31 to June 1, 2002,
within the John F. Kennedy School of Govern- just prior to the announcement of NSF funding
ment at Harvard University, and is codirected by and establishment of the NCDG. Several weeks
Dr. David Lazer. A three-year, $1.5 million grant later, the E-Government Act of 2002 (also known
awarded by the National Science Foundation as the Lieberman Bill) was unanimously passed
(NSF) originally funded the center, with the early in the U.S. Senate. When it was signed into law
mission to conduct research into ways that bur- in December, a new agency within the Office of
geoning information technologies were integrated Management and Budget—the Office of Elec-
into strategies for governance and civic discourse. tronic Government—was created, charged with
Understanding the impact of information tech- overseeing “Web-based Internet applications or
nology within the intersections of institutions, other information technology to enhance the
individuals, and government was deemed by NSF access to and delivery of government informa-
of paramount importance in advancing research tion and services to the public, other agencies,
aimed at developing and implementing effective and other government entities. . . .” That legisla-
policy frameworks. tion was instrumental in authorizing and fund-
Jane Fountain’s academic background includes ing the original NCDG, as well as rapid expan-
a master’s degree in education (Harvard) and sion of its activities.
Ph.D.s in organizational behavior and political In the first two years of the NCDG, Jane Foun-
science (Yale), with research focuses on institu- tain was keynote speaker at the International
tional change, virtual governance, and the impact Conference on Public Participation and Informa-
of information technologies on these topics. tion Technologies at the Massachusetts Institute
David Lazer’s academic credentials include a B.A. of Technology, was a featured speaker at an infor-
in economics (Wesleyan) and a Ph.D. in political mation technology (IT) workshop at the London
874 National Freedom of Information Coalition

School of Economics, was a speaker at a confer- See Also: Digital Government; E-Democracy;
ence on e-governance in Barcelona, Spain, deliv- Innovation and Technology; Open Source Politics.
ered the keynote address at the First Seminar on
Digital Government and Governance at the Uni- Further Readings
versity of Tokyo, was a speaker at an IT confer- Fountain, Jane E. “Promises and Pitfalls of Social
ence in Santiago, Chile, and delivered an address Media Use in Government.” Public Administration
on Governing the Virtual State at the European Review, v.73/2, (2013).
Information Society Technologies Conference in Lee, Sang M., Xin Tan, and Silvana Trimi. “Current
the Hague. Practices of Leading E-Government Countries.”
Since the re-establishment of the NCDG at the Communications of the ACM, v.48/10 (2005).
University of Massachusetts, Amherst, in 2005, Warf, Barney. Global Geographies of the Internet.
and the founding of the PNG at Harvard the same Dordrecht: Springer, 2013.
year, the two centers have pursued similar, some-
times interconnected trajectories toward similar
missions. Both are increasingly active on a global
scale. NCDG research at Amherst “extends and
refines theoretical frameworks in the social sci- National Freedom of
ences to encompass fundamental changes in
information processing and communications . . . Information Coalition
to advance social and applied social science dis-
ciplines and fields as well as an understanding of The National Freedom of Information Coalition
digital government.” (NFOIC) is a nonpartisan organization that sup-
Among more recent research topics at the ports the general public’s right to an open and
NCDG are ethics in science and engineering transparent government. As a nonprofit organi-
(Jane Fountain and colleagues), networked gov- zation, NFOIC relies on the hard work and sup-
ernance (Jane Fountain), crowdsourcing and the port of citizens, lobbyists, and advocates of the
environment (Charles Schweik, NCDG Associ- First Amendment and a transparent government.
ate Director), and e-rulemaking and democracy NFOIC is funded by grants from the John S. and
(Stuart Shulman, NCDG associate director, and James L. Knight Foundation, an organization
research group). In February 2013, Workshop working toward improving journalism around
in the Knowledge Commons was introduced to the world. The National Freedom of Information
examine issues and possibilities related to what Coalition officially met for the first time in 1989,
has been called an emerging field of study, that of in Dallas, Texas; at the time, it was known as the
worldwide open access initiatives. National Freedom of Information Assembly. The
Recent PNG projects and ongoing research purpose of its first meeting was to support the
focuses have included the PNG Working Paper growing number of active First Amendment orga-
Series; developments in social network analy- nizations and to protect citizens’ rights to public
sis, including focuses on teaching resources, lit- records and governmental oversight.
erature, and network visualization; DNA in the The coalition’s second meeting took place in
criminal justice system, featured on CBS’ 60 Min- Dallas, Texas, in 1991, which was the 200th anni-
utes; Knowledge Sharing and networking among versary of the Bill of Rights. At a third meeting
state health officials; and connecting to Con- in 1992, the National Freedom of Information
gress. The connecting to Congress project reflects Assembly was officially renamed the National
the mandate of the 2002 E-Government Act to Freedom of Information Coalition. Today, the
develop and manage information technology that NFOIC holds an annual meeting, and is governed
enhances the capacity for effective interaction of by a board of directors. Each board member is
civic and governmental entities elected to serve a three-year term, while the chair-
man of the board can serve up to two two-year
Leslie Reynard terms. Each year’s conference includes guest
Washburn University speakers, panels, and receptions. The NFOIC
National Press Club 875

headquarters is currently located at the Donald Web sites, the NFOIC facilitates cooperation
W. Reynolds Journalism Institute, part of the between different organizations. Education and
Missouri School of Journalism in Columbia, Mis- awareness is another important aspect of NFO-
souri. The NFOIC is the oldest and one of the IC’s day-to-day activities. It prepares reports
largest freedom of information libraries in the and publications in order to educate and spread
world; it contains more than a million documents awareness about the public’s right to information.
and journal articles about the public’s right to Also, the NFOIC attempts to advice and influence
government information. appointed or elected officials about their respon-
The NFOIC considers itself an education and sibilities to the public; it hopes to establish new
resource center for local and state governments; it advocates and support for its cause. The NFOIC
hopes to advise officials on ways of maintaining has partnered with many other coalitions and
an open government, and ways of implementing organizations around the country, including the
new legislation and laws that could further sup- Online Media Legal Network at Harvard Univer-
port the flow of information from the government sity in Cambridge, Massachusetts.
to its citizens. Twice a year, the NFOIC awards
monetary grants to state coalitions and local orga- R. Bruce Anderson
nizations with similar goals and values. It is also Matthew Geras
responsible for managing the Knight Freedom of Florida Southern College
Information Fund, which provides financial assis-
tance to limit the costs and expenses associated See Also: Open Data; Open Source Governance;
with court cases relating to freedom of informa- Open Source Politics; OpenGovernment.org.
tion. These funds help to cover the costs of filing
fees, consultation fees, and attorneys. The Knight Further Readings
Freedom of Information Fund has awarded over National Freedom of Information Coalition. http://
30 grants since its inception in 2010. About half www.nfoic.org (Accessed May 2013).
of these cases resulted in a ruling that was favor- “Newspaper Wins Grant For Disclosure Of E-Mail
able to the free flow of information. Lists.” North Country Gazette (May 14, 2013).
One such grant was awarded to a local news- “OMLN Partners With National Freedom of
paper in Westminster, Maryland, for compel- Information Coalition to Assist With Freedom
ling the local board of county commissioners to of Information Lawsuits” (February 1, 2010).
release its e-mail distribution list. The newspaper Berkman Center at Harvard University. http://
in question received a $12,500 litigation grant cyber.law.harvard.edu/newsroom/OMLN_
after battling with the board of county commis- National_ Freedom_of_Information_ (Accessed
sioners for several months. The Carroll County May 2013).
Time’s requests for the information were denied
several times by the county commissioners, even
after legal sources declared that e-mail addresses
are not barred from public access. The board of
county commissioner defended its position by National Press Club
pointing to concerns for cybersecurity and the
potential for cyberbullying if the e-mail addresses The National Press Club (NPC) is a Washing-
were released. ton, D.C., based professional organization and
The NFOIC supports many existing state and private social club for journalists. It has more
local-level organizations while helping to create than 3,000 members. Members of the NPC range
and start up similar organizations. The NFOIC from current and former journalists to govern-
helps many of these organizations work together ment information officers and to those believed to
by aiding in fundraising and by providing forums be sources of news on a regular basis. The NPC
for networking between members. By holding offers a place for journalists to socialize and hosts
conferences, running an open government blog on speakers, including leaders in government, poli-
its Web site, and utilizing many other social-media tics, business, music, film, academia, and sports.
876 National Press Club

The NPC also has a nonprofit called the National W. Bush introducing his national security team
Press Club Journalism Institute, which provides during the 2000 election. It has also been argued
training for communications professionals on that the club may have contributed to the launch-
changing media environments, and provides ing of the Korean War because of a 1950 speech
scholarships to journalism students. at the club by Secretary of State Dean Acheson,
The club was founded in 1908 by 32 newspaper who outlined America’s “defense perimeter” for
reporters, each willing to contribute $10 to the Asia and omitted South Korea. Some believe that
creation of the club. By 1910, the club had begun Soviet dictator Joseph Stalin interpreted that to
to establish itself, and welcomed William How- mean that North Korea should prepare to invade
ard Taft as the first president to visit the club. As South Korea.
the club became more well known, its member-
ship levels increased, and the organization needed Press Freedom
more and more space. In the 1920s, the club In an effort to promote press freedom, each year,
decided to build a high-rise building in the heart the NPC awards the John Aubuchon Freedom
of Washington, D.C. The building would be home of the Press Award to one domestic and one
to many Washington news bureaus, and the club international recipient. The award honors peo-
had its headquarters on the top floor. The build- ple who have contributed to the cause of press
ing opened in December 1927, and at 14 stories freedom and open government. The NPC also
tall, it was the tallest office building in Washing- hosts an array of speakers on the topic of press
ton at the time. It was rebuilt in the early 1980s, freedom, and has publicly voiced support for
and in 2006, a broadcast operations center was journalists in press freedom cases. Additionally,
added to transmit news globally. Today, the build- the Freedom of the Press Committee of the NPC
ing also houses two restaurants, the Fourth Estate offers training courses intended to help reporters
and the Reliable Source Bar and Grill. understand laws relating to press freedom and
When the NPC was first created, its mem- journalists’ rights.
bership was limited to white, male journalists. The NPC received criticism in 2011 when jour-
Because female journalists were not allowed to be nalist Sam Husseini, an NPC member, was sus-
members of the club, a group of women, assisted pended for asking Saudi Arabia’s Prince Turki
by First Lady Eleanor Roosevelt, created the al-Faisal about the legitimacy of his regime. He
Women’s National Press Club in 1919. Similarly, was suspended for two weeks on the grounds
as a result of the NPC’s discrimination, African that such action violates the NPC rule prohibiting
American journalists founded the Capital Press “boisterous and unseemly conduct or language
Club in 1944. The NPC admitted the first African in or about the club.” The NPC received criti-
American male journalist in 1955, and the Capi- cism for not allowing journalists to be journalists
tal Press Club still exists today. Members of the inside the club because of the incident, and the
Women’s National Press Club voted in 1970 to suspension was later reversed.
allow men into their club, which they renamed
the Washington Press Club. Shortly thereafter, the Meghan Sobel
NPC voted to admit women. The two organiza- University of North Carolina at Chapel Hill
tions remained competing clubs until 1985, when
they merged to form a new NPC. See Also: Freedom of the Press and National
In 1931, the NPC welcomed President-elect Security; Immersive Journalism; John Aubuchon Press
Franklin Roosevelt to speak at an event that has Freedom Award.
become the newsmaker luncheon series, which reg-
ularly attracts speakers such as Mahmoud Ahma- Further Readings
dinejad, Nelson Mandela, Yasser Arafat, Golda National Press Club. http://www.press.org (Accessed
Meir, Boris Yeltsin, and the Dalai Lama. Many big August 2013).
events have begun or have been announced at the “National Press Club Press Freedom Committee
club, such as Ronald Reagan and Jimmy Carter Launches New Educational Initiative.” Science
announcing their presidential bids, and George Letter (March 24, 2009).
Near-Me Tabs and Political Protest 877

“National Press Club Releases 100 Key Dates in NPC (GPS)-enabled phones and tablets, alongside the
History.” PR Newswire (March 30, 2008). http:// prevalence of data-enabled devices as part of the
www.prnewswire.com/news-releases/national “mobility turn” of the 2000s, allowed for new
-press-club-releases-100-key-dates-in-npc practices of connectivity during this era. However,
-history-57317282.html (Accessed August 2013). a PBA allows for temporary, localized connectiv-
ity between anyone with a mobile device, either
directly through automatic geotagging of items
such as images, videos, or social media posts, or
through opt-in geomapping through technologies
Near-Me Tabs and such as Google Maps. These types of technolo-
gies were particularly useful in the many protests
Political Protest in 2011 and 2012 that used social media as an
organizational tool, particularly the Arab Spring
Near-Me tabs are a function of proximity-based and global Occupy Movement that heavyily used
applications (PBAs), applications and functions Twitter and Facebook.
designed to allow for mobile devices to detect Proprietary software protocols or mobile ser-
nearby events, people, news, or other happen- vices are necessary to access GPS-enabled mobile
ings within a certain geographical distance in devices and applications, which often allow users
space. The rise of global positioning system some degree of control over their ability to be

Proximity-based applications allow for temporary, localized connectivity between anyone with a mobile device. These applications
became especially useful to both Arab Spring and global Occupy Movement protestors in 2011 and 2012. This group of protestors
checked their mobile phones at a rally for Egyptian democracy in San Francisco, California, in early 2011.
878 Negative Campaigning

both located and contacted in geographic space. advantages of mobile and GPS-enabled technolo-
However, the uses of these location-based services gies allowed for individuals to organize and amass
have raised concerns over user privacy in terms of a network-centric multitude, as well as to become
both the data available to the administering com- aware of events in the nearby vicinity.
panies of these applications and to wireless carri- This was also similar to the social media uses
ers, particularly through sometimes confusing or of the global Occupy movement, particularly the
changing privacy policies. This practice has also New York City encampment in Zuccotti Park,
raised troubling questions in terms of surveillance which used geomapping and Near-Me tabs to
by law enforcement agencies. keep track of happenings in Manhattan in fall
The uses of PBAs are still being realized as the 2011. The Occupy Movement was diverse and
technology develops and new applications are had several actions and occupations occurring
developed. Stores can send coupons or price dis- in different locations, as well as skirmishes with
counts to shoppers who are shopping in or passing police throughout the city and in its protest
by a physical location; several large retailers have marches. These were captured on a number of
experimented with these technologies lately. A mobile devices; immediately uploaded to social
parent who loses a child in a shopping center can media, video-sharing, or photo-sharing sites;
broadcast a localized message to other shoppers geotagged; and pooled together to paint a pic-
nearby through the creation of a Near-Me area ture of the real-time events that occurred in geo-
network, a localized wireless network between graphic space.
several wireless devices in close proximity to one
another. Individuals can be notified when their Doug Tewksbury
PBA-enabled friends are within a certain geo- Niagara University
graphical distance of a certain phone. Videos can
be viewed through an app like Vidcinity, a geo- See Also: Activists and Activism, Digital; Arab
graphically based video service of user-generated Spring; Geo-Locational Enabling; Geotagging;
content. Real estate listings can use GPS data to Occupy Movement.
list local houses for sale or apartments for rent.
Facebook briefly experimented with a PBA friend Further Readings
finder in 2012 before canceling the service. In Bartlett, D. Essentials of Positioning and Location
each case, the technology works in a relatively Technology. Cambridge, UK: Cambridge
open infrastructure, allowing for interoperability University Press, 2013.
between wireless carriers and network protocols, Hardey, M. “The City in the Age of Web 2.0: A
with a focus more on close geographic proximity, New Synergistic Relationship Between Place and
rather than on localized networks. People.” Information, Communication & Society,
v.10/6 (December 1, 2007).
Political Protest and Massing Publics Howard, P. N. and M. M. Hussain. Democracy’s
With the rise of the global Occupy movement, the Fourth Wave? Digital Media and the Arab Spring.
Arab Spring, and other protests that emerged in New York: Oxford University Press, 2012.
2011 and 2012, PBA technology allowed for the
creation of new networks of information shar-
ing and political action, primarily through Twit-
ter. While some critics argued that accounts of
the power of social media in these protests were Negative Campaigning
overblown (the Arab Spring was referred to as
the “Twitter Revolution” by many in the Western Negative campaigning is trying to win an advan-
press), the peer-to-peer contacts allowed these pro- tage in elections by referring to negative aspects
tests to not only remain flexible in their organiza- of an opponent, rather than emphasizing one’s
tion, but also mobile in their geographic location. positive attributes or preferred policies. Negative
In a moving protest that is taking place in several campaigning became commonplace in modern
different locations at a synchronistic time, the electorate campaigns, particularly in the United
Negative Campaigning 879

States, but also in many other countries such as John Kerry in 2004, are follow-ups of the Willie
Russia and the UK. Certain forms of negative Horton campaign.
campaigning are as old as communities with an
electorate. During the Roman Empire, members Scientific Studies
of the Senate used methods of negative campaign- Many scholars have worked on the use of nega-
ing to achieve their goals. In the United States, tive attacks in elections and their potential adverse
the presidential campaign of Lyndon Johnson was effects on turnout, vote choice, and democracy.
seminal for negative ads in the political arena. They have used diverse investigation techniques
On September 7, 1964, he launched the adver- like surveys, experiments, and formal models. A
tisement “Peace, Little Girl.” It shows a young great deal of time and effort has been devoted
girl plucking the petals from a daisy and counting to determining whether or not negative political
from one to nine. Then, a male announcer counts information works, and how. It was hypothesized
down from 10. With each successive number, the that it might drive everything from support for a
camera jumps to a closer shot of the child’s face. candidate to turnout and effect on the political
At zero, a nuclear blast fills the screen and Presi- system as a whole. For the most part, scientific
dent Johnson says: “These are the stakes to make studies show that there are some effects of nega-
a world in which all of God’s children can live, tive information, but their direction and impact is
or to go into the dark. We must either love each difficult to determine.
other, or we must die.” The commercial aired just Scholars have shown in a metaanalytic assess-
once, but caused an instant furor. NBC, the net- ment of the effects of political advertising that
work on which the commercial was aired, was for every study showing the damaging effects of
flooded with phone calls and letters. President negative information, there was a study prov-
Johnson’s opponent, Senator Barry Goldwater, ing the opposite. Increasingly, negative informa-
requested equal time from NBC to clarify his posi- tion comes from sources beyond the candidates
tions on the use of nuclear warheads. Television or campaigns themselves, particularly interest
news programs on all three existing networks at groups and the media. Both are common sources
the time featured the commercial and the result- of information in the campaign context. With
ing controversy. expenditures on interest group advertisements
Decades later, campaign commercials are often totaling somewhere around one-third of the
subject to media coverage. Newspapers and tele- money spent on political advertising, the potential
vision news programs frequently report on can- electoral impact of moneyed interest groups plays
didates’ campaign ads. Another prominent and a crucial role. Interest group advertising can have
more recent example for negative campaigning is an informative function, but it can also attack just
the electoral race between Vice President George as strongly as an advertisement coming directly
Bush and his challenger Michael Dukakis. In the from a candidate. In this context, studies show
1988 presidential campaign, a black man named that information from independent group ads or
Willie Horton helped defeat Governor Michael news story accounts are more persuasive than
Dukakis of Massachusetts. Willie Horton had campaign-sponsored negative information.
committed rape while on furlough from a Massa-
chusetts prison under a program that was actually Role of Media
started by another governor, a Republican. The Campaign commercials, especially negative ones,
anti-Dukakis commercial featuring Mr. Horton are well suited to fulfill the requirements of a good
was spread via an outside group launched by Lee news story. Journalists usually get a good story
Atwater, a campaign manager for George H. W. when candidates attack one another. Allegations
Bush. The latter publicly denied that he had been of dishonesty and incompetence plant the seeds of
in any way involved. However, the campaign controversy and scandal. Even if the charges prove
worked. Many voters related Willie Horton’s face to be false, reporters can rail against the candidate
to Democratic nominee Michael Dukakis. Many who aired the attack for engaging in unfair cam-
of today’s third-party advertisements, like the paigning. The political fight then becomes the story.
“Swift Boat” attacks that helped defeat Senator Turning advertisements into news stories allows
880 Negative Campaigning

candidates to set the campaign agenda, and mag- ongoing and heated. Studies on the topic of nega-
nifies the effects of the ads. News coverage of the tive campaigning do not show consistent findings
advertisements recycles the political messages, regarding the effectiveness of such a campaign
providing the candidates with valuable prime time strategy. Negative campaigning may keep people
in the news, free of charge. The public is usually away from the polls for different reasons. One
disappointed by such negative political disputes. reason is that negative advertising may discour-
For this reason, voters increasingly give election age supporters of the candidate who is attacked.
coverage in the United States poor marks. In U.S. An alternative explanation is that negative adver-
states where campaigns were highly negative, peo- tising makes the public disenchanted with both
ple rated the media especially badly. candidates. That way, candidates unintention-
There are a number of techniques used in nega- ally disappoint their supporters by using negative
tive campaigning. The most common is running advertising. Finally, negative campaigning may
advertisements attacking an opponent’s personal- diminish the power of civic duty, and may under-
ity, record, or opinion. There are two main types: mine the legitimacy of the entire electoral process.
attack ads and contrast ads. Attack ads exclu- Campaigns that generate more negative than posi-
sively focus on the negative aspects of the oppo- tive messages may leave voters embittered toward
nent. Contrast ads contain information about the the candidates and the rules of the game.
candidate and the opponent, but the informa- Negative ads can produce a backlash. For
tion about the candidate is positive, whereas the example, in the 1993 Canadian national elec-
information about the opponent is negative. Since tion, Conservatives attacked the physical handi-
contrast ads must contain positive information, caps of the liberals’ candidate Jean Chrétien for
they are considered less damaging to the political prime minister. The liberals won anyway, but vot-
process than attack ads. Often, campaigners will ers were so disgusted about the Conservatives’
use outside organizations such as lobby groups to behavior that only two Tories were elected to Par-
launch attacks and discretely disseminate nega- liament from the whole country. Previously, the
tive information about the rival candidate. Social Conservatives had held 154 seats, so the entire
media offer many new possibilities in this context. party wiped itself out for one election cycle.
Another common negative campaigning tactic is During the run up to the 1997 United Kingdom
attacking the other side for running a negative general election, the British Conservative Party
campaign. ran a campaign that stated that the Labour Party
In 1992, ad-watch journalism, in which the was dangerous, and used posters of Labour leader
media acknowledge some degree of responsibility Tony Blair with “demon eyes” on them. Many
for monitoring the basic truthfulness of content voters rejected this claim, the campaign failed,
contained in political advertising, appeared on and Labour won in a landslide. Negative cam-
the media landscape. The Los Angeles Times, for paigning can backfire in many ways. It can turn
instance, published more than 20 ad-watch stories off voters and can cause opponents to respond in
focusing on the two races for U.S. Senate in Cali- kind. It can cause voters to wonder if the other
fornia. Today, ad-watches are standard in print and candidate has some of the same negatives that his
broadcast outlets at national, regional, and local or her opponent seems to have, and can create a
levels. Ad-watches represent an important shift in negative campaign for the candidate’s opponent.
campaign journalism. They provide reporters and Because of the possible harm that may arise from
editors with a tool to clarify their independence being seen as a negative campaigner, candidates
and to rebuild the integrity of their media. often pledge to refrain from such negative attacks.
In commercial advertising, various regulations
Risks and Advantages prohibit false advertising and broadcast cam-
The discussion about whether negative political paigns to promote potentially harmful activities,
advertising encourages voters to participate in such as advertising tobacco products or alcohol.
democracy, discourages voters to participate, or Similar regulations have at times been proposed
only influences voters with particular character- by politicians to limit negative political cam-
istics and under certain circumstances remains paigning. They argue that negative political ads
Network Influentials 881

poison the political process. In modern Western and LinkedIn connections) of one’s network
societies, however, the proposed regulation of influence, illustrates why network influentials are
public speech is confronted by strong traditions important, and concludes with a political labor
favoring the open exchange of ideas and opin- reform example of how network influentials can
ions, and by fundamental legal protections, such snowball out their effect and impact public policy
as the Constitution. and opinion.

Ralf Spiller Klout


Macromedia University Many policymakers, CEOs, and media executives
strive to identify the individuals through whom
See Also: Campaign Strategy; Candidate Image; they can deliver their message, thus resulting in
Candidates, Political Branding of; Political Parties. the maximum network saturation (i.e., for the
least amount of effort and cost, who will bring the
Further Readings greatest return on investment). As a rough indica-
Djupe, Paul A. and David A. M. Peterson. “The tor of network influence, crude numbers like the
Impact of Negative Campaigning: Evidence From number of Facebook friends or LinkedIn connec-
the 1998 Senatorial Primaries.” Political Research tions an individual possesses have been used in the
Quarterly, v.55/4 (2002). past, but these are crude indicators and do little
Johnson, Tyler, Johanna Dunaway, and Christopher to describe the individuals’ true influence or con-
R. Weber. “Consider the Source: Variations in nectedness within their network. More recently,
the Effects of Negative Campaign Messages.” Klout.com has elevated the ability to assess the
Journal of Integrated Social Sciences, v.2/1 extent to which someone is a network influential
(2011). with the introduction of a Klout score. A Klout
Lau, R. R., L. Sigelman, C. Heldman, and P. Babbitt. score ranges from 0 to 100, and not only factors
“The Effects of Negative Political Advertisements: in number of connections on social networking
A Meta-Analytic Assessment.” American Political sites, but also the individual’s ability to stimu-
Science Review, v.93 (1999). late dialogues and inspire actions such as “likes,”
Marks, Eric, Mark Manning, and Icek Ajzen. “The “retweets,” and “shares.”
Impact of Negative Campaign Ads.” Journal of Despite the known importance of network
Applied Social Psychology, v.42/5 (2012). influentials and recent advances in identifying
them, much work remains to truly conclude that
these mechanisms to identify network influence
are valid measures of actual influence. The pri-
mary challenge to the validity of these measures
Network Influentials of influence is their proprietary nature—many
of the algorithms used to calculate scores are
In the media and politics domain, Alan Rosenblatt kept secret, thus forcing the public to assume
coined the term network influentials to describe that measure is valid without having any way to
individuals who, through social networks and verify it. Klout scores, for example, as mentioned
social media, reach large numbers of others. This above are based on some combination of “likes,”
notion, not new to those who study and analyze retweets, and “shares,” among other factors.
social networks, is synonymous with the idea of But, how exactly a share is weighted, and how
a “super-connector” or a “super-actor,” terms the influence of the person who shared it is calcu-
used to describe individuals within a given net- lated (or if it is calculated), are not disclosed. Cer-
work who are the most connected and influential. tainly, a share by former President Bill Clinton’s
Identifying and understanding network influen- Facebook account, which has tens of thousands
tials can be a key component in dispersing infor- of followers, has more influence than a share by
mation, swaying public opinion, or organizing a a friend from grade school who has only a few
community around a cause. The remainder of this hundred followers. How exactly that influence is
entry discusses some indicators (e.g., Klout scores quantified remains undisclosed.
882 Network Influentials

Netform subjected. Each day, she would dress in rags, and


Karen Stephenson, an organizational anthropol- go from employer to employer seeking work. By
ogist, runs Netform, an organization that seeks the time all was said and done, she infiltrated
to map and measure social capital in business over 15 employers, documenting physical and
and society. Through Netform’s proprietary pro- emotional abuse, employees fined for talking and
cess, Stephenson has conducted social network charged for cups of water, employers refusing to
studies for both government and Fortune 500 pay employees as promised (or when promised),
company use. and numerous instances of children as young as
What makes Stephenson’s approach to iden- 12 and 13 years old working 12-plus-hour days
tifying network influentials unique is that she in sweatshop conditions.
includes the individual’s propensity toward Through her social connections, Nelson lever-
action as a key factor in her equation. Stephen- aged her position as a reporter to shine light on
son’s hypothesis is that most attempts to iden- these workplace atrocities and effect changes in
tify network influentials and exploit their influ- public policy. She used her connections with the
ence fail because the people commonly thought Illinois Woman’s Alliance, Florence Kelly (the
to be the most influential are also typically the Hull House and National Consumer’s League),
most busy, and thus are the least likely or able to Elia Peattie (Omaha Women’s Club and Nebraska
take action. Stephenson’s approach, one that is State Federation of Woman’s Clubs), and some
used by many governments seeking to stimulate connections at the New York World newspaper to
policy change, focuses on identifying individuals organize letter-writing campaigns, stage protests,
who have strong relationships across multiple and generate public outcry that ultimately led to a
community sectors; relationships grounded in domino effect of labor policy changes at the local
mutual trust. and federal levels. Nelson recognized, albeit over
In this sense, the focus is not on power or hierar- time, that she had the ability to be influential in
chal structure where a leader with the most direct her network, and she took action to do so. Thus,
reports is assumed to be most influential. Instead, action is a key component of a network influ-
Stephenson’s work shows that often when seek- ential—the individual must be well-connected
ing to effect change, individuals performing grass- enough to impact change, and must also be will-
roots outreach in the community (e.g., a business ing to exploit their network in a systematic and
person who offers her conference room to host targeted manor.
local community organizations) often have the
most influence given that they reach a broad array Eric Liguori
of individuals from different networks and do so California State University, Fresno
in a very trustworthy way. Josh Bendickson
Louisiana State University
Example
Perhaps what Stephenson’s work illustrates, and See Also: Alpha Bloggers; Klout Score; LinkedIn;
all that is know for certain about network influ- Opinion Leader Theory; Snowball Effect; Social
entials, can best be described by looking at the Capital; Social Network Analysis
influence of Nell Nelson, a Chicago socialite
turned newspaper reporter at the turn of the cen- Further Readings
tury. Well-connected socially, Nelson was one of Aldrich, H. E. and A. B. Elam. “A Guide to
the first female reporters for the Chicago Times, Surfing the Social Networks.” In Managing
and authored a series of articles under the col- Enterprise, S. Birley and D. Myzuka, eds. London:
umn heading “City Slave Girls.” Prior to writ- Pittman, 1997.
ing the articles, Nelson spent six months seeking Aldrich, H. E. and C. Zimmer. “Entrepreneurship
employment and working for various clothing Through Social Networks.” In The Art and
manufacturers in Chicago’s garment district. Her Science of Entrepreneurship, D. L. Sexton and
goal: to chronicle and shine light on the work- R. W. Smilor, eds. Cambridge, MA: Ballinger
ing conditions to which women and children were Publishing, 1986.
Networks, Political 883

Bashi, V. Survival of the Knitted: Immigrant Social analysis, the social units are commonly called
Networks in a Stratified World. Palo Alto, CA: “nodes,” and the relationships are called “ties.”
Stanford University Press, 2007. Social units can vary in scale from individuals to
Castilla, E. J., H. Hwang, E. Granovetter, and M. organizations to nation states. Ties can vary in
Granovetter. “Social Networks in Silicon Valley.” terms of strength and content. Political networks
In The Silicon Valley Edge, C. M. Lee, W. F. Miller, are social networks that involve political actors
M. G. Hancock, and H. S. Rowen, eds. Palo Alto, and/or political phenomena. At the individual
CA: Stanford University Press, 2000. level, scholars might focus on the role that inter-
Jack, S. L. “Approaches to Studying Networks: personal social networks play in affecting politi-
Implications and Outcomes.” Journal of Business cal opinions, voting, or mobilization for collective
Venturing, v.25/1 (2010). action. At the organizational level, organizations
Liguori, E. W. “Nell Nelson and the Chicago Times might constitute the nodes in a social network,
‘City Slave Girls’ Series: Beginning a National and coordinated activity (such as joint participa-
Crusade for Labor Reform in the Late 1800s.” tion in events) in a coalition might constitute ties.
Journal of Management History, v.18/1 (2012). While in contemporary discourse, social media
Milgram, S. “The Small World Problem.” Psychology and social networks are often used interchange-
Today (May 1967). ably, from the perspective of social network
Stephenson, K. “The Community Network Solution.” analysis, these are not one and the same thing.
strategy+business, v.49/1–6 (2008). Relations made through social media may be con-
sidered one type of social network, but other types
of social networks exist, and social media should
be thought of as a subset of the concept of social
network. Digital social networks encompass social
Networks, Political media, as well as related things such as the Inter-
net and World Wide Web, mobile phones, and
Traditional social science predominately focuses short message service (SMS). The scale of focus of
on actor attributes in explanations, and on indi- political network analysis can be “ego-networks”
viduals or aggregates of individuals (e.g., in group- or “whole networks.” An ego-network is a focal
level measures) as the units of analysis. Social actor, and the set of alters to which the focal actor
network scholars, by contrast, focus on relation- is tied. The ego-network sometimes also includes
ships. For instance, rather than ascribing politi- ties among alters. A whole network is comprised
cal attitudes to the socioeconomic characteristics of all of the nodes, and all of the ties among the
of individuals, network scholars are interested in nodes, in a bounded social grouping.
how political attitudes are diffused and sustained Another distinction that is made by network
through social networks. Social network analysis analysts is between one-mode networks and two-
can be thought of in three different ways: in terms mode networks. In matrix terms, in one-mode
of particular theories and concepts (such as struc- networks, the rows and columns are the same
tural holes), in terms of particular methods (e.g., actors. In two-mode networks, the rows and
measures of things like density, centrality, and columns are different actors. For example, the
cliques, name roster survey methods, and network rows might be individuals, whereas the columns
visualization), and in terms of particular substan- might be organizations or events. With regard to
tive problems (e.g., social capital, the diffusion of the organization example, individuals are linked
information, collective action, or attitude forma- to one another through their joint membership
tion). More generally, social network analysis can in organizations, and organizations are linked
be thought of as a paradigm that encompasses all together through the joint membership of individ-
of these things. A wide array of political phenom- uals. At the individual actor level, “tie strength”
ena potentially falls under the rubric of political refers to the strength of the relationship between
network analysis. two actors. One conceptual indicator of this is
A social network is a set of social units and the “felt closeness.” Sometimes, role relationships
interrelationships among them. In social network are used as a proxy for closeness, such as the
884 Networks, Political

distinction between close friends versus acquain- Individual Political Action


tances. A variety of other indicators are also used Social networks play a role in both the forma-
in different studies, such as tie multiplexity or tion of public opinion about politics and in the
frequency of contact. Tie strength can also be adoption of political behaviors, such as voting.
used to describe relationships among organiza- Social connections provide conduits for informa-
tions and actors at other scales. Here, the concept tion to flow between individuals about political
is somewhat less developed. One indicator that issues. This social transmission process also pro-
has been used is “interlocking directors.” vides a space for political messages to get shaped
In social network analysis, there are also a vari- and reinterpreted to correspond with individu-
ety of concepts and measures of subgroups. The als’ political preferences. Additionally, social net-
central concept is the clique; that is, a subgroup of works influence political participation by increas-
at least three actors, where every actor has a direct ing access to political resources via social ties,
tie to every other actor in the subgroup. Other and by reinforcing norms about the desirability of
related concepts vary the threshold values for participation. The link between political behavior
these criteria. In terms of digital social networks, and social ties is shaped by two forces: persuasion
ties might be measured by Facebook friendships, (or social influence) and social selection. Persua-
Twitter followers, URL links on the World Wide sion theory posits that when people interact, they
Web, or messages across mobile phones. influence each other’s perceptions and actions.
Frequent interaction between individuals shapes
Political Networks political attitudes, and creates normative expec-
Political network analysis seeks to understand tations that influence behavior, such as voting
how relationships influence political processes. choices or participation in political rallies. Social
Network studies have been conducted at all selection theory highlights the tendency of people
levels of politics, from the influence of country- to make connections to similar others. People
level interactions on world systems to the effect choose to form ties to individuals who share their
of interpersonal exchanges on the political par- political views, embedding themselves within a
ticipation of individuals. This work has helped network that reinforces their political attitudes.
to illuminate the fact that the political arena Thus, people’s political actions can be shaped by
is a relational space. Power and influence are their networks, and their political preferences
exercised between actors in networks, common may also shape the formation of their network.
interests are formed through connections, and
information and resources flow through social Collective Action and Social Movements
structures. Social network theories provide frame- Collective action refers to a collectivity of people
works for examining these relational dimensions working toward a common goal. When this goal
of politics. Network theory has been applied to involves trying to either foster or resist social
the study of political phenomena in three distinct change, this activity is referred to as a social move-
ways. One stream of research has focused on ment. While social movements can overlap with
individual political action. This work examines political parties and formal political institutions,
how interpersonal relationships affect individu- they are normally conceived of as entities that are
als’ political preferences and behavior. A second relatively less institutionalized, and as primarily
stream focuses on collective action and social involving organizations that are separate from
movements, and seeks to understand how inter- political parties and government institutions. In
personal and interorganizational relationships recent years, social movement scholars have given
influence the coordination of political action. A considerable attention to social networks in social
third body of research focuses on the role that movements. Four types of network processes
networks play in policymaking processes. This have been explored, though these are not entirely
work is based on the assumptions that the policy separate phenomena: personal networks that are
options that exist, and are adopted by govern- implicated in the initial recruitment and ongoing
ments, are in part related to the social network mobilization of social movement members, inter-
structure of policy actors. organizational networks that link members of
Networks, Political 885

distinct social movement groups, network struc- organization of, and participation in, the move-
tures that help transmit ideas and other aspects of ment occur entirely online. This is an example of
culture, and networks that produce social capital high leveraging of the affordances of digital net-
for group members. works; for example, the Strategic Voting Move-
Mario Diani has made networks central to his ment. In Digitally Enabled Social Change, Earl
conceptual definition of social movements. He and Kimport discuss two schools of thought
argues that what distinguishes social movements about the effects of digital technology on activ-
from other forms of collective action are the con- ism: supersized, it magnifies traditional processes;
nections that occur between independent sites, and theory 2.0, it actually changes the processes
events, and actors that link them together into a that underlie activism.
collective experience, with shared identities and
goals across time and space. Diani defines social Policymaking Processes
movements as “... networks of informal interac- Policy network analysis examines the role that
tions between a plurality of individuals, groups actors play in the process of policymaking. This
and/or organizations, engaged in political or involves studying the influence of different indi-
cultural conflicts, on the basis of shared collec- viduals and groups, such as government agencies,
tive identities.” More recently, Diani and Bison lobbyists, and nongovernmental organizations,
argue that social movement scholars should rec- in shaping policy outcomes. Several different
ognize social movements as specific social pro- frameworks have been developed to explain the
cesses, distinct from other episodes of collective interaction between networks and policy devel-
action, including discrete protest events. These opment processes. The most prominent of these
individual events should only be considered mea- are the organizational state perspective, the epis-
sures of social movements if there is evidence of temic community approach, the advocacy coali-
their connectedness to each other. In distinguish- tion framework, institutional analysis, and the
ing between organizations, coalitions, consensus social learning model. The organizational state
movements, and social movements, Diani and perspective asserts that policy is influenced by the
Bison have defined the latter in the following way: participation of extragovernmental organizations
“. . . social movement processes ... [are] instances (e.g., social movements, nongovernmental orga-
of collective action with clear conflictual orien- nizations, business associations, and scientific
tations to specific social and political opponents, advisory bodies) in state-policy domain events. A
conducted in the context of dense inter-organiza- variety of organizations are more or less engaged
tional networking, by actors linked by solidarities in policymaking processes, and are perceived to
and shared identities that precede and survive any have more or less influence, based in part on their
specific coalitions and campaigns.” Thus, net- relative position within the policy network.
works can be viewed as an integral part of social Epistemic communities are networks of knowl-
movement phenomena. edge-based experts who define how complex prob-
In terms of social media and digital social net- lems are understood, and who identify state inter-
works, Earl and Kimport talk about a continuum ests and policy options. Epistemic communities are
of online activism involving: e-mobilization, characterized by shared normative beliefs and vali-
e-tactics, and e-movements. E-mobilization is dation criteria, and a common causal understand-
where the digital networks are used to facilitate ing of a particular problem. Epistemic communi-
the sharing of information in the service of an ties shape the distribution of knowledge around
offline protest action (e.g., United for Peace and a particular issue through their network connec-
Justice’s march and rally in Washington, D.C., in tions, and in turn influence perceptions of available
2007). E-tactics include both offline and online policy choices. The advocacy coalition framework
components. These are usually low cost, and do suggests that stakeholders with similar values and
not rely on co-presence for participants or orga- beliefs form coalitions so that they can compete for
nizers. E-tactics provide varying leverages of the policy influence. These coalitions are not limited to
affordances of digital networks; for example, particular issues or policies, but rather form based
the Web site Petition Online. In e-movements, on similarity of core values, and work together
886 Networks, Political

across multiple policy venues. Network analysis of pre-existing ties. While social media sites pro-
can be used to identify clusters of actors who work vide new ways to interact, they do not necessarily
together based on shared values, and to character- replace existing face-to-face networks.
ize different policy communities based on coalition The Internet does, however, make building
formation across several domains. social linkages faster and easier. It also helps peo-
The institutionalist approach assumes that ple to build connections to others with similar
policy actors behave rationally, and that they interests because it expands the pool of available
seek network relationships in order to improve connections. Furthermore, information is more
individual outcomes via collective action. Actors readily available online, and the cost of distribut-
work together and coordinate policies so that they ing ideas and building connections is significantly
can achieve results that are mutually beneficial for reduced. This lowers the expense of collective
network participants. From an institutional per- action, and makes it possible to build transna-
spective, policy network analysis can be used to tional networks and conduct political action on
identify the types of relationships that enhance a global scale. People can be mobilized to take
outcomes for both individual policy actors and action through mailing lists, Web sites, and social
the network as a whole. The social learning model media campaigns; however, ties formed to social
posits that policy approaches diffuse through movements through the Internet alone tend to be
social networks via a process of social learning. weaker than those built through existing relation-
Individuals and organizations learn about the ships. In sum, social media provide a range of
suite of policy options available to them through new tools to support political participation, but
their connections. Patterns of policy adoption face-to-face networks still play an important role
can be understood by examining the connections in mediating political action.
between policy actors.
Case Study: Climate Change
Social Media and Political Networks Denial Networks
The advent of computer-mediated communica- In recent years, global climate change has been
tion has led to a new research agenda in social net- transformed from an object of scientific inquiry
work analysis that seeks to understand how Inter- into the most visible global environmental issue.
net technologies influence social interaction. The While the exact consequences are difficult to pre-
Internet is a constantly evolving space, and thus dict, authors, scientists, and environmentalists
research on social media and political networks is warn of droughts, sea-level rise, and increased
also evolving. E-mail, listservs, blogs, and social extreme weather. There is a high degree of scien-
media sites such as Facebook and Twitter provide tific consensus that climate change is occurring,
platforms for forging new network connections, and that it is primarily a consequence of human
sharing ideas and resources, and shaping political production of greenhouse gases. Yet, at the same
processes. On the whole, research on networks time as the scientific community has been calling
and social media tends to support the idea that for action on climate change, a well-organized cli-
Internet technologies complement, rather than mate change denial movement has steadily devel-
replace, face-to-face networks. For example, in a oped, and has been working to derail efforts to
study of 61 million U.S. Facebook users, R. Bond combat global warming. The U.S. climate change
et al. found that political messaging through denial movement has been widely studied, and
social media significantly influences political provides an interesting demonstration of the dif-
self-expression, information seeking, and voting ferent ways that political networks act to shape
behavior, but that messages are predominantly public opinion and policies. The climate change
transmitted to people who already have existing denial movement was born in the 1990s, in reac-
face-to-face relationships. Similarly, Y. Takhteyev tion to rising global environmental awareness.
et al. found that geography and language are both The movement was initially comprised of con-
significant predictors of Twitter ties, and that a servative think tanks, foundations, politicians,
substantial share of Twitter connections are found and members of the fossil fuel industry, and was
within the same city, highlighting the significance driven by a shared concern about the perceived
Networks, Political 887

impact of climate change legislation on neolib- learning perspective, whereby the innovations
eral economic policies. At the time of its forma- of the U.S. denial movement were spread via
tion, this network could be viewed as an advo- networks to other nations. Though the climate
cacy coalition, a network of disparate actors who denial movement is one among many influences
banded together around shared neoliberal values on climate change action, these strategies have
in order to gain influence over political processes. had a lasting impact on global policymaking. A
After its formation, the movement quickly well-organized movement that harnessed social
sought to gain legitimacy through “scientific networks in order to influence policy, it managed
expertise.” A number of contrarian scientists to undermine scientific evidence demonstrat-
vocally challenged mainstream climate science in ing the seriousness of climate change, and as a
order to sow seeds of doubt about the reality and consequence helped to derail efforts to develop
seriousness of global climate change. Despite the meaningful climate policy. A. M. McCright and
fact that these scientists were not climatologists, R. E. Dunlap documented some of the dynam-
and their work was at odds with the overwhelm- ics of this countermovement, including its use of
ing majority of climate scientists, the media gave both mainstream and digital media.
denialist scientists press attention in order to
present an image of journalistic balance on the Analyzing Political Networks
issue. Thus, the climate change denial movement A wide array of computer software is available for
had effectively formed an epistemic community analyzing political network data. Two of the most
of “experts” that was capable of shaping media popular programs for calculating network mea-
messages on climate change, and in turn influ- sures are UCINET, as introduced by S. P. Borgatti et
enced perceptions of whether creating climate al.; and PAJEK. For visualizing political networks,
policy was a necessary step. two useful programs are Netdraw (which is pack-
In the United States, the issue of climate change aged with UCINET) and Visone. Two programs
quickly began to polarize along party lines, and specifically designed to analyze social network data
the denial movement gained momentum when the obtained from social network sites are Netminer
Republicans took control of Congress in 1994. and NodeXL. These programs (in some instances
Republican politicians formed closer links with with related apps) will allow one to extract and
climate change deniers, and some began to actively analyze Facebook and Twitter data, and calculate a
promote the ideas of the contrarian scientists. This variety of social network analytic measures. There
shift is consistent with the organizational state are also various programs for extracting and ana-
perspective, whereby politicians and nongovern- lyzing data from other types of Web sites. In order
mental actors work together to promote particular to tease out the difference between persuasion and
interests and shape governmental policies. Addi- social selection effects, one needs to have longitu-
tionally, this polarization filtered down to public dinal panel data on political actors, their relations,
opinion about climate change, and attitudes about and related variables of interest. If one has two
climate change began to form cleavages along or more waves of data (preferably less than two),
party lines within the broader U.S. population. then one approach is to utilize SIENA modeling,
The U.S. climate denial movement spread its which has been developed by Snijders et al. In the
influence through a number of tactics. It orga- coming years, social network analysis of political
nized conferences, talks, and “front groups” networks in general, and social media related to
(grassroots initiatives that were built and funded politics more specifically, will become increasingly
by corporations and conservative think tanks) to prominent in the social sciences.
develop climate denial networks and disseminate
uncertainty. The movement supplemented these David B. Tindall
face-to-face interactions with a growing online Georgia Piggot
presence, and began actively exporting its strate- University of British Columbia
gies to its networks in other countries in order
to prevent global political action on climate See Also: Activists and Activism, Digital; Advocacy
change. This approach is consistent with a social Groups, Political Branding of; Homophily; Influence
888 News Media

on Elections; Social Networking Web Sites; Strong-Tie soldiers. The development, however, of capitalist
Connections Versus Weak-Tie Connections; Topology socioeconomic relations from the 16th century
of Social Networks. onward would bring a true revolution in the field
of communication. Along with the removal of old
Further Readings modes of production and the boom of capitalistic
Bond, R. M., et al. “A 61-Million-Person Experiment production, the press was invented.
in Social Influence and Political Mobilization.” In the mercantilism era, national economies
Nature, v.489/7415 (2012). were developed within the modern state. The
Borgatti, S. P., M. G. Everett, and J. Johnson. nation is formed as a modern state, with bureau-
Analyzing Social Networks. Thousand Oaks, CA: cratic organization and increasing financial needs.
Sage, 2013. The new capitalist relations that prevail in the
Farrell, H. “The Consequences of the Internet for economy require the emergence of new media for
Politics.” Annual Review of Political Science, communication, which broaden the social base of
v.15/1 (2012). political participation and deliberation. Within
Lubell, M., J. Scholz, R. Berardo, and G. Robins. the political and social context that shaped the
“Testing Policy Theory With Statistical Models of mercantile phase of capitalism, the press was
Networks.” Policy Studies Journal, v.40/3 (2012). developed into a true revolutionary power. The
McCright, A. M. and R. E. Dunlap. “The Politicization actors of this new mode of production were the
of Climate Change and Polarization in the American rising bourgeoisie. The request for participation
Public’s View of Global Warming, 2001–2010.” in the regulation of public life required complete
Sociological Quarterly, v.52 (Spring 2011). information and knowledge of all the current
Takhteyev, Y., A. Gruzd, and B. Wellman. issues. The press was developed in order to fulfill
“Geography of Twitter Networks.” Social the needs of the new social class: public policy
Networks, v.34/1 (2012). debate and criticism, financial reporting, and dis-
semination of ideas and beliefs that reinforced a
new urban way of life, thinking, and behavior.
Habermas follows Bücher in identifying three
phases in the historical development of the press.
News Media In the first phase, the newspaper business is orga-
nized as small handloom units. The interest of the
News media hold a mediating role between the publisher for this business is purely commercial,
institutions of society and the public. They include and the activity of the organization consists of
print media (newspapers and magazines), broad- managing news circulation and printing. In this
casting media (radio and television), and online phase, the press has no political function. At the
media. The emergence of news media in their early later stage, news writing acquires a competitor,
form coincides with the emergence of a range of literary journalism, converting the newspapers
institutional developments that are linked with from publishing news institutions to institutions
the early stages of modernity. This coincidence and leaders of public opinion.
was the result of the institutional transforma- During this second phase, the structural trans-
tions that began to prevail in Europe in the late formation of the press is witnessed: the profit-ori-
Middle Ages and early modernity. These transfor- ented function of the press is minimized, and its
mations became prominent in the fields of eco- role as watchdog of public political institutions
nomic, political, and symbolic power. In precapi- begins. The central role in the political function
talist societies, communication was characterized of a newspaper is the lead article of the newspa-
by the dominance of oral speech and the lack of per. Publishers financially support the press, and
popular print media. The use of the written word are not that interested about the commercial per-
was restricted to privileged classes and dominant formance of their business. Without the agony of
social classes. Those days, the carriers of news generating profit, the press can become a criti-
from the outside world were the moving part of cal instrument of the political thinking and act-
the population: merchants, monks, pilgrims, and ing public. The press plays a crucial role not only
News Media 889

in informing the public, but also in shaping and growing popularity of social media. The Inter-
mobilizing public opinion. net is changing the media landscape of the 21st
Following the ideal type of public sphere of century. The transition from the era of print and
Jurgen Habermas, Brian McNair summarizes the broadcasting media to the emergence of the new
specific functions that news media are expected online platforms has structurally changed the flow
to perform in the media in democratic societ- of information, introducing a nonlinear model of
ies. The media, therefore, must: inform the pub- communication that is multidirectional. A distinc-
lic about everything that happens around them tion that can help show the way that the Internet
(surveillance or monitoring function); provide is incorporating the qualities of traditional media
knowledge on the importance and significance and at the same time innovating is to distinguish
of events; provide a framework for public pol- between conversational and group media. Con-
icy debate between citizens, facilitating the for- versational media, such as the telephone, allow
mation of public opinion within which public horizontal communication (one-on-one). On the
opinion is formed; expose publicly the party other hand, group media, such as the television
and political institutions (control function); and and the press, allow vertical communication from
act as channels for the expression of different a sender to a specific cluster (one-to-many).
viewpoints. The Internet is good at both: it allows commu-
Media organizations are experiencing vast nication toward all directions, supporting direct
transformations that drastically and rapidly and interpersonal communication (as a conversa-
change their role and functions because of the tional medium), as well as mass communication

A man wears a gas mask to film a protest in Taksim Square, Turkey, using a television camera during the first week of protests in June
2013. During the Arab Spring protests that began in 2011, citizen journalists were often the only ones who could avoid government
censorship of traditional media or access remote places; their work was sometimes the only available journalism about certain events.
890 News Media

(as a group medium). It becomes the canvas on linear, asymmetric communication model into
which all media converge, and constructs a net- an interactive, nonlinear, participatory model. In
work with complex dynamics. other words, the Internet allows the opening of a
Web 2.0 has become the buzzword describing a dialogue between the producers and consumers of
plethora of social media available on the Internet, news. News is no longer static, but open to trans-
including blogs, photos, file-sharing systems, and formation. In this way, journalists can enrich their
social-networking sites. Web 2.0, with its social produced news content with the views, thoughts,
platforms, introduces its users to the possibility and creative expressions of their audience. For
to interact or cooperate, offering them the choice the consumer of news, the digital revolution cre-
to become producers and transcend their passive ates an abundance of options, but can also lead
role as audience of content that was created for to fragmentation of attention. Existing forms of
them. Digital social platforms change the way that media are challenged by new online media plat-
people connect, communicate, act, and interact. forms that offer added values: personalization,
They form social clusters on various levels (local, interactivity, and feedback.
national, and international) as well as around These innovations are not only changing the
common interests or problems, media, and politi- structural nature of media consumption, but also
cal agenda. signal a new era in which consumers can now act
as coproducers and co-distributors of news con-
Citizen Journalism tent. At the other end of the news chain, media
These new forms of social media and networks organizations require larger volumes of news
enable the active involvement of the public in the content than can be produced by professional
news process, causing cracks in the (until recently journalists. To saturate the demands of 24/7
strictly defined) dichotomy between the pro- online media platforms, publishers are becom-
ducer and the consumer of news. The public can ing increasingly dependent on external suppliers
significantly contribute to the agenda of main- for news material from their public. At the same
stream media, or even set an alternative agenda time, they search for new communications appli-
on alternative media platforms. The lifecycle of cations in order to make their news content more
news becomes even more complex and difficult relevant to the needs of the public.
to define. News that appears online can be easily Web 2.0 technologies provide the public with
ignored, buried in the vast new attention economy. popular and accessible tools that enable them to
The mainstream media remain powerful in the publish text, pictures, audio, and video. Tradi-
selection and determination of the public agenda. tional media, the press, radio, and television are
However, the emergence of new participatory not participatory platforms. However, traditional
forms of news production and dissemination media are developing new interactive features and
puts into doubt the certainty that the setting of experimenting with participatory forms of con-
the media agenda is only one way, and is directed tent production in order to involve and engage
from the mass media to the public. Influences on the public in the news process. Strong media orga-
the determination of the daily agenda are three- nizations compete in order to dominate the new
fold: new professional journalistic standards emerging field of new media and social networks.
and practices, a more interdependent intermedia The purchase of Flickr (a photo-sharing Web site)
agenda-setting process, and the growing news by Yahoo! in 2005, the acquisition of Blogger.com
content produced by citizens. by Google in 2003 and YouTube in 2006, and the
The field of information and communication is acquisition of Newsvine by MSNBC in 2007 are a
evolving into a more participatory media ecosys- few examples.
tem that transforms the news into a social expe- In the example of CNN, the media organiza-
rience. The news becomes a participatory activ- tion developed the collaborative journalistic plat-
ity in which people contribute their stories and form iReport, where people freely publish their
experiences and post their reactions to events. content. In cases of censorship of traditional
The Internet is changing the relationship between media, especially in the protests associated with
journalists and their audiences from a one-way, Arab Spring, citizen journalism emerged as the
Nongovernmental Organizations 891

only available news. However, the movement of NGOs represent. Considering the complexity
citizen journalism does not signal the end of the and immensity of the task confronting NGOs,
determination of the news agenda by mainstream social media has been a boon to the activities of
media organizations. They still set the tone of the these organizations. Social media has impacted
selection and hierarchy of the online news agenda. every facet of the work that NGOs do, including
The most significant change is that the dominant advocacy, community outreach, and fundraising.
traditional media compete to attract the attention Furthermore, social media has opened avenues
of the public with a plethora of online news and and opportunities for NGOs that were not pre-
entertainment content. This indicates a redistri- viously available. Still, there are challenges that
bution of power in the modern media ecosystem, continue to confront NGOs and their effective
from professional journalist to the citizen. use of social media.
The term NGO refers to a broad variety of
Dimitra Dimitrakopoulou organizations operating both at local and inter-
Aristotle University of Thessaloniki national levels. The term emerged out of the UN
in 1945 from a need to define the nongovernmen-
See Also: Citizen Journalism; Reporters Committee tal agents inducted into the UN system through
for Freedom of the Press; Reporters Without Borders; consultative status. However, over time, there has
User-Generated Content; World Press Freedom Index. emerged an agreement that a definition of NGOs
must include at least two elements: method of
Further Readings organizing and outcome orientation. In the meth-
Habermas, Jurgen. The Structural Transformation ods of organizing, NGOs are characterized as
of the Public Sphere: An Inquiry Into the Category being a nonprofit and voluntary citizens group. As
of Bourgeois Society. Cambridge, MA: MIT to an outcome orientation, NGOs are expected to
Press, 1991. be working toward a nonviolent social mission,
McNair, Brian. The Sociology of Journalism. London: such as eradication of poverty or provision of
Hodder Arnold, 1998. health care. In addition, to be recognized by inter-
Thompson, John B. The Media and Modernity: national governing bodies, NGOs are expected to
A Social Theory of the Media. Palo Alto, CA: have a formalized structure and accountability to
Stanford University Press, 1995. their stakeholders.

Role in Civil Society and Politics


Scholars conceptualize society as constituted
by three sectors: governments, businesses, and
Nongovernmental the voluntary sector. NGOs are categorized as
belonging to the voluntary sector where they
Organizations have played an increasingly significant role over
the last 20 years. While initially, NGOs were seen
Nongovernmental organizations (NGOs) have as filling gaps in service and infrastructure left by
been pivotal participants in international politics government and businesses, in recent years, the
and governance for over 60 years. While organi- political significance of NGO activities has been
zations such as Rotary International have existed receiving increasing attention. Scholars suggest
for far longer, with the creation of the United that NGOs strengthen civil society by facilitating
Nations (UN), the role and position of NGOs participatory and democratic solutions to social
was formalized at a global level. Today, the sig- issues. The role of NGOs in civil society has also
nificance of NGOs to international and national gained prominence as international organiza-
politics is such that they are routinely consulted tions such as the UN and European Union (EU)
by governments and intergovernmental organi- have established formal avenues for consulta-
zations. However, the strength of NGOs lies in tions with NGOs on policy issues. For example,
the range of social issues they espouse and the for more than 60 years, the UN has been orga-
vast numbers of people whose interests these nizing an annual NGO meeting at its New York
892 Nongovernmental Organizations

headquarters. The annual conference is open to behalf of disadvantaged populations. This has
the 3,500 NGOs that have been granted consul- often put NGO workers and activists in harm’s
tative status with the UN. As for the EU, after way. In addition, mass media has not traditionally
decades of holding consultative status, in 2003 been open to providing sustained or meaningful
all 400 NGOs holding consultative status were coverage of causes espoused by NGOs, or of the
automatically granted participatory status in the work of NGOs themselves.
European Council.
NGOs play a significant role in international Social Media and NGOs
as well as national politics by providing an orga- The rising social and political significance of
nized and sustained effort around various social social media has not gone unnoticed by the NGO
events and issues. Some well-known instances of community and its stakeholders. Social media
such activity would be the International Red Cross have been said to offer vast opportunities to
Society and human rights, Greenpeace and envi- NGOs by facilitating communication and coor-
ronmental protection, and Transparency Interna- dination activities. Social media promise to revo-
tional and systematic corruption. NGOs also have lutionize the way that NGOs fundraise, connect
traditionally been the vehicle through which indi- with stakeholders, disseminate information, and
vidual citizens can have their voices heard on the network with other NGOs. While some of this
national and international stage. While it would potential has been realized, much ground remains
be difficult for an individual or even a group to to be covered, and there are challenges that will
engage in advocacy on the national or interna- need to be overcome.
tional stage, being part of an NGO makes this
possible. In the case of advocating for women’s Outreach and Fundraising
rights to be put on the global agenda, NGOs and One of the most prominent areas of social media
their rigorous efforts at the UN are given credit impact for NGOs is in the area of outreach.
for the organizing of several international confer- NGOs are able to use social media tools such as
ences on the issue. Web sites, blogs, microblogs, and videos to share
information, tell stories, and encourage action.
Challenges Social media also allows organizations to intro-
NGOs have faced various challenges over the duce, talk about, and discuss their initiatives. Dig-
years in their efforts to fulfill their social mis- ital storytelling has been a particularly successful
sions. The dearth of financial resources is a major strategy for outreach, as evidenced in the case of
hurdle that must be overcome. Often, NGOs Hoshyar. Hoshyar, a Pakistani NGO advocating
depend on memberships or individual dona- women’s education in the Swat Valley, teamed
tions to conduct their work. However, the major up with Sliderocket to create a video. It went
source of funding for most NGOs continues to viral, and garnered global recognition for this
be donor-based funding. Donor funding usually tiny NGO operating in a geographically secluded
comes with constraints built in by donor agen- area. Stakeholders have the increased benefit of
cies. Thus, fundraising and satisfying donors are interactivity, of being able to communicate with
some of the major activities for an NGO. Most the NGO, and other stakeholders.
NGOs continue to work under substantial finan- Social Media are revolutionizing the way that
cial constraints that make advocacy, research, NGOs engage in fundraising. While online dona-
and outreach a challenge. tions have long been a Web site standard for
NGOs from developing countries have also NGOs, the advent of social media has introduced
had to contend with infrastructural limitations. newer and broader avenues to solicit donations.
For these NGOs, gaining access to the basics of The American Cancer Society has been using Sec-
communication technology, such as phone and ond Life to recruit virtual volunteers and raise
Internet access, can be a luxury. Finally, NGOs money. Other NGOs have used Twitter and Face-
face political and social pressures from govern- book to highlight issues and solicit donations. The
ments, business, and groups that are negatively organization Charity: water was able to raise over
affected by the NGO’s advocacy and efforts on $200,000 using Twitter. While funding via social
Nongovernmental Organizations 893

Volunteers lighting candles near the Brandenburg Gate in Berlin, Germany, during the Earth Hour Global event in 2012, during which
lights were switched off all over the world in what was billed as “the world’s largest display of environmental action.” The event was an
initiative in partnership with the large nongovernmental organization World Wide Fund for Nature (WWF).

networks has been elusive, it still offers NGOs pouring in. In addition, NGOs are successfully
a platform to engage their stakeholders in such using Twitter as a way to keep their stakehold-
campaigns. Recently, a plethora of crowdfund- ers engaged and motivated. NGO causes are no
ing Web sites have sprung up on the social media longer limited by national borders; they can now
scene. These organizations offer NGOs a way to draw on an international audience, and involve
extend the already successful strategy of solicit- them on a daily basis. Both Greenpeace and the
ing microdonations. Furthermore, mobile phone World Wide Fund for Nature (WWF) have over a
donations and text2giving microdonations have million “likes” on Facebook alone, and actively
become popular in developing countries. use this platform to promote and facilitate their
“members.”
Participation Facilitation and It is not the NGOs alone that facilitate partici-
Information Dissemination pation for their stakeholders. A new kind of social
One of the major barriers to NGO participation network is emerging on the Internet that serves
is time and travel investment. With the Internet, to connect individuals with NGOs. In Canada,
particularly social media, this barrier has been Charityvillage.com provides an NGO database,
considerably lowered. Interested individuals can Web pages for NGO profiles, and listings for vol-
“like” a Facebook page and NGO updates start unteers and donations.
894 Nongovernmental Organizations

NGOs have been able to use the Internet as an Social Media Challenges
effective information dissemination tool over the While social media have brought much opportu-
last decade. However, social media add an addi- nity to NGOs, they have also brought new chal-
tional element of immediacy, interactivity, and the lenges. One of the most significant is that social
possibility of cross-linkages. Stakeholders no lon- networks allow populations to be self-organized.
ger need to visit an NGO’s Web site and search for Movements in Pakistan, Iran, and the Middle East
the latest data, action items, or updates. NGOs were largely initiated and sustained by individuals
can showcase current research, facts, and advo- using social media. The NGOs in these countries
cacy campaigns through microblogging and pod- were largely bypassed by the masses in favor of
casts, as well as social bookmarking. This kind spontaneous organizing initiated and maintained
of selective sharing and highlighting of informa- by a core group of individuals. This phenomenon
tion also has the opportunity to go viral because is replicated, albeit on a less dramatic scale, across
social network users frequently repost and share the global public sphere. People are using social
updates from their news feeds. network groups and niche networks to connect,
organize, and interact with other individuals. This
Community Building and Management need not spell doom for NGOs; rather, it can be
Social media also offer NGOs effective and seen as a need to refine strategy and adapt to the
expansive community management opportuni- new role that social media has created for them.
ties. Stakeholders often use NGOs’ social media The digital divide continues to be an issue for
posts as starting points to engage with NGO rep- NGOs. While in the United States, 89 percent of
resentatives and other community members, thus nonprofits are using social media, the number is
building a sense of belonging and camaraderie. much lower for international NGOs. These orga-
Individuals can also repost text, photos, and vid- nizations, particularly NGOs in those areas of
eos within the social network, to other networks, the world requiring the most attention, continue
or on their own blogs to show their affiliation and to find challenges in affording the tools necessary
support of an NGO. Online social networks are for participation in the social media space. It is not
also used to facilitate offline connections among only NGOs that are affected; stakeholders are also
stakeholders, so that social media can be used to affected. Social media adoption rates are quite high
connect people in the same geographical region. for stakeholders belonging to developed countries
Social media not only allow NGOs to connect and for upper income populations. However, key
with their audiences, but also with other NGOs. NGO populations continue to remain off the
The primary sources for NGO–NGO outreach Internet and social networks. This will continue
are emerging niche networks like jumo.com and the conversation in the NGO community regard-
wiser.org that allow NGOs to connect with other ing the north–south divide, as well as proportional
NGOs. Donor agencies also maintain substantial representation of disadvantaged communities in
and active online presences that provide another the global public sphere.
avenue for NGO representatives to connect and
relate to each other. Saman Talib
Furthermore, social media in all its forms pro- Humber College
vide previously isolated NGOs with the opportu-
nity to connect with other NGOs in their field of See Also: Activists and Activism, Digital; Campaigns,
activity. This is particularly true of NGOs operat- Digital; Campaigns, Organizing; Campaigns, Virtual;
ing in countries with oppressive regimes and/or Countries Banning Social Media for Political Reasons;
oppressive communication policies. In addition, Crowdfunding; Crowdsourcing; Evolution of Social
the viral features of social media have been used Media; Nonprofit Organizations.
quite successfully by NGO activists to spread
information and activate support. This is par- Further Readings
ticularly crucial in times when an NGO’s repre- Alger, C. “Evolving Roles of NGOs in Member State
sentatives and stakeholders might be in jeopardy Decision-Making in the UN System.” Journal of
themselves. Human Rights, v.2/3 (2003).
Nonprofit Organizations 895

Ali, A. H. “The Power of Social Media in Developing public outreach. Although NPOs currently lag
Nations: New Tools for Closing the Global Digital behind others in social media adoption, they have
Divide and Beyond.” Harvard Human Rights recognized the widespread use of social media
Journal, v.24 (2011). and seek to utilize this medium. This entry will
Allison, J. E. Technology, Development, and explain the perceived benefits and drawback of
Democracy. Albany: State University of New York NPOs’ use of social media, including discussion
Press, 2002. of cost effectiveness, image transparency, infor-
Bennett, W. L. “Communicating Global Activism: mation dissemination, reaching stakeholders, and
Strengths and Vulnerabilities of Networked building relationships.
Politics.” Information, Communication, & Society,
v.6/2 (2003). Cost Effectiveness
Keck, M. E. and K. Sikkink. Activists Beyond Like other organizations, NPOs find the inexpen-
Borders: Advocacy Networks in International sive nature of social media appealing. However,
Politics. Ithaca, NY: Cornell University Press, implementation of social media has proven not as
1998. cheap as initially thought. Staff limitations pres-
Jayakanthan, R. “Community Engagement ent one obstacle prohibiting adoption of social
Through Social Media.” In Fifth International media by NPOs. Large-scale social media efforts
AAAI Conference on Weblogs and Social Media, require a staff and constant monitoring, updat-
June 2011. ing, and responding. It is necessary to designate
Segerberg, A. and W. L. Bennett. “Social Media individuals with the responsibility of performing
and the Organization of Collective Action: Using these tasks and maintaining overall standards for
Twitter to Explore the Ecologies of Two Climate content addition. NPOs experience more difficul-
Change Protests.” Communication Review, v.14/3 ties when attempting to use multiple platforms
(2011). because they tend to have smaller staffs, budgets,
Seo, H., J. Y. Kim, and S.-U. Yang. “Global Activism and resources. Additionally, those tasked with
and New Media: A Study of Transnational NGOs implementation need some guidance and support
Online.” Public Relations Review, v.35/2 (2009). as they adopt social media.

Image Transparency
Social media can be an effective way for NPOs to
maintain an open and transparent online image.
Nonprofit Many NPOs appear to understand the impor-
tance of disclosure as they tend to be open and
Organizations transparent in their use of Facebook. In fact, the
use of social media allows NPOs to directly com-
A nonprofit organization (NPO) is an organi- municate with the media while pushing the mes-
zation that uses revenue for social aid without sage beyond traditional gatekeepers. The ability
a profit motive. NPOs operate to benefit the for quick information scanning afforded by social
general public or specific groups. Examples of media allows NPOs and traditional media out-
NPOs include charitable organizations, advocacy lets to monitor one another. As such, NPOs can
groups, religious organizations, professional/ communicate directly with the media while also
trade associations, political organizations, and allowing the media to monitor the organization
several others. The goal of NPOs is to provide and contact it for stories.
support to a key public through campaigns that The ability to maintain an authentic interactive
stimulate public interest, recruit and maintain presence is a valuable asset to NPOs because it can
volunteers, and raise money. lead to an enhanced public image. NPOs appear
In order to achieve these goals, NPOs are con- to put a lot of effort into managing their images
tinually seeking outreach opportunities. Recently, and making a good impression in social media.
NPOs have shown interest in social media out- However, when NPOs lack the resources to effec-
lets such as Facebook, Twitter, and YouTube for tively maintain their social media presence, they
896 Nonprofit Organizations

also fail to keep a consistent identification, which efforts. Engaging stakeholders can be useful to
can be detrimental. NPOs; Facebook and Twitter have proven to be
beneficial methods for NPOs to gain public feed-
Information Dissemination back. For example, Twitter has provided pub-
NPOs have utilized social media to disseminate lic conversation and conflict resolution. Social
information to their key publics, the broader media outlets also have great potential for offer-
community, and the media. NPOs appear to ing forms of two-way communication, such as
understand the benefits of using social media polling opportunities, extending invitations for
to spread news, educate the public, get issues offline interaction, participating in forums, and
on the public agenda, distribute press releases, signing e-petitions.
and ultimately add to the information distrib- Although NPOs are taking steps to use the
uted through traditional media. Social media social media environment to create dialogue with
outlets have also been used to distribute polls stakeholders and to build relationships, they
and e-petitions, promote events, and otherwise have not yet taken full advantage of their abilities
notify potential donors and volunteers. to aid in relationship cultivation. Additionally,
The information that NPOs share through NPOs are currently failing to capitalize on the
social media should be relevant, timely, and of interactive and multimedia capabilities of social
mutual concern to the organization and its stake- media. Volunteers can play a key role in the posi-
holders. As such, Twitter is quickly becoming a tive promotion of an organization by sharing
popular outlet for these organizations. Unfor- multimedia content. However, this requires that
tunately, NPOs are not yet effective at using all NPOs put effort toward the development of rela-
types of social media for the distribution of orga- tionships by involving volunteers. Furthermore,
nizational information. In fact, less than a quarter NPOs have failed to capitalize on the full poten-
of NPOs actively publicize Facebook and Twitter tial of social media outlets because they fail to
pages on their Web sites. provide methods for supporters to become more
involved.
Stakeholder Relationships
Reaching stakeholders is a necessary task for Social Media Implementation Problems
NPOs, and is a primary reason why NPOs use As noted above, NPOs have several obstacles to
social media outlets. This is especially important overcome. One of the biggest relates to imple-
to NPOs because social media can be poten- mentation and leadership. Staff limitations are a
tially used to communicate with target audi- hardship faced by NPOs. Older volunteers have
ences, despite a lack of staffing and resources. expressed reservations about using social media,
Social media provide NPOs with another medium and the task of implementing social media is
through which they can build relationships with often designated to an existing employee or a
key publics on a topic/issue of mutual interest. young intern/volunteer because of their techno-
Social media also allow organizations to deepen logical knowledge.
existing relationships with stakeholders through Adoption of social media has also been hin-
two-way communication, which can cultivate dered by the learning curves of those tasked
long-term relationships. with implementation. Employees and volun-
NPOs are unique in their reliance on donors teers reportedly lack guidance from superiors
and volunteers. As such, relationship build- and face internal barriers of control. The use
ing among an organization and these groups is of social media is more likely to occur in orga-
an important task that can now be facilitated nizations that offer facilitating conditions and
through social media. Social media, especially resources, usually in the form of a public rela-
Facebook and Twitter, are now considered a good tions department.
medium to recognize volunteers and fundraise. NPOs have also failed to directly engage with
For example, Facebook provides an online space their publics through social media. There is a need
where volunteers can share the tasks associated to proactively participate in the social media con-
with managing and promoting an organization’s text. However, NPOs do little to foster a two-way
Nonprofit Organizations 897

flow of communication, and tend to use social image, post frequent updates, and provide a wide
media in a traditional one-way flow. For example, array of multimedia content.
NPOs tend to use Twitter to convey one-way mes-
sages, rather than to facilitate dialogue or build Weiwu Zhang
relationships. This means that NPOs are not uti- Texas Tech University
lizing opportunities to engage in conversations, Sherice Gearhart
respond to comments, or answer questions, even University of Nebraska at Omaha
though context allows for dialogue and relation-
ship building. The failure of NPOs to utilize the See Also: Activists and Activism, Digital; Campaign
interactive potential of social media results in an Strategy; Campaigns, Digital; Campaigns, Organizing;
inability to use this context to generate meaning- Campaigns, Virtual; Chartered Institute of Public
ful communication with key publics. Relations Social Media Guidelines; Crowdfunding;
Crowdsourcing; Nongovernmental Organizations.
Planning and Recommendations
NPOs desperately need enhanced guidance, time, Further Readings
and resources to utilize the full potential of social Bortree, Denise S. and Trent Seltzer. “Dialogic
media. The impact of using social media is greater Strategies and Outcomes: An Analysis of
when it is carefully planned, goals are predeter- Environmental Advocacy Groups’ Facebook
mined, and several outlets are utilized as part of Profiles.” Public Relations Review, v.35 (2009).
a multiplatform strategy. Campaign planning is Briones, Rowena L., Beth Kuch, Brooked F. Liu,
crucial for NPOs to achieve predetermined goals. and Yan Jin. “Keeping Up With the Digital Age:
Planning should consider strategies to support How the American Red Cross Uses Social Media
the development of long-term relationships. to Build Relationships.” Public Relations Review,
A multiplatform strategy allows NPOs to inter- v.37/1 (2011).
relate information across online spaces. A multi- Henderson, Alison and Rachel Bowley. “Authentic
platform strategy can be as simple as using Face- Dialogue? The Role of ‘Friendship’ in a Social
book and Twitter alongside a traditional Web site. Media Recruitment Campaign.” Journal of
This allows organizations to utilize the unique Communication Management, v.14/3 (2010).
capabilities offered by the different social media Hovey, Windy. L. “Examining the Role of Social
platforms available. For example, NPOs utilize Media in Organization–Volunteer Relationships.”
Facebook more than any other form of social Public Relations Journal, v.4/2 (2010).
media and have found it to be a good medium Meriläinen, Niina and Marita Vos. “Human Rights
to communicate a transparent image and generate Organizations and Online Agenda Setting.”
discussion. The short, compact nature of Twit- Corporate Communications: An International
ter has been found to help NPOs promote and Journal, v.16/4 (2011).
distribute new information to potential donors Park, H., S. Rodgers, and J. Stemmle. “Health
and volunteers. Additionally, there are benefits Organizations’ Use of Facebook for Health
of using YouTube and other media sharing sites. Advertising and Promotion.” Journal of Interactive
Using the informal environment of social media Advertising, v.12/1 (2011).
in conjunction with a more formal Web site is also Waters, Richard D. “The Use of Social Media by
beneficial for NPOs. Nonprofit Organizations: An Examination From
Finally, engaging with publics through these the Diffusion of Innovations Perspective.” In
online spaces is a necessary task of organiza- Handbook of Research on Social Interaction
tions that use social media. NPOs can effectively Technologies and Collaboration Software:
increase their engagement by providing updates, Concepts and Trends, T. Dumova and R. Fiordo,
directly interacting with publics, encouraging eds. Hershey, PA: IGI Publishing, 2010.
participation, and distributing new information, Waters, Richard. D. and Jia Y. Jamal. “Tweet,
especially multimedia content. This can be accom- Tweet, Tweet: A Content Analysis of Nonprofit
plished by making a concerted effort to respond Organizations’ Twitter Updates.” Public Relations
to public feedback, communicate a transparent Review, v.37/3 (2011).
898 Nonprofit Organizations

Waters, Richard D., Emily Burnett, Anna Lamm, and Are Using Facebook.” Public Relations Review,
Jessica Lucas. “Engaging Stakeholders Through v.35/2 (2009).
Social Networking: How Nonprofit Organizations
O
Obama for America MyBO included the “Neighbor to Neighbor” ini-
tiative, a program that allowed volunteers to use
iPhone Application their home computers to print out lists of names
and addresses of potential voters to contact in a
With less than 100 days remaining until the location of their choice. The Obama campaign
2012 presidential election, Obama for America also started using mobile devices in its fundrais-
released its mobile application (app) for the ing, creating “text-to-give” fundraising programs,
iPhone. The app marked the first time that a and using texting as a way to communicate with
presidential campaign created a program that supporters and with each other. At the end of the
accelerated, aggregated, and customized the flow election, MyBO and texting had grown into a
of resources and information between the differ- sophisticated hub that raised $30 million, held the
ent operations of a national political campaign information of 2 million profiles, and organized
for use on a mobile device. However, the inven- thousands of events and groups.
tion of the Obama for America iPhone app also
raised questions about the distribution of an app Organizing for America
that provided publicly available personal infor- Elements of the 2008 Obama presidential cam-
mation with minimal oversight. paign merged with the Democratic National Com-
The Obama mobile app turned mobile devices mittee to create Organizing for America (OFA),
into a powerful tool for political campaigns by cen- an initiative that used the Obama for America
tralizing canvassing and fundraising innovations infrastructure to encourage political activism
developed by the Obama campaign. For the 2008 in support of the Obama administration and
Democratic primaries and presidential campaign, the Democratic Party. On June 23, 2010, OFA
Obama for America launched My.BarackObama released its app for the iPhone. The OFA iPhone
.com (MyBO), the first national campaign social- mobile app was the first step in moving campaign
networking site. Built on the architecture and operations onto mobile practices. The OFA app
philosophy behind Facebook, MyBO allowed performed all the same functions of MyBO—it
supporters with computers and Internet service provided supporters with resources about issues
to connect with other supporters, call potential and events, ways to share information across
voters, organize into groups, plan events, fund social networks, and ways to donate—and added
raise, and access campaign and election resources. a function to call a constituent’s representative in

899
900 Obama for America iPhone Application

Congress to encourage congressional support for from public sources. The tactics and data being
the Obama administration. used by the campaign was the same kind of data
In advance of the 2010 midterm congressional and tactics used by marketing and advertising
elections, OFA released an update of its app to campaigns and by social media platforms like
include canvassing tools. The canvass app pro- Facebook and search engines like Google. How-
vided voter lists and interactive maps, informa- ever, privacy advocates expressed concern over
tion about the issues and candidates, and a way the unprecedented aggregation of political data
for supporters to report information about their and its use in the future: Anyone could access this
contacts—such as location, number of contacts information via the app and the question remains
made and their political orientation—to OFA unanswered, what will happen to the personal
field offices and OFA headquarters. In 2008, information collected by the campaign?
Obama for America field offices and volunteers Also available for Android devices, the Obama
performed the same canvassing tasks, but the for America mobile app proved an essential tool
impact was slowed by the time it took to pro- for political campaigns, but the future of the app
cess information from the field; the iPhone app has yet to be determined. Will the Obama for
eliminated the lag between recording information America mobile app and its information be shared
on clipboards and printed lists, and entering the with candidates across the Democratic Party? Or
information into the OFA system. will the mobile app be retired and replaced by a
newer version engineered by the team behind the
Obama for America next Democratic presidential candidate?
The outcome of the 2010 midterm congressional
elections led to gains for the Republican Party in Konrad Ng
Congress, but the OFA canvass app showed how a Smithsonian Institution
political campaign could load its operations onto
mobile devices; the challenge was to take the app See Also: Campaigns, Congressional 2010;
to scale. For a presidential re-election campaign, Campaigns, Presidential (2008); Campaigns, 2012;
major challenges included the reengagement of Information Aggregation; Mobile Apps.
supporters from the previous presidential elec-
tion, the recruitment of new supporters, tailoring Further Readings
information and services based on the location of Kindelan, Katie. “iPhone Revolutionizes Political
a supporter to streamline engagement, and pro- Canvassing.” Social Times (September 2, 2010).
viding reliable data for the campaign to assess the http://socialtimes.com/iphone-revolutionizes
state of the race and help make decisions in the -political-canvassing_b21873 (Accessed
distribution of resources. December 2012).
With the Obama for America mobile app, O’Dell, Jolie. “Obama’s iPad/iPhone App Hits the
supporters could access important information App Store Tonight.” Mashable (June 23, 2010).
related to their state as determined by their IP http://mashable.com/2010/06/24/obama-ipad
address or zip code. For example, supporters -iphone-app (Accessed December 2012).
could learn how to register to vote and receive Roeder, Ethan. “I Am Not Big Brother.” New York
information about voting guidelines, and they Times (December 5, 2010). http://www.nytimes
could receive a list of voters to contact in their .com/2012/12/06/opinion/i-am-not-big-brother
area, and armed with a script, they could contact .html (Accessed December 2012).
a voter and evaluate his or her intentions on elec- Scherer, Michael. “Inside the Secret World of
tion day. This data allowed the Obama for Amer- the Data Crunchers Who Helped Obama Win.”
ica campaign to determine follow-up actions in Time (November 7, 2012). http://swampland
their canvassing efforts, including the kind of .time.com/2012/11/07/inside-the-secret-world
engagement required to mobilize the voter and -of-quants-and-data-crunchers-who-helped-obama
determining the resources required in the area. -win (Accessed November 2012).
All the information gathered and provided by Shear, Michael D. “Obama Campaign Releases
the Obama for America mobile app was available iPhone App for Canvassing.” New York Times
Occupy Movement 901

(July 31, 2012). http://thecaucus.blogs.nytimes which encouraged its followers to take part in the
.com/2012/07/31/obama-campaign-releases-iphone protests. By October 5, the demonstration in New
-app-for-canvassing (Accessed December 2012). York City had grown to an estimated 15,000
protesters; by October 9, Occupy protests were
occurring in over 95 cities in 82 different coun-
tries; and by October 29, there were an estimated
2,300 Occupy protest zones worldwide.
Occupy Movement The Occupy movement prompted spinoff move-
ments such as Occupy Homes, aimed at helping
The Occupy movement is a protest movement homeowners who had lost their homes because of
focused on social and economic inequalities. perceived illegal banking practices; Occupy Your
Inspired by world events such as the Arab Spring, Block, linking Occupiers to local community orga-
the Spanish Indignants protests, and the subprime nizations; Occupy Colleges, charged with educat-
mortgage crisis in the United States, the Occupy ing the public about concerns related to mounting
movement brought international attention to the student debt; and Bank Transfer Day, which urged
economic and power structures that it claims dis- Americans to leave corporate banks in favor of
proportionately benefit a minority of the popula- community credit unions.
tion, are unstable, and undermine democracy. Touting slogans such as “We Are the 99 Per-
The Occupy movement began unceremoni- cent,” “Main Street, Not Wall Street,” “Foreclose
ously in mid-July 2011, when the Canadian- on Banks, Not People,” and “Occupy Every-
based group Adbusters Media Foundation posted thing,” and capitalizing on the extensive reach
a blog post proposing a peaceful occupation of of social media, the movement quickly gained
Wall Street to bring attention to growing wealth supporters and spawned movements across the
disparity and the influence of corporations on world. To date, the Occupy movement has seen
democracy. The hashtag #OccupyWallStreet protests on every continent except Antarctica,
was retweeted by a few Twitter users over the and is regarded as an important global move-
next two months, and the idea, while provoca- ment symbolizing the reinvention of politics in
tive, was slow to gain traction. The movement’s the 21st century.
message gained substantial momentum on social
and microblogging sites on September 16, 2011, 99 Percenters
the evening before the first organized Occupy The most pervasive mantra used by the move-
Wall Street protest. Within 24 hours, #Occupy ment was “We Are the 99 Percent.” This slogan,
WallStreet represented one in every 500 uses of proposed on a social-networking site, indirectly
a hashtag on Twitter, a phenomenon credited to referenced the concentration of wealth among
hyperlocal tweeters, individuals who cover the the top 1 percent of income earners. The move-
happenings of local communities in great detail. ment contended that the bottom 99 percent were
The first visible protest of the Occupy move- charged with paying for the financial mistakes of
ment was held at New York City’s Zuccotti Park, the top 1 percent, referencing the mortgage and
also referred to as Liberty Plaza, on September banking crises of the late 2000s, and frequently
17, 2011, coinciding with the 10th anniversary asserted that billions live in poverty, whereas the
of the reopening of trading on Wall Street fol- rich control a majority of the world’s assets. The
lowing the September 11, 2001, attacks. On the movement stressed that existing political sys-
evening of September 17, Adbusters posted “A tems are highly influenced by the 1 percent, and
Modest Call to Action” on the movement’s Web advocated for the creation of alternative politi-
site, occupywallst.org, calling on like-minded cal structures focused on direct action and direct
individuals to engage in a revolution of the mind, democracy.
as well as the body politic, through protests In the early stages of the movement, it was
organized to disrupt the system. The movement assumed that the 99 percenters were comprised
quickly grew, spurred on by other organizations of mostly students, the unemployed, and Demo-
such as the Internet hacking group Anonymous, crats. However, research conducted by a variety
902 Occupy Movement

of organizations and academic institutions chal- opinions and agendas voiced, causing the meet-
lenged these assumptions. The majority of the ing to lose effectiveness. In order to ensure that
protesters were white and male, with an average members of marginalized groups were heard,
age of 44.5 years old, most were college educated Occupy Wall Street developed a process called
and employed full time, and were not affiliated a progressive stack. This system allowed women
with a political party or were independent vot- and minorities to speak with facilitators before
ers. Over half of the respondents voted for Presi- members of the dominant group; this was criti-
dent Obama, with nearly three-quarters unhappy cized for violating the principle that everyone’s
with his performance, and nearly all respon- voice was equal, and for forcing equality. Con-
dents disapproving of how Congress handled its cerns also arose that the working groups’ focus
responsibilities. on separate causes resulted in the dilution of
the movement’s larger initiatives. As the move-
Leaderless Movement ment developed, members began to worry that it
The Occupy movement focused on embodying was becoming fractured, with its center of grav-
the ideals of participatory democracy and demon- ity devolving into smaller groups with different
strating an overriding commitment to democratic agendas and objectives.
processes. While critics of the movement focused
on the lack of a centralized leadership, protest- Goals of the Occupy Movement
ers instead saw this as echoing the larger ideals The Occupy movement was heavily criticized
of the movement, that no one person’s opinion or for its lack of a central focus or demand. Dur-
status was more important than that of another. ing the early stages of the movement, a myriad
Occupiers collectively negotiated all decisions via of alleged goals were put forth by demonstra-
meetings of the General Assembly, a horizontal, tors. The goals included a broad range of issues,
leaderless, autonomous, de facto decision-making including more and better jobs, bank reform,
body. During the General Assembly, people were and to initiate global changes against capitalism
informed of the findings of multiple working and austerity measures. Additional concerns that
groups, assemblies that performed much of the were frequently highlighted included the political
day-to-day work and organization for the move- influence of corporations, social and economic
ment, and any protester had the right to speak. A injustices, rising student and household debt,
consensus model of direct democracy, which fea- foreclosures, and limited prospects for graduat-
tured the use of hand signals and discussion facil- ing college students.
itators to increase participation, allowed every As the movement developed, more specific
protester to have an equal voice in the decision- and loftier demands were put forth. Touting
making process. the slogan, “Democracy Not Corporatocracy,”
Members of the movement embraced consen- these demands included a mandate that Presi-
sus decision-making methods that allowed the dent Obama convene a presidential commission
General Assembly to stay true to the mission of charged with ending the relationship between
promoting every member’s issues and represent- money and political representatives in Washing-
ing the will of the people. The egalitarian process ton, D.C. Other goals included a broad tight-
functioned both procedurally and substantively ening of banking-industry regulations, the ban-
to provide members a high level of satisfaction ning of high-frequency trading, and the arrest of
regarding decisions. Occupiers believed that everyone involved in the financial crash of 2008.
people would lead by example, step up when There was also a “99 Percent Declaration,”
needed, or step back when appropriate, and developed by a working group in New York City,
emphasized that the movement was not leader- which called for the creation and implementation
less, rather it was leaderful. of a system of public financing for political cam-
The commitment to consensus-based deci- paigns, a ban on all monetary and gift contribu-
sion making produced some challenges. The tions to politicians, and the repeal of the Citizens
ability for anyone to speak out during the Gen- United decision by the Supreme Court via a con-
eral Assembly often resulted in many divergent stitutional amendment.
Occupy Movement 903

In addition to multiple goals and demands, the of Internet technologies ideal because its growth
movement had shifting goals. In October 2011, spread virally, from person to person, and not
Adbusters began forwarding the agenda for a from a central authority. Occupy Wall Street
“Robin Hood Tax,” or a tax on the financial sec- (OWS) successfully and effectively utilized social
tors, and focused much of the movement’s attention media to translate online support into offline
on a global march in support of the tax. By Decem- presence and activism. Social media platforms
ber, many occupiers had begun to focus their atten- were instrumental in recruiting and linking sup-
tions beyond the protest camps, and instead on the porters, acquiring necessary resources for local
projects of the working groups, such as Occupy occupations, distributing information, creating
Homes, and focused more on the need for bank- and managing local encampments, and organiz-
ing reform, and less on engaging with mainstream ing protests and marches, storytelling, and across-
politics. What many thought would be heralded as group exchanges.
a new political and social dynamic, brought about While multiple social networking platforms
by a transformation of civic engagement and politi- were used across OWS, the most prominent was
cal participation, got seemingly lost in the plurality Facebook. Over 450,000 Facebook users joined
of voices of the movement. Critics asserted that the the more than 400 Occupy-related Facebook
overarching theme and message of the movement pages; these pages included Wall Street Occupa-
was not coherent, and suffered from a lack of uni- tion pages, national pages (efforts to symbolically
fying purpose and voice. Protesters countered by occupy national institutions), state or regional
declaring that the unifying concern, the corrupting pages, and local pages. On these pages, more than
effects of money on politics, was evident, and that 170,000 people posted or commented more than
issuing demands would have served to legitimize one million times (a number that does not include
the political and power structures the movement people who only “liked” or “shared” a post).
sought to challenge. Users tended to first be active on local pages, and
then matriculate to national pages; 40 of the 50
Commitment to Nonviolence Occupy pages with the largest number of active
Essential to the movement were nonviolent occu- users were local pages. The concentration of Face-
pations of major cities and towns across the book activism was most notable in college towns
world; throughout the demonstrations, nonvio- and state capitals, with online participation low-
lence remained a core strength of the movement. est in the south.
While a majority of the protesters abided by their Twitter was also instrumental in broadcast-
pledge of nonviolence, there were instances of vio- ing on-the-ground details of OWS events. Twit-
lent interactions between occupiers and the police ter traffic was heavily driven by significant events,
broadcast throughout the mainstream media. In such as when over 700 individuals were arrested
September, a video of peaceful female protest- on the Brooklyn Bridge, and on October 15,
ers sprayed with pepper spray by a police com- when hundreds of protests were held around the
mander gained significant coverage, and helped world. Usage of #OWS and #Occupywallstreet,
to bolster the movement’s focus on nonviolence. the two most common hashtags associated with
However, later reports by media outlets regard- the movement, spiked during events during which
ing the increase of violence among protesters, there were police–protester interactions. Because
including allegations of sexual assault and videos Twitter’s interface is specifically suited to high-
depicting physical clashes between demonstrators light current events, it was a valuable platform
and police, served to depict the movement in a through which dramatic, compelling, and news-
more aggressive light. worthy video footage could be instantaneously
tweeted to the world.
Occupy and Social Media Videos and images captured and shared
The Occupy movement mobilized thousands of through social media were important to the
people around the world, exclusively through movement because they were frequently picked
the Internet. The decentralized and ostensibly up by the mainstream media. The OWS move-
leaderless nature of the movement made the use ment is an interesting example of the evolving
904 Occupy Movement

relationship between social and mainstream the financial crisis of the late 2000s. It was also
media. Although the OWS movement was suc- paramount in shifting mainstream media cover-
cessful in its goals via social media, it still needed age in the United States from narratives about the
the mainstream media’s circulation of vivid pic- federal debt and deficit to issues of unemployment
tures and videos to increase the knowledge and and unequal income distribution. The movement
legitimacy of the movement. While a movement also brought national attention to the current U.S.
may be powerful in a social media environment, tax system, which a 2011 Congressional Budget
it still often needs the power of the mainstream Office report noted was partially responsible for
media to help gain validity. income inequality. In November 2011, U.S. Con-
gressman Ted Deutch introduced the OCCUPIED
Political and Social Impact (Outlawing Corporate Cash Undermining the
Critics of the Occupy movement contend that it Public Interest in our Elections and Democracy)
had little collective political or social consequence. constitutional amendment, aimed at overturning
Yet, supporters believe that the movement made the Supreme Court’s Citizens United decision,
a global impact through altering the terms of the which in part would ban corporate money from
political debate and substantially boosting media the electoral process, a primary concern of the
coverage of the crises facing citizens worldwide. Occupy movement.
The movement was mentioned often at the 2011 References to income inequality became more
G20 summit, and in policy responses related to prevalent in worldwide political discourse, with
former Vice President Al Gore calling on activists
to “Occupy Democracy,” noting that the politi-
cal system no longer served the best interest of the
electorate. President Obama spoke in support of
the movement, acknowledging that the occupa-
tions were a sign of the collective frustrations of
the American public. It was also widely suggested
that the movement influenced President Obama’s
2012 State of the Union address, and created an
opportunity for Obama to speak about the wealthy
paying a greater share of the national tax burden.
Although Obama stopped referencing the move-
ment by name, income inequality remained a cen-
tral theme during his 2012 re-election campaign.
While the tangible political impact of the
Occupy movement may not be considered sig-
nificant, the widespread social implications
appear more impactful. The movement generated
national conversation regarding the economic
problems faced by a vast number of Americans,
including unemployment, heavy student loan and
personal debt burdens, and social issues such as
homelessness and health care deficiencies. Refer-
ences to income inequality, which were not com-
monplace prior to the movement, proliferated in
mainstream print and broadcast media, the terms
“1 percenters” and “the 99 percent” became prev-
Organizers on September 25, 2011, during the ninth day of alent throughout popular culture, and the word
Occupy Wall Street in Zuccotti Park in lower Manhattan. Over “Occupy” became the most common word on the
450,000 Facebook users joined Occupy-related Facebook pages, Internet and in print in the 12-month period fol-
on which over 170,000 people posted or commented. lowing the outset of the movement.
Office of Government Information Services 905

Support for the movement was voiced from beyond its initial excitement, and potentially build
around the world, by prominent figures such as an infrastructure that will sustain the movement
Jesse Jackson, who reminded demonstrators that beyond the occupations. The movement contin-
Gandhi and Martin Luther King, Jr., were also ues to evolve and diversify its messages to reach
“occupiers,” and wealthy supporters joining the different audiences that it believes are a critical
movement with slogans such as “We Stand with part of the 99 percent.
the 99 percent” and “I am the 1 percent—I stand Whether or not the movement will adopt any
with the 99 percent.” A January 2012 global sur- concrete agendas is uncertain because the organic
vey of 23 countries, published by a global market and extemporaneous nature of the movement
research firm, indicated that around 40 percent lacked a hierarchy of leaders that may have been
of worldwide respondents were familiar with necessary to develop and sustain the movement.
the Occupy movement, and over twice as many The Occupy movement provided an opportunity
reported a favorable opinion of the movement for hundreds of thousands of people worldwide
than a negative one. The movement also resulted to engage in participatory democracy. Although
in the forming of the Coalition for the First the impact on political policy has thus far been
Amendment, organized by journalists in New minimal, the future of the Occupy movement is
York City in response to perceived constitutional yet to be defined, and has the potential to grow
violations on the part of the police during the into a galvanizing political force.
NYPD’s eviction of Occupy Wall Street protesters
from Zuccotti Park. LaChrystal Ricke
The movement also generated a palpable nega- Sam Houston State University
tive social response, with politicians and pun-
dits often characterizing protesters as a growing See Also: Activists and Activism, Digital; Arab
mob seeking government handouts, and one-time Spring; Campaigns, Grassroots; International Unrest
presidential candidate Herman Cain even call- and Revolution; Twitter.
ing the occupiers “anti-American.” Advocates
of the movement attribute a portion of the nega- Further Readings
tive social perception to the mainstream media’s Editors of Time magazine. What Is Occupy? Inside
coverage, which was scant and largely dismissive. the Global Movement. New York: Time, 2011.
The movement received very little media attention Gelder, Sarah. This Changes Everything: Occupy
between the start of the protests and September 24, Wall Street and the 99 Percent Movement. San
2011, when the first organized march into uptown Francisco: Berrett-Koehler Publishers, 2011.
New York City resulted in the closure of several Wolffe, Richard and David Barsamian. Occupy the
busy streets and the arrest of 80 demonstrators. Economy: Challenging Capitalism. San Francisco:
Mainstream media consistently characterized the City Lights Books, 2012.
Occupiers as a marginalized group, specifically Writers for the 99 Percent, et al. Occupy Wall Street:
highlighting violent interactions between protest- The Inside Story of an Action That Changed
ers and police, although these exchanges were not America. Chicago: Haymarket Books, 2012.
common, and focused on the financial impact of
the movement upon cities.

Future of the Occupy Movement


There is uncertainty about what the future of the Office of Government
Occupy movement holds, or whether it was ever
even a movement to begin with. Various organiz- Information Services
ing factions are coordinating different agendas,
and many demonstrators are looking beyond The Office of Government Information Services
the Occupy label that some feel has boxed in (OGIS), created in 2007, acts as a Freedom of
the movement. The emerging ad hoc leaders are Information Act (FOIA) ombudsperson by medi-
considering plans to help propel the movement ating, in situations of contested FOIA requests,
906 Office of Government Information Services

between FOIA requesters and the federal agen- 598 (2001), which would have precluded FOIA
cies from which the request for information has requesters from recovering attorney fees from the
been made. The FOIA, enacted in 1966, provides agencies that denied their request. The bill clari-
that American citizens have a legally enforce- fied that FOIA requesters actually had a right to
able right to obtain access to any federal agency recover attorney fees in that situation, provided
information, provided that such information that the requester’s claim was legitimate.
does not fall under any of the several exemptions However, Congress also found that FOIA liti-
from public disclosure. Thus, the FOIA repre- gation, even if attorney fees were recovered, was
sents an accountability mechanism that ensures cost prohibitive for a FOIA-requester. To address
the transparency and openness of the govern- this shortcoming, the Open Government Act
ment. Although one of the purposes in the cre- established the OGIS to (1) review the FOIA-
ation of OGIS was to assist information seekers related policies, procedures, and compliance of
by creating an alternative avenue to lengthy and federal agencies; (2) conduct audits on and publish
costly litigation in cases of agency noncompli- reports about FOIA compliance among admin-
ance with FOIA requests, it remains to be seen to istrative agencies; (3) issue FOIA-related policy
what extent OGIS will be able to improve agency recommendations to Congress and the president;
response to FOIA requests and provide a mean- and (4) offer mediation services between FOIA-
ingful complement to FOIA litigation. requesters and federal agencies as an alternative
to litigation, as well as issue advisory opinions in
History and Purpose case of unsuccessful mediation. Thus, the purpose
The OGIS was established by the Openness Pro- of the OGIS was to function as an ombudsperson
motes Effectiveness in our National Government for FOIA requests, mirroring at federal level some
Act (OPEN Government Act) of 2007 (Public state-level successful alternatives to FOIA litiga-
Law 110-175), a bipartisan initiative of U.S. Sen- tion, such as the New York Committee on Open
ators John Cornyn (R-Texas) and Patrick Leahy Government.
(D-Vermont), as part of the National Archive and The stated purpose of placing the OGIS with
Records Administration (NARA). The Open Gov- the National Archive and Records Administra-
ernment Act of 2007 represented one of the most tion (NARA) was to free the OGIS from the influ-
comprehensive overhauls of the FOIA since the ence of the Department of Justice (DOJ), which
Electronic Freedom of Information Act amend- oversees agency compliance with FOIA directives
ments of 1996. Some of the FOIA amendments and acts on government’s behalf in FOIA dis-
passed into law included the creation of a track- putes. However, five weeks after the OPEN Gov-
ing system for FOIA requests, a FOIA hotline ser- ernment Act was signed into law, in his fiscal year
vice for all the federal agencies, and a mandatory 2009 budget proposal sent to Congress, President
position of chief FOIA officer for each agency George W. Bush sought to transfer the functions
tasked to monitoring agency compliance with of the OGIS from NARA to the Department of
FOIA requests; the extension of the fee waiver Justice. The administration argued that the pro-
for FOIA requests to Internet bloggers and other posed functions for the OGIS would duplicate the
Web-based journalists; and the establishment of activities already performed by the DOJ.
financial penalties for federal agencies missing However, the argument was considered contro-
the FOIA’s 20-day statutory deadline or rejecting versial by open government organizations (includ-
requests in an arbitrary and capricious fashion. ing the American Civil Liberties Union, American
Additionally, the bill closed a legal loophole Library Association, Electronic Frontier Founda-
that allowed federal agencies to delay compli- tion, National Freedom of Information Coalition,
ance with FOIA requests during litigation until and the Sunlight Foundation) and by both the
just before a court decision favorable to the FOIA House and Senate Appropriation Subcommittees
requester. The purpose of this delaying tactic was because the OGIS transfer to the DOJ was seen
to trigger the Supreme Court ruling in Buckhan- to directly contradict the mandate of the OGIS as
non Board and Care Home, Inc. v. West Virginia an independent mediator between FOIA request-
Dept. of Health and Human Resources, 532 U.S. ers and governmental agencies. The OGIS was
OhmyNews 907

eventually restored to NARA with an appropria- OhmyNews


tion of $1 million, and opened in September 2009.
Since 2009, the seven-person OGIS agency OhmyNews is one of the most popular Inter-
assisted in nearly 2,100 FOIA-related instances, net newspapers in South Korea. It was founded
and offered suggestions to 17 federal agencies. by Korean journalist Oh Yeon Ho in 1999, and
OGIS success in submitting policy recommenda- was officially launched on February 22, 2000.
tions to Congress is less clear. Although the OPEN His idea was to establish a citizen-participatory
Government Act mandated the OGIS to issue alternative Internet newspaper. The site’s name
policy recommendations to Congress meant to is derived from the comedic catch phrase “Oh
improve FOIA-related agency compliance, OGIS my God!” that was popular in Korea at the time.
did not do so until 2011. In 2011, recommenda- The slogan of OhmyNews is “every citizen is a
tions were submitted to the Office of Manage- reporter.” OhmyNews provides a public plat-
ment and Budget (OMB), but the OMB created form to a large number of citizens who had previ-
additional controversy in Congress by failing to ously not been represented in the media. The site
forward the OGIS recommendations to Congress covers all kinds of news, ranging from politics,
for review. In 2012, the OGIS recommended the society, international affairs, education, business,
improvement of FOIA along several dimensions, information technology, sports, and entertain-
including facilitating information sharing among ment. OhmyNews is widely considered one of
agencies, improving the online tracking of FOIA the most influential news organizations in South
requests, coordinating multiagency responses to Korea. The South Korean weekly magazine Sisa
FOIA requests, and improving the dispute reso- Journal ranked it several times as one of the top
lution skills of FOIA professionals. In 2013, the 10 South Korean media organizations, evaluat-
OGIS will be working on examining FOIA fees, ing newspapers, TV and radio stations, as well as
which continue to remain a contentious issue for print magazines.
FOIA requesters, and recommending policies to
ease up the backlog of cases created by immigra- Role in Politics
tion-related FOIA requests by non-U.S. citizens. OhmyNews played a major role in the presiden-
tial elections of South Korean President Roh Moo-
Mihaela Popescu Hyun in 2002. It provided an alternative news
California State University, San Bernardino source to the mainstream media. OhmyNews not
only served as a news source in the presidential
See Also: National Freedom of Information election, but also as a hub for political mobiliza-
Coalition; Social Media and Freedom of Information tion and social change. After the election, Presi-
Act; Sunlight Foundation. dent Roh Moo-Hyun granted his first interview to
reporters of OhmyNews. OhmyNews also played
Further Readings an important role regarding the reporting of a
Gerstein, Josh. “Patrick Leahy, Chuck Grassley on traffic incident in 2002 involving the U.S. mili-
Warpath Over Stalled FOIA Recommendations” tary, which resulted in the death of two teenage
(May 13, 2012). Politico. http://www.politico girls and led to political protests. While Korean
.com/blogs/under-the-radar/2012/03/patrick-leahy mainstream press provided little information
-chuck-grassley-on-warpath-over-stalled-117303 on the subject, OhmyNews triggered debate on
.html (Accessed May 2013). America’s military role in the country.
Office of Government Information Services. https://
ogis.archives.gov (Accessed May 2013). Citizen Journalists
“Open Government: Reinvigorating the Freedom of The alternative Internet newspaper finances itself
Information Act.” Hearing before the Committee primarily through commercial advertising. It
on the Judiciary, 110th Congress, March 14, announced that the company became profitable
2007. http://www.gpo.gov/fdsys/pkg/CHRG in 2003, but its business model appears unstable.
-110shrg35801/pdf/CHRG-110shrg35801.pdf Mostly young, male, well-educated, and progres-
(Accessed May 2013). sive-thinking people constitute the reader and
908 OhmyNews

reporter membership. OhmyNews differentiates mainstream media. It also addresses issues largely
between citizen and specialist reporters. Citizen ignored by established news organizations in
reporters claim their roles by formally register- Korea. Another important factor is the informa-
ing as members before they are allowed to sub- tion technology infrastructure of the country.
mit articles. Specialist reporters are employed OhmyNews relies heavily on Korea’s sophis-
on a full-time basis by OhmyNews to select and ticated and extensive digital telecommunication
examine the news coming in from citizen report- infrastructure, which is a result of significant
ers. That way, only a selection of submitted items government-led policies. Since the mid-1990s,
is authorized as OhmyNews articles. the Korean government has presented national
OhmyNews started with 727 citizen report- goals for establishing a knowledge-based society.
ers who supplied articles. This number increased Since then, it has been pursuing a broad infor-
steadily to 14,000 in 2001, and to more than mation and communication policy by imple-
40,000 in 2006. All OhmyNews citizen report- menting a series of mid- and long-term programs
ers have to provide a profile, and they have to to fund the telecommunications infrastructure.
agree to abide the reporters’ ethics code and regu- Currently, Korea has one of the highest rates of
lations. Articles from citizen reporters comprise overall Internet connectivity in the world. On
the bulk of OhmyNews content. The contribu- August 28, 2006, OhmyNews started a Japan-
tions amount to 150 to 250 articles a day. The based citizen-participatory journalism site called
OhmyNews model includes monetary incentives OhmyNews Japan, launched with the financial
for citizen reporters. If a reporter´s article is pub- support of Softbank, a Japanese telecommunica-
lished in OhmyNews, he or she can receive a small tion and media corporation. It did not succeed.
sum of money, depending on whether the article In July 2008, all staff of OhmyNews Japan was
appears on the site. Additionally, readers can dismissed, and by the end of August 2008, oper-
“tip” citizen reporters by sending money online ations had ceased on the site.
or by cell phone. These payments serve more as
encouragement than income for the reporter. Ralf Spiller
In order to be able to compete with the tra- Macromedia University
ditional Korean press, OhmyNews has been cul-
tivating the professionalism of its “guerrilla” or See Also: Activists and Activism, Digital; Asia;
citizen reporters. A citizen journalism school was Citizen Journalism; News Media.
opened in November 2007 on the outskirts of
Seoul to act as a collaborative knowledge center, Further Readings
developing new citizen reporters. OhmyNews has Joyce, Mary. “The Citizen Journalism Web Site
published hoaxes, and faces a problem of undis- ‘OhmyNews’ and the 2002 South Korean
closed conflicts of interest. The editor filtration presidential Election.” Berkman Center for
system tries to prevent such behavior, but has not Internet & Society at Harvard Law School,
been able to fully succeed. Research Publication No. 2007-15 (2007).
OhmyNews emerged as a response to specific Kang, Daniel Jisuk and Laurel Evelyn Dyson.
historical, social, and cultural conditions. The “Internet Politics in South Korea: The Case of
increasing differences between different genera- Rohsamo and OhmyNews.” 18th Australasian
tions and a longstanding skepticism toward con- Conference on Information Systems, December
servative mainstream media played a major role. 5–7, 2007, Toowoomba, Australia.
Three traditionally conservative daily newspapers Kim, Eun-Gyoo and James W. Hamilton.
(Chosun Ilbo, Don-A Ilbo, and Joong Ang Ilbo) “Capitulation to Capital? OhmyNews as
had been covering around 80 percent of daily Alternative Media.” Media, Culture and Society,
circulation for many years. There are various v.28/4 (2006).
factors that play a crucial role in the success of Young, Chang Woo. “OhmyNews: Citizen Journalism
OhmyNews. One of them is that the site attracted in South Korea.” In Citizen Journalism: Global
a new generation that grew up in a more afflu- Perspectives, Allan Stuart and Einar Thorsen, eds.
ent, high-tech society that was more dubious of New York: Peter Lang, 2009.
ONE Campaign 909

ONE Campaign of the famous American businessman Warren


Buffett; and Morton H. Halperin, senior advisor
ONE Campaign is an international grassroots at the Open Society Institute. ONE Campaign
advocacy and campaigning organization aimed at is managed by an executive team of 10 people
fighting extreme poverty and preventable diseases with the former editor of TIME International,
in the poorest regions of the world, particularly in Michael Elliott, as president and chief executive
Africa, by increasing public awareness, lobbying officer, and cofounder of advocacy organization
global political leaders to take concrete actions, DATA and ONE, Jamie Drummond, as execu-
and working together with leaders in Africa to tive director.
support democracy, accountability, and trans- ONE Campaign has offices in Belgium, France,
parency in using international aid. According to Germany, the United Kingdom, the United States,
the organization, its name was chosen because and South Africa, but it mostly operates online
the word “one” symbolizes the idea of joining and through viral activities. The organization
together antipoverty organizations’ forces. ONE leverages the use of social media to spread mes-
Campaign officially started in 2004, as a project sages and information on diverse social issues,
involving humanitarian and advocacy organiza- policy developments, and political discussions.
tions such as DATA, Bread for the World Insti- ONE Campaign has a blog as well as Face-
tute, CARE USA, International Medical Corps, book, Flickr, and Twitter accounts, and a dedi-
International Rescue Committee, Mercy Corps, cated YouTube channel. Activists and volunteers
Oxfam America, Plan USA, Save the Children, around the world can post their pictures, videos,
World Concern, and World Vision. Moved by
a common interest, these organizations joined
forces to appeal to the U.S. government to increase
its budgetary investment of one percent for the
fight against extreme poverty.
The campaign held its opening event in Phila-
delphia, Pennsylvania, in May 2004. The coop-
eration among these organizations continued in
2005 with a series of benefit events around the
world, in conjunction with the G8 Summit in Gle-
neagles, Scotland. Ten Live 8 concerts hosting dif-
ferent artists took place in Africa, Asia, Europe,
and North America on July 2, 2005, just before
the official start of the G8 conference and sum-
mit. This second social action succeeded in mak-
ing G8 leaders commit to providing an additional
$25 billion in assistance to Africa by 2010. The
collaborations between the ONE Campaign ini-
tiative and the organization DATA increased dur-
ing 2007, and in 2008, the two merged ito form
ONE Campaign. The organization claims to have
over 3 million members supporting its cause.
ONE Campaign is primarily funded by dona-
tions made by philanthropists, many of whom are
on the board of directors. The board is made of
19 people, including cofounder Bono, the singer
of the Irish band U2; Bobby Shriver, cofounder
of the organization; Condoleezza Rice, 66th U.S. ONE Campaign volunteers at a June 13, 2011, rally in London in
Secretary of State; Sheryl Sandberg, Facebook support of a global project to increase children’s vaccinations by
chief operating officer; Howard G. Buffett, son 250 million a year worldwide by 2015.
910 140ELECT.com

and comments about events and activities that Campaign is an example of dehumanizing the poor
relate to ONE Campaign causes. Videos of celeb- and the commodification and individualization of
rities endorsing ONE Campaign causes are also poverty, especially through narratives that pro-
made available through ONE Campaign’s You- mote stereotypical representations of celebrities as
Tube channel. In addition to organizing differ- northern rescuers, raising questions about the use
ent events and mobilizing public opinion, ONE of celebrities in humanitarian actions.
Campaign provides policy analysis and informa-
tion on the challenges and opportunities to tackle Chiara Valentini
important social, economic, and political issues. Aarhus University
The organization works with different national
and international grassroots organizations on See Also: Activists and Activism, Digital; Actors and
specific projects and actions, including issues such Social Media in Politics; Artists and Social Media in
as clean water, education, hunger, trade, and pre- Politics; Cause-Marketing Campaigns.
ventable diseases. ONE Campaign is also one of
the international organizations supporting global Further Readings
efforts to achieve the United Nations Millennium Kapoor, Ilan, Celebrity Humanitarianism:
Development Goals by 2015. The Ideology of Global Charity. New York:
While the organization claims not to be a celeb- Routledge, 2013.
rity campaign but a grassroots movement, many Mukherjee, Roopali and Sarah Banet-Weiser,
events and activities raising public attention see Commodity Activism: Cultural Resistance in
celebrities involved either directly as ambassadors Neoliberal Times. New York: New York University
or indirectly through donations and project-specific Press, 2012.
actions. Nonprofit and nongovernmental organi- Nolan, David and Akina Mikami. “The Things That
zations, including international organizations such We Have to Do: Ethics and Instrumentality in
as the United Nations, have involved celebrities as Humanitarian Communication.” Global Media
ambassadors to endorse particular social causes. and Communication, v.9/3 (2013).
Because of their positions in the minds of consum-
ers and the general public, celebrities are capable
to move mass media and citizens’ attention toward
specific social and political issues, and by doing so,
they increase public expectations toward global 140ELECT.com
leaders’ decisions and actions on those issues. For
the same reasons, celebrities are often engaged in 140ELECT.com is an Internet-based consulting
direct donations and fundraising activities. ONE service focused on the successful and effective
Campaign claims that it does not seek to raise implementation of Twitter in political campaigns.
money for a specific cause, but that its mission is The service focuses on the integration of strate-
to advocate certain social causes, such as the fight gic and targeted Twitter initiatives that assist in
against poverty, and to lobby for concrete political engaging supporters, creating communities, and
actions and commitments. organizing fundraising. It works to track, ana-
ONE Campaign has received some criticism on lyze, and manage Twitter accounts to provide
the actual use of donations it receives, confronted campaigns with actionable methods for effec-
by allegations that in 2008, only 1.2 percent of tively engaging prospective audiences, followers,
donations were devolved to charity activities. The and voters.
organization responded by explaining that it func-
tions primarily as an advocacy group on behalf of 140ELECT Campaign Tools
fundraising activities, and does not run operational Through programming tips and consultation,
programs, thus asserting that a percentage spend- 140ELECT provides campaigns a distinct set of
ing charge is irrelevant as a measure of its effi- tools geared toward effective political tweeting.
ciency. Other criticisms are more ideological; some A primary focus of 140ELECT is using tactical
scholars, such as David Nolan, claim that ONE management techniques focused on the strategic
140ELECT.com 911

deployment of tweets and the growth of Twit- analyzed Twitter accounts based on a range of
ter pages to increase campaigns’ effectiveness. issues, including the frequency of specific types
Research, tracking, and metric tools analyze of retweets and hashtags, users were presented
tweets both by and about candidates to identify with prominent Twitter accounts that they might
tweets and hashtags (words or phrases prefixed want to follow. Subscribers to the free service
with the symbol #) that appear to resonate with could also have their Twitter accounts analyzed
voters, recognize potentially influential support- in order to receive a recommended list of Twitter
ers based on their followers, and help target active accounts that they were not already following
and potential supporters by state and city. These but may find interesting. Unite Blue users could
tools are designed to enhance campaigns’ Twitter select up to 50 accounts per day to follow, ask
visibility and success by offering real-time met- those accounts to follow them in return, and find
rics, tweeting advice, and alerts that enable rapid Twitter accounts by state.
campaign response. Other political engagement initiatives devised
140ELECT also creates custom Twitter pages by 140ELECT included “2012twit,” “Who to
and engagement Web sites, and provides opposi- Follow,” “Obama vs. Romney,” and “Romney
tion research tools and alerts. Through custom Attacks.” 2012twit served as an election dash-
Twitter pages and engagement Web sites, sup- board, providing real-time tracking of Twitter
porters can find and retweet (repost someone activity during the presidential election cycle. It
else’s tweet) a campaign’s most effective tweets, monitored content such as candidates’ total num-
participate in town hall spaces, and engage in ber of followers, mentions, unique mentions,
community building and fundraising. Opposi- retweets, and unique retweets in a 24-hour period.
tion research tools provide real-time reports on 2012twit also provided word clouds (visual rep-
tweets both by and about opponents, allowing resentations for text data) highlighting trending
campaigns to identify trending attack tweets and words in reference to each candidate and hyper-
hashtags and to inject campaign messages into links that served as search engines for tweets on
opponents’ tweet streams (timeline of tweets listed those topics. Who to Follow was a Twitter direc-
in real-time order). These tools give campaigns tory of the top Twitter accounts to follow during
the ability to rapidly and strategically respond to the 2012 election, Obama vs. Romney cataloged
critical tweets about the campaign. all tweets between @BarackObama and @Mit-
tRomney following the primaries, and Romney
140ELECT Projects Attacks assembled popular tweet attacks on the
During its involvement in the U.S. 2012 presiden- candidate, provided easy verification of attack
tial election cycle, 140ELECT shifted from focus- accuracy, and encouraged retweeting.
ing exclusively on political and campaign analysis
to designing initiatives around political advocacy Conclusion
as well. Through the facilitation of multiple proj- 140ELECT was a prominent social media archi-
ects, such as hosting the first-ever presidential tect in the U.S. 2012 presidential election cycle. By
debate on Twitter, creating unique campaigns for offering tools and services that allowed for Twit-
independent candidates, and developing tools like ter to be strategically integrated into campaign
Donate Tweets, 140ELECT sought to increase strategies and grassroots initiatives to increase
political engagement. political engagement, 140ELECT was integral
Unite Blue, one of 140ELECT’s political in the prominent role that Twitter played in the
engagement projects, aimed to connect and ener- 2012 presidential race.
gize the political left by making it easier for users
to connect with like-minded individuals and LaChrystal Ricke
organizations on Twitter. The site used advanced Sam Houston State University
heuristics and artificial intelligence techniques to
locate and centralize the most politically active See Also: Activists and Activism, Digital;
progressive and Democratic-leaning tweet- Campaigns, 2012; Evolution of Social Media;
ers. Through BlueRank, a ranking system that Hashtag; Micro-Targeting; Twitter.
912 100Reporters Whistleblower Alley

Further Readings whistleblowers, and human rights advocates. In


Cross, Mary. Bloggerati, Twitterati: How Blogs addition, online surveillance of activists, report-
and Twitter Are Transforming Popular Culture. ers, and whistleblowers is on the rise. WikiLeaks
Westport, CT: Praeger, 2011. reveals the extent and sophistication of the more
Lassen, David and Adam Brown. “Twitter: The than $5 billion online surveillance market.
Electoral Connection?” Social Science Computer Online surveillance, considered an “enemy of
Review, v.29 (2010). the Internet” by Reporters Without Borders, is
Parmelee, John and Shannon Bichard. Politics and used by repressive regimes to control and silence
the Twitter Revolution: How Tweets Influence the activists and dissidents through deep packet
Relationship Between Political Leaders and the inspection, a highly intrusive technology that
Public. Lanham, MD: Lexington Books, 2011. allows Internet service providers to monitor, filter,
Shark, Alan and Susan Cable. Web 2.0 Civic Media in and suppress specific services or content. Officials
Action—Emerging Trends & Practices. Alexandria, from such regimes have openly acknowledged
VA: Public Technology Institute, 2011. their attempts to track down and punish those
who critique them. According to the Commit-
tee to Protect Journalists, “dozens of journalists;
Syrian reporters, bloggers, and activists are regu-
larly followed, arrested, and tortured. Ordinary
100Reporters citizens who came into contact with international
journalists are also targeted.” For example, one
Whistleblower Alley Syrian activist was caught by the national govern-
ment’s online surveillance efforts, and was sub-
100Reporters is a community- and collaborative- sequently arrested and tortured, reporting: “My
centered global news organization specializing in computer was arrested before I was.”
investigative reporting on all types of corruption. Whistleblower Alley uses various protective
It connects professional reporters with citizen measures, including PrivacyBox.de, which allows
journalists, citizen watchdogs and whistleblow- users to submit files to a secure dropbox. Whistle-
ers, and social and economic justice advocates blower Alley’s secure message acknowledgment
and activists around the world. Because of the system uses anonymizing networks, such as the
increased use of online surveillance tactics by Tor network and the Invisible Internet Project,
repressive regimes to locate, torture, or kill human which defend against online surveillance and
rights and anticorruption activists, 100Report- aggressive efforts to suppress free speech. Tor
ers created Whistleblower Alley, an online file protects users by shifting computer-mediated
exchange and communications point to securely communication around a distributed network of
and anonymously transmit information. In order relays run by volunteers to circumvent censor-
to protect the reporters, activists, and advocates ship, and provide tools to evade direct monitoring
who are a part of the 100Reporters community, by governments by preventing surveillance efforts
the organization created Whistleblower Alley so from learning a user’s geophysical location.
that those wishing to submit reports exposing Whistleblower Alley has also published sev-
corruption can do so as safely as is possible, using eral pretty good privacy (PGP) public encryp-
the infrastructure of the Internet. tion keys, which allow anyone to submit secure
As the Internet makes it difficult to silence ideas, messages using Whistleblower Alley’s public key
information, and images entering a nation from that can only be decrypted by 100Reporters. The
outside it, authoritarian governments that have public key (a series of letters and numbers) is for
long controlled communication see a free flow of users who want to submit an encrypted e-mail
ideas and information as potentially destabilizing. message to the Alley. To enhance protection, the
Various legal protections safeguarding press free- public keys are set to expire after a few months.
dom have increasingly come under attack from Reporters Without Borders (RWB) has devel-
many regimes. Correspondingly, there is an inten- oped a similar secure Web site for submission of
sified need to protect reporters, citizen journalists, potentially sensitive reporting and information.
Onion, The 913

The organization argues, “If war reporters care Reporters Without Borders. “Enemies of the
about their physical safety, they take a helmet and Internet.” http://en.rsf.org/internet-enemie-viet
bullet-proof vest when they venture into the field. -nam,36694.html (Accessed June 2013).
Similarly, all journalists should equip themselves
with a ‘digital survival kit’ if they are exchang-
ing sensitive information online or storing it on a
computer or mobile phone.”
RWB has an online survival kit on its Web site. Onion, The
The survival kit explains how to use Tor or virtual
private networks (VPNs) for anonymizing com- As one of the finest comedic news organizations
munication, discusses the need to purge metadata in the United States, since 1988, The Onion has
from files, and offers advice on securing commu- gone from an obscure Wisconsin college newspa-
nication and data on laptops and mobile phones. per to a far-reaching producer of humorous polit-
RWB organizational founders argue, ical content, both online and offline. From 1996
to the present, The Onion has charged into the
Journalists and netizens must learn to evalu- digital world, playing a role in the political pro-
ate the potential surveillance risks and iden- cess with daily articles and commentaries, e-mail
tify the data and communications that need blasts, and starting in 2007, Onion News Net-
protecting in order to find appropriate solu- work (ONN) online video sketches targeted for
tions, preferably ones that are easy to use. The distribution through social media.
sophistication of the methods used by censors The Onion is perhaps best known for obscur-
and intelligence agencies is testing the ingenu- ing the lines between political fact and fiction
ity of news providers and the hacktivists who for satirical effect. While typical news headlines
are ready to help them. But the future of free- might cover 2012 presidential candidate Mitt
dom of information depends on the outcome Romney’s wealthy upbringing, The Onion posted
of this battle. This is a battle without bombs, columns about, for example, “Romney Just Say-
prison bars or blank inserts in newspapers, ing He Grew up Poor in Memphis Now.” The
but if care is not taken, the enemies of the comedic publisher often creates headlines and
truth may sweep the board. material about major and minor subjects. Its
original, trivial content is exemplified by its long-
Catherine Cassara running series of what a nameless “Area Man” is
Lara Lengel up to, such as “Convenience of E-Mail Takes up
Bowling Green State University 30 Percent of Area Man’s Work Day.” Yet, just
as often, The Onion puts a humorous twist upon
See Also: Activists and Activism, Digital; Committee real political events and cultural trends through
to Protect Journalists; Cyber-Vigilantism; Press infamous headlines like “Drugs Win Drug War,”
Freedom and Online/Social Media Security. “Nation Shudders at Large Block of Uninter-
rupted Text,” or “U.S. Economy Grinds to Halt
Further Readings as Nation Realizes Money Just a Symbolic, Mutu-
Citizen Lab. “Middle East and North Africa ally Shared Illusion.” The search engine giant
CyberWatch—May 2013.” https://citizenlab.org/ Google has also come in for its share of satirical
2013/05/middle-east-and-north-africa-cyberwatch treatment by Onion writers, both for its ability to
-may-2013 (Accessed June 2013). peer into the private lives of Google search users
Newsom, Victoria, Lara Lengel, and Catherine and for its ability to dominate contemporary
Cassara. “Local Knowledge and the Revolutions: social media landscapes.
A Framework for Social Media Information The Onion has remained true to its type of
Flow.” International Journal of Communication, humor over the last 25 years, but its success-
v.5 (2011). ful use of social media has been part of strategy
100Reporters. “Whistleblower’s Alley.” http://100r of convergence and distribution between dif-
.org/wa (Accessed May 2013). ferent platforms. The Webby Award–winning
914 Online Smear Campaigns

theOnion.com boasted an average of 7.5 million indication, topics like social media will continue
unique visitors per month from about 40 million to undergo its trenchant, biting critiques.
page views in 2013. The Web site is dedicated to
newspaper content that is, as its producers assert, Don Waisanen
“delivered constantly, tweeted at optimum times City University of New York
and posted on Facebook during high-traffic peri-
ods. Subsequently, users can easily embed, share, See Also: Colbert Report, The; Daily Show, The;
or post articles and videos to their personal Face- Saturday Night Live.
book and Twitter accounts.” There is much col-
laboration between the site and its fans, who are Further Readings
targeted both for their laughter and ability to Achter, Paul. “Comedy in Unfunny Times: News
spread viral content. Parody and Carnival After 9/11.” Critical Studies
Aside from these goals, two particular devel- in Media Communication, v.25 (2008).
opments have fostered The Onion’s success in Beato, Greg. “Amusing Ourselves to Depth? Is The
social media and politics. One has to do with Onion America’s Most Intelligent Newspaper?”
the timing and nature of its content. After the Reason Magazine (November 7, 2007). http://
September 11, 2001, attacks on the World Trade www.reason.com/news/show/122453.html
Center and Pentagon, most national comedy (Accessed September 2012).
venues went relatively silent. The Onion was Hariman, Robert. “Political Parody and Public
one of the first organizations to respond to the Culture.” Quarterly Journal of Speech, v.94
events with news headlines like “Hijackers Sur- (2008).
prised to Find Selves in Hell.” This brazen and Johnson, Steve. “Blooming Onion.” Chicago Tribune
fast approach to creating comic news content (January 10, 2011). http://articles.chicagotribune
has propelled the organization into the spotlight .com/2011-01-10/entertainment/ct-live-0111
amid a 24/7 news cycle. -onion-tv-20110110_1_steve-hannah-onion
The other development has to do with the very -news-network-national-lampoon (Accessed
form of The Onion’s productions—especially with September 2012).
its creation of the ONN, which copies the televised The Onion. http://www.onion.com (Accessed
stylings of networks like CNN. In fact, it might be September 2012).
hard to differentiate the ONN from other tradi- Sharp, Johnny. “Tomorrow’s Nonsense Today.”
tional news organizations, were it not for slight The Guardian (April 5, 2008).
tweaks in messaging, as in its video report “Poll: Waisanen, Don J. “Crafting Hyperreal Spaces for
Bullshit Is Most Important Issue for 2008 Voters.” Comic Insights: The Onion News Network’s Ironic
By parodying bloviating pundits, hyperbolic news Iconicity.” Communication Quarterly, v.59 (2011).
graphics, and self-congratulatory titles for media Warner, Jamie. “Tyranny of the Dichotomy: Prophetic
segments like “In the Know,” ONN occupies a Dualism, Irony, and The Onion.” Electronic
distinctive place in the political landscape. Journal of Communication, v.18 (2008).
While The Onion’s producers have exploited
the Internet’s potential to go beyond television’s
tendency to sanitize or censor much program-
ming, recent trends may call into question how
independent the organization will continue to be Online Smear
in developing content free from commercial media
pressures. The Onion’s Web site is replete with Campaigns
advertising and ONN itself recently moved from
the Internet to a show on the AMC Network’s The 2008 presidential campaign was characterized
channel IFC. Overall, however, The Onion’s dis- by the online smear campaign that claimed that
courses show no sign of diminishing in public cul- Barack Obama was Muslim. The main source of
ture, and if headlines like “Number of Users Who the smear against Obama was an e-mail chain that
Actually Enjoy Facebook Down To 4” are any spread blogs, video-sharing platforms, and social
Online Smear Campaigns 915

networks; subsequently, it was covered by the and an influential news Web site only contributed
mass media, which finally prompted the Obama to making the story more popular.
campaign to react. While this was, far and away, On February 10, 2007, Obama officially
the most egregious and conspicuous of the season’s announced his candidacy for the Democratic
smears, it was not the only one. There were proba- presidential nomination. In the following days,
bly hundreds of other smear campaigns, but only a the smear e-mail spread even further and faster.
few of them reached a greater audience. The main Around mid-November, the Obama campaign
variable for breaking into the news was direct and intervened for the first time by publishing a dos-
indirect media coverage. sier on its official Web site titled: “Obama has
Nonetheless, some other examples need to be never been a Muslim, and is a committed Chris-
mentioned. John McCain had to deal with sev- tian.” On December 5, the Clinton campaign
eral smear campaigns: one that he was senile, one acknowledged that one of its volunteers in Iowa
that he sold out his fellow POWs to save him- had forwarded a version of the e-mail, and it dis-
self, and another about a supposed extramarital avowed him. On January 15, 2008, during the
relationship with a lobbyist. Sarah Palin was the crucial period between the New Hampshire and
target of a smear campaign based on a series of Nevada primaries, Obama strongly reaffirmed his
spoof photographs circulated on the Internet. Christian faith in the Las Vegas primary debate.
During the Republican primaries, Mitt Romney However, the slander was still leaving its marks on
also suffered from the spread of statements about public opinion, as one in 10 Americans thought
religion and personal beliefs that were falsely that he was Muslim.
attributed to him. On May 1, 2008, more than 600 videos refer-
ring to “Obama Muslim” could be found on You-
Barack Obama Tube, and some totaled hundreds of thousands of
The story of the “Obama is Muslim” smear began views. In the same period, there were 540 Face-
on August 10, 2004, when Andy Martin, a for- book pages on the issue, equally divided between
mer political opponent of Obama in Illinois and Obama’s supporters and groups who backed the
contributor to the Web site FreeRepublic.com, smear. On Myspace, the query “Obama Muslim”
posted an article arguing that Obama had con- produced more than 1,000 results, most of them
cealed his Muslim heritage. Martin wrote that favorable to the smear. Finally, on May 12, the
“under Islamic law, Obama became a Muslim at New York Times published a controversial edito-
birth due to his father’s religion.” Then, the first rial by Edward Luttwak that partially confirmed
versions of the smear e-mail began to circulate on the speculations about Obama’s Islamic faith and
several Web sites and blogs, such as the U.S. Vet- argued that,
eran Dispatch, Snopes.com, FreeRepublic.com,
and About.com. Insight, an online conservative . . . as the son of the Muslim father, Senator
magazine owned by the Unification Church, pub- Obama was born a Muslim under Muslim law
lished an article that claimed that Hillary Clin- as it is universally understood. It makes no dif-
ton’s campaign was questioning Obama’s religious ference that, as Senator Obama has written, his
background. The fact that Obama’s main Demo- father said he renounced his religion. Likewise,
cratic rival may have thrown the gauntlet down under Muslim law based on the Koran his
on the issue heightened the controversy. On Janu- mother’s Christian background is irrelevant.
ary 19, Fox News Channel’s morning show Fox
and Friends broadcast a story based on the article For the Democratic candidate it was now time
published by Insight; on January 23 CNN.com to directly tackle the controversy. On June 12,
published a report refuting the Insight story. The Obama’s campaign opened the Web site Fight­The­
report asserted that the school attended by Obama Smears.com, a platform through which Obama’s
in Indonesia was not a madrasah (muslim school), supporters could defend their candidate from the
but it did not clarify many other aspects of the smears that were hitting him. Obama’s strategy
story. Instead of disproving the smear, the cover- was premised on the idea of replying to the slan-
age of the story by a national cable news channel ders on the same medium where they originated.
916 Online Smear Campaigns

Pew Research Center found that in January 2007,


only 5 percent of Americans thought that Obama
was Muslim. The percentage increased gradually,
peaking at 13 percent in March 2008, then rapidly
decreased. At the same time, the number of people
who did not know Obama’s religion or refused
to answer the question constantly dropped from
more than 80 percent in January 2007, to about
25 percent near election day.
The seriousness of this smear needs to be eval-
uated in the context and political culture of the
United States. On the one hand, the memory of
the terroristic attacks by Islamic extremists on
September 11, 2001, is still vivid and induces in
many citizens the controversial equation between
Islam and terrorism. On the other hand, histori-
cally, a candidate of any religious faith different
from Christianity is perceived as uncommon and
suspicious by part of the electorate. The religious
slander was an attack on the patriotism of the
candidate, and questioned his sharing of the val-
ues that keep the political community together
and that the president, as a symbol of national
unity, should embody. Furthermore, claiming that
One participant’s response to the largely online campaign to a politician practices a different religion than the
declare President Barack Obama a Muslim at the satirical “Rally one he publicly declares implies the even more
to Restore Sanity and/or Fear” led by comedians Jon Stewart and dangerous insinuation that the candidate has
Stephen Colbert in Washington, D.C., on October 30, 2010. deceived voters by hiding a central aspect of his
personal life and identity.

John McCain
Substantively, Obama had clear evidence on Republican candidate John McCain did not have
his side: he had been a Christian since his teen- to tackle one large smear attack, but instead had
age years, and since the mid-1980s, he had been to face several minor slanderous accusations. One
a member of a powerful Chicago-based Protes- claimed that he was senile. Following concerns
tant church. However, some elements of ambi- about his age (72 in 2008), about him having had
guity could have made it difficult to fight back previous multiple surgeries to remove melanomas
on the topic, beyond the issues connected to and his notorious, rage-prone, impulsive nature,
the viral and anonymous origins of the smear. rumors about him losing memory started to spread
Obama’s vulnerability came from spending part when he began accumulating “gaffes.” He mud-
of his childhood in Indonesia (though Obama dled Al Qaeda with the Shiite branch of the Iraq
also grew up in Hawai‘i), his Kenyan father and insurgency, and he misread Korean dictator “Kim
his Muslim stepfather; moreover, he emerged as a Sung Il” as “Kim Sung the second.” He had odd
national political celebrity quite suddenly, which explosions with questioners in town meetings dur-
left voters little time to get to know his biography ing the campaign, referring to one young ques-
and background. tioner as a “jerk,” and saying to another “you’re
The calumny reached its peak in public opin- drafted,” and singing his famous ditty “Bomb-
ion in the first months of 2008, when primaries bomb Iran.” Bloggers noted these bizarre perfor-
were held in the first few states, and the candi- mances, and related videos appeared on YouTube,
dates were not well known to the population. The while others spread questions about McCain’s
Online Smear Campaigns 917

alleged dementia. Liberal activists were blamed, One quote said that God had multiple wives,
but these accusations did not have much impact while another stressed that the Virgin Mary was
on the race. “exceedingly fair and white.” Neither the Romney
After winning the nomination, McCain’s cam- family nor the Boston, Massachusetts, temple cited
paign had to deal with another dangerous smear on the card had anything to do with the mailing.
campaign: The candidate was purported to have Fortunately for Romney, the attack was limited,
had a relationship with a telecommunications and his race did not suffer much from the slander.
lobbyist, Vicki Iseman, nine years earlier. The Ari-
zona senator was also attacked in a flyer prepared Conclusion
by a group called Vietnam Veterans Against John The launch of smear campaigns is easier than
McCain. The group set up a Web site that detailed ever because of the Internet; extensive advertis-
the allegations presented on the flyer that McCain ing budgets are not necessary. The Web is an
was exploiting his POW status and that he collab- ideal vehicle for slander for two main reasons:
orated with his captors to save himself and not his first, attacks can remain anonymous, allowing
colleagues. McCain, however, was able to inter- promoters to escape responsibility for launch-
cept the attacks before there was major damage. ing them; second, they can be diffused toward
selected groups of voters and opinion leaders in a
Sarah Palin way that opponents cannot immediately discover,
Sarah Palin’s credibility as a candidate for U.S. which allows the slander more time to spread and
vice president was also undermined by a series gain momentum before targets have the chance
of spoof photographs circulated on the Internet. to answer. However, the calumny damages the
The sexy pictures, which exploit her glamorous candidate’s image as long as it remains under
image, were published amid a concerted cam- the surface, circulating on the Web and gaining
paign against the former beauty queen, following only sparse attention by the mainstream media.
her surprise appointment as 72-year-old Republi- As soon as it attracts attention on a larger media
can candidate John McCain’s running mate. One stage, a candidate’s campaign can promptly react
showed her wearing a leather miniskirt and stilet- on the same media from which it came, and the
tos, while another had her in a stars and stripes untruth of the story may rapidly emerge in both
bikini, brandishing a rifle. Palin looked like a the media and public opinion.
stripper, and while the images could be seen as
harmless fun, they hindered the relatively inexpe- Marco Morini
rienced 44-year-old Alaskan Governor’s attempts Macquarie University
to be taken seriously as a political candidate. The
Republican campaign blamed a vague “liberal See Also: Campaigns, Presidential 2008; Campaigns,
lobby” for the images, but no clearly responsible 2012; Deception in Political Social Media; Decoy
party was found. Campaign Web Sites; FightTheSmears.com; Going
Viral; Negative Campaigning; Rumors.
Mitt Romney
During the 2008 Republican primaries, a bogus Further Readings
Christmas card “from the Romney family,” con- Allen, D. “Worse Than Mud.” Washington Post
taining controversial quotes from the Book of (November 7, 2008).
Mormon, found its way into the mailboxes of Pew Research Center for the People and the Press.
South Carolina Republicans. The holiday greet- “Belief That Obama is Muslim is Durable,
ings appeared positive, with the greeting reading, Bipartisan—But Most Likely to Sway Democratic
“We wish you and your family a happy holiday Votes.” http://pewresearch.org/pubs/898/belief-that
season and a joyful New Year,” but the foul play -obama-is-muslim-is-bipartisan-but-most-likely-to
from the covert authors was far from merry. The -sway-democrats (Accessed December 2012).
card included Book of Mormon passages designed Mark, D. Going Dirty: The Art of Negative
to make conservative Christian voters in the state Campaigning. Lanham, MD: Rowman &
feel uncomfortable with the Mormon candidate. Littlefield, 2009.
918 Open Data

Westen, D. The Political Brain. The Role of Emotion governments of Australia, Estonia, New Zealand,
in Deciding the Fate of a Nation. New York: Norway, and the United Kingdom (UK), along
Public Affairs, 2007. with global organizations like the United Nations
and the World Bank. Some countries and cities are
fully embracing the idea of opening up their data
to the public, while others are still more reluctant
to see the opportunities that the availability of
Open Data public sector data will bring to the public.
Tim Berners-Lee, one of the main proponents
Open data is nonprivacy-restricted and noncon- of open data in the UK, argues that government
fidential data that is produced with public funds data is put online to increase accountability, con-
and is made available without restrictions on its tribute valuable information about the world, and
usage or distribution. Private, confidential, and enable government, the country, and the world to
classified data is excluded because this data is more efficiently function. One example of open
inappropriate to publicize. Public data, available data from the UK is the expanded availability of
to citizens, should meet certain requirements con- crime-related data, coupled with mapping soft-
tained in the open data principles. These princi- ware, which encourages citizens to investigate
ples propose that data must be complete, primary, the security of their neighborhood. They are then
timely accessible, machine-processable, nondis- able to draw conclusions about the performance
criminatory, nonproprietary and license free. of their local police service. The open data move-
Open government data are all stored data of ment’s main objectives are to make public sector
the public sector that could be made accessible by information available to the public to increase
the government in a public interest, without any transparency and participation, as well as to
restrictions for usage and distribution. Some exem- achieve greater administrative efficiency and cre-
plary realizations, such as apps, mash ups, and ser- ate economic value from public data.
vices based on open government data can be found A number of barriers exist to prevent the spread
in the Web-based portal data.gov of the U.S. gov- of open data. Such barriers exist at the institutional
ernment, data.gov.uk of the British government, level, the task complexity of handling the data, the
and the DataSF App Showcase of the City of San use of open data and participation in the open data
Francisco. Linked Open Data are all stored data process, legislation, information quality, and at
connected via the World Wide Web that could be the technical level. Since the start of the open data
made accessible in a public interest, without any movement, many federal agencies have adopted
restrictions for usage and distribution. a rather passive stance to open data programs by
The content of open data can be statistics, geo- indexing a minimal quantity of data while lock-
data, traffic data, education material, scientific ing more valuable datasets inside closed databases.
publications, medical studies, and even radio and There are significant differences in national rules
television programs. The term open data not only and practices regarding the execution of open data
combines stored data of the public sector, but policies. Other critics say that open data empow-
also includes data from businesses or nonprofit ers the already empowered, such as the tech-savvy
organizations. Transparency, participation, and people who do not need to be convinced that open
collaboration are the main issues of the integra- data can improve government. Various public
tion of citizens in the paradigm of “open govern- administrations have established codes of conduct,
ment,” which acts as an umbrella term for dif- specifying the uses that can be made of public sec-
ferent ideas and concepts. This evolution toward tor information. The UK code of conduct, pub-
an open state, including open politics and open lished on data.gov.uk, illustrates the conditions
administration, can be seen as the path toward a that should guarantee the quality of public sector
government 2.0. North American cities like New information when it is disseminated by citizens.
York, Chicago, Portland, San Francisco, and Van-
couver have begun to release their datasets. The Ralf Spiller
U.S. government has also done so, as have the Macromedia University
Open Society Foundations 919

See Also: Open Data; Open Source Governance; London School of Economics Karl Popper’s book
Open Source Politics; Web 2.0. The Open Society and Its Enemies (1945). In his
view, the open society is a place that permits its
Further Readings citizens the right to criticize and changes institu-
Cerrillo-I-Martinez, Augustí. “Fundamental Interests tions as they see fit; he rejected the imposed intel-
and Open Data for Re-Use.” International Journal lectual conformity, central planning, and histori-
of Law and Information Technology, v.20/3 (2012). cal determinism of Marxist doctrine. According
Geiger, Christian P. and Jörn von Lucke. “Open to Popper, any belief system or individual claim-
Government and (Linked) (Open) (Government) ing to be an “ultimate truth” is an “enemy” of
(Data).” eJournal of eDemocracy and Open the open society.
Government, v.4/2 (2012). In 1984, George Soros established the Open
Janssen, Marijn, Yannis Charalabidis, and Anneke Society Foundations to help countries make the
Zuiderwijk. “Benefits, Adoption Barriers and transition from communism. From that time,
Myths of Open Data and Open Government.” the activities of the foundations have grown to
Information Systems Management, v.29 (2012). encompass the United States and more than 70
countries in western and eastern Europe, Asia,
Africa, and Latin America. Each foundation
relies on the expertise of boards composed of
eminent citizens who determine agendas based
Open Society on local priorities.
Open Society Foundations include the following
Foundations offices and regional foundations located through-
out the world: the Open Society Initiative for East-
The Open Society Foundations (OSFs, formerly ern Africa, Open Society Foundation for South
the Open Society Institute) are a family of donor Africa, Open Society Initiative for Southern Africa,
foundations and offices founded by Hungarian Open Society Initiative for West Africa, Open
American business magnate, investor, and Society Afghanistan, Tifa Foundation Indonesia,
philanthropist George Soros that support civil Soros Foundation–Kazakhstan, Soros Founda-
society groups around the world. Aimed to build tion–Kyrgyzstan, Open Society Forum–Mongolia,
vibrant and tolerant democracies with govern- Foundation Open Society Institute–Pakistan, Open
ments that are accountable to their citizens, the Society Institute Assistance Foundation–Tajikistan,
OSFs implement local initiatives that advance Open Society Foundation for Albania, Open Soci-
justice, education, public health, and indepen- ety Foundations–Armenia, Open Society Institute
dent media. As a global network, Open Society Assistance Foundation–Azerbaijan, Open Society
Foundations aspire to build alliances across bor- European Policy Institute, Open Society Fund–Bos-
ders and continents on issues such as corruption nia and Herzegovina, Open Society Institute–Sofia,
and freedom of information. The foundations Open Society Fund–Prague, Open Estonia Foun-
place a high priority on protecting the rights and dation, Open Society Georgia Foundation, Open
improving the lives of people in marginalized Society Foundations–Budapest, Kosovo Founda-
communities, shaping public policies that ensure tion for Open Society, Soros Foundation–Latvia,
greater fairness in political, legal, and economic Foundation Open Society Institute–Macedonia,
systems, and safeguarding fundamental rights. Soros Foundation–Moldova, Foundation Open
OSFs projects include the National Security and Society Institute–Representative Office Monte-
Human Rights Campaign that opposes detention negro, Stefan Batory Foundation (Poland), Soros
of unprivileged combatants, and the Lindesmith Foundation Romania, Open Society Foundation
Center and others dealing with drug reform. The Serbia, Open Society Foundation–Bratislava (Slo-
Open Society Foundations also award grants, vakia), Open Society Initiative for Europe (Spain),
scholarships, and fellowships. Open Society Foundation–Turkey, International
The name of the foundations was inspired by Renaissance Foundation, Open Society Founda-
Austro-British philosopher and professor at the tion–London, Foundation Connaissance et Liberte
920 Open Source Governance

(Haiti), Arab Regional Office, Open Society Insti- they do in the real world, to examine how social
tute–Baltimore, Open Society Foundations–New media is changing politics and political activism in
York, Open Society Foundations–Washington, Europe, and what this means for mainstream and
D.C., and the Open Society Policy Center. fringe parties. Another example is a study com-
Since civil society initiatives and civic activ- missioned by the Open Society Foundations that
ism have entered online and have started to apply looks at how new technology serves for economic
Internet instruments in many countries, they have development and more efficient governance in
made new paths to democratization and access Turkmenistan. OSFs global research project Map-
to information. OSFs support of social media as ping Digital Media examines media digitalization
a tool to promote change, engage people, and in 60 countries around the world and looks the
make a significant political and social impact has changes connected with media digitalization and
increased during recent years. how it affects news about political, economic,
Application of Internet and social media as a and social affairs.
space for open communication and uncensored
ideas exchange has become an important part of Anastasiia Grynko
the OSF’s work in many countries, especially in National University of Kyiv-Mohyla Academy
countries where democracy suffers from media
censorship and control. Besides the funded proj- See Also: Evolution of Social Media;
ects that promote e-governance, OSFs launch new Nongovernmental Organizations; Nonprofit
interactive online platforms focused on human Organizations.
rights, transparency, public health, and educa-
tion, supporting online civic activism. OSFs’ Further Readings
grantees utilize Facebook, Twitter, and You- Open Society Foundations. http://www.opensociety
Tube to share content and initiate public discus- foundations.org (Accessed April 2013).
sions. The Open Society podcast features audio Popper, K. The Open Society and Its Enemies.
recordings of panel discussions, talks, and book London: Routledge, 1945.
launches. The podcast is delivered through RSS Soros, G. Open Society: Reforming Global
feed syndication and can be played on a com- Capitalism. New York: Public Affairs, 2000.
puter or automatically downloaded to an iPod or
other MP3 player.
Recent projects supported by OSFs have been
focused on research about social media’s impact
on democratic change in different countries. Open Source
For example, a survey of 1,865 Facebook users,
funded by OSFs, explains how Beppe Grillo, Ital- Governance
ian blogger and politician, “has used social media
to communicate, recruit and organize, growing Open source governance is a term used to describe
the Movement 5 Stelle from practically nothing the application of open source principles and prac-
to a major political force in Italy in the space of tices to governing institutions. Typically invoked
three years, with it expected to play a crucial role in the context of computer software development,
in the 2013 Italian elections.” His antiestablish- “open source” refers to a transparent and distrib-
ment message has resonated with many against uted production process, wherein both the final
a backdrop of declining trust in political insti- product and the process leading to its develop-
tutions, falling political party membership, and ment are “open” to multiple contributors and
ever-lower voter turnout. users. In some cases, open source organization
In 2011, the OSFs supported a survey of over leads to peer production: a largely self-organizing
13,000 Facebook supporters of populist parties in group of individuals who negotiate, peer review,
12 European countries, conducted to understand and collaborate to produce something that any
who these “digital populists” are, what they think, one participant would not easily be able to cre-
and how their online behavior maps onto what ate alone. The Internet, and in particular, social
Open Source Governance 921

media, with their capacity to host low-cost, net- policies, programs, and services that are
worked communication, have supported the rise developed at a lower cost.
of open source projects, with the most famous
example being Wikipedia. Barriers to Open Source Governance
Proponents of open source governance argue Governing institutions face a number of chal-
that governing institutions are more democratic, lenges when adopting the principles of open
transparent, effective, and efficient when they source governance. First, these institutions must
enable members of the public to contribute to address the question of how representative the
their work. While political parties, legislatures, sample of participants is for any given initia-
and governments have begun to adopt open tive. Research suggests that those who engage in
source principles and practices, a number of bar- online political participation are not reflective of
riers complicate their efforts. the general population. Similarly, in online col-
laborative environments, a small number of users
Drivers of Open Source Governance tend to make the bulk of the contributions. If an
Advocates of open source governance typically institution aims to use open source governance to
advance the following three arguments in its raise levels of political participation, it may not be
favor: an appropriate route.
In addition, open source governance raises
• Democratic engagement: Open source a series of legal concerns. First, when soliciting
governance introduces new and poten- information from citizens, governing institu-
tially more powerful avenues for citizens tions must ensure that adequate procedures are
to influence their governing institutions. in place to protect participants’ privacy. Second,
As a result, advocates argue that such governing institutions must develop policies on
initiatives may inspire greater rates of the ownership of goods developed via collabora-
political participation. Additionally, tive processes or that make use of data owned by
open source governance is thought to governing institutions. Third, institutions must
strengthen the representative functions consider who is accountable for the outcomes of
of governing institutions, since it can collaborative processes, in particular, when those
enable these institutions to better under- outcomes are undesirable. Finally, governing
stand and reflect the values and interests institutions may need to revise policies on citizen
of the public. engagement, because in some cases, legal restric-
• Transparency and accountability: tions addressing when and how an institution can
Advocates argue that by making the engage with the public are incongruous with the
decision-making processes of governing dictates of open source governance.
institutions open to mass collaboration, Finally, governing institutions steeped in a
institutions must share information that tradition of hierarchical decision making and
might previously have been kept from unaccustomed to open information sharing may
the public domain (both with regards to struggle to adapt to the principles of open source
the institution’s internal processes and governance. Similarly, outdated information tech-
to policy issues). As a corollary to this, nology, weak information management practices,
some argue that heightened transparency and a lack of technical expertise may hinder insti-
will bolster accountability as citizens tutions hoping to employ new technologies like
become “armchair auditors,” scrutinizing social media to engage with the public.
governing institutions with data released
for public use. Amanda Clarke
• Effectiveness and efficiency: Since open Oxford Internet Institute
source governance enables governing
institutions to draw on the insight of a See Also: Cognitive Surplus; Crowdsourcing;
broader base of individuals, advocates E-Democracy; Open.Dems; OpenGovernment.org;
argue that it will lead to more effective Transparency.
922 Open Source Politics

Further Readings reprogram policies in order to improve them. In


Benkler, Yochai. The Wealth of Networks: How open source politics, citizens are regarded as part-
Social Production Transforms Markets and ners instead of customers, in all stages of the policy
Freedom. New Haven, CT: Yale University process and in public service delivery. Citizens can
Press, 2006. rewrite the “codes” of formal policy proposals by
Noveck, Beth Simone. Wiki Government: How using new digital and online technologies. Open
Technology Can Make Government Better, source politics opens the policy process to all sorts
Democracy Stronger, and Citizens More of participants, letting them evaluate plans and
Powerful. Washington, DC: Brookings Institution projects proposed by policymakers, make recom-
Press, 2009. mendations, launch new proposals, and influence
Sifry, Micah. “The Rise of Open Source Politics.” the shift of resources from one option to another.
The Nation, v.4 (2004). Open source politics means, to a certain extent,
the replacement of current forms of governing by
new governance models that allow and enhance
direct citizen inputs in the policy process, includ-
ing citizen coproduction of policy contents. The
Open Source Politics advent of new digital tools and online collabora-
tive platforms made the implementation of this
The idea that citizens can be empowered to play a model of open source politics easier in all political
more active role in public policy through the use and administrative layers.
of Web-based collaborative tools is the basis of a Other terms such as collaborative governance,
new policy model. This new concept—open source politics 2.0, Web-enabled government, or open
politics—sees the political process as a wide and source governance, to name just a few, have also
comprehensive wiki, continuously fueled with been introduced to mainstream political discourse
new or revised contents produced by an engaged to designate a similar or the same perspective of the
citizenry. It aims to enable common citizens to policy process. In other fields, similar approaches
actively participate in the creation of public policy regarding citizen engagement have also emerged.
content through online e-participation technolo- In the media sector, for example, the term citi-
gies, and to influence policy decisions on issues of zen journalism is now frequently applied, and the
public interest. By engaging citizens in the policy same happens with the term citizen science in an
process, open source politics performs more effi- increasing number of scientific disciplines. These
ciently, more effectively, and produces more just are just two examples of the deep changes that
and equitable policy outcomes than those that have been introduced in the way that profession-
would result from the narrower perspectives that als develop their activities, in particular in the
characterize policy makers and other core stake- role given to individuals as user-generators of all
holders in conventional politics. In other words, sorts of content and perspectives. Crowdsourc-
open source politics is seen as an efficient form of ing is another example of similar changes that are
bringing into the policy decision-making process occurring in other fields, from private business to
different perspectives and a continuous flow of public policy, in this case in all tiers of the politi-
updated knowledge. cal and administrative structure.
The term and concept of open source poli- Despite the increasing acceptance and wide-
tics has been applied by authors from different spread use of this concept, some objections have
academic backgrounds with slightly different been raised regarding the term open source, in
meanings. Nonetheless, they all use it to refer particular due to the fact that the technologies
to a perspective that aims to apply in the policy used are not open source, as is the often cited case
process the principles of the open source move- of YouTube and similar Web 2.0 platforms. On
ment, developed in the software community. Like the contrary, from another perspective, it can be
open source software, which is designed to allow argued that the term open source emphasizes the
users to alter its code to make improvements, fact that it is the new information and communi-
open source politics allows citizens to change or cation technologies that are making politics and
Open Source Politics 923

Web 2.0 tools, enhances the ability of common


citizens to influence the political, legislative, and
administrative processes, at both national and
subnational tiers. These tools and platforms can
be used to deliver information to specific sections
of the population but also to proactively connect
citizens and policymakers in all stages of the deci-
sion-making process.
Open source politics contributes to the renewal
and innovation of policy content, increasing the
diversity of perspectives and experiences of par-
ticipants. It allows input from citizens of other
political perspectives, collecting knowledge and
intelligence that can rival that of the much nar-
rower and more specialized perspective of the
conventional political actor, and may benefit soci-
ety as a whole.
However, open source politics also faces a num-
ber of difficulties and weaknesses. As in other mod-
els of participative governance, there is also in this
case the risk of control of the policy process by a
group of more active citizens. Some political lead-
ers and policymakers tend to see open source poli-
A participant at an event for reThinkCali reads from the tics as a threat to their leadership role within the
organization’s online materials on a mobile device. reThinkCali.com, community, and may boycott its full implementa-
an online effort to “fix California” with residents’ help, claims the tion. Issues of trust, transparency, privacy, and con-
“world’s first virtual constitutional convention.” fidentiality are also present in open source politics
and require due consideration by those involved in
the design of these participatory processes.

the public policy process more participatory and Carlos Nunes Silva
transparent. There are different software applica- University of Lisbon
tions available that can be used to engage citizens
in a process of open source politics. Among the See Also: Crowdsourcing; Digital Citizen;
chief instruments of open source politics are the Digital Government; E-Democracy; Open Source
Web 2.0 tools (e.g., open forums, blogs, and wiki Governance.
platforms), which can be used to compile ideas
and proposals from citizens and other stakehold- Further Readings
ers around specific issues, in the initial stage of the Brabham, Daren C. “Crowdsourcing as a Model
policy process (e.g., the preparation of a policy for Problem Solving: An Introduction and Cases.”
program or urban plan), or during the implemen- Convergence: The International Journal of
tation, monitoring, or evaluation stages of the Research Into New Media Technologies,
policy process. v.14/1 (2008).
Brabham, Daren C. “Crowdsourcing the Public
Advantages and Weaknesses Participation Process for Planning Projects.”
Open source politics is seen as an open politi- Planning Theory, v.8/3 (2009).
cal process that has numerous advantages over Breslin, John G., et al. “Crowdsourcing, Citizen
conventional forms of citizen engagement in the Sensing and Sensor Web Technologies for Public
public policy process. The use of new information and Environmental Health Surveillance and
and communication technologies, in particular Crisis Management: Trends, OGC Standards and
924 OpenCongress.org

Application Example.” International Journal of making it the most popular government transpar-
Health Geographics, v.10 (2011). ency Web site in the United States.
Buchinger, Walter, et al. “Crowdsourcing: OpenCongress was launched by the Participa-
Leveraging Innovation Through Online Idea tory Politics Foundation (PPF) and the Sunlight
Competitions.” Research-Technology Management Foundation, both 501(c)3 nonprofit organiza-
(May–June 2012). tions. While the PPF runs OpenCongress, the Sun-
Formenti, Carlo. “Web 2.0: Netizen Empowerment light Foundation serves as its founding and main
vs. Unpaid Labor.” JCOM: Journal of Science sponsor. Intended to assist the public in unveiling
Communication, v.11/1 (2012). the behind-the-scenes functioning of the legisla-
Kavanagh, Eric. “Citizen Auditors—Web-Enabled, tive branch and its officials, OpenCongress seeks
Open Source Government: Models that Oversee to help individuals see the political realities (often
the Financial Holdings and Reporting Accuracy unreported or underreported by the news media)
of America’s Corporations Can Be Used to of activities on the part of their representatives
Effect Transparency in Government—Right and Congress as a whole.
Down to Where Federal Relief Funds Go for By combining government information with
Hurricane Katrina Victims.” Public Manager social media, networking, and avenues for partici-
(Spring 2006). pation, OpenCongress attempts to place Congress
Kloby, Kathryn and Maria J. D’Agostino. “Citizen 2.0. in greater context in order to bring about greater
Public and Governmental Interaction Through Web accountability by the public. In this vein, Open-
2.0 Technologies.” Hershey, PA: IGI-Global, 2012. Congress provides detailed information regarding
Manoharan, Aroon and Marc Holzer. “Active particular legislation, along with official congres-
Citizen Participation in E-Government. A Global sional reports and analyses by news media and the
Perspective.” Hershey, PA: IGI-Global, 2012. blogosphere, to provide a comprehensive portrait
Sifry, Micah. “The Rise of Open Source Politics.” (big picture) of Congress along with its workings,
The Nation, v.4 (2004). members, and various pieces of legislation. Thus,
Yahr, Emily. “Crowded House: News Organizations individuals unaware of who their representatives
Turn to Crowdsourcing to Get Readers More are can locate them by zip code, and from there
Involved in the Newsgathering Process.” American can view their senators’/representatives’ voting
Journalism Review, v.29/5 (2007). history, campaign contributors and contribution
amounts, recently sponsored bills, and stances on
various policy issues.
A key resource for users is the OpenCongress
wiki, a collaboratively written “citizens’” encyclo-
OpenCongress.org pedia on Congress. The OpenCongress wiki began
as Congresspedia in 2006, with the mission of
Founded in 2007 as a nonprofit organization, shedding more light on the political realities and
OpenCongress is an Internet resource Web site dynamics of Congress and its inner workings. In
that is open source, nonpartisan, and free to the 2009, Congresspedia merged with OpenCongress
public. Created in order to facilitate public track- to form the OpenCongress wiki. Continuing the
ing of congressional bills, OpenCongress provides mission of Congresspedia, the wiki seeks to arm
more detailed and in-depth information to the individuals and the news media with the neces-
public than found in typical news media articles. sary information to hold Congress and its mem-
By integrating articles from the news media with bers more accountable, and to bring about greater
key information surrounding legislation (e.g., transparency in the system and expose corruption.
sponsors, summaries, status, roll calls, and pub- The OpenCongress wiki allows users to more
lic reaction), OpenCongress seeks to empower closely scrutinize members of Congress and to
individuals through enhanced context and per- develop informed opinions on congressional activ-
spective. In so doing, it has developed into an ities and the political system in which they take
organization involving over 150,000 members place. Because this resource is a wiki, anyone may
and receiving about 1 million visits each month, add new, or alter current, information. However,
Open.Dems 925

the OpenCongress wiki is monitored by an official See Also: Information Aggregation; Networks,
editor and staff in order to verify the accuracy of Political; Open Source Politics; OpenGovernment.
information. org; Participatory Politics Foundation; Peer to Peer;
Another major resource offered by Open­ Transparency.
Congress, “The Money Trail,” focuses on wasteful
spending, and targets corrupt practices on the part Further Readings
of politicians. In seeking to hold elected officials Jones, K. C. “Web Sites Push for More
accountable, OpenCongress utilizes this instru- Transparency and Accessibility in Government.”
ment to show the inner workings of Congress InformationWeek (June 23, 2008). http://www
as well as the potential implications and practi- .informationweek.com/news/internet/web2.0/
cal consequences of various bills. OpenCongress showArticle.jhtml?articleID=208800273
places great emphasis on delineating key, underly- (Accessed October 2012).
ing aspects of bills such as their supporters, their OpenCongress.org. http://www.opencongress.org
funding sources, and their proposals, in order to (Accessed October 2012).
get at the “essence” of bills. The objective is to Participatorypolitics.org. http://www.participatory
inform and educate the public in order to empower politics.org (Accessed October 2012).
their political ideas and actions.
On the OpenCongress Web site, individuals
can also locate bills that they are interested in
by browsing through issue areas. OpenCongress
organizes every piece of legislation by issue areas Open.Dems
defined by the Congressional Research Service,
the nonpartisan research arm of Congress. With Open.Dems (open.democrats.org) is an open
over 4,000 issues, users can scrutinize congres- source initiative by the Democratic National
sional activity in any one of these areas. Users Committee (DNC), launched in 2010. The Web
can also examine swing votes by members of site serves as a clearinghouse for open source
Congress and find primary supporters of legisla- technologies, including APIs and other software,
tion, allowing more targeted grassroots lobbying developed by the DNC. Much of what is released
campaigns. through Open.Dems was developed by the DNC’s
In addition to allowing individuals to analyze new media shop and innovation labs, under the
and follow bills, congressional officials, and pol- purview of the DNC’s new media director, Nata-
icy issues, users can also track events through My lie Foster, hired in 2009.
OpenCongress, a social network that relies on Foster was hired after the success of the 2008
peer-to-peer communication to share pertinent Obama campaign in an attempt to maintain that
information on areas of particular interest. Social momentum and continue to develop social media
networking, along with social sharing tools, per- outreach and new media initiatives for the Demo-
mits an open exchange of information among cratic Party. Foster arrived at the job under con-
individuals. By creating a profile, users can fol- siderable scrutiny because it was widely known
low, remark, and even vote on items they are con- that the Obama for America campaign had an
cerned about in Congress. In this fashion, users’ enormous campaign database, and that after its
profiles serve to tailor information to their indi- 2008 successes, whoever took over the reins of
vidual needs and interests concerning bills, the new media and social media would do so under
legislative process, members of Congress, policy a heavy burden of expectations. Open.Dems was
issues, and more. Along with profiles of individu- one of her most noteworthy initiatives.
als utilizing resources on the OpenCongress Web The significance of Open.Dems goes beyond the
site, the collective social network helps foster availability of open source software. It is intended
personal engagement in the democratic process. as a signal that Democrats have adopted the open
source ethos and have applied it to politics, blur-
Steven J. Campbell ring the line between professional and grassroots,
University of South Carolina, Lancaster lowering the fence in order to better collaborate
926 OpenGovernment.org

and better share information and tools. At launch, Blog entries on Open.Dems have addressed
Open.Dems consisted of three main projects: an issues like OFA’s discoveries of the best strate-
open source API clearinghouse; a selection of gies for asking supporters to donate money,
computer code by DNC developers; and a blog and in particular the fact that advocacy e-mails
on new media issues relevant to the Democratic with a “donate” button increased the number of
Party, fundraising, crowdsourcing, and related unsubscribing recipients, decreased the number of
matters. One piece of code hailed at the time of responses, and failed to increase the number of
release was the Lock Box, a Rails-based code donations. Other issues covered included the use
that improved the way that multiple APIs could of splash pages in Web sites and the use of Ruby
be combined. (An API is an application program- on Rails in the Raise Your Vote’s Web site’s back-
ming interface, a protocol app developers use in end. Open.Dems also runs an associated Twitter
the creation of Web apps.) account, @opendems.
The Open.Dems project released a voter reg-
istration API, which allowed developers to cre- Bill Kte’pi
ate streamlined voter registration apps consistent Independent Scholar
with local state laws. Developers using the API
needed to sign up as a partner with Raise Your See Also: Blogosphere; Campaigns, Digital;
Vote, the DNC’s 2010-launched voter registra- Campaigns, 2012; Crowdsourcing; E-Democracy;
tion drive. Voter registration apps allow users to MoveOn.org; Open Data; Open Source Governance;
either register to vote from the Web site, or access Open Source Politics; OpenCongress.org;
the information they need to register by mail or OpenGovernment.org.
in person, depending on the registration laws
in their state. Like Raise Your Vote, the voter Further Readings
registration API was motivated by the observa- Abramson, Paul R., John H. Aldrich, and David W.
tion that Democratic success in elections largely Rohde. Change and Continuity in the 2008 and
rose and fell with voter participation. In par- 2010 Elections. Washington, DC: CQ Press, 2011.
ticular, the 15 million new voters in the historic Corn, David. Showdown: The Inside Story of
2008 presidential election were overwhelmingly How Obama Battled the GOP to Set Up the
Democratic voters, many of them coming from 2012 Election. New York: William Morrow
traditional Democratic bases like young people, Paperbacks, 2012.
blacks, and Latinos. Mayer, William G. and Jonathan Bernstein, eds.
Open.Dems’ Polling Place API allowed develop- The Making of the presidential Candidates 2012.
ers to incorporate dynamic polling place lookup Lanham, MD: Rowman & Littlefield, 2011.
in their applications, to make it easy for users
to find their nearest polling place. Open.Dems
also released a mobile app, on both iOS (iPhone,
iPad) and Android platforms, for Organizing for
America, the grassroots registration program OpenGovernment.org
that succeeded the Obama for America campaign
organization. OpenGovernment.org is an open source, pub-
The canvassing iOS and Android app released lic Web site that was launched in January 2011.
by Open.Dems was praised by many users, pro- Designed to allow users freer access to information
viding information about Obama supporters in on state and local government, the site seeks to
the canvassed region, as well as bringing up a list arm citizens with the necessary knowledge to hold
of local organizing events and allowing canvass- government and governing officials accountable.
ers to take notes on their conversations with vot- Created by the Participatory Politics Foundation
ers, which are uploaded to campaign headquar- (PPF) and the Sunlight Foundation, two 501(c)3
ters. Released in 2010, it was considered the most nonprofit organizations, OpenGovernment is a
important and effective campaign tool released nonpartisan, public resource. By displaying aggre-
that campaign season. gated information on government, together with
OpenGovernment.org 927

information such as campaign contribution data before sending it to OpenGovernment. Once


and online social commentary, OpenGovernment acquired, OpenGovernment then contextualizes
seeks to provide the most user-friendly experience this data with information from sources such
available when viewing state- and local-level polit- as press accounts, the blogosphere, discussion
ical information. In addition, OpenGovernment forums, and social media. By complementing
provides avenues for public participation through this with a range of public engagement instru-
various instruments in seeking to advance greater ments, OpenGovernment provides citizens with
civic engagement and transparency at state and a user-friendly Web page for acquiring informa-
local levels of government. tion on a variety of governmental actors, issues,
The central goal of OpenGovernment is to and processes at the state level. Equipped with
provide a comprehensive, easily accessible site such knowledge as committee assignments, full
for locating political information on state/local texts for bills, interest group ratings, and vote
government. In order to shed more light on state analyses, users can see what really goes on in
government, PPF and the Sunlight Foundation their state legislatures.
founded OpenGovernment as a joint venture Visitors to OpenGovernment can track bills via
along with the community-initiative Open States RSS feeds, comment on bills, convey information
Project. With information on six state legislatures to others via social sharing tools, and contrib-
(California, Louisiana, Maryland, Minnesota, ute to public knowledge of bills via peer-to-peer
Texas, and Wisconsin), OpenGovernment plans communication. In addition, OpenGovernment
to extend its reach to include the remaining state allows users to find, track, and contact their rep-
governments—along with a handful of big city resentatives via e-mail straight from OpenGov-
governments—in the near future. ernment’s Web page. With such built-in mecha-
Derived from the same group that created nisms, citizens can organize grassroots call-ins to
OpenCongress.org, a Web site devoted to greater officials on important votes, and coordinate mass
transparency on U.S. congressional members and e-mailing to make officials aware their constitu-
activities, OpenGovernment was modeled after ents are watching. By providing engagement tools
this project. In attempting to hold state/local gov- such as the ability to sort bills by “most-viewed,”
ernments more accountable, OpenGovernment “date,” and “most-in-the-news,” users can read-
was intended to serve an analogous role to Open- ily acquire crucial information that was previ-
Congress—that is, fostering greater transparency ously inaccessible. OpenGovernment’s offerings
in government—at subnational levels of govern- also lend themselves to journalists in their report-
ment. To carry out this task, OpenGovernment ing of political news as well as to citizen activists
brings together state/local legislative information and watchdog groups.
with news articles, voter/voting databases, blog
postings, public online forums, social media com- Conclusion
mentary, wiki platforms, and other resources to OpenGovernment seeks to ensure compliance
allow citizens to see the true happenings in gov- by all three branches of government (executive,
ernment. By combining government data and legislative, and judicial) at all levels of govern-
information on state officials with databases, ment (local, state, national) with the principles of
press coverage, and social media, OpenGovern- open government data. These principles include
ment seeks to facilitate the process of citizens notions such as the following: government infor-
acquiring information relating to important bills, mation should be readily available to the public,
activities of legislators, campaign contributions, should be made public completely and without
and more. delay, and should be accessible to all online in
Official state government Web sites, such as order to foster public trust in the political sys-
those with “.gov” URL addresses, serve as the tem. However, OpenGovernment faces the politi-
main foundation for government information on cal realities of state governments not living up to
OpenGovernment’s site. The Open States Proj- these principles and best practices. Public access
ect first processes this data (e.g., bills, roll calls, to even basic government data on bills and voting
legislative actions) into a standardized format can be severely limited. Though OpenGovernment
928 OpenLeaks

seeks to make such vital information easily acces- WikiLeaks, which set the standard for online
sible to the public, even displaying state legisla- whistleblowing, OpenLeaks does not receive or
tive actions such as roll calls in real time to the publish documents on its Web site, but its part-
public is still not possible. ners can receive leaked content on their Internet
domains via a digital dropbox within the Open-
Steven J. Campbell Leaks network. OpenLeaks is one of the major
University of South Carolina, Lancaster digital whistleblowing projects, which was popu-
larized after the rise of WikiLeaks.
See Also: Information Aggregation; Networks, OpenLeaks has often been defined as a Wiki­
Political; Open Source Politics; OpenCongress.org; Leaks spinoff because of Domscheit-Berg’s affili-
Peer to Peer; Transparency. ation with WikiLeaks and some similarities in
terms of technology and purpose. The entire
Further Readings OpenLeaks project started as a detachment from
Howard, Alex. “OpenGovernment.org Connects Julian Assange’s platform. One of the major par-
State Government to Citizens.” Radar: News & allels is the opportunity for whistleblowers to sub-
Commentary (January 18, 2011). http://radar mit sensitive documents in a safe and anonymous
.oreilly.com/2011/01/opengovernment-platform way using an online dropbox. However, Open-
-launches.html (Accessed October 2012). Leaks focuses more on a collaborative orientation
OpenGovernment.org. “OpenGovernment.” with interested parties. Unlike WikiLeaks, Open-
http://www.opengovernment.org (Accessed Leaks was not created as a platform to publish
October 2012). documents, but instead to make leaked informa-
“OpenGovernment.org—Researching U.S. State tion available to interested and trusted recipients.
Legislation.” Legal Information Institute, Cornell OpenLeaks argues that the whistleblowing pro-
Law School (December 5, 2011). http://blog.law cess has to be rethought: WikiLeaks centralizes all
.cornell.edu/voxpop/2011/12/05/opengovernment steps in the whistleblowing process, from receiv-
-org-researching-u-s-state-legislation (Accessed ing to publishing leaked information, whereas
October 2012). OpenLeaks wants to abandon this concept by
separating submitted documents from their pub-
lication. In contrast to WikiLeaks, which tends
to publish documents without involving external
partners, OpenLeaks aims to give leaked content
OpenLeaks to the best receivers for editing, fact checking, and
publication, acting as a neutral conduit between
OpenLeaks is a whistleblowing online project anonymous sources and recipients.
founded in September 2010, by former WikiLeaks When submitting documents to OpenLeaks,
spokesperson Daniel Domscheit-Berg with former sources must decide where and how their data
employees of WikiLeaks. OpenLeaks aims to pro- will be leaked. Sources can name an organiza-
vide technological tools and know how to every tion within the OpenLeaks network to address
organization or media outlet interested in giving their leaks, or give the information to the whole
whistleblowers a channel to anonymously submit community. OpenLeaks’ perspective is to increase
material and documents on the Internet. Open- “direct leaking for socially localized, and not just
Leaks presents itself as a technical framework and global, issues,” providing a transparent whistle-
knowledge base aimed to enable whistleblowers blowing process by involving trustful organiza-
to disseminate data to third parties. tions when it comes to editing and publishing
However, unlike similar Web sites, OpenLeaks’ leaked information. In OpenLeaks’ vision, coop-
vision of whistleblowing involves working in eration with partners will ensure more transpar-
cooperation with partners such as nongovern- ency and accountability to the platform, together
mental organizations, media outlets, unions, and with more protection for people mentioned in the
human rights organizations in order to share leaked documents. In addition, OpenLeaks’ com-
the process of digital leaking. Different from mitment to source privacy and safety confirms
OpenLeaks 929

its platform with a security penetration test, ask-


ing CCC hackers to stress the OpenLeaks infra-
structure as much as possible in order to check
its safety and reliability. The launch failed again.
In April 2012, during the Share 2 Conference in
Belgrade, Daniel Domscheit-Berg announced that
OpenLeaks had set up offices and workshops to
train activists and journalists on how to safely
handle digital whistleblowing. The creation of the
OpenLeaks structure was instead announced as
“on the way,” but no leaks appeared. In Decem-
ber 2012, a blog post on the OpenLeaks Web site
announced that the project was still alive. At this
stage, OpenLeaks was presenting itself as more
focused on the transfer of know how for organi-
zations willing to provide a whistleblowing ser-
vice, while the provision of such a service seemed
to be secondary. However, in April 2013, the Web
page for OpenLeaks was offline.
The OpenLeaks project has been highly debated
in the hacker community and in the media. Daniel
Domscheit-Berg left WikiLeaks in 2011 because
of intense discord with Julian Assange. Later
that same year, he published his memoirs, Inside
Daniel Domscheit-Berg, now of OpenLeaks, speaking about WikiLeaks, revealing details about the organiza-
WikiLeaks at the hacker convention Chaos Communication tion and mentioning a cache of data that Dom-
Congress in December 2009 in Berlin, Germany. scheit-Berg and another ex-WikiLeaks staffer,
known as “The Architect,” took with them when
leaving WikiLeaks. Among the data taken was the
submissions system, together with the archive of
the platform’s role as a neutral conduit. Still, as published documents, and thousands of unpub-
OpenLeaks appears to still be in a preparatory lished documents. The further deletion of Wiki­
phase, only its declaration of intent can be ana- Leaks’ unpublished documents by Domscheit-
lyzed. However, OpenLeaks’ activities go further Berg and The Architect signaled the height of the
than technology and coding—recently, the project internal dispute between WikiLeakers and Open-
has also been working in the field of knowledge Leakers. As a consequence of this struggle, Dan-
sharing, organizing workshops on encryption and iel Domscheit-Berg was expelled from the hacker
digital whistleblowing to encourage other orga- association Chaos Computer Club in 2011, but
nizations to build similar platforms with proper he was readmitted in 2012.
skills and competence.
OpenLeaks’ domain was registered in Septem- Philip Di Salvo
ber 2010, and was launched in December of that Colin Porlezza
year. In January 2011, OpenLeaks was supposed Università della Svizzera Italiana
to launch its operations together with the German
dailies Die Tageszeitung and Freitag, Denmark’s See Also: Activists and Activism, Digital;
Dagbladet Information, Portugal’s Expresso, and Hacktivism; TuniLeaks.org; WikiLeaks.
the Berlin-based Foodwatch nonprofit group.
Yet, the operation never started. In August 2011, Further Readings
OpenLeaks staff attended the Chaos Communica- Beckett, Charlie. WikiLeaks: News in the Networked
tion Camp (CCC) in the suburbs of Berlin to test Era. Cambridge, MA: Polity Press, 2012.
930 OpenTunisia.org

Brevini, Benedetta, Arne Hintz, and Partick games and forum creation tools. For people who
McCurdy, eds. Beyond WikiLeaks: Implications do not have the funds to purchase expensive soft-
for the Future of Communications, Journalism and ware, this removes an important barrier to access
Society. New York: Palgrave Macmillan, 2013. of full digital citizenship. More specialized tools,
Domscheit-Berg, Daniel. Inside WikiLeaks: My including voting record wikis, contact informa-
Time With Julian Assange at the World’s Most tion lists, and online government reform discus-
Dangerous Website. New York: Crown, 2011. sion groups are also easily accessible via the page.
Greenberg, Andy. This Machine Kills Secrets: Some of the more influential tools available
How WikiLeaks, Cypherpunks and Hacktivists on OpenTunisia include Mumble, a voice over
Aim to Free the World’s Information. New York: Internet protocol (VoIP) service that makes tele-
Dutton, 2012. phony affordable to the masses; Dev.TN, a lab in
which application developers can access tools to
help them innovate new means of creating links
between Tunisians and their government; Images
.TN and Pad.TN, image hosting and collabora-
OpenTunisia.org tion wiki sites that allow Tunisians to publish pho-
tos to a secure cloud service and to work on joint
OpenTunisia.org is a Web site created at the begin- projects or have group discussions in real time;
ning of the Arab Spring. It reflects a host of online and RoundCube, a free Web mail service. Each of
activities undertaken by the Arab diaspora in sup- these efforts is a reaction against Tunisia’s history
port of their compatriots’ goals of political reform of censorship and political repression.
and open and accountable government. This par- During times of political unrest, it is common
ticular site is the brainchild of Internet activist for regimes to cut off access to mobile phone
Chemseddin Ben Jemaa, a Tunisian expatriate who networks and social media. However, tools like
registered the domain name toward the beginning Mumble allow people to gain phone access as
of the Arab Spring, in February 2011. According long as they can find a Wi-Fi hotspot for their
to the site, it is part of a much larger project to smartphone, or have alternative Internet access.
promote open governance, access to information, Although this could also be restricted by a deter-
and government transparency and accountability mined government, the potential fallout and sig-
in Tunisia. This effort includes external sites with nals of threat perception make attempts to shut
specialist aims like OpenGov.TN, which hosts down local Internet a last resort for most regimes.
discussions and creates white papers on proposed Likewise, it is essential for regimes to provide
reforms to make the Tunisian government more work opportunities for their populations, and
accessible to citizens. technological innovation is often an important
Open governance and responsiveness and part of achieving this end. The Dev.Tn platform is
access to the citizenry are difficult goals to achieve a valuable asset because it allows budding appli-
for even the most well-established liberal regimes. cation developers to innovate, to access tools
In the case of Tunisia, there is a long history of they couldn’t otherwise afford for making better
government by dictators who allowed wide dis- products, and to gain skills that could make them
cretion in personal life, but required loyalty to more employable, while furthering OpenTunisia’s
one-party rule in public life. In order to establish goal of improving access to the government.
a clean break with its past, activists like Chemsed- Image hosting is already available on sites
din Jemaa believe that average Tunisians must like Flickr and Tumblr, but Images.TN is not a
have instant access to not just information, but typical image-sharing facility, but rather a hacker
also to tools that help them interpret, interact space, as its Web banner demonstrates. Its image
with, and distribute that information. This is why library and Twitter feed allow users to interact
registered users of the site gain access to an inter- with one another in an online community and to
face with a variety of cloud computing applica- post images relevant to the pro-open information
tions. These include common functions like word goals of the group. Coupled with the collabora-
processing and database management, as well as tive opportunities from HackerPad (Pad.Tn), this
Opinion Leader Theory 931

type of community represents not just a reaction of communication elaborated by Paul Lazarsfeld
against the former regime, but also an affirma- and Elihu Katz. Despite the enduring popularity
tion that the group intends to ensure that the new of the concept of opinion leadership, academic
regime is true to its promises of political free- researchers have only recently begun to explore
dom and transparency. Finally, RoundCube pro- the ramifications of online opinion leadership.
vides one of the most basic tools for those seek- Online opinion leaders differ from their offline
ing an online presence, an e-mail address. This equivalents. The major distinction in the online
effort may seem redundant because the ubiquity environment is that opinion leaders and nonlead-
of enormous cloud Web mail services, but it is a ers are much more similar than they are in the
means of placing a Tunisian identity on a tool that offline world.
ultimately becomes highly linked to most users’ In 1940, a group of researchers guided by
personal lives and identities. Paul Lazarsfeld investigated how much influence
OpenTunisia.org is part of a broad trend in the mass media exerted during presidential elec-
online political activism to require states and tions. They focused their attention on the media’s
regimes to be more transparent, more accessible role in the election between Democratic incum-
to constituents, and more accountable when rep- bent Franklin Delano Roosevelt and Republican
resenting their aims and goals. Its suite of basic challenger Wendell Willkie. To gather data, they
computing software and community-building and set up an extensive infield study in Erie County,
political activism tools are one way in which activ- Ohio. The study’s results indicated that neither
ists like Chemseddin Ben Jemaa can make technol- radio nor print had as much influence on voters
ogy more democratic, and can potentially make as had been suspected. The researchers found that
their democracies more stable and responsive. most of the people studied relied more on other
people for the information they used to make vot-
Jeremy Kleidosty ing decisions. Lazarsfeld then began to study the
University of St. Andrews individuals who were relied on for information,
calling them “opinion leaders.” He found that an
See Also: Africa, north; Arab Spring; TuniLeaks.org; opinion leader could be just about anyone. How-
Tunisia; WikiLeaks/Arab Spring. ever, further analysis revealed that opinion lead-
ers were better informed than the average person,
Further Readings and in general, they tended to read more newspa-
Bachrach, J. “Wikihistory: Did the Leaks Inspire the pers and magazines and listen to more radio news
Arab Spring?” World Affairs, v.174/2 (2011). and commentary.
Jemaa, Chemseddine Ben. “Les hackers dans Furthermore, Lazarsfeld and Katz advanced the
le cite arabe.” WordPress.com. http:// idea that one or more of these factors make note-
leshackersdanslecitearabe.wordpress.com worthy opinion leaders: expression of values, pro-
(Accessed June 2013). fessional competence, and nature of their social
OpenTunisia.Org. http://www.opentunisia.org network. Opinion leaders seek the acceptance of
(Accessed June 2013). others and are especially motivated to enhance
their social status. They can influence mem-
bers in the social community because of special
techniques, knowledge, personalities, and other
unique qualities, and are commonly described as
Opinion Leader Theory people with high social participation, status, and
responsibility. Opinion leaders are seen as trust-
Opinion leadership is conducted by an active worthy and nonpurposive. People do not feel that
media user who interprets the meaning of media they are being tricked into thinking a certain way
messages or content for lower-end media users. about something from someone they know. On
Typically, the opinion leader is held in high regard the contrary, the media can be seen as forcing a
by those who accept his or her opinions. Opinion concept on the public, and is therefore less influ-
leadership comes from the theory of two-step flow ential. While the media can act as a reinforcing
932 Opposition Videographer

agent, opinion leaders have a more changing leaders and nonleaders are more similar than they
or determining role in an individual’s opinion are different in terms of the interactivity and mes-
or action. As a result of his findings, Lazarsfeld sages that they post. All posters, regardless of
developed the two-step flow theory of commu- opinion leader status, would classify their posts
nication. This theory advanced the concept that: as “reactive messages” to express their opinion.
the mass media influence certain individuals, and The popularity of reactive messages challenges
these individuals personally influence others. Sub- the general assumption that interactive messages
sequent studies of the 1952 and 1956 presiden- are the most desired form of communication in
tial elections by Campbell, Converge, Miller, and the online, networked environment. The general
Stokes substantiated Lazarsfeld’s findings. public is not necessarily writing messages to seek
Opinion makers in social media can be blog- information, challenging the assumption that
gers, journalists, or even message board members media audiences are primarily information and
who command a certain following among their opinion seekers. The online environment does not
readers. There have been a number of metrics try- encourage interactive message exchanges among
ing to assert the exact influence of social media discussants; however, it does promote mutual dis-
and its opinion makers, however, the methodolo- course and role interchanges among participants
gies and approaches greatly differ. Also, there is of a news-oriented online community.
a heated discussion of whether opinion leaders,
influentials, or simply “very central people” (as Marco Morini
seen from a network perspective) are able to gen- Macquarie University
erate viral postings. With the advent of Web 2.0,
Web sites where consumers voluntarily contribute See Also: Alpha Bloggers; Minimal Effects Theory;
product reviews have prospered. By sharing their Network Influentials; YouTube.
opinions on online forums, consumers also influ-
ence others’ opinions and ideas. This leads to the Further Readings
formation of a network of trust among reviewers, Bucy, E. and Chen-Chao Tao. “The Mediated
with high-degree individuals acting in the opinion Moderation Model of Interactivity.” Media
leaders. There are several famous Web sites that Psychology, v.9 (2007).
provide forums for user-generated content, pro- Gnambs, T. and B. Batinic. “Convergent and
viding mechanisms under which users can extend Discriminant Validity of Opinion Leadership:
links to other users whose opinions or content Multitrait-Multimethod Analysis Across
they value, thus leading to a networked commu- Measurement Occasion and Informant Type.”
nity. Examples of such Web sites include YouTube Journal of Individual Differences, v.39 (2011).
for sharing videos, IMDb and Rotten Tomatoes Rose, P. And J. Kim. “Self-Monitoring,
for opinion sharing on movies, and social net- Opinion Leadership and Opinion Seeking:
works such as Facebook, Myspace, and Twitter. A Sociomotivational Approach.” Current
One of the key features of online review com- Psychology, v.30 (2011).
munities is that the network structure and indi-
vidual behavior are dynamically changing over
time. Over time, reviewers may receive new
incoming trust links and contribute new reviews,
both of which increase their attractiveness to Opposition
other members of the community. Compared
with offline social networks, the cost of chang- Videographer
ing structural and behavioral characteristics
is smaller in online settings, and therefore the Opposition videography, a form of video activ-
dynamic properties are salient. ism, is the practice of shooting political incidents
In general, online opinion leaders differ from and accounts as documentary evidence against an
those identified and characterized in traditional opposing political faction, such as filming warfare
studies of opinion leadership. Both online opinion and political statements for release in court trials,
Opposition Videographer 933

traditional media, and social media to mobilize powerful than a tank, challenging the “control
civic resistance or affect a political campaign. Its paradigm” as discussed by McNair, by subverting
dynamic impact on the political agenda has both the hegemony of society through media control.
encouraged and been compounded by the explo- Opposition parties now use cameras and social
sion of citizen journalism and the viral distribu- media as weapons, creating new tactics for activism.
tion of opposition videos through social networks Video evidence of atrocities wins over new citizen
and new media. supporters and soldiers to a movement, convinces
An example is witness footage that is e-mailed opponent soldiers to defect and other nations to
to others to circumvent social media firewalls, intervene, and documents evidence for war crimes
uploaded as YouTube clips, propagated through trials and the court of international opinion on
tweets and Facebook protest pages, and then the World Wide Web. This serves as a direct and
broadcast via television news and documenta- divisive way of wielding power by a people over a
ries. New media and citizen journalism is then government, corroding the legitimacy of a regime
reintegrated with “legacy” media, transforming in the eyes of its people and the world, and forcing
one-way transmission media into two-way inter- response from foreign diplomats.
active media. Videos said to incite violence often ignite calls
Videographers range from professionally trained for their censorship or banning from the Web
camerapersons contracted to shadow a politician (such as the outcry over The Innocence of Mus-
or campaign (such as Hassan Gol Khanban, the Ira- lims), which in turn fuels controversy and debates
nian president’s videographer who defected while about freedom of expression. In forcing politi-
filming the president’s attendance at the United cians to respond, the power is proven to sit firmly
Nations), to citizens armed with cell phones, such in the hands of the videographer.
as the volunteer brigade of video activists filming Whereas traditional documentaries often avoid
footage for the Free Syrian Army. or fictionalize the sight of bodies and ground wars,
The practice of opposition videography stems Patricia Rodden Zimmerman argues that insur-
from the use of video by political parties as propa- gent documentary practice reclaims this ground,
ganda in fundraising and advertising campaigns, and employs reconnaissance and new technolo-
as well as traditions of media activism and advo- gies as a new offensive strategy.
cacy documentary pioneered by filmmakers such Arab Spring opposition videos are often
as John Grierson. gruesome, evoking martyrology, which in turn
Filmmaker Sergei Eisenstein theorized that the increases their social media virality and becomes
politicized spectator is made to react demonstra- a rallying cry for revolution. An example is the
tively by the “agitational spectacle” of film, simi- death of “Neda,” an Iranian woman whose Twit-
lar to receiving a shock or blow to the psyche. ter hashtag transformed her into an icon of Iran’s
Jane Gaines extends this theory, describing spon- unrest. In cultures such as Iran, where traditions
taneous audience activism as a sign of the politi- of honoring martyrs and revolting against tyr-
cized body and an example of political mimesis, anny are considered duties to God, tribute sites
in which the sensationalized on-screen body pro- quickly proliferate. Mourning rituals also invoke
duces a mimicry of emotion and visceral sensa- the commemoration of deaths at cyclical inter-
tion in the body of the spectator. vals. This triggers further political crisis as the
viral dissemination of videos of death then esca-
Arab Spring lates a cyclical contagion of rebellion.
Since the Arab Spring, opposition videography In response, opposition videographers are
has emerged as a growing phenomenon with star- frequently labeled terrorists or accused of fal-
tling power to mobilize civic engagement, fueled sification by parties they oppose. Questions of
by increasing access to social media and cam- impartiality, authenticity, credibility, and the use
era phones. With the ubiquity of digital devices, of video as propaganda then arise, together with
opposition videography is even possible for a issues of censorship, government controls on
bystander with a mobile to create. This makes media and Internet access, and the safety and sur-
skills in mobile phone repair arguably more veillance of citizen journalists.
934 Opposition Videographer

Republican presidential and vice presidential candidates Mitt Romney and Paul Ryan in front of the cameras at a campaign rally in
Norfolk, Virginia, on August 11, 2012. Romney’s campaign was seriously affected by an opposition video that captured him saying,
“There are 47 percent of the people who will vote for the president no matter what . . . who are dependent upon government, who
believe that they are victims,” at private fundraiser attended by wealthy donors in Boca Raton, Florida, on May 17, 2012.

To suppress activism and the power of oppo- Sue Curry Jansen states that inverse surveil-
sition footage, regimes frequently impose media lance, such as the use of cameras as a “copwatch,”
blackouts, and journalists become the first targets becomes another form of activism that challenges
both on the front line and social media. Media existing power relationships. Social media and
outlets, frequently unable to obtain access or videography, both technologies of mobiliza-
visas for foreign journalists, are forced to rely on tion, are often combined with the use of open
footage by opposition videographers. Opposition software for circumventing surveillance, turning
factions also smuggle in journalists who risk their software freedom and information control into
lives and those of their sources by both shoot- issues of social justice. Patricia Rodden Zimmer-
ing and sharing footage. Faces are obscured, by man argues that the use of emerging technology
filming over people’s shoulders so that opposition as proactive ambush achieves an intervention in
supporters cannot be identified by facial recogni- public discourse and both national and transna-
tion software and added to wanted lists. tional media flows.
With the rise of citizen journalism, there have
also been sharp rises in the statistics of impris- U.S. Politics
oned and murdered videographers. One exam- Video ambushes are frequently deployed both
ple is Syrian opposition videographer Ahmad domestically and internationally, as exempli-
Hamada, who filmed his own death during the fied by U.S. election tactics. Mitt Romney’s
siege of Homs this year. reputation greatly suffered from the release of
Outparty Innovation Incentives 935

opposition videos during the 2012 campaign. Outparty Innovation


Some press speculated they originated from the
McCain camp. The Democratic National Com- Incentives
mittee also appropriated Sarah Palin’s clips into
their videos targeting Romney’s refusal to release The outparty innovation incentives thesis was
his tax returns. The ensuing media storms effec- first articulated by David Karpf in his book The
tively undermined and intervened in discourse on MoveOn Effect: The Unexpected Transforma-
Romney’s election platform. Technically labeled tion of American Political Advocacy. In this
“opposition videos” because of their deliberate book, Karpf takes a close look at the organiza-
collection or reediting by a political opponent and tional layer of American politics, with an eye
their opposing position, any such material holds toward understanding the role of communica-
immense power to influence the press, voters, and tion technology in reshaping the structure, prac-
national debate, particularly when virally dissem- tices, and tactics of new political organizations.
inated through social media. The “MoveOn effect” refers to the new, techno-
logically driven membership structures, as well
Conclusion as the fundraising and mobilizing tactics pio-
With the proliferation of video technology, the neered by the progressive advocacy organization
number of sites for cultural struggle has also MoveOn.org, starting in the early 2000s. Follow-
multiplied. Opposition videographers now fre- ing MoveOn’s successful example, a new genera-
quently rely on mapping-enabled camera technol- tion of Internet-mediated progressive political
ogy, cryptography for privacy protection, hacking organizations has emerged by similarly adopting
skills, and cutting-edge software to circumvent and leveraging new technological innovations to
firewall blocks and surveillance, bringing libera- redefine their membership and mobilize support.
tion technology to the forefront of social media Through extensive analyses, Karpf notes that
and the front line. This has reinforced the use and these organizations have mostly flourished on the
importance of the digital media landscape as a left side of the ideological spectrum. In address-
second battlefield, escalating a digital arms race ing the reasons for the gap between liberals and
between opposition videographers and the politi- conservatives in Internet-mediated political group
cal parties they challenge. infrastructure, Karpf makes the strongest case for
the outparty innovation incentives thesis.
Wendy Dent Building on the concept of opportunity struc-
University of Southern California tures in social movement research, the outparty
innovation incentive thesis postulates that the
See Also: Activists and Activism, Digital; Arab political party out of power has stronger incen-
Spring; Campaigns, 2012; Citizen Journalism; Going tives to pursue novel communication platforms,
Viral; News Media; Online Smear Campaigns; Syria; as well as campaign tactics and strategies, and it
Vlogging; YouTube. often more aggressively adopts innovative tech-
nological tools. Karpf suggests that this explains
Further Readings increasingly dramatic adoptions of new techno-
Gaines, Jane and Michael Renov, eds. Collecting logical tools on the progressive side, starting in
Visible Evidence. Minneapolis: University of the early 2000s—a direct outcome of the progres-
Minnesota Press, 1999. sive countermobilization efforts in the aftermath
Jansen, Sue Curry. Media and Social Justice. New of the 2000, 2002, and especially the 2004 elec-
York: Palgrave Macmillan, 2011. tions. In accordance with this main premise, the
McNair, Brian. Cultural Chaos: Journalism, News outparty innovation incentives perspective plays
and Power in a Globalised World. New York: out similarly at three different levels of analysis—
Routledge, 2006. the political organization, candidate, and party
Zimmerman, Patricia Rodden. States of Emergency: network levels.
Documentaries, Wars, Democracies. Minneapolis: At the political organization level, Karpf’s
University of Minnesota Press, 2000. thesis suggests that whereas nascent political
936 Outparty Innovation Incentives

organizations are born all the time, it is primar- older set of consultants, it is only after a string
ily during periods of oppositional politics that of electoral losses that a party network readily
they fully leverage new technological affordances. adopts new campaign technologies. This trend,
Political organizations are more motivated to Karpf suggests, is bound to continue for as long
adopt new communication technologies when the as the American political system relies on profes-
political party they are affiliated with is out of sional consultants devoted to managing elections,
power, and as a result they see the highest levels of regardless of what the prevailing communication
donations and volunteer support during periods technologies are at any given time.
of countermobilization, when they can serve as Beyond the power dynamics among political
outlets for political discontent. As MoveOn.org parties in any given election cycle, there are other
demonstrated, harnessing technological tools in possible explanations for the adoption and use
countermobilization efforts can yield highly suc- of novel technologies in the political arena. For
cessful membership and fundraising patterns. In example, one such explanation pertains to the
particular, by thinking of everyone on their e-mail specific makeup of a political constituency of any
list as a member, these organizations are able to given candidate or party. Factors such as age, edu-
reach the broadest possible audience and target cation, income, ethnicity, and urbanization have
their fundraising appeals to salient issues in the long been noted as important predictors of both
media at any given time. Internet usage and political and civic engagement
At the candidate level, the outparty innova- among voters. Consequently, it is possible that
tion incentives thesis submits that individuals the makeup of the democratic constituency holds
who are thought to be long-shot candidates typi- more explanatory power regarding Democrats’
cally have strong incentives to adopt tactics that countermobilization efforts in the aftermath of
are both novel and unconventional. Given that the 2000, 2002, and 2004 election losses than
the formal campaign rules established by law are their out-of-power status.
not easily amenable to change, candidates who In addition, while the outparty innovation
are widely expected to lose often attempt to alter incentives thesis strikes a largely optimistic note
the rules of the game instead, tinkering with the regarding the role of new communication tech-
tactical norms and supporting technologies. As nologies in American politics, some scholars
perhaps one of the most notorious examples of have cautioned against hyperbolizing their over-
innovative campaigning, Karpf notes Howard all impact on democratic health. For example,
Dean’s 2004 campaign, fueled by a novel com- in “The Myth of Digital Democracy,” Hindman
munication strategy that allowed supporters to suggests that despite facilitating important trans-
self-organize through social networking sites like formation in political mobilization, new commu-
Meetup.com. Likewise, Barack Obama’s Internet- nication technologies have failed to give a voice
mediated campaign in caucus states is precisely to the voiceless. The vast majority of online politi-
what sealed his Democratic presidential nomina- cal messages, he says, are being created and fil-
tion in the 2008 election, where Hillary Clinton tered by a relatively small group of media elites,
was largely presumed to be a frontrunner. In light in stark contrast to the Internet’s early promise of
of these examples, Karpf further notes that not all citizen empowerment.
technologically innovative campaigns are bound
to succeed. Such campaigns are able to alter pre- Carmen Stavrositu
vailing strategic norms and rules only when they University of Colorado
attract substantial financing and media attention,
and when they are highly contested. See Also: MoveOn Effect, The; MoveOn.org;
Last, at the party network level, Karpf suggests Political Parties.
that power is a zero-sum game, whereby funding
for innovative campaigning strategies replaces Further Readings
funding for older tactics. Given that new techno- Castells, Manuel. Networks of Outrage and Hope:
logically driven strategies come attached to a new Social Movements in the Internet Age. New York:
set of campaign consultants, at the expense of an Polity Press, 2012.
Oxford Internet Institute 937

Hindman, Mathew. The Myth of Digital Democracy. communication, and the social sciences. The OII
Princeton, NJ: Princeton University Press, 2008. again expanded its teaching offerings in 2009 with
Karpf, D. The MoveOn Effect: The Unexpected the introduction of a one-year master’s degree in
Transformation of American Political Advocacy. the social science of the Internet.
New York: Oxford University Press, 2011.
Research
The OII focuses its research around five broad
themes: everyday life, governance and democracy,
network economy, science and learning; and shap-
Oxford Internet ing the Internet (i.e., governance of the Internet).
In exploring these themes, its researchers employ
Institute a variety of quantitative and qualitative methods,
including traditional social science approaches
The Oxford Internet Institute (OII) is a multidis- (e.g., interviews, focus groups, ethnography, and
ciplinary department of the University of Oxford surveys) and more innovative methodologies that
that carries out research and study of the relation- are both appropriate to, and in some cases reliant
ship between society and the Internet. A number on the Internet and related technologies. These
of the OII’s research projects explore the role of include Web metrics (the study of the underlying
social media in contemporary politics, often by structure of the World Wide Web), Web-based
employing innovative research methods made experiments, social network analysis, and big
possible by the Web and related technologies. data analysis (research that makes use of large-
scale sets of data generated by the use of Inter-
History net-related technologies by citizens, governments,
The Oxford Internet Institute (OII) was officially firms, and social enterprise).
founded in 2001, drawing on the leadership of Researchers at the OII have managed major
Andrew Graham, master of Balliol College (Uni- research projects funded by the UK government,
versity of Oxford), Professor Richard Susskind, the European Union, and private and third-sector
Derek Wyatt (former member of the United King- donors. In addition, the OII’s biannual Oxford
dom [UK] parliament), and the software entrepre- Internet Survey (OxIS) serves as the UK’s contri-
neur and philanthropist Dame Stephanie Shirley, bution to the World Internet Project. OxIS tracks
who endowed the Institute. From its inception, the Internet use and attitudes in the UK over time,
OII has aimed to be the world-leading, indepen- beginning in 2003.
dent center for the multidisciplinary study of soci-
ety and the Internet. In 2002, Professor Bill Dutton Social Media and Politics
was appointed as the OII’s first director, succeeded While not always focusing on social media specifi-
in 2011 by Helen Margetts, professor of society cally, much of the OII’s research speaks to the role
and the Internet at the University of Oxford. of social networks in contemporary government
The OII’s research base has grown with time, and politics. The OII’s past and ongoing contribu-
drawing on faculty, research associates, and visit- tions to this research area include the following:
ing researchers from a range of disciplines, includ-
ing law, history, informatics, geography, econom- • The Oxford Internet Survey (OxIS): The
ics, political science, sociology, computer science, OxIS tracks online political participation
communications, anthropology, and education. and government-citizen interactions on
In 2003, the OII introduced its Summer Doc- the Web in the UK. Since 2009, OxIS has
toral Programme, a two-week series of seminars incorporated questions on social media
and workshops for doctoral students from across use into its survey questionnaire. This
the world studying some aspect of the relation- allows for the identification and analysis
ship between the Internet and society. In 2006, the of trends in social media and political
OII introduced a full doctoral program, a three- engagement, informing debates about the
year course leading to a D.Phil. in information, link between online and offline political
938 Oxford Internet Institute

participation, and emerging forms of phones and social media reduce the barri-
engagement made possible by new ers that have traditionally complicated
information communcation technologies individuals’ capacity to band together in
(ICTs) such as social media. support of common or socially desirable
• Digital-era governance and government- goals. For example, using Web-based
citizen relationships: Led by Profes- experiments, Professor Helen Margetts
sor Helen Margetts, this project draws is investigating the influence that social
on interviews, hyperlink analysis, and information cues have on an individual’s
experiments to assess how the Internet propensity to sign petitions, vote, or
can enable citizens to contribute to the donate to charities.
work of government and better retrieve • Ethics and the study of social media
information from public sector depart- and politics: As a new and fast-moving
ments and agencies. field, the study of online social networks
• The Fifth Estate: This research initia- lacks rigorous and agreed-upon ethi-
tive is led by Professor Bill Dutton and cal standards. The OII is also working
explores the extent to which networked to address this gap, an effort that may
ICTs such as social media enable new prove particularly relevant for the study
sources of accountability in politics and of politics and social media, where
government. concerns about protection of research
• Geotag analysis: Led by Dr. Mark Gra- participants’ privacy and anonymity can
ham, researchers at the OII collect and be especially high.
analyse geotags (digital labels that attach • Policy and Internet: The OII edits a peer-
longitude and latitude coordinates to reviewed journal titled Policy and Inter-
online data) to identify where contribu- net (published by Wiley Blackwell) that
tors to collections of online information addresses the relationship between the
and content, such as Wikipedia and Internet and public policy.
Flickr, come from. When these social
media sites address politically sensitive Amanda Clarke
topics, such as land boundaries, con- Oxford Internet Institute
troversial historical events, or political
identities, this crowdsourced information See Also: Berkman Center; Digital Cultures
can have important implications for real- Research Center; MIT Media Lab; Pew Internet and
world politics. American Life Project.
• Public opinion and social media: By
analyzing the content of online political Further Readings
discussions on Usenet forums, Dr. Sandra LSE Public Policy Group and Oxford Internet
Gonzalez-Baillon has identified a link Institute. “Government on the Web.” http://
between sentiments expressed online and www.governmentontheweb.org (Accessed
election outcomes in the United States, September 2012).
providing an alternative to more tradi- Oxford Internet Institute. “OxIS: Oxford Internet
tional polling methods. Surveys.” http://microsites.oii.ox.ac.uk/oxis
• Collective action online: Researchers at (Accessed September 2012).
the OII explore how low-cost, widely Oxford Internet Institute. “Research.” http://www.oii
used Internet technologies like mobile .ox.ac.uk/research (Accessed September 2012).
P
Palin Phenomenon moved to Alaska to take jobs as teachers. Palin
earned a degree in communications-journalism
The Palin phenomenon refers to the sudden rise from the University of Idaho in 1987. She is mar-
of Sarah Palin on the American national political ried to Scott Palin and they have five children. She
stage. Her dramatic climb was followed by a rela- was twice elected to the Wasilla City Council, and
tive decline in her political stature. then served as mayor for two terms. She became
Palin, then Alaska governor, was tapped by the first female governor of Alaska in 2006.
John McCain as the Republican Party’s vice At her Republican National Convention speech
presidential candidate on August 29, 2008. After Palin said, “You know they say the difference
McCain-Palin lost the election to Democrats between a hockey mom and a pit-bull: lipstick.”
Barack Obama and Joe Biden, Palin’s popularity The line propelled many cartoons, columns, and
remained high, aided by her use of social media, commentaries. Palin often referred to herself as
a reality television show, two books, and scan- a “mama grizzly” in relation to the instincts of
dals that kept her and her family in the news. her home state’s species of bear to protect their
She flirted with running for the Republican nom- young. She was derisively referred to as “Caribou
ination for president in 2012, before deciding Barbie” for the reindeer of her home region and a
to sit out the race and continuing as a political reference to her background as a beauty pageant
commentator. contestant.
Palin’s phenomenal rise from a relatively During the presidential campaign, Palin often
obscure governor to a national celebrity was referred to herself and McCain as “maverick”
spurred by her use of social media. Supporters politicians. When the McCain campaign showed
liked her authenticity, plain style of speaking, concern that she was “going rogue” by wandering
strong conservative convictions, and ability to off message, Palin embraced the title. Her autobi-
connect with average Americans. Her attractive ography Going Rogue was released in November
physical appearance also aided her popularity. 2009, and became a best seller. She also wrote
Critics focused on her lack of knowledge about America by Heart, released in November 2010.
government, her use of divisive language and tac- The Palin phenomenon was a boon for online
tics, and her sometimes ultraconservative views. sales once she was named to the presidential
Sarah Heath Palin was born February 11, ticket. Online stores with campaign gear saw huge
1964, in Idaho. After three months, her parents sales increases with McCain-Palin paraphernalia.

939
940 Palin Phenomenon

Two days before Palin was picked, there were no


items related to Sarah Palin on eBay. The day of
the announcement,there were 100 items up for
sale. Within three weeks, more than 4,000 items
related to Palin were sold. Other unrelated items
were marketed with her name on them in order to
drive traffic to sellers’ sites.
Palin hosted an eight-week reality television
show on TLC called Sarah Palin’s Alaska. She
signed a lucrative deal as a Fox News contributor,
and did interviews from a studio at her Alaska
home.

Social Media
Palin was a prolific user of social media in the
months after her run for vice president. She
used her Facebook status updates and tweets to
announce policy opinions and generate attention.
She had nearly 3.5 million “likes” from Facebook
fans in 2012. Her status updates get tens of thou-
sands of “likes” and spawn long conversations
with hundreds and even thousands of comments.
They also serve as a forum for Palin to comment
on public issues.
Palin had 873,000 Twitter followers and
tweeted nearly 1,300 times from the @Sarah
PalinUSA handle. Entries are mostly political Former vice presidential candidate Sarah Palin at the Time 100
commentary, with scattered remarks about her Gala in New York City on May 4, 2010. Palin’s popularity started
family. There is also a Sarah Palin news account to fade after 2010, when a study from February to April 2011
(@SarahPalinLinks), touted as “Communication, found that online posts referring to Palin fell by 38.2 percent
Information, and Internet Activism in support of and social media posts dropped 32 percent.
Governor Sarah Palin.” It had more than 16,700
followers, and posted nearly 105,000 tweets. A
SarahPalinRadio address focused on her radio
appearances, and had more than 3,600 followers. network television interviews. In her interview
There is also a “FakeSarahPalin” dubbed “Snow- with Charles Grodin of ABC News, she said that
mobilin’ right to the Naval Observatory,” a refer- “you can actually see Russia from land here in
ence to a favorite activity of Sarah and Todd Palin Alaska.” Another interview with Katie Couric
and to the vice presidential residence. The fake on CBS News led to ridicule when Couric asked
site had more than 10,000 followers. Palin to name a Supreme Court decision other
than the proabortion Roe v. Wade case that she
Influence opposed. Palin could not name one, nor did she
While Palin played an important part in the rise specify what newspapers she read.
of the Tea Party movement and Republican elec- Palin helped popularize the phrase “lame
toral success in 2010, her influence soon began stream media” to refer to mainstream outlets.
to wane. Between February and April 2011, one She also, through the use of social media, coined
study found that online posts about Palin fell by a new word. In response to plans to build a
38.2 percent, and social media mentions fell by mosque near the World Trade Center site, Palin
32 percent in that period. Part of the problem asked Muslins to “refudiate” it in a tweet. After
that Palin had in the campaign came from two she was criticized, she responded on Twitter that
Participatory Politics Foundation 941

“English is a living language.” “Refudiate”— Participatory Politics


combining the words refute and repudiate—was
added in 2010 to the New Oxford American Foundation
Dictionary.
Palin was parodied in pop culture through her The Participatory Politics Foundation is a non-
portrayal by actress Tina Fey on Saturday Night profit organization that is dedicated to increasing
Live. Fey resembled Palin, and mimicked her civic engagement by developing free Web tools
accent and mannerisms. The comedian won an that create opportunities for citizens to partici-
Emmy for her performances. pate in their government. Based on their founda-
An HBO movie Game Change from a book of tional belief that government proceedings should
the same name documented the 2008 campaign. be accessible and understandable to the broad
Based on interviews by journalists, it showed the public, the Participatory Politics Foundation pro-
process of picking Palin, the pitfalls she and the duces its flagship project OpenCongress.org. In
McCain campaign faced in preparing for the vice this project, a blend of primary legislative docu-
presidential debate with Biden, and the pressures ments is published alongside related news stories,
of the national spotlight. Actress Julianne Moore editorials, and social commentary written by
portrayed Palin in the film. It depicts a scenario OpenCongress users. Through its maintenance
whereby Palin was not fully vetted by McCain’s of this Web site, the Participatory Politics Foun-
advisors before the selection. dation strives to continue its mission to improve
In January 2009, SarahPAC was established political processes by making them more partici-
to support conservative candidates endorsed by patory, creative, responsive, and accountable.
Palin. A controversial graphic posted to Palin’s The Participatory Politics Foundation was co-
Facebook page in March 2010 to solicit contri- founded by Tiffiniy Cheng, Nicholas Reville, and
butions gained attention after the January 2011 Holmes Wilson, and was publicly launched in
shooting of Congresswoman Gabrielle Giffords. February 2007. Since the organization’s found-
The picture showed a map of the United States ing, David Moore has served as the executive
with crosshairs on the location of 20 congressio- director, and is also the program manager of
nal districts held by House Democrats targeted OpenCongress.
by conservatives. One of the districts was Gif- The operating structure for the Participatory
fords’ Arizona 8th District. Giffords was shot Politics Foundation is based on six principles
while holding an outdoor town hall meeting. No that establish its organization as: free for every-
connection was ever found between the shooter one, open source, open standards, nonprofit, and
and Palin or SarahPAC. After the 2012 presiden- nonpartisan. “Libre content, for social sharing”
tial election, speculation began that Palin may constitutes a final principle, which means that its
run in 2016. content is free for sharing in social venues such as
Sean D. Foreman online social media platforms, educational con-
Barry University texts, media outlets, and other civic causes. The
Participatory Politics Foundation contends that
See Also: Campaigns, Presidential (2008); Decoy citizens should do more to civically engage, and
Campaign Websites; Facebook; Saturday Night Live; that the Internet offers opportunities for citizens
Tea Party Movement; WikiLeaks. to improve communication with political repre-
sentatives and to become more informed in the
Further Readings government’s proceedings.
Heath, Chuck, Sr. and Chuck Heath, Jr. Our Sarah: The creation and operation of the Participa-
Made in Alaska. New York: Center Street, 2012. tory Politics Foundation’s Web site OpenCon-
Heilemann, John and Mark Halperin. Game Change: gress is founded on these fundamental beliefs.
Obama and the Clintons, McCain and Palin and OpenCongress was conceived of during the wake
the Race of a Lifetime. New York: Harper, 2010. of the 2004 election in an effort to sustain the
Kurtz, Howard. “Is Sarah Palin Over?” Newsweek excitement among the electorate that was stimu-
(May 1, 2011). lated by the election. The designers of this project
942 Participatory Politics Foundation

sought to aggregate existing online news con- effort to demonstrate to members of Congress
cerning congressional activities, and to package it how the OpenCongress community stands on
in a user-friendly interface. After partnering with issues. These features seek to open communica-
the Sunlight Foundation in 2006, OpenCongress tion between citizens and their political leaders in
launched a public version of its site in February a way that was not possible prior to the creation
2007. Since this time, OpenCongress has existed of this site.
as an open source Web site that publishes legis- OpenCongress.com has generated a vast audi-
lative records with accompanying news stories, ence of approximately one million visits per
summaries of bills, and blog posts. For each bill, month, as well as a user community of more
there is also a designated area for OpenCongress than 300,000 members. In 2008, the site crashed
users to post comments pertaining to given gov- as a result of the number of citizens attempting
ernment proceedings. For example, when click- to access it following a controversial decision
ing on H.R. 624, the “Cyber Intelligence Shar- wherein U.S. Treasury Secretary Henry Paulson
ing and Protection Act,” users can view the bill’s asked Congress to entrust him with $700 bil-
text, status, sponsors, committees, and votes, as lion in taxpayers’ money. The online project also
well as an aggregation of news articles, blog cov- attracts viewers from a number of online blogs
erage, and comments written by OpenCongress and news sites such as the New York Times, the
users that show their opinions and levels of sup- Washington Post, and PBS that have linked to
port or opposition in relation to a given bill. OpenCongress.org on their sites. For example, in
In comparison to traditional news stories about a September 10, 2009, article published on The
political issues, OpenCongress aims to provide Atlantic online, journalist Chris Good linked to
more detailed and in-depth information concern- a blog post on OpenCongress to provide primary
ing legislative action by linking to the text writ- text and in-depth analysis related to a specific bill.
ten in bills. Moore and other staff members who The Participatory Politics Foundation has
maintain the Web site attempt to reduce the com- developed two sibling nonprofits, the Participa-
plexity of legal language contained in bills by pro- tory Culture Foundation and Center for Rights,
viding relevant context and analysis. To further both of which operate on similar principles that
enhance users’ abilities to easily access informa- citizens should employ the Internet to enhance
tion, OpenCongress encourages users to person- the openness and accessibility of their govern-
alize their experience by creating a free account, ment. The Participatory Culture Foundation
which then gives them the option to track spe- focuses on supporting democratic media by creat-
cific bills and receive reminders when topics they ing resources for citizens to produce and publish
care about are scheduled for votes. For example, digital videos. By designing open source software
a user may select to follow the issue of “health applications they allow individuals and organi-
policy,” consequentially allowing them to gain zations to create broadly accessible videos that
notifications when major bills related to health empower communities. The Center for Rights is
policy are approaching a vote, and alerting them a nonprofit that advocates for the public interest,
of the results. digital rights, Internet freedom, and open Web
As part of its objective to increase citizens’ innovation through empowering individuals to
political participation and interaction with their use the Internet for public good by participating
political leaders, OpenCongress features com- in a range of civic campaigns that are linked to its
ment boards on pages for every bill, senator, and Web site.
representative. These designated virtual spaces Through its continued efforts to maintain
encourage users to discuss issues and evaluate and improve OpenCongress.org, the Participa-
their political landscapes. Citizens can also voice tory Politics Foundation utilizes the advantages
their level of support for each bill by casting an of open source Internet tools to enhance civic
“aye” or “nay” vote, and can give senators and engagement.
representatives a personal approval rating, using
a scale of 1 to 100. Results from these votes and Stephanie E. Bor
approval ratings are publicly displayed in an University of Utah
Peer to Peer 943

See Also: E-Democracy; Open Data; Today, many widely used applications and
OpenCongress.org; Sunlight Foundation. tools are based on the P2P model. Skype, the
most widely used Internet phone application, was
Further Readings P2P technology. Instant messaging (IM) systems
Jones, K. C. “Web Sites Push for More and online chat services are also based on the P2P
Transparency and Accessibility in Government.” model. Other well-known applications that uti-
InformationWeek (June 23, 2008). lize P2P are file-sharing systems such as BitTor-
OpenCongress. http://www.opencongress.org rent services. The P2P model is quite extensively
(Accessed May 2013). used on the Internet today. Many Internet service
Participatory Politics Foundation. “Participatory providers claim that more than 50 percent of
Politics Foundation.” http://www.participatory Internet traffic is generated by P2P applications.
politics.org (Accessed May 2013). The P2P model offers many advantages. The
failure of one peer does not compromise the
whole network. The decentralized nature of P2P
networks increases robustness because it removes
the single point of failure that can be inherent in a
Peer to Peer client–server-based system. Also, the lack of a sys-
tem administrator makes the network easier and
Peer to peer (P2P) refers to a self-organizing com- faster to set up and maintain. Each peer is respon-
puter network of equals in which each computer sible for controlling its data and resources. Of
(which is an autonomous entity) can act as a cli- course there also disadvantages. Risky or illegal
ent or server for the other computers, thus allow- data can be distributed on P2P networks because
ing shared access to various distributed resources peers are connecting to untrusted sources, as
(e.g., files or peripherals), without the need for opposed to an administrative server. Also, the
a central server. In the peer-to-peer model, any removal of such data is not an easy task because
node (computer) is able to initiate or complete there is no central control that manages the con-
any supported transaction. Peer nodes may differ tent that circulates in the network.
in local configuration, processing speed, network The P2P concept has inspired new structures
bandwidth, and storage quantity. In this model, and philosophies in many areas of human inter-
peers can act both as suppliers and consumers of action. P2P is not restricted to technology any-
resources, in contrast to the traditional client– more, but also covers social processes. Social
server model, where only the server sends, and P2P processes are currently emerging throughout
clients receive. society. The P2P concept can be applied as a gen-
P2P networks can be set up within the home, eral technical/social/cultural movement to pro-
a business, or over the Internet. Each network vide content and services. Each peer (computer
type requires all computers in the network to use or the user that operates it) can be a creator or
the same or a compatible application to connect distributor of content to other peers, not simply
to each other and access resources found on the a consumer of content provided by a centralized
other computer. P2P networks can be used for system. The more peers who participate in such
sharing content in a digital format (e.g., audio, peer-to-peer networks will result in more con-
video, or data). tent available to all peers—this is also one of the
The first P2P distributed system platform main characteristics of social networks. Yochai
appeared in the 1990s. P2P gained wide accep- Benkler has proposed the term commons-based
tance with the introduction of the Napster file peer production to designate collaborative proj-
sharing system in 1999. Napster was a pioneer- ects (e.g., free and open source software such as
ing P2P file sharing Internet service that empha- Wikipedia).
sized sharing audio music files encoded in MP3 Associated with peer production are the con-
format. Although it became very successful, the cepts of peer governance, peer property, and peer
company ran into legal difficulties over copyright distribution. Peer governance refers to the manner
infringements. in which peer production projects are managed.
944 Pelosi, Nancy

On the other hand, peer property denotes the district represents an area near California’s Silicon
type of licenses that recognize individual author- Valley, Pelosi has often voted for legislation that
ship but not exclusive property rights (e.g., the favors companies involved in high-technology
General Public license and the Creative Commons endeavors. Pelosi was an early adopter of many
licenses) and peer distribution refers to the man- social media, and has used these channels to com-
ner in which peer-produced products are distrib- municate with constituents and other interested
uted. Finally, it is worth noting that emerging parties. Perhaps because of her interest in social
collaborative P2P systems are investigating the media, Pelosi was an adamant early opponent to
concept of diverse peers who can bring in unique the proposed Stop Online Piracy Act (SOPA).
resources and capabilities to a virtual community.
Background
Andreas Veglis Nancy Particial D’Lesandro was born in Balti-
Aristotle University of Thessaloniki more, Maryland, in 1940. The sixth and young-
est child of Annunciata “Nancy” Lombardi and
See also: Communication; Digital Revolution; Thomas D’Alesandro, Jr., she was educated at
Evolution of Social Media; Instant Messengers, IRC the Institute of Notre Dame, an all-girls Catholic
and ICQ; Skype. high school in Baltimore, and received a B.A. in
political science from Trinity College in Washing-
Further Readings ton, D.C., in 1962. Pelosi’s family had a record
Benkler, Yochai and Helen Nissenbaum. “Commons- of public service, and many of her relatives were
Based Peer Production and Virtue.” Journal of involved with the Democratic Party. Married to
Political Philosophy, v.14/4 (2006). Paul Pelosi in 1963, she and her husband moved
Buford, John, Heather Yu, and Eng Keong Lua. P2P to New York City after their wedding, ultimately
Networking and Applications. Burlington, MA: moving to San Francisco in 1969.
Morgan Kaufmann, 2008. Pelosi and her husband have five children:
Miller, Michael. Discovering P2P. Hoboken, NJ: John Nancy, Christine, Jacqueline, Paul, and Alexan-
Wiley & Sons, 2001. dra. Although Pelosi devoted much of her time
Oram, Andy. Peer to Peer: Harnessing the Power of to rearing her children after the family’s move to
Disruptive Technologies. Sebastopol, CA: O’Reilly California, her political heritage is strong. Her
Media, 2001. father served as a member of the U.S. House of
Steinmetz, Ralf and Klaus Wehrle. Peer-to-Peer Representatives from 1939 until 1947, at which
Systems and Applications. New York: Springer, point he ran for and served as mayor of Baltimore
2005. for 12 years. Her brother, Thomas D’Alesandro
Wikibooks. The World of Peer-to-Peer. http://en III, also served as mayor of Baltimore between
.wikibooks.org/wiki/The_World_ of_Peer-to-Peer_ 1967 and 1971. Pelosi’s brother-in-law, Ron-
(P2P) (Accessed December 2012). ald Pelosi, was a member of the San Francisco
County Board of Supervisors, and was well-con-
nected in Democratic Party circles in California.
As a result, Pelosi found easy entry into Demo-
cratic politics, soon becoming friends with Phillip
Pelosi, Nancy Burton, the representative from California’s 5th
Congressional District, and one of the leaders of
Nancy Pelosi is an American politician from Cali- the California Democratic Party.
fornia who served as the first female speaker of
the House of Representatives, and who has held Political Career
leadership positions for House Democrats for Pelosi was elected to the Democratic Party’s
more than a decade. As the representative of one National Committee as a member from Califor-
of the nation’s most strongly Democratic congres- nia in 1976, a position she would hold for the
sional districts, Pelosi is considered to be very next 20 years. Pelosi was elected as the northern
progressive in most of her positions. Because her California Democratic Party chair in 1977, and
Pelosi, Nancy 945

same-sex couples in the United States, and cov-


ering only slightly more than 110 square miles.
Pelosi has been re-elected each time since she
first ran for the seat, often pulling more than 80
percent of the votes cast.
After becoming a member of the House of
Representatives, Pelosi was appointed to the
Appropriations Committee and the Intelligence
Committee, serving on the Intelligence Commit-
tee until she joined the Democratic leadership in
2001. In that year, her party caucus chose Pelosi to
serve as House assistant minority leader (minor-
ity whip), serving under Minority Leader Richard
“Dick” Gephardt of Missouri. In 2002, Gephardt
resigned from the House of Representatives in
order to pursue the Democratic nomination for
Speaker Nancy Pelosi in 2007. Pelosi served as the first female president. At that time, Pelosi was selected to
speaker of the House during the 110th and 111th Congresses replace him, becoming the first woman to serve
after serving as the House minority leader after Richard as minority leader for either the Democratic or
Gephardt’s resignation in 2002. the Republican parties. After the Democrats took
control of the House of Representatives following
the mid-year elections of 2006, Pelosi was nomi-
nated by her caucus to serve as the first female
also served as the chair of the California Demo- speaker of the House, assuming that office in Jan-
cratic Party from 1981 through 1983. In these uary 2007. In addition to being the first woman to
positions, Pelosi was able to form a network of serve as Speaker of the House, Pelosi was also the
political allies across the United States. Working first Italian American and only the second person
as the finance chair of the Democratic Senato- from the west coast to be selected to that office.
rial Campaign Committee (DSCC), Pelosi raised Before the 2006 elections, Pelosi had
campaign funds for candidates across the United announced a 100-Hour Plan that detailed legisla-
States, serving in this role from 1985 through tion that the Democratic Caucus would attempt
1986. Although she was defeated by Charles to pass during the first 100 hours of the new
Manatt in her 1985 attempt to be elected chair of congressional term. The 100-Hour Plan agenda
the Democratic National Committee, the death of included reforming House rules so that lobbyists’
her friend Phillip Burton in 1983 would eventu- influence was curtailed, instituting a pay-as-you-
ally open up the seat that Pelosi has held through go plan to reduce the deficit, enacting all recom-
the past several decades. mendations of the September 11 Commission,
After Burton’s death, his widow Sala won a increasing port security, granting federal fund-
special election to his position and won re-elec- ing to stem-cell research, requiring Medicare to
tion to the House in 1984 and 1986. When Sala directly negotiate with drug manufacturers to
Burton was diagnosed with what proved to be reduce the cost of prescription medications, halv-
terminal cancer, she tapped Pelosi to be her suc- ing interest rates on student loans, and ending
cessor. Narrowly defeating City of San Francisco large subsidies to petroleum companies. Under
Supervisor Harry Britt with 36 percent of the Pelosi’s leadership, the House passed all of this
vote to his 32 percent in the special election that legislation between January 9 and January 18,
was held after Sala Burton’s death, Pelosi was 2007, taking only 87 business hours to do so.
elected to Congress for the first time in 1987. While some of this legislation died in the Senate,
Pelosi’s district, which comprises 80 percent the 100-Hour Plan helped Pelosi establish her-
of the City of San Francisco, is reliably liberal, self as an effective leader who was able to push
comprised of the largest number per capita of through a legislative agenda.
946 Pelosi, Nancy

Pelosi served as speaker of the House through minority leader, her family, constituents, and
the 110th and 111th congresses, stepping down those involved in causes she supports. Pelosi also
only after the Democratic Party’s loss of 63 seats, offers a news feed service that allows constituents
and the majority, to the Republicans. Although and other supporters access to legislative updates
she was forced to step down as speaker, the Demo- and political speeches.
cratic Caucus again elected Pelosi House minority
leader following the 2010 and 2012 elections. In Stop Online Piracy Act
this role Pelosi has worked to promote President Since the Internet became popular with the general
Barack Obama’s legislative agenda while serv- public, the holders of the copyrights for recorded
ing her constituents and her party. In particular, music, films, television programs, and other intel-
Pelosi has been known for advocating for lesbian, lectual property have struggled to control access to
gay, bisexual, and transgender (LGBT) rights, their property and to minimize the pirating, copy-
increasing environmental protections, raising the ing, or other unauthorized sharing of that mate-
minimum wage, protecting civil liberties, tying rial. Between 1999 and 2001, for example, the
foreign aid to reductions in human rights abuses, peer-to-peer file sharing service Napster permit-
and opposing military spending and the war in ted users to share audio files, often in an encoded
Iraq. Pelosi was a major advocate for President audio format known as MP3. While some trans-
Obama’s Patient Protection and Affordable Care actions via Napster included the legitimate sale
Act of 2010, delivering 219 House votes in favor of audio files, the vast majority of the service’s 25
of the legislation. Proponents of the health care million users shared over 80 million files, many
legislation praised Pelosi for pushing for health containing copyrighted material, for free. This
care reform’s passage at a point when its pros- filesharing was in violation of the copyright own-
pects for passing seemed bleak. ers’ and performers’ rights, and amounted to bil-
lions of dollars of lost royalties. Filesharing also
Use of Social Media was alleged by the major record companies to
Like most politicians, Pelosi uses a variety of have caused their sales to precipitously drop. In
social media to communicate with her constitu- response, the Recording Industry Association of
ents, the general public, and those interested in a America (RIAA)—the trade association represent-
variety of issues she supports. To that end, Pelosi ing the record companies—filed suit against Nap-
maintains two Web sites, a Twitter account, Face- ster and others for copyright violations. Although
book page, Flickr account, and news feed service. the RIAA was ultimately successful in forcing
Pelosi’s office Web site contains a variety of infor- Napster into bankruptcy, a variety of other Web
mation, including updates on legislation, news sites and services almost immediately sprang up
releases, ways for constituents to contact her, that allowed unauthorized file sharing to con-
community funding resources, answers to fre- tinue. While the RIAA and others continued to
quently asked questions, ways to seek assistance file lawsuits to stop illegal filesharing, relief came
with federal agencies, a synopsis of her congres- too late to stop the decline in sales.
sional district, and biographical information. Her The creators of intellectual property and the
second Web site, democraticleader.gov, chiefly copyright holders of those creations lobbied Con-
focuses on her political agenda, and includes a gress to grant them further protections to pre-
blog, photographs, a calendar of appearances and vent unauthorized sharing. In response to these
meetings, summaries of proposed bills, and links requests, a bipartisan group of congressmen and
to the Congressional Record. Pelosi’s Twitter senators worked to develop legislation that would
account, which has over 250,000 registered fol- curtail online piracy. Representative Lamar Smith,
lowers, transmits regular tweets related to news a Republican from Texas, introduced SOPA in
events or pending legislation. On her Facebook the House of Representatives with 13 cosponsors.
page, Pelosi includes photographs, links to other SOPA was related, although somewhat different,
organizations, and postings related to her activi- to a similar bill in the Senate, thePreventing Real
ties and travels. Pelosi’s Flickr account contains Online Threats to Economic Creativity and Theft
a variety of photographs, including those of the of Intellectual Property (PROTECT IP) Act (PIPA),
Pence, Mike 947

introduced by Senator Patrick Leahy, a Democrat Pelosi was joined in her opposition by conser-
from Vermont, and 33 cosponsors. SOPA was vatives such as California Republican Representa-
intended to thwart online piracy of copyrighted tive Darrell Issa, and libertarians such as frequent
intellectual property and counterfeit goods. To presidential candidate Ron Paul. In this opposi-
do this, SOPA proposed giving law enforcement tion, Pelosi was joined by many colleges, univer-
agents increased ability to fight such infringe- sities, and libraries, who felt that SOPA would
ments. SOPA allowed law enforcement agents unnecessarily impede their operations. A variety
and rights holders to identify infringing Web sites, of online protests took place, and many technol-
and then seek a court order barring advertisers ogy companies worked to stimulate opposition
and payment facilities from engaging in business to SOPA. After President Barack Obama stated
with the infringer. SOPA also permitted court that he would not support legislation that could
orders that would bar search engines from link- lead to the diminishment of innovation, limita-
ing to infringing Web sites, and to require Internet tions on free speech, or reduced Internet security,
service providers to block access to the offending opposition to SOPA grew, culminating in a vote
Web sites. SOPA made unauthorized streaming of postponed in both the House and the Senate.
copyrighted material illegal, and increased maxi- Pelosi continues to oppose legislation that would
mum penalties for violating the law to five years impede social media.
in prison.
SOPA enjoyed broad support from an array of Stephen T. Schroth
rights holders, creative types, and labor unions. Jason A. Helfer
Specifically, SOPA was supported by such orga- Knox College
nizations as the Actors’ Equity Association; CBS,
Inc.; the Directors Guild of America; the Asso- See Also: Actors and Social Media in Politics;
ciation of American Publishers; the National Bas- Campaigns, Congressional (2008); Campaigns,
ketball Association (NBA); the National Football Congressional (2010); Identity Politics; Musicians and
League (NFL); Warner Music Group; the Motion Social Media in Politics; Voter Turnout.
Picture Association of America (MPAA); Ran-
dom House; the National Governors’ Associa- Further Readings
tion; the International Brotherhood of Teamsters; Bzdek, V. Woman of the House: The Rise of Nancy
and many others. Both of California’s senators, Pelosi. New York: Palgrave Macmillan, 2008.
Barbara Boxer and Dianne Feinstein, supported Pelosi, N. Know Your Power: A Message to America’s
the legislation. The supporters of SOPA main- Daughters. New York: Random House, 2008.
tained that the act was necessary to strengthen the Sandalow, M. Madam Speaker: Nancy Pelosi’s Life,
enforcement of copyright laws, especially as they Times, and Rise to Power. New York: Modern
applied to Web sites owned and operated by those Times, 2008.
outside of the United States.
Despite this, Pelosi opposed SOPA. Pelosi
believed that SOPA threatened free speech and
innovation, while also giving law enforcement
agents the ability to block entire Internet domains Pence, Mike
in order to be able to block a lone offending Web
page. Although initially Pelosi was one of the few Elected to the U.S House of Representatives in
public opponents of SOPA, this stance was not 2000, Congressman Mike Pence (R-IN) quickly
totally surprising. Historically, Pelosi has been an became a leading conservative voice in Con-
ardent supporter of civil liberties, so her unwilling- gress. By 2005, the conservative weekly publi-
ness to impede speech is not a shock. Some have cation Human Events named Pence its “Man of
also suggested the involvement of many of Pelosi’s the Year.” After only eight years in Congress,
constituents and donors in companies affected by he was unanimously elected by his peers to the
the law, such as Yahoo!, Google, Facebook, Twit- third-ranking leadership position in the House—
ter, and eBay, all of which opposed SOPA. chair of the House Republican Conference. In this
948 Pence, Mike

capacity, Pence led the development and dissemi- unsuccessfully ran for governor. This time, how-
nation of the GOP caucus message and promoted ever, Pence beat five other Republicans in the pri-
its members. As a former radio talk show host, mary election, and a Democratic lawyer in the gen-
Pence understood the need for regular, ongoing eral election, to win the congressional seat he would
communication with a wide variety of constitu- hold until December 2012, leaving only after win-
ents. He was an early adopter of communicating ning his race to become governor of Indiana.
with constituents via the Web and social media.
Conservative activists and the media speculated Congressional Service
about Pence as a potential GOP candidate for Pence served as chair of the Republican Study
president in 2012, but he chose instead to run for Committee from 2005 to 2007. The committee
Indiana governor. In 2012, Congressman Pence is made up of conservative Republican House
was elected governor of Indiana, succeeding fel- members, generally advocating for an agenda
low conservative Mitchell E. Daniels, Jr. they describe as supporting limited federal gov-
ernment, strong national defense, individual and
Early Life and Career property rights protection, and measures that
Mike Pence was born in Columbus, Indiana, on support traditional family values. When Pence
June 7, 1959, to Nancy and Edward J. Pence, Jr. left the leadership of this organization, member-
He attended Columbus North High School, and ship had grown to more than 110 members.
graduated from Hanover College in 1981 with In 2006, Pence ran for House Minority Leader,
a B.A. in history. Pence earned his J.D. from the but was trounced by Ohio Congressman John
Indiana University McKinney School of Law in Boehner by a vote of 168–27–1. Undeterred and
1986. On June 8, 1985, Pence married his wife, with the support of Boehner, Pence ran in 2008
Karen, an elementary school art teacher. and was unanimously elected by his peers to the
Following graduation from law school until third-ranking leadership position—chair of the
1991, Pence worked as an attorney. However, he House Republican Conference. Pence served in
entered politics early, running for Congress only that position until resigning to run for governor
two years after graduation. He lost that race to of Indiana.
veteran Democratic Representative Philip R. Before leaving Congress, Pence served on the
Sharp. He attempted again two years later to take U.S. House Committee on Foreign Affairs. He
over Sharp’s seat, but lost by 19 points in a largely was vice chair of the Subcommittee on the Middle
negative campaign. After the bruising congressio- East and South Asia. He also served as a member
nal race, Pence took a break from politics and in of the U.S. House Committee on the Judiciary. On
1991 began serving as president of the Indiana that committee, Pence was vice chair of the Sub-
Policy Review Foundation, a nonprofit education committee on the Constitution and a member of
foundation focused on state and municipal issues. the Subcommittee on Intellectual Property, Com-
By 1994, Pence’s local conservative talk radio petition, and the Internet.
show, The Mike Pence Show, grew into syndica-
tion and began airing statewide on 18 radio sta- Social policy. In his official biography, Pence
tions. The show ran weekdays until September describes himself as “a Christian, a conserva-
1999. From 1995 until 1999, Pence also hosted a tive, and a Republican, in that order.” This quote
Sunday morning public affairs television show in defines Pence and his approach to politics. It has
Indianapolis. The experience Pence acquired dur- consistently reflected the positions, votes, and
ing this time was invaluable. His familiarity with issues that Pence has championed throughout his
the media would serve him well in later elections public life and career. In fact, Brian Howey, long-
and in his capacity as spokesperson for the House time Indiana political writer, wrote after Pence’s
Republican Caucus. election to the governorship that he would be the
Pence never gave up on running for elected “most socially conservative governor in modern
office, and in 2000 he ran for the 6th Indiana Indiana history.”
Congressional District following the retirement Pence voted 100 percent in support of the
of fellow Republican David M. McIntosh, who positions taken by the National Right to Life
Pence, Mike 949

Committee in each of the congressional sessions federal spending earmarks. The latter of which
since 2000. He has a 100 percent lifetime rating he remained committed to, even when local civic
from the American Conservative Union, and in leaders in his own congressional district requested
2011, he scored 100 percent in National Journal federal financial assistance to pay for reconstruc-
ratings as a “conservative on social policy.” He tion after serious damage was caused by a series
also scored 100 percent in 2011 from the Family of tornadoes and floods.
Research Council, a national nonprofit Christian His strong commitment to conservative fis-
advocacy organization. cal policy has earned him 100 percent favorable
An example of Pence’s commitment to conser- ratings from groups such as Americans for Tax
vative social issues is found in his introduction and Reform, Citizens Against Government Waste,
longtime defense of the Title X Abortion Provider and FreedomWorks, a grassroots advocacy orga-
Prohibition Act. Originally introduced in 2009 by nization that supports limited government and
Pence, the bill sought to prohibit federal funding low taxes.
for family planning to any organization that per-
forms abortions, including Planned Parenthood. Social Media and the Internet
Pence maintained his fight for this controversial Shortly after arriving in Washington in 2001,
measure, which became known as the “Pence Pence joined the Congressional Internet Caucus.
Amendment,” until April 2011, when it eventu- The caucus is a bipartisan group of House and
ally passed the House by a vote of 241–185–1. Senate members who advocate for greater gov-
ernment Internet utilization and for members of
Fiscal policy. Pence is a vocal supporter of smaller Congress to use the Internet to better communi-
government and an outspoken opponent of federal cate with constituents.
deficits. He opposed all the corporate bailouts, Almost immediately, Pence provided online
including the bailout of the auto industry, even access to his office. In 2002, Pence was awarded a
though U.S. automakers are important employers Golden Mouse, and in 2003, a Silver Mouse from
in the state of Indiana. He has supported tax cuts, the Congressional Management Foundation. The
flat tax proposals, and a multitude of measures foundation recognizes members of Congress who
aimed at reducing federal spending and federal “best use the Internet to communicate with and
deficits. He has done so without regard to politi- serve citizens.” In 2010, Pence was recognized
cal party, opposing both Republican and Demo- with a Platinum Mouse for his leadership of the
cratic presidential measures that would increase House Republican Conference’s Web site.
federal spending. When Pence was elected chair of the House
He often cites Ronald Reagan as his touch- Republican Conference, President Obama had
stone on fiscal policy. In a 2010 address to just won the election and ushered in a new era
the Detroit Economic Club, Pence outlined an of political campaigning via social media. At this
“incentive-based, growth agenda” he called time, the Republican Party lagged the Democrats
S.T.A.R.T. The acronym stands for sound mone- in adoption of new media. To remedy the dispar-
tary policy, tax relief and reform, access to amer- ity, Pence launched a number of measures includ-
ican energy, regulatory reform, and trade. This ing the first New Media Competition, which
address encapsulated Pence’s longtime views on pitted Republican House members against one
supply-side economics, smaller government, and another to demonstrate who could gain the most
lower taxes that he championed throughout his followers, friends, and subscribers to the respec-
career in office. tive social media platforms.
Two striking examples of Pence’s commitment According to the House Republican Confer-
to his economic philosophy includes his cospon- ence, when Pence took over as chair in 2009, only
sorship with Rep. Jeb Hensarling (R-Texas) of a 56 percent of House Republicans used YouTube,
constitutional amendment to limit the amount 37 percent used Facebook, and 28 percent used
the federal government could spend to only “one- Twitter. By 2010, social media adoption increased
fifth of economic output of the United States dramatically to 89 percent, 79 percent, and 64
of America,” and his pledge not to request any percent, respectively.
950 Pence, Mike

Facebook of Indiana, and in 2012 announced his choice of


While the Republican Party was discovering the lieutenant governor on his Facebook page. By
power of social media, Congressman Pence had the time he left Congress, Pence had more than
already deciphered the code to communication in 53,000 “likes” on his Facebook page.
the new age. At the Republican National Com- Pence did not include links to his Facebook
mittee Tech Summit in 2009, Pence remarked that page from his congressional Web site. Because he
he ranked ninth among members of Congress in only has one official page, he has used it for both
the number of friends on Facebook. This mile- political and congressional business. Given the
stone is not surprising, since he began using Face- political element, it is possible Pence chose not to
book in 2008. feature a Facebook link on his official Web page
Pence quickly adopted the platform as a formal for that reason.
communication tool. Most notably, he announced
his intention to run for House Republican Con- Twitter
ference chair in 2008, announced to supporters in Pence began officially tweeting in early 2010. He
2010 his decision not to run for the U.S. Senate, utilized a Twitter handle specifically for official
in 2011 announced of his candidacy for governor congressional business, @RepMikePence. With
over 38,000 followers, Pence’s tweets ran the full
spectrum, from local items such as job fairs based
in his district to national issues such as health-
care reform and military concerns. He tweeted
on average eight to 10 times per month on his
official handle. His Twitter feed was prominently
featured on his official congressional Web site.
Constituent tweets were to remain on the feed;
however, the congressman largely chose not to
respond via Twitter to constituent comments or
questions.
Pence also adopted Twitter for campaign-
ing, utilizing @pencecampaign throughout his
bid for Indiana governor. Twitter was regularly
used, sometimes tweeting as much as 10 times a
day. The campaign tweeted under three different
hashtags: #mike4gov, #pence, and #HoosierFact-
Friday, where he also tweeted about Indiana his-
tory and trivia.

YouTube
In Congress, Pence utilized YouTube, display-
ing his channel, Congressman Mike Pence (IN-
06), prominently on his congressional Web site
homepage. By the end of his 2012 term, he had
nearly 700 subscribers and over 643,000 video
views. His congressional use of YouTube dates
back to early 2009, with over 230 videos posted
in that year alone. Pence’s congressional channel
had nearly 520 videos posted by the time he left
President Barack Obama talks with Governor Peter Shumlin Congress in 2012.
(D-VT), center, and former congressman and now-Governor His posts varied widely, from local television
Mike Pence, (R-IN), after a meeting with the National Governors interviews on district issues to in-depth interviews
Association at the White House on February 25, 2013. on Meet the Press and C-Span. On the channel,
Pentagon Digital Engagement Team 951

constituents can find video on the congressman’s documents/111gmp-platinummouseawards


House testimony, major policy speeches, news .pdf (Accessed December 2012).
conferences, and public service announcements. House Republican Conference. “Fleming Wins the
The congressman added more than 150 video House Republican New Media Challenge.” http://
clips to his favorite playlist. These include many www.gop.gov/blog/10/06/09/fleming-wins-the
clips of Speaker of the House John Boehner, -house-republican (Accessed December 2012).
House Republican leadership news conferences, Pence, Mike. “Biography.” http://mikepence.house
other House Republican members speaking on .gov/index.php?Itemid=53&id=54&option=com_
a variety of policy issues, and weekly Republi- content&view=article (Accessed December 2012).
can video addresses. Particularly poignant clips Pence, Mike. “Pence Speech to Detroit Economic
include memorials to an Indiana guardsman Club.” http://mikepence.house.gov/index.php
killed in Afghanistan, tributes to the U.S. military ?option=com_content&view=article&id=4392:
services and victims of natural disasters. excerpts-of-pence-speech-to-detroit-economic
While his official YouTube channel is exten- -club&catid=94:news-statements-a-speeches
sive, his campaign channel, Pence4Indiana, is not &Itemid=94 (Accessed December 2012).
as comprehensive. Started in 2011, the campaign Project Vote Smart. “Governor Mike Pence.” http://
channel hosted more than 40 videos, largely com- votesmart.org/candidate/34024#.ULpG8ZPjmFc
prised of advertisements from the 2011 to 2012 (Accessed December 2012).
campaign. This video channel includes clips from
his wife Karen, as well as other more personal
appeals directly from the congressman. While
only comprised of a small number of videos, they
were viewed nearly 37,000 times. Pentagon Digital
Conclusion Engagement Team
Mike Pence’s background in media and his recog-
nized talent as a communicator may contribute to The Pentagon Digital Engagement Team (PDET) is
his interest in and use of social media platforms. an initiative developed in 2008, aimed at enhanc-
Additionally, his choice to cochair the Congres- ing the United States’ online presence in the Mus-
sional Caucus for Freedom of the Press highlights lim world in order to rebut Islamic extremists
his interest in open access to government and con- who use the Web and social media to disseminate
gressional action. While his use of social media is anti-American propaganda.
not exclusive or exhaustive, it is, however, deep The PDET, which is based in U.S. Central Com-
and defining. He was an early adopter of new mand (CENTCOM), uses the practices of public
media, and would be expected to continue to diplomacy in an effort to sway public opinion in
lead through use of the various platforms as he strategically important areas of the world.
continues in elected office.
Public Diplomacy and the War on Terror
Katherine R. Fleck The PDET is part of a broader U.S. effort to use
Ohio Northern University diplomacy and persuasion to counter the rhetoric
of extremists in countries where the United States
See Also: Campaigns, Congressional (2008); is militarily involved. During the war on terror,
Campaigns, Congressional (2010); Facebook; the United States has sought to supplement its
Political Parties; Social Media, Adoption of; Social military efforts with diplomatic initiatives aimed
Media Strategies and Tactics; Twitter; YouTube. at winning the “hearts and minds” of individuals
who are vulnerable to extremist propaganda. In
Further Readings contrast to traditional diplomacy, which focuses
Congressional Management Foundation. “111th on persuading the political elites of countries,
Congress Gold Mouse Project Award Winners.” public diplomacy relies on interaction with the
http://www.congressfoundation.org/storage/ general public in a target country. This interaction
952 Pentagon Digital Engagement Team

can include U.S.-sponsored radio and TV broad- According to Never, in these interactions, mem-
casts, educational exchanges, and in the case of bers of the PDET seek to “respectfully deflect base-
the PDET, interaction between U.S. officials and less and often irrational insults, confront adver-
people in the Muslim world via Web sites and saries with factual evidence and expose extremist
social media. propaganda that might otherwise go unrefuted.”
An article in the Tampa Bay Tribune recounted
Operation of the PDET a typical exchange between a team member and
U.S. efforts in the area of Internet diplomacy an anonymous Internet user. In this case, Lieuten-
began in 2006, with the formation of the State ant Commander William Speaks, a public affairs
Department’s Digital Outreach Team, based in the officer, participated in a discussion thread for an
Department’s Bureau of International Informa- online news story about explosions in the Paki-
tion. The 10-person team was tasked with com- stani city of Lahore. In response to a commenter
menting on Arabic, Persian, and Urdu language who claimed that the Obama administration had
blogs and Web sites that featured content criti- “dragged” Pakistan into a war for U.S. gain,
cal of U.S. foreign policy; when commenting, the Speaks pointed out the harm caused by the domes-
team members would identify themselves as repre- tic terrorists in Pakistan. He noted, “it is your
senting the U.S. government, and would challenge countrymen that are conducting these attacks, it is
the factual premises of anti-American statements. homegrown insurgency and your own war.”
The PDET, the Pentagon’s version of this effort, In another instance, a Persian-speaking con-
was developed in 2008, and was launched in Jan- tractor working for the PDET engaged in an
uary 2009. The team is located at MacDill Air extended conversation on a comments thread,
Force Base in Tampa, Florida; this is the head- attempting to rebut posters who argued that the
quarters of CENTCOM, which is responsible alliance between the United States and Pakistan
for U.S. military operations in the Middle East, was of no benefit to the people of Pakistan. The
central Asia, and north Africa. Major David team has also dealt with claims that Osama bin
E. Never, the former chief of the team, told a Laden is still alive, as well as false claims of indis-
reporter for the New York Times that the PDET criminate violence against Afghani civilians com-
seeks to “counter extremist ideology, promote mitted by U.S. soldiers.
cultural awareness and explain U.S. interests.” As
Never notes, the team wants to engage in dialog Engagement Versus Cyberwarfare
with individuals who are moderates, rather than Although the aim of the PDET is open exchange
radicals; unlike extremists, moderates are more with those critical of U.S. policy, other aspects
likely to be receptive to new information offered of the United States’ online strategy have been
by team members. done in a covert manner. In 2011, several news
The team, which is comprised of CENTCOM outlets reported on CENTCOM’s 2010 contract
officials and private contractors, includes 20 with Ntrepid, a company that produces software
speakers of Arabic, Dari, Persian, Pashto, Urdu, designed to obscure the identity of users. Spe-
and Russian, and focuses on Web sites and social cifically, the $2.7-million contract would provide
media outside of the United States. When com- software so that U.S. personnel could create up to
menting on a Web site, members of the team 10 online personas, and use these so-called sock-
acknowledge that they are with CENTCOM, puppets to leave pro-American comments on for-
and are attempting to advance the interests of eign blogs and news sites. Moreover, the software
the U.S. government. When anti-American mes- can obscure the location of the user’s IP address,
sages or articles are located, the team aims to making it appear as if a user was located outside
provide a rapid turnaround. Specifically, after of the United States. Like the PDET, this program
identifying postings or articles that distort U.S. would focus only on users and sites outside of the
policy, members of the team request “Permission United States, and would exclude popular social
to Engage” from the team leader, and then com- media sites such as Twitter and Facebook.
pose a response; this process is usually completed The United States has also directly targeted the
within a single day. Web sites of extremists, with the aim of disabling
Personal Democracy Media 953

them or altering their content. For example, in Further Readings


May 2012, in a speech to Special Operations Com- Altman, Howard. “Central Command Uses Social
mand in Tampa, former Secretary of State Hill- Media to Respond to ‘Enemy Propaganda.’”
ary Clinton revealed that the Center for Strategic Tampa Tribune. http://tbo.com/news/central
Counterterrorism Communications at the State -command-uses-social-media-to-respond-to-enemy
Department had successfully hacked a Web site -propaganda-21843 (Accessed May 2013).
run by Al Qaeda in Yemen. The United States then Shanker, Thom and Eric Schmitt. “U.S. Military Goes
replaced the anti-American content with informa- Online to Rebut Extremists’ Messages.’” New
tion about civilians killed in Al Qaeda attacks. York Times. http://www.nytimes.com/2011/11/18/
world/us-military-goes-online-to-rebut-extremists
Effectiveness of Digital Engagement .html?pagewanted=all (Accessed May 2013).
Proponents of these programs argue that in order Weimann, G. Terror on the Internet: The New Arena,
to succeed in the war on terror, the United States the New Challenges. Washington, DC: United
must adopt the persuasive tactics that are used States Institute of Peace, 2006.
successfully by extremist groups. For example, in
2011 testimony before the Senate Armed Services
committee, former CENTCOM Commander Gen-
eral James N. Mattis argued that it was crucial for
the United States to challenge the enemy narrative. Personal Democracy
He noted that due to the use of the Web as a propa-
ganda and recruiting tool by terrorist groups, the Media
Internet had become a front in the war on terror,
and should be given the same importance as the Personal Democracy Media is an independent
physical domain in which terrorists operate. Philip media organization that focuses on providing a
Seib, the director of the Center on Public Diplo- global forum for discussing issues surrounding
macy at the University of Southern California, has technology, the Internet, politics, and society. The
also praised the program, noting that it represents term personal democracy is based on the idea that
an effective use of American “soft power.” advancements in Internet technology increasingly
Even backers of the effort, however, acknowl- allow citizens to participate more fully in govern-
edge that ultimately, programs like the PDET ment processes. Cofounded in 2004 by Andrew
operate on a small scale relative to the number Rasiej and Micah Sifry, Personal Democracy
of individuals, especially young men, who are Media organizes the annual Personal Democracy
vulnerable to extremist propaganda. The counter- Forum conference, and publishes the award-win-
argument to this is that these young men repre- ning online news site TechPresident.
sent a small but crucial component within the Personal Democracy Media’s organizational
larger target population, a claim that can only be manifesto is motivated by the notion that democ-
tested over time. The veracity of either perspec- racy is changing as a result of new technology,
tive will be difficult to prove empirically since it which provides citizens with novel tools for
will manifest in things that did not happen (that enhancing their participation in politics. In con-
is, conversion to a more radical political stance or trast to an older political system that limited
actual acts of ideologically motivated violence), media participation to those who could afford
as opposed to those that did occur and could, the costly expense and labor associated with
consequently, be observed and recorded. broadcast media, the Internet enables citizens
to be active reporters, community organizers,
Kelly McHugh publishers, and political leaders for virtually no
Florida Southern College monetary cost. Personal Democracy Media is
founded on the belief that the Internet has pro-
See Also: Cyber-Jihad; Foreign Policy; U.S. moted a revival of civic conversation because it
Pentagon Social Media in Strategic Communications allows like-minded individuals to connect and
Program. expand their social networks. They maintain
954 Personal Democracy Media

that citizens want a voice in their government, sessions explored the dynamic and convergent
as well as increased openness and transparency roles of bloggers, journalists, and politicians dur-
from government and corporations. According ing the 2004 election.
to its organizational manifesto, Personal Democ- Since this initial meeting, Personal Democ-
racy Media strives to provide a place for people racy Forums have been organized in New York
who are challenging the status quo to meet and City each summer. The theme of its ninth annual
collaborate to “discover the tools powering the conference following the 2012 election was
new civic conversation, spot the early trends, and “The Internet’s New Political Power.” Among
to share in understanding and embracing this the topics discussed by speakers and attendees
dynamic new force.” included Internet privacy policy, global Internet
Prior to initiating Personal Democracy Media, issues, hacking and activism (hacktivism), and
Andrew Rasiej counseled national and interna- dynamic power shifts that have stimulated social
tional politicians, offering new media advice to and cultural change. Panels and discussions also
congressional representatives and political lead- explored new strategies for effective online orga-
ers such as Hillary and Bill Clinton. In 2003, he nizing and campaigning, and examined how
was named chairman of the Technology Advisory technology affected and reshaped politics during
Committee for presidential candidate Howard the 2012 election.
Dean’s revolutionary digital media campaign. Beginning in 2009, Personal Democracy Media
Since founding Personal Democracy Media, began organizing a series of European confer-
Rasiej has continued his involvement in other ences that have occurred in various cities through-
nonprofit organizations and leadership positions out Europe (Barcelona in 2009 and 2010; Brus-
dedicated to promoting the use of the Internet sels in 2012; Warsaw in 2013; and Paris in 2011
for enhancing citizen involvement in politics and and 2013). Additionally, a Personal Democracy
increasing government transparency and account- Forum was held in Santiago, Chile, in 2010. Past
ability. Cofounder Micah Sifry’s experience prior sponsors of Personal Democracy Forums include
to Personal Democracy Media included working Microsoft, Google, Facebook, AT&T, and the
with the nonprofit organization Public Campaign, Harvard Institute of Politics. Notable speakers
which was focused on issues of campaign finance have included Arianna Huffington, Lawrence
reform. He also served as editor and writer of the Lessig, Eliot Spitzer, and Joe Trippi.
magazine The Nation for 13 years, and authored Personal Democracy Media also publishes
several books on politics. While serving as the TechPresident, which is an online news outlet
editorial director of Personal Democracy Media dedicated to covering news about how technol-
since 2004, Sifry has also worked as an Internet ogy is changing politics, government, and civic
consultant for various political organizations, life. TechPresident journalists report on organiza-
campaigns, nonprofits, and media entities. tions’ and political campaigns’ uses of the Internet
In an effort to achieve its organizational objec- and social media, as well as activists and citizens
tives, Personal Democracy Media produces physi- who are using new technologies to change politi-
cal and virtual forums throughout the year. One cal processes. In 2007, TechPresident received the
of its largest events is the Personal Democracy Knight-Batten Award for Innovations in Journal-
Forum, which is an international cross-partisan ism for its coverage of the 2007 to 2008 presiden-
conference that allows political professionals, tial campaigns. This distinction rewards news and
activists, academics, and technologists to come novel approaches to information exchange that
together to explore and analyze technology and enhance opportunities for digital engagement.
its impact on politics and government. The first
Personal Democracy Forum was held in New Social Media
York City following the 2004 presidential cam- In an effort to further communicate with citizens,
paign, and focused on discussing the ways that Personal Democracy Media has adopted multiple
the Internet was used by electoral candidates social media platforms. It also maintains a Web
to fundraise, generate votes, and organize com- site that features information about its organi-
munities of supporters. Additionally, conference zation and opportunities for citizens to become
Personalization 955

involved in its initiatives. Its Web site hosts a narrow sense, it means the drive of firms to mar-
digital library that holds an array of multime- ket products, cultural goods, and information
dia content, such as recordings of past Personal differentiated according to individuals’ prefer-
Democracy Forums and other relevant special ences. Personalization impacts the production,
events. A subscription-based area of its Web site, circulation, and consumption of goods, media,
Personal Democracy Plus, offers further oppor- and services. Firms evaluate the personal quali-
tunities for citizens to stay informed of the lat- ties, tastes, and experiences of citizens and con-
est news, tools, and resources for understanding sumers. To do so, they take advantage of digital
how technology is utilized in government, poli- developments in new media such as the Internet,
tics, and advocacy. mobile phones, and social media sites, which
Through producing conferences and events, enable users to communicate through networks
as well as tracking and analyzing news, Personal of personal contacts, and thus provide funda-
Democracy Media attempts to provide resources mental platforms for the personalization of prod-
for citizens, politicians, and advocates to under- ucts. In less familiar parlance, personalization
stand democracy as it evolves with new advance- refers to the intensification of media politics.
ments in technology. The global reach of its orga- Politicians persuade citizens by communicating
nization and communication outreach enables to them their “authentic” personalities, tastes,
individuals to engage in international collabora- and experiences, rather than by articulating pol-
tion and discussion concerning the ways that digi- icy platforms in more formal political settings. In
tal media are used to facilitate a more participa- both meanings, personalization is connected to
tory, connective, and transparent world. major social transformations.

Stephanie E. Bor Background


University of Utah The principal force behind the personalization of
goods, services, and information flows is the need
See Also: Activists and Activism, Digital; Bottom-Up of the capitalist economy to boost consumption
Campaigns; E-Democracy; James K. Batten Award. after the mid-1970s recession that halted eco-
nomic growth in advanced capitalist countries.
Further Readings Since the 1940s, this growth had been based on
Benkler, Yochai. The Wealth of Networks: How the standardized mass production and consump-
Social Production Transforms Markets and tion of commodities. In response to the 1970s cri-
Freedom. New Haven, CT: Yale University Press, sis, and with the goal of increasing consumption,
2006. companies customized their production of com-
Noveck, Beth Simone. Wiki Government: How modities, targeting them toward niche markets.
Technology Can Make Government Better, This shift toward flexible production transformed
Democracy Stronger, and Citizens More Powerful. products in every sector, from automobiles to
Washington, DC: Brookings Institution Press, media commodities. This produced changes
2009. impacting all citizens and consumers, but they are
Personal Media Democracy. “Personal Democracy especially relevant for the lifestyle of a new petite
Media.” http://personaldemocracy.com (Accessed bourgeoisie: a middle-class segment characterized
May 2013). by an ethos of personal pleasure.
Digital technology accelerated this trend to
customize products according to individual pref-
erences. More sophisticated computers, new soft-
ware—such as customer relationship manage-
Personalization ment, a system of management applications to
contact and communicate with consumers—algo-
Personalization is a key term in understanding rithmic methods, Web 2.0, and social media facil-
contemporary transformations in the economy, itated the reprocessing of individual data. These
technology, media, politics, and culture. In its innovations were so impactful that marketers
956 Personalization

apply the term personalization to that set of per- Politics


sonalization technology and means of communi- Interacting with those marketing developments,
cation such as e-mails, text messages, and applica- there has been a shift toward the personalization
tions connecting smartphones, social media, and of politics in contemporary democracies. Political
Web sites. Online and social media corporations parties often experience difficulties in communi-
are central agents in personalizing products. Two cating their messages to stable electorates. This is
of the most successful of these companies are the related to the fact that the neoliberal and global
online bookseller Amazon, which instantly repro- restructuring of the economy has increased tem-
cesses feedback from all customers and recom- porary contracts, part-time labor, and unemploy-
mends books to each customer in real time, and ment. This process fragments the working class
the social network site Facebook, with a news and the middle classes, while eroding the link
feed that is personalized according to individual between group identities and political ideologies.
preferences indicated by users’ online behavior. Under these conditions, citizens receive political
information from the media, turning the media
Cultural Controversies into the principal space for political discourse.
Companies contend that personalization is an Further, in a media-saturated environment,
efficient tool to satisfy the genuine needs of con- politicians must simplify their messages. Politi-
sumers, customers, and users. They claim that cians thus focus on constructing the credibility
personalization increases opportunities for citi- of their personal images while deconstructing
zens to participate in cultural life, increasing their the personal images of their rivals—the politics
knowledge while satisfying their desires. of scandal becomes a form of political competi-
On the other side of the debate, scholars and tion. As result, media politics employs the dra-
media activists are concerned that personalization matic tools of television to produce celebrities
allows companies to commodify data; companies and villains, while the personalization of com-
convert individuals’ personal information into munication, such as targeted advertising and
items to be exchanged for financial gain. Schol- social media, facilitates interaction with citizens.
ars point to the cases of online search engines Finally, and related to the crisis in political ide-
like Google and social network sites like Face- ologies, scholars observe that citizens tend to set
book that actively encourage the self-disclosure political demands according to lifestyle expecta-
of personal information. They argue that Internet tions, shaped by cultural images both represented
corporations sell this information to advertisers, in and targeted via the media.
which then target customers by personalizing the
marketing of products online. Pablo Castagno
Tradable user-generated content includes Universidad Nacional de La Matanza
demographic data, online activities (e.g.,
searches, e-mail communications, Internet links See Also: Algorithmic Authority; Audience
clicked, type of smartphone used), interpersonal Fragmentation/Segmentation; Candidate Image;
communication and personal profiles—but not Privacy; Social Media Strategies and Tactics.
individuals’ identities—in social media. Schol-
ars’ concern is that online users—termed “pro- Further Readings
sumers” or “produsers” because they consume, Bennett, W. Lance. “The Personalization of Politics:
use, and produce economic value—are not paid Political Identity, Social Media, and Changing
for those activities of production. Further, they Patterns of Participation.” ANNALS of the
contend personalization entails the surveillance American Academy of Political and Social
of citizens, and could be detrimental to civic Science, v.644/1 (2012).
life because companies personalize information Boltanski, Luc and Eve Chiapello. The New Spirit of
flow—for example, in online newspapers linked Capitalism. London: Verso, 2007.
to social network sites—thus hindering the Bourdieu, Pierre. Distinction: A Social Critique of
development of civicness on common ground in the Judgement of Taste. Cambridge, MA: Harvard
daily interaction. University Press, 1984.
Persuasion Niche and Political Messaging 957

Castells, Manuel. The Power of Identity: The which emphasizes not general or universal points
Information Age: Economy, Society and Culture of appeal about a product or message, but the
Volume II. 2nd ed. Malden, MA: Wiley-Blackwell, specific relevance of the message to specific ele-
2010. ments of the public.
Fuchs, Christian. “The Political Economy of Privacy Political niche markets are often defined in geo-
on Facebook.” Television & New Media, v.13/2 graphic or demographic terms, such as mountain
(2012). state voters; voters in Oxford, Mississippi; young
Golumbia, David. The Cultural Logic of voters; Hispanic female voters; independent vot-
Computation. Cambridge, MA: Harvard ers; or non-Hispanic white voters over 65 years
University Press, 2009. old. How large a target can be while still being
Harvey, David. The Condition of Postmodernity: a “niche” is essentially a function of the scope
An Enquiry Into the Origins of Cultural Change. of the campaign. A local political campaign is
Oxford: Blackwell Publishers, 1990. already aimed at a relatively small number of
Pariser, Eli. The Filter Bubble: What the Internet Is voters; for instance, compared to a statewide or
Hiding From You. London: Penguin Press, 2011. national campaign. Likewise, a primary campaign
is focused on a relevantly different group of voters
than a general election is (i.e., a group that may
be more persuadable if the candidate affirms his
or her commitment to party ideas than by a can-
Persuasion Niche and didate who, during the general election, empha-
sizes his or her moderate stances and willingness
Political Messaging to work with the other side). Primary candidates
with a reasonable expectation of nomination may
A persuasion niche is a niche market that is the bear general election voters in mind even during
target for a specific persuasive message tailored or the primary, to avoid making or supporting state-
best suited to that niche as part of a marketing or ments that could be used against them by their
political messaging endeavor. In the private sector, general election opponent.
a niche market is the subset of the overall mar- The larger the scope of a campaign, the more
ket at which a product is aimed, but in politics, diverse the group of voters to which it is mar-
the “market” for a political product—whether a keted, which—as with the energy conservation
candidate, ballot issue, or cause—consists of all example—necessitates emphasizing different (not
eligible voters. In political campaigning and mes- contradictory) messages in order to reach differ-
saging, “niche market” refers not to the market ent segments of the population. This is not a new
at which the overall campaign is aimed, but to a phenomenon; even the earliest American politi-
smaller and clearly defined subset to which some cal campaigns had to deal with the very differ-
approaches and aspects of the product will be ent political concerns of the free north and the
more appealing than others. slaveholding south, and the different lives and
A simple example is the energy conserva- economic realities of urban Americans and rural
tion campaign, which has taken numerous farming Americans that constituted the earliest
approaches to convincing audiences to use less rebels against the new American government.
electricity, appealing to some with environmen- More recently, various Democratic congressional
tal concerns (the lesser damage wrought by more re-election campaigns in 2010 and 2012 focused
conservative fuel use), to others with economic on the specific benefits of health care reform that
concerns (using less electricity is less expensive, were being or would be reaped by different seg-
despite one’s opinion of global warming), to still ments of the candidates’ constituencies.
others with foreign policy concerns (diminishing
dependence on foreign oil), or the very specific Internet and Niche Messaging
side effects of the overuse of electricity, such as The Internet has made niche marketing a more
light pollution and its effect on stargazing. In popular technique throughout the public and pri-
marketing, this is also called precision marketing, vate sectors. The 2008 Barack Obama campaign
958 Petraeus, David

was especially forward thinking in the way it Further Readings


tracked the different results of differently worded Gass, Robert and John S. Seiter. Persuasion: Social
fundraising e-mails, not only in terms of each Influence and Compliance Gaining. Upper Saddle
draft’s relative efficacy, but also its appeal across River, NJ: Pearson, 2013.
different niches. The discovery of untapped Hoch, Charles. What Planners Do: Power, Politics,
niches, or niches that can be leveraged to one’s and Persuasion. Chicago: APA Planners Press,
favor, is an important part of the field. An impor- 2011.
tant related concept is that of the “long tail”— Koster, Josh. “Long-Tail Nanotargeting.” Campaigns
the subset of a set of objects that is distributed far and Elections (February 1, 2009). http://www
from the center of its distribution. When political .campaignsandelections.com/case-studies/176102/
campaigns are targeting the same groups of vot- longtail-nanotargeting.thtml
ers, the center of distribution, it is advantageous Lindquist, Julie. A Place to Stand: Politics and
to find ways to attract or persuade voters in the Persuasion in a Working-Class Bar. New York:
long tail. Oxford University Press, 2002.
Niche marketing is easier online, where mes- Shirky, Clay. Here Comes Everybody: The Power of
sages can be precisely narrowcast at target mar- Organizing Without Organizations. New York:
kets, instead of broadcast at large audiences like Penguin Books, 2008.
on television or on billboards. The overwhelming
majority of American adults are regular Internet
users and have regular contact with both e-mail
and online advertising. Al Franken’s 2008 sena-
torial campaign was one of the first to provide a Petraeus, David
case study of persuasion niche marketing, target-
ing, or “nanotargeting” (in the parlance of the In November 2012, David H. Petraeus, direc-
campaign, referring to the very small and tightly tor of the Central Intelligence Agency (CIA) and
focused nature of the marketing efforts) more than a retired four-star general, resigned after rev-
125 different niche groups for less than $100,000, elations that he had engaged in an extramarital
resulting in 2,500 separate donors, 20,000 clicks, affair with Paula Broadwell, his biographer. The
and 5,500 e-mail signups. affair came to light during a federal investiga-
Persuasion niche marketing is very specifically tion into threatening e-mails Broadwell sent to a
targeted, not only according to demographics, social acquaintance of Petraeus, who Broadwell
but also by issue. The Franken campaign tied perceived to be a competitor for his affections.
different Google ads to very specific keywords Petraeus’s resignation ended a decades-long
so that they would be triggered by searches, or career during which he was instrumental in reviv-
in the case of Gmail users, e-mails containing the ing and applying counterinsurgency strategy in
relevant phrases. These keywords represented the wars in Iraq and Afghanistan.
various issues of concern to the targeted niche
groups. Franken’s strongest campaign material— Biography
his or her various positions, articles on Franken, David H. Petraeus was born in 1952 in Cornwall-
and endorsements—were paired with the niche on-Hudson, New York. He gradated from West
groups for which they would be the most per- Point in 1974, and was commissioned as a sec-
suasive, and the ad campaigns were accordingly ond lieutenant in the U.S. Army. In 1983, Petraeus
arranged. graduated first in his class from the U.S. Army
Command General Staff College. Subsequently, he
Bill Kte’pi attended Princeton University’s Woodrow Wilson
Independent Scholar school of Public and International Affairs, earning
a Master of Public Administration in 1985, and
See Also: Actors and Social Media in Politics; a Ph.D. in 1987. His dissertation was titled “The
Advertising and Marketing; Cultivation; Cynicism, American Military and the Lessons of Vietnam: A
Political. Study of Military Influence and the Use of Force in
Petraeus, David 959

General David Petraeus meets with U.S. Senator Robert Byrd (D-WV) in January 2007. Petraeus drew national attention when he
testified before Congress in 2008. Some Republicans viewed Petraeus as a possible 2008 presidential candidate, and although that did
not occur, he was appointed commander of International Security Assistance Forces in Afghanistan by President Barack Obama in 2010.

the Post-Vietnam Era”; it focused on the applica- part of a group of civilian and military officials
tion of counterinsurgency in modern conflicts. He who argued that the United States should cease
later used his expertise to oversee the rewriting of its troop withdrawals and instead send more
the U.S. Army’s Counterinsurgency Field Manual. soldiers to Iraq to focus on population security
After earning his doctorate, Petraeus briefly and winning “hearts and minds”; this policy was
taught at West Point; he then returned to active dubbed the “surge.” In January 2007, President
service. Notable assignments included member- George W. Bush adopted the idea of the surge and
ship in the North Atlantic Treaty Organization announced that he was sending more than 20,000
(NATO) Stabilization Forces in Bosnia, and additional soldiers to Iraq. By 2008, the surge had
serving as commander of the 101st Airborne led to a marked reduction in violence in Iraq, and
Division in Baghdad, Iraq. In 2007, after a rapid Petraeus’s subsequent testimony before Congress
series of promotions, he achieved the rank of garnered him national attention and praise, with
general, and was selected as commander of the some Republicans suggesting him as a 2008 presi-
Multi-National Forces in Iraq. In October 2008, dential candidate.
Petraeus became commander of U.S. Central Petraeus continued to occupy a prominent role
Command, headquartered at MacDill Air Force during the Obama administration. In 2010, the
Base in Tampa, Florida. president appointed him commander of Interna-
During the later years of the Iraq War, Petraeus tional Security Assistance Forces in Afghanistan.
became a national figure. In 2006, Petraeus was Subsequently, in 2011, Obama nominated him
960 Pew Internet and American Life Project

to as director of the CIA. He retired from the security breaches. The investigators eventually
military to accept this position, and in June, the traced the e-mails, sent from multiple accounts,
Senate unanimously confirmed him. He served as to Broadwell. Subsequently, federal investigators
director until his resignation in November 2012. also found that Broadwell was using the accounts
to communicate with Petraeus. In an attempt to
The Affair avoid an electronic record of their communica-
Broadwell and Petraeus first met in April 2006, tion, Petraeus and Broadwell would use a Gmail
when Petraeus gave a speech at Harvard’s Ken- account to compose messages, and then save them
nedy School of Government; Broadwell was in the draft folder.
enrolled in a Master’s program there. Broadwell, In late October 2012, both Broadwell and
who transferred to King’s College to pursue Petraeus admitted the affair to investigators. By
her Ph.D., made Petraeus’s leadership style the early November, when it became clear that the
subject of her dissertation. She interviewed story would become public, Petraeus decided to
Petraeus through e-mail, and eventually traveled resign. On November 8, two days after Obama’s
to Afghanistan to meet with him in person. Her re-election, Petraeus offered his resignation,
unfinished dissertation became the basis for her which the president accepted the following day.
best selling biography of Petraeus, titled All In: The investigation is ongoing, and federal investi-
The Education of General David Petraeus. The gators have searched the homes of both Broadwell
book was coauthored by Vernon Loeb, and was and Petraeus to discover if either possessed clas-
published in 2012. sified material. In March 2013, the Senate con-
Like Petraeus, Broadwell, who was born in 1972 formed John O. Brennan to replace Petraeus as
in North Dakota, was a graduate of West Point. CIA director.
Broadwell then received a Master’s degree from
the University of Denver, and served in the U.S. Kelly McHugh
Army and U.S. Army Reserves. In August 2012, Florida Southern College
she achieved the rank of lieutenant colonel. The
Army Reserves, however, later revoked this pro- See Also: Ethics of Social Media in Politics; Foreign
motion when her extramarital affair came to light. Policy; Google+.
Broadwell was married, and had two children.
According to news reports, the affair between Further Reading:
Petraeus and Broadwell began sometime in late Kaplan, Fred. The Insurgents: David Petraeus and the
fall 2011, after Petraeus retired from the military Plot to Change the American Way of War. New
and was confirmed as CIA director. The affair York: Simon & Schuster, 2013.
ended in mid-2012. “Timeline of the Petraeus affair.” CNN. http://www
.cnn.com/2012/11/12/politics/petraeus
The Scandal -timeline (Accessed March 2013).
The roots of the scandal were in messages
Broadwell anonymously sent to Jill Kelley, a
wealthy resident of Tampa, who frequently
hosted and attended parties for top military offi-
cials at MacDill Air Force Base. The e-mails con- Pew Internet and
tained details about Kelley and Petraeus’s social
activities, and warned Kelley to stay away from American Life Project
an unnamed man. In response, Kelley contacted a
local FBI agent, and requested that he investigate The Pew Internet and American Life Project is a
the source of the e-mails. nonprofit, nonpartisan initiative that aims to col-
Since the e-mails contained details about lect and disseminate information on the social
Petraeus’s schedule that were not public knowl- impact of the Internet in the United States. The
edge, the Justice Department also became Pew Internet and American Life Project is one of
involved in a formal investigation into potential seven projects that are coordinated by the Pew
Pew Internet and American Life Project 961

Research Center whose motto—“numbers, facts banking, and cloud computing. Since its creation,
and trends shaping your world”—aptly sum- the project has produced more than 350 reports
marizes its mission. The Pew Research Center over 30 different topics. The Pew Internet and
describes itself as a “fact tank” because it places American Life Project reports can be divided into
emphasis on generating data and facts on impor- three broad categories: activities and pursuits,
tant issues affecting the United States and the demographics, and technology and media. Special
world. The center does not offer policy recom- emphasis is given to teens, health, and broadband
mendations or endorse any industry, organiza- adoption. The project also provides separate trend
tion, or individual. The umbrella organization, data on adults and teens, as well as infographics
the Pew Charitable Trusts, was established in on key research topics. The project makes it clear
1948, and provides the bulk of financial support that it does not take a position on policy issues
for the Pew Research Center, yet it upholds the related to the Internet.
center’s independence and neutrality. The data collection methods of the Pew Inter-
The Pew Internet and American Life Project net and American Life Project are aligned with the
was established in 1999 with the help of a $5.9 rigorous research methods of the Pew Research
million, three-year grant by the Pew Charitable Center, and are grounded in public opinion poll-
Trusts. The idea was conceived when Pew Chari- ing and social science research. The project’s
table Trusts staff members recognized the need to research reports are often regarded as an authori-
generate reliable data on what people do online, tative source among policymakers, scholars, jour-
and how their Internet use was affecting their nalists, and bloggers.
lives. Because existing research at the time pre- The project’s Web site lists hundreds of media
dominantly centered on the commercial role of mentions by such prestigious news organizations
the Internet, project creators decided to fill the as the New York Times, Washington Post, PBS,
gap by researching the wide social implications of the Associated Press, and Reuters. In line with its
this new medium, thus placing special emphasis research focus, the Pew Internet and American
on families, communities, education, health, poli- Life Project maintains an active Web presence,
tics, and news. with regularly updated profiles on all major social
The Pew Internet and American Life Project networks. The project also makes available for
became part of the Pew Research Center in 2004, free the full versions of its reports and its data sets
when the Pew Charitable Trusts announced that on its Web site, but users need to follow its user
it was consolidating all its research projects under policy guidelines.
one nonprofit subsidiary. The Pew Internet and
American Life Project director is Harrison “Lee” Maria Stover
Rainie, former managing editor of U.S. News & Washburn University
World Report. The offices of the Pew Internet and
American Life Project are located in Washington, See Also: Berkman Center; Focus Groups;
D.C., and the project currently employs a staff of Infographic; Oxford Internet Institute; Polling.
nine research experts.
The first report, titled “Tracking Online Life,” Further Readings
was published in May 2000, and examined the Pew Charitable Trusts. “Computers and the Internet.”
role of the Internet in Americans’ everyday lives. http://www.pewtrusts.org/our_work_category.aspx
Some of the early reports were based on surveys ?id=4 (Accessed November 2012).
completed in the 1990s by Andrew Kohut, who Pew Internet and American Life Project. “Pew
is director of the Pew Research Center for the Charitable Trusts Backs Research Examining
People and the Press and founder of the Princeton The Internet.” http://www.pewinternet.org/Press
Survey Research Associates. -Releases/2000/Pew-Charitable-Trusts-Backs
With time, the scope of the Pew Internet and -Research-Examining-The-Internet.aspx
American Life Project research expanded to (Accessed November 2012).
include timely examinations of such emergent Pew Internet and American Life Project. “Project
Internet issues as online piracy, blogging, online History.” http://pewinternet.org/Static-Pages/
962 Phishing, Political

About-Us/Project-History.aspx (Accessed The term phishing is believed to be a word


November 2012). play on “fishing,” because it refers to the baiting
Pew Research Center. “About: Andrew Kohut.” of individuals through illicit messages, with the
http://www.people-press.org/about/andrew-kohut initial letters standing in for “password-harvest-
(Accessed November 2012). ing.” The majority of phishing attacks are per-
Pew Research Center. “Pew Charitable Trusts petrated over e-mail, with phishers pretending to
Establishes New Nonprofit Research Organization be a bank or financial institution, and requesting
to Help Better Inform Public and Policy Makers users to login to their accounts in order to verify
on Key Issues and Trends.” http://pewresearch.org/ information or change their personal identifica-
docs/?DocID=142 (Accessed November 2012). tion numbers (PINs).
The e-mail directs users to a fraudulent Web
site, where their private information is captured
and later used to steal money. Another common
phishing technique is installing malicious soft-
Phishing, Political ware (malware) on users’ computers when they
simply click on a fraudulent Web site or open an
Phishing is the act of enticing a person into reveal- infected e-mail attachment. The malware then
ing private information by masquerading as a steals private information from users’ comput-
trustworthy entity. Phishing can be used to steal ers through key logging or downloading Inter-
any type of restricted information (e.g., money, net browsing caches. The most successful type
hospital records), and can be accomplished of phishing, known as “spear-phishing” because
through any communication technology (e.g., of its highly targeted nature, involves including
e-mail or voicemail), as well as in person. In the some personal information, such as names, dates
political realm, phishing refers to the theft of per- of birth, and the last four digits of credit card
sonal information by masquerading as a political numbers, in e-mails sent to potential victims. The
entity, most commonly a politician running for users interpret this information as a sign of e-mail
office who requests donations from supporters. In credibility, when in fact it is mined from the Inter-
this case, the victim gives money to the phisher, net by the phishers, or is simply made up.
rather than to the politician. As a result, both
the campaign donor and the legitimate politician Political Phishing
who might have benefited from the donation are Campaign donations are a particularly ripe tar-
defrauded. get for e-mail phishing. First, politicians have
Political phishing can also refer to conning exempted their campaign donation solicitation
politicians and government officials into disclos- e-mails from the CAN-SPAM Act, which prohib-
ing confidential information, such as national its the promotion of commercial products and
security intelligence and plans for political cam- services through unsolicited e-mail. As a result,
paigns, which can then be used for terrorism, the public is less suspicious of receiving campaign
espionage, or sabotage. Studies show that phish- donation requests from politicians via e-mail.
ing is prevalent in the United States and results Second, political domain names tend to fluctuate,
in substantial monetary damages, although there which makes the public less able to distinguish
are no such statistics currently available on between real and fake ones. For instance, Presi-
political phishing in particular. dent Barack Obama may use barack4president.
Several remedies have been proposed to com, obama12.com, or barackobama.com. All
reduce the impact of phishing attacks. These of these Web sites appear legitimate, yet some of
include both technical solutions (i.e., developing them may be phishing scams. By contrast, finan-
blacklists of phishing sites and removing them cial institutions maintain strict consistency in their
from the Internet, building better antispyware domain names precisely in order to avoid confu-
software) and user education programs on how sion between their real Web sites and a phish-
to recognize fraudulent e-mails and Web sites. ing impersonator. Third, it is relatively easy to
Both have shown effectiveness. mine for information about political affiliation in
Picasa 963

order to create personalized spear-phishing cam- Picasa


paigns. This information can be found on social
network sites or on records of individuals’ prior The proliferation of broadband Internet, digital
campaign contributions, which are publicly avail- cameras, and smartphones has made photo shar-
able online, as required by law. Finally, political ing a popular communication practice. Picasa is
phishing may be less detectable than other types Google’s Web- and desktop-based application for
of phishing. Provided that phishers do not steal sharing digital photographs. Created by Lifes-
more money than the intended campaign contri- cape, initially Picasa was a software package for
bution, the victims may not even realize that they organizing and storing photos for Microsoft Win-
have been defrauded. Political phishing Web sites dows. In 2004, Google acquired Picasa from Lif-
may then be less likely to be blacklisted and taken escape, released it free of charge, and developed
off the Internet. it for Windows, Mac operating system (iOS), and
To combat political phishing, politicians have Linux. Picasa is a part of Google’s attempt to
adopted two noteworthy tactics. One is brand establish an entire ecosystem of software services
consolidation, or funneling campaign donations that include social networking, e-mailing, photo
for multiple politicians through a centralized sharing, and file or document sharing. The role
donation Web site, the Democratic ActBlue and of Picasa in this all-inclusive system is to act as
the Republican RightRoots. The other is enabling a hub for the storage and circulation of photos.
donations through users’ existing accounts with Any Google service that can carry image-based
PayPal and Google. These strategies help avoid content will automatically sync with the user’s
confusion between candidates’ domain names, Picasa account. For example, files stored on
and forgo the necessity of inputting financial Picasa can be uploaded to another Google service,
information for every donation, thus reducing such as Blogger, while any files uploaded to Blog-
contributors’ susceptibility to phishing scams. ger will automatically appear on the user’s Picasa
account, and can then be recirculated to another
Catalina L. Toma service such as the social network Orkut.
University of Wisconsin–Madison In addition to making the software available
across a range of operating systems, Google
See Also: Campaigns, E-Mail; CAN-SPAM Act; developed Picasa Web, the online portal of Picasa.
Data Mining; Decoy Campaign Web Sites. Most users use Picasa Web to upload, store, and
share their photos in photo albums. Like many
Further Readings other forms of social media, Picasa’s organi-
McGrath, Kevin and Minaxi Gupta. “Behind zational structure works with tags, which are
Phishing: An Examination of Phisher Modi searchable by the general public. Users can dis-
Operandi.” In Proceedings of the 1st USENIX seminate the content of their photos in several
Workshop on Large-Scale Exploits and Emergent ways. For example, customized user-generated
Threats. Berkeley, CA: USENIX Association, tags let Picasa users browse through their photo
2008. albums or other people’s photo collections in an
Ratkiewicz, Jacob, et al. “Detecting and Tracking associational way. Users can also contribute to
Political Abuse in Social Media.” Proceedings threaded discussions regarding photo content by
of the Fifth International AAAI Conference on making comments and sharing photos on their
Weblogs and Social Media, 2011. http://www other Google accounts, thereby generating traf-
.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/ fic. This networking functionality allows users to
viewFile/2850/3274 (Accessed November 2012). partake in a form of asynchronous social interac-
Soghoian, Christopher and Markus Jakobsson. tion around photos in the online domain. Simi-
“The Threat of Political Phishing.” In The Second lar to Flickr, the threaded discussion acts as an
International Symposium on Human Aspects of archive of social interaction that can be added to
Information Security & Assurance, Nathan Clarke at various times.
and Steven Furnell, eds. Plymouth, MA: University Image-centric social media developments such
of Plymouth, 2008. as Picasa are changing both online and offline
964 Piccadilly Riots, London

viewing practices. Picasa’s search functionalities media is about accessibility and speed. Picasa’s
facilitate the organization and display of photos structure is more conducive to long-term storing
in that they can recognize all image files on the and archiving of photos.
user’s hard drive. From there, one can upload all
the photos, or a selection, and organize them into Magdalena Olszanowski
folders to showcase for their family and friends. Kim Sawchuk
Picasa also provides an offline photo sharing and Concordia University
viewing platform with a slideshow. Additionally,
movies can be made with Picasa’s Movie Maker See Also: Aggregation; Citizen Journalism;
editing tool, shared across other Google services, Facebook; Flickr; Google.
and most importantly, uploaded directly to You-
Tube. This cross-platform flexibility and range Further Readings
of interlinked functions means that a variety of “Flickr Commons Marks Five-Year Anniversary
users—ordinary citizens, professional photogra- With Galleries of Most-Viewed Pics.” DPreview
phers, photo agencies, and magazines—all take (January 2013). http://www.dpreview.com/
advantage of Picasa. news/2013/01/17/flickr-commons-celebrates
One of the benefits of Picasa is its potential for (Accessed January 2013).
those interested in photojournalism as a part of Sarvas, Risto and David M. Frohlich. From Snapshots
citizen-driven social media. With Picasa, users to Social Media—The Changing Picture of
can attach photos to their e-mail, or immediately Domestic Photography. London: Springer, 2011.
upload them to social media sites like Twitter Shirky, Clay. Here Comes Everybody: The Power of
or Facebook if they have a network connection. Organizing Without Organizations. New York:
Newspapers often source photos of international Penguin, 2008.
events downloaded from Picasa when they want
to showcase “citizen media.” Potentially useful
during times of political protest or civil unrest,
Picasa developers have created plug-ins that allow
users to directly post photographs to non-Google- Piccadilly Riots, London
owned networks such as Facebook and Twitter.
However, Picasa’s plug-ins are not as well inte- August 6 to August 11, 2011, represented a time
grated with mobile phone services, limiting its use of widespread rioting and civil unrest throughout
as a form of citizen-based media-making during London and the surrounding area. What began
a crisis. Crucially, (at present) Picasa has no free, as a peaceful protest against the rising poverty
proprietary iPhone app, and its Android equiva- and unemployment in areas of north London was
lent is a paid service, whereas other major social quickly transformed into a violent situation when
networking apps for mobile devices feature free Mark Duggan, a young man and father of four,
mobile services for photo sharing, such as Face- was killed in Tottenham. During these five nights
book’s Instagram. of unrest, there were over 4,000 arrests and 5,112
Those engaged in citizen media-making as of individual riot-related crimes. Slightly more than
late 2012 tended to rely on social networks such half of the crimes were committed against com-
as Twitter and Facebook for instantaneously mercial shops. This was not an isolated event—on
photo-publishing to a dedicated group of follow- several occasions earlier in 2011, groups of stu-
ers. While Google’s ubiquity is persistent, Picasa’s dents and youths had rioted throughout London.
future remains uncertain. According to the most The August 2011 riots were unique because of the
recent data, its use, along with Flickr, is stagnat- use of social media.
ing because of its poor mobile integration. The
ubiquity of 3G mobile phones is a key factor in Reactions to Social Media Use
social media pervasiveness. Without an easy way During Riots
to upload and share photos, citizens are less likely This riot in London represented one of the first
to use this application for real-time sharing. Social large-scale uses of many types of social media
Piccadilly Riots, London 965

that functioned to help rioters organize, gain rec- to requiring the media to turn over any unused
ognition (e.g., posting photos of people rioting), riot footage. Cameron also had the home secre-
and spread information in novel ways. People tary, Teresa May, meet with representatives from
used Twitter and Facebook to publicly post infor- Facebook, Twitter, and Research In Motion (the
mation that was retweeted and broadly shared, manufacturer of the BlackBerry mobile device).
and they also used private messaging networks Government officials attempted to pressure the
through services like BlackBerry Messenger. By companies that were providing these new social
using social media, ordinary people gained the communication tools to shut down networks,
power to observe and participate in diverse digital monitor conversations, and limit the type of
conversations—practices previously reserved for conversations. The discussion of these bans on
governments, police departments, and organiza- social media use during times of unrest contin-
tions with access to private networks. This exten- ued for a month following the riots, but were
sive use of social media prompted a new type of later dropped.
blame game. Social media became a player, along These riots also represented one of the more
with the actions of individuals, and it was easy to public accounts of how police reacted to the use of
blame these new communication tools for fueling social media, and in particular, the use of private
and even causing the riots. networks through BlackBerry Messenger, to help
One of the more controversial reactions to the rioters organize. Police officers have protocols
prolific use of social media during these riots was concerning when and how they intervene during
that of David Cameron, the prime minister. Quite times of unrest. Yet, with claims of racism and
early during the riots, Cameron made broad prejudice in the air, police found themselves in a
claims that were interpreted by the media and pivotal position: do little and watch the destruc-
citizens as an intent to limit free speech. Cam- tion abound, or act with force and risk criticism.
eron talked of banning the use of social network- The combination of this uncertain time period
ing sites like Twitter and Facebook, in addition and the explosion of communication through

Firefighters attempt to extinguish a large fire at a Party Superstore on Lavender Hill, Clapham Junction, August 8, 2011, during
riots. The majority of crimes committed included vehicles being set on fire and commerical shops ransacked, looted, and set on fire
during the five nights of unrest in north London.
966 Piccadilly Riots, London

social media forced the police to deal with new Differences in Social Media Use
forms of organizination and a crowd temperment After the riots, The Guardian partnered with the
that required faster investigations and reactions London School of Economics to conduct a num-
than in past civil violence situations. As a result, ber of studies that they titled Reading the Riots.
individuals were arrested for statements posted on Extensive interviews were conducted with a wide
social media platforms if the content was believed range of stakeholders involved in the riots. This
to be capable of inciting violence. A report gen- included rioters, victims, police, and court offi-
erated by the United Kingdom (UK) government cials, and the study covered a wide geography. In
made formal recommendations concerning the addition, 2.5 million tweets were analyzed, and
riots, and suggested that not only the Metropoli- researchers found that Twitter played a big role
tan Police Department, but all police organiza- in clean up after the riot, but only a small role in
tions maintain a regular presence on Twitter. actual riot conversation. The hashtag #riotcleanup
was posted by more than 12,000 people and
The Plurality of Social Media the messages were retweeted more than 31,000
The reactions and realizations resulting from times. The messages on Twitter helped people,
the use of social media during the London riots find others who were also interested in rebuilding
mimic those found in other types of organiza- their community. While the vast majority of the
tional crises and emergencies. While much of the reports surrounding the use of social media dur-
rhetoric surrounding limiting social media use ing the riot focused on their destructive impact, it
during the riots was couched as a limit on free is hopeful to have documentation that there were
speech, in reality, controlling messages and com- also many people organizing clean-up efforts, col-
munication channels is likely to be logistically lecting donations to help victims, and combining
impossibile. While networks can be shut down in efforts to rebuild businesses.
a given area, so many different social media plat- BlackBerry Messenger (BBM) was actually the
forms exist that getting total cooperation when dominate communication channel used by the
time is limited is highly unlikely. This shift in the active rioters. This may seem odd because Black-
speed and transparency of communication has Berrys are often considered the tools of business
forced many organizations to rethink their role communicators. Yet, in London at the time of the
in crafting and controlling messages. The entire riots, BlackBerrys were fairly inexpensive because
field of public relations now encourages organi- mobile users could pay for services by the month.
zations to embrace a new way to approach com- Once that low fee was paid, BBM messages could
munication—one where joint messages are cre- be sent to a user’s entire contact list very quickly
ated and the social aspects of these new media with no extra fees. These mobile devices became
are harnessed. very popular with young and poorer people in
These riots also demonstrated the power that London. Combine the low cost of service with the
social media has as a conduit for groups of like- fact that BlackBerry operated an encripted private
minded individuals to organize and perpetu- service that could not be monitored by the police,
ate activities like riots. When people can simply and it is not surprising that this tool became the
touch a button and share information with their dominant device used to spread riot information.
entire contact list, even the metaphor of “spread- One major lesson that should be learned from
ing like wildfire” seems too slow of a description. discussions of the role of social media during riots
In a short period of time, the Web of influence is that social media perform different functions
can experience extreme distribution. and lumping them all together is inaccurate. An
However, this type of rapid self-organization industry social media researcher, danah boyd, has
does not mean one cannot model, predict, and studied social network sites and how they func-
learn from these crowd behaviors. Several studies tion differently than social tools that facilitate pri-
have used the London riot data to generate pre- vate communication and information sharing. In
dictive models to help justify the number of police the UK riots, BBM was the chosen tool of rioters
needed and approaches to take if these situations because most of them did not want to post infor-
occur again. mation publicly and risk arrest. The rioters and
Pinterest 967

bystanders who chose to use more public media Pinterest


like Twitter and Facebook likely did so knowing
that there was a risk involved. This risk was out- Pinterest is a social networking site through
weighed by the publicity they garnered for them- which users share their favorite images of inter-
selves and their causes. When the content shifted ests, hobbies, and activities. It is estimated to be
from illegal activities to organizing for cleanup and the fastest growing and third-largest social media
rebuilding, the more public social media emerged site, behind only Facebook and Twitter, with
as a dominant communication channel. over 48 million users as of April 2013. Accord-
This multiday UK riot will be remembered as ing to the Pew Internet and American Life Proj-
one of the early crises where a mix of communi- ect, 12 percent of online adults and nearly a fifth
cation technologies, including social media, was of online women (19 percent) use Pinterest.
used to perpetuate, publicize, and clean-up from The user space is the equivalent of virtual bul-
an emergency. The resulting mixed messages and letin boards, within which one can pin or collate
blame on technology highlight the complex infor- images from across the Internet. Users can have
mation and communication technologies that will multiple boards for different topics or themes.
continue to morph into new forms and communi- Postings are called “pins,” and users can either
cation practices. use Pinterest buttons embedded by owners in
their Web sites, or a “Pin It” button in their Web
Keri K. Stephens browser to create a pin. Each pin includes a cap-
University of Texas at Austin tion, a short descriptions of the image, and links
back to the site from which it originated. Other
See Also: International Unrest and Revolution; users can comment on pins and repin items to
Quebec, Canada 2012 Student Riots. their boards. Users can easily post their pins to
their Facebook and Twitter accounts.
Further Readings
boyd, danah m. and N. B. Ellison. “Social Network Uses
Sites: Definition, History, and Scholarship.” Pinterest is only limited by the imaginations of
Journal of Computer-Mediated Communication, users. Also, while the original use of Pinterest
v.13 (2007). focused on visually beautiful images, it did not
Gov.UK. “An Overview of Recorded Crimes and take long for companies and corporations to
Arrests Resulting from Disorder Events in August add it to their social media campaigns to adver-
2011.” (October 2011). https://www.gov.uk/ tise products and services. Both individuals and
government/publications/an-overview-of-recorded organizations have adopted the site to advocate
-crimes-and-arrests-resulting-from-disorder-events for their social causes and advance their messages
-in-august-2011 (Accessed June 2013). through social marketing.
Gov.UK. The Riots Communities and Victims Panel. For example, the United Nations Children’s
“After the Riots: The Final Report of the Riots Fund (UNICEF) created a Pinterest board called
Communities and Victims Panel, 2012.” http:// “Really Want These” (pinterest.com/AmiMusa/
webarchive.nationalarchives.gov.uk/2012 really-want-these), which helps users view the
1003195935/http:/riotspanel.independent.gov.uk/ world through the eyes of a fictional girl from
wp-content/uploads/2012/03/Riots-Panel-Final Sierra Leone. The items portrayed are the basic
-Report1.pdf (Accessed June 2013). necessities of everyday life such as grain, water, and
Halliday, J. “David Cameron Considers Banning soap. Following Hurricane Sandy, the ad agency of
Suspected Rioters From Social Media.” The Y & R Midwest created a board “Helpin,” which
Guardian (August 2011). http://www.guardian.co allowed families to create boards identifying the
.uk/media/2011/aug/11/david-cameron-rioters items they needed. Purchases were made through
-social-media (Accessed June 2013). Amazon.com and shipped directly to the family’s
“Reading the Riots.” The Guardian and London home. Petfinder.com posts pictures of adoptable
School of Economics. http://www.guardian.co.uk/ pets to Pinterest to help find homes for animals.
uk/series/reading-the-riots (Accessed June 2013). Pinterest also offers educational opportunities for
968 Pinterest

curating collections of course resources and the


development of class projects.
Web site owners have become aware of the
importance of the quality of their images to
increasing their visibility on Pinterest. Recently,
Pinterest added the ability for business users to
list a link to their Web sites, which appears at
the top of their Pinterest page, right under their
account name and description.
Users can now click and go directly to the
original Web site. Along with this convenient and
expedited Web access, Pinterest also introduced
Web-based analytics to help Web site owners
track and analyze how Pinterest users utilize their
Web sites. Site owners can track the number of
pinners and pins used, as well as the number of
pins and repins from the original first-generation Pinterest page of Ann Romney, wife of 2012 presidential
users. They can also track total impressions and candidate Mitt Romney, still had nearly 17,000 followers at the
reach on the network, as well as referral traffic, end of 2013. The page contains sections such as “Books Worth
both in clicks and unique visitors via data sent Reading,” “Things I Love,” and “Inspiration.”
back to their sites.

Pinterest and Politics


Social media use has grown in recent years as a the Pinterest search engine, hundreds of pins and
tool for political action and civic engagement. boards show up. Interestingly, a review of major
According to the Pew Research Project on Ameri- newspaper Pinterest boards shows that they
can Life and the Internet, 39 percent of all Ameri- focus primarily on beauty, fashion, food, enter-
can adults participated in some sort of political tainment, sports, and so on, with little emphasis
activity on a social-networking site during the on politics, while the TV news networks include
2012 campaign. And while this study specifically political boards and top news stories boards that
looked at Facebook and Twitter users, several of may include political articles. Individuals can eas-
the political activities they described could also be ily repin these to their boards.
performed on Pinterest, including: posting links As might be expected, political candidates,
to political stories or articles, following a political campaigns, and parties have embraced Pinterest
candidate or other political figure, encouraging as part of their social media campaigns. “Poli-
others to vote, voicing one’s opinion on political tics” does not exist as a topic on the drop-down
candidates or issues, encouraging others to take menu of categories in the Pinterest menu. A little
action on political issues of importance to the research leads to the discovery of many political
poster, or belonging to a group on a social net- boards and pinners. President Obama is a social
working site involved in advancing a political or media savvy politician with an official page run
social issue. by the Obama for America 2012 presidential
Individuals can use Pinterest to advance their campaign (pinterest.com/barackobama). Both
political views, just as fans might create a board the White House (pinterest.com/whitehouse) and
for a celebrity. Such pages do not necessarily have the United Kingdom’s Prime Minister (pinterest
the approval of the candidates they support. In .com/number10gov), among others, have Pin-
addition, other users may create anti-candidate terest boards to share news and photos with
or anti-policy boards that portray negative views their constituents. Governmental units such as
of individuals, political parties, or programs. the U.S. Department of State (pinterest.com/
Political cartoons and satirical material are easily usdos), the CDC’s National Prevention Informa-
pinned and repinned. If one types in “politics” in tion Network (NPIN) (pinterest.com/cdcnpin),
Pioneers in Social Media and Politics 969

and the U.S. Department of Health and Human pewinternet.org/Reports/2013/Civic-Engagement


Services (pinterest.com/hhsgov) maintain Pinter- .aspx (Accessed April 2013).
est presences. A search for “senator” or “repre-
sentative” located numerous pages for state and
federal Congress members. Searches for both the
Republican and Democratic parties found sites
for state and local committees. Both potential Pioneers in Social
First Ladies Michelle Obama and Ann Romney
used Pinterest to create a sense of “homey con- Media and Politics
nection” with voters during the 2012 presiden-
tial campaign. Pioneers in social media are individuals, groups,
and institutions that offer innovative leadership
Conclusion in finding more effective ways of providing tech-
Pinterest is a relatively new social media net- nological and human interchanges and connec-
working site, only opening by invitation for beta tion. Traditional systems of communication that
testing in 2010, yet it already has a significant depend on unidirectional flows and top-down
following of individual and organizational users. models have been revolutionized by modern social
One can expect that it will continue to be used media, which have democratized the process by
for political as well as educational and recre- empowering individuals, groups, and hitherto
ational activities. Its multiplatform applications marginalized populations into becoming active
(for smartphones, tablets, and computers) allow players in governance and participatory politics.
individuals to easily curate images and content Debates on the exact meaning of social media,
from across the Internet about candidates and the pioneers of the phenomenon, and its impact
political and social issues. on politics rage throughout the world. Hence, a
broader view, tracing the highlights of the rev-
Adele Weiner olution without having to attribute exclusive
Metropolitan College of New York credit to particular individuals or single events,
Kim Lorber is imperative. Social media in its contemporary
Ramapo College of New Jersey form emerges from the confluence of advances
in technology and movements for pluralism,
See Also: Facebook; Flickr; Social Networking Web expanded public space, and connections among
Sites; Tumblr; Twitter. citizens. Movements for social change and net-
works joined with revolutions in the technolo-
Further Readings gies of communication and information to pro-
Pinterest.com. “PBS NewsHour: Politics on duce social media as a vehicle for facilitating
Pinterest.” http://pinterest.com/pbsnewshour/ political change.
politics-on-pinterest (Accessed April 2013).
Pogue, D. “A Scrapbook on the Web Catches Fire” History
New York Times (February 16, 2012). http:// In tracing the pioneers of social media, the multi-
www.nytimes.com/2012/02/16/technology/ plicity of human agencies as well as institutions,
personaltech/reviewing-pinterest-the-newest policies, and movements in collectively shaping its
-social-media-site.html?emc=eta1(Accessed trajectories of change cannot be overemphasized.
April 2013). Visionaries, leaders, scientists, artists, technology
Rainie, L., J. Brenner, and K. Purcell. “Photos and experts, entrepreneurs, and individuals commit-
Videos as Social Currency Online” Pew Internet ted to creating new worlds have all contributed.
and American Life Project. http://www.pewinternet Framed in historical context, the advance of
.org/Reports/2012/Online-Pictures.aspx (Accessed science and technology is described by Freeman J.
April 2013). Dyson in his book, The Sun, the Genome and the
Smith, A. “Civic Engagement in the Digital Age” Internet: Tools of Scientific Revolutions to Under-
Pew Internet and American Life Project. http:// score the Joint Human Heritages of the Brain and
970 Pioneers in Social Media and Politics

Hands as the Basis of Civilizations. From ancient social media pioneers include Facebook develop-
times to the industrial and contemporary revolu- ers Mark Zuckerberg, Eduardo Severin, Dustin
tions, he notes that abstract thinkers have had to Moskovitz, and Chris Hughes; Twitter heavy-
forge relations with practical inventors and craft- weights Jack Dorsey, Noah Glass, Florian Weber,
speople. This practice has continued today, as Evan Williams, and Biz Stone; Google leadership
centers of scientific research are ensconced among Larry Page and Sergey Brin (with Andy Bechtol-
industry, as seen now with involvement by, for sheim as a visionary early funder); and YouTube
example, Stanford, Harvard, MIT, Princeton, and inventors Steven Chen, Chad Hurley, and Jawed
Rutgers in technology centers such as Silicon Val- Karim.
ley and Route 128 in Boston, which also thrive Like the computer, the Internet is also viewed
as interdependent environments. Other analysts as a byproduct of multiple innovators with com-
corroborate this observation by showing the con- peting narratives. Credit is due to government,
tributions of public policies to providing semi- business, and high-tech entrepreneurs. Respond-
autonomous research institutions such as the U.S. ing to public debates attributing the Internet to
Advanced Research Projects Agency (ARPA) and government guidance and Al Gore’s claim of
its successor ARPANET, and the European labo- shepherding it through Congress, Bob Kahn and
ratory for particle physics, CERN. All are com- Vincent Cerf, often called the fathers of the Inter-
plemented by the imaginative efforts of indepen- net, noted his support for the growth and devel-
dent technology experts and hobbyists, as well as opment of the Internet for an extended period
business and social entrepreneurs from such orga- beginning in the 1970s in a paper titled “Al Gore
nizations as IBM, Bell Labs, the National Science and the Internet.”
Foundation, and RAND.
Blaise Pascal’s calculator in 1642 introduced Social Media and Politics
the modern era of automation. Gottfried Leib- The development of social media has brought
nitz and Isaac Newton’s work, which improved about greater grassroots engagement and the
on Pascal’s calculator, is believed to have laid the democratization of access to information, espe-
groundwork for Charles Babbage’s further refine- cially through its reduction of the cost of commu-
ment of the concepts for a mechanical computer nication. In The Creation of the Media-Political
in the 1820s. Ada Lovelace’s great contribution Origins of Modern Communications, Paul Starr
in building on Babbage’s analytical engine using argues that the modern media, symbolized by the
the first algorithm earned her the standing of the leading role that the U.S. system has played in
“world’s first computer programmer.” The com- the world, is a byproduct of the political struc-
puter has been described as a complex piece of tures and ethos that have created environments
machinery comprising multiple parts, often con- of pluralism and decentralized governance. Social
sidered as separate inventions credited to differ- media, with its inclusion of a broad array of
ent individuals. The list of inventors ranges from actors from scientists, technical experts, visionar-
Konrad Zuse and John Atanasoff to Howard ies, public servants, ordinary citizens, community
Aiken and Grace Hopper. Institutions involved groups, and grassroots institutions, set the stage
in its development include many universities, for the empowerment of individuals or marginal
General Electric, the Bank of America, IBM, and groups to establish power centers.
Microsoft, among others. In the organizational column are entities such
Innovators as diverse as governments, inves- as ARPA, which paved the way with the first
tors, hobbyists, consultants, political and civic e-mail message in 1971, and CompuServe, which
leaders, journalists, visionaries, and tech wiz- was at the forefront with its dial-up technology
ards have all been associated with the rise and and service, enabling members to participate in
development of the new media made possible by common forums. The bulletin board system (BBS)
computers. They include the founders of Apple, provided online meeting places for users to share
Steven P. Jobs and Stephen G. Wozniak; Internet files and messages, while America Online (AOL),
service providers such as AOL and Yahoo!; and which has been described as “the Internet before
Microsoft developer Bill Gates. Other notable the Internet,” blazed a trail with innovative
Pioneers in Social Media and Politics 971

platforms of interactive information paradigms. such as Franklin Roosevelt and John F. Kennedy
Pioneering transformations in integrating the as pioneers. Others even point to Jerry Garcia as
social and political followed from companies the innovator who operationalized the ethos of
such as Friendster, LinkedIn, Myspace, Facebook, social media.
and Twitter. The difficulty of tracing visionaries and par-
As mentioned previously, individual pioneers ticipants in pioneering social media and politics
playing leading roles in mass movements in tech- is illustrated by countless individuals’ overlap-
nology and social change include Tim Berners-Lee ping contributions and competing claims to
of CERN, who offered the technical basis for the ownership of particular technological innova-
operation of the World Wide Web; Steve Case and tions, sociopolitical ideas, or even terminologies.
Kim Kimsey, cofounders of AOL; Tom Anderson Regarding a debate over who first coined the
and Chris DeWolfe, cofounders of Myspace; Steve term social media, Ted Leonsis responded to a
Chen, Jawed Kim, and Chad Hurley, cofounders contested narrative about Tina Sharkey’s claim
of You Tube; and Larry Page and Sergey Brin, of the term’s authorship by pointing out that
cofounders of Google. Jack Dorsey’s Twitter has the concept developed from his and Steve Case’s
also demonstrated its extensive impact on social attempt to craft an instant messenger that fused
networking and politics with its growth in mem- technology and communications with social
bership and geographic spread. networking. Digital innovators, political lead-
However, Mark Zuckerberg’s Facebook has ers, bloggers, social activists, and forerunners
had the most profound impact on politics and of change all contributed to the transformative
society, as David Kirkpatrick emphasizes in The phenomenon.
Facebook Effect, which illustrates its influence In the United States, a leader in the revolu-
by its operation in 75 languages and its trans- tion, pioneers representing different aspects of
formative impact on global politics and society, the process include Evan Williams of Blogger,
although many political analysts feel that Twitter Jim Bumgardner’s The Palace, Adrian Scott’s
is also emerging as a political game-changer, par- Raze, as well as Rick Sanchez with his use of
ticularly in light of its conspicuous role in the U.S. social media to bolster news, as well as Eliza-
2012 presidential election. beth Lindsey, Jude Owner, Maddy Harland,
Because of the fusion of technological, social, and scores of visionaries as founders emphasiz-
and political movements in driving transforma- ing varied dimensions. Social media pioneers in
tions, distinct boundaries between pioneers in politics such as Joan Blades and Wes Boyd, with
particular areas cannot be drawn. On the foun- MoveOn.org, introduced the creative power of
dations laid to revolutionize communication social media to mobilize grassroots involvement
from the traditional top-down and linear para- in national politics.
digms, pioneers in politics have fully utilized
social media in conveying their visions and ideas, Pioneers in Politics
mobilizing followers and establishing alternate Globally, pioneers in politics mirrored the Ameri-
organizations. As noted in the preceding dis- can experience with social media as the new
cussions relating to different fields of endeavor, alternate mode of communication enabled move-
whole movements and group efforts have gone ments, parties, and individuals to rise or fall from
into the pioneering work of politics. critiques raised by the new platform. Political
The building blocks of social media and poli- movements organized and facilitated by social
tics, including the creation of relationships, media led to the ouster of leaders or governing
direct transmission of information, and estab- parties in the Philippines, Spain, and Moldavia.
lishment of supportive networks, are believed to Egyptian and Tunisian uprisings largely spurred
have been practiced long before the current ter- by the media resulted in attempts to curtail
minology limited it to the modern technological this freedom, and the fall of oppressive leaders.
revolution. As such, a large number of visionary Attempts at suppression have occurred in Iran,
leaders, activists, and change agents are placed Belarus, Zimbabwe, Angola, Russia, and China.
in the category. Some observers point to leaders Occupy Wall Street protests in such cities as New
972 Platform

York, Oakland, Quebec, Barcelona, and Chicago See Also: Activists and Activism, Digital; Facebook;
challenged the status quo of finance and politics. Twitter; Zuckerberg, Mark.
To put human faces on the pioneers, mention
could again be made of the prominent exemplars Further Readings
whose workings on politics and organization are Chatora, Arthur. Encouraging Political Potential of
considered transformative by the social media of Social Media Platforms. Pretoria, South Africa:
the world. The United States is credited with intro- Africa Portal, A Project of the African Initiative,
ducing social media into high politics. Other figures 2012.
like Governor Howard Dean of Vermont laid the Dyson, Freeman J. The Sun, the Genome, and the
groundwork of digital activism for political causes Internet: Tools of Scientific Revolutions. New
and office. However, Barack Obama is rightly cel- York: Oxford University Press, 1999.
ebrated as the political figure who pioneered such Kirkpatrick, David. The Facebook Effect: The Inside
methods and changed political communication, Story of the Company That Is Connecting the
fundraising, and mobilization worldwide. World. New York: Simon & Schuster, 2010.
Candidates to congresses and parliaments, Leader, Brian D. and Dan Mercea, eds. Social Media
governors, and leaders in public institutions now and Democracy: Innovations in Participatory
engage their constituencies through digital media. Politics. London: Routledge, 2012.
A good example of the power of the Facebook O’Connor, Rory. Friends, Followers and the Future:
effect has been Oscar Morales, a Colombian How Social Media Are Changing Politics,
citizen who confronted the guerrilla politics of Threatening Brands. San Francisco: City Lights
kidnapping. His mobilization of demonstrations Books, 2012.
throughout world’s cities using Facebook resulted
in the release of a hostage.
In Russia, Aleksei Navalny, an anticorrup-
tion blogger, is acknowledged as a maverick who
sparked an opposition movement through a Rus- Platform
sian equivalent of Facebook, Vkontakte. Chinese
dissident artist Ai Weiwei is recognized as a voice Microblogging sites such as Twitter, video-shar-
of alternate politics mediated by social media. ing sites such as YouTube, and social-network
Wael Ghonim, who spearheaded the mobiliza- sites such as Facebook are social media platforms.
tion of followers in Egypt through Facebook and The metaphor of a platform refers to a horizontal
Twitter, is honored as a pioneer in the region. Ory structure raised above a particular situation; for
Okolloh’s online campaign on Ushahidi moder- example, a stage for public speakers. Translated
ated the brutality of political violence in Kenya. to the digital realm, the platform renders social
Kim Ou-Joon and his colleagues, with their satiri- media sites accessible for ordinary people to voice
cal weekly podcast called Neneuen Ggomsuda, themselves. This understanding of a platform as
also pioneered a political paradigm of multilat- an empty vessel of communication rests on the
eral engagement of public discourses with aca- combined notions of equal opportunity and tech-
demic and political constituencies. nological neutrality. Framing social media sites
The list of innovators and participants linking as neutral platforms, however, tends to conceal a
social media and political pioneers with momen- key tension in their relationships to politics. The
tous events and transformed realities is long. public use of social media platforms for political
Nevertheless, the salience of the revolution and discourse is structured by the commercial impera-
its huge number of actors spanning geographic, tives behind these sites.
cultural, and ideological boundaries cannot be Social media platforms have become strategic
exaggerated. political fields, as citizens across the world use
them to gather together, express their opinions,
Alem Hailu protest injustices, and mobilize around civic ini-
Helen Bond tiatives. Politicians also use them as platforms
Howard University for campaigning and public communication. The
Platform 973

large user base of platforms like Facebook, You- YouTube, and Twitter are leading to an increas-
Tube, and Twitter are the product of not only ing enclosure of users’ radius of online action.
their usefulness in communication practices, but Instead of an open and accessible network, the
also of the profit incentives guiding their provi- Web is increasingly fenced off in proprietary
sion of a “free” communication infrastructure. walled gardens.
The drive to profit from user data and behavior Thanks to the apparent equality and neutral-
shapes Web site architecture and policies primar- ity of a platform, this transformation and its
ily in the service of private interests, rather than attendant power dynamic tends to go unnoticed
public spheres. in everyday social media use. Most users remain
The central function of the term platform unaware of how their actions and personal infor-
in this context is to elide the power differen- mation generates value for platform owners. The
tial between commercial actors and “ordinary” political consequence of this is a widespread pen-
users. At the same time, however, the political etration of surveillance practices into the very
activity of ordinary people using social media architecture of social media platforms. While this
platforms is significant. Especially in massive surveillance is ostensibly a function of the plat-
political mobilizations such as the Arab Spring forms’ advertising models, it can also be used
of 2011 or the Québec student protests of 2012, for political ends, such as in the aftermath of the
social media platforms played a central role in Arab Spring, in which particular organizers were
facilitating physical demonstrations that in many identified and targeted by repressive governments
cases led to political change. As ordinary people through their social media activities.
increasingly circulate their views on the Web, for On the surface, social media platforms seem
the first time in history, the breadth and scope to provide an equal opportunity for all users to
of citizen perspectives and debates becomes participate in public debate over a neutral com-
archived and accessible. munications infrastructure. Yet, the commercial
However, as Tarleton Gillespie argues, plat- motives behind sites like Facebook, YouTube, and
forms are not neutral. The promise of the plat- Twitter seriously undermine the political promise
form as a level playing field for social partici- of platforms in rendering users into commodities
pation obscures asymmetrical power dynamics through what are effectively practices of online
between users and corporate powers that exploit surveillance. The consequence of having commer-
and appropriate user participation. Advertising cially owned public spaces can be seen especially
is the central mechanism through which social in politically turbulent situations, when corporate
media platforms exert control over users. Personal control over the means of communication tends
information about users is collected in exchange to side with powerful private and authoritarian
for their access to commercial social media sites, interests, as opposed to the public interest. In this
in accordance with the terms and conditions way, platforms are not neutral; they structure
agreed to upon signing up. Further, user behav- and regulate political discourse and freedom of
iors online, such as page visits, clicks, and search expression.
terms, are also monitored and compiled as part
of “behavioral advertising” models that seek to Koen Leurs
predict future consumer behavior based on the Utrecht University
patterns of individual users. Tamara Shepherd
Ultimately, the advertising imperative that Ryerson University
underlies social media platforms effectively
limits the scope of users’ online action by con- See Also: Activists and Activism; Advertising and
solidating Web content into the interface of a Marketing Aggregation; Arab Spring; Privacy; Social
particular social media platform. Facebook, Networking Web Sites.
for example, compiles various online content in
its newsfeed, and at the same time, Facebook’s Further Readings
trademark “like” button is ubiquitous across the Campbell, John Edward and Matt Carlson.
Web. The corporate monopolies of Facebook, “Panopticon.com: Online Surveillance and
974 Podcasts

the Commodification of Privacy.” Journal of download on the user’s device, instead of the user
Broadcasting & Electronic Media, v.46/4 (2002). having to search for it on the Web. A variation
Cohen, Nicole S. “The Valorization of Surveillance: of the podcast is the video podcast or “vodcast.”
Towards a Political Economy of Facebook.” This is similar in concept to the podcast, but adds
Democratic Communiqué, v.22/1 (2008). a visual element.  
Gillespie, Tarleton. “The Politics of ‘Platforms.’”
New Media & Society, v.12/3 (2010). Attributes and Drawbacks
MacKinnon, Rebecca. Consent of the Networked: Podcasts offer the user the benefit of convenience
The Worldwide Struggle for Internet Freedom. and portability. They can be listened to during
New York: Basic Books, 2012. a commute to work or during an evening run,
whenever and wherever is convenient for the lis-
tener. Improvements in technology even allow
an amateur to produce a podcast that sounds as
good as something a professional might create.
Podcasts However, this does not mean that every podcast
is created equal. Without planning and attention
Podcasts are audio recordings that are dis- to details such as acoustics, vocal quality, ambient
seminated via the Internet through a sound file. noise, and good content, a podcast will fail. To be
According to the latest Pew Research Center’s successful, podcasts should be relevant, on topic,
2012 State of the News Media report, there are and thoughtful.
approximately 91,000 podcasts in existence and It is important to recognize that almost anyone
25 percent of Americans reported listening to can produce a podcast and claim to be an expert
podcasts in 2011. on a topic. Podcasts are often not put through the
Podcasting began as an offshoot of blogging, same sort of editing or fact checking as would a
when technology evolved to a point that it became piece produced by a media company. As a result,
possible to embed audio files into a blog post and finding podcasts that are worth the time invested
disseminate them through the same channels as to listen to them is a challenge. If a podcast is
a blog. The term podcast was developed as a embedded within a blog, there is often an oppor-
derivative of Apple Corporation’s iPod, an audio tunity to preview the content through an episode
device that facilitates digital downloads and play- guide or synopsis so that the listener can evaluate
back of audio files. The earliest appearances of the creator’s credentials and credibility and deter-
the word in the lexicon date back to 2004; how- mine whether or not it is worth the time to listen.
ever, its adoption was quite rapid, as the New Podcasts are also one sided. They do not allow the
Oxford American Dictionary named “podcast” listener to engage with the speaker as they might
the word of the year for 2005. The term pod- during a live broadcast. However, if the podcast is
cast is a bit of a misnomer because it infers that embedded within another medium like a blog, the
podcasts are only available for consumption via author can use the comments feature in the blog
an iPod device, when in reality, they can be con- to allow for interaction with the listeners.
sumed via any computer if the proper software is Access to technology should also be considered
downloaded. The podcasts are usually produced with regard to the appropriate use of podcasts.
as an MP3 file for convenience because most play- Though it may seem otherwise, not everyone has
ers can accommodate that file type. Podcasts can Internet access. As a result, only a fragment of the
be produced quickly and easily, and disseminated population may be able to benefit from a podcast.
through a variety of social media channels. There
are millions of podcast episodes in existence Podcasts and Politics
across a wide variety of genres, from education Podcasts have been used by a number of different
to sports, science to news, and politics. Listeners political entities. Both major political parties and
interested in a particular podcast series can also individual politicians have podcasts. At last count,
subscribe via an really simple syndication (RSS) there were over 250 different podcasts listed
feed, so that each new episode will automatically under the “News and Politics” category heading
Polarization, Political 975

on iTunes, Apple’s library of downloadable pod- images, or videos that are shared from other
casts. The New Yorker magazine, for example, media outlets. Coupled with the rise of partisan
produces the Political Scene Podcast, hosted by news channels, talk radio, and Web sites, there
the magazine’s executive editor, Washington cor- is a substantial amount of information that is
respondent, and others. The podcast discusses the presented in a way that confirms the views of its
previous week’s White House activity. As private consumers, often offering only a token of dissent
individuals can produce a podcast almost as eas- or none at all, which can be posted to a person’s
ily as The New Yorker, it is now easier than ever social networking pages and shared with their
for interested parties to contribute their voices to social networks.
political discourse. This in turn allows these polarized versions of
news stories to “go viral” and quickly circulate
John Dolan among these political communities. The effects
Pennsylvania State University of this polarization are debatable, and the extent
to which social media increases polarization is
See Also: Audience Fragmentation/Segmentation; likewise contentious. However, there is a substan-
Blog Syndication; Blogs; Embedding; RSS Feeds; tial discourse surrounding political uses of social
User-Generated Content; Web 2.0. media, and their impacts on political polarization
and this discourse seems likely to be influential
Further Readings for the foreseeable future.
Educause. “7 Things You Should Know About
Podcasting.” http://net.educause.edu/ir/library/pdf/ Pro-Polarizing Effects
ELI7003.pdf (Accessed September 2012). Much of the political discourse on social media
Pew Research Center. “The State of the News Media tends to reinforce and accelerate the processes of
2012.” http://stateofthemedia.org/2012/audio political polarization. This is because social media
-how-far-will-digital-go/audio-by-the-numbers users tend to subscribe to news from sources that
(Accessed September 2012). share their ideological perspectives, and that are
“‘Podcast’ Is the Word of the Year.” Oxford unlikely to challenge their views in any significant
University Press. http://www.us.oup.com/us/ way. The sheer abundance of choice in this politi-
brochure/NOAD_podcast (Accessed September cally tailored media can even give the impression
2012). that one is exposed to a multitude of views, which
Ralph, Jason. “Pol-Casting: The Use of Podcasting is supposedly essential for the effective running of
in the Teaching and Learning of Politics and democratic governments.
International Relations.” European Political However, the fact that people can see an
Science, v.9/1 (2010). enormous number of commentators and report-
ers echoing the same views and purported facts
means that this impression is not only likely to
be in error, it is also highly probable that their
politically polarized views are reinforced by the
Polarization, Political sense that most people agree with this view. In
other words, this self-selection of media is com-
Political polarization is a process by which politi- pounded via social media to create false impres-
cal opinions in a given population diverge toward sions of majority belief and the unquestionable
extremes, generally along party lines. This pro- rationality and truth of one’s political preferences.
cess leads to a reduction in dialogue between peo- Genuine shock at election results that contradict
ple of different political views, and to a decreased one’s expectations can result. Although this surely
chance of political compromise between them. existed before the rise of social media, the poten-
Social media can be seen as both a causal factor tial problem for democracies is that this shock
in this process and a force that is shaped by it. could be translated into questioning the valid-
The content of social media is often not original ity of the results and the political process itself,
to that platform, but instead consists of articles, which undermines the ultimate legitimacy of the
976 Polarization, Political

government and makes it more difficult for lead- news and political sources further exacerbates
ers to actually govern. these effects.
Twitter is one of the most popular social media Polarization can also occur via mashups of
platforms in the world, boasting roughly 200 mil- clips to make a larger partisan point about how
lion regular users. Its popularity is partly because “wrong” the other political side is on a given
of its constraints on the number of characters issue, or to mock candidates or positions. It can
allowed in each tweet, and the ease with which also occur via “gotcha” moments where candi-
people can share a link to a longer article, site, or dates are exposed making significant gaffes or
media clip via the platform. Political interaction offensive remarks, often without the awareness
with this social media platform occurs in at least that they are being recorded. These clips can then
three distinct ways. People can subscribe to Twit- be reposted to other social networking platforms
ter feeds from political people and organizations, like Twitter and Facebook, and then used as a sort
making it a fast way of getting bite-sized political of opposition viral information effort to rally the
messages from trusted sources. Alternatively, peo- politically like-minded around a given candidate
ple can post political thoughts and links on their or cause.
Twitter feeds, meaning that their ideas are shared One of the other key social media sites is Face-
with those following them. Even more popular is book, which boasts regular user numbers of over
the practice of rettweeting, which means simply 1 billion people. This makes it potentially one of
forwarding existing political tweets on ones’ feed, the most important political tools in the world.
again creating the potential for a viral dynamic to Consequently, a great deal of effort has been
emerge on a political issue. spent by politicians and other political actors
Unlike other social media platforms, which in democratic regimes in creating a meaningful
often focus on relationships, the brevity of presence on the site. As with other social media
Twitter lends itself to use for quickly distribut- platforms, political actors hope that their mes-
ing brief thoughts that do not necessarily create sages will go viral through reposting or sharing
much of a relational dynamic between users. across users and platforms. Indeed, it is difficult
Furthermore, the hashtag system, which allows to think of a single major political figure in any
Twitter users to identify relevant topics for their democratic state who does not have a Facebook
tweet, and which often have millions of poten- page with significant numbers of people who
tial followers, means that politically minded “like” or “follow” it.
users can subscribe to specific party, issue, and There is some debate over the polarizing poten-
candidate hashtags that conform to their views. tial of political activity on Facebook. People are
As such, people are more likely to subscribe to more likely to “friend” those who they know in
Twitter feeds that correspond to their political the nonvirtual worlds of work, school, and more,
views, and to have followers who are relatively and more likely to have a politically heteroge-
politically homogeneous. neous set of contacts on the site. Still, the oppor-
Social media interaction via YouTube videos tunity to subscribe to updates from like-minded
tends to be highly impersonal. People may be politicians and groups and to forward those posts
sharing clips with others they know, but view- and articles to one’s friends creates the possibility
ers are unlikely to have personal connections to of continued media selection and echo chamber
those in the clip or those producing them. This dynamics. This is especially true given that it is
means that comments sections below the clips easy to block the posts of people who politically
can be notoriously vicious. These may range from disagree without actually “unfriending” them or
disagreement with issues, to disparaging remarks losing access to chat, see their photos, or manu-
about the content, to personal attacks on other ally check their updates.
commenters. Clearly, these factors mean that People can thus filter out those who disagree
there is a low political trust factor, low personal and further reinforce politically polarized social
interaction factor, and high risk of polarizing networks that extend to offline social relation-
effects. The sorting of YouTube content into cus- ships. Facebook’s carryover effect into the real
tomized channels from already polarized partisan world makes political polarization that occurs via
Polarization, Political 977

its platform potentially more powerful and last- may nonetheless have political views that are not
ing since people are often interacting with others aligned with their subscribers. This is especially
whom they care about, know very well, and/or true of people in the film industry, who might hold
view as trustworthy. leftist or progressive views, but whose fans often
come from regions of the United States that are
Anti-Polarizing Effects more conservative. Alternatively, some sports like
Despite the wealth of research demonstrating NASCAR or music genres like country-western
the potential of social media to foster political are more likely to feature people who are conser-
polarization, there is likewise a significant body vative, yet they may very well have more liberal
of evidence that demonstrates it can conversely fans who subscribe to their feeds for updates on
be used for obviating polarization and increasing their latest activities.
dialogue and even tolerance. In some instances, There are also far less influential Twitter
social media is even used as a simple means of feeds in terms of subscriber numbers that may
information gathering for those wanting to make have more impact on individual voters because
better informed decisions as voters, and can offer any individual can have an account. This means
a genuine avenue for political persuasion. that when someone subscribes to the feed of
Younger voters in particular are likely to gather someone they actually know, and consequently
information online. Prior to the rise of social are more likely to trust on political issues, they
media and social networking sites, this would may be exposed to alternative political ideas, or
have involved search engine queries, visits to at the very least to internal critiques and refine-
major news and political sites, and perhaps a look ments, or partisan political messages. Polariza-
at official party or candidate platforms on their tion has pushed people more firmly into the U.S.
Web pages. This information-gathering method two-party system, but that does not mean that
is relatively passive and noninteractive, though it there are not very distinct constituencies within
certainly makes access easier and faster. The addi- them that have unique concerns and outlooks on
tion of social media to this mix means that peo- particular issues, and thus provide an element
ple can not only gather information online, they of internal debate and self-correction toward a
can also see how others are interacting with that political mean.
information, including people whom they know While YouTube is relatively impersonal and
from their own social networks, and who conse- more prone to online trolling and abuse, it is one
quently would have a higher quotient of political of the primary sources of information for people
trust. The type and nature of the discourse can looking to make informed decisions about poli-
widely vary depending upon the personalities of tics. They can subscribe to channels from non-
the social media users, nature of the topic being partisan sources, or even from direct government
discussed, and use of escalating rhetoric within sources like the White House or Congress. This
posts. The social media platform also has an allows politicians to directly speak to voters with-
important role to play in the type of discussion out partisan news filters, though this does not
taking place. mean people do not filter the news via personal
Although Twitter is among the more likely partisan lenses. It is also an excellent resource for
platforms to have a polarized audience due to its those who want to engage in and watch substan-
use of hashtags and the ease of filtering informa- tive political debates as various expert roundtables
tion according to political preferences, it nonethe- and even candidate debates are easily accessed on
less has significant potential as a dialogue starter, its portal. Although polarization does not disap-
not only because of the ease of use and rapidity of pear in these venues, they do make the existence
distribution mentioned before, but also because it of debate and the possibility of alternative politi-
is immensely popular as a publicity tool for sports cal beliefs more concrete and could theoretically
figures, celebrities, and other public figures. In also foster greater tolerance for and awareness of
these cases it is entirely plausible that people may divergent views.
subscribe to tweets from people in public life that Of all the most popular social media sites,
they enjoy in a public consumptive capacity, who Facebook is probably the most likely to foster
978 Polarization, Political

political tolerance and genuine discourse. This echo chamber effect of people surrounding them-
does not completely mitigate the polarizing influ- selves with those who agree with them politically
ences of friend selection, the existence of echo to the extent that they no longer view opposing
chamber effects due to regional political trends, beliefs as legitimate or even rational. Once one’s
and social or religious networks, all of which will opponents cannot even be seen as possessing logic
likely be reflected in a user’s friends list. How- and common sense, there is little ground left for
ever, its key distinction is this very same personal respectful dialogue, let alone genuine compromise.
relational element. As mentioned before, this is a Furthermore, the viral nature with which infor-
crucial component of what is referred to as politi- mation is distributed on these platforms and their
cal trust. The more political trust a user has in emphasis on quickly grabbing attention and mak-
someone else, the more likely it is that their opin- ing political statements with the utmost simplicity
ions will matter and be influential. A lack of trust and brevity means that polarization can be fur-
equates to an easier time ignoring information or ther worsened, simply through a lack of factual
opinions that run counter to one’s own. substance and grounding of political argument
Various studies have been done on actual Face- with observed effects in the real world. Ideology
book posts and their political content. These have thus trumps experience and empiricism, and in
generally rated the opposition factor of opinions this scenario, it is difficult to see any means of
and the tone of the discourse involved. To date, extricating political debate from this polarizing
most of these studies have shown that discourse dynamic.
is surprisingly civil, and is centered on discuss- Despite these many tendencies toward polar-
ing the facts and merits of given political topics ization, social media, particularly as seen on sites
or candidates. Researchers Matthew Kushin and like Facebook and in conjunction with nonparti-
Kelin Kitchener, for example, have found that san open information and government account-
there is little evidence of widespread polarization ability groups, can actually foster not only easier
on Facebook or at least that Facebook is not a access to relevant political information, but also
causal factor in polarization in most instances. In far more substantive and tolerant debate between
fact, it was shown to potentially increase political people with divergent views. If these educational
tolerance and discourse precisely because the peo- and relational components continue to rise in
ple involved already have personal relationships popularity as social media functions, then it may
with one another that exist outside of a politi- very well have a significant role to play in allow-
cal context. This means that unlike many other ing political partisans to be exposed to alternative
online spaces where anonymity or at least the lack viewpoints, and even to hosting the conversations
of offline connections exist between users, gener- that are necessary for finding solutions that are
ating a sense of alienation toward other actors acceptable, if not optimal, to people of all politi-
and general lack of accountability for how one cal persuasions.
behaves, Facebook actually encourages substan-
tive and polite conversation because normal social Jeremy Kleidosty
rules apply as they would in the offline real world. University of St. Andrews

Conclusion See Also: Blogosphere; Campaigns, Digital;


Improving the effectiveness of social media efforts Cynicism, Political; Facebook; Going Viral; Hashtag;
is part of a major drive by both major U.S. politi- Political Base; Political Parties; Twitter; YouTube.
cal parties to increase turnout among voters. They
are also seen as critical parts of building an online Further Readings
brand that can generate user loyalty, with the aim Baum, M. A. and T. Groeling. “New Media and the
of ultimately improving not just voting but also Polarization of American Political Discourse.”
citizen engagement with politics. Due to the use Political Communication, v.25/4 (2008).
of social media platforms to republish material Bernhardt, D., S. Krasa, and M. Polborn. “Political
from partisan news outlets and other self-filtering Polarization and the Electoral Effects of Media
sources, it often has the effect of amplifying the Bias.” Journal of Public Economics, v.92/5 (2008).
Polis, Jared 979

Fiorina, M. P. and S. J. Abrams. “Political the Community Computer Connection program,


Polarization in the American Public.” Annual which supplies schools and nonprofit organiza-
Review of Political Science, v.11 (2008). tions with refurbished computers—more than
Kushin, Matthew J. and Kelin Kitchener. “Getting 3,500 each year. The JPF also produces a semi-
Political on Social Network Sites: Exploring Online annual report on education.
Political Discourse on Facebook.” First Monday In 2004, Polis founded the New America
(October 2009). http://firstmonday.org/ojs/index School, which has four campuses that serve immi-
.php/fm/article/view/2645/2350 (Accessed June grants ages 16 to 21 years old. Polis next co-
2013). founded the Academy of Urban Learning, which
Zhang, W., T. J. Johnson, T. Seltzer, and S. L. helps at-risk Denver youth. He has received many
Bichard. “The Revolution Will Be Networked: The awards for his philanthropic efforts, including the
Influence of Social Networking Sites on Political 2006 Outstanding Philanthropist, the Boulder
Attitudes and Behavior.” Social Science Computer Daily Camera’s 2007 Pacesetter Award in Edu-
Review, v.28/1 (2010). cation, the Kauffman Foundation Community
Award, the Ohtli of the consul general of Mexico,
the Martin Luther King, Jr., Colorado Humanitar-
ian Award, and the Boulder Community Builder
Award through the Anti-Defamation League.
Polis, Jared
Political Career
Jared Polis is the U.S. representative for Colora- In 2000 Polis began a six-year term on the Colo-
do’s Second District. First elected in 2008, Polis rado State Board of Education. He served until
serves on the Committee on Rules and the Com- his district was eliminated in January 2007. The
mittee on the Judiciary. Polis is also a member of election that brought him into this position was
the Democratic Steering and Policy Committee one of the closest in the history of the state of
of the House of Representatives. Despite his rela- Colorado; Polis won by only 90 votes.
tively recent tenure Polis leads as a Democratic Starting in 2006, Polis joined Coloradans for
Caucus regional whip, co-chairman of the New Clean Government as cochair. On this committee
Democrat Coalition Education Task Force, chair he advocated for Amendment 41, which sought
of the Immigration Task Force of the Congres- to ban lobbyist gifts to elected officials and estab-
sional Progressive Caucus, cochairman of the lished an annual $50 restriction on nonlobby-
U.S.–Mexico Congressional Caucus, cochairman ist gifts. It further mandated a two-year waiting
of the Congressional Caucus on Nepal, and co- period for former elected officials who wish to
chairman of the LGBT (lesbian, gay, bisexual, and begin lobbying, and established an ethics com-
transgender) Equality Caucus. Additionally, he is mittee to be independently regulated. In 2006 the
a member of the U.S. Air Force Academy Board measure was approved by Coloradans.
of Visitors. In 2007 Polis cochaired a campaign for school
Polis and his parents created the online greet- bonds, which was approved. In 2008 Polis suc-
ing card Web site www.bluemountainarts.com, ceeded Mark Udall as representative for Colo-
later selling it for $780 million. Polis launched rado’s Second District in Congress, and he was
ProFlowers on his own, an online florist that was reelected in 2010. Polis is openly gay, and became
eventually acquired by Liberty Media Corpora- the first gay parent in Congress in 2011.
tion in 2006. By 2008, when he was elected to In 2011 Polis and Senator Joe Lieberman spon-
Congress, Polis was one of the 10 wealthiest con- sored the Race to the Top Act, H.R. 1532, which
gresspeople, worth approximately $66 million. dealt with school innovation, charter schools,
In 2000 Polis signaled his commitment to edu- and teacher compensation. Polis also sponsored
cational opportunity with his establishment of the School Lunch Improvements for Children’s
the Jared Polis Foundation (JPF). The JPF runs Education Act, SLICE, in response to the congres-
the annual Teacher Recognition Awards to spot- sional definition of pizza as a vegetable. SLICE
light outstanding educators. It also administers would require healthier meals for students, would
980 Polis, Jared

count tomato paste based on its actual volume, Polis also introduced the Computer Science
set targets for sodium reduction, and allow a U.S. Education Act, which was designed to provide
Department of Agriculture whole grain require- computing vocational training. Polis also spon-
ment. SLICE is opposed by agribusiness giant the sored the ACE Act to provide funding for chroni-
Food Institute. cally low-performing schools.
Polis sponsored the Student Non-Discrimina- Polis has consistently opposed the Iraq war. He
tion Act, SNDA, with Senator Al Franken that also supports removal of all troops from Afghani-
would apply Title IX of the Education Amend- stan. Polis voted in favor of sanctions against
ments Act to LGBT students and therefore feder- Iran. He has called for the U.S. State Department
ally prohibits sexual orientation and gender iden- to investigate human rights abuses against LGBT
tity discrimination in all schools. Work continues Iraqis and to take action to stop violence against
to make this a bipartisan enterprise because only the Honduran LGBT community. An outspoken
two Republicans had signed onto SNDA by opponent of the USA PATRIOT Act, Polis has
December 2012. Polis also sponsored the Defend- called for restoration of civil liberties and privacy
ing Special Education Students and Families Act, rights in Congress. Polis was also critical of cer-
which would fund the Individuals with Disabili- tain aspects of SOPA, PIPA, and CISPA, all acts
ties Education Act (IDEA). This legislation regu- designed to fight piracy, protect intellectual prop-
lates how government agencies intervene in spe- erty, or allow online surveillance by authorities.
cial education cases. Polis is an active advocate for the LGBT com-
munity. He has called for the repeal of the Defense
of Marriage Act (DOMA), and asked for the rec-
ognition of LGBT marriages in the United States
as an original sponsor of the Respect for Marriage
Act to repeal DOMA. Polis voted for the repeal of
“Don’t Ask, Don’t Tell.” Polis also cosponsored
the Matthew Shepard and James Byrd, Jr. Hate
Crimes Prevention Act, which would fund federal
investigation of hate crimes, and has pressed for
the inclusion of LGBT domestic violence victims
in VAWA provisions.

Social Media Use


According to OhMyGov, at the end of 2012,
Jared Polis enjoyed a Media Power Rank of 48th
among 541 peers; Poleet.com also reported that
Polis had a Klout score of 82. In December 2012
he had just under 19,000 fans on his Facebook
page and more than 37,000 Twitter followers. In
a 2012 interview with Politico, Polis said of his
social media use: “I use these platforms myself, so
they have an authentic voice. You’re not going to
connect with users with nothing but canned mes-
saging and press releases. You have to ‘get’ the
unique language of each medium.”
In 2012 Jared Polis was the winner of the
Member Online All-Star Competition among
Colorado Congressman Jared Polis’s speech titled “Financing Democrats in the U.S. House of Representatives.
Mechanisms for Developing Human Capital” at the TEDxBoulder This three-week-long competition, which was in
event in 2010. Polis discussed how small investments in its third year in 2012, was designed to boost the
education could yield big results for the economy. social media presence of Democratic members of
Political Base 981

the House. Polis put his online experience and that just as alcohol is banned on campus despite
familiarity to work and campaigned on Red- its legal status, marijuana will also continue to be
dit and on his profile pages. Polis is also a Sec- banned. Polis also e-mailed an official statement
ond Life player, and has posted on the League of countering Benson’s message. This rapid response
Legends forum with a positive response. House in online fora highlights Polis’s effective social
Democratic Whip Steny Hoyer announced in media presence.
August 2012 that Polis was the winner, and that
Democratic House members gained in excess of Karla Lant
139,000 new fans on Facebook, followers on Northern Arizona University
Twitter, and subscribers on YouTube during the
three-week contest. This represents a gain of See Also: Hoyer, Steny; Lesbian, Gay, Bisexual, and
more than 82,000 over the 2011 contest results. Transgender Rights; Pelosi, Nancy.
This was not Polis’s first run as MVP; he also won
the first contest in 2010. Further Readings
Polis’s Republican counterpart in 2012 was Murgai, P. “Rep. Jared Polis Wins House Democrats’
Congressman Justin Amash, the Republican New Online Crown.” Politico. http://www.politico.com/
Media Challenge MVP. The Republican New news/stories/0812/79448.html (Accessed December
Media Challenge is a nearly identical yearly con- 2012).
test in which Republican Representatives compete OhMyGov. “Jared Polis.” http://ohmygov.com/
to attract the highest number of new followers on accounts/Person/326-jared-polis/summary
Facebook, Twitter, and YouTube. (Accessed December 2012).
Also in August 2012 (and in the wake of his Poleet.com. “Jared Polis.” http://www.poleet.com/
MVP victory) Polis was highlighted by the Inde- jaredpolis (Accessed December 2012).
pendent Voter News (IVN) in a feature called Project Vote Smart. “Representative Jared Polis’s
“The Social Ballot.” This segment of the online Biography.” http://votesmart.org/candidate/
publication is devoted to recognition of “politi- biography/106220/jared-polis#.UMqXOZPjmNw
cians, candidates, and political organizations who (Accessed December 2012).
are utilizing social media in effective and creative Roll Call. “Rep. Jared Polis (D-Colo).” http://www
ways.” IVN attributes Polis’s likeability in the .rollcall.com/members/29126.html (Accessed
social media world to his personal management December 2012).
of his social media presence, his regular and con- Rubino, J. “Jared Polis Blasts Bruce Benson for
sistent tweeting, and his attention to trending top- Claims CU Could Lose $1B Over Amendment
ics on Twitter. 64.” Times Call. http://www.timescall.com/
Polis’s social media intelligence is not limited ci_22150601/bruce-benson-cu-risks-losing-1b
to gaining new followers. He has also proven -year-funding?source=most_viewed (Accessed
that social media use can be a very effective tool December 2012).
for advocacy. In December 2012 University of Susskind, J. “Social Spotlight: Rep. Jared Polis.”
Colorado (UC) President and Republican Bruce Independent Voter Network. http://ivn.us/social
Benson e-mailed alumni a warning about the UC -ballot/2012/08/10/social-media-spotlight-rep
risking a loss of almost $1 billion based on the -jared-polis (Accessed December 2012).
decriminalization of marijuana. The argument
was that the UC receives a substantial amount of
federal funding, and that federal guidelines pro-
hibit marijuana use.
Polis was quick to respond on Twitter, Political Base
denouncing the e-mail as “false” and attributing
Benson’s motivation to personal disagreement A political base is a group of individuals that
with Amendment 64, the decriminalization initia- supports a candidate or party based on a set of
tive. Polis tweeted that the amendment did not agreed upon core values. The core values form
require that UC allow marijuana on campus, and the basis of a political agenda or platform. A
982 Political Base

continuum for identifying a political base moves the number of ways in which he or she reaches
from left to right. On this continuum a left- that varied political base.
leaning political base is more liberal, whereas Social media also offer the opportunity to
a political base leaning right is said to be more gather information about various bases of politi-
conservative. Moderates, or those in the middle, cal ideology while seeing responses to an issue
may lean in either direction-based on the issue. develop in real time. Because social media do not
Politicians have quickly recognized the advan- include every member of a particular political
tage that social media such as Twitter, LinkedIn, base, at best, the results will only be conclusive
Facebook, YouTube, blogs, text messages, and for that particular group responding by social
similar virtual tools, provide as instruments for media; and at worst, the results will be limited in
keeping in touch with their political base. Other the perspectives that can be shared by the particu-
examples include GoToMeeting, which provides lar group responding via social media.
virtual presentations for anyone with Internet Contemporary writers remarking about
access. Skype has similar features and offers the changes in political bases and on techniques for
opportunity for cheap or free calls. Politicians use reaching a base often cite the belief that, depend-
these particular social media options quite often ing on the form, social media will have both a
to make presentations and provide Webinars for temporary as well as a permanent impact on base
their political base. politics. Specifically, Malcolm Gladwell believes
For most of the 20th century the dissemina- that social media’s influence has been exagger-
tion of information followed a basic two-step ated. He has called for caution regarding the use
flow theory. Paul Lazarsfeld, Bernard Berel- of social media for reaching a base in networks he
son, and Hazel Gaudet introduced this theory sees as loose and leaderless.
in 1948, noting that procedurally, information Since the 1960s, politics have shifted, and issue
flowed from radio and print media to leaders, influence has tended to crowd around visible con-
and from leaders to the sections within the popu- cerns that spark emotion and action in a politi-
lation who are overall the least active. In 1995 cal base. Social media documents this shift in real
Deborah Baldwin, commenting on the interac- time as noted by blog or article comments, tweets,
tion between interest groups and the Internet, or texts sent during a live debate on TV or radio.
stated that for interest groups, the Internet pre- Social media also provides a steady stream of live
sented a new way of lobbying individuals and numbers that can be easily captured. Prior to mak-
groups. The current environment and its strong ing a statement on an issue in the recent past, a
reliance on social media has turned the two-step politician would assemble his or her team of advi-
flow theory on its head: an individual sending a sors and hash out a script to read to assembled
tweet, posting on Facebook, or sending a text supporters. Now, a social media specialist may
may now also become a leader. The news is first consult on where to place the content. This
no longer entirely the possession of television, base can be local, state, national, or global, and an
radio, and print media outlets. effective consultant could make a judgment on the
reach and base in a matter of minutes.
Social Media and the Political Base
Politicians have come to use social media International Reach
approaches like Twitter feeds, Facebook posts, A local political base is not the only base of sup-
texts, podcasts, and discussion forums as means porters that social media can reach on a daily
of reaching their base. Robert Merton called basis. A global political base can also be accessed
leaders who can only manage one area of influ- for ideas and suggestions as they receive com-
ence “monomorphs,” while those managing to munications once limited to traditional media,
influence several areas are “polymorphs.” In the airmail, faxes, or personal visits. The notion
current political environment, with the potential that any leader of any country can stay in con-
for a political base to be extremely varied, a poli- tact with his or her political base from abroad is
tician must expand his or her range of influence now a way of life. At any time, a leader can visit
on many different issues, as well as increasingly another country, make a speech in that country
Political Economy 983

on an issue or a concern, and have that speech Political Economy


streamed live by any number of social media out-
lets. Anyone watching the streaming version of The political economy of social media refers
the remarks can instantly become a part of the to the effects of capitalism in shaping, afford-
political base, thus making any issue around any ing, and constraining social media, as well as to
subject a potential international issue. These the role of social media in capitalist society. The
additions to the political base come with the term also refers to the intellectual paradigm that
opportunity for further information dissemina- investigates social media in the context of capi-
tion, collaboration, and opportunities for addi- talist society.
tional means of funding for particular projects. Drawing on the Marxist-inspired political
Today, a political base has become a virtual economy of the (mass) media, the political econ-
community. The 2011 Arab Spring is an exam- omy of social media seeks to uncover the social,
ple of a political base that expanded with every legal, cultural, and technological arrangements
tweet, Facebook update, and text message to embedded in social media, and examines the social
include new supporters from around the world. implications of such arrangements. The politi-
When these users are a part of a political base, the cal economy of social media, then, investigates
core values that were once so simple may become social media as economic organizations operat-
more global in nature and design. Politicians who ing within the contours and logic of a capitalist
understand this will become the leaders of the society, and at the same time seeks to decipher the
future, directing an ever-growing and ever-chang- role of social media in the economy at large.
ing population of supporters. At the most fundamental level, the political
economy of social media assumes that the new
Lisa Saye space of social media cannot be thought of merely
Independent Scholar in terms of the technology that enables it or the
communication forms it affords; rather, it is also
See Also: Constituencies, Social Media Influence set within the broader socioeconomic space of
on; Digital Citizen; Digital Government; Occupy capitalism. Social media is ommonly treated as
Movement; Voter Demographics; Wikis and a new means of communication, enabling new
Collaborative Project Websites. forms of expression and social exchange in var-
ied spheres, from political mobilization to eco-
Further Readings nomic activities. The political economy of social
Baldwin, Deborah. “Interest Groups and the media, however, attempts to locate social media
Information Superhighway.” In American as caught within the Web of capitalist political
Government, Karen O’Connor, ed. Needham economy. Rather than viewing social media as
Heights, MA: Allyn & Bacon, 1995. a transparent, neutral communication tool, the
Eisenstadt, Shmuel Noah. “Post-Industrial Societies political economy of social media points to the
and the Continuity and Reconstruction of ways by which it embodies and constitutes social
Tradition.” Daedalus, v.102/1 (1973). power relations. Most fundamentally, the fact
Gladwell, Malcolm. “Social Media Fail to Incite True that the most prominent social media Web sites
Activism.” In The Global Impact of Social Media, are owned by commercial companies is not inci-
Dedria Bryfonski, ed. Farmington Hills, MI: dental to the analysis of communication, but is
Greenhaven Press, 2012. rather highly consequential. Countering the hege-
Lazarsfeld, Paul, Bernard Berelson, and Hazel monic approach that focuses on the communi-
Gaudet. The People’s Choice. New York: Duell, cation that takes place within social media, the
Sloan & Peard, 1928. political economy of social media focuses on the
Merton, Robert King. “Patterns of Influence.” In Web of social power relations established through
Communication Research, New York: Harper and this seemingly neutral technical platform.
Brothers, 1949. Like any voluntary market exchange, in social
O’Connor, Karen. American Government. Needham media, both parties act out of self-interest and
Heights, MA: Allyn & Bacon, 1995. gain something from the exchange: Consumers
984 Political Economy

use social media for free and producers sell adver- consumers of media content. In 1970, the political
tising space. Contrasting this view of a market economy of the media was greatly revised by Dal-
exchange between equals, the political economy las Smythe, who analyzed media as a site of pro-
of social media sees social media as embodying duction unto itself, thus highlighting the produc-
power relations. While few dimensions of power tivist role of the audience in the creation of media
relations emerge as central themes in the political value. He suggested that what goes on in the mass
economy of social media, they all seem to collate media was not primarily audience consumption
around the focal point of audience labor. It would of media content but the selling of audience atten-
be useful then to organize this discussion around tion to advertisers. This formulation rendered
this key concept, not least because of its roots in the audience an active participant in the political
the political economy of the mass media and its economy of the mass media. The audience per-
link to a central debate in political economy gen- forms cognitive and emotional work—learning
erally about the labor theory of value. to desire and buy commodities—and it was the
Such an analytical move would also allow the attention of the audience that was sold as a com-
underlining of how the political economy of social modity to advertisers. This rendered the media a
media is different from the (traditional and estab- vital component in the chain of capital accumula-
lished) political economy of the (mass) media. tion. In return for the “bait” of programming, the
And last, exploring audience labor would allow audience remains glued to the television screen,
one to offer a political economy critique to the thus watching advertisements, which become an
notion of “participation,” which in popular and ever-important driving motor for consumption.
academic discourse is seen as the key revolution- Smythe assigned the mass media and the audience
ary aspect of social media. central roles in advanced capitalism: the audience
is put to work in marketing commodities to itself.
Audience Labor As a theoretical outlook and a research pro-
The notion of audience labor emerges as a cri- gram, the political economy of the media emerged
tique of traditional political economy of the during and within the context of the mass media.
media, which regarded audience as located The emergence of social media poses new chal-
outside the sphere of (capitalist) media produc- lenges to this approach, given some fundamental
tion. Traditionally, the political economy of the differences pertaining to the relationship between
media analyzed media as a means of production the media and its audience. Social media compa-
in capitalist society, investigating issues of media nies provide the audience a platform for commu-
monopoly, media corporations’ mergers and con- nication rather than content, and the seemingly
solidations, links between government and the passive audience has been rendered into active
media, and employment schemes of media work- “users,” critical to the production of the media.
ers. The essential claim of this approach was that These transformations in the relations of produc-
all elements of the media ecology, such as media tion between audience and media has also led to
corporations, journalists, and public service a change in the research program. While in the
broadcasters, cannot be understood outside the political economy of the mass media, the notion
institutional and structural positions they occupy. of audience labor remained relatively periph-
News organizations are also commercial enter- eral; in the political economy of social media, it
prises thriving on the sale of advertising; news has focused on the labor process as well as its
reporting may be constrained by legal or regula- product.
tory dictates; and journalists are wage earners. The centrality of audience labor in the politi-
The political economy of the media sought to cal economy of social media is anchored in the
highlight those economic and political facets and increased involvement of the audience in the
investigate which effects they have on the media production of media. Indeed, the popular dis-
and in turn, on society. course on social media is dotted with a variety
Traditionally, then, the political economy of terms describing new production practices
of the media considered the audience as laying and new products entailing audience involve-
outside of the accumulation process, as passive ment facilitated by social media: cocreation,
Political Economy 985

mass collaboration, social production, com- amount and variety of data produced by users.
mons-based peer production, mass customiza- Such data includes demographic and personal
tion, prosumption, produsage, crowdsourcing, information, content of communication, online
open source, social production, user-generated and offline behavior, and metadata about online
content, user participation, folksonomics, and usage patterns. This huge amount of data—lead-
wikinomics. Take, for example, the category of ing to the establishment of big data “warehouses”
the media “prosumer” (or “produser”). Whereas of social media companies—is a key force of pro-
in traditional media, there was a relatively clear- duction in an information economy, an economy
cut separation between producers and consumers that thrives on data, information, and knowledge.
of media content, social media is characterized Big data allows an intimate knowledge of the
by the blurring of these boundaries. Consumers audience, both as individuals and in aggregate.
(or users) are at once also producing that which The ability of social media companies to have
they consume. This is seen in popular discourse (free) access to such big data—produced by the
as empowering individuals, rendering the pas- audience in return for (free) platforms—and com-
sive audience of the mass media into the engaged modify it is at the heart of their business model,
audience of social media. which is the sale of advertisements, which become
While popular discourse celebrates these new more personalized and targeted.
modes of media production as having empow- An example of the commodification of big data
ered the audience, the political economy of social is predictive analytics, which seeks to predict indi-
media uncovers new relations of power that these viduals’ consumerist behavior and bolster it. To
modes create, pointing to the ways by which a large extent, predictive analytics based on big
these multiple production forms enhance the abil- data substitutes statistics in providing knowledge
ity of media companies—compared to the mass about human behavior based on real-life data
media—to mobilize audience labor into capital- (rather than data collected from interviews or
ist accumulation. The political economy of social surveys) and the whole population (rather than a
media seeks to explain how value is created in sample of the population).
social media sites, and uncover the role of the One issue emerging from the production of
audience in the creation of its value. data is a new form of inequality between audi-
The audience of social media may potentially ences using social media and companies that own
work more, create more surplus value, and be them—dubbed the “big data divide”—which
more exploited than was the case in the mass is based on differential accessibility to the data.
media. It participates in three moments along While the audience produces the data, only social
the value chain of social media. As in the mass media companies can access it. The valorization
media, an audience is mobilized to watch ads, of personal, mundane data, produced through
leading to consumption. However, relative to the what the autonomist school of Marxism refers
mass media, in social media, advertising schemes to as “immaterial labor,” is a testament to an
tend to blend commercial messages with social increased reliance on life itself—taking place out-
communication, thus leading to greater con- side the traditional sites of production—in con-
sumer mobilization. For example, Facebook’s temporary capitalism.
Sponsored Stories are regular posts rendered into Social media are technically and ideologically
ads, thus representing both a real-life event and structured to make users produce as much data as
a commercial message, and are regarded as more possible. Indeed, what goes on in social media is
effective than conventional ads. not primarily the collection of pre-existing audi-
ence data, but rather the production of data by
Audience Data the audience, data that has been hitherto almost
The audience of social media is central in two inaccessible to harness for capital accumulation,
additional moments of the value chain. First, the including personal, communicative, mundane,
networked and interactive nature of social media and behavioral data. Such data are produced
and its affordance of audience participation within the context of regular communication and
enables social media companies to access a huge the sociability of social media users.
986 Political Economy

In addition to watching ads and producing audience members are able to communicate with
data, the audience also engages in marketing. each other, cooperate, and collaborate. By con-
Social media audiences construct and maintain struction, then, the product of audience labor is
multiple networks within social media, which communal. A Google search result is based on
are founded on—to varying degrees—familiar- previous queries of users, and a user’s Facebook
ity, similarity, and mutual trust and influence news feed is a communal product of other users.
between networks’ members, as well as afford- The legal and normative institutions of intellec-
ing them a peer-group, sharing common interests tual property rights were founded on the notion
and lifestyle. The “viral” or “organic” nature of of a cultural product having a single, recognized
commercial messages in social media (as they are producer or author. They were construed in the
called in advertising lingo) derives precisely from context of the mass media and fitted its political
the construction of such networks, and leads to a economy, which assigned media companies with
new type of audience labor where audience mem- exclusive rights over content.
bers do not merely market products to themselves
(as Smythes put it), but also market products to Noncommodified Social Media
other members of the audience. Social media undermines the foundations of this
normative arrangement since the product is by
Surveillance and Privacy construction collective, representing the “general
Notwithstanding the importance of consump- intellect” of the audience. In reality, sparse efforts
tion and marketing, it is the production of data have been developed, alongside the hegemonic
and metadata by users that lies at the heart of the capitalist model of private intellectual property
political economy of social media. As audience- rights, to build nonmarket based projects of social
generated data becomes a central force of produc- media, the most exemplary of which is Wikipedia,
tion, an inextricable link is created between social the online collaborative free encyclopedia. As are
media and surveillance because audience data all social media, Wikipedia is also the product
needs to be accessible to social media companies of audience labor; but unlike commercial social
in order to be commodified. The political econ- media, audience labor on Wikipedia is not com-
omy of social media is conditioned by the will- modified. Such and other exemplars of noncom-
ingness of an active audience to surrender private modified social media have led political economists
and personal data to social media companies, and of social media to point to an alternative political
often also to third-party companies; by construc- economy that would reconstitute social media as
tion, such data loses its status as private. The cen- the commons—noncommercial, common, cul-
trality of surveillance to the political economy of tural products to which everyone contributes and
social media poses a threat not only to privacy, has access to—as a project that transcends the
but as noted above, but also affects the way that contradictions of contemporary capitalist social
social media is designed in order to maximize the media. The political economy of social media,
production of media, and may be consequential then, proposes to radicalize the notion of social
in terms of inequality (i.e., the big data divide). media by suggesting that its production is truly
More broadly, this issue points to the contra- social, and hence its value should also be socially
diction, embedded in social media, between social shared rather than privately owned.
norms that consecrate privacy and a political
economy that thrives on surveillance. This has Conclusion
indeed been an issue of intense public debate. In The political economy of social media also points
a similar way, and leading to much public debate to the ideological role of the media in justifying
as well, is the intrinsic contradiction between its model of political economy and the political
social norms and institutions consecrating private economy at large. In the mass media, political
ownership and authorship over products, and economists have pointed, for example, to a press
the collective and social nature of production in that accepts the basic premises of liberal democ-
social media. In contrast to the mass media, social racy and capitalism, to the content of programs
media companies are able to create big data, and naturalizing racial and gender inequalities, and to
Political Information Opportunity Structures 987

advertisements advancing a consumerist lifestyle undermine and disrupt commodification, as is the


and facilitating a consumerist society. The analy- case with Wikipedia, where the socialization of
sis of social media has pointed to the ideological the media led to the creation of a knowledge com-
mechanisms that drive audiences to produce as mons rather than commodification.
much personal data as possible: from the dictum The trend toward the commodification of data
to share one’s mundane life with others through and communication and the exploitation of audi-
text and photos, to the call for audience mem- ence labor occurs along with enhanced opportu-
bers to be part of an emancipatory, participatory, nities for the audience to express themselves, col-
democratic, antielitist and collaborative culture, laborate with each other, and participate in the
and express themselves—all of which are aimed reproduction of society through a fairly accessible
to encourage audience labor in social media. media. Indeed, the political economy of social
At the heart of the political economy of social media is founded on social media being a juxtapo-
media are two contradictory trends. On one sition of a means of communication and a means
hand, social media represents the unprecedented of production, an arena for sociability and a site of
“socialization of communication,” where the labor. These trends are also dialectical: they feed
means of communication are democratized, into each other, but can also disrupt one another,
where every Internet user can communicate, leaving the field of political social media dynamic
tweet, create a blog, be a citizen journalist, and and open for change.
be part of a custom-made social network. Social-
ization here refers not only to the decentraliza- Eran Fisher
tion of expression to each member of the audi- Open University of Israel
ence, but also to the ability of users to cooperate
among themselves on a social-wide scale—com- See Also: Advertising and Marketing; Big Data;
munal, national, or transnational—and create a Data Mining; Information Aggregation; Predictive
media that is radically social, of the people, by Analytics; Privacy; Viral Marketing.
the people, for the people.
On the other hand, social media also represent Further Readings
a trend toward the unprecedented “commodifica- Andrejevic, Mark. “Social Network Exploitation.”
tion of communication.” The audience’s social In A Networked Self: Identity, Community, and
communication is increasingly commodified and Culture on Social Network Sites, Zizi Papacharissi,
sold on the market, becoming a staple force of ed. New York: Routledge, 2010.
production in the political economy of social Cohen, Nicole. “The Valorization of Surveillance:
media. Social media sites are predominantly com- Towards a Political Economy of Facebook.”
mercial spaces, structured and run according to Democratic Communiqué, v.22/1 (2008).
the rationale of capital accumulation rather than Fuchs, Christian. “Class and Exploitation on the
social communication. As immaterial products Internet.” In Digital Labour: The Internet and
of data and information, communication and Playground and Factory, Trebor Scholz, ed.
sociability become increasingly important forces New York: Routledge, 2012.
of production in contemporary capitalism, and
as their production is increasingly taking place
within digital media, so the commodification of
communication ensues.
These two trends are dialectical; they are con- Political Information
tradictory and complimentary, and above all
tenuous and dynamic. The more media is social- Opportunity
ized, the more it mediates the production of social
communication and in turn boosts the commodi-
Structures
fication of communication. At the same time, the Social change triggered by popular movements
socialization of communication, the ability of the occurs when the actions of like-spirited individuals
audience to communicate among itself, may also whose shared values and goals related to particular
988 Political Information Opportunity Structures

in a particular time and place. Peter Eisinger, in


his study of 1960s-era riots in 43 American cit-
ies, coined the term structure of political oppor-
tunities, stating that these opportunities emerge
from the cultural mood and ideological climate
of a given time and place. They arise from situa-
tion-specific “soft spots” that might offer fertile
ground for social movements to take root and
develop. The structuralist approach emphasizes
that the importance of those factors external to
the movement are at least as important as factors
relating to the goals, values, and characteristics of
actors within the movement.
Sociologist Douglas McAdam, an early theo-
rizer of the “political process model” for social
movement analysis, explained that these external
A protest in Boston on June 20, 2009, in support of the Iranian factors (or political opportunity structures) can
Green Movement and condemning the Iranian government’s be described along four spectra: (1) how open or
violent response to protesters in Tehran. The current information closed to action the political institutions within
environment allows groups to organize and demonstrate a particular field of action are; (2) how stable or
without long-term planning or extensive resources. unstable the collectivity of elites who are oper-
ating at that time and place is; (3) whether or
not those elites are affiliated with other entities
outside their collectivity; and (4) whether or not
issues mobilize them to sustained collective action, the political institution(s) governing a particular
generally moving forward in stages. However, not field of action are willing and able to repress the
all social movements will survive the early stages movement. The particular integration of posi-
of emergence and coalescence. The importance of tions along these spectra can expand or contract
context or sociopolitical structures is critical to political opportunities for the social movement,
understanding which social movements will fully for other social movements, for opponents of the
develop and how they might do so. movement, or for elites and their allies.

Social Movements and Political Media Regimes and Political


Opportunity Structures Information Opportunities
Sociologist Robert Merton established that soci- While shared norms, customs, traditions, values,
eties are dynamic, sensitive to functional (and and institutions have been the ground on which
dysfunctional) outcomes of actions, with social sociopolitical movements have taken root prior to
institutions ultimately emerging as the integra- the 21st century, the basic building block now is
tion of factors. Michael Lipsky observed that information and access to channels that empower
social movements tend to progress in stages and actor-agents to construct and disseminate social
waves, with potentials and outcomes dependent meanings. Now, informational bonds construct
upon many variables. Merton emphasized that sociopolitical bonds. Technological channels not
institutional structures are not the only providers only impact the venues and contexts of political
of societal survival functions, but that a variety interaction, they also construct them. Govern-
of social and cultural alternatives exist, including ment is embedded in its publics in a radically new
the “deviant” actions of social movements. way and is increasingly vulnerable to networked
Social scientists use the concept of “opportu- collective action locally mobilized via global infor-
nity structures” to examine factors external to the mation technologies. Information fields are vastly
movement or individuals within it that inhibit or expanded and far more complex, with fewer gate-
facilitate the viability of a particular movement keepers. Access to politicized information and the
Political Parties 989

power to transfer it widely is, with the emergence Joseph Kony, which was reportedly viewed by up
of digital communication modes, information to half of young Americans, having tallied over
technologies, and the global networks these gen- 100 million views within six days of its release.
erate, a new form of opportunity structure.
Bruce Bimber, political scientist and founder Leslie Reynard
of the Center for Information Technology and Washburn University
Science at the University of California, Santa
Barbara, has contextualized the current techno- See Also: Activists and Activism, Digital; Arab
logical revolution and its impact on American Spring; Immersive Journalism; Social Authority;
democratic processes within a historical overview Technological Determinism.
of the relationships between political informa-
tion and institutional adaptions to advances in Further Readings
informational linkages. Bimber calls the current Bimber, Bruce. Information and American
information environment—the rise of the Inter- Democracy: Technology in the Evolution of
net—the “fourth information revolution,” the Political Power. Cambridge, UK: Cambridge
key characteristic of which is “information abun- University Press, 2003.
dance.” By this is meant that virtually anyone can Cammaerts, Bart. “Protest Logics and the Mediation
produce and distribute it worldwide at little or Opportunity Structure.” European Journal of
no cost. Communication, v.27/2 (2012).
In this era of “post-bureaucratic pluralism,” Hara, N. and B.-Y. Huang. “Online Social
the power to act quickly, effectively, and eco- Movements.” Annual Review of Information
nomically has produced what Bimber calls a Science and Technology, v.45 (2011).
new “media regime.” Absent the need for for- Kitschelt, Herbert. “Political Opportunity Structures
mal organization or interest groups, long-range and Political Protest: Anti-Nuclear Movements in
planning, and extensive resources, some theorists Four Democracies.” British Journal of Political
expect increased political participation on an Science, v.16/1 (1986).
increasingly democratized field of action. Other McAdam, Doug. “Conceptual Origins, Current
theorists take issue with what they see as an over- Problems, Future Directions.” Comparative
application of the concept of “political opportu- Perspectives on Social Movements: Political
nity.” These theorists fear that in attempting to Opportunities, Mobilizing Structures, and Cultural
offer a broad and comprehensive explanation, Framings. Cambridge, UK: Cambridge University
concrete and useful application will not be possi- Press, 1996.
ble, especially because there appears to be a lack Williams, Bruce A. and Michael X. Delli Carpini.
of consensus as to what a “political opportunity” After Broadcast News: Media Regimes,
actually is. Democracy, and the New Information
Nevertheless, the centrality and effectiveness of Environment. Cambridge, UK: Cambridge
social media in generating, mobilizing, and sus- University Press, 2011.
taining the wave of revolutionary demonstrations
and protests in nearly two dozen countries in the
Middle East and north Africa beginning in Decem-
ber 2010, collectively named the Arab Spring,
has been extensively studied. The relationship Political Parties
between social media (or “rebellious communica-
tion”) and social movements generally is a grow- Political parties use social media to provide infor-
ing subdiscipline of sociopolitical research; other mation, communicate about party issues and
focuses have been the Occupy Wall Street move- candidates, connect constituents and politicians,
ment, the Iranian Green movement, animal rights and ultimately to mobilize supporters to take
activism in Poland, women’s social networks in action through volunteering, voting, or spreading
the United Kingdom and Germany, and Kony the word. The two major political parties in the
2012, the viral video about Ugandan warlord United States have taken different approaches to
990 Political Parties

the use of social media, while third parties seek networking sites a valuable source of political
to build social media capital through networks of news to a much greater degree than citizens who
online supporters, hoping to mitigate the financial describe themselves as “conservative” or “mod-
disadvantage that they face during political cam- erate,” although there were no significant differ-
paigns and their exclusion from public debates. ences between liberals and conservatives in over-
The Democratic Party, particularly during the all use of social media. There is also, however,
2008 and 2012 campaigns of Barack Obama, has evidence to support the theory that social media’s
incorporated social media into every aspect of its ability to distribute both authored and anony-
political campaigns. mous messages quickly, widely, and often spon-
In the 2012 election, both parties were expected taneously exacerbates political polarization on
to spend a record percentage of their advertising both ends of the liberal/conservative continuum.
budgets on Internet advertising. While the Repub- Social media provide political organizations
lican Party has also employed various social and actors with a two-way channel of communi-
media platforms, it has not been as active in using cation. Members of the online public are able to
them as tools for mobilization and engagement respond to and reframe messages, and can serve
for constituents and supporters. Third-party can- as amplifiers or spoilers of a party or politician’s
didates and supporters depend on social media to preferred narrative. The Democratic Party advan-
establish a presence in a market that requires sig- tage may be attributed to three factors. The first
nificant campaign cash to compete for advertising is the Obama campaign’s early adoption of social
time on broadcast media. In terms of content, the media as a medium for speaking directly to sup-
Democratic Party and the president also employ porters. The second is the recognition that effec-
a more visual strategy when it comes to social tive use of social media means entrusting support-
media, relying on images and graphics with styl- ers to not only share campaign messages, but also
ized text that are designed to be easily shared on to craft them. The third dimension of this strategy
any social media platform. For both Democrats comes from the daily generation of content by the
and Republicans, especially during campaigns, campaign, through both a candidate channel and
social media activity is centered on the accounts official White House channels, which provide a
of national candidates. constant stream of “president at work” messages
and images.
Ideologies Political parties are also represented in social
The United States is dominated by two major media on the state and local level, by party
parties, representing two major ideologies, it is accounts as well as local candidates, organizing
useful to examine how the parties’ use of social and speaking to constituencies in their communi-
media reflects their underlying ideologies, most ties. At the national level, the tasks of communica-
commonly defined as conservative and liberal. tion and information are the focus, and support-
Conservatives favor individualism, tradition, ers play a critical role in distribution of messages
order, and well-defined structures of power. through sharing and retweeting. Both Democrats
Liberals promote notions of equality, collective and Republicans maintain Facebook pages for
responsibility, and inclusion. Thus the Demo- their congressional and senatorial campaign com-
cratic conversation in the United States is about mittees, and both have attracted as many “likes”
the value of collective rights and responsibilities as the official party pages.
versus the rights and responsibilities of the indi- During the 2012 national elections, the Demo-
vidual, and the role of government in facilitat- crats further integrated social media into its cam-
ing those differing priorities. As many scholars paign, creating a social media–style dashboard that
have noted, social media may be a more hospi- allowed real-time tracking of volunteers and their
table environment for citizens with liberal val- campaign activities, thus maximizing the cam-
ues, who are generally more tolerant of the cha- paign’s time and resources. The dashboard also
otic, democratic nature of online discussion. The provided the campaign with constantly updated
Pew Research Center found that citizens who information about voters. Post-election, President
describe themselves as “liberal” consider social Obama has continued to regularly use social media
Political Parties 991

in his efforts to move legislation forward, encour- pages. President Obama also posts on Facebook
aging citizens to contact members of Congress as “The White House,” a page that has just over
through Twitter and Facebook and express their a million subscribers.
support for his agenda. Using empirical methods, President Obama posts on Facebook every
the Analyst Institute, a think tank organized and day, sometimes multiple times per day, sharing
funded by progressives, continues to pursue data- content that is overwhelmingly positive, and pri-
driven strategies for connecting to and mobilizing marily visual—smiling faces, images of the fam-
voters, strategies that are fully grounded in the ily and the family dog, and images of President
cell phone, Internet, and social media–connected Obama interacting positively with citizens. This
world. For the Republican Party, the election cam- approach is consistent with findings by the Pew
paign of Mitt Romney saw the development of Research Center, which suggest that users of
an application dubbed ORCA, a voter tracking social media see them as environments for pri-
system that was criticized by campaign watchers marily positive exchanges and content. There are
as ineffective and undertested. This battle over frequent posts with humorous themes. There is
the technological tools of persuasion and motiva- consistency, although not duplication between the
tion represents an entirely new front for political “White House” page and the “Barack Obama”
campaigns. page. For example, on the “Barack Obama”
page, the image posted to celebrate Thanksgiv-
Social Media on Official Party Web Sites ing 2012 was a snapshot–style portrait that was
The official Web pages for the Democratic and clearly taken before the 2008 election, of a much
Republican parties are similar in design. However, younger Obama family, while the “White House”
the content is presented quite differently, with the page shared a family photo that was a recent, and
Democratic Party opting for visually focused con- very formal, White House portrait.
tent, providing images of the president, as well as Candidate Mitt Romney and the Republican
talking points presented in stylized graphics that National Committee (RNC) were not as frequent
are designed for social media sharing. Both parties with their postings, and generally not as play-
have included tools for social media–sharing on ful as the posts made on behalf of the president.
their pages, but in slightly different ways. On the Humor is rarely employed, nor are the posts as
Republican page, each page has a floating “share” image-heavy as those of the Democrats. The RNC
button, requiring clicking through headlines to posted a single sentence wishing subscribers a
individual pages, which can then be shared on “Happy Thanksgiving,” while former candidate
social media. On the Democrat’s homepage, sto- Romney posted an image of himself and his wife
ries are presented on the home page with “share” posed quite informally in their kitchen, a post
buttons, requiring one less click for sharing to that stands out on his Facebook page as unchar-
Twitter, Facebook, Google+, and other sites. acteristically intimate. The post was shared more
than 16,000 times, in comparison to the RNC’s
Facebook text-only greeting, which was only shared by 104
Typing “Republican Party” into the Facebook people. It is clear that for politicians and parties,
search function does not bring up the official a compelling image can dramatically increase the
Republican Party page. “Republican National chances that a post will go viral on Facebook. In
Convention” brings up the official “GOP” page fact, the record for the most “liked” image ever
with over one million “likes.” Typing “Demo- on Facebook is now held by the Obama campaign
cratic Party” immediately brings up the Demo- by its celebratory message posted as results were
cratic Party Facebook page, with the recently announced in the 2012 election.
updated, minimalist logo design. This page has
over a half-million “likes.” Both party pages Twitter
represent miniscule followings in comparison to President Obama’s advantage of three to one on
their national candidates, with Mitt Romney and Facebook is even more dramatic on Twitter. Gov-
Barack Obama listing more than 11 million and ernor Romney amassed 1.7 million followers
33 million “likes,” respectively, on their individual during the 2012 presidential campaign, whereas
992 Political Parties

President Obama has more than 20 million Twit- Obama has a Myspace page that has been idle
ter followers. In comparison, the Democratic for more than a year; the parties are not present
Party official Twitter account (@TheDemocrats) there at all. While the parties do not have a signif-
has only 200,000 followers. At just under 200,000 icant presence on Tumblr, a site that is dominated
followers, the Republican Party (@GOP) Twitter by a young demographic, President Obama does
account is similarly dwarfed by its most recent have an account, “ObamaFamily,” which posts a
national leader. stream of images from the official White House
Twitter limits users to 140 characters, but photographer. Third parties such as the Libertar-
allows for embedded content from image-sharing ian and Green parties have a presence on Twitter
sites, including YouTube and TwitPic. It favors and Facebook, but their followers and subscribers
the clever retort over the long-winded argument, represent a proportion of citizens that is similar
and allows users to address any other Twit- to their nominal percentage of the popular vote in
ter user via the @ symbol, known as a mention, federal elections.
whether they are connected through “following”
or not. Twitter was widely used during the presi- Conclusion
dential debates of 2012 in a practice known as For political parties, social media has generated
“live-tweeting.” The most striking aspect of live- a new landscape that must be navigated, but also
tweeting was the instant emergence of memes that one that provides opportunities to maintain an
influenced news media coverage of the debates. At ongoing conversation between politicians and
other times, Democratic and Republican citizens constituents. The Republican Party has estab-
can be found tweeting with the hashtags #p2 and lished a presence on social media sites, but has
#tcot. In this way, participants on Twitter connect not yet fully deployed strategies designed to take
with like-minded citizens, and also seek to pro- advantage of the unique features of social media.
voke and engage political opponents. Visual content, including many images of smiling
faces, and political positions expressed as easily
YouTube sharable graphics are the assets that are most likely
Both parties maintain a channel on YouTube. to encourage supporters to share and retweet to
Neither of the party channels is very active in their friends and family. The Democrats are also
comparison to the channels of their most recent easier to find on social media, maintaining a con-
national candidates. The RNC channel has more sistent image across platforms.
views than the Democratic Party channel. Again, The disparity between followers of high-profile
President Barack Obama has established an audi- politicians and parties raises the question of how
ence that dwarfs his opponents and his party to an parties can create and sustain a coherent social
exponential degree. Results of YouTube searches media presence when terms are over or politi-
also demonstrate how candidates benefit from an cians are unsuccessful in an election or re-election
active online following that creates and redistrib- campaign. For the Democrats, Barack Obama has
utes media among themselves. Searching the can- become the face of the party in the realm of social
didate or party name produces a number of user- media. The challenge for his party will be to redi-
generated tribute videos for President Obama, rect his followers once his second term is over. For
while critical parodies and satire are prominent the Republican Party, this question is even more
in the search results for “Republican” and “Mitt urgent because the party out of power finds itself
Romney.” without a national representative between presi-
dential elections.
Other Parties, Other Platforms
Politicians and parties seem to have focused most Jeanette Castillo
of their attention on Facebook and Twitter, but Ball State University
the Democratic Party can also be found on Pin-
terest, as well as the mobile phone image-sharing See Also: Campaigns, Presidential (2008);
application Instagram. The Republican Party is Campaigns, 2012; Facebook; Twitter; Voter Turnout;
not easily found on these platforms. President YouTube.
Politico 993

Further Readings through Twitter, Facebook, TV, and radio. Owned


Hanson, Gary, Paul Haridakis, Audrey Cunningham, by Allbritton Communications, Politico is affili-
Rekha Sharma, and J. D. Ponder. “The 2008 ated with the ABC Network, which is owned by
presidential Campaign: Political Cynicism in the the Walt Disney Company.
Age of Facebook, MySpace, and YouTube.” Mass Editor-in-Chief John F. Harris has worked in
Communication and Society, v.13 (2010). journalism for over 30 years, working for The
Issenberg, Sasha. The Victory Lab: The Social Science Washington Post as a reporter for 20 years until
of Winning Campaigns. New York: Crown, 2012. becoming interested in editing. Harris posits
Rainie, Lee and Aaron Smith. “Politics on Social that becoming an editor allows one to become
Networking Sites.” Pew Internet & American immersed in conversations about the future, con-
Life Project (September 4, 2012). http://www templating “What’s next?” During his brief edit-
.pewinternet.org/Press-Releases/2012/Politics ing career at the Post, Harris worked with then
-on-Social-Networking-Sites.aspx (Accessed editor VandeHei, who had over 15 years of expe-
May 2013). rience reporting on Washington politics. They
Rainie, Lee, Joanna Brenner, and Kristen Purcell. began brainstorming about collaborating on a
“Photos and Videos as Social Currency Online.” new political publication. In 2006, Robert All-
Pew Internet & American Life Project (September britton, chairman and chief executive of Allbrit-
13, 2012). http://pewinternet.org/Reports/2012/ ton Communications, offered Harris and Vande-
Online-Pictures.aspx (Accessed May 2013). Hei the opportunity to start a nonpartisan media
company, which became Politico.
Though Politico continues to be a successful
political news organization, the progressive watch-
dog group Media Matters for America has accused
Politico it of having a Republican slant. Media Matters
for America is Politico’s strongest competitor, and
Politico is a fast-paced, innovative Web site (and has also been accused of being a “mouthpiece”
accompanying newspaper) with an audience of for President Barack Obama. Despite Politico’s
60 million visitors. The site changed the face of naysayers, it has proved that people want to read
political news reporting by helping bring the news “fast, fresh, and forward looking news.” It is this
cycle down to 15 to 20 minutes, as opposed to type of trend-setting reporting that gives Politico
network coverage that is typically on a 24-hour an edge over its competition. Media critics have
cycle. Politico is staffed with over 150 employees given it mixed reviews; however, the positive
working to provide a mixture of politics, trade reviews largely outweigh the negative ones.
journalism, real-time chat, blogs, information on Politico has embraced new technology, pro-
political jobs, and advertisements in a minute-by- viding its audience an opportunity to download
minute format. Through the use of social media, apps for smartphones, receive e-mail alerts, and
Politico delivers political news and conversation voice their opinions on blogs. The newer forms
in a real-time manner. of social media allow Politico to distribute stories
Launched on January 23, 2007, by Editor-in- that can instantaneously drive the conversation
Chief John F. Harris, Executive Editor Jim Van- about politics and government. Erik Wemple, a
deHei, and Publisher for Allbritton Communi- media critic who writes for the Washington Post’s
cations Robert Allbritton, Politico has quickly Web site, says that Politico has a credibility that
become one of the leading nonpartisan news comes from old media combined with the speed,
media companies, covering national politics and TV, and social-media tools that define new media.
Washington, D.C., news. Politico’s daily newspa- Politico’s innovative means of news reporting
per has a circulation of over 30,000, is distrib- on Capital Hill, Congress, and the president now
uted free on Capitol Hill, and features content on has a spinoff Web site called Politico Pro. Politico
the president, Congress, lobbyists, and media. In Pro is a subscription-only product launched in
addition to the site and newspaper, readers can February 2010, reporting on policy in a Politico
access and participate in Politico’s conversation style. According to social media critics, Politico is
994 PolitiFact.com

for political “news junkies,” whereas Politico Pro original sources, and impartial experts, rather
is for political insiders. than news stories; the end results of multiple
sources and original reporting reflects its goal of
Jennifer Summary arriving at the truth. The final step is a rating of
Southeast Missouri State University the accuracy, truthfulness, or status of promises
made in the statements.
See Also: Campaigns, 2012; Drudge Report; The Tampa Bay Times (originally the St.
Huffington Post; Townhall.com. Petersburg Times) was owned by the Poynter
family since 1912. In the 1970s, its owner Nelson
Further Readings Poynter (who also cofounded the Congressional
Bigelow, William. “Media Matters Attacks Politico.” Quarterly with his wife Henrietta), devised a plan
Brietbart (November 2012). http://www.breitbart to keep his paper independent. He created a small
.com/Big-Journalism/2012/11/06/Media-Matters nonprofit school for journalism, originally called
-Attacks-Politico (Accessed December 2012). the Modern Media Institute (later renamed the
Enda, Jodi. “Politico Act II.” http://www.ajr.org/ Poynter Institute), and left the school his shares
article.asp?id=5192 (Accessed December 2012). in the Times Publishing Company (which owned
New Republic. “Washington’s Most Powerful, Least the newspaper) when he died in 1978. Control of
Famous People.” http://www.tnr.com/article/ the newspaper is unique: a single executive man-
politics/96131/washingtons-most-powerful-least ages all operations and then picks the successor.
-famouspeople?passthru=ZTM3Y2VhYmZjNmIz Partner news organizations, include newspapers
MjllNzQ3MjMxOGEzMmJlZjg1NzI# (Accessed such as the Atlanta Journal-Constitution, Cleve-
December 2012). land Plain Dealer, Austin American-Statesman,
Politico. http://www.politico.com (Accessed and The Oregonian, as well as one radio partner,
November 2012). New Hampshire Public Radio.
Politico Media Group. http://www.politiconetwork
.com (Accessed November 2012). Launching PolitiFact
Wolff, Michael. “Politico Washington’s Coup.” PolitiFact, the paper’s Web-based project, accepts
Vanity Fair (August 2009). http://www.vanityfair underwriting funding from foundations involved
.com/politics08/wolff200908/features/08/wolff with the improvement of civic discourse or news
200908 (Accessed December 2012). coverage, such as the Knight Foundation, Craigs­
list Charitable Fund, and the Collins Center for
Public Policy. However, PolitiFact claims that it
is an independent, nonpartisan news organization
that does not answer to any corporate, political,
PolitiFact.com or government interest.
Launched in August 2007, initially to fact-check
PolitiFact.com, begun in August 2007, is a Web- the 2008 presidential race, it expanded in January
based project of the Tampa Bay Times and part- 2009 to fact-check members of Congress and the
ner news operations. The Web site researches White House. In 2009, PolitiFact was awarded
and rates for accuracy statements made by public a Pulitzer Prize for News Reporting for presi-
officials, including the executive branch, mem- dential election coverage in 2008. PolitiFact has
bers of Congress, candidates, political party developed a number of rating tools that evaluate
leaders, political activists and political action the accuracy of statements or the solidity of posi-
committees (PACs), advocacy groups, lobbyists, tions. The Truth-O-Meter, the centerpiece of the
officials at all government levels, those testify- Web site, investigates the accuracy of discourse by
ing before Congress, and those who contribute candidates, elected officials, political parties, inter-
to discourse in American politics such as pun- est groups, pundits, and talk-show hosts. Among
dits, columnists, interviewers, and talk-show the guiding principles for Truth-O-Meter ratings
hosts, and even widely circulated chain e-mails. are the precision of the statement’s wording and
They research statements using original reports, the context in which the statement was made.
PolitiFact.com 995

Although PolitiFact tries to verify statements, the Romney gained the 2012 award for his false claim
burden of proof for providing evidence to substan- that President Obama had sold Chrysler to Italian
tiate claims is on the person who made them. nationals so that they could build Jeeps in China.
PolitiFact staffers read many statement sources Another rating feature is the Flip-O-Meter,
daily, including news reports, press releases, adver- which rates the consistency of an elected official’s
tisements, Web and Facebook postings, speeches, issue positions. Rather than providing a value
and interview transcripts. They select which state- judgment of shifting positions (which might dem-
ments to research, report on, and rate for accuracy, onstrate an ability to compromise or adapt), the
based on a series of criteria involving the signifi- articles presented with the Flip-O-Meter offers
cance of a statement, the likelihood that a state- analysis of the shift and then rates the amount of
ment will be repeated by others, the verifiability of change based on three ratings. It follows the iden-
a claim (they do not fact check opinions), and the tical standards and process for writing, editing,
perception that a statement leaves an impression and rating. A “no flip” rating signals that there
that may mislead or cause the audience to won- was no significant change in position. A partial
der “Is that true?” Recent topics range from gun change rates a “half flip.” A total alteration of the
control to sexual assault in the military, and from initial position receives a “full flop.”
immigration reform to terrorism. Promise Meters rate the status of campaign
After an article is written and edited, it is promises made by elected officials. The first was
reviewed by a minimum of three editors who the “Obameter,” which compiled over 500 cam-
establish a panel that assigns the rating. The rat- paign promises made by Barack Obama during
ings are offered in a hierarchy: the lower the rat- his presidential campaigns in 2008 and 2012.
ing, the more the deceitfulness (or the less truthful- Campaign promises are rated as “not yet rated,”
ness). A rating of “true” means that the statement “in the works,” or “stalled”; if an action has
is accurate, with nothing significant missing. A occurred, it is rated as “promise kept,” “com-
statement rated as “mostly true” is accurate, but promise,” or “promise broken.” A summary
needs additional information for clarification. of the status of all promises is created, and the
If rated “half true,” a statement exhibits partial Obameter also sorts promises by subject, such as
accuracy, but leaves out details or presents infor- energy, taxes, the economy, and the military. An
mation out of context. A rating of “mostly false” additional Promise Meter, the “GOP Pledge-O-
means that there may be an element of truth but Meter,” reviews Republican congressional leader
the statement ignores information that would promises made during the 2010 campaign, and
offer a different perception. If a statement is not uses the same rating system.
at all accurate, it is rated “false.” The lowest rat- PolitiFact has received criticism from both
ing, given to statements that are ridiculously false, sides of the political spectrum, with conservatives
is “pants on fire.” and liberals claiming bias. This is because some
Each Truth-O-Meter rating is accompanied facts that the site claims to have been checked
by a list of sources and includes links to those could not possibly have been examined. How-
sources so that readers can decide if they agree ever, PolitiFact has received praise for some of
with the rating. An annual “Lie of the Year” has its efforts. With the motto “Sorting out the truth
been awarded since 2009, with the first going to in politics,” and its mandate to employ ethical,
Sarah Palin’s claims of the government death pan- strict journalistic standards, PolitiFact’s fact find-
els that would result from the Patient Protection ers attempt to confirm the accuracy of discourse
and Affordable Care Act (also known as Obam- that impacts daily civic life.
acare). The same issue garnered the 2010 award
for opponents who claimed that the act was a gov- Beth M. Waggenspack
ernment health care takeover. In 2011, the Demo- Virginia Tech
cratic Congressional Campaign Committee was
cited for claiming that Congressman Paul Ryan’s See Also: Campaigns, Congressional (2010);
budget proposal would end Medicare, which was Campaigns, Presidential (2008); Campaigns, 2012;
untrue. Republican presidential candidate Mitt FactCheck.org; Lobbyists; Political Parties; Politico.
996 Polling

Further Readings the presidency. Yet, Truman won re-election, and


Byers, Dylan. “National Review Attacks PolitFact.” the polling error is reflected in the famous pho-
Politico (August 28, 2012). http://www.politico tograph of Harry Truman holding the Chicago
.com/blogs/media/2012/08/national-review Tribune newspaper with the headline “Dewey
-attacks-politifact-133506.html (Accessed April Defeats Truman.” This catastrophic effort was
2013). explained by embarrassed pollsters as “late decid-
PolitiFact. http://www.politifact.com (Accessed April ers” breaking for the president.
2013). Since the 1950s, polling has become an impor-
Yahr, Emily. “Policing the Pols.” American Journalism tant part of the political campaign process for a
Review (2008). variety of reasons, including the media’s penchant
for horse-race-oriented campaign stories to entice
and keep market share, as well as campaigns’
attempts to formulate messages that reflect a
candidate’s strategy in winning the election or
Polling success in a public policy initiative. Polling has
proliferated in recent times. In 1972, there was
A straw poll is an informal survey of attitudes one national presidential poll during the last three
about an issue, candidate, or event that does not weeks of the election; in 2008, there were 24.
have binding consequences in the arena in which
it takes place. The first political poll, which was Why Use Polling?
a straw poll, was introduced during the election Polling is utilized in politics to gauge the public’s
of 1824 in Pennsylvania. This poll predicted that attitude toward a person or issue, and to learn
Andrew Jackson would win over John Quincy what message could persuade a particular type
Adams, and Jackson did win the popular vote of voter to support a particular person or issue.
but lost the electoral college (which was not the Polls can measure candidate viability through the
object of the survey). ballot test question, and evaluate the effective-
Over the next century, the process of data ness of a particular communication strategy. For
collection evolved into direct-mail solicitations instance, polling allows a representative sample
through the magazine of the day, Literary Digest, of 1,000 people to share their opinions on a can-
which contacted millions of potential voters as didate or issue, thereby providing the researcher
its sample and successfully offered predictions on the ability to extrapolate such findings to the
presidential elections from 1916 through 1932. In overall population.
1936, Literary Digest opted to base its sample on Polling provides data on key segments of con-
motor vehicle registrations and phone numbers, stituents of the population’s attitudes toward a
which biased its sample, and led to the predic- particular issue, in contrast to the overall popula-
tion that the more affluent candidate, Alf Landon, tion. Standpoint theory affirms that it is problem-
would be the next president. Of course, Franklin atic to truly understand someone else’s perspec-
Delano Roosevelt was re-elected for the second tive of the world because every person is shaped
time, and due to its errors, Literary Digest lost by multiple factors and individual experiences.
credibility and soon went out of business. Polling provides a vehicle to understand trends,
Instead of collecting data from millions of peo- similarities, and the differences of subgroups
ple, as had been the practice by Literary Digest, within the general population.
George Gallup and Elmo Roper used representa-
tive sampling methods of fewer people to predict Data Collection
the outcome of the 1936, 1940, and 1944 elec- There have been many changes in collection
tions. Gallup and Roper began using the modern methods of data over the last 100 years. For
scientific approach to polling by implementing instance, the straw poll, which was popular in the
a probability sampling technique and a margin 19th century, is now viewed more as a fundraising
of error. In 1948, Gallup, along with other poll- gimmick, rather than a legitimate and accurate
sters, predicted that Thomas Dewey would win measurement of public opinion. For example,
Polling 997

message to be played to all recipients. Recipi-


ents respond with keypads to enter their choices.
According to Nate Silver, the most accurate poll-
ster in 2008 and 2010 was Scott Rasmussen, and
in 2012 Public Policy Polling; both use IVR data
collection.
One explanation for the accuracy of IVR data
collection is the trend for increased automation
in people’s day-to-day lives, including touch sys-
tems for customer service, self-banking, and even
self-checkout at stores. However, there are chal-
lenges as IVR may lose its legitimacy in data col-
lection, given that the FCC has made it illegal to
call cell phones, which limits the sampling frame.
Internet data collection is growing in popularity
with the ability to ask longer questions and have
a representative sample. Firms like Ipsos/Reuters
The Ames, Iowa, straw poll has been important to the and Google Consumer Surveys were remarkable
Republican Party since 1980. Fred Karger speaks at the Iowa successes in 2012.
State Fair in Des Moines, Iowa, prior to the straw poll. Karger
was a Republican candidate for the 2012 presidential election. Aggregate Polling
Known as “the poll of polls,” aggregate polling
has been around since 2000. The distinguishing
characteristic of aggregate polling is that statis-
the Ames, Iowa, straw poll has been used by the ticians do not actually conduct any polls them-
Republican Party since 1980, but has accurately selves but rather collect polls and use a weighting
predicted the eventual nominee only twice (1996 system to predict the outcomes of races. Critics
and 2000). argue that aggregate polling compares apples
Direct mail and face-to-face interviews for data with oranges, as each poll has different margins
collection were the most popular techniques used of error and different data collection processes.
in the early 20th century. Direct mail continued to Nonetheless, proponents argue that the reliabil-
be popular into the late 1980s. Yet, the increased ity of results as accurate predictors proves the
cost of postage and the decrease in responses validity of the method. Real Clear Politics was
adversely impacted the reliability of this data col- the first to introduce this method to the main-
lection method. The face-to-face interview also stream, and aggregate polling is now very popu-
became too costly, and was hampered by poten- lar in the media, as is evidenced by the Huffing-
tial interviewer bias. In response, the modern poll- ton Post and the New York Times’ blog by Nate
ing industry adopted the telephone as its favored Silver, www.fivethirtyeight.com.
means of data collection.
Live-operator phone calls continue to be the Web Analytics
standard practice because they allow access to Today’s pollsters are opting for noninvasive ways
most of the population and there is no limit on of measuring attitudes as a means of countering
what sample of the population one can access via the Hawthorne effect, which suggests that the act
cell phones. A total of 11 of the 22 national poll- of observation will affect behavior. Web analyt-
ing firms use this telephone method. ics examines the dynamics of individuals on the
For the last decade, telephone data collection Web. As people surf the Web, data is constantly
has evolved with voice over Internet protocol collected about which pages a person visits, how
(VOIP) and interactive voice recognition (IVR) long he or she stays on a page, and how many
software, known as auto calls or robocalls. This comments are generated by a story or quote.
system of data collection allows for a prerecorded Some analytics include the number of “likes” or
998 Polling

“friends” on Facebook, the number of followers early in the campaign, that shows a candidate win-
on Twitter, or the number of views on YouTube. ning will create a bandwagon effect as people want
One critical concern is that social network sites to be associated with a winner, and will support a
can be artificial or have purposefully inflated candidate early in the process, thereby limiting the
counts due to advertising. ability for a challenger to persuade voters.
In contrast to the bandwagon phenomenon
Types of Polling is the underdog effect, based on the notion that
Cross-sectional polls are the most common type people root for the underdog, as witnessed by
of polling used in political campaigns. These the David versus Goliath narrative. When a poll
are snapshots-in-time polls, where a poll is con- shows a candidate losing, this theory postulates
ducted in a few days or less. Such polls are also that people will rally around the candidate and
called benchmark polls and brushfire polls. These support him or her in opposition to the presump-
types of polls are limited in value because there is tive winner.
only one result to analyze, as opposed to longitu- Immediacy theory argues that people are
dinal studies. intensely interested in the results of elections,
Tracking polls are popular in determining the and that instead of waiting for Election Day to
effects of how messages are received by voters. count the votes, there is a need to know who
Tracking polls are conducted through a series of is winning at any given point. As a result, the
shorter polls over the course of days, weeks, or popularity of polling has increased. This horse
even years. race phenomenon provides pundits something to
Overnight and flash polls are typically used to talk about during the campaign dependent upon
learn the effects of a particular event, such as a the polling results. However, LaPiere’s studies of
debate, or if an advertisement or direct mail piece the 1930s that found that attitudes do not nec-
is having the intended effects. These polls are essarily reflect behavior, and several indicators,
done in one night, and have a few questions that such as favorable opinion, may not result in an
directly examine a communication phenomenon. actual vote.
Bellwether polls use a sampling technique that
identifies a region or city/town of a state that Question Design
closely reflects the voting trends of the entire state. Two key concepts regarding polling are validity
This region is polled and the results are general- and reliability. Validity asks, “Are we studying
ized to the overall population. what we claim to be studying?” and reliability
Push polling is a message strategy technique looks at the consistency of the instrument used to
that is designed to resemble a scientific poll. The collect the data in terms of its ability to measure
purpose of push polling is not to measure the atti- the same thing the same way each time. Such fac-
tudes or feelings of a potential voter, but rather tors as the time of day a survey is administered,
to persuade a voter through the use of leading the day of the week, and the weather can influ-
questions. ence the results and lower the reliability of data.
Exit polls are conducted the day of an elec- Basic survey format includes a screening ques-
tion; voters are asked to tell interviewers who tion, name recognition questions, followed by
they voted for and about their demographics. The ballot tests, then issue and message strategy ques-
U.S. Constitution calls for a secret ballot, and in tions, and finally demographic questions.
order to learn the demographics of voter support Screening questions are used to qualify a per-
for a particular candidate or issues on Election son to participate in the survey. Most polls for
Day, pollsters will visit various voting locations to electoral politics will ask if the person is registered
interview voters after they have cast their votes. or likely to vote in order to qualify for the survey.
Yet there is a caveat, which will be discussed sub-
Polling Effects sequently, in the “likely voter model.”
There are multiple theories on the effects of polls Name recognition is a product of favorability
on society, but the extent and magnitude of such questions, where respondents are asked if they
effects is up for debate. Some advocate that a poll have a positive opinion, negative opinion, no
Polling 999

opinion, or have never heard of the candidate in three-digit local exchange code, and then a ran-
question. dom assignment of the last four digits. An impor-
Ballot test questions are asked after the name tant caveat with this technique is if one generate
recognition questions, so as to not influence the one’s own RDD list, one must make sure to elim-
former. These questions focus on who voters are inate any emergency numbers, including police
going to vote for. Most pollsters write and order stations and hospitals.
the responses based on what the voter will see Registered voter lists can be acquired from the
on the ballot on Election Day. Issue and mes- Secretary of State’s offices normally for free, or for
sage strategy questions focus on identifying what a nominal cost, However, many private vendors
issues are most important to voters. Demographic provide this data to candidates and campaigns as
questions focus on age, party affiliation, gen- well. A typical random sample provided by a ven-
der, socioeconomic status, education level, home dor costs $350 to $500 depending on size and any
ownership, marital status, race, ethnicity, and stratification requests.
children, and so on. Open-ended questions allow
interviewers to freely choose their answers, but Data Analysis
can be difficult to analyze because they need to Polls are analyzed through top-line results
be categorized and coded. Most polls use forced (referred to as frequencies or marginal), which
choice question design. are the percentage of responses given for each
Polling can be used as part of a media audit to answer to each question. Most pollsters only use
determine where voters get their news, what pro- cross tabulations as further analysis, and do not
grams they watch, or what other sources they use employ advanced statistical testing such as Chi
throughout the day in order to target messages to Square, Anova’s, t-test, correlation, and regres-
these individuals. sion analysis.
Wording of questions can bias the validity of a Before results are published, most pollsters will
poll. For example, using loaded words such as if determine if the sample that answered the poll is
a person “supports the killing of babies” would representative of the entire population, based on
likely result in an answer of “no,” but the ques- a set of parameters such as age, gender, and party
tion of whether someone “supports abortion” affiliation. If the sample is not representative, then
could elicit a “yes” response. Other examples the pollster will use a system of weighing prior to
include double-barreled questions in which two analyzing the results.
questions are asked at once. Leading questions Weighing is the process of assigning more value
are characterized by an assertion that predisposes to one demographic and less value to another. For
the recipient to a particular response. example, if a sample has 100 respondents, and 70
were women and 30 were males, but it is known
Sampling Methods from voter registration numbers that gender is
A sample is a subset of the population. Probabil- split 50/50, then one would devalue the results
ity sampling refers to the opportunity for every- of women by dividing 70 by 1.4 and multiplying
one in a population to have an equal opportunity men 30 × 1.67 to create a representative sample
to be chosen. Since political polling is protected of 50/50.
as political speech, the “do not call list” does not Using multiple demographics is more complex
apply and all phone numbers can be dialed. The and there is no universal, agreed-upon weighing
exception is that if one is using an automated data principle used by all pollsters. Yet, the general
collection method, one is not allowed to call cell rule is to either collect a large enough sample in
phones. order to eliminate enough respondents to match
The two most common types of probability the parameters set by the demographics, or after
sampling employed by pollsters are random digit each weighing of one demographic, making
dial (RDD), and using a random sample from adjustment in other demographics.
a list of registered voters. RDD is a probability Perhaps the most important criteria for weigh-
sampling method that randomly generates tele- ing is party affiliation, and some firms use a
phone numbers by using area codes, followed by likely voter model (LVM), which accounts for the
1000 Polling

variance in survey results for any given race. Poll- a 100,” although such colloquial interpretations
sters use a variety of techniques to determine the can sometimes run the danger of sliding toward
LVM of any given election, including exit polling over-simplification.
and party registration numbers. Some pollsters do
not weigh their results, claiming that the random- Challenges for the Future
ness of the sample is what makes the results rep- Equifinality suggests that there are multiple ways
resentative of the overall population. to reach a desired outcome, and this certainly
applies to polling. Methods of data collection and
Margin of Error analysis have continued to evolve from the days
Margin of error (MoE) is a statistic used to deter- of the first straw poll conducted during the 1824
mine how much sampling error is contained in presidential election, and the challenges presented
the results of a survey. It is a standardized value by the Literary Digest approach to public opin-
primarily related to sample size, assuming a ran- ion. For example, over the last decade, modifi-
dom sample research design. It quantifies the cations in techniques have changed to ensure a
amount of unavoidable error that is built into the representative sample, with younger people opt-
sampling process, since there can never be a 100 ing for cell phones and abandoning landlines. In
percent match between a sample and the popula- order to reach subgroups of the population, mul-
tion from which it is drawn. tiple methods of data collection will become more
A MoE is calculated based on the size of the prominent in the future, including the use of Web
sample, and to a certain degree, the size of the analytics and the Internet.
overall population. Simply put, in a random sam- An example of how different forms of data col-
pling design, the more people who answer the lection can lead to bias responses is a study con-
survey, the lower the MoE. Sample error is then ducted by Pew Research Center (2010), which
used in further calculations, including the linked suggests that people who answer the polls on
numbers’ “confidence level and confidence inter- landlines are biased toward conservative values
val.” Once calculated, the numerical value of the by about 5 percent versus those who answer via
margin of error is then applied to the “average” cell phones. Those successful in gauging public
or mean response to a question, first as an addi- opinion via polling will remain vigilant and cog-
tion, then as a subtracted number (since one does nizant of such changes within the public and its
not know if the error is “too high” or “too low” means and manner of decision making. To do so
relative to the unknown true value), resulting in a increases the likelihood that polling predictions
range of percentage values along which the accu- mirror reality, which is the bottom line in the
rate measurement can be presumed to lie. This credibility of any pollster.
is called the “confidence interval.” “Confidence
level,” a related term, refers to the relative pro- Spencer H. Kimball
portion of all possible cases that any particular Emerson College
confidence interval can be expected to describe,
using the mean value as a point of reference and See Also: Data Mining; Focus Groups; Forecasting
expanding in both directions (positive and nega- Elections; Inferring Sentiment; Information
tive valences) to cover increasingly large areas of Aggregation; Predictive Analytics; Push Polling;
the Bell Curve that describes the total population. Voter Turnout.
Social science research typically uses a 95 per-
cent confidence level, which in clear language Further Readings
means that it calculates the range of values Keeter, Scott, Leah Christian, and Michael Dimock.
revealed in the survey, and along which the “real” “The Growing Gap Between Landline and Dual
value (in the population) is presumed to occur, to Frame Election Polls.” Pew Research Center
describe 95 percent of all possible cases. This is (November 22, 2010). http://pewresearch.org/
also frequently expressed as being “95 percent pubs/1806/growing-gap-between-landline-and
confident” in one’s results, or as being confident -dual-frame-election-polls (Accessed December
that one’s results are accurate “95 times out of 2012).
Pornography, Revenge 1001

Silver, Nate. “Poll Averages Have No History of and exchange information and ideas. Just as You-
Consistent Partisan Bias.” New York Times Tube or Facebook host other people’s images and
(September 29, 2012). http://fivethirtyeight.blogs videos, revenge pornography sites enable users to
.nytimes.com/2012/09/29/poll-averages-have-no post nude images and videos for vindictive pur-
-history-of-consistent-partisan-bias (Accessed poses, whereby the person submitting informa-
December 2012). tion accepts full responsibility for uploading it.
Silver, Nate. “Which Polls Fared Best (and Worst) Although revenge pornography Web sites may
in the 2012 presidential Race.” New York Times feature private information of men and couples,
(November 10, 2012). http://fivethirtyeight.blogs women’s images are prevalent and constitute
.nytimes.com/2012/11/10/which-polls-fared-best the majority of profiles. Sexually explicit images
-and-worst-in-the-2012-presidential-race are often acquired by victims’ ex-partners in the
(Accessed December 2012). course of the romantic relationship. They may be
Stonecash, J. M. Political Polling: Strategic obtained with the consent of the woman when
Information in Campaigns. Lantham, MD: Rowan she, for instance, sends intimate “sext” messages,
& Littlefield, 2008. sexually explicit text/video messages via a cell
phone or social media networks, to her partner.
Alternatively, nude photos may be attained by
hackers clandestinely from victims’ PCs, social
media profiles, and cell phones. Revenge por-
Pornography, Revenge nography sites are large repositories for amateur
pornography and online discussion platforms
The term revenge pornography, or involuntary where users can share opinions about the con-
pornography, refers to Web sites where users post tents. They also serve as easy sources of private
sexually explicit images of individuals, primarily information, including revenge subjects’ names
women, without their consent, often along with and city of residence, as well as screen shots of
their full legal names and detailed contact infor- their social media pages.
mation, including Facebook profiles or other social Despite the sexually explicit content of revenge
media identities, so that third parties may harass pornography sites, revenge pornography should
them. It also refers to posting this type of sexually not be confused with conventional forms of por-
explicit material on other people’s online and social nography. Traditional pornographic materials are
media sites in order to give the impression that the produced by consenting adults. Revenge pornog-
owners of those sites consume pornographic mate- raphy is nonconsensual pornography, whereby
rial, when in fact this may not be the case. Typical those individuals whose nude images are posed
“revengers” are the depicted individuals’ ex-part- online are denied the rights to consent to be used
ners. Nude images, however, may also be posted as sex objects by Web site users. The very purpose
by hackers. Apart from nude images and contact of revenge pornography is to allow users of the
information, users may also post false information Internet to post, exchange, and comment on nude
that creates a negative image of the person who is images in order to shame, humiliate, and destroy
subjected to further humiliation. Revenge pornog- the lives and reputations of hand-picked targets.
raphy Web sites subject individuals to severe emo- Although defenders of revenge pornography
tional injury, pecuniary loss if they lose their job, argue that the information they use is already
and a significant likelihood of being stalked and available online through multiple sources, crit-
harassed in cyberspace and real life. ics counter that these Web sites deliver private
information while making women, without their
Misconduct express consent, subjects to sexual harassment
Revenge pornography Web sites refer to the and sexual fixation for (cyber-)stalkers and trolls.
generic group of social media. Similar to social Revenge pornography sites allow posting com-
networks, Internet forums, and blogs, revenge ments that are cynical and sarcastic remarks on
pornography Web sites offer a site for interac- intimate photos. Most of them mean to shame
tions among people in which they create, share, those who are featured for their provocative
1002 Pornography, Revenge

content. Because revenge pornography sites and DirtyBlast.com disappeared when Texxxan
reveal detailed private information about victims, .com went offline as a result of the pending law-
stalkers are provided with sufficient information suit. Pinkmeth.com, maintained by anonymous
to find victims, follow them, and research them individuals, is still in operation with a pending
through their use of social media profiles, work lawsuit in Denton County Court, Texas, by Shelby
Web sites, forums, and online directories. Stalk- Conklin. She claims punitive damages of $1 mil-
ing via smartphones, social networking Web sites lion from Pinkmeth.com for intrusion on seclu-
and in real life may present risks to the victims’ sion, public disclosure of private facts, appropri-
emotional and physical health. ation of her name and likeness, and intentional
infliction of emotional distress.
Allegations and Lawsuits
Intrusion into an ordinary person’s private sexual Criminalization and Legal Remedies
sphere may generate considerable profits. Promis- Revenge pornography has been subject to much
ing fast and easy revenues, revenge pornographers controversy. Law enforcement officers and pros-
have demonstrated persistence and creativity, fill- ecutors face increased pressure to work with cases
ing in a gap in the amateur pornography market. of nonconsensual pornography. Victimized indi-
Revenge pornography seems to have first viduals have resorted to suing site owners or those
come to the public eye with the launch of the site associated with revenge pornography for hosting
IsAnyoneUP.com in 2010. Founded by Hunter nude images displayed online. Revenge pornog-
Moore, IsAnyoneUP.com was the materialization raphers make money by posting nude images and
of an idea that came from a woman who continu- have little incentive to create policies that make
ously sent Moore sexually explicit shots. Moore it easy for victims to remove the submitted pho-
created a blog for his collection of images, which tos. More refined legislation is necessary to more
was quickly expanded to include other nude narrowly define the conditions under which the
pictures sent by Internet users. Revenge-seeking victims of revenge pornography are protected.
users rapidly upgraded Moore’s unexceptional Such legislative maneuverings are very likely to be
blog into a well-known online database of nude pushed back by companies and organizations that
images and personal information. seek to keep content restrictions on the Internet as
IsAnyoneUP.com garnered over 30 million minimal as possible.
page views a month, and earned up to $10,000 Revenge pornography sites, as much as other
a month until Moore decided to shut it down on social media Web sites, enjoy certain protections
April 19, 2012, following mounting public pres- from liability for the contents posted by users
sure. Because the site attracted a great deal of con- in the United States under the Communications
demnatory attention, much of which was related Decency Act (CDA) of 1996. Section 230 of the
to child pornography, defamation, and privacy CDA immunizes Web sites from liability result-
invasion, Moore was subjected to investigation ing from the publication of information provided
by the Federal Bureau of Investigation (FBI). He by others. As long as published material is not
faced numerous lawsuits, such as one by James illegal to post (e.g., child pornography or copy-
McGibney, in which Moore was found guilty of righted material), Section 230 provides immunity
defamation and was fined $250,000 in damages. for Internet service providers, including blogs and
In February 2013, John S. Morgan sued and Web sites, that publish information provided by
shut down another revenge pornography site, third parties. Protections under the CDA, how-
www.Texxxan.com, citing copyright infringe- ever, are not without limitations. Section 230 does
ment under Texas state law. The lawsuit on not protect the third parties who post illicit con-
behalf of more than two dozen local women tent on the Internet. Administrators of revenge
claimed that the site was designed to cause pornography Web sites could face liability for
humiliation and emotional distress. The lawsuit facilitating the violation of Section 230.
also alleged invasion of privacy, gross negligence, Given the proliferation of revenge pornography
emotional distress, and civil conspiracy on the in a legal environment that makes it very difficult to
part of the Web site operator. CajunWins.com criminalize legal pornography, a series of lawsuits
Portman, Rob 1003

against revenge pornography Web sites instigated agenda, Anonymous attacked YouTube with por-
the launch of a public campaign against involun- nographic film clips disguised with tags of teen
tary pornography supported by petitions for both idol musicians to avoid detection and increase
state and federal laws in the United States. Peti- their chance of exposure across the site.
tioners urge fighting revenge pornographers who Evaluations of Anonymous’s activities thus
post intimate images without permission. They vary. On one hand, Anonymous’s philosophy
call for the amendment of cyberstalking laws and and modus operandi have received wide public
enactment of an invasion of privacy statute that support. On the other hand, hacking activities
would criminalize revenge pornography. have been criticized for making Hunter Moore
Florida is the first state in the United States to a victim, as is anyone else who is picked on by
attempt to take an action against revenge por- hackers promoting a particular set of sociopoliti-
nography. House Bill 787, effective October cal ideals.
2013, makes posting revenge pornography a fel-
ony punishable by up to five years in prison and Yuliya G. Zabyelina
a $5,000 fine. It made it a third-degree felony for Masaryk University
a person to knowingly use a computer, or other
device capable of electronic data transmission or See Also: Anonymous; Antibullying Campaigns;
distribution, to transmit or post to a Web site or Cyberculture; Cyber-Vigilantism; Ethics of Social
any other social networking service, or cause to Media in Politics; Evolution of Social Media; Privacy;
be posted to a Web site or any other social net- Sexting.
working service any photograph or video of an
individual that depicts nudity and contains the Further Readings
depicted individual’s personal information, or Bocij, Paul. Cyberstalking: Harassment in the Internet
counterfeit or fictitious information purporting Age and How to Protect Your Family. Westport,
to be such personal information, without first CT: Praeger, 2004.
obtaining the depicted person’s written consent, Bowker, Art and Michael Sullivan. “Sexting:
unless the victim was photographed or video- Risky Actions and Overreactions.” FBI Law
taped in public. Enforcement Bulletin (July 2010).
Lee, David. “Anonymous Target Revenge Porn Site
Hacktivists Against Revenge Porn Owner Hunter Moore.” BBC (December 3, 2012).
The owners of revenge porn sites have been under Steinbaugh, Adam. “Revenge Porn: The Fight Against
attack by online advocacy groups. Anonymous, the Net’s Nastiest Corner.” The Guardian (April
a group of unidentified Internet users engaged in 12, 2013).
a controversial online resistance movement on a
number of sociopolitical matters, declared war
on Hunter Moore in 2012. Although best known
for targeting corporate Web sites, Anonymous’s
operations were to “make a real difference in the Portman, Rob
lives of hundreds of bullied teenagers and protect
them from real harm such as rape or stalking.” Rob Portman, the junior senator from Ohio, has
In Operation Hunt Hunter, Anonymous hacked been considered twice as a potential vice presi-
and distributed Moore’s personal information, dential candidate and often serves as a nemesis
including date of birth, address, phone number, for Republican candidates during debate practice.
parents’ names, social networking details, inter- His relative low profile belies his conservative
net protocol (IP) addresses, and a list of pending policies and accomplishments. Democratic Senate
lawsuits. In another operation, Operation Dark- Budget Committee Chairman Kent Conrad has
net, Anonymous hacked into and stole users’ said, “He is a person of credibility and decency
e-mails and passwords from several child por- that commanded respect on both sides of the
nography Web sites, later releasing them to the aisle.” Former President George W. Bush called
public. Despite the pronounced antipornography him a “good friend, a decent man, and a skilled
1004 Portman, Rob

negotiator.” These two statements sum up Port- In 2007, after another stint in the White House,
man’s character. this time serving under President George W. Bush,
Portman was born in Cincinnati, Ohio, on Portman returned home to Cincinnati and legal
December 19, 1955, to Joan and William C. Port- practice. He joined the law firm of Squire Sand-
man II. When he was young, his father borrowed ers as part of the firm’s transactional and inter-
money to start the Portman Equipment Company, national trade practice, where he practiced until
a forklift dealership. The company grew from a winning the Senate seat that was vacated by the
small business in which Portman, his siblings, and retirement of George V. Voinovich in 2010.
mother all worked, to a sizeable and successful
enterprise that employed more than 300 workers. presidential Appointments
Portman graduated from the Cincinnati Coun- Shortly after winning a second term in office,
try Day School in 1974, and Dartmouth College President George W. Bush nominated Portman
in 1979, where he earned a Bachelor of Arts. In to become the U.S. Trade Representative. He
1984, Portman graduated from the University quickly won Senate confirmation and was sworn
of Michigan Law School. In July 1986, Portman in on May 17, 2005. Upon taking office, Port-
married the former Jane Dudley, who worked as man became the first sitting congressman in his-
an aide to then Democratic Congressman Tom tory to hold the post. With trade law in his back-
Daschle. The Portmans have three children: Jed, ground and years on Capital Hill working on
Will, and Sally. trade issues, Portman quickly advanced and suc-
Portman and his siblings own the Golden cessfully gained congressional approval for trade
Lamb Restaurant and Inn in Lebanon, Ohio. The deals with Bahrain, Peru, Oman, and Colombia.
property has been in his family since 1926, and Portman successfully navigated approval for
has a reputation for being haunted. Along with the Central American Free Trade Agreement
the inn, Portman’s interest in history runs deep. (CAFTA) after a bruising battle. Portman’s power
He penned his only book to date, with coau- of persuasion served him well during intense con-
thor Cheryl Bauer, about an Ohio Shaker Village gressional debates. The Senate eventually passed
founded in 1805. The book, Wisdom’s Paradise: the measure with only a nine-vote margin. How-
The Forgotten Shakers of Union Village, was ever, victory in the house was even more difficult.
published in 2004. The House passed the bill with only a two-vote
Outside of politics, Portman enjoys physical margin, 217–215, on July 28, 2005.
challenges. He bikes, canoes, and kayaks. He has Following his success on CAFTA, President
kayaked two major Chinese rivers, and the entire Bush called on Portman again to take on a tough
Rio Grande. assignment. On April 18, 2006, Bush nominated
Portman to become director of the Office of Man-
Legal Career agement and Budget (OMB). The Senate unani-
After graduating from law school, Portman mously confirmed Portman on May 26, 2006.
moved to Washington, D.C., to work for the law Portman stayed in the position for only one year. In
firm Patton Boggs, where he practiced trade law a later interview with the Hill, he lamented, “I was
and lobbied on behalf of clients. From there, he frustrated when I was there about some spending
moved back home to Cincinnati and joined the issues—specifically, as you know, I wanted to offer
law firm Graydon Head & Ritchie, where he a balanced budget over five years, and a lot of peo-
practiced business and international law. ple didn’t.” However, Portman’s skill for gaining
It was not long before Portman returned to consensus helped him persuade Bush to submit his
Washington. In 1989, he joined the White House first plan to balance the budget and eliminate the
staff of President George H. W. Bush as an asso- deficit by 2012. Even though he was “frustrated,”
ciate counsel. He quickly moved up to become Portman remained loyal to Bush.
deputy assistant, and then director of the White
House Office of Legislative Affairs, where he Congressional Career
served as the president’s chief lobbyist on Capitol With the encouragement of his friend Congress-
Hill until 1991. man John Boehner (R-OH), Portman decided to
Portman, Rob 1005

run for Congress in 1993. He won the special National Underground Railroad Freedom Center
election to fill a spot vacated by his friend and in Cincinnati.
mentor Bill Gradison. Portman had worked on Over the course of his House career and tenure
Gradison’s earlier congressional campaign for in the executive branch, Portman was known for
the seat he would eventually win, and hold for his willingness to work with Democrats to ensure
12 years. important legislation was enacted, all the while
From 1993 to 2005, Portman represented the maintaining his devotion to conservative ide-
2nd Congressional District of Ohio in the U.S. als. While in the House, Portman voted with the
House of Representatives. He won seven con- Republican majority 90 percent of the time, and
secutive congressional elections with over 70 garnered consistently high approval ratings from
percent of the vote. Portman worked on a wide conservative organizations such as the National
range of issues and championed many diverse Right to Life Committee, National Taxpayer’s
causes. For example, he worked to gain passage Union, Americans for Tax Reform, and the Chris-
of a ban on unfunded mandates, supported wel- tian Coalition of America.
fare reform, passed a measure to eliminate capi- When Ohio Senator George V. Voinovich
tal gains taxes on home sales, and cosponsored announced his planned retirement from the Sen-
a bill to swap Costa Rican debt for preservation ate, Portman immediately formed a team to seek
of tropical forests. In 2004, he teamed up with the seat. Portman won a decisive victory in 2010
Louis Stokes, then a Cleveland-area Democratic by a margin of 57 to 39 percent of the vote. Since
congressman, to pass a bill that would create the joining the Senate, he returned to the traditional
issues he has focused on for much of his career—
the country’s debt and economic recovery.
In August 2011, Senate Minority Leader Mitch
McConnell (R-KY) appointed Portman to the
high-profile Joint Select Committee on Deficit
Reduction. This bipartisan panel was created to
recommend ways to reduce the federal budget
deficit by $1.5 trillion over 10 years. When the
effort bogged down, Portman left disappointed,
telling the Columbus Dispatch, ”I am very sad
about this process not succeeding because it was
a unique opportunity to both address the fiscal
crisis and give the economy a shot in the arm.”
In the Senate, Portman serves on the Senate
Committee on the Budget and the Senate Armed
Services Committee, where he is the ranking
Republican on the Emerging Threats and Capa-
bilities Subcommittee, a member of the Subcom-
mittee on Readiness and Management Support,
and a member of the Subcommittee on Strate-
gic Forces. He also serves on the Senate Energy
and Natural Resources Committee, where he is
a member of the Subcommittee on Energy, the
Subcommittee on National Parks, and the Sen-
ate Committee on Homeland Security and Gov-
ernmental Affairs. Portman is also a member of
U.S. Senator Rob Portman (left) pins the Silver Star medal on the Senate Committee on Homeland Security and
Sergeant Thomas Gdovin (right) on November 8, 2011. Gdovin Governmental Affairs, serving as a member of the
was awarded the medal for risking his life to save a wounded Subcommittee on Federal Financial Management,
soldier while under enemy fire during the Vietnam War in 1968. Government Information, Federal Services, and
1006 Portman, Rob

International Security, and as the ranking Repub- Portman’s Facebook page dates back to Febru-
lican on the Ad Hoc Subcommittee on Contract- ary 2011, when he used his first post to announce
ing Oversight. that he was “up and running” on social media
and inviting constituents to communicate with
Communication and Social Media his office via Facebook, Twitter, and YouTube.
While Portman has been an integral part of the He quickly paid tribute to his mentor and friend
governance of the country for more than 20 years, President George H. W. Bush by posting an arti-
his name is not as well known to the public out- cle and congratulating him on being awarded the
side of his congressional district. He has been qui- presidential Medal of Freedom. He uses Facebook
etly and intensely working inside the “Beltway” often, sometimes posting more than once a day
to pass legislation, but not working the media or with updates on votes, links to his YouTube chan-
social media. While he is on multiple platforms of nel for floor speeches, pictures of Ohioans, and
social media, he is a relative newcomer. even a proud post showcasing a stint as a guest
Portman’s Senate Web site links to the social blogger for the Heritage Foundation, a conserva-
media platforms on which he is active. These tive think tank.
platforms include: Flickr, Twitter, Facebook, and In a little more than a year on YouTube, the
YouTube. Portman also posts audio files to his Senator had more than 54,000 views of only 166
online newsroom. These files are often public ser- videos. The Senator also links to his Google+
vice announcements or discussions on important account from his YouTube channel, inviting view-
issues. There are no favorite videos posted on his ers to “hangout” with other Portman friends.
YouTube channel; instead, he posts certain videos Unlike his approach on Twitter and Facebook,
directly to his Senate Web site. Weekly columns Portman’s videos are decidedly more policy heavy
are used like blog posts to his Web site and cover and more partisan in nature. Videos showcase
a range of topics and issues. the Senator testifying on specific bills, criticizing
There are more than 200 photos posted to Democratic policies on national news shows and
Portman’s Flickr photo-sharing account. The video responses to questions from his Twitter and
photos vary from a meeting with police officers in Facebook accounts about health care reform.
Lima, Ohio, to a picture of Portman looking out The Senator maintains only a shell campaign
over Paktika Province on a visit to Afghanistan. Web site at robportman.com when he is not
The majority of the pictures he shares are of folks actively campaigning. While visitors can sign up
in his native state of Ohio—constituents, business to receive e-newsletters, the blog, newsroom, and
owners, and veterans. Sprinkled throughout is the other functions are not active when the campaign
occasional head of state or foreign trade repre- is not active.
sentative next to Brutus the Buckeye, Ohio State Portman uses his Senate Web site and social
University’s mascot. media effectively as tools to provide information
Portman also utilizes Twitter to connect with to constituents. While he is not prolific, his com-
constituents. In just over a year, he gathered nearly munication seems genuine and appears to reflect
23,000 followers. His tweets are more personal his overall communications style—understated,
in nature, such as congratulating college sports but clear. As is his style, there are very few vanity
teams, tweeting pictures of himself and a team- pictures, posts, or videos. Instead, the informa-
mate winning a kayak contest, and asking con- tion Portman provides reflects back to the issues
stituents for movie recommendations. However, he has championed and that voters in Ohio want
he does not shy away from tweeting about dis- to know and follow.
agreements with Democratic policies or support-
ing Republican candidates for office. He also will Katherine R. Fleck
retweet articles and information that he wants to Ohio Northern University
share with his followers. His communication style
is casual and unassuming. The Senator does not See Also: Campaigns, Congressional (2010);
tweet as often as other members, but he uses the McConnell, Mitch; Project Vote Smart; Spending and
platform nearly every day. Debt, Government.
Poverty 1007

Further Readings “The Global Social Crisis,” warns that between


Abcarian, Robin. “A Safe VP Pick, or Boring?” Los 47 million and 84 million more people fell into or
Angeles Times (August 5, 2010). http://articles were trapped in extreme poverty because of the
.latimes.com/2012/aug/05/nation/la-na-portman global financial and economic crisis. The World
-20120805/2 (Accessed December 2012). Bank suggests that what makes people poor is
Becker, Elizabeth. “Congressman From Ohio Is not just low income level, but also being illiter-
Chosen for Trade Post.” New York Times. http:// ate, having high health risks, and living in squalid
query.nytimes.com/gst/fullpage.html?res=9D05E7D conditions. This creates a profound deprivation
F113CF93BA25750C0A9639C8B63&sec=&spon in wellbeing.
=&pagewanted=all (Accessed December 2012). Another approach to understanding poverty is
Bolton, Alexander. “Possible VP Pick Rob Portman the capability approach of Amartya Sen, the 1998
Was ‘Frustrated’ at Bush Budget Office.” The Nobel Prize winner for Economics. This model
Hill. (August 2012). http://thehill.com/homenews/ extends the definition of poverty to include vulner-
senate/241767-portman-frustrated-at-bush-budget ability to risk, lack of voice in society, and pow-
-office (Accessed December 2012). erlessness. This builds on the notion of wellbeing
Bush, George W. “President Bush Nominates Rob to develop an awareness that poor people need
Portman as OMB Director and Susan Schwab for the capability to function in society. Capabilities
USTR.” http://georgewbushwhitehouse.archives included both the access to meet basic needs (food,
.gov/news/releases/2006/04/20060418-1.html clothing, and shelter) but also access to education,
(Accessed December 2012). health care, security from violence and other risks,
Torry, Jack. “Golden Opportunity Wasted When and political empowerment and equality.
Supercommittee Failed.” Columbus Dispatch Closely related to the notion of poverty is
(November 27, 2011). http://www.dispatch.com/ inequality, which highlights the gaps between the
content/stories/editorials/2011/11/27/golden rich and poor. These gaps include differences in
-opportunity-wasted-when-supercommittee any of the indicators of wellbeing and the distri-
-failed.html (Accessed December 2012). bution of economic, political, and social opportu-
Wingfield, Brian. “Portman Departs White House nities. By definition, those who are poor or live in
Post.” Forbes (June 19, 2007). http://www poverty have resource limitations and a resulting
.forbes.com/2007/06/19/bush-portman-nussle-biz lack of access to social media; in many cases, the
beltway_cx_bw_0619portman.html (Accessed lack of social status brings many to feel politically
December 2012). disempowered, despite their equivalent right to
vote, if they qualify.

Access to and Use of Social Media


by the Poor
Poverty Social media and the Internet have become valu-
able sources of information about current events
Poverty is the lack of sufficient resources to meet throughout the world. Informal social networks
one’s basic needs such as food, shelter, and cloth- using blogging and social media sites as well as
ing. In the United States, this is measured by a the traditional news media, both print and televi-
theoretical poverty threshold calculated by the sion, use the Internet to disseminate information.
U.S. Census Bureau, while eligibility for welfare As might be expected, many of the extremely poor
programs and benefits is measured by poverty do not necessarily have access to these resources,
guidelines established by the U.S. Department of which require the use of computer and media
Health and Human Services. equipment and a service provider. Depending on
Poverty is relative to the cost and style of living their location, some individuals may have access
in a particular community. The level of income through public facilities such as libraries, schools,
established as “poverty” in the United States can and Internet cafes, which provide low-cost access.
provide a very comfortable lifestyle in other parts Public and nongovernmental programs have
of the world. A 2011 United Nations (UN) study, been designed to provide low-cost Internet access
1008 Poverty

and equipment to low-income individuals. Cer- Using Social Media to Eradicate Poverty
tain municipalities have developed public Inter- Many traditional organizations maintain Web
net access, which is free. Comcast, an American sites to advertise their activities and solicit funds
Internet provider, offers low-cost Internet service and support. These sites now contain tools to
and inexpensive computers to low-income house- allow viewers to easily post to social media sites
holds with children who qualify for and receive including Facebook, Twitter, YouTube, Pinterest,
free or reduced-price school lunches through the Tumblr, and others.
National School Lunch Program. One Laptop per Numerous nongovernmental organizations
Child has developed rugged, low-cost, low-power have developed social media campaigns to help in
connected laptops that are distributed in develop- their missions to eradicate poverty and influence
ing countries. political processes. Many combine educational
Internet access has increased for individuals resources, social media, and appeals for donations
with limited incomes via low-cost cell phones. Cell to reach these goals. A few examples can illustrate
phone communication has been a powerful tool their potential and demonstrated effectiveness.
in mobilizing individuals in political protests such The World Bank is an international develop-
as the Arab Spring and Occupy Movements. Yet, ment cooperative of 188 countries that works
in some developing countries where social media with governments in developing countries to
access is limited or nonexistent, even these tools are reduce poverty by providing money and techni-
not available to those who wish to make change. cal expertise. It maintains a large Web site with
This access and economic imbalance can result in research papers, data, and educational resources.
global awareness of events of immediate concern Its social media strategy includes offering mul-
to populations that do not have the technology and tiple mobile applications, over 30 blogs (http://
social media access with which to know what is blogs.worldbank.org/blogs) and links to the
happening that directly impacts their lives. major social media networks (http://live.world
bank.org/connect).
Poverty as Portrayed in Social Media In 2011, the UN brought together social media
There are multiple ways of looking at the relation- experts to discuss strategies for fighting poverty.
ship between poverty and social media. One way is At the time, they estimated that a total of 5 billion
by determining how poverty is portrayed in social mobile phones exist worldwide through which
media. A brief search of Facebook for the word many in developing countries access social media.
poverty produces many international groups and For the 2012 International Day for the Eradica-
pages. Most of these are maintained by nongovern- tion of Poverty, the UN established a one-day
mental organizations focused on providing aware- social media action to raise awareness about the
ness education and dedicated to the eradication of progress made and the challenges that remain in
poverty. Posted updates about their projects and the fight against poverty. Individuals were asked
activities inform viewers who are asked to “like” to donate their Facebook and Twitter profiles to
their pages and share them with Facebook friends. send Poverty Day messages. The MyWorld Web
When an individual “likes” an organization’s site (http://www.endpoverty2015.org) was devel-
Facebook page, it will be displayed to everyone in oped to maintain a social media presence to sup-
their network, which costs nothing, and helps raise port citizen participation in achieving the UN’s
awareness about an issue like poverty. Millennium Development Goals.
Unfortunately, this may provide some individu- Cofounded by Bono in 2002, ONE (http://
als with a sense of contribution, when they have www.one.org) is a grassroots organization com-
actually done very little. These tools allow one mitted to the eradication of extreme poverty and
to say they care about the poor, but not to actu- HIV/AIDS. Using bright graphics, videos, and
ally care for them. It has been suggested that this colorful text, the Web site is linked to the major
raised awareness may eventually lead to actual social media networks. Links to encourage par-
actions such as donations, volunteerism, partici- ticipation in the political process are provided for
pation in social protest activities, political activ- petitions to elected officials in support of legisla-
ism, or influencing a career choice. tion and public policy. Funds are raised through
Poverty 1009

online store sales of the classic white silicone scale for social media purposes. This organization
ONE bracelet. partners with other organizations (including the
Worldvision is a Christian organization that United Nations Children’s Fund [UNICEF], and
uses the adopt-a-child model to make changes in the U.S. Agency for International Development
poor communities throughout the world. While [USAID]) to provide mobile phone–based com-
its official Web page lacks the bells and whistles munication social networks dealing with develop-
of social media, one of its educational projects, ment, education, and health projects.
30 Hour Famine, educates students about famine While many of these organizations provide
and provides a group simulation game that asks technical assistance and public education, the
participants to fast for 30 hours. This project intended result of their social media campaigns
site (http://www.30hourfamine.org/learn-about is to develop public awareness about poverty and
-the-famine/) includes educational information facilitate mobilization for political action.
and projects, social media links, blogs, and direc-
tions for collecting and sending funds. Poverty, Politics, and Social Media
Recognizing the limited availability of tech- In recent years, social media have played a grow-
nology in many underdeveloped countries, Text ing role in social movements and political change.
to Change (TTC) (http://www.texttochange.org) Poverty, or the disparity between the haves and
operates using simple cell phones. Founded in have-nots, has been at the root of many of these
2008, this organization creates innovative mobile social movements. Economic issues play an impor-
solutions for technology access. TTC was the first tant role in the current political atmosphere. The
of its kind in Africa to use mobile phones on a large concept of the political economy highlights the

Sopheap Chak (center) a fellow in the Internet Freedom Fellows program funded by the U.S. Department of State and managed by
the U.S. mission to the United Nations in Geneva, speaking at a Webcast on Internet Freedom in Geneva, Switzerland. Human rights
activists from around the world convened in June 2012 to share experiences and lessons learned on the importance of a free Internet
to the promotion of freedom of expression and assembly as fundamental human rights.
1010 Poverty

intimate interrelation of economic forces and the political processes and struggle for economic
political process. equality. The functionality and cost of smart-
In the United States’ 2008 presidential debate, phones allows more individuals to participate in
CNN and YouTube collaborated to allow individ- social media campaigns. As costs come down and
uals to send in videos asking questions of the can- communication networks expand, those who are
didates. Many of the individuals posed questions living in poverty and are currently disenfranchised
about unemployment, taxes, home mortgages, will increasingly use social media to change politi-
and the recession. If not for the access through cal processes and alter their economic lives.
YouTube, they would not have had the opportu-
nity to ask questions since they were not members Adele Weiner
of the political elite. It has been suggested that Metropolitan College of New York
this advance in election politics is as significant Kim Lorber
as the impact of television on the political process Ramapo College of New Jersey
was during the Kennedy–Nixon debates in 1960.
Throughout the world, several countries have See Also: Arab Spring; Economic and Social
forced political leaders to leave office, resulting Justice; Microfinance Initiatives; Nongovernmental
in changed political control of their governments Organizations; Occupy Movement; ONE Campaign;
and the promise of access to economic resources. Robin Hood Foundation; sub-Saharan Africa;
Many of these movements have used social media Water.org.
within their organizations to provide information
to global news networks. When thousands of pro- Further Readings
testers took to the streets in Moldava, Iran, and Bishop, C. “When Social Media Is Not an Option
Egypt, political forces changed the face of govern- for Social Change—The DRC Example.” http://
ments. Political and economic issues were implicit www.audiencescapes.org/congo-DRC-elections
in these movements. It was not the wealthy who -women-violence-social-media-ben-affleck-mccain
were protesting, but mostly struggling middle- -arab-spring-china-egypt-NDI-education
class and poor citizens who felt a lack of access to (Accessed January 2013).
needed resources. During the uprising in Iran, the Gladwell. M. “Small Change: Why the Revolution
U.S. State Department asked Twitter to postpone Will Not Be Tweeted.” The New Yorker (October
a scheduled maintenance shutdown because of 4, 2010). http://www.newyorker.com/reporting/
the importance of this communication tool. 2010/10/04/101004fa_fact_gladwell#ixzz2Gkk
The Occupy Movement has spread worldwide, VgKHF (Accessed January 2013).
and while not specifically focused on poverty, it Media Measurement and Mediapro. “UN Enlists
has drawn attention to the economic disparity Social Media Experts to Help Eradicate Poverty.”
between the 1 percent of the population, which http://www.mediameasurement.com/un-enlists
holds most of the wealth in the world, and the -social-media-experts-to-help-eradicate-poverty
other 99 percent, which while lacking resources, (Accessed January 2013).
holds more political power through voting num- Rainie, L., et al. “Social Media and Political
bers. The recent American elections show that the Engagement.” Pew Research Center Report (2012).
Super Political Action Committees (PACs), funded http://pewInternet.org/Reports/2012/Political
by the extremely wealthy, were not able to override -engagement.aspx (Accessed January 2013).
the will of the voters in favor of their candidates. Rosenberg, J. “Social Media at the World Bank: Tell
Us What Will It Take to End Poverty.” http://blogs
Conclusion .worldbank.org/voices/social-media-at-the-world
Internet access, social media, and economic issues -bank-tell-us-what-will-it-take-to-end-poverty
will continue to influence political processes. (Accessed January 2013).
Increasingly, many poorer individuals are gain- 30-Hour Famine Blog. “How Social Media Helps &
ing access to social media and education. They Hurts Serving the Poor.” http://www.30hour
become informed about the world and will con- famine.org/2011/10/how-social-media-helps-hurts
tinue to use the tools available to them to influence -serving-the-poor (Accessed January 2013).
Predictive Analytics 1011

United Nations Development Programme (UNDP). big data, researchers may depend on massively
“Social Media: An Outside the UN Perspective.” parallel processing systems (MPP) that contain
UNDP Communications Training Webcast large numbers of processors.
(December 19, 2011). http://www.unmultimedia In the context of social media research, users
.org/tv/webcast/2011/12/social-media-an-outside leave digital records in the form of comments,
-the-un-perspective-undp-communications-training photos, or videos posted in blogs and various
.html (Accessed January 2013). online social networking sites. These records con-
tain metadata such as the date, time, and location
of their creation. Indeed, the social media envi-
ronment is appropriate for intelligence gather-
ing in various disciplines, allowing researchers to
Predictive Analytics acquire collective knowledge about current trends
and events.
The term predictive analytics broadly refers to
various data-mining techniques that examine Predicting Election Outcomes
patterns and relationships using large and com- Predictive analytics have been used as a method
plex datasets for the purpose of making predic- for predicting the outcomes of elections in
tions of future trends and behaviors. While the the United States. Most notably, these tech-
term is typically used in conjunction with busi- niques have been used by Nate Silver, author of
ness marketing, predictive analytics are applica- FiveThirtyEight.com, a blog created in 2008 that
ble to other fields such as epidemiology, health began publication as part of the New York Times
insurance, resource management, and finance. in 2010. In his first attempt at applying predic-
They are also increasingly applied in the politi- tive models in the arena of U.S. elections, Silver
cal arena to better understand and predict vot- correctly predicted the outcome of the electoral
ing behavior. Discovering meaningful patterns college for 49 of the 50 states in the 2008 presi-
and associations based on past events and occur- dential election between Senators Barack Obama
rences allows practitioners and organizations to and John McCain. Silver went on to make pre-
better formulate future courses of action, gener- dictions during the 2010 midterm election. How-
ate more optimized planning and investing, and ever, he was less accurate in his predictions, with
more effectively allocate resources. Republicans winning 65 seats in the House, 11
Predictive analytics are inductive in nature. more seats than the mean gain of 54 seats that
They are data driven and use a variety of ana- Silver’s model projected. In the 2012 U.S. presi-
lytical tools such as statistics, neural computing, dential election between President Obama and
robotics, computational mathematics, and artifi- Governor Mitt Romney, Silver’s predictive ability
cial intelligence. The necessary first step in pre- was reaffirmed. His model accurately predicted
dictive analytics is data mining. During this step, the electoral college for all 50 states. His model’s
all relationships (or correlations) are analyzed in accuracy in the 2012 election was further dem-
the data to produce a predictive model. Predictive onstrated when he predicted the popular vote
models may be developed with regression tech- to within half of a percentage point, and he pre-
niques (e.g., ordinary least squares) using conven- dicted 31 of 33 Senate races.
tional desktop statistical computer applications Silver’s development of predictive analytics is
such as SPSS and SAS. Yet, other more advanced an outgrowth of the emphasis on the “horserace”
techniques such as neural network modeling can in politics, a manner of framing the election in
be used with less common applications such as terms of which candidate is winning a particular
JavaNNS and Emergent. race at a given point in time based upon who is
Because predictive analytics quite often employ ahead in political polls. Traditional political poll-
large and complex datasets, or big data, this ing relies on research methods grounded in sta-
necessitates the use of specific database manage- tistical sampling techniques in order to produce
ment and processing systems that are equipped to accurate samples of a specific voting population,
deal with such large data. To manage and analyze such as at the state or national level. As Silver
1012 Predictive Analytics

has argued, the samples collected by polls are donations, and online social behaviors. Voter
often inaccurate representations of the popula- data are often purchased from data brokers such
tion. For example, pollsters often rely on land- as Acxiom, or may be shared by businesses and
line telephones to gather data. Young adults, who organizations supporting a candidate. Powerful
tend to vote Democratic, use mobile phones and analytic software is used to structure the data
cannot be reached by pollsters. Taking a different into profile groupings of individuals with com-
approach, Silver has produced statistical mod- mon characteristics. Models are constructed to
els that analyze an array of data points to arrive predict which profiles will respond to particular
at a probability prediction that a candidate will messages.
win. Silver’s methods rely on a number of fac- Targeting is used to reach out to individuals
tors, including historical performance of polls, who are not yet persuaded, but are likely to be
past election outcomes, and other factors known persuaded by a message. This way, resources are
to impact the outcome of elections, such as job not wasted on individuals who already support a
reports numbers, and stock market performance. cause or candidate. Resources are also not wasted
Silver has been the subject of scrutiny for his on individuals who are not likely to be persuaded
methods and projections. Historically, public by a message because they already oppose the
opinion polls have been used to assess where cause or candidate.
candidates stand in a particular race. Polls are For example, Frontline (PBS) reported that in
used to provide a snapshot of public opinion at the 2012 presidential election, the Obama team
a specific time. They are not predictors of future used data mining and analytics in a coordinated
outcomes, despite popular tendency to extrapo- effort to turn out the vote. The Obama campaign
late from their results. Silver has broken away gathered unprecedented amounts of data about
from this traditional approach by using predic- potential voters by piecing together an individual’s
tive analytics in an attempt to forecast the prob- information from a number of different sources
ability of election outcomes. As such, he has into a voter profile. That voter profile could con-
been criticized. Criticisms include accusations by tain hundreds of data points about an individual.
supporters of both parties that Silver’s methods This coordinated data mining effort sourced data
have been biased in manners that disadvantaged from voter records, consumer databases, donor
their candidate. However, despite any political lists, volunteer databases, data gathered during
leanings Silver may have, his track record of suc- canvassing, smart phone applications, and social
cessfully modeling the election outcomes in the media such as Facebook profiles.
2008, 2010, and 2012 elections is evident of his These voter profiles were then microtargeted
reliance on a nonpartisan, data-driven approach based on their profile classification, derived from
devoid of personal bias. Silver’s work has given analysis of demographic data points such as gen-
validity to the use of predictive analytics as a der, age, and marital status, feedback the individ-
tool for forecasting the outcome of democratic ual may have given during canvassing, as well as
elections in the United States. consumer habits that were known predictors of
political orientation such as entertainment pref-
Campaigns and Advocacy Groups erences or type of car owned. Voters were tar-
Predictive analytics are not only used to predict geted with messages highlighting issues important
election outcomes. They have become a strategy to them to increase the probability of activating
for campaigns and advocacy groups to increase their support.
their efficiency by enhancing the accuracy of Predictive analytics can also be effectively used
audience targeting, thereby optimizing the allo- by organizations with fewer resources than a pres-
cation of limited financial and human resources. idential campaign. For example, the Sierra Club
Predictive analytics as a tool for driving civic or advocacy group has used predictive analytics to
political action rely on sourcing massive amounts target potential supporters of the organization’s
of data that citizens share about themselves environmental stances. As consumers share more
through such means as shopping activities, sub- information about themselves, and campaigns
scriptions, Internet traffic activities, campaign and advocacy groups build larger databases,
Predictive Analytics 1013

more detailed profiles can be produced, resulting advanced predictive models and more precisely
in better message targeting and enhanced predic- understand audiences and forecast outcomes.
tive ability.
Matthew J. Kushin
Criticism Shepherd University
Despite its utility, predictive analytics are not free Francis Dalisay
from criticism. Privacy advocates are concerned University of Hawai‘i–Manoa
with the amount of data that is gathered about Masahiro Yamamoto
the public, and how that data is used. While cam- University of Wisconsin–La Crosse
paigns have an increased ability to serve targeted
campaign messages based on information voters See Also: Campaign Strategy; Campaigns, Digital;
voluntarily share, data gathering that occurs with- Data Mining; Forecasting Elections; Microtargeting.
out their prior knowledge. This particularly con-
cerns online data mining. Many Web sites track Further Readings
users’ online behavior such as keywords they use Boulos, M. N. Kamel, et al. “Social Web Mining and
in search engines, Web sites they visit, and items Exploitation of Serious Applications.” Computer
they put in a shopping cart by planting a cookie Methods and Programs in Biomedicine, v.100
on visitors’ browsers. This information is used to (2010).
produce tailored campaign messages. Dhar, Vassant. “Prediction in Financial Markets: The
For example, a campaign in partnership with Case for Small Disjuncts.” ACM Transactions on
advertising networks, might serve an ad related Intelligent Systems and Technology, v.2 (2011).
to health care to users who frequent health Web Duhigg, Charles. “Campaigns Mine Personal Lives
sites. The main concern about this practice is that to Get out Vote.” New York Times (October 14,
users are often not informed that their behavior 2012) http://www.nytimes.com/2012/10/14/us/
is being tracked by sites, and thus are deprived of politics/campaigns-mine-personal-lives-to-get-out
the opportunity to give informed consent for the -vote.html?pagewanted=all (Accessed December
use of their information. As campaigns gain more 2012)
information about users, and users lose control Eckerson, Wayne W. “Extending the Value of Your
over access to their information, this data min- Data Warehousing Investment.” http://tdwi.org/
ing practice could be used to manipulate voters, articles/2007/05/10/predictive-analytics.aspx?sc_
for example, by inordinately exposing them to lang=en(Accessed December 2012).
a particular political viewpoint. To ensure user Mitchell, Robert L. “Election 2012: Obama for
privacy and protect users from potential mis- America’s ‘Moneyball’ Moment.” http://blogs
use of their information, it is essential to spell .computerworld.com/business-intelligence
out user-friendly privacy policies such as opt-in analytics/21282/election-2012-obamas-money
policies asking for user affirmation prior to data ball-moment (Accessed November 2012).
gathering. Nyce, Charles. “Predictive Analysis White Paper.”
http://www.aicpcu.org/doc/predictivemodeling
Conclusion whitepaper.pdf (Accessed December 2012).
Altogether, it can be expected that the role of pre- Silver, Nate. “Why I Started FiveThirty-Eight.” Daily
dictive analytics in the political arena will grow. Beast (October 11, 2012). http://www.thedaily
While businesses, health care, and other arenas beast.com/articles/2012/11/10/why-i-started
look to big data to understand and more effec- -fivethirtyeight.html (Accessed December 2012).
tively target audiences, so will campaigns and Sreenivasan, Hari. “Digital Campaigns May Decide
advocacy groups. Without changes to privacy Election.” PBS Newshour (October 2012). http://
laws and policies, access to large amounts of www.pbs.org/newshour/rundown/2012/10/digitial
detailed consumer data will likely continue in the -campaigns-may-decide-the-election.html (Accessed
future. With continued advances in computing December 2012).
power for data storage and statistical modeling, Terdiman, Daniel. “Obama’s Win a Big Vindication
organizations will be able to build increasingly for Nate Silver, King of the Quants.” CNet. http://
1014 Presidential Policy Directive 20

news.cnet.com/8301-13510_3-57546161-21/ Presidential Policy Directive 20 was issued as a


obamas-win-a-big-vindication-for-nate-silver-king response to the threat of cybersecurity. While the
-of-the-quants (Accessed December 2012). full text has not been released, a fact sheet has been
provided by the Obama administration. The fact
sheet notes that as the directive is implemented, it
will seek to follow the Constitution and existing
law. The fact sheet, which offers very little sub-
Presidential Policy stantive information, emphasizes the coordinat-
ing of activities across national and international
Directive 20 boundaries. In addition, it is suggested that policy
will be designed to respond to threats, rather than
Presidential Policy Directive 20 was issued by taking preemptive action. Differentiating between
President Barack Obama in October 2012 in an two distinct areas of cybersecurity, responding to
attempt to formulate a coherent strategy on cyber- threats on government networks as opposed to
security with a particular focus on formulating a exploring potential threats on private networks is
distinction between “offensive” and “defensive” the key distinction made in the directive.
policy responses. The full text of the directive is The Washington Post was one of the first major
classified. Media and public information sources news outlets to report on presidential Directive 20
have provided information on some general pro- in a November 14, 2012, story. The Washington
visions of the directive. Post and other media outlets such as The Hill news-
The directive represents a use of executive paper noted that the directive helped systematize
power in the field of national security and exhibits and codify cybersecurity policy while also expand-
the broadening of conceptions of national secu- ing the scope. The Post noted that differentiation
rity. Exploring the context and implementation between network defense and cyberoperations was
of Presidential Policy Directive 20 provides an established in the directive. Network defense pri-
opportunity to learn more about national security marily focuses on the government’s systems, while
policy and its potential impact on the media and cyberoperations involves monitoring potential
civil liberties. As cybersecurity becomes a larger threats. Cyberoperations specifically refers to what
part of American national security policy, exam- happens outside of the networks of the federal gov-
ining policy responses from a variety of angles ernment. The implementation of cyberoperations
becomes crucial. is an area of contention. The extent of cybersecu-
Cybersecurity is an emerging threat to govern- rity efforts on private networks raises questions
ments, private organizations, and individuals. regarding transparency and the impact of security
Particularly, the United States–China relationship initiatives on electronic media and dissent.
increasingly focuses on responding to cybersecu- Presidential Policy Directive 20 was also cre-
rity threats. In October 2012, then Secretary of ated in part because of the failure of legislation
Defense Leon Panetta noted that the Department authored by Senators Susan Collins and Joseph
of Defense is able to conduct both pre-emptive Lieberman to advance. Since Congress was unwill-
and retaliatory cyberattacks. Panetta noted that ing or unable to enact legislation, the Obama
cybersecurity was an area where the Department administration made use of executive power. Use
of Defense would respond. As of fall 2012, 13 of executive power in the area of national security
units were formed by the U.S. military to respond has been widespread, particularly since the events
to cyberattacks. In addition, President Obama has of September 11, 2001.
sought to build an alliance and coordinate cyber-
security with China, and has provided assistance Precursors
to other nations throughout the world. A little Presidential Policy Directive 20 represents an
understood, emerging policy area, much of the excellent opportunity to observe how the Obama
activity regarding cybersecurity has taken place administration in many ways continues direc-
through confidential directives that represent a tions begun during the administration of George
broad exercise of executive power. W. Bush. In January 2008, President Bush issued
Presidential Policy Directive 20 1015

Presidential Policy Directive 54. While, like Presi- he has invited a wide range of policymakers to
dential Policy Directive 20, the text has not been National Security Council meetings to discuss
released, but some information is available on emerging national security issues. Presidential
the contents of the document. Presidential Policy Policy Directive 20 is a continuation of what the
Directive 54 included 12 initiatives, and estab- Obama administration identified as a broad defi-
lished the Comprehensive National Cybersecurity nition of national security.
Initiative (CNCI). President Obama expanded on Presidential Policy Directive 20 uses executive
Presidential Policy Directive 54 in Presidential Pol- power to coordinate a policy response to cyberat-
icy Directive 20, making the distinction between tacks. It broadens the concept of national secu-
the two areas of cybersecurity clearer, and expand- rity to include new threats from both state and
ing the authority of the military to respond to nonstate actors. Criticism of the directive shows
cybersecurity threats. One potential method of the dangers in balancing national security and
responding to cybersecurity threats beyond gov- civil liberties. Social media and new forms of
ernment networks is Einstein 3. technology continue to be a forum for political
discourse, and policymaking is made without full
Einstein 3 transparency due to national security concerns.
One of the key facets focused on in the current The creation of tools such as Einstein 3 provide
CNCI is Einstein 3, a successor to earlier attempts the capability for monitoring networks that has
to monitor government networks. Einstein 3 the potential to raise questions. With controversy
moves beyond monitoring activity on American emerging from practices sanctioned under the
government networks to explore federal govern- USA PATRIOT Act, questions will continue to
ment activity on private Web sites. Media accounts arise on whether vigorous cybersecurity practices
suggested that AT&T was the likely test case. Ein- could have a chilling impact on dissent and debate
stein 3 is in many ways an example of seeking in the United States. In the years since Septem-
to preempt threats before they achieve their goals ber 11, 2001, the U.S. government has sought to
of conducting cyberattacks. Some scholars have respond to technologically sophisticated threats
criticized the Einstein 3 program for poor design while balancing national security with transpar-
that makes implementation difficult. ent governance and opportunities for freedom of
Einstein 3 represents one of the first major ini- expression. As a result, conflict and criticism have
tiatives taken beyond monitoring government net- arisen against both the Bush and Obama adminis-
works. How and if cybersecurity extends into pri- trations, and from political figures throughout the
vate networks is likely to provoke controversy in ideological spectrum.
coming years. As scrutiny over government obser-
vation of personal data has become more known Matthew Gritter
to the public, the difficulties of formulating policy Angelo State University
that intrudes on the privacy of private businesses
and citizens have become a large concern. One See Also: Domestic Surveillance and Social Media;
of the key challenges of cybersecurity is creating Freedom of the Press and National Security; Press
methods that identify threats while protecting pri- Freedom and Online/Social Media Security; Privacy;
vacy. Whether that goal can be achieved remains Terrorism; Transparency.
to be seen.
Further Readings
National Security and Cybersecurity Landau, Susan. Surveillance or Security? The
Presidential Policy Directive 20 represents a Risks Posed by New Wiretapping Technologies.
broadening of traditional conceptions of national Cambridge, MA: MIT Press, 2013.
security, beyond a traditional focus on military Nakishma, Ellen. “Obama Signs Secret Directive to
intervention, national security concerns, economic Help Thwart Cyberattacks.” Washington Post
and trade issues, environmental issues, energy (November 14, 2012). http://articles.washingtonpost
issues, and border security. Barack Obama’s .com/2012-11-14/world/35505871_1_networks
National Security Strategy is broad ranging, and -cyberattacks-defense (Accessed June 2013).
1016 Press Freedom and Online/Social Media Security

White House. “Comprehensive National that only 66 countries of 197 investigated can be
Cybersecurity Initiative.” http://www.whitehouse considered free countries.
.gov/cybersecurity/comprehensive-national-cyber
security-initiative (Accessed June 2013). Social Media
With the advent of digital media, the concept of
press freedom is extended to include the freedom
of expression in shared online content. Due to the
shrinking of the print media market and increas-
Press Freedom and ing public demand for online content, many
media organizations have introduced online ver-
Online/Social Media sions of their newspapers, and many journalists
Security have blogs and social media pages in which they
post their reflections, analyze events, and hold
Press freedom, but also freedom of press or free- discussions with their followers.
dom of media, is related to the concept of free- Digital and social media allow for fast and
dom of expression. It refers to journalists’ right to prompt communication to large and differenti-
communicate and express their opinions, without ated groups of audiences. They create high vis-
obstruction or coercive control. Press freedom is ibility for news content. However, they also yield
recognized as a fundamental human right, like the several risks. Online journalists may be accused
rights to freedom of opinion and expression by of defamation, subversive behaviors, and even
the United Nations (UN) Universal Declaration of terrorism, and legal action over posting certain
Human Rights that states that everyone has the content online can occur. Unverified reporting and
right “to hold opinions without interference, and leaking confidential information are issues that
impart information and ideas through any media have come to the forefront in the online environ-
regardless of frontiers.” ment. Since anyone can post anything in digital
Today, press freedom encompasses freedom not media, unless explicitly declared, individuals may
only of print media, but also of digital and other be persecuted for content posted on their online
public media. The concept has a long history, dat- pages, even if they were not the authors.
ing back to the 17th century, with the emergence of Online journalists are also less protected when
free markets and economic liberalization. A press posting content in social media. They are under
that is free from direct control was considered an more constraints because the content they post
important element for free trade. The evolution can reach audiences from countries with very dif-
and development of press freedom is, however, not ferent media regulations. In some countries, cer-
homogenous around the world. While the First tain content may infringe on national laws. This
Amendment of the U.S. Constitution and many means that journalists working online, such as
Western countries defends freedom of speech, the news bloggers, are more exposed to legal issues
modern free press only emerged in the 19th century than journalists working for traditional media
in Europe, North America, and those countries that operates in a specific country or region with
experiencing liberalism and democratic reforms. set rules.
Despite important developments in legislation, Current regulations in most countries are short
todays journalists around the world are still fac- on guidelines or legislation for handling content
ing discrimination, intimidation, and legal action, in digital media, and often refer to regulations
and sometimes must risk their lives to express created for traditional mass media that are not
their opinions on events. Reporters Without Bor- suitable for the online environment. Under inter-
ders, a nonprofit, nongovernmental organiza- national treaties, online journalists who have
tion that studies the freedom of journalists every posted sensitive content online can be extradited
year, has developed a World Press Freedom Index from their country to face trial and eventually
to compare the status of journalism around the be punished for serious publishing offences. One
globe. The organization’s findings depict a highly example is the case of Julian Assange, an Austra-
problematic situation for press freedom, showing lian online journalist and activist, considered the
Press Freedom and Online/Social Media Security 1017

founder of WikiLeaks, who published sensitive freedom, many different types of content can be
U.S. diplomatic and military documents in 2010. posted, shared, collected, and stored in the online
Assange was accused of violating international environment. Yet, the availability of unrestricted
standards of fairness ,and may face the court if he content can undermine personal rights and
returns to Australia. national security.
The case of WikiLeaks has also raised debate Digital technologies have increased the pos-
on the impact of disclosing and sharing infor- sibility to create, post, and share content in the
mation online and on freedom of expression in online environment; however, most Web 2.0
social media in general. The rise of citizen jour- environments, including social media, require
nalism and the development of newer and more the creation of an account or profile to do so.
integrated social media platforms may have two When creating an online account, an individual
main effects for society: they may advance trans- releases some personal information. For some
parency if online reporting is practiced ethically Web sites, the provision of a nickname and a
and in a moral manner, but they may also push valid e-mail account is sufficient but for others,
governments and authorities to make stricter more detailed information, such as gender, age,
regulations and thus increase different forms of profession, and even the country of residence
censorship in the name of security. In authori- is requested. One of the problems of disclosing
tarian countries, government controls on online personal information online is that this infor-
content may consist of information blackouts in mation may be shared to third parties who are
the state media, sophisticated Internet and text- collecting information for specific purposes, for
message filtering as in China, and even personal instance market research, but also in the name of
intimidation and coercion of journalists as in state security. This creates a problem for online
Nigeria. privacy, that is, the keeping of a person’s infor-
Yet, supporters of the positive effect of social mation secret from others. In practice, monitor-
media for press freedom argue that citizen jour- ing social media can turn the online environment
nalism and news discussions and sharing in into a practice of public surveillance, of state
social media have become important elements control as the novelist George Orwell discussed
for keeping political and economic powers under back in 1949 in his novel 1984. Indeed, special
scrutiny. One example is the case of the Arab investigative units of states are constantly moni-
Spring. In several countries in the north African toring social media to find information on pos-
region, freedom of expression, especially press sible criminals and terrorists, raising public con-
freedom, is limited. In these areas, social media cerns on the extent of the state’s intrusion into
has played a key role in challenging political personal matters.
authorities, to the extent that international news Online security problems can also occur when
coverage of the revolutions was mostly possible personal information is used by hackers for crimi-
thanks to bloggers, along with Twitter and Face- nal purposes. Hackers may obtain personal data
book activists. by, for example, deceiving people into providing
their user names, passwords, and account num-
Online Security bers via deceptive e-mails, fake (spoofed) Web
An important element linked to press freedom sites, or both—this is known as phishing. They
and social media is security. Specifically, online may also do so by inserting malicious software,
security concerns the safety of a computer and/ often referred to as “malware” or “spyware,”
or online environment, and deals with rules into a user’s system. Other times, private informa-
and measures to protect against threats such as tion is simply made available unconsciously to the
viruses, spam, and hackers, as well as to enforce public because of the configuration of the online
firewall and parental controls. The concept of social media provider. A case occurred in 2012
security has become increasingly important in when Facebook was accused of leaking access to
the development of Internet and digital technolo- information pertaining to profiles, photographs,
gies because of their increasing use and some- and chat material to advertisers through Face-
times misuse. Under the auspices of greater press book users’ accounts.
1018 Press Freedom and Online/Social Media Security

Third-party organizations also had the possibil- Conclusion


ity to post messages and extract personal informa- Overall, the debate on the role of the Internet
tion from Facebook accounts. In these situations, and social media for the free flow of informa-
online privacy is undermined and the risks of mis- tion and promotion of press freedom is still open
use of personal information have grown. There and it is hard to foresee a clear direction due to
are situations of limited or no press freedom, typi- diverse political and economic interests around
cally in authoritarian countries in which securing the world. Yet, clear guidelines are needed at
anonymity of the source of the content and online least to tackle ethical concerns about the privacy
privacy are necessary in order to maintain a cer- of information when collecting and managing
tain level of free discussion. When human rights, information on people in social media, including
especially freedom of expression, are limited, the the dissemination of such information to third-
identification of online journalists, bloggers, and party organizations.
activists achieved through bypassing online secu-
rity mechanisms can have serious consequences Chiara Valentini
for the lives of these people, and may seriously Aarhus University
impact freedom of expression in those countries.
See Also: Arab Spring; Blogger Rights and
Debate Responsibilities; Citizen Journalism; Domestic
Promoting freedom of opinion and expression Surveillance and Social Media; Facebook; Freedom of
on the Internet in the name of transparency and the Press and National Security; Hacktivism; Internet
accountability for powerful entities has raised Society, The; Privacy; Professional Bloggers; Reporters
other questions concerning national security and Without Borders; Transparency; WikiLeaks;
what impact a free flow of information can have in WikiLeaks/Arab Spring; World Press Freedom Index.
terms of prevention of crime, international terror-
ism, competition, and more. Skeptics of the free Further Readings
flow of information on the Internet call for more Ball, Kirstie, David Lyon, and Kevin Haggerty.
content regulation. Greater online security, both Routledge Handbook of Surveillance Studies.
for individuals and countries, is desirable under Abingdon, UK: Routledge, 2012
certain conditions, but it requires the develop- Chapman, Jane. Comparative Media History: An
ment of Internet-specific laws and harmonization Introduction: 1789 to the Present. Cambridge, UK:
of Internet governances, two areas of concern that Polity Press, 2005.
are particularly difficult to tackle due to difficul- Karhula, Päivikki. “What Is the Effect of WikiLeaks
ties in reaching shared international agreements. for Freedom of Information?” (January 19, 2011).
The lack of harmonization means that online http://www.ifla.org/publications/what-is-the-effect
content is regulated as well as sanctioned dif- -of-wikileaks-for-freedom-of-information
ferently in different regions of the world, with (Accessed May 2013).
greater consequences for personal security and Karlekar, Karin Deutsch and Jennifer Dunham. “Press
journalists’ freedom. It also triggers exceptions to Freedom in 2011: Breakthroughs and Pushbacks in
the right of access to information. In the name of the Middle East.” http://www.freedomhouse.org/
national security, states in nondemocratic regimes sites/default/files/FOTP%202012%20Booklet.pdf
seek to suppress the free flow of information, (Accessed May 2013).
for instance by Internet service provider control, Mooney, Carla. Online Security. San Diego, CA:
whereas states in democratic regimes encourage ReferencePoint Press, 2011.
self-regulation by private parties in order to regu- Okafor, Mark. “Press Freedom and the Challenge of
late potentially harmful content. These actions Online Media in Nigeria.” (May 5, 2013). http://
do not find justification for the sake of security saharareporters.com/article/press-freedom
because they simply restrict personal access to -and-challenge-online-media-nigeria-mark-oka
otherwise available information, and do not pre- for (Accessed May 2013)
vent the disclosure of information considered Pearson, Mark. Blogging & Tweeting Without
confidential because of national security. Getting Sued: A Global Guide to the Law for
Pretty Good Privacy 1019

Anyone Writing Online. Sydney, Australia: Allen a USENET newsgroup in June 1991, and invited
& Unwin, 2012. people to use it for free. Shortly thereafter, PGP
Reporters Without Borders. “Press Freedom was used by human rights activists in what, at
Index 2013.” http://en.rsf.org/press-freedom the time, was the intensely conflict-ridden region
-index-2013,1054.html (Accessed May 2013). of the Yugoslav successor states, most notably in
Shear, Kenneth. Unoriginal Misunderstanding: Press Kosovo, Sarajevo, and Croatia. It was also used
Freedom in Early America and Interpretation of in the early 1990s in volatile states including,
the First Amendment: A Monograph. Seattle, WA: but certainly not limited to, Guatemala. There,
Liberty Company, 2009. in 1992, Dr. Patrick Ball collaborated with the
International Center for Human Rights Research
in Guatemala (CIIDH) to develop a database of
more than 43,000 human rights violations that
he protected from the authorities through PGP
Pretty Good Privacy encryption.

Pretty Good Privacy, commonly known as PGP, The Impact of PGP


is a user-friendly computer application used to At the time of the release of PGP, Zimmerman argued
encrypt e-mail correspondence. PGP can also be the encryption software “dramatically changed the
used to include an encrypted digital signature to security landscape.” Zimmerman noted, “Before
an e-mail message without encrypting the mes- PGP, there was no way for two ordinary people to
sage. PGP is the most widely used encryption soft- communicate over long distances without the risk
ware for e-mail correspondence worldwide. of interception. Not by phone, not by FedEx, not
Pretty Good Privacy was the creation of Phillip by fax.” Users, ranging from human rights defend-
Zimmerman who, in 1984, first conceived of the ers to students, wrote to Zimmerman to report that
idea of a widely available, cost-free, open source the only thing standing between them and oppres-
computer program that ordinary people could use sive regimes was his technology.
to send and receive e-mail correspondence that Zimmermann was promptly “considered the
could not be read by others. According to Zim- godfather of encryption software,” according to
merman, his concept for PGP relied on a program- the New York Times. Such wide attention had
ming “breakthrough” that had occurred more a downside for Zimmerman; shortly after its
than a decade before, involving the most essen- release, PGP came to the attention of the U.S.
tial (and most vulnerable) element in any secret National Security Administration (NSA), the gov-
communication scheme: turning plain text into ernment body that oversees all issues pertaining
coded text, and vice versa. Thus, if a user wished to encryption. The NSA informed Zimmerman
to send someone else an encrypted message, he in February 1993 that he was being investigated
or she had to give the recipient the necessary key for violating U.S. export control laws. Because
to unlock the encryption code. The challenge was the U.S. government considered encryption soft-
to develop a protocol to send the encryption key ware weaponry at the time, PGP was restricted
so that it could not be intercepted and thus make for export under a munitions clause of import/
secret communications not so secret. export. Interestingly, while at the time, it was ille-
Zimmerman pondered the question of how to gal to transport PGP on a (then commonly used)
exchange encryption keys over a period of years, floppy disk or computer hard drive, it was pos-
developing PGP’s complex algorithms in the lim- sible to carry a printout of the million or so lines
ited free time he had available between parenting of Zimmerman’s computer code that instructed
and engaging in freelance work. It was not until a the functionality of PGP.
clause introduced by U.S. Congress in a proposed The NSA eventually dropped the charges in
antiterrorism bill that Zimmerman threw himself January 1996, after which Zimmerman founded
into the task of completing PGP and making it the commercial startup PGP Inc., which was pur-
available to anyone who wished to use it. Zimmer- chased by Network Associates in 1997. Zimmer-
man first uploaded the source code to PGP into man’s prediction in 2000, that “We’ll be accessing
1020 Price, Tom

the Internet all the time, which means a dramatic Price, Tom
increase in security requirements,” eventually led
him to a partnership with former U.S. Navy Seals Tom Price is a Georgia Republican whose reputa-
security expert Mike Janke and their start-up, tion for uncompromising conservatism, electoral
Silent Circle, a security firm that encrypts phone performance, and legislative leadership in both
calls, texts, and video calls. Silent Circle reported the Georgia State Senate and U.S. House have
a 400 percent increase in new customers after given him the prominence to be a contender for
the 2013 disclosures about the National Security the position of speaker of the House or the U.S.
Agency’s surveillance efforts. Senate. As a member of the U.S. House, he has
been adept at using social media to promote his
Lara Lengel public policy positions and political ambitions.
Bowling Green State University Encompassing many of the relatively affluent,
predominantly white, suburban municipalities
See Also: Activists and Activism; Anonymous; Arab in north metro Atlanta, including Alpharetta,
Spring; Carnivore; Committee to Protect Journalists’ Brookhaven, Doraville, Dunwoody, Johns
Deep Packet Inspection; Department of Homeland Creek, Roswell, Sandy Springs, and Tucker,
Security Media Monitoring Initiative; Digital Price’s 6th Congressional District was previously
Activism; Echelon; Federal Privacy Act; Firewalling; represented by current Republican U.S. Senator
Freedom of the Press and National Security; Johnny Isakson. Before that, the seat was held by
Search and Scrape Capability; Tor; Voter Privacy; former Republican Speaker of the House Newt
WikiLeaks. Gingrich. North metro Atlanta was the scene
of very rapid suburbanization in the 1990s and
Further Readings 2000s, with small mill towns and farm towns
Caldwell, Thomas. “PGP, the Universe, and transformed into outer suburbs inhabited by
Everything.” Computing Japan, v.4/1 (1997). commuters.
Dawson, Stephen. “Reviews.” Institute of Public That the long commutes to work and resi-
Affairs Review, v.5/3 (1998). dential racial isolation common in the outer
Dugan, Sean. “Phil Zimmermann: Security.” suburbs that comprise most of the 6th District
InfoWorld, v.22/41 (2000). could brew up a toxic mix of frustration, social
Fox, Robert. “Pretty Good Improvement.” alienation, and political extremism is plausible.
Communications of the ACM, v.38/10 (1995). Certainly a reputation for denouncing political
Harn, Lein, et al. “Fully Deniable Message opponents and for refusing to compromise on
Authentication Protocols Preserving the basis of principle would find such an angry
Confidentiality.” Computer Journal, v.54/10 audience receptive. Although the district is more
(2011). racially and ethnically diverse after Georgia’s
Hodson, Hal. “We Know Who You Are.” New congressional electoral map was redrawn to
Scientist, v.218/2921 (2013). make way for a new 14th U.S. House district,
Marks, Paul. “Keep the Hackers at Bay.” New it continues to be a safe seat for both the GOP
Scientist, v.216/2894 (2012). and the incumbent. The fact that Barack Obama
Singh, Simon. The Code Book: The Science of Secrecy received a mere 35 percent of the vote in the 6th
from Ancient Egypt to Quantum Cryptography. District in 2008 general election reveals its ideo-
London: Fourth Estate, 1999. logical complexion.
Thurlow, Crispin, Lara Lengel, and Alice Tomic. Price is a good fit for the demography of his
Computer Mediated Communication. 2nd ed. district. A white, northern transplant like many of
London: Sage, 2012. his constituents, he was born on October 8, 1954,
Wilson, David L. “‘Pretty Good Privacy’ Software Is a in Lansing, Michigan, and earned both his under-
Popular Tool for Encrypting Messages.” Chronicle graduate and medical degrees at the University of
of Higher Education, v.43/3 (1996). Michigan. Among the 50 wealthiest members of
Zimmermann, Phil. PGP: Source Code and Internals, Congress, Price was reportedly worth $8.5 mil-
Cambridge, MA: MIT Press, 1996. lion in 2009. He is married to Elizabeth “Betty”
Price, Tom 1021

Clark Price, an anesthesiologist who is active in larger than that of Chambliss, would make him a
local politics in Roswell where the couple reside. formidable opponent.
Betty Price received her undergraduate education Price’s legislative voting record appeals to
at Pomona College and her medical training at both economic libertarians and social conserva-
McGill University. tives. In 2011, the American Conservative Union
awarded him a lifetime score of 97.14, indicating
Political Career that he is one of the most conservative and per-
Ambition is evident in a political career launched haps the most conservative member of the U.S.
by winning a seat in the Georgia State Senate in House of Representatives. With respect to eco-
1998, where Price would serve first as minority nomic regulation, he has voted to reduce capi-
whip, and then as majority leader, until his suc- tal gains taxes, implement the Central American
cessful 2004 run for a seat in the U.S. House. The Free Trade Agreement, schedule the permitting of
6th District was an open seat that year because of new refineries, and open the Outer Continental
Johnny Isakson’s decision to run for a seat in the Shelf to oil and gas drilling.
U.S. Senate. Price won unopposed. In 2006, he Enthusiasm for the corporations engaged in
defeated his Democratic challenger, Steve Sinton, offshore drilling earned Price a measure of con-
by a margin of 44.8 percent. In 2008, he defeated troversy in June 2010. During testimony by BP
his Democratic challenger, Bill Jones, by a mar- CEO Tony Hayward, Republican Representative
gin of 37 percent. Running unopposed again in Joe Barton of Texas echoed comments previously
2010 and in 2012, he defeated his Democratic made by Price as chair of the House Republican
challenger, Jeff Kazanow, by a margin of 29.02
percent. If the margins of victory have decreased
over time, they do not suggest vulnerability.
As he had in the Georgia State Senate, Price
climbed into the GOP leadership in the U.S.
House, becoming chair of the Republican Study
Committee, or the fourth-highest-ranking party
leader. However, in tracking toward the center
after the electoral defeats of 2012, Speaker John
Boehner informally but effectively backed the
more moderate Representative Cathy McMorris
Rodgers from Washington for that position and
Price lost theleadership position. Together with
the selection of a cohort of new, more moderate
committee chairs, Boehner’s support for McMor-
ris was perceived by many conservatives as a
purge by Boehner to move the legislative party,
and with it the national party, closer to the ideo-
logical center.
High visibility led to Price being mentioned as a
possible contender for speaker of the House , and
more probably, a possible challenger to Republi-
can Senator Saxby Chambliss in 2014. Populist
conservatives like those who were active in the
Tea Party Movement were unhappy with Cham-
bliss for expressing willingness to compromise on
restoring tax rates in budget negotiations after Tom Price, a member of the U.S. House of Representatives from
the 2012 general election. Refusal to compromise Georgia’s 6th district, speaking at the Freedomworks New Fair
on taxes made Price popular among that same Deal Rally outside the U.S. Capitol, Washington, D.C., on April 15,
group. That, together with a campaign war chest 2013. Price is known as an uncompromising conservative.
1022 Price, Tom

Study Committee that, by agreeing to create a He ended the piece with a denunciation of the
$20 billion escrow account to pay for damage president for attending a fundraiser in Las Vegas
caused by the 2010 oil spill in the Gulf of Mexico, on the evening following the attack on the U.S.
BP had been subjected to a “shakedown” by the consulate in Benghazi.
Obama White House. The term connotes orga-
nized crime. Unlike Barton, Price did not apolo- Social Media Use
gize for using the inflammatory term. Social media represents something different in the
Price has voted against modification of bank- relationship between elected officials and their
ruptcy rules to avoid foreclosures, regulating the constituents because it permits interaction that is
subprime mortgage industry, economic recovery/ relatively inexpensive in both time and social risk
stimulus spending, increasing the debt limit, per- for the constituent. While the delivery of speeches
mitting corporate shareholders to vote on executive before groups and/or the issuing of op-ed columns
compensation, granting tax incentives for renew- and press releases also permit responses from con-
able energy, and regulating tobacco as a drug. stituents, these require more from the constituent
With respect to social policy, he has voted to because they must rise to ask questions during a
award equal protection under the Fourteenth town hall meeting or write a letter to the editor
Amendment to human fetuses, ban federal gov- after reading an op-ed column.
ernment health coverage for abortions, restrict The greater ease of responding to social media
interstate transport of minors for abortions, ban such as YouTube videos and tweets invites
human embryonic stem cell research, prohibit fed- increased interaction. Online conversation may
eral funding for Planned Parenthood, and restrict reinforce the abstract connection that develops
the definition of marriage as the union of one when constituents recognize the elected official
man and one woman in the U.S. Constitution. He and approve of his or her public policy position
voted against prohibiting employment discrimi- and legislative voting when it is the subject of
nation based on sexual orientation and recogniz- news coverage. However, it may also establish
ing hate crimes targeting sexual minorities. virtual personal relationships that are as much
The Roswell Republican also predictably voted akin to that formed via case work as it is through
on a range of other issues that are important to recognition and approval of position taking and
conservative constituencies: against gun control, legislative voting. From the perspective of the
in favor of roving wiretaps in terrorism cases; elected official, a virtual personal relationship
against congressional oversight of CIA interro- may be less costly than undertaking the problem
gations, in favor of ending gederal funding for solving required of legislative casework.
National Public Radio, for marijuana prohibi- Although it obviates the possibility of develop-
tion, and for making English the official language ing a virtual personal relationship, the possibility
of the United States. Finally, his votes have been that constituents or anyone else online may anon-
consistently conservative on two issues about ymously respond to social media content dramati-
which he appears especially passionate: health cally reduces the attendant social risk. As a conse-
care policy, and U.S. foreign policy toward Israel quence, conversation is all too frequently uncivil.
and Palestine. That is evident in the commonplace discourtesy
These same issues feature prominently in mes- and practiced unpleasantness by participants on
sages conveyed in a manner originating in the era some message boards and chat rooms. Dogma-
of print media, such as newspaper op-ed columns tism, hyperbole, and vituperation are predictable
and press releases. However, they may gain wider features of unmonitored discussions of political
circulation because they are reproduced online on topics. The reason for this is that some individu-
Web sites controlled by the House GOP. Thus, als succumb to the temptations of anonymity by
a September 19, 2012, op-ed column posted presenting an alternative identity that psychiatrist
on the Republican Study Committee Web site, Elias Aboujaoude has termed the “disinhibited
“Rep. Price Op-ed: Where Leading From Behind e-personality.” Grandiosity, narcissism, impulsiv-
Leads,” expressed strong disapproval of President ity, immaturity, and the illusion of knowledge are
Obama’s response to events in the Middle East. its symptoms.
Price, Tom 1023

Lack of inhibition characterizes comments newspaper op-ed columns. On November 29, he


posted in response to a July 16, 2009, YouTube also posted these messages:
video of a committee hearing in which Price states
twice that the health care legislation proposed by As I explained today on @TeamCavuto, I do
Obama administration will “destroy health care not favor raising the tax rates. Watch to find
in America.” In addition to obscene language, out why—http://bit.ly?YvaEzt #fiscalcliff #tcot
one of the comments endorsed criminal punish-
ment for political opponents: Check out my op-ed: Falling for Hamas’s
media manipulation http://www.washington
Obama/Emanuel/Pelosi/Reid—just for their post.com/opinions/falling-for-hamass-media
criminal medical service takeover—should be -manipulation/2012/11/28/4d7b9498-39a1
in prison at least. -11e2-8a97-363b0f9a0ab3story.html…#gaza
#palestinians
Elected officials willing to mobilize support-
ers with strong ideological views walk a fine line To generate and manage social media, Price
between rallying them at public gatherings and hired a director of new media for both his personal
on election day on the one hand, and being asso- and leadership offices, in addition to his regular
ciated with their most extreme sentiments and press aide. He has also created multiple Web sites
actions on the other. To date, he has walked that to post press releases and op-ed columns. Much
line flawlessly. of the content is innocuous. Examples include
Price is a vigorous tweeter. Jennifer Golbeck, press releases informing readers that the Con-
Justin Grimes, and Anthony Rogers identified 12 gressman had been named a “Defender of Lib-
categories of tweets by congressmen in their con- erty” by the American Conservative Union and a
tent analysis of congressional posts, including two “Defender of Economic Liberty” by the Club for
that characterize much of Price’s tweeting: opin- Growth. However, there are also messages like
ion and announcement/advertisement. Moreover, the denunciation of a reported “stealth survey” of
many of his opinions are about a small set of issues: physician’s offices by the Obama administration
health care, government spending, and support for that ends with the apocalyptic warning that “Big
Israel. Thus, in the weeks after the November 6, Brother is destroying health care in America.”
2012, election, he offered multiple opinions criti-
cal of the health care and budget policies of the John Hickman
Obama administration and supportive of Israel. Berry College
On December 4, he posted this message:
See Also: Boehner, John; Campaigns, Congressional
We do not need a government #healthcare (2006); Campaigns, Congressional (2008);
takeover & President Obama’s higher taxes. Campaigns, Congressional (2010); Cantor, Eric;
We need patient-centered reforms. Pelosi, Nancy.

On November 29, in an apparent response to Further Readings


the majority decision of the United Nations (UN) Aboujaoude, Elias. Virtually You: The Dangerous
general assembly to grant the Palestinian Author- Powers of the E-Personality. New York: W. W.
ity the status of a nonvoting state, he posted this Norton, 2011.
message: Gibson, Ginger and David Catanese. “Right Targets
Saxby Chambliss, Lindsey Graham.” Politico
Path to Palestinian statehood is between Ramal- (December 2, 2012).
lah and Jerusalem—UN [United Nations] scor- Giroux, Gregory L. “A Line in the Suburban Sand.”
ing political points only makes things worse. Congressional Quarterly Weekly Report, v.63
(2005).
He also frequently announces or advertises Golbeck, Jennifer, Justin Grimes, and Anthony
his appearances on television talk shows and Rogers. “Twitter Use by the U.S. Congress.”
1024 Primacy Effect

Journal of the American Society for Information how the spread of ideas is formed by a blend of
Science and Technology, v.61/8 (2010). the thing itself, and the process. In some ways, it
Gutman, Amy and Dennis Thompson. “The Mindsets is similar to what happens when a good product
of Political Compromise.” Perspectives on Politics, is joined with a brilliant advertising campaign:
v.8/4 (2010). this is the essence of marketing. Jonah Berger
Jaret, Charles, Elizabeth P. Ruddiman, and Kurt has described six principles that contribute to the
Phillipis. “The Legacy of Racial Segregation.” “contagiousness” of something. The first is social
In Sprawl City: Race, Politics, and Planning in currency, or how the message is crafted to achieve
Atlanta, Robert D. Bullard, et al., eds. Washington, the desired result. In social media, it is important
DC: Island Press, 2000. to know something that will make others—espe-
Seward, Christopher. “John Linder, Tom Price, cially those who count—think that one is smart
Johnny Isakson Among the Richest in Congress.” and on the cutting edge. Individuals may become
Atlanta Journal Constitution (September 1, 2010). known as the person to go to for the latest infor-
mation on a particular set of knowledge, giving
them insider status.
Second, ideas spread when they are triggers,
something that comes to mind when a related
Primacy Effect idea surfaces. This is a common phenomenon
when people surf the Web and go from topic to
An important aspect of social media is their imme- topic as their minds form associations. Third,
diacy. Social media have been built on speed and when strong emotion accompanies something, it
instant communication. This is a shift in some is more likely to spread; this explains the pleth-
ways from the previous view, like the moral in the ora of videos of adorable cats and toddlers that
fable of the tortoise and the hare, that slow and find their way to everyone’s e-mail or Facebook.
steady wins the race. The concept of primacy has Fourth, making something visible or public con-
invaded the world, and education is being forced tributes to spread. Author M. Lindstrom discusses
to rethink content and pedagogy. The concept of the concept of mirror neurons in the brain that
primacy has a history in psychology, neurosci- seem to be responsible for the human tendency to
ence, and education. In the early 1900s, psychol- imitate. Something that is public is seen, and more
ogist Hermann Ebbinghaus studied the effect of likely to be copied. Fifth, individuals are eager to
serial position on recall, and demonstrated that pass on things that are useful and have practical
individuals are more likely to retain information value. If something may help another person, it
presented at the beginning and end of a group or will generally spread. Finally, presenting informa-
session. Later, Frederick Lund applied the concept tion via stories rather than explanations will lead
to persuasion; others studied the impact of posi- to dispersal. Messages embedded in a narrative
tion on significance, or cognitive bias. will not only spread, but be remembered. Within
Rather than previous methods of communica- these stories, certain themes will resonate more
tion, such as newspapers or television reporting, than others. These themes often combine a num-
social media sites such as Twitter and Instagram ber of the six factors, such as emotion, triggers,
have become popular based on the perceived and practical value.
value ascribed to instantaneous communication Some researchers have begun to examine the
across boundaries. Two main aspects of social nature of identity and community in light of
media that are examined in conjunction with pri- spreadable media. Word-of-mouth is still just
macy are the degree to which the idea or informa- that; despite the proliferation of gadgets and
tion spreads widely, and how it is memorable. applications, most human interaction is face-to-
face, verbal, and personal. One study found that
Spread of Information of Facebook friends, only 7 percent were people
Malcolm Gladwell, Henry Jenkins, and others that users have never met in person, and only 3
have investigated why some units of information percent are people they only met one time. The
spread, and others do not. They have discussed remaining connections may not be active, such
Privacy 1025

as friends-of-friends and social ties that may be Dooley, R. Brainfluence: 100 Ways to Persuade and
seen as potential sources of trusted information, Convince Consumers With Neuromarketing.
thus contributing to spreadability. Author Doug- Hoboken, NJ: Wiley, 2011.
las Rushkoff describes content as something to be Gladwell, M. Blink: The Power of Thinking Without
stored for the next conversational opportunity; Thinking. New York: Back Bay Books, 2007.
still spread, but in human terms as well as through Godin, S. Free Prize Inside. New York: Portfolio,
social media. Primacy without these other factors 2004.
does not appear to be enough to result in disper- Goldman, A. Everything I Know About Marketing I
sal, but it is a potent force when combined with Learned From Google. New York: McGraw-Hill,
other attributes. 2011.
Hampton, K. N., L. S. Goulet, L. Rainie, and K.
Retention Purcell. “Social Networking Sites and Our Lives.”
Within the incredible amounts of content contin- Washington, DC: Pew Research Center, 2011.
ually changing on the Internet, some is retained, Heath, C. and D. Heath. Made to Stick: Why Some
while most is forgotten. Not all information that Ideas Survive and Others Die. New York: Random
is spreadable due to primacy will “stick”; sticki- House, 2007.
ness is defined as ideas that are understood and Holbert, R. L., J. L. Lambe, A. D. Dudo, and K.
remembered, and often have a lasting impact or A. Carlton. “Primacy Effects of The Daily Show
cause someone to change his or her opinion or and National TV News Viewing: Young Viewers,
behavior. Primacy may be enough to gain atten- Political Gratifications, and Internal Political Self-
tion, but something else is needed to command Efficacy.” Journal of Broadcasting & Electronic
retention. Educators often need to balance these Media, v.51/1 (2007).
two factors and utilize both for the most critical Jenkins, H., S. Ford, and J. Green. Spreadable Media:
knowledge and skills. Creating Value and Meaning in a Networked
Primacy alone is not enough to ensure that a Culture. New York: New York University Press,
message will be noticed or retained. However, 2013.
social media have increased the seeming impor- Lindstrom, M. Buyology: Truth and Lies About Why
tance of staying informed up to the second as to We Buy. New York: Doubleday, 2000.
the latest nugget of information that no one else Rushkoff, D. “The Internet Is Not Killing off
knows. Social status is often achieved by being Conversation But Actively Encouraging It.” In
the one to pass along something new. Rushkoff We’ve Got Blog: How Weblogs Are Changing Our
has coined the term presentism to describe the Culture, J. Rodzvilla, ed. Cambridge, MA: Perseus
diminishment of everything that is not happen- Books, 2000.
ing right now. From status updates to location Rushkoff, D. Present Shock: When Everything
check-ins on Foursquare to tweets and trending Happens Now. New York: Current Hardcover,
topics, there is a lure to the instantaneous. In edu- 2013.
cation, questions remain regarding the balance of
freshness with value. It is not always clear what
may get lost in the excitement, or how others may
manipulate based on “buzz.”
Privacy
Cathy Leogrande
Le Moyne College The increased transparency, expression, and con-
tent sharing created by the proliferation of social
See Also: Buzz Creation; Cognitive Surplus; Going media has been paralleled by significant global
Viral; Sleeper Effect; Trending Topic; Viral Marketing. concern about a corresponding reduction in indi-
vidual privacy. Although online privacy issues
Further Readings have existed since the onset of the Internet, they
Berger, J. Contagious: Why Things Catch On. New rose to the forefront of public consciousness in
York: Simon & Schuster, 2013. early 2012 due to well-publicized media coverage
1026 Privacy

of privacy stories, including Facebook privacy extent to which their personal information is dis-
changes, the Obama administration’s call for a closed on the Internet. Privacy scholars like Pro-
Consumer Privacy Bill of Rights, and increased fessor Daniel Solove believe that today’s defini-
Federal Trade Commission scrutiny and fines for tion of privacy, to which the notion of personal
privacy failures. The Internet vastly increased the control is integral, has evolved from a narrower
amount of personal information accessible and right to be let alone, and is culturally dependent.
visible to the public, as well as the aggregation Solove posits that privacy’s importance to society
and tracking of that data by governments, private stems not from a desire to hide negative behavior,
companies, and political campaigns. The lack of but rather because it fosters positive democratic
privacy in social media and the Internet is both traits like free speech and expression. The surveil-
a platform upon which politicians have cam- lance that causes a lack of privacy is often accom-
paigned, and a source of public embarrassment panied by censorship because individuals inhibit
when online incidents expose their personal lives. themselves when others are monitoring them.
The modern conception of privacy refers to The rise of social media was largely responsible
individuals’ ability to control the context and for this definitional shift in privacy, as many indi-
viduals could share detailed personal information
with greater ease in larger volumes. However,
also saw drawbacks from failing to adjust their
privacy settings, frequent privacy policy changes,
increasingly common undisclosed tracking and
the aggregation of data and metadata by commer-
cial interests, and external use of their posted con-
tent in unexpected situations, including in hiring
decisions and legal proceedings. Increasingly, pri-
vate social media companies aid law enforcement
investigations both proactively, such as Face-
book scanning all uploaded photos to identify
known images of child pornography and refer-
ring suspects to law enforcement, and reactively,
by responding to subpoenas and administrative
requests for the personal information of their
members. The National Security Agency’s large-
scale surveillance of U.S. residents also includes
social media sources.
Although social networks do not usually have
authority to refuse such data requests, they can
challenge the request’s validity and notify the
individual it concerns. The 2012 case of Harris v.
Twitter was a notable example: after New York
law enforcement officials sought three months’
worth of tweets and other Twitter information
about Malcolm Harris, a Twitter user who was
involved in the Occupy Wall Street protests, Twit-
ter fought the subpoena’s grounds and argued
on behalf of its users before having to turn over
Julian Assange, standing center, speaking at the Occupy Harris’s data.
London protest on October 16, 2011. Assange founded
WikiLeaks, a nonprofit organization that published millions WikiLeaks
of classified government and corporate documents under the Few privacy topics have been as contentious
constitutional protection of freedom of the press. as WikiLeaks. Founded in 2006, the nonprofit
Privacy 1027

organization WikiLeaks crowdsourced whistle- membership limited to select universities and


blowing and went on to publish millions of clas- expanding throughout the United States, Face-
sified government and corporate documents. book inspired millions of users to disclose their
Julian Assange, WikiLeaks’s founder, was both personal information under the protection of pri-
lauded and deplored for releasing previously pri- vacy by default and user-controlled privacy set-
vate records on such subjects as the Guantanamo tings. Since then, Facebook has gradually eroded
Bay prison camp, the tenets of Scientology, and its members’ ability to keep their information pri-
the Iraq War. Controversy peaked in 2010 when vate, moving to a philosophy that people prefer to
WikiLeaks released material provided by U.S. share than to limit their disclosures.
Army Private Bradley Manning, including a video Facebook continues this trend of making more
that showed U.S. helicopters firing on unarmed personal information public on the site after its
journalists. March 2012 IPO, despite negative reactions,
including a Federal Trade Commission settle-
Pseudonyms ment over deceptive privacy practices resulting
Social media privacy also encompasses choices in a 20-year series of privacy audits, a multimil-
about personal identification, particularly pseud- lion-dollar lawsuit settlement for using mem-
onymity as it relates to political speech online. bers’ images in Sponsored Stories advertising,
The U.S. Supreme Court highlighted the value and protestation from members. The Europe v.
of anonymous and pseudonymous speech in Facebook movement started by Austrian student
McIntyre v. Ohio Elections Commission (1995), Max Schrems encouraged Facebook members in
noting that “protections for anonymous speech the European Union (EU) to request their stored
are vital to democratic discourse.” Individuals information from the social network, overwhelm-
have embraced pseudonyms since the early days ing Facebook’s staff and resulting in hundreds of
of the Internet, using them to sign petitions on pages of Facebook records on each individual.
crowd movement Web sites like Change.org, In July 2012, Senator Al Franken questioned
whistleblow about employers, review services, Facebook representatives and other experts in
and freely express themselves. Many equate Inter- a Senate hearing on Facebook’s use and storage
net pseudonymity with the online disinhibition of biometric data through its facial recognition
effect and “trolling,” where individuals behave system, suggesting that widespread use of such
aggressively and offensively behind a pseudony- technology could have chilling effects on political
mous mask when they would not behave simi- speech, among other concerns. After an investi-
larly in unmasked interactions. The Nymwar- gation by Ireland’s Data Protection Commis-
smovement began in 2011 when Google launched sioner, Facebook disabled facial recognition for
Google+ with a real-name policy requiring mem- EU users.
bers to have real or real-looking names to use the
service, stating that the policy encouraged more Negative Effects
genuine interactions. After widespread protest Both private individuals and politicians have
spearheaded by the Electronic Frontier Founda- dealt with the negative effects of unintentional
tion, Google+ moved to support pseudonymous or unwanted disclosure of their social media
identities. Facebook maintains a real name policy, content. One notable example is high school
but Twitter does not. teacher Ashley Paine’s firing after a Facebook
photo surfaced of her holding a beer while on
Facebook vacation. Data aggregation companies like
No social network has been as influential and Social Intelligence record social media posts for
controversial on privacy issues as Facebook. Face- up to several years, even if the individual deleted
book emerged and supplanted Myspace as the them, and sells the content to hiring managers
largest social network in 2008, a shift that many who make employment decisions based on it,
researchers attribute in part to Facebook’s more despite individuals believing it to be private or
robust privacy controls compared to Myspace’s deleted. Republican vice presidential candidate
“public by default” settings. Starting out with Sarah Palin’s Yahoo! e-mail was hacked after
1028 Privacy

a member of the hacktivist group Anonymous they may enact regulation to make Do Not Track
guessed the answers to her security questions enforceable to limit personal data collection if the
based on publicly available online information advertising industry’s self-regulatory efforts fall
about her, and Democratic Senator Anthony short of protecting user privacy.
Weiner resigned after the sexually explicit pho-
tos he tweeted to a young woman became public. Political Campaigns
Because the Internet makes public gaffes much The use of both social media and personal data
more visible and accessible than ever before, the has become integral to modern political cam-
EU is considering creating a “right to be forgot- paigns, allowing candidates to engage with and
ten” through regulation that would force social target eligible voters with previously unforeseen
networks to remove users’ submitted content if precision. Big data was a focus of both parties in
they later request to do so. the 2012 presidential elections, with the Obama
and Romney campaigns collecting voter infor-
Advertising mation through their official social media pages,
The “pay with your personal information” busi- Web sites, and apps. The campaigns combined
ness model of many social networks and other free online data with offline records from data bro-
Internet services that derive a majority of revenue kers, including voting history and past political
from advertising has led to a rift between privacy contributions, to build profiles on eligible voters
advocates and advertisers. Online data collection for advertising purposes. The campaigns then tar-
and tracking of site visitors are significant fac- geted eligible voters with advertising and sought
tors powering monetization. Advertisers argue to enlist those with higher influence in their social
that the tracking data they collect is aggregated circles to endorse a candidate, aiming to change
and not personally identifiable. Privacy advocates the minds of undecided voters.
such as University of Stanford researcher Arvind
Narayanan counter that tracking data is often Legislation
identified or easily linked to individuals, thus pos- Preceding the election, in February 2012, Presi-
ing privacy concerns. The debate often centers on dent Obama called for a Consumer Privacy Bill
tracking’s possible value to Internet users, with of Rights that, if codified, would grant Ameri-
advertisers saying that users prefer personalized cans greater control over and access to their
advertising, and privacy advocates arguing that personal data online. Personal privacy remains
most consumers are unaware of the tradeoff they a bipartisan issue in the United States, although
make with their personal data by using ad-funded the impact of privacy technology on industry has
free services. led Republicans to largely disfavor government
Research suggests that consumers are largely enforcement of privacy rights, while Democrats
ignorant of the existence of online tracking, tend to favor it.
which is typically invisible to the user, but that In 2012, social media rose to protest pro-
consumers who learn about the practice dislike posed laws with privacy-infringing implications.
having their online behavior tracked and ana- In January 2012, Internet users across the globe
lyzed. The chief Internet standards organization, united through social media and Web site con-
the W3C, began standardizing a Do Not Track tent blackouts to protest and ultimately defeat the
browser header in 2009 that many of the major Stop Online Piracy Act (SOPA), with Web sites
Web browsers have included in their settings. like Wikipedia and Reddit leading the movement.
Microsoft created controversy in 2012 when SOPA followed a similar bill, the PROTECT IP
it enabled the Do Not Track request by default Act (PIPA). The EU Parliament rejected a multi-
in Internet Explorer; major advertising groups national treaty to combat intellectual property
stated that they would ignore these requests. The piracy, the Anti-Counterfeiting Trade Agree-
Do Not Track header does not specify how a ment (ACTA), in July 2012. These bills were
receiving Web site or advertiser should react to it, criticized for allowing overbroad surveillance to
and current cooperation is voluntary and virtu- justify a reduction in online piracy and copyright
ally nonexistent. U.S. lawmakers have stated that infringement, which critics argued would violate
Pro-Choice and Pro-Life 1029

Internet users’ privacy and promote censorship. any circumstance; or pro-choice, supporting a
The future of online privacy is uncertain while woman’s right to choose.
tracking-heavy legislation like the Cyber Intelli- A variety of advocacy groups promote the
gence Sharing and Protection Act (CISPA) lingers agendas of these polarized groups. While the
in the U.S. legislature. terms pro-life and pro-choice seem to represent a
clear dichotomy, many individuals fall on a con-
Sarah A. Downey tinuum. While they might not choose an abortion
Abine, Inc. for themselves, they do not think that they should
make decisions for others. Some are willing to
See Also: Anonymous; Data Mining; Electronic make exceptions in the case of rape, health risks
Frontier Foundation; Electronic Privacy Information to the mother, or severe genetic abnormalities.
Center; Facebook; Franken, Al; Google+; Google
AdSense; Information Aggregation; Myspace; Before Roe v. Wade
Presidential Policy Directive 20; Transparency; Twitter. Abortions have been performed, in every society,
for thousands of years. Some historians suggest
Further Readings that abortions were legal in the United States
Andrews, Lori. I Know Who You Are and I Saw from the time of its first settlers. Abortions were
What You Did: Social Networks and the Death of available, openly advertised, and performed at
Privacy. New York: Free Press, 2011. the time that the U.S. Constitution was adopted.
Brenner, Joanna, Kristen Purcell, and Lee Rainie. State laws making abortions illegal passed in the
Search Engine Use 2012. Pew Internet and mid-to-late 1800s. Specific state laws were imple-
American Life Project (2012). http://www.pew mented for a variety of reasons. Doctors were the
internet.org/Reports/2012/Search-Engine strongest force behind the criminalization of abor-
-Use-2012.aspx (Accessed November 2012). tion. No longer would “alternative” practitioners
McIntyre v. Ohio Elections Commission, 514 U.S. like midwives, homeopaths, or apothecaries com-
334 (1995). pete with them for patients and fees.
Solove, Daniel. “‘I’ve Got Nothing to Hide’ and Abortions were extremely risky and were often
Other Misunderstandings of Privacy.” San Diego carried out by well-respected doctors armed only
Law Review, v.4 (2007). with outdated medical educations and absent
hospitals (which were uncommon) and antisep-
tics (as of yet unknown). While medical prac-
tices improved due to scientific discoveries and
improved methodologies, most women in need
Pro-Choice and of abortions had to resort to “back alley” illegal
practitioners who could not utilize the safer pro-
Pro-Life cedures that were available.
In order to ensure that others would not per-
Even before the existence of social media, the form abortions, the American Medical Association
proponents of the pro-choice and pro-life per- (AMA), newly established, declared that abortions
spectives on abortion have used print and televi- were dangerous and immoral. All but one state
sion/film media to present their respective views. had criminalized abortion by 1910, except when
The opposed positions stem from the landmark a doctor determined that a woman’s life was at
U.S. Supreme Court case of Roe v. Wade, which risk. Abortion became the doctor’s domain. The
removed abortion laws in all 50 states. This made Comstock (anti-obscenity) laws prohibited both
abortion legal through all nine months of preg- legal abortion, as well as the distribution of infor-
nancy. Forty years later, state legislators have mation regarding birth control from the 1880s
worked to provide women and girls with legal through 1973. The criminalization of abortions
protections. Aligned with legislation are the opin- did not reduce the numbers, which were estimated
ions of voters who tend to self-define as being to be as high as 1.2 million per year and included
pro-life, which prohibits abortions under almost medical harm to thousands of women and many
1030 Pro-Choice and Pro-Life

deaths. Some doctors performed safe illegal abor- of the sociopolitical movement identified as the
tions for the first half of the 20th century, until “War on Women.”
scrutiny forced many to stop. North Dakota is facing legal challenges follow-
ing the passage of three abortion laws. These are
Roe v. Wade the strictest in the United States and are expected
One-third of the U.S. states repealed abortion to take effect on August 1, 2013. Arkansas has the
laws or reduced criminalization between 1967 most restrictive abortion ban, the Human Heart-
and 1973. Yet, it was not until the 1973 Supreme beat Protection Act, which sets a 12-week preg-
Court decision in Roe v. Wade that remaining nancy limit and detection of a fetal heartbeat, typi-
restrictive state laws were struck down. This deci- cally by an abdominal ultrasound. This legislation
sion allowed women to have legal and safe abor- will also face court challenges. Intrusive trans-vag-
tions performed by experienced medical profes- inal ultrasounds are required in Virginia following
sionals. The Supreme Court’s decision supported its recent abortion legislation. Mississippi requires
the right to privacy of Americans regarding their doctors to have local hospital visiting privileges,
bodies, including a woman’s right to make per- which will result in the closing of the only remain-
sonal choices regarding her pregnancy. ing abortion clinic and restrict traveling doctors
Reactions to the legalization of abortion (who do not have hospital privileges).
resulted in a variety of responses. Supporters were Ten states have reduced abortion time limits
confident that their battle had been won. Others to 20 weeks, based on the premise that a fetus
found fault with the Court’s decision. Opponents can feel pain, which is disputed by most medi-
of legal abortions used a variety of approaches cal experts. Arizona and Georgia are facing legal
to undermine or limit the impact of the change challenges and a federal judge found the Idaho
in legal status. Some fought to prevent state and fetal pain law unconstitutional. The Pain-Capa-
federal funding of abortions, whereas others dis- ble Unborn Child Protection Act was debated
rupted clinics performing abortions, vandalized in Congress and was passed by the Republi-
their properties, prevented access, and harassed can House but not by the Democratic Senate;
anyone entering such establishments. Anti-abor- President Obama stated that he would veto the
tion violence escalated over time. Clinics were legislation if it was ever passed. Originally, the
bombed, individuals were physically attacked and legislation banned all abortions after 20 weeks;
some were murdered; these efforts created a hos- Democratic objections led to a revision permit-
tile environment for women in need of services. ting abortions in cases of rape and incest. How-
Over time, the Supreme Court has allowed some ever, this was still not found acceptable by, Dem-
abortion restrictions. In 1992, in Planned Parent- ocrats who felt that this would require all rapes
hood v. Casey, states were allowed to restrict pre- to be legally reported in order to qualify.
viability first trimester abortions, as long as women While some states are restricting and challeng-
seeking services were not faced with an undue bur- ing a women’s choice, others, such as New York,
den. There are restrictions in many states, ranging are reviewing legislation that would protect that
from requiring parental participation, mandatory right. Governor Andrew Cuomo introduced the
waiting periods, and anti-abortion counseling. Women’s Equality Act in 2013, which would
One disallowed requirement was that a woman write the provisions of Roe v. Wade into state leg-
involve her spouse in her decision. islation to protect women’s rights should Roe v.
Wade ever be overturned. It was under debate in
Current U.S. Abortion Rights Challenges the New York State Legislature and it appeared
Most recently, legislation has been proposed, that the Republican members were not allowing a
opposed, implemented, overturned, and rein- vote on legislation.
terpreted in a variety of states. These decisions
include forbidding abortion, except in the case Politics, Social Media, and
of maternal death, or requiring invasive ultra- Abortion Rights
sounds,. This topic has become increasingly vola- Before the current use of social media and the
tile and politicized of late and has become part Internet, both sides used the media to advance
Pro-Choice and Pro-Life 1031

More than 5,000 protested anti-abortion bills at the Texas State Capitol in Austin on July 1, 2013. The large turnout for the march was
credited to Senator Wendy Davis’s 13-hour filibuster and her efforts to block abortion-restrictive bills proposed by Governor Rick Perry. Live
updates were tweeted throughout Davis’s filibuster, as many celebrities tweeted “Stand with Wendy.” The bill was temporarily derailed.

their views. The famous photos of fetus’s feet were intended.” Both men lost their elections. Karl
used in pro-life campaigns, and continue to appear Rove, the Republican political strategist, wrote
on pro-life awareness pins. Wire hangers have in the Wall Street Journal that these remarks
been used as a symbol, and continue to appear on allowed the media to focus on this social issue
pins and posters as a reminder of the days of back and were responsible for the Republican loss of
alley and illegal abortions. The recent legislation two Senate seats. The “It’s Not Just Akin” cam-
and ongoing pro-life and pro-choice groups have paign (http://itsnotjustakin.com), funded by the
made abortion policies and attempts to overturn American Bridge 21st Century PAC, highlights
Roe v. Wade political issues. In recent elections, the abortion, rape, and women’s health care
most candidates have been asked to express their views of other Republican politicians. It comes
views on abortion legislation. Facebook, Twitter, replete with Facebook and Twitter buttons to
Pinterest, and YouTube have been used to present share with social networks.
abortion legislation perspectives.
In some cases these sources have instantly Pro-Choice and Pro-Life Groups
highlighted some of the controversial views of Using Social Media
candidates. Todd Akin of Missouri said, “If it’s Both pro-life and pro-choice organizations main-
a legitimate rape, the female body has ways to tain Web sites and a presence on social media
try to shut that whole thing down,” while Indi- networks. A quick search on Facebook using
ana’s Richard Mourdock expressed his view that the terms pro-choice or pro-life yielded multiple
pregnancy from rape was “something that God pages with numerous supporters on both sides.
1032 Pro-Choice and Pro-Life

The page with the greatest number of “likes” in Komen claimed that since Planned Parenthood
the pro-life search was “I Am Pro-Life,” which was facing a congressional investigation by Rep.
has nearly 700,000 “likes.” While many other Cliff Stearns, its newly revised rules would not
pro-life groups use Facebook, memberships are allow funding of such programs. Stearns, a Flor-
much lower. ida Republican, pro-life advocate, and chairman
NARAL Pro-Choice America has been of the House Energy and Commerce Oversight
described by Fortune Magazine as one of the top and Investigations Subcommittee, initiated an
10 advocacy groups in America. Its purpose is investigation to learn if Planned Parenthood was
to politically engage to oppose abortion restric- illegally using government money for abortions. A
tions and to expand access to abortions. It has 12-term incumbent, Stearns lost his primary elec-
an official page on Facebook with almost 80,000 tion in 2012.
“likes.” Many of their state chapters also have Cecile Richards, president of Planned Parent-
pages. I Am Pro-Life also runs a media campaign hood, credited Facebook and Twitter with draw-
from its Facebook page called “Here’s Why I’m ing attention to the issue. The postings in sup-
Pro-Life,” where participants upload pictures. port of Planned Parenthood far outnumbered
Other organizations also use social media those supporting the Komen decision. The social
campaigns to advance their views. Students for media campaign also resulted in increased fund-
Life (studentsforlife.org/) has a social network- ing for Planned Parenthood’s breast screening
ing presence on all the major social media net- programs. The organization received more than
works. In 2013, it launched a campaign called $400,000 from 6,000 donors. In addition, three
lifeBLAST: A Pro-life Social Media Project to large donors contributed: The Amy and Lee
promote the pro-life perspective on social media. Fikes’ Foundation, run by the head of Bonanza
Choice Out Loud (choiceoutloud.org), a pro- Oil Company in Dallas, pledged $250,000; New
choice advocate, presents 40, an online film and York Mayor Michael Bloomberg matched that
interactive experience, which explores the per- $250,000; and Credo, the mobile-phone com-
sonal choices made by young women in the 40 pany, promised $200,000. Within four days,
years since Roe v. Wade. It also appears on major Komen’s board of directors reversed the decision,
social networking sites, and has buttons to allow and announced that it would amend the policy
viewers to share the video. These are just some to “make clear that disqualifying investigations
examples of how groups use social media, and must be criminal and conclusive in nature and
many more can be found. not political.” Several top-level staff members
resigned from Komen during the controversy. The
Susan B. Komen Foundation and foundation has suffered a decrease in donations,
Planned Parenthood on Social Media and had to cut back on some of its fundraising
The strength of social media in the ongoing pro- events.
choice and pro-life debate was demonstrated
in the Facebook campaign against the Susan B. Conclusion
Komen Foundation when it announced that it The differences between those who favor a wom-
was pulling its funding for breast cancer screen- an’s right to choose and those who wish to outlaw
ings from Planned Parenthood. abortion will continue. State legislatures will con-
On January 31, 2012, the Associated Press ran tinue to pass restrictive legislation that will even-
a story on the defunding of Planned Parenthood tually be reviewed by the Supreme Court. Voters
by the Komen Foundation, which was picked will continue to elect both pro-choice and pro-life
up on Facebook and Twitter. While the Komen candidates, and both groups will continue to use
funds had only been used for breast screening social media to advance their causes.
services, Planned Parenthood’s role in providing
birth control and abortion services clearly played Kim Lorber
a role in the decision. In many, Planned Parent- Ramapo College of New Jersey
hood is the only place that poor, uninsured, or Adele Weiner
underinsured women can receive these services. Metropolitan College of New York
Professional Bloggers 1033

See Also: Christian Right and Social Media; public disclosures of casual, subjective messages
Facebook; Gender; Health Care; MOMocrats; via the Internet, published by “amateurs” (in the
MomsRising.org; Polarization, Political; Social Issues sense that they are not necessarily professional
Advocacy, Net-Roots Driven. public communicators), and backed by an accessi-
ble software that allows almost anyone to become
Further Readings a publisher. Blogs are much closer to longstand-
Allen Guttmacher Institute. “State Level Resources on ing Internet newsgroups than to the journalistic
Abortion.” http://www.guttmacher.org/statecenter/ profession.
abortion.html (Accessed May 2013). In any case, the combination of user-friendly
Boston Women’s Health Book Collective and software resources with subjective storytelling
Judy Norsigian. Our Bodies, Ourselves: A New (even if it is performed by “experts” in any given
Edition for a New Era. New York: Touchstone, field of knowledge) developed into networked
2005. structures of shared interests has given blogs their
ChartsBin. “World Abortion Laws and Policies.” personality. Mainstream media at first sounded
http://chartsbin.com/view/s53 (Accessed May an apocalyptic note in their coverage of blogs
2013). (“The Attack of the Blogs” was the alarmist title
Pew Research Center. “Report on the Complicated of a Forbes cover story in 2005), but have since
Politics of Abortion.” http://www.people-press.org/ adopted blogging as a way of diversifying and
2012/08/22/the-complicated-politics-of-abortion “freeing” reporting by assigning journalists to
(Accessed June 2013). run their own blogs under the umbrella of their
Rove, Karl. “Rove: The Lessons of Defeat for the legacy media.
GOP.” Wall Street Journal (November 14, 2012, Blogs brought these classical information out-
European ed.). http://online.wsj.com/article/SB100 lets a more casual, compelling, and passionate
01424127887324735104578118873224497426 style of reporting or commenting, the opportunity
.html (Accessed June 2013). to deal with old or new issues in a new way, and a
more personalized style of delivering information
that could help bring journalists closer to their
audiences and achieve a greater degree of engage-
ment. Blogs boosted the development of hyper-
Professional Bloggers textuality in mainstream media, and fostered
participatory and interactive practices (many of
Blog activity took off during the late 1990s, which did not go beyond the simulacra level),
almost on the eve of the 21st century. The term especially commenting. In recent years, the apoc-
blog and its cognate word Weblog are generally alyptic view, both in the case of blogs and Twitter,
credited as arising from an iterative coining pro- seems to have been overcome. Most journalists
cess involving Web and Internet pioneers Peter today praise blogs as “rewarding” software, and
Merholtz and John Barger in the late 1990s. A many have come to terms with Twitter and its
blog is an online, public, user-friendly publish- 140-character format.
ing platform. Messages or “posts” are displayed
in reverse chronological order, usually allowing Professionalization
comments. Hyperlinks are distinctive features of The professionalization of blogging is a compli-
blogs (“It’s the Link, Stupid” was the provoca- cated issue. A blogger can write about many of
tive title of a 2006 article about blogs published the same things that provide the subject of tra-
by the Economist), and they constitute the foun- ditional journalistic attention, such as politics,
dations of what is known as the “Blogosphere.” science, religion, economics, and lightbulbs. Blog-
The Blogosphere is not just the sum of all exist- gers can even embark upon investigative activi-
ing blogs, but is also a dense network of hyper- ties about relevant public issues, and those who
textual interrelations. attract many readers can also become opinion
The expression professional bloggers can be leaders, can influence people, and can even earn
considered paradoxical. Blogs are, by definition, some money. But the question of whether such
1034 Professional Bloggers

bloggers are fundamentally different from jour- very likely to be driven, if one dives deeper, by
nalism professionals who use blogging as one of forces that are not theoretical ones, even if they
their many vehicles for distributing their work is seem so. “Weblogs and Journalism: Do They
still a live debate. Connect?” asked Rebeca Blood in a Nieman
On one side of the argument lies blogging’s Foundation report published in 2003, in which
genesis and significant history as a form of alter- the thorny issue of whether “Weblogs are a form
nate and noninstitutional news and information, of journalism” was raised. One possible answer,
which professionalization would, by its very a decade later, is that perhaps they have been rhe-
nature, impair or destroy. On the other hand, torically pushed to connect too much.
however, more legal apparatuses are being put Platforms traditionally associated with “pro-
into place to protect bloggers under the same fessional bloggers” like ProBlogger, Mediabistro,
shield laws and free speech protections enjoyed or JournalismJobs, list job postings for “media
by information providers who work in commer- professionals” and offer a mix of news and “vir-
cial media organizations. Both the United Nations tual training” tips and tools. JournalismJobs is
and the U.S. National Press Club, among others, now part of AOL, and MediaBistro is owned by
have called for these protections to extend to WebMediaBrands. Those are just some exam-
bloggers who work to report political and social ples of the widespread institutionalization of the
abuses in totalitarian states and emerging democ- blogosphere. Out of the blogs with top ranking
racies alike, which would suggest that some ver- in the Technorati Top 100, most are owned by
sions of blogging have now morphed into a much big media companies like AOL, Condé Nast, and
more professionalized stature than previously CNN.One of the main arguments used by advo-
experienced. cates of the “professionalization” of blogging is
In a related debate, it is a substantive as well that, in fact, blogs do not often offer new infor-
as a semantic challenge to distinguish between mation, but instead recreate, gloss, or directly
“real” bloggers, whom history insists are non- plagiarize information from the mainstream
professionals, and those people who begin their media—that they are “echo chambers” of tradi-
professional journalistic career as bloggers and tional media.
who never do anything else, even if they do that The blogger-as-amateur argument would
for legacy media like the Washington Post and the maintain that bloggers, as individuals, have every
New York Times. right in the world to embark on this kind of
Finally, the fact that there are people who activity, precisely because they are not journal-
make their living writing as bloggers for specifi- ists—they are bloggers. The blogger-as-profes-
cally online outlets calls into question the role of sional side might respond with the observation
quantity as an indicator of professional status. that there are now so many different types of
How many bloggers have to blog for a living bloggers, all of whom blog for different reasons
before blogging, itself, can be seen as an activity and under different conditions, that one can no
in which both professional and impassioned ama- longer legitimately use the word blogger in such a
teur status is possible? It is a tricky question, but universalist and undifferentiated way. Of course,
an important one, and an issue that illustrates a everything changes when recycling and remixing
common journey experienced by many new media news media stories becomes part of the core busi-
technologies, in which they begin their public life ness of institutionalized blog networks conceived
as “rogue media” offering alternatives to main- as high-scale aggregators and much of the time
stream structures, but eventually, either become owned by media conglomerates. It is sometimes
subsumed by them or spawn institutionalized ver- the case that those same big media companies
sions of their earlier selves. are the owners of some of the news media whose
Both traditional journalists and bloggers have content is being remixed.
defined identities, and presumably they are fully
satisfied with them. Purposely theoretical confu- Conclusion
sion and progressive conceptual assimilation of In the original sense of the word, bloggers com-
“professional bloggers” and “journalists” are municate not as journalists but as people, citizens,
Project Vote Smart 1035

individuals, fathers, movie lovers, mothers, music Carrera, P. “Periodismo y Social Media.” In El
fans, gourmets,as scientists, economists, politi- periodismo en la encrucijada. Madrid: Ariel-
cians, pilots, teachers, origami enthusiasts, and Fundación Telefónica, 2011.
participants in the entire range of human experi- McLuhan M. “At the Moment of Sputnik the Planet
ence in a way that precludes or ignores the pro- Became a Global Theater in Which There Are
fessionalization of any of those specific roles or No Spectators, But Only Actors.” Journal of
activities. Communication, v.24 (March 1974).
That is the purist understanding of “blogger” Moles, A. “Qu’est-ce que le Kitsch?” Communication
as a type of performed identity, and may be their et Languages, v.9 (1971).
unique and ongoing contribution to the digital Reese, S. D., L. Rutigliano, K. Hyun, and J. Jeong.
age. Blogging as an activity, however, has undeni- “Mapping the Blogosphere. Professional and
ably multiplied into many different things, some Citizen-Based Media in the Global News Arena.”
of which are antithetical to the original concept Journalism, v.8 (2007).
of the “Blogosphere” as a noninstitutionalized,
unranked outburst of interventions performed in
the global scenario of the Internet by impassioned
and very often expert amateurs.
It may be that blogging, per se, continues its Project Vote Smart
trajectory into the realm of career journalism; it
may also be that the act of blogging calves into Project Vote Smart is a nonprofit voter education
two—or several—contrasting functions in the organization. It aims to provide voters with inde-
larger Web-universe. It is too late to say that there pendent, unbiased information about candidates
is no such thing as a “professional blogger,” but and officials at all levels and in all branches of
the jury is still out on the degree to which this American government. Started by Richard Kim-
must be an all-or-nothing transition. ball in 1988, the organization compiles both
original research and candidate-provided state-
Pilar Carrera ments into a useful database of easily compared
Universidad Carlos III de Madrid information. The organization delivers this data
primarily through the Web site http://www.votes-
See Also: Alpha Blogger; Blogger Rights and mart.org, although it also offers some traditional-
Responsibilities: Blogosphere; Blogs, Role in Politics; format publications. The Vote Smart database
Blogs; Blog Syndication; Writers and Social Media in includes candidates’ and officials’ voting records,
Politics. biographical and employment background, rat-
ings from a variety of interest groups, public
Further Readings statements, and campaign finance sources. In
Banks, M. A. Blogging Heroes: Interviews With Thirty addition to directly transmitting information to
of the World’s Top Bloggers. Hoboken, NJ: Wiley, voters, Vote Smart frequently provides data for
2007. journalism and political research.
Barnett, J. A., ed. Encyclopedia of Social Networks. To gather data, Project Vote Smart asks every
Los Angeles: Sage, 2011. candidate for national office and many candi-
Baudrillard, J. “Requiem for the Media.” In For a dates for state-level office to respond to its Politi-
Critique of the Political Economy of the Sign. cal Courage Test, a list of questions that seeks to
New York: Telos Press Publishing, 1981. establish the candidate’s position on 13 signifi-
Benjamin, W. “The Author as Producer.” In The cant issue areas. Candidate response to the Politi-
Work of Art in the Age of Its Technological cal Courage Test has declined over the years that
Reproducibility, and Other Writings on Media. the test has been issued. The New York Times
Cambridge, MA: Belknap Press of Harvard reported that when the organization first issued
University Press, 2008. its test in 1996, 72 percent of candidates for
Blood, R. “Weblogs and Journalism: Do They national office answered the test. In 2008, only
Connect?” Nieman Reports, v.57 (Fall 2003). 41 percent of congressional candidates answered
1036 Project Vote Smart

the questions, and an organization spokeswoman sought to determine the impact of additional pub-
confirmed that candidates are being told by their lic information on democratic participation have
staff not to provide answers to Project Vote Smart also made use of Project Vote Smart.
because the information could be used by oppos- Project Vote Smart uses volunteers and interns
ing candidates. As a result of declining response to gather information on the over 40,000 politi-
rates, the organization began determining can- cal actors in its database. Most interns and vol-
didates’ likely positions on the Political Courage unteers work at the organization’s headquarters
Test issue areas based on public statements made in Philipsburg, Montana, although interns also
by the candidates. Project Vote Smart publishes work at the Project Vote Smart satellite office
these “inferred” positions, along with the state- at the University of Texas at Austin. In addition
ments researchers used to infer the candidates’ to the information available on its Web site, the
positions. organization continues to develop new informa-
Project Vote Smart demonstrates an issue-ori- tion products and outreach methods, including a
ented approach to politics, which the organiza- national bus tour from 2007 to 2008 that was
tion identifies as a counterbalance to an overly intended to help raise awareness of its database,
partisan political process. While profiles for can- and an interactive Web tool created in 2010 called
didates and officials include partisan affiliations, VoteEasy.
the information system emphasizes candidates’ Using the same data that is presented in static
stated positions on specific political issues. The form in the database, the VoteEasy tool allows
Vote Smart database provides identical displays users to select electoral races and then select their
for all registered candidates, not distinguishing preferences on political issues in order to iden-
between major and minor party candidates. Simi- tify candidates whose stated positions are closest
larly, the Vote Smart Web site folds the Demo- to their own. The Project Vote Smart founding
cratic and Republican parties into its listing of board includes a number of influential political
56 national political parties, a list ranging from actors, including former U.S. presidents Jimmy
the American Beer Drinker’s Party to the Ther- Carter and Gerald Ford, and current and former
modynamic Law Party. The Web site explicitly members of Congress.
targets partisanship as a problem. While many
former political officeholders are on the Project Emily Shaw
Vote Smart board, the organization requires that Thomas College
no board member join “without being balanced
by a political enemy.” The organization also has See Also: Campaigns, Congressional (2008);
a policy of not accepting money from any corpo- Campaigns, Congressional (2010); Democracy
ration or organization that lobbies, supports, or for America; Momocrat; Political Information
opposes candidates. Opportunity Structures; Voter Turnout.
While Project Vote Smart provides voters with
information directly through its Web site, it also Further Readings
provides this information indirectly by provid- Alexovich, Ariel. “Candidates Tested on ‘Courage.’”
ing local news outlets with an important source New York Times (November 15, 2007). http://
of state and local candidate information. Dozens thecaucus.blogs.nytimes.com/2007/11/15/candidates
of local newspapers have used the organization’s -tested-on-courage (Accessed October 2012).
information in their profiles of candidates; many Delli Carpini, Michael X. and Scott Keeter. “The
newspapers have also endorsed the organization’s Internet and an Informed Citizenry.” Annenberg
database to their readers as a good source of School of Communication Departmental
objective information. The Vote Smart database Papers (2002). http://repository.upenn.edu/cgi/
has also frequently been used by political scien- viewcontent.cgi?article=1003&context=asc_papers
tists, who have found that it provides a uniquely (Accessed October 2012).
consistent source of information about state Panoka, Anna. “Project Vote Smart on Colorado
and local political actors on biographical data, Candidates.” Colorado Public Radio (October 6,
key votes, and issue positions. Studies that have 2010). http://www.cpr.org/article/Project_Vote_
Proxy Measurements 1037

Smart_on_Colorado_candidates (Accessed October • Does the approach measure the right


2012). things in order to show the business
Project Vote Smart. “About Project Vote Smart.” impact of the programs and initiatives?
http://votesmart.org/about?utm_source=votesmart • Will stakeholders of the report receive
&utm_medium=homepagelink&utm_campaign the data and actionable insights required
=about#.UGo8VZjAeSo (Accessed October 2012). to make strategic decisions?
Steel, Brent S., John Pierce, and Nicholas P. Lovrich. • Are the data and insights presented in
“Public Information Campaigns and ‘At-Risk’ a clear and concise manner that tells a
Voters: A Northern California Case Study.” story and makes it easy to understand
Political Communication, v.15 (1998). and proceed?

Social media metrics are derived from three pri-


mary sources: program goals, with specific met-
rics directly tied to program or campaign objec-
Proxy Measurements tives; business outcomes, with metrics designed
to measure the business impact of the campaign,
In the United States, televised political adver- program, or objective; and channel-specific, with
tising is the main way that modern campaigns metrics that are unique to social channels, such as
communicate with voters. Although viewers tweets and retweets. Ideally, a robust social media
may learn facts while watching news programs, measurement program will have a well-rounded
during which many political ads air, advertising set of metrics from all three dimensions.
appears during many types of shows, including Metrics tied to program objectives allow for
those unlikely to convey political information. direct measurement of program success. Funda-
More to the point, such information has even less mentally, measurement is about assessing perfor-
to do with the content of most political advertis- mance against goals. Business outcome metrics
ing; political knowledge, then, is a tenuous proxy are used to connect social media programs and
for campaign and exposure. Proxy measurement the business results they are designed to drive.
is any attempt to measure something that cannot It is surprising how often social program objec-
be measured exactly when one wants or needs tives are biased toward channel-specific metrics
to, and instead looking at what can be measured. (e.g., “likes” or followers), and not the specific
Using proxy measures in weight construction outcomes desired for the program. Also, rely-
leads to a larger shift in survey estimates than ing too seriously on channel metrics limits one
when they are not included. An ideal proxy varia- to what one can measure rather than what one
ble for a successful adjustment variable for a point should measure. Understanding the social media
estimate does not necessarily translate to the ideal objectives will suggest general parameters of a
variable when interest is in estimated regression measuring program, and finally, the decision tool
coefficients or subgroup analyses. must operate within them. A good measurement
strategy should be to take a holistic, integrated
Social Media Metrics approach using methodologies, tools, and data
Appropriate social media aims should be measur- from all dimensions, being able to track behavior
able, and it is essential to understand the business of individuals, understanding how online behav-
process that a social media program will address ior impacts offline behavior and vice versa. Met-
or drive, because each business process drives rics for all dimensions can be any of the following:
specific metrics. For instance, metrics related to
program objectives allow direct measurement of • Exposure: Opportunities to see, branded
program success; fundamentally, the measure is mentions, search rank, message inclu-
about evaluating performance against objectives. sion, net positive impressions, change in
To evaluate the robustness and effectiveness of responsiveness, number of flowers, “likes”
every approach to social media measurement, one • Engagement: Branded search, replicate
may ask three fundamental questions: visitors, duration, subscriptions and
1038 Psychographics

acquaintances, URL visits, comments/ Scan and other digital sales data are
post shares, communication evoke and important.
maintenance, links, bookmarks/votes/
likes Conclusion
• Influence: Purchase consideration, When trying to measure political participation,
changes in opinion or attitudes, asso- questions that might be asked include: Have you
ciation with the branding or attributes, ever contacted any elected official? Attended a
notify a friend, likelihood to recommend campaign event? Joined an organization in sup-
to a friend or colleague (net follower port of a particular cause? Contributed money to
index) a candidate running for public office? How much
• Action: Visit the store, attend the event, do you enjoy keeping up with political news about
buy the product, contact a politician, campaigns and elections? How closely have you
vote for/against, visit Web site, request been following news about the race for the Demo-
more info cratic presidential nomination?

In the early days, efforts to measure digital and Jaime Raúl Seixas Fonseca
social media almost exclusively focused on Web Technical University of Lisbon
analytics; today it is developing toward meas-
uring the conversations and behavior patterns See Also: Audience Fragmentation/Segmentation;
occurring within networking. The great rise in Click-Through Rate; Data Mining; Evolution of
the popularity of social networks in the last few Social Media; Innovation and Technology; Media
years presented new challenges in digital research and Communications Policy; News Media.
and measurement: researchers were faced with
measuring both the conversations and behavior Further Readings
patterns occurring within social networks, and Besley, T. and R. Burgess. “The Political Economy of
understanding and connecting the underlying Government Responsiveness: Theory and Evidence
influences and motivations for the online behav- from India.” Quarterly Journal of Economics,
ior; finally, there are also the real-world, offline v.117/4 (2002).
interactions and transactions. Goldstein, K. and T. N. Ridout. “Measuring the
Effects of Televised Political Advertising in the
• Web sites: Web analytics software pro- United States.” Annual Review of Political
vided an explosion of data and new Science, v.7 (2004).
metrics like: unique visitors, page views, Immorlica, Nicole, Kamal Jain, Mohammad
click-through rates, duration, referring Mahdian, and Kunal Talwar. “Click Fraud
sites and conversions. Resistant Methods for Learning Click-Through
• Social networks: It becomes important to Rates.” Internet and Network Economics,
measure conversations and engagement: v.3828 (2005).
How often is the brand mentioned in
conversation? What is the sentiment of
the comments? How often is the brand
recommended and by whom? Content
and behavior analysis, including tracking Psychographics
technologies, are the primary measure-
ment tools. Demographics are the external, often visible
• Offline: Audience research, representing characteristics of a person such as age, gender,
all the real-world offline transactions that nationality, or educational level. Grouping and
may be of interest: Did someone visit describing individuals by way of the demographic
the store or attend the event? Did they categories into which they fit can facilitate analy-
buy a product? Did they recommend the sis and description of groups and communities
brand or product to a friend over coffee? for public policy or organizational purposes.
Psychographics 1039

Demographic analysis also provides a powerful useful. Ernest Dichter’s qualitative investigations
marketing tool that enables audience segmenta- of subjects’ motivations, while criticized as lacking
tion and targeting. sound ethical and scholarly foundation, produced
Psychographics (or psychological demograph- better results. A blending of qualitative and quan-
ics) provides an additional dimension for analy- titative approaches has been the norm since the
sis, providing a framework for identifying and mid-1960s. An early study of airplane travelers’
categorizing the internal characteristics of that patterns and preferences by Stanley Plog in 1967
person. While demographics can provide some produced one of the first psychographic models.
insight into what will motivate a person’s behav- Since then, researchers have focused on fine-
ior, using psychographics to understand that tuning their methodologies to produce higher con-
person’s values, attitudes, and beliefs can elicit a struct reliability and validity, stronger predictive
much more nuanced and reliable path to motivat- validity, and thus greater usefulness in achieving
ing that person. marketing goals. In developing increasingly dense
These audience analysis methods have long and detailed psychographic profiles of potential
been the standard tools by which marketing consumers, it is possible to go well beyond the
and advertising campaigns are constructed and surface characteristics of demographic groups
deployed. As the complexity and power of mass and to understand the attitudes, needs, and drives
marketing technology has become more sophis- of complex individuals.
ticated, so have the instruments by which the Using data from user-generated social net-
receivers of these campaigns are defined and works such as Facebook, YouTube, and Twitter,
targeted. The proliferation of interactive social researchers can develop multidimensional social
media technology in the 21st century adds a profiles that provide highly accurate and useful
great deal of depth and richness to the amount behavioral, lifecycle, and lifestyle data. Research-
of psychographic information available, as well ers can track an individual’s online behavior
as offering more sensitive and immediate tools to gain insights into the mental and emotional
to measure message effectiveness. The constant realms where that behavior emerged. For exam-
reciprocal flow of information from policymak- ple, as a user travels from Web site to Web site,
ers through campaign managers and through a “click set stream” of “cookies” is produced.
millions of users back through policymakers and Data-aggregators might then map a mental
managers is especially potent in the pursuit of model consisting of psychographic-derived moti-
political outcomes. vations that could define certain logical connec-
tions among the sites. When the user updates his
The Evolution of Psychographic or her Facebook page, social profile data man-
Research and Its Application agement tools such as GraphEffect, which does
Trying to understand what motivates a person’s a linguistic analysis of status updates, can pro-
buying decisions originally, though now applied duce insights into his or her personality or mea-
much more broadly, became a core focus of mar- sure purchase intent. Other forms of data-mining
keting professionals and scholars shortly after can link the user’s purchase of baby furniture or
the end of World War II. Understanding of the other product key-indicators to his or her posi-
interrelationship of audience demographics, pub- tion in lifecycle and lifestyle dimensions.
lic opinion, and economic choices was a useful Marketers’ and social researchers’ evolving
lens into consumer motivation and behavior. ability to develop this level of understanding of
Then, beginning in the 1960s, marketers began individual consumers is closely linked to the abil-
to explore and map the consumer’s “inner land- ity to develop and deliver messages tailored to that
scape” by way of a psychological profile. specific consumer, in a specific realm of selection
In 1960, Arthur Koponen conducted well- of action, at a specific time and place. Such disag-
designed quantitative studies designed to link con- gregation of huge markets into specialized clusters
sumer behavior with findings from standardized of consumers facilitates “variable data messag-
personality inventories. But results were found ing,” which has a much higher return on invest-
unreliable, “equivocal,” and too abstract to be ment than mass-marketing techniques. Thus,
1040 Public Affairs Council

political campaigns are coming to rely upon voter on the online political campaign and candidates’
segmentation strategies since the emergence of the adoption of Web-based messaging resources. One
communication systems produced by Web 2.0. such study by Jeff Gulati and Christine Williams
found that major party candidates for the House
Political Communication of Representatives were likely to have a Facebook
Insofar as political parties, their platforms, and page, Twitter account, and YouTube channel, with
their candidates can achieve their goals only by Republicans more likely than Democrats to be on
gaining consumer/voter “buy-in,” strategic appli- YouTube. In the 2012 election cycle, microtarget-
cations of psychographic analysis and segmenta- ing of potential voters with variable political mes-
tion are crucial. The use of these psychographic sages based on data mined from social networks
profiles in segmenting and microtargeting politi- and other Internet sources was highly effective.
cal consumers is central to a 21st-century politi- Some strategists suggest that the ability to iden-
cal communication model that harnesses the tify and tap into demographic and psychographic
power of the networks and systems generated by dimensions of the electorate were deciding factors
social media. in the outcome of several key elections.
The goal of 20th-century market research
was to develop demographics-based approaches Leslie Reynard
through which like-minded potential consumers Washburn University
could be aggregated into large groups of receiv-
ers for persuasive messages delivered through the See Also: Advertising and Marketing; Audience
mass media of radio, television, and print sources. Fragmentation/Segmentation; Cause-Marketing
In contrast, the major goals of 21st-century mar- Campaigns; Data Mining; Microtargeting; Voter
keters are to develop tools for construction of Demographics.
accurate, detailed user profiles, to isolate and
track trend data, and to trigger consumer engage- Further Readings:
ment in issues using psychographic segmentation. Butler, Patrick and Phil Harris. “Considerations on
In short, 21st-century market research is built on the Evolution of Political Marketing Theory.”
a foundation of segmentation, fragmentation, Marketing Theory, v.9/2 (2009).
and microtargeting. Internet-based technologies Gulati, Jeff and Christine B Williams. “Diffusion of
and Internet-based user networks produced by Innovations and Online Campaigns: Social Media
the proliferation of social media facilitate prog- Adoption in the 2010 Congressional Elections.”
ress toward these goals. Social Science Research Network (August 13,
An integration of political science theory and 2011). http://ssm.com/abstract=1925585
practice with that of marketing specialists, which (Accessed November 2012).
some have characterized as “e-democracy,” has Howard, Philip N. and Malcolm Parks. “Social
evolved. This “new paradigm,” according to Media and Political Change: Capacity, Constraint,
global marketing experts Patrick Butler and Phil and Consequence.” Journal of Communication,
Harris, requires that political parties refigure their v.62/2 (April 2012).
focus from an essentially economic bottom line Wells, William D. “Psychographics: A Critical
to one that recognizes the importance of “lead- Review.” Journal of Marketing Research, v.12
ership based on citizen value and need” and the (1975).
use-value of such “intangible resources” as inter-
personal relationships, loyalties, and the power of
social networks generated by bottom-up informa-
tion flows.
Since Democrat Howard Dean’s pioneering use Public Affairs Council
of Internet resources from 2004 forward, integra-
tion of psychographic data and social networks are The Public Affairs Council is one of the larg-
increasingly vital in national campaigns. In the 2010 est associations for public affairs professionals
U.S. election cycle, a number of studies focused worldwide. It seeks to advance the field of public
Public Affairs Council 1041

affairs and promote ethical standards by educat- Role of the Public Affairs Council
ing public affairs professionals. Public affairs, The role of the Public Affairs Council has
which includes the practice of lobbying, refers extended over the years as a result of the increas-
to organizational activities concerning the socio- ing influence and relevance of the profession in
political environment, and specifically to the the United States and in developed countries.
management function of helping an organiza- The growth of public affairs in society is directly
tion generate political power and influence pub- linked to political culture. Political systems that
lic opinion. are generally supportive of business participation
Public affairs activities can involve lobbying; in the policymaking process promote the use and
monitoring and predicting political, legal, eco- the diffusion of public affairs. Liberal and demo-
nomic and social developments; providing politi- cratic political systems typically recognize the
cal intelligence and strategic advice; and assist- profession of public affairs, but regulations con-
ing media relations specialists. Public affairs cerning the practice of public affairs vary across
professionals work for consultancies, industry, countries.
trade bodies or associations, civil society, unions, In the United States, professional recognition
regions, or municipalities. As more political activ- of public affairs has a long history. The practice of
ity moves into the online and social media sphere, lobbying goes back at least as far as the late 18th
the Public Affairs Council is playing an increas- century, beginning in the earliest days of Con-
ingly important role in self-monitoring activities gress. Yet, professional recognition did not arise
for social media–based campaign and e-gover- until President Dwight D. Eisenhower provided
nance activities. a national institutional framework to support
the participation of the business sector in politi-
Structure cal processes. Eisenhower decided to establish the
The Public Affairs Council is headquartered in Public Affairs Council in 1954, originally called
Washington, D.C., and is made up of a volunteer the Effective Citizens Organization.
board of directors and an executive committee, For the first decade of its existence, the Effective
which runs the day-to-day functions. The board Citizens Organization focused on training about
of directors comprises about 170 senior pub- half a million managers and executives on politics
lic affairs executives from leading corporations, and government relations. Because of U.S. social
associations, and consultancies. Board mem- unrest in the 1960s, community relations assumed
bers are typically business leaders who commit greater importance among corporations to tackle
to contributing to the different activities of the social issues in the communities where companies
council, including speaking at conferences, serv- operated. The Public Affairs Council created a
ing as information resources, participating in dedicated post in 1968, the Urban Affair Func-
council networks, and promoting membership. tion, and engaged in annual training seminars on
Board members are elected every two years. The community relations by hiring specialists in urban
Executive committee includes 16 board members affairs to serve member companies’ needs.
elected for a term. The committee is in charge of During the 1970s, public distrust of big busi-
overseeing networks, developing budgets, recom- ness and concerns about transparency in govern-
mending new programs, setting staff performance ment increased, calling for stricter government
goals, planning board meetings, and conducting regulation. Since then, the public affairs practice
other council business. Along with this, the Pub- has been highly regulated, and the U.S. legislation
lic Affairs Council has a foundation—the Foun- requires extensive disclosure of which organiza-
dation for Public Affairs—that conducts studies tions use public affairs, how and where they use
and produces benchmarking analyses on emerg- them, and what their budgets are. With the intro-
ing public policy issues and trends that affect duction of the Lobbying Disclosure Act (LDA) in
the practice of public affairs. The foundation is 1995, public affairs professionals that are paid
sustained by donations made by Public Affairs for lobbying at the federal level have to register
Council’s members and supporters, mainly con- with the secretary of the Senate and the clerk of
sisting of corporations. the House.
1042 Public Intellectual

Relevency Today Lerbinger, Otto. Corporate Public Affairs: Interacting


The Public Affairs Council works to support With Interest Groups, Media, and Government.
corporate members that face greater challenges London: Routledge, 2006.
because of the globalization phenomenon and the McGrath, Conor, Danny Moss, and Phil Harris.
fact that U.S. corporations increasingly operate in “The Evolving Discipline of Public Affairs.”
international environments with diverse legisla- Journal of Public Affairs, v. 10/4(2010).
tions, regulations, and cultures in practicing public Moss, Danny, Dejan Vercic, and Gary Varnaby,
affairs. Working at the global level also means that Perspective on Public Relations Research. New
substantial differences in public acceptance of cor- York: Routledge, 2002.
porate involvement in sociopolitical matters exist. Public Affairs Council. http://pac.org/about
Because of the nature of public affairs activities, (Accessed May 2013).
that is, influencing public opinion and politicians, Public Affairs Council. “Governance.” http://pac.org/
public affairs is one of the professions that receives about/governance (Accessed May 2013).
frequent criticism in terms of legitimacy, represen- Venice Commission. “Report on the Role of
tativeness, transparency, accountability, and ethics. Extra-Institutional Actors in the Democratic
While public affairs professionals can be highly System (Lobbying).” European Commission for
influential in legislation formulation and decision Democracy Through Law (Venice Commission),
making processes, they are not elected officials, Strasbourg, France: March 22, 2013. http://www
thus they do not represent the interests of soci- .venice.coe.int/webforms/documents/?pdf=CDL
ety. Consequently, they are not accountable to -AD%282013%29011-e (Accessed May 2013).
citizens or publics for the legislation formulation
they promote. These concerns call for a greater
role of the Public Affairs Council in training and
preparing business leaders in handling societal
pressures, and acting ethically and in a transpar- Public Intellectual
ent manner.
Throughout history, academics and other highly
Chiara Valentini educated citizens of democracies have contrib-
Aarhus University uted to public discussions about issues of broad
concern. During the 20th century, the traditional
See Also: Advocacy Groups, Political Branding media—books, newspapers, magazines, radio,
of; Lobbyists; Networks, Political; Social Issues and television—were the forums through which
Advocacy, Net-Roots Driven; Special Interest so-called public intellectuals contributed to their
Campaigns; Transparency. societies’ dialogues, however, the specific outlets
in which their ideas were published or broadcast
Further Readings tended to reach relatively narrow audiences. The
De Santo, Barbara. “Public Affairs: An American explosion of social and other digital media in the
Perspective.” Journal of Public Affairs, v.1/1 (2001). 21st century offers the promise of the democrati-
Harris, Phil and Craig S. Fleisher. Handbook of zation of the reach and access of public intellec-
Public Affairs, Thousand Oaks, CA: Sage, 2005 tuals and their ideas. At the same time, scholars
Harsanyi, Fruzsina M. and Susan Schmidt. “Creating and social critics question the quality of certain
a Public Affairs Function in Countries Without a online outlets, and therefore fear that the reputa-
Public Affairs Culture.” Journal of Public Affairs, tion of public intellectualism is in danger of being
v.12/1(2012). cheapened.
Institute of Public Administration (IPA). “Regulations
of Lobbyists in Developed Countries. Current Rules PIs and Politics
and Practices 2004.” http://www.environ.ie/ A public intellectual (PI) is a person deeply commit-
en/LocalGovernment/LocalGovernment ted to the life of the mind and its impact on society.
Administration/StandardsinPublicLife/ A PI draws on his or her intellectual resources and
PublicationsDocuments (Accessed May 2013). depth of knowledge in order to address a broad,
Public Intellectual 1043

though educated public about serious national or PIs and (Social) Media
transnational issues. While many PIs work as col- By definition, a “public” intellectual dissemi-
lege professors, being on a college faculty is not a nates his or her ideas to the population at large;
requirement for being a PI. thus, to be a PI, one must find and cultivate a
Indeed, many PIs work as journalists, media broad audience. Throughout the latter half of
personalities, and/or as members of “think the 20th century, radio and television were the
tanks”; for such people, the term public intellec- dominant media through which PIs dissemi-
tual is not merely an informal social role, but is, nated their ideas, typically using outlets such as
in effect, their job description. The “day job” of National Public Radio, C-SPAN, and public tele-
academic PIs, by contrast, is typically that of pro- vision. While even these outlets can be somewhat
fessor: the majority of their time is spent teach- exclusive, PIs speaking about issues of politi-
ing and publishing scholarly work, meaning their cal importance in such venues have had to find
“public” general-audience-focused contributions, ways of translating often dense academic jargon
publications, and media appearances are a side- into accessible, plain language. Magazines such
line, if often more lucrative than their university as The Nation, Harper’s, the New Yorker, and
positions. The New Republic, and newspapers such as the
The origins of the term public intellectual are New York Times and the Washington Post have
disputed, although it appears that the idea gained also provided platforms for PIs to address press-
currency in late 19th-century France, when many ing concerns at greater length, albeit to relatively
of that country’s leading scholars and writers narrow audiences. More recently, political/enter-
offered public criticisms of the government’s tainment shows on cable television—chief among
handling of the Dreyfus Affair, a political scan- them Real Time with Bill Maher, The Daily Show
dal involving accusations of treason and a mili- With Jon Stewart, and The Colbert Report—
tary cover-up of evidence. In the United States, have offered PIs opportunities to speak (usually
the idea that members of the academy should while promoting a recently published book) on
share their ideas with the public became popu- issues of importance to the nation. One scholar
lar in the 1930s, inspired largely by John Dewey, has even argued that Jon Stewart is the greatest
a university professor and educational reformer. public intellectual of this age.
Intellectuals’ contributions to public life—and The explosion of new forms of media—online-
public awareness of those contributions—became only publications, podcasts, and especially blogs
increasingly visible throughout the subsequent and microblogs—have allowed PIs to greatly
decades of the 20th century, fueled largely by the expand the dissemination of their ideas and work.
explosion of traditional mass media. Indeed, several scholars have argued that social
The relationship of PIs to politics is somewhat media have made the early 21st century the best
controversial. While most scholars see the role time in history for public intellectuals because the
of PI as providing insight into, and solutions for, growth in digital publication has exponentially
pressing political problems, others argue that PIs increased the quality, diversity, and accessibility
can be successful or respected only if they are of PIs and their ideas.
nonpartisan and nonideological, or are at least While some critics have expressed reservations
open to opinions other than their own. In any about the darker sides of the blogosphere and its
case, most PIs’ public content—whether deliv- potential to tarnish the reputation of PIs who use
ered in the form of magazine or newspaper arti- them, others have cheered social media’s interac-
cles, television appearances, blog posts, or Twit- tivity and ability to break down the barriers to
ter feeds—is intended to shape public opinion. It PIs that are often erected by the formal, exclusive
tends to consist of political analysis and critique, nature of the academy, where so many PIs make
calls for political and social change, and often their homes.
offers specific recommendations for the execu- The work of PIs can be found in a variety of
tion of public policy, typically on issues such as social-media spaces. A citizen searching for a
war, education, the environment, the economy, public intellectual’s thoughts about the important
and human rights. issues of the day can find them in PIs’ blogs and
1044 Push Polling

tweets, on PIs’ Web sites, on Web sites such as effort that has distributed laptops to over 2 mil-
“The Public Intellectual Project” (run by Cana- lion children in more than 40 countries—a public
da’s McMaster University), in podcasts featuring dissemination of not merely ideas but also the very
lectures by and interviews with PIs, in videotaped tools necessary in the digital age to stimulate the
lectures posted to YouTube by organizations development of and appreciation for intellectual-
such as RSA and TED Talks, and on Facebook ism, public as well as private, around the globe.
pages hosted by members such as “The Public
Intellectual: Guru, Gadfly, and Gunrunner.” PIs David Weiss
using these various social and other digital media University of New Mexico
to contribute to public discussion and enlight-
enment include academicians, journalists, social See Also: Blogosphere; Blogs; Daily Show, The;
critics, political consultants, and media personali- Facebook; News Media; Twitter.
ties as varied as Cornel West, Barbara Ehrenreich,
Naomi Klein, David Frum, Fareed Zakaria, and Further Readings
Andrew Sullivan, among many others. Brouwer, Daniel C. and Catherine R. Squires. “Public
Intellectuals, Public Life, and the University.”
PIs Who Publish About Social Media Argumentation and Advocacy, v.39/3 (2003).
Not only do PIs use social media as forums for Drezner, Daniel W. “Public Intellectuals 2.0.”
their ideas, in many cases, PIs blog, tweet, post, Conference paper presented at Boston University’s
write, and/or speak publicly about social media Institute on Culture, Religion, and World Affairs
and, notably, about the roles increasingly played (May 2008). http://drezner.foreignpolicy.com/
by social media in political movements. The Arab posts/2008/05/13/blogs_public_intellectuals_and_
Spring of 2011, for example, brought to the fore the_academy (Accessed December 2012).
widely accessible arguments by PIs about the cen- Etzioni, Amitai and Alyssa Bowditch, eds. Public
trality of Twitter and Facebook in the processes Intellectuals: An Endangered Species? Lanham,
of political organization and revolution in coun- MD: Rowman & Littlefield Publishers, 2006.
tries such as Tunisia and Egypt. Among the most Jacoby, Russell. The Last Intellectuals: American
prominent of these was “The Political Power of Culture in the Age of Academe. New York: Basic
Social Media,” an article published in Foreign Books, 1987.
Affairs by New York University Professor Clay Lilla, Mark. The Reckless Mind: Intellectuals in
Shirky. Shirky, the director of NYU’s interactive- Politics. New York: New York Review Books, 2001.
telecommunications program, as well as a fre- Parsi, Kayhan. “The Political Satirist as Public
quent contributor to publications such as the Wall Intellectual: The Case of Jon Stewart.” American
Street Journal, Wired, and the New York Times, Journal of Bioethics, v.11/12 (2006).
might well be considered an exemplar of the 21st- Posner, Richard A. Public Intellectuals: A Study of
century public intellectual. Decline. Cambridge, MA: Harvard University
Perhaps even more noteworthy is Nicholas Press, 2001.
Negroponte, author of the 1995 book Being Dig- Vaidhyanathan, Siva. “The Lessons of Juan Cole.”
ital, and founder of both the Media Lab at the Chronicle of Higher Education (July 28, 2006).
Massachusetts Institute of Technology (MIT) and
Wired magazine, who speaks and writes exten-
sively in scholarly and popular outlets about the
power of social and digital media to change the
world. Negroponte may be unique among PIs Push Polling
because he puts his money (and that of his sup-
porters) where his mouth is. Push polls are political polls through which the
As the developer of the One Laptop Per Child pollster attempts to impact the views and atti-
project, a philanthropic initiative that provides tudes of respondents by pretending to ask survey
computers to children in the world’s poorest questions. Unlike regular polls, which aim for
nations, Negroponte is the driving force behind an randomization and are deeply concerned with
Push Polling 1045

recording respondent data, push polls reach out polls. Real polls tend to use small, representative
to a large number of possible respondents, and samples that allow for valid results, while push
are more concerned with spreading informa- polls instead behave like traditional marketing
tion than in gathering information. The subject efforts, casting as wide a net as possible. Since
of push polls may rely on innuendos, small bits they are not concerned about the data returned,
of information from opposition research con- there is no need for push polls to be concerned
ducted by the campaign, or in its worst form, with samples or respondents. Further, push polls
pure rumors. In any case, the information pre- are very short. They do not see the need to gather
sented is misleading, and tends to work against any type of background information, as they are
the traditional democratic process. It is viewed only worried about pushing out a message to as
negatively enough that both the American Asso- many people as they can. Regular polls can go on
ciation for Public Opinion Research and the for up to 30 minutes, and typically ask positive
American Association of Political Consultants and negative questions about a plethora of can-
have written policies barring members from par- didates and issues. Most conclude with questions
taking in the practice, regardless of the strategic related to demographic information of the polled
advantages it may give them. individual.
Push polling has been conducted since the
advent of polling in one form or another. Yet in 2000 Republican Presidential Primary
recent years, the practice has garnered significant While push polls had been used for a long time
negative attention and campaigns have veered in campaigns, they became the center of national
away from the tactic. However, the development attention during the 2000 Republican presi-
of social media has made push polling easier to dential primary in South Carolina. While not
pull off, with fewer reputational risks. No longer proven, it was strongly alleged that the Bush
does one have to be as concerned with leading campaign had used push polling in an effort to
polls being tracked back to a campaign when discredit Senator John McCain.
they can be posted by anyone on any number of Given the history of race relations in the south-
social media sites that are decidedly more dif- ern state, it is of little surprise that the push poll
ficult to definitively link back to a candidate or had strong racial undertones. Voters were asked
campaign. whether their likelihood of voting for McCain
In their most mild form, push polls simply would change if they knew he had fathered an
remind voters of a particular issue that may have illegitimate black child. Thousands of voters
a negative connotation. For example, polls con- received the call, and it was aided by the fact that
ducted by Republicans in West Virginia would McCain had previously adopted a Bengali girl.
often ask if individuals were aware that Robert While it has never been definitively traced back to
Byrd had been a member of the Ku Klux Klan. Bush, he had a history of push polling. In 1994,
While the information was factual, it was only his gubernatorial campaign was accused of ask-
included in polls in an effort to discredit Byrd ing voters if they would be less likely to vote for
and attempt to convince voters to not support Texas Governor Ann Richards if they knew her
him. More serious push polls will involve direct staff was dominated by lesbians.
negative attacks on opponents, and rely on non- On face value, the tactic of push polling is
factual information. For example, a poll may ethically questionable. Insinuating information
ask: “If you knew that Governor Miller commit- as factual when it is not undermines democratic
ted adultery, how would that impact your view values and the processes of the country. At the
of him?” There may be no proof of an affair, and same time, candidates play to win, and if push
the offending campaign can claim that they were polling can help them do so, it is difficult to dis-
just trying to anticipate how a scandal could suade. With social media gaining more and more
impact the race, but it is clear what the motives traction as a vehicle for politics, push polling has
actually are. become easier to conduct. Given the lack of fil-
Sample size and poll length are two telling fac- ters or control on what individuals post in a blog
tors to distinguish push polls from traditional or on Facebook, candidates and campaigns can
1046 Push Polling

present information by any number of means, polling within their state’s borders. Other states
and then permit it to spread like wildfire across will likely follow. Push polls do not just mislead
the Internet. With no real way of tracing back to the public, they also misguide political system.
the initial information, campaigns are less likely
to face the blowback that Bush did in 2000 in William J. Miller
South Carolina. Flagler College
While professional consultants and pub-
lic opinion researchers are strongly urged by See Also: Campaign Strategy; Decoy Campaign
their professional associations to not partake in Web Sites; Ethics of Social Media in Politics; Polling;
push polls, new media have allowed candidates Special Interest Campaigns.
and campaigns to stealthily utilize these tactics,
without the need for consultant help. Even more Further Readings
concerning, however, is that average citizens can American Association for Public Opinion Research.
present push polls through online means without “AAPOR Statement on ‘Push’ Polls.” (June 2007).
any affiliation to a candidate or campaign. This http://www.aapor.org/AAPOR_Statements_on_
can adversely affect how the campaign is viewed Push_Polls1.htm (Accessed December 2012).
by voters. Frankovic, Kathy. “The Truth About Push Polls.”
CBS News (February 11, 2009). http://www
Conclusion .cbsnews.com/stories/2000/02/14/politics/
While push polling is not deemed legitimate or main160398.shtml (Accessed December 2012).
acceptable, studies show that it works. As a result, Gordon, David, et al. Controversies in Media Ethics.
it is likely to continue plaguing American elec- New York: Routledge, Taylor & Francis, 2011.
tions for the foreseeable future. States—especially Stonecash, J. M. Political Polling: Strategic
New Hampshire—have begun taking legislative Information in Campaigns. Lantham, MD: Rowan
action to attempt to limit the influence of push & Littlefield, 2008.
ENCYCLOPEDIA OF

Social Media and Politics


ENCYCLOPEDIA OF

Social Media and Politics


Volume 3

Kerric Harvey
George Washington University
editor
Q
Quebec, Canada, postsecondary education, has caused Quebec to
accumulate greater education debt. Attempts to
2012 Student Protests cut $103 million from postsecondary education in
2005 prompted students to strike for five weeks.
From February to September 2012, postsecondary The University Student Federation of Quebec
students in Quebec, Canada, went on strike. Stu- (FEUQ) and Broad Coalition of the Association
dents opposed the provincial government’s plan to for Student Union Solidarity (FEUQ) are the two
raise tuition over five years, from 2012 to 2017. largest Quebec student associations. The first
The urban centers of Montreal and Quebec City weekend of the strike, FEUQ trained its delegates
saw the largest protests. On September 5, 2012, in strike workshops, including using social media.
the government abandoned its planned increases, The original 11,000 students became an estimated
ending the strike. Social media played a central 180,000 by late April. Participation ballooned to
role in the protests as it was used for organizing 400,000–500,000 people at a protest in Montreal
and following marches, debating issues, critiquing on May 22, the 100th day of protest. Organizers
the media, disseminating messages, and both mak- proclaimed it the largest act of civil disobedience
ing and breaking political careers. in Canadian history as people marched in viola-
On February 14, 2012, 11,000 students from tion of Bill 78, a law that banned protest within
Université du Québec à Montréal and Université 50 meters (164 feet) of a campus and required
Laval voted to strike against the provincial gov- police approval for public protest routes involv-
ernment’s tuition increases. Parti Quebecois Edu- ing 50 people or more.
cation Minister Line Beauchamp sought to raise In February, student strikers shut down Mon-
tuition by $325 each year from 2012 to 2017. treal’s Jacques Cartier Bridge during an afternoon
Average Quebec undergraduate tuition fees were rush hour. They also shut down the Montreal-
less than half the Canadian average of $5,366 in bound ramp of the Champlain Bridge during
2012. As a result, Quebec has higher postgradu- a morning rush hour in March, leading to 100
ate enrollment (9 percent) than other Canadian arrests. On March 22, 200,000 protesters assem-
provinces, and delivers high school’s senior year bled in downtown Montreal. Spectators could fol-
and college’s first year via inexpensive CÉGEP’s low the protests through Facebook, blogs, online
(general/vocational colleges). This system, though videos, Concordia University Television (stream-
praised for resembling European models of ing online), and an Android application.

1047
1048 Quebec, Canada, 2012 Student Protests

The protests resulted in occasional violence, protesters targeted three subway lines with
with injuries suffered by both students and police, smoke bombs. The resulting confusion essen-
and thousands of arrests. In late April, protest- tially crippled parts of the métro and left thou-
ers broke windows, vandalized artworks, and sands of commuters stranded. Four suspects,
triggered fire alarms at Université de Montréal three women and one man, were subsequently
in an attempt to disrupt exams. In response to arrested for the smoke bombings. The four were
the growing violence, FEUQ asked the Broad identified through camera footage, and they
Coalition of the Association for Student Union turned themselves in. In addition to the May 22
Solidarity (CLASSE), representing about half of protests of Bill 78, it was also during this month
the student strikers, to publicly condemn recent that talks between student groups and the gov-
acts of vandalism so that student organizations ernment broke down when two different govern-
could be included in government talks. CLASSE ment proposals to increase tuition 70 percent by
spokesperson and protest leader Gabriel Nadeau- 2020 were rejected.
Dubois stopped short of completely condemning By late May, casseroles (French for “pans”)
violence by reiterating that students had the right protests, where people march while banging
to self-defense against acts of police violence. on pots and pans, were occurring in Montreal
On May 10, 2012, during morning rush regularly at 8:00 p.m. During this time, three
hour, the Montreal Métro was shut down when Twitter hashtags (#ggi, #manifencours, and

Members of the student organization the Broad Coalition of the Association for Student Union Solidarity (CLASSE), which represented
around half of the student strikers during the Quebec students protests of 2012, marching during the massive May 22, 2012,
demonstration marking the 100th day of the protests in Montreal. Crowds of 400,000 to 500,000 people gathered that day, which
some called the largest act of civil disobedience in Canadian history.
Quebec, Canada, 2012 Student Protests 1049

#casserolesencours) produced 700,000 posts in immediately critiqued the law and organized
just a month. Social media prompted students protests on social media.
around the world to march in solidarity, pub- FEUQ president and protest leader Léo Bureau-
licizing the time, place, and location of demon- Blouin, however, became the youngest person (20
strations and debated tuition increases, as well years old) ever to be elected to the Quebec pro-
as discussing Bill 78, Premier Jean Charest, the vincial government under the ruling Parti Que-
police, and journalistic coverage of the events. becois in the fall 2012 election. He subsequently
Also in May, five university newspaper report- received threats and harassment on the Facebook
ers (from Concordia University’s The Link and page he used to communicate with his constitu-
McGill University’s McGill Daily) posted on the ents from individuals upset that he had switched
Montreal Police Department’s Twitter account sides from protester to politician. Also, CLASSE
(@SPVM) to secure their release when they were spokesperson and protest leader Gabriel Nadeau-
mistakenly arrested as protesters, despite hold- Dubois became a media celebrity during the pro-
ing press credentials. tests. He became sought after as a protest advisor,
In June a Montreal blogger known only as Anna conducting an Ontario university tour following
argued that the English Canadian media were the Maple Spring.
less critical of Bill 78 and were less sympathetic Even before September 5, the official end of the
to the plight of the students than their French strike when the government abandoned its origi-
counterparts. Anna believed that limited access nally planned tuition increases, several post-sec-
to French-language media was to blame. She in ondary institutions had already returned to class,
turn used Tumblr to create the site called Trans- some meeting during August and on weekends
lating the Printemps Érable. A dozen volunteers to make up lost time. Despite calls for solidarity
or so, including professional translators, posted during the strike, roughly two-thirds of Quebec
translated French-language reporting, first-person students, including many from McGill Univer-
accounts, videos, and editorials to the site in Eng- sity, remained in class and completed their final
lish. That month, the site registered 60,000 page exams. In spring 2013, Premier Pauline Marois
views from 35,000 unique visitors. A Montreal participated in an education summit before intro-
Web designer bought the domain QuebecProtest. ducing plans to increase tuition 3 percent each
com and donated it to the project. “Maple Spring” year until 2018, prompting students to return to
(printemps érable) sounds like Arab Spring (print- the streets in protest.
emps arabe) in French, plus both are activist move-
ments fueled by social media. Gordon Alley-Young
Early on, protesters argued that Education City University of New York
Minister Line Beauchamp fueled the protests
by dismissing them with a February directive See Also: Activists and Activism, Digital; Arab
for classes to continue, even as additional stu- Spring; Facebook; Piccadilly Riots, London; Seattle
dents voted to strike. Beauchamp’s office was 1999 WTO Protests; Tumblr; Twitter.
subsequently vandalized, and she received death
threats. On May 14, Beauchamp resigned as dep- Further Readings
uty premier and education minister. Beauchamp Earl, Jennifer and Katrina Kimport. Digitally Enabled
stated that her failure to recognize the power Social Change: Activism in the Internet Age.
of social media was her downfall, and that she Cambridge, MA: MIT Press, 2011.
resigned not because of violence, but because Huffington Post Canada. “Quebec Student Protests.”
she was no longer part of the solution. Similarly, http://www.huffingtonpost.ca/news/quebec
the Quebec government was criticized for over- -student-protests (Accessed April 2013).
looking social media. It took the government National Post. “Quebec Student Protests.” http://
four days after Bill 78’s passing to call a press fullcomment.nationalpost.com/tag/quebec-student
conference to defend it, while student protesters -protests (Accessed April 2013).
R
Race/Ethnicity and as online forums, blogs, YouTube, virtual gaming,
and virtual social worlds.
Social Media Social media engagement in politics, entertain-
ment, and issues concerning specific groups has
Early notions around the Internet were to create seen a surge of activity by nonwhites, establish-
a digital utopian society absent of race; however, ing even more variety of online information and
race and ethnicity are ever present in online com- exchange. For instance, the 2008 presidential
munities, and in particular within social media. elections witnessed an increase in communities of
Since social media centers around interactivity color exercising various social media platforms
and the exchange of information, the interests, to engage in political discourse, and the presence
and the identification of its users have become of black, Latino, and Asian bloggers is becoming
integral parts of engagement. With more than half more visible in the blogosphere. Whereas sites like
of Internet users employing some type of social Myspace saw a departure of white users, other
media, preference and practices differ between racial and ethnic groups continue to use the site to
racial and ethnic groups. Race and ethnicity in articulate complex and overlapping interests that
social media is a rapidly growing field, looking at include identity and group belonging. At the same
how specific groups utilize, choose, and appro- time, Myspace still serves as a vehicle to network
priate social networking sites (SNS). Currently, through music via a diverse cultural exchange.
Facebook is the dominating social media in the Furthermore, blacks, Asians, Native Americans,
United States, but Twitter and Myspace have the and Latinos use social media to stay current on
most diverse users. issues in their neighborhoods more than whites.
While Twitter is the second-largest social In sum, social networking illuminates a burgeon-
media employed, Myspace is considered a dwin- ing diversity.
dling SNS; nonetheless, both provide a platform Identity, self-presentation, and mobilization are
where an aggregate articulation of voices can salient themes in race/ethnicity discourse around
interact online. Pinterest, Instagram, and Tum- social media. The United States is comprised of
blr are noted as additional popular social media a large white population and principally oper-
applications, but there are other social network- ates from a white hegemonic cultural, political,
ing sites that garner millions of users that repre- and economic thrust. Although nonwhite popu-
sent an array of racial and ethnic groupings such lations outnumber whites when combined, and

1051
1052 Race/Ethnicity and Social Media

Hispanics alone come close to being the most community. Twitter use by African Americans has
populous racial group, these groups are con- opened public discourse and a growing acceptance
structed and approached as minorities in every around the usage of African American communi-
major institution. Social media allow racial and cation and language. There has been an increase
ethnic groups to establish an online identity pre- of cultural rhetoric found in the oral traditions
scribed by them; they also furnish a space where of African Americans in Twitter text. Also, there
groups can connect and mobilize interests in ways are frequent occurrences of text that defies estab-
that were previously difficult, especially for mar- lished grammar and vocabulary rules that is seen
ginalized populations. Through social media, in African American communication, and is now
racial and ethnic groups have an opportunity to captured in Twitter posts; it is being adopted into
initiate agency while cultivating community and general communication habits.
connecting with group members within relevant Self-presentation centers black participation in
cultural frameworks. social media. On sites such as Facebook, there are
high volumes of self-portraits and pictures docu-
African Americans menting the everyday life of black users. In the
With more than half of black Internet users visit- case of Instagram, an SNS that is employed by
ing a social media site at least once a day, Afri- African Americans more than any other group,
can Americans are shifting the media landscape. the picture presents the personal profile. Photo-
Although African American households are less graphic agency is an important method to con-
likely to own a computer or have Internet access nect to friends and to establish an image that is
at home, and possess fewer chances in accessing user-generated, rather than a mainstream media
public broadband sites in their communities as representation. Belonging and community are
compared to whites, their active participation on recurring themes illustrated among black social
SNSs contributes to complicating ideas around media users. A study by Bun Lee showed that
online agency, accepted forms of communica- African American college students who had Face-
tion, civic engagement, and public presentation. book accounts mainly interacted with other Afri-
Blacks tend to use Twitter more than any other can American friends, with a greater emphasis on
racial group. Research suggests that Twitter is a staying connected to family and associates than
popular medium for African Americans because meeting new friends, promoting a business, or
of its user-friendly and mobile-friendly capabili- using it as a source of entertainment. In addition,
ties. Twitter does not need access to the Internet blacks use online forums catering to their issues
to work; it is accessed via a phone with a text and interests, specifically around being black. In
messaging function. On a cell phone, Twitter terms of black bloggers, they disproportionately
messages are designed in a style similar to that focus on political issues, along with an emphasis
of texting. on encouraging racial group members to mimic
Also, African American Twitter users favor their online civic engagement offline. However,
entertainment and celebrity news, and often relationships are the most popular topic for black
engage in public discourse with notable figures. online forums, followed by a focus on iden-
In some ways, the practice of being involved in tity, heritage, politics, religion/spirituality, and
public discourse regarding famous personalities women, all subsets of collective acceptance and
generates a status that appears intertwined with community building.
celebrity lifestyle; in other ways, it appears to Black SNS users have carved out a niche com-
position members of a marginalized group within munity on YouTube focusing on aesthetics, in par-
a circle of power brokers. Additionally, African ticular, cosmetics and hair care. Black YouTube
American interests are situated within national communities design cultural and relevant topics
and sometimes international dialogue through around the unique composition of skin and tex-
the use of hashtags. Currently, African Ameri- tured hair, especially around grooming hair that
can topics are ranked as some of the top issues, is not chemically processed. Tutorials and vid-
obligating users to notice the critical interests eos that cater to various aspects of beauty from
and aspects of cultural perspectives in the black the perspective of black people, especially black
Race/Ethnicity and Social Media 1053

African American girls at Holmes Elementary School in Liberty City, Miami, work with a laptop computer in January 2012. While there
are lower rates of computer ownership and home Internet access for African American households as compared to whites, African
American Internet users are extremely active on social networking sites, with over half using such sites once a day or more.

women, has led to the creation of an alternative Hispanics/Latinos


forum addressing issues that mainstream fashion Hispanics use social media more than any other
and beauty overlook, and that African American group, and have started to close the gap in the
communities are attempting to resolve. digital divide by becoming increasingly engaged
Perhaps the biggest misperception of black in social media. The average Latino using social
social media participants is the assumption that media is between the ages of 18 and 29, English-
black people are a monolithic group. Although dominant but bilingual, has some college experi-
African Americans are the largest group of the ence or more, and was born in the United States.
black demographic in the United States, ethnic Though their participation shows visible genera-
assemblages use social media to carve out alter- tional gaps, Latinos use social media to integrate
native customized black identities. Black ethnic into American society while preserving ethnic
identity in the United States is an oft-ignored facet heritage and establishing a distinct voice recog-
of black social media users that can explain how nizing multiple ethnic groups. Microblogging and
online identities overlap and sometimes clash. For blogging are avenues that give voice to a popula-
instance, the Cape Verdean community employs tion that exist in physical mass, but still push for
Myspace to create online communities that are more media visibility, political power, and agency.
focused on connecting other Cape Verdeans The celebration of heritage is a critical aspect of
within discourse around identity, especially in a Hispanic people. At the same time, employing
hegemonic culture that clumps them into African tools that strengthen the voices of Hispanics is
American and Latino racial categories. important. Latinos are the second-largest users
1054 Race/Ethnicity and Social Media

of traditional online blogs, and edge out blacks Asian Americans


and whites in Tumblr, a hybrid genre of blogging. Unlike other minority groups, Asian Americans
Tumblr is a social media site allowing users to have the highest adaptation of technology and
share all forms of content, thus making available have gained entry into the digital world. Since a
a platform where the exchange of information significant number of Asian immigrants migrate
is multitextured and provides different layers of from countries with sophisticated technology
experience and understanding. infrastructures, most already participate in an
Blogs provide an arena to articulate the vari- SNS that is indigenous to their country and meets
ous perspectives of Latinos and serve as an exten- the needs of staying connected to language, cul-
sion of Hispanic-centered news. English-speaking ture, and the people. Asian Americans are the
or bilingual Hispanics learn more by blogging or most active in daily social networking, and spend
following blogs, and Hispanic bloggers are likely more time on Facebook than the average Ameri-
to focus on issues of immigration more than any can. A number of members of this demographic
other group. Additionally, blogging is a social belong to another SNS similar to Facebook that is
media that captures the nuances of ethnicity in from their homeland; nonetheless, Asian Ameri-
Latino culture. For example, black Latinos or can females are recorded as spending the most
Afro-Latinos dialogue around race, identity, and time on Facebook. While the self-presentation of
discrimination in their homeland and host coun- other ethnic groups like Indians and Latinos tend
try. These forums concentrate on the experiences to highlight their faces on profile pages, southeast
of black Hispanics in South America while mak- Asians and east Asians who live in the United
ing efforts in fill the gap of Afro-Latino history States de-emphasize their features and present
by sharing historical and current information limited or reserved emotional expressions.
regarding African countries of which members Also, Asian Americans have been identified as
are descendants. Activist and 2008 vice-presiden- visiting and spending more time than any other
tial candidate Rosa Clemente frequently examines group on YouTube. Efforts to obtain celebrity-
her black Puerto Rican identity through blogging. like status are best seen in musical performances.
The blogs provide discourse, looking at how indi- YouTube is also used as a site where east Asian
viduals can obtain multiple group memberships, communities around beauty are explored, espe-
but it also gives outsiders a purview into ignored cially in the area of cosmetics, fashion, and cos-
populations in the United States. metic surgery. On the other hand, Indian women
Hispanics are the second-largest users of Twit- use YouTube for hair care; much like African
ter and Instagram, and are more likely to use American women, it is SNS fusing ethnic-specific
Twitter, Myspace, and Facebook for individual information around body imaging.
recreational purposes. However, political activism Navigating and negotiating identity and
and awareness is intertwined in their daily lives; belonging in the United States is one of the main
therefore, these SNSs are used to mobilize around topics of online forums for Asian migrants. These
critical community health problems and politi- niche SNSs are used as support systems. Indian
cal issues. Unlike African Americans, most Lati- diasporas create virtual communities that operate
nos are connected to other countries; therefore, like online families, providing kinship and rein-
they participate in transnational engagements forcement. Also, there are numerous social media
through social media that help maintain fam- support groups for Korean and Chinese wives
ily ties and friendships across borders. Spanish- who migrate with their spouses to new terrain,
language media play a critical role in the lives of and work through daily life challenges of cultural
Latinos; however, the young Hispanic population and language barriers. However, there are seg-
in the United States is beginning to rely on wire- ments of the Asian American population that do
less devices for Internet, radio, film, and television not fit into the template of tech fitness. Overall,
content. Consequently, traditional media such as the heterogeneous demographic is homogenized
magazines, print news, radio, and television make in America, making negotiation even more diffi-
use of interactive sites to establish a multimedia cult, but at the same time validating the necessity
platform, plus recruit and retain consumers. of social media.
Race/Ethnicity and Social Media 1055

Native Americans The native gaming industry also galvanizes Indian


Native Americans are among one of the last casino owners through its Facebook organiza-
demographics in the United States to garner tional pages, while individual casinos advertise to
Internet access, yet native nations work for inclu- non-natives about casino activities such as con-
sion in the digital world and actively engage in certs and gaming promotions.
social media by using it as a tool to strengthen Video-sharing and radio streaming have been
tribal community, preserve and disseminate First the most salient social media used by First Nation
Nation cultures, and ultimately develop native communities. Over half of Native American Inter-
nations. Social networking activity among Native net users watch videos on video-sharing sites such
Americans focuses on tribal communication, as YouTube or Google Share. Streaming music
community engagement, and the ability to main- is used as a way to exchange music while edu-
tain inter- and intra-tribal connections. Addition- cating and preserving native cultures that are in
ally, social media is used to provide Native Ameri- some cases vulnerable to becoming extinct. Rez-
can representation to mainstream America that is Kast is a popular video-sharing media known as
both favorable and contemporary. There are over the Native YouTube. On one hand, traditional
500 tribes living on sovereign territories that make music and cultural videos are shared; while on the
up a population of three million native people in other, modern images, music, and videos provide
the United States. On most tribal lands, it is dif- outside communities representations of current
ficult and costly to acquire access to broadband, native peoples in efforts to minimize an American
resulting in less than 10 percent of the population hegemonic imagination that depicts Native Amer-
accessing the Internet. ican people in outdated and racist frames. Native
Since the beginning of the new millennium, Americans use YouTube as a format to provide
there have been concerted efforts to build a tribal- alternative depictions of native people. Often,
centric technology infrastructure. Once the Inter- there is a focus on traditional images of Native
net was put into place, Native Americans imme- Americans in tribal clothes and participating in
diately became engaged in the digital world and traditional ceremonies; however, the use of You-
social media. Native Americans blog, podcast, Tube puts Native Americans in a contemporary
and employ social media sites such as Facebook, setting, and allows YouTube users to engage in
LinkedIn, and Twitter, but most usage is seen on discourse around current issues that are impor-
radio-streaming and video sharing. tant to tribal nations.
Tribal Web sites are used to keep Native Amer-
icans informed of tribe-specific activities, festi- Kaia Shivers
vals, trade shows, and Native American news. Rutgers, The State University of New Jersey
They operate as social network portals, serving
as a resource and site to gather and exchange See Also: Diaspora/Migration; Identity Politics;
information. These sites are used to disseminate Immigration; Social Media, Adoption of.
information such as event postings and coverage,
job announcements, and health and safety advi- Further Readings
sories. Some tribal sites blog, podcast, or provide Ahn, June. “Digital Divides and Social Network Sites:
music streaming, though it is not common. There Which Students Participate in Social Media?”
are only two online radio stations that provide Journal of Educational Computing Research,
radio streaming on an interactive platform, but v.45/2 (2011).
they have limited broadcasting capabilities. Also, Brock, André. “From the Blackhand Side: Twitter as
Facebook is an avenue used by tribal councils a Cultural Conversation.” Journal of Broadcasting
and Native American organizations. Pages that & Electronic Media, v.56/4 (2012).
have been established by various tribes connect Graziano, Teresa. “The Tunisian Diaspora: Between
members and supporters around current news ‘Digital Riots’ and Web Activism.” Social Science
and issues. In addition, Facebook is used as a site Information, v.51/4 (2012).
to announce political activities and advocate for Hargittai, Eszter and Eden Litt. “The Tweet Smell of
the protection of native peoples and their lands. Celebrity Success: Explaining Variation in Twitter
1056 Radical Decentralization

Adoption Among a Diverse Group of Young encompassing the social, political, and business
Adults.” New Media & Society, v.13/5 (2011). dimensions of its operations. The “radical” ele-
Lee, E. Bun. “Young, Black, and Connected Facebook ment of decentralization in this model expresses
Usage Among African American College Students.” the extension of this concept into every aspect of
Journal of Black Studies, v.43/3 (2012). the organization, rather than a claim to radical
Pennington-Gray, Lori, Kiki Kaplanidou, and Ashley social critique that has characterized earlier left-
Schroeder. “Drivers of Social Media Use Among ist movements, from Marxian to anarchist and
African Americans in the Event of a Crisis.” agrarian collectives. This willingness to integrate
Natural Hazards, v.66/1 (2013). business models and work within a state-oriented
politics (as opposed to models based on social rev-
olution) is one of the reasons for the wide appeal
of MoveOn and its ability to use social media to
integrate members from across the United States
Radical for concentrated and delimited projects aiming to
shift state policy.
Decentralization In The MoveOn Effect (2012), David Karpf
calls MoveOn a “networked hybrid of organiza-
In keeping with its roots in pluralism, radical tional practices” that uses a variety of Internet-
decentralization is not defined by a single histori- based strategies to bring disparate and nonpartici-
cal moment, political movement, or author. Fre- patory citizens into effective political movements.
quently linked to different, often incompatible The decentralized structure of MoveOn keeps its
aspects of current political, social, and technolog- operational costs low, allowing participants who
ical context, radical decentralization has been put rarely donate to larger, more centralized political
to use by a remarkably broad spectrum of move- organizations to become involved through small,
ments and theories. From leftist political organi- sporadic donations. The consistency between
zations in South America and the Occupy Move- these fundraising practices and MoveOn’s Inter-
ment to charter school reform and the Tea Party, net outreach has brought radical decentraliza-
and even extending into business and marketing tion to the fore as a key concept in discussions
strategies, there are few contemporary move- of political policy and activism. As a hybrid
ments that fail to make reference to the notion network, MoveOn exemplifies one of the most
of decentralized, community-based strategies of potent aspects of media-based politics because it
organization. As a political term, decentraliza- illustrates some of the most effective strategies for
tion is most often understood in opposition to changing the criteria of participation while multi-
the standardization and hierarchical organization plying avenues for self-empowerment.
that has been increasingly associated with multi-
national corporations and the global market. All Beyond MoveOn
of the recent uses of decentralization are rooted The concept of radical decentralization has roots
in the new ecology of social media and its poten- in Euro-American culture, extending back to a
tial to replace such top-down political and social period before MoveOn and what Victoria Carty
structures with a mass-based local framework. has called “cyberactivism.” The broader context
MoveOn is one of the most important contem- of MoveOn’s commitment to decentralization
porary illustrations of this integration of politics comes out of series of debates in the late 20th cen-
and social media into an effective decentralized tury by influential social theorists such as Jurgen
collectivity based on the widening latitude of Habermas, Chantal Mouffe, and Ernesto Laclau.
technological communication. In an operational These debates centered on the role of the social
statement (“The Way We Work”) credited to sphere, in contrast to the political or private
cofounder Wes Boyd, MoveOn claims that it is an spheres. Various elements of radical decentraliza-
“experiment in radical decentralization.” As a key tion come into play in these discussions as part of a
tenet of its organizational model, decentraliza- larger set of strategies concerned with the waning
tion extends to every part of MoveOn’s process, of “communicative action.” As Habermas argues,
Radical Decentralization 1057

the contemporary period is characterized by the decentralization can thus be understood as a set
loss of action-oriented communication in a social of tactics that try to harness some of these ele-
milieu that would allow groups to form around ments of complexity for focused political ends.
issues and effectively act according to those
responses. Social media have had a direct impact Political Action
on the creation of a commons in which commu- Faced with a growing symmetry between gov-
nicative action might be possible again, but it is ernmental organizations and global corporate
not yet clear how the very notion of the commons interests, many activists have turned to local and
will in turn change as a result. MoveOn signals autonomous strategies based on radical decentral-
one possible route, and other unpredictable real- ization and the strategies of complexity theory. In
izations of new social community, like the radical the Americas, movements such as the Zapatistas
movements connected to the Arab Spring and the and Abya Yala have redefined radicalism as an
Occupy Movement, will also likely continue to attachment to the land and the local community
emerge. Part of this unpredictability comes from while embracing the use of social media to com-
the other sense of “radical” implicit in the decen- municate and coordinate action, both loca

S-ar putea să vă placă și