skip to main content
10.1145/1556460.1556481acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesc-n-tConference Proceedingsconference-collections
research-article

And the ringleaders were banned: an examination of protest in virtual worlds

Published:25 June 2009Publication History

ABSTRACT

Protest has made the jump between the offline and the online spaces and is frequently used in most virtual worlds available today. Despite the frequency of these protest actions in virtual worlds, and their similarities to offline protest actions, further research is needed to see how the adaptation to a virtual environment changes the protest. This research uses case studies to examine several major protest actions that have occurred in several different virtual worlds over the last 10 years. The author finds that the use of the technology in virtual world enables very different methods of protest. She makes the argument that these differences are large enough that they require a deeper exploration and grounding in theoretical models for the field to grow into its potential.

References

  1. Bartle, R. (1996). Hearts, Clubs, Diamonds, Spades: Players Who Suit MUDs. Journal of MUD Research. 1(1).Google ScholarGoogle Scholar
  2. Blickstein, S., and Hanson, S. (2001). Critical Mass: Forging a Politics of Sustainable Mobility in the Information Age. Transportation, 28, 347--362.Google ScholarGoogle ScholarCross RefCross Ref
  3. Blizzard Entertainment. (2008). "World of Warcraft Reaches New Milestone: 10 Million Subscribers". blizzard.com. Retrieved January 22, 2008 from: http://www.blizzard.com/us/press/080122.htmlGoogle ScholarGoogle Scholar
  4. Brunsting, S., and Postmes, T. (2002). Social Movement Participation in the Digital Age: Predicting Offline and Online Collective Action. Small Group Research, 33, 525--554.Google ScholarGoogle ScholarCross RefCross Ref
  5. Bub, A. S. (2002). Computer Role-Playing Games -- Part III: Massively Multiplayer Madness. GameSpy.com. Retrieved December 18, 2007, from: http://archive.gamespy.com/articles/april02/rpgweek/rpg3/Google ScholarGoogle Scholar
  6. Clarks, J., and Thermado, N. (2005). Linking the Web and the Street: Internet-Based "Dotcauses" and the "Anti-Globalization" Movement. World Development, 34, 50--74.Google ScholarGoogle ScholarCross RefCross Ref
  7. Curtis, P., and Nichols, D. (1994). MUDs Grow Up: Social Virtual Reality in the Real World. from the Proceedings of the 1994 IEEE Computer Conference, 193 -- 200.Google ScholarGoogle Scholar
  8. Day, G. (2001). Online Games: Crafting Persistent--State Worlds. IEEE Computer, 34, 111--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Dibbell, J. (1993). "A Rape in Cyberspace." The Village Voice. 21 Dec 1993Google ScholarGoogle Scholar
  10. Ducheneaut, N., Moore, R. (2004a). The Social Side of Gaming: a Study of Interaction Patterns in a Massively Multiplayer Online Game. from the Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work: 360--369. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Earl, J. (2006). Pursuing Social Change Online: The Use of Four Protest Tactics on the Internet. Social Science Computer Review, 24, 362.Google ScholarGoogle ScholarCross RefCross Ref
  12. Granovetter, M. (1982). The Strength of Weak Ties: A Network Theory Revisited. in P.V. Marsden and N. Lin's (Eds.) Social Structure and Network Analysis, 105--130. Beverly Hills: Sage.Google ScholarGoogle Scholar
  13. Klastrup, Lisbeth (2002): "Interaction Forms, Agents and Tellable Events in EverQuest".Fromthe Proceeding of the 2002 CGDC Conference (ed. Frans Mäyrä), Tampere University Press, Tampere.Google ScholarGoogle Scholar
  14. Kolo, C.&Baur, T. (2004). Living a Virtual Life: Social Dynamics of Online Gaming. The International Journal of Computer Game Research, 4(1).Google ScholarGoogle Scholar
  15. Kreimer, Seth F. (2001) Technologies of Protest: Insurgent Social Movements and the First Amendment in the Era of the Internet. University of Pennsylvania Law Review, 150, 119--171.Google ScholarGoogle ScholarCross RefCross Ref
  16. Krzywinska, T. (2006). "Blood Scythes, Festivals, Quests, and Backstories: World Creation and Rhetoric of Myth in World of Warcraft." Games and Culture, 1, 383--396.Google ScholarGoogle ScholarCross RefCross Ref
  17. Langman, Lauren. (2005). From Virtual Public Spheres to Global Justice: A Critical Theory of Internetworked Social Movement. Sociological Theory, 23, 42--74.Google ScholarGoogle ScholarCross RefCross Ref
  18. Leizerov, S. (2000) Privacy Advocacy Groups Versus Intel: a Case Study of How Social Movements are Tactically Using the Internet to Fight Corporations: Social Science Protest in an Information Society. Computer Review, 18, 461--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Nah, S., Veenstra, A., Shah, D. (2006). The Internet and Anti-war Activism: A Case Study of Information, Expression, and Action. Journal of Computer-Mediated Communication, 12.Google ScholarGoogle ScholarCross RefCross Ref
  20. Peckham, M. (1998) New Dimensions of Social Movement/Countermovement Interaction: The Case of Scientology and its Internet Critics. Canadian Journal of Sociology Online, 23: 317--47.Google ScholarGoogle ScholarCross RefCross Ref
  21. Postmes, T., and Brunsting, S. (2002). Collective Action in the Age of the Internet: Mass Communication and Online Mobilization. Social Science Computer Review, 20, 290. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Riemer, J. (2003) Grass-Roots Power Through Internet Technology--The Case of the Crandon Mine. Society&Natural Resources, 16, 853 -- 868.Google ScholarGoogle Scholar
  23. Russell, A. (2005). Myth and the Zapatista movement: exploring a network identity. New Media&Society, 7, 559--577.Google ScholarGoogle Scholar
  24. Schussman, A., and Earl, A. (2004). From Barricades to Firewalls? Strategic Voting and Social Movement Leadership in the Internet Age. Sociological Inquiry 74, 439--463.Google ScholarGoogle ScholarCross RefCross Ref
  25. Seay, A., Jerome, W., and Lee, K. (2002). Supporting Group Activity in MMORPGs with CSCW Techniques. Retrieved December 18, 2007 from: http://www.cs.cmu.edu/~sangl/papers/MMORPG-cscw-tools.pdfGoogle ScholarGoogle Scholar
  26. Seay, A., Jerome, W., Lee, K., and Kraut, R. (2004). Project Massive: a Study of Online Gaming Communities. From the Proceeding of the 2004 Conference on Computer Human Interaction: Extended Abstracts on Human factors in Computing Systems. Vienna, Austria. April 24 -- 29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Utz, S. (2000). Social Information Processing in MUDs: The Development of Friendships in Virtual Worlds. Journal of Online Behavior, 1.Google ScholarGoogle Scholar
  28. Wall, M. (2007). Social Movements and Email: Expressions of Online Identity in the Globalization Protests. New Media&Society, 9, 258 -- 277.Google ScholarGoogle Scholar
  29. Yee, N. (2002). "Facets: 5 Motivational Factors for Why People Play MMORPG's." The Daedalus Project. Retrieved November 08, 2008 from: http://www.nickyee.com/facets/home.htmlGoogle ScholarGoogle Scholar
  30. Yee, N. (2006a). The Demographics, Motivations, and Derived Experiences of Users of Massively Multi-User Online Graphical Environments. Presence-Teleoperators and Virtual Environments, 15, 309--329. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Yee, N. (2006b). The Psychology of MMORPGs: Emotional Investment, Motivations, Relationship Formation, and Problematic Usage. In R. Schroeder&A. Axelsson (Eds.), Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments. pgs. 187--207. London, UK: Springer-Verlag.Google ScholarGoogle Scholar
  32. Yee, N., Bailenson, J., Urbanek, M., Chang, F., and Merget, D. (2007). The Unbearable Likeness of Being Digital: The Persistence of Nonverbal Social Norms in Online Virtual Environments. CyberPsychology&Behavior, 10, 115 -- 121.Google ScholarGoogle Scholar
  33. McCaughey, M., and Ayers, M (Eds.)(2003). Cyberactivism: Online Activism in Theory and Practice. New York, NY: Routledge. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Baringhorst, S. (2009). Political Campaigning -- Typological and Historical Approaches, in: Baringhorst, S, Kneip, V., and Niesyto, J. (Eds.): Political Campaigning on the Web, Bielefeld: Transcript, 9--30.Google ScholarGoogle ScholarCross RefCross Ref
  35. Bennett, L.W. (2004) Communicating Global Activism. Strengths and Vulnerabilities of Networked Politics, in W. van de Donk et al. (eds) Cyberprotest. New Media, Citizens and Social Movements, New York, NY: Routledge, 123--146.Google ScholarGoogle Scholar
  36. Saeed, S., Rohde, M. and Wulf, V. (2008b) ICTs, An alternative sphere for Social Movements in Pakistan: A Research Framework. Paper Presented at IADIS international conference on E-Society. April 9--12, 2008. Algarve, Portugal.Google ScholarGoogle Scholar
  37. Lusoli, W., Ward, S. (2005). Hunting Protestors: Mobilisation, Participation, and Protest Online in the Countryside Alliance, in Oates, S, Owen, D&Gibson RK. (Eds.). The Internet and Politics: Citizens, Voters and Activists. New York: Routledge.Google ScholarGoogle Scholar
  38. Neumayer, C., Raffl, C. (2008). Facebook for Protest? The Value of Social Software for Political Activism in the Anti-FARC Rallies. In: DigiActive Research Series, December 2008Google ScholarGoogle Scholar

Index Terms

  1. And the ringleaders were banned: an examination of protest in virtual worlds

          Recommendations

          Reviews

          William Edward Mihalo

          Blodgett examines three protest situations that took place in virtual worlds. The first involved a stress test and demo in Ultima Online . An invincible character, Lord British, representing the head of Ultima Online , was given a tour of the online world while the site was being beta tested. A character in the crowd of onlookers had disguised himself as a chicken and managed to steal a fire field spell from one of the onlookers. The chicken then tossed the spell in the direction of Lord British. The spell missed, but the person who was controlling Lord British decided to walk into the fire field to show his invincibility. Unfortunately, the person controlling Lord British forgot to reset the invincibility flag and the character died instantly when he entered the fire field. A week after the assassination, the person who disguised himself as a chicken was banned from the game for failing to report the ability to change into a chicken. The second involved a real-world labor strike that was taken into Second Life . The strike appeared in Second Life along with counter-protesters from a union watchdog group. The strike was successful for the labor union that implemented it in Second Life . There was little retribution against the people involved in the strike. Rather, retribution went against the people in management who allowed the strike to reach the point where it went into Second Life . The third involved online corruption within the EVE Online environment. The dispute escalated to a point where it was picked up by The New York Times . Although Blodgett's paper is interesting and humorous, it is difficult to follow, due to some weak editing. There are numerous grammatical and typographical errors, which should have been corrected prior to publication. Online Computing Reviews Service

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            C&T '09: Proceedings of the fourth international conference on Communities and technologies
            June 2009
            306 pages
            ISBN:9781605587134
            DOI:10.1145/1556460
            • General Chair:
            • John M. Carroll

            Copyright © 2009 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 25 June 2009

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate80of183submissions,44%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader