Online harassment is on the rise, according to a recent Pew Research Center study. While that may not seem surprising — since even the president of the United States regularly engages in it — researchers are, nevertheless, perplexed, given the many widespread efforts to combat the phenomenon.
An examination of these efforts, which have been the subject of several books in recent years, may yield a better understanding of not only what’s working and not working, but also what’s missing — namely an approach that relies more on individual and collective empowerment, as opposed to legal and police action.
Online harassment as a crime
Danielle Keats Citron’s 2014 book “Hate Crimes in Cyberspace” is a comprehensive account of online harassment directed at women. Citron uses three case studies to illustrate the seriousness and seeming intractability of the problem. In one case, a woman was targeted by various anonymous individuals, perhaps including her university classmates, who spread horrendous lies about her, sending them to family, friends, her teachers and later her employers. The harassment continued for years.
A key theme in “Hate Crimes in Cyberspace” involves comparisons with sexual harassment and domestic violence. Decades ago, these were not seen as issues of importance. Sexual harassment was seen as something women at work just had to accept, and likewise domestic violence was invisible as a social issue. Then along came the feminist movement. Sexual harassment and domestic violence were given names, stigmatized as wrong and even contemptible, and criminalized by the passing of laws.
Citron says cyber harassment should be treated the same way. In all three forms of abuse, women and men can be victims, but women are much more likely to be targeted.
Citron is a lawyer with extensive experience with abuse online. She devotes considerable attention to legal remedies, but the overall message is that they are inadequate even when they can be brought to bear. Another avenue for redress is via complaint mechanisms provided by service providers. However, in many cases, harassers are anonymous and change their online identities. For example, on Twitter it’s possible to set up a new account within minutes, so shutting down the account of an abuser may provide only temporary relief.
Some targets of abuse go to the police, but this is usually disappointing, as many police do not understand the online world. For example, they fail to appreciate the importance of Twitter for some women’s work and how harassers can abuse the service. Police may suggest going offline to avoid the abuse, but this is unrealistic in an online world. It is like suggesting never going outside because of the risk of assault.
The misogyny of online abuse
Emma Jane is an academic at the University of New South Wales, in Sydney, where she researches online harassment of women. Before this, for two decades she was a well-known media commentator under the name Emma Tom. Before the internet, she and other female figures in the media were used to receiving hostile written letters. But something changed in the 1990s after she started adding her email address at the bottom of her newspaper columns. The abuse she received in response to her columns became more insistent, graphic and voluminous. She started saving all this abuse, not knowing what to make of it.
In her research, inspired by her own experience and based on interviews and other evidence, she is quite clear that online harassment targeted at women is intended to tear them down and drive them off the internet. She has written several academic articles about the phenomenon and a 2017 book titled “Misogyny Online: A Short (and Brutish) History.”
Jane addresses the frequency of online abuse, its gendered features, the weakness of the rationales for doing it, the terrible consequences for targets and the failure of institutional channels to address it. She terms the inadequacy of police and service providers to address abuse as an “epic fail” — Jane has a delightful turn of phrase and manner of plain-speaking.
Unlike most other commentators, Jane gives many examples of some of the worst abuse received by women. That is why the subtitle of her book refers to a “brutish” history: to read examples of abuse can be disturbing even when you are not the target. By presenting graphic examples, Jane challenges the usual dismissals of this form of harassment as just a normal part of the internet. To get a feeling for the sort of abusive messages women receive, visit Random Rape Threat Generator (note: this is explicit and confronting).
Jane also gives special attention to academic work in the area, castigating scholars for not addressing an important topic or, when they do, not taking the abuse seriously. For example, incorporating rape and death threats in the category of “trolling” reduces their seriousness.
The problem with rationalizing abuse
Bailey Poland is a writer and editor who became interested in cybersexism and wrote the book “Haters: Harassment, Abuse and Violence Online” published in 2016. It is a comprehensive, scholarly treatment. Poland learned about the problem in part through her own experiences of coming under attack. She recounts the stories of many other women harassed online.
Some cases have become notorious, most prominently what is known as Gamergate. Zoe Quinn, a game developer, was abused online and openly complained about it. This led to a huge increase in abuse and threats, in turn triggering a countermovement. Gaming is highly male dominated, and women working in the field are regular targets.
Poland takes aim at the many justifications for cyber harassment and at the advice regularly given to women. One often-repeated mantra is “Don’t feed the trolls.” This assumes that trolling is the problem, but trolling is not an accurate description of rape and death threats. Not feeding the trolls means not replying to abusers, on the assumption that they get their kicks by seeing their target squirm: without replies, they should tire of the game and give up. The problem with this advice is that it doesn’t work. The attackers continue as long as their target is online, and may escalate by sending abuse, threats, and derogatory comments to family members and employers.
(For insights about trolling, see Whitney Phillips’ book “This Is Why We Can’t Have Nice Things.” Phillips argues that trolling can’t be addressed on its own because it draws its energy from damaging behaviors in mainstream culture.)
One of the rationalizations for abuse is that “everyone gets harassed.” In other words, women shouldn’t complain because men are harassed too and, anyway, it’s just part of the way the internet works. Poland reports on studies showing that although many people are harassed, women are harassed far more, and furthermore much of the abuse aimed at them is specifically about gender.
Another regular piece of advice is to block the harassers. This is all very well, but is not protection from the harmful effects of abuse. When damaging claims are posted online, they can hinder a woman’s job prospects, because employers often do a Google search on the names of prospective employees. Blocking harassers also takes time; some of them create several new identities every day.
Harassers cloak their actions in the righteous mantle of free speech. In their eyes, it seems, sending unsolicited derogatory comments is an exercise of free speech, and to protest against such messages is an intolerable restraint. Setting aside the fact that rape and death threats are not legally protected speech, one of the consequences of online abuse is the silencing of targets. Indeed, silencing women seems to be the purpose of much of the abuse. This is a serious restraint on their own free speech. If the goal is a public forum where people can express their views, then moderation and respect for others are crucial.
To get a handle on how to respond to cyber harassment, Poland turns to a perspective developed by feminists in the early days of the internet, called cyber feminism. Some women use privacy settings for protection. Groups of women have set up closed online networks for sharing information, including about harassers. A few, for example Lindsay Bottos, use art to challenge online harassment.
But the burden of responding to online abuse should not rest only on women. Poland cites work by Leigh Alexander on what men can do. The first step is to not engage in cyber harassment themselves. Men can also provide one-on-one support for targeted women, focusing on a woman’s work (not just the harassment) and intervening online to draw attention away from the target.
Poland usefully refers to the activism of several U.S. groups, including Working to Halt Online Abuse, End to Cyber Bullying, Crash Override Network and HeartMob.
The psychology of abusers
Citron, Jane and Poland cite studies about typical perpetrators, but it seems to me that more could be done to understand what drives them. It is not sufficient to look at the effects of their harassment (namely, women driven off online spaces) and assume that is why perpetrators do it. Roy Baumeister, in his book “Evil: Understanding Human Violence and Cruelty,” looked at what is known about the psychology of Nazi camp guards, serial killers, and other perpetrators and concluded that usually they feel justified in their actions, feel they are the real victims, and do not think the consequences of their actions are very significant. If the same analysis applied to perpetrators of online harassment, it implies they do not think sending rape and death threats to women is a big deal and that their targets deserve what they get. This is not far from the usual rationales provided.
But why are women targets? One explanation is based on the psychological process of projection, in which a person unconsciously rejects a part of their self or behavior and attributes it to others. For example, a man might reject his own attraction to other men, fearing it, project it on to gay men and sometimes attack them.
All people have, as part of their personalities, both masculine and feminine aspects. Some men may not want to recognize their feminine side. Instead, they project it onto others, onto women, naturally enough, and then try to destroy it. In this picture, powerful and prominent women would be the most likely targets. This perspective seems compatible with a perpetrator pattern called DARVO — deny, attack, reverse victim and offender — in which perpetrators deny their own abuse, blame it on the target and say, when they are criticized, that they are actually the ones being abused.
The point of gaining a deeper understanding of the psychology of abusers is to come up with more effective responses.
Insights from nonviolent action
In acting against online abuse, what can be learned from the theory and practice of nonviolent action? This is not straightforward, because nonviolent action most commonly involves collective action in public spaces against identifiable opponents. Cyberabuse typically targets individuals, often in private spaces, and many attackers are anonymous. Nevertheless, several of the key features of effective nonviolent action — non-standard, limited harm, participation, voluntary participation, fairness, prefiguration and skillful use — are relevant to countering cyberharassment.
The most commonly recommended response to online abuse is to report it to authorities, something each of the three authors find is usually unhelpful. A nonviolence-inspired response needs to be something else, something non-standard.
In effective nonviolent action, actionists try to limit the harm to their opponent. In cyberspace, this means not using abuse to counter abuse. It seems that few targets do this anyway. When they do, it is often counterproductive, as would be expected from nonviolence theory.
In nonviolent action, a high level of participation greatly increases effectiveness. Methods such as strikes, boycotts and rallies enable many people to participate regardless of age, sex and ability. In the online environment, the implication is to choose methods of resistance that enable greater participation. A first step is for targeted women (and men) to join together with allies to formulate a collective response. This might be making supportive comments, challenging ISPs that allow abuse and developing campaigns that allow safe participation.
One of the benefits of greater participation in nonviolent action, especially when people with varied backgrounds and experiences are involved, is more ideas about responding and more innovation in techniques. This suggests that campaigners against online misogyny should attempt to involve diverse sectors of the population, for example men as well as women, old and young, different social classes, social media newbies, as well as digital natives, and people from different cultural backgrounds. Especially important is building support among people who would not normally be interested in the social media platforms where abuse often occurs.
Taking the issue to broader sectors of the population has the prospect of getting to friends (online and off), neighbors, parents and children of abusers. This is the same broadening of concern that has been effective in stigmatizing sexual harassment offline.
Another important facet of effective nonviolent action is skillful use of methods. Responding to abusers needs to be done well, based on assessments of the psychology of the attacker, audiences, the likelihood of others joining in the abuse or opposing it and other factors. Developing skills requires guidance and practice. The implication is that targets of abuse need to reach out to others, gain support and, in particular, get help in improving responses. By improving skills in judging the motivations, intent, and psychological weaknesses of harassers, targets should be better able to judge whether to make a polite response, to not respond, to ask for personal assistance or to seek help in mounting a campaign. Similarly, skills can make a big difference when making a response to abusers, finding supporters and campaigning.
All too often, targets feel isolated and humiliated and attempt to deal with the situation on their own. Reaching out to others, and others being willing and able to help, are crucial for mobilizing support and for making better choices and responses.
The implications of ideas from nonviolent action for challenging online abuse seem, at one level, all too obvious: Get more people involved, including from different backgrounds; learn and practice skills; and work cooperatively to develop responses and campaigns. Yet, at another level, these implications are not obvious at all, given the continual attention to addressing the problem through laws and actions by police, ISPs and other officials. Rather than looking for authorities to provide protection, it may be more effective to aim at individual and collective empowerment.
Source: Waging Nonviolence