Advertisement

A Villain’s Guide to Social Media and Interactive Digital Storytelling

  • Mark BernsteinEmail author
  • Clare Hooper
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11318)

Abstract

If we have not yet achieved planetary super-villainy on the desktop, it may be feasible to fit it into a suburban office suite. The familiar perils of fiction and deceit can now be augmented by mass customization, allowing powerful malefactors to shape perceived reality to suit their preferences. Social media permit the modern villain to deploy traditional cruelties to great and surprising effect. Interactive digital storytelling lets us exploit weakness and illness for profit and help us normalize wickedness. Because the impact of villainous techniques is radically asymmetric, our fetid plots are difficult and costly to foil.

Keywords

Hypertext New media Literature Fiction Implementation History of computing Politics Villainy 

Notes

Acknowledgments

This is a satire. Don’t try this at home. The works cited here are not villainous. We thank David E. Millard, Charlie Hargood, Dr. Fionnbar Lenihan and Robert A. Sullivan for helpful conversations on related topics. Of course, none of them are in any way responsible for this villainous paper.

References

  1. 1.
    Ammann, R.: Jorn barger, the newspage network and the emergence of the weblog community. In: Proceedings of the 20th ACM Conference on Hypertext and Hypermedia. HT 2009, pp. 279–288 (2009)Google Scholar
  2. 2.
    Backstrom, L., Dworkin, C., Kleinberg, J.: Wherefore art thou R3579x?: Anonymized social networks, hidden patterns, and structural steganography. Commun. ACM 54(12), 133–141 (2011)CrossRefGoogle Scholar
  3. 3.
    Backstrom, L., Kleinberg, J.: Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on Facebook. In: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW 2014, pp. 831–841 (2014)Google Scholar
  4. 4.
    Johnson, B.: The Short Life of Kaycee Nicole. The Guardian (2001)Google Scholar
  5. 5.
    Chen, A.: The Agency. New York Times Mag. (2015)Google Scholar
  6. 6.
    Clarke, A.C.: The Nine Billion Names of God; the Best Short Stories of Arthur C. Clarke. Harcourt, Brace & World (1967)Google Scholar
  7. 7.
    Derakhshan, H.: Killing the hyperlink, killing the web: the shift from library-internet to television-internet. In: Proceedings of the 27th ACM Conference on Hypertext and Social Media, HT 2016, p. 3 (2016)Google Scholar
  8. 8.
    Dick, P.K.: The Minority Report: and Other Classic Stories. Citadel Press (2016)Google Scholar
  9. 9.
    Dickens, C.: The Adventures of Oliver Twist. Fields, Osgood & Co (1870)Google Scholar
  10. 10.
    Edwards, M., Peersman, C., Rashid, A.: Scamming the scammers: towards automatic detection of persuasion in advance fee frauds. In: Proceedings of the 26th International Conference on World Wide Web Companion, WWW 2017 Companion, pp. 1291–1299 (2017)Google Scholar
  11. 11.
    Hamilton, D.: The thinking machine. In: King, L.R., et al. (eds.) Echoes of Sherlock Holmes: Stories Inspired By The Holmes Canon. Pegasus Books (2016)Google Scholar
  12. 12.
    Hern, A.: Fitness Tracking App Strava Gives Away Location of Secret US Army Bases. The Guardian (2018)Google Scholar
  13. 13.
    Huang, Q., Singh, V.K., Atrey, P.K.: Cyber bullying detection using social and textual analysis. In: Proceedings of the 3rd International Workshop on Socially-Aware Multimedia, SAM 2014, pp. 3–6 (2014)Google Scholar
  14. 14.
    Le Carré, J.: Smiley’s People. Knopf (1980)Google Scholar
  15. 15.
    Rizoiu, M.-A., Xie, L., Caetano, T., Cebrian, M.: Evolution of privacy loss. In: Wikipedia Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, WSDM 2016, pp. 215–224 (2016)Google Scholar
  16. 16.
    Shelley, M.W.: Frankenstein, or, the Modern Prometheus. Modern Library (1984)Google Scholar
  17. 17.
    Sofia El Amine, S.B., Saad, S., Tesfa, A., Varin, C.: Infowar in Syria: the web between liberation and repression. Web Science 2012 (2012)Google Scholar
  18. 18.
    Stross, C.: The Jennifer Morgue. Golden Gryphon Press (2006)Google Scholar
  19. 19.
    Mueller, R.S.: Indictment: United States of America vs. Viktor Borisovich Netyksho et al., U. S. District Court for the District of Columbia, 13 July 2018Google Scholar
  20. 20.
    Czege, P.: My Life With Master. Half-Meme Press (2003)Google Scholar
  21. 21.
    Timberg, C., Harwell, D.: We studied thousands of anonymous posts about the Parkland attack—and found a conspiracy in the making. The Washington Post, 28 February 2018Google Scholar
  22. 22.
    Reeves, B., Nass, C.: The Media Equation - How People Treat Computers, Television, and New Media Like Real People and Places. Cambridge University Press, Cambridge (1996)Google Scholar
  23. 23.
    DiFranzo, D., Taylor, S.H., et al.: Upstanding by design: bystander intervention in cyberbullying. In: CHI 18, Montréal, 21–26 April 2018Google Scholar
  24. 24.
    Brignull, H.: Types of Dark Patterns. https://darkpatterns.org/types-of-dark-pattern
  25. 25.
    Vosoughi, S., Roy, D., Aral, S.: The spread of true and false news online. Science, 1146–1151 (2018)CrossRefGoogle Scholar
  26. 26.
    Ramachandran, A., Wang, L.: Chaintreau dynamics and prediction of clicks on news from Twitter. In: Sastry, N., Weber, I. (eds.) Proceedings of the 29th on Hypertext and Social Media, HT 2018, pp. 210–214 (2018)Google Scholar
  27. 27.
    Nagy, G.: A Cretan Odyssey, Part 1. Classical Inquiries Studies on the Ancient World from CHS. https://classical-inquiries.chs.harvard.edu/a-cretan-odyssey-part-1/
  28. 28.
    Brusilovsky, P., Millán, E.: User models for adaptive hypermedia and adaptive educational systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web. LNCS, vol. 4321, pp. 3–53. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-72079-9_1CrossRefGoogle Scholar
  29. 29.
    Stephens-Davidowitz, S.: Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are. Dey St., An Imprint of William Morrow, New York (2017)Google Scholar
  30. 30.
    Aletras, N., Chamberlain, B.P.: Predicting Twitter user socioeconomic attributes with network and language information. In: Proceedings of the 29th on Hypertext and Social Media, HT 2018, pp. 20–24 (2018)Google Scholar
  31. 31.
    Khazaei, T., Xiao, L., Mercer, R.E., Khan, A.: Understanding privacy dichotomy in Twitter. In: Proceedings of the 29th on Hypertext and Social Media, HT 2018, pp. 156–164 (2018)Google Scholar
  32. 32.
    Goodman, A.: The Chalk Artist: A Novel. The Dial Press, New York (2017)Google Scholar
  33. 33.
    Soroush, M., Hancock, M., Bohns, V.K.: Self-control in casual games: the relationship between candy crush saga; players’ in-app purchases and self-control. In: IEEE Games Media Entertainment, pp. 1–6 (2014)Google Scholar
  34. 34.
    Mazetti, M., Benner, K.: 12 Russian agents indicted in Mueller investigation. The New York Times, 13 July 2018. https://www.nytimes.com/2018/07/13/us/politics/mueller-indictment-russian-intelligence-hacking.html
  35. 35.
    Eagleton, T.: After Theory. Basic Books, New York (2003)Google Scholar
  36. 36.
    Murray, J.: Hamlet on the Holodeck: The Future of Narrative in Cyberspace. The Free Press, New York (1997)Google Scholar
  37. 37.
    Bernstein, M.: As we may hear: our slaves of steel. In: Proceedings of the 29th ACM Conference on Hypertext and Social Media, HT 2018, pp. 242–245 (2018)Google Scholar
  38. 38.
    Arakelyan, S., Morstatter, F., Martin, M., Ferrara, E., Galstyan, A.: Mining and forecasting career trajectories of music artists. In: Proceedings of the 29th ACM Conference on Hypertext and Social Media, HT 2018, pp. 11–19 (2018)Google Scholar
  39. 39.
    Zhao, B.Y.: Insecure machine learning systems and their impact on the web. In: Proceedings of the 29th on Hypertext and Social Media (HT 2018), p. 63. ACM, New York (2018).  https://doi.org/10.1145/3209542.3209544
  40. 40.
    Wang, B., Yao, Y., Viswanath, B., Zheng, H., Zhao, B.Y.: With great training comes great vulnerability: practical attacks against transfer learning. In: 27th {USENIX} Security Symposium ({USENIX} Security 18). USENIX Association, August 2018Google Scholar
  41. 41.
    Baeza-Yates, R.: Bias on the web. Commun. ACM 61(6), 54–61 (2018)CrossRefGoogle Scholar
  42. 42.
    Lazer, D.M.J., et al.: The science of fake news. Science 359(6380), 1094–1096 (2018)CrossRefGoogle Scholar
  43. 43.
    McCurry, J.: Japanese blogger stabbed to death after internet abuse seminar. The guardian, 26 June 2018. https://www.theguardian.com/world/2018/jun/26/japanese-blogger-kenichiro-okamoto-stabbed-to-death-after-internet-abuse-seminar
  44. 44.
    Jason, Z.: Game of fear. Boston Mag. (2015). https://www.bostonmagazine.com/news/2015/04/28/gamergate/
  45. 45.
    Feinberg, A.: The alt-right can’t disown charlottesville. Wired, 13 August 2017. https://www.wired.com/story/alt-right-charlottesville-reddit-4chan/
  46. 46.
    Orwell, G.: Politics and the English Languages. Horizon 13(76) (1946)Google Scholar
  47. 47.
    Flanagan, C.: I believe her. The Atlantic Monthly, 17 September 2018. https://www.theatlantic.com/ideas/archive/2018/09/me-too/570520/

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.Eastgate Systems, Inc.WatertownUSA
  2. 2.VancouverCanada

Personalised recommendations