A Villain’s Guide to Social Media and Interactive Digital Storytelling
Abstract
If we have not yet achieved planetary super-villainy on the desktop, it may be feasible to fit it into a suburban office suite. The familiar perils of fiction and deceit can now be augmented by mass customization, allowing powerful malefactors to shape perceived reality to suit their preferences. Social media permit the modern villain to deploy traditional cruelties to great and surprising effect. Interactive digital storytelling lets us exploit weakness and illness for profit and help us normalize wickedness. Because the impact of villainous techniques is radically asymmetric, our fetid plots are difficult and costly to foil.
Keywords
Hypertext New media Literature Fiction Implementation History of computing Politics VillainyNotes
Acknowledgments
This is a satire. Don’t try this at home. The works cited here are not villainous. We thank David E. Millard, Charlie Hargood, Dr. Fionnbar Lenihan and Robert A. Sullivan for helpful conversations on related topics. Of course, none of them are in any way responsible for this villainous paper.
References
- 1.Ammann, R.: Jorn barger, the newspage network and the emergence of the weblog community. In: Proceedings of the 20th ACM Conference on Hypertext and Hypermedia. HT 2009, pp. 279–288 (2009)Google Scholar
- 2.Backstrom, L., Dworkin, C., Kleinberg, J.: Wherefore art thou R3579x?: Anonymized social networks, hidden patterns, and structural steganography. Commun. ACM 54(12), 133–141 (2011)CrossRefGoogle Scholar
- 3.Backstrom, L., Kleinberg, J.: Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on Facebook. In: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW 2014, pp. 831–841 (2014)Google Scholar
- 4.Johnson, B.: The Short Life of Kaycee Nicole. The Guardian (2001)Google Scholar
- 5.Chen, A.: The Agency. New York Times Mag. (2015)Google Scholar
- 6.Clarke, A.C.: The Nine Billion Names of God; the Best Short Stories of Arthur C. Clarke. Harcourt, Brace & World (1967)Google Scholar
- 7.Derakhshan, H.: Killing the hyperlink, killing the web: the shift from library-internet to television-internet. In: Proceedings of the 27th ACM Conference on Hypertext and Social Media, HT 2016, p. 3 (2016)Google Scholar
- 8.Dick, P.K.: The Minority Report: and Other Classic Stories. Citadel Press (2016)Google Scholar
- 9.Dickens, C.: The Adventures of Oliver Twist. Fields, Osgood & Co (1870)Google Scholar
- 10.Edwards, M., Peersman, C., Rashid, A.: Scamming the scammers: towards automatic detection of persuasion in advance fee frauds. In: Proceedings of the 26th International Conference on World Wide Web Companion, WWW 2017 Companion, pp. 1291–1299 (2017)Google Scholar
- 11.Hamilton, D.: The thinking machine. In: King, L.R., et al. (eds.) Echoes of Sherlock Holmes: Stories Inspired By The Holmes Canon. Pegasus Books (2016)Google Scholar
- 12.Hern, A.: Fitness Tracking App Strava Gives Away Location of Secret US Army Bases. The Guardian (2018)Google Scholar
- 13.Huang, Q., Singh, V.K., Atrey, P.K.: Cyber bullying detection using social and textual analysis. In: Proceedings of the 3rd International Workshop on Socially-Aware Multimedia, SAM 2014, pp. 3–6 (2014)Google Scholar
- 14.Le Carré, J.: Smiley’s People. Knopf (1980)Google Scholar
- 15.Rizoiu, M.-A., Xie, L., Caetano, T., Cebrian, M.: Evolution of privacy loss. In: Wikipedia Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, WSDM 2016, pp. 215–224 (2016)Google Scholar
- 16.Shelley, M.W.: Frankenstein, or, the Modern Prometheus. Modern Library (1984)Google Scholar
- 17.Sofia El Amine, S.B., Saad, S., Tesfa, A., Varin, C.: Infowar in Syria: the web between liberation and repression. Web Science 2012 (2012)Google Scholar
- 18.Stross, C.: The Jennifer Morgue. Golden Gryphon Press (2006)Google Scholar
- 19.Mueller, R.S.: Indictment: United States of America vs. Viktor Borisovich Netyksho et al., U. S. District Court for the District of Columbia, 13 July 2018Google Scholar
- 20.Czege, P.: My Life With Master. Half-Meme Press (2003)Google Scholar
- 21.Timberg, C., Harwell, D.: We studied thousands of anonymous posts about the Parkland attack—and found a conspiracy in the making. The Washington Post, 28 February 2018Google Scholar
- 22.Reeves, B., Nass, C.: The Media Equation - How People Treat Computers, Television, and New Media Like Real People and Places. Cambridge University Press, Cambridge (1996)Google Scholar
- 23.DiFranzo, D., Taylor, S.H., et al.: Upstanding by design: bystander intervention in cyberbullying. In: CHI 18, Montréal, 21–26 April 2018Google Scholar
- 24.Brignull, H.: Types of Dark Patterns. https://darkpatterns.org/types-of-dark-pattern
- 25.Vosoughi, S., Roy, D., Aral, S.: The spread of true and false news online. Science, 1146–1151 (2018)CrossRefGoogle Scholar
- 26.Ramachandran, A., Wang, L.: Chaintreau dynamics and prediction of clicks on news from Twitter. In: Sastry, N., Weber, I. (eds.) Proceedings of the 29th on Hypertext and Social Media, HT 2018, pp. 210–214 (2018)Google Scholar
- 27.Nagy, G.: A Cretan Odyssey, Part 1. Classical Inquiries Studies on the Ancient World from CHS. https://classical-inquiries.chs.harvard.edu/a-cretan-odyssey-part-1/
- 28.Brusilovsky, P., Millán, E.: User models for adaptive hypermedia and adaptive educational systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web. LNCS, vol. 4321, pp. 3–53. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72079-9_1CrossRefGoogle Scholar
- 29.Stephens-Davidowitz, S.: Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are. Dey St., An Imprint of William Morrow, New York (2017)Google Scholar
- 30.Aletras, N., Chamberlain, B.P.: Predicting Twitter user socioeconomic attributes with network and language information. In: Proceedings of the 29th on Hypertext and Social Media, HT 2018, pp. 20–24 (2018)Google Scholar
- 31.Khazaei, T., Xiao, L., Mercer, R.E., Khan, A.: Understanding privacy dichotomy in Twitter. In: Proceedings of the 29th on Hypertext and Social Media, HT 2018, pp. 156–164 (2018)Google Scholar
- 32.Goodman, A.: The Chalk Artist: A Novel. The Dial Press, New York (2017)Google Scholar
- 33.Soroush, M., Hancock, M., Bohns, V.K.: Self-control in casual games: the relationship between candy crush saga; players’ in-app purchases and self-control. In: IEEE Games Media Entertainment, pp. 1–6 (2014)Google Scholar
- 34.Mazetti, M., Benner, K.: 12 Russian agents indicted in Mueller investigation. The New York Times, 13 July 2018. https://www.nytimes.com/2018/07/13/us/politics/mueller-indictment-russian-intelligence-hacking.html
- 35.Eagleton, T.: After Theory. Basic Books, New York (2003)Google Scholar
- 36.Murray, J.: Hamlet on the Holodeck: The Future of Narrative in Cyberspace. The Free Press, New York (1997)Google Scholar
- 37.Bernstein, M.: As we may hear: our slaves of steel. In: Proceedings of the 29th ACM Conference on Hypertext and Social Media, HT 2018, pp. 242–245 (2018)Google Scholar
- 38.Arakelyan, S., Morstatter, F., Martin, M., Ferrara, E., Galstyan, A.: Mining and forecasting career trajectories of music artists. In: Proceedings of the 29th ACM Conference on Hypertext and Social Media, HT 2018, pp. 11–19 (2018)Google Scholar
- 39.Zhao, B.Y.: Insecure machine learning systems and their impact on the web. In: Proceedings of the 29th on Hypertext and Social Media (HT 2018), p. 63. ACM, New York (2018). https://doi.org/10.1145/3209542.3209544
- 40.Wang, B., Yao, Y., Viswanath, B., Zheng, H., Zhao, B.Y.: With great training comes great vulnerability: practical attacks against transfer learning. In: 27th {USENIX} Security Symposium ({USENIX} Security 18). USENIX Association, August 2018Google Scholar
- 41.Baeza-Yates, R.: Bias on the web. Commun. ACM 61(6), 54–61 (2018)CrossRefGoogle Scholar
- 42.Lazer, D.M.J., et al.: The science of fake news. Science 359(6380), 1094–1096 (2018)CrossRefGoogle Scholar
- 43.McCurry, J.: Japanese blogger stabbed to death after internet abuse seminar. The guardian, 26 June 2018. https://www.theguardian.com/world/2018/jun/26/japanese-blogger-kenichiro-okamoto-stabbed-to-death-after-internet-abuse-seminar
- 44.Jason, Z.: Game of fear. Boston Mag. (2015). https://www.bostonmagazine.com/news/2015/04/28/gamergate/
- 45.Feinberg, A.: The alt-right can’t disown charlottesville. Wired, 13 August 2017. https://www.wired.com/story/alt-right-charlottesville-reddit-4chan/
- 46.Orwell, G.: Politics and the English Languages. Horizon 13(76) (1946)Google Scholar
- 47.Flanagan, C.: I believe her. The Atlantic Monthly, 17 September 2018. https://www.theatlantic.com/ideas/archive/2018/09/me-too/570520/