Culture, Media and Sport CommitteeWritten evidence submitted by Dr Claire Hardaker
Summary
In this document I discuss the following four points:
What facilitates abusive or threatening online comments (ie what makes it “easy”?)
What motivates abusive or threatening online comments (ie what makes people do it?)
Measures unlikely to reduce abusive or threatening online comments (ie what won’t stop it?)
Measures likely to reduce abusive or threatening online comments (ie what could stop it?)
Preliminary Comments
(1) Whilst my research has covered strategies of content filtering, it relates better to the discussion of “preventing abusive or threatening comments”, and less directly to “protecting minors from adult content” or “filtering extremist material such as child abuse imagery”. I therefore do not comment on these two areas.
(2) A crucial point note, however, is that filtering content intended to promote harmful behaviour (eg terrorism, violence) is unlikely to deal with the online grooming responsible for inciting these behaviours. Grooming is typically an interactive process involving a manipulator persuading a vulnerable target to undertake action that is in the manipulator’s interest, and typically harmful to the target (eg extremist violence, suicide, self-harm, age-inappropriate sexual behaviour, etc.).
(3) Such grooming is likely to occur in interactive environments such as chatrooms, messageboards, and via private direct-message software (eg Windows Live Messenger) where content filtering will struggle to apply, and where processes of moderation are likely to be far more effective. I would therefore suggest that content filtering as a strategy for dealing with material intended to promote terrorism or other acts of violence is unlikely to tackle this point with much success.
What facilitates abusive or threatening comments online?
(4) There are arguably three major factors (though easily more besides):
Anonymity
(5) The internet offers a perceived anonymity that has no real parallel offline, and this appearance of invisibility encourages the user to feel that they can do unpleasant things with a highly reduced risk of suffering any consequences. In turn, the sense of being invulnerable encourages disinhibition: the user thinks that she is safe from repercussions, so behaves in a mildly objectionable way. Each time there is no negative consequence, her behaviour may gradually escalate.
(6) By itself, however, anonymity does not explain why the internet seems to bring the worst out in some, since many of us are online and anonymous all the time, yet would never think to behave in this way. A second issue to consider, then, is detachment.
Detachment
(7) Linked to disinhibition is the way that the internet allows us to shut down our empathy, and in particular, our compassion. In fact, we can choose not to empathise at will, especially when dealing with someone we dislike. The internet, however, drastically increases this ability, and allows us to emotionally distance ourselves—not just from people we don’t like but also from those we don’t even know—in several ways:
Entertainment
(8) The third aspect that seems to encourage some to be deliberately mean online long predates the internet. It is simply the human tendency to enjoy and glorify aggression. Evidence for this can be found worldwide, stretching back over millennia. For brevity, however, we need only look at ancient military artefacts (eg the Bayeux tapestry, Homer’s Iliad, Beowulf), the sports descended directly from warfare (javelin, archery, fencing, boxing, wrestling, martial arts), and archaeology built especially for the enjoyment of bloodshed (eg the Coliseum, the Hippodrome).
(9) Today, one glance at mainstream entertainment demonstrates that this interest is not remotely abated. For instance, The Hunger Games is a book series about individuals forced to fight to the death for a reality television show. Shawshank Redemption tells of a man wrongly convicted for the murder of his wife and incarcerated in a brutal, corrupt prison where inmates are beaten to death, shot, and raped. The X Factor television series places competitors into highly stressful, even cruel environments with antagonistic judges. And many of the biggest games titles, such as the Call of Duty, Halo, and Grand Theft Auto series, involve players simulating extreme violence and murder.
(10) The above should demonstrate that humans are entertained by violence, and that this is by no means a new phenomenon brought about by digital media. For some, however, simply consuming aggression-based entertainment from fiction (eg books, films) or simulation (eg games, sports) is not enough. For them, the internet presents a virtual Coliseum where they can amuse themselves by attacking others without risk of “injury”, since they can hide behind a cloak of anonymity, and silence their own conscience by ignoring their target’s feelings.
What motivates abusive or threatening comments online?
(11) To reiterate a point from above, whilst many of us are frequently online anonymously and enjoy consuming violence (it is a rare person who hasn’t watched an action movie!), it is still a relatively small number who feel motivated to take advantage of the conditions that the internet presents, and to actually engage in abusive or threatening online behaviour. In the same way, many of us drive, but however annoyed we may become behind the wheel, mercifully few of us are ever turn our car into a lethal weapon.
(12) In other words, each individual needs a trigger, or motive to push them into using the internet as a weapon. Unsurprisingly, the evidence suggests that there is no single, over-riding motive for being abusive or threatening online, but that whilst there certainly are trends, there are also many unique cases. Some of those broad trends include:
(13) In summary, motivations for posting abusive/threatening content can spring from a number, and a mixture of sources, including emotional, psychological, social, political, economical, etc. This means that there is likely to be no single approach that will have any meaningful impact on this issue. Instead, it is far more likely to require addressing on multiple fronts. I discuss this area next.
Measures unlikely to reduce online abuse or threats
(14) There are two classic “solutions” that have been proposed to fix online abusive comments. I deal with them briefly since they merit very little serious consideration.
Remove Anonymity
(15) In a nutshell, this is borderline impossible, if only because it is unenforceable, and unworkable. Even if all countries agree to legally mandating online identity disclosure (unlikely) the costs of setting up, administrating, and then enforcing it would be staggering. Further, we need only consider the risks inherent in having a child’s name, age, location, etc, available online to realise that online identity disclosure would actually create more dangers than anonymity currently averts.
Stop Using the Internet (or the Site in Question)
(16) This is not only bizarrely unrealistic, since the internet is now ubiquitous, it is also ineffective (kids don’t need a single device to be cyberbullied) and puts responsibility on the victim, rather than the attacker (see victim-blaming, para. (7(c)) above).
Measures likely to reduce online abuse or threats
(17) There is no single answer to this complex problem, but several smaller improvements can, collectively, advance online safety. I therefore recommend five ways forward.
Education, Resources, and Training for Children and Young Adults
(18) In a perfect world, we would always choose prevention over cure, but this requires well-informed vigilance both from potential targets and from those responsible for protection. At present, Childnet does outstanding work, teaching school-children to be safe and kind online, and I welcome the fact that online safety has been introduced across the 2014 National Curriculum.
(19) For best effect, however, these lessons need to be appropriately supported (see paras. (21)–(23) below), sufficiently detailed/thorough, and adopted across all schools (private, public, and free). These lessons also should not be restricted purely to Computing, but should be adopted across a number of classes, including PSHEE and Citizenship.
(20) However, in order for this to be successful, teachers themselves need to be well-trained in the safety measures, in tell-tale signs, and in appropriate strategies of intervention. Teachers also need the support of parents and caregivers, and this leads into a second area of improvement.
Education, Resources, and Training for Parents, Caregivers, and Teachers
(21) The assistance that Childnet currently offers teachers is also invaluable, but it could be substantially underpinned with compulsory online safety training in all PGCEs, since NSPCC research shows that far too many teachers currently don’t feel confident when it comes to advising pupils on safe social network practices.1
(22) Meanwhile, parents would benefit from proactive, face-to-face training in:
(23) Whilst these organisations all do invaluable work, they cannot be a standalone solution. A third area of improvement, then, is through sites themselves.
Site Tools, Responsibilities, and Processes
(24) We generally expect social networks to offer the tools and support to keep us safe. Indeed, the expectation seems fairly reasonable. If Mr Smith wants to profit from people buying his goods or services, his products and premises must meet the relevant legal requirements to protect customers from loss and harm. However, should Mr Smith want to profit from people using his social network, in the UK at least there appear to be no similar legal requirements.
(25) It seems reasonable to argue that the opportunity to profit from a social network should also entail a duty of care towards that site’s users. However, whilst most social networks require registrants to enter into agreements forbidding abusive behaviour, beyond that, sites differ widely in the availability, sophistication, and transparency of their safety features. At the most basic level, social networks should:
(26) At present, whilst some sites offer all of these and more, others provide none, and some even appear to stonewall those trying to tackle online abuse.12 This takes us into a fourth area of improvement—enforcement.
Education, Resources, and Training for Police
(27) Where cases become too serious for a user or site to deal with, we would naturally turn to the police. However, whilst SOCA13 does tackle cybercrime, its focus tends to divide between child sexual exploitation and online fraud. SOCA and the Police Central e-Crime Unit14 are forming a new National Cybercrime Unit,15 but it remains unclear whether online abuse will form part of this organisation’s remit.
(28) This means that for now at least, online abusive messages and threats are more likely to be dealt with by ordinary police officers, and that makes it difficult for the average non-high-profile individual to find appropriately trained police who will take their complaint seriously.16 In short, it is vital that we have the necessary resources and training for police, including:
Legislation and Guidance
(29) Assuming that a case is investigated by the police and the CPS decides to pursue criminal charges, many of the Acts that might by employed (eg Malicious Communications Act 1988, §5 of the Public Order Act 1986, Protection from Harassment Act 1997, Communications Act 2003) were created before the advent of major social networks, and so are imperfectly equipped to deal with the new behaviours that these sites have created.
(30) For instance, the most recent, relevant legislation, the Communications Act, came into force in July 2003. However, an Act of this magnitude—more than 250,000 words spanning over four hundred sections—takes years to write and enact. The section relevant to online behaviour (§127) is therefore far more heavily informed by the internet of the 1990s than that of the new millennium. Meanwhile, massive, ubiquitous social networks like Facebook and Twitter were founded 2004 and 2006 respectively. As sites like these have evolved, so too have the behaviours associated with them, yet the legislation remains largely unchanged.
(31) Whilst the CPS published guidelines17 on prosecuting cases involving communications sent via social media in June this year, like much current legislation designed for supposedly-similar offline behaviours, these guidelines do not explicitly address the critical differences that the online environment offers:
(32) It is therefore worth considering whether these Acts need updating, or whether we actually need a new Online Communications Act that specifically covers the increasing range of abusive behaviours on the internet.
(33) This difficulty is further exacerbated by a culture in which offline crime still seems to be seen as more serious than any supposed online counterpart. For instance, the CPS provides useful guidance on behaviours such as stalking,18 harassment,19 and school bullying,20 but if one reads these guidelines, it seems that the offline version is considered the norm, and any online variant, where it is even acknowledged to exist, is simply considered a sub-type.
(34) This overlooks the fact that supposedly equivalent behaviours like cyberstalking, cyberharassment, and cyberbullying can have their own unique attributes, methods, and consequences which require dealing with in fundamentally different ways. Indeed, what little the CPS has to say about online antisocial behaviours tends to be vague.21
(35) In short, it appears that we need CPS guidance for the police, court system, legal practitioners, etc. that would provide definitions for, and explanations of the various antisocial online behaviours (eg trolling, cyberbullying, cyberstalking, etc), and information with regards to issues of jurisdiction and proof.
(36) Finally, across the European Union, the Safer Internet Programme22 is promoting self-regulation,23 and already, several high-profile corporations have signed up to a set of Safer Social Networking Principles.24 This is a great start, but these principles are purely voluntary, and whilst it would be inappropriate to enforce such principles across all EU-based social networks, it is worth returning to the example of Ms Smith, and to ask whether those profiting from social networks should have similar duties of care towards their site users.
Conclusion
(37) The full potential of the internet is yet to be realised. If we are to fully enjoy the benefits, and reduce online threatening and abusive behaviour, my belief is that we must approach this in a comprehensively and holistically. I hope the above may offer some ways in which to achieve this.
September 2013
1 www.nspcc.org.uk/Inform/resourcesforprofessionals/onlinesafety/statistics-online-safety_wda93975.html
2 http://consumers.ofcom.org.uk/2009/12/child-internet-safety-strategy-launched/
3 www.beatbullying.org/
4 www.childline.org.uk/Explore/Bullying/Pages/online-bullying.aspx
5 www.childnet.com/
6 www.getsafeonline.org/
7 www.iwf.org.uk/
8 www.nspcc.org.uk/help-and-advice/for-parents/online-safety/online-safety_wdh99554.html
9 www.saferinternet.org.uk/advice-and-resources
10 www.nhs.uk/Livewell/Bullying/Pages/Cyberbullying.aspx
11 www.thinkuknow.co.uk/
12 www.theguardian.com/society/2013/aug/09/cyberbullying-mother-fight-askfm
13 www.nationalcrimeagency.gov.uk/
14 http://content.met.police.uk/Site/pceu
15 www.gov.uk/government/policies/keeping-the-uk-safe-in-cyberspace/supporting-pages/setting-up-a-national-cyber-crime-unit
16 www.theguardian.com/society/2013/aug/09/cyberbullying-mother-fight-askfm
17 www.cps.gov.uk/consultations/social_media_guidelines.pdf
18 www.cps.gov.uk/legal/s_to_u/stalking_and_harassment/#a02b
19 www.cps.gov.uk/legal/s_to_u/stalking_and_harassment/#a02a
20 www.cps.gov.uk/legal/v_to_z/youth_offenders/#a25
21 www.cps.gov.uk/southwest/cps_southwest_news/news_articles/in_the_dock__prosecuting_cyber_bullying__electronic_stalking_and_trolling/
22 http://ec.europa.eu/digital-agenda/self-regulation-better-internet-kids
23 http://ec.europa.eu/digital-agenda/self-regulation-better-internet-kids
24 http://ec.europa.eu/digital-agenda/sites/digital-agenda/files/sn_principles.pdf