Social Media and Social Order
Social Media and Social Order
)
Social Media and Social Order
David Herbert and Stefan Fisher-Høyrem (Eds.)
This work is licensed under the Creative Commons Attribution 4.0 International license (CC BY 4.0)
For details go to http://creativecommons.org/licenses/by/4.0
Preparation and publication of this book was financially supported by the Research Council of
Norway.
www.degruyter.com
Nick Couldry
2 The Social Construction of Reality – Really! — 10
2.1 The Question of Social Order: Returning to Elias — 11
2.2 Managing Social Order Through Data — 13
2.3 Conclusion — 15
References — 16
Sagorika Singha
5 Meme Collectives and Preferred Truths in Assam — 52
5.1 Introduction — 52
5.2 Memes as Digital Objects — 52
5.2.1 Digital Objects and Generation of Social Knowledge — 53
5.2.2 Public Opinion Formation and the Meme-Machine — 56
5.3 Network Economy and the Meme — 57
5.3.1 Memes Experience and Existence: Offline Dynamics Acting on Memes — 58
5.4 Akhil Gogoi, or How a Peasant Leader Became a Meme — 59
5.4.1 The Media Event and the Meme — 63
5.5 Conclusion — 64
References — 65
Liat Berdugo
6 Insurgent Ways of Looking: Gendering the Witness and the Land in the
Visuality of Israel-Palestine — 67
6.1 A “One-Way Hierarchy of Vision” — 69
6.2 A Woman’s Camera — 72
6.3 Women’s Ethical Agency in Conflict — 74
6.4 Watching the Land — 75
6.5 An Ecofeminist Critique of the Feminized Witness — 81
6.6 Towards an Insurgent Way of Seeing — 82
Acknowledgements — 84
References — 84
Researching the social/media relation today must mean more than merely describing how the
latest platforms work, let alone celebrating their supposedly positive potential (democratic?
expressive? socializing?). It must mean at least researching how social media platforms … have
come to propose a certain version of “the social,” and how users go on to enact it. It must also
mean researching … and registering the fractured spaces from where alternative proposals of
“the social” might be built (Couldry & van Dijck 2015, p. 2; emphases in the original).
The concept of “social order” is not an academic detail, still less a theoretical extravagance, but
rather a highly practical term for registering how social worlds are, on the largest scale, being
transformed through the interlinking of all we do on social media … and the systems of social
governance, explicit and implicit, that are emerging to manage them (Couldry, this volume).
This book addresses the relationship between social media and social order at multiple
scales, providing insights into how diverse social worlds are being reshaped by social
media, as well as analysis and reflection on what this means and how critical publics
might respond.
From the invention of the internet, successive waves of digitally networked
technologies have been welcomed by social scientists and commentators as providing
the means both to widen participation in discussion of matters of common concern
(the public sphere model, following Habermas, 1989/1968) and for subordinate
groups to self-organise and resist forms of oppression based on media and political
elites’ symbolic domination of society through the mass media (the emancipatory
model, following Castells, 2012). Furthermore, social scientists have identified several
mechanisms through which these forms of participatory and emancipatory agency
might be exercised – including the propensity of networks to elude hierarchical
domination (Benkler, 2006), their capacity to enable “contraflow” from peripheral to
central media producers (Cottle, 2006), and the “virality” of user-generated content,
which can on occasion generate networked publics capable of challenging major
corporations and even governments (Castells, 2012).
However, it is our contention that, while networked technologies do indeed
sometimes enable such dialogical and emancipatory outcomes, normally they enable
rather different social processes – i.e. they tend to reinforce, elaborate and further
embed existing forms of social order, rather than challenge them (Boy & Uitermark,
2019, pp. 2–3; Herbert, 2020, p. 10). Social order in this context should not be conceived
as static, but rather as dynamic, constantly evolving and actively reproduced through
2 How Do Social Media Change Social Order?
response, Couldry argues that “at a time when, through datafication, it appears that
corporations and governments are intent on reconstructing social reality in ways that
align with their interests, it becomes vital to pay close attention to processes of social
construction” (Couldry, Ch. 2) – and that some concept of social order is essential in
developing a critical account of such processes.
Furthermore, other evidence suggests social order may not be such a neglected or
marginal topic in social sciences. In 2003 an American textbook on the topic appeared,
with a second edition in 2009 and a well-maintained supporting website, suggesting
at least modest currency of the term in US social science programs (Hechter & Horne,
2009; https://www.sup.org/socialorder/?ref=bookurl). This collection is useful for
showing the influence of the concept of social order across a range of social science
disciplines, for asserting its role as “a core theoretical issue in the social sciences” and
for indicating the range of ways in which the “problem of social order” – understood
by the authors as how people “coordinate their actions and … cooperate to attain
common goals” (ibid. 1) is addressed through several traditions of conceptualisation
and theorisation, including mobilising concepts of groups, hierarchies, markets and
networks (ibid., vii–viii).
Notably absent from this collection, however, is any sustained attention to how
media technologies might shape social order, which is the central question addressed
in this volume, focusing on social media. The perspective also differs markedly in
its Hobbesian framing – which constructs the “state of nature” as fundamentally
conflictual and therefore legitimises the need for ordering mechanisms to reconcile
the differing interests of individuals for the greater (individual and collective) good.
In this way, the perspective aligns with what Zygmunt Bauman describes as “the
gardening principle” of the modern state, as Schiel summarises the concept:
It refers to a state “managed” by its government like a garden. The gardener/
government applies rational methods based on scientific knowledge to create optimal
conditions of growth for the “plants”/people (2005, p. 81).
The framing of an absence of social order as a problem that needs “solving”
tends to legitimise the need for “solutions” of some kind; whether through markets
or networks as “horizontal” or decentralised co-ordinating mechanisms, or through
the state or some kind of hierarchy as “vertical” mechanisms of control. Bauman, in
contrast, is suspicious of such mechanisms of social control, an approach exemplified
by his characterisation of the modern state, which emphasises the disruptive and
novel features of modern state power:
With the backbone of communal self-reproduction disintegrating or crushed, the modern state
power was bound to engage in deliberate management of social processes on an unheard-of
scale … it did not concentrate the previously dispersed powers. It presided over the formation of
an entirely new kind of power, or unprecedented scope, depth of ambition, depth of penetration
and ambition (Bauman, 1990, p. 157).
4 How Do Social Media Change Social Order?
We think it is not exaggerating to say that Couldry sees the datafication of society as
a project of similar scope, involving a parallel deepening of penetration of state and
corporate mechanisms of social control. Couldry focuses on corporate data harvesting
as the most ubiquitous global form of datafication, but locates this in relation to and
stresses connections with state uses of digital data; for example, in China where there
is less separation of state and corporate sectors and less emphasis on personal privacy
to maintain that distinction than in the West. It is also where the most ambitious and
overt attempt to harness big data to rank the social “trustworthiness” of citizens and
distribute rewards and punishments accordingly – The Social Credit System – and
hence directly harvest digital date to shape social order – is already being rolled out
(Liang et al., 2018). Yet, Couldry also notes the interest of governments everywhere
in harnessing digital data to police populations and shape behaviour, stressing the
disproportionate impact of this on the lives of the poor and especially those relying
on state welfare.
Couldry argues that the genesis of the datafied order was largely unplanned (e.g.
Google’s accidental discovery that it could commercially exploit internet search data,
Zuboff, 2019), and that this remains partly true of its ongoing development. For while
“corporate intention becomes a major factor once the advantages of an emerging
datafied social order become clearer to corporations,” planned or coordinated
action by key players is not required for what we suggest might be termed the deep
datafication of society, a process through which “the principle of discrimination-
through-data (that is, automatically harvested data from online activities) has spread
right across the social terrain” (Couldry, this volume). Thus, while corporations and
governments have long sought, held and used data on citizens and consumers from
multiple sources, networked digital platforms enable its gathering, use and integration
on an unprecedented scale, reaching deep into the everyday lives of people across the
planet – hence deep datafication.
Like Herbert and Fisher-Høyrem (Chapter 4), Couldry draws on Elias to
conceptualise the emergence of a datafied social order. Elias understands a
“figuration” as “a structure of mutually orientated and dependent people … the
network of interdependencies formed by individuals” (Elias, 2000, p. 482). Elias
argues that social order emerges through such figurations, “through the continuous
interweaving of many interrelationships and connections, their progressive impact,
as social actors try, successfully or otherwise, to live their lives through the web of
interrelations in which they have largely no choice but to be entangled” (Couldry,
this volume). Thus, what Couldry and Mejías (2019) call “data relations,” referring
to “relations that configure social life on a basis designed to optimise the generation
and extraction of valuable data” become “a leading form of ‘figuration’ … for the era
of datafication.” (Couldry, this volume).
At the same time, Couldry argues that while “discrimination-through-data … has
spread right across the social terrain,” resistance is neither impossible nor futile;
rather “to the extent that this order is resisted by social actors, it will not unfold
How Do Social Media Change Social Order? 5
exactly as I outline here. That is the point of analysing datafied societies from the
point of view of social order, to alert readers to what is under way and help them
imagine what resistance might feel like.” (Couldry, this volume).
Elias’ concept of figuration can be applied to many kinds of social relations,
especially where there is a lack of strong central social control, or social norms leave
space for negotiation. But the difference in a datafied social order is the way in which
virtual forms of social interaction are mediated by the properties of digital systems,
in particular by social media platforms. It is on this mediation, its effects on those
enmeshed, their agency and resistance, that the substantive chapters that follow
Couldry’s essay focus. Each examines how users enact – using Couldry and van
Dijck’s terms – the versions of the social proposed by social media platforms across
range of scales and sites.
Drawing on the dramaturgical perspective of Erving Goffman, in Chapter 3 Boy
and Uitermark investigate the self-presentation and status displays characterising the
online conduct and related careers of Instagram influencers. Instagram clusters tend
to centre on very few user accounts, whose style of display sets the tone for the entire
cluster, and whose influence enables them to access temporary job opportunities as
party hosts or event promoters. The interviews reveal a vast and stress-inducing gap
between their curated Instagram “frontstage” personas and the “backstage” precarity
of their offline lives and continuous intense effort required to maintain their social
media profiles. These interviewees are “central users” in their Instagram clusters and
the platform has become central for their livelihoods, but one that has become a hard
taskmaster, requiring constant updating to maintain the users’ precarious position at
the pinnacle of esteem.
Similarly, in Chapter 4 Fisher-Høyrem and Herbert draw on Elias’ model of
the early modern royal court, analysing how local top users of Instagram in a
Scandinavian town compete for the attention of users of higher status, and how this
quest for affirmation involves mutual (and self-) policing, shaming, and an anxious
interweaving of online and offline lives. Combining computational and qualitative
methods in their investigation of local online “clusters of prestige,” they argue
that what is celebrated in the local social order of the “Bible belt” town – specific
locations, leisure activities, family structures, religious identities – is also celebrated
as prestigious and worthy of esteem across local social media clusters, so that at this
site Instagram tends to reinforce the social norms and hierarchies of the pre-existing
social order.
In Chapter 5 Sagorika Singha also examines the interplay of small-town dynamics
with digital media – in this case the media product being not an Instagram profile
but the memes produced by local online “meme collectives” in the Indian region
of Assam. Memes have revived and fuelled old sentiments, providing a platform
from which users seek to influence regional and national politics through insider
jokes and shaming practices playing on pop-cultural references. Singha explores
the ambivalence of the effects of these meme collectives on the distribution of
6 How Do Social Media Change Social Order?
power in local social and political relations. On the one hand they demonstrate a
decentralisation of “agenda-setting” media power away from educated urban elites
in the major cities, empowering “small town” media users. As Singha comments “if
designed and received in the right way, a meme has immense potentialities to provide
required value to a cause.”
But on the other hand, those so empowered tend to be amongst the more
privileged within local communities. Furthermore, because “memes often appropriate
dominant discourses” their use can (and does, in the examples discussed) reproduce
and more widely disseminate gendered, stereotyping and populist discourses. The
dynamic here seems to be similar to that observed by Rajagopal (2001) of the national
televising religious epics on Indian politics two decades before: new publics are
created and new participants become politically engaged, but at the cost of increased
“confusion” of public discourse and polarisation of political life (ibid., p. 279; see also
Herbert, 2003, pp. 112–3). Social media thus reconfigures the social order in ways that
allow for the emergence of new political actors, but which tends to reinforce existing
social hierarchies, prejudices and divisions.
In Chapter 6 Liat Berdugo also investigates the interaction between networked
digital media and contested local spaces, in this case between Israeli security
services and Palestinian and Israeli activists in contested territories on the West
Bank, examining the liminal space that emerges between physical and mediatised
conflict. Specifically, she investigates what happens when camera recordings of civic
injustices in Palestine are met with camera recordings of the resistance – a “struggle
for spectral power,” and the implicit recognition from all involved parties of the force
carried by the online spectacle, as activists’ videos are posted on their website for a
potentially global audience.
Berdugo’s analysis highlights gendered aspects of the conflict, especially between
the “vision of and visual documentation produced by Palestinian women” and that
produced by “a special unit of exclusively female soldiers called Tatzpitaniot (‘The
Watchers’),” whose “sole job (is) to watch live video streams of the IDF’s network
of 1,700 security cameras mounted along key sites in the West Bank and Gaza.”
Berdugo argues that the framing of the activities of the Tatzpitaniot in the Israeli
Defence Forces’ promotional material as defenders of Israel’s borders draws on an
essentialised construction of Israeli women as defenders of “the land,” against which
Palestinian counter-surveillance is positioned as a threat. In response, Berdugo
invites readers to view the conflict through and “an ecofeminist lens, which demands
a consideration of how the land and women – as feminized witnesses – have both
been historically subjugated by a shared history of oppression” and for “a sightline
that celebrates disobedient, insurgent ways of looking: ways that visibilise the very
frame of an image as a means towards new kinds of resistance in conflict.” Here, the
use of networked digital technologies crystallizes around and, in some ways, amplifies
existing divisions, with the IDF mobilising tropes of the female guardians of the land
reaching back to pioneering days, and activists invoking the potential presence of
How Do Social Media Change Social Order? 7
a global audience for their videos in an attempt to redress the power balance. Yet
Berdugo also points to the possibility of the invocation of a shared narrative and way
of viewing which moves beyond binary constructs of “us” and “them.”
Berdugo’s analysis of the gender dimensions of the “competitive videography”
may also be used to suggest another perspective on Amsterdam’s Instagram
influencers (Boy & Uitermark, Chapter 3). Both their leading interviewees are women,
reflecting a tendency for women in their 20s and 30s to predominate among the most
followed accounts on Instagram in Amsterdam (Boy & Uitermark, 2017, p. 617). It may
be that the Instagram platform, with its emphasis on the curation and projection
of stylish and glamorous self-images, is one that skilled female users are amongst
those most adept at exploiting to attract followers. However, as Boy and Uitermark’s
analysis clearly brings out, this attention comes at the price of constant effort to
maintain the image, articulating the precarity of a profile based on gendered criteria
of glamour and attractiveness, and in a context in which the women’s working lives
are precarious, dependent on their capacity to keep drawing “the right crowd” to the
venues they promote.
A different downside of gendered public attention to women on social media
is exposed by Soberaj and Merchant’s study of Twitter mentions of US legislators
(Chapter 7), and their analysis takes on an intersectional dimension as it focuses
particularly on the abuse directed at female legislators of colour in the US. Their
analysis reveals that different users inhabit different digital worlds, in that online
shaming and harassment affects female legislators and legislators of colour far more
than their white (and/or) male colleagues. In a world where social media are crucial to
the outcome of democratic elections, politicians are required to display themselves on
several platforms, yet exposure can have huge personal costs for female candidates,
especially women of colour. Here social media serves to amplify prejudices and power
imbalances within the wider social order.
Our second American case study is provided by Wanless and Berk (Chapter 8),
who show how social media users are “drawn into and participating in the creation
and spread of persuasive messaging,” something they call an “enhanced form of
propaganda” that is increasingly invasive in nature. Using data from the 2016 US
presidential campaign, they examine the “organised deployment” of techniques of
“participatory propaganda” to greatly amplify the impact of political messaging by
harnessing the trust people place in social networks, including giving credibility to
messages of questionable provenance and veracity – and indeed whose provenance
has been deliberately obscured. From the propogandists’ viewpoint the method
is particularly efficient, as rather than requiring the constant funding of political
advertisements via mass media, “participatory propaganda campaigns run as long
as the cause driving it matters to its members – or rather, those administrating such
groups are able to produce content that engages and provokes followers.” Social
media here present a threat to social order rooted in democratic debate, because the
social basis of trust in networks is used by participatory propagandists to mask the
8 How Do Social Media Change Social Order?
invested in the platform maintain a critical and external perspective which allows
them to imagine how things might be otherwise. The second constructs a vantage
point from which deeply divided Israeli and Palestinian women can be seen to share
a common history of oppression, while the third articulates the desire to understand
in order to empower people to choose to change; a good vantage point from which to
launch into the collection.
References
Bauman, Z. (1990). Modernity and Ambivalence. Theory, Culture & Society, 7(2–3), 143–169.
Benckler, Y. (2006). The Wealth of Networks: How Social Production Transforms Markets and
Freedom. New Haven, CT: Yale University Press.
Bordoni, C. (2016). Introduction to Zygmunt Bauman. Revue internationale de philosophie, 277(3),
281–289.
Boy, J. D. & Uitermark, J. (2017). Reassembling the city through Instagram. Transactions – Institute of
British Geographers, 42(4), 612–624.
Boy, J. D. & Uitermark, J. (2019). Theorizing Social Media with Elias: Status Displays, Mutual
Monitoring, and the Genesis of New Sensibilities. SocArXiv. July 11. doi:10.31235/osf.io/phm5x.
Castells, M. (2012). Networks of Outrage and Hope. Cambridge: Polity.
Cottle, S. (2006). Mediatized Conflicts. Buckingham: Open University Press.
Couldry, N. & van Dijck, J. (2015). Researching Social Media as if the Social Mattered. Social Media +
Society, 1(2), 1–7.
Elias, N. (2000). The civilizing process: Sociogenetic and psychogenetic investigations (E. Jephcott,
Trans. Revised ed). Oxford: Blackwell Publishers.
Habermas, J. (1989/1968). The Structural Transformation of the Public Sphere. Cambridge:
Cambridge Univresity Press.
Hechter, M. & Horne, C. (2009). Theories of Social Order. Stanford, CA: Standford University Press.
Herbert, D. (2020). Social Media and Spatial Justice: Instagram, Status Competition and the
Deepening of Urban Exclusion in Northern Europe. In Watson, S. (Ed.), Spatial Justice in the City
(pp. 7–25). London: Routledge.
Herbert, D. & Black, T. (2012). What Kind of Global Conversation? Participation, Democratic
Deepening and Diplomacy: an examination of mediated global talk about religion and politics.
In Gillespie, M. & Webb, A. (Eds.), Diasporas and Diplomacy: Cosmopolitan Contact Zones at the
BBC World Service (1932-2012) (pp. 211–229). Routledge.
Latour, B. (2005). Reassembling the Social. Oxford: Oxford University Press.
Liang, F., Das, V., Kostyuk, N., & Hussain, M. (2018). Constructing a Data-Driven Society: China’s
Social Credit System as a State Surveillance Infrastructure. Policy and Internet, 10(4), 415–453.
Rajagopal, A. (2001). Politics after Television: Hindu Nationalism and the Reshaping of the Public in
India. Cambridge: Cambridge University Press.
Zuboff, S. (2019). The Age of Surveillance Capitalism. London: Profile Books.
2 The Social Construction of Reality – Really!
Nick Couldry
Today, in countless diverse places, a new project is under way: the project of
transforming the social fabric so it becomes amenable to a new kind of rule at a
distance, rule through data. A new vision of social governance is emerging in many
varied forms but based around a convergent principle; that the stuff of social life, its
every element, will, indeed must, be reconfigured in ways that enable the extraction
of data and so new regimes of governance and value extraction. Under these
circumstances, we cannot think about media’s role in society (let alone social media’s
role) without drawing on social theory. But which social theory exactly?
The societies we inhabit today are not societies in the same way as the societies
of fifteen, perhaps even ten, years ago. They are different types of configuration that
operate on different scales and through different flows from the societies of earlier
eras. Indeed, because every point in space and time now, in principle, embeds a
two-way computer connection (for influence and surveillance), the non-linear patterns
of social relations operate in many more dimensions than our old models of social
interaction can account for. The result is new forms of technological, institutional and
social power that we have barely begun to characterise, although we already know
one thing for sure: that they will depend on the continuous multi-scalar tracking of
human life by technologies. We can also predict with confidence that those forms,
taken together, will make possible a new type of social order, massively more aligned
to corporate goals and economic ends than previous social forms.
We need to understand this emerging social order; indeed, it makes no sense to
analyse social media without theorising the underlying “social order” of which their
“socialness” is part. This affects the theorists we choose as allies.
The book that follows contains many finely detailed analyses of the uneven and
often strange surfaces and conflicts that characterise this new social order: conflicts
over identity and status, battles for political capital, personal attacks and strategies
of self-defence, the shifting patterns of contention and self-advancement in urban
space. They give the reader a vivid sense of the unsettling uncertainty of the datafied
social world in locations as varied as Assam and Israel, Holland and the US.
In this opening essay, I want to strike a bass note that, I hope, will resonate
through what follows. I would like to capture a few more general features of the type
of social order that is emerging through “datafication” (Van Dijck, 2014), when every
aspect of life is under pressure to reconfigure itself in ways that allow the extraction
of data. It goes without saying that this is the core rationale behind the emergence
of social media platforms, even if this is never their stated mission. But – and this
is important to note – datafication as a process goes much wider than social media
platforms. It is transforming other areas of business such as logistics, education and
The Question of Social Order: Returning to Elias 11
health, and it is changing business models of all sorts. That said, social media is a
good place to focus analysis.
I will stop short of offering a specific theory of the new social order. There are,
to be sure, rival theorisations here, and I have a stake in that debate (see Couldry &
Mejías, 2019; Srnicek, 2017; Zuboff, 2019). But, whatever specific theory one prefers,
what matters more here is to get a broader sense of key lines of change; lines that will
help, I hope, bring into focus the details of the following chapters as you read them.
The concept of “social order” has gone out of fashion. The last major book on the
topic was written a quarter of a century ago and it is now out of print (Wrong, 1994):
even that book complained of the topic’s neglect. Meanwhile, and less directly, much
has been said about technology’s role in engineering the social world, in the wake
particularly of Actor Network Theory. Indeed, a whole way of thinking about the
social order through technology has developed that involves, in a sense, not thinking
about it (Latour, 2005), and rejecting the whole tradition from Durkheim onwards of
analysing the emergence of social facts from human beings’ efforts to construct social
reality.
There are, for sure, serious problems with versions of “social construction”
that paid little attention to media technologies (Berger & Luckmann, 1966). But, as
I have argued elsewhere (Couldry & Hepp, 2016), these can be addressed without
abandoning entirely the question of what social world emerges from processes
of social construction. Indeed, at a time when, through datafication, it appears
corporations and governments are intent on reconstructing social reality in ways that
align with their interests, it becomes vital to pay close attention to processes of social
construction. What if those processes are not metaphorical – as the term “social
construction” often seems to be – but literal: actual processes of building a different
material basis on which humans’ lives together can be configured?
Some remarkable intuitions of the future expansion of corporate power and
rule emerged three decades ago in the wake of Foucault’s extraordinary insights
into neoliberalism. I am thinking of Deleuze’s short essay on “the control society”
(Deleuze, 1997), on which much has been written. That essay, however, remains
vague about how its predictions will be actualized, and it cannot possibly have been
based on a prediction of social media platforms, which were not predicted even by
the engineers closest to the developments from which the internet developed and the
world wide web was invented. So, we must look elsewhere for a theory of how today’s
social world is being transformed.
The place to look is not commentary predicting the emergence of social media
themselves, for the issue is not about technology or software as such, but instead an
earlier tradition of thinking about social order itself that remains extremely insightful
12 The Social Construction of Reality – Really!
to this day. I mean the work from the 1970s and 1980s and even before of the German
sociologist Norbert Elias. Particularly useful is Elias’s idea that complexity in social
life emerges from interconnections between human beings, from the patterns of
interaction that he calls “figurations” (see Couldry & Hepp, 2016).
Figurations for Elias are “processes of social interweaving” that have a “special
kind of order” that “starts … from the connections, the relationships, and works …
out from there to the elements involved in them” (Elias, 1978, p. 116). His most simple
example is a game of cards or football or a dance in which everyone plays their part by
being in relations with each other person playing. As he says, “the behaviour of many
separate people intermeshes to form interwoven structures” (1978, p. 132). In Elias’s
approach to social order, by contrast with Durkheim’s, two things are very important.
First, he grasps the role that material infrastructures play: today, that means
software, computer code, servers for storing data, the cloud. But second, Elias insists
on thinking about the consequences of that material infrastructure, of technology,
from the point of view of the human beings entangled within them and their human
goals. This was a point Elias made eloquently towards the end of his life: “People
often seem deliberately to forget that social developments have to do with changes in
human interdependence […]. If no consideration is given to what happens to people in
the course of social change – changes in figurations composed of people – then any
scientific effort might as well be spared” (Elias, 1978, p. 172, added emphasis).
There are many worries today about the role of social media platforms in politics,
in government, in family life, in the lives of children, concerns that run through this
volume. Those worries are important, but they do not get to the most important issues
that datafication raises for social space and power: the problem of how social order is
being put together. Right now, that debate is emerging in multiple places.
Think of the intense debate today in the US about the consequences of automatic
data collection on the lives of the poor, which in the US disproportionately means the
lives of black people. As the legal theorist Patricia Williams (2019) recently commented,
“many of us imprison ourselves with ... technology by choice – the smart watches
we wear on our wrists, the GPS tracking on our cell phones or car-location apps, the
... reassurances of Siri. They aren’t perceived as disciplinary tools; instead they are
marketed as ways to connect.” Yet that, she suggests, is what they are: disciplinary
tools of social order operating through processes of datafication. The most dramatic
example of this new vision of social order through connection, through datafication,
comes from China. In China there are the most socially integrated digital platforms:
in effect “super-platforms” like Alibaba or Tencent which combine social media
(something like Facebook and Twitter and WhatsApp), with sites for e-commerce
(like Amazon) and with sites for personal finance. Unlike in the West, none of these
platforms are securely encrypted and the government has a close relation with
the owners of those platforms (it helped finance their building). Think of China’s
emerging “social credit system,” whose general framework and key mechanisms were
Managing Social Order Through Data 13
established by 2020 and which gives a score to every citizen depending on the data
gathered about them online –their score for social responsibility.
In an important policy document outlining this new system, the Chinese
government used an interesting phrase to describe its significance: “a market
improvement of the social and economic order” (China Copyright and Media, 2014).
So, we are brought back here to the question of social order, but this time not as a
theoretical concept, but as vision of government, a practical plan for the management
of society. A vision that, for the US, Patricia Collins (2019) goes so far as to call “the
civic practice of nothing less than totalitarianism.”
What these two rather dramatic perspectives on the forms of social order
emerging in datafied societies – the US and China – bring out is that the concept of
social order is not an academic detail, still less a theoretical extravagance, but rather a
highly practical term for registering how social worlds are, on the largest scale, being
transformed through the interlinking of all we do on social media (Elias’s insight),
and the systems of social governance, explicit and implicit, that are emerging to
manage them.
We cannot, in other words, do without a concept of social order. In the next
section, I want to address the question of what is distinctive about a datafied social
order.
It might, initially, seem implausible to argue that a new type of social order is being
made through the processing of data. This is, indeed, an extraordinary and epochal
development. In explaining this a little further, let’s remember Elias’s key insight that
new norms and what he called “social pressure” (Elias, 1987, p. 145) emerge without
anyone exactly intending them, as a complex and, if you like, higher-dimensional
side-effect of countless individual, group and institutional actors doing what they
intend to do. The “special kind of order” Elias was interested in emerges through
the continuous interweaving of many interrelationships and connections, their
progressive impact, as social actors try, successfully or otherwise, to live their lives
through the web of interrelations in which they have largely no choice but to be
entangled.
In Elias’s view, there is absolutely no need to imagine a vast corporate conspiracy
to build something like a social order. It would indeed be deeply implausible to claim
that what is emerging today through data processes was all, from the outset, planned
to occur in particular boardrooms (so, for example, Zuboff’s (2019) account of the
emergence of surveillance capitalism allows for plenty of contingency along the way,
as for example when Google discovered its ability to predict human activities in great
detail from crunching the vast datasets about people’s online activities that it had,
indeed, intended to amass to fuel its search algorithm). Acknowledging that, however,
14 The Social Construction of Reality – Really!
is very different from denying that corporate intention becomes a major factor once
the advantages of an emerging datafied social order become clearer to corporations.
We are now more than a decade into the era of social media and taken-for-granted
fast internet connection in many parts of the world, and we are now in a very different
phase in the evolution of datafied social orders.
Why in particular, you might ask, should new ways of collecting data generate a
new type of social order? Data, of course, has always been collected by governments,
though on a massively smaller scale and intensity than today’s everyday forms of
corporate data collection. The link between data and social order derives not so much
from the collection of data as from its use. As Oscar Gandy (1993, p. 15), a pioneer of
research into corporate data collection back in the 1980s, noted, the point of gathering
data is to make discriminations, to treat this entity or person differently from that
entity or person. In the early states of datafication, it was discriminations between
the customers of credit card companies and airline companies, to offer differential
pricing for linked purchases. But now the principle of discrimination-through-data
(that is, automatically harvested data from online activities) has spread right across
the social terrain, including the actions of government.
Also spreading fast is the principle that institutional rationality now depends on
the continuous gathering of data on human subjects so more discriminations can be
made about them. Although this will vary depending on employee status (with higher
status jobs being likely to be exposed less to continuous surveillance), many jobs today
involve not just regular monitoring of key outputs, but continuous tracking of every
dimension of an employment’s activities and the generation from this of data-driven
interventions to modulate and regulate the employee’s behaviour. Similar principles
apply to governments’ regulation of those citizens who are dependent on state
benefits or are in other ways subject to close management (for a useful recent survey,
see Sánchez-Monedero & Dencik, 2019). Once again, the point of data gathering is not
just to gather data, but to continuously manage behaviour through data uses.
While there might seem to be a huge distance between the explicit regulatory intent
of state authorities and the business models of social media platforms that track their
consumers, what is emerging across many different social and economic domains is a
shared rationality of changing behaviour through data, based on continuous tracking
and the constant modulation of signals and incentives.
The language of marketers is an instructive entry-point to this emerging rationale
for the social order of datafied societies. Listen, for example, to Price Waterhouse
Coopers (2014) speculating about a future where consumers will wear embedded
chips that monitor their bodily and psychic mood continuously: “brands could
even tap body cues to tailor messages ... sensor revealing that you’re thirsty? Here’s
a coupon for smart water.” Or listen to AT Kearney (2014), leading consultants in
the insurance industry, commenting on the advantages of the so-called Internet
of Things not for consumers, but for insurers: insurers, they say, could “use IoT-
enriched relationships to connect more holistically to customers and influence their
Conclusion 15
behaviors.” These are not random remarks, but early signs of a shift in business
rationalities summed up recently in a report by Wharton Business school professors
in the authoritative Harvard Business Review, which recommended the adoption of
“four effective connected strategies, each of which moves beyond traditional modes
of customer interaction and represents a fundamentally new business model. We call
them respond to desire, curated offering, coach behavior, and automatic execution”
(Siggelkow & Terwiesch, 2019).
Once again, we are looking less here at a conspiracy to dominate and influence
and more at a rationality for ordering the world. Which leaves a final question: how
do those tracked participate in this order? The short answer is that they are induced
in countless different ways to enter into what Ulises Mejías and I call “data relations,”
relations that configure social life on a basis designed to optimise the generation and
extraction of valuable data (Couldry & Mejías, 2019, Chapter 1). Data relations can be
seen as a leading form of “figuration” in Elias’s term for the era of datafication.
Such data relations can, however, have many different gradations: from the
definitely voluntary choice of someone who wants to track their fitness or health and
so uses a tracking app which sends data to a third party; the less voluntary “choice”
of an employee encouraged by her employer to use a health app as a condition of
obtaining work-related health insurance; the definitely not voluntary decision of
welfare claimants or borrowers whose activities online are comprehensively tracked
by state agencies or finance companies to generate a stream of information on their
reliability and creditworthiness. And then there is the barely voluntary submission
to tracking of users of social media platforms who may calculate that the seeming
necessity of being on the platform such as Facebook – so as to connect with everyone
else who is there for various practical purposes – makes it worth paying the price of
being tracked by the platform. What is much less clear is how platform users calculate
the bargain in relation to all the other uses of data relating to them gathered by and
through Facebook and used by multiple parties unknown to them.
In these various ways, data relations work and the forms of power established
through them come to stick. As we enter into ever more intermeshing data relations,
something like a social order emerges.
2.3 Conclusion
In this short essay, I have only been able to give a bare outline of how a social order is
being built through data processing, an order that is gathering a depth and intensity
unrivalled by previous forms of governance and social power.
It is worth emphasising, however, that this order remains under construction; it
is certainly not complete. Its eventual shape cannot at this stage be fully predicted.
Indeed, to the extent that this order is resisted by social actors, it will not unfold
exactly as I outline here. That is the point of analysing datafied societies from the
16 The Social Construction of Reality – Really!
point of view of social order; to alert readers to what is under way and help them
imagine what resistance might feel like. This demonstrates again that the concept of
social order is not a trivial addition to social theory, but a practical tool for analysing
the world that corporations and governments are building for us.
In this essay, however, I have chosen to focus on general features of the emerging
datafied social order, abstracting from the local complexities and tensions that are
the subject of the essays which follow. A more complete picture can, of course, only
be formed by reading them all together.
References
A.T. Kearney. (2014). The Internet of Things: Opportunity for Insurers. Retrieved from https://www.
atkearney.com/documents/10192/5320720/Internet+of+Things+-+Opportunity+for+Insurers.
pdf/4654e400-958a-40d5-bb65-1cc7ae64bc72
Berger, P. & Luckmann, T. (1966). The Social Construction of Reality. Harmondsworth: Penguin.
China Copyright and Media (2014). Planning Outline for the Construction of a Social Credit System
(2014-2020). As last modified April 25, 2015. https://chinacopyrightandmedia.wordpress.
com/2014/06/14/planning-outline-for-the-construction-of-a-social-credit-system-2014-2020/
Couldry, N. & Hepp, A. (2016). The Mediated Construction of Reality. Cambridge: Polity.
Couldry, N. & Mejías, U. A. (2019). The Costs of Connection. Stanford: Stanford University Press.
Deleuze, G. (1997). Postscript on Control Societies. In Negotiations (pp. 177–182). New York:
Columbia University Press.
Elias, N. (1978). What is Sociology? London: Hutchinson.
Elias, N. (1987). The Society of Individuals. Oxford: Blackwell.
Gandy, O. (1993). The Panoptic Sort. Boulder: Westview Press.
Latour, B. (2005). Reassembling the Social. Oxford: Oxford University Press.
Price Waterhouse Coopers (2014). The Wearable Future. Retrieved from https://www.pwc.com/us/
en/industries/technology/library/wearable-technology.html
Sánchez-Monedero, J. & Dencik, L. (2019). The Datafication of the Workplace, working paper, Data
Justice Lab, Cardiff university, 9 May. Retrieved from https://datajusticeproject.net/wp-content/
uploads/sites/30/2019/05/Report-The-datafication-of-the-workplace.pdf
Siggelkow, N. & Terwiesch, C. (2019) The Age of Continuous Connection. Harvard Business Review,
May-June, 2019. Retrieved from https://hbr.org/2019/05/the-age-of-continuous-connection
Srnicek, N. (2017). Platform Capitalism. Cambridge: Polity.
Van Dijck, J. (2014). Datafication, Dataism and Dataveillance: Big Data Between Scientific Paradigm
and Ideology. Surveillance & Society, 12(2), 197–208.
Williams, P. (2019). Why Everyone Should Care About Mass E-Carceration. The Nation 29 April.
https://www.thenation.com/article/surveillance-prison-race-technology/
Wrong, D. (1994). The Problem of Social Order. Harvard: Harvard University Press.
Zuboff, S. (2019). The Age of Surveillance Capitalism. London: Profile Books.
3 The Dramaturgy of Social Media: Platform Ecology,
Uneven Networks, and the Myth of the Self
For good reason, critical observers of the contemporary digital media landscape have
grown tired of Mark Zuckerberg’s contention that there is something inherently good
about “connection.” Even when faced with overwhelming criticism, the Facebook
founder and CEO has stuck to his claim, which seemingly counterbalances all evils
the company might be accused of, that Facebook facilitates building “community.”
This is not surprising, since more connection means more users, means more revenue,
means more profit for the company and its shareholders. But if we take Zuckerberg
at his word, he sees connection as valuable because it shores up social ties, which
have been shown to be beneficial to individuals in many ways; from lowering blood
pressure to making it easier to find a job. In other words, Facebook and other platforms
like it simply add more of a good thing to people’s lives.
One reason this simple formula fails to convince is the growing recognition
that social media are not simply added to what is already there: the institutions,
interactions, and effects of everyday life. They have gradually come to permeate
everyday life, and this interweaving has left the fabric itself changed. In other words,
social media have become ecological (Postman, 1998).
For their part, sociologists have long asked whether online social ties develop at
the expense of offline social ties. When it was found that this wasn’t the case, they
were reassured. Now we view the correlation between online and offline social ties
somewhat differently. We no longer think of them as additive or interchangeable, but
as mutually transformative. This changes the verdict. It means the difference they make
is no longer linear. Instead, they effect a broad qualitative shift that isn’t confined to
any particular area but has reverberations throughout the social environment. This
has consequences for how we study them. Although platforms have specific cultures,
which is the stuff of media studies, there’s also much to be said for understanding
platforms as sites within a larger ecology.
Hoping to develop an understanding of how such ecological processes “scale
down” (Breiger, 2015) to the level of daily life, we turn to the stories of two informants
we met in the course of our research whose social position as “very online” women
means that the platform ecology is particularly relevant to how their daily lives
unfold. Their experiences give us some points of reference to evaluate how well
the tools of the sociology of everyday life, particularly dramaturgical analysis, are
suited to our task. Dramaturgical concepts, which study the self in interaction,
are pervasive in the extant literature on digital media. It almost seems like Erving
Goffman, the founding figure of dramaturgical analysis, has experienced a rebirth
as an analyst of online life. Even so, our assessment of the dramaturgical approach
18 The Dramaturgy of Social Media
is mixed. While on the one hand it helps us bring some of the cross-pressures
that shape experiences within the platform ecology into view, it can also lead to
an overly narrow perspective. That is especially the case when the self is merely
taken as a strategic project subject to deception and manipulation by individuals.
In such cases, the dramaturgical perspective obscures the “colonization of everyday
life” (a term coined by Guy Debord) by platforms circumscribing what constitutes
idiomatic identity displays and establishing a hierarchy among them. Insofar as
dramaturgical perspectives account not just for individual strategies but also for
normative pressures and systematic interdependencies, they provide a useful tool
for making sense of platform ecologies.
Throughout our discussion, we draw on some findings from five years of studying
Instagram in Amsterdam using both computational and qualitative methods. Early
on in our research on social media in urban life, we identified uneven networks as
one of the defining features (Boy & Uitermark, 2017). For an impression, consider
that among the roughly 80,000 Amsterdam Instagram users we included in a
computational analysis, the top 50 users (0.06%) received more likes and comments
between them than the bottom 30,000 (38.4%). The Gini coefficient, commonly used
as a measure of income inequality, when applied to the distribution of attention
comes to a stunning 0.76 – considerably higher than the Gini coefficient for South
Africa’s income distribution, the world’s most unequal. We found this kind of
unequal distribution fractally repeated at every level, from the city as a whole to
individual neighborhoods and subgroups of users. Since we wanted to understand
how personal appeal and self-exposure through platforms are experienced in
everyday life, we figured that the most central users, those getting the most attention,
offered a privileged window onto this world – kind of like how social scientists of
another era studied the experiences of white-collar workers to understand the social
alienation they saw as society’s characteristic mentality. Or, to quote cyberpunk
legend William Gibson, “The future is already here – it’s just not evenly distributed”
(quoted in Ratcliffe, 2016b).
Using a network metric, PageRank, that initially developed rank search results
for the Google search engine, we could identify the hubs of the Instagram network.
Not surprisingly given what we know about the “very online,” a high number of these
individuals were young women in their twenties and thirties. Many of them work
in fashion, marketing, or entertainment – professions that give them facility in the
visual idioms of micro-celebrity. The experiences of two women in particular shaped
our thinking about the presence of Instagram in the practice of everyday life: Yvette
Very Online 19
and Sammy.1 We briefly introduce them here before returning to their experiences
below in our discussion of dramaturgical perspectives on social media.
During the day, Loggerhead’s is the kind of hamburger joint where you can get a burger
with a truffle-glazed patty, but even the basic burger – Angus beef, lettuce, tomato,
onions, slice of pickle – costs over ten euros. The restaurant, located on a busy market
street, is small and unassuming and features the same unfinished wood paneling
found in bars in gentrified neighborhoods the world over. At night, the back of the
establishment is rumored to transform into a nightclub serving exquisite cocktails
where you can dance till the early hours of the morning. Rumor also has it that access
to the secret back room is only granted to those who know the password. Standing at
the passageway between the burger joint and the extravagant speakeasy-style club
is a door hostess. She’s who you have to convince if you want to be part of what is
happening in the back room. “Most people coming are wasted, that’s why I call myself
a ‘door bitch.’ I try to be polite,” Yvette Legrand tells us, laughing.
In her early thirties, tall, with long blonde hair and wearing an elegant outfit,
sometimes with a hint of butch, she cuts an imposing figure in the role of gatekeeper.
But that’s not her only role –not by far. On her Instagram profile, she calls herself
an “Amsterdam insider,” and her insider status derives not only from being able to
decide who’s in and who’s out in the backroom at Loggerhead’s. Yvette became an
insider by entering the city’s party scene and getting to know a lot of people not long
after her thirtieth birthday. In a matter of just two years, she became highly connected
among the movers and shakers of the city’s nightlife. In her various other roles – as
party organizer, event producer, and photographer – she has put them on a guest list,
partied with them, and, of course, taken their picture. There’s no question that she
belongs.
What ties together these various activities in Yvette’s life is the crowd of people in
which she moves. In her understanding, this crowd, or “scene,” is defined by a shared
style above all else. “My photography is a bit more fabulous,” she explains. “Either
you like it or you don’t.” Those who like her photography are those she encounters
in other parts of her life as well. Because she lives in De Pijp, walking distance from
Loggerhead’s and most other central venues where the city’s party scene congregates,
she moves in a relatively small radius and mostly interacts with likeminded people. “I
have a certain kind of people that I see in my life wherever I go. They’re all in the same
crowd. So it’s pretty easy for me, because I know a lot of them. When I go somewhere
with a camera, they jump in front of my camera. I don’t have to ask them, ‘Can you
1 We use pseudonyms for both people and places to hide our research participants’ identities.
20 The Dramaturgy of Social Media
please…?’” Similarly, when she’s the one hosting a party, she doesn’t have to work
particularly hard to get people to turn out. They come, because Yvette’s involvement
all but guarantees the party will have the right vibe. Yvette is connected, and she is
also recognized as somebody who knows the right kind of people. Her recognition in
the scene revolves around her persona – Yvette Legrand is her nom de guerre, and she
projects a seductive and glamorous image through her appearances in the city’s party
venues and online, chiefly Instagram.
Other events she participates in, such as art openings, are a way for her to extend
her social circles and to investigate what appeals to people in other scenes. Rather
than just draw in the people she already knows, she tries to mix up the composition
of her crowd by assembling members of different groups. “That’s the most important
thing to keep on going,” she explains. “To be interesting in the scene, it has to be
surprising.” Filling a venue is no challenge when you’re as connected as Yvette is; the
challenge is to put the right people together. If four out of five attendants are gay men,
the women and straight men will be alienated and won’t want to come back. Instead,
you have to engage in an activity that Yvette likens to scouting: searching for the right
kind of people that will fit in. Another smaller event with an attendance of 80 to 100
that Yvette started serves as her scouting grounds. Each person she personally invites
is able to bring two to three other people. “It’s the best cocktail you could imagine,”
she says enthusiastically. The event brings together gay men, well-dressed women,
and straight men who say to themselves, “It’s a bit gay, but I actually like this!” Mixing
this cocktail is a matter of mobilizing the right social connections, but also of having
the right communications strategy.
In the course of our research we also spoke to Sammy, another young woman thriving
on social media. Sammy has a lot going on in her life. She runs a program to match
brands and social media influencers, organizes talent scouts, is responsible for the
creative management for several well-known artists, designs marketing campaigns
for various big brands, hosts evenings at one of Amsterdam’s best-known clubs,
and manages a co-working space for creative entrepreneurs. She’s a self-diagnosed
workaholic: “I never stop. I work 24/7. Go! Go! Go! There is no such thing as a holiday,
and we don’t do breaks.”
Not that she minds. She knows no greater pleasure than creating content
for marketing campaigns. She loves working with her best friend and long-time
collaborator, Cori. Unlike Sammy, who is more into marketing, Cori is a “real fashion
girl.” She is also wilder, younger, and taller, so she appeals to a different subset of
people in the scene. When they’re at events, the two of them stand out. With her height
and looks, Cori is naturally the center of attention. Sammy all too modestly states that
she can also attract looks if she dresses up. As a self-professed workaholic, Sammy
Dramaturgy: The Self in Interaction 21
abhors the distraction of exhibitions or social events, but she found out that she and
Cori are at their best when they’re going out. She checks out how other entrepreneurs
organize events or promote brands (and invariably comes to the conclusion that
they can do better) and gets into contact with business partners or recruits for her
influencers program. As long as she attracts attention, she knows opportunities, and
new people, will present themselves.
Take her recent foray into deejaying. She had been messing around with a turntable
for a couple of weeks when she got her first booking. At the time of the interview,
her deejay career was accelerating. That was before she had actually purchased any
deejay equipment. When she explains why she is so successful, she mentions looks
and connections. Social media are important for both. Sammy consciously crafts a
stream of images to maintain visibility, so she’s on people’s minds, allowing her to
outcompete aspiring deejays who have spent years honing their skills. Having an
Instagram profile helps her maintain connections and make new ones.
media are common. Since the 1990s, social psychologists, communications scholars,
and scholars of human-computer interaction (HCI) have adopted his work to analyze
what people do online, and publications discussing social media citing Goffman and
using his central concepts now number in the hundreds. While these appropriations
of Goffman indicate some of the ways in which dramaturgy helps us understand the
social media–social order nexus, they are not in themselves without shortcomings.
Our review seeks to assess the existing literature and clarify how the perspective we
develop here relates to existing perspectives.
3.2.1 Self
Posts and profiles on social media are meaningful because they are the expressive
products of users who put their selves on display. This was already true of personal
websites, blogs and other pre-Web 2.0 formats, but social media heightened the
emphasis on the self as the locus of significance because of the insistence, in the
words of Facebook founder Mark Zuckerberg, that “[y]ou have one identity … Having
two identities for yourself is an example of a lack of integrity” (quoted in Ratcliffe,
2016a). Foremost among the Goffmanian concepts to enter the literature is, therefore,
the “self”: its production, presentation, and evaluation.
The literature on social media using dramaturgical frameworks has two main
emphases in its discussion of the self: the self as strategic project, and the self as
myth.2
especially should not assume it can be drawn around inherently pathological behaviors or traits (see
also Warfield, Cambre, & Abidin, 2016).
3 Patreon is a digital platform through which subscribers can access content produced by artists and
performers.
4 In Goffman’s work, “fatefulness” implies that something may “spill over into the rest of life”
(Goffman, 1967, p. 162). A gambler wants the situation at the gambling table to transform their life
into one of affluence. Similarly, aspirational social media users may want their online personae to be
a pathway to a better livelihood. An excellent literary depiction of such a fateful transformation can
24 The Dramaturgy of Social Media
the game-like, strategic nature of online sociability. Having and building an online
presence is a gamble taken in hope of sprucing up one’s social status.
The game-like cast of online interaction is a reflection of the competitive
environment bred by social media which brings strategic considerations to the fore.
Social media feature publicly visible personae, tools for reward and appraisal, and
multiple clear indicators to gauge the impression made on others. Combined, these
features amount to a perfect storm. They conspire to make impression management
and self-presentation salient and ongoing concerns for those who maintain a public
presence on social media.
Metrics can be an immaterial mark of distinction, and they can also translate
into economic opportunities. But in absence of metrics, there are other ways of
waging competition on social media. On Instagram (which has stopped displaying
the number of likes on posts), appearing alongside celebrity users and being tagged
by them is a coveted trophy (Abidin, 2018). On Twitter, the practice of “one-upping”
or “dunking on” other users, of concocting “owns” and “burns” in response to
others’ status updates, is an almost unescapable part of the experience. All of this
competitiveness is no doubt intensified by the reigning neoliberal meritocracy which
“places a strong need to strive, perform, and achieve at the center of modern life”
(quoted in Day, 2018).
Yvette and Sammy’s experiences both speak to the importance of expression
games. Looking through their carefully curated feeds, it was undeniable that they
gave a lot of strategic thought to their appearance. Yvette likened this to being an
artist on a stage, and she insisted that aside from that, she is a “normal person” who
attends small-town family gatherings as well. She finds it important to not come over
as too icy and unapproachable, so she tries to smile and not take herself too seriously.
In discussing this with us, Yvette revealed that she was aware of a tension between
her desire, on the one hand, not to get too sucked into the frequently competitive
game of self-presentation on social media and, on the other hand, managing the
impression others have of her. Resolving this tension is a matter of careful reflection,
which means her social media presence becomes a larger preoccupation than she’d
like it to be. The game never ends.
Sammy saw this, too, and in fact she thrived on the excitement of always being on
and always having to remain vigilant. Moving through different scenes at a dizzying
pace, Sammy emphasizes she has to act fast, very fast, to keep up with developments
and seize new opportunities. But you couldn’t tell just from looking at her posts.
There she seems to be kicking it. She is having a drink, doing a dance. She’s acutely
aware that the images are contrived. “Everything I put up there is tongue in cheek.
be found in Stagg (2016). Almost overnight, the protagonist Colleen rises to influencer status, and the
resulting transformation of her life is whiplash-inducing.
Dramaturgy: The Self in Interaction 25
You know exactly how you present yourself. You’re constantly feeding. There’s a sort
of marketing narrative. It’s ridiculous, but it’s there.”
means avoiding expression rather than engaging in strategic expression games. It’s
about what we hold back, not just what we put out there.
Despite the evident joy both derive from expression games, the strains of paying
homage to the myth of the self are apparent in Yvette and Sammy’s experiences. When
we met Yvette, she was dressed down in yoga pants and looking forward to getting a
good night’s rest. For the next four days, she was booked, either as the “door bitch” at
Loggerhead’s, or photographing events. This meant multiple late nights coming up,
and yoga and resting were Yvette’s way of anticipating this exhausting stretch and
maintaining a degree of balance in her life. Yvette expressed ambivalence about her
ability to maintain balance. “I can do a lot,” she told us. “But when it’s my own party
and I need to be there till five o’clock in the morning, sometimes I really don’t feel like
it.” She has to be the last one standing, not just because she bears responsibility as
the organizer, but also because she has to keep everyone’s spirits up till the end.
Yvette is feeling the strains of playing her role. “I’m always watching and they’re
always watching me. … You can see me in social media, being in front of everything.
I want to be more in the background. It’s pretty exhausting.” Her way out is not an
exit, but a pivot. She aspires to become an entrepreneur whose involvement in urban
scenes is not in the foreground, as an artist, but more behind the scenes. She hopes to
achieve this by building a web-based guide to gay Amsterdam, advertising events and
locations and providing booking and ticketing services, all from her unique insider
perspective. She’s built a prototype, but it hasn’t really gotten beyond the stage of a
passion project. Even so, Yvette hopes this venture will become a “second step” in her
career as an insider, allowing her to capitalize on her connections and her persona
without having to perform all the frontstage work the scene currently demands of her.
Her planned pivot holds the promise of an eventual reprieve from all this
exhaustion. She thinks perhaps she’ll even be able to hire somebody to share the load
with her. Meanwhile, she has to achieve her hoped-for balance in other ways. Reading
about spirituality and practicing yoga are part of her practice of self-care and have
been since before she became a scenester. “I’m really into growth. Once in a while I
really need to go inside myself for real, like working, healing,” she explains when we
ask about her interest in spirituality. “That’s something I missed in the last two years,
when I got really into this world, which is a lot of, of course, like, fake and tough and
competition and whatever.”
The sense that her world is permeated by fakeness and competition is another
source of exhaustion, if not anxiety. Yvette feels a desire to steer against it, to be a
beacon of authenticity in the fake world in which she moves. That’s the reason she
doesn’t really like social media, and why she tries to restrict her use of it to building a
portfolio of her various activities. Aside from Instagram, where she feels the need to
be active, she also maintains a site on Tumblr, a Vimeo profile, and a Facebook Page
promoting her work as a photographer. At the same time, because she is aware that
everything on social media tends to “look so much more beautiful than it really is” –
in fact, that’s the whole point of social media as she understands it – she also wants
Dramaturgy: The Self in Interaction 27
to show another side of herself. She mentioned making an effort to share things from
other parts of her life, such as taking an elderly acquaintance out for a walk or visiting
her family in a small town in the south of the Netherlands.
Sammy also told us that she’d recently been looking to make a change. She was
hunting for a job. “Not a nine-to-five job,” she emphasized, but still something more
“corporate.” Her attempts so far had been unsuccessful. For one position, she spent
an inordinate amount of time on the application. She put together a video clip with
help from some friends. She took four days to write an application letter to get it
absolutely right. And still, in the end, she didn’t get the job. It’s not that she can’t
do the work, because she’s already doing it, and at a high level. It’s just that, in
this industry, short-term or one-time contracts are the norm. While it is exceedingly
difficult to get a steady job, it is – at least for Sammy – remarkably easy to move
from one gig to the next. Under these structural conditions of intense competition and
short-term engagements, people like Sammy are successful as long as they maintain
their reputations and keep up with their excruciating work schedules.
Sammy’s carefully curated Instagram profile only captures the glamorous aspects
of her brutal life-work regime. “I was working five days full-time on a day job. But you
can’t tell someone what they need to do and then not show up at night to see how
they do it. It’s not officially part of your job but you have to do it.” At 32, she feels
she’s getting old. She works out in the gym and has a policy of not drinking alcohol
or using drugs. “I look to London and New York for examples. Those people get up
at six in the morning and get home around one. Sure, they’re paid different kinds of
amounts, but you have to persist if you want to get somewhere.” Working from a canal
house in Amsterdam’s historic central district and shaping the image of big clubs and
large corporations, she has achieved much more than most people in her industry can
hope for, but she remains in a precarious position. Her devotion to her career is taking
a toll. She suffers from spells of exhaustion. She shares much of the glamour and the
suffering with her friends but she can’t really relate to her family anymore. When we
asked her whether it was difficult to explain what she’s doing, she replied that they
have stopped asking. In turn, she stopped going to family celebrations.
Bound up as it is with myriad strains and anxieties, self-presentation is not
merely strategic, but also ritualized. That means that, while they can tailor their
performances to different audiences and use all manner of strategies to improve their
status, neither Yvette nor Sammy can avoid self-presentation or turn it off when the
costs outrun the payoff.
3.2.2 Interaction
other words, we inhabit a shared social world in which our roles and behaviors are
meaningful to each other because of the displays we put on for one another. Every
moment of our social existence is an accomplishment rather than a natural outgrowth
of our human nature or the functional product of the social order. Both performers
and audiences constantly have to affirm, confirm, or correct the impressions fostered
in their shared drama. Understanding social life requires close attention to these
ceaseless maneuvers. As a “sociology of occasions” (Goffman, 1967, p. 2), Goffman’s
dramaturgical approach is interested in the syntax of momentary relations rather
than their specific content or longer-term structures. It’s all about process.
Goffman thought that face-to-face interaction was the site par excellence to study
this process. This wasn’t because he deemed other interactions less meaningful; he
mainly wanted to redeem the most basic forms of interaction from the condescension
of mainstream social scientists dismissing them as trivial. Given this emphasis, it is
no surprise that the literature takes differences between face-to-face and mediated
interaction as occasion to go beyond Goffman (Cetina, 2009). The context of
interaction becomes more complicated. “The presentation of self in everyday internet
still corresponds to Goffman’s playacting metaphor,” writes Jia Tolentino (2019,
p.14). “But the internet adds a host of other, nightmarish metaphorical structures:
the mirror, the echo, the panopticon.” While there is broad-based consensus in the
literature that we need to study more than the face-to-face, there is no consensus on
what that should look like.
long as possible, and that scale up indefinitely. They also try to squeeze as much
data out of users as possible to target advertisements or strengthen their positions
as data brokers. For that reason, Facebook users are encouraged to share their likes
and dislikes in ever more detailed online profiles. These profiles are thus no longer
(primarily) symbolic representations of selves, but inputs into larger algorithmic
systems.
Despite this strong emphasis in the literature, our conversations with Yvette,
Sammy and other participants do not suggest that varying affordances play a big
role in their daily lives. Even though they navigate multiple platforms with different
affordances and have seen platforms change their affordances, their practices and
anxieties had little relation to the shifting socio-technical landscape.
3.3 Conclusion
References
Abidin, C. (2018). Internet Celebrity: Understanding Fame Online. Bingley: Emerald.
Baker, S. A. & Walsh, M. J. (2018). ‘Good Morning Fitfam’: Top Posts, Hashtags and
Gender Display on Instagram. New Media & Society, 20(12), 4553–70. https://doi.
org/10.1177/1461444818777514.
Boy, J. D. & Uitermark, J. (2017). Reassembling the City Through Instagram. Transactions of the
Institute of British Geographers, 42(2), 612–24. https://doi.org/10.1111/tran.12185.
References 31
Boy, J. D. & Uitermark, J. (2019). Theorizing Social Media with Elias: Status Displays, Mutual
Monitoring, and the Genesis of New Sensibilities. SocArXiv. https://doi.org/10.31235/osf.io/
phm5x.
Boy, J. D. & Uitermark, J. (2020). Lifestyle Enclaves in the Instagram City? Social Media + Society,
6(3). https://doi.org/10.1177/2056305120940698.
boyd, d. (2010). Social Network Sites as Networked Publics: Affordances, Dynamics, and
Implications. In Papacharissi, Z. (Ed.), Networked Self: Identity, Community, and Culture on
Social Network Sites (pp. 39–58). New York: Routledge.
boyd, d. (2014). It’s Complicated: The Social Lives of Networked Teens. New Haven, Conn.: Yale
University Press.
Branaman, A. (1997). Goffman’s Social Theory. In Lemert, C. & Branaman, A. (Eds.), The Goffman
Reader (pp. xlv–lxxxii). Oxford: Blackwell.
Breiger, R. L. (2015). Scaling down. Big Data & Society, 2(2), https://doi.
org/10.1177/2053951715602497.
Cetina, K. K. (2009). The Synthetic Situation: Interactionism for a Global World. Symbolic Interaction,
32(1), 61–87. https://doi.org/10.1525/si.2009.32.1.61.
Davis, J. L. (2014). Triangulating the Self: Identity Processes in a Connected Era. Symbolic
Interaction, 37(4), 500–523. https://doi.org/10.1002/symb.123.
Day, M. (2018). Under Neoliberalism, You Can Be Your Own Tyrannical Boss. Jacobin, January.
Retrieved from https://jacobinmag.com/2018/01/under-neoliberalism-you-can-be-your-own-
tyrannical-boss
Dijck, J. van. (2013). ‘You Have One Identity’: Performing the Self on Facebook and LinkedIn. Media,
Culture & Society, 35(2), 199–215. https://doi.org/10.1177/0163443712468605.
Duffy, B. E. (2017). (Not) Getting Paid to Do What You Love: Gender, Social Media, and Aspirational
Work. New Haven, Conn.: Yale University Press.
Ellison, N., Heino, R., & Gibbs, J. (2006). Managing Impressions Online: Self-Presentation Processes
in the Online Dating Environment. Journal of Computer-Mediated Communication, 11(2), 415–41.
https://doi.org/10.1111/j.1083-6101.2006.00020.x.
Goffman, E. (1959). The Presentation of Self in Everyday Life. Garden City, NY: Anchor Doubleday.
Goffman, E. (1961a). Asylums: Essay on the Social Situation of Mental Patients and Other Inmates.
Garden City, NY: Anchor Doubleday.
Goffman, E. (1961b). Encounters: Two Studies in the Sociology of Interaction. Indianapolis:
Bobbs-Merrill.
Goffman, E. (1967). Interaction Ritual: Essays in Face-to-Face Behavior. Chicago: Aldine.
Goffman, E. (1969). Strategic Interaction. Philadelphia: University of Pennsylvania Press.
Goffman, E. (1979). Gender Advertisements. New York: Harper & Row.
Gouldner, A. (1971). The Coming Crisis of Western Sociology. London: Heinemann.
Hancock, B. H. & Garner, R. (2014). Erving Goffman: Theorizing the Self in the Age of Advanced
Consumer Capitalism. Journal for the Theory of Social Behaviour, 45(2), 163–87. https://doi.
org/10.1111/jtsb.12062.
Hearn, A. (2008). ‘Meat, Mask, Burden’: Probing the Contours of the Branded ‘Self’. Journal of
Consumer Culture, 8(2), 197–217. https://doi.org/10.1177/1469540508090086.
Leary, M. R. & Kowalski, R. M. (1990). Impression Management: A Literature Review and
Two-Component Model. Psychological Bulletin, 107(1), 34–47. https://doi.org/10.1037/0033-
2909.107.1.34.
Leaver, T., Higfield, T., & Abidin, C. (2020). Instagram: Visual Social Media Cultures. Cambridge:
Polity.
Lefebvre, H. (2002). Critique of Everyday Life (Translated by John Moore; Vol. 2). London: Verso.
(Original work published 1961).
32 The Dramaturgy of Social Media
Marwick, A. (2014). Status Update: Celebrity, Publicity, and Branding in the Social Media Age. New
Haven, Conn.: Yale University Press.
Marwick, A. E. & boyd, d. (2010). I Tweet Honestly, I Tweet Passionately: Twitter Users, Context
Collapse, and the Imagined Audience. New Media & Society, 13(1), 114–33. https://doi.
org/10.1177/1461444810365313.
Norman, D. A. (1988). The Design of Everyday Things. New York: Doubleday.
Postman, N. (1998). Five Things We Need to Know About Technological Change. March 27. Retrieved
from https://www.technodystopia.org/.
Ratcliffe, S. (Ed.). (2016a). Mark Zuckerberg. In Oxford Essential Quotations (4th ed). Oxford: Oxford
University Press. https://doi.org/10.1093/acref/9780191826719.001.0001.
Ratcliffe, S. (Ed.). (2016b). William Gibson. In Oxford Essential Quotations (4th ed). Oxford: Oxford
University Press. https://doi.org/10.1093/acref/9780191826719.001.0001.
Silfverberg, S., Liikanen, L.A., & Lampinen, A. (2011). ‘I’ll Press Play, but I Won’t Listen’: Profile
Work in a Music-Focused Social Network Service. In CSCW ’11. ACM Press. https://doi.
org/10.1145/1958824.1958855.
Stagg, N. (2016). Surveys. Cambridge, Mass.: Semiotext(e).
Tolentino, J. (2019). Trick Mirror: Reflections on Self-Delusion. London: 4th Estate.
Warfield, K., Cambre, C., & Abidin, C. (2016). Introduction to the Social Media + Society
Special Issue on Selfies: Me-Diated Inter-Faces. Social Media + Society, 2(2). https://doi.
org/10.1177/2056305116641344.
Wissinger, E. (2015). This Year’s Model: Fashion, Media, and the Making of Glamour. New York: NYU
Press.
4 Clusters of Prestige: Social Media and Social Order
in the Norwegian Bible Belt
4.1 Introduction
This chapter uses data from the southern Norwegian city of Kristiansand (population
90,000), asking whether social media constitute a vector for challenging the local
social order, or rather reproduce and reinforce existing established-outsider relations.
We combine computational and qualitative methods, while drawing on analytical
concepts from Norbert Elias’ figurational sociology, whose primary concern is
how social figurations are created and maintained through notions of prestige and
shame, as well as models of behavior (Elias, 1978). Specifically, we utilise Elias’
conceptualization of “established-outsider relations,” which he proposed as “a
universal human theme” of creating and maintaining social distinctions within the
same community (Elias, 1994, p. xv).
For Elias, the fundamental characteristic of social figurations is the distinction
between a dominant “established” group and other “outsider” groups; indeed,
categories such as gender, race, or class he sees as secondary to this most fundamental
social figuration (Elias, 1994, p. xviii).5 The superiority of the established group stems
not primarily from numerical size or use of force – the group is often a numerical
minority – but from a comparatively high degree of internal cohesion and extent of
communal control (Elias, 1994, p. 86). Internal cohesion is created and maintained
by certain collective norms “which are apt to induce the gratifying euphoria that
goes with the consciousness of belonging to a group of higher value and with the
complementary contempt for other groups” (Elias, 1994, p. xviii). Put another way,
the two key elements in established-outsider figurations are power and morality, or
rather, power reinforced by a sense of moral superiority (Elias, 1994, p. xv).
Elias’s framework lends itself particularly well to analyses of social media, since
they are constructed precisely to facilitate mutual recognition (or ignoring) between
users competing for signs of prestige and seeking to reinforce their social status within
particular networks and groups.
5 For a discussion of Elias’ theory of established-outsider relations and race, see e.g. (Stanley, 2016).
34 Clusters of Prestige: Social Media and Social Order in the Norwegian Bible Belt
Named the buckle of the Norwegian bible belt, Kristiansand is the administrative and
economic center of the country’s southernmost region – a region which for the past
century has been known as a stronghold of conservative Evangelical Christianity.
The close association between regional Christian mission ministries, free churches,
and the mercantile middle and upper classes has molded the political, religious, and
cultural landscape of the region and its coastal ‘capital’ for at least the past 120 years,
and is well-known and accounted for by historians. (Abrahamsen, 2014; Seland, 2012,
2014). Even today, the region – but in particular Kristiansand – remains something
of a national political anomaly in its comparatively strong support for the relatively
conservative Christian Democratic Party (KrF), together with weaker support for the
Labour Party (AP)(Røed, 2010). Many of the Christian families who, with the help of
willing and generous brothers in the Christian associations, became wealthy during
the late nineteenth and early twentieth centuries, still remain so today.6
Through the 1990s and onwards, the region and its municipal center has
maintained a high level of religious activity according to almost all common
indicators (Botvar et al., 2010; Botvar & Aagedal, 2002; Magnussen et al., 2013). 24%
are religiously active at least once a month, compared to 7% nationwide. The region
has a high proportion (15% in 2008) of people who feel some association with one
of its many free Evangelical churches, compared to the rest of the country (3% in
2008) (Magnussen et al., 2013). The region has high levels of part-time work among
women, and studies suggest an ideal of “the good mother” – working less in order
to “spend time with her children” – remains a strong norm, to the point where non-
working mothers might sanction other mothers who “work too much,” which again
leads to full-time-working mothers reporting feeling like outsiders (Magnussen et al.,
6 As Elias also points out, it is not uncommon to find a certain allusion to family bonds in studies
of high- and upper middle-class communities, where networks of families often may operate as a
powerful factor in the social stratification and structure of the local community (Elias, 1994, p. 3).
Social Order in Kristiansand 35
2005).There are more married couples with children than in other regions, and more
married couples with many children (Ryen, 2002).
Other research has shown how in this particular region the most important
factor explaining the lingering skepticism towards gender equality – even more than
social background, age, education, or income levels – is the conservative Christianity
found in the free churches and associations (Magnussen et al., 2005, 2013). So-called
‘traditional men’ in this region are more conservative than their peers in other parts
of Norway: they believe in God; they tend to see religion as relevant and important on
a daily basis; they support religious organizations, and they are particularly oriented
around so-called ‘traditional family values’. While on a national scale this group
tends to score low on experience of contentment/happiness, in this region it scores
the highest, enjoying higher social status, higher education, and a stronger financial
situation (Ellingsen & Lilleaas, 2010).
Even religious people in the region who are “sporadically active” are more
conservative than the same group nationwide, which some researchers have suggested
“supports the hypothesis of a Christian conservative hegemony” (Halvorsen, 2004).
Some have suggested that the effects of conservative Christianity extend beyond the
“core congregation,” so that conservative values (with regard to family structures,
sexual norms, and so on) somehow spill out of the specific church contexts. While
one might contest this by saying it ascribes too much power to what is arguably still
a numerical minority, Elias’ theory of established-outsider relations explains how
the fact that key members of the “established” group might hold key positions in the
community means that their norms come to influence people beyond their relatively
close-knit circle, and despite their lacking numbers. Indeed, it has been shown that
the moral ideals associated with this group remain strong even for people who have
to some extent left the former religious faith; that is, the ideals continue to influence
their perspective on what it might mean to be a “good person” and lead a “good life”
(Henriksen & Repstad, 2005).
From the 1930s, tourism gradually became one of the region’s primary economic
engines, with Kristiansand as a natural center point. During the first decades of the
twentieth century, as artists began to explore the variations in the southern landscape,
these traits gradually turned into “positive” stereotypes in the increasing promotion
of Sørlandet (the South land) and Kristiansand as a tourist attraction associated
with summer, seaside, and hospitable locals (Johnsen, 2010). The accusations that
had been levelled at southerners during the decades of decline in the sail shipping
industries – that they were slow, lacked initiative, and were generally politically
incompetent – transformed into characteristics with more positive connotations: the
36 Clusters of Prestige: Social Media and Social Order in the Norwegian Bible Belt
At the time of writing, one long-time member of the Cultiva steering board is
Kristiansand’s vice mayor from the conservative Christian Democratic party. In 2009,
another well-known conservative Christian politician from the Conservative Party
became new chair of the board. Soon after, in April 2011 Cultiva surprisingly changed
their official strategy to the following: “Kristiansand will become the leading city of
culture for children in the Nordic countries. With this the city will become the best
place for growing up and a city that children and their families alike must visit”
(About Cultiva, 2017). Instead of having artists apply for funding (a process that had
Social Order in Kristiansand 37
been criticized for being overly complex and oriented towards questions of economic
profitability), the board would seek to initiate projects themselves, and then look
for potential partners. The abrupt change spurred strong negative reactions from
the cultural milieus in the city – like when more than 50 artists, critics, actors, and
directors issued a joint statement protesting the change and demanding the board
members’ resignation – but at the time, these protests had little effect.
7 IK Start still enjoys an annual Church service in their honor at the local church.
38 Clusters of Prestige: Social Media and Social Order in the Norwegian Bible Belt
participation had reached a national record high of 10%, five times higher than other
comparable cities.
From the above we might glean some general characteristics of Kristiansand’s social
order.
One characteristic is a particular church culture. During interviews with project
leaders and key people found through “snowballing” methods, remarkably many
informants referred to “church culture” or “church power” as a key factor in the city’s
social order. These were less precise attributions than expressions of a general sense
that in Kristiansand it matters whom you know, and that decisions can often appear
to have been made after church services as much as around official negotiation tables.
Another characteristic is a strong focus on nuclear families. We see it in how
the Children’s City project not only seeks to cater to this demographic for tourism
purposes, but also in the effect it has on local businesses, who even outside of the
tourist season have to target families with children, even if this would not be their
‘natural’ customer base. A further indication is the changes made to Cultiva’s statement
of purpose, which at the time when this research was conducted primarily targeted
nuclear families with children.
A third characteristic we see across various arenas in Kristiansand is
a general celebration of physical exercise and experiencing nature. This
is evident in the high number of memberships in sports clubs, and in
the mediatization of and official subsidizing of fitness events such as Cycle to
Work or Terrengkarusellen. Similarly, the promotion of a large new neighborhood
as “the sportiest neighborhood in Norway” speaks to the importance of physical
exercise as a symbol of prestige and high status.
In isolation, none of these are peculiar to Kristiansand; many cities promote
themselves in similar ways. However, we contend that the particular combination of
these gives Kristiansand’s social order a distinct local “flavor” which is recognizable
as “typical” of the place. In the next section, we turn to the question of whether social
media in Kristiansand tend to challenge these norms, or rather serve to reinforce and
reproduce them.
mentions, referrals, and so on, which means that online visibility depends on
affirmation, and that different forms of affirmation provide different levels of
visibility. In contrast to such accounts, Alice E. Marwick convincingly argues that just
like the tech-entrepreneurial scene in San Francisco where they were first designed,
“social media applications encourage people to compete for social benefits by
gaining visibility and attention [...] adopt[ing] self-consciously constructed personas
and market themselves [...] to an audience or fan base” (Marwick, 2013, p. 5). One
point being made here is that the technology itself is structured in order to create
and facilitate ever-more conforming clusters of users with similar sensitivities and
aspirations. In these clusters, most signs of affirmation go to a few very active and
comparatively central users with a lot of followers. Receiving affirmation from a
cluster of users, or indeed from one central user within such a cluster, ensures
visibility within that cluster.
Again, Elias’ figurational sociology lends itself particularly well to this reading
of social media logics. In his book The Court Society (1983), he describes the social
life at the seventeenth-century royal court, which has several striking parallels to the
social dynamics on social media platforms. For instance, in order to rise in the social
hierarchy of the court, the important thing is not so much to be rich and powerful,
as to be perceived as such.8 People at the center of this universe display their status
with ever-new attire and performances, which people in their orbit seek to emulate
and mimic. In the same way, social media users tend to orbit central celebrity users
– so-called influencers – within specific fields of interest that one simply has to follow
in order to belong.
Furthermore, like at the royal court, social media users tend to display themselves
in situations signaling high status, while at the same time trying to stand out from the
crowd as authentic and original. Success in this endeavor is relative to feedback in
the form of likes, comments, tags, shares and mentions. This “traffic” makes users
visible to others, just as their own affirmative gestures determine what and who will
(over time) become visible and available to them. Negative feedback most often takes
the shape of scrolling past content, unfollowing, or quietly ignoring – though outright
shaming also occurs.
Drawing on these theories, the Cultural Conflict 2.0 project has sought to
investigate how social media is reshaping social relations in particular cities, looking
especially at how social order is generated, reinforced, and challenged both on social
media platforms and at their intersection with life in the physical city. What then
can be said about the social order and social media in Kristiansand? We began our
investigation by focusing on Instagram, because this platform’s strong emphasis on
visual communication and affirmation in the form of following, likes and affirmative
comments, together with a comparatively limited possibility for verbal messaging,
8 I am grateful to Justus Uitermark and John Boy for highlighting this point.
40 Clusters of Prestige: Social Media and Social Order in the Norwegian Bible Belt
In order to locate user networks and clusters, we identified geotagged posts from
Kristiansand posted between June 2015 and May 2016, from users who post at least
every 14 days (to eliminate potential tourists). We assigned a relational tie every
time users expressed mutual appreciation in the form of likes, comments, mentions,
tags, and so on. In this way, we identified 8 Instagram user clusters in Kristiansand,
each centering on about 10–15 top users. The pattern of distribution of social status
typical of Instagram also holds on this level: most likes and comments go to the top
users, who could be seen as modelling the successful symbolic entrepreneur in their
respective clusters.
We manually viewed all the posts posted in this period by the ten top users in
each cluster and compared each of their feeds against ten randomly selected users
in the same cluster. Most of these users had an open account, so we were able to see
all their posts. The few who had private accounts generally seemed (from the look of
profile pictures, or from emojis or hashtags used in their bio) to affirm the general
sense of their respective clusters’ circulating symbols of prestige (so, for instance, a
private account near the top of a cluster focusing on CrossFit might typically have a
profile picture of someone performing CrossFit exercises).
Table 4.1 below shows the eight largest clusters, the name we gave the cluster
according to the typical themes that circulate among its most central users, the
clusters’ size in terms of connected users, their top tagged locations, and which
businesses were found among the top ten users. Names of businesses related to
specific informants have been changed for the sake of anonymity.
We located the ten most connected users in each cluster. Some of the top user profiles
were businesses or hub accounts where several users share photos in specific genres
(like in C1). Some users were 16 or younger (like most top users in C4), while others
had since moved to other cities. We contacted three randomly selected top users with
open profiles in each cluster. We also contacted some users who were most connected
across the city as a whole, even if they were not prominent in any one cluster. Most
responded, but some refused to be interviewed – though a few changed their mind
Social Media in Kristiansand 41
when learning that they had been selected among local top users. In total, we ended
up interviewing 12 Instagram users, 10 of which were randomly selected top users.
Most were interviewed face to face, though two were interviewed via Skype. In the
following their names (and the names of associated businesses, if any) have been
changed.
Table 4.1: Overview of the eight largest clusters obtained from community detection on relations
among Instagram users in Kristiansand.
Local top users boast between 1,000–2,000 followers (though not all of these are
local), while they themselves follow less than half this number. Most of them spend
at least one hour editing photos (always taken with phone camera or digital camera,
never the Instagram camera function) before they post them, and most of them use
the VSCO app for editing. They also have some idea (more or less substantiated) about
how or when one should post to generate higher levels of engagement.
We found that top users navigate two social worlds simultaneously that in some
respects work according to different logics. On the one hand, there is the exclusive
online-only community of Instagram. Here, they actively seek affirmation from
influencers at the top of the hierarchy in specific lifestyle areas, such as physical
exercise, fashion, foods, etc., whose presentation style they try to emulate, and whose
affirmation they actively seek.
For instance, top users Erik (27) and Sonja (25) in the Fitness cluster (C5), both
active at the Viking CrossFit center, seek out world leading CrossFit performers in
order to follow them. On average, Erik’s posts receive around 500 likes. But on a post
featuring himself and a particular CrossFit influencer, he has received over 1,800 likes.
Erik: “I got 1,600 new followers in one day. That’s pretty cool […] all their followers came over
to me.”
Beate: “Like this building […] I spent 20 minutes just getting the angle right. Here, [the
influencer’s] response means a lot [to me], because I put so much effort into it.”
But this online-only exclusive “royal court” is not the only one the local top users
navigate; there is also the world of personal friends, and the signs of affirmation
that circulate in local on- and offline networks. Here, users police each other (and
themselves) according to unwritten but strict codes of prestige and shame, where the
fear of being ignored is more significant than the fear of explicit negative response.
Beate (28), a top user in the Church cluster (C8), engages in political work, but
avoids politics on her Instagram profile because her friends might not be interested.
As one of the most connected users across the city as a whole, she puts strict demands
on herself regarding what she posts or likes and spends a lot of time finding the
hashtags that she believes will bring influencers to her profile. Yet for local friends
not part of the genre-specific community, she operates with a different set of criteria.
Beate: “[If] a friend posts a picture, then I like that picture regardless of what it is. Because I like
my friends, and if they post it, then it’s important to them, I reckon.”
Social Media in Kristiansand 43
Other top users similarly speak of liking all their friends’ posts, even the posts they
dislike. Ragnhild (19) spoke of her own criteria for liking posts.
Ragnhild: “I like a lot of posts. To me, that’s a way of supporting people [laughs], like ‘Nice pic!,’
even if I don’t think it’s a good picture, I… well, we’re friends, so…”
Jon (38) feels his pastoral responsibilities in a local free church prevent him from
unfollowing users that he knows offline, even if he dislikes their posts.
Jon: “I’m the kind of guy who’s worried about hurting people’s feelings. If I unfollow someone, I
feel so awkward [laughs]. So… I’ve never done that.”
Visibility in the respective worlds – online lifestyle networks and local personal
friends – in both cases depends on engagement and active affirmation. If more
engaged in one world, our informants will gradually become less visible in the other.
For instance, engaging too much with friends’ posts even if these are irrelevant to
their online lifestyle communities means that their friends’ posts will become visible
to users in the more prestigious online communities, which might result in them
unfollowing our informants, practically rejecting them from the hierarchy they are
trying to ascend. However, ignoring friends’ posts in order to preserve one’s position
in the online hierarchy means an increased risk of having to explain oneself to those
friends offline.
Several informants have examples of instances where they, having initially
“liked” a picture they would otherwise consider inappropriate, later confronted the
friend face to face about it. Maria’s (19) friend, for instance, posted a selfie from a
party together with someone she barely knew, and afterwards did not remember
taking the picture. Still, she was “scared of deleting it because of what others might
think.” Similarly, Beate tells of a friend who posted a selfie revealing what she (Beate)
considers too much naked skin. This resulted in several friends confronting the girl.
Beate: “[W]hen we got together we were like ‘why do you have to post pictures like that,’ and then
we had a nice talk about confidence and looks and stuff.”
Elias describes the “courtly art of human observation” as a joint observation of the self
and of others in relation to a specific social context (Elias, 1983, pp. 104–106). “This
self-observation and the observation of other people are complementary,” he writes,
“[o]ne would be pointless without the other.” We can observe this in how top users
police their own presentation in light of how they expect others to respond. Maria
(20, Kristiansand) speculates on why her efforts to secure followers occasionally fail.
Interviewer: “Has it happened that people you wish would follow you have unfollowed?”
Maria: “Yes [laughs] If I want to follow them, then it sucks when they don’t want to follow me […]
I put so much effort into posting good stuff, so when it’s people I know, it really sucks when they
44 Clusters of Prestige: Social Media and Social Order in the Norwegian Bible Belt
unfollow me. I mean, it can’t be because my pictures are bad, then I would get it, you know? I am
really trying to post good pics.”
Here, it is not receiving negative feedback that causes frustration, but the sense of
being ignored. As in the pre-modern court, visibility is an existential necessity, and
recognition of status in the hierarchy depends on being seen and affirmed. Several
top users, such as Anne (20) has an app tracking who unfollows her and when.
Anne: “If someone unfollows me, then I unfollow them. I mean, unless they’re, like, really big
[on Instagram], then I totally get it.”
The self-policing does not require actual feedback from followers, only a general
fear of being ignored. Ragnhild (19) describes removing a picture she later regretted
posting. Her insistence that she does not care what other people say behind her back,
and that the decision to delete the post is entirely her own, go together with her
explicit awareness that people might disapprove without telling her directly, and that
she must maintain a positive attitude in order to be perceived as “inspiring.”
Interviewer: “Did you receive any negative response on the post itself?”
Ragnhild: “No, it was my own decision. No one said anything […] not to my face anyway […] but
probably behind my back, you know.”
Ragnhild: “I don’t know. People say so much. I don’t really care anyway. I’m just trying to have
a profile that’s inspiring to other people, and I try to have a happy tone in what I’m writing. It’s
important to stay positive.”
In their seminal study of the town “Winston Parva,” Norbert Elias and John L. Scotson
describe how local family networks where characterized by unspoken criteria for how
people were ranked in social hierarchies. While these criteria are known to everyone
in the group, this is not explicit, but primarily on the level of practice (Elias, 1994, p.
xxxviii). In our interviews with the top users in Kristiansand’s local Instagram clusters,
we find a similar dynamic. All our informants demonstrate a high awareness of how
Instagram functions according to a logic of status displays, exchange of symbols of
Reproducing the Social Order 45
prestige, mutual policing, and stratification into offline and online hierarchies, even
if they might have differing strategies for navigating these logics.9
The central question for the present purposes is whether what is associated
with prestige in the local clusters corresponds to the symbols associated with
“established” groups in Kristiansand. To answer this question, we might look to the
symbols circulating in and characterizing particular clusters – such as C5 the Fitness
cluster or C3 and C6, the Fashion clusters. In these typical Instagram genres, top users
are typically sponsored by famous brands. Harald, for instance, claims not to care
why people often like his posts, but at the same time reveals the degree to which he
actively seeks the affirmation of particular brands and people in the fashion world.
Harald: “My friends say my Instagram feed is an ’inspofeed,’ like an inspiration for others. I don’t
know about that. I don’t think a lot about it […] But what I often do is tag famous fashion people
or where I bought my clothes.”
Harald: “Yes, we bought a smoke bomb [...] and right here, the shop where I bought the trousers
have commented on the picture. An emoji. And it’s not the first time!”
The Fitness Cluster (C5) is another example. Sonja used to post both CrossFit and
fashion pictures, but lately she has been “concentrating on the former.” She is
sponsored by various clothing brands and the Viking CrossFit center, and works
out for free as long as she keeps tagging their username in her posts. Erik uses a
professional photographer for most of his posts and insists that all his photos are
“authentic” because they are taken during actual training sessions.
The clusters also indicate the socio-economic aspirations of the users. One indication
is the shops and businesses found among top tagged locations. Here we find medium-
to high-end jewelry or fashion outlets (such as Lulu’s, Berglihn Goldsmiths, VOLT
Sandens, and Bohem) targeting young adults. Other businesses found among the
top users across the city as a whole (cluster association in parenthesis) include the
music festival and event Palmesus (C0), Hansen & Co (C3), Bik Bok Sorlandssenteret
(C3), Slottet Shopping (C1), and Image (C1). Cross-cluster tagged locations also
9 This awareness also manifested in their being confused to be considered a “top user” in the first
place; many were initially reluctant to be interviewed because they felt had no reason to be considered
“big” on Instagram.
46 Clusters of Prestige: Social Media and Social Order in the Norwegian Bible Belt
include dining places popular among middleclass consumers, such as the waterfront
restaurants at Fiskebrygga (C6), Bønder i Byen (C3), and Jordbærpikene Sandens (C6).
We should note that when locations appear in various forms (such as Flekkerøy,
Flekkerøya, Flekkerøy Kristiansand) it suggests that these are not established
hashtags, but instead highlights the location itself and its connotations as worthy
of display. Some informants speak of actively using Instagram to discover locations
recommended by users they admire, whether it be shops, popular hang-outs, or
weekend trip destinations. The areas Baneheia and Odderøya (both C7) are popular
recreational areas where people go for runs or Sunday walks. In addition, Odderøya
is a gentrifying area boasting cafés, museums, art galleries, and occasional music
festivals (the Kilden Concert Hall (C0), as well as parts of Fiskebrygga (C6) are located
in Odderøya). The area of Flekkerøy(a) is among the top tagged locations in C1, C2,
C3, and C8. An island just off mainland Kristiansand, Flekkerøy generally has a more
rural feel. It is a popular site for nature photo enthusiasts and is associated with
conservative and somewhat charismatic Evangelicalism.
The status and prestige associated with the neighborhoods represented in the
clusters is further underscored by which areas are not represented. Table II shows
the density of clusters in each city neighborhood. Darker colors mean that a higher
proportion of posts in the particular cluster was posted from that neighborhood. As is
Reproducing the Social Order 47
evident, C0 is evenly spread out across the city’s neighborhoods, reminding us that
people use Instagram whichever part of the city they live in. The locations appearing
prominently in the clusters, however, have important contrasts to the neighborhoods
that do not. Flekkerøy, for instance, appears in official statistics as a neighborhood
characterized by medium- to upper-medium income levels, relatively low numbers
of single parents and unmarried people between 30–49, and with the city’s lowest
number of immigrant inhabitants (7%). Relatively low numbers of immigrants also
characterize the larger neighborhood of Vågsbygd, which is tagged in clusters C1, C2,
C4, C6, and C7.
By contrast, the neighborhoods of Grim, Hånes, and in particular Slettheia, all have
very low density of Instagram clusters. According to the numbers from the municipality
website, they also have the highest rate of visible ethnic-religious minorities, receivers
of welfare, and typically medium- to low-median income levels. What this shows is
that people living in neighborhoods with poorer households or a higher rate of visible
ethnic-religious minorities might be on Instagram, but they are not included among
the top users in the local clusters of online affirmation. Their neighborhoods remain
invisible on social media. The point is underscored by the fact that out of all the top
users across the clusters, only a handful appear (from their profile photos) to be non-
white, and of these at least two identify as Christian (as signified in user name, profile
picture, or post content), while none are (openly) Muslim.
Some symbols of prestige are found across several of the clusters. Here, together with
the manual examination of online profiles, the interviews help provide insight into
symbols that are circulating more city-wide, at the interface of online and offline
communities.
Sports and outdoor life are, as we have seen, associated with high status in
Kristiansand’s social order. In addition, several of the informants in clusters centering
on landscape photography or fashion turn out to be active in various prominent
fitness centers and free churches alike. Jon (37), for instance, a top user in the Church
cluster is an active member of one of the CrossFit centers prominent in the Fitness
cluster. Yet he never posts pictures of himself exercising, because he thinks this would
contribute to an unhealthy focus on physical appearance. Still, he mainly follows
CrossFit celebrities and instructors from the Viking CrossFit center, where he regularly
works out. Jon’s own posts feature pictures from the his church’s conference center, a
few natural landscapes, and him and his family on vacation.
Posts featuring nature and landscape photos are among the top shared and liked
across the city – often intersecting with users emphasizing outdoor life as a form of
healthy exercise. Some informants post semi-professional photos that have taken a
long time to prepare, while others, like Cecilia, edit and post pictures from evening
48 Clusters of Prestige: Social Media and Social Order in the Norwegian Bible Belt
walks or weekend outdoor treks. Harald, a top user in one of the fashion clusters, says
he enjoys going for walks and posting pictures of “nice scenery.” For Beate, whose
Instagram profile is prominent both across the city and in the Church cluster, it was
nature photos that drew her to Instagram as a social media platform.
Beate: “You know… sunsets draw a lot of likes [laughs] […] That’s what I like, seeing other
people’s lives and where they are, where they are travelling, and where they are heading.”
Finally, the local social order’s celebration of nuclear families is reflected and
reinforced across the clusters, not primarily because there are many photos of families
– though there is arguably a certain prestige associated with displaying a happy
family situation – but also in that the family networks of the “established” seem to
be reinforced in and across clusters; some of the families enjoying high status in the
social order also enjoy high status in the local online hierarchies. For instance, top
user Ragnhild belongs to one of Kristiansand’s prolific Christian business families,
and some of her younger family members have also built up prominent Instagram
profiles. These are all found among the top users in the Church cluster, and their
connections to recording artists and other influencers in various fields are visible both
in post content, likes, and comments. The post that received most likes on Ragnhild’s
feed features her with some of these family members and famous influencers.
Ragnhild: “I don’t know. It’s got [influencer] in it, and that’s fun. And I notice that people like it
when I show pictures with my family. That often generates a lot of likes […] most people know
we have a strong family bond, that we are very close and love each other. So, I suppose people
[…] want to support that.”
Finally, the Christian culture evident in Kristiansand’s self-promotion and social order
is likewise evident in and across local social media clusters. In terms of content, there
is the Christian variation on a common Instagram theme: the inspirational quote
on the background of a full teacup, and open landscape, and so on – only here, the
quotes are Bible verses. Signs of users identifying with Christianity are also found in
usernames, bios, or Christian symbol emojis. More importantly, the interviews reveal
networks not immediately visible online. Several informants turn out to also belong
to the offline church networks. Cecilia, a fashionista who is one of the most well-
connected users across the city as a whole, does social media work for a large free
church, but deliberately avoids Christian symbolism on her own Instagram feed.
Cecilia: “I’d say I go to [church] maybe once a week [...] but [on Instagram] I’m kind of laying
low… I mean, I have friends who go there too, but… I follow very few friends. So, I very rarely
‘like’ pictures of, say, coffee cups with a Bible verse on it [laughs], even if I’m sure I could post
pictures like that myself. But, yeah, I don’t tend to ‘like’ those anyway.”
Concluding Remarks 49
Harald is another case in point. He mainly posts pictures of fashion outfits and is
proud of his “inspofeed.” He also enjoys administrative access to one of the nature
photo hubs in the General cluster which reposts landscape photos from around the
region. At the same time, he occasionally volunteers in a large free church’s media
department – indeed, it was a youth pastor who first recommended Instagram to
him. And it was Beate, top user in the Church cluster, who invited him to co-run the
landscape photo account.
In summary, while the clusters to some extent make it possible to identify groups
according to shared interests – fashionistas, church affiliates, and fitness enthusiasts –
the clustering does not imply segregation. The General cluster C1, the largest cluster we
have been able to locate, embraces all of these groups. Its top users include the former
user profile of a free church’s congress center, designers, nature photographers, and
fitness enthusiasts. The most locally connected Instagram users in Kristiansand seek
to distinguish themselves by displaying symbols of prestige that largely correspond to
the ones we have found to characterize the local social order: they picture themselves
with family and friends, in nice outfits, at shops or businesses associated with an
aspiring middle class, exercising in picturesque natural surroundings, or on their way
to church-related activities.
Social media are often assumed to be vectors for social change, for challenging existing
structures, and facilitating the forging of new and original identities unhampered by
traditional norms. Our evidence points in the opposite direction. Using computational
methods in combination with qualitative interviews and participating observation,
we have located several social media clusters of users who affirm among themselves
certain values and norms through public affirmation in the form of likes, comments,
mentions, and so on. Indeed, without computational methods combined with local
knowledge and ethnographic sensitivity, these local influencers would have been
very difficult to locate, and the meaning of the symbols of prestige they circulate
would be near impossible to interpret. Interviews show that top users are aware of
the unspoken criteria for rising in the online as well as offline social ranks, and these
criteria largely correspond to the symbols of prestige we were able to define in the
social order of the city. Where one might have thought that social media would level
the playing field between diverse groups in a medium-sized city, what we see is the
reproduction of a social order where one group tends to dominate other groups in
terms of visibility and influence.
50 Clusters of Prestige: Social Media and Social Order in the Norwegian Bible Belt
References
About Cultiva. (2017, November 9). http://cultiva.no/english/
Abrahamsen, O. A. (2014). Kristenredere og småbymatadorer. In S. Bjørg (Ed.), Agderseminaret
2013: Religion og næringsliv (pp. 112–135). Cappelen Damm Akademisk.
Benkler, Y. (2007). The Wealth of Networks: How Social Production Transforms Markets and Freedom
(9/23/07 edition). Yale University Press.
Bille, T. (2013). How to Develop a Region Through Culture and Creativity: The Foundation Cultiva in
Kristiansand. In L. Lindeborg & L. Lindkvist (Eds.), The Value of Arts and Culture for Regional
Development: A Scandinavian Perspective (pp. 161–179). Routledge.
Botvar, P. K. & Aagedal, O. (2002). Øst er øst og vest er vest...? En sammenligning av østnorsk
folkekristendom og sørvestnorsk vekkelseskristendom. In O. G. Winsnes (Ed.), Tallenes tale
2002 Kifo-rapport nr 23. Tapir Akademisk.
Botvar, P. K., Repstad, P., & Aagedal, O. (2010). Regionaliseringen av norsk religiøsitet. In P. K.
Botvar & U. Schmitt (Eds.), Religion i dagens Norge. Universitetsforlaget.
Castells, M. (2008). The New Public Sphere: Global Civil Society, Communication Networks, and
Global Governance. The ANNALS of the American Academy of Political and Social Science,
616(1), 78–93. https://doi.org/10.1177/0002716207311877
Elias, N. (1978). What is Sociology? (S. Mennell & G. Morrissey, Trans.). Columbia University Press.
Elias, N. (1983). The Court Society (E. Jephcott, Trans.). Pantheon Books.
Elias, N. (1994). The Established and the Outsiders. Sage Publications.
Halvorsen, A. (2004). Hvor spesielle er sørlendingene? En analyse av kristen tro og aktivitet i
Vest-Agder. In O. G. Winsnes (Ed.), Tallenes tale 2004: Perspektiver på statistikk og kirke. Tapir
Akademisk.
Hundstad, D. (2008). Regionsbygging i sør. In B. Seland (Ed.), Regionen (pp. 59–92).
Høyskoleforlaget.
Johnsen, B. E. (2010). Skippere, sommergjester og Sabeltann. In B. E. Johnsen (Ed.), Sørlandsk
kultur (pp. 37–68). Høyskoleforlaget.
Justvik, N. M. (2012). Idrett og Kristendom på Sørlandet: 1945-2000. Portal Akademisk.
Kommunedelplan idrett- og friluftsliv, 2015-2018. (2014). Kultur- og idrettsetaten.
Lysgård, H. K. (2013). The definition of culture in culture-based urban development strategies:
Antagonisms in the construction of a culture-based development discourse. International
Journal of Cultural Policy, 19(2), 182–200. https://doi.org/10.1080/10286632.2011.647005
Lysgård, H. K. & Tveiten, O. (2005). Cultural economy at work in the city of Kristiansand: Cultural
policy as incentive for urban innovation. AI & SOCIETY, 19(4), 485–499. https://doi.
org/10.1007/s00146-005-0334-5
Magnussen, M.-L., Mydland, T. S., & Kvåle, G. (2005). Arbeid ute og hjemme: Sørlandske mødres
valg og vurderinger (FoU-Rapport No. 5). Agderforskning.
Magnussen, M.-L., Repstad, P., & Urstad, S. (2013). Skepsis til likestilling på Sørlandet – et resultat
av religion? Tidsskrift for Kjønnsforskning, 36(03–04), 204–222.
Røed, H. (2010). Sørlandet – et politisk “annerledesland.” In B. E. Johnsen (Ed.), Sørlandsk kultur:
Mangfoldet og motsetningene (pp. 146–197). Høgskoleforlaget.
Ryen, A. (2002). Husmorlandets siste skanse. In K. Jon P. & S. Hege (Eds.), Hvitt stakitt og fiberoptikk:
Regionale myter – regional makt (pp. 167–183). Høyskoleforlaget.
Seland, B. (2012). Sørlandsk pietisme? Religion på tvers av grenser. In B. E. Johnsen (Ed.), Sørlandet
og utlandet (pp. 91–120). Cappelen Damm Akademisk.
Seland, B. (2014). Den kristelige gründeren: Sosiale kapital og hard valuta. In S. Bjørg (Ed.),
Agderseminaret 2013: Religion og næringsliv (pp. 89–111). Cappelen Damm Akademisk.
References 51
Stanley, L. (2016). The Established-Outsider Figuration, Race and Whiteness [Educational]. Whites
Writing Whiteness: Letters, Domestic Figurations & Representations of Whiteness in South
Africa 1770s-1970s. http://www.whiteswritingwhiteness.ed.ac.uk/thinking-with-elias/
the-established-outsider-figuration-race-and-whiteness/
5 Meme Collectives and Preferred Truths in Assam
Sagorika Singha
5.1 Introduction
This chapter focuses on memes and their rising popularity in the geopolitical region
of Assam. It explores that which gives local memes their agency; in short, how
diverse social media groups use memes to propagate or build public opinion among
a new emerging public of internet users. Of late, social media has become a popular
news source globally, and this is also true for Assam. But on social media, the news
does not merely spread in a straight forward manner via numerous posts. Paratexts
accompany these posts. In this context, paratexts – a term derived from literature –
refers to the multitude of extraneous, ephemeral popular cultural by-products that
populate our contemporary mediascape (Pesce & Noto, 2016). Memes these days act
as a popular form of such paratexts, and they help put a spin on a news story or event
through their movement in the digital space. This chapter considers certain instances
where memes surface as vehicles propagating discussion around the socio-cultural
and political situation in the form of a local situation or an inside joke and what this,
in turn, tells us about the manifestation of the social order that exists in the social
media space in local territories.
In order to critically discuss meme as a cultural artefact this chapter reads meme as a
“digital object” and borrows from Yuk Hui’s On the Existence of Digital Objects (Hui,
2012). In Hui’s analysis, digital objects move beyond the realm of representation,
hence he considers them to be material objects. Considering the materiality of
digital objects helps us engage with the socio-economic systems that lead to their
emergence. Borrowing from and extending Hui’s methodology, this chapter maps out
a framework to delve into local digital objects, and in doing so, reimagines cultural
geography as an associated milieu wherein memes reveal mechanisms of local
“truth-making.” Digital objects are bereft of the definitive qualities of “objects.” What
happens then when people find themselves representatives of an era of digital objects
– digital objects which serve as floating objects of communication drifting from one
screen to another, shared by one user with another? In doing so, they form chains and
networks of connections which involve not just the sharing of those objects but also
the knowledge of the social order of each user.
Memes as Digital Objects 53
Memes are a ubiquitous form of popular culture digital objects such as jokes,
rumours, videos and websites which are circulated from person to person via the
internet. People’s interaction with media and infrastructure reveals their relation to
the world and their respective nation-state. In accepting this, there is also the potential
to foresee that the effect of individuation of digital objects is not only experienced by
users and “machine agents” but is equally affected by the geographies they inhabit
(Simondon, 1980). While objects have been historically understood as tangible things,
here digital objects, memes, emerge as intangible artefacts that link users through
their circulation. Further, memes serve a dual presence; they allow users to leave
a digital trace online (as an extension of the self) while indicating an offline world
(which our real selves inhabit).
There is a distinctive difference between digital objects and their physical counterparts,
including cultural records. While the latter is rooted in “solid, self-evident nature,”
the former remains evasive (Kallinikos, 2010). The signatory attributes of digital
objects are editability, interactivity, openness, and distributedness (ibid.). While all of
this holds true for memes, they are often evasive, ambivalent, paradoxical – features
which affect not only their creation but also their circulation and meaning-making.
Throughout this chapter, we witness these attributes at work with one another. As
digital objects and despite being embedded “in local cultures and power structures,”
memes have allowed for a change in the way users interact and, more importantly, in
the way social knowledge is generated online (Shifman, 2014). Most of the time, these
digital artefacts or objects or things and their creators are themselves oblivious of
the limit to their potency. This narration is an exercise in understanding how digital
objects and artefacts have a life of their own, and how they bring forth an experience
which pervades and affects various aspects of our lives.
Gilbert Simondon’s notion of individuation deliberates that the genesis of an
individual (either an individual or a social group standing for an individual) is a
continuous process within an “associated milieu.” As digital objects go through the
process of concretisation, there is a presumption of improvement. Web 3.0 is supposed
to be more enlightening than Web 2.0; GIFs are better than still images, and so on.
However, following Simondon’s idea of individuation, the never-ending process of
concretisation allows for numerous possibilities. What we conceive at a point in the
upgrade is just one of those multiple possibilities. In this chapter, local memes reveal
different stages of apprehension or individuation, and not all of them engage with
the same purpose. Within a regional milieu, as these digital objects grow, one of their
potent objectives is the generation of social knowledge within the geography where
they circulate. The caveat is that the social knowledge generated is also reflective of
the composition and the order of society. This is revealed by the contesting mode of
54 Meme Collectives and Preferred Truths in Assam
after-effects that the circulation of the digital objects leads to. While these artefacts
are supposed to take on physical forms, what happens is that the instances triggered
by these artefacts start reflecting the features of the objects themselves, namely,
being evasive and ambivalent. This vagueness appears in the emergent post-truth
era, marked by a rampant increase in the circulation of fake news, particularly in
economies such as India. This is a transformation on a massive scale with far-reaching
effects in the ways people interact, form opinions, and consume media information,
as well as their experience of the “real” world which they inhabit.
The most fundamental way in which mobile media has transformed the
contemporary world is by altering our relationships in social spaces. By demonstrating
the sharing and creation of specific memes on social media platforms, mainly
Facebook and WhatsApp, this chapter highlights the role such contemporary social
digital objects play in driving this transformation in Assam. Users often create popular
memes in the region in local languages such as Assamese, Bodo and Sylheti, among
others. Language becomes a means for self-assertion, which is also a marker of
“localisation” and the establishment of “cultural individualism.” This development
affects the tensions between the peripheral region of Assam (in northeast India) and
the larger nation-state. The circulation of these memes leads to the emergence of
a new vocabulary to discuss offline socio-political situations within specific social
media groups. Additionally, they play a part in constructing conversations and events
catering to a cluster or social group. The central concern here is how memes emerge
as a newfound language and can develop platforms through their creators and users,
in turn, transforming, asserting, and establishing new emerging publics.
Scholars have always looked at the northeast region of India as a politically
unstable state with a history of secessionist movements and unrest (Mitra, 1993;
Baruah, 2005; Bhaumik, 2009; Gill, 2013). However, there has been no significant
attempt to read the region post the digital inroads, which have led to overwhelming
changes. Propaganda and other pursuits go hand in hand with increased mobile
internet penetration, and access to the internet ensures a new kind of landscape which
no one has tried to gauge from a cultural study perspective. How are local citizens
dealing with these changes and how are they affecting not only their appraisal of
things and popular culture around them but also the production of these digital
objects? Often, we find an incoherence in dealing with it. For example, on 18 May
2017, the Assam government issued an order announcing stricter monitoring of the
use of social media (PTI, 2017). This order came after a series of unsavoury incidents10
concerning government officials went viral. In this context, a decision like this does
10 A slew of such incidents included the leak of a video showing MLA Ramakanta Deuri in a
compromising position with an unidentified women in a hotel room (The Asian Age, 2017). In another
incident, MLA Aminul Islam broadcast his Assembly speech through Facebook Live (Roy, 2017).
Memes as Digital Objects 55
not come as a surprise. It reflects poorly on the inability of both the users and the
authorities to understand and control the online space.
Rumourmongering-instigated episodes and incidents riddle the current news
landscape of the state, often accelerated by the use of memes on social media. In
March 2017, there was a case of a Fatwa (that never was) issued against the popular
reality show runners-up from Assam, Nahid Afrin (Saikia, 2017). The only evidence of
any Fatwa was a leaflet signed by 46 clerics requesting residents not to attend musical
performances or magic shows since they were against the Sharia.11 But the photo of
the leaflet, written in the local Assamese language was shared extensively on social
media and the non-existent threat on the life of the young singer was considered so
real that the news received prime-time national TV and print media coverage (Saikia,
2017). As Sergio Sismondo remarks, “If the post-truth era starts by blowing up current
knowledge structures, then it isn’t very likely to be democratisation, and in fact most
likely leads to authoritarianism” (Sismondo, 2018). There is a certain pattern to such
propagations, as could be witnessed in the two cases mentioned above and many
others which have cropped up in the past year in India. Most such incidents have
taken place in tier II and III cities.12
There has been a definite shift in the way users access, interpret and consume
information. The socio-economic and cultural milieu, along with users’ interactions
and adoption of the new technological dimension of information consumption affect
this process. While the influence of social media and the behaviour of the youth
has been chronicled (Tripathi, 2017; Arora & Rangaswamy, 2015), there are gaps in
analysing these phenomena from the perspective of the formation of the user units
and exploring how social media changes the interpretation of current events within
a particular user unit. The primary question here is how the increasing presence of
social media platforms affect users in realising their selves in the way social media
stages an event within such cultural discourses. How does it, for instance, encourage
their view of themselves as mediated users? In the online space, how does their
participation affect the functioning of the social establishment? In Assam, political or
institutional participation in the online space has been prominent, and employees of
various government departments are encouraged to participate in WhatsApp groups
11 Sharia law is part of the Islamic religious tradition. It is derived from the religious precepts of
Islam, particularly the Quran and the Hadith.
12 The Reserve Bank of India classifies cities based on their population. Tier II cities population
(between 500,000 and 5 million) and category Z or tier III cities (population below 5 lakh). Police,
when asked by journalists about the recent bout of mob lynching which took place in the country
following rumours of child-lifters, mention how the places where such incidents took place had a
high concentration of poor and illiterate people (Raina, 2019). Pamposh Raina, “New Media and
Indian Elections 2019” (The Indian Express & Jindal School of Journalism and Communication’s (JSJC)
panel discussion, New Delhi March 29, 2019).
56 Meme Collectives and Preferred Truths in Assam
informally. Such institutions often use these groups to disseminate news and circulars
within those sets of official participants.
Poe’s law, first articulated in online forums, states that without a clear intention
from the author, some readers might accept “obvious, exaggerated, parody of extreme
views” to be true (Poe, 2005). Memes and GIFs take on a different value because they
not only bring forward potent conversations in a casual and accepted way but are
susceptible to Poe’s law. It becomes all the more true for users who are becoming
accustomed to this form of news dissemination. Once the user-base acknowledges
this reality, it will be easier to understand the implications of the social makeup and
to interpret political events through social media in a specific regional geography.
This will bring evidence to the interpretation of culture and society among a relatively
new kind of user-base and a new kind of political geography. Studies similar to this
can ultimately help us understand in an ethnographic sense how events and popular
culture deviate from textbook understanding when new media percolates into
everyday plebeian discourse. When a user circulates a video or a meme online, an
“apolitical” creator or propagator may remain “oblivious” that the readers and the
receivers will interpret it in their own way. There is a lack of an established hierarchy
in the comprehension of such information.
13 In reference to this, it is interesting to think of how the Amul hoardings (which also get published
in newspapers etc.) precede the idea of a meme in terms of the usage of image and text and allusions
to prevailing news scene in the country.
Network Economy and the Meme 57
the rage mainly involve caustic reactions to socio-political and cultural scenarios. The
sarcasm-fuelled conversations provoked by such content become noteworthy when
viewed through a lens of the “meme-synthesis.” In essence, these conversations
become significant because they reflect that the crises of the place, the region, are
always a popular rhetoric and it comes as a small wonder that such content has the
characteristics of vitriolic conversations and “strong” opinions.
Bjarneskans and his colleagues postulate that people strive to join a circle of
individuals who “share the joke” (Bjarneskans et al., 1999). While this results in the
creation of a group, often the participants strive to share individual opinions and
issues which conform to the group’s preferences merely because it seems cool to
belong to the trendy crowd sharing similar beliefs. With regards to internet addiction,
Jonathan J Kandell observed how a psychological dependence to being online could
result in anxiety when one feels disconnected, thereby leading to a fear of missing
out (Kandell, 1998). In a rush to belong, to find ever-popular and powerful memes, a
user can inadvertently present an unpopular opinion which might prosper owing to
the general propensity to “follow the crowd” on social media. We can see this in the
contagious sharing of opinion that follows on social media.
“Sharing” is the exhortation of the present generation, not just sharing one’s private
life and politics but also tastes, skills and capabilities. As Limor Shifman clarifies,
sharing in this age stands both for distribution and consumption (Shifman, 2014).
Sharing is also a way to network because when you share (and share widely) you
also forge a network which spreads further depending on the amount of effort a user
puts into that sharing. Sanjeev Goyal describes a network as a collection of nodes
and links between them – individuals, firms, countries, or even a collection of such
entities (Goyal, 2007). He also focuses on how structures of relationships assisted by
such networks shape or influence individual behaviour in both a social and economic
context. This reading is in opposition to another network approach, the Actor-
Network Theory (ANT), which espouses a material semiotic method to understand
networks (Latour, 2014). ANT focuses on the relational ties within a network – “the
tracing of associations” (ibid.). With users sharing memes, naturally, the circulation
occurs within specific networks of individuals, and most of the time we find groups
affirming to a common interest in terms of acceptance of ideas and political voices in
order to belong to the socially desirable networks.
Ryan Milner introduces the concept of “polyvocality,” the possibility of a varied
range of voices to be heard, which is enabled by memes and other digital objects
(Milner, 2012). Even though as a concept it seems promising, in an economically weak
state its probability is questionable. Even when the infrastructure is in place, it is
not easy for the economically and socially marginalised to readily access information
58 Meme Collectives and Preferred Truths in Assam
owing to illiteracy or a lack of basic familiarity with the technology. In such regions,
a different form of digital literacy evolves. As late adopters, users often associate the
internet with social media since they access the internet’s possibilities only through
social media and smartphones. Even though mainstream media still exists as the vital
component of opinion formation, particularly in public discourse, new media and
its tools, such as memes, exist to dent its influence, questioning and – in this case –
even trolling it. For a new range of viewers, old media has become superfluous; an
unavoidable, non-functioning necessity. In contrast, new media is the alternative; the
substitute that they desire and one that they can customise.
Shifman observes how, in spite of the trend of a specific meme form, “the
common ideas and forms shared by many internet memes might tell us something
about digital culture” (Shifman, 2014). Memes do not exist in isolation. The sharing
of images, memes, statuses, reviews to release emotional sentiments, among others,
all contribute towards building the network. She considers this phenomenon as
emergent of a central cultural logic which goes beyond the “sharing economies”
(ibid.). In economic parlance, there is a value attached to such network formation.
We can observe this pattern of value-making explicitly in the phenomenon of virality
and which we often use as the barometer for measuring the success of online shared
content. As Manual Castells muses, the new technological regime also results in a
new networked, interdependent economy which ideally should encourage greater
productivity and efficiency and which, in turn and with the right conditions, gives
rise to equally dramatic organisational and institutional changes (Stark & Castells,
1997). However, memes, which distinctly rely on “networks of mediated cultural
participation in their creation, circulation, and transformation,” go beyond those
organisational changes (Milner, 2012). Memes have the potential to work on social
representations and public discourse owing to their informal engagement as an
everyday pop-cultural artefact. Their propagation through personal social networks
can simultaneously give birth to an alternate social voice, with both its advantages
and disadvantages.
TAM, a vaguely defined acronym standing for multiple terms such as Trolls and Memes,
and Trolling Assamese Media among others, is a meme collective based in Guwahati,
Assam. It started by targeting local Assamese media extensively, and they pointed
out flaws in their shoddy reporting, factual incongruencies and grammatical errors.
Ironically their own memes had typographical errors and were poorly written most
of the time. There seemed to be a fascination with targeting individuals. Even when
talking about the media, the target was usually a particular reporter, owners of specific
Akhil Gogoi, or How a Peasant Leader Became a Meme 59
news channels, activists and others. If Assamese journalist Hemen Rajbonshi14 was
the most trolled person in their memes in the early period of the group’s existence,
he was later replaced by activist Akhil Gogoi. Every time they targeted someone, they
garnered a group of users who shared the sentiment towards that person.
Furthermore, the group succeeded in creating an echo chamber of their own.
The pop-cultural rehashing of the politico-cultural events via such groups links
back to the question of trivialisation. However, it is this trivialisation that makes a
post or a meme go viral, and we can consider that these meme groups curate such
echo chambers based on their inherent politics and ideology. It further heightens the
societal divide between those with access and those without. In an already contested
terrain, access become the criteria for determining who is privileged and who is not.
Memes certainly have a specific agenda and, not surprisingly, they thrive while
promoting that agenda in their own informal ways. Nevertheless, the Facebook
groups discussed in this chapter which create vernacular memes (hereon referred
to as meme collectives) generally deny any overt support for a particular ideology
or political preference. When questioned, they profess to stand for a more common
community approach with the primary purpose of being humorous in dealing with
everyday crises (Administrators, 2017). Treating social events through that prism, they
have their agenda in place, and this is reflected clearly in the kind of memes they
come up with. In this regard, there are numerous categories and subjects that such
meme collectives seem to favour. Considering the scope and limits of this chapter, I
am taking only one such category of meme as a case study – the category of memes
featuring peasant activist Akhil Gogoi. Gogoi is one of the most in-demand memeable
entities within this meme collective.
Akhil Gogoi memes are a special case because of what he is associated with and
how the collectives exploit their understanding of his politics. Gogoi is a well-known
peasant and Right To Information (RTI) activist in Assam, India. He is the president
of the Krishak Mukti Sangram Samiti (KMSS) (Farmers’ Freedom Struggle Committee)
and a vehement critic of the right-leaning Bharatiya Janata Party (Indian People’s
Party) that leads the government at the centre. His critics have attacked him for his
vitriolic speeches against the government’s decisions, particularly regarding the
14 In August 2015, Hemen Rajbongshi, a reporter with the local Assamese channel, Pratidin Time,
aired a news capsule on “scantily clad women” in Guwahati and described them as a nuisance during
summer time. He was referring to women who wore mini-skirts or any version of the skirts. The
viewers harshly criticised the sexist reporting on social media resulting in the birth of the “I am so
Assamese” memes.
60 Meme Collectives and Preferred Truths in Assam
granting of citizenship to Hindu Bangladeshis.15 The state has also accused him of
instigating people to take up weapons to attack the government’s “malicious intent.”
Considering the impact of Gogoi’s activism on Assamese society and politics, it is
not surprising that he is a regular feature in newspaper articles. What is interesting,
however, is how an agrarian peasant leader, far removed from social media, has
become one of the most popular memes in the region. Gogoi has been a meme-
friendly target of the Troll Assamese Media group since their inception in 2015. There
is a self-vigilante sense of justice in the tone used by the people behind such memes.
However, their notional value is contested owing to the collective’s general, overt
“ethno-nationalistic” leanings.
In this particular instance, the meme collective dissolves the public persona
of a well-known and respected activist with the active use of topical memes which
present a very different version of Gogoi – the activist. This section outlines the role
such contemporary forms of social digital objects play in driving a construction of
the image of specifically targeted individuals in Assam. This chapter assessed this
by observing the sharing and creation of memes on social media platforms such as
Facebook. In this way, apart from recognising the spatial and virtual connections
that appear within the meme-world, the segment also reveals the inherent potency
thriving in digital cultural objects and how they are employed to construct “preferred
truths” to a cluster of social groups.
The TAM collective has two administrators. Owing to the rampant online threats
they received, they asked to remain anonymous (Administrators, 2017). Both of them
claim to work in print media but lack any formal training in the field. The convergence
of print media and online media which led to the evolution of the collective could
also highlight the patterns of access in the state itself. Even though internet access
(primarily through mobile data) has increased, it is yet to replace print or other
traditional media. When I asked one of the administrators what led him to create the
group on Facebook, he replied, “During th(e) time Assamese media started yellow
journalism. First, we started by trolling media, and then we trolled issues based on
news. We have done it like a (sic) dynamism – to awaken people. To spread awareness
among commonality (sic)” (Administrators, 2017). Their rationale for choosing
Facebook as the platform and memes as the medium was that “Facebook is for
common people and memes can attract (sic) easily in an attractive way … there was
no such meme page in Assam then” (ibid.). What caught my attention, though, was
the passionate tone they used to explain their objective behind founding the group
15 In the 2014 General Election, the BJP government promised to amend the Citizenship Act, 1955
and introduced the Citizenship Amendment Bill of 2016 which will make illegal Hindus, Sikhs,
Buddhists, Jains, Parsis and Christians migrants from Afghanistan, Bangladesh and Pakistan eligible
for citizenship.
Akhil Gogoi, or How a Peasant Leader Became a Meme 61
which was to tackle what they perceived as the misuse of journalism in victimising
people in a prejudicial manner.
From the example of the rise of the anti-Gogoi memes, what we can realise is
that the activities of such meme collectives are disturbing, especially considering
their trolling agenda. Their agenda seems innocuous and fun, but it is their political
underpinnings that actually drive the conversations. In the case of this group in
particular, the issues they project have a strong “Assamese identity, neglected state”
sentiment to it. They discuss the poor infrastructure in the state, parental pressure,
joblessness and unemployment and the underdeveloped media industry in general;
they vocally display their united hatred against Bangladeshis and their shared love
for Zubeen Garg16 and sports. All of these issues magnify the united identity of the
“typical” Assamese youth and also vouch for a right-wing inspired political ideology.
While the TAM collective refrains from claiming any political affiliation as such, they
have no qualms in attacking others because of their political affiliations. Meanwhile,
the popularity of the Akhil Gogoi memes which gradually grew to become a genre of
their own in the meme collective’s page reflects the value attached to what Gogoi-
bashing stands for and how it is successful as a perspective.
The increasing attacks on him in real life reflect the infamy of Akhil Gogoi on
the page. For those witnessing this phenomenon, the alarming question is whether
one is affecting the other or is it because Gogoi ceases to be of interest in real politics
that he becomes a staple on the online group’s page. Talking to the young people in
the group, it is interesting how the anarchism otherwise attributed to Gogoi become
tepid in comparison to the hatred they shower on him. Memes often appropriate
dominant discourse. However, Gogoi’s support base, which lies among the liberal
demography, draws a contradictory picture lauding him as “Assam’s new voice of
dissent” (Barbora, 2019). Diversity in any form of artefact circulation is important.
However, when the means to create memes is accessible only to a specific group of
people, the lack of diversity becomes troubling. It is a reminder of what Milner writes:
that in the competition of meme creation, even though there is scope for a variety
of perspectives to participate, it is only certain perspectives, values and references
which gain ground (Milner, 2012). Here the digital transformation has occurred at
a fast pace. However, users have difficulty coping with these transformations since
the development in access is incongruous to their literacy and economic growth.
Meanwhile, the creators of these online collectives have access to more resources and
knowledge, allowing them to direct the conversation in the way they want because
the majority of the consumers would not have the same agency and would be inclined
to accept the creator’s version as truth.
16 Zubeen Garg is a popular music artist from Assam. Garg is one of the most influential contemporary
representatives of Assamese culture and identity.
62 Meme Collectives and Preferred Truths in Assam
The original image in the meme (see figure 5.1) appeared for the first and only time
on Twitter when Goutam Baruah, a self-proclaimed Sanatan Hindu, posted it in
September 2016 right after the Kaziranga eviction incident. In his tweet he writes
“#Kaziranga Eviction Thnx AKHIL GOGOI 4 Uniting Assamese Ppl redardless (sic)
of Political Differences..Great Job Assam Govt” (sic) (Baruah, 2016). The TAM meme
collective rehashed the context of the image and used it numerous times on their page
to propagate Gogoi’s support for the illegal Bangladeshis. A sexual, more intimate
pretext is used to underline the image as a visible form of the meme. Two other memes
also establish a similar viewpoint of Gogoi demonstrating a deep, even sexual,
attraction towards Bangladeshi immigrants. According to Milner, “Memes were a
means to transform established cultural texts into new ones, to negotiate the worth
of diverse identities, and to engage in unconventional arguments about public policy
and current events. Memes were a mix of old inequalities and new participation”
(Milner, 2012). Others though, including Liesbet van Zoonen, have questioned this
position. Van Zoonen outlines how powerful institutions use populist forms of public
discourse to influence the public (Van Zoonen, 2006). With cases such as these, we
observe how emerging alternative media can also be used by individuals and groups
to manipulate people into spreading their preferred view of the world.
Geert Lovink points out that since most memes spread within specific bubbles
of people who share a viewpoint, the primary challenge lies in creating “bubble-
breaking memes” (Lovink, 2017). Lovink rightly observes the method of using memes
as a weapon, something exhibited in the US with the alt-right. According to him,
Akhil Gogoi, or How a Peasant Leader Became a Meme 63
Does a meme function as an event itself? In May 2017, following a series of WhatsApp
circulated rumours, three men were lynched in Jharkhand’s Singbhum district on
suspicion of being child abductors (Special Correspondent, 2017). In Assam too, there
have been numerous similar reports where information shared via social media was
used to trigger incidents, including one identical to the Jharkhand incident (Karmakar,
2018; Anon., 2018; Anon., 2017). It is thus imperative to assess the effectiveness with
which memes may trigger events by taking up a fake issue or news and plastering it
over related images.
Moreover, its viral circulation makes its all the more probable for an event
to become bigger in scope and consequently reach a larger group of people. Even
though social media seems like a popular means to instigate or further prioritise a
current issue, holding memes single-handedly responsible for creating an event will
be too farfetched. Memes, though, act as indicators that gauge the importance of a
current issue. In the case of the Akhil Gogoi trolling, one can see it as propaganda;
an emotional, political issue is taken up and even mocked and associated with an
assortment of other agendas, to make the memes surface repeatedly. When trolling
him with that dose of humour and sarcasm, the desire is not only to make the collective
hatred escalate but also to make it palatable and far-reaching.
Just like memes, we can also study how a personal form of exchange can be made
responsible for a media event which is more public and widespread. It can thus be
seen as an atomic response accumulating to form an event. So, can a meme be simply
an agent of a media event and without the potential to be an event itself? To what
17 Shitpost is the internet slang for a worthless post on a message board, newsgroup, or
other online discussion platform.
64 Meme Collectives and Preferred Truths in Assam
5.5 Conclusion
This chapter discusses the potency of apparently mundane digital artefacts to come
together to reveal newer ways of expression and to emerge as the driving force behind
such participation. We can conclude that the ingrained socio-political notions of
online users steer obsessively popular meme topics and issues that ultimately ended
up as inconsequential material for consumption by online users. Through meme
collectives, the youth have found ways and means of fuelling old sentiments in a new
garb. In many other instances (not discussed in this particular chapter), memes have
highlighted burning issues in a way which makes them comprehensible and far more
accessible to a new user-base. In the process, it is also evident that contemporary
civil issues are morphed into their corresponding digital counterparts to suit current
times. However, while it acts as a critical stance to whatever seems to be the problem
at hand, it is also disturbing when the reins only seem to be available to a select few
and issues can be equally subsumed as made prominent. The chapter contemplated
how new media technologies bring change in the way small towns communicate,
particularly in the way in which they discuss crises. While the traditional way of
participation gets gradually but invariably transformed, particularly in the methods
chosen for communicating ideas and events, it is clear that only particular sentiments
and ideologies spread through these newer platforms. The creation of these platforms
References 65
helped in building a cultural autonomy for the people of the region and also allowed
for other controversial stances to exist and breed.
The growth of a new digital userbase participating, collaborating and building
a sense of presence allowed for peripheral voices to thrive through their own energy.
However, this occurred simultaneously with the proliferation of preferential views
and the ease in creating factions and in circulating them. Those with keyboards at
their fingertips had more say in this emergence. In this gradual transformation of
the socio-cultural space in Assam, memes exist as a potent pursuer, as an easy
catalyst extending the new media platform and encouraging the development
of a contemporary local vocabulary which is aspirational but also has a succinct
personality. While we cannot necessarily call memes tools of resistance, users do
employ them as an effective intervention, and on the global stage they present a
window for the local meme collectives’ agenda-setting capabilities.
References
Administrators, T. (2017). Facebook Messenger [Interview] (25 October 2017).
Anon. (2017). BBC News. [Online] Retrieved March, 8, 2018 from https://www.bbc.com/news/
world-asia-india-39769172
Anon. (2018). News18.com. [Online] Retrieved July, 10, 2018 from https://www.news18.com/videos/
india/mob-beats-up-purported-holy-men-in-assam-1676687.html
Arora, P. & Rangaswamy, N. (2015). Digital romance in the Indian city. Journal of
Communication, 49(3), 84–105.
Barbora, S. (2019). Assam ’ s New Voice of Dissent. Economic and Political Weekly, 46(28), 19–22.
Baruah, G. (2016). Tweet. Guwahati: Twitter.
Baruah, S. (2005). India and its Northeast: A new politics of race. IIC Quarterly, 32(2 & 3), pp.
165–76.
Baruah, S. (2010). Society versus State in Assam. In Durable Disorder: Understanding the Politics of
Northeast India (pp. 123–144). New York: Oxford University Press.
Bhaumik, S. (2009). Troubled Periphery: Crisis of India’s Northeast. New Delhi: Sage Publication.
Bjarneskans, H., Grønnevik, B., & Sandberg, A. (1999). The Lifecycle of Memes. [Online] Retrieved
September, 23, 2018 from http://www.aleph.se/Trans/Cultural/Memetics/memecycle.html
Gill, P. (Ed.). (2013). The Peripheral Centre: Voices from India’s Northeast. New Delhi(Delhi): Zubaan.
Goyal, S. (2007). Connections: An Introduction to the Economics of Networks. Princeton: Princeton
University Press.
Hui, Y. (2012). What is a Digital Object?, Metaphilosophy, 43(4), 380–395. doi: 10.1111/j.1467-
9973.2012.01761.x.
Kallinikos, J. (2010). Digital objects: Definitions and attributes, First Monday, 15(6), 1–16.
Kandell, J. J. (1998). Internet Addiction on Campus: The Vulnerability of College Students’,
CyberPsychology & Behavior, 1(1), 11–17. doi: 10.1089/cpb.1998.1.11.
Karmakar, R. (2018). The Hindu. [Online] Retrieved June, 10, 2018 from https://www.thehindu.com/
news/national/other-states/two-men-lynched-on-suspicion-of-being-child-lifters-in-assam/
article24122413.ece
66 Meme Collectives and Preferred Truths in Assam
Liat Berdugo
2). One former soldier described that “Tazpitaniot are forbidden from looking away
from our screens, for even a second” (Silkoff, 2018).
Perhaps predictably, the video concludes with a close up of the soldier’s eyes.
The narrator says, “It’s thanks to women like her, who keep their eyes open, that
millions of Israelis can close their eyes safely every night.” The Tazpitaniah then
winks knowingly at the camera (see Figure 6.2). A wink is a momentary closure of the
eye, a flirt – a colluding gesture that accentuates the weapon she has sharpened to
protect her nation. Her wink, we are to understand, is not a blink; instead she keeps
one eye open at all times, training her watchful gaze on her target.
Figure 6.1: Video still from the Israeli Defense Forces’ video, “With Her Eyes She Defends Israel’s
Borders,” 2019.
Figure 6.2: Video still from the Israeli Defense Forces’ video, “With Her Eyes She Defends Israel’s
Borders,” 2019.
A “One-Way Hierarchy of Vision” 69
The women-only IDF unit relies on troubling stereotypes of the exclusively feminized
eye as a maternal force of protection: a stereotype that extends responsibilities of
an essentialized feminine, watchful gaze over children to a gaze that watches over
territory. In Israel-Palestine, in a conflict that weaponizes and structures gazes
(Azoulay, 2008, 2011a; Hochberg, 2015; Maimon & Grinbaum, 2016; Berdugo, 2021), I
argue that there has been a particular focus on the vision of and visual documentation
produced by women as a problematically gendered force of protection. A woman’s
vision is celebrated as a militarized extension of the dominant Israeli scopic regime,
as with the Tazpitaniot; as a Palestinian counter-visual tactic celebrated by the human
rights group B’Tselem, which distributes cameras to Palestinians living in high-
conflict zones and gathers the footage. I show that in Israel-Palestine in particular,
this focus on women’s sight essentializes a long history of relating Zionism to the land,
with all the feminized ideas associated with the land-based focus on “mother earth”
or “mother nature” as a sustainer of people and the celebration of women’s roles in
Zionism as Haluzot (“female pioneers”). I critique such celebrations of women by
turning towards ecofeminist critiques, which teach us to consider the ways in which
women and the land have both been historically subjugated by a shared history of
oppression. Ultimately, I argue in favor of de-gendering vision and de-gendering the
land, instead towards a kind of sightline that celebrates a disobedient, insurgent way
of looking: one that visibilizes the very frame of sight, and of the camera, as a means
towards new kinds of resistance in conflict.
to act as a watchful eye to monitor Palestinian action (Ibid., p. 132). Such settlements
have transformed the West Bank into a network of visual monitoring stations, staffed
by civilians who might also be “enjoying the view” (Ibid., p. 133).
However, Palestinians may not look at these Israeli Jewish settlements. According
to the rules of engagement as of 2003, IDF soldiers may shoot-to-kill any Palestinian
caught observing IDF activities near Israeli settlements with binoculars or in any other
“suspicious manner” (Harel, 2003) Jewish Israelis thus maintain what Eyal Weizman
has called a “one-way hierarchy of vision” over their Palestinian counterparts. Put
differently, Israelis dominate what Nicholas Mirzoeff has called the “right to look”
(2011), as a subset of a host of other visual rights: the right to see and to be seen;
rights to look and to surveil; rights to be out of sight (of surveillance, for instance);
and rights to have one’s image trusted (rather than subject to a “digital suspicion”
(Kuntsman & Stein, 2015) through claims of photoshopping, cropping, or falsification
in post-production). If “the gaze that sees is the gaze that dominates,” as Foucault has
written, then the seer has power over the seen (1994, p. 39). An uneven distribution
of power in the realms of economics, politics, natural resources, equality, and justice
within a conflict zone also reaches the realm of visuality itself.
It is against this backdrop that, in 2015 – the same year that YouTube was founded
and video was gaining prominence on the Internet – an Israeli NGO called B’Tselem
welcomed video into its repertoire by hiring a video coordinator and publicly
including its videos as a main navigational component on its website (B’Tselem,
2005a). B’Tselem, also called The Israeli Information Center for Human Rights in
the Occupied Territories, was established in 1989 by a prominent group of attorneys,
academics, journalists, and Knesset members to document human rights violations
in the Occupied Territories (B’Tselem, 2005b). Before adopting video as a tactic,
B’Tselem published statistics, testimonies and eyewitness accounts, and reports in
an effort to create a human rights culture in Israel.
At first, B’Tselem’s videos were largely comprised of videotaped testimonies of
Palestinian victims, which bolstered the organization’s long-standing initiative to
collect written testimonies from across the Occupied Territories (B’Tselem, 2005c).
B’Tselem also produced short documentary videos that catalogued the hardships
that the occupation placed Palestinians (B’Tselem, 2006). B’Tselem housed the role
of its new video coordinator within its public relations department, signaling the
organization’s belief in the communicative potential of moving images.
In 2007, B’Tselem staff toured Hebron to see the conditions of Palestinians living
adjacent to Israeli settlements (Tarabieh, 2019). Due to frequent settler attacks and
stonings, Palestinian residents living in close proximity to the settlements were forced
to erect metal grates around their houses for protection. As a result of its tour, B’Tselem
resolved to give a video camera to one family who lived inside a “cage house”, the Abu
‘Ayeshas.
In January of 2007, a member of the Abu ‘Ayesha family filmed the “Sharmuta”
or “whore” video, a short clip in which an Israeli settler attempted to shut her into
A “One-Way Hierarchy of Vision” 71
her house (“Sit here, in the cage!”) and then bullies her by calling her a “whore”
nine times in a hissing, menacing tone (B’Tselem, 2007). The Sharmuta video became
the first ever citizen-recorded video in B’Tselem’s camera distribution project and
circulated widely within Israeli and international media outlets, to the point that it
has become part of the Israeli lexicon (B’Tselem, 2009).
Thus the B’Tselem Camera Project was born, three years before the Arab Spring
brought vast attention to the power of technology in the hands of the oppressed.
Within its first year and a half, B’Tselem’s distributed over one hundred cameras to
Palestinian families in the Occupied Territories and hired two more staff members to
support its growth (B’Tselem, 2008a and 2008b). Today there are around two hundred
B’Tselem-issued cameras in the field, and B’Tselem has amassed an archive of over
4,500 hours of raw footage, which it keeps on a handful of different servers and in
rows of original magnetic tapes behind glass doors in its Jerusalem headquarters
(Tarabieh, 2019). B’Tselem’s Camera Project is notable for the consistency of its video
publication: the project has published an average of one video per week since its
conception, often adding subtitles and other demarcations for the public.18 Today,
B’Tselem’s website prominantly features a carousel containing video footage shot
by its volunteer videographers. On YouTube, B’Tselem’s channel has over 43,000
subscribers, and its most popular video has been viewed over 4 million times
(B’Tselem, 2017).
Notably, one thing that distinguishes the Israeli-Palestinian conflict is the freedom
to record. Israeli law is more lenient on recording in public than is the US state of
Massachusetts. In a letter from a Public Inquiries Officer, the IDF Central Command
states, “filming in Judea and Samaria [the West Bank] is permitted, including filming of
IDF soldiers, so long as nothing about the filming interferes with the forces’ operations
or serves to collect classified information” (2009). Moreover, the volunteers who film
for B’Tselem sign an explicit legal document with the Israeli Defense Forces. Certain
things are off limits to the camera’s eye, such as court proceedings, army facilities,
any persons working for Israel’s internal security services (“Shabak” – similar to
America’s FBI), and checkpoints.
B’Tselem’s Camera Project was launched with the conviction that a Palestinian
with a camera reverses the normal order of domination under the Israeli occupation.
Likewise, the citizen with the cell phone video of the police reverses the normal
hierarchy of vision, which flows from state to people, from white to black. The reversal
of the typical one-way hierarchy of vision allows for a view into the slow, suspended
violence of the Israeli occupation (Azoulay & Ophir, 2005). Yet, importantly, the
majority of B’Tselem videos are not leveraged as proof of Israeli criminality. Instead,
18 As of August 2019, B’Tselem had uploaded 631 videos to its YouTube channel, for an average of
1.01 videos per week in the twelve years since its founding. The remainder of the unpublished footage
is viewable in B’Tselem headquarters with prior permission.
72 Insurgent Ways of Looking
19 For more on the exculpatory role of the B’Tselem camera, see Berdugo 2021, and specifically the
2012 case of Palestinian teenager ‘Abd al-’Aziz Fakhouri.
20 The women videographers who film for B’Tselem told me that these traditional gender roles vary
from city to city and region to region. For instance, the videographers in Hebron feel these roles limit
them more strongly than their counterparts in the Nablus area.
21 Yizhar is particularly known for its retaliatory Tag Mechir or Price Tag attacks, in which extremist
Israeli settlers seek to harm and vandalize Palestinians and their property as a ‘price’ for Palestinian
violence or for anti-settlement activity more generally.
A Woman’s Camera 73
Filming the images is helpful to us. It has given me inner strength. I’m no longer scared. When
they [Israeli settlers or soldiers] come, I go out. I used to hide when the soldiers came by. Now, I
go outside with my husband. It has helped me very much on a personal level (B’Tselem, 2014b).
Likewise, a volunteer named Lubna Saleh, began filming with a B’Tselem camera in
2007, after Israeli settlers set her family’s car on fire. While she had previously felt a
kind of fear of the settlers that kept her sealed within the domestic realm of her home,
her camera has liberated her. She said:
I used to be scared to go out and face them [the settlers]. Now I’m not scared to go out and film….
True, I worry about getting injured, but I am more concerned about my children…. Sometimes,
men ask me why I film. I tell them: to protect my home and my children (B’Tselem, 2014c).
To Saleh, the purpose of filming is to protect her domestic sphere (her home, her
children). The camera has become a shield that safeguards the very realm over which
she, as a woman, is traditionally held responsible. B’Tselem has made a point to
call out women as the bearers of a particularly significant and unique burden of the
Occupation’s human rights violations:
Women are the ones who must find a way to run a household without regular or sufficient water.
Women are the ones in charge of caring for children and they are the ones who must obtain food
if their homes are demolished. Women are also usually the ones at home during settler attacks,
so they are the ones who must shield their children (B’Tselem, 2014a).
In a traditional, patriarchal society, the realm of the woman is the home; yet the
women from the village of ‘Asirah al-Qibliyah describe exiting the home in order to
film with their B’Tselem cameras. They speak of “going out” or “going outside” the
home as a marked difference from their previous actions of “hiding” inside their
domestic spaces, feeling “scared.” Khadrah ‘Abd al-Karim even intimated the outside
realm as a distinctly masculine location when she said, “Now, I go outside with my
husband.” ‘Outside’ is the public sphere in which her husband appears, and in which
she now joins because of her camera.
Many women volunteers who film for B’Tselem chose not to leave the home. Scholar
Ruthie Ginsburg has researched the phenomenon of Palestinian women who film out
their windows, making their own very private spheres sites for anti-colonial activism
(Ginsburg, 2016). Of course, their homes are never quite private; the Palestinian home
is constantly subject to the intrusion of the Israeli colonizing power, which ‘makes
its presence felt’ through house searches, seizures, and demolition threats. But when
women film out their windows, they achieve a superior perspective of ‘looking down’
at activity on the street, as if with the powerful view of Israeli hilltop settlements,
just for a moment. Moreover women who film out their windows remain in their
own distinct space, separate from the action ‘out there’. Their acts of documentation
therefore cannot be inhibited by physical assaults on the camera (such as grabbing,
hitting, or breaking) because the camera resides in a separate space from the action.
74 Insurgent Ways of Looking
Conflict, it is often said, is a man’s fault (as in, “Men start wars”). While sounding
trite, scholars have long researched the ways in which women and men are treated
differently in war. R. Charli Carpenter’s research shows that women are more likely
to be deemed civilians than men (2006). To the category of women, she adds other
populations that are likely to be considered civilians, no matter their context:
children, the elderly, the sick, and the disabled. Put differently, in conflict “femininity
and masculinity are often coded: the former as civilians, the latter as combatants”
(Ginsburg, in press, pp. 7–8).
Moreover, women in conflict are more likely to be portrayed as victims than their
male counterparts. Wendy Hesford has noted that the Palestinian sufferer is visibilized
as a feminized victim with whom a viewer should sympathize (2011). Hesford has
noted that this feminization of the victim is problematic for its re-inscription of the
Watching the Land 75
spectator’s Western and neoliberal values on the subject, thus confining her (often
non-Western) body to a violently partialized set of comprehensions. Indeed, B’Tselem’s
portrayal of women as innocent parties who, as Ginsburg notes, “should be shielded
from violence and saved” (Ginsburg, in press, pp. 10–11) further problematizes the
gendered portrayal.
I’d like to focus on the notion of a shield, for a moment, as an object of protection
which the feminized victim lacks, but deserves as a civilian wishing to remain safe in
times of conflict. A shield is, by definition, an object of protection. The classic shield
is a large piece of metal that one wears to protect against bodily harm (from a blow, or
a projectile weapon). Shields therefore function in a necessarily preventative manner.
Shields act as defenses, not offenses: they assume a kind of danger ‘out there’ from
which the body requires protection. B’Tselem volunteer Shuruk Saleh describes how
she “goes out” to the public realm of appearances to “defend [her] rights” with her
camera. Indeed, the English word shield derives from the proto-Indo-European word,
*(s)kelH-, meaning to “split” or “divide,” as if to separate the interior vulnerability
of the body from the violence of the exterior world. It is notably radical to portray
the danger as ‘out there’, outside of Palestinian homes and instead in the space of
appearances dominated and controlled by Jewish Israelis: such a portrayal reverses
the occupation’s narrative that it is Palestinians who are alien and violent intruders
into Jewish Israeli space, and must, for instance, be kept in their place by an eight
meter tall separation wall. Yet the very idea of a woman’s need for a shield or defense
plays into the idea that women are innocent civilians, victims, and generally lacking
in political agency within the Israeli-Palestinian conflict.
Allow me a brief detour to another zone of conflict: the contentious border between
the United States and Mexico, where, in 2006, a program was founded to allow
remote, civilian monitoring of the border in an American effort to curtail illegal
immigration. A network of 200 security cameras were mounted along Texas’s Rio
Grande river, and were live-streamed online via a website called BlueServo.net (Moll,
2014). On BlueServo, citizens could flag and report suspicious activity, which was then
sent to the corresponding Texas sheriff’s office. The project transformed everyday
civilians into a “Virtual Border Patrol” (or as the website called them, “virtual Texas
deputies”) who aided US law enforcement agents (Burnett, 2009). While the program
ended in 2012 due to lack of funding, its website is still active and accepting new
user registrations, even though its “live” camera feeds are now reruns (Texas Border
Watchers BlueServo). At its height, though, BlueServo boasted involvement by over
203,000 volunteer watchers, representing an estimated 1 million hours in free labor
for the Texas Sheriff (Moll, 2014).
76 Insurgent Ways of Looking
22 When asked why she watches the US-Mexican border, Andrews cited two reasons: first, she hoped
her watchful eye would prevent drugs from reaching New York via Mexico; second, she describes
herself as “nosy about what’s going on” along the border.
23 A discussion of feminized watchers in Israel-Palestine would be incomplete without mention of
Machsom Watch (“Checkpoint Watch”), a volunteer organization of Israeli women who have been
observing the “West Bank checkpoints, the separation fences, the agricultural gates, the military
courts and Palestinian villages”# since 2001 as anti-occupation peace activists aiming to influence
public opinion against the occupation and to curtail bad action by the Israeli soldiers they watch.
The group is comprised of primarily female retirees, meaning a generation of women who could be
the soldiers’ mothers. They say, “When we look at the soldiers as our sons, part of our flesh and
blood, the next generation – we fear the mental experience they have to go through and the ethical
values they trample on during the military service in the Occupied Territories” (Machsom Watch, cited
in Ginsburg, 2011). In this way, their watching ties explicitly to babysitting. For more on Machsom
Watch, see Halperin (2007), Carter Hallward (2008), and Kutz-Flamenbaum (2012).
Watching the Land 77
a B’Tselem volunteer named Wydian Zaben filmed Israeli settlers as they torch the
fields around Burin (see Figure 6.4). She documents the land to protect it, and to
incriminate the settlers who aim to annihilate it. In both clips, we hear the women’s
children speaking in the background, reminding us that their gaze has not drifted
far from their domestic life or indeed that they may be watching the land and their
children, simultaneously.
I visited the homes of both Thawra and Wydian in 2019, accompanied by
B’Tselem’s field coordinator for the Nablus region named Salma a-Deb’i. Both women
live at the outskirts of their Palestinian village that occupies a small fertile valley
near Huwwara. As land became more expensive in the village, families like theirs
began settling the hillsides of the valley, closer to the Jewish settlements and illegal
Jewish outposts that sprung up on the hilltops above their village. Both Thawra and
Wydian suffer from close proximity to the settler attacks, but also enjoy the scopic
benefit of sweeping views of the village’s land – views that are not beautiful nor
enjoyable, but instead dangerous, heartbreaking, and rife with violence. Moreover,
as mothers, both women frequently film attacks on Burin’s single school which
both their children attend, and which their homes look down upon with a clear
unobstructed line of sight. Both women record Israeli settler attacks on the school
from their homes.
Figure 6.3: B’Tselem volunteer Thawra ‘Eid zooms in on Israeli settler children who are attacking her
Palestinian village of Burin by throwing stones with slingshots, May 20, 2015, © B’Tselem.
78 Insurgent Ways of Looking
Figure 6.4: B’Tselem volunteer Wydian Zaben films Israeli settlers torching the fields around her
Palestinian village of Burin, Aug 15, 2015, © B’Tselem.
Figure 6.5: “The Po’alot (female workers) in the agricultural settlement Ayanot,” Jan 2, 1940. Source:
Schwartz Tel Aviv. From the The Jewish National Fund (JNF) Photographic Archive.
Yet if Zionism’s inclusion of women in the public sphere could be considered feminist,
it was only conditionally so. Zionism’s early focus was wedded to land, and women
were portrayed as essential to Zionism; yet, women were still characterized as having
an essentially feminine connection to the land: a connection that served to sustain the
next generation of the Israeli state through the dual responsibilities of motherhood
and subsistence farming. Like the feminized conceptions of “mother earth” or “mother
nature,” Zionism fetishied women for their unique and essentialized relationship to
children in the same way that it fetishised their unique and essentialized relationship
to the land. This view was mirrored by NGOs in the 1980s, teaches Melissa Leach,
who “put forward the view that women were the primary users and managers of the
environment at the local level” (Leach, 2007, p. 69; see also Dankelman & Davidson,
1988; Rodda, 1991). At this time, NGOs around the world argued that women’s work
tied them intimately to the environment, especially in “reproductive and subsistence-
focused activities” (Leach, 2007, p. 69).
At the same time as early Zionist factions were establishing themselves, Jewish
organizations – most notably, the Jewish National Fund (JNF) – were founded to buy
and develop land for Jewish settlement in Israel-Palestine. The JNF was founded in
1901 in what was then Ottoman Palestine, later British Mandate for Palestine. Together
with its parent organization, today the JNF owns 93% of the land of Israel, which
cannot be leased to foreigners, non-Jews, or Palestinians (Israel Land Authority,
80 Insurgent Ways of Looking
2013). Notably, the JNF executed large campaigns of afforestation – distinct from the
more common reforestation, which is planting trees where they once grew – instead
introducing “trees to sites that never supported forests, or had no forest cover for
a long period of ecological time” (Nyland, 1996). The JNF solicited donations from
diasporic Jewry for its campaigns via its iconic blue donation boxes, to great effect
and financial solvency. Today, many Jews donate money so that trees may be planted
in Israel-Palestine in honor of loved ones or familial lifecycle events, and many even
travel to Israel to plant the trees with their own hands (Jewish National Fund, n.d.).
In the early years, the JNF planted olive and fruit trees because of their romantic
biblical associations (Stemple, 1998). But these trees required a lot of care. Therefore
in the 1920s, the JNF switched to Aleppo pine trees (or Pinus halepensis), which
became the main tree planted because it grew quickly and “suited the European
image of a proper forest” (Shoham, 2017, p. 80). Others claim that the Pine was chosen
for the acidic deposits its needles leave on the ground, which prevents undergrowth
and deprives Palestinian shepherds of pasture (Weizman, 2007). The problematic
focus on monoculture has created massive “Pine deserts” that now dominate Israeli
forests, making them ecologically susceptible to devastating wildfires (Osem et al.,
2011). Moreover, as of research released in 2014, more than two-thirds of the JNF forest
sites are located on ruins of former Palestinian villages. In other words, the trees have
been structurally planted to efface the visual traces of prior Palestinian inhabitation
within the State of Israel (Ibid.; see also Weizman, 2007 and Berdugo, 2020).
What is striking about the violent colonialism of these JNF forests is the very
innocence – and generally presumed goodness – of the simple act of planting a tree.
This optimism is epitomized by the dedication of the book, Trees as Good Citizens,
which is offered up in celebration of “every man, woman and child who plants a
tree” (Pack, 1922).24 Likewise the US Secretary of Agriculture once proclaimed, “Every
tree is beautiful, every grove is pleasant, and every forest is grand; the planting and
care of trees is exhilarating and a pledge of faith in the future” (U.S. Department of
Agriculture Forest Service, 1905, p. 10). Trees are held to be uncomplicatedly positive,
and those who plant them are good. In this way they map cleanly on to the gendering
of civilians in war: like a tree, a woman is presumed to be an innocent and vulnerable
bystander – a victim just like the very scars left on a landscape itself. Certainly plants
hold scars and other memories of damage. In the former village of Deir Yassin, twenty
Palestinians were shot to death by Israeli paramilitary forces, with the fatal bullets
piercing the prickly pear hedges behind them (see Figure 6.6). The cactus lived on,
bearing the marks of this violence like a shadow, like a ghost.
24 This book even opens one of its chapters with the following poem: “What does he plant who
plants a tree? / He plants, in sap and lead and wood, / In love of home and loyalty, / And far-cast
thought of civic good / His blessing on the neighborhood” (p. 23).
An Ecofeminist Critique of the Feminized Witness 81
Figure 6.6: Deir Yassin (also transliterated as Dayr Yasin), Associated Press, April 1948.
The feminized land, the feminized witness: ecofeminists would argue that both
have been subjected to what Melissa Leach calls “a shared history of oppression by
patriarchal institutions and dominant western culture” (2007, p. 70). From an over
forty-year history of ecofeminist scholarship we are taught that women and nature
share a mutual state of oppression from male-dominated society: women and nature
are both seen as property, for instance; moreover, in the same way that men dominate
women, humans dominate nature. In this way, the vast afforestation campaigns
led by the JNF are part of an effort to dominate nature. Similarly, the subjugation of
women to the role of passive “watchers” are part of systematic efforts to dominate or
contain them under the patriarchy. Put differently, both women and nature have been
82 Insurgent Ways of Looking
subjected to what feminist philosopher Val Plumwood has called “the standpoint of
mastery” of the self to the other, involving “seeing the other as radically separate
and inferior, the background to the self as foreground.” (Plumwood, 1993; Plumwood,
1996; Griffin, 2001, p. 284).
Against the backdrop of an ecofeminist critique, we can see that notions of
women as possessing a natural or special relationship with the environment must be
challenged alongside notions that women possess a special or uniquely innate ability
to watch – especially over the land, itself – and to produce visual documentation of what
they see. Instead, what might it look like to treat Palestinian women camerapersons
as frontline defenders of human rights, who, like their male counterparts, record to
oppose the occupation? In a 2016 panel that followed a screening of women-recoded
B’Tselem videos at the Tel Aviv Cinematheque, one of the woman videographers was
asked whether her ‘womanness’ uniquely affected her videos. Ginsburg described
that this woman answered, without hesitation, “No, I just was there” (Ginsburg, in
press, pp. 12–13). Indeed, what if Palestinian women videotape spectacular footage of
the Israeli occupation because it is a horrific, monstrous spectacle of an occupation?
Ecofeminists would argue that the notion of a uniquely feminized witness, who
produces uniquely superior documentation, must be decommissioned as a mere social
construction. An ecofeminist critique would further argue that such a conception
of a woman B’tselem videographer is intricately and intersectionally linked to the
subjugation of the land as a feminized and controllable commodity – a thing that can
be afforested, sculpted, bought, owned, and fought over.
In San Francisco’s Prelinger Library, I came across a book titled Should Trees Have
A Standing?, published by legal scholar Christopher Stone in 1974, the same year
that French writer Françoise d’Eaubonne coined the term ecofeminism. Stone’s book
argues that trees and other natural objects should have their own legal rights, just as
people and even corporations do. Trees could then claim damages when they were cut
down; streams could demand reparations for pollution; and natural objects in general
would have rights to “seek redress on their own behalf” through lawyers (Stone, 1974,
p. 17). Perhaps this sounds absurd, but “each time there is a movement to confer rights
onto some new ‘entity’ the proposal is bound to sound odd or laughable,” wrote Stone
(Ibid., p. 8). Certainly at one point it was laughable to bestow rights onto women,
slaves, persons of color, and the incarcerated25; certainly, it is considered laughable
under the current Israeli government to bestow rights to occupied Palestinians. Stone
explains that this “is partly because until the rightless thing receives its rights, we
25 One could argue that those rights have never been properly bestowed.
Towards an Insurgent Way of Seeing 83
cannot see it as anything but a thing for those of us who are holding rights at the time”
(Ibid.). Rights give ‘things’ agency to be more than things. Rights remove ‘thingness’,
transforming things into bodies, entities, and states.
Palestinian women who film for B’Tselem are made into things twice over. First,
they are ‘thing-ed’ by the Israeli regime by their status as Palestinians, who lack rights
generally considered to be universally human under the UN’s Universal Declaration
of Human Rights (UN General Assembly, 1948). Secondly, these women are ‘thing-ed’
by the valorization of their position as feminized watchers, as feminized watchers and
feminized producers of visual documentation. Contemporary Palestinian feminists
remind us, though, that the primary cause of Palestinian women’s subjugation –
and Palestinian society more broadly – is the Israeli occupation, not their status as
women (Sayigh, 1981; Souad, 1994; Jad, 1995; Allabadi, 2008; Rought-Brooks et al.,
2010). These feminists – together with ecofeminists – beg the question: what might it
look like, visually, to treat the Israeli occupation itself as the preeminent subjugator
of women B’Tselem volunteers? How might it appear to pay attention, with a sincere
attention to vision and visuality, to Palestinian visual documentation of the Israeli
occupation?
Following scholars like Judith Butler (2004, 2009) and Ariella Azoulay (2008,
2011b), I argue that what is needed is an insurgent way of seeing: a kind of vision that
acts contrary to the dominant political regime by visibilizing the frames of images
themselves – or to use Azoulay’s terminology, that considers the photographic event
as a whole, not merely the image that results from a photographic act. This kind of
seeing is rebellious in its opposition to established norms and dominant scopic and
political paradigms. Indeed, it is a shift in comprehension of what injustices these
images seek to remedy, from what legal scholar Nancy Fraser defines as ordinary-
political misrepresentation to the much more severe metapolitical injustice (2008).
Injustices of ordinary-political misrepresentation are injustices in which a civil
society and its government denies people who are generally agreed to be members
of that society the opportunity to participate in decision making, as peers or equals.
As Fraser describes, these political injustices occur within political societies “whose
boundaries and membership are widely assumed to be settled” (Ibid., p. 407). For
instance, ordinary-political misrepresentational injustice occurs when a citizen is
denied a fair trial under law, for instance. Such injustices occur “when a polity’s rules
for decision making deny some who are counted in principle as members the chance
to participate fully…” (Ibid.). The citizenship or membership of such a person into
a political community has not been called into question, as it is generally agreed.
Instead, the injustice occurs from the mistreatment of that citizen by the polity.
The second and more severe level on injustice is one in which civil society and its
government wrongly draw the boundaries of citizenship. This kind of injustice, called
metapolitical injustice, entails the denial of civil membership to a population, or the
denial of its opportunity to participate in what Fraser calls “authorized contests over
84 Insurgent Ways of Looking
justice” such as elections (Ibid., p. 408).26 Metapolitical injustice arises “as a result of
the division of political space into bounded polities” or when “a polity’s boundaries
are drawn in such a way as to wrongly deny some people the chance to participate
at all in its authorized contests over justice” (Ibid.). In such cases, a person is not
simply denied the right to ordinary-political representation, but denied the very right
of constituting a body that is entitled to political representation at all. Here I think of
the American civil rights movement, and its work against the mischaracterization of
African-Americans as non-Americans who were not entitled to the right to vote. This
kind of justice is a second-order injustice. It is meta political, of a higher order than
the realm of the political, itself. This injustice is perpetrated by an act of misframing
persons outside of the edges of the political, as if pushing them outside the boundaries
of a frame, a photograph.
Just as ecofeminists teach us that what is needed to protect ecology is not a
feminized conception of nature, I have shown that what is needed is not a celebrated
feminized witness. Instead, what is needed is an insurgent, disobedient way of
seeing that conceptualizes events captured as metapolitically unjust. Put differently,
what is demanded by this way of seeing is not a celebration of the female witness,
the female gaze, or the feminized connection to nature; instead, this way of seeing
consider the frame of the image to be the problem, itself. This is, ultimately, a way
of seeing that elevates citizen videography in zones of conflict to engage in radically
new possibilities of resistance.
Acknowledgements
I thank the staff and volunteers at B’Tselem for their generosity and accomodation,
which has made this research possible. Thank you to my Arabic language translator,
Yuval Orr; and to the Dorot Foundation whose funding has enabled portions of this
research.
References
a-Deb’i, S. (2019, February 5). Personal Interview (L. Berdugo, Interviewer; Y. Orr, Trans.) [Personal
communication].
al-Ja’bri, A. (2019, February 4). Personal Interview (L. Berdugo, Interviewer; Y. Orr, Trans.) [Personal
communication].
al-Ja’bri, M. (2019, February 4). Personal Interview (L. Berdugo, Interviewer; Y. Orr, Trans.) [Personal
communication].
26 A citizen can be denied of the right to vote, or denied the right to elect equal representation by,
say, district gerrymandering.
References 85
Allabadi, F. (2008). Secular and Islamist Women in Palestinian Society. European Journal of Women’s
Studies, 15(3), 181–201.
Andrews, L. B. (2012). I know who you are and I saw what you did: Social networks and the death of
privacy. Simon and Schuster.
Azoulay, A. (2008). The civil contract of photography (R. Mazali & R. Danieli, Trans.). Zone Books.
Azoulay, A. (2011a). From Palestine to Israel: A photographic record of destruction and state
formation, 1947-50. Pluto Press.
Azoulay, A. (2011b). Photography: The Ontological Question. Mafte’akh, 2e, 65–80. http://
monoskop.org/images/8/82/Azoulay_Ariella_2011_Photography_The_ontological_question.
pdf
Azoulay, A. & Ophir, A. (2005). The Monster’s Tail. In M. Sorkin (Ed.), Against the wall: Israel’s barrier
to peace. The New Press.
Baxter, D. (2007). Honor Thy Sister: Selfhood, Gender, and Agency in Palestinian Culture.
Anthropological Quarterly, 80(3), 737–775. https://doi.org/10.1353/anq.2007.0037
Berdugo, L. (2017, August 22). Spectral Power. Real Life Magazine. http://reallifemag.com/
spectral-power/
Berdugo, L. (2020). A Situation: A Tree in Palestine. Places Journal. https://placesjournal.org/
article/a-situation-a-tree-in-palestine/
Berdugo, L. (2021). The Weaponized Camera in the Middle East: Videography, Aesthetics and Politics
in the Israel and Palestine. Bloomsbury.
BlueServo. (n.d.). Retrieved May, 24, 2019, from http://www.blueservo.com/
B’Tselem. (2005a). B’Tselem Staff - The Wayback Machine. Retrieved January, 5, 2020 from http://
web.archive.org/web/20050810025108/http://www.btselem.org/english/About_BTselem/
Staff_Members.asp
B’Tselem. (2005b). About B’Tselem - The Wayback Machine. Retrieved January, 5, 2020 from http://
web.archive.org/web/20050308111422/http://www.btselem.org/English/About_BTselem/
Index.asp
B’Tselem. (2005c). B’Tselem Video - The Wayback Machine. Retrieved January, 5, 2020 from http://
web.archive.org/web/20051210222750/http://www.btselem.org/English/Video/Index.asp
B’Tselem. (2006). Documentary: Separation Barrier’s Consequences for Farmers. [Video] Retrieved
January, 5, 2020 from www.youtube.com/watch?v=k4bC1hKucQA
B’Tselem. (2007). “Sharmuta Video” - Settler Harassment of Palestinians in Hebron. [Video]
Retrieved January, 5, 2020 from www.youtube.com/watch?v=KUXSFsJV084
B’Tselem. (2008a). Shooting Back - The Wayback Machine. Retrieved January, 5, 2020 from http://
web.archive.org/web/20080414161342/http://www.btselem.org/english/Video/Shooting_
Back_Background.asp
B’Tselem. (2008b). B’Tselem’s Staff - The Wayback Machine. Retrieved January, 5, 2020 from http://
web.archive.org/web/20080524075508/http://www.btselem.org/english/About_BTselem/
Staff_Members.asp
B’Tselem. (2009). B’Tselem’s Video Camera Distribution Project Wins British One World Media
Award. Retrieved January, 5, 2020 from www.btselem.org/press_releases/20090623
B’Tselem. (2014a, March). Camera savvy: Video-training seminar for women volunteers, village
of Burin, 8 Jan. 2014. Eyes Wide Open | Photo Blog. www.btselem.org/photoblog/2014_
international_womens_day
B’Tselem. (2014b, March 5). Khadrah tells what it’s like to film settler attacks. Int’l Women’s Day
2014. [Video] www.youtube.com/watch?v=XKQ9ihQtdb8
B’Tselem. (2014c, March 6). Filming to protect our families. International Women’s Day 2014. [Video]
www.youtube.com/watch?v=nY6aVYjWQ6s&feature=youtu.be
86 Insurgent Ways of Looking
B’Tselem. (2017). Israeli soldiers drag 8-year-old from home to home looking for stone-throwers,
Hebron, March 2017. Retrieved January, 5, 2020 from https://www.youtube.com/
watch?v=erZKXJOkV9s
B’Tselem. (2018). 2017 Annual Report. www.btselem.org/sites/default/files2/2017_activity_report.
pdf
Burnett, J. (2009, February 23). A New Way To Patrol The Texas Border: Virtually. NPR.Org. https://
www.npr.org/templates/story/story.php?storyId=101050132
Butler, J. (2004). Precarious life: The powers of mourning and violence (Gleeson Stacks HV6432 .B88
2004). Verso.
Butler, J. (2009). Frames of war: When is life grievable? (Gleeson Stacks HM1116 .B88 2009). Verso.
Caplan, N. (2011). The Israel-Palestine Conflict Contested Histories. John Wiley & Sons.
Carpenter, R. C. (2006). Innocent women and children: Gender, norms and the protection of civilians.
Ashgate.
Carter Hallward, M. (2008). Negotiating boundaries, narrating checkpoints: The case of Machsom
Watch. Critique: Critical Middle Eastern Studies, 17(1), 21–40.
d’Eaubonne, F. (1974). Le féminisme ou la mort. Pierre Horay.
Dajani, S. (1994). Between National and Social Liberation: The Palestinian women’s movement in the
Israeli occupied West Bank and Gaza Strip. In T. Mayer (Ed.), Women and the Israeli occupation:
The politics of change. Routledge.
Dankelman, I. & Davidson, J. (1988). Women and environment in the Third World: Alliance for the
future (Reprinted). Earthscan.
Feldman, A. (1997). Violence and Vision: The Prosthetics and Aesthetics of Terror. Public Culture,
10(1), 24–60. https://doi.org/10.1215/08992363-10-1-24
Finn, J. (2009). Capturing the criminal image: From mug shot to surveillance society. University of
Minnesota Press.
Foucault, M. (1994). The Birth of the Clinic: An Archaeology of Medical Perception. Vintage.
Fraser, N. (2008). Abnormal justice. Critical Inquiry, 34(3), 393–422. https://doi.
org/10.1086/589478
Gelvin, J. L. (2014). The Israel-Palestine conflict: One hundred years of war (Third Edition). Cambridge
University Press.
Gerner, D. (1994). One Land, Two Peoples: The Conflict over Palestine. Routledge. https://doi.
org/10.4324/9780429494918
Ginsburg, R. (2011). Taking Pictures over Soldiers’ Shoulders: Reporting on Human Rights Abuse
from the Israeli Occupied Territories. Journal of Human Rights, 10(1), 17–33.
Ginsburg, R. (In Press). Armed with a Camera: Gendering Visual Documentation in the Case of Israel/
Palestine. Signs: Journal of Women in Culture and Society.
Ginsburg, R. (2016). Gendered visual activism: Documenting human rights abuse from the private
sphere. Current Sociology, 66(1), 38–55. https://doi.org/10.1177/0011392116651115
Griffin, N. (2001). Val Plumwood, 1939–. In J. Palmer (Ed.), Fifty Key Thinkers on the Environment.
Routledge.
Gross, J. A. (2015, October 22). The Gaza border fence won’t protect you, but the IDF will. The Times
of Israel. https://www.timesofisrael.com/the-gaza-border-fence-wont-protect-you-but-the-
idf-will/
Halperin, I. (2007). Between the lines: The story of Machsom Watch. Journal of Humanistic
Psychology, 47(3), 333–339.
Harel, A. (2003, November 5). Soldiers Can Shoot Gazans Spying on Netzarim. Haaretz. https://www.
haaretz.com/1.4752144
Harel, A. (2017, June 22). Israel Speeds Up Camera Placements in West Bank in Effort to Deter
Terrorism. Haaretz. www.haaretz.com/israel-news/.premium-idf-speeds-up-camera-
placements-in-w-bank-in-effort-to-deter-terrorism-1.5485764
References 87
Hesford, W. (2011). Spectacular rhetorics: Human rights visions, recognitions, feminisms. Duke
University Press.
IDF Central Command. (2009). Subject: Your request concerning photography and videography
by B’Tselem staff and volunteers. https://www.btselem.org/download/20091130_central_
command_response_to_letter_on_soldiers_obstructing_photographers_heb.pdf
Is Tazpitanit an intersting army role? Or should I fight for something else? (n.d.). 9CHAT: Get Cookie.
Retrieved May, 24, 2019 from http://getcookie.com/p/aWoNkz9Nb
Jad, I. (1995). Claiming Feminism, Claiming Nationalism: Women’s Activism in the Occupied
Territories. In A. Basu (Ed.), The Challenge of local feminisms: Women’s movements in global
perspective (Gleeson Stacks HQ1101 .C46 1995). Westview Press.
Jewish National Fund. (n.d.). Plant a Tree. Retrieved May 30, 2019, from http://usa.jnf.org/jnf-tree-
planting-center/
Kaplan, E. (2001). Decadent pioneers: Land, space and gender in Zionist revisionist thought. Journal
of Israeli History, 20(1), 1–23. https://doi.org/10.1080/13531040108576147
Kark, R. (2004). “Not a Suffragist”? Rachel Yanait Ben-Zvi on Women and Gender. Nashim: A
Journal of Jewish Women’s Studies & Gender Issues, 7, 128–150. http://search.ebscohost.
com/login.aspx?direct=true&AuthType=sso&db=edsjsr&AN=edsjsr.40326575&site=eds-
live&scope=site&custid=s3818721
Kutz-Flamenbaum, R. V. (2012). Mobilizing gender to promote peace: The case of Machsom Watch.
Qualitative Sociology, 35(3), 293–310.
Leach, M. (2007). Earth Mother Myths and Other Ecofeminist Fables: How a Strategic Notion Rose
and Fell. Development and Change, 38(1), 67–85.
Lebow, A. (2012). Shooting with Intent. In J. Ten Brink & J. Oppenheimer (Eds.), Killer images:
Documentary film, memory and the performance of violence (Gleeson Stacks PN1995.9.D6 K54
2012; pp. 41–61). Wallflower Press.
Mackey, R. (2009, March 26). Thousands Sign Up for Virtual Border Patrol. The New York Times.
https://thelede.blogs.nytimes.com/2009/03/26/thousands-sign-up-for-virtual-border-patrol/
Maimon, V. & Grinbaum, S. (Eds.). (2016). Activestills: Photography as protest in Palestine and Israel.
Pluto Press.
Mirzoeff, N. (2011). The Right to Look. Critical Inquiry, 37(3), 473–496. https://doi.
org/10.1086/659354
Moll, J. (2014, July 8). Surveillance through Social Networks along with US-Mexico Border. Electronic
Visualisation and the Arts 2014. https://doi.org/10.14236/ewic/eva2014.19
Plumwood, V. (1993). Feminism and the mastery of nature. Routledge.
Plumwood, V. (1996). Androcentrism and Anthrocentrism: Parallels and Politics. Ethics and the
Environment, 1(2), 119–152. https://www.jstor.org/stable/27766018
Rodda, A. (Ed.). (1991). Women and the environment. Zed Books.
Rosenberg-Friedman, L. (2018). Religious-Zionism and Gender: 70 Years of Redefining the Identity
of Women in the Military, Religious, and Public Spheres. Israel Studies, 23(3), 152–163. http://
search.ebscohost.com/login.aspx?direct=true&AuthType=sso&db=edspmu&AN=edspmu.
S1527201X18300188&site=eds-live&scope=site&custid=s3818721
Rought-Brooks, H., Duaibis, S., & Hussein, S. (2010). Palestinian Women: Caught in the Cross Fire
Between Occupation and Patriarchy. Feminist Formations, 22(3), 124–145. https://www.jstor.
org/stable/40980987
Rubinstein, E. (2015, November 25). On Zionism and Gender—The Young Women’s Farm. The Times
of Israel. http://blogs.timesofisrael.com/on-zionism-and-gender-the-young-womens-farm/
Sayigh, R. (1981). Encounters with Palestinian Women under Occupation. Journal of Palestine
Studies, 10(4), 3–26. https://doi.org/10.2307/2536386
88 Insurgent Ways of Looking
Silkoff, S. (2018, September 13). I’m in the IDF. So how did I get here? The Jewish Chronicle. https://
www.thejc.com/comment/blogs/i-m-in-the-idf-so-how-did-i-get-here-lone-soldier-blog-shira-
silkoff-1.469746
Sontag, S. (2002, December 2). Looking at War. The New Yorker. https://www.newyorker.com/
magazine/2002/12/09/looking-at-war
Suttler, J. (2009, March 12). Guarding the U.S.-Mexico border, live from suburban New York. CNN.
http://edition.cnn.com/2009/TECH/03/12/border.security.cameras.immigration/index.html
Tarabieh, E. (2019, February 10). Personal Interview (L. Berdugo, Interviewer) [Personal
communication].
Tewksbury, D. (2012). Crowdsourcing Homeland Security: The Texas Virtual BorderWatch and
Participatory Citizenship. Surveillance & Society, 10(3/4), 249–262.
Texas Border Watchers BlueServo. (n.d.). Facebook. https://www.facebook.com/
groups/2217025407/?ref=group_header
UN General Assembly. (1948). Universal Declaration of Human Rights (217 A (III)). https://www.
refworld.org/docid/3ae6b3712c.html
U.S. Department of Agriculture Forest Service. (1905). Forest Preservation and Natural Prosperity
(Circular No. 35).
Virilio, P. (2009). War and cinema: The logistics of perception (P. Camiller, Trans.). Verso Books.
Warriner, I. & Tessler, M.A. (1997). Gender, Feminism, and Attitudes Toward International Conflict:
Exploring Relationships with Survey Data from the Middle East. World Politics, 49(2), 250–281.
https://doi.org/10.1353/wp.1997.0005
Yom Hame’ah. (2015, July 25). Mitnadevet. http://mitnadevet.wordpress.com/tag/idf/page/2/
Zaban, W. (2019, February 5). Personal Interview (L. Berdugo, Interviewer; Y. Orr, Trans.) [Personal
communication].
Zraqo, S. (2019, February 4). Personal Interview (L. Berdugo, Interviewer; Y. Orr, Trans.) [Personal
communication].
7 Gender and Race in the Digital Town Hall: Identity-
Based Attacks Against US Legislators on Twitter
7.1 Introduction
In August 2018, amidst an unprecedented number of women running for public office
in the US, the New York Times released a video of current and former female candidates
talking about their experiences with harassment and sexism, much via social media,
during their campaigns (Kerr, Tiefenthäler, & Fineman, 2018). Throughout the video,
the women describe abuse that is gendered and racialized. Among the women in
the video is Iowa Democrat Kim Weaver, who pulled out of her 2016 congressional
race amid a torrent of sexist and anti-Semitic abuse (Astor, 2018). There is ample
reason to believe racist and sexist abuse plague white women and people of color
once they hold office as well. In 2017, Senator Kirsten Gillibrand received a throng of
sexist tweets after she called for Senator Al Franken’s resignation. And as recently
as June 2018, after Representative Maxine Waters called for lay people to confront
Trump administration representatives in public, she faced such intimidation on- and
offline that she cancelled two speaking engagements out of concern for her safety.
This is not unique to politicians in the US. In 2016, British Member of Parliament
Jess Phillips received 600 rape threats on Twitter in one day in response to strongly
worded remarks she made about sexism from the left (Elliot & Turner, 2017).
Previous research has identified abuse of politicians on social media but has
not identified – and in some cases not looked for – racial or gender differences. The
anecdotal evidence above, coupled with recent research documenting widespread
digital harassment of people of color and white women in arenas ranging from gaming
(Gray, 2012; Fox & Tend, 2017) and academia (Ferber, 2018; Veletsianos et al., 2018)
to journalism (Gardiner, 2018; Adams, 2018; Chen et al., 2018), suggests systematic
research is needed to explore how participation in digital publics differs for political
figures from historically underrepresented demographic groups. This research mines
the content of tweets containing @mentions to 16 US legislators, revealing that male
and female politicians on social media navigate very different digital worlds. What’s
more, we find particularly egregious hostility directed at female legislators of color,
much of it explicitly identity-based, drawing on racist and sexist stereotypes and
epithets to discredit, intimidate and shame the recipients.
These unevenly distributed consequences of public service represent tangible
evidence of patterned resistance to political voice and visibility of those from
historically underrepresented groups. This abuse undoubtedly has a variety of
personal and political costs for the legislators targeted for attack, but we must also
90 Gender and Race in the Digital Town Hall
consider the social costs: as a result of this blowback, we lose qualified candidates
and hear a narrower range of perspectives. The macro and micro implications of this
hostile work environment will need to be explored more fully, as leaving Twitter,
YouTube, and Facebook are not practical options in a political context where the
populace increasingly gets information via social media platforms and evidence
mounts that a robust social media presence helps candidates win elections.
7.2 Literature
There is a burgeoning body of literature that explores politicians’ use of social media,
particularly its role in campaigning (e.g. Bimber, 2014; Evans et al., 2014; Jungherr,
2015; Sweetser & Lariscy, 2008) and constituent interaction (e.g. Jackson & Lilleker,
2011; Larsson & Øyvind, 2013; Waisbrod & Amado, 2017). Research shows that most
political leaders prefer to use these platforms to broadcast, showing greater interest in
one-way communication than in engaging voters or constituents (Gibson et al., 2014;
Graham et al., 2013; Hoffmann & Suphan, 2016; Lev-On, 2011; Sweetser & Lariscy,
2008). This is not particularly surprising given that members of the general public
often respond to politicians in hostile, even abusive, ways. Most politicians in the US
have experience with combative town hall meetings, uncomfortable encounters while
canvassing, and being on the receiving end of rancorous phone calls. Lambasting and
jeering politicians is not a new phenomenon – there is a long tradition of lashing out
at politicians, with tactics ranging from heckling and hate mail to shoe and tomato
throwing (Bennett, 1979; Ibrahim, 2009; Temkin & Yanay, 1988).
While social media were not required to give politicians a hard time, platforms
such as Twitter, Facebook, YouTube, and Instagram create new points of access for the
public and offer opportunities for feedback that require little time, skill or expense.
These new pathways for communication between political leaders and the public
create new venues for negative and potentially embarrassing or harmful flak (in
addition to more constructive engagement), while reducing the personal investment
and the risk of repercussions for critics, particularly for those hiding behind the veil
of anonymity.
Recent research documents harassment of political figures extending into the
social media space (James et al., 2016; McLoughlin & Ward, 2017). Yet, looking at the
findings, one might conclude that the digital abuse is evenly distributed, something
that seems empirically unlikely given existing identity-based hierarchies. James,
Farnham, Sukhwal, Jones, Carlisle, and Henley (2016) conducted a four-site, cross-
national survey of MP experiences with digital harassment in the UK, Australia, New
Zealand and Norway and found a tremendous amount of abuse, but did not examine
gender or racial patterns in their data. And, in 2017, McLoughlin and Ward conducted
an analysis of tweets to MPs and found that the gender of the MPs didn’t matter (they
did not examine race). The most extensive academic work on harassment of political
Literature 91
figures (online and offline) comes from the threat assessment literature, which
focuses on the perpetrators and evaluates risk in nearly universal psychological terms
without attending to the broader patterns of victimization (Dietz et al., 1991; Adams et
al., 2006; Hoffman & Sheridan, 2008; Meloy, 2014).
We have little research about how the digital aspects of public life vary for political
leaders with different social locations, save an Amnesty International finding that
among women, black, Asian, and minority ethnic MPs received 41% of the abusive
tweets, even though white female MPs outnumber them nearly 8 to 1 (Stambolieva,
2017). This gap in our understanding exists even though there are reasons to suggest
representatives of color and white women find digital publics more hostile than their
white male counterparts. For example, evidence suggests that women in politics
experience disproportionate amounts of violence offline (Dalton, 2017; Krook, 2017).
Recently, Krook (2017) looked at journalistic accounts and research reports from non-
governmental organizations such as the National Democratic Institute and concluded
that violence against women in politics is rampant, particularly in African countries.
And as the first African American President, Barack Obama entered office faced
with an unprecedented number of death threats (Parks and Heard, 2009). It seems
counterintuitive that digital spaces would diverge from these offline patterns.
The fact that differential digital abuse of political leaders has not been studied is
also peculiar, given the noteworthy gendered and racialized patterns to digital abuse in
other arenas (Chen et al, 2018; Gardiner, 2018; Ferber, 2018; Nakamura, 2002; Daniels,
2009; Herring, 1999; Citron, 2014; Gray, 2012; Veletsianos et al., 2018; Sian, 2018).
Watching politics – at least in the US – certainly suggests that gender and race matter.
Consider the backlash against Florida Representative Frederica Wilson; After Wilson
criticized President Donald Trump’s phone call with Myeshia Johnson, the widow of
La David T. Johnson who had been killed in Niger, she received a deluge of abuse via
social media, much of which took on overtly racial and gendered dimensions. Figures
7.1–7.5 offer illustrations. The comments are pointedly racialized in several ways,
including the disturbing suggestion that Wilson be lynched and the reference to her
and Representative Maxine Waters as “race hustler pimps.” The references to Waters’
physical attractiveness and the description of her as a “hooker” show the way that the
pushback can be gendered. These examples also offer insight into the ways abuse can
be intersectional, as seen in the reference to welfare – an implicit connection to one
of the most pernicious stereotypes of black women in the US: the lazy, entitled welfare
queen. Such vitriol is an example of what Moya Bailey calls “misogynoir,” hatred
directed towards black women where race and gender intersect and play a pivotal
role in the discrimination, abuse and bias.27 US Representatives Ilhan Omar (D-MN)
and Alexandria Ocasio-Cortez (D-NY) have also endured venomous identity-based
abuse online. For example, the comments directed at Omar, a Somali-American and
27 See Bailey (2018) for a discussion of the origin of the term.
92 Gender and Race in the Digital Town Hall
observant Muslim, include references to her as a “rag head cunt,” a “gorilla looking
bitch,” and a “sand nigger,” as well as outlandish accusations of her participating
in cannibalism, an incestuous relationship with her brother and terrorist activity
(Sobieraj, 2019).
Sobieraj (2017, 2020) highlights the ways in which such abuse is often heightened
in male-dominated spheres such as science and technology, gaming and sports. It
makes little sense intuitively that politics – another male-dominated space – would
be different.
In light of this, McLoughlin and Ward’s (2017) finding that gender is not a
significant predictor in the abuse of MPs on Twitter seems suspect. We suspect the
finding reflects a validity issue, generated as an artifact of the combination of the
sentiment analysis and key-word coding process, which – while excellent at capturing
obscenity and epithets –misses a great deal of hostile content. As a result, we revisit
Twitter to explore how the experiences of legislators differ based on their racial
and gender identities, but with a more interpretive approach and coding attuned to
context.
7.3 Methods
invocation of the legislators’ race and gender and references to physical appearance,
sex and the body, as Sobieraj (2017) identifies these as common in digital attacks
against women, particularly women of color. Thumbnail descriptions of the variables
are provided in Appendix A and the complete codebook is available upon request. We
use these data to test the following hypotheses:
H1a: Attempts to discredit will be more common in tweets targeting female legislators than in
those targeting men.
H1b: Attempts to discredit will be more common in tweets targeting legislators of color than in
those targeting white legislators.
H1c: Attempts to discredit will be more common in tweets targeting female legislators of color
than in those targeting other groups.
H2a: Attempts to intimidate will be more common in tweets targeting female legislators than in
those targeting men.
H2b: Attempts to intimidate will be more common in tweets targeting legislators of color than in
those targeting white legislators.
H2c: Attempts to intimidate will be more common in tweets targeting female legislators of color
than in those targeting other groups.
H3a: Attempts to shame will be more common in tweets targeting female legislators than in those
targeting men.
H3b: Attempts to shame will be more common in tweets targeting legislators of color than in
those targeting white legislators.
H3c: Attempts to shame will be more common in tweets targeting female legislators of color than
in those targeting other groups.
H4a: The race (of the legislator) will be invoked more in tweets directed toward legislators of
color than in those directed toward white legislators.
H4b: The race (of the legislator) will be invoked more in tweets directed toward female legislators
of color than in those directed toward men of color.
H5a: The gender (of the legislator) will be invoked more in tweets directed toward female
legislators than in those directed toward male legislators.
H5b: The gender (of the legislator) will be invoked more in tweets directed toward female
legislators of color than in those directed toward white women.
96 Gender and Race in the Digital Town Hall
H6a: References to physical appearance, sexual situations and the body will be more common in
tweets directed toward female legislators than in those directed toward male legislators.
H6b: References to physical appearance, sexual situations and the body will be more common
in tweets directed toward female legislators of color than in those directed toward white women.
To isolate the effects of race and gender, we compiled a list of 16 US senators and
representatives: four are white male politicians, four are white female politicians,
four are male politicians of color and four are female politicians of color. Lack of
diversity in the House and Senate prevented us from exploring more fine-grained
racial distinctions or from taking sexual orientation and gender identity into
account. Legislators were sampled purposively based on race, gender, visibility on
Twitter, national name recognition and party. A nearly equal number of Democrats
and Republicans are represented across groups; however, due to the low number
of Republican women of color in congress, we were unable to achieve parity in that
group (three Democrats (D) and one Republican (R) were selected). The 16 legislators
included are: Leader Mitch McConnell (R), Speaker Paul Ryan (R), Sen. Bernie Sanders
(D), Sen. Chuck Schumer (D), Sen. Cory Booker (D), Rep. Keith Ellison (D), Sen. Marco
Rubio (R), Sen. Tim Scott (R), Sen. Susan Collins (R), Sen. Lisa Murkowski (R), Rep.
Nancy Pelosi (D), Sen. Elizabeth Warren (D), Sen. Tammy Duckworth (D), Sen. Kamala
Harris (D), Rep. Mia Love (R), Rep. Maxine Waters (D).
We amassed a database of tweets directed toward these 16 legislators via @
mentions (in the form of @replies and original tweets) using Twitter Archiver. We
then conducted a census of the first 152 tweets directed at each legislator beginning
at a specified time on March 6, 2018. For higher profile legislators, these 152 tweets
were accrued in a matter of hours, while for others they spanned several days. When
two or more politicians from our list were @mentioned in the same tweet, the tweet
was discarded, unless the named politicians shared the same race and gender. In
addition, a number of tweets were discarded because they had been deleted by
the time of coding (in late March 2018), their links or images no longer existed, or
they were identified as spam. Of the 2,432 possible tweets, 2,216 usable tweets were
coded. Legislators averaged 138.5 usable tweets. The census (n = 2,216) consisted of
548 tweets @mentioning women of color, 566 @mentioning white women, 560 @
mentioning men of color, and 542 @mentioning white men. After training and pilot
testing, a team of three researchers manually coded the tweets. Two of the coders
identify as non-Hispanic white women, and the third coder identifies as an Asian-
American man. Inter-rater reliability testing indicates the level of agreement among
coders to be very good, with Cohen’s Kappa = 0.925 (SE = 0.021, with 95% confidence
interval: from 0.883 to 0.967).
Analysis 97
7.4 Analysis
As described above, this research involves a census of each of the first 152 @mentions
positioned toward each of the 16 legislators at the time of our investigation, eliminating
the variation that would have been introduced had we relied on random selection to
generate our sample. Because the study is based on a population, inference is not
needed to interpret the findings, and can, in fact, be misleading (Gibbs et al., 2017;
Gorard, 2013). We, therefore, follow Kenski, Filer, and Conway-Silver’s 2018 analysis
of campaign tweets and restrict our analysis to descriptive statistics.
7.5 Findings
Our first set of hypotheses looked at three common strategies used to limit the speakers’
impact in digital publics as identified by Sobieraj (2017): discrediting, intimidating
and shaming. Tweets that were coded as discrediting attempts include insinuations
or accusations that the targeted legislator is not qualified, capable, well-informed,
trustworthy or deserving of respect, as seen in this tweet: “@RepMaxineWaters
Ms. Waters you should get ready for the asylum. You are disoriented, angry, and
paranoid,” which contains the not-so-subtle subtext that Waters should not be taken
seriously because she is mentally unstable and overly-emotional. We hypothesized
that these types of comments would be more common in tweets directed at female
legislators (regardless of race) than male legislators, more common in tweets directed
toward legislators of color (regardless of gender) than in those directed toward white
legislators and most common in tweets directed at female legislators of color.
In terms of gender, our hypothesis was confirmed: 58.44% of tweets directed
toward female legislators attempted to discredit them, while “only” 37.84% of tweets
directed toward male legislators did so (see Table 7.1 and Figure 7.6). Tweets containing
discrediting efforts are 2.31 times more likely to be directed at female legislators (odds
ratio: 2.3097, 95% CI: 1.9479 to 2.7386, p < 0.0001). In contrast, legislators of color
(48.65%) and white legislators (47.74%) received a roughly equivalent amount of such
criticism (odds ratio: 0.9645, 95% CI: 0.8164 to 1.1394, p = 0.6707). Figure six shows
the percentage of tweets directed at each subgroup of legislators that contained
discrediting attempts. The result prevents us from confirming hypothesis 1c; the
highest percentage of discrediting tweets were directed at white women (68.37%)
rather than women of color (57.12%) as we predicted. Attempts to discredit Nancy
Pelosi were particularly common; a remarkable 82.7% of all tweets she received
attempted to discredit her.
98 Gender and Race in the Digital Town Hall
28 Importantly, while attempts to intimidate are not abundant, they are more common than this
Findings 99
do appear are three and a half times as likely to be directed at female legislators than
male legislators (odds ratio: 3.5258, 95% CI: 1.5998 to 7.7704, p = 0.0018). However,
while the percent of intimidating tweets positioned at legislators of color is higher
(1.81%) than those of white legislators (1.44%), this difference is not statistically
significant (odds ratio: 1.2546, 95% CI: 0.6467 to 2.4341, p = 0.5024). Stepping back
to look at all four subgroups (Figure 7.7), we see intersectional effects at play. As
hypothesized, attempts to intimidate are more common in tweets targeting female
legislators of color than in those targeting other groups. Among legislators of color:
female legislators of color received a higher proportion of intimidating tweets (2.92%)
than their male counterparts (0.71%). Women of color also received a higher proportion
of @mentions using intimidation tactics than white women, but the difference is
smaller: 2.92% in contrast to 2.12%.
dataset suggests, as most overtly threatening tweets directed at public figures are caught relatively
quickly by Twitter. Indeed, there were a number of tweets no longer available for coding and accounts
that has been suspended at the time of coding. While these tweets may be missing for a variety of
reasons, in all likelihood a subset contained content that would qualify as intimidation.
100 Gender and Race in the Digital Town Hall
For the purposes of this study, shaming involves efforts to taint the public perception of
the legislators by exposing something personal, rather than political, that is meant to
be hidden or private, taking a personal, rather than political, action that was initially
public and recast it in a markedly negative light, or fabricating personal, rather
than political, stories intended to be “gotcha” type moments that purport to reveal
something about the person’s character. “@NancyPelosi still hitting the booze pretty
hard @NancyPelosi?! Either that or Botox is rotting your brain!” We hypothesized that
attempts to shame would be more common in tweets directed at female legislators
than male legislators as well as for legislators of color than white legislators. Both
hypotheses were confirmed, as shown in Table 7.3. We found 7.81% of @mentions
directed toward female leaders contained personal shaming, in contrast to 2.81% of
those directed at male leaders (odds ratio: 2.3097, 95% CI: 1.9479 to 2.7386, p < 0.0001).
In terms of race, 3.88% of @mentions directed at white legislators contained attempts
to shame, in comparison to 6.14% of those directed at legislators of color (odds ratio:
1.6194, 95% CI: 1.0950 to 2.3950, p = 0.0158). And, as predicted, intersectional abuse
is compounding; women of color are by far the most likely to receive @mentions
that target them with personal shame (see Figure 7.8). One out of every ten tweets
directed at women of color involves shaming, about 40% more than white women
and almost 80% more than men of color. We are therefore able to confirm the third
related hypothesis; attempts to shame are more common in tweets targeting female
legislators of color than in those targeting other groups.
Findings 101
Often when tweets contain attempts to discredit, intimidate or shame their targets,
attackers use identity-based pushback as leverage. The next set of hypotheses were
intended to test the prevalence of @mentions containing identity-based content.
First, we hypothesized that legislators’ racial, ethnic and/or religious identity would
be invoked more often for people of color than for whites, and that among people of
color, women would receive a higher proportion of this content than men. One such
example of invoking racial identity: “@SenatorTimScott Hey Timmy boy..i see you
the black lackey at the white house.. did you take @LindseyGrahamSC coffee this
102 Gender and Race in the Digital Town Hall
morning. ? you obviously dont like people of your color..you chose a white man over
a black man..Afro-Americans going to drop you good.. your career is over.” As seen
in Table 7.4, both hypotheses were confirmed; tweets directed at legislators of color
are almost three times as likely to include references to their race or perceived race
(7.04%) than those positioned toward white legislators (2.53%) (odds ratio: 2.9238,
95% CI: 1.88827 to 4.5405, p < 0.0001). Gender compounds the abuse; 10.40% of the
tweets @mentioning women of color include race-based commentary in contrast to
2.14% of those @mentioning men of color (odds ratio: 2.9796, 95% CI: 1.7802 to 4.9871,
p < 0.0001).
The heavy burden on female legislators of color reappears when we explore @
mentions that include comments about elected officials’ gender or gender-identity.
These kinds of remarks often use gender as a means to devalue or discredit the
legislators or their contributions (e.g. “@NancyPelosi Pelousy you’re just a commie
hag,” “@NancyPelosi they are not Americans, sweetheart” and “@NancyPelosi shut
up bitch”). We were able to confirm our hypothesis that gender is invoked more in
tweets directed toward female legislators than male legislators; Table 7.5 shows that
7.99% of tweets @mentioning female leaders reference or comment on their gender,
in contrast with 2.90% of the tweets directed at male leaders (odds ratio: 2.9034, 95%
CI: 1.9211 to 4.3879, p < 0.0001). Once again, gender-talk is disproportionately directed
at female legislators of color; tweets including this kind of commentary are 1.66 times
more likely to target female legislators of color than white female legislators (odds
ratio: 1.6584, 96% CI: 1.0653 to 2.5818, p = 0.0251).
Our final hypotheses involved direct and indirect comments about elected officials’
physical appearance, bodies and/or sexual behavior. For example, one such tweet
reads, “@RepMaxineWaters @realDonaldTrump I swear I think James Brown faked
his own death and returned in drag as Maxine Waters.” We predicted that tweets
directed at female legislators would more often include body-based commentary than
those directed at their male counterparts. This was confirmed: 4.04% of @mentions
directed at women included such comments, while only 2.18% of at mentions directed
at men did so (odds ratio: 1.9808, 95% CI: 1.1439 to 3.1255, p = 0.0130), as visible in
Table 7.6. We can also confirm our hypothesis that body-based comments are more
common for female legislators of color than for white women (odds ratio: 2.0334, 95%
CI: 1.0293 to 4.0168, p = 0.0410).
# Hypothesis Confirmed?
H1a Attempts to discredit will be more common in tweets targeting female YES
legislators than in those targeting men.
H2a Attempts to intimidate will be more common in tweets targeting female YES
legislators than in those targeting men.
H2c Attempts to intimidate will be more common in tweets targeting female YES
legislators of color than in those targeting other groups.
H3a Attempts to shame will be more common in tweets targeting female YES
legislators than in those targeting men.
H3b Attempts to shame will be more common in tweets targeting legislators of YES
color than in those targeting white legislators.
H3c Attempts to shame will be more common in tweets targeting female YES
legislators of color than in those targeting other groups.
H4a Race (legislator’s) will be invoked more in tweets directed toward YES
legislators of color than in those directed toward white legislators.
H4b Race (legislator’s) will be invoked more in tweets directed toward female YES
legislators of color than in those directed toward men of color.
H5a Gender (legislator’s) will be invoked more in tweets directed toward female YES
legislators than in those directed toward male legislators.
H5b Gender (legislator’s) will be invoked more in tweets directed toward female YES
legislators of color than in those directed toward white women.
H6a References to physical appearance, sexual situations, and the body will be YES
more common in tweets directed toward female legislators than in those
directed toward male legislators.
H6b References to physical appearance, sexual situations, and the body will be YES
more common in tweets directed toward female legislators of color than in
those directed toward white women.
Discussion and Conclusions 105
also has social costs: if we lose qualified candidates or hear from people of color and
white women less often or more guardedly as a result of this abuse, our digital public
spaces contain a narrower range of perspectives. The macro and micro implications
of this hostile work environment will need to be explored more fully, as leaving
Twitter, YouTube and Facebook are not practical options in a political context where
the populace increasingly gets information via social media platforms and evidence
mounts that a robust social media presence helps candidates win elections.
References
Adams, C. (2018). They Go for Gender First. Journalism Practice, 12(7), 850–69. doi:10.1080/1751278
6.2017.1350115.
Adams, S. J., Hazelwood, T. E., Pitre, N. L., Bedard, T. E., & Landry, S. D. (2009). Harassment of
Members of Parliament and the Legislative Assemblies in Canada by Individuals Believed
to Be Mentally Disordered. Journal of Forensic Psychiatry & Psychology, 20(6), 801–14.
doi:10.1080/14789940903174063.
Astor, M. (2018). For Female Candidates, Harassment and Threats Come Every Day. The New
York Times, August 24, 2018. Retrieved August, 25, 2018 from https://www.nytimes.
com/2018/08/24/us/politics/women-harassment-elections.html.
Bailey, M. (2018). On Misogynoir: Citation, Erasure, and Plagiarism, Feminist Media Studies, 18(4),
762–768. doi:10.1080/14680777.2018.1447395.
Bennett, G. C. (1979). The Heckler and the Heckled in the Presidential Campaign of
1968. Communication Quarterly, 27(2), 28–37. doi:10.1080/01463377909369330.
Bimber, B. (2014). Digital Media in the Obama Campaigns of 2008 and 2012: Adaptation to the
Personalized Political Communication Environment. Journal of Information Technology &
Politics, 11(2), 130–150. doi:10.1080/19331681.2014.895691.
Chen, G. M., Pain, P., Chen, V. Y., Mekelburg, M, Springer, N., & Troger, F. (2018). ‘You Really Have to
Have a Thick Skin’: A Cross-cultural Perspective on How Online Harassment Influences Female
Journalists. Journalism, 21(7), 877–895. doi:10.1177/1464884918768500.
Citron, D. K. (2014). Hate Crimes in Cyberspace. Cambridge, MA: Harvard University Press.
Dalton, E. (2017). Sexual Harassment of Women Politicians in Japan. Journal of Gender-Based
Violence, 1(2), 205–219. doi:10.1332/239868017x15099566627749.
Daniels, J. (2009). Cyber Racism: White Supremacy Online and the New Attack on Civil Rights.
Lanham: Rowman & Littlefield.
David, G., Munro, M., & Scott, B. (1996). How to make trouble and influence people: Australasian
pranks, hoaxes and political mischief making. Sydney: Political Hooligan Publications.
Dietz, P. E., Matthews, D. B., Martell, D. A., Stewart, T. M., Hrouda, D. R., & Warren, J. (1991).
Threatening and Otherwise Inappropriate Letters to Members of the United States
Congress. Journal of Forensic Sciences, 36(5). doi:10.1520/jfs13165j.
Elliott, F. & Turner, J. (2017). MP Jess Phillips Forced to Filter Her Tweets after 600 Rape Threats in
a Day. News | The Times. August 26, 2017. Retrieved November, 10, 2017 from. https://www.
thetimes.co.uk/article/mp-jess-phillips-forced-to-filter-her-tweets-after-600-rape-threats-in-a-
day-6655nr57m.
Evans, H. K., Cordova, V., & Sipole, S. (2014). Twitter Style: An Analysis of How House Candidates
Used Twitter in Their 2012 Campaigns, PS: Political Science & Politics, 47(2), 454–62.
doi:10.1017/s1049096514000389.
References 107
Ferber, A. L. (2018). ‘Are You Willing to Die for This Work?’ Public Targeted Online Harassment
in Higher Education: SWS Presidential Address. Gender & Society, 32(3), 301–20.
doi:10.1177/0891243218766831.
Fox, J. & Teng, W. Y. (2017). Women’s Experiences with General and Sexual Harassment in Online
Video Games: Rumination, Organizational Responsiveness, Withdrawal, and Coping Strategies.
New Media & Society, 19(8), 1290–1307.
Gardiner, B. (2018). ‘It’s a Terrible Way to Go to Work:’ What 70 Million Readers’ Comments on the
Guardian Revealed about Hostility to Women and Minorities Online. Feminist Media Studies,
18(4), 592–608. doi:10.1080/14680777.2018.1447334.
Gibbs, B. G., Shafer, K., & Miles, A. (2017). Inferential Statistics and the Use of Administrative Data
in US Educational Research. International Journal of Research & Method in Education, 40(2),
214–20. doi:10.1080/1743727x.2015.1113249.
Gibson, R., Römmele, A., & Williamson, A. (2014). Chasing the Digital Wave: International
Perspectives on the Growth of Online Campaigning. Journal of Information Technology &
Politics, 11(2), 123–29. doi:10.1080/19331681.2014.903064.
Gorard, S. (2013). Research Design: Creating Robust Approaches for the Social Sciences. London:
SAGE.
Graham, T., Broersma, M., Hazelhoff, K. & Haar, G. van ‘t. (2013). Between Broadcasting Political
Messages and Interacting with Voters. Information, Communication & Society, 16(5), 692–716.
doi:10.1080/1369118x.2013.785581.
Gray, K. L. (2012). Intersecting Oppressions and Online Communities. Information, Communication &
Society, 15(3), 411–428. doi:10.1080/1369118x.2011.642401.
Hoffmann, C. P. & Suphan, A. (2016). Stuck with ‘electronic Brochures’? How Boundary Management
Strategies Shape Politicians’ Social Media Use. Information, Communication & Society, 20(4),
551–569. doi:10.1080/1369118x.2016.1200646.
Hoffmann, J. & Sheridan, L. (2008). Stalking, Threatening, and Attacking Corporate Figures. In Meloy,
J. R., Sheridan, L. & Hoffmann, J. (Eds.), Stalking, Threatening, and Attacking Public Figures (pp.
123–42). doi:10.1093/med:psych/9780195326383.003.0006.
Ibrahim, Y. (2009). The Art of Shoe-throwing: Shoes as a Symbol of Protest and Popular
Imagination. Media, War & Conflict, 2(2), 213–26. doi:10.1177/1750635209104655.
Jackson, N. & Lilleker, D. (2011). Microblogging, Constituency Service and Impression Management:
UK MPs and the Use of Twitter. The Journal of Legislative Studies, 17(1), 86–105. doi:10.1080/13
572334.2011.545181.
James, D. V., Farnham, F. R., Sukhwal, S., Jones, K., Carlisle, J., & Henley, S. (2016). Aggressive/
intrusive Behaviours, Harassment and Stalking of Members of the United Kingdom Parliament:
A Prevalence Study and Cross-national Comparison. The Journal of Forensic Psychiatry &
Psychology, 27(2), 177–97. doi:10.1080/14789949.2015.1124908.
Jungherr, A. (2015). Twitter Use in Election Campaigns: A Systematic Literature Review. Journal of
Information Technology & Politics, 13(1), 72–91. doi:10.1080/19331681.2015.1132401.
Kenski, K., Filer, C. R., & Conway-Silva, B. A. (2018). Lying, Liars, and Lies: Incivility in 2016
Presidential Candidate and Campaign Tweets During the Invisible Primary. American Behavioral
Scientist, 62(3), 286–99. doi:10.1177/0002764217724840.
Kerr, S. S., Tiefenthäler, A., & Fineman, N. (2018, August, 24). ‘Where’s Your Husband?’ What Female
Candidates Hear on the Trail. The New York Times. Retrieved August, 25, 2018 from https://
www.nytimes.com/video/us/politics/100000006027375/women-politics-harassment.html.
Krook, M. L. (2017). Violence Against Women in Politics. Journal of Democracy, 28(1), 74–88.
Larsson, A. O. & Ihlen, Ø. (2015). Birds of a Feather Flock Together? Party Leaders on Twitter
during the 2013 Norwegian Elections, European Journal of Communication, 30(6), 666–81.
doi:10.1177/0267323115595525.
108 Gender and Race in the Digital Town Hall
Lev-On, A. (2011). Campaigning Online: Use of the Internet by Parties, Candidates and Voters
in National and Local Election Campaigns in Israel. Policy & Internet, 3(1), 107–134.
doi:10.2202/1944-2866.1045.
McLoughlin, L. & Ward, S. (2017). Turds, Traitors and Tossers: The Abuse of UK MPs via Twitter.
Conference Paper, European Consortium for Political Research, 25-30 April 2017. Cited with
permission of the authors.
Meloy, J. R. (2014). Approaching and Attacking Public Figures: A Contemporary Analysis of
Communications and Behavior. Journal of Threat Assessment and Management, 1(4), 243–61.
doi:10.1037/tam0000024.
Nakamura, L. (2002). Cybertypes: Race, Ethnicity, and Identity on the Internet. New York: Routledge.
Parks, G. S. & Heard, D. C. (2009). Assassinate the Nigger Ape: Obama, Implicit Imagery, and the
Dire Consequences of Racist Jokes. SSRN Electronic Journal. doi:10.2139/ssrn.1447572.
Sian, K. (2018). Stupid Paki Loving Bitch: The Politics of Online Islamophobia and Misogyny. In
Bhatia, M. Poynting, S., & Tufail, W. (Eds.), Media, Crime and Racism (pp. 117–138).
doi:10.1007/978-3-319-71776-0_7.
Sobieraj, S. (2017). Bitch, Slut, Skank, Cunt: Patterned Resistance to Women’s Visibility in
Digital Publics. Information, Communication & Society, 21(11), 1700–714. doi:10.1080/1
369118x.2017.1348535.
Sobieraj, S. (2019). Disinformation, Democracy, and the Social Costs of Identity- Based Attacks
Online. Social Science Research Council, MediaWell. https://mediawell.ssrc.org/expert-
reflections.
Sobieraj, S. (2020). Credible Threat: Attacks Against Women Online and the Future of Democracy.
New York: Oxford University Press.
Stambolieva, E. (2017). Methodology: Detecting Online Abuse against Women MPs on
Twitter. Amnesty International. Retrieved from https://apo.org.au/sites/default/files/
resource-files/2017-09/apo-nid107651.pdf.
Sweetser, K. D. & Lariscy, R. W. (2008). Candidates Make Good Friends: An Analysis of Candidates
Uses of Facebook. International Journal of Strategic Communication, 2(3), 175–98.
doi:10.1080/15531180802178687.
Temkin, B. & Yanay, N. (1988) ‘I Shoot Them with Words’: An Analysis of Political Hate-Letters. British
Journal of Political Science, 18(4), 467. doi:10.1017/s0007123400005226.
Veletsianos, G., Houlden, S., Hodson, J., & Gosse, C. (2018). Women Scholars’ Experiences with
Online Harassment and Abuse: Self-protection, Resistance, Acceptance, and Self-blame. New
Media & Society, 20(12),4689–4708. doi:10.1177/1461444818781324.
Waisbord, S. & Amado, A. (2017). Populist Communication by Digital Means: Presidential Twitter
in Latin America. Information, Communication & Society, 20(9), 1330–346. doi:10.1080/1
369118x.2017.1328521.
ATTEMPTS TO DISCREDIT 109
ATTEMPTS TO DISCREDIT
This variable is intended to measure whether the tweet suggests that the elected
official is not qualified, capable, well-informed, trustworthy, or deserving of respect.
Attempts to discredit generally work to deflate or undercut a person’s status (see
codebook for detailed examples).
INTIMIDATION
This variable is intended to measure whether the tweet contains direct or indirect
threats of reputational, political, or physical harm to the elected official, those close to
them, or their party. This code was not be used for dispassionate political forecasting
(i.e. “this could hurt their chances for reelection”); it was be reserved for attempts to
intimidate (see codebook for detailed examples).
PERSONAL SHAMING
This variable is intended to measure whether the tweet includes efforts to publicly
humiliate or contaminate the public perception of the target as a person. Personal
shame: 1) exposes something personal that is meant to be hidden or private (or pile on
when someone else does so), 2) takes a personal action that was initially public and
recast it in a markedly negative light, or 3) fabricates personal stories intended to be
“gotcha” type moments that purport to reveal something about the person’s character.
Note that political shame, such as suggesting someone’s political decisions have been
shaped by financial interests, were counted as “discredit,” not personal shame (see
codebook for detailed examples).
RACE/RACIALIZATION
This variable is intended to measure whether the tweet contains direct or indirect
comments about the elected official’s perceived racial, ethnic, or religious identity.
The variable is – at its heart – intended to capture how often and for whom racial /
ethnic / religious identity is invoked. (see codebook for detailed examples).
110 Appendix A: Thumbnail Descriptions of Key Variables
GENDER TALK
This variable is intended to measure whether the tweet contains direct or indirect
comments about the elected official’s stated or perceived gender identity. The variable
is – at its heart – intended to capture how often and for whom gender identity is
invoked (see codebook for detailed examples).
BODY-BASED COMMENTARY
This variable is intended to measure whether the tweet contains direct or indirect
comments about the elected official’s physical appearance or sexual behavior. (see
codebook for detailed examples).
8 Participatory Propaganda: The Engagement of
Audiences in the Spread of Persuasive Communications
29 The original definition of propaganda by Jowett & O’Donnell reads “Propaganda is the deliberate
and systematic attempt to shape perceptions, manipulate cognitions, and direct behavior to achieve
a response that furthers the desired intent of the propagandist.” See Jowett & O’Donnell, 2015, p. 7.
Modern Propaganda and the Evolution of Its Participatory Model 113
This step relates to positioning and boosting provocative content in front of users
by manipulating important online algorithms. Internet giants, such as Facebook
(Facebook, 2017a, 2017b) and Google (Google, 2017), use algorithms to provide
users with content they think is wanted. Search returns have been found to sway
voter decisions (Epstein & Robertson, 2015) and algorithms enable echo chamber
development (Barret, 2016). Learning and understanding how these platforms
operate both through openly available information and experimentation may allow
a propagandist to ensure their provocative content appears higher and more often in
returns, or in front of a user.
Algorithms had a role in the 2016 elections. Fake news supporting Trump trended
on Facebook through algorithms (Lee, 2016), whereas Google search autocompletes
and returns favoured Trump, spreading false information with a far-right bias (Solon
& Levin, 2016).
Google Search algorithms can be gamed in at least two ways:
Hyperlinking and Seeding of Content: Posting content, such as fake news, on
multiple websites and linking back and forth between sources helps boost content in
Google search returns (Moz, 2107), and if nothing else, can bury opposing information
from appearing in the first pages of returns. Indeed, in one study using hyperlink
network analysis pro-Trump websites were found to be choking out mainstream
media (Albright, 2016b).
Modern Propaganda and the Evolution of Its Participatory Model 117
Once inside echo chambers, followers can be encouraged through posts and email
distribution lists (Albright, 2016a; Plouffe, 2010) to participate in the spread of
propaganda, including: sharing messages; co-opting or borrowing influencer
accounts to share content (Katalenas, 2016); or encouraging trolling (Cheng et al.,
2017; Buckels et al., 2014) to stifle debate.
To many, Trump is a troll (Silver, 2015; Offman, 2016; Lapowsky & Marshall, 2017),
but he was also supported by a legion of online trolls during the election (Marantz,
2016), spreading disinformation (Kang, 2016; Gallucci, 2016) and attacking Clinton
supporters online (Chmielewski, 2016). Some online communities, such as the United
States Freedom Army (who believes the left is engaging the right in a civil war) offered
its members a monthly directive on actions to take on Twitter, and elsewhere in the
spread of their content and support for Trump (Lotan, 2016).
31 This online domination through automation led researchers to coin a new term for explaining
computer-assisted propaganda techniques – the computational propaganda. See, Woolley, S.C.
& Howard, P.N. eds., 2018. Computational propaganda: political parties, politicians, and political
manipulation on social media. Oxford: Oxford University Press.
118 Participatory Propaganda
Media play a critical role in furthering political agendas (Wodak, 2013; Engel &
Wodak, 2009; Engel & Wodak, 2012); after all, “the media are a key element in the
construction of public understanding” (Philo, 2008, p. 539). Rates of a politician’s
media coverage correlate to popular support levels (Vliegenthart et al., 2012) and
Trump was consistently mentioned more on television, online, and social media
(Wanless, 2016). By the start of the primary election campaign in early 2016, Trump
had been enjoying “more nightly news coverage than the entire Democratic field
combined” (Borchers, 2015). Media coverage can be earned in at least three ways:
– Trending Online – generating media coverage simply by occupying top positions
in social media (which can also be distorted by using bots and automated posting).
– Staging a Scandal – populist politicians are particularly adept at gaining media
attention, provoking opposition to attack, then distorting ensuing debate to
position themselves as victims not tolerated by a biased system.
– Commune with the news – media politicians and online communities have a
deeply interconnected relationship, creating a distinct and insulated media
system which uses social media to spread hyper-partisan perspectives.
The study included social network and content analyses undertaken on 17 Facebook
pages, using data related to a month-long period leading up to the 2016 election (7
October to 7 November). These pages included three that supported Trump during the
Modelling Participatory Propaganda 119
Infowars NPR
The three pro-Trump pages were chosen as a sample of those supporting his candidacy,
with one showing its open support through the name (Citizens for Trump), another
having been found spreading fake news (Silverman et al., 2016) supporting Trump
(Eagle Rising), and a third standing out as a node in initial, exploratory network
analysis (Wake Up & Reclaim America).
Drawing from a Pew Research Centre survey on Political Polarization and Media
Habits (Mitchell et al., 2016), seven media outlets trusted consistently by respondents
who self-identified as liberal or conservative were selected. One substitute was made
on the conservative-leaning side, which was Infowars, given the role it played in the
election (Finnegan, 2016). Media pages were used to assess how pro-Trump pages
were engaging with news outlets.
120 Participatory Propaganda
An initial “seed” page liking other pages revealed a directed network of pages linked to
it on Facebook, which was visualised using Gephi. The data in this pull also included
information regarding page categories, follower numbers, and rates of engagement.
All of the posts made by these pages during the month leading up to the election were
also collected, including information regarding the type of post, engagement rates,
and embedded links.
This data was analysed to answer the following questions:
– Did pro-Trump pages share provocative content such as fake news, memes, and
data leaks?
– Did pro-Trump pages constitute an echo chamber?
– Was content shared on pro-Trump pages posted across multiple websites? And
how was this content reflected in Google search returns?
– Were followers of pro-Trump pages encouraged to action?
– How did pro-Trump pages engage with media outlets?
8.3 Findings
8.3.1 Pro-Trump Pages Shared Different Kinds of Provocative Content, Such as Fake
News, Memes, and Data Leaks
Fake News. The links shared to the three Trump-supporting pages were mostly non-
mainstream media. On average, link posts comprised 53.22% of updates made by the
pro-Trump pages. Eagle Rising shared more links than the other two (83.25% of posts),
with nearly half of those links (45.4%) pointing to the page’s own website eaglerising.
com, which contains coverage speculating on connections between Clinton, terrorists
and Nazis,32 for example, and the Clinton campaign’s alleged use of psychological
warfare (which in turn points back to another site shared by these pages called
ipatriot.com).33
After Breitbart, the most shared domain to Citizens for Trump was gatewaypundit.
com, a blog that has posted many questionable articles on Hillary Clinton, including
that she secretly called for Trump’s assassination,34 had suffered a brain seizure,35
and that she had a gum and immune disorder.36 During the period between 7 October
to 7 November 2016, Citizens for Trump shared 13 Gateway Pundit articles, accounting
for 4.32% of all link posts, including one speculating on Clinton’s health that enjoyed
319 shares on Facebook.37 Wake Up & Reclaim America also shared 14 Gateway Pundit
articles, including a post suggesting Clinton was involved in having Supreme Court
Justice Scalia assassinated.38
Memes. Drawing from a similar study of Breitbart posts (Renner, 2017), memes
were counted by the total number of photo posts made by the pro-Trump pages. Memes
account for a considerable number of posts on community Facebook pages such as
Wake Up & Reclaim America. In analysis of 1,330 posts made by Wake Up & Reclaim
America in the month leading up to the 2016 election, nearly half were image posts.
Nearly two-thirds of those photo posts were shared by the page administrator from
other Facebook user posts, pages or groups, such as Liberal Wackadoodles, indicating
spread through a wider community. Memes were also shared by Eagle Rising (14.79%)
and Citizens for Trump (26.62%).
Data Leaks. Hacks and leaks were certainly discussed online. All of the pro-Trump
pages made mention of “Wikileaks,”39 a non-profit that aims to “open governments,”
which in that period had shared more of the leaked Podesta emails to its website.
Of the three pro-Trump pages, 65 posts mentioned “Wikileaks” during the month
leading up to the 8 November election, accounting on average for 2.75% of all posts
during that period. Both the conservative- and liberal-leaning media outlets analysed
made mention of “Wikileaks” in this timeframe too: the seven right-leaning pages
mentioned “Wikileaks” 131 times, accounting for 2.72% of all posts made on average,
whereas the left-leaning pages referenced it 47 times, or in just 0.46% of all posts.
The pages for InfoWars, Sean Hannity, and Wake Up & Reclaim America referenced
“Wikileaks” on average more than the others, accounting for 44% of all mentions
found.
A manual categorization of pages based on names and content reveals that nearly
all (94.1%) of the Citizens for Trump network are right-leaning, pro-Trump pages,
while 82.7% of those within the Eagle Rising network are. In the Wake Up & Reclaim
America network of over 5,000 pages, a sample of 1,000 pages, representing 18.8% of
the total, revealed that 67.8% of these were right-leaning, pro-Trump pages covering
topics reflected in Trump’s campaign rhetoric, such as pro-Christian, anti-Muslim,
pro-military, pro-police, anti-immigration, and pro-life views.
As noted earlier, the three pro-Trump pages shared more alternative media sources
than mainstream links in the month leading up to the 2016 election. Of those links
shared to the pro-Trump pages and pointing to the conservative- and liberal-leaning
pages also analysed, most were from either Fox or Breitbart. The page Eagle Rising
shared none of the 14 media pages analysed, and the 1,143 links posted between 7
October and 7 November 2016 pointed to just 14 websites, including eaglerising.com.
8.3.3 Pro-Trump Pages Posted Across Multiple Websites Affected Google Search
Returns
A Google search of article titles posted on pro-Trump pages sheds some light on how
such networks function. For example, Eagle Rising shared an article from the blog the
blacksphere.net entitled “Hillary Clinton: Calls Blacks Professional Never Do Wells.”
This post garnered 157 shares on Facebook.
A Google search using the article’s exact title returned the original post, as
well as several nearly exact reprints on other sites, with some linking back to The
Blacksphere article. A search for The Blacksphere returned 734 results, including posts
from rightwingnews.com, teapartytribune.com, and thegatewaypundit.com. Some of
these links were posted by other users in comment sections and online forums, and
Sharescount40 suggested the URL was shared 12,500 times across social networks. The
article was also picked up by online trend aggregators like Trendolizer,41 indicating
the efforts to spread this content had some impact. The apparent domination of these
sites’ content among first pages of Google returns may create an impression that
Hilary Clinton has a clear bias against African Americans.
Depending on one’s own echo chamber, the size of pro-Trump networks might
come as a surprise. To some media pundits, Trump rode to the White House on a wave
of fringe support (Coppins, 2015) – but that would be a mistake, as analysis of the
networks shows.
Each of the networks were visualised using Gephi, presenting a total of 5,416
nodes with 100,208 edges between them. To put that into perspective, similar data
pulls were made on two media page groups. The three pro-Trump pages had 16.3 times
more nodes and 55.86 times more edges than the liberal-leaning media group.
Each network contained a considerable percentage of pages that have self-
categorized on Facebook as “Community,” but also “Public Figure,” “Politician” and
some form of “News/Media” (See Figure 8.3).
Figure 8.3: Facebook page categories selected by pages within pro-Trump page like network.
The pro-Trump network was then analysed using Gephi (Figure 8.4). Additional
statistical analysis was conducted, using Modularity, which identifies the various
communities within a network, marked in the data visualization below by colours.
The pro-Trump network wasn’t just bigger in comparison; it was also more closely
integrated between pages with an Average Weighted Degree of 18.502 compared to
that of the conservative-leaning media group at 9.01 or the liberal-leaning at 5.404
(the higher the number, the greater the average number of edges that touch a node in
the network).
Findings 125
Pages liking each other demonstrate a possible channel for the spread of information.
To investigate further, Netvizz was used to pull all posts made by each page from 7
October to 7 November 2016. These posts where analysed using Excel to count the
mentions of specific terms (such as Clinton, Trump, and Wikileaks), how many posts
were shared from other accounts, and what web domains were shared to the page, for
example. The same investigative process was then applied to analysing the two media
page groups.
Around one-third of the posts made by Wake Up & Reclaim America (34.1%)
and Citizens for Trump (28.7%) were shares from other Facebook accounts or pages,
indicating community-like behaviour on these two pages.
126 Participatory Propaganda
Figure 8.5: Number of posts shared from other Facebook pages or accounts.
Some pages, such as Occupy Libtards,42 enjoyed repeated shares to Wake Up & Reclaim
America, including The Deplorables.43 This Facebook group has 472,297 Members (as
of 18 April 2017) and takes its name from a comment made by Hillary Clinton during
the election about Trump supporters.
These pro-Trump pages are not operating in isolation. Of note, as bigger nodes
in the pro-Trump Page Like network visualisation are Fox News, Sean Hannity, The
Blaze, and Glenn Beck (see the darker orange community in the upper left of the
network) – not to mention the NRA Institute for Legislative Action and The Heritage
Foundation (Figure 8.6).
Figure 8.6: Zoomed in screenshot of pro-Trump Facebook page like network using Gephi.
Beyond the official political campaign Facebook pages, hundreds if not thousands
of other pages pumped content supporting Trump to sympathetic users of that social
network. Indeed, within the Wake Up & Reclaim America network, 207 page names
contain the word “Trump” – with many more that are pro-Trump that do not, making
them much more difficult to track. Together, these Facebook pages support each other
with reciprocal Page Likes and sharing of posts, while also mobilizing users to not just
spread the message but also support Trump. In so doing, these online communities
are also tapping into bigger organisations, such as media outlets, lobby groups, and
think tanks – hinting at a much more systemic participatory propaganda effort.
The liberal-leaning media group, visualised in Figure 8.7, comprised seven almost
entirely independent communities. The visualisation below uses Gephi’s stronger
gravity function to keep the communities closer together for ease of viewing; however,
they are not linked so closely in reality. What’s more, the Facebook pages tend to be
grouped into ‘ego networks,’ meaning any given media outlet tends to only like pages
related to that network, such as its own TV shows or journalists.
Figure 8.7: Left-leaning media Facebook page like (or “ego”) network.
The conservative-leaning media group is quite different (Figure 8.8). The massive
Infowars community dominates the visualisation, represented here below by the
large yellow section, running into the Alex Jones network in blue, which comes with
Findings 129
it.44 While nodes connect the Infowars monolith to Fox, the key connector page is
Judge Andrew Napolitano. This is interesting in itself, as in past analysis of media
Facebook Page Like networks, Fox stood out from outlets such as the BBC for its
connecting to personalities, both their own journalists as well as US politicians,
suggesting that some media outlets aren’t just covering the news, but engaging
directly with the subjects making the news (Wanless, 2015). This form of engagement
could be considered alarming, if the notion of impartial news is accepted as crucial to
a functioning democracy.
44 Since then, Facebook has banned Alex Jones and Infowars blog from its pages.
130 Participatory Propaganda
When these two media groups are combined with the pro-Trump network (Figure
8.9), the liberal-leaning outlets become islands unto themselves almost entirely
disconnected (the blue communities at the bottom left), while the conservative-
leaning media are absorbed into the overall community, and as noted above, in some
cases becoming influential nodes.
While the analysis presented above is based on a very limited number of pages,
the degree of engagement and inter-connectivity, both inside the network and
with supportive media, demonstrate the existence of a systematic and coordinated
attempt to influence the US voters to support the Trump campaign. All but two of the
critical tactics identified in the participatory propaganda model were used by Trump
supporters to achieve this goal, including sharing provocative content (fake news,
memes, and data leaks), feeding such content into an echo chamber, reposting the
same content, encouraging followers to do the same, and connecting with media and
larger organisations supportive of Trump. The only two critical elements missing were
hyper-targeted audience analysis (Step 1) and monitoring and evaluation (Step 7), as
these activities are typically conducted through in-house research during a campaign
and are not traceable through open sources. However, Cambridge Analytica has
openly claimed to have used such tactics for the Trump campaign (Nix, 2016).
45 For more data, see 2016 CIRA report for Canada, the 2016 Office for National Statistics report for
UK, and the 2017 Pew Research Center report for the USA.
46 Similar models of participatory propaganda have been identified through subsequent research on
the 2017 U.K. general election (https://lageneralista.com/anti-establishment-blues-2017-u-k-election/)
and Canadian political Facebook pages (https://lageneralista.com/polarising-politics-in-canada-a-
facebook-study/).
132 Participatory Propaganda
in 2016, the average American was consuming 10:39 hours (Nielsen, 2016) of media
across devices each day. Unlike radio and television before it, the internet has people
constantly connected to information. Americans are at the vanguard of these changes
– and as such are among the most vulnerable populations to information warfare, be
it in the form of participatory propaganda, social engineering or cyber-attacks.
With such levels of exposure to a constant barrage of information, the ability of
any one individual to discern its veracity and relevance in a broader context of daily
life is constantly challenged. Furthermore, the effects of continuous online exposure
on individual mental health or general perceptions of the world are still too poorly
understood, and as such, are not yet part of mainstream knowledge or incorporated
into national education curriculums at the level required to cope. The negative and
long-lasting repercussions of such limited understanding are perhaps nowhere as
serious as in national politics.
In 2014, the World Economic Forum listed “the spread of misinformation online”
as one of the top ten trends facing the world (WEF, 2014). By 2016, Reporters Without
Borders declared that we “have reached the age of post-truth, propaganda, and
suppression of freedoms – especially in democracies” (2017). As demonstrated,
modern propagandists have a considerable arsenal of methods at their disposal to
manipulate populations, influence their opinions or engage them in active propagation
of the desired content that go well beyond the creation and distribution of ‘fake news’
alone. Unfortunately, the tools and methods discussed in this article can be used
by savvy propagandists everywhere, regardless of their political clout or country of
provenance. What perhaps stands out most in this participatory propaganda model
is its perpetuation. Through the use of online communities, such participatory
propaganda campaigns run as long as the cause driving it matters to its members – or
rather, those administrating such groups are able to produce content that engages
and provokes followers. Finding ways to identify and measure engagement within
these networks to understand the driving rationale, as opposed to blocking them,
should be a priority for those studying liberal democracies.
References
Albright, J. (2016a, November 2016). #Election2016: Propaganda-lytics & Weaponized Shadow
Tracking. [Online] Medium. Retrieved May, 11, 2017 from http://bit.ly/2pD3Q3M
Albright, J. (2016b, November 18). The #Election2016 Micro-Propaganda Machine. [Online] Medium.
Retrieved December, 29, 2016 http://bit.ly/2qYWviJ
Allcott, H. & Gentzkow, M. (2017). Social Media and Fake News in the 2016 Election. The National
Bureau of Economic Research. [Online] NBER Working Paper No. 23089. Retrieved May, 11, 2017
from http://www.nber.org/papers/w23089
Ambled, N. & Bui, T. (2011). Harnessing the Influence of Social Proof in Online Shopping: The
Effect of Electronic Word of Mouth on Sales of Digital Microproducts. International Journal of
Electronic Commerce, 16(2), 91–114.
References 133
Bakshy, E., Messing, S., & Adamic, L.A., (2015). Exposure to ideologically diverse news and opinion
on Facebook. Science, 348(6239), 1130–1132.
Bastion M., Heymann S., & Jacomy, M. (2009). Gephi: an open-source software for exploring and
manipulating networks. In Proceedings of the third international conference on weblogs and
social media, AAAI: May 2009. Retrieved January, 22, 2017 from https://bit.ly/2TLFPKZ
BBC. (2016, November 15). US Election 2016: Trump’s ‘hidden’ Facebook army. BBC. [Online]
Retrieved January, 21, 2017 from http://bbc.in/2ftfkEF
Benkler, Y., Faris, R., Roberts, H., & Zuckerman, E. (2017). Study: Breitbart-led right-wing media
ecosystem altered broader media agenda. Columbia Journalism Review [Online]. Retrieved May,
11, 2017 from http://bit.ly/2ougMbz
Bernays, E. L. (1928). Propaganda. Reprint: Ig Publishing, 2004.
Bessi, A., & Ferrara, E. (2016). Social bots distort the 2016 US Presidential election online
discussion. First Monday, 21(11). Retrieved February, 23, 2017 from https://bit.ly/2W3fgNO
Bessi, A, Zollo, F, Del Vicario, M, Puliga M, Scala, A, Caldarelli, G. ... Quattrociocchi, W. (2016). Users
Polarization on Facebook and YouTube. PLoS ONE 11(8). Retrieved February, 19, 2017 from
https://bit.ly/2QziJCC
Blackmore, S. (2000). The Meme Machine (Vol. 25). Oxford Paperbacks.
Bos, L., Van der Brug, W., & De Vreese, C. (2010). Media coverage of right-wing populist leaders.
Communications, 35(2), 141–163.
Breitenbach, D. (2017, February 7). What goes on in a far-right Facebook filter bubble? [Online]
Deutsche Welle. Retrieved May, 11, 2017 from http://bit.ly/2poWipi
Buckels, E. E., Trapnell, P. D., & Paulhus, D. L. (2014). Trolls just want to have fun. Personality and
Individual Differences,67, 97–102. Retrieved May, 11, 2017 from http://bit.ly/1jNIiM0
Castronovo, R. (2014). Propaganda 1776: Secrets, Leaks, and Revolutionary Communications in Early
America. Oxford and New York: Oxford UP.
Cheng, J., Bernstein, M., Danescu-Niculescu-Mizil, C., & Leskovec, J. (2017). Anyone Can Become
a Troll: Causes of Trolling Behaviour in Online Discussions. In Proceedings of the 2017 ACM
Conference on Computer Supported Cooperative Work and Social Computing (pp. 1217–1230).
[Online] Retrieved May, 11, 2017 from http://bit.ly/2jZY4ub
Chmielewski, D. (2016, November 12). White supremacists urge trolling Clinton supporters to
suicide. USA Today. [Online] Retrieved January, 21, 2017 from https://usat.ly/2fGtBOW
CIRA.ca (2016). Internet use in Canada. [Online] Retrieved November, 16, 2017 from https://bit.
ly/2omFfkP
Cohen, R. (2017, February 20). Humanity in the Age of AI. The Huffington Post. [Online] Retrieved
March, 20, 2017 from http://huff.to/2q5ZPrP
Connolly, K., Chrisafis, A., McPherson, P., Kirchgaessner, S., Haas, B., Phillips, D., Hunt, E., & Safi,
M. (2016, December 2). “Fake news: an insidious trend that’s fast becoming a global problem”.
The Guardian. [Online] Retrieved January, 21, 2017 from http://bit.ly/2gvuCJC
Coppins, M. (2015, November 27). How Donald Trump courted the right-wing fringe to conquer the
GOP. The Washington Post. [Online] Retrieved May, 11, 2017 from http://wapo.st/2r9dVXo
Democracy Now. (2016, October 3). Clinton Tape: Sanders Supporters “Living in Their Parents’
Basement”. Democracy Now. [Online] Retrieved January, 21, 2017 from http://bit.ly/2q6vBVj
Del Vicario, M., Bessi, A., Zollo, F., Petroni, F., Scala, A., Caldarelli, G. ... Quattrociocchi, W. (2016).
The spreading of misinformation online. In Proceedings of the National Academy of Sciences,
113(3), 554–559. doi: 10.1073/pnas.1517441113
Dhami, M. K. (2011). Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations.
The Intercept. [Online] Retrieved December, 29, 2016 from http://bit.ly/1TQrLZs
Dreyfus, E. (2017, January 20). Secret Facebook Groups are the Trump Era’s Worst, Best Echo
Chamber. Wired. [Online] Retrieved January, 21, 2017 from http://bit.ly/2jGtkNt
134 Participatory Propaganda
Ellul, J. (1965). Propaganda: The Formation of Men’s Attitudes, Trans. Konrad Kellen & Jean Lerner.
New York: Vintage Books.
Epstein, R. & Robertson, R. E. (2015). The search engine manipulation effect (SEME) and its possible
impact on the outcomes of elections. In Proceedings of the National Academy of Sciences,
112(33), E4512–E4521.
Frank, T. (2016, October 31). Forget the FBI cache; the Podesta emails show how America is run. The
Guardian. [Online] Retrieved January, 13, 2017 from http://bit.ly/2eN30Pk
Facebook.com. (2017a). How does News Feed decide which stories to show? [Online] Retrieved
January, 21, 2017 from http://bit.ly/2r6YXAY
Facebook.com. (2017b). How News Feed Works. [Online] Retrieved January, 21, 2017 from https://bit.
ly/1wTf4MN
Finnegan, W. (2016, June 23). “Donald Trump and the ‘Amazing’ Alex Jones”. The New Yorker. [Online]
Retrieved May, 11, 2017 from http://bit.ly/28QSd1a
Frankovic, K. (2016, December 27). Belief in conspiracies largely depends on political identity.
[Online] YouGov. Retrieved January, 13, 2017 from http://bit.ly/2irRrfS
Garrison, W. C. (1999). Information Operations and Counter-Propaganda: Making a Weapon of Public
Affairs. Carlisle Barracks, PA: Army War College.
Gallucci, N. (2016, December 5). A pizza shop patron is fighting back against the #Pizzagate trolls.
[Blog] Mashable. Retrieved January, 13, 2017 from http://on.mash.to/2r9oF89
Garrett, R. K. & Weeks, B. E. (2013) The Promise and Peril of Real-Time Corrections to Political
Misperceptions. In Proceedings of the 2013 Conference on Computer Supported Cooperative
Work and Social Computing (pp. 1047–1058). [Online] Retrieved January, 13, 2017 from https://
bit.ly/2KcpwAM
Google.com (2017). How Search Works. [Online] Retrieved January, 21, 2017 from http://bit.
ly/1zZneEO
Grömping, M. (2014). ‘Echo Chambers’ Partisan Facebook Groups during the 2014 Thai Election. Asia
Pacific Media Educator, 24(1), 39–59.
Gruzd, A. & Roy, J. (2014). Investigating political polarization on Twitter: A Canadian perspective.
Policy & Internet, 6(1), 28–45.
Gruzd, A. & Tsyganova, K. (2015). Information Wars and Online Activism During the 2013/2014 Crisis
in Ukraine: Examining the Social Structures of Pro‐and Anti‐Maidan Groups. Policy & Internet,
7(2), 121–158.
Hern, A. (2016, September 23). Oculus Rift founder Palmer Luckey spends fortune backing pro-Trump
‘shitposts’. The Guardian. [Online] Retrieved January, 21, 2017 from http://bit.ly/2d5WX6q
Hsu, H, (2016, October 4). The Dank Memes that are ‘Disrupting’ Politics. The New Yorker. [Online]
Retrieved December, 29, 2016 from http://bit.ly/2pCokZr
Irwin, W. (1919). An Age of Lies: How the Propagandist Attacks the Foundation of Public Opinion.
Sunset 43 (December), 56–66.
Jowett, G. S. & O’Donnell, V. (2015). Propaganda & Persuasion. 6th ed. Thousand Oaks, CA: Sage. P 7
Kabin, B. (2013, September 23). New York Cracks Down on Companies That Buy Fake Online Reviews,
Entrepreneur. [Online] Retrieved December, 29, 2016 from http://bit.ly/2r0yDvq
Kang, C. (2016, November 21). Fake News Onslaught Targets Pizzeria as Nest of Child-Trafficking. The
New York Times. [Online] Retrieved January, 13, 2017 from http://nyti.ms/2iB2s24
Katalenas, D. (2016, July 16). Join the US Freedom Army. LinkedIn User Post. [Online] Retrieved May,
11, 2017 from http://bit.ly/2r99cov
Kollanyi, B. & Howard, P. N. (November 2016). Bots and Automation over Twitter during the U.S.
Election. Data Memo. [Online] Retrieved January, 8, 2017 from http://politicalbots.org/?p=787
Lapowsky, I. & Marshall, A. (2017, January 3). Ford’s US Expansion is a Victory for Trump’s Trolling
Tactics. Wired. [Online] Retrieved January, 22, 2017 from http://bit.ly/2ixfWKZ
References 135
Pew Research Centre. (2016b, November 10). Social Media Update. [Online] Retrieved November, 1,
2017 from http://pewrsr.ch/2nU4zMm
Pew Research Centre. (2017). Internet/Broadband Fact Sheet. [Online] Retrieved November, 16, 2017
from https://pewrsr.ch/2kQtkrM
Plouffe, D. (2010). The Audacity to Win: How Obama Won and How We Can Beat the Party of
Limbaugh, Beck, and Palin. Updated ed. Penguin Books.
Renner, N., (2017, January 30). Memes trump articles on Breitbart’s Facebook page. Colombia
Journalism Review. [Online] Retrieved May, 11, 2017 from http://bit.ly/2pCf3Rs
Reporters Without Borders. (2017). 2017 World Press Freedom Index – tipping point. [Online]
Retrieved May, 11, 2017 from http://bit.ly/2pyXh61
Rieder, B. (2013, May). Studying Facebook via data extraction: the Netvizz application. In
Proceedings of the 5th Annual ACM Web Science Conference (pp. 346–355). ACM.
Ross, S. T. (2002). Understanding propaganda: The epistemic merit model and its application to art.
Journal of Aesthetic Education, 36(1), 16–30.
Schreckender, B. (2017, March/April) World War Meme. Politico. [Online] Retrieved May, 11, 2017
from http://politi.co/2lNQpvN
Scott, J. (1988). Social network analysis. Sociology, 22(1), 109–127.
Sheets, P., Bos, L., & Boomgaarden, H. G. (2016). Media cues and citizen support for right-wing
populist parties. International Journal of Public Opinion Research, 28(3), 307–330.
Silver, N. (2015, July 20). Donald Trump Is The World’s Greatest Troll. [Blog] FiveThirtyEight. Retrieved
January, 22, 2017 from http://53eig.ht/2r7BD5q
Silverman, C. (2015). Lies, Damn lies, and viral content. How news websites spread (and debunk)
online rumors, unverified claims, and misinformation. [Online] Tow Center for Digital
Journalism. Retrieved January, 22, 2017 from https://bit.ly/2YV487b
Silverman, C, Strapagiel, L, Shaban, H, Hall, E, & Singer-Vine, J. (2016, October 20). Hyperpartisan
Facebook Pages Are Publishing False And Misleading Information At An Alarming Rate.
Buzzfeed. [Online] Retrieved January, 21, 2017 from http://bzfd.it/2poeH5C
Solon, O. (2017, 27 October). Russia’s RT Reveals Twitter’s Pitch to Sell Millions of Dollars in 2016
Election Ads. The Guardian. [Online] Retrieved November, 1, 2017 from http://bit.ly/2ycyh9a
Solon, O. & Levin S., (2016, December 16). How Google’s search algorithm spreads false information
with a right-wing bias. The Guardian. [Online] Retrieved January, 21, 2017 from http://bit.
ly/2gSL7PJ
Thompson, A. (2016, December 8). Parallel narratives: Clinton and Trump supporters really don’t
listen to each other on Twitter, MIT Media Lab Electome project, VICE. [Online] Retrieved
December, 29, 2016 from http://bit.ly/2poU0GC
Trump, D. (2016, 4 July). Dishonest media is trying their absolute best to depict a star in a tweet as
the Star of David rather than a Sheriff’s Star, or plain star! [Post] Twitter. Retrieved November, 1,
2017 from http://bit.ly/2xJrKP5
Turcotte, J., York, C., Irving, J., Scholl, R. M, & Pingree, R. J., (2015). News recommendations from
social media opinion leaders: Effects on media trust and information seeking. Journal of
Computer-Mediated Communication, 20, 520–535. doi.org/10.1111/jcc4.12127
U.K. Office for National Statistics. (2016). Internet users in the UK: 2016. Statistical Bulletin.
[Online] London: Office for National Statistics. Retrieved November, 16, 2017 from https://bit.
ly/2eCVxzH
Wall Street Journal. (2016). Blue Feed, Red Feed: See Liberal Facebook and Conservative Facebook,
Side by Side Retrieved January, 22, 2017 from http://graphics.wsj.com/blue-feed-red-feed/
Wanless, A. (2015). You’ve Got a Friend in News. [Blog] La Generalista. Retrieved November, 1, 2017
from https://lageneralista.com/youve-got-a-friend-in-news/
Wanless, A. (2016). Facebook and the U.S. Elections. [Blog] La Generalista. Retrieved November, 1,
2017 from https://lageneralista.com/facebook-stats/
References 137
Weedon, J., Nuland, W., & Stamos, A. (2017). Information Operations and Facebook. [Online]
Facebook. Retrieved May, 11, 2017 from http://bit.ly/2oOOS9s
WEF. (2013). Outlook on the Global Agenda 2014. [Online] World Economic Forum. Retrieved May, 11,
2017 from at http://bit.ly/2q8UIqy
Williams, P. (2016, May 25). Guccifer, Hacker Who Says He Breached Clinton Server, Pleads Guilty.
NBC News. [Online] Retrieved January, 21, 2017 from http://nbcnews.to/1szUR3X
Wodak, R. (2013). Right-wing populism in Europe: politics and discourse. A&C Black
Woolley, S. C. & Howard, P. N. (2018). (Eds). Computational propaganda: political parties,
politicians, and political manipulation on social media. Oxford: Oxford University Press
138 List of Figures
List of Figures
Figure 4.1: Density of clusters according to neighborhood — 46
Figure 5.1: Akhil Gogoi Meme — 62
Figure 6.1: Video still from the Israeli Defense Forces’ video, “With Her Eyes She Defends Israel’s
Borders,” 2019 — 68
Figure 6.2: Video still from the Israeli Defense Forces’ video, “With Her Eyes She Defends Israel’s
Borders,” 2019 — 68
Figure 6.3: B’Tselem volunteer Thawra ‘Eid zooms in on Israeli settler children who are attacking her
Palestinian village of Burin by throwing stones with slingshots, May 20, 2015, © B’Tselem — 77
Figure 6.4: B’Tselem volunteer Wydian Zaben films Israeli settlers torching the fields around her
Palestinian village of Burin, Aug 15, 2015, © B’Tselem — 78
Figure 6.5: “The Po’alot (female workers) in the agricultural settlement Ayanot,” Jan 2, 1940. Source:
Schwartz Tel Aviv. From the The Jewish National Fund (JNF) Photographic Archive — 79
Figure 6.6: Deir Yassin (also transliterated as Dayr Yasin), Associated Press, April 1948 — 81
Figure 7.1: Tweet 1 — 92
Figure 7.2: Tweet 2 — 92
Figure 7.3: Tweet 3 — 93
Figure 7.4: Tweet 4 — 93
Figure 7.5: Tweet 5 — 94
Figure 7.6: @mentions containing attempts to discredit — 98
Figure 7.7: @mentions containing attempts to intimidate — 99
Figure 7.8: @mentions containing attempts to shame — 101
Figure 8.1: Post type by pro-Trump Facebook pages — 121
Figure 8.2: Average shares on posts by page — 123
Figure 8.3: Facebook page categories selected by pages within pro-Trump page like network — 124
Figure 8.4: Three pro-Trump Facebook page like networks — 125
Figure 8.5: Number of posts shared from other Facebook pages or accounts — 126
Figure 8.6: Zoomed in screenshot of pro-Trump Facebook page like network using Gephi — 127
Figure 8.7: Left-leaning media Facebook page like (or “ego”) network — 128
Figure 8.8: Right-leaning media page like networks — 129
Figure 8.9: All Facebook page like networks combined — 130
List of Tables 139
List of Tables
Table 4.1: Overview of the eight largest clusters obtained from community detection on relations
among Instagram users in Kristiansand — 41
Table 7.1: @mentions containing attempts to discredit — 98
Table 7.2: @mentions containing attempts to intimidate — 100
Table 7.3: @mentions containing attempts to shame — 101
Table 7.4: Percent of @mentions invoking race (of legislator) — 102
Table 7.5: Percent of @mentions invoking gender (of legislator) — 103
Table 7.6: Percent of @mentions containing body commentary — 103
Table 7.7: Summary of hypothesis test results — 104
Table 8.1: Facebook pages analysed — 119