User:MaryJane404/Internet vigilantism/Panacotta101 Peer Review

Peer review by panacotta101
This is where you will complete your peer review exercise. Please use the following template to fill out your review.

General info

 * Whose work are you reviewing? (provide username) MaryJane404
 * Link to draft you're reviewing: User:MaryJane404/sandbox

Lead
Guiding questions:


 * Has the Lead been updated to reflect the new content added by your peer?
 * Does the Lead include an introductory sentence that concisely and clearly describes the article's topic?
 * Does the Lead include a brief description of the article's major sections?
 * Does the Lead include information that is not present in the article?
 * Is the Lead concise or is it overly detailed?

Lead evaluation
The Lead can reflect new content added and it is concise. The first sentence introduces the topic. The last sentences briefly describes following sections.

Content
Guiding questions:


 * Is the content added relevant to the topic?
 * Is the content added up-to-date?
 * Is there content that is missing or content that does not belong?
 * Does the article deal with one of Wikipedia's equity gaps? Does it address topics related to historically underrepresented populations or topics?

Content evaluation
Content added are relevant to the topic and up-to-date. It does not deal with equity gaps.

Tone and Balance
Guiding questions:


 * Is the content added neutral?
 * Are there any claims that appear heavily biased toward a particular position?
 * Are there viewpoints that are overrepresented, or underrepresented?
 * Does the content added attempt to persuade the reader in favor of one position or away from another?

Tone and balance evaluation
Content added are neutral and does not biased towards a particular position. It discusses both sides of the topic.

Sources and References
Guiding questions:


 * Is all new content backed up by a reliable secondary source of information?
 * Are the sources thorough - i.e. Do they reflect the available literature on the topic?
 * Are the sources current?
 * Are the sources written by a diverse spectrum of authors? Do they include historically marginalized individuals where possible?
 * Check a few links. Do they work?

Sources and references evaluation
Most sentences are backed up by reliable sources. Most sources are current and from different authors.

Organization
Guiding questions:


 * Is the content added well-written - i.e. Is it concise, clear, and easy to read?
 * Does the content added have any grammatical or spelling errors?
 * Is the content added well-organized - i.e. broken down into sections that reflect the major points of the topic?

Organization evaluation
Content added is well written. There are not many grammatical or spelling errors. Sections are divided clearly. Order of the sections could be modified to make the article goes more smoothly. The structure of Measures section could be clearer.

Images and Media
Guiding questions: If your peer added images or media


 * Does the article include images that enhance understanding of the topic?
 * Are images well-captioned?
 * Do all images adhere to Wikipedia's copyright regulations?
 * Are the images laid out in a visually appealing way?

Images and media evaluation
No image has been added.

For New Articles Only
If the draft you're reviewing is a new article, consider the following in addition to the above.


 * Does the article meet Wikipedia's Notability requirements - i.e. Is the article supported by 2-3 reliable secondary sources independent of the subject?
 * How exhaustive is the list of sources? Does it accurately represent all available literature on the subject?
 * Does the article follow the patterns of other similar articles - i.e. contain any necessary infoboxes, section headings, and any other features contained within similar articles?
 * Does the article link to other articles so it is more discoverable?

New Article Evaluation
NA

Overall impressions
Guiding questions:


 * Has the content added improved the overall quality of the article - i.e. Is the article more complete?
 * What are the strengths of the content added?
 * How can the content added be improved?

Overall evaluation
The added content makes to original article more complete. They present the topic comprehensively. The content could be improved probably by making the language easier to understand.

Copy Edit
Internet vigilantism is the act of carrying out vigilante activities through the Internet. The term encompasses vigilantism against alleged scams, crimes, and non-Internet related behavior. The expanding scope of media savvy and online interaction has enabled vigilantes to utilize methods specific to the internet in order to distribute justice to parties they consider to be corrupt(ed), but who have not committed a formal crime or have not been held accountable by the criminal justice system.

Internet Vigilantism has multiple ways of expressing itself. It involves a variety of methods and has varying relationships to state authority depending on context.

Description
The term internet vigilantism describes punitive public denunciations, (which) aim ed at swaying public opinion in order to “take justice into one’s own hands” by engaging in forms of targeted surveillance, unwanted attention, negative publicity, repression, coercion or dissuasion. [citation needed] Associate professor in sociology Benjamin Loveluck identifies the four main forms of internet vigilantism as: flagging, investigation, hounding, and organized denunciation. Also referred to by Steve man as Sousveillance, meaning "to watch from below", internet vigilantism can work as a type of peer surveillance. This is based on the premise that shame can be used as a form of social control. There are muddied overlaps between internet vigilantism and cyber bullying, as both utilize public shaming methods, and cyber bullying may sometimes be conducted under the guise of internet vigilantism. This is in the case that the vigilante "realizes they aren't achieving social justice but utilize it as a means of rationalizing their acts".

Origins
Cyber Vigilantism has become a widespread social phenomena in China as a method of exposing government corruption and utilizing civic engagement, and as a means of sharing previously censored or unavailable information. The popularity of these activities arose due to the Human flesh search engine, which enables the conduction of cyber manhunts. The first of these manhunts was conducted in 2006, when a video surfaced online of a woman killing a kitten with her high heels. A similar example can be seen in the Netflix TV show Don't F**k with Cats: Hunting an Internet Killer, in which a widespread effort by internet vigilantes is made to track down a serial cat murderer on the internet, who had been posting anonymous videos of their activities. In 2008, cyber vigilantism was used in Shenzhen China to expose a government official for attempted child molestation. Surveillance videos from the restaurant in which the assault took place were released on the internet to expose the official, as he had claimed his government position would protect him from incurring any punishment.

In Singapore, cyber vigilantism became a popular form of peer surveillance and is largely viewed as a form of civic engagement. Whereas acts of online vigilantism in China have largely been used as a means of punishment and exposing social corruption, cases in Singapore revolve mainly around exposing fellow citizens for inconsiderate behavior such as not cleaning up after one's dog. Online shaming is viewed by the vigilantes as redintegrative shaming, as they claim their actions are a means of shaming the behavior rather than the perpetrator. This brand of vigilantism is seen as being in line with the morals of a largely collectivist society.

Internet Vigilantism can also take the form of Dark Justice, such as when vigilante pedophile hunters pose as children online in order to ensnare sexual predators.

(Online shaming)
Main article: Online shaming

The act of publicly shaming other internet users online. Those who are shamed online have not necessarily committed any social transgression, however. Online shaming may be used to get revenge (for example, in the form of revenge pornography), stalk, blackmail, or to threaten other internet users.

Doxing is the act of publishing ones personal details online to incur social punishment of the target.

Redintegrative shaming is public shaming based on the perspective that the act is meant to shame the behavior rather than the target, and that the target can be redeemed and reintegrated into society. This approach utilizes shame as a means of social control and deterrent from deviating from social norms.

Human Flesh Search Engine is a method originating in China in the early 2,000s, which works as a cyber manhunt. It consists of crowdsourcing and pooling together information from the public via online forums to conduct vigilante justice through the internet.

Information Entropy in the field of internet vigilantism, is an act intended to disrupt online services.

Denial-of-service attack s are a form of information Entropy conducted by online vigilantes, which involves a widespread effort to make a website inaccessible to legitimate users. The method is to provide so much traffic to the website that it crashes. This is also known as a Denial-of-service attack. DOSAs grew in popularity due to Low Orbit Ion Cannon (LOIC), which is an open source application that enables denial of service attacks.

Hactivism is when hacking is used as a form of political activism.

Relationship to Authority
According to K.K Silva, "Vigilantes’ responses to perceived malicious activity have reportedly caused the loss of digital evidence, thereby obstructing law enforcement’s effort in ascertaining attribution and jurisdiction over cybercrime offences." Therefore internet vigilantism is generally in opposition to legitimate criminal investigations, and viewed as tampering with evidence. However, there are cases in which internet Vigilantism is legally protected, such as when it falls under laws relating to protection of the other. There have also been cases in which vigilantes have cooperated with criminal justice investigations, such as the cases of BrickerBot and WannaCry ransomware attack. In both of these cases, vigilantes cooperated with authorities, utilizing cyber crime methods to fight cyber crime and prevent further damage.

Conversely, Internet Vigilantism can also work for the interests of the Government or for the government, as is sometimes the case Russia. Two non profit groups practicing internet vigilantism, Liga Bezopasnogo Interneta (LBI, Safe Internet League), and Molodezhnaia Sluzhba Bezopasnost (Youth Security Service), attempted to pass a bill that would enable unpaid volunteers to regulate the internet, also known as the Cyber Cossak movement. These groups argue that their aim is to identify content that is extreme or dangerous for children such as child porn, and track down the creators of the content", however the bill has drawn a lot of skepticism from those who argue it is reminiscent of Soviet era peer surveillance, and that it's a breach of Data privacy rights.

The Russian youth group Nashi (youth movement), who conducted a vigilante project called StopXam (organization), has even been publicly supported by Vladimir Putin, who has posed for a picture with them. The group became prominent in the Russian media through publicly shaming bad drivers and filming their (often violent) altercations with them. The group fell out of favor with the Russian government and was liquidated after targeting an Olympic Athlete.

Internet Vigilante Groups

 * Anonymous (group) A hacktivist group responsible for Operation Payback
 * Liga Bezopasnogo Interneta (LBI, Safe Internet League) A Russian non-profit dedicated to regulating extremist material online.
 * Molodezhnaia Sluzhba Bezopasnost (Youth Security Service) A Russian non-profit dedicated to regulating extremist material online.
 * StopXam (organization), also known as "Stop a Deuce bag", is a Russian youth group that publicly shames bad drivers via online videos.
 * Zomri A Slovak online community which publishes political satire on Facebook, in means of inspiring civic engagement.