Show Less
Restricted access

Hashtag Publics

The Power and Politics of Discursive Networks

Series:

Edited By Nathan Rambukkana

This collection investigates the publics of the hashtag. Taking cues from critical public sphere theory, contributors are interested in publics that break beyond the mainstream – in other publics. They are interested in the kinds of publics that do politics in a way that is rough and emergent, flawed and messy, and ones in which new forms of collective power are being forged on the fly and in the shadow of loftier mainstream spheres.
Hashtags are deictic, indexical – yet what they point to is themselves, their own dual role in ongoing discourse. Focusing on hashtags used for topics from Ferguson, Missouri, to Australian politics, from online quilting communities to labour protests, from feminist outrage to drag pop culture, this collection follows hashtag publics as they trend beyond Twitter into other spaces of social networking such as Facebook, Instagram, and Tumblr as well as other media spaces such as television, print, and graffiti.
Show Summary Details
Restricted access

Chapter Ten: More than Words: Technical Activist Actions in #CISPA

Extract

← 138 | 139 →

CHAPTER TEN

More than Words: Technical Activist Actions in #CISPA

STACY BLASIOLA, YOONMO SANG, AND WEIAI WAYNE XU

In recent years, Internet policy making has received an increased level of interest from publics (Breindl & Briatte, 2013; Powell, 2012). The net neutrality debate and the SOPA/PIPA bills, for example, both relate to Internet policy making, and each case has garnered a fair share of the spotlight. Understanding whether and how Internet activism can affect policy-making processes is an issue that warrants our attention. Previous studies have investigated digital activists’ communicative and technical tactics (Van Laer & Van Aelst, 2010); however, most studies fail to provide a workable investigation into the range of technical actions used and how those actions utilize the affordances of the Internet.

You are not authenticated to view the full text of this chapter or article.

This site requires a subscription or purchase to access the full text of books or journals.

Do you have any questions? Contact us.

Or login to access all content.