skip to main content
research-article
Public Access

Creativity, Copyright, and Close-Knit Communities: A Case Study of Social Norm Formation and Enforcement

Published:05 December 2019Publication History
Skip Abstract Section

Abstract

Social norms as a regulatory mechanism often carry more weight than formal law--particularly in contexts when legal rules are gray. In online creative communities that focus on remix, community members must navigate copyright complexities regarding how they are permitted to re-use existing content. This paper focuses on one such community--transformative fandom--where strong social norms regulate behavior beyond copyright law. We conducted interviews with fan creators about their "unwritten rules" surrounding copying and remix and identified highly consistent social norms that have been remarkably effective in policing this community. In examining how these norms have formed over time, and how they are enforced, we conclude that the effectiveness of norms in encouraging cooperative behavior is due in part to a strong sense of social identity within the community. Furthermore, our findings suggest the benefits of creating formal rules within a community that support existing norms, rather than imposing rules from external sources.

References

  1. June Ahn, Mega Subramaniam, Kenneth R. Fleischmann, Amanda Waugh, Greg Walsh, and Allison Druin. 2012. Youth identities as remixers in an online community of storytellers: Attitudes, strategies, and values . Proceedings of the American Society for Information Science and Technology , Vol. 49, 1 (jan 2012), 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  2. Patricia Aufderheide and Peter Jaszi. 2011. Reclaiming Fair Use: How to Put Balance Back Into Copyright. University of Chicago Press, Chicago, IL.Google ScholarGoogle Scholar
  3. Camille Bacon-Smith. 2014. Training New Members . In The Fan Fiction Studies Reader , , Karen Hellekson and Kristina Busse (Eds.). University of Iowa Press, Iowa City, 138--158.Google ScholarGoogle Scholar
  4. Louise Barkhuus. 2012. The mismeasurement of privacy : Using contextual integrity to reconsider privacy in HCI. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. Austin, Texas, 367--376.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Nancy K. Baym. 2000. Tune In, Log On. SAGE Publications, Thousand Oaks, CA.Google ScholarGoogle Scholar
  6. Cristina Bicchieri. 2007. Covenants without swords: Group identity, norms, and communication in social dilemmas . Rationality and Society , Vol. 14, 2 (2007), 192--228.Google ScholarGoogle ScholarCross RefCross Ref
  7. Lindsay Blackwell, Tianying Chen, Sarita Schoenebeck, and Cliff Lampe. 2018. When online harassment is perceived as justified . Proceedings of the AAAI ICWSM International Conference on the Web and Social Media (2018), 22--31.Google ScholarGoogle Scholar
  8. Anita L. Blanchard, Jennifer L. Welbourne, and Marla D. Boughton. 2010. A Model of Online Trust . Information, Communication & Society , Vol. 14, 1 (2010), 76--106.Google ScholarGoogle ScholarCross RefCross Ref
  9. John Braithwaite. 1989. Crime, Shame, and Reintegration. Cambridge University Press, New York, NY.Google ScholarGoogle Scholar
  10. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology . Qualitative Research in Psychology , Vol. 3, 2 (apr 2006), 77--101.Google ScholarGoogle ScholarCross RefCross Ref
  11. Glenn Otis Brown. 2004. Culture's open sources . Anthropological Quarterly , Vol. 77 (2004), 575--580.Google ScholarGoogle ScholarCross RefCross Ref
  12. Amy Bruckman. 2006. A new perspective on "community" and its implications for computer-mediated communication systems . Extended Abstracts on Human Factors in Computing Systems (CHI EA) (2006), 616--621.Google ScholarGoogle Scholar
  13. Julia Bullard. 2016. Motivating invisible contributions: Framing volunteer classification design in a fanfiction repository. In Proceedings of the ACM GROUP Conference on Supporting Group Work. 181--193.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Gary Burnett and Laurie Bonnici. 2003. Beyond the FAQ: Explicit and implicit norms in Usenet newsgroups . Library & Information Science Research , Vol. 25, 3 (2003), 333--351.Google ScholarGoogle ScholarCross RefCross Ref
  15. Kristina Busse. 2015. Fan labor and feminism: Capitalizing on the fannish labor of love . Cinema Journal , Vol. 54, 3 (2015), 110--115.Google ScholarGoogle ScholarCross RefCross Ref
  16. Kristina Busse and Shannon Farley. 2013. Remixing the remix: Fannish appropriation and the limits of unauthorized use . M/C Journal: A Journal of Media and Culture , Vol. 16, 4 (2013).Google ScholarGoogle Scholar
  17. Kelly Caine. 2016. Local standards for sample size at CHI. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. 981--992.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Fabio Calefato, Giuseppe Iaffaldano, and Filippo Lanubile. 2018. Collaboration success factors in an online music community. In Proceedings of the ACM GROUP Conference on Supporting Group Work. 61--70.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Julie Ann Campbell, Sarah Evans, Cecilia Aragon, Abigail Evans, Katie Davis, and David P Randall. 2016. Thousands of positive reviews: Distributed mentoring in online fan communities. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing . San Francisco, CA, 691--704.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Alissa Centivany and Bobby Glushko. 2016. "Popcorn tastes good": Participatory policymaking and Reddit's "AMAgeddon" . Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (2016), 1126--1137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Stevie Chancellor, Andrea Hu, and Munmun De Choudhury. 2018. Norms matter: Contrasting social support around behavior change in online weight loss communities. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. 666:1--14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Eshwar Chandrasekharan, Mattia Samory, Shagun Jhaver, Hunter Charvat, Amy Bruckman, Cliff Lampe, Jacob Eisenstein, and Eric Gilbert. 2018. The internet's hidden rules: An empirical study of Reddit norm violations at micro, meso, and macro Scales . Proc. ACM Human-Computer Interaction , Vol. 2, CSCW (2018), 32:1--25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Elfreda A. Chatman. 1996. The impoverished life-world of outsiders . Journal of The American Society for Information Science , Vol. 47, 3 (1996), 193--206.Google ScholarGoogle ScholarCross RefCross Ref
  24. Giorgos Cheliotis, Hu Nan, Jude Yew, and Huang Jianhui. 2014. The antecedents of remix. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing . Baltimore, MA, 1011--1022.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Bertha Chin. 2014. Sherlockology and Galactica.tv: Fan sites as gifts or exploited labor? Transformative Works and Cultures , Vol. 15 (2014).Google ScholarGoogle Scholar
  26. Robert B. Cialdini and Noah J. Goldstein. 2004. Social influence: Compliance and conformity . Annual Review of Psychology , Vol. 55, 1974 (jan 2004), 591--621.Google ScholarGoogle ScholarCross RefCross Ref
  27. Eric Cook, Stephanie D. Teasley, and Mark S. Ackerman. 2009. Contribution, commercialization & audience: Understanding participation in an online creative community. In Proceedings of the ACM GROUP Conference on Supporting Group Work. Sanibel Island, FL, 41--50.Google ScholarGoogle Scholar
  28. Francesca Coppa and Rebecca Tushnet. 2011. How to suppress women's remix . Camera Obscura , Vol. 26, 2 (2011), 131--139.Google ScholarGoogle ScholarCross RefCross Ref
  29. Gluseppina D'Agostino. 2008. Healing fair dealing: A comparative copyright analysis of Canada's fair dealing to UK fair dealing and US fair use . McGill Law Journal , Vol. 53 (2008), 309.Google ScholarGoogle Scholar
  30. Jill P Dimond, Casey Fiesler, Betsy DiSalvo, Jon Pelc, and Amy Bruckman. 2012. Qualitative data collection technologies: A comparison of instant messaging, email, and phone. In Proceedings of the ACM GROUP Conference on Supporting Group Work. Sanibel Island, FL, 277--280.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Judith S. Donath. 1999. Identity and deception in the virtual community . In Communities in cyberspace . Vol. 1996. Routledge, 29--59.Google ScholarGoogle Scholar
  32. Brianna Dym and Casey Fiesler. 2018. Generations, migrations, and the future of fandom's private spaces . Transformative Works and Cultures , Vol. 28 (2018).Google ScholarGoogle ScholarCross RefCross Ref
  33. Robert C Ellickson. 1986. Of Coase and Cattle: Dispute Resolution Among Neighbors in Shasta County . Stanford Law Review , Vol. 38 (1986), 623--687.Google ScholarGoogle ScholarCross RefCross Ref
  34. David Fagundes. 2012. Talk Derby To Me: Intellectual Property Norms Governing Roller Derby Pseudonyms . Texas Law Review , Vol. 90 (2012), 1093--1152.Google ScholarGoogle Scholar
  35. Ernst Fehr and Urs Fischbacher. 2004 a. Social norms and human cooperation . Trends in Cognitive Sciences , Vol. 8, 4 (2004), 185--190.Google ScholarGoogle ScholarCross RefCross Ref
  36. Ernst Fehr and Urs Fischbacher. 2004 b. Third-party punishment and social norms . Evolution and Human Behavior , Vol. 25, 2 (2004), 63--87.Google ScholarGoogle ScholarCross RefCross Ref
  37. Edward W Felten. 2003. A Skeptical View of DRM and Fair Use . Commun. ACM , Vol. 46, 4 (2003), 56--59.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Casey Fiesler. 2008. Everything I Need To Know I Learned from Fandom: How Existing Social Norms Can Help Shape the Next Generation of User-Generated Content . Vanderbilt Journal of Entertainment and Technology Law , Vol. 10, 3 (2008), 729--762.Google ScholarGoogle Scholar
  39. Casey Fiesler and Amy S. Bruckman. 2014. Remixers' Understandings of Fair Use Online . Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing (2014), 1023--1032.Google ScholarGoogle Scholar
  40. Casey Fiesler, Jessica Feuston, and Amy S. Bruckman. 2015. Understanding Copyright Law in Online Creative Communities. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing . Vancouver, BC, Canada, 116--129.Google ScholarGoogle Scholar
  41. Casey Fiesler, Jialun "Aaron" Jiang, Joshua McCann, Kyle Frye, and Jed R. Brubaker. 2018. Reddit Rules! Characterizing an Ecosystem of Governance. In Proceedings of the AAAI ICWSM International Conference on the Web and Social Media . 72--18.Google ScholarGoogle Scholar
  42. Casey Fiesler, Cliff Lampe, and Amy S. Bruckman. 2016a. Reality and Perception of Copyright Terms of Service for Online Content Creation. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing . 1450--1461.Google ScholarGoogle Scholar
  43. Casey Fiesler, Shannon Morrison, and Amy S. Bruckman. 2016b. An Archive of Their Own: A Case Study of Feminist HCI and Values in Design. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems . San Jose, CA.Google ScholarGoogle Scholar
  44. Casey Fiesler, Shannon Morrison, Ben Shapiro, and Amy Bruckman. 2017. Growing Their Own: Legitimate Peripheral Participation for Computational Learning in an Online Fandom Community. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing .Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Catherine L. Fisk. 2006. Credit where it's due: The law and norms of attribution . Georgetown Law Journal , Vol. 95, 1 (2006), 49--117.Google ScholarGoogle Scholar
  46. Katharina. Freund. 2014. "Fair use is legal use": Copyright negotiations and strategies in the fan-vidding community . New Media & Society , Vol. 18, 7 (2014), 1348--1363.Google ScholarGoogle Scholar
  47. Katie Gach, Casey Fiesler, and Jed R. Brubaker. 2017. "Control your emotions, Potter": An Analysis of Grief Policing on Facebook in Response to Celebrity Death . Proc. ACM Human-Computer Interaction , Vol. 2, CSCW (2017), 47:1--13.Google ScholarGoogle Scholar
  48. Kyle L. Galbraith. 2017. Terms and Conditions May Apply (But Have Little to Do With Ethics) . American Journal of Bioethics , Vol. 17, 3 (2017), 21--22.Google ScholarGoogle ScholarCross RefCross Ref
  49. E. Goffman. 1963. Stigma: Notes on the management of spoiled identity. Touchstone, New York, NY.Google ScholarGoogle Scholar
  50. Greg Guest, Arwen Bunce, and Laura Johnson. 2006. How Many Interviews Are Enough?: An Experiment with Data Saturation and Variability . Field Methods , Vol. 18, 1 (feb 2006), 59--82.Google ScholarGoogle ScholarCross RefCross Ref
  51. Debora Halbert. 2006. Feminist interpretations of intellectual property . Am. U. J. Gender Soc. Pol'y & Law , Vol. 14, 3 (2006), 431.Google ScholarGoogle Scholar
  52. Karen Hellekson. 2009. A Fannish Field of Value: Online Fan Gift Culture . Cinema Journal , Vol. 48, 4 (2009), 113--118.Google ScholarGoogle Scholar
  53. Karen Hellekson. 2015. Making Use Of: The Gift, Commerce, and Fans . Cinema Journal , Vol. 4, 3 (2015), 125--131.Google ScholarGoogle ScholarCross RefCross Ref
  54. Serena Hillman, Jason Procyk, and Carman Neustaedter. 2014. ? alksjdf ; lksfd ': Tumblr and the Fandom User Experience. In Proceedings of the ACM DIS Conference on Designing Interactive Systems. 775--784.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Michael a. Hogg and Scott a. Reid. 2006. Social identity, self-categorization, and the communication of group norms . Communication Theory , Vol. 16, 1 (2006), 7--30.Google ScholarGoogle Scholar
  56. Guanxiong Huang and Kang Li. 2016. The effect of anonymity on conformity to group norms in online contexts . International Journal of Communication , Vol. 10 (2016), 398--415.Google ScholarGoogle Scholar
  57. Sal Humphreys. 2008. The Challenges of Intellectual Property for Users of Social Networking Sites: A Case Study of Ravelry. In Proceedings of the ACM MindTrek International Conference on Entertainment and Media in the Ubiquitous Era . Tampere, Finland.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Steven J Jackson, Tarleton Gillespie, and Sandy Payette. 2014. The Policy Knot: Re-integrating Policy, Practice and Design in CSCW Studies of Social Computing. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing . Baltimore, MD, 588--602.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Henry Jenkins. 1992. Textual Poachers: Television Fans and Participatory Culture. Routledge.Google ScholarGoogle Scholar
  60. Henry Jenkins. 2006. Fans, Bloggers, and Gamers. New York University Press, New York.Google ScholarGoogle Scholar
  61. Bethan Jones. 2013. Fifty shades of exploitation: Fan labor and Fifty Shades of Grey . Transformative Works and Cultures , Vol. 15 (2013).Google ScholarGoogle ScholarCross RefCross Ref
  62. Michihiro Kandori. 1992. Social Norms and Community Enforcement . The Review of Economic Studies , Vol. 59, 1 (1992), 63--80.Google ScholarGoogle ScholarCross RefCross Ref
  63. Anna Kasunic and Geoff Kaufman. 2018. "At Least the Pizzas You Make Are Hot": Norms, Values, and Abrasive Humor on the Subreddit r/RoastMe . Proceedings of the AAAI ICWSM International Conference on the Web and Social Media (2018), 161--170.Google ScholarGoogle Scholar
  64. Sara Kiesler, Robert E. Kraut, Moira Burke, John Riedl, and Paul Resnick. 2014. Regulating Behavior in Online Communities . In Building Successful Online Communities: Evidence-Based Social Design, Robert E. Kraut and Paul Resnick (Eds.). MIT Press, Boston, MA, 179--230.Google ScholarGoogle Scholar
  65. Ben Kirman, Conor Linehan, and Shaun Lawson. 2012. Exploring Mischief and Mayhem in Social Computing or : How We Learned to Stop Worrying and Love the Trolls. In Extended Abstracts on Human Factors in Computing Systems (CHI EA). Austin, Texas, 121--130.Google ScholarGoogle Scholar
  66. R. E. Kraut, R. E. Rice, C. Cool, and R. S. Fish. 1998. Varieties of Social Influence: The Role of Utility and Norms in the Success of a New Communication Medium . Organization Science , Vol. 9, 4 (1998), 437--453.Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Cliff Lampe and Erik Johnston. 2005. Follow the (Slash)dot: Effects of Feedback on New Members in an Online Community . Proceedings of the ACM GROUP Conference on Supporting Group Work (2005), 11--20.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Maria Knight Lapinski and Rajiv N. Rimal. 2005. An explication of social norms . Communication Theory , Vol. 15, 2 (2005), 127--147.Google ScholarGoogle ScholarCross RefCross Ref
  69. Lawrence Lessig. 2006. Code: And other Laws of Cyberspace, Version 2.0. Basic Books, New York, NY.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Jessa Lingel and danah boyd. 2013. "Keep in Secret, Keep it Safe": Information Poverty, Information Norms, and Stigma . Journal of The American Society for Information Science , Vol. 64, 5 (2013), 981--991.Google ScholarGoogle ScholarCross RefCross Ref
  71. Lydia Pallas Loren. 2007. Building a Reliable Semicommons of Creative Works: Enforcement of Creative Commons Licenses and Limited Abandonment of Copyright . George Mason Law Review , Vol. 14, 1 (2007), 271--328.Google ScholarGoogle Scholar
  72. Kurt Luther, Nicholas Diakopoulos, and Amy Bruckman. 2010. Edits & Credits : Exploring Integration and Attribution in Online Creative Collaboration. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. 2823--2832.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Caitlin McLaughlin and Jessica Vitak. 2011. Norm evolution and violation on Facebook . New Media & Society , Vol. 14, 2 (sep 2011), 299--315.Google ScholarGoogle Scholar
  74. Robert K. Merton. 1959. Social Conformity, Deviation, and Opportunity Structures: A Comment on the Contributions of Dubin and Cloward . American Sociological Review , Vol. 24, 2 (1959), 177--189.Google ScholarGoogle ScholarCross RefCross Ref
  75. André s Monroy-herná ndez, Benjamin Mako Hill, Jazmin Gonzalez-Rivero, and danah boyd. 2011. Computers can't Give Credit: How Automatic Attribution Falls Short in an Online Remixing Community. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. Vancouver, BC, Canada, 3421--3430.Google ScholarGoogle Scholar
  76. Alexander Nill, John Schibrowsky, and James W. Peltier. 2008. Factors that Influence Software Piracy : a View from Germany . Commun. ACM , Vol. 53, 6 (2008), 131--134.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. JonathanA. Obar and Anne Oeldorf-Hirsch. 2018. The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services . Information Communication and Society (2018), 1--20.Google ScholarGoogle Scholar
  78. Dotan Oliar and Christopher Sprigman. 2008. There's No Free Laugh (Anymore): The Emergence of Intellectual Property Norms and the Transformation of Stand-Up Comedy . Virginia Law Review , Vol. 94, 8 (2008), 1787--1867.Google ScholarGoogle Scholar
  79. Elinor Ostrom. 2010. Collective Action and the Evolution of Social Norms . The Journal of Economic Perspectives , Vol. 14, 3 (2010), 137--158.Google ScholarGoogle ScholarCross RefCross Ref
  80. Costas Panagopoulos. 2010. Affect, Social Pressure and Prosocial Motivation: Field Experimental Evidence of the Mobilizing Effects of Pride, Shame and Publicizing Voting Behavior . Political Behavior , Vol. 32, 3 (2010), 369--386.Google ScholarGoogle ScholarCross RefCross Ref
  81. Uta Pankoke-babatz and Phillip Jeffrey. 2002. Documented Norms and Conventions on the Internet . International Journal of Human-Computer Interaction , Vol. 14, 2 (2002), 219--235.Google ScholarGoogle ScholarCross RefCross Ref
  82. Malte Paskuda and Myriam Lewkowicz. 2015. Anonymous Quorans are Still Quorans, Just Anonymous. In Proceedings of the ACM C&T Conference on Communities and Technologies. Limerick, Ireland, 9--18.Google ScholarGoogle Scholar
  83. Jessica A. Pater, Moon Kim, Elizabeth D. Mynatt, and Casey Fiesler. 2016. Governing Online Harassment: Characterizing Policies Across Social Media Platforms. In Proceedings of the ACM GROUP Conference on Supporting Group Work. Sanibel Island, FL, 369--374.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Jessica Annette Pater, Yacin Nadji, Elizabeth Mynatt, and Amy Bruckman. 2014. Just Awful Enough: The Functional Dysfunction of the Something Awful Forums . Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (2014), 2407--2410.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Celia Pearce. 2007. Communities of play: The social construction of identity in persistent online game worlds . Second Person RolePlaying and Story in Games and Playable Media , Vol. 1 (2007), 1--7.Google ScholarGoogle Scholar
  86. Jennifer Preece. 2004. Etiquette, empathy and trust in communities of practice: Stepping-stones to social capital . Journal Of Universal Computer Science , Vol. 10, 3 (2004), 294--302.Google ScholarGoogle Scholar
  87. S. D. Reicher, R. Spears, and T. Postmes. 1995. A Social Identity Model of Deindividuation Phenomena . European Review of Social Psychology , Vol. 6, 1 (1995), 161--198.Google ScholarGoogle ScholarCross RefCross Ref
  88. Elizabeth Reid. 1999. Hierarchy & Power: Social Control in Cyberspace . In Communities in Cyberspace , , Peter Kollock and A Smith (Eds.). Routledge, London, 107--133.Google ScholarGoogle Scholar
  89. Jon Ronson. 2015. So You've Been Publicly Shamed. Riverhead Books.Google ScholarGoogle Scholar
  90. Elizabeth L Rosenblatt. 2011. A Theory of IP's Negative Space . Columbia Journal of Law & the Arts , Vol. 34, 3 (2011), 317.Google ScholarGoogle Scholar
  91. Elizabeth L Rosenblatt. 2013. Fear and Loathing: Shame, Shaming, and Intellectual Property . DePaul Law Review , Vol. 63, 1 (2013), 1--48.Google ScholarGoogle Scholar
  92. Mark F. Schultz. 2007. Copynorms: Copyright and Social Norms . In Intellectual Property and Information Wealth: Issues and Practices in the Digital Age , , Peter K. Yu (Ed.). Praeger Publishers, Westport, Conn., 201--236.Google ScholarGoogle Scholar
  93. Joseph Seering, Felicia Ng, Zheng Yao, and Geoff Kaufman. 2018. Applications of Social Identity Theory to Research and Design in Social Computing . Proc. ACM Human-Computer Interaction , Vol. 2, CSCW (2018), 201:34.Google ScholarGoogle Scholar
  94. Irving Seidman. 1998. Interviewing as Qualitative Research. Teachers College Press.Google ScholarGoogle Scholar
  95. Christine B. Smith, Margaret L. McLaughlin, and Kerry K. Osborne. 2006. Conduct Control on Usenet . Journal of Computer-Mediated Communication , Vol. 2, 4 (jun 2006).Google ScholarGoogle ScholarCross RefCross Ref
  96. Mel Stanfill. 2015a. Spinning Yarn with Borrowed Cotton: Lessons for Fandom from Sampling . Cinema Journal , Vol. 54, 3 (2015), 131--137.Google ScholarGoogle ScholarCross RefCross Ref
  97. Mel Stanfill. 2015b. The interface as discourse: The production of norms through web design . New Media and Society , Vol. 17, 7 (2015), 1059--1074.Google ScholarGoogle ScholarCross RefCross Ref
  98. Samuel A. Stouffer. 1949. An Analysis of Conflicting Social Norms . American Sociological Review , Vol. 14, 6 (1949), 707--717.Google ScholarGoogle ScholarCross RefCross Ref
  99. Rebecca Tushnet. 2007. Payment in Credit: Copyright Law and Subcultural Creativity . Law & Contemporary Problems , Vol. 70 (2007), 135.Google ScholarGoogle Scholar
  100. Rebecca Tushnet. 2014a. All of This Has Happened before and All of This Will Happen Again : Innovation in Copyright Licensing . Berkeley Technology Law Journal , Vol. 29 (2014), 1447--1488.Google ScholarGoogle Scholar
  101. Rebecca Tushnet. 2014b. 'I'm a Lawyer, Not an Ethnographer, Jim': Textual Poachers and fair use . The Journal of Fandom Studies , Vol. 2, 1 (apr 2014), 21--30.Google ScholarGoogle ScholarCross RefCross Ref
  102. Rebecca Tushnet. 2015. The Romantic Author and the Romance Writer: Resisting Gendered Concepts of Creativity . In Diversity in Intellectual Property , , Irene Calboli and Srividhya Ragavan (Eds.). Cambridge University Press.Google ScholarGoogle Scholar
  103. Emily van der Nagel and Jordan Frith. 2015. Anonymity, Pseudonymity, and the Agency of Online Identity: Examining the Social Practices of r/Gonwild . First Monday , Vol. 20, 3 (2015).Google ScholarGoogle ScholarCross RefCross Ref
  104. Thomas Voss. 2001. Game-Theoretical Perspectives on the Emergence of Social Norms . In Social Norms , , Michael Hechter and Karl-Dieter Opp (Eds.). Russell Sage Foundation, New York, 105--136.Google ScholarGoogle Scholar
  105. S. Warwick. 1994. Abstraction, Ethics and Software: Why Don't Rules Work? Ethics in the Computer Age (1994).Google ScholarGoogle Scholar
  106. P Young. 2008. Social Norms . In The New Palgrave Dictionary of Economics, Steven N. Durlauf and Lawrence E. Blume (Eds.). Palgrave Macmillan, New York.Google ScholarGoogle Scholar

Index Terms

  1. Creativity, Copyright, and Close-Knit Communities: A Case Study of Social Norm Formation and Enforcement

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!