Zoom-bombing the Future of Education

Zoom-bombing the Future of Education

by Bill Dutton and Arnau Erola based on their discussions with Louise Axon, Mary Bispham, Patricia Esteve-Gonzalez, and Marcel Stolz

In the wake of the Coronavirus pandemic, schools and universities across the globe have moved to online education as a substitute rather than a complement for campus-based instruction. While this mode of online learning may be time-limited and is expected to return to campuses and classroom settings once the Covid-19 outbreak subsides, this period could also be an important watershed for the future of education. Put simply, with thousands of courses and classrooms going online, this could usher in key innovations in the technologies and practices of teaching and learning online in ways that change the future of education. 

However, the success of this venture in online learning could be undermined by a variety of challenges. With dramatic moves to online education and a greater reliance on audio, video and Web conferencing systems, like Zoom, Webex and Skype, have come unexpected challenges. One particular challenge that has risen in prominence is efforts of malicious users to sabotage classrooms and discussions, such as by what has been called Zoom-bombing (Zoombombing). Some have defined it as ‘gate-crashing tactics during public video conference calls’, that often entail the ‘flooding of Zoom calls with disturbing images’. There are a growing number of examples of courses and meetings that have been bombed in such ways. It seems that most ‘Zoombombers’ join illegitimately, by somehow gaining access to the meeting or classroom details. But a student who is actually enrolled in a class could create similar problems. In either case, it is clear that zoom-bombing has become an issue for schools and universities, threatening to undermine the vitality of their teaching and relationships with faculty, students, and alumni of their institutions. 

TheQuint.com

We are involved in research on cybersecurity, and see this as one example in the educational domain, of how central cybersecurity initiatives can be to successfully using the Internet and related social media. We also believe that this problem of the digital gate-crasher and related issues of malicious users can be addressed effectively by a number of actors. As you will see, it is in part, but not only, a cybersecurity problem. It involves training in the use of online media, awareness of risks, and a respect for the civility of discussion in the classroom, meetings, and online discussions. Unfortunately, given how abrupt the shift to online learning has been, given efforts to protect the health of students, staff, faculty, and their networks, there has not been sufficient time to inform and train all faculty and students in the use of what is, to many, a new media. Nor has there been time to explain the benefits as well as the risks, intended and unintended, such as is the case with digital gate-crashers. 

Not a New Phenomenon

From the earliest years of computer-based conferencing systems, issues have arisen over productively managing and leading discussion online. One to many lectures by instructors have been refined dramatically over the years enabling even commercially viable initiatives in online education, such as Ted Talks, which actually began in the early 1980s and have been refined since, as well as live lectures, provided by many schools for at home students. 

But the larger promise of online learning is the technical facility for interaction one-to-one, one-to-many, many-to-one, and many-to-many. An early, pioneering computer-mediated conferencing system, called ‘The Emergency Management Information System and Reference Index’ (EMISARI) led to one of the first academic studies of the issues involved in what was called ‘computerized conferencing’ in the mid-1970s (Hiltz and Turoff 1978). Since the 1970s, many have studied the effective use of the Internet and related social and digital media in online learning. It would be impossible to review this work here, but suffice it to say, problems with the classroom, and online learning have a long and studied history that can inform and address the issues raised by these new digital gate-crashers.

Actors and Actions

This is not simply a problem for an administrator, or a teacher, as online courses and meetings involve a wide array of actors, each of which have particular as well as some shared responsibilities. Here we identify some of the most central actors and some of the actions they can take to address malicious actors in education’s cyberspace. 

Recommendations 

There are different issues facing different actors in online education. Initially, we focus on the faculty (generally the conference host) side, providing guidance on essential actions that can be taken to diminish the risks of zoom-bombing the future of education. We will then turn to other actors, including students and administrators.

  • Authentication: as far as possible, limit the connection to specific users by only allowing users authenticated with specific credentials, having a valid and unique link, or possessing an access code. Ideally, many want courses to be open to visitors, but the risks of this are apparent unless the moderator is able to eject malicious users, as discussed below. A pre-registration process for attendees  (e.g. via an online ticketing system) could help limit the risk of “trolls” joining while keeping an event open to visitors. 
  • Authorization: limit the technical facilities to which the students or participants in any meeting have access. Keep to the minimum required for the class session. That is, in most circumstances, the instructor should restrict file sharing, chat access, mic holding or video broadcasting if they do not need to use these in the session. This does not prevent students from using chat (interacting with other students) over other media, but it limits disruption of the class. The need to access these resources varies largely depending on the type of classroom, and it is the responsibility of the instructor or host to grant the permissions required.
  • Monitoring: careful monitoring of the connected participants can help avoid unauthorized connections – the gatecrashers, so the course lead should have access to the list of participants and monitor it routinely. In some cases, virtual classrooms can be locked when no more participants are allowed. (See the last bullet point with respect to stolen accounts.)
  • Moderation: in the same way that participants are monitored, their participation in the form of text, voice, video or shared links or files, should be reviewed. This can be a tedious task, particularly with a large class, but it is an advantage of online courses that instructors can monitor student participation, comments, and gain a better sense of their engagement. That said, it can take some time and it might not be possible during the class. 
  • Policies: Each institution should have adequate policies and reporting mechanisms to deal with offensive, violent and threatening behaviour in the classroom, real or virtual. Actions or words that are judged offensive, or otherwise toxic language, should not necessarily exclude a student’s opinions from a class discussion, but the students should be aware of and try to abide by the institution’s standards and policies. It is also helpful if student participants have the facility to report offensive posts, which instructors can then review, delete or discuss with the individual(s) posting them. 
  • Procedures: procedures need to be in place to deal in a timely manner (quickly) with stolen credentials and participants behaving irresponsibly. That could involve removing classroom access for an offending user and their loss of authorization to the specific credentials, as well as processes for generating new ones in case they are needed.

The above recommendations provide general guidance in securing online classrooms without any specifics on the technology used. Some platforms such as Zoom, have published their own guidelines for the administrators of online educational initiatives. But here it is useful to identify some of the responsibilities of other actors.

Students need to understand how the principles of behaviour in the classroom translate into the online, virtual classroom. The Internet is not a ‘Wild West, and the rules and etiquette of the classroom need to be followed for effective and productive use of everyone’s time. Students should have the ability to express their opinions and interpretations of course material, but this would be impossible without following rules of appropriate behaviour and what might be called ‘rules of order’, such as raising your hand, which can be done in the virtual classroom (Dutton 1996). Also, just as it would be wrong to give one’s library card to another person, when credentials or links are provided for enabling authentic students to join a class, it is the student’s responsibility to keep these links to themselves, and not share with individuals not legitimately enrolled. These issues need to be discussed with students and possibly linked to the syllabus of any online course. 

Administrators and top managers also have a responsibility to ensure that faculty and students have access to training on the technologies and best practices of online learning. It is still the case that some students are better equipped in the online setting than their instructors, but instructors can no longer simply avoid the Internet. It is their responsibility to learn how to manage their classroom, and not blame the technology, but it is the institution’s responsibility to ensure that appropriate training is available to those who need it. Finally, administrations need to ensure that IT staff expertise is as accessible as possible to any instructor that needs assistance with managing their online offerings. 

Points of Conclusion and Discussion

On Zoom, and other online learning platforms, instructors may well have more rather than less control of participation in the classroom, even if virtual, such as in easily excluding or muting a participant, but that has its added responsibilities. For example, the classroom is generally viewed as a private space for the instructors and students to interact and learn through candid and open communication about the topics of a course. Some level of toxicity, for example, should not justify expelling a participant. However, this is a serious judgement call for the instructor. Balancing the concerns over freedom of expression, ethical conduct, and a healthy learning environment is a challenge for administrators, students and teachers, but approaches such as those highlighted above are available to manage lectures and discussions in the online environment. Zoom-bombing can be addressed without diminishing online educational initiatives. 

We would greatly welcome your comments or criticisms in addressing this problem. 

References

Dutton, W. H. (1996), ‘Network Rules of Order: Regulating Speech in Public Electronic Fora,’ Media, Culture, and Society, 18 (2), 269-90.

Hiltz, S. R., and Turoff, M. (1978), The Network Nation: Human Communication via Comptuer. Reading, Massachusetts: Addison-Wesley Publishing. 

How the #Infodemic is being Tackled

The fight against conspiracy theories and other fake news about the coronavirus crisis is receiving more help from the social media and other tech platforms, as a number of thought leaders have argued.[1] However, in my opinion, a more important factor has been more successful outreach by governmental, industry, and academic researchers. Too often, the research community has been too complacent about getting the results of their research to opinion leaders and the broader public. Years ago, I argued that too many scientists held a ‘trickle down’ theory of information dissemination.[2] Once they publish their research, their job is done, and others will read and disseminate their findings. 

Even today, too many researchers and scientists are complacent about outreach. They are too focused on publication and communication with their peers and see outreach as someone else’s job. The coronavirus crisis has demonstrated that governments and mainstream, leading researchers, can get their messages out if they work hard to do so. In the UK, the Prime Minister’s TV address, and multiple press conferences have been very useful – the last reaching 27 million viewers in the UK, becoming one of the ‘most watched TV programmes ever’, according to The Guardian.[3] In addition, the government distributed a text message to people across the UK about it rules during the crisis. And leading scientists have been explaining their findings, research, and models to the public, with the support of broadcasters and social media. 

If scientists and other researchers are complacent, they can surrender the conversation to creative and motivated conspiracy theorists and fake news outlets. In the case of Covid-19, it seems to be that a major push by the scientific community of researchers and governmental experts and politicians has shown that reputable sources can be heard over and amongst the crowd of rumors and less authoritative information. Rather than try to censor or suppress social media, we need to step-up efforts by mainstream scientific communities to reach out to the public and political opinion leaders. No more complacency. It should not take a global pandemic crisis to see that this can and should be done.


[1] Marietje Schaake (2020), ‘Now we know Big Tech can tackle the ‘infdemic’ of fake news’, Financial Times, 25 March: p. 23. 

[2] Dutton, W. (1994), ‘Trickle-Down Social Science: A Personal Perspective,’ Social Sciences, 22, 2.

[3] Jim Waterson (2020), ‘Boris Johnson’s Covid-19 address is one of the most-watched TV programmes ever’, The Guardian, 24 March: https://www.theguardian.com/tv-and-radio/2020/mar/24/boris-johnsons-covid-19-address-is-one-of-most-watched-tv-programmes-ever

Women and the Web

News reports today citing one of the inventors of the Web, Sir Tim Berners-Lee, as arguing that the Web “is not working for women and girls”. Tim Berners-Lee is a hero of all of us involved in study and use of the Internet, Web, and related information and communication technologies. Clearly, many women and girls might well ‘experience violence online, including sexual harassment and, threatening messages’. This is a serious problem, but it should not be unnoticed that the Internet and Web have been remarkably gender neutral with respect to access. 

In fact, women and girls access and use the Internet, Web and social media at about the same level as men and boys. There are some nations in which the use of the Internet and related ICTs is dramatically lower for women and girls, but in Britain, the US, and most high-income nations, digital divides are less related to gender than to such factors as income, education, and age.  This speaks volumes about the value of these media to women and girls, and this should not be lost in focusing on problematic and sometimes harmful aspects of access to content on the Web and related media. 

Below is one example of use of the Internet by gender in Britain in 2019, which shows that women are more likely to be next generation users (using three or more devices, one of which is mobile) and less likely to be a non-user:

The full report from which this drawn is available online here.

Society and the Internet for Courses

The 2nd Edition of Society and the Internet (OUP 2019) is available in paperback and electronic editions for courses on the social aspects of the Internet, social media, computational analytics, and more. Information about the book is available online at: https://global.oup.com/academic/product/society-and-the-internet-9780198843498?cc=gb&lang=en& 

Please check this out if you are considering reading for your Spring courses, or simply have an interest in the many social issues surrounding digital media. From Manuel Castells’ Foreword to Vint Cerf’s concluding chapter, you find a diverse mix of contributions that show how students and faculty can study the social shaping and societal implications of digital media. 

Thanks for your own work in this field, at an incredible period of time for Internet and new media studies of communication and technology.

Good Courses and Programmes Attract Good Students: It is not about saying ‘no’ to other institutions

An engaging but provocative article in the Guardian suggested that a woman’s daughter said ‘no’ to Oxbridge institutions by choosing to join an innovative programme at Leeds University. I simply would like to suggest that her daughter did not reject the Oxbridge universities. Instead, she positively pursued a degree programme she found more attractive and most relevant to her interests – a history of art degree at Leeds University’s School of Fine Art. Her mother said is was ‘radical’ and was right up her daughter’s street. Wonderful. That is a win for Leeds.

Too often, universities and educational institutions can forget that it is not simply their general reputation or brand that attracts students. The best students are looking for programmes of direct relevance to their vision of their future. It will be the institutions that are continually seeking to strengthen programmes and innovate in their educational offerings that will succeed in attracting these students who are making informed choices.

Having been a former faculty member at Oxford, as well as a number of other institutions, including a visiting professorship at Leeds, it is possible for me to argue that this focus on educational degree programmes is one of the major reasons that Oxford has been so successful. Many examples come to mind, but consider two that are most obvious to me. First, it has continued to build on its strengths, such as its PPE (Philosophy, Politics, and Economics) degree, and secondly, innovate, such as in establishing the Oxford Internet Institute (OII). At the OII, where I taught, I was continually and pleasantly surprised to speak with applicants and students who convinced me that they only applied to Oxford to study at the OII. They were truly interested in the societal implications of the Internet and related media and a post-graduate degree programmed designed to address their particular interests.

So congratulations to Leeds University for putting together a programme that attracted this parent’s daughter. Faculty at Leeds, and Oxford, are doing exactly what they need to do in order to continue climbing in the rankings of UK universities. General university reputations matter, but exciting and innovative degree offerings can matter more.

Bill Dutton back in the OII days

Society and the Internet, 2nd Edition

It is such a pleasure to see the publication today of the second edition of Society and the Internet by Oxford University Press. My co-editor, Mark Graham, and I worked long and hard to assemble a wonderful set of authors to build on the first edition. The success of the original volume led to this new edition. The pace and scale of changes in the issues surrounding the Internet led to almost a completely new set of chapters. Information about the 2nd edition is available on the OUP web site for the paperback edition here, and the hardback here.

Society and the Internet, 2nd Edition

Our thanks to OUP and the many professional staff who helped us produce this new 2nd edition, and particularly to my friend Steve Russell for the brilliant art work on the cover. Thanks as well to the OII, which inspired our lecture series that led to these volumes, and OII colleagues who launched much of the research that informs them. I hope you can read the acknowledgements in full as we owe thanks to so many individuals and institutions, such as MSU’s Quello Center, which together with the Global Cyber Security Capacity Centre, supported my own contributions to this second edition.

We owe incredible thanks to our colleague Manuel Castells for his insightful foreword and all the authors of the book’s 24 chapters. These colleagues endured our many requests and most importantly accepted our call to contribute to what we hope will be a perfect reader for courses on Internet studies, digital technology and society, new media, and many other courses dealing with society and the Internet. The authors include junior and senior researchers from around the world. To all, we send our appreciation. No more deadlines, we promise. The authors are:

Maria Bada, Cambridge Cybercrime Centre
Grant Blank, University of Oxford
Samantha Bradshaw, University of Oxford
David A. Bray, People-Centered Internet
Antonio A. Casilli, Paris Institute of Technology
Manuel Castells, University of Southern California
Vint Cerf, Google
Sadie Creese, University of Oxford
Matthew David, Durham University
Laura DeNardis, American University, Washington, DC
Martin Dittus, University of Oxford
Elizabeth Dubois, University of Ottawa
Sandra González-Bailón, University of Pennsylvania 
Scott A. Hale, University of Oxford
Eszter Hargittai, University of Zurich
Philip N. Howard, University of Oxford
Peter John, King’s College London 
Sílvia Majó-Vázquez, University of Oxford
Helen Margetts, University of Oxford
Marina Micheli, European Commission
Christopher Millard, Queen Mary University of London
Lisa Nakamura, University of Michigan
Victoria Nash, University of Oxford
Gina Neff, University of Oxford
Eli Noam, Columbia Business School 
Sanna Ojanperä, University of Oxford
Julian Posada, University of Toronto
Anabel Quan-Haase, University of Western Ontario
Jack Linchuan Qiu, The Chinese University of Hong Kong
Lee Rainie, Pew Research Center
Bianca C. Reisdorf, University of North Carolina at Charlotte
Ralph Schroeder, University of Oxford
Limor Shifman, The Hebrew University of Jerusalem
Ruth Shillair, Michigan State University 
Greg Taylor, University of Oxford
Hua Wang, University at Buffalo, The State University of New York
Barry Wellman, NetLab
Renwen Zhang, Northwestern University

So, if you are seriously interested in the societal implications of the Internet and related social media and the mobile Internet, please consider this reader. You will see a variety of methods, data, and theoretical perspectives in play to address important issues in ways that challenge conventional wisdom and punditry about the Internet. You can get a paperback edition from OUP here or from your favourite bookstore.

OII – the Institute has reached escape velocity!

I spent a full day at the OII for my first time since being back in Oxford. It was in part enjoying my new affiliation as an OII Senior Fellow and also participation in a meeting of the Advisory Board. But it also included attending the Awards Day ceremonies that featured a conversation with Professor Judy Wajcman, interviewed by OII’s Dr Victoria Nash (photos). Judy received a well-deserved Lifetime Achievement Award. The day concluded with a dinner at Balliol, where all awards were formally presented to the recipients.

Having been away from Oxford for four years, only returning for short visits to the UK, I was struck by the phenomenal progress of the OII. Since I stepped down as Director in 2011, and retired in 2014, Professor Helen Margetts, and now, Professor Phil Howard have taken over direction of the Institute – a department in Oxford’s Social Science Division. The number of faculty (now around 50) and students have expanded significantly – dramatically, with new degrees and new directions and affiliations, such as with the Alan Turing Institute in London. The visibility and impact of the OII has also been growing dramatically, such as around Phil Howard’s work on computational propaganda and the role of bots in elections, which has been showcased repeatedly by The New York Times.

So the size and shape, but more importantly, the impact and reputation of an increasingly strong faculty has been progressed beyond what I could have expected – or even envisioned. One of the members of the Advisory Board put it best when he said that it is clear that the OII has reached escape velocity. No one is questioning the very idea of an Internet Institute at the University of Oxford – it has put the Internet on the agenda of the University and has continued to innovate and adapt with the rapid evolution and global impact of the Internet, Web, social media, and related information and communication technologies, such as AI and the Internet of Things.

I had the pleasure of speaking with a prospective MSc student before OII’s Open House on 23 November, and felt so pleased and confident in supporting her decision to study at the OII. She took little convincing – it was the only program she was considering.

Conversation in Oxford with Judy Wajcman, recipient of OII Lifetime Achievement Award

Judy Wajcman and Victoria Nash in conversation

Pack Journalism – Digitally Networked

Digitally Networked Pack Journalism

Pack journalism is not only alive and well in the digital age, it is arguably more prominent than it could ever be in the analogue era of print journalism. There is clearly a need for multi-disciplinary research on the sociology and politics of digitally enabled pack journalism.

The concept of pack journalism was coined in the midst of the Nixon-McGovern election campaigns of 1972 through observations made of journalists riding on the campaign buses, leading to the book entitled The Boys on the Bus by Timothy Crouse (Random House 1973).

9780812968200_p0_v1_s260x420

It is not difficult to imagine how reporters travelling together on a campaign bus would interact in ways that shaped the definition of the story and undermine the diversity of viewpoints that might otherwise emerge from multiple reporters covering the same campaign. Recall Kurt and Gladys Lang’s classic, Television and Politics, which demonstrated how different people watching the same parade or demonstration would have very different perspectives from different vantage points, such as being there in person versus watching it on television. Despite blogging and Tweets galore, the news is likely to present one perspective on a demonstration, as well as most other political events, as journalists are more networked – not just on the bus, but – nationally and globally, than ever before possible.

9780765808899

Pack journalism was seen as a problem as it created a more homogeneous coverage of stories, but it also homogenizes the news agenda, every paper covering the same story in similar ways. This is dangerous in creating a sense of THE news agenda and THE truth about a story, rather than a healthier view of multiple perspectives on the news. It is important to remember that TV is still king, and sets the agenda for most other media.

The driving forces behind networked pack journalism are not simply technical, but also economic and socio-political. As news organizations are more financially stressed, in part due to the rise of online and the decline of revenues for traditional media outlets, then reporters are more likely to rely more than ever on other journalists. This is not only a recipe for more reliance on press releases, what has been called ‘churnalism’ rather than original reporting, but also for reliance on the increasingly networked pack of journalistic reporting. It saves money and time. News organizations are also increasingly operating in a highly partisan setting in which journalists might well be increasingly concerned with how their stories are politically categorized. It is safe to travel in the company of other journalists, creating another incentive to stick with the pack, or packs, as in the polarized news political news coverage of today.

Good journalists are alert to the value of diversity in reporting, but it is possible for even good journalists to drift into pack journalism without being aware of the degree there interaction with their peers is homogenizing the news. So beware of pack journalism in the digital age. The ‘boys on the bus’ are an anachronism, but pack journalism is not, and could well be an even greater problem in the digital age of networking.

In this respect, I would argue a need for more multidisciplinary research on the networking of journalists. This requires sociologists, academics in Internet studies, political scientists, and others to study how journalists use networks and with what effect on the diversity or homogeneity of the news. With all the attention being directed on how Internet users are networked into echo chambers, or filter bubbles, it is surprising indeed that journalists are not a stronger focus of critical research.

References

Timothy Crouse (1973), The Boys on the Bus (New York: Random House).

Kurt Lang, and Gladys Engel Lang, Politics and Television (Chicago: Quadrangle Books, 1968).

Evidence of Benefits from Opening the White House Press Briefings via Skype Seats

I’ve argued on this blog that the idea of enabling the press to ask questions from outside the White House Press Office, in fact, outside the Washington DC Beltway, was a good idea. Some anecdotal evidence is being reported that the strategy is working. USA Today reported that over 13 White House press briefings, Sean Spicer has taken questions ‘from 32 outside-the-Beltway outlets’. This is a great example of using the Internet to enable more distributed participation. The Washington press is obviously defensive when people complain about the ‘media bubble’ in the briefing room, but the potential for what was once called ‘pack journalism’ is real, and location matters. Geographically distributing contributions is symbolically and materially opening the briefings up to more diversity of viewpoints and issues. th-1

Inevitably, more voices means more competition among the journalists in asking questions. But there are already too many in the room, and why it is fair to give more access to the outlets that can afford to station staff in Washington DC is not clear to me. That said, the Skype seats will always be the cheap seats, and be less likely to get their turn in the question and answer sessions.

My earlier post is here.

Should Tweeting Politicians be able to Block Users?

An interesting debate has been opened up by lawyers who have argued that President Trump should not block Twitter users from posting on Twitter. I assume this issue concerns his account @realDonaldTrump (32M followers) but the same issue would arise over his newer and official account as President @realDonaldTrump (almost 19M followers).

th

Apparently, the President has blocked users who may have made rude or critical comments to one or more of his Twitter posts. Regardless of the specifics of Donald Trump’s tweets, and specific individuals blocked, the general question is: Should any American politician who tweets be able to block any user without violating the user’s first amendment rights? I would say, yes, but others, including the lawyers posing this question, would disagree.

I would think that any user has a right to block any other user, particularly if they appear to be a malicious user, bot, or simply obnoxious. I’d argue this on the basis that these are the affordances of Twitter, and the rules of the site are – or should be – known by users. Moreover, the potential for blocking is a means of maintaining some level of civility on one’s social media. Having rude or obnoxious users posting harassing comments could frighten other users off the site, and thereby undermine a space for dialogue and the provision of information. If there is no way for a social media site to moderate its users, its very survival is at risk.

I actually argued this in the mid-1990s, when the issue surrounded electronic bulletin boards, and some of the first public forums, such as Santa Monica, California’s Public Electronic Network (PEN).* Essentially, I maintained that any democratic forum is governed by rules, such as Robert’s Rules of Order for many face-to-face meetings. Such rules evolved in response to difficulties in conducting meeting without rules. Some people will speak too long and not take turns. Some will insult or talk over the speaker. Democratic communication requires some rules, even thought this may sound somewhat ironic. As long as participants know the rules in advance, rules of order seem legitimate to enabling expression. Any rule suppresses some expression in order to enable more equitable, democratic access to a meeting. Obviously, limiting a tweet to 140 characters is a restriction on speech, but it has fostered a rich medium for political communication.

In this sense, blocking a Twitter user is a means for moderation, and if known in advance, and not used in an arbitrary or discriminatory way, it should be permitted. That said, I will post a Twitter poll and let you know what respondents believe. Bryan M. Sullivan (2017), an attorney, seems to argue a very different position in his Forbes article.** I respectively disagree, but wonder what the Twitter community thinks, while it is easy to guess that they will be on the side of not being blocked. But please think about it, before you decide.

Reference

*Dutton, W. H. (1996), ‘Network Rules of Order: Regulating Speech in Public Electronic Fora,’ Media, Culture, and Society, 18 (2), 269-90. Reprinted in David, M., and Millward, P. (2014) (eds), Researching Society Online. (London: Sage), pp. 269-90.

**Sullivan, B. (2017), ‘Blocked by the President: Are Trump’s Twitter Practices Violating Free Speech?’, Forbes, available here: https://www.forbes.com/sites/legalentertainment/2017/06/08/blocked-by-the-president-are-trumps-twitter-practices-violating-free-speech/#40fe73043d57