Browse Definitions :

Getty Images/iStockphoto

Digilantism explained: Everything you need to know

With the rise of digital communications, some people turn to digilantism for justice and support. Here is how digilantism is used to gain advocacy for various causes.

Vigilantism has been around for centuries. And with the advent of the internet, a digital version -- digilantism -- has emerged.

The internet has fueled ways to communicate with other people quickly and gather others to address social injustice, crime and fraud. This revolution has created online vigilantes who punish others when they feel a person has committed a crime yet wasn't punished enough by law enforcement.

Digilantism is a form of digitally harassing a person or company. It is a way to punish and bring awareness to the public.

What is digilantism?

Digilantism -- also known as internet vigilantism -- carries out activities in response to alleged crimes, scams and offline behavior through individuals or groups using grassroots action instead of working through the national justice system. Digilantism involves people taking justice into their own hands, using the internet to punish those they feel are guilty or corrupt through surveillance, negative publicity, unwanted attention and repression.

Digilantism can coincide with digital activism, which is aimed to increase awareness of a social issue. The goal is to increase social outrage to raise attention with the public. A couple of examples are the #MeToo social justice campaign and #BlackLivesMatter movement. Both campaigns aimed to increase awareness of social injustice issues and gained popularity on social media along with in-person demonstrations.

There can be some overlap between digilantism and cyberbullying because they both use public shaming. Some people might take digilantism too far and justify it by saying it's for social justice. However, even though cyberbullying can also involve publishing private information for humiliation, it is driven more by the harassment of the individual versus a push for social change.

Because there is not as much centralized control in the digital age, there are more people taking action who did not have the platform years ago. Before the internet, most people got their news and information from professionals working at TV news stations, magazines and newspapers. Now, more people have a platform to get their views and opinions out to others when they feel authorities aren't properly handling the issues that matter to them.

Methods of digilantism

There are different methods of digilantism people can use to get their point across and take justice into their own hands. These methods include the following:

  • Doxxing. This is an act of online shaming done by publishing personal details online for punishment. Data exposed includes personal information such as legal name, address, job, personal photos, videos and any other information that identifies a person so that others can find them.
  • Human flesh search engine. This method, similar to doxxing, originated in China in the early 2000s and can be compared to a digital version of a manhunt. It involves crowdsourcing and gathering people together to conduct digilantism.
  • Denial-of-service (DoS) attack. A DoS attack makes a website inaccessible to others by overwhelming it with traffic. It is a way to crash a website as a form of punishment.
  • Scambaiting. This act engages scammers by wasting their time and resources. Scambaiters pose as potential victims to gather useful information on the scammers. Scambaiters then publicly expose the scammers by publishing information about their crime such as tools, methods and names of fraudulent websites to warn other potential victims.
  • Hacktivism. This is a form of breaking into a computer system for socially motivated purposes. The hacktivist might deface a website by adding content or share a company's information, such as internal communications. The purpose is to gain visibility for their cause.
  • Reintegrative shaming. This public shaming is different because it shames the behavior instead of the person. It uses shame for social control and to change any social norms or perceptions.

Legal implications

Like vigilantism, digilantism is done outside the law, but is not always against the law. Some people view digilantism as policing the internet when governments fail to do so. Others view this practice as a menace to authorities, obstructing digital evidence.

Digilantism sometimes can help governments find perpetrators, such as pedophiles or spammers. Vigilante groups pose as victims to get responses and lead violators to authorities.

Other groups take exposure and confrontations public, such as livestreaming events, which has led to some innocent people being publicly condemned. Some of the people demanding justice might also be criminals themselves.

A popular example of digilantism is from the Boston Marathon bombing. The internet community took matters into its own hands to find the bomber. The community used online forums such as Reddit to post photos. However, there were false accusations that implied two young boys were involved, and it caused much distress to their family. The boys' names were posted online, leading people to their homes. One of the boys was missing before the bombing took place, and all the attention caused even more emotional stress for the family. The boys were not involved in the bombing.

Social media offers a platform for people to get information out quickly and rally support for their cause. Platforms can exercise content moderation, but that can take time.

Learn how to spot disinformation on social media.

Dig Deeper on Marketing and customer experience

  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ...

  • messaging security

    Messaging security is a subcategory of unified threat management, or UTM, focused on securing and protecting an organization's ...

  • WebAuthn API

    The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web ...

  • value stream management

    Value stream management is an emerging business process intended to gauge the flow of value into business resources and ...

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • Net Promoter Score (NPS)

    Net Promoter Score (NPS) is a metric that organizations use for assessing customer loyalty toward their brand, products or ...

  • B2C (business-to-consumer)

    B2C, or business-to-consumer, is a retail model where products or services move directly from a business to the end user who has ...

  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...