Submit Search
Upload
Digi Active For Mobile Active 2008 Final
•
Download as PPT, PDF
•
8 likes
•
3,219 views
Patrick Meier
Follow
Presentation given by DigiActive.org on digital activism at MobileActive 2008 conference
Read less
Read more
Technology
Business
Report
Share
Report
Share
1 of 29
Download now
Recommended
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworks
Sara-Jayne Terp
Cybersecurity
Cybersecurity
Glenn McKnight
Digital Tech, New Media, and the Internet in Nonviolent Struggle
Digital Tech, New Media, and the Internet in Nonviolent Struggle
daryncambridge
Peace processes after the pandemic: What role for technology?
Peace processes after the pandemic: What role for technology?
Sanjana Hattotuwa
Mikie
Mikie
MJBULLOCK01
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Yudhistira Nugraha
Top influential women cybersecurity
Top influential women cybersecurity
Sentryo
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
Recommended
Using AMITT and ATT&CK frameworks
Using AMITT and ATT&CK frameworks
Sara-Jayne Terp
Cybersecurity
Cybersecurity
Glenn McKnight
Digital Tech, New Media, and the Internet in Nonviolent Struggle
Digital Tech, New Media, and the Internet in Nonviolent Struggle
daryncambridge
Peace processes after the pandemic: What role for technology?
Peace processes after the pandemic: What role for technology?
Sanjana Hattotuwa
Mikie
Mikie
MJBULLOCK01
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
Yudhistira Nugraha
Top influential women cybersecurity
Top influential women cybersecurity
Sentryo
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
WAIHIGA K.MUTURI
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
ACAD1ITG
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
CRS4 Research Center in Sardinia
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
VincentAcapen
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
CTIC Technology Centre
ppt on child pornography and cyber crime
ppt on child pornography and cyber crime
008_Anuj
South Africa MXIT exploratory paper
South Africa MXIT exploratory paper
Akshay Sinha
Privacy, social networks and EU policy
Privacy, social networks and EU policy
Chris Marsden
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
REVULN
Computer Crime
Computer Crime
Farjana Akter
Internet Safety
Internet Safety
Charles Mok
South african mobile generation
South african mobile generation
Akshay Sinha
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
gkurtz
Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2
Inge de Waard
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
VivekanandaGN1
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
Michael Edson
Cyber ethics
Cyber ethics
Preet Hanspal
Meier uav experts meeting 2014
Meier uav experts meeting 2014
Patrick Meier
Digital Humanitarians: Book Slides
Digital Humanitarians: Book Slides
Patrick Meier
More Related Content
Similar to Digi Active For Mobile Active 2008 Final
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
WAIHIGA K.MUTURI
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
ACAD1ITG
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
CRS4 Research Center in Sardinia
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
VincentAcapen
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
CTIC Technology Centre
ppt on child pornography and cyber crime
ppt on child pornography and cyber crime
008_Anuj
South Africa MXIT exploratory paper
South Africa MXIT exploratory paper
Akshay Sinha
Privacy, social networks and EU policy
Privacy, social networks and EU policy
Chris Marsden
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
REVULN
Computer Crime
Computer Crime
Farjana Akter
Internet Safety
Internet Safety
Charles Mok
South african mobile generation
South african mobile generation
Akshay Sinha
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
gkurtz
Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2
Inge de Waard
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
VivekanandaGN1
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
Michael Edson
Cyber ethics
Cyber ethics
Preet Hanspal
Similar to Digi Active For Mobile Active 2008 Final
(20)
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
ppt on child pornography and cyber crime
ppt on child pornography and cyber crime
South Africa MXIT exploratory paper
South Africa MXIT exploratory paper
Privacy, social networks and EU policy
Privacy, social networks and EU policy
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Computer Crime
Computer Crime
Internet Safety
Internet Safety
South african mobile generation
South african mobile generation
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
Cyber ethics
Cyber ethics
More from Patrick Meier
Meier uav experts meeting 2014
Meier uav experts meeting 2014
Patrick Meier
Digital Humanitarians: Book Slides
Digital Humanitarians: Book Slides
Patrick Meier
Monitoring Humanitarian Crises in the Digital Age
Monitoring Humanitarian Crises in the Digital Age
Patrick Meier
Presentation to QCRI
Presentation to QCRI
Patrick Meier
Meier where20 2012
Meier where20 2012
Patrick Meier
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Patrick Meier
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Patrick Meier
Digital Mapping Technologies for 21st Century Democracy
Digital Mapping Technologies for 21st Century Democracy
Patrick Meier
Red Cross: Changing the World, One Map at a Time
Red Cross: Changing the World, One Map at a Time
Patrick Meier
Recampaign 2011: Changing the World, One Map at Time
Recampaign 2011: Changing the World, One Map at Time
Patrick Meier
Re:publica 2011: Changing the World, One Map at a Time
Re:publica 2011: Changing the World, One Map at a Time
Patrick Meier
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Patrick Meier
Changing the World, One Map at a Time
Changing the World, One Map at a Time
Patrick Meier
Ushahidi Presentation for UN IASC
Ushahidi Presentation for UN IASC
Patrick Meier
The Ushahidi Story: Liberation Technology in Practice
The Ushahidi Story: Liberation Technology in Practice
Patrick Meier
Ushahidi Deployments
Ushahidi Deployments
Patrick Meier
Collaborative Crisis Mapping
Collaborative Crisis Mapping
Patrick Meier
Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation at Fletcher, November 2009
Patrick Meier
Crisis Mapping Presentation for UN OCHA
Crisis Mapping Presentation for UN OCHA
Patrick Meier
How to Communicate Securely in Repressive Regimes
How to Communicate Securely in Repressive Regimes
Patrick Meier
More from Patrick Meier
(20)
Meier uav experts meeting 2014
Meier uav experts meeting 2014
Digital Humanitarians: Book Slides
Digital Humanitarians: Book Slides
Monitoring Humanitarian Crises in the Digital Age
Monitoring Humanitarian Crises in the Digital Age
Presentation to QCRI
Presentation to QCRI
Meier where20 2012
Meier where20 2012
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Digital Mapping Technologies for 21st Century Democracy
Digital Mapping Technologies for 21st Century Democracy
Red Cross: Changing the World, One Map at a Time
Red Cross: Changing the World, One Map at a Time
Recampaign 2011: Changing the World, One Map at Time
Recampaign 2011: Changing the World, One Map at Time
Re:publica 2011: Changing the World, One Map at a Time
Re:publica 2011: Changing the World, One Map at a Time
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Changing the World, One Map at a Time
Changing the World, One Map at a Time
Ushahidi Presentation for UN IASC
Ushahidi Presentation for UN IASC
The Ushahidi Story: Liberation Technology in Practice
The Ushahidi Story: Liberation Technology in Practice
Ushahidi Deployments
Ushahidi Deployments
Collaborative Crisis Mapping
Collaborative Crisis Mapping
Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation for UN OCHA
Crisis Mapping Presentation for UN OCHA
How to Communicate Securely in Repressive Regimes
How to Communicate Securely in Repressive Regimes
Recently uploaded
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Recently uploaded
(20)
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Digi Active For Mobile Active 2008 Final
1.
Mobiles for Activism
& Advocacy Examples, Challenges & Opportunities Patrick Meier Director of Research DigiActive.org MobileActive08, Johannesburg
2.
Presentation Focuses on
Grassroots Digital Activists… Limited Resources Loose Networks Anonymity Individual Actors Security Low/No Budget
3.
Examples…
4.
1. Using Mobile
Phones to Organize and Coordinate Protests …
5.
Protests…
6.
Philippines ‘01 -
“Coup de Text” Protests…
7.
Philippines ‘01 -
“Coup de Text” Spain ‘04 - “The Night of SMS” Protests…
8.
Philippines ‘01 -
“Coup de Text” Spain ‘04 - “The Night of SMS” Pakistan ‘07 - “Flash Protests” Protests…
9.
2. Using Mobile
Phone Videos to Document Human Rights Abuses …
10.
Videos…
11.
Egypt - “Exposing
Torture” Videos…
12.
Tibet - “Media
Blackout?” Egypt - “Exposing Torture” Videos…
13.
Morocco ‘08 -
“Exposing Abuse” Egypt - “Exposing Torture” Tibet ’08 - “Media Blackout?” Videos…
14.
Using a Camera
Phone and YouTube to Expose Police Brutality in Morocco
15.
3. Using
Microblogging Tools to Bridge Between Mobile Phones and Internet Activism
16.
MicroBlogging…
17.
MicroBlogging… Egypt -
“Twitter out of Jail”
18.
Egypt - “Twitter
out of Jail” China - “Live-Twittered Arrest” MicroBlogging…
19.
Egypt - “Twitter
out of Jail” China - “Live-Twittered Arrest” MicroBlogging… Egypt - “Twitter to Safety”
20.
Issues to Consider…
21.
1. Network Structure
centralized decentralized distributed source: http://en.wikipedia.org/wiki/Social_networks
22.
2. Security
23.
Surveillance Content Filtering
Traceability Network Integrity 2. Security
24.
NonID Prepaid Cards
(Anonymity) “ Mobile” Mobile Activism (On the Move) Avoid Centralization (Distribute Risk) 2. Security
25.
3. Cost
26.
NGO Budget Premium
Rate Number Prepaid Cards Top-up to Subscribe? 3. Cost
27.
4. Dissemination
28.
Calling for Action
Using Relays Distributed Public Sphere Using Complementary Tools 4. Dissemination
29.
Thank You www.DigiActive.org
[email_address] Twitter.com/DigiActive iRevolution .wordpress.com my blog
Editor's Notes
Early warning systems HHI Ushahidi Interest in digital activism and Digiactive
Download now