This document assesses the role of social media and digital technology in violence reporting. It discusses how social media has transformed how information about violence is captured, analyzed, and acted upon. However, it also notes that social media data comes with limitations and biases that must be considered. The document evaluates the relative strengths and weaknesses of using social media for violence reporting compared to other methods. It aims to understand how reliable social media data is for analyzing and reporting violence, as well as the practical and ethical challenges of collecting and using such data.
How the emerging technologies change the way people participate politically. Linked open data, AI, social bots, personalised and customised public services. Based on research of WP1 and WP2 of the project.
Alexander Ronzhyn, Researcher, Nationale E-Government Kompetenzzentrum, DE
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...ALexandruDaia1
Our primarly goal was to detect clusters via gensim libraries in news data consisting ofinformation regarding health and threats. We identified clusters for the periodscorresponding: i) Jannuary 2006 until the end of 2019, as December 2019 is considered thefirst month in which information about CORONVIRUS COVID-19 was made public; ii)between the 1st of Jannuary 2019 and 31st December 2019; and iii) between the 31st ofDecember 2019 and the 14th of April 2020. We conducted experiments using naturallanguage on open source intelligence data offered generously by brica.de, a providerspecialized in Business Risk Intelligence & Cyberthreat Awareness.
Running Head: SOCIAL MEDIA EFFECT 1
SOCIAL MEDIA EFFECT 14
Social Media Effect to Public Safety Administration
Michael Petras
University of Maryland University College
Introduction
Regulation of social media usage has led to lawmakers, community members, and even the litigators in shaping their policies. This is done based on federal, local, and state laws while also realigning the information that they are sharing online. This is concerning the public safety administration that is usually affected by the continued use of social media platforms. Public safety administration is also based on restricting access to personal information while trying to protect citizens from various issues such as bullying and cybercrime. Social media usage has continued to put more people at risk, and there is a need for the provision of public safety protection by the relevant administrators. This needs to be tied to the generation of federal laws that protect information and data from various individuals that have been posted on social media platforms while encouraging the much-needed transparency in the protection of the public. Continued social media usage by the general public has also brought about the issue of stolen identity due to the emergence of modern technology. The new technology arrival has been the leading cause of the interaction of many people on social media platforms (Beckett, 2018). Those tasked with policymaking have always argued that the administration of public safety should be in line with the duty to protect the privacy or access to information and data from various individuals. In that regard, this paper aims at analyzing the issue of social media usage as it affects the administration of public safety at all times.
Resources
Public safety administration often encompasses the release and coordination of various resources, which can be able to ensure the safety and security of the community as a whole (Gintova, 2018). Administration of public safety is inclusive of many departments such as the police, the emergency services, the medical services, and even the fire department. Public safety administration also happens to be affected by limited resources when it comes to preventing the processes involved from working efficiently. This can be linked to the limiting resources by the government while ensuring the safety and the security of the general public (Baym, 2015). The general public will always rely upon a variety of services that come from the relevant governments to enable the provision of safety and security to the public in their daily lives. However, limited resources will end up hampering the whole process as systems and policies seize to operate with the much-needed efficiency (Wohn & Bowe, 2016).
Public safety administration services hap.
Analysing Large-Scale News Media Content for Early Warning of Conflict - Proj...UN Global Pulse
A feasibility study conducted by Global Pulse with UNDP explored how data mining of large-scale online news data could complement existing tools for conflict analysis and early warning. Analyzing news media archives from before and after Tunisia's 2011 revolution showed that tracking changes in tone and sentiment over time offered insights into emerging conflicts. Mining digital content was found to have considerable potential for conflict prevention if further explored.
This is an invited talk I presented at the University of Zurich, speakers' series 2.10.2017. The presentation is based on the following paper: Brandtzaeg, P. B., & Følstad, A. (2017). Trust and distrust in online fact-checking services. Communications of the ACM. 60(9): 65-71
Call for papers - ICPP6 T13P05 - PLATFORM GOVERNANCE IN TURBULENT TIMES.docxAraz Taeihagh
CALL FOR PAPERS
T13P05 - PLATFORM GOVERNANCE IN TURBULENT TIMES
https://www.ippapublicpolicy.org/conference/icpp6-toronto-2023/panel-list/17/panel/platform-governance-in-turbulent-times/1428
Abstract submission deadline: 31 January 2023
GENERAL OBJECTIVES, RESEARCH QUESTIONS AND SCIENTIFIC RELEVANCE
Platforms significantly increase the ease of interactions and transactions in our societies. Crowdsourcing and sharing economy platforms, for instance, enable interactions between various groups ranging from casual exchanges among friends and colleagues to the provision of goods, services, and employment opportunities (Taeihagh 2017a). Platforms can also facilitate civic engagements and allow public agencies to derive insights from a critical mass of citizens (Prpić et al. 2015; Taeihagh 2017b). More recently, governments have experimented with blockchain-enabled platforms in areas such as e-voting, digital identity and storing public records (Kshetri and Voas, 2018; Taş & Tanrıöver, 2020; Sullivan and Burger, 2019; Das et al., 2022).
How platforms are implemented and managed can introduce various risks. Platforms can diminish accountability, reduce individual job security, widen the digital divide and inequality, undermine privacy, and be manipulated (Taeihagh 2017a; Loukis et al. 2017; Hautamäki & Oksanen 2018; Ng and Taeihagh 2021). Data collected by platforms, how platforms conduct themselves, and the level of oversight they provide on the activities conducted within them by users, service providers, producers, employers, and advertisers have significant consequences ranging from privacy and ethical concerns to affecting outcomes of elections. Fake news on social media platforms has become a contentious public issue as social media platforms offer third parties various digital tools and strategies that allow them to spread disinformation to achieve self-serving economic and political interests and distort and polarise public opinion (Ng and Taeihagh 2021). The risks and threats of AI-curated and generated content, such as a Generative Pre-Trained Transformer (GPT-3) (Brown et al., 2020) and generative adversarial networks (GANs) are also on the rise (Goodfellow et al., 2014) while there are new emerging risks due to the adoption of blockchain technology such as security vulnerabilities, privacy concerns (Trump et al. 2018; Mattila & Seppälä 2018; Das et al. 2022).
The adoption of platforms was further accelerated by COVID-19, highlighting their governance challenges.
This document discusses the ethical issues surrounding governments using big data analysis to identify possible terrorist threats. It examines factors that determine whether such use is acceptable, including minimizing privacy intrusions, manipulation of data, and ensuring accuracy. While big data can help counter terrorism through identifying threats, its use also brings risks like overreach, false alarms, and lack of transparency that must be addressed. The line between ethical and unethical use depends on balancing security needs with preventing harm and protecting civil liberties.
Media in Authoritarian and Populist Times: Post Covid-19 scenarioAI Publications
This paper is analytical in approach and draws various conclusions from the present-day media and its functioning. Media plays critical role in strengthening of Democracy but at the same time can be impediment also if not properly managed and given enough freedom to operate. Media is also called the fourth pillar of Democracy and gives space to criticism, dissent and questioning skill to electorate against the people in power. This paper argues that media in times of populism and authoritarianism is in for a serious overhaul and change. Media is very difficult to be found independent and working in conducive environment. Populism and authoritarians stifles dissent and criticism and manages the media in order to sell its own agenda. Post Covid-19 this phenomenon has gotten worse and the pandemic has aggravated the situation.
How the emerging technologies change the way people participate politically. Linked open data, AI, social bots, personalised and customised public services. Based on research of WP1 and WP2 of the project.
Alexander Ronzhyn, Researcher, Nationale E-Government Kompetenzzentrum, DE
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...ALexandruDaia1
Our primarly goal was to detect clusters via gensim libraries in news data consisting ofinformation regarding health and threats. We identified clusters for the periodscorresponding: i) Jannuary 2006 until the end of 2019, as December 2019 is considered thefirst month in which information about CORONVIRUS COVID-19 was made public; ii)between the 1st of Jannuary 2019 and 31st December 2019; and iii) between the 31st ofDecember 2019 and the 14th of April 2020. We conducted experiments using naturallanguage on open source intelligence data offered generously by brica.de, a providerspecialized in Business Risk Intelligence & Cyberthreat Awareness.
Running Head: SOCIAL MEDIA EFFECT 1
SOCIAL MEDIA EFFECT 14
Social Media Effect to Public Safety Administration
Michael Petras
University of Maryland University College
Introduction
Regulation of social media usage has led to lawmakers, community members, and even the litigators in shaping their policies. This is done based on federal, local, and state laws while also realigning the information that they are sharing online. This is concerning the public safety administration that is usually affected by the continued use of social media platforms. Public safety administration is also based on restricting access to personal information while trying to protect citizens from various issues such as bullying and cybercrime. Social media usage has continued to put more people at risk, and there is a need for the provision of public safety protection by the relevant administrators. This needs to be tied to the generation of federal laws that protect information and data from various individuals that have been posted on social media platforms while encouraging the much-needed transparency in the protection of the public. Continued social media usage by the general public has also brought about the issue of stolen identity due to the emergence of modern technology. The new technology arrival has been the leading cause of the interaction of many people on social media platforms (Beckett, 2018). Those tasked with policymaking have always argued that the administration of public safety should be in line with the duty to protect the privacy or access to information and data from various individuals. In that regard, this paper aims at analyzing the issue of social media usage as it affects the administration of public safety at all times.
Resources
Public safety administration often encompasses the release and coordination of various resources, which can be able to ensure the safety and security of the community as a whole (Gintova, 2018). Administration of public safety is inclusive of many departments such as the police, the emergency services, the medical services, and even the fire department. Public safety administration also happens to be affected by limited resources when it comes to preventing the processes involved from working efficiently. This can be linked to the limiting resources by the government while ensuring the safety and the security of the general public (Baym, 2015). The general public will always rely upon a variety of services that come from the relevant governments to enable the provision of safety and security to the public in their daily lives. However, limited resources will end up hampering the whole process as systems and policies seize to operate with the much-needed efficiency (Wohn & Bowe, 2016).
Public safety administration services hap.
Analysing Large-Scale News Media Content for Early Warning of Conflict - Proj...UN Global Pulse
A feasibility study conducted by Global Pulse with UNDP explored how data mining of large-scale online news data could complement existing tools for conflict analysis and early warning. Analyzing news media archives from before and after Tunisia's 2011 revolution showed that tracking changes in tone and sentiment over time offered insights into emerging conflicts. Mining digital content was found to have considerable potential for conflict prevention if further explored.
This is an invited talk I presented at the University of Zurich, speakers' series 2.10.2017. The presentation is based on the following paper: Brandtzaeg, P. B., & Følstad, A. (2017). Trust and distrust in online fact-checking services. Communications of the ACM. 60(9): 65-71
Call for papers - ICPP6 T13P05 - PLATFORM GOVERNANCE IN TURBULENT TIMES.docxAraz Taeihagh
CALL FOR PAPERS
T13P05 - PLATFORM GOVERNANCE IN TURBULENT TIMES
https://www.ippapublicpolicy.org/conference/icpp6-toronto-2023/panel-list/17/panel/platform-governance-in-turbulent-times/1428
Abstract submission deadline: 31 January 2023
GENERAL OBJECTIVES, RESEARCH QUESTIONS AND SCIENTIFIC RELEVANCE
Platforms significantly increase the ease of interactions and transactions in our societies. Crowdsourcing and sharing economy platforms, for instance, enable interactions between various groups ranging from casual exchanges among friends and colleagues to the provision of goods, services, and employment opportunities (Taeihagh 2017a). Platforms can also facilitate civic engagements and allow public agencies to derive insights from a critical mass of citizens (Prpić et al. 2015; Taeihagh 2017b). More recently, governments have experimented with blockchain-enabled platforms in areas such as e-voting, digital identity and storing public records (Kshetri and Voas, 2018; Taş & Tanrıöver, 2020; Sullivan and Burger, 2019; Das et al., 2022).
How platforms are implemented and managed can introduce various risks. Platforms can diminish accountability, reduce individual job security, widen the digital divide and inequality, undermine privacy, and be manipulated (Taeihagh 2017a; Loukis et al. 2017; Hautamäki & Oksanen 2018; Ng and Taeihagh 2021). Data collected by platforms, how platforms conduct themselves, and the level of oversight they provide on the activities conducted within them by users, service providers, producers, employers, and advertisers have significant consequences ranging from privacy and ethical concerns to affecting outcomes of elections. Fake news on social media platforms has become a contentious public issue as social media platforms offer third parties various digital tools and strategies that allow them to spread disinformation to achieve self-serving economic and political interests and distort and polarise public opinion (Ng and Taeihagh 2021). The risks and threats of AI-curated and generated content, such as a Generative Pre-Trained Transformer (GPT-3) (Brown et al., 2020) and generative adversarial networks (GANs) are also on the rise (Goodfellow et al., 2014) while there are new emerging risks due to the adoption of blockchain technology such as security vulnerabilities, privacy concerns (Trump et al. 2018; Mattila & Seppälä 2018; Das et al. 2022).
The adoption of platforms was further accelerated by COVID-19, highlighting their governance challenges.
This document discusses the ethical issues surrounding governments using big data analysis to identify possible terrorist threats. It examines factors that determine whether such use is acceptable, including minimizing privacy intrusions, manipulation of data, and ensuring accuracy. While big data can help counter terrorism through identifying threats, its use also brings risks like overreach, false alarms, and lack of transparency that must be addressed. The line between ethical and unethical use depends on balancing security needs with preventing harm and protecting civil liberties.
Media in Authoritarian and Populist Times: Post Covid-19 scenarioAI Publications
This paper is analytical in approach and draws various conclusions from the present-day media and its functioning. Media plays critical role in strengthening of Democracy but at the same time can be impediment also if not properly managed and given enough freedom to operate. Media is also called the fourth pillar of Democracy and gives space to criticism, dissent and questioning skill to electorate against the people in power. This paper argues that media in times of populism and authoritarianism is in for a serious overhaul and change. Media is very difficult to be found independent and working in conducive environment. Populism and authoritarians stifles dissent and criticism and manages the media in order to sell its own agenda. Post Covid-19 this phenomenon has gotten worse and the pandemic has aggravated the situation.
This document provides a summary of predictive policing technologies and their implications. It discusses how policing has evolved from political to community-based models using broken windows theory. Two predictive policing software programs, PredPol and HunchLab, use data analysis to predict future crime locations. While these programs aim to efficiently allocate police resources, concerns include privacy violations, implementation costs, and potential biases. The document examines debates around predictive policing and big data collection in law enforcement.
How does fakenews spread understanding pathways of disinformation spread thro...Araz Taeihagh
What are the pathways for spreading disinformation on social media platforms? This article addresses this question by collecting, categorising, and situating an extensive body of research on how application programming interfaces (APIs) provided by social media platforms facilitate the spread of disinformation. We first examine the landscape of official social media APIs, then perform quantitative research on the open-source code repositories GitHub and GitLab to understand the usage patterns of these APIs. By inspecting the code repositories, we classify developers' usage of the APIs as official and unofficial, and further develop a four-stage framework characterising pathways for spreading disinformation on social media platforms. We further highlight how the stages in the framework were activated during the 2016 US Presidential Elections, before providing policy recommendations for issues relating to access to APIs, algorithmic content, advertisements, and suggest rapid response to coordinate campaigns, development of collaborative, and participatory approaches as well as government stewardship in the regulation of social media platforms.
Census microdata from different countries and time periods is currently difficult to access, combine, and analyze due to differences in format and granularity. The authors propose applying Linked Open Data principles and semantic web technologies to publish census microdata in order to address these issues. They present a process for converting census microdata to Linked Open Data and apply it to two case studies: the 2001 Spanish census and the Integrated Public Use Microdata Series International framework. The results show census microdata can be published as Linked Open Data while preserving original structures, and this approach enables harmonization and integration across data sources.
Social Media and the Internet of Things (Arab Social Media Report 2017) 7th E...Ahmed Al-Shams
The power and influence of social media has continued to grow globally over the past decade. During this period, the scope and scale of usage have changed dramatically, from the early days when social media was primarily fulfilling social needs of connectivity, communication, socialization and entertainment, to the current era, where social media applications are seen as important tools of governing, development, diplomacy and business. More recently, informational flows taking place through social media have been informing—and misinforming—public opinion and influencing policy development and political communication. For example, in 2015 and 2016, social media played a critical role in shaping public opinion internationally and on national levels, during numerous major events with global implications. During the past few years, as applications of “big data” and artificial intelligence continued to mature, the level of sophistication and influence of social media expanded further. As societal penetration rates increased, these data-driven applications started to provide deep insights into public views, sentiments, needs, behaviors and activities in numerous countries at unprecedented granular levels. The newfound insights harnessed through social media created new opportunities, as well as new risks.
Experimenting with Big Data and AI to Support Peace and SecurityUN Global Pulse
UN Global Pulse is working with partners to explore how data from social media and radio shows can inform peace and security efforts in Africa. The methodology, case studies, and tools developed as part of these efforts are detailed in this report.
This document summarizes a study of crisis informatics and the challenges of studying crisis events in a networked world. The researchers conducted a case study of the 2007 Virginia Tech shooting crisis through both on-site interviews and analysis of online activity. They traced information dissemination across multiple online platforms and timelines to map the digital and physical responses. Key challenges included the dispersed and emergent nature of online information, determining what sites to study, and integrating digital and in-person data.
Analysing the role_of (2) Relation between Sandro Suzart, SUZART, GOOGLE ...Sandro Santana
The document analyzes the role of information and communication technologies (ICTs) in the Tunisian and Egyptian uprisings from an information warfare perspective using the Information Warfare Lifecycle Model. ICTs like social media and mobile phones were used by protesters to coordinate demonstrations and spread anti-government sentiment domestically and internationally. Governments attempted to restrict ICT access but were ultimately unsuccessful. The analysis characterizes the role of ICTs as psychological operations and command/control warfare, facilitating the dissemination of information to influence local and global audiences and provide some organization for initial protests.
Analysing the role_of (2) Relation Sandro Suzart SUZART GOOGLE INC Uni...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation, Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations countries IMPEACHMENT GOOGLE INC
Analysing the role_of Relation between Sandro Suzart, SUZART, GOOGLE INC,...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
Analysing the role_of Relation Sandro Suzart SUZART GOOGLE INC United ...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation, Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations countries IMPEACHMENT GOOGLE INC
This document proposes a natural language processing (NLP)-based digital investigation platform for analyzing online communications like emails and social media. The platform comprises four phases: 1) data collection and representation, 2) vectorization, 3) feature selection, and 4) classifier generation and evaluation. The platform uses unsupervised NLP models to extract topics from communications and ranks topics associated with targets. Classifiers are trained and evaluated to further aid investigations. An evaluation on a real-world dataset found it outperformed two other approaches in F1-score and precision.
This document discusses how social media has influenced politics. It begins by exploring how the networked nature of the internet facilitated new forms of political engagement. The advent of social media further enhanced this by increasing circulation of information and political knowledge, which can increase political participation. The document then provides evidence of social media's influence on politics by looking at how circulation of information is key in political campaigns, mobilizing social movements, and among political actors and practices. It analyzes how social media has become an important channel for political groups and citizens to share information and viewpoints.
MASINT (Measurement and Signature Intelligence) uses scientific and technical methods to collect strategic and tactical intelligence. It builds models to aid decision-making but can be complicated to apply quickly. In 2004, President Bush established the Commission on Intelligence Capabilities to review intelligence functions after 9/11. The commission found 74 areas needing reform, and 71 were addressed in the 2004 Intelligence Reform and Terrorism Prevention Act. This act established a director of national intelligence and improved information sharing. MASINT now plays a role in countering global terrorism by tracking networks and using enemies' own technology against them.
What Data Can Do: A Typology of Mechanisms
Angèle Christin .
International Journal of Communication > Vol 14 (2020) , de Angèle Christin del Departamento de Comunicación de Stanford University, USA titulado "What Data Can Do: A Typology of Mechanisms". Entre otras cosas es autora del libro "Metrics at Work.
Under what conditions can information and communications technologies (ICTs) enhance the well-being of poor communities? The paper designs an alternative evaluation framework (AEF) that applies Sen’s capability approach to the study of ICTs in order to place people’s well-being, rather than technology at the center of the study. The AEF develops an impact chain that examines the mechanisms by which access to, and meaningful use of, ICTs can enhance peoples “informational capabilities” and can lead to improvements in people’s human and social capabilities. This approach thus uses peoples’ human capabilities, rather than measures of access or usage, as its principal evaluative space. Based on empirical evidence from rural communities’ uses of ICTs in Bolivia, the study concludes that enhancing people’s informational capabilities is the most critical factor determining the impact of ICTs on their well-being. The findings indicate that improved informational capabilities, like literacy, do enhance the human capabilities of the poor and marginalized to make strategic life choices to achieve the lifestyle they value. Evaluating the impact of ICTs in terms of capabilities thus reveals that there is no direct relationship between improved access to, and use of, ICTs and enhanced well-being; ICTs lead to improvements in people’s lives only when informational capabilities are transformed into expanded human and social capabilities in the economic, political, social, organizational and cultural dimensions of their lives.
Manipulating Social Media to Undermine Democracy 2017 Final Alireza Ghahrood
his report was made possible by the generous support of the U.S. State Department’s Bureau of Democracy, Human Rights and Labor (DRL), Google, the German Federal Foreign Office, the Internet Society, Yahoo, and Golden Frog. The content of this publication is the sole responsibility of Freedom House and does not necessarily represent the views of its donors.This booklet is a summary of findings for the 2017 edition of Freedom on the Net. A full volume with 65 country reports assessed in this year’s study can be found on our website at www.freedomonthenet.org.
Manipulating Social Media to Undermine Democracy Online content manipulation contributed to a seventh consecutive year of overall decline in internet freedom, along with a rise in disruptions to mobile internet ser-vice and increases in physical and technical attacks on human rights defenders and independent media.Nearly half of the 65 countries assessed in Freedom on the Net 2017 experienced declines during the coverage period, while just 13 made gains, most of them minor. Less than one-quarter of users reside in countries where the internet is designated Free, meaning there are no major obstacles to access, onerous restrictions on content, or serious violations of user rights in the form of unchecked surveillance or unjust repercussions for legitimate speech.The use of “fake news,” automated “bot” accounts, and other manipulation methods gained particular atten-tion in the United States. While the country’s online environment remained generally free, it was troubled by a proliferation of fabricated news articles, divisive partisan vitriol, and aggressive harassment of many journalists, both during and after the presidential election campaign. Russia’s online efforts to influence the American election have been well documented, but the United States was hardly alone in this respect. Manipulation and disinformation tactics played an important role in elections in at least 17 other countries over the past year, damaging citizens’ ability to choose their leaders based on factual news and authentic debate. Although some governments sought to support their interests and expand their influence abroad—as with Russia’s disinformation campaigns in the United States and Europe—in most cases they used these methods inside their own borders to maintain their hold on power
From drones to old-fashioned phone calls, data come from many unlikely sources. In a disaster, such as a flood or earthquake, responders will take whatever information they can get to visualise the crisis and best direct their resources. Increasingly, cities prone to natural disasters are learning to better aid their citizens by empowering their local agencies and responders with sophisticated tools to cut through the large volume and velocity of disaster-related data and synthesise actionable information.
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...UN Global Pulse
This guide offers an overview of e-analytics in the context of peacemaking and preventive diplomacy. It presents a summary of e-analytics tools as well as examples from the peace and security field. It includes a data project planning matrix that aims to help facilitate and motivate data-driven analysis. Part of the guide is a glossary on basic terminology related to new technologies.
Finished Custom Writing Paper By Essay Writer ServiHannah Baker
Here are the key positive and negative effects of thermoregulation:
Positive effects:
- Maintaining core body temperature within a narrow range allows the body and brain to function optimally.
- Heat acclimatization through training can improve the body's ability to dissipate heat and reduce performance decrements in hot conditions.
Negative effects:
- Excessive heat from high ambient temperatures or strenuous exercise can lead the body to decrease power output and speed to avoid overheating.
- If the body is unable to properly cool itself through sweating or increased blood flow, it can result in heat illness like heat exhaustion or heat stroke.
- In cold conditions, maintaining core temperature requires additional calorie expenditure
UML (Unified Modeling Language) is a standard modeling language used in software engineering. It provides a set of graphic notation techniques to create visual models of object-oriented software systems. UML is used to visualize, specify, construct, and document different aspects of a software system. It helps system designers, developers and stakeholders communicate and understand the key aspects of a software system such as functions, data and architecture. UML models can be created at different stages of the software development life cycle from requirements specification to design and implementation.
[/SUMMARY]
More Related Content
Similar to Assessing The Role Of Social Media And Digital Technology In Violence Reporting
This document provides a summary of predictive policing technologies and their implications. It discusses how policing has evolved from political to community-based models using broken windows theory. Two predictive policing software programs, PredPol and HunchLab, use data analysis to predict future crime locations. While these programs aim to efficiently allocate police resources, concerns include privacy violations, implementation costs, and potential biases. The document examines debates around predictive policing and big data collection in law enforcement.
How does fakenews spread understanding pathways of disinformation spread thro...Araz Taeihagh
What are the pathways for spreading disinformation on social media platforms? This article addresses this question by collecting, categorising, and situating an extensive body of research on how application programming interfaces (APIs) provided by social media platforms facilitate the spread of disinformation. We first examine the landscape of official social media APIs, then perform quantitative research on the open-source code repositories GitHub and GitLab to understand the usage patterns of these APIs. By inspecting the code repositories, we classify developers' usage of the APIs as official and unofficial, and further develop a four-stage framework characterising pathways for spreading disinformation on social media platforms. We further highlight how the stages in the framework were activated during the 2016 US Presidential Elections, before providing policy recommendations for issues relating to access to APIs, algorithmic content, advertisements, and suggest rapid response to coordinate campaigns, development of collaborative, and participatory approaches as well as government stewardship in the regulation of social media platforms.
Census microdata from different countries and time periods is currently difficult to access, combine, and analyze due to differences in format and granularity. The authors propose applying Linked Open Data principles and semantic web technologies to publish census microdata in order to address these issues. They present a process for converting census microdata to Linked Open Data and apply it to two case studies: the 2001 Spanish census and the Integrated Public Use Microdata Series International framework. The results show census microdata can be published as Linked Open Data while preserving original structures, and this approach enables harmonization and integration across data sources.
Social Media and the Internet of Things (Arab Social Media Report 2017) 7th E...Ahmed Al-Shams
The power and influence of social media has continued to grow globally over the past decade. During this period, the scope and scale of usage have changed dramatically, from the early days when social media was primarily fulfilling social needs of connectivity, communication, socialization and entertainment, to the current era, where social media applications are seen as important tools of governing, development, diplomacy and business. More recently, informational flows taking place through social media have been informing—and misinforming—public opinion and influencing policy development and political communication. For example, in 2015 and 2016, social media played a critical role in shaping public opinion internationally and on national levels, during numerous major events with global implications. During the past few years, as applications of “big data” and artificial intelligence continued to mature, the level of sophistication and influence of social media expanded further. As societal penetration rates increased, these data-driven applications started to provide deep insights into public views, sentiments, needs, behaviors and activities in numerous countries at unprecedented granular levels. The newfound insights harnessed through social media created new opportunities, as well as new risks.
Experimenting with Big Data and AI to Support Peace and SecurityUN Global Pulse
UN Global Pulse is working with partners to explore how data from social media and radio shows can inform peace and security efforts in Africa. The methodology, case studies, and tools developed as part of these efforts are detailed in this report.
This document summarizes a study of crisis informatics and the challenges of studying crisis events in a networked world. The researchers conducted a case study of the 2007 Virginia Tech shooting crisis through both on-site interviews and analysis of online activity. They traced information dissemination across multiple online platforms and timelines to map the digital and physical responses. Key challenges included the dispersed and emergent nature of online information, determining what sites to study, and integrating digital and in-person data.
Analysing the role_of (2) Relation between Sandro Suzart, SUZART, GOOGLE ...Sandro Santana
The document analyzes the role of information and communication technologies (ICTs) in the Tunisian and Egyptian uprisings from an information warfare perspective using the Information Warfare Lifecycle Model. ICTs like social media and mobile phones were used by protesters to coordinate demonstrations and spread anti-government sentiment domestically and internationally. Governments attempted to restrict ICT access but were ultimately unsuccessful. The analysis characterizes the role of ICTs as psychological operations and command/control warfare, facilitating the dissemination of information to influence local and global audiences and provide some organization for initial protests.
Analysing the role_of (2) Relation Sandro Suzart SUZART GOOGLE INC Uni...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation, Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations countries IMPEACHMENT GOOGLE INC
Analysing the role_of Relation between Sandro Suzart, SUZART, GOOGLE INC,...Sandro Santana
Sandro Suzart, SUZART, GOOGLE INC and United States on relationship among Demonstrations, 2013. IMPEACHMENTS of 22 governments, Relation, Sandro Suzart, SUZART, GOOGLE INC, United States, Demonstrations countries IMPEACHMENT, GOOGLE INC, the torture suffered by Sandro Suzart, Genocide in Egypt and Lybia.
Analysing the role_of Relation Sandro Suzart SUZART GOOGLE INC United ...Sandro Suzart
relationship between Sandro Suzart SUZART GOOGLE INC and United States on Demonstrations 2013 and Impeachments of 22 governments Relation, Sandro Suzart, SUZART, GOOGLE INC, United States on Demonstrations countries IMPEACHMENT GOOGLE INC
This document proposes a natural language processing (NLP)-based digital investigation platform for analyzing online communications like emails and social media. The platform comprises four phases: 1) data collection and representation, 2) vectorization, 3) feature selection, and 4) classifier generation and evaluation. The platform uses unsupervised NLP models to extract topics from communications and ranks topics associated with targets. Classifiers are trained and evaluated to further aid investigations. An evaluation on a real-world dataset found it outperformed two other approaches in F1-score and precision.
This document discusses how social media has influenced politics. It begins by exploring how the networked nature of the internet facilitated new forms of political engagement. The advent of social media further enhanced this by increasing circulation of information and political knowledge, which can increase political participation. The document then provides evidence of social media's influence on politics by looking at how circulation of information is key in political campaigns, mobilizing social movements, and among political actors and practices. It analyzes how social media has become an important channel for political groups and citizens to share information and viewpoints.
MASINT (Measurement and Signature Intelligence) uses scientific and technical methods to collect strategic and tactical intelligence. It builds models to aid decision-making but can be complicated to apply quickly. In 2004, President Bush established the Commission on Intelligence Capabilities to review intelligence functions after 9/11. The commission found 74 areas needing reform, and 71 were addressed in the 2004 Intelligence Reform and Terrorism Prevention Act. This act established a director of national intelligence and improved information sharing. MASINT now plays a role in countering global terrorism by tracking networks and using enemies' own technology against them.
What Data Can Do: A Typology of Mechanisms
Angèle Christin .
International Journal of Communication > Vol 14 (2020) , de Angèle Christin del Departamento de Comunicación de Stanford University, USA titulado "What Data Can Do: A Typology of Mechanisms". Entre otras cosas es autora del libro "Metrics at Work.
Under what conditions can information and communications technologies (ICTs) enhance the well-being of poor communities? The paper designs an alternative evaluation framework (AEF) that applies Sen’s capability approach to the study of ICTs in order to place people’s well-being, rather than technology at the center of the study. The AEF develops an impact chain that examines the mechanisms by which access to, and meaningful use of, ICTs can enhance peoples “informational capabilities” and can lead to improvements in people’s human and social capabilities. This approach thus uses peoples’ human capabilities, rather than measures of access or usage, as its principal evaluative space. Based on empirical evidence from rural communities’ uses of ICTs in Bolivia, the study concludes that enhancing people’s informational capabilities is the most critical factor determining the impact of ICTs on their well-being. The findings indicate that improved informational capabilities, like literacy, do enhance the human capabilities of the poor and marginalized to make strategic life choices to achieve the lifestyle they value. Evaluating the impact of ICTs in terms of capabilities thus reveals that there is no direct relationship between improved access to, and use of, ICTs and enhanced well-being; ICTs lead to improvements in people’s lives only when informational capabilities are transformed into expanded human and social capabilities in the economic, political, social, organizational and cultural dimensions of their lives.
Manipulating Social Media to Undermine Democracy 2017 Final Alireza Ghahrood
his report was made possible by the generous support of the U.S. State Department’s Bureau of Democracy, Human Rights and Labor (DRL), Google, the German Federal Foreign Office, the Internet Society, Yahoo, and Golden Frog. The content of this publication is the sole responsibility of Freedom House and does not necessarily represent the views of its donors.This booklet is a summary of findings for the 2017 edition of Freedom on the Net. A full volume with 65 country reports assessed in this year’s study can be found on our website at www.freedomonthenet.org.
Manipulating Social Media to Undermine Democracy Online content manipulation contributed to a seventh consecutive year of overall decline in internet freedom, along with a rise in disruptions to mobile internet ser-vice and increases in physical and technical attacks on human rights defenders and independent media.Nearly half of the 65 countries assessed in Freedom on the Net 2017 experienced declines during the coverage period, while just 13 made gains, most of them minor. Less than one-quarter of users reside in countries where the internet is designated Free, meaning there are no major obstacles to access, onerous restrictions on content, or serious violations of user rights in the form of unchecked surveillance or unjust repercussions for legitimate speech.The use of “fake news,” automated “bot” accounts, and other manipulation methods gained particular atten-tion in the United States. While the country’s online environment remained generally free, it was troubled by a proliferation of fabricated news articles, divisive partisan vitriol, and aggressive harassment of many journalists, both during and after the presidential election campaign. Russia’s online efforts to influence the American election have been well documented, but the United States was hardly alone in this respect. Manipulation and disinformation tactics played an important role in elections in at least 17 other countries over the past year, damaging citizens’ ability to choose their leaders based on factual news and authentic debate. Although some governments sought to support their interests and expand their influence abroad—as with Russia’s disinformation campaigns in the United States and Europe—in most cases they used these methods inside their own borders to maintain their hold on power
From drones to old-fashioned phone calls, data come from many unlikely sources. In a disaster, such as a flood or earthquake, responders will take whatever information they can get to visualise the crisis and best direct their resources. Increasingly, cities prone to natural disasters are learning to better aid their citizens by empowering their local agencies and responders with sophisticated tools to cut through the large volume and velocity of disaster-related data and synthesise actionable information.
Using Data and New Technology for Peacemaking, Preventive Diplomacy, and Peac...UN Global Pulse
This guide offers an overview of e-analytics in the context of peacemaking and preventive diplomacy. It presents a summary of e-analytics tools as well as examples from the peace and security field. It includes a data project planning matrix that aims to help facilitate and motivate data-driven analysis. Part of the guide is a glossary on basic terminology related to new technologies.
Finished Custom Writing Paper By Essay Writer ServiHannah Baker
Here are the key positive and negative effects of thermoregulation:
Positive effects:
- Maintaining core body temperature within a narrow range allows the body and brain to function optimally.
- Heat acclimatization through training can improve the body's ability to dissipate heat and reduce performance decrements in hot conditions.
Negative effects:
- Excessive heat from high ambient temperatures or strenuous exercise can lead the body to decrease power output and speed to avoid overheating.
- If the body is unable to properly cool itself through sweating or increased blood flow, it can result in heat illness like heat exhaustion or heat stroke.
- In cold conditions, maintaining core temperature requires additional calorie expenditure
UML (Unified Modeling Language) is a standard modeling language used in software engineering. It provides a set of graphic notation techniques to create visual models of object-oriented software systems. UML is used to visualize, specify, construct, and document different aspects of a software system. It helps system designers, developers and stakeholders communicate and understand the key aspects of a software system such as functions, data and architecture. UML models can be created at different stages of the software development life cycle from requirements specification to design and implementation.
[/SUMMARY]
This document provides a musical analysis of Chopin's Prelude in Db Major, Op. 28, No. 15. It discusses that the piece is from the Romantic period and was composed for solo piano. The prelude follows a ternary form (A-B-A/Coda) and is primarily in the key of Db major, modulating to the enharmonic equivalent of C# minor for the B section. The left hand accompaniment in section A is based on the tonic and dominant chords of Db and Ab, while the B section features the dominant G# as a repeated figure.
This document discusses how consumer perceptions of financial risk in online shopping have impacted security measures on the website eBay. It begins with an introduction addressed to the lecturer, providing the date and subject of the report. The body of the report then explains how eBay has implemented additional security features to address consumer concerns about risk, making the transaction process safer. It concludes by stating this has helped increase consumer confidence and online sales.
Writing Skill - Grade 2 - My Best FrienHannah Baker
Here are the key factors that affect which liquid works best for watering plants:
- Water content - Plants need water to carry out photosynthesis and grow. Water is the best option as it provides the necessary hydration without additional substances.
- Nutrient content - While some liquids like milk provide extra nutrients, too many can burn or damage plants. Water has the right balance of containing no extra nutrients to harm plants.
- Acidity - Highly acidic liquids like vinegar can lower the soil's pH and damage roots. Water is neutral.
- Sugar/calorie content - Drinks with added sugar lack the nutrients of water and can feed mold or attract pests if spilled on soil.
- Chemicals
The document provides instructions for creating an account on HelpWriting.net to request essay writing help. It outlines a 5-step process: 1) Create an account with email and password. 2) Complete a form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied. It emphasizes the site's commitment to original, high-quality work and full refunds for plagiarism.
The document discusses how to create an account and place an order on the HelpWriting.net website to request that a writer complete an assignment. It explains the multi-step process of registering with the site, providing assignment details and a sample of one's work, reviewing bids from writers, selecting a writer, making a deposit, and then reviewing and authorizing payment for the completed work. The document also notes that the site offers free revisions and guarantees original, high-quality content or a full refund.
CARSONIA The Music Of 1,000 Paper CranesHannah Baker
The document discusses the steps to request a paper writing service from HelpWriting.net, including creating an account, providing a request with instructions and sources, reviewing writer bids and choosing one, revising the paper as needed, and being ensured of original and high-quality content with the option of a refund if plagiarized. The process aims to match requests with qualified writers and allow customers to receive customized assistance with their assignments.
Three Factor I Like About Essay Writing, However Three Is My FavouriteHannah Baker
The passage discusses the debate around nationalizing healthcare in the United States. It argues that national healthcare is necessary because it saves lives, decreases costs, and increases access to care. While some oppose national healthcare on grounds of individual liberty and cost, the passage counters that everyone must contribute to offset costs for disadvantaged groups, and ensuring access to healthcare falls under the government's power to regulate interstate commerce. Most other developed nations recognize healthcare as a basic human right.
7 Steps You Must Follow To Write A Professional AcadHannah Baker
1. The document outlines 7 steps for writing a professional academic paper through the HelpWriting.net service, including creating an account, completing an order form, reviewing writer bids and choosing a writer, revising the paper as needed, and requesting revisions until satisfied.
2. It then provides two multi-paragraph examples of potential paper topics on investment management processes and World War II history and leaders to illustrate how writers on the site can assist with completing assignments.
3. The service claims to provide original, high-quality content and a refund if plagiarism is found, aiming to fully meet customer needs.
Why Do You Need Paper Writing Help - The Neo ComHannah Baker
Okonkwo was a respected warrior of the Igbo tribe who strived to be successful and masculine in order to avoid being seen as weak like his father, Unokwo. However, Okonkwo's impulsive killing of Ikemefuna and decision to flee from justice after accidentally killing a clansman during the Week of Peace brought dishonor upon himself and his family. This downward spiral ultimately led to Okonkwo's suicide to avoid being displayed as a coward after he was exiled from the tribe for seven years.
I DonT Know What To Write My Paper About How To MakeHannah Baker
This document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process:
1. Create an account with a password and email.
2. Complete a 10-minute order form providing instructions, sources, deadline, and attaching a sample if wanting the writer to imitate style.
3. Review bids from writers and choose one based on qualifications, history, and feedback. Place a deposit to start work.
4. Review the paper for expectations and authorize payment for the writer if pleased, with free revisions available.
5. Choose HelpWriting.net confidently knowing needs will be fully met, with the promise of original, high-quality content or
Not Everyone Should Go To College Essay. SussmanagHannah Baker
The document discusses and compares FedEx and UPS, two major package delivery companies. It outlines some key details about each company, including FedEx's focus on independent networks to meet customer needs, competing collectively as one brand, and collaborative management. UPS is described as having a single, highly integrated network structure serving 8 million customers daily with 360,000 employees. The document also notes emerging industry trends in globalization, consolidation, smaller/more frequent shipments, and outsourcing that both companies are aligning their strategies around.
The document provides steps for requesting writing help from HelpWriting.net:
1. Create an account with a password and email.
2. Complete a 10-minute order form providing instructions, sources, deadline, and attaching a sample if wanting the writer to imitate your style.
3. Review bids from writers and choose one based on qualifications, history, and feedback, then pay a deposit to start the assignment.
4. Review the completed paper and authorize full payment if satisfied, or request revisions using the free revision policy.
Paragraph Of The Week Paragraph Writing PracticHannah Baker
The founding of Israel has its roots in World War 2, when millions of Jews fled Germany to escape persecution by Hitler. After the war, the Zionist movement advocated for Jewish refugees to settle in Palestine. In 1947, the UN proposed partitioning Palestine into separate Jewish and Arab states. Israel declared independence in 1948, though this was met with hostility from surrounding Arab nations. Conflict has persisted between Israel and neighboring Arab countries ever since.
7 Best Images Of Free Printable Paper Vintage HHannah Baker
Music has long been used as an artistic outlet to explore and express the human condition. Composers are able to tap into universal human experiences and emotions through their musical works, conveying complex ideas about what it means to be human. Certain musical genres and styles are particularly well-suited for examining specific aspects of the human experience, such as the inner psychological struggles we all face or the social and cultural forces that shape our lives. By connecting with audiences on an emotional level, music provides meaningful commentary on the shared human experiences of love, loss, joy, suffering, and our search for meaning and purpose.
3 Easy Ways To Get Rid Of Writers Block - The Beat A Blog By PremiuHannah Baker
This document discusses hearing loss in Canada. It notes that around 20% of the Canadian population has some form of hearing loss. Noise-induced hearing loss is becoming more common due to uncontrolled sounds and an aging population. About 42% of Canadians are at risk of noise-induced hearing loss from excessive noise exposure. There are passive and active hearing protection devices available. Passive devices provide constant noise attenuation while active devices offer communication and adjustable noise reduction capabilities. Digital signal processing active devices have advantages over analog ones.
The document discusses the goals of language learning and teaching. It states that language allows for the expression and exchange of thoughts, concepts and knowledge, as well as the transmission of experience. Setting clear language learning goals is important for successful language learners. Understanding learners' beliefs and desires about language learning provides insight into setting appropriate goals. Some key goals of language learning include communication, personal growth and understanding other cultures.
The document provides instructions for requesting and completing an assignment writing request on the HelpWriting.net platform. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one. 4) Review the completed paper and authorize payment. 5) Request revisions to ensure satisfaction, with refund available for plagiarized work. The document emphasizes providing high-quality, original content to meet customer needs.
Scholarship Essay College Admission Essay WritersHannah Baker
The document provides instructions for using a writing service called HelpWriting.net. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and choose one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied, with a refund option for plagiarism. The service aims to provide original, high-quality content to meet customer needs.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Thesis Statement for students diagnonsed withADHD.ppt
Assessing The Role Of Social Media And Digital Technology In Violence Reporting
1. 9
Contemporary Readings in Law and Social Justice 10(2), 2018
pp. 9–42, ISSN 1948-9137, eISSN 2162-2752 doi:10.22381/CRLSJ10220181
ASSESSING THE ROLE OF SOCIAL M EDIA AND
DIGITAL TECHNOLOGY IN VIOLENCE REPORTING
TONY ROBERTS
T.Roberts@ids.ac.uk
Institute of Development Studies,
University of Sussex, Brighton
GAUTHIER MARCHAIS
G.Marchais@ids.ac.uk
Institute of Development Studies,
University of Sussex, Brighton
ABSTRACT. The use of social media and digital technologies has radically changed the way
that information about violence is captured, reported, analysed and acted upon. People’s use
of social media played a significant role in the Egyptian revolution, post-election violence
in Kenya, and drug-cartel violence in Mexico. Social media can be used to provide human-
itarian agencies, policy makers and academics seeking to understand and respond to violent
crises with data unavailable from other sources. After an initial period of uncritical optimism
regarding the potential of social media and digital technologies there is now however a
growing recognition that they come with new practical, ethical and methodological limita-
tions. Indeed social media content is often the target of conscious distortions, manipulations,
or censorship by a range of actors. Bias of several kinds can significantly distort social
media data and reduce its representativeness. This paper assesses the role of social media
and digital technology (SMDT) in the reporting of violent events, and evaluates its relative
strengths and weaknesses as compared to other means available. It seeks to understand how
SMDT data is collated, how reliable the data is, and what practical and ethical issues are
associated with its collection and use. We start by situating the application of these tech-
nologies within the wider discussion of the use of Information and Communication Tech-
nologies for Development (ICT4D) and the sub-field of real-time data for development
(RTD4D) before presenting the different types of SMDT data collection instruments and
methods. We then assess the reliability of SMDT for the reporting of violent events, iden-
tifying potential factors of biases in the data, such as geographical coverage, demographic
and socio-economic factors, or biases resulting from the nature and configuration of violent
events. We also look at whether such data can accurately capture underlying dynamics of
violent events. Finally, we look at the practical and ethical challenges associated with the
collection of SMDT data on violent events.
Keywords: social media; digital technology; violence reporting
2. 10
How to cite: Roberts, Tony, and Gauthier Marchais (2018). “Assessing the Role of Social
Media and Digital Technology in Violence Reporting,” Contemporary Readings in Law
and Social Justice 10(2): 9–42.
Received 30 March 2018 • Received in revised form 25 July 2018
Accepted 31 July 2018 • Available online 25 August 2018
1. Capturing Violence Data Using SMDTs: A New Panacea?
1.1 Introduction
Our use of social media and digital technologies (SMDTs) is profoundly transform-
ing the way violent events are reported, analysed and acted upon. Social media
platforms such as Twitter, Facebook and WhatsApp allow ordinary members of the
public to use their mobile phones or other digital devices to broadcast their personal
reports widely, or to narrowcast them to private, shared interest groups. These new
information and communication tools have been key in reducing previous infor-
mation asymmetries in contexts of highly unequal confrontations, such as the Arab
Spring uprisings (Zhuo et al., 2011), or the anti-globalisation demonstrations in
Pittsburgh (Earl et al., 2013). As Specht (2017) has shown, in Colombia increased
connectivity and new digital tools help information and knowledge spread rapidly
to mobilise opinion and social protest. Social media and digital technologies
(SMDTs) provide new formats of social behaviour and means of collective action
(Moule, 2016) and are now used for co-ordinating violent forms of collective action
by a range of actors, ranging from street gangs (Behrman, 2015), rebel groups and
mafias (Carroll, 2013) to “terrorist” networks (Rudner, 2017) and nation states
(MacAskill, 2015). Social media and digital technologies are now widely used by
state and non-state actors as a means for the monitoring and surveillance of political
unrest and armed conflict.
Social media content and data has revealed forms and types of violence
previously invisible and under-reported in traditional media due to reporting biases
(Weidmann, 2015; Matthew and Zhukov, 2015). The ready availability of mobile
phones with the capability to take photos and video footage and to upload them to
Facebook or Instagram enables citizens to provide much more immediate, and
detailed, visual and textual evidence of violence than had previously been available
via mainstream media. Black Lives Matter and the Occupy Movement are examples
of civil society organisations (CSOs) who have used social media successfully to
circumvent mainstream media’s ambivalence to police violence against African-
Americans and growing social inequality, turning social media into a powerful tool
for advocacy and collective action. Social media content has also been used to
reveal state violence and torture in Abu Ghraib (Amnesty, 2006) and the secret
drone wars being waged by the USA in Pakistan, Yemen, Somalia and elsewhere
(Strasser, 2013).
Social media use is also radically transforming the way humanitarians, policy
actors and academics engage with violent events, as they offer significant advan-
3. 11
tages over traditional media, including the ability to capture more instances of more
granular information about on-the-ground realities, and the potential to visualise,
verify and validate it in near real-time (Sambuli et al., 2013). As information is
both crucial and, often, scarce in times of crisis, the capacity to collect real time
situational data using such technologies has the potential to significantly improve
early warning systems and to provide enhanced information for decision making in
relation to security and the targeting of interventions and humanitarian aid. It can
also enhance the quantity and quality of “evaluative data,” such as monitoring and
evaluation systems, internal audit, and accountability procedures (Read et al., 2016).
Enthusiasm for such technologies in the development and humanitarian sectors
has been high. In their report Preventing Violence, War and State Collapse the
OECD recommended member states recognise “the critical importance of adopting
innovative information and communication technologies for data collection, com-
munication, visualisation and analysis” (OECD, 2009). Similarly, the UN High
Level Panel on the Post-2015 Development Agenda called for a “data revolution,”
which “would draw on existing and new sources of data to fully integrate statistics
into decision making, promote open access to, and use of, data” (UN, 2013). With
regards to violent crises specifically, one of the most significant advances has been
the development of crowdsourcing platforms that enable actors to monitor violent
episodes through the aggregation and mapping of social media data. The Ushahidi
platform is an early example of SMDT use by local citizens to monitor unfolding
electoral violence during Kenya’s 2007 elections (Makinen, 2008) and, later, to
monitor elections in countries including Sierra Leone, Nigeria and Ghana (Moreno
et al., 2017). Crowdsourcing tools like Ushahidi have also been used to map
unfolding humanitarian disasters such as earthquakes and typhoons in a practice
called Crisis Mapping, again using citizen-generated data to visually map and
document unfolding crisis situations (Gao et al., 2011; Meier, 2012). Although a
critical review of humanitarian technologies is beyond the scope of this paper, see
for example the work of Madianou, Longboan, and Ong (2015).
Social media and digital technologies have also generated significant enthusiasm
in academia, as they give researchers the potential to enhance the quantity and
quality of data available for research on violent conflict. As falling costs of digital
data collection devices such as tablets and smartphones have reduced barriers to
carrying out surveys on violent events in conflict-affected areas. They enable
researchers to capture the micro-level dynamics of violent conflict events through
the collection of fine-grained, disaggregated data (Blattman and Miguel, 2010;
Bruck et al., 2015). They also make it possible to capture the temporal dimension
of violent events more accurately, the analysis of which was previously limited by
the lack of historical data and the reliance on cross-section type data, which doesn’t
allow for temporal analysis.
History cautions that emerging technologies are often accompanied by uncritical
over-enthusiasm in which we overestimate the effect of technologies in the short
term. Gartner (2016) characterises this phenomenon as a “technology hype cycle”
4. 12
in which an early flush of inflated expectations predictably precedes a later trough
of disappointment (Figure 1). Read et al. (2016) have warned about the “data hubris”
that has permeated the aid, humanitarian and academic spheres.
Figure 1 Gartner’s Technology Hype Cycle
Like any other type of data, data generated through social media and digital tech-
nologies is subject to issues of reliability and bias. Data collected through platforms
such as Twitter has been shown to be fraught with potential biases resulting from
the architecture of these social media platforms and restrictions of access to the
data (Boyd and Crawford, 2011: 7). Ownership of these platforms also poses a range
of questions with regards to political interference and potential manipulation or
alteration of the data. Data on violent events presents a range of additional chal-
lenges. Unequal access to SMDTs in conflict affected areas, social norms about
what constitutes violence, manipulation and falsification of content by powerful
actors which are likely to be exacerbated in violent contexts are among the factors
that can generate systematic biases in social media data on violent events. As a
result, certain types of violent events can be systematically under-reported in social
media data, which can have severe political and humanitarian consequences.
Furthermore, the fact that SMDT enables data collection in real time does not make
it immune to measurement error, or to inaccuracies of spatial or temporal patterns.
Assessing the accuracy of social media data in capturing these patterns as well as
the social, political and economic mechanisms that underpin and enable violent
events is therefore crucial for its usage in academic research. Furthermore, lower
costs of SMDT methods do not entail ease of implementation. In high-risk settings
where data collectors can be subjected to violence, threats, repression, and manipu-
lation, data collection comes with significant additional material, logistic, financial,
and ethical challenges which have to be carefully evaluated.
This paper analyses and assesses the relative advantages and disadvantages of
the use of social media and digital technologies to collect data on violent events.
5. 13
More specifically, we look at whether SMDT data is reliable for reporting and
analysing violent events, the logistical and ethical challenges generated by the col-
lection of such data, and the issues posed for informing policy, humanitarian action
and academic research. The report begins by situating this type of method within
the growing ICT4D literature, and presents the different types of social media and
digital technologies currently used to collect data on violence. In Section 2, we
explore the question of reliability and accuracy of SMDT data, identifying key
potential sources of biases in SMDT data with regards to geographical coverage,
demographic and socio-economic factors, and biases due to the nature and con-
figuration of violent events. We also discuss the potential of such data to accurately
capture the social, economic and political processes that underpin violent events. In
Section 3, we move beyond the analysis of SMDT data to understand the ways in
which it can become “actionable,” and identify the logistical, financial and ethical
challenges rising from the implementation of SMDT data collection methods.
1.2 Background: Digital technology in humanitarian aid and development
The increased use of social media and digital technologies for violence reporting is
part of a larger effort to harness new technologies for use in humanitarian aid and
international development in what is sometimes called Information and Communi-
cation Technologies for Development (ICT4D). ICT4D is a growing field of prac-
tice and research concerned with understanding whether, to what extent, and under
which circumstances, the use of information and communication technologies (ICTs)
can contribute to achieving development goals. We situate this paper within the
field of ICT4D because of its focus at the intersection of digital technologies and
international development but also because the interdisciplinary nature of ICT4D
allows us to pull together relevant literature from multiple domains.
The continued rapid increase in the speed and capacity of ICTs, including the
internet and mobile phones, coupled with their reducing cost have made possible a
broad range of applications of ICT4D. However, whether ICTs should be viewed
as a means to promote development is contested. Some scholars have argued that
ICTs lead relatively straightforwardly to development outcomes; projects to build
Digital Villages (Sachs, 2005) or to provide One Laptop per Child are examples of
this theory of change. Others have claimed that ICT use in development is prob-
lematic and should not be promoted as a development solution, as to do so uncriti-
cally represents a form of neo-colonialism in which development is understood as
the adoption of “Western” culture and technologies (Ya'u, 2004; Pieterse, 2010).
The majority of ICT4D research and practice sits somewhere between these positions
and focuses on the critical analysis of which factors contribute to, or inhibit, the
productive use of ICT for development (Heeks, 2009; Unwin, 2009; Walsham,
2012; Kleine, 2013)
Within this broader field of ICT4D lies the subfield of real-time data for devel-
opment (RTD4D) which focuses on the use of “live” data to inform action in near
real-time. Examples of RTD4D include digital systems to remote-sense whether
6. 14
water pumps are working (ITU, 2010), and the monitoring of social media to inform
epidemiology during disease outbreaks (Salathé et al., 2012). Some real-time data
for development systems are bespoke solutions, such as those designed to enable
farmers to use SMS text messaging to solicit today’s price for the crop they are
harvesting in several alternative local markets (World Bank, 2011). Real-time
market-price systems allow farmers access to “small data” tailored to their specific
needs. By contrast, “Big Data” applications process huge data-sets such as the
billions of “status updates,” “tweets,” and “posts” produced by citizens every day
(Statistica, 2016), and filter, collate and visualise them for analysis. By automatically
and manually filtering data-sets by location, date and time, and by using keyword
searches, analysts aim to “mine” Big Data in order to discern patterns early on and
to produce actionable information that might prevent violent events or help to
mitigate their effects. This report focuses on one specific area of real-time data for
development which is the use of real-time social media data about violence, par-
ticularly “crowdsourced” data.
The term crowdsourcing refers to the process of getting the general public (the
crowd) to become a source of specific resources. Wikipedia, for example, is a
crowdsourced encyclopaedia as the entries are produced by volunteers who author
and upload the platform’s content. Facebook and Twitter are social media platforms
that effectively crowdsource their content as their users voluntarily author and
upload status updates, photos and other content items. Sambuli et al. (2016) have
characterised crowdsourcing as being either passive or active.
1.2.1 Active crowdsourcing of small data
Active crowdsourcing involves making a public call-to-action to provide specific
information on a chosen topic to a dedicated telephone number, software platform
or mobile application (app). This narrowly targeted approach is designed to generate
small data sets that can be processed relatively easily to pinpoint critical events and
lead to action. Ushahidi is the exemplar of active crowdsourcing of violence reports.
The Ushahidi team in Nairobi used their social networks to share information about
their platform and used social media to disseminate their call-to-action, which was
for the crowd to send SMS reports of any election violence incidents to a dedicated
number. Their core team then used these reports to populate a visual online map
(Figure 2) which was successful in generating increased awareness among the
public and global media of the unfolding events. Another example of the proactive
crowdsourcing of small data on a pre-specified issue is the Jangbeeshi dedicated
mobile app which was used to crowdsource reports live from polling stations during
Ghana’s 2012 elections.
7. 15
Figure 2 Ushahidi Online Map of unfolding violence during Kenyan elections
1.2.2 Passive crowdsourcing of Big Data
In contrast “passive crowdsourcing” involves no call-to-action or dedicated number,
but filtering the Big Data sets spontaneously produced by the crowd on social media
platforms such as Twitter, Facebook or WhatsApp. Government intelligence and
security forces “passively” monitor social media Big Data traffic to detect criminal
activity, including various dimensions of violence. An example of “passive crowd-
sourcing” to detect violent events would be the use of “Aggie” for election monitor-
ing in Ghana (Moreno et al., 2017). Aggie is an open source software application
used for aggregating social media to track real-time events such as election violence,
humanitarian disasters or dangerous speech. No specific “call to action” is made;
instead millions of publicly available social media updates are automatically filtered
using keyword searches to locate specific content. When Aggie was used to monitor
for violence during elections in Nigeria and Ghana, a “situation room” was staffed
by local civil society staff and journalists using SMDTs connected to the application
programming interface (API) of Twitter and WhatsApp to extract messages men-
tioning keywords such as “violence,” “gunshots,” “killed” etc.
Sambuli et al. (2013) used the 2013 Kenyan elections as a case study to directly
compare passive crowdsourcing from Twitter with active crowdsourcing using
Ushahidi. They found that passive crowdsourcing from Twitter produced a signif-
icantly larger number of critical incidents, but involved far more work filtering out
background noise than the more targeted Ushahidi implementation with its very
8. 16
specific call to action. Each method has its strengths and weaknesses; in this case
study the higher number of incidents captured by passive crowdsourcing and the
need to manually filter out higher levels of irrelevant information added to the
costs but the method delivered valued intelligence on a larger number of critical
incidents. The active crowdsourcing had a better signal-to-noise ratio and therefore
lower human workloads to analyse the data, but it delivered less critical incidents.
Active and passive crowdsourcing rely on members of the public volunteering
reports and, as a result, involve challenges of verification and systematic bias, issues
which we will address in detail in the following sections.
1.2.3 Crowd-seeding
Crowd-seeding is a third modality for collecting SMS or social media reports of
violent events. Instead of relying on unspecified volunteers to report violence as
crowdsourcing platforms do, crowd-seeding methods select and train specific data
collectors to report violent events through SMDT. As a result, reporters can be
selected using sampling methods to ensure geographic and demographic represen-
tation, and they can be equipped with mobile phones and call credit to ensure that
they are able to provide specific types of information to a dedicated platform. This
allows researchers an additional mechanism through which to control quality, repre-
sentativeness and validation, which present significant challenges when sourcing
data from the crowd, as we will discuss in the following section. Voix des Kivus is
an example of crowd-seeding for the reporting of violent events in an active war
zone. In the conflict-affected province of South Kivu, eastern DRC, three reporters
were selected from each of the project’s target villages to report all violent incidents
occurring in the village (Van der Windt and Humphreys, 2016). In relation to
passive and active crowdsourcing, however, this method has relatively high costs.
Whereas passive and active crowdsourcing rely on the crowd using their own
mobiles and phone credit, this form of crowd-seeding involves higher capital and
revenue costs, as the project has to pay for the training of the researchers as well as
the phones or reporting devices, and the telephone credit.
Amnesty International is using a novel form of active crowdsourcing to address
the high costs of human processing of Big Data. They use a digital platform to
enable the crowd to volunteer in the painstaking work of searching through
thousands of satellite images of conflict affected areas of Darfur in order to isolate
evidence of violent attacks. Amnesty has insufficient paid staff time to accomplish
these tasks so it is using the digital platform to outsource the task to individual
supporters working on their laptops or mobile phones. Each person is allocated one
small section of the overall satellite imagery to search for identifiable indicators of
violence. This active crowdsourcing of Big Data and then out-sourcing the micro-
tasking of processing the data enabled Amnesty to successfully decode 326,000
square miles of satellite images of Darfur.
If we organise passive and active technologies into those relying on small data
and dedicated platforms, and those that filter Big Data from non-dedicated platforms
9. 17
then we able to produce this useful typology for distinguishing violence monitoring
SMDTs (Figure 3).
Figure 3 Typology of social media monitoring (source author)
This section has located the use of social media and digital technologies in the
wider context of ICT4D and real-time data for development. It has also described a
range of technologies and modalities for crowdsourcing and crowd-seeding data on
violence events. Having examined the various ways in which violence data is col-
lected and filtered, the next section will look at the specific challenges of analysing
violence data collected using social media and digital technologies.
2. Analyzing SMDT Data on Violent Events
The reliability of data collected during the “fog of war” or other types of violent
crises has always been a major challenge for humanitarian actors, policy makers
and academics. This frustration has led some to hope that the “data revolution” might
lift this fog and produce greater clarity about violent events and their underlying
mechanisms. However few assessments have been made of the reliability of data
collected on violent events using SMDT. To assess the reliability of social media
data, we will first evaluate whether this data on violent events is representative of
the full scope of violent events, by identifying potential sources of systematic biases
in social media data. We will start by looking at the biases that can affect all
SMDT collected data, in particular: (1) biases in geographical and spatial coverage
(2) biases emerging from unequal access and usage of SMDTs by different groups,
and (3) biases resulting from social and gender norms. Taking into account that
violent events present very specific characteristics, we focus in part (4) on biases
that result from the nature, characteristics and configurations of violent events, and
10. 18
in part (5) on whether SMDTs capture temporal patterns of violent events. We then
discuss whether SMDT data are helpful in analysing the social, political and
economic mechanisms that trigger and underpin violent events.
During the phase of the technology hype cycle that Gartner (2006) calls the peak
of inflated expectations (Figure 1), social media was acclaimed as a means to both
democratise information flows and to compress time and space (Tsatsou, 2009).
Social media and digital technologies provide the potential for individuals to publish
their own perspectives and to send their own reports immediately, across great
distances, to multiple recipients, and at relatively low cost. However this potential
is not evenly distributed across geographies or demographic groups and, as the next
sections will detail, the use of social media and digital technology itself introduces
new exclusions and biases that significantly shape data reliability and its utility for
analysis of violence and conflict.
2.1 Geographic and spatial bias in violence reporting
Not all violent events are equally reported. Reporting of humanitarian crises and
violent events by traditional media has historically been subject to geographical
imbalances that reflect the financial and power interests of the urban elite over
those in the rural periphery (Chan, 2017) and the interests of the global North over
those of the global South (Guardian, 2015). These geographical inequalities at the
local and global level reflect underlying social and political dynamics that privilege
coverage of the activities of dominant ethnic, gender and social class groups at the
expense of others. For example, during the floods that devastated Thailand in 2011,
the north-east region was worst hit in terms of death and destruction; for many weeks
its inhabitants were disproportionately left homeless, without food, clean water or
sanitation. However media analysis shows that the damage caused to urban busi-
nesses in Bangkok and the Central Region received a larger share of media coverage
(Chan, 2017).
Onto this backdrop the use of social media and digital technology layers new
geographical bias, relying as it does on a technical infrastructure that is unevenly
distributed both internationally and within individual countries. Internet access is
provided via physical fibre-optic or copper cable networks as well as by satellite or
cellular networks. These connectivity networks have developed at a faster pace and
transmit at greater speeds in the global North than in the global South (ITU, 2016).
They are also more developed in each country’s capital city and commercial centres
than in its most remote and rural areas. Internet access and cellular connection are
simply not available to many rural populations. This inequality exists in many
countries that are relatively advanced in economic and technological terms (Chen
and Wellman, 2004). This uneven infrastructure raises the question of whether
there is uneven reporting of violent events that occur in areas that are more or less
served by information and communications networks (Croicu, 2017). Geographical
inequalities both reflect and reinforce other existing inequalities, and can introduce
biases in data collected through SMDTs. For example in many low income coun-
11. 19
tries the majority of women live in rural areas. So some women who are already
geographically marginalised and living on low incomes also become marginalised
in terms of social media participation (Wilson and Gapsiso, 2016; A4AI, 2017) both
as consumers and as producers of social media data.
2.2 Demographic bias in social media access
Social media tools such as blogging and microblogging platforms have the advan-
tage of making it possible for an individual to publish their thoughts, perspectives
and accounts without professional training or a publishing contract. SMDT poten-
tially provides the means for anyone to independently and autonomously publish on
any subject and to reach a potentially wide audience, therefore democratising access
to media and voice. However, access to social media and digital technologies is not
only geographically uneven but it is also uneven across income, age and other
demographic indicators. Therefore, if we rely on social media for violence reporting,
many people experiencing violence are structurally silenced whilst the voices of
the relatively affluent, urban, young and literate are further privileged (Lerman,
2013). If we wish to avoid reproducing and reinforcing existing (dis)advantage it
becomes important to understand in some detail the specific ways in which social
media and digital technologies exclude. One way of analysing technological ex-
clusions is to use the Five “A”s of Technology Access: availability, affordability,
awareness, ability and accessibility (Roberts, 2017).
Availability: In most territories a proportion of the population live in remote areas
where there is simply no availability of internet or cellular coverage, making
access to social media impossible for millions. Commercial pressures mean that
Internet Service Providers (ISPs) and mobile telecommunications companies invest
more heavily in network infrastructure in urban centres when compared to remote
communities. It is worth remembering that the majority (60%) of the world’s
population are not active users of social media; half of the world’s population has
no internet access, and one third do not own a mobile phone (WeAreSocial, 2017).
When relying on social media data for violence reporting it is therefore important
to conduct an analysis of for whom social media is (un)available.
Affordability: Where there is availability of connectivity infrastructure affordability
still excludes another large section of the population from social media use. Afford-
ability acts as a structural constraint on social media use as the cost of a mobile
phone handset, as well as call and data credit and battery charging are all significant
considerations for low income groups (Faith, 2016) and rural communities. Levels
of affluence are a factor in people’s ability to use social media. Although affordable
access to the internet for everyone by 2020 is one of the United Nations’ Sustain-
able Development Goals, the Alliance for Affordable Internet doesn’t expect us to
achieve this goal before 2040 (A4AI, 2017).
12. 20
Awareness: Even when social media access is affordable, lack of awareness ex-
cludes others from social media use. Some individuals will be unaware of particular
violence reporting initiatives, or of particular social media applications, which might
be beneficial. While social media companies like Facebook and Twitter spend
heavily on marketing to raise awareness of their services, violence reporting
initiatives have relatively small or non-existent budgets to raise awareness of their
crowdsourcing programmes. Technical investments need to be matched by market-
ing investments if initiatives are to reach their full potential.
Figure 4 Social media access: The five “A”s
Ability: Among groups that do have awareness of SMDTs lack of ability still ex-
cludes a significant number of citizens from making effective use of the technology
as a result of a lack of digital literacy skills (Poveda, 2016) or “informational
capabilities” (Gigler, 2011). Crowd-seeding programmes attempt to overcome the
problems of low levels of affordability, awareness, and abilities by carefully select-
ing informants and providing them with precisely the necessary capabilities and
mobile phones to deliver reliable data (Van der Windt and Humphreys, 2016). How-
ever our research failed to identify any such initiatives that overcame availability
or accessibility.
Accessibility: Even when there is availability, affordability, awareness and ability,
issues of accessibility routinely exclude significant numbers from using social media
and digital technologies. Some ethnic and linguistic groups are excluded from social
media initiatives because the technology only supports particular languages. Social
13. 21
media initiatives of technology interfaces may also lack the adaptive technologies
necessary to enable the inclusion of people who are blind or visually impaired for
example (ITU, 2013). As Hirth (2011) points out, disabled, print illiterate, rural and
low-income groups are often systematically under-represented in crowdsourced
social media data.
Thus, while the rise of social media carried the promise of levelling geographic
imbalances and democratising communication, on closer inspection social media
does not create a level playing field. Uneven network coverage, asymmetric access
to digital devices and lack of skills and awareness all combine to make social media
far from a comprehensive source of data. Use of social media in violence reporting
is therefore liable to introduce biases including economic class, age and gender,
structurally excluding those who cannot or do not upload content on social media.
Although there is always hope that future economic growth and continued tech-
nological diffusion will reduce these inequalities, history suggests otherwise. Digital
technology has been accompanied by a widening of social inequality and not its
reduction (Piketty, 2014). This is partly because the already privileged urban,
educated, middle class are better placed to exploit its advantages. There are reasons
to think that the continued pace of technological change means that low income
groups are likely to lag behind permanently. If rural workers do indeed secure
affordable access to the internet by 2040 (defined as access to 1Gb of data for less
than 2% of income, A4AI (2017)) we might reasonably expect that by 2040 the
urban elite will have upgraded to the next generation of advanced technology and
may by then be measuring their internet access in terabytes, thus maintaining their
structural advantage.
Even if equality of access to SMDTs could be guaranteed this would be an
insufficient condition to guarantee equality of outcomes. The ability of people with
access to SMDTs to broadcast their opinion on social media does not mean that
they are all equally heard or equally influential. Regular citizens may have several
hundreds of Facebook friends or Twitter followers but a politician or celebrity can
expect to have millions. The ability to “capture” attention through content posting
is highly dependent on underlying social and class dynamics. In this respect social
media tends to amplify existing (dis)advantage rather than create a level playing
field. This echoes Toyama’s (2011) findings that technology can amplify existing
human capacity and intent but that it cannot substitute for it where it does not exist.
2.3 Social and gender norms
Exclusion from the use of mobile phones or social media can also be the result of
norms and values that shape unequal social relationships. For example, in Afghan-
istan social norms often constrain women from public use of mobile phones or social
media (USAID, 2013). On the other hand the use of a phone can be a valuable
means for women to circumvent the restriction of gendered conventions of purdah
which restrict women’s freedom to travel alone. SMDTs can provide alternative
means for women to communicate over distance and to conduct business transactions
14. 22
that obviate the need to travel (Comfort and Dada, 2003). In relation to violence
reporting, existing gender norms may make individuals unable or unwilling to
report violence against women. Domestic violence may be culturally unspeakable
or be so commonplace as to be considered not worthy of reporting – resulting in
under-reporting.
In the Zambian Household Survey, seven thousand women were interviewed
about whether a husband was justified in beating his wife if she (a) burnt the food
(b) argued with her husband (c) neglected the children or (d) refused to have sex.
62% of Zambian women felt that a man was justified in beating his wife in at a
least one of the situations (ZCSO, 2009). This demonstrates how unequal gender
norms can be internalised and domestic violence normalised, one consequence of
which is that violence against women is under-reported. In Egypt and Morocco
however women are using social media proactively to report violence against women
as part of their wider programme of gender activism. HarrassMap is an Egyptian
initiative that enables women to use SMS text messages and social media to
generate an online map that geo-locate incidents of sexual harassment and violence
against women as a tool for organising and advocacy (Peuchaud, 2014). In Morroco,
Women-Shoufouch is a similar SMDT platform used to combat gender-based
violence (Skalli, 2014). Research indicates that this use of social media has made
the scale of violence against women more visible, raised public awareness, and
enabled activists to engage powerful stakeholders to press for meaningful change
(Peuchaud, 2014).
In the Zambian example cultural norms mean that violence against women is
often accepted as normal and goes unreported. In the Egyptian and Moroccan
examples social media is used to actively challenge violence against women. These
examples demonstrate how dominant gender norms and gender activism interact
with the issues of access from the preceding section. The Afghan example above
illustrates how gender norms can restrict the availability of social media to women
and the Zambian example shows how gendered norms constrain what is considered
to be violence worth reporting. In remote rural areas women’s low incomes make
smartphones and connectivity less affordable. HarrassMap and Women Shoufouch
have built strong networks in urban centres but in rural areas there is less aware-
ness about such social media initiatives designed to challenge gender norms about
violence against women. In rural Zambia boys’ education is often prioritised above
girls’ and these norms affect the abilities to make effective use of SMDT (digital
literacy levels). Many of the local languages and dialects used by indigenous com-
munities are not used on social media platforms creating additional accessibility
issues. In these ways and others social norms and geographical factors interact with
the structural issues of access from the previous section in ways that significantly
affect a person’s ability to make effective use of social media and digital tech-
nologies in violence reporting.
Crowd-seeding can be understood as one attempt to redress some of these access
issues. Crowd-seeding initiatives are proactive in their inclusive recruiting of
15. 23
marginalised groups as active participants in social media-based violence reporting.
Crowd-seeding initiatives often recruit and train selected informants and equip and
train them to report on violent events. By providing participants with mobile phones,
training and phone credit to make calls it is possible to overcome some of the prob-
lems of affordability, awareness and abilities and so reduce some of the structural
biases of projects that rely on social media data. The comparative advantage of
crowd-seeding platforms is that data collectors can be trained to report specific types
of violent events that might otherwise be under-reported, such as rape during war
or domestic violence. They can also “plant” data collectors in particular locations to
ensure greater representativeness. Van Der Windt and Humphreys (2016) inten-
tionally designed their Voix des Kivus crowd-seeding platform to reduce biases due
to the positionality of data collectors, or systematic under-reporting of certain types
of violent events, in particular violence against women. In each of the villages of
the study, they trained three data collectors: One appointed by the village chief
(representing traditional authority), one elected by the village, and one representing
women’s groups. They did not, however, find that women reported more events of
violence against women than other reporters. This can point to several underlying
mechanisms: Either it is a sign that such biases do not exist, or it is a sign that the
strategy was not successful in rectifying them. Whilst the Voix des Kivus example
is notable in overcoming some of the structural issues of affordability, awareness
and ability this example of crowd-seeding does not overcome the availability or
accessibility issues of the print-disabled or most rural communities.
2.4 Measurement error due to the nature and characteristics of violent events
An additional source of potential bias in SMDT data stems from the nature and
characteristics of violent events. Violent events differ substantially, and violent
episodes often disrupt the contexts in which they occur, which can significantly
alter the way data is collected, yet the implications for the reliability of SMDT data
on violent events has rarely been analysed.
Nature: Violence constitutes a very large and heterogeneous range of actions
(Luckham, 2017). How violence is defined, what actions are considered as violent,
and what is considered worthy of reporting is socially constructed and changes over
time and space. Violence that is considered to have a political character is generally
more reported than violence that is considered either criminal or domestic. In the
last two decades, there has been a proliferation of projects focused on collecting
data on political violence, such as the Armed Conflict and Location and Event Data
Project (ACLED), or the Uppsala Conflict Data Program (UCDP). Yet recent
analyses of trends of violence on the African continent show that, while armed con-
flict has receded in recent years, violence related to criminal activity has increased
(Aucoin, 2017). Criminal violence is tied, in complex ways, to political and social
factors, yet data collection projects focused on political violence are not necessarily
conceptually and methodologically equipped to collect data on “non-political” forms
of violence. Crime statistics, for example, are usually reported by national states,
16. 24
and are thus dependent on the quality of national statistics agencies. Similarly,
domestic violence, which we have previously seen is less likely to be reported
because of self-censorship and social norms, is rarely, if at all, seen as political
violence and thus much less likely to be picked up by data collection projects. Yet
recent studies have shown that that domestic violence increases during episodes of
conflict (Wijayatilake and Gunaratne, 1999), pointing to much more complex ties
between domestic and political violence. The advent of mobile phones and the inter-
net provides potential new modes of crime watching (Wood, 2018) and reporting
that could address these challenges.
Intensity: Another characteristic of violent events that can affect the way they are
reported is their intensity. The intensity of a violent event depends on the level of
coercive or military means involved, the nature of the violence and the number of
people affected by it. The relationship between the intensity of violent events and
their reporting using SMDT, however, is not linear. On one hand, higher intensity
violent events, involving more brutal forms of violence or higher numbers of victims,
can be more “visible” and therefore more likely to be witnessed and reported on
SMDT systems. High-visibility violent events such as bombings or mass killings are
more likely to be reported than systematic and normalised violence which may be
more extensive but less intensive. Intensity may, in certain cases, offset the effects
of low phone or internet coverage (Dafoe and Lyall, 2015: 404). On the other hand,
high-intensity violent events can also have a negative effect on the level and
accuracy of reporting through SMDTs. The destruction of telecommunications infra-
structure, forced migration due to combat, fear of reprisals, physical and psycho-
logical distress may mitigate against SMDT reporting. In extreme cases, high
fatalities means that there might not be anyone left alive around to witness or report
the violence (De Juan and Bank, 2015, Appendix 1: 1).
Configuration and complexity: The configuration of violent events and their
complexity can also affect the accuracy of reporting. In armed conflicts, the larger
the number of military actors involved in a battle, the more difficult it is to identify
different actors and to attribute violent events to specific actors. Higher numbers of
protagonists and actions also raise the likelihood that measurement error will occur
due to the complexity of the event and resulting confusion. Analysing media cover-
age, Weidmann (2015) shows that measurement error for location and casualty
reporting is less accurate for battles involving a large array of actors than for one-
sided attacks. Given their reliance on non-professional data collectors, similar
measurement errors are likely to be present in SMDT data as well, although their
magnitude has not yet been evaluated.
It is worth noting that military configurations can reflect and amplify the
geographical imbalances in media coverage previously discussed, as geography is a
key dimension of military strategy and the distribution of military resources, par-
ticularly in civil wars. A typical civil war configuration is one where the govern-
ment holds cities and larger towns as well as strategic outposts and routes, while
17. 25
rebel factions set up base in remote and difficult to access areas such as forests,
mountains, or islands, regions that often have reduced phone coverage. This military
configuration closely reflects internet and phone network coverage as both are
dependent on geography: As a result, geographical reporting biases can generate or
amplify organisational reporting biases. For example, Weidmann (2015) shows that
only 30% of the violent events present in the US “Significant Activities” military
database that are coded as perpetrated by insurgent groups were present in media-
based datasets, a very large discrepancy that points to potentially large biases in
media-based data, which could also be present in SMDT data.
It is also important to note that a protagonist’s military dominance may give
them the ability to control, distort or censor social media platforms and even to
entirely cut off their availability to opposition forces. Blocking access to social media
platforms has become a widespread tool of political repression, used for example in
Burundi in 2015, or in DRC in December 2016, to quell the mobilization against
President Kabila’s refusal to step down after the end of his constitutional mandate
(Reuters, 2016). As a result, SMDT coverage of an event might be extensive for a
certain period and then severely reduced following repressive measures, which can
lead to unbalanced event coverage that cripples data analysis. Furthermore, state
intelligence agencies both passively monitor mobile phone and social media traffic
as well as employing assets to actively influence online content. The UK army
reportedly recruits soldiers with social media skills for its 77th
Brigade to run “non-
lethal operations” (MacAskill, 2015). The increased investment of protagonists in
efforts to influence social media discourse and to distort it with “fake news” raises
new validity and verification challenges about how those interpreting SMDT reports
on violence can discern information from disinformation.
Not all actors in a violent conflict have the power to block social media platforms
or shut down the internet, but other tactics may be deployed to repress the use of
social media. Close control and monitoring of the use of digital technology by
civilian populations is another mode of operation. It usually requires developing a
significant political repression apparatus and deeply infiltrating social networks.
This has been the case in Mexico, where the drug cartels systematically target and
assassinate those suspected of reporting violent events on social media platforms
such as the Blog Del Narco (Monroy-Hernandez and Palacios, 2014). Such monitor-
ing of social media usage can lead to distortion of reporting of violent conflict. In
major battles, such as the battle for Mosul in Iraq in 2016–2017, access and usage
of social media might be thoroughly repressed on one side and encouraged on the
other, leading to unbalanced reporting.
Temporality: Another key dimension of violent events is their temporality, which
refers to the way they unfold over time. Along with geographical and spatial patterns
of violent events, temporality is key in understanding the diffusion of violent
events. Given that one of the comparative advantages of SMDT data is the capacity
to record events in real time, the question of whether SMDT data can accurately
capture the temporality of violent events requires a more extensive discussion.
18. 26
Despite the centrality of temporality and diffusion in understanding patterns of
violent events, few studies to date pay specific attention to them (Bruck et al.,
2015: 35). As Van Der Windt and Humphreys (2016) note, studies of conflict dif-
fusion have long been focused on international cross-national conflicts (Braithwaite,
2010; Buhaug, 2008). Recently, however, a stream of literature has paid increased
attention to the micro-spatial and micro-temporal dynamics of conflict diffusion
(Schutte and Weidmann, 2011), using novel data collection methodologies partially
based on digital technologies, such as the geospatial location of conflict events based
on interviews (McDoom, 2013), or novel violent event location datasets based on
media reporting such as ACLED (Dowd and Drury, 2017).
Temporality is not only key in explaining the diffusion of violence, but also in
capturing the change in both the causes and consequences of violence, which can
have a dynamic character: variables that might have a causal effect on violence at
one point in time might not do so at another point. Recent advances in survey
methods have allowed researchers to move beyond cross-section type data, which
cannot capture the temporal dimensions of violent events as they are limited to a
single point in time. In particular, recall methods, where respondents are asked to
recall the value of a variable in the past, allow the building of retrospective panel
datasets, which are datasets where the value of one variable is recorded at different
points in time. This enables an analysis of the change in the value of variables over
time, and has recently been applied to the analysis of violent events and armed con-
flict (Bruck et al., 2015; Sanchez de la Sierra, 2017; Marchais, 2016; Justino and
Stojetz, 2018). However, the accuracy and reliability of retrospective panel
datasets can be affected by recall bias, which results from the errors respondents
make in recalling past events. Studies assessing the quality of data collected through
recall methods have shown that the means of variables can be recalled accurately,
but that the variation of the value of variables is prone to significant recall error
(De Nicola and Gine, 2014: 53). Thus, while this type of data is reliable to assess
broad temporal trends on key variables, it cannot allow a fine-grained analysis of
small scale temporal variations in these variables. Given the speed at which violent
events occur and their complexity, this constitutes a severe limitation of such data.
SMDT data can address these fundamental limitations, as the data is generated
and collected in real time, and each piece of data is automatically geo-located and
date-stamped, allowing researchers to capture spatial and temporal diffusion of
violent events with increased precision. This can significantly reduce recall and
measurement error and thus produce more reliable time-series datasets. Comparing
data collected through their Voix des Kivus crowd-seeding platform and data from a
previous survey they implemented in the province of South Kivu, DRC, Van Der
Windt and Humphreys (2016) show that survey-based data can lead to conclusions
that are opposed to those found using fine-grained near-real time data, illustrating
the comparative strength and promise of these methods. Big data approaches can
also increase capacity to capture timing and temporality of violent events, as they
19. 27
can provide extensive and very fine-grained data, particularly in areas with high
cell phone and internet coverage, such as cities (Unver and Alasaad, 2016).
Yet not all SMDT data collection methods display similar capacities to accurately
capture the timing of violent events. Comparing data obtained through crowd-
sourcing platforms (in particular the Syria Tracker) and non-SMDT based reports
on violent events in Syria, Price et al. (2013) and De Juan and Bank (2015) find
high correlation factors on dates and timing, suggesting such platforms accurately
capture the timing of violent events. De Juan and Bank (2015) and Masad (2013),
however, find significant temporal discrepancies between violent events reported in
the Syria Tracker and those reported in the Global Data on Events, Location and
Tone (GDELT) data set, which is based on news reports from international news
sources (De Juan and Bank 2015 Appendix, 1: 3). According to them, this is most
likely due to time lags between the reporting of violent events on crowdsourcing
platforms and their reporting in international news outlets. The causes of these
temporal discrepancies are not clear but may include delays in translation of events
reported in different languages. Given that crowdsourcing platforms rely on
volunteers that are usually present in the areas where the violence occurs, the lags
in reporting could also be due to factors such as displacement or lack of access to
internet. They could also be due to short term recall bias in the reporting of dates
and times of events, which is likely in situations of distress and trauma. As a result
of these temporal discrepancies, De Juan and Bank suggest that the Syrian Tracker
should be used to analyze the spatial patterns of violent events rather than their
temporal patterns. The temporal accuracy of SMDT data collection should there-
fore not be taken for granted, and the temporal measurement error systematically
evaluated.
The issue of temporality of SMDT data is also tied to the core questions of
causality and causal inference. While causal inference is fundamentally an academic
question, this issue concerns all uses of SMDT data collected for purposes that are
not strictly descriptive (such as locating violent events) and imply conjectures about
causality. Dafoe and Lyall (2015) identify the core problem as one of dependence
resulting from the temporal and spatial structure of SMDT datasets, where obser-
vations do not satisfy the core requirement of independence, which is necessary for
causal inference (Dafoe and Lyall, 2015: 407). For example, when estimating
whether violence (dependent variable) increases as a result of cell phone coverage
and access to social media platforms (independent variables), time can affect both
the outcome variable and the independent variable, but also be altered by the inde-
pendent variable, as access and usage of SMDT technologies changes the temporal
and spatial dynamics of violence. According to Dafoe and Lyall, “this is especially
true for ICTs which tend to influence politics through their amplification and sup-
pression of other processes related to communication, coordination, and monitoring”
(Dafoe and Lyall, 2015: 403). While this issue can be partially mitigated through
corrective statistical measures, it is not just a statistical question, and touches the
very core of the assumptions that underpin the use of SMDT data, and the core
20. 28
assumptions about violent events. What is required, therefore, is a better under-
standing of the underlying causal processes underpinning the usage of such methods
in conflict-affected settings, and the ways these might influence violent events and
reporting biases. This calls for complementary in-depth qualitative research on the
mechanisms of violence, and the mechanisms through which the use of ICTs might
affect both the temporal dimensions of violence and its reporting (Dafoe and Lyall,
2015: 402). Recent qualitative studies, such as the Social Media and Security in
Africa project, are focused on understanding the behavior of social media users in
the organization and provision of security, with a particular focus on closed plat-
forms such as Whatsapp or Telegram that have grown increasingly popular on the
African continent (Dwyer and Molony, 2018).
2.5 Capturing underlying mechanisms of violence
In addition to the fundamental question of temporality, it is important to assess
whether SMDT data can accurately capture the mechanisms that underpin violent
events. Violent events are co-determined by a range of complex social, economic
and political processes that precede them and enable their diffusion (Wood, 2003;
2008; Kalyvas, 2006). One of the risks of using SMDT to study violent events is to
direct attention away from the underlying causes. Initial analyses of the Arab
Spring, for example, presented it as a “Facebook revolution.” This foregrounding
of social media as a determinant of social change was at the expense of a deeper
analysis of the social and political determinants. Recent in-depth and empirically
grounded studies of the revolutionary movement in Egypt have challenged the
dominant narrative that the protests were spearheaded by liberal-minded, secular
youth seeking to challenge the longstanding autocratic regime and the conservative
religious social order. These studies show that social media played an important
role, relaying calls to protest, sharing protest tactics, and documenting events, but it
was the mosques and religious brotherhoods, which were deeply embedded in urban
neighbourhoods that enabled the bulk of the mobilisation and its persistence over
time (Eghdamian, 2014; Hofmann and Jamal, 2014; Ketchley, 2016). These studies
also show that the protests were violent from their onset, with protesters system-
atically targeting symbols of state repression, in particular police stations (Ketchley,
2016). What this example points to is the need to complement an analysis of SMDT
data with in-depth understanding of the mechanisms that underpin violent events,
and the necessity of careful triangulation of sources.
When used appropriately, recourse to SMDT data can enable an analysis of
these underlying dynamics that would be extremely difficult to carry out using
traditional data. In their analysis of the 2015 anti-coup mobilisation in Turkey, Unver
and Alasaad (2016) used an algorithm they developed to “comb” social media in
real time and generate fine-grained temporal and spatial data on dynamics of mobi-
lisation. This allowed them to prove that the bulk of the anti-coup mobilisation
could be traced back to early mobilising efforts by Istanbul’s traditional networks,
organised around mosques and neighbourhoods. Contrary to what had been widely
21. 29
reported in international media, it was not the result of Erdogan’s media appear-
ances and calls to mobilise, which they show occurred after the bulk of the popular
mobilisation. The mosques mobilised through traditional methods – salah prayers –
combined with an extensive use of SMS and social media (Unver and Alasaad,
2016). It is the overlap of these mobilisation methods, they show, that explains the
strength and intensity of anti-coup mobilisation. The analysis of SMDT data must
therefore be combined with a close understanding of the social processes that under-
pin violent events.
Furthermore, the content of SMDT data can reveal aspects of violent events that
cannot be captured by traditional media. The Forensic Architecture project Forensis,
based at Goldsmith’s University in London, uses social media content to generate
dynamic 3D modelling of violent events and their architectural environment.1
As a
large number of armed conflicts take place in dense urban settings, the architecture
of these urban centres becomes a key dimension of combat and violence. These
urban environments are often well covered by social media and densely populated,
which generates very dense social media content that can be compiled and train-
gulated to reproduce the sequencing of events, but also provide a visualisation of
their unfolding in space and in particular architectural settings. The Forensis project
used such methods to build 3D reconstitutions of, among other violent episodes,
the airstrike on the M2 hospital in Aleppo in 2016, or the use of white phosphorus
bombs by the Israeli army in the Gaza strip during Operation Cast Lead in 2008–
2009. As they are based on primary social media data, these reconstructions are then
presented as evidence for international prosecution teams, NGOs and other policy
actors working on violent crimes.
In this section, we have reviewed several aspects that are crucial in assessing
the reliability of SMDT data for reporting and analysing violent events. We have
seen in particular that, for all its promises, SMDT data can be affected by a range
of biases that can affect its representativeness. This does not mean that social media
data has no value. All data sources contain bias. What is important is that those
monitoring and analysing data are mindful of the particular biases of each dataset
and triangulate with alternative datasets that are complementary. When this is done
with appropriate rigour, social media data can add micro-level detail not available
by other means and it can make this data available in near real-time.
3. Beyond Data Collation
The majority of the existing literature on the use of social media and digital tech-
nologies in violence reporting and analysis has focused on describing the tech-
nology and data collation process. Relatively little analysis exists on translating
data into actionable information and the extent to which this has had led to change.
This section will begin by presenting practical examples work that go beyond tech-
nology description and address how to produce data that is actionable by social
change agents. The following section will then present some findings on the com-
22. 30
parative (dis)advantages of different SMDTs compared to traditional methods.
Finally we will assess some of the ethical considerations raised by using social
media and digital technologies in violence reporting and analysis before concluding
with some tentative recommendations.
3.1 Towards actionable data
Some social media and digital technology initiatives go beyond capturing violence
data and are specifically designed to facilitate practical action by peace activists or
policy actors. Increasing efforts are being made to tailor data monitoring processes
to produce actionable information that has the potential in the prevention, de-
escalation or mitigation of violence. At a community level PeaceTXT is one such
initiative that works with existing neighbourhood peace groups in the United States
and Kenya; they apply mobile tools to amplify and extend the reach of the organi-
sation’s existing awareness raising methods. Developed in partnership with New
York University, E-Responder has developed an evidence-based approach to assess-
ing the impact of their mobile-phone based approach in which they equip anti-
violence professionals with the technical abilities and intervention skills to track,
identify, and de-escalate online conflicts before they spill over into offline conflict.
Their research shows that increasingly, the “virtual” violence that starts online can
turn real physical assaults and deaths (Javdani, 2017). One of the advantages of
real-time social media monitoring like this is that it raises the possibility of recog-
nising rising tensions early and acting in a timely manner. Social media monitoring
tools offer the potential to monitor escalating tensions, and, where early identification
is successful, it creates the opportunity to launch de-escalation interventions along
the lines of E-Responder and PeaceTXT.
The ability to crowdsource millions of social media reports and to conduct key-
word analysis in real-time makes it possible to track developing tensions, hate speech
and threats online. As social media reports contain meta-data that can include
precise geographical location and the time of posting, it is possible to generate an
online “heat map” of rising tensions over time which can be used to trigger peace-
keeping responses and violence de-escalation measures. The challenge however is
that whilst keyword data filtering can be automated and performed in near real-
time, the task of interpreting data contextually and making judgements about appro-
priate responses is an essentially human task. Therefore bringing the right human
capacity to bear on what may well be life-and-death decisions is key. Sambuli et al.
(2013) and Moreno et al. (2017) have provided some insight into the combination
of actors it is necessary to bring together in a live social media monitoring “situation
room” as well as the various practical stages between data collection and producing
actionable data to emergency services and other actors.
Election monitoring is used here as an example of producing actionable data
from social media reports. Social media monitoring of election violence has taken
place in many countries worldwide including Kenya (Makinen and Wanu Kuira,
2008) Nigeria (Bartlett et al., 2015), Sri Lanka (CMEV, 2015) and Ghana (Moreno
23. 31
et al., 2017). One passive crowdsourcing initiative collected 13 million individual
posts in Twitter (called “tweets”) posted by 1.3 million unique users, including
408,000 tweets about election violence (Bartlett, 2015). Using a combination of
automated filtering and manual data analysis, researchers were able to segment the
data by geographic and demographic categories contained in the meta-data for each
tweet time and map and visualise the data online. This passive surveillance of Big
Data from Twitter enables analysis to draw on a huge number of individual reports
that make it possible to discern patterns and trends (spatial and temporal correlates)
not available by other means. At the same time it is possible to drill down to the
granular level of each individual first-person report and their precise location. One
of the challenges of social media’s open interface, however, is that individuals are
free to exaggerate, purposefully distort, or be mistaken in their reports. Unlike pro-
fessional reporting protocols of mainstream media there is no built in verification
mechanism on social media – so election monitoring programmes need to establish
their own verification processes.
Moreno et al. (2017) describe a Social Media Tracking Centre, which was used
to monitor for violence during elections in Ghana using a social media aggregator
platform called “Aggie.” The centre was staffed by local civil society organisations
and volunteers who were divided in a tracking team, a veracity team, an escalation
team, and an embedded team. The job of the tracking team is to monitor reports
generated automatically by Aggie and to identify relevant actionable issues. They
then produce “incident reports” containing verifiable information, such as the time
and location of the incident and the actors involved. The veracity team then have
the job of checking the incident details as well as corroborating the story with third
parties. Verified incident reports are then passed to the escalation team for commu-
nication to, and coordination with, front-line response organisations. The embedded
team are based within partner organisations and can support them in taking appro-
priate action. This illustrates the importance of investing in human resources and
skills to contextualise, interpret and verify social media data before it is actionable.
In a separate study of Kenya’s 2013 elections Sambuli et al. (2013) provide a
unique comparative analysis of passive and active crowdsourcing with traditional
media. Mainstream media monitoring was compared both with passive Twitter
crowdsourcing using the proprietary Dataswift application, as well as with the
active crowdsourcing using the Ushahidi-based election platform called Uchaguzi.
In their passive crowdsourcing process, Twitter data mined from the Twitter API
was cleaned and processed by a technical team of specialists using machine learn-
ing technology. In their active crowdsourcing process, a team of election observers
located at polling stations were used to verify reports and a team of online and
local volunteers reviewed citizens’ reports and organised them into structured work-
flows. Like the Ghanaian example, this also points to the importance of contextual
analysis and the need to invest in human interpretation of data. What emerges from
analysing these different approaches is that each method has its strengths and
24. 32
weaknesses. When taken together with the analysis from earlier sections it becomes
possible to tabulate these comparative (dis)advantages.
Table 1 Comparative (dis)advantages of violence reporting media (source authors)
Advantages Disadvantages
Passive Crowdsourcing Huge volumes of free data.
Automated filtering.
Filtering terms modifiable.
Generates most incident reports.
Impossible to verify in real-time.
No informed consent.
High noise/signal ratio.
Time-consuming to process.
Likely to contain disinformation.
Needs highly specialised staff.
Active Crowdsourcing More targeted.
Lower data volume to process.
Easier to verify in real-time.
Subject must be pre-determined.
Generate less incidents than passive.
Needs specialised.
Crowd-Seeding Targeted.
Trained data collectors.
Community Participation.
Subject must be pre-defined.
Only works in defined area.
Expenses of training and equipping.
Traditional Media Targeted.
Trained reporters.
Rigorous verification protocols.
Can operate in remote areas
without phone/internet
coverage.
Labour intensive.
Expensive trained journalists.
Access to social media data streams has an economic dimension. Whilst many social
media monitoring projects use the free Twitter Streaming API and researchers can
access historical data freely using the Twitter Search API in order to access the
unlimited access of the full Twitter or Facebook “firehose” of data fees are payable.2
This raises a new dimension of affordability as full data access is only available to
those with the ability to pay for the data – and for the significant associated cost of
human interpretation of that data. When users of social media platform sign up to
the terms and conditions they are often unaware that their data will become avail-
able as a commodity that is tradable in these ways, raising ethical issues, which are
the subject of the next section.
3.2 Ethical challenges of social media data use
Using crowdsourced data presents significant ethical challenges. Ensuring that we
“Do No Harm” requires careful consideration and local contextual knowledge as
the potential exists to expose data collectors or data originators to violence or
repression as the following examples illustrate.
Mainstream journalists and reporters are often subjected to violence or political
repression in contexts of violent conflict. Risks associated with exposing the actions
of powerful protagonists in militarised contexts do not disappeared because the
medium is now SMDTs. Citizen journalists providing microblogging and blogging
content on social media platforms like Raqqa is Being Silently Slaughtered (Orton,
2015) or Blog Del Narco (Carroll, 2013) were physically attacked and in some
cases tortured and executed by the insurgents and cartels that they reported on. In
25. 33
Moscow, social media reporters have been imprisoned. In Paris, citizen journalists
filming police have been beaten. Each example testifies to the potential for recrim-
ination and violence against social media reporters. Crowdsourcing platforms are
normally geographically removed from the sites of violence, often in foreign and
relatively “safe” countries,3
while risk resides primarily with in-country reporters
or networks of reporters. Actions taken by crowdsourcing platform operators can
directly influence the level of risk these reporters face, such as unintentionally
revealing reporters’ location or identity.
Although the situation of war reporting is an extreme case, it raises significant
ethical issues that pertain in other uses of social media data and which may expose
individuals to threats, violence, repression or manipulation. Oxfam are amongst an
international consortium that has developed a rights-based approach to responsible
data management (O’Donnell, 2015). As local staff and community members on
the ground are the experts in any specific context, the responsible data policy firstly
ensures that those on the frontline inform and own the process. This approach
includes, but goes beyond, data encryption to involve communities in the process
of data collection and usage without inadvertently putting people at risk. The policy
affords the right to privacy and not to be put at risk, but also the positive freedoms
to be heard and respected and to be able to make informed decisions (Oxfam, 2015).
In humanitarian and academic work informed consent is a requirement, prior to
collection of data on human subjects. In crowd-seeding and active crowdsourcing
that involves a call-to-action it is possible that appointed data collectors can be
informed about the uses to which data may be put and their consent sought. In the
Voix des Kivus project, this was done by organising a village-wide meeting to
present the data collection process for discussion and adoption. This however raises
the issue of the anonymity of data collectors, as revealing their identity can poten-
tially expose them to increased censorship, pressure, coercion or violence. In the
case of passive crowdsourcing, the automated filtering process can potentially anon-
ymise the identity of reporters but obviates the opportunity for informed consent.
Another central ethical issue concerns the autonomy and independence of data
collection that relies on social media and digital technologies. Information is a
weapon of war. TV and radio stations have always been primary military targets
and the same may now be true of social media channels. As the Blog del Narco and
Raqqa examples above illustrate, protagonists may exact violence on social media
journalists in pursuance of military objectives. There is also evidence that state and
non-state actors are investing in “armies” of human and robotic actors in order to
influence online narratives (The Guardian, 2015). Social Media has provided a
powerful new means to spread hatred and intolerance online (Wolfsfeld, 2017),
including new patterns of violent extremism (Tan, 2018). Powerful actors in violent
conflicts are now developing the ability to attack, threaten or co-opt individual
media outlets. The most powerful actors may also have the means to block access
to particular online platforms and in extreme situations to shut down local access to
the internet altogether. The autonomy and independence of social media is then a
26. 34
particular issue in active conflict zones where powerful military and political actors
are involved. International NGOs are notoriously easy to infiltrate by state intel-
ligence services, which can use them as covers to gather intelligence of conflict-
affected areas. Therefore the collection of social media data by NGOs may expose
citizens to risk and pose difficult questions about data protection and access. Power-
ful corporations also have the power to shut down social media channels. One
example of this is Apple’s banning of Metadata+ a mobile app that aggregates
journalist reports of deaths caused by US drone strikes in Pakistan, Yemen and
Somalia, all countries that the USA is not at war with. Metadata+ creates a record
of deaths not covered by mainstream media through a dedicated social media
channel. Apple initially refused to list the app under its original name of Drones+
and then later removed Metadata+ app from the Apple iStore on the grounds that it
contained “objectionable” data. Metadata+, however, remains available on Android
phones.
3.3 Concluding remarks and recommendations
This paper has focused on the increasing role of social media and digital tech-
nologies in the rapidly changing landscape of violence reporting and analysis.
Social media and digital technologies allow those monitoring violence access to a
wealth of new data that is largely free and machine readable. This opens the possi-
bility to automatically filter millions of reports to reveal patterns and trends at the
macro level, at the same time as drilling down to individual first-person reports
which are date and time stamped. This enables forms of analysis and insight not
available by other means and secures a valuable role for SMDTs among other
violence reporting media. This paper has identified and categorised different types
of social media and digital technologies and presented some of their comparative
advantages and disadvantages in relation to each other as well as in relation to more
traditional media. This contribution is intended to help activists, policy actors and
researchers to select SMDTS and to blend them with traditional means in com-
plementary ways.
Importantly, this paper has also drawn specific attention to the particular biases
and risks that the use of social media and digital technologies introduce or accen-
tuate. 60% of the global population are not users of social media – so any reporting
or analysis that relies on SMDT has the unintended consequence of structurally
silencing “those who do not tweet” due to their lack of availability, affordability,
awareness, abilities or accessibility to SMDTs. These exclusions are non-trivial as
marginalised people are often among those worst affected by violent conflict as
well as the most challenging to reach. It is sometimes assumed that over time these
challenges will disappear as rising levels of economic growth will extend the
provision of technical infrastructure and so remove the kind of biases highlighted
in this report. However evidence does not support this linear logic. Digital divides
and unequal gender norms persist even in those economies with the highest levels
of technological adoption. This suggests that there is a need for more targeted
27. 35
interventions in excluded and marginalised communities as well as for digital
development interventions that consciously design for equity from the outset.
Furthermore, the paper has discussed the comparative strengths and limitations of
using SMDT data with regards to accurately capturing the processes and mechanisms
that underpin violent events, with particular attention to temporality and spatial pat-
terns. We have shown that, while using SMDTs can bring significant advantages
when compared to traditional data sources and media, they are also prone to a range
of biases that can affect the understanding of these violent events. Finally, we have
shown that collecting and analysing data in conflict affected contexts generates
significant logistical and ethical challenges, tied to the fact that, as any source of
information in such contexts, SMDT data is subject to manipulation and falsification.
We conclude that it is crucial that social media and digital technologies are used
critically. The main recommendations arising out of this study reflect this:
Social media data needs to be complemented by data from other sources. This
is necessary to avoid the risk of amplifying the existing advantage of the already
privileged as well as the disadvantage of the digitally excluded.
Investments in technology must be matched by investments in the human capacity
to verify and validate social media data. Crowdsourced data requires translation
and interpretation in order to produce actionable data and new knowledge.
Critical and contextual analysis is necessary to avoid superficial description
and to pinpoint the causes of violence. One of the risks of using SMDT to study
violent events is to direct attention toward description of violent events rather than
their causes. We therefore recommend complementing data analysis with critical
and contextual analysis to identify and direct attention toward the root causes of
violence. Furthermore, given that significant biases can emerge with regards to
spatial distribution and temporal accuracy, we recommend that a careful analysis of
the spatial and temporal dynamics of the studied violent events is also carried out.
Policy measures should focus on the Five “A”s to remove existing structural
barriers to technology access. Rural connectivity programmes could target lack of
availability. Competition regulation could target the barrier of affordability. Public
information campaigns could improve awareness of key initiatives. Training
provision could address missing abilities and adaptive technologies for those living
with disabilities can address accessibility barriers.
Acknowledgements
The authors are indebted to four anonymous reviewers as well as to Anand Sheombar from
Hogeschool Utrecht, Andres Moreno from the United Nations University, Computing and
Society research institute and to Sonia Sinanan for their invaluable inputs to this paper.
28. 36
NOTES
1. http://www.forensic-architecture.org/
2. For a more detailed explanation see: https://brightplanet.com/2013/06/twitter-
firehose-vs-twitter-api-whats-the-difference-and-why-should-you-care/
3. The Syrian Observatory for Human Rights, for example, is based in London.
REFERENCES
A4AI (2017). 2017 Affordability Report. Washington, DC: Alliance for Affordable Internet.
Amnesty International (2006). Beyond Abu Ghraib: Detention and Torture in Iraq. https://
www.amnesty.org/en/documents/mde14/001/2006/en/ (accessed 5 May 2017)
Aucoin, C. (2017). “Less Armed Conflict but More Political Violence in Africa,” 12 April.
https://issafrica.org/iss-today/less-armed-conflict-but-more-political-violence-in-africa
(accessed 5 May 2017)
Bardall, G. (2010). “Election Violence Monitoring and the Use of New Communication
Technologies,” Democracy & Society 7(2): 9–12.
Bartlett, J., Krasodomski, A., Jones Nengak, D., Fisher, A., and Jesperson, S. (2015). Social
Media for Election Communication and Monitoring in Nigeria. London: Demos.
Baum, M. A., and Zhukov, Y. (2015). “Filtering Revolution: Reporting Bias in Interna-
tional Newspaper Coverage of the Libyan Civil War,” Journal of Peace Research 52(3):
352–368.
Behrman, M. (2015). “When Gangs go Viral: Using Social Media and Surveillance video to
Enhance Gang Databases,” Harvard Journal of Law and Technology 29(1): 315–338.
Bock, J. G. (2012). “Crowdsourcing during Post-Election Violence in Kenya,” in J. G.
Bock (eds.), The Technology of Nonviolence: Social Media and Violence Prevention.
Cambridge, MA: MIT Press, 105–126.
Boyd, D., and Crawford, K. (2011). “Six Provocations for Big Data,” paper presented at the
A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society,
University of Oxford, September. https://ssrn.com/abstract=1926431 (accessed 5 May
2017)
Braithwaite, A. (2010). “Resisting Infection: How State Capacity Conditions Conflict Con-
tagion,” Journal of Peace Research 47(3): 311–319.
Bruck, T., Justino, P., Verwimp, P., and Avdeenko, A. (2015). “Measuring Violent Conflict
in Micro-level Surveys: Current Practices and Methodological Challenges,” The World
Bank Research Observer 31(1): 29–58.
Bucher, T., and Helmond, A. (2017). “The Affordances of Social Media Platforms,” in J.
Burgess, T. Powell, and A. Marwick (eds.), The SAGE Handbook of Social Media.
London: SAGE, 233–253.
Buhaug, H. (2008). “Contagion or Confusion? Why Conflicts Cluster in Space,” International
Studies Quarterly 52(2): 215–233.
CAI (2015). “Social Media and Forecasting Electoral Violence: Pilot Project in Guyana,”
Creative Media Associates. http://41pylqn86jp37e3n04us8vqq.wpengine.netdna-cdn.
com/wpcontent/uploads/2016/07/Guyana-_Pilot_Project.pdf (accessed 5 May 2017)
Carroll, R. (2013). “Blog del Narco: Author Who Chronicled Mexico’s Drugs War Forced
to Flee,” 27 April. https://www.theguardian.com/world/2013/may/16/blog-del-narco-
mexico-drug-war (accessed 5 May 2017)
29. 37
Chan, E. (2017). Public Health Humanitarian Response to Natural Disasters. London:
Routledge.
Chen, W., and Wellman, B. (2004). “The Global Digital Divide: Within and Between
Countries,” IT & Society 1(7): 39–45.
CMEV (2015). “Final Report on Election Related Violence, Colombo: Centre for Monitor-
ing of Election Violence.” https://cmev.org/category/final-reports/ (accessed 5 May 2017)
Comfort, K., and Dada, J. (2003). “Rural Women’s Use of Cell Phones to Meet Their Com-
munication Needs: A Study from Northern Nigeria,” in I. Buskens and A. Webb (eds.),
African Women and ICTs. London: Zed Books, 44–55.
Coyle, D., and Meier, P. (2009). New Technology in Emergencies and Conflicts: The Role
of Information and Social Networks. New York: UN Foundation.
Croicu, M., and Kreutz, J. (2017). “Communications Technology and Reports on Political
Violence: Cross-national Evidence Using African Events Data,” Political Research
Quarterly 70(1): 19–31.
Dafoe, A., and Lyall, J. (2015). “From Cell Phones to Conflict? Reflections on the Emerg-
ing ICT–Political Conflict Research Agenda,” Journal of Peace Research 52(3): 401–
413.
De Juan, A., and Bank, A. (2015). “The Ba‘athist Blackout? Selective Goods Provision and
Political Violence in the Syrian Civil War,” Journal of Peace Research 52(1): 91–104.
De Nicola, F., and Gine, X. (2014). “How Accurate Are Recall Data? Evidence from Coastal
India,” Journal of Development Economics 106: 52–65.
Dowd, C., and Drury, A. (2017). “Marginalization, Insurgency and Civilian Insecurity: Boko
Haram and the Lord’s Resistance Army,” Peacebuilding 5(2): 136–152.
Dwyer, M., and Molony, T. (2018). Social Media and Politics in Africa: Democracy,
Security, and Surveillance. London: Zed Books
Earl, J., McKeeHurwitz, H., Mejia Mesinas, A., Tolan, M., and Arlotti, A. (2013). “THIS
PROTEST WILL BE TWEETED: Twitter and Protest Policing during the Pittsburg
G20,” Information, Communication and Society 16(4): 459–478.
Eghdamian, K. (2014). “What Was the Role of Religion in the Arab Spring?,” 28 July.
https://www.opendemocracy.net/arab-awakening/kat-eghdamian/what-was-role-of-
religion-in-arab-spring (accessed 5 May 2017)
Faith, R. (2016). How Does the Use of Mobile Phones by 16–24 Year Old Socially Excluded
Women Affect Their Capabilities? Unpublished PhD thesis, The Open University.
Frazier, J. (2011). “How Social Media Tools Can Disrupt Community Violence,” Association
for Talent Development. https://www.td.org/Publications/Newsletters/Learning-Circuits/
Learning-Circuits-Archives/2011/02/How-Social-Media-Tools-Can-Disrupt-Community-
Violence (accessed 5 May 2017)
Friedman, M., and Friedman, R. (1980). Free to Choose. London: Harvest Harcourt.
Gagliardone, I. et al. (2016). Mechachal: Online Debates and Elections in Ethiopia. From
Hate Speech to Engagement in Social Media. Oxford: Oxford University Press.
Gao, H., Barbier, G., and Goolsby, R. (2011). “Harnessing the Crowdsourcing Power of
Social Media for Disaster Relief,” IEEE Intelligent Systems 26(9): 10–14.
Gartner (2006). “Gartner Hype Cycle: Interpreting Technology Hype,” http://www.gartner.
com/technology/research/methodologies/hype-cycle.jsp (accessed 29/04/17)
Gee, J. (2009). “A Situated Sociocultural Approach to Literacy and Technology,” http://
www.jamespaulgee.com/node/6 (accessed 5 May 2017)
Gibson, J. (1977). “The Theory of Affordances,” in R. Shaw and J. Bransford (eds.),
Perceiving, Acting, and Knowing. Hillsdale, NJ: Lawrence Erlbaum, 67–82.
30. 38
Gigler, B. S. (2011). “Informational Capabilities: The Missing Link for the Impact of ICT
on Development,” E-Transform knowledge platform, Working Paper 1. Washington,
DC: World Bank.
The Guardian (2015). “Media Distortion and Western Bias – Why Do Some Disasters
Attract More Cash,” December 2. https://www.theguardian.com/global-development/
2014/dec/02/students-speak-media-distortion-western-bias-disasters (accessed 28/04/17)
Heeks, R. (2009). The ICT4D 2.0 Manifesto. Manchester: IDPM.
Heise, L., Ellsberg, M., and Gottemoeller, M. (1999). “Ending Violence against Women,”
Population Reports Series L (11). Baltimore, MD: Johns Hopkins University.
Hinduja, S., and Patchin, J. (2007). “Offline Consequences of Online Victimization: School
Violence and Delinquency,” Journal of School Violence 6(3): 89–112.
Hirth, H., Hossfeld, T., and Tran-Gia, P. (2011). Human Cloud as Emerging Internet
Application – Anatomy of the Microworkers Crowdsourcing Platform. Research Report
478, University of Wuerzburg.
Hofmann, M., and Jamal, A. (2014). “How Islam Mattered in the Arab Uprisings,”
The Monkey Cage, July 17. https://www.washingtonpost.com/news/monkey-cage/wp/
2014/07/17/how-islam-mattered-in-the-arab-uprisings/?utm_term=.f23698a873f8
(accessed 5 May 2017)
International Peace Institute (2013). New Technology and the Prevention of Violence and
Conflict. New York: International Peace Institute.
International Telecommunications Union (2013). ICT as an Enabler for Smart Water Man-
agement. Geneva: International Telecommunications Union.
International Telecommunications Union (2013). The ICT Opportunity for a Disability-
Inclusive Development Framework. Geneva: International Telecommunications Union.
International Telecommunications Union (2016). ICT Facts and Figures 2016. Geneva:
International Telecommunications Union.
Javdani, S. (2017). “E-Responder Aims to Stop Real World Violence that Start Online,”
New York University. http://steinhardt.nyu.edu/site/ataglance/2017/02/e-responder-
developed-by-the-citizens-crime-commission-and-nyu-steinhardt-aims-to-stop-real-world-
violence-that-starts-online.html (accessed 20/03/17)
Justino, P., and Stojetz, W. (2018). “On the Legacies of Wartime Governance,” Households
in Conflict Working Paper Series.
Kadivar, J. (2015). “A Comparative Study of Government Surveillance of Social Media and
Mobile Phone Communications during Iran’s Green Movement (2009) and the UK
Riots (2011),” tripleC 13(1): 169–191.
Kalyvas, S. (2006). The Logic of Violence in Civil War. Cambridge: Cambridge University
Press.
Ketchley, N. (2016). Egypt in a Time of Revolution. Cambridge: Cambridge University
Press.
Kleine, D. (2013). Technologies of Choice? ICTs, Development and the Capabilities
Approach. Cambridge, MA: MIT Press.
Lerman, J. (2013). “Big Data and its Exclusions,” Stanford Law Review Online 66: 55–63.
Luckham, R. (2017). “Whose Violence, Whose Security? Can Violence Reduction and Se-
curity Work for Poor, Excluded and Vulnerable People?,” Peacebuilding 5(2): 99–117.
MacAskill, E. (2015). “British Army Creates a Team of Facebook Warriors,” January 31.
https://www.theguardian.com/uk-news/2015/jan/31/british-army-facebook-warriors-
77th-brigade (accessed 27/04/17)
31. 39
Madianou, M., Longboan, L., and Ong, J. (2015). “Finding a Voice through Humanitarian
Technologies? Communication Technologies and Participation in Disaster Recovery,”
International Journal of Communication 9: 3020–3038.
Makinen, M., and Wanu Kuira, M. (2008). “Social Media and Postelection Crisis in Kenya,”
International Journal of Press & Politics 13(3): 328–335.
Marchais, G. (2016). He Who Takes the Weapon Becomes Other: A Study of Participation
in Armed Groups in South Kivu, Democratic Republic of the Congo. Unpublished PhD
thesis, London School of Economics and Political Science.
Masad, D. (2013). “How Computers Can Help Us Track Violent Conflicts v Including
Right Now in Syria,” July 9, http://themonkeycage.org/2013/07/09/how-computers-can-
help-us-track-violent-conflicts-including-right-now-in-syria/ (accessed 5 May 2017)
McDoom, O. (2013). “Who Killed in Rwanda’s Genocide? Micro-Space, Social Influence
and Individual Participation in Intergroup Violence,” Journal of Peace Research 50(4):
453–467.
Meier, P. (2012). Do Liberation Technologies Change the Balance of Power between
Repressive States and Civil Society? Unpublished PhD thesis, Fletcher School of Law
and Diplomacy.
Monroy-Hernandez, A. and Palacios, L. (2014). “Blog del Narco and the Future of Jour-
nalism,” Culture and Society 79(2): 85–96.
Moule, R. K., Decker, S. H., and Pyrooz, D. C. (2016). “Technology and Conflict: Group
Processes and Collective Violence in the Internet Era,” Crime, Law and Social Change
68(1/2): 47–73.
Moreno, A., Garrison, P., and Bhat, K. (2017). “WhatsApp for Monitoring and Response
during Critical Events: Aggie in the Ghana 2016 Election,” Proceedings of the 14th
ISCRAM Conference, Albi, France, May, 1–11.
O’Donnell, A. (2015). “A Rights Based Approach to Responsible Data,” Oxfam, http://
policy-practice.oxfam.org.uk/blog/2015/08/a-rights-based-approach-to-treating-data-
responsibly (accessed 5 May 2017)
OECD (2009). Preventing Violence, War and State Collapse: The Future of Conflict Early
Warning and Response. Paris: Organisation of Economic Cooperation and Development.
Office for the Coordination of Humanitarian Actions (2013). Humanitarianism in the Net-
work Age. New York: United Nations Office for the Coordination of Humanitarian
Affairs.
Okolloh, O. (2009). “‘Ushahidi or ‘Testimony’: Web 2.0 Tools for Crowdsourcing Crisis
Information,” Participatory Learning and Action 59: 65–70.
Orton, K. (2015). “As Another Activist Is Murdered, the Least We Owe ‘Raqqa Is Being
Slaughtered Silently’ Is Our Attention,” December 17. https://www.independent.co.uk/
voices/the-activists-of-raqqa-is-being-slaughtered-silently-pay-with-their-lives-to-expose-
isis-the-least-a6777601.html (accessed 5 May 2017)
Oxfam (2015). “Oxfam Responsible Program Data Policy.” http://policy-practice.oxfam.
org.uk/publications/oxfam-responsible-program-data-policy-575950 (accessed 5 May 2017)
Peuchaud, S. (2014). “Social Media Activism and Egyptians’ Use of Social Media to
Combat Sexual Violence,” Health Promotion International 29(1): 113–120.
Pew Research (2013). “Twitter Reaction to Events Often at Odds with Overall Public
Opinion,” March 4. http://www.pewresearch.org/2013/03/04/twitter-reaction-to-events-
often-at-odds-with-overall-public-opinion/ (accessed 5 May 2017)
Pieterse, J. (2010). Development Theory. London: SAGE.
32. 40
Piketty, T. (2014). Capital in the Twenty-First Century. Cambridge, MA: Harvard University
Press.
Postmes, T., and Brunstig, S. (2002). “Collective Action in the Age of the Internet: Mass
Communication and Online Mobilisation,” Social Science Computer Review 20(3):
290–301.
Poveda, S. (2016). Conscientisation and Human Development: The Case of Digital Inclusion
Programmes in Brazil. Unpublished PhD thesis, University of London.
Price, M., Klinger, J., and Ball, P. (2013). “Preliminary Statistical Analysis of Documen-
tation of Killings in the Syrian Arab Republic,” Benetech Human Rights Program,
http://www.ohchr.org/Documents/Countries/SY/PreliminaryStatAnalysisKillingsInSyri
a.pdf (accessed 5 May 2017)
Read, R., Taithe, B., and Mac Ginty, R. (2016). “Data Hubris? Humanitarian Information
Systems and the Mirage of Technology,” Third World Quarterly 37(8): 1314–1331.
Reuters (2016). “Congo Asks Companies to Block Social Media before anti-Kabila Protests,”
December 15. http://www.reuters.com/article/us-congo-politics-telecoms-idUSKBN144
20M (accessed 5 May 2017)
Roberts, T. (2017). “Digital Technologies Exclude,” May 2. http://www.makingallvoices
count.org/blog/digital-technologies-exclude/ (accessed 5 May 2017)
Rudner, M. (2017). “Electronic Jihad: The Internet as Al Qaeda’s Catalyst for Global Terror,”
Studies in Conflict Terrorism 40(1): 10–23.
Salathé, M. et al. (2012). “Digital Epidemiology,” PLoS Computational Biology 8(7):
e1002616.
Sambuli, N., Crandall, A., Costello, P., and Orwa, C. (2013). Viability, Verification, Validity:
3Vs of Crowdsourcing. Nairobi: iHub Research
Sanchez de la Sierra, R. (Forthcoming). “On the Origins of States: Stationary Bandits and
Taxation in Eastern DRC.”
Schutte, S., and Weidmann, N. (2011). “Diffusion Patterns of Violence in Civil Wars,”
Political Geography 30(3): 143–152.
Sen, A. (1999). Development as Freedom. Oxford: Oxford University Press.
Skalli, L. (2014). “Young Women and Social Media against Sexual Harassment in North
Africa,” The Journal of North African Studies 19(2): 244–258.
Skjelsbaek, I. (2012). The Political Psychology of War Rape. London: Routledge.
Specht, D., and Ros-Tonen, M. A. F. (2017). “Gold, Power, Protest: Digital and Social
Media and Protests against Large-scale Mining Projects in Colombia,” New Media &
Society 19(12): 1907–1926.
Statistica (2017). “Global Social Media Statistics.” http://www.smartinsights.com/social-
media-marketing/social-media-strategy/new-global-social-media-research/ (accessed 5
May 2017)
Strasser, M. (2013). “Oblivion By Design: Drones and Social Media,” Full Stop Media
Publishing, January 7. http://www.full-stop.net/2013/01/07/blog/max-strasser/ oblivion-
by-design-drones-and-social-media/ (accessed 5 May 2017)
Steinhardt (2017). “E-Responder Aims to Stop Real Work Violence that Starts Online,”
February 6. http://steinhardt.nyu.edu/site/ataglance/2017/02/e-responder-developed-by-
the-citizens-crime-commission-and-nyu-steinhardt-aims-to-stop-real-world-violence-
that-starts-online.html (accessed 5 May 2017)
Stiglmayer, A. (1994). Mass Rape: The War against Women in Bosnia-Herzegovina.
Lincoln, NE, and London: University of Nebraska Press.