These are my slides from the Internet Researcher's Conference (#IR15.0) in Daegu, Korea in October 2014... you can read more about it at my research blog over at www.incitestories.com.au
In the world of Big Data, there has been a lot of the research into creating efficient algorithms that can help us gain statistical insight from the large databases that record much of our life. However, as our digital footprint becomes larger, many databases that were originally considered anonymous can now be re-identified. How do we make sure that doesn't happen?
Online Violence Against Women in Politics - Comparative Trends, Impacts and R...Gabrielle Bardall
Please cite as:
Bardall, Gabrielle. 2019. "Online Violence Against Women in Elections: Comparative Trends, Impacts and Responses". International Foundation for Electoral Systems (IFES). Paper presented at "Breaking Gender Barriers: Taking USAID Programming to the Next Level". Washington, D.C. November 19, 2019.
These are my slides from the Internet Researcher's Conference (#IR15.0) in Daegu, Korea in October 2014... you can read more about it at my research blog over at www.incitestories.com.au
In the world of Big Data, there has been a lot of the research into creating efficient algorithms that can help us gain statistical insight from the large databases that record much of our life. However, as our digital footprint becomes larger, many databases that were originally considered anonymous can now be re-identified. How do we make sure that doesn't happen?
Online Violence Against Women in Politics - Comparative Trends, Impacts and R...Gabrielle Bardall
Please cite as:
Bardall, Gabrielle. 2019. "Online Violence Against Women in Elections: Comparative Trends, Impacts and Responses". International Foundation for Electoral Systems (IFES). Paper presented at "Breaking Gender Barriers: Taking USAID Programming to the Next Level". Washington, D.C. November 19, 2019.
Principles & Guidelines of Social Media - Rules of the Gameshawnbee
A great reference for building enduring relationships with your customers online.
Prepared and Presented by:
Shawn Bhasin
Social Media Marketing
Dr. R. V. Kozinets
Schulich School of Business
Toronto, Canada
Extreme Democracy: Politics And NetworksPaul Schumann
This presentation was session 6 in a 12 part webinar series on the book Extreme Democracy. Extreme democracy is a political philosophy of the information era that puts people in charge of the entire political process. It suggests a deliberative process that places total confidence in the people, opening the policy-making process to many centers of power through deeply networked coalitions that can be organized around local, national and international issues. This seminar covered Politics & Networks: A discussion of the essays of Valdis Krebs (It’s the Conversation Stupid!: The Link Between Social Action & Political Choice), Ross Mayfield (Social Network Dynamics & Participatory Politics), David Weinberger (Broadcasting & the Voter’s Paradox) & Danah Boyd (Social Technology & Democracy). Pages 112 – 190
Principles & Guidelines of Social Media - Rules of the Gameshawnbee
A great reference for building enduring relationships with your customers online.
Prepared and Presented by:
Shawn Bhasin
Social Media Marketing
Dr. R. V. Kozinets
Schulich School of Business
Toronto, Canada
Extreme Democracy: Politics And NetworksPaul Schumann
This presentation was session 6 in a 12 part webinar series on the book Extreme Democracy. Extreme democracy is a political philosophy of the information era that puts people in charge of the entire political process. It suggests a deliberative process that places total confidence in the people, opening the policy-making process to many centers of power through deeply networked coalitions that can be organized around local, national and international issues. This seminar covered Politics & Networks: A discussion of the essays of Valdis Krebs (It’s the Conversation Stupid!: The Link Between Social Action & Political Choice), Ross Mayfield (Social Network Dynamics & Participatory Politics), David Weinberger (Broadcasting & the Voter’s Paradox) & Danah Boyd (Social Technology & Democracy). Pages 112 – 190
A Dissertation Submitted in Partial Fulfillment of the Requirements For the M...Ephraim Mwendamseke
Dissertation Submitted in Partial Fulfillment of the Requirements For the Master of Science in Natural Resources Management of the University Of Dodoma University of Dodoma November, 2016
Cadastre Information System (Brochure ENG)Fernando Gil
In summary, FBSIC enable to maintain an organized and structured database, which identifies
land property in all its aspects - physical, descriptive, legal and tax – allowing to relate
information concerning the owner (documental and alphanumeric) to property (topographic, cartographic, physical, documental and alphanumeric).
encircle.io brings to you how museums can use beacon technology to engage their visitors better. Also use the visitor data to understand their behaviour.
Imágenes de algunos de los proyectos que se realizan en el curso online de "50 formas de envejecer materiales", que se realiza en el blog "encuadernacionalpoder" de Ojodeva
Media Education in the Era of Algorithmic Personalization: Facing Polarizati...Renee Hobbs
Keynote address at the INTERNATIONAL CONFERENCE AND TRAINNING
ON DIGITAL AND MEDIA EDUCATION
PRELIMINARY PROGRAM
Cluj-Napoca, Romania, October 25-28, 2023
A presentation for my social media class at the University of Nebraska-Omaha on the topic of polarization on social media, and the effects of echo chambers on online political discussions
Authoritarian and Democratic Data Science in an Experimenting Societynatematias
How will the role of data science in democracy be transformed as software expands the public’s ability to conduct our own experiments at scale? In the 1940s-70s, debates over authoritarian uses of statistics led to new paradigms in social psychology, management theory, and policy evaluation. Today, large-scale social experiments and predictive modeling are reviving these debates. Technology platforms now conduct hundreds of undisclosed experiments per day on pricing and advertising, and the algorithms that shape our social lives remain opaque to to the public. Democratic methods for data science may offer an alternative to this corporate libertarian paternalism.
In this talk, hear about the history and future of democratic social experimentation, from Kurt Lewin and Karl Popper to Donald Campbell. You’ll also hear about CivilServant, software that supports communities to conduct their own experiments on algorithms and social behavior online.
http://cmsw.mit.edu/event/nathan-matias-authoritarian-democratic-data-science-experimenting-society/
"Understanding Broadband from the Outside" - ARNIC Seminar April1 08ARNIC
"Understanding Broadband from the Outside"
Ricardo Ramírez
Freelance researcher and consultant, adjunct professor at the University of Guelph, Ontario, Canada
http://arnic.info/ramirezseminar.php
This is an invited talk I presented at the University of Zurich, speakers' series 2.10.2017. The presentation is based on the following paper: Brandtzaeg, P. B., & Følstad, A. (2017). Trust and distrust in online fact-checking services. Communications of the ACM. 60(9): 65-71
Nadia naffi-Learning About Oneself an Essential Process to Confront Social Me...Nadia Naffi, Ph.D.
Civic educators, social workers, curriculum developers, policy makers and parents concerned with the takeover of social media by hate speech proponents can apply these findings and help youth withstand manipulation and fight racism, hate speech, radicalization, and cyberbullying through the Get Ready to Act Against Social Media Propaganda model generated by this study. The model includes five iterative stages: Question, analyze, design, prepare and evaluate.
The corresponding video is at https://youtu.be/ztNHKLTHBrA AIISC conducts foundational and translational research in AI. In this talk, we review part of the AIISC's research in Social Good, Social Harm, and Public Health.
This talk was given to the UofSC College on Information and Communication.
Additional project details at http://wiki.aiisc.ai
ORIGINAL ARTICLEWhen Twitter Fingers Turn to Trigger Finge.docxhoney690131
ORIGINAL ARTICLE
When Twitter Fingers Turn to Trigger Fingers: a Qualitative Study
of Social Media-Related Gang Violence
Desmond U. Patton1 & David Pryooz2 & Scott Decker3 & William R. Frey1 & Patrick Leonard1
# Springer Nature Switzerland AG 2019
Abstract
Mounting evidence suggests that social media can exacerbate tensions among gangs that ultimately lead to violence, but serious
questions remain about precisely how conflict online translates to conflict offline. The purpose of this study is to examine the
ways in which gang violence can be mediated by the Internet. We conducted a sociolinguistic study with 17 Black males between
the ages of 14–24 who self-identified at the time of the study as having current or former gang involvement to determine how
online provocations may generate offline violence. We examine the sociolinguistic patterns of two prominent gangs on Chicago’s
South Side and use qualitative interviews and a vignette methodology to gather in-depth information into the nature of Internet-
mediated gang violence from multiple perspectives. We identified three forms of social media communication that were
interpreted as threating by participants: dissing, calling, and direct threats. We developed a framework for understanding
participant responses to tweets and the potential for violence that is a consequence of such posts. Lastly, we highlight racial
decoding and importance of context when interpreting the social media communication of Black and Latino youth. This study has
important implications for the prevention of gang violence that is amplified by social media communication. Findings can be
used to initiate conversations between researchers and practitioners regarding the role of social media for prevention and the
ethical use of such tools, particularly for marginalized populations.
Keywords Gangs . Youth . Social media . Crime . Neighborhood effects
Mounting evidence suggests that social media can catalyze
and amplify hostile relationships among youth and gang fac-
tions who have longstanding tensions in the community often
resulting in serious injury and homicide (Patton et al. 2016a, b,
2017a, b). An emerging body of research suggests that social
ties and interactions of gang-involved youth play out on social
media. Despite the important role social media plays in peri-
odic surges and steady persistence of youth violence, little
extant research attempts to understand how youth perceive,
categorize, and react to aggressive and potentially threatening
social media posts. Therefore, a crucial challenge for
researchers and practitioners working with gang-involved
youth is to determine the conditions where social media use
can lead the youth to become involved in violence, either as
victims or perpetrators (Patton et al. 2017c). This article fills a
significant gap by asking formerly gang-involved youth in
Chicago to interpret communication on Twitter from two
prominent crews on Chicago’s South Side. We used a quant.
Communication Theories - Knowledge Gap & Modernization Theory Alyssa G. Lobo
This presentation discusses two communication theories - Knowledge Gap (Tichenor, Donohue & Olien, 1970) and Modernization Theory (Marks, 2014). We apply these theories through an examination of contemporary uses of social media across the globe. In India, the rise of the internet has led to the rise of "semi-arranged marriages" (Jejeebhoy et al., 2013) and a growing dating culture. In Africa, we examine how young people use social media to fulfill information needs (GeoPoll Rapid Survey, February 2017). With respect to the Knowledge Gap , we look at if education and social standing really do affect political awareness and activism, and if social media can actually help bridge socio-economic gap.
Media Literacy, Artificial Intelligence and American ValuesRenee Hobbs
Delivered at the Holland Symposium at Angelo State University, February 15, 2024.
Digital tools are used to create a tsunami of entertainment, information, and persuasion that floods into our daily lives because media messages influence knowledge, attitudes, beliefs and behaviors. Some people are overwhelmed and others are exhilarated by the rise of generative AI, which is quickly becoming normative for both creators and consumers alike. At the same time, mistrust and distrust are rising because it’s so easy to use digital media tools to activate strong emotions, simplify information, and attack opponents. Thanks to algorithmic personalization, new forms of propaganda are being created and shared on social media. Tailored to our deepest hopes, fears, and dreams, these messages can, at times, seem irresistible.
But the practice of media literacy education offers a humanistic response to the changing nature of knowledge caused by the rise of big data and its reshaping of the arts, business, the sciences, education, and the humanities. Learn how educators can help learners to ask critical questions that enable people to recognize the subtle forms of manipulation embedded in all forms of symbolic expression. Gain an understanding of the business models and technological affordances of AI, machine learning, and big data in order to distinguish between harmful and beneficial AI tools, texts, and technologies. Learn why creative and critical thinking, when it is combined with intellectual humility and empathy, help people develop the identity of a lifelong learner. When media literacy is embedded in education at all levels, people can find common ground, restore trust, and deepen respect for the shared human values of care and compassion.
BIOGRAPHY
Renee Hobbs is one of the world’s leading experts on media literacy education. She is Founder of the Media Education Lab, a global online community. Hobbs’s book, Mind Over Media: Propaganda Education for a Digital Age won the 2021 Prose Award for Excellence in Social Sciences from the American Association of Publishers. She began her career by offering the first teacher education program in media literacy education at Harvard Graduate School of Education. She has since inspired a generation of students, teachers, and citizens on four continents who have helped develop a global media literacy movement. As a full professor at the University of Rhode Island, Hobbs has published 12 books and more than 200 scholarly and professional articles. Her engaging talks clearly demonstrate how media literacy can be implemented in home, school, workplace, and community settings. Audiences enjoy Hobbs’ passion and energy and the skillful way she engages people from all walks of life in ways that activate critical thinking about contemporary popular culture and media messages, especially the new types of persuasive genres on social media that may escape people’s scrutiny.
Running head SOCIAL MEDIA AND CHILDREN DEVELOPMENT1SOCIAL MED.docxjeanettehully
Running head: SOCIAL MEDIA AND CHILDREN DEVELOPMENT 1
SOCIAL MEDIA AND CHILDREN DEVELOPMENT 13
Social Media’s Effect on the Development and Learning Stages of A Child
Nisha Cunningham
Felician University
Social Media’s Effect on the Development and Learning Stages of A Child
Annotated Bibliography
Best, P., Manktelowa, R., & Taylor, B. (2014). Online communication, social media, and adolescent wellbeing: A systematic narrative review. Children and Youth Services Review, 27-36.
The article looks into the growing debate about the effects of online social technologies on children and teenagers. Through an in-depth analysis of empirical research, the authors identify both the benefits and harmful effects of social media on young people. The article gives recommendations on how to minimize adverse impacts and increase the positive effects of social media.
Loureiro, K., Solnet, D., Bolton, R. P., Hoefnagels, A., Migchels, N., & Kabadayi, S. (2013). Understanding Generation Y and their use of social media: a review and research agenda. Journal of Service Management, 245-267.
Social media use has several implications for young people. This article refers to today's younger generation as Generation Y. The authors collect information to show the effects of social media on society, organizations, and individuals. Several research questions are derived to explain social media use in a better way.
Hutter, K., Hautz, J., Dennhardt, S., & Füller, J. (2013). The impact of user interactions in social media on brand awareness and purchase intention: the case of MINI on Facebook. Journal of Product & Brand Management, 342-351.
The article analyzes how social media influences the purchase of products. Through an online survey, the authors indicate how individuals can be talked into buying products over the internet. The authors use a mixed-method research method to show how social media has influenced the marketing of products.
Schwendler, I. L., & Trude, A. (2018). Implementation of Text-Messaging and Social Media Strategies in a Multilevel Childhood Obesity Prevention Intervention: Process Evaluation Results. The Journal of Health Care Organization, Provision, and Financing, 187-198.
Social media has been highly attributed to the increase in obesity in young children. Children are spending more time on social media platforms. Physical exercise has dramatically reduced as more children embrace social media and their major entertainment. The article reviews the use of social media in both increasing and lowering obesity prevalence.
Lewin, C., & Greenhow, C. (2016). Social media and education: reconceptualizing the boundaries of formal and informal learning. Journal of Learning, Media and Technology, 6-30.
Social media has several effects on society. Some people have argued that social media has the potential of creating a bridge between formal and informal learning. Social media affects learning at both levels. This article analyzes the use of ...
Similar to Online Harassment Workshop Opening Talk (20)
Artificial Intelligence in Christian Thought and Practicenatematias
Slides from a talk given at Stone Hill Church on November 3, 2018.
If you are interested to learn more you can read our report and discussion guide here: https://medium.com/ai-and-christianity/artificial-intelligence-in-christian-thought-and-practice-20ec8635a94f
Gratitude: Sermon at Sunday Assembly Boston, October 18, 2015natematias
On Sunday, October 18, I gave a sermon on the topic of gratitude at the Boston gathering of Sunday Assembly, a non-theist church. Here are my slides from the talk.
Promising and Problematic Projects with Gender Datanatematias
Classifying people by gender, whether manually or automatically, can offer valuable opportunities to see and address inequities in society. On the other hand, it can also create problems and risks. In this talk, I presented projects that highlight the power and problems of gender data.
Presentation at the Gender Data 4 Change workshop, hosted by the Center for Civic Media, Datakind, and Microsoft in November 2014.
In this talk, I offered an overview of the history and my current work designing systems to crowdsource gender diversity.
Presentation at the Gender Data 4 Change workshop, hosted by the Center for Civic Media, Datakind, and Microsoft in November 2014.
Oliver Hauser on the Behavioural Insights Team, a talk at the Berkman Center ...natematias
How can policymakers conduct randomized trials and incorporate them into their policymaking? Over the summer, Oliver Hauser, a PhD student at Harvard, worked at the Behavioural Insights Team in London, sometimes called the "nudge unit." Yesterday at the Cooperation Working Group that I co-facilitate, Oliver shared with us the work that the nudge unit has done before opening up the conversation for discussion
Networked Tactics for Gender Representation In The Newsnatematias
Slides from a talk I gave at the MIT Knight Civic Media Conference on my thesis, which expands our ability to measure and change gender diversity in the media.
Collaborators:
- @dearsarah
- @ireneros
- @therealprotonk
- @objectgroup
- Sophie Diehl
Full list of 40 collaborators here:
http://civic.mit.edu/blog/natematias/research-is-cooperation-the-40-people-who-made-my-thesis-a-reality
Timelines for Case-Work Collaboration with Citizensnatematias
Saw a great demo by the e-GovPlus people while I was in HT09
So I gave a talk about it at BarCamp Transparency Oxford.
The E-Gov Plus site is: http://www.egovplus.dk/
J. Nathan Matias and David Williams propose an approach to comparison of spatial hypertext collections which avoids becoming entangled in complexities of version management and merging.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
3. liberation of power from the
constricted group of the few to its
rightful place as the wealth of the
information sharing community
charging a mere 25 cents to post
a message significantly raised the
level of discourse, eliminating
many trivial or rude messages
Bruckman, A. (1998). Finding one’s own in cyberspace. High Wired: On the
Design, Use, and Theory of Educational MOOs. Ed. Cynthia Haynes and Jan
Rune Holmevik. Ann Arbor, MI: U of Michigan P, 24.
4. Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of computer-mediated
communication. American psychologist, 39(10), 1123.
refers to the practice of expressing oneself
more strongly on the
computer than one would in other
communication settings
FLAMING
5. Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of computer-mediated
communication. American psychologist, 39(10), 1123.
a "GRIPENET" emerged—organized
complaints against management
practices and policies whose form and
substance deviate considerably from
standard IBM culture
ORGANIZED LABOR
6. The two sides were supposed to listen to expert testimony and come to a friendly agreement;
cartoon from the Cleveland Dealer. Source: Wikipedia
7. Lotan, G., Graeff, E., Ananny, M., Gaffney, D., & Pearce, I. (2011). The Arab Spring | the revolutions were twee
15. Leavitt, A. (2015, February). This is a Throwaway Account: Temporary Technical Identities and
Perceptions of Anonymity in a Massive Online Community. In Proceedings of the 18th ACM
Conference on Computer Supported Cooperative Work & Social Computing (pp. 317-327). ACM.
16. Andalibi, N., Haimson, O. L., De Choudhury, M., & Forte, A. (2016, May). Understanding Social Media
Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. In Proceedings
of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 3906-3918). ACM.
when people seek support in stigmatized
traumatic contexts such as sexual abuse,
they face a trade-off between choosing
anonymity and being potentially identified
17. Doleac, J. L., & Stein, L. C. (2013). The visible hand: Race and online market
outcomes. The Economic Journal, 123(572), F469-F492.
In local online classified advertisements throughout
the US… Black sellers do worse than white sellers
on a variety of market outcome measures:
• They receive 13% fewer responses
• 17% fewer offers
• Conditional on receiving at least one offer,
• black sellers also receive 2-4% lower offers
• buyers corresponding with black sellers exhibit
lower trust:
• They are 17% less likely to include their name in
e-mails,
• 44% less likely to accept delivery by mail
• 56% more likely to express concern about
making a long-distance payment.
18. Duggan, M. (2014). Online harassment. Pew Research Center.
half of those who have experienced online
harassment did not know the person
involved in their most recent incident
19. McMillen, Andrew. Wikipedia Is Not
Therapy: How the online encyclopedia
manages mental illness and suicide
threats in its volunteer community.
Backchannel. Illustration by Laurent Hrybyk
22. Citron, D. K., & Norton, H. L. (2011).
Intermediaries and hate speech: Fostering
digital citizenship for our information age.
Boston University Law Review, 91, 1435.
“a thoughtful and nuanced
intermediary-based
approach to hate speech
can foster respectful
online discourse without
suppressing valuable
expression”
23. MacKinnon, R. (2012). Consent of the
networked: The worldwide struggle for
Internet freedom. Basic Books
“How do citizens make
sure that private agendas
and pursuit of profit do not
erode… democratic
expression?”
27. Cheng, J., Danescu-Niculescu-Mizil, C. & Leskovec, J. (2014). How Community Feedback Shapes User
Behavior. ICWSM 2014.
negative feedback leads to significant
behavioral changes that are detrimental to
the community.
Not only do authors of negatively-evaluated
content contribute more, but also their future
posts are of lower quality, and are perceived
by the community as such.
28. Halfaker, A., Geiger, R. S., Morgan, J. T., & Riedl, J. (2012). The rise and decline of an open collaboration
system: How Wikipedia’s reaction to popularity is causing its decline. American Behavioral Scientist
AI VANDALISM
DETECTION
29. Wulczyn, Ellery, Nithum Thain. Understanding Personal Attacks on Wikipedia.
July 2016 Wikimedia Research Showcase
30. Wulczyn, Ellery, Nithum Thain. Understanding Personal Attacks on Wikipedia.
July 2016 Wikimedia Research Showcase
31. Munger, Kevin. Tweetment Effects on the Tweeted: An Experiment to Reduce Twitter Harassment.
Society for Political Methodology Conference, Washington University, St Louis, July 2015.
32. Kohavi, R., Deng, A., Frasca, B., Walker, T., Xu, Y., & Pohlmann, N. (2013, August). Online controlled
experiments at large scale. In Proceedings of the 19th ACM SIGKDD international conference on
Knowledge discovery and data mining (pp. 1168-1176). ACM.
33.
34. it was the
complications—the
incomplete data sets, the
trolls’ endless
prevarications, the
incessant march of
subcultural change—that
gave rise to my basic
argument
Phillips, Whitney. The Ethnography of
Trolling.Ethnographymatters, January 8 2013.
1973. Idealists at Berkeley install computer terminals in libraries and record stores to create public assess digital communications for their neighborhood.
They talk about supporting the “liberation of power” and the “wealth of the information sharing community.” But let’s look closer at their terminal. It charges 25 cents per post!
As Amy Bruckman, who’s here in the room, has pointed out, even in the earliest days of Internet idealism, they had a problem with people being terrible to each other online.
Ten years later, Sara Kiesler and colleagues start worrying that people might be worse to each other on computers than elsewhere.
And what was the specter that haunted computer communications?
“Gripenet,” the possibility that workers might do labor organizing or try to change their workplace culture using the internet.
Because of course, as we learned in the Coal Miner’s Strikes of 1902, conversations with employers in a democracy always involve considering the evidence and arriving at a friendly agreement over the treatment of workers.
In the thirty years since Kiesler’s article, we’ve come to see the deep power of social technologies to communicate political change
And make visible to us profound social changes in our respect for human dignity and rights as a society
But we’ve also gained remarkable capacities to organize harm, as many in this room have personally experienced, whether you’ve been a target of networks like GamerGate, or some other coordinated harassment.
As digital communications have become a basic part of human life, so has harassment. Maeve Duggan
As much as we need to acknowledge the risk to women and marginalized groups, we also need to recognize that everyone shares these risks— with a greater percentage of men than women reporting that they face physical threats online.
And it’s not just online risks. it Katherine Clark
1993 New Yorker Cartoon by Peter Steiner
As we debate whether anonymity is part of the problem, we should acknowledge new research that shows how important it is for the most vulnerable— with women on reddit being more likely to use strong anonymity protections.
And anonymity playing a key role for people who seek support for sexual abuse
Many choose to be anonymous to be treated fairly and equally
In half of online harassment, anonymity might not be an issue at all — in cases like domestic abuse and bullying, where people know their harassers.
And we have come to know and care for strangers on the Internet. As those bonds grow, we feel their suffering, and we want to protect each other- as Andrew McMillen’s moving article about Wikipedia’s response to mental illness has reminded us.
And so we ask how to respond.
Berkman Klein Colleague Larry Lessig’s work on how to regulate the Internet was prompted by Julian Dibbell’s article on a Rape in Cyberspace.
and 17 years later, we have a complex set of layers that govern what we’re allowed to do online. Here in the room, Alice Marwick and Andy Sellars have written about the relationship between law and online harassment. Many people from platforms are constantly working out policies, often at a rate of several new ones a day. And many of us think about community responses, including Lindsay Blackwell, who’s doing research on peer support with HeartMob.
Right now, platforms are under incredible pressure over the policies and decisions that they make— expected to “solve” online harassment.
And yet at the same time, we’re still in the early days of figuring out what it means for democracies to have our speech regulated by private corporations.
Often, when people come to designers, this is what they want.
They think of us as santa, and what they want might very well escalate our conflicts rather than resolve them.
And what about that dislike button? Ratings and voting are common online, but do they reduce problems?
Cliff Lampe did work in the early 2000s on voting systems, showing how volunteers can actually be good at rating participation. But it’s also possible that these voting systems may not achieve the ends that we hope, as Justin Cheng has found.
Jigsaw and Wikimedia
Any response is ultimately a blend of social and technical, as Kevin Munger’s ongoing experiments show us. Kevin is using social bots to test the effect of responding to racial slurs that people share on Twitter. And much of Susan Benesch’s research has examined this kind of “counter-speech” in the wild.
As we talk about these issues, we need to be thinking about the scale and speed at which online harassment evolves, and the scale of the tools we now have at our disposal for addressing them.
At Microsoft, Ron Kohavi. In day two, we will discuss infrastructures of experimentation
Infrastructures of Understanding. Many of our questions have parallels in debates over digital copyright, which is another fast-evolving area. Last night, I looked up Olympic copyright takedowns on Lumen and saw requests from the Olympic Committee to take down livestreams from the olympics. Periscope is only 18 months old. And Lumen opens up this emerging area of regulation to further discussion.
Adam Holland from Lumen, which was founded 15 years ago as an archive for copyright takedown requests, is helping us understand emerging questions.
However online harassment just something we can put in a test tube. It’s a social phenomenon that is part of wider structures of society and culture. Whitney Phillips started out wanting to understand why Trolls did what they did, and instead wrote about factors in attention economies and contemporary culture that make it mainstream. Her book, which is deeply valuable, came out of wrestling with the incomplete data of her subject.
All of you know that I’ve just *begun* to outline *part* of the conversation about online harassment, the conversation we are here to have. And not just to gain intellectual clarity— though that is one of our goals — but to advance concrete projects that could transform people’s lives in fundamental ways toward collective well-being, justice, and potential as human beings.
Day One: Projects
Day Two: Infrastructures & Enablers
The collective experience, resources, expertise, and wisdom in this room is profound. Each of you has been invited because we believe that you can do something amazing over the next two days. And you already have — I’ve loved the experience of hearing you share your ideas and passions. As we join in conversations, let’s be proactive to look for points of connection or ways that we can support someone else’s work by opening our networks, knowledge, and organizations.
And that means paying attention to who’s NOT in this room as much as who *is* here.
Since not all of us can have our names listed publicly, we are creating a document out of this event that represents the public record of our conversations. That way, if you want to link someone up with a person or a resource, advocate for a project in your organization, or incorporate feedback in your designs. Our report will be a tool to help you bring others into the conversation.
This becomes especially important on day two. By listing out and defining the impacts and projects enabled by a particular infrastructure or collaboration, we support each other to scope those projects well, make them more concrete, and articulate the impact that can come from them.