Sexuality, Sexual and Reproductive Health and Rights, and the Internet

Total Page:16

File Type:pdf, Size:1020Kb

Sexuality, Sexual and Reproductive Health and Rights, and the Internet women’s, gender, and rights perspectives arrow for change in health policies and programmes vol. 22 no. 1 2016 vol. 22 no. 1 2016 issn 1394-4444 Sexuality, Sexual and Reproductive Health and Rights, and the Internet published by the asian-pacific resource & research centre for women editorial 2—6 New Technologies for Safe Safer Nudes! A Sexy Guide to The New Green: Medical Abortion Services Digital Security The Landscapes of Digital Activism The Potential Impact of Free Women’s Bodies on Digital Basics on SRHR Advocacy in Battlegrounds: Networks of Bangladesh Information and Support by spotlight 6—27 Pro-choice Activists in Latin America One and the Other: in our own words 28—33 Fighting Online Gender, Romance, Misogyny, Fighting a and the Internet: The resources from the arrow srhr Corporatised Internet Creation of a Non-Binary, knowledge sharing centre 41—44 Non-Binary Person Minding the Data developed in selected arrow resources 44—46 collaboration with Gap: Data Risks and Is Access Real? Disability, Revolutions in Meeting Sexuality, and the Digital definitions 46-48 the Sustainable Space Development Goals factfile 49—55 Quantifying Fertility and monitoring regional and Reproduction through global activities 34—40 Access, Legislation, and Online Mobile Apps: A Critical Freedom of Expression: A Data published with funding support of Overview Security in Contentious Overview Contexts: Exploring Digital Apps, Drones, and Resilience for Organisations editorial and production team 56 iTunes: Opportunities Serving Sexual and Gender and Challenges in Using Minorities 2 arrow for change editorial vol. 22 no. 1 2016 THE NEW GREEN: The Landscapes of Digital Activism In an episode of the popular American The internet works in a television show Mad Men set in a New York manner inimical to access advertising firm in the 1960s, the family of the protagonist, Don Draper, goes for a picnic in and voice: control exists the park. Once the picnic is over, Draper’s wife in the very architecture Betty picks up the picnic blanket and shakes of the systems that we it out, spilling paper napkins, plates, drink believe enable freedom. bottles, and food waste out onto the grass, Harassment, abuse, then folds the blanket and puts it away. She manipulation, exclusion, dusts off her hands and the family gets into their car leaving a littered field behind them. and discrimination— This shocking little detail reminds the viewer of these experiences that the period the show is set in: environmentally we have known and friendly civic behaviours that are commonplace experienced offline find today—like being conscious of littering, eating their twins online. local, or recycling—were once not. The internet is the new green. The sectors are doing something similar for digital environmental rights movement raised technologies. consciousness about our relationship with, and Surveillance, blocking and filtering, social effects on, the natural environment; and have media, “hashtag activism,” phishing, scams, demonstrated the interrelationships between spam, viruses, online abuse, big data, leaks of actors like states, corporations, communities, personal data, privacy violations, and hacks consumers, and the law in matters of climate have also entered a collective awareness of justice. Activists and advocacy groups in the what it means to be online today. The internet tech-for-change and technology-activism works in a manner inimical to access and voice: control exists in the very architecture of Information technologies the systems that we believe enable freedom. are now part of the Harassment, abuse, manipulation, exclusion, chemistry of activism. and discrimination—these experiences that we The struggle for digital have known and experienced offline find their twins online. Large parts of the internet belong sovereignty and freedoms entirely to corporations that users have no online are not necessarily control over, though businesses profit from new; they are a continuation users. Governments control the infrastructure of existing political of the internet: electromagnetic spectrum, laws struggles. Movements and governing digital access, publishing policies, activisms for “internet even malicious surveillance software that are sometimes deployed against citizen activists freedom” or “digital access” and journalists. should therefore not be isolated from movements What does this mean for activism, political engagement, and human rights defense? What and collective action in are the relationships and interdependencies other areas such as SRHR. influencing the promises of being online: voice, editorial arrow for change 3 vol. 22 no. 1 2016 visibility, and power? This ARROW for Change …sexual health information Notes & References (AFC) issue on sexual and reproductive health is being censored, and and rights (SRHR) and the internet documents some of these dynamics. nudity is being equated 1 Associated Press, “Indonesia Bans Gay with pornography. Emoji and Stickers from Messaging Apps,” Information technologies are now part of The Guardian, February 12, 2016, http:// www.theguardian.com/world/2016/feb/12/ the chemistry of activism. The struggle for indonesia-bans-gay-emoji-and-stickers- from-messaging-apps. digital sovereignty and freedoms online are a total of 5,034 YouTube videos claimed to be not necessarily new; they are a continuation 2 Google Transparency Report, https:// “harmful” to youth with no definition of what www.google.com/transparencyreport/ of existing political struggles. Movements and was considered “harmful.”2 removals/government/notes/?hl=en#autho activisms for “internet freedom” or “digital rity=KR&period=all. 3 access” should therefore not be isolated from Online Censorship is a project that documents 3 Online Censorship, https:// onlinecensorship.org. movements and collective action in other removal of content by technology corporations that own popular social media platforms— 4 Jessica Anderson, Matthew Stender, areas such as SRHR. This AFC is an attempt to Sarah Myers West, and Jillian C. York, narrativise sites of continuity, connection, and Facebook, Google, Instagram, Twitter, and Unfriending Censorship: Insights from YouTube. The project’s aim is to push for Four Months of Crowdsourced Data potential collaboration. on Social Media Censorship, Electronic transparency in how speech is regulated online Frontier Foundation and Visualising by these corporations. From November 2015 Impact, March 2016, https://s3-us-west-1. amazonaws.com/onlinecensorship/ to March 2016, people submitted 186 reports posts/pdfs/000/000/044/original/ …Facebook, Instagram, of takedowns of their social media content on Onlinecensorship.org_Report_-_31_ March_2016.pdf?2016. Twitter, and YouTube these five platforms. Of these, 89 are related 5 For example, The Guardian recently are also sites of abuse to nudity concerns and primarily on Facebook. analysed over 70 million comments in Some broad themes emerged from Online response to articles posted in a ten-year- and harassment, period and showed how its female, LGBT, which affect women Censorship’s early findings: sexual health and Jewish writers were more regularly information is being censored, and nudity is and consistently harassed online. See and sexual minorities here: Becky Gardiner, Mahana Mansfield, being equated with pornography.4 Ian Anderson, Josh Holder, Daan Louter, disproportionately and Monica Ulmanu, “The Dark Side of At the same time, Facebook, Instagram, Guardian Comments,” The Guardian, April compared to the other 12, 2016, https://www.theguardian.com/ populations online; and Twitter, and YouTube are also sites of abuse technology/2016/apr/12/the-dark-side-of- and harassment, which affect women and guardian-comments. yet these are not regulated sexual minorities disproportionately compared 6 J. Nathan Matias, Amy Johnson, Whitney Erin Boesel, Brian Keegan, Jaclyn Friedman, with quite the same vigour. to the other populations online; and yet and Charlie DeTar, “Reporting, Reviewing, these are not regulated with quite the same and Responding to Harassment on Twitter,” Women, Action, and the Media, May 13, vigour. Through these initiatives and high- 2015. http://womenactionmedia.org/ Speech Acts. A significant dynamic of the profile cases of online harassment, there has twitter-report. internet is the struggle to use it as a platform been a mainstream discussion of its scale 7 See Gender and Tech Resources, “Complete Manual,” https://gendersec. 5 for speech and expression, sexual speech and and effects. In 2014, research by Women, tacticaltech.org/wiki/index.php/Complete_ content in particular. However, States and Action, and Media, in partnership with manual#Counterspeech for an extensive list of feminist counterspeech actions and technology corporations emerge as partners Twitter, demonstrated that in 800 reports of projects. in the regulation of sexual speech and content harassment, 27% were about hate speech, 12% online. For example, as part of a wider about threats of violence, and 22% were to do suppression of LGBT communities, in February with doxxing (uncovering details of the user’s 2016, Indonesia’s Communications Ministry identity and location, and sharing this as an banned gay emoji stickers in messaging incitement to violence offline).6 applications like Line and WhatsApp, as well In the past few years, there have been new as on larger social media platforms.1 Other guides and toolkits to help internet users states in the region, anxious to maintain control mitigate harassment online.
Recommended publications
  • Content Regulation in the Digital
    Content Regulation in the Digital Age Submission to the United Nations Special Rapporteur on the Right to Freedom of Opinion and Expression by the Association for Progressive Communications (APC) February 2018 Introduction 1 I. Company compliance with State laws 2 Terrorism-related and extremist content 3 False news, disinformation and propaganda 4 The “right to be forgotten” framework? 7 How should companies respond to State content regulation laws and measures that may be inconsistent with international human rights standards? 8 II. Other State Requests 9 State requests based on platform terms of service (ToS) and “shadow” requests 9 Non-transparent agreements with companies 10 III. Global removals 11 IV. Individuals at risk 12 V. Content regulation processes 15 VI. Bias and non-discrimination 16 VII. Appeals and remedies 17 VIII. Automation and content moderation 17 IX. Transparency 18 X. General recommendations from APC 19 Introduction The Association for Progressive Communications (APC) is an international network and non- profit organisation founded in 1990 that works to help ensure everyone has affordable access to a free and open internet to improve lives, realise human rights and create a more just world. We welcome this topic because it is current and integral to our work. On the one hand there is a lot of ‘noise’ in the mainstream media about so-called “fake news” and what appears to be a fairly rushed response from platforms consisting of increasing in-house regulation of content. On the other hand, human rights defenders and activists we work with express concern that 1 platforms are removing some of their content in a manner that suggests political bias and reinforcing of societal discrimination.
    [Show full text]
  • Claiming and Reclaiming the Digital World As a Public Space
    Claiming and Reclaiming the Digital World as a Public Space Experiences and insights from feminists in the Middle East and North Africa www.oxfam.org OXFAM DISCUSSION PAPER – NOVEMBER 2020 This paper seeks to highlight the experiences and aspirations of young women and feminist activists in the MENA region around digital spaces, safety and rights. It explores individual women’s experiences engaging with the digital world, the opportunities and challenges that women’s rights and feminist organizations find in these platforms, and the digital world as a space of resistance, despite restrictions on civic space. Drawing on interviews with feminist activists from the region, the paper sheds light on women’s online experiences and related offline risks, and illustrates patterns and behaviours that prevailed during the COVID-19 pandemic. © Oxfam International November 2020 This paper was written by Francesca El Asmar. Oxfam acknowledges the assistance of Hadeel Qazzaz, Manal Wardé, Neus Tirado Gual, Salma Jrad, Joane Cremesty, Suzan Al Ostaz, Fadi Touma and Mounia Semlali in its production, as well as the contributions of the interviewees who participated in the research process. It is part of a series of papers written to inform public debate on development and humanitarian policy issues. For further information on the issues raised in this paper please email [email protected] This publication is copyright but the text may be used free of charge for the purposes of advocacy, campaigning, education, and research, provided that the source is acknowledged in full. The copyright holder requests that all such use be registered with them for impact assessment purposes.
    [Show full text]
  • Intellectual Privacy and Censorship of the Internet
    Georgetown University Law Center Scholarship @ GEORGETOWN LAW 1998 Intellectual Privacy and Censorship of the Internet Julie E. Cohen Georgetown University Law Center, [email protected] This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/1963 8 Seton Hall Const. L.J. 693 (1997-1998) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the First Amendment Commons, and the Intellectual Property Law Commons 1998 INTERNET SYMPOSIUM INTELLECTUAL PRIVACY AND CENSORSHIP OF THE INTERNET ProfessorJulie E. Cohen Good morning. I would like to thank the Constitutional Law Journal for inviting me to be here today. I am not a First Amendment lawyer. I am not really a constitutional law- yer, so why am I here? I think that after having heard Dan Burk's presenta- tion, you should realize that intellectual property lawyers need to be First Amendment lawyers as well. You have all heard the aphorism that the Internet interprets censorship as a malfunction and routes around it.' You also may have heard that censorship on the Internet is a terrible thing; in particular, you may have heard this in the context of debates about pornography on the Inter- net or hate speech on the Internet. I would like to suggest to you today, how- ever, that the single most prevalent problem involving censorship on the Inter- net has to do with the protection of intellectual property. If you think about it, intellectual property protection, and particularly copy- right protection, is a form of censorship.
    [Show full text]
  • The Right to Privacy in the Digital Age
    The Right to Privacy in the Digital Age April 9, 2018 Dr. Keith Goldstein, Dr. Ohad Shem Tov, and Mr. Dan Prazeres Presented on behalf of Pirate Parties International Headquarters, a UN ECOSOC Consultative Member, for the Report of the High Commissioner for Human Rights Our Dystopian Present Living in modern society, we are profiled. We accept the necessity to hand over intimate details about ourselves to proper authorities and presume they will keep this information secure- only to be used under the most egregious cases with legal justifications. Parents provide governments with information about their children to obtain necessary services, such as health care. We reciprocate the forfeiture of our intimate details by accepting the fine print on every form we sign- or button we press. In doing so, we enable second-hand trading of our personal information, exponentially increasing the likelihood that our data will be utilized for illegitimate purposes. Often without our awareness or consent, detection devices track our movements, our preferences, and any information they are capable of mining from our digital existence. This data is used to manipulate us, rob from us, and engage in prejudice against us- at times legally. We are stalked by algorithms that profile all of us. This is not a dystopian outlook on the future or paranoia. This is present day reality, whereby we live in a data-driven society with ubiquitous corruption that enables a small number of individuals to transgress a destitute mass of phone and internet media users. In this paper we present a few examples from around the world of both violations of privacy and accomplishments to protect privacy in online environments.
    [Show full text]
  • Annual Report 2017
    101110101011101101010011100101110101011101101010011100 10111010101110110101001 10101110001010 EDRi EUROPEAN DIGITAL RIGHTS 110101011101101010011100101011101101010011100101 10101110110101000010010100EUROPEAN010 DIGITAL001 RIGHTS11011101110101011101101100000100101101000 DEFENDING RIGHTS AND FREEDOMS ONLINE 01000111011101110101 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101 101110101010011100 101110101011101101010011100 101011101101010000100101000100011101 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101 101110101010011100 101110101011101101010011100 1010111011010100001001010001000111011101110101011101101100000 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101 101110101010011100 101110101011101101010011100 10101110110101000010010100010001110111011101010111011011000001001011010000100011101110111010 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101 101110101010011100 101110101011101101010011100 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101 101110101010011100 101110101011101101010011100 EUROPEAN DIGITAL RIGHTS EUROPEAN DIGITAL RIGHTS ANNUAL REPORT 2017 1011011101101110111010111011111011 January 2017 – December 2017 1011011101101110111011101100110111 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101 101110101010011100 101110101011101101010011100 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101
    [Show full text]
  • 00047-82167.Pdf (548.01
    CYVA Research Corporation Abstract Data Slave Trade An Argument for the Abolition of Digital Slavery: The Intrusive & Coercive Collection and Trafficking Of Personal Information for Profit and Power For a Better Union of Social, Economic and Political Liberty, Justice and Prosperity Recognize and Secure the Mutual Rights & Responsibilities of Human-digital Existence Contact: Kevin O’Neil Chairman & CEO 858 793 8100 [email protected] This Abstract (“Abstract”) and the contents herein are owned by CYVA Research Corporation (“CYVA”, “we”, “our”, “us”, or the “Company”) and are being furnished solely for informational purposes. The information contained herein is intended to assist interested parties in making their own evaluations of CYVA. This Abstract does not purport to contain all information that a prospective investor might need or desire in properly evaluating the Company. In all cases, interested parties should conduct their own investigation and analysis of the Company. By accepting this Abstract, each recipient agrees to keep confidential the information contained herein or made available in connection with further investigation of the Company. Each recipient agrees not to reproduce or disclose any such information, in whole or part, to any individual or entity, without the prior written consent of the Company. DRAFT Abstract DRAFT Table of Contents Document Audience, Structure and Purpose 4 Preface 5 Slave Trade Metaphor 5 Network Community 6 1. Introduction: The Data Slave Trade 7 1.1. Our Human Dignity - What Dignity? 7 1.2. Data Protection Laws: Unending Catch-up Game 8 1.3. Awakening: Informational Self-determination 8 1.4. Privacy and Human Dignity Taking a Back Seat to Profits and Power: Recognition and Resistance 9 1.5.
    [Show full text]
  • Children's Rights in the Digital
    Children’s Rights in the Digital Age A download from children around the world Amanda Third Delphine Bellerose Urszula Dawkins Emma Keltie Kari Pihl 1 | Children’s Rights in the Digital Age: A download from children around the world “We have to concern ourselves with listening to children. We [need to] see [their] perspectives, and those of the practitioner or researcher, as not in competition but standing together in the construction of dialogues, in which there is mutual respect, active participation and the negotiation and co-construction of meaning. Listening to children and encouraging their participation in research, evaluation, decision making and planning is important for many reasons [including] empowering children as learners, enabling them to make choices, express their ideas and opinions and develop a positive sense of self [and] the benefits of their participation to society as a whole and for the development of citizenship.” Pascal & Bertram, 2009: 254 Cover image Philip Chan,UNICEF Australia Young Ambassador and member of the Young and Well Cooperative Research Centre’s Youth Brains Trust, at a Youth Brains Trust workshop held in Melbourne, Australia, in February 2014. Photo by Oli Sansom. 2 | Children’s Rights in the Digital Age: A download from children around the world Children’s Rights in the Digital Age A download from children around the world Amanda Third1 Delphine Bellerose2 Urszula Dawkins3 Emma Keltie4 Kari Pihl5 1 Principal Research Fellow, Institute for Culture and Society 2 Research Assistant, Institute for Culture and Society 3 Writer and Editor, lightblue.com.au 4 Research Assistant, Institute for Culture and Society 5 Research Assistant, Institute for Culture and Society Second edition Suggested citation: Third, Amanda, et al., ‘Children’s Rights in the Digital Age: A Download from Children Around the World’, Young and Well Cooperative Research Centre, Melbourne, 2014.
    [Show full text]
  • Digital Technologies and Parenting Education Susan K
    Digital Technologies and Parenting Education Susan K. Walker, PhD University of Minnesota [email protected] UN DESA May 14, 2021 1 • Image of quote by Wilma Mankiller UN DESA May 14, 2021 2 Looking the future On one hand… Yet, on the other…. • Greater convenience & • Growing social and racial efficiencies (‘tele-everything’, inequality, worsening security ”smart’ devices, AI boom) and privacy and further spread • Opportunities for personal of misinformation expression, creativity. • Peoples’ mental health will be • Work as more flexible, less challenged bounded by time or place • Job insecurities due to • Adaptable worker skills valued employment shifts to automation, on-demand work Anderson, J., et al, (2021, February 18). Experts say the “New Normal” in 2025 will be far more tech-driven, presenting more challenges. https://www.pewresearch.org UN DESA May 14, 2021 3 UN DESA May 14, 2021 4 Photo credit: Brenda Ann Kenneally @ NYTimes. The most important question we must ask ourselves is, ‘are we being good ancestors’? - Jonas Salk, polio vaccine pioneer The ultimate effects of technology will be determined by technical capabilities and by how technology is used, how individuals, organizations, and policy makers prepare for/respond to shifts in economic/social landscape. National Academies of Science (2017): IT and the US Workforce: Where do we go from here? UN DESA May 14, 2021 5 Bronfenbrenner’s bioecological perspective on human development • Development as influenced by interactions of the person- in process and context – over time. • Systems that the individual interacts with directly and indirectly influence development. Credit: Hchokr at English Wikipedia, CC BY-SA 3.0 UN DESA May 14, 2021 6 Internet access and use varies around the world.
    [Show full text]
  • Digital Rights Are Human Rights
    1 DFF celebrated Human Rights Day 2020 with a count- down that kicked off on 24 November and ran until 10 December. Each day for 16 days, we published a short article illustrating how digital rights are human rights. Each bite size post was written by an esteemed guest author in our network. Collectively, the series shows how the 1948 Universal Declaration of Human Rights remains relevant today, with the digital age presenting many new and urgent challenges to our human rights. The mini-series was inspired by the excellent Privacy Matters project from Privacy International. List of Contributors Sarah Chander European Digital Rights (EDRi) Rasha Abdul Rahim Amnesty Tech Chloe Setter Global Alliance (WPGA) Samantha Newbery University of Salford Griff Ferris Fair Trials Ilia Siatitsa Privacy International Lea Beckmann Gesellschaft Freiheitsrechte (GFF) Ivan Stepanov Max Planck Institute for Innovation and Competition David Kaye University of California Ilia Siatitsa Privacy International Nora Mbagathi Open Society Justice Initiative Jedrzej Niklas Data Justice Lab James Farrar Worker Info Exchange Lotte Houwing Bits of Freedom Jen Persson defenddigitalme Adele Vrana and Anasuya Sengupta Whose Knowledge? 2 The right to equal enjoyment of human rights UDHR Articles 1-2 By Sarah Chander, Senior Policy Advisor at European Digital Rights (EDRi). Articles 1 and 2 of the Universal Declaration of target and experiment on communities at the Human Rights tell us that all human beings are margins. In the world of work, the roll-out of a equal. Unfortunately, we know that in our world, range of automated decision-making systems has we are still a long way from realising these rights.
    [Show full text]
  • Digital Rights Issues
    ALA American Library Association Digital Rights Issues The purpose of DRM technology is to control access to, track and limit uses of digital works. These controls are normally imbedded in the work and accompany it when it is distributed to the consumer. DRM systems are intended to operate after a user has obtained access to the work. It is in this “downstream” control over consumer use of legitimately acquired works that DRM presents serious issues for libraries and users. DRM technology is new and evolving. Different schemes are being proposed, developed in the laboratory, and experimented with in the marketplace. In general, these technologies are intended to be flexible and to provide a wide range of options to the content provider, but not the user or licensee. Importantly, DRM technology can have profound effects on a wide range of policy issues, including intellectual property, privacy, access to government information, and security. As a consequence, it will be very important for Congress to carefully consider the impacts on many different constituencies, including libraries. Key concerns for libraries The principal policy issues for libraries and schools are not derived from DRM technology, itself, but from the business models the content industry chooses to enforce. DRM has uses far beyond simply enforcing traditional and long-standing protections extant in current law. By embedding controls within the product, providers can prevent the public from use that is non-infringing under copyright law as well as enforce restrictions that extend far beyond those specific rights enumerated in the Copyright Act (or other laws). Thus, DRM changes the fundamental relationship between the creators, publishers, and users, to the detriment of creators, users, and the institutions that serve them.
    [Show full text]
  • Principles on Freedom of Expression and Copyright in the Digital Age 2013
    The Right to Share: Principles on Freedom of Expression and Copyright in the Digital Age 2013 International Standards Series ARTICLE 19 Free Word Centre 60 Farringdon Road London EC1R 3GA United Kingdom T: +44 20 7324 2500 F: +44 20 7490 0566 E: [email protected] W: www.article19.org Tw: @article19org Fb: facebook.com/article19org ISBN: 978-1-906586-44-7 © ARTICLE 19, 2013 ARTICLE 19 encourages organisations and individuals to endorse The Right to Share Principles. We also encourage feedback about how The Right to Share Principles are being used - please send feedback or endorsements to [email protected], with your name, affiliation and comments. This work is provided under the Creative Commons Attribution-Non-Commercial-ShareAlike 2.5 licence. You are free to copy, distribute and display this work and to make derivative works, provided you: 1) give credit to ARTICLE 19; 2) do not use this work for commercial purposes; 3) distribute any works derived from this publication under a licence identical to this one. To access the full legal text of this licence, please visit: http://creativecommons.org/licenses/by-nc-sa/2.5/legalcode. ARTICLE 19 would appreciate receiving a copy of any materials in which information from this report is used. This document has been published with support of the Adessium Foundation of The Netherlands, as part of their wider support for ARTICLE 19’s work on freedom of expression and internet communications technology. 1 Contents Introductory statement 2 Preamble 4 SECTION I – General Principles 6 Principle 1:
    [Show full text]
  • Big Data and Sexual Surveillance
    APC ISSUE PAPERS BIG DATA AND SEXUAL SURVEILLANCE By Nicole Shephard KEYWORDS: surveillance, gender, sexuality, race, big data, LGBTIQ, women human rights defenders, privacy, anonymity, consent of surveillance. In addition to exposing and addressing SUMMARY algorithmic discriminations, feminist data practices oppose the non-consensual collection of data, amplify participatory urveillance has historically functioned as an op- data projects that empower women and sexual minorities, pressive tool to control women’s bodies and is and protect the data, privacy and anonymity of activists and closely related to colonial modes of managing the communities they work with. populations. Big data, metadata and the tech- nologies used to collect, store and analyse them are by no means neutral, but come with their own exclusions and biases. This paper highlights the gendered and racialised effects of data practices; outlines the overlap- MAIN CONCEPTS ping nature of state, commercial and peer surveillance; and maps the challenges and opportunities women and queers Big data: Vast datasets containing social media data, encounter on the nexus between data, surveillance, gen- machine data or transactional data that can be analysed der and sexuality. Vulnerable communities as well as sexual computationally to reveal patterns, trends and predic- rights activists are at heightened risk of data-driven modes tions about human behaviour and social life. Dr Nicole Shephard is an independent researcher and writer working on the intersections between gender, sexuality and technology. She holds a PhD in Gender (LSE) and an MSc in International Development (University of Bristol). 2 / ISSUE PAPERS Metadata: Information describing other data; in the context surveillance practices in the private as well as in the of email, telephone calls or instant messaging, metadata public sphere.6 includes the sender, receiver, devices, locations, service provid- • Big data is generated in many places – social media, global ers, IP addresses, time, length or size of a message.
    [Show full text]