Download Download
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
March 24, 2021 Via First Class and Electronic Mail Jack Dorsey Chief
OFFICE OF THE ATTORNEY GENERAL CONNECTICUT william tong attorney general March 24, 2021 Via First Class and Electronic Mail Jack Dorsey Chief Executive Officer Twitter, Inc. 1355 Market St. San Francisco, CA 94103 Mark Zuckerberg Chairman & Chief Executive Officer Facebook, Inc. 1 Hacker Way Menlo Park, CA 94025 Re: Vaccine Disinformation Dear Messrs. Dorsey and Zuckerberg: As Attorneys General committed to protecting the safety and well-being of the residents of our states, we write to express our concern about the use of your platforms to spread fraudulent information about coronavirus vaccines and to seek your cooperation in curtailing the dissemination of such information. The people and groups spreading falsehoods and misleading Americans about the safety of coronavirus vaccines are threatening the health of our communities, slowing progress in getting our residents protected from the virus, and undermining economic recovery in our states. As safe and effective vaccines become available, the end of this pandemic is in sight. This end, however, depends on the widespread acceptance of these vaccines as safe and effective. Unfortunately, misinformation disseminated via your platforms has increased vaccine hesitancy, which will slow economic recovery and, more importantly, ultimately cause even more unnecessary deaths. A small group of individuals use your platforms to downplay the dangers of COVID-19 and spread misinformation about the safety of vaccines. These individuals lack medical expertise and are often motivated by financial interests. According to a recent report by the Center for Countering Digital Hate1, so-called “anti-vaxxer” accounts on Facebook, YouTube, Instagram, and Twitter reach more than 59 million followers. -
Post-Truth Protest: How 4Chan Cooked Up...Zagate Bullshit | Tuters
5/5/2019 Post-Truth Protest: How 4chan Cooked Up the Pizzagate Bullshit | Tuters | M/C Journal M/C JOURNAL Home > Vol 21, No 3 (2018) > Tuters ARTICLE TOOLS HOME Post-Truth Protest: How 4chan Cooked Up the Pizzagate Bullshit PRINT THIS ARTICLE Marc Tuters, Emilija Jokubauskaitė, Daniel Bach CURRENT ISSUE INDEXING METADATA HOW TO CITE ITEM UPCOMING ISSUES Introduction FINDING REFERENCES ARCHIVES On 4 December 2016, a man entered a Washington, D.C., pizza parlor armed with an AR15 assault rifle in an attempt to save the victims of an alleged satanic pedophilia ring run by EMAIL THIS ARTICLE CONTRIBUTORS prominent members of the Democratic Party. While the story had already been discredited (LOGIN REQUIRED) (LaCapria), at the time of the incident, nearly half of Trump voters were found to give a ABOUT M/C JOURNAL measure of credence to the same rumors that had apparently inspired the gunman (Frankovic). EMAIL THE AUTHOR Was we will discuss here, the bizarre conspiracy theory known as "Pizzagate" had in fact (LOGIN REQUIRED) USER HOME originated a month earlier on 4chan/pol/, a message forum whose very raison d’être is to protest against “political correctness” of the liberal establishment, and which had recently ABOUT THE AUTHORS JOURNAL CONTENT become a hub for “loose coordination” amongst members the insurgent US ‘altright’ movement Marc Tuters SEARCH (Hawley 48). Over a period of 25 hours beginning on 3 November 2016, contributors to the /pol/ forum combed through a cache of private emails belonging to Hillary Clinton’s campaign https://oilab.eu manager John Podesta, obtained by Russian hackers (FranceschiBicchierai) and leaked by University of Amsterdam SEARCH SCOPE Julian Assange (Wikileaks). -
Vincenzo Morabito
Vincenzo Morabito Trends and Challenges in Digital Business Innovation Trends and Challenges in Digital Business Innovation Vincenzo Morabito Trends and Challenges in Digital Business Innovation 123 Vincenzo Morabito Department of Management and Technology Bocconi University Milan Italy ISBN 978-3-319-04306-7 ISBN 978-3-319-04307-4 (eBook) DOI 10.1007/978-3-319-04307-4 Springer Cham Heidelberg New York Dordrecht London Library of Congress Control Number: 2013958136 Ó Springer International Publishing Switzerland 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. -
Effectiveness of Dismantling Strategies on Moderated Vs. Unmoderated
www.nature.com/scientificreports OPEN Efectiveness of dismantling strategies on moderated vs. unmoderated online social platforms Oriol Artime1*, Valeria d’Andrea1, Riccardo Gallotti1, Pier Luigi Sacco2,3,4 & Manlio De Domenico 1 Online social networks are the perfect test bed to better understand large-scale human behavior in interacting contexts. Although they are broadly used and studied, little is known about how their terms of service and posting rules afect the way users interact and information spreads. Acknowledging the relation between network connectivity and functionality, we compare the robustness of two diferent online social platforms, Twitter and Gab, with respect to banning, or dismantling, strategies based on the recursive censor of users characterized by social prominence (degree) or intensity of infammatory content (sentiment). We fnd that the moderated (Twitter) vs. unmoderated (Gab) character of the network is not a discriminating factor for intervention efectiveness. We fnd, however, that more complex strategies based upon the combination of topological and content features may be efective for network dismantling. Our results provide useful indications to design better strategies for countervailing the production and dissemination of anti- social content in online social platforms. Online social networks provide a rich laboratory for the analysis of large-scale social interaction and of their social efects1–4. Tey facilitate the inclusive engagement of new actors by removing most barriers to participate in content-sharing platforms characteristic of the pre-digital era5. For this reason, they can be regarded as a social arena for public debate and opinion formation, with potentially positive efects on individual and collective empowerment6. -
What Is Gab? a Bastion of Free Speech Or an Alt-Right Echo Chamber?
What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? Savvas Zannettou Barry Bradlyn Emiliano De Cristofaro Cyprus University of Technology Princeton Center for Theoretical Science University College London [email protected] [email protected] [email protected] Haewoon Kwak Michael Sirivianos Gianluca Stringhini Qatar Computing Research Institute Cyprus University of Technology University College London & Hamad Bin Khalifa University [email protected] [email protected] [email protected] Jeremy Blackburn University of Alabama at Birmingham [email protected] ABSTRACT ACM Reference Format: Over the past few years, a number of new “fringe” communities, Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, like 4chan or certain subreddits, have gained traction on the Web Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?. In WWW at a rapid pace. However, more often than not, little is known about ’18 Companion: The 2018 Web Conference Companion, April 23–27, 2018, Lyon, how they evolve or what kind of activities they attract, despite France. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3184558. recent research has shown that they influence how false informa- 3191531 tion reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web’s information ecosystem. 1 INTRODUCTION In August 2016, a new social network called Gab was created The Web’s information ecosystem is composed of multiple com- as an alternative to Twitter. -
Riots: a Comparative Study of Twitter and Parler
111 Capitol (Pat)riots: A comparative study of Twitter and Parler HITKUL, IIIT - Delhi, India AVINASH PRABHU∗, DIPANWITA GUHATHAKURTA∗, JIVITESH JAIN∗, MALLIKA SUBRA- MANIAN∗, MANVITH REDDY∗, SHRADHA SEHGAL∗, and TANVI KARANDIKAR∗, IIIT - Hy- derabad, India AMOGH GULATI∗ and UDIT ARORA∗, IIIT - Delhi, India RAJIV RATN SHAH, IIIT - Delhi, India PONNURANGAM KUMARAGURU, IIIT - Delhi, India On 6 January 2021, a mob of right-wing conservatives stormed the USA Capitol Hill interrupting the session of congress certifying 2020 Presidential election results. Immediately after the start of the event, posts related to the riots started to trend on social media. A social media platform which stood out was a free speech endorsing social media platform Parler; it is being claimed as the platform on which the riots were planned and talked about. Our report presents a contrast between the trending content on Parler and Twitter around the time of riots. We collected data from both platforms based on the trending hashtags and draw comparisons based on what are the topics being talked about, who are the people active on the platforms and how organic is the content generated on the two platforms. While the content trending on Twitter had strong resentments towards the event and called for action against rioters and inciters, Parler content had a strong conservative narrative echoing the ideas of voter fraud similar to the attacking mob. We also find a disproportionately high manipulation of traffic on Parler when compared to Twitter. Additional Key Words and Phrases: Social Computing, Data Mining, Social Media Analysis, Capitol Riots, Parler, Twitter 1 INTRODUCTION Misinformation of the United States of America’s presidential election results being fraudulent has been spreading across the world since the elections in November 2020.1 Public protests and legal cases were taking place across the states against the allegation of voter fraud and manhandling of mail-in ballots.2 This movement took a violent height when a mob attacked the Capitol Hill building to stop certification of Mr. -
Building Resilience & Confronting Risk In
BUILDING RESILIENCE & CONFRONTING RISK IN THE COVID-19 ERA A PARENTS & CAREGIVERS GUIDE TO ONLINE RADICALIZATION POLARIZATION AND EXTREMISM RESEARCH AND INNOVATION LAB (PERIL) PERIL brings the resources and expertise of the university sector to bear CONTENTS on the problem of growing youth polarization and extremist radicalization, through scalable research, intervention, and public education ideas to PARENT & CAREGIVER GUIDE 3 reduce rising polarization and hate. WHAT IS ONLINE RADICALIZATION? WHY SHOULD YOU CARE? 4 SOUTHERN POVERTY LAW CENTER NEW RISKS IN THE COVID-19 ERA 5 The SPLC seeks to be a catalyst for racial justice in the South and RECOGNIZING WARNING SIGNS 6 beyond, working in partnership with communities to dismantle white UNDERSTANDING THE DRIVERS 7 supremacy, strengthen intersectional movements, and advance the ENGAGE AND EMPOWER 9 human rights of all people. RESPONDING TO HATE 11 HOW TO GET HELP 12 APPENDIX: STAYING ALERT TO SITES, PLATFORMS AND APPS FREQUENTLY EXPLOITED BY EXTREMISTS 17 ENDNOTES 19 CREDITS 20 ILLUSTRATIONS BY CLAUDIA WHITAKER PARENT & CAREGIVER GUIDE Who is this guide for? We wrote this guide with a wide Whether you live with a young person, or work virtually range of caregivers in mind. with youth, radicalization to extremism is something we all should be concerned about. Extremists looking Caregivers living with children and young adults. This to recruit and convert children are predatory. Like all includes parents, grandparents, foster parents, extended forms of child exploitation, extremist recruitment drives families, and residential counselors who are the a wedge between young people and the adults they would guardians and caregivers of children and youth living typically trust. -
1396 the Platforms of Our Discontent (Social Media, Social Destruction)
#1396 The Pla-orms of Our Discontent (Social Media, Social Destruc?on) JAY TOMLINSON - HOST, BEST OF THE LEFT: [00:00:00] Welcome to this episode of the award-winning Best of the Le; Podcast in which we shall learn about the role that social media plays in the radicalizaAon of discontented communiAes, and engage in the debate over content moderaAon and de-plaDorming of individuals. Clips today are from The Weeds, Newsbroke from AJ Plus, On the Media, Off-Kilter, a piece of a speech from Sasha Baron Cohen, Big Tech, Vox ConversaAons, the Medhi Hasan Show, and Your Undivided AVenAon. Why everyone hates Big Tech, with The Verge's Nilay Patel - The Weeds - Air Date 7-19-19 NILAY PATEL: [00:00:34] I think one thing everyone will agree on, just universally, is that these companies are not necessarily well-run. And even if they were perfectly run, the nature of wriAng and enforcing speech regulaAon is such that you're sAll gonna do a bad job. The United States has been trying to develop a free speech policy in our courts for 220+ years and we're preVy bad at it, but four guys at Facebook aren't going to do a good job up in 20 years. So there's that problem, where does the line cross from being a preVy funny joke to being overtly bigoted? It really depends on context. We all understand this. So it absolutely depends on the context. It depends on who you think you are speaking to, whether it's a group of your friends or whether suddenly TwiVer's algorithm grabs you and amplifies you to millions of people. -
It's About Ethics in Games Journalism? Gamergaters and Geek
SMSXXX10.1177/2056305116672484Social Media + SocietyBraithwaite 672484research-article2016 SI: Making Digital Cultures Social Media + Society October-December 2016: 1 –10 It’s About Ethics in Games Journalism? © The Author(s) 2016 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav Gamergaters and Geek Masculinity DOI: 10.1177/2056305116672484 sms.sagepub.com Andrea Braithwaite Abstract #Gamergate is an online movement ostensibly dedicated to reforming ethics in video games journalism. In practice, it is characterized by viciously sexual and sexist attacks on women in and around gaming communities. #Gamergate is also a site for articulating “Gamergater” as a form of geek masculinity. #Gamergate discussions across social media platforms illustrate how Gamergaters produce and reproduce this gendered identity. Gamergaters perceive themselves as crusaders, under siege from critics they pejoratively refer to as SJWs (social justice warriors). By leveraging social media for concern-trolling about gaming as an innocuous masculine pastime, Gamergaters situate the heterosexual White male as both the typical gamer and the real victim of #Gamergate. #Gamergate is a specific and virulent online node in broader discussions of privilege, difference, and identity politics. Gamergaters are an instructive example of how social media operate as vectors for public discourses about gender, sexual identity, and equality, as well as safe spaces for aggressive and violent misogyny. Keywords Gamergate, gaming cultures, geek masculinity, online harassment, social media At the end of August 2014, many online gaming communities situate themselves as the “real” victims, oppressed by calls erupted into vicious arguments—ostensibly about ethics in for diversity and at risk of losing “their” games to more video game journalism, but more pointedly about gender, inclusive ones. -
Introduction to Online Communities
An Introduction to Online Communities by Helen Baxter Community Manager KnowledgeBoard.com Sift, 100 Victoria Street, Bristol, BS1 6HZ, 0117 915 9600, www.sift.co.uk For more details contact Richard Dennys, [email protected] Introduction by Helen Baxter I have been involved in online communities since 1994, first as a member, then community producer, and am now Community Manager of Knowledgeboard.com, the portal for the EC's Knowledge Management Forum. I have made many great friends over the years through online communities and even 'met' my husband online. I think that the increasing success of online communities stems from the fact that they harness the way that people naturally use the Internet. It is the innate human nature to communicate and build relationships that has driven the development of the Internet as we see it today. Ever since the network was opened up to the academic establishment in the 1970s, 'online' or 'virtual' communities have formed. In real life most communities are formed through geographical proximity, but online communities are mostly formed around a shared interest or need, and are a powerful tool for building trust and relationships, word of mouth marketing, and knowledge acquisition and exchange. This 'Introduction to Online Communities' has been written to give an overview of the different types of online community, what makes an online community, and the various community tools. Every community is unique and it is difficult to give a guaranteed recipe for success, but I will cover common factors found in every good online community. It is also worth remembering that as in real life communities take time to grow, and will continually evolve. -
Understanding the Qanon Conspiracy from the Perspective of Canonical Information
The Gospel According to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information Max Aliapoulios*;y, Antonis Papasavva∗;z, Cameron Ballardy, Emiliano De Cristofaroz, Gianluca Stringhini, Savvas Zannettou◦, and Jeremy Blackburn∓ yNew York University, zUniversity College London, Boston University, ◦Max Planck Institute for Informatics, ∓Binghamton University [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] — iDRAMA, https://idrama.science — Abstract administration of a vaccine [54]. Some of these theories can threaten democracy itself [46, 50]; e.g., Pizzagate emerged The QAnon conspiracy theory claims that a cabal of (literally) during the 2016 US Presidential elections and claimed that blood-thirsty politicians and media personalities are engaged Hillary Clinton was involved in a pedophile ring [51]. in a war to destroy society. By interpreting cryptic “drops” of A specific example of the negative consequences social me- information from an anonymous insider calling themself Q, dia can have is the QAnon conspiracy theory. It originated on adherents of the conspiracy theory believe that Donald Trump the Politically Incorrect Board (/pol/) of the anonymous im- is leading them in an active fight against this cabal. QAnon ageboard 4chan via a series of posts from a user going by the has been covered extensively by the media, as its adherents nickname Q. Claiming to be a US government official, Q de- have been involved in multiple violent acts, including the Jan- scribed a vast conspiracy of actors who have infiltrated the US uary 6th, 2021 seditious storming of the US Capitol building. -
Covid-19 Disinformation Briefing No. 2 Far-Right Mobilisation
COVID-19 DISINFORMATION BRIEFING NO. 2 FAR-RIGHT MOBILISATION 9th April 2020 This is the second in a series of briefings from ISD’s Digital Research Unit on the information ecosystem around coronavirus (COVID-19). These briefings expose how technology platforms are being used to promote disinformation, hate, extremism and authoritarianism in the context of COVID-19. It is based on ISD’s mixture of natural language processing, network analysis and ethnographic online research. This briefing focuses on the way far-right groups and individuals are mobilising around COVID-19 in the US. The first briefing in the series can be found on ISD’s website. Top Lines Far-right groups and individuals are opportunistically using the ongoing pandemic to advance their movements and ideologies: - COVID-19 is an increasingly important topic within far-right communities. Mentions of ‘corona-chan’, a slang term for COVID-19 popular with far-right groups and individuals have increased significantly across mainstream and fringe social media platforms. - COVID-19 is being used as a ‘wedge issue’ to promote conspiracy theories, target minority communities, and call for extreme violence. COVID-19 is being used to advance calls for the ‘boogaloo’ – an extreme right-wing meme referring to an impending civil war: - While some of these calls appear to be ironic, others should be recognised as legitimate security threats. - Discussions of the ‘boogaloo’ are increasingly pivoting towards the ways the COVID- 19 pandemic provides an opportunity for violence. - This conversation is taking place across mainstream and fringe social media. - This trend has already manifested into real-world violence, with one alleged white supremacist terrorist dying after shootouts with the FBI.