A Pluralist Approach to Democratizing Online Discourse

Total Page:16

File Type:pdf, Size:1020Kb

A Pluralist Approach to Democratizing Online Discourse A Pluralist Approach to Democratizing Online Discourse Jay Chen Barath Raghavan International Computer Science Institute University of Southern California [email protected] [email protected] Paul Schmitt Tai Liu Princeton NYU Abu Dhabi [email protected] [email protected] ABSTRACT Freedom of speech is key to democracy. A free and open Online discourse takes place in corporate-controlled spaces Internet is key to modern global society. Yet how does one thought by users to be public realms. These platforms in reconcile the perspectives above, which speak to fundamental name enable free speech but in practice implement varying issues and are at once in agreement and at odds? Throughout degrees of censorship either by government edict or by uneven the 20th century the greatest threat to free speech was that and unseen corporate policy. This kind of censorship has of government censorship. Indeed, this persists under autoc- no countervailing accountability mechanism, and as such racies around the world (e.g., China, Iran) but it has fused platform owners, moderators, and algorithms shape public with corporate censorship, with autocracies using corporate discourse without recourse or transparency. partners to implement censorship, or corporate moderators Systems research has explored approaches to decentraliz- unevenly removing unprofitable or unpalatable speech. ing or democratizing Internet infrastructure for decades. In The character of discourse online is not only a matter of parallel, the Internet censorship literature is replete with ef- policy or culture, but also one of systems: the systems that forts to measure and overcome online censorship. However, provide or prevent the exercise of free speech. The wide reach in the course of designing specialized open-source platforms and accessibility of the early Internet enabled flourishing free and tools, projects generally neglect the needs of supportive speech, but centralization into a handful of platforms (e.g., but uninvolved ‘average’ users. In this paper, we propose a Facebook, Twitter, Weibo, etc.) has surrendered control over pluralistic approach to democratizing online discourse that online speech. Social media platforms provide users a ‘free’ considers both the systems-related and user-facing issues as service with convenience, usability, and powerful network first-order design goals. effects. Users treat these platforms as public realms, but they are private spaces that can unilaterally decide the content 1 INTRODUCTION they serve [19, 24]. These corporations use one-sided terms “The best test of truth is the power of the thought to get itself of service to justify the removal of content and to provide accepted in the competition of the market.” arbitrary exemptions, typically without explanation [33, 55, 57]. This lack of transparency and accountability raises the Oliver Wendell Holmes question: why should corporations be responsible, de jure “In order to maintain a tolerant society, the society must be (e.g., in China) or de facto (e.g., in the US), for adjudicating speech at all? arXiv:2108.12573v1 [cs.NI] 28 Aug 2021 intolerant of intolerance.” In the US, Section 230 of the Communications Decency Karl Popper Act [50] effectively shields online platforms from responsibil- “We are creating a world that all may enter without privilege or ity for content posted by a third party. However, because social prejudice accorded by race, economic power, military force, media platforms have elected to apply their own moderation or station of birth. We are creating a world where anyone, policies to restrict speech (e.g., harassment or hate speech), anywhere may express his or her beliefs, no matter how singu- they have successfully interjected themselves into a difficult lar, without fear of being coerced into silence or conformity. position. Recent disputes regarding how to handle controver- Your legal concepts of property, expression, identity, move- sial political speech on such platforms have resulted in politi- ment, and context do not apply to us. They are all based on cians simultaneously criticizing platforms for doing both too matter, and there is no matter here.” little and too much policing [26]. Indeed, recent responses by Facebook and Twitter have differed significantly [12, 27], John Perry Barlow which further demonstrates how ill-equipped corporations are in arbitrating such matters [38]. At the time of writing, pro- 2 GOALS posals to weaken Section 230 further complicate the problem, The early Internet consisted of many autonomous providers because if such amendments are made, corporations would with little centralized control of services or infrastructure. then have to assume both the responsibility of policing content Today’s Internet, while physically distributed, consists of a and the risk of legal liability [2]. few popular services whose authority is held in the hands of Legal systems have traditionally recognized that freedom corporations. As observed by Liu et al. [34]: of speech should be limited when it conflicts with other free- “Changes in the Internet’s structure have taken place along doms [17, 32, 37, 45, 51]. Spam, scams, and other abuses two orthogonal axes over the past few decades, yet they are are typically removed because they are nearly universally often conflated. The first axis concerns physical distribu- unwelcome. However, moderation on the basis of political tion—centralized vs. decentralized – whether the physical or ideological grounds is notoriously difficult because there resources being accessed for some service are located at a is so much content to filter and because different people and single machine (at one extreme) or dispersed across many communities have their own norms and expectations [54, 57]. machines all over the planet (at the other). The second axis Today, platform operators generally delegate moderation to in- concerns control -— whether the control over the service dividuals who manage the problem at smaller scales or within and the machines providing a service is held by a few versus particular communities. For example, Facebook has approxi- spread across many individuals or organizations. The Inter- mately 15,000 community managers in the US who review net of today is quite different from that of a few decades past flagged content [54]. While moderators can let their personal along both axes: it has gone from partially centralized and views bias their decisions [42], the bigger problem when it democratic to distributed and feudal.” comes to political speech is that companies can unevenly In this paper we are explicitly focused on the decentral- apply their own policies in favor of profitable content [43]. ization of control rather than that of physical resources, and In response, some have advocated the creation of so-called we use the term “democratization” interchangeably with that free-speech platforms such as Gab, 4chan, and 8chan, which notion of decentralization. Numerous systems have been de- seem to always yield high concentrations of hate speech veloped in academia, industry, and as open source projects and are notorious for their racism, misogyny, and homopho- in attempts to re-democratize the Internet [1, 5, 6, 15, 18, 22, bia [58]. These and other recent historical examples suggest 25, 35, 36, 39, 40, 46–48, 52, 59]. The core problems that that moderation is critical for preserving an environment that these projects tackle predominantly focus on basic Internet is not filled with large amounts of gore and hate speech [54]. infrastructure such as: naming, communication, data storage, In this spectrum of options we have seen the promise and serverless web applications, and digital currencies. Rather pitfalls of the approaches that one might consider aligned than focusing purely on systems goals such as scalability, with Holmes (e.g., free discourse with an expectation of high- security, and efficiency, we include two meta-level goals: minded debate), Popper (e.g., uneven regulation, either by Democratize control over content: Because today’s social governments or corporations, to ensure preservation of a rel- media companies own the infrastructure, they possess inor- atively open sphere), and Barlow (e.g., a free for all). Our dinate power over online content. They control what content observation is that there is a need to balance free speech with may be posted, whether it remains stored, how it is discov- moderation and so we introduce another option: ered by users, whether it is presented to users, and how it is “[D]emocracy is the worst form of Government except for all presented to users. Democratizing control over content (i.e., those other forms that have been tried from time to time.” spreading out power) counteracts digital authoritarianism by Winston Churchill definition. This goal is not new and broadly mirrors themo- tivations behind Tim Berners-Lee’s Solid [52] project and This democratic political perspective lays the philosophical many others in the context of re-decentralizing the Web. How- foundation for our paper and is aligned with notions of free ever, we add a less explored corollary, of considering how to expression and the marketplace of ideas common in Western prevent re-centralization. democracies. It also recognizes that a truly free Internet allows Preserve moderated user experience: Online media com- for the possibility of undesirable pockets of content, but that panies like Facebook hire armies of moderators to filter out they are not desired by the
Recommended publications
  • ADL Report to Global Forum on Cyberhate 2015
    Report of the Anti-Defamation League on Confronting Cyberhate 5th Global Forum for Combating Anti-Semitism May, 2015 ANTI-DEFAMATION LEAGUE Barry Curtiss-Lusher National Chair Abraham H. Foxman National Director Kenneth Jacobson Deputy National Director Milton S. Schneider President, Anti-Defamation League Foundation CIVIL RIGHTS DIVISION Christopher Wolf Chair Deborah M. Lauter Director Steven M. Freeman Associate Director Eva Vega-Olds Assistant Director Jonathan Vick Assistant Director, Cyberhate Response CENTER ON EXTREMISM Mitch Markow Chair Oren Segal Director Lauren Steinberg Terrorism Analyst For additional and updated resources please see: www.adl.org Copies of this publication are available in the Rita and Leo Greenland Library and Research Center. ©2015 Anti-Defamation League | Printed in the United States of America | All Rights Reserved Anti-Defamation League 605 Third Avenue, New York, NY 10158-3560 www.adl.org Table of Contents PREFACE .........................................................................................................................................................4 INTRODUCTION ..............................................................................................................................................5 CHARTING PROGRESS ....................................................................................................................................6 A NEW CHALLENGE: TERRORIST USE OF SOCIAL MEDIA ............................................................................11 RECOMMENDATIONS
    [Show full text]
  • Nextcloud Desktop Client for Linux
    EOAS Help Desk Portal > Knowledgebase > Linux > NextCloud desktop client for Linux NextCloud desktop client for Linux Tom Yerex - 2020-02-19 - 0 Comments - in Linux Access to the EOAS NextCloud server can occur over several different protocols including WebDAV and over the web using a browser. The NextCloud desktop client synchronizes files and folders from your Linux workstation to the NextCloud server. Once the Linux desktop client is installed and you have it configured, the client will periodically check the server for updated files, as well as copy updated files from your workstation to the server. To begin to use the NextCloud Linux desktop client, visit the NextCloud web site at https://nextcloud.com/install/#install-clients, select Linux , on the same page below read the paragraph about Nextcloud Desktop client packages for your Linux distribution. Once you have downloaded the client specific to your operating system, you must follow the distribution-specific steps for installing the client. The desktop agent will prompt at launch for the server address, user name, password, and finally the files/folders that you wish to synchronize. Server: owncloud.eoas.ubc.ca User name: <your EOAS account> Password: <your EOAS password> Once the initial configuration is complete, the NextCloud desktop client will begin to synchronize files/folders with the server, pulling down any files that you may have on the server as well as uploading any new files you have on your local desktop. If you have any questions or concerns, please contact the EOAS IT Help Desk, by email at [email protected], or by using our contact form..
    [Show full text]
  • Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
    Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites.
    [Show full text]
  • Server Administration Manual Release Latest
    Nextcloud Server Administration Manual Release latest The Nextcloud developers Oct 01, 2021 CONTENTS 1 Introduction 1 1.1 Videos and blogs.............................................1 1.2 Target audience..............................................1 2 Release notes 3 3 Maintenance and release schedule5 3.1 Major releases..............................................5 3.2 Maintenance releases...........................................5 3.3 Older versions..............................................6 4 Installation and server configuration7 4.1 System requirements...........................................7 4.2 Deployment recommendations......................................9 4.3 Installation on Linux...........................................9 4.4 Installation wizard............................................ 17 4.5 Installing from command line...................................... 21 4.6 Supported apps.............................................. 22 4.7 SELinux configuration.......................................... 24 4.8 NGINX configuration.......................................... 27 4.9 Hardening and security guidance.................................... 36 4.10 Server tuning............................................... 40 4.11 Example installation on Ubuntu 20.04 LTS............................... 42 4.12 Example installation on CentOS 8.................................... 44 4.13 Example installation on OpenBSD.................................... 48 5 Nextcloud configuration 53 5.1 Warnings on admin page........................................
    [Show full text]
  • Libreoffice and Collabora
    Real Time, Secure Collaboration Michael Meeks General Manager [email protected] Skype - mmeeks, G+ - [email protected] LibreOffice@CollaboraOffice Conference 2015, Aarhus | Michaelwww.CollaboraOffice.com Meeks 1 / 28 What is Collabora Online ? ● Documents + Spreadsheets + Slides ● Viewing and Collaborative editing ● Interoperability with Microsoft formats ● DOCX, DOC, RTF, XLSX, XLS, PPTX, PPT ● Import filters / Viewing for ● PDF, Visio, Publisher, Keynote, Numbers, Pages +many more ● Powerful WYSIWG rendering ● On-premise Integration with Nextcloud. ● Architecture – bet on CPU threads & network ... Collabora Productivity www.collaboraoffice.com Collabora: ~100 staff – founded 2005 Collabora Productivity: ~20 staff – founded 2013 Subsidiary – 50/50 - Collabora / me. Shared raison d’etre: Make Open Source rock. We re-invest your money in the open product. Leaders in the LibreOffice Community who add 300 developers/year, 1000 contributors Collabora Online (DE) - 7 million docker images ... Collabora Productivity www.collaboraoffice.com Collabora Productivity: examples One of the top three Italian banks 20,000 seats deployed in all their branch offices. Visionary cost savings. Partner: Partner: 0 Powerful document classification – eg. “top secret”. Digital signatures and classification of paragraphs. 130 partners and growing ... 4 A seamless partnership ● Nextcloud - an awesome partner ● working together seamlessly and regularly ● Product support & Professional Services. ● A single support partner. ● Nextcloud have experts in Collabora Online ● No blame-game nightmares: ● Bank: 5 people & 5 companies in the room. – It is exactly not like that … with us ● Single point of contact, and relationship. 5 Collabora Online Vision: Full-feature, Open Source, On-premise / hosted – control your data & apps ... No compromises & flexible Complements Nextcloud’s vision Collabora Productivity www.collaboraoffice.com MS Office Online browser a stop-gap ..
    [Show full text]
  • DRC Diaspora Programme, DEMAC and GIZ, As Well As Consultations with Diaspora Communities in Europe for Possible Modalities of Diaspora Engagement
    DRC DIASPORA PROGRAMME, DEMAC & GIZ’ Recommendations on behalf of diasporas to the Global Compact on Refugees’ Programme of Action Key considerations and recommendations to UNHCR and United Nations’ Member States 1 This paper sets forth joint recommendations of Danish Refugee Council Diaspora Programme, DEMAC (Diaspora Emergency Action and Coordination) and Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH (Sector Project Forced Displacement, on behalf of the German Federal Ministry for Economic Cooperation and Development, BMZ) for the Global Compact on Refugees’ Programme of Action, bringing together perspectives from a humanitarian and a development point of view. It is based on the experiences of DRC Diaspora Programme, DEMAC and GIZ, as well as consultations with diaspora communities in Europe for possible modalities of diaspora engagement. The objective of this paper is to ensure that the voices and perspectives of diaspora organisations will be reflected in the Global Compact on Refugee’s Programme of Action. Diasporas are dispersed collectives residing outside their country of origin who “maintain regular or occasional contacts with what they regard as their homeland and with individuals and groups of the same background residing in other host countries” (Sheffer: 2003, 9-10). Diasporas include first generation emigrants and their descendants, former refugees and asylum seekers. “Diaspora and refugee overlap significantly and are neither linear, nor static categories. The terms “refugee” and “diaspora” are situational identities that overlap and shift over time and depending on context. There is no bright line demarcation”. (Research paper No.278: 2016, UNHCR, 4) DRC, DEMAC and GIZ are focusing in this paper on diaspora organisations which are formally constituted entities comprising diaspora members that operate in their countries of settlement and countries of origin, and may also work in neighbouring (third) countries.
    [Show full text]
  • Auswertung Onlinebefragung Social Media
    HSD Auswertung Onlinebefragung Social Media Impressum Herausgeber Dezernat Kommunikation & Marketing Redaktion Rebecca Juwick M.A. Dezernat Kommunikation & Marketing Stand Februar 2016 2 Inhalt 1 Einleitung 4 2 Methode 5 3 Ergebnisse 6 Nutzung Social Networks 9 Zielgruppen 15 Funktionen & Inhalte 16 4 Fazit 22 3 Auswertung Social- Media-Umfrage 1 Einleitung Im Rahmen der Social-Media-Projektgruppe sollten die Anforderungen der unterschiedlichen Ziel- gruppen an das Social-Media-Angebot der Hochschule erhoben werden. Um dies möglichst effektiv umsetzen zu können, wurde eine Onlinebefragung für Studierende und Beschäftigte der Hochschule Düsseldorf durchgeführt. Diese liefen in zeitlichem Abstand zueinander jeweils 4 Wochen lang. Im Folgenden wird zuerst das methodische Vorgehen zur Befragung kurz erläutert, bevor die Ergeb- nisse vorgestellt werden. Alle Ergebnisse können den Datei-Anhängen „Auswertung_Studie- rende.xlsx“ und „Auswertung_Beschäftigte.xlsx“ entnommen werden. 4 Auswertung Social-Media-Umfrage 2 Methode Damit möglichst viele Studierende aus allen Fachbereichen und die Beschäftigten der Hochschule, unabhängig vom Standort, an der Erhebung teilnehmen konnten, wurde die Befragung als reine On- linebefragung durchgeführt. Aufgrund der Ähnlichkeit in Bezug auf die avisierten Zielgruppen, sowie der inhaltlichen Fragestellung wurde die Befragung in Kooperation mit der Campus IT, dem Daten- schutzbeauftragten und dem Fachbereich Sozial- und Kulturwissenschaften realisiert. Der Fragebogen wurde mithilfe der Software Unipark umgesetzt und über den entsprechenden Uni- park-Server für mehrere Wochen zur Beantwortung verfügbar gehalten. Der Umfang des Fragebo- gens wurde dabei so gewählt, dass eine Bearbeitungsdauer von 10 bis 15 Minuten – inklusive Brie- fing und Debriefing – nicht überschritten wurde. Zur Gewinnung von Teilnehmenden wurden diese über diverse Kanäle angesprochen. Auf der Start- seite des Internetauftritts der HSD wurde beispielsweise eine Meldung von der Pressestelle einge- stellt.
    [Show full text]
  • We Need Net Neutrality As Evidenced by This Article to Prevent Corporate
    We need Net Neutrality as evidenced by this article to prevent corporate censorship of individual free speech online, whether its AOL censoring DearAOL.com emails protesting their proposed email fee for prioritized email delivery that evades spam filters, AT&T censoring Pearl Jam which this article is about, or Verizon Wireless censoring text messages from NARAL Pro Choice America. If the FCC won't reclassify broadband under Title II the FTC should regulate Net Neutrality, also the DOJ should investigate corporations engaging in such corporate censorship and if they are violating competition laws break them up. Pearl Jam came out in favor of net neutrality after AT&T censored a broadcast a performance they did in Chicago last Sunday. I guess AT&T didn?t like Pearl Jam?s anti-Bush message. I don?t know if Pearl Jam?s sudden embrace of net neutrality is out of ignorance, or if it?s retaliation. It doesn?t really matter because it should help bring some more awareness to the issue. Here?s the issue with net neutrality, in a nutshell. AT&T wants to charge companies like Amazon, eBay, and Google when people like you and me access their web pages. And if the companies don?t pay, AT&T will make the web sites slower. The idea is that if one company doesn?t pay the fees but a competitor does, AT&T customers will probably opt to use the faster services. IT"S WORTH NOTING: Without content, an Internet connection has no value. Proponents say AT&T built the infrastructure, so they have the right to charge whoever uses it.
    [Show full text]
  • Hard-Coded Censorship in Open Source Mastodon Clients — How Free Is Open Source?
    Proceedings of the Conference on Technology Ethics 2020 - Tethics 2020 Hard-coded censorship in Open Source Mastodon clients — How Free is Open Source? Long paper Juhani Naskali 0000-0002-7559-2595 Information Systems Science, Turku School of Economics, University of Turku Turku, Finland juhani.naskali@utu.fi Abstract. This article analyses hard-coded domain blocking in open source soft- ware, using the GPL3-licensed Mastodon client Tusky as a case example. First, the question of whether such action is censorship is analysed. Second, the licensing compliance of such action is examined using the applicable open-source software and distribution licenses. Domain blocking is found to be censorship in the literal definition of the word, as well as possibly against some the used Google distribu- tion licenses — though some ambiguity remains, which calls for clarifications in the agreement terms. GPL allows for functionalities that limit the use of the software, as long as end-users are free to edit the source code and use a version of the appli- cation without such limitations. Such software is still open source, but no longer free (as in freedom). A multi-disciplinary ethical examination of domain blocking will be needed to ascertain whether such censorship is ethical, as all censorship is not necessarily wrong. Keywords: open source, FOSS, censorship, domain blocking, licensing terms 1 Introduction New technologies constantly create new challenges. Old laws and policies cannot al- ways predict future possibilities, and sometimes need to be re-examined. Open source software is a licensing method to freely distribute software code, but also an ideology of openness and inclusiveness, especially when it comes to FOSS (Free and Open-source software).
    [Show full text]
  • The National Hillumat Otti
    THE NATIONALUS009742853B2 HILLUMAT OTTI TIK (12 ) United States Patent ( 10 ) Patent No. : US 9 , 742 ,853 B2 Auerbach (45 ) Date of Patent: Aug. 22 , 2017 ( 54 ) DYNAMIC COMPUTER SYSTEMS AND ( 56 ) References Cited USES THEREOF U . S . PATENT DOCUMENTS (71 ) Applicant : Michael H . Auerbach , Rockville , MD 6 ,850 , 511 B2 2 /2005 Kats et al. (US ) 7 ,002 , 944 B2 2 /2006 Kats et al. (72 ) Inventor : Michael H . Auerbach, Rockville , MD (Continued ) (US ) FOREIGN PATENT DOCUMENTS ( 73 ) Assignee : The Michael Harrison Tretter EP 2151793 2 /2010 Auerbach Trust , New York , NY (US ) WO WO 2010 / 144766 12 / 2010 ( * ) Notice : Subject to any disclaimer, the term of this (Continued ) patent is extended or adjusted under 35 U . S . C . 154 (b ) by 177 days . OTHER PUBLICATIONS Ahtiainen , A . et al. (2009 ) “ Awareness Networking in Wireless (21 ) Appl. No. : 14 /512 ,442 Environments ,” Vehicular Technol. Mag . IEEE 4 ( 3 ) : 48 , 54 . ( 22 ) Filed : Oct. 12 , 2014 (Continued ) Pri Primary Examiner - Kevin Bates (65 ) Prior Publication Data Assistant Examiner — Nazia Naoreen US 2015 /0334044 A1 Nov . 19, 2015 ( 74 ) Attorney , Agent, or Firm — Jeffrey I. Auerbach ; AuerbachSchrot LLC Related U . S . Application Data (60 ) Provisional application No. 62/ 000 ,015 , filed on May (57 ) ABSTRACT 19 , 2014 . The invention concerns computer systems that are specially adapted to propagate content over a dynamic network , (51 ) Int. Cl. substantially in real time, by virtue of the locational prox H04L 12 /911 (2013 . 01) imity of network joined client computers . Preferably, the G06F 1730 ( 2006 .01 ) content will also be proximity -weighted , and more prefer ably also rank -weighted , topic -weighted , time -weighted , (Continued ) query - weighted , vote -weighted , and / or location - weighted .
    [Show full text]
  • Edri Submission to UN Special Rapporteur David Kaye's Call on Freedom of Expression and the Private Sector in the Digital Age
    EDRi submission to UN Special Rapporteur David Kaye's call on freedom of expression and the private sector in the digital age Introduction EDRi is a not-for-profit association of digital civil rights organisations. Our objectives are to promote, protect and uphold civil rights in the field of information and communication technology. European Digital Rights (EDRi) welcomes the UN Special Rapporteur on freedom of opinion and expression David Kaye’s public consultation on the role of ICT companies vis-à-vis freedom of expression in the digital environment to identify: I. the categories of actors in the ICT sector whose activities implicate the freedom of opinion and expression; II. the main legal issues raised for freedom of opinion and expression within the ICT sector; and III. the conceptual and normative work already done to develop corporate responsibility and human rights frameworks in these spaces, including governmental, inter-governmental, civil society, corporate and multistakeholder efforts. I. ICT actors with a potential to impact freedom of expression and opinion In order to communicate online, it is necessary to rely on a chain of different service providers, often based in different jurisdictions and with whom one may have no direct relationship at all. For example, if "zero-rating" or even data caps are imposed by Internet access providers in a country and you have no organisational and financial capacity to be "zero-rated", your ability to communicate with people that are using such restricted services is limited and there is no "leverage" with the ISPs that connect your intended audience with the Internet.
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]