Technology-Facilitated Gender-Based Violence: an Overview Suzie Dunn
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Download Paper
Lawless: the secret rules that govern our digital lives (and why we need new digital constitutions that protect our rights) Submitted version. Forthcoming 2019 Cambridge University Press. Nicolas P. Suzor Table of Contents Part I: a lawless internet Chapter 1. The hidden rules of the internet ............................................................................................. 6 Process matters ....................................................................................................................................................... 12 Chapter 2. Who makes the rules?.......................................................................................................... 17 Whose values apply? ............................................................................................................................................... 22 The moderation process .......................................................................................................................................... 25 Bias and accountability ........................................................................................................................................... 28 Chapter 3. The internet’s abuse problem ............................................................................................... 41 Abuse reflects and reinforces systemic inequalities ................................................................................................ 50 Dealing with abuse needs the involvement of platforms ....................................................................................... -
The Internet of Garbage
1 The Internet of Garbage © 2015, 2018 by Sarah Jeong Cover and Illustrations by William Joel for The Verge, © 2018 Vox Media, Inc. All rights reserved. The Verge Edition 1.5 August 2018 Published by Vox Media, Inc. www.theverge.com ISBN: 978-0-692-18121-8 2 Table of Contents Preface ............................................... 4 Chapter One: The Internet Is Garbage .................. 6 A Theory of Garbage .......................................... 8 Spam as Garbage .............................................. 9 Chapter Two: On Harassment ........................... 12 Harassment in the News ...................................... 13 About That Media Narrative . ............................ 18 Is Harassment Gendered? ..................................... 20 Intersections of Harassment ................................. 21 On Doxing ................................................... 24 SWATting .................................................... 27 Doxing Women ................................................ 28 Concluding Thoughts on Doxing ............................... 30 A Taxonomy of Harassment .................................... 32 On Modern-Day Social Media Content Moderation ............... 35 What Happens Before: Setting Norms .......................... 38 Chapter Three: Lessons from Copyright Law ............ 40 The Intersection of Copyright and Harassment ................ 41 How the DMCA Taught Us All the Wrong Lessons ................ 44 Turning Hate Crimes into Copyright Crimes ................... 47 Chapter Four: A -
Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/327186182 Custodians of the internet: Platforms, content moderation, and the hidden decisions that shape social media Book · January 2018 CITATIONS READS 268 6,850 1 author: Tarleton Gillespie Microsoft 37 PUBLICATIONS 3,116 CITATIONS SEE PROFILE All content following this page was uploaded by Tarleton Gillespie on 20 December 2019. The user has requested enhancement of the downloaded file. Custodians of the Internet platforms, content moderation, and the hidden decisions that shape social media Tarleton Gillespie CUSTODIANS OF THE INTERNET CUSTODIANS OF THE INTERNET platforms, content moderation, and the hidden decisions that shape social media tarleton gillespie Copyright © 2018 by Tarleton Gillespie. All rights reserved. Subject to the exception immediately following, this book may not be repro- duced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The Author has made this work available under the Creative Commons Attribution- Noncommercial- ShareAlike 4.0 International Public License (CC BY- NC- SA 4.0) (see https://creativecommons.org/licenses/ by- nc- sa/4.0/). An online version of this work is available; it can be accessed through the author’s website at http://www.custodiansoftheinternet.org. Yale University Press books may be purchased in quantity for educational, business, or promotional use. For information, please e- mail sales.press@yale. edu (U.S. offi ce) or [email protected] (U.K. -
Deplatforming Misogyny
Copyright © 2021 Women’s Legal Education and Action Fund (LEAF) Published by Women’s Legal Education and Action Fund (LEAF) 180 Dundas Street West, Suite 1420 Toronto, Ontario, Canada M5G 1C7 www.leaf.ca LEAF is a national, charitable, non-profit organization, founded in 1985. LEAF works to advance the substantive equality rights of women and girls in Canada through litigation, law reform and public education using the Canadian Charter of Rights and Freedoms. This publication was created as part of LEAF's Technology-Facilitated Violence (TFV) Project. The TFV Project brings together feminist lawyers and academics to conduct research and produce publications imagining legal responses to TFV against women and gender-diverse people that are informed by equality principles. The project also supports and informs LEAF’s law reform efforts and potential upcoming interventions concerning TFV. Acknowledgements Deep gratitude and appreciation go to the many people whose efforts and support made this publication possible. This report was researched and written by Cynthia Khoo, a technology and human rights lawyer and researcher. Cynthia holds an LL.M. (Concentration in Law and Technology) from the University of Ottawa, where she worked on cases as junior counsel at the Samuelson-Glushko Canadian Internet Policy and Public Interest Clinic (CIPPIC). Her paper on platform liability for emergent systemic harm to historically marginalized groups received the inaugural Ian R. Kerr Robotnik Memorial Award for the Best Paper by an Emerging Scholar at We Robot 2020. She has managed a sole practice law firm, Tekhnos Law, and obtained her J.D. from the University of Victoria. -
GOOGLE IS a MAFIA-LIKE POLITICAL CARTEL 1.2.Pdf
INVESTIGATIONS REVEAL THAT GOOGLE IS OPERATED AS A MAFIA-LIKE CARTEL FBI 302 Form Background Information Draft FED-DOJCONG44-2018.C-GH 1.2 Investigation of Google/Alphabet/YouTube/Jigsaw, et al, Operating As An Organized Crime Entity President Donald Trump 1600 Pennsylvania Avenue, NW Washington, D.C. 20500 U.S. Christopher Wray – Director Federal Bureau Of Investigation 601 4th Street NW Washington, DC 20535 Jeff Sessions – Attorney General U.S. Department of Justice 950 Pennsylvania Avenue, NW Washington, DC 20530-0001 Erin Schneider - Senior Investigator, Regional Director - Enforcement Securities And Exchange Commission 44 Montgomery Street, Suite 2800 San Francisco, CA 94104 Copies To: Tamara (Tien-Jan) Jih Murray, Google Litigation Counsel Google, Inc. 15 Upper Lake Road Woodside, CA 94062 David Drummond, Google Litigation Counsel Google, Inc. #2 Quail Road Woodside, CA 94062 Kent Walker, Google Litigation Counsel Google LLC 1600 Amphitheatre Parkway Mountain View, CA 94043 1 INVESTIGATIONS REVEAL THAT GOOGLE IS OPERATED AS A MAFIA-LIKE CARTEL FBI 302 Form Background Information Google And It's Cartel Members have offices in the United States nationwide and are, at least, known to have offices in California at numerous locations. Google And It's Cartel Members attempted (And did, in fact, succeed) to “kill brands via Jigsaw AI attacks; decimate income via anti-trust violations; bribe politicians to acquire exclusive monopolistic advantages over competitors; steal technology; manipulate the stock market via “flash-boy”, “pump-and-dump”, -
Alma Mater Studiorum – Università Di Bologna Dual Award Phd Con Monash University
Alma Mater Studiorum – Università di Bologna Dual Award PhD con Monash University DOTTORATO DI RICERCA IN Traduzione, Interpretazione e Interculturalità Ciclo XXIX Settore Concorsuale di afferenza: 10/L1 – LINGUE, LETTERATURE E CULTURE INGLESE E ANGLO-AMERICANA Settore Scientifico disciplinare: L-LIN/12 – LINGUA E TRADUZIONE – LINGUA INGLESE TITOLO TESI Misogynistic Hate Speech on Social Networks: a Critical Discourse Analysis Presentata da: Beatrice Spallaccia Coordinatrice Dottorato Relatrice Prof. Raffaella Baccolini Prof. Raffaella Baccolini Relatrice Prof. Rita Wilson Co-relatrice: Prof. Delia Carmela Chiaro Esame finale anno 2017 2 After all, the public cybersphere isn’t actually public if half the people are being told to get the fuck out Emma Jane 3 Acknowledgments My first acknowledgment goes to the supervisors of my thesis, Prof. Raffaella Baccolini, Prof. Rita Wilson, and Prof. Delia Chiaro, not only for their insightful comments on online misogyny and their contributions to the development of my thesis, but also for their continuous support, which helped me to conduct this research both in Italy and in Australia, and to reduce the emotional toll that sometimes comes with the analysis of a social problem like misogynistic hate speech. I would also like to thank Caitlin Roper and Coralie Alison for providing me an extensive database to study their online abuse, and Dr. Nicola Henry for our interesting conversation on technology-facilitated sexual violence and harassment, at La Trobe University (Melbourne) in September 2015. All their contributions were a valuable resource for my thesis, and they helped me to develop a more structured, interdisciplinary, and intercultural analysis of online misogynistic hate speech. -
Custodians of the Internet Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media
Custodians of the Internet platforms, content moderation, and the hidden decisions that shape social media Tarleton Gillespie CUSTODIANS OF THE INTERNET CUSTODIANS OF THE INTERNET platforms, content moderation, and the hidden decisions that shape social media tarleton gillespie Copyright © 2018 by Tarleton Gillespie. All rights reserved. Subject to the exception immediately following, this book may not be repro- duced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The Author has made this work available under the Creative Commons Attribution- Noncommercial- ShareAlike 4.0 International Public License (CC BY- NC- SA 4.0) (see https://creativecommons.org/licenses/ by- nc- sa/4.0/). An online version of this work is available; it can be accessed through the author’s website at http://www.custodiansoftheinternet.org. Yale University Press books may be purchased in quantity for educational, business, or promotional use. For information, please e- mail sales.press@yale. edu (U.S. offi ce) or [email protected] (U.K. offi ce). Set in Minion type by IDS Infotech Ltd., Chandigarh, India. Printed in the United States of America. Library of Congress Control Number: 2017953111 ISBN 978-0-300-17313-0 (hardcover: alk. paper) A catalogue record for this book is available from the British Library. This paper meets the requirements of ANSI/NISO Z39.48-1992 (Permanence of -
Social Media Governance: Platforms in Conflict — the Strategies of Operators and the Tactics of Users
SOCIAL MEDIA GOVERNANCE: PLATFORMS IN CONFLICT — THE STRATEGIES OF OPERATORS AND THE TACTICS OF USERS. Andrew Quodling B Creative Industries (Honours I) Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy Digital Media Research Centre Creative Industries Faculty Queensland University of Technology 2019 Keywords Platform Governance Social Media Platform Politics User Tactics Content Moderation Online Harassment Facebook Twitter Google+ Social Media Governance: Platforms in Conflict — The strategies of operators and the tactics of users. i Abstract The growth in availability, affordability and accessibility of internet services in recent years has seen a dramatic increase in the use of social media platforms like Facebook and Twitter. The political conflict and activism both on and against social media platforms have become a more frequent occurrence as their user bases grow and diversify. Conflicts between users and platform operators have involved their attitudes and policies towards issues as diverse as censorship, privacy and surveillance, images depicting breastfeeding, images depicting nudity, pornography, hateful speech and threats of physical harm — with many conflicts garnering coverage in mainstream media. This project investigates conflicts in which users of social media platforms have dramatically different political views and expectations than the operators and designers of their platforms by analysing the different ways in which users have negotiated differences of power and political disputes on social media platforms in several case studies. It has highlighted regular areas of conflict or tension, the strategies that platforms use and the tactics that users deploy to negotiate these conflicts. By interrogating the power structures and political conflicts of social media platforms, this research has discovered how platform operators attempt to govern users through policy and enforcement strategies, and how users interact with platforms during conflict and by identifying themes in user actions during conflicts. -
Sok: Hate, Harassment, and the Changing Landscape of Online Abuse
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse 5 x Kurt Thomas , Devdatta Akhawe , Michael Bailey , Dan Boneh, Elie Bursztein , ◦ x Sunny Consolvo , Nicola Dell , Zakir Durumeric, Patrick Gage Kelley , Deepak Kumar , z 4 ◦ ∗ Damon McCoy , Sarah Meiklejohn , Thomas Ristenpart , Gianluca Stringhini ∗ ◦ 5 z Google Boston University Cornell Tech Figma, Inc. New York University 4 x Stanford University College London University of Illinois, Urbana-Champaign Abstract—We argue that existing security, privacy, and anti- We collate over 150 research papers and prominent news abuse protections fail to address the growing threat of online hate stories related to hate and harassment and use them to create a and harassment. In order for our community to understand and taxonomy of seven distinct attack categories. These include— address this gap, we propose a taxonomy for reasoning about online hate and harassment. Our taxonomy draws on over 150 among others—toxic content like bullying and hate speech, interdisciplinary research papers that cover disparate threats and surveillance including device monitoring and account ranging from intimate partner violence to coordinated mobs. takeover. In the process, we identify seven classes of attacks—such as We then provide in-depth, longitudinal statistics on the toxic content and surveillance—that each stem from different attacker capabilities and intents. We also provide longitudinal growth of hate and harassment and the at-risk communities evidence from a three-year survey that hate and harassment is currently being targeted. Our analysis draws on a three-year a pervasive, growing experience for online users, particularly survey collated from 50,000 participants located in 22 different for at-risk communities like young adults and people who countries. -
Sok: Hate, Harassment, and the Changing Landscape of Online Abuse
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse 5 x Kurt Thomas , Devdatta Akhawe , Michael Bailey , Dan Boneh, Elie Bursztein , ◦ x Sunny Consolvo , Nicola Dell , Zakir Durumeric, Patrick Gage Kelley , Deepak Kumar , z 4 ◦ ∗ Damon McCoy , Sarah Meiklejohn , Thomas Ristenpart , Gianluca Stringhini ∗ ◦ 5 z Google Boston University Cornell Tech Figma, Inc. New York University 4 x Stanford University College London University of Illinois, Urbana-Champaign Abstract—We argue that existing security, privacy, and anti- We collate over 150 research papers and prominent news abuse protections fail to address the growing threat of online hate stories related to hate and harassment and use them to create a and harassment. In order for our community to understand and taxonomy of seven distinct attack categories. These include— address this gap, we propose a taxonomy for reasoning about online hate and harassment. Our taxonomy draws on over 150 among others—toxic content like bullying and hate speech, interdisciplinary research papers that cover disparate threats and surveillance including device monitoring and account ranging from intimate partner violence to coordinated mobs. takeover. In the process, we identify seven classes of attacks—such as We then provide in-depth, longitudinal statistics on the toxic content and surveillance—that each stem from different attacker capabilities and intents. We also provide longitudinal growth of hate and harassment and the at-risk communities evidence from a three-year survey that hate and harassment is currently being targeted. Our analysis draws on a three-year a pervasive, growing experience for online users, particularly survey collated from 50,000 participants located in 22 different for at-risk communities like young adults and people who countries. -
Case for the Digital Platform Act: Market Structure and Regulation of Digital Platforms
The Case for the Digital Platform Act: Market Structure and Regulation of Digital Platforms Harold Feld May 2019 This document is released under Creative Commons license Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) ROOSEVELTINSTITUTE.ORG | PUBLICKNOWLEDGE.ORG Foreword by Tom Wheeler A late 1970’s television commercial for stock brokerage firm E.F. Hutton closed with the tagline, “When E.F. Hutton talks, people listen.” On technology-related policy matters in the 21st century, when Harold Feld talks, people listen. We now have the advantage of Harold’s speaking between two covers. The volume you hold in your hands is a tour de force of the issues raised by the digital economy and internet capitalism. Whether you agree or disagree with Harold, these thoughts will stretch your intellect and stimulate your thinking. Digital platforms are a unique creation of the late 20th and early 21st centuries. The digital economy may have replaced the industrial economy, but the rules created to oversee the fair operation of the industrial economy have not kept pace with that evolution. This volume sets out numerous thoughts about the kinds of policy changes necessary to reflect the realities of our new era. Thus far, the companies of the digital economy have been successful in keeping government oversight at bay. The growth of these companies happened to coincide with the era of deregulation. The companies seized that momentum to spin the story that somehow “digital is different” than traditional analog activities and thus needed to be left alone. It has always been true in history that the pioneers made the rules … until their activities infringed on the rights of individuals and the public interest. -
Emily Van Der Nagel Thesis
Social Media Pseudonymity: Affordances, Practices, Disruptions Emily van der Nagel Submitted in total fulfilment of the requirements of the degree of Doctor of Philosophy 2017 Department of Media and Communication School of Arts, Social Sciences and Humanities Faculty of Health, Arts and Design Swinburne University of Technology Abstract Discussions around anonymity in social media tend to centre on themes of freedom versus harm, as anonymous people can communicate with few consequences, but anonymity can also be an element in harassment and abuse. Anonymity is rarely found within social media platforms that require personal information like email addresses and usernames. This thesis argues that anonymity on social media needs to be reframed as pseudonymity, which is identity work – or the strategic presentation of the self – and involves relationships between affordances, practices, and disruptions. The term ‘pseudonym’, meaning ‘false name’, dates back to the era of the printing press, as pseudonymity became a way for authors to make decisions about how their texts would be known. On iterations of social media, from bulletin boards to chat rooms to Facebook, pseudonyms are an important part of identity work, which is the process of creating and contextualising a self through actions and representations. Although the early 2010s saw a rise in what Bernie Hogan calls the ‘real-name web’, as a number of platforms demanded that people use their real names, pseudonymity remains a key practice within social media. After exploring these historical and contemporary forms of social media pseudonymity, this thesis presents three case studies, each drawing on a different approach to studying social media.