Blog Del Narco and the Future of Citizen Journalism
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
La Situación De La Violencia Relacionada Con Las Drogas En México Del 2006 Al 2017 : ¿Es Un Conflicto Armado No Internacional
La situación de la violencia relacionada con las drogas en México del 2006 al 2017 : Titulo ¿es un conflicto armado no internacional? Arriaga Valenzuela, Luis - Prologuista; Guevara Bermúdez, José Antonio - Otra; Autor(es) Campo Esteta, Laura Martín del - Traductor/a; Universiteit Leiden, Grotius Centre for International Legal Studies - Autor/a; Guadalajara Lugar ITESO Editorial/Editor Comisión Mexicana de Defensa y Promoción de los Derechos Humanos 2019 Fecha Colección Tráfico de drogas; Drogas; Violencia; Carteles; México; Temas Libro Tipo de documento "http://biblioteca.clacso.org/Mexico/cip-iteso/20200713020717/03.pdf" URL Reconocimiento-No Comercial-Sin Derivadas CC BY-NC-ND Licencia http://creativecommons.org/licenses/by-nc-nd/2.0/deed.es Segui buscando en la Red de Bibliotecas Virtuales de CLACSO http://biblioteca.clacso.org Consejo Latinoamericano de Ciencias Sociales (CLACSO) Conselho Latino-americano de Ciências Sociais (CLACSO) Latin American Council of Social Sciences (CLACSO) www.clacso.org La situación de la violencia relacionada con las drogas en México del 2006 al 2017: ¿es un conflicto armado no Internacional? La situación de la violencia relacionada con las drogas en México del 2006 al 2017: ¿es un conflicto armado no Internacional? COMISIÓN MEXIcaNA DE DEFENSA Y PROMOCIÓN DE LOS DERECHOS HUMANOS, A.C. CONSEJO DIRECTIVO COORDINacIÓN DE INCIDENCIA Ximena Andión Ibáñez Olga Guzmán Vergara Presidenta Coordinadora Alejandro Anaya Muñoz Jürgen Moritz Beatriz Solís Leere María Corina Muskus Toro Jacobo Dayán José Luis Caballero -
Bostonbarjournal
January/February 2009 BostonBarA Publication of the Boston Bar Association Journal Web 2.0 and the Lost Generation Web 2.0: What’s Evidence Between “Friends”? Q W The New E-Discovery Frontier — Seeking Facts in the Web 2.0 World (and Other Miscellany) do you E Twitter? Massachusetts Adopts Comprehensive Information Security Regulations updated 3 minutes ago Law Firm Added You as a Friend What Happens When the College Rumor Mill Goes Online? R 77º The Future of Online THIS AGREE- Networking MENT (hereinafter referred to as the “Agreement”) made and entered into this ____________ day of Y tweet! T Boston Bar Journal • January/February 2009 1 Boston Bar Journal Volume 53, Number 1 January/February 2009 Contents President’s Page 2 Officers of the Boston Bar Association President, Kathy B. Weinman President-Elect, John J. Regan BBJ Editorial Policy 3 Vice President, Donald R. Frederico Treasurer, Lisa C. Goodheart Secretary, James D. Smeallie Departments Members of the Council Opening Statement 4 Lisa M. Cukier Damon P. Hart Edward Notis-McConarty Paul T. Dacier Christine Hughes Maureen A. O’Rourke Web 2.0 and the Lost Generation Anthony M. Doniger Julia Huston Laura S. Peabody Bruce E. Falby Kimberly Y. Jones Mala M. Rafik By Donald R. Frederico George P. Field Wayne M. Kennard Rebecca B. Ransom Laurie Flynn Grace H. Lee Douglas B. Rosner First Principles 5 Lawrence M. Friedman James D. Masterman Charles E. Walker, Jr. Elizabeth Shea Fries Wm. Shaw McDermott Mark J. Warner Web 2.0: What’s Evidence Randy M. Gioia Between “Friends”? Past Presidents By Seth P. -
Sinaloa: fin De La Hegemonía Y Epicentro De La Guerra Que Comienza Carlos Rodríguez Ulloa1
Sinaloa: fin de la hegemonía y epicentro de la guerra que comienza Carlos Rodríguez Ulloa1 — ¿Existe algún código dentro del cártel de Sinaloa, reglas sobre lo que se puede hacer y lo que no? —No se mata a inocentes. El negocio sólo es tráfco. No existen extorsiones, ni secuestros. En la empresa nuestro dicho es “Hay que ayudar al inocente y mancharnos con el corriente. Nosotros sí nos sabemos respetar”. 169 Dámaso Lez Serrano (a) “El Mini Lic”.2 Introduccin El estado de Sinaloa fue una de las áreas estratégicas en el tráfco de drogas en México durante el siglo y por ello zona importante para la operación de la delincuencia organizada; en es- pecífco, es la sede del mal llamado “cártel de Sinaloa” o “del Pacífco”, uno de los grupos dominantes de la delincuencia organizada, además de tener presencia del grupo de los hermanos Beltrán Leyva. Por ello, los acontecimientos en esta región tienen importantes repercusiones en los mercados ilegales de narcóticos y en los niveles de violencia que les están asociados. Sinaloa es una entidad clave para los mercados controlados por la delincuencia organizada debido a razones geográfcas, ya que la sierra madre occidental cruza el estado de norte a sur y es parte importante del Triángulo Dorado, región montañosa que comprende los estados de Sinaloa, Durango y Chihuahua. Se trata de una de las áreas del país con mayor producción de marihuana y amapola; cuenta con los puertos estratégicos de Mazatlán y Topolobampo -que representan el acceso al comercio en el Océano Pacífco- y con las ciudades de Culiacán y Los Mochis, enclave terrestre en la ruta de paso de mercancías hacia el norte. -
Revista Comunicação E Sociedade, Vol. 25
Comunicação e Sociedade, vol. 25, 2014, pp. 252 – 266 The (non)regulation of the blogosphere: the ethics of online debate Elsa Costa e Silva [email protected] Centro de Estudos de Comunicação e Sociedade, Universidade do Minho, Instituto de Ciências Sociais, 4710-057 Braga, Portugal Abstract New technologies have enabled innovative possibilities of communication, but have also imposed new upon matters of ethics, particularly in regards to platforms such as blogs. This ar- ticle builds upon the reflections and experiences on this issue, in an attempt to map and analyse the ethical questions underlying the Portuguese blogosphere. In order to reflect on the possibil- ity and opportunity to create a code of ethics for bloggers, attention is permanently paid to the political blogosphere. Keywords Code of conduct; values; political blogs; freedom of expression 1. Introduction The debate about ethics in communication (a theme that is perhaps as old as the first reflections on the human ability to interact with others) remains extremely dynamic in contemporary societies, fuelled by innovative technological capabilities that bring new challenges to this endless questioning. Ethics is a construction whose pillars oscillate between different perspectives (Fidalgo, 2007), ranging from a greater primacy of the freedom of the ‘I’, to a primacy of the collective responsibility, from the justification by the norms (to do that which is correct) to the justification by the purposes (the good to be achieved). Values and rules underlie ethics, providing a standard for human behaviour and forms of procedure. It is never a finished process, but the result of ongoing tensions and negotiations between interested members of the community (Christofoletti, 2011). -
3.3.5.Haulath.Pdf
CONTENTS SL. PAGE NO. ARTICLE NO 1 DATA PRE-PROCESSING FOR EFFECTIVE INTRUSION DETECTION RIYAD AM 5 2. AN ENHANCED AUTHENTICATION SYSTEM USING MULTIMODAL BIOMETRICS MOHAMED BASHEER. K.P DR.T. ABDUL RAZAK 9 6. GRADIENT FEATURE EXTRACTION USING FOR MALAYALAM PALM LEAF DOCUMENT IMAGEGEENA K.P 19 7. INTERNET ADDICTION JESNA K 23 8. VANETS AND ITS APPLICATION: PRESENT AND FUTURE.JISHA K 26 9. DISTRIBUTED OPERATING SYSTEM AND AMOEBAKHAIRUNNISA K 30 5. INDIVIDUAL SOCIAL MEDIA USAGE POLICY: ORGANIZATION INFORMATION SECURITY THROUGH DATA MINING REJEESH.E1, MOHAMED JAMSHAD K2, ANUPAMA M3 34 3. APPLICATION OF DATA MINING TECHNIQUES ON NETWORK SECURITY O.JAMSHEELA 38 4. SECURITY PRIVACY AND TRUST IN SOCIAL MEDIAMS HAULATH K 43 10. SECURITY AND PRIVACY ISSUES AND SOLUTIONS FOR WIRELESS SYSTEM NETWORKS (WSN) AND RFID RESHMA M SHABEER THIRUVAKALATHIL 45 11. ARTIFICIAL INTELLIGENCE IN CYBER DEFENSESHAMEE AKTHAR. K. ASKARALI. K.T 51 SECURITY PRIVACY AND TRUST IN SOCIAL MEDIA Haulath K, Assistant professor, Department of Computer Science, EMEA College, Kondotty. [email protected] Abstract— Channels social interactions using 2. Social Blogs extremely accessible and scalable publishing A blog (a truncation of the expression weblog) is a methods over the internet. Connecting individuals, discussion or informational site published on communities, organization. Exchange of idea Sharing the World Wide Web consisting of discrete entries message and collaboration through security privacy (“posts”) typically displayed in reverse chronological and trust. order (the most recent post appears first). Until 2009, Classification of Social Media blogs were usually the work of a single individual, occasionally of a small group, and often covered a 1. -
Handbook for Bloggers and Cyber-Dissidents
HANDBOOK FOR BLOGGERS AND CYBER-DISSIDENTS REPORTERS WITHOUT BORDERS MARCH 2008 Файл загружен с http://www.ifap.ru HANDBOOK FOR BLOGGERS AND CYBER-DISSIDENTS CONTENTS © 2008 Reporters Without Borders 04 BLOGGERS, A NEW SOURCE OF NEWS Clothilde Le Coz 07 WHAT’S A BLOG ? LeMondedublog.com 08 THE LANGUAGE OF BLOGGING LeMondedublog.com 10 CHOOSING THE BEST TOOL Cyril Fiévet, Marc-Olivier Peyer and LeMondedublog.com 16 HOW TO SET UP AND RUN A BLOG The Wordpress system 22 WHAT ETHICS SHOULD BLOGUEURS HAVE ? Dan Gillmor 26 GETTING YOUR BLOG PICKED UP BY SEARCH-ENGINES Olivier Andrieu 32 WHAT REALLY MAKES A BLOG SHINE ? Mark Glaser 36 P ERSONAL ACCOUNTS • SWITZERLAND: “” Picidae 40 • EGYPT: “When the line between journalist and activist disappears” Wael Abbas 43 • THAILAND : “The Web was not designed for bloggers” Jotman 46 HOW TO BLOG ANONYMOUSLY WITH WORDPRESS AND TOR Ethan Zuckerman 54 TECHNICAL WAYS TO GET ROUND CENSORSHIP Nart Villeneuve 71 ENS URING YOUR E-MAIL IS TRULY PRIVATE Ludovic Pierrat 75 TH E 2008 GOLDEN SCISSORS OF CYBER-CENSORSHIP Clothilde Le Coz 3 I REPORTERS WITHOUT BORDERS INTRODUCTION BLOGGERS, A NEW SOURCE OF NEWS By Clothilde Le Coz B loggers cause anxiety. Governments are wary of these men and women, who are posting news, without being professional journalists. Worse, bloggers sometimes raise sensitive issues which the media, now known as "tradition- al", do not dare cover. Blogs have in some countries become a source of news in their own right. Nearly 120,000 blogs are created every day. Certainly the blogosphere is not just adorned by gems of courage and truth. -
From Drug Wars to Criminal Insurgency: Mexican Cartels, Criminal Enclaves and Criminal Insurgency in Mexico and Central America
From Drug Wars to Criminal Insurgency: Mexican Cartels, Criminal Enclaves and Criminal Insurgency in Mexico and Central America. Implications for Global Security John P. Sullivan To cite this version: John P. Sullivan. From Drug Wars to Criminal Insurgency: Mexican Cartels, Criminal Enclaves and Criminal Insurgency in Mexico and Central America. Implications for Global Security. 2011. halshs-00694083 HAL Id: halshs-00694083 https://halshs.archives-ouvertes.fr/halshs-00694083 Preprint submitted on 3 May 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. From Drug Wars to Criminal Insurgency: Mexican Cartels, Criminal Enclaves and Criminal Insurgency in Mexico and Central America. Implications for Global Security John P. Sullivan N°9 | april 2012 Transnational organized crime is a pressing global security issue. Mexico is currently embroiled in a pro- tracted drug war. Mexican drug cartels and allied gangs (actually poly-crime organizations) are currently chal- lenging states and sub-state polities (in Mexico, Gua- temala, El Salvador and beyond) to capitalize on lucra- tive illicit global economic markets. As a consequence of the exploitation of these global economic flows, the cartels are waging war on each other and state institu- tions to gain control of the illicit economy. -
Drug Violence in Mexico
Drug Violence in Mexico Data and Analysis Through 2013 SPECIAL REPORT By Kimberly Heinle, Octavio Rodríguez Ferreira , and David A. Shirk Justice in Mexico Project Department of Political Science & International Relations University of San Diego APRIL 2014 About Justice in Mexico: Started in 2001, Justice in Mexico (www.justiceinmexico.org) is a program dedicated to promoting analysis, informed public discourse and policy decisions; and government, academic, and civic cooperation to improve public security, rule of law, and human rights in Mexico. Justice in Mexico advances its mission through cutting-edge, policy-focused research; public education and outreach; and direct engagement with policy makers, experts, and stakeholders. The program is presently based at the Department of Political Science and International Relations at the University of San Diego (USD), and involves university faculty, students, and volunteers from the United States and Mexico. From 2005-2013, the project was based at the USD Trans-Border Institute at the Joan B. Kroc School of Peace Studies, and from 2001-2005 it was based at the Center for U.S.-Mexican Studies at the University of California- San Diego. About the Report: This is one of a series of special reports that have been published on a semi-annual by Justice in Mexico since 2010, each of which examines issues related to crime and violence, judicial sector reform, and human rights in Mexico. The Drug Violence in Mexico report series examines patterns of crime and violence attributable to organized crime, and particularly drug trafficking organizations in Mexico. This report was authored by Kimberly Heinle, Octavio Rodríguez Ferreira, and David A. -
Social Media Identity Deception Detection: a Survey
Social Media Identity Deception Detection: A Survey AHMED ALHARBI, HAI DONG, XUN YI, ZAHIR TARI, and IBRAHIM KHALIL, School of Computing Technologies, RMIT University, Australia Social media have been growing rapidly and become essential elements of many people’s lives. Meanwhile, social media have also come to be a popular source for identity deception. Many social media identity deception cases have arisen over the past few years. Recent studies have been conducted to prevent and detect identity deception. This survey analyses various identity deception attacks, which can be categorized into fake profile, identity theft and identity cloning. This survey provides a detailed review of social media identity deception detection techniques. It also identifies primary research challenges and issues in the existing detection techniques. This article is expected to benefit both researchers and social media providers. CCS Concepts: • Security and privacy ! Social engineering attacks; Social network security and privacy. Additional Key Words and Phrases: identity deception, fake profile, Sybil, sockpuppet, social botnet, identity theft, identity cloning, detection techniques ACM Reference Format: Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, and Ibrahim Khalil. 2021. Social Media Identity Deception Detection: A Survey . ACM Comput. Surv. 37, 4, Article 111 (January 2021), 35 pages. https://doi.org/10.1145/ 1122445.1122456 1 INTRODUCTION Social media are web-based communication tools that facilitate people with creating customized user profiles to interact and share information with each other. Social media have been growing rapidly in the last two decades and have become an integral part of many people’s lives. Users in various social media platforms totalled almost 3.8 billion at the start of 2020, with a total growth of 321 million worldwide in the past 12 months1. -
Blog Rules: a Business Guide to Managing Policy, Public Relations, and Legal Issues Has You Covered
Other Books by Nancy Flynn Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication, Nancy Flynn, (AMACOM) E-Mail Rules: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication, Nancy Flynn and Randolph Kahn, Esq., (AMACOM) The ePolicy Handbook: Designing and Implementing Effective E-Mail, Internet, and Software Policies, Nancy Flynn (AMACOM) Writing Effective E-Mail: Improving Your Electronic Communication, Nancy Flynn and Tom Flynn (Crisp) E-Mail Management, Nancy Flynn (Thomson Learning) ................. 15888$ $$FM 05-19-06 09:29:45 PS PAGE i This page intentionally left blank Blog Rules A Business Guide to Managing Policy, Public Relations, and Legal Issues Nancy Flynn American Management Association New York • Atlanta • Brussels • Chicago • Mexico City • San Francisco Shanghai • Tokyo • Toronto • Washington, D. C. ................. 15888$ $$FM 05-19-06 09:29:45 PS PAGE iii Special discounts on bulk quantities of AMACOM books are available to corporations, professional associations, and other organizations. For details, contact Special Sales Department, AMACOM, a division of American Management Association, 1601 Broadway, New York, NY 10019. Tel.: 212-903-8316. Fax: 212-903-8083. Web site: www.amacombooks.org This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional service. If legal advice or other expert assistance is required, the services of a competent professional person should be sought. Although this book is designed to provide accurate and authoritative information in regard to the subject matter covered, it is sold with the understanding that the publisher and author are not engaged in rendering legal, regulatory, technology, or other professional service. -
SOCIAL MEDIA USE and MISUSE: a GUIDE for PSYCHIATRISTS the Content of This Booklet (“Content”) Is for Informational Purposes Only
SOCIAL MEDIA USE AND MISUSE: A GUIDE FOR PSYCHIATRISTS The content of this booklet (“Content”) is for informational purposes only. The Content is not intended to be a substitute for professional legal advice or judgment, or for other professional advice. Always seek the advice of your attorney with any questions you may have regarding the Content. Never disregard professional legal advice or delay in seeking it because of the Content. ©2015 Professional Risk Management Services, Inc. (PRMS). All rights reserved. Social Media Use and Misuse: A Guide for Psychiatrists PRMS 3 Introduction 4 Websites 5 Facebook 7 LinkedIn 10 Doximity, Sermo and Other Medically-Oriented 10 Social Networking Communities Blogging 11 Twitter 14 Listservs 15 Social Media in the Medical Office 16 Managing Your Online Reputation – Yes You Do Have One 19 Asking Patients to Rate You 20 Googling Patients 20 Physicians and Social Media – Further Guidance 22 Conclusion 23 Glossary 24 Social Media Use and Misuse: A Guide for Psychiatrists PRMS 4 INTRODUCTION The way patients seek out healthcare information is changing. Whereas once patients would pick up the phone and call their doctors, today’s patients are more likely to look to the Internet for information. Psychiatrists are taking note of this change and are looking for guidance on using technology to enhance physician-patient communication and to provide patients with accurate and reliable information. Many are also recognizing that in order to be found by prospective patients, they need an online presence and are exploring options for achieving this. To help in this endeavor, in the following pages we will discuss various forms of social media and ways in which they may be used by you, in your practice, and in your care of patients. -
Mass Communication and Society Division 2010 Abstracts
Classic J&MC Quarterly Teaching Tools AEJMC Live JMC Graduate School Programs Trailblazers South Asia E-book Reports Links Events Annual Conference Post Conference News Future Conferences Past Conference Sites Winter Meeting Regional Meetings WJEC Advertising Online Job Ads AEJMC News Ads Advertise Online Job Ads Advertise in AEJMC News Advertising Kit Pay AEJMC Invoices Online Membership Membership Categories AEJMC Membership Benefits Membership Labels Lists AEJMC eDirectory Tuesday, 2 January 2018 Mass Communication and Society Division 2010 Abstracts Posted by kysh on July 14, 2010 · Leave a Comment Sources of Facts and Advice for Farmer Decision-Making Concerning Soil Conservation Practices in Wisconsin • Tammy Enz, Iowa State University; Eric Abbott, Iowa State University; Suman Lee, Iowa State University • This study uses diffusion theory and opinion leadership to investigate sources of facts and advice used in farmer decision-making concerning soil conservation practices. The importance of interpersonal interactions and the role of new communication technologies, including the Internet, email and the cellular telephone, as well as practical inquiry into which persons, organizations and/or media sources are important opinion leaders in the area of implementation of soil conservation were investigated. Information sources used in actual past behavior changes and information sources likely to be influential in a future hypothetical scenario were assessed. Data for this study were gathered through a random sample mail survey of Grant County, Wisconsin rural landowners. A return rate of 48% yielded 268 usable surveys. Findings reveal that farmers use a number of sources for information concerning the adoption of soil conservation innovations, with ‘neighbors and other farmers,’ ‘government agency staff’ and ‘magazines and other publications’ being the most frequently used and the most important sources throughout the decision process.