Internet Literacy Handbook

Total Page:16

File Type:pdf, Size:1020Kb

Internet Literacy Handbook INTERNET LITERACY HANDBOOK Supporting users in the online world Building a Europe for and with children www.coe.int/children INTERNET LITERACY HANDBOOK Supporting users in the online world Council of Europe French Edition: Manuel de maîtrise de l’Internet The opinions expressed in this work are the responsibility of the author(s) and do not necessarily reflect the official policy of the Council of Europe. All rights reserved. No part of this publication may be translated, reproduced or transmitted, in any form or by any means, electronic (CD-Rom, Internet, etc.) or mechanical, including photocopying, recording or any information storage or retrieval system, without prior permission in writing from the Directorate of Communication (F-67075 Strasbourg Cedex or [email protected]). Cover, layout and graphic deisgn: Iddifix Council of Europe Publishing F-67075 Strasbourg Cedex http://book.coe.int Authors: Janice Richardson, Elizabeth Milovidov and Martin Schmalzried © Council of Europe, October 2017 Printed at the Council of Europe Table of contents FOREWORD 7 INTRODUCTION 9 1. INTERNET – ANYTIME, ANYWHERE Fact sheet 1 – Getting connected 13 Fact sheet 2 – Online presence and the cloud 19 Fact sheet 3 – Web 2.0, Web 3.0 and more 25 Fact sheet 4 – Blogs and vlogs 31 Fact sheet 5 – Internet on the go 37 2. INTERNET – CONNECTING IDEAS AND PEOPLE Fact sheet 6 – E-mail and communication 45 Fact sheet 7 – Chat and messaging media 49 Fact sheet 8 – Social networking and social sharing 55 Fact sheet 9 – Privacy and privacy settings 61 3. INTERNET – PARTICIPATING IN THE KNOWLEDGE SOCIETY Fact sheet 10 – Searching for information 71 Fact sheet 11 – Finding quality information on the Web 77 Fact sheet 12 – Distance learning and MOOCs 81 Fact sheet 13 – Shopping online 87 4. INTERNET – FOR EVERYONE Fact sheet 14 – Videos, music and images on the Internet 93 Fact sheet 15 – Creativity 99 Fact sheet 16 – Games 103 Fact sheet 17 – Digital citizenship 107 Fact sheet 18 – Digital parenting: positive and proactive 115 5. INTERNET – ADDRESSING THE CHALLENGE Fact sheet 19 – Cybercrime: spam, malware, fraud and security 123 Fact sheet 20 – Labelling and filtering 129 Fact sheet 21 – Online harassment: bullying, stalking and trolling 135 Fact sheet 22 – Getting assistance 141 6. INTERNET - LOOKING FORWARD Fact sheet 23 – Internet of things 147 Fact sheet 24 – Artificial intelligence, automation and disruptive technologies 151 Fact sheet 25 – Virtual and augmented reality 157 Fact sheet 26 – Are you the product? Big data, data mining and privacy 163 Acknowledgments Janice Richardson has been a consultant in children’s rights online for several decades and led the editorial team for this Handbook. Coordinator of the European Commission’s 30-country wide Insafe network until 2014, and more recently the ENABLE anti-bullying network, Janice also sits on Facebook’s Safety Advisory Board. Dr. Elizabeth Milovidov, J.D. is an eSafety consultant with more than 20 years of experience as an attorney, law professor and child rights advocate. Her mission is to empower parents and children on Internet, technology and social media issues and she is the founder of DigitalParentingCoach.com. Martin Schmalzried is Senior Policy Officer for COFACE (Confederation of Family Organisations in the EU) and specialises in safer Internet and new technologies. He is Chair of the SIP BENCH III project (review of parental control tools) and has been involved in numerous EU projects and initiatives linked to this field. Foreword How important is it to be Internet literate? The short answer to that is quite clear: very important. There are fast-approaching 3.5 billion Internet users, some 20% of which are in the European region. And while the Internet offers a stream of information to experience and share, navigating securely in the complex online world can be a demanding task. A basic knowledge set is required. This Handbook offers that knowledge set using language that is straightforward and easy to digest. This is not a brand new publication, but a constantly evolving set of handy tips on how to get to grips with nowadays’ ever-increasing flow of information. The contents of the Handbook are equally clearly laid out online, thanks also to the winning graphics, so that the sections can be presented to groups in classrooms or community centres. In this way, it can be used as a tool for training purposes, and for all age-groups. In unravelling a myriad of complexities, the Handbook offers insights into ethical considerations and risks attached to sharing information: if we wish to use the Internet to quench our thirst for knowledge, and share our thoughts and opinions, then we must do so responsibly. Human rights tenets are just as applicable in the digital world as they are offline. They are engaged, for example, with regard to respecting others’ freedom of expression and privacy online, as well as having ours respected by others. How do we ensure that our own personal data is safe? What do we do if we come across illegal content or are at the receiving end of bullying or hate speech? These topics and many, many more are presented in a way which provides practical advice and tips for an eager public, with an invitation for readers to think critically about what they see and read online, and to make informed and safe choices. If we are online to share ideas, we are at the same time building knowledge and understanding; we may challenge conventional wisdom, and we may create networks for positive change. This is particularly evident for younger generations, for whom the Internet offers endless opportunities to explore, learn, socialise and create, which in turn contribute directly to their personal development. It has become their primary source of freedom and information in growing up, and gives them the means to exercise their rights and freedoms online. Although the Internet harbours potential pitfalls, cautionary measures can be taken and sensible assistance provided. In order not to deter (especially younger) users, the Internet must not be presented as a dark place signposted with danger and caution. It is precisely in its aim of providing support in using the Internet knowledgeably, creatively, safely and fearlessly that marks the Handbook out as a unique and precious tool. If, through the Handbook, children can embrace the multitude of possibilities that the Internet has to offer, at the same time as building up their digital resilience, conscious of their own capabilities and responsibilities, then the Handbook will have served its purpose. The Council of Europe is proud to have followed the evolution of the Handbook and grateful to the many involved over the years in its initial launch, subsequent revision and edition. This tool now provides an even richer source of quality information for children, parents, teachers and policy makers of the 47 member states to be able to make the most of the Internet and to prepare future generations to use the Internet safely and confidently. Snežana Samardžić-Marković Christos Giakoumopoulos Director General of Democracy Director General of Human Rights and Rule of Law Internet Literacy Handbook | Page 7 Introduction Literacy is a bridge from misery to hope. It is a bulwark against poverty, and a building block of development, …a platform for democratization, and a vehicle for the promotion of cultural and national identity. … Literacy is, finally, the road to human progress and the means through which every man, woman and child can realize his or her full potential. Kofi Annan, former Secretary General of the United Nations, January 1997-December 2006 his is the second edition of the Internet Literacy Handbook, which was initially published in 2003. The first edition was revised at three-yearly intervals, in 2006 and 2009, in an effort to keep up T with the challenging pace of evolution in the online technology sector. Although this edition proposes a similar structure, the content has been completely updated and new Fact sheets added, with special focus also on the technology of tomorrow. The handbook is destined for a broad public including families, educators and policy makers; however, it also provides links to more in-depth information and resources for those who wish to delve further into the topics. At the same time, it is aimed to be instructive for young people in their teens and 20s who figure amongst the most avid users of technology and are the shapers and makers of new trends. Above all, the Internet Literacy Handbook sets out to provide information and promote reflection on some of the more complex ethical, sociological and cultural issues that are intrinsically linked to digital- and media-related activities which have taken on such a large role in the lives of a majority of people in many parts of the world. The Council of Europe, which publish this handbook, has striven since 1949 to promote, protect and develop human rights, democracy and the rule of law in its 47 member states. As technology has rapidly reached into most corners of most people’s lives over the past half century, it has also impacted upon human rights, responsibilities and freedoms, and at the same time considerably extended the concept of literacy, which is at their core. The Internet Literacy Handbook is one of the Council of Europe’s broad palette of instruments aimed at tackling the many challenges and at taking advantage of the many opportunities that have come in the wake of the Internet. Some of these instruments are referenced in the handbook. Literacy implies the mastery of contemporary tools of communication as a means of expression and understanding – previously known in English as the 3Rs (reading, (w)riting and (a)rithmetic).
Recommended publications
  • Maximum Internet Security: a Hackers Guide - Networking - Intrusion Detection
    - Maximum Internet Security: A Hackers Guide - Networking - Intrusion Detection Exact Phrase All Words Search Tips Maximum Internet Security: A Hackers Guide Author: Publishing Sams Web Price: $49.99 US Publisher: Sams Featured Author ISBN: 1575212684 Benoît Marchal Publication Date: 6/25/97 Pages: 928 Benoît Marchal Table of Contents runs Pineapplesoft, a Save to MyInformIT consulting company that specializes in Internet applications — Now more than ever, it is imperative that users be able to protect their system particularly e-commerce, from hackers trashing their Web sites or stealing information. Written by a XML, and Java. In 1997, reformed hacker, this comprehensive resource identifies security holes in Ben co-founded the common computer and network systems, allowing system administrators to XML/EDI Group, a think discover faults inherent within their network- and work toward a solution to tank that promotes the use those problems. of XML in e-commerce applications. Table of Contents I Setting the Stage 1 -Why Did I Write This Book? 2 -How This Book Will Help You Featured Book 3 -Hackers and Crackers Sams Teach 4 -Just Who Can Be Hacked, Anyway? Yourself Shell II Understanding the Terrain Programming in 5 -Is Security a Futile Endeavor? 24 Hours 6 -A Brief Primer on TCP/IP 7 -Birth of a Network: The Internet Take control of your 8 -Internet Warfare systems by harnessing the power of the shell. III Tools 9 -Scanners 10 -Password Crackers 11 -Trojans 12 -Sniffers 13 -Techniques to Hide One's Identity 14 -Destructive Devices IV Platforms
    [Show full text]
  • Social Media Tool Analysis
    Social Media Tool Analysis John Saxon TCO 691 10 JUNE 2013 1. Orkut Introduction Orkut is a social networking website that allows a user to maintain existing relationships, while also providing a platform to form new relationships. The site is open to anyone over the age of 13, with no obvious bent toward one group, but is primarily used in Brazil and India, and dominated by the 18-25 demographic. Users can set up a profile, add friends, post status updates, share pictures and video, and comment on their friend’s profiles in “scraps.” Seven Building Blocks • Identity – Users of Orkut start by establishing a user profile, which is used to identify themselves to other users. • Conversations – Orkut users can start conversations with each other in a number of way, including an integrated instant messaging functionality and through “scraps,” which allows users to post on each other’s “scrapbooks” – pages tied to the user profile. • Sharing – Users can share pictures, videos, and status updates with other users, who can share feedback through commenting and/or “liking” a user’s post. • Presence – Presence on Orkut is limited to time-stamping of posts, providing other users an idea of how frequently a user is posting. • Relationships – Orkut’s main emphasis is on relationships, allowing users to friend each other as well as providing a number of methods for communication between users. • Reputation – Reputation on Orkut is limited to tracking the number of friends a user has, providing other users an idea of how connected that user is. • Groups – Users of Orkut can form “communities” where they can discuss and comment on shared interests with other users.
    [Show full text]
  • Social Media Reputation Management
    SOCIAL MEDIA REPUTATION MANAGEMENT If you are using social media sites such as Facebook or Twitter, there are some simple steps you can take to manage your reputation and protect your identity. Even if you are not using these sites, it is important to manage your digital footprint and identify any false or misleading information about you online. In this booklet you will find our top 10 tips for protecting your reputation online. We also provide practical guides for setting up Facebook, Twitter, Instagram and mobile devices to help you ensure your information is safe online. Contents Top 10 tips for protecting your reputation online ... 2 Managing your Facebook account ................ 5 Make sure your profile is set to private 5 Only accept friend requests from people you know and trust and learn to block offensive users 8 Report fake profiles 9 Delete unused accounts 10 Managing your Twitter account .................. 12 Make sure your profile is set to private 12 Only accept friend requests from people you know and trust and learn to block offensive users 12 Report fake profiles 13 Delete unused accounts 15 Managing your LinkedIn account ................ 16 Make sure your profile is set to private 16 Limiting who can view your activity feed and connections 16 Limiting certain people from communicating with you 17 Protecting your account information 17 Delete your account 17 Managing your Instagram account ............... 18 Make sure your profile is set to private 18 Only accept friend requests from people you know and trust and learn to block offensive users 19 Report fake profiles 19 Managing your Snapchat account ...............
    [Show full text]
  • Los Angeles Lawyer June 2010 June2010 Issuemaster.Qxp 5/13/10 12:26 PM Page 5
    June2010_IssueMaster.qxp 5/13/10 12:25 PM Page c1 2010 Lawyer-to-Lawyer Referral Guide June 2010 /$4 EARN MCLE CREDIT PLUS Protecting Divorce Web Site Look and Estate and Feel Planning page 40 page 34 Limitations of Privacy Rights page 12 Revoking Family Trusts page 16 The Lilly Ledbetter Fair Pay Act Strength of page 21 Character Los Angeles lawyers Michael D. Schwartz and Phillip R. Maltin explain the effective use of character evidence in civil trials page 26 June2010_IssueMaster.qxp 5/13/10 12:42 PM Page c2 Every Legal Issue. One Legal Source. June2010_IssueMaster.qxp 5/13/10 12:25 PM Page 1 Interim Dean Scott Howe and former Dean John Eastman at the Top 100 celebration. CHAPMAN UNIVERSITY SCHOOL OF LAW PROUDLY ANNOUNCES OUR RANKING AMONG THE TOP 100 OF ONE UNIVERSITY DRIVE, ORANGE, CA 92866 www.chapman.edu/law June2010_IssueMaster.qxp 5/13/10 12:25 PM Page 2 0/&'*3. ."/:40-65*0/4 Foepstfe!Qspufdujpo Q -"8'*3.$-*&/54 Q"$$&445007&3130'&44*0/"- -*"#*-*5:1307*%&34 Q0/-*/&"11-*$"5*0/4'03 &"4:$0.1-&5*0/ &/%034&%130'&44*0/"--*"#*-*5:*/463"/$&#30,&3 Call 1-800-282-9786 today to speak to a specialist. 5 ' -*$&/4&$ 4"/%*&(003"/(&$06/5:-04"/(&-&44"/'3"/$*4$0 888")&3/*/463"/$&$0. June2010_IssueMaster.qxp 5/13/10 12:26 PM Page 3 FEATURES 26 Strength of Character BY MICHAEL D. SCHWARTZ AND PHILLIP R. MALTIN Stringent rules for the admission of character evidence in civil trials are designed to prevent jurors from deciding a case on the basis of which party is more likeable 34 Parting of the Ways BY HOWARD S.
    [Show full text]
  • Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
    Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites.
    [Show full text]
  • ED381174.Pdf
    DOCUMENT RESUME ED 381 174 IR 055 469 AUTHOR Klatt, Edward C.; And Others TITLE Windows to the World: Utah Library Network Internet Training Manual. INSTITUTION Utah State Library, Salt Lake City. PUB DATE Mar 95 NOTE 136p. AVAILABLE FROMWorld Wide Web at http://www.state.lib.ut.us/internet.htm (available electronically) or Utah State Library Division, 2150 S. 3rd W., Suite 16, Salt Lake City, UT 84115-2579 ($10; quantity price, $5). PUB TYPE Guides Non-Classroom Use (055) EDRS PRICE MF01/PC06 Plus Postage. DESCRIPTORS Access to Information; *Computer Networks; Computer Software; Electronic Mail; *information Networks; *Information Systems; *Librarians; Online Catalogs; Professional Training; Telecommunications IDENTIFIERS *Internet; Utah ABSTRACT This guide reviews the basic principles of Internet exploration for the novice user, describing various functions and utilizing "onscreen" displays. The introduction explains what the Internet is, and provides historical information. The introduction is followed by a listing of Internet hardware and software (freeware and shareware), both lists including information fo: PC-compatibles and Macintosh computers. Users are introduced to and instructed in the use of the following Internet systems and services: EWAN telnet; OPACS (Online Public Access Catalogs); CARL (Colorado Alliance of Research Libraries; FirstSearch; UMI (University Microfilm Inc.); Deseret News; Pegasus E-Mail; Listservs; WinVN Newsreader; Viewers; Netscape; Mosaic; Gopher; Archie; and FTP (File Transfer Protocol). Over 100 computer screen reproductions help to illustrate the instruction. Contains 16 references and a form for ordering additional copies of this guide are provided. (MAS) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document.
    [Show full text]
  • The Example of Swedish Independent Music Fandom by Nancy K
    First Monday Online groups are taking new forms as participants spread themselves amongst multiple Internet and offline platforms. The multinational online community of Swedish independent music fans exemplifies this trend. This participant–observation analysis of this fandom shows how sites are interlinked at multiple levels, and identifies several implications for theorists, researchers, developers, industry and independent professionals, and participants. Contents Introduction Fandom Swedish popular music The Swedish indie music fan community Discussion Conclusion Introduction The rise of social network sites is often taken to exemplify a shift from the interest–based online communities of the Web’s “first” incarnation to a new “Web 2.0” in which individuals are the basic unit, rather than communities. In a recent First Monday article, for instance, boyd (2006) states, “egocentric networks replace groups.” I argue that online groups have not been “replaced.” Even as their members build personal profiles and egocentric networks on MySpace, Facebook, BlackPlanet, Orkut, Bebo, and countless other emerging social network sites, online groups continue to thrive on Web boards, in multiplayer online games, and even on the all–but–forgotten Usenet. However, online communities are also taking a new form somewhere between the site-based online group and the egocentric network, distributing themselves throughout a variety of sites in a quasi–coherent networked fashion. This new form of distributed community poses particular problems for its members, developers, and analysts. This paper, based on over two years of participant–observation, describes this new shape of online community through a close look at the multinational online community of fans of independent rock music from Sweden.
    [Show full text]
  • Confronting Antisemitism in Modern Media, the Legal and Political Worlds an End to Antisemitism!
    Confronting Antisemitism in Modern Media, the Legal and Political Worlds An End to Antisemitism! Edited by Armin Lange, Kerstin Mayerhofer, Dina Porat, and Lawrence H. Schiffman Volume 5 Confronting Antisemitism in Modern Media, the Legal and Political Worlds Edited by Armin Lange, Kerstin Mayerhofer, Dina Porat, and Lawrence H. Schiffman ISBN 978-3-11-058243-7 e-ISBN (PDF) 978-3-11-067196-4 e-ISBN (EPUB) 978-3-11-067203-9 DOI https://10.1515/9783110671964 This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. For details go to https://creativecommons.org/licenses/by-nc-nd/4.0/ Library of Congress Control Number: 2021931477 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available on the Internet at http://dnb.dnb.de. © 2021 Armin Lange, Kerstin Mayerhofer, Dina Porat, Lawrence H. Schiffman, published by Walter de Gruyter GmbH, Berlin/Boston The book is published with open access at www.degruyter.com Cover image: Illustration by Tayler Culligan (https://dribbble.com/taylerculligan). With friendly permission of Chicago Booth Review. Printing and binding: CPI books GmbH, Leck www.degruyter.com TableofContents Preface and Acknowledgements IX LisaJacobs, Armin Lange, and Kerstin Mayerhofer Confronting Antisemitism in Modern Media, the Legal and Political Worlds: Introduction 1 Confronting Antisemitism through Critical Reflection/Approaches
    [Show full text]
  • Twitter – a Personal Perspective
    Twitter – a personal perspective Catriona Fisher Customer Services Manager University of Glasgow Library Email: catriona.fisher@glasgow. ac.uk twitter: @catrionafisher I joined Twitter in March 2009, but like most people I spent the first few months wondering what on earth this strange new world was all about. As a devoted user of Multiply, then Bebo and later Facebook, I was no stranger to social net- working, but Twitter was quite obviously some- thing different. I quickly realised the following: • you need your tweets to be public • the best way to get followers is to follow other people • hashtags are a must if you want your voice to be heard amongst the millions of tweets. I started out tweeting solely about work and had intended to have two accounts, one for work and a personal account (as I do with Facebook), but I quickly realised that many professionals on Twit- ter were tweeting about their work lives and their personal lives from the same account. This takes a bit of getting used to, but is very much the norm on Twitter. I now tweet from my own account @catrionafisher and also on behalf of the University of Glasgow Library @uofglibrary, along with a group of staff from Library Services. We’ve found Twitter to be a really powerful way of reaching out to students and other library users and it is now one of our primary channels of communication when we need to share informa- tion quickly. For example, we are using it to keep students up to date with any disruption during the work to re-clad the library building.
    [Show full text]
  • Edri Submission to UN Special Rapporteur David Kaye's Call on Freedom of Expression and the Private Sector in the Digital Age
    EDRi submission to UN Special Rapporteur David Kaye's call on freedom of expression and the private sector in the digital age Introduction EDRi is a not-for-profit association of digital civil rights organisations. Our objectives are to promote, protect and uphold civil rights in the field of information and communication technology. European Digital Rights (EDRi) welcomes the UN Special Rapporteur on freedom of opinion and expression David Kaye’s public consultation on the role of ICT companies vis-à-vis freedom of expression in the digital environment to identify: I. the categories of actors in the ICT sector whose activities implicate the freedom of opinion and expression; II. the main legal issues raised for freedom of opinion and expression within the ICT sector; and III. the conceptual and normative work already done to develop corporate responsibility and human rights frameworks in these spaces, including governmental, inter-governmental, civil society, corporate and multistakeholder efforts. I. ICT actors with a potential to impact freedom of expression and opinion In order to communicate online, it is necessary to rely on a chain of different service providers, often based in different jurisdictions and with whom one may have no direct relationship at all. For example, if "zero-rating" or even data caps are imposed by Internet access providers in a country and you have no organisational and financial capacity to be "zero-rated", your ability to communicate with people that are using such restricted services is limited and there is no "leverage" with the ISPs that connect your intended audience with the Internet.
    [Show full text]
  • Green Views on Digital Rights and Digital Commons
    Adopted Policy Paper GREEN VIEWS ON DIGITAL RIGHTS AND DIGITAL COMMONS Introduction As information, digital technologies and the internet play an increasingly important role in today’s society, new forms of cooperation and work can emerge, as well as alternative economic models and new possibilities for involving citizens in society and political participation. Meanwhile, a whole array of new laws since the end of the 90s – from “intellectual property” to security – keep raising deep concerns. We Greens are taking a stand to defend individual rights and serve public interests. The European Greens want to take a leading role in building and strengthening digital commons and enabling all people to take part in digital society. As Greens we like to see the internet, the worldwide digital infrastructure as digital commons1. That means a free and open common ground for all citizens to communicate, share and profit from available resources. However, we know that in reality the internet is far from being free, open and for the benefit of all citizens. We also recognise the limits of governmental intervention in a global infrastructure and the dangers of state interference in the free flow of information. But to safeguard digital rights we need the intervention by national states, the European Union and the entire global community. We Greens want to achieve an internet and digital society where civil rights are respected and all citizens can profit equally from the rich amounts of information and culture that are now accessible while acknowledging author rights. In view of rapid technological developments these goals must also be applicable to devices and tools outside the internet where the right to privacy is at stake.
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]