Online Disinformation Andthe Roleof Wikipedia
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Additional Resources
Resource Guide to Communication Scholarship on Social Justice Activism Lawrence R. Frey, Kellie Brownlee, Jeanette Musselwhite Additional Resources Conceptual/Theoretical Scholarship on Communication and Social Justice Activism A. Communication Aldás, E. N., & Pinazo, D. (2013). “Communication and engagement for social justice.” Peace Review, 25, 343–348. doi:10.1080/10402659.2013.816552 Andersen, P. A. (1993). “Beyond criticism: The activist turn in the ideological debate.” Western Journal of Communication, 57, 247–256. doi:10.1080/10570319309374447 Barge, J. K. (Ed.). (1996). “Dialogue: Communication and social justice [Special section].” Communication Studies, 47, 110–151. Contains the essays: Frey, L. R., Pearce, W. B., Pollock, M. A., Artz, L., & Murphy, B. A. O. “Looking for justice in all the wrong places: On a communication approach to social justice.” 110–127. doi:10.1080/10510979609368467 Wood, J. T. “Social justice research: Alive and well in the field of communication.” 128–134. doi:10.1080/10510979609368468 Makau, J. M. “Notes on communication education and social justice.” 135–141. doi:10.1080/10510979609368469 Pollock, M. A., Artz, L., Frey, L. R., Pearce, W. B., & Murphy, B. A. O. “Navigating between Scylla and Charybdis: Continuing the dialogue on communication and social justice.” 142–151. doi:10.1080/10510979609368470 Broome, B. J., Carey, C., De La Garza, S. A., Martin, J., & Morris, R. (2005). “In the thick of things: A dialogue about the activist turn in intercultural communication.” In W. J. Starosta & G.-M. Chen (Eds.), Taking stock in intercultural communication: Where to now? (pp. 145–175). Washington, DC: National Communication Association. Carragee, K. M., & Frey, L. -
Digital Activism in Asia: Good, Bad, and Banal Politics Online
Asiascape: Digital Asia 7 (2020) 5-19 brill.com/dias Digital Activism in Asia: Good, Bad, and Banal Politics Online Bart Barendregt Leiden Institute of Cultural Anthropology and Sociology, Leiden, the Netherlands [email protected] Florian Schneider Leiden University Institute for Area Studies, Leiden, the Netherlands [email protected] Abstract This article introduces the special issue on ‘Digital Activism’ by exploring some of the trends in social media activism and scholarship thereof. The authors ask to what extent this literature helps us understand Asian forms of online activism, which forms of activism have relatively done well, and whether Asian activism requires its own the- orizing. Most of all, it is a plea for a careful and ethnographically informed approach to digital activism. Although outwardly they look similar and use the same templates, manuals, or even similar media strategies, not all forms of online activism promote democratic values. Furthermore, we argue that much of what happens under the ban- ner of digital activism is not necessarily politics with a capital P but, rather, consists of everyday forms of engagement, with sometimes seemingly vulgar contents and often familiar routines and natural forms, yet in their impact such ‘banal activism’ may have political implications. Keywords Asia – civic engagement – digital activism – mediatization – online community – social media © Koninklijke Brill NV, Leiden, 2020 | doi:10.1163/22142312-bja10004Downloaded from Brill.com09/25/2021 02:48:27AM via free access 6 Barendregt and Schneider 1 Hopes and Hoaxes New media have always held not just the promise of compressing space/time but also, and inherently, of spreading the values of transparency and democ- racy and of serving as a potential means of better and just governance. -
View/Print Page As PDF
MENU Policy Analysis / Muqawama Fake News Surrounding Qasim Muslih’s Arrest (Part 2): Release Claims by Michael Knights, Crispin Smith, Hamdi Malik May 28, 2021 Also available in Arabic ABOUT THE AUTHORS Michael Knights Michael Knights is the Boston-based Jill and Jay Bernstein Fellow of The Washington Institute, specializing in the military and security affairs of Iraq, Iran, and the Persian Gulf states. Crispin Smith Crispin Smith is an associate at a Washington-based national security law group. His research focuses on Iraqi security, human rights, and law of armed conflict issues. Hamdi Malik Dr. Hamdi Malik is an Associate Fellow with the Washington Institute, specializing in Shia militias. He is the co-founder of the Militia Spotlight platform, which offers in-depth analysis of developments related to the Iranian-backed militias in Iraq and Syria. He is the coauthor of the Institute's 2020 study "Honored, Not Contained: The Future of Iraq’s Popular Mobilization Forces." Brief Analysis Part of a series: Militia Spotlight or see Part 1: How to Use Militia Spotlight Militias made a concerted effort to create the false impression that their colleague had been released immediately, and the claim was soon echoed by major global media outlets. n May 26, the Iraqi state arrested militia leader Qasim Muslih in connection with the May 9 murder of activist O Ehab al-Wazni. In June 2020, when fourteen Kataib Hezbollah (KH) members were arrested and thirteen suspects not covered by the warrant were quickly released, muqawama (resistance) groups were able to badly damage the Iraqi government’s credibility by publicizing the release. -
Truth in the Information Age
Beuth Hochschule für Technik Berlin Sprachenpreis 2019 Truth in the Information Age - Dead or Just Hidden? By Miriam Werner Theater- und Veranstaltungstechnik und -management 20.09.2019 Introduction Pokémon Go, iPhone 7, Donald Trump, Prince and Powerball. Those were the top five Google searches in 2016.1 Although it is hard to get a specific number from Google, it is estimated that Google handles more than two trillion searches per year. When doing the math that makes more than 63,000 searches per second.2 With numbers like these, you can see how important it is for us to gather information and with the right tools we have 24/7 access as well. If it didn’t matter what sort of information we receive, then everything would be fine. But in the era where expressions like “fake news” seem to pop up everywhere, the question seems to arise whether anything we read is true, or better yet, “is truth dead in the information age?” To fully understand all the nuances of this question a few definitions are required. When looking at the expression “information age” it refers to a period of time starting at the end of the 20th century and continuing into the foreseeable future. It is the change from the industrial to the post-industrial society where a large portion of the economy lies in information technology. It is shaped by the invention of the computer and telecommunication thereby changing how information is spread, managed and saved. 3 For this essay, I will be referring to the last three to four decades that include the invention of the internet, allowing information to travel around the world in seconds as well as offering access to more people than ever before. -
Technical Reference for Microsoft Sharepoint Server 2010
Technical reference for Microsoft SharePoint Server 2010 Microsoft Corporation Published: May 2011 Author: Microsoft Office System and Servers Team ([email protected]) Abstract This book contains technical information about the Microsoft SharePoint Server 2010 provider for Windows PowerShell and other helpful reference information about general settings, security, and tools. The audiences for this book include application specialists, line-of-business application specialists, and IT administrators who work with SharePoint Server 2010. The content in this book is a copy of selected content in the SharePoint Server 2010 technical library (http://go.microsoft.com/fwlink/?LinkId=181463) as of the publication date. For the most current content, see the technical library on the Web. This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. © 2011 Microsoft Corporation. All rights reserved. Microsoft, Access, Active Directory, Backstage, Excel, Groove, Hotmail, InfoPath, Internet Explorer, Outlook, PerformancePoint, PowerPoint, SharePoint, Silverlight, Windows, Windows Live, Windows Mobile, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. -
Influencer Marketing with Fake Followers
IIMB-WP N0. 580/2020 WORKING PAPER NO: 580 Influencer Marketing with Fake Followers Abhinav Anand Assistant Professor Finance and Accounting Indian Institute of Management Bangalore Bannerghatta Road, Bangalore – 5600 76 [email protected] Souvik Dutta Assistant Professor Social Sciences Indraprastha Institute of Information Technology Delhi - 110020 [email protected] Prithwiraj Mukherjee Assistant Professor Marketing Indian Institute of Management Bangalore Bannerghatta Road, Bangalore – 5600 76 [email protected] Year of Publication – January 2020 Influencer Marketing with Fake Followers Abhinav Anand∗ Souvik Duttay Prithwiraj Mukherjeez January 23, 2020 Abstract Influencer marketing is a practice where an advertiser pays a popular social me- dia user (influencer) in exchange for brand endorsement. We develop an analytical model in a contract-theoretic setting between an advertiser and an influencer who can inflate her publicly displayed follower count by buying fake followers. There is a non-strategic third party audit which successfully detects fraud with some prob- ability, leading to additional reputational costs for the influencer. We show that the optimal contract exhibits widespread faking which increases with the influencer’s true follower count (type). The advertiser exploits the influ- encer's fraud as a screening mechanism to identify her type. The audit accuracy and penalty from being exposed do not affect optimal faking levels but the in- creased cost imposed by the audit to the influencer gets passed on to the advertiser in terms of higher payments. Our paper illustrates why fake followers are rife in influencer marketing, and how digital marketers can exploit this phenomenon to their advantage. Keywords: Digital marketing, social media, influencer marketing, fake follow- ers, optimal control, contract theory. -
Poking the Bear: Feminist Online Activism Disrupting Conservative Power
DSJ, 5(Fall 2019/2020), 28-44 ISSN: 2578-2029 Copyright © 2020 Research Articles Poking the Bear: Feminist Online Activism Disrupting Conservative Power Rusa Jeremic University of Toronto INTRODUCTION his is the time for a critical digital pedagogy that simultaneously recognizes both the potential inherent in social media to challenge power and build movements and the dangers T lurking in a fake news era that spreads hate, division, and distraction. This paper explores how Canadian digital feminist activists challenged conservative power over three federal elections with innovative creativity using critical pedagogical humour that resulted in an impromptu online social movement focused on ousting the Prime Minister. CHALLENGING AUTHORITARIAN POWER WITH A SMILE efore Trump, Canadian Conservative Party member Stephen Harper sat as Prime Minister from 2006-2015. Although Harper might appear a stark contrast to the bombastic Trump, B while in power, he enacted policies that were nothing short of a slow erosion of Canadian democracy. He ruled by stealth through a steady and consistent attack on fundamental Canadian values. Harper refused to speak to the media, enacted policies that violated and eroded women’s rights, and vowed to create a “barbaric cultural practices” (Andrew-Gee, 2015, para 1) snitch line targeting immigrants, amongst other inflammatory acts. His actions signalled a turn toward authoritarianism and a battle of competing ideologies. Parallel to Harper’s time in power, the emergence of Web 2.0 social media tools created the opportunity for all kinds of people to engage in online activism as content producers/educators. A good number of those people were women. -
Of Facebook in Myanmar: a Case for Corporate Criminal Liability
The “Weaponization” of Facebook in Myanmar: A Case for Corporate Criminal Liability † NERIAH YUE The advent of social media platforms in the mid-2000s increased global communication and encouraged innovative activism by ushering new, effective ways to organize and protest. News agencies have recently reported the misuse of these platforms by individual actors and authoritarian regimes. Autocrats, in particular, twist social media platforms into weapons to silence dissent and spread hate speech. The latter category, hate speech, has contributed to some of the gravest human rights abuses globally. The increased spotlight on the weaponization of social media has motivated scholars, states, and companies to revisit the theory of corporate responsibility. This Note unpacks the potential criminal liability of social media companies for misuse on their platforms that result in grave human rights violations. Specifically, it explores Facebook’s corporate criminal liability in light of authoritarian regimes’ misuse of its platform to incite crimes against humanity. This Note will not cover jurisdictional issues regarding corporate criminal liability. Rather, it identifies on a theoretical level, which crimes, if any, social media corporations could be held accountable for under international criminal law. While there remain significant obstacles to prosecuting such cases, this Note identifies an accountability gap between Facebook’s actions and victims of human rights abuses that occur from its platform. Ultimately, this Note concludes that corporate criminal liability is an effective form of ensuring that social media companies remain responsible in doing their part to uphold human rights. † J.D. Candidate 2020, University of California, Hastings College of the Law; Executive Managing Editor, Hastings Law Journal. -
Fact and Fiction
ACTIVITY SHEET A Fact and Fiction There are many types of material produced in our digital age that are meant to persuade consumers, to sell products, or to exploit big issues—some more dangerous than others. An article that looks like news but is actually an advertisement for a new shopping mall is not as dangerous as an article that appears to be objective but is actually propaganda meant to influence a local election. Once you understand the varieties of non-news content and disinformation out there, you’re on your way to becoming an informed reader of news. INSTRUCTIONS Below, use what you learned in class to fill in the definition for each kind. Then, provide an example of that category of content that you have seen or read. If an example does not come to mind, imagine an example that would fit the description. DEFINITIONS EXAMPLES n Propaganda Example n Hoax Example n Agenda-Based Misrepresentation Example n Circular Reporting Example n Clickbait Example n Advertisements or Sponsored Content Example ACTIVITY SHEET B Be an Active News Consumer Spotting an artificial version of something can be hard. Counterfeit dollar bills are made to look identical to real currency. Pieces of forged art have been sold for millions of dollars. And spotting disinformation disguised to look like credible journalism can be tricky. At first, anyway. Fortunately, there are ways to look at news that help us tell serious journalism from other kinds of content. In the spaces below, paraphrase a piece of disinformation or non-news content and an example of credible journalism, both of which you’ll find online. -
CPC Outreach Journal #484
USAF COUNTERPROLIFERATION CENTER CPC OUTREACH JOURNAL Maxwell AFB, Alabama Issue No. 484, 21 February 2006 Articles & Other Documents: Commercial Photos Show Chinese Nuke Buildup Rice Asks For $75 Million To Increase Pressure On Iran Niger Uranium Rumors Wouldn't Die Iran Working On Nuclear Arms Plan, France Says Iran Hints At Compromise On Nuclear Inspections Europeans Reaffirm Diplomacy With Iran Bioterrorism, Hyped Iranian Fatwa Approves Use Of Nuclear Weapons Nuke-Armed Iran A Way Off: Experts On tape, Hussein talks of WMDs Talks On Enriching Nuclear Fuel For Iran In Russia Seem To Stall Welcome to the CPC Outreach Journal. As part of USAF Counterproliferation Center’s mission to counter weapons of mass destruction through education and research, we’re providing our government and civilian community a source for timely counterproliferation information. This information includes articles, papers and other documents addressing issues pertinent to US military response options for dealing with nuclear, biological and chemical threats and attacks. It’s our hope this information resource will help enhance your counterproliferation issue awareness. Established in 1998, the USAF/CPC provides education and research to present and future leaders of the Air Force, as well as to members of other branches of the armed services and Department of Defense. Our purpose is to help those agencies better prepare to counter the threat from weapons of mass destruction. Please feel free to visit our web site at www.au.af.mil/au/awc/awcgate/awc-cps.htm for in-depth information and specific points of contact. Please direct any questions or comments on CPC Outreach Journal to Jo Ann Eddy, CPC Outreach Editor, at (334) 953-7538 or DSN 493-7538. -
Social Activism Through Social Media: the Case of Child Soldiering in the Global Context
University of Windsor Scholarship at UWindsor Electronic Theses and Dissertations Theses, Dissertations, and Major Papers 2013 SOCIAL ACTIVISM THROUGH SOCIAL MEDIA: THE CASE OF CHILD SOLDIERING IN THE GLOBAL CONTEXT Mary Girges University of Windsor Follow this and additional works at: https://scholar.uwindsor.ca/etd Recommended Citation Girges, Mary, "SOCIAL ACTIVISM THROUGH SOCIAL MEDIA: THE CASE OF CHILD SOLDIERING IN THE GLOBAL CONTEXT" (2013). Electronic Theses and Dissertations. 4976. https://scholar.uwindsor.ca/etd/4976 This online database contains the full-text of PhD dissertations and Masters’ theses of University of Windsor students from 1954 forward. These documents are made available for personal study and research purposes only, in accordance with the Canadian Copyright Act and the Creative Commons license—CC BY-NC-ND (Attribution, Non-Commercial, No Derivative Works). Under this license, works must always be attributed to the copyright holder (original author), cannot be used for any commercial purposes, and may not be altered. Any other use would require the permission of the copyright holder. Students may inquire about withdrawing their dissertation and/or thesis from this database. For additional inquiries, please contact the repository administrator via email ([email protected]) or by telephone at 519-253-3000ext. 3208. SOCIAL ACTIVISM THROUGH SOCIAL MEDIA: THE CASE OF CHILD SOLDIERING IN THE GLOBAL CONTEXT By Mary Girges A Thesis Submitted to the Faculty of Graduate Studies through Sociology, Criminology and Anthropology -
The Efficacy of Virtual Protest: Linking Digital Tactics to Outcomes in Activist Campaigns
Portland State University PDXScholar Dissertations and Theses Dissertations and Theses Spring 6-19-2017 The Efficacy of Virtual Protest: Linking Digital Tactics to Outcomes in Activist Campaigns Rina Lynne James Portland State University Follow this and additional works at: https://pdxscholar.library.pdx.edu/open_access_etds Part of the Sociology Commons Let us know how access to this document benefits ou.y Recommended Citation James, Rina Lynne, "The Efficacy of Virtual Protest: Linking Digital Tactics to Outcomes in Activist Campaigns" (2017). Dissertations and Theses. Paper 4008. https://doi.org/10.15760/etd.5892 This Thesis is brought to you for free and open access. It has been accepted for inclusion in Dissertations and Theses by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. The Efficacy of Virtual Protest: Linking Digital Tactics to Outcomes in Activist Campaigns by Rina Lynne James A thesis submitted in partial fulfillment of the requirements of the degree of Master of Science in Sociology Thesis Committee: Ginny Garcia-Alexander, Chair Amy Lubitow Robert Liebman Portland State University 2017 Abstract Activists are increasingly relying on online tactics and digital tools to address social issues. This shift towards reliance on the Internet has been shown to have salient implications for social movement formation processes; however, the effectiveness of such actions for achieving specific goals remains largely unaddressed. This study explores how the