Dclaims: a Censorship Resistant Web Annotations System (Extended Abstract of the Msc Dissertation)

Total Page:16

File Type:pdf, Size:1020Kb

Dclaims: a Censorship Resistant Web Annotations System (Extended Abstract of the Msc Dissertation) DClaims: A Censorship Resistant Web Annotations System (extended abstract of the MSc dissertation) Joao˜ Ricardo Marques dos Santos Departamento de Engenharia Informatica´ Instituto Superior Tecnico´ Advisors: Professors Nuno Santos and David Dias I. INTRODUCTION the text highlighted by her friends (or anyone chosen by her) and when she places her mouse over the highlighted portions The web plays a critical role in informing modern democ- she sees comments made by the users about the highlighted racies. A study [1] by the Reuters Institute for the Study text. What web annotations allow is for the creation of a of Journalism at the University of Oxford, conducted in new layer of data, on top of the existing websites, without 2016, reveals that the Internet makes 53% to 84% of the changing the original resources. Currently, there are several primary sources of information used by UK citizens aged web annotation services available to the general public [12], 18-44. Unfortunately, we have become more aware of often but they have a centralised nature. An annotation made by lack of credibility, falsehood and incompleteness of that very a user using service A cannot be used by service B. We same information – which can have serious consequences. call these services silos because the information they hold Democracies are fed by public opinion which in turn is and services they offer are only useful and relevant to their shaped by the information individuals receive. Campaigns ecosystem. Other platforms such as Hypothes.is improve of disinformation have the power to start wars [2], influence over the interoperability aspect by using a standard type government elections [3], endanger human lives [4] and even of web annotation data model, but still have total control jeopardise the future of the human species [5]. Therefore, over the data and offer no guarantees of permanent storage. it is essential to allow people to have access to reliable Consequently, these services are vulnerable to the same type sources of information – to the point of the identification of censorship as the one present in social networks. and classification of low-quality information has become one The goal of our work is to build a system that allows of the most active areas of research[6], [7], [8], [9]. for uncensored access to web annotations on the Internet by There have been several attempts to improve the reliability eliminating central points of control where a powerful actor of information on the Web. Fact-checking platforms and can exert pressure to fabricate, modify, or suppress exchanged social networks are two. The problem with these platforms messages. Examples of such actors include governments or is that they too can be censored. There are multiple instances powerful media organisations. of state censorship of information. There is evidence of Our system must satisfy the following requirements: efforts by governments of at least 13 countries (including China, Egypt, Turkey, United Kingdom, Russia and France) • Authenticity and Integrity Assurances: Ensure that to either block access to these platforms or censor user- the end-users know who created the web annotations, generated content [10], [11]. Google, Facebook and Twitter and that they have not been tampered with. publish annual reports of the number of government requests • Data Permanence and Portability: Links to web of remove content 1 2 3. annotations should not get broken if they change loca- Besides being vulnerable to censorship, the information tion. This means that the links should remain the same, created by these platforms is scattered across multiple profile independent of the web server where content is stored. pages and websites. An alternative way to achieve the goal • Financial Cost Efficiency: The infrastructure cost of of informing would be to display the information directly operating such a system will be supported by voluntary on the source webpage. Web annotations4 is a new way of institutions, and should not be higher than one of current interacting with information on the web, which allows for platforms which provide similar services. users to make and share annotations of web pages, just like • Scalability: The system should handle workloads simi- they would annotate a physical notepad. It empowers end- lar to the ones on Facebook’s news pages. users to highlight text, create sticky notes or comment specific • Compatibility with standards: The data model used parts of a web page. A typical usage scenario consists of a should be compatible with current standards. This is im- user visiting a news webpage article which shows portions of portant to ensure interoperability between applications. This paper presents a novel system for the censorship- 1Google Transparency Report: https://transparencyreport.google.com/ resistant exchange of web annotations over the Internet, government-removals/overview called DClaims. DClaims has a decentralised architecture, 2 Facebook Transparency Report: https://web.archive.org/web/ which is based upon two building blocks: the Ethereum 20180501211320/https://transparency.facebook.com/government/ 5 6 3Twitter Transparency Report: https://web.archive.org/web/ blockchain and the Inter-Planetary File System(IPFS) . To 20180501211317/https://transparency.twitter.com/en/gov-tos-reports.html 4https://web.archive.org/web/20180502111019/https://www.w3.org/ 5https://www.ethereum.org/ annotation/ 6https://ipfs.io/ marry the feature set of web annotations, with the integrity Table I: Comparison Of All The Presented Web Annotation and censorship resistance assurances of IPFS and the ordered Services As Well As Dclaims registry and freshness of Ethereum, our system stores web Multiple Website Cross-Platform Self Censorship Revocability Support Compatible Verifiability Permanence Resistant annotations on IPFS and records the IPFS links of these files Medium Yes No No No No No Genius Yes Yes No No No No on Ethereum. Hypothes.is Yes Yes Yes No No No In summary, the contributions of this paper are: DClaims Yes Yes Yes Yes Yes Yes • The development of the DClaims Protocol, which de- fines how web annotations are generated, transported and stored. With the goal of increasing interoperability between web annotations services, the World Wide Web Consortium • Implementation of the DClaims platform, which imple- 8 ments the DClaims Protocol and can run on any modern (W3C) created a standard for web annotations. Following the web browser or web server. standard, a new web annotation service, called Hypothes.is, was created. Hypothes.is inherits the properties of the stan- • An experimental evaluation of the DClaims platform, comparing its performance with other widely adopted dard’s data model and transport protocol. The features offered platforms. by their platform are comparable to the ones of Genius’ (users can annotate any webpage and share it with anyone) with the The rest of this document is structured as follows: Section advantage of interoperability, meaning that the annotations II is the related work where we overview Web Annotations, produced by Hypothese.is’ platform will be compatible with blockchain and IPFS. In Section III we present the architec- the ones produced by any other platform that implements ture of the DClaims protocol. After, in Section IV we offer the same standard. Furthermore, Hypothes.is has developed our implementation, followed in Section V by the evaluation specific software for use cases in education, journalism, of the system. Finally in Section VI we present the conclusion publishing and research. However, the annotations are being and discussion. stored by Hypothes.is containers (servers run and controlled by Hypothes.is) and users still need to trust the organisation II. RELATED WORK to keep their best interests in mind. In this section, we analyse the current systems for Web Discussion: Web Annotations are a handy tool for the Annotations and explain how they can be a useful tool for web. They allow for the creation of a layer on top of the fact-checking information on the web. To understand the existing websites, enriching their content and improving the general model of web annotations services, consider a simple way information about them is shared, all of this without the example. Alice is a blogger who just published an article on need to change the original resources. Table I is a comparison Medium (a blog hosting website). Bob visited the website and between the previously presented services. Platforms such found a paragraph of the blog post particularly interesting, as Genius are feature rich, offering great functionality for he highlighted that portion of the text and used the website’s their users, but a cost of no interoperability. The standard highlight feature. Later that day, Charlie, visits Medium and data model for Web Annotation is the one produced by reads Alice’s blog post. The paragraph that Bob highlighted W3C which has interoperability and decentralisation in mind. is displayed highlighted to Charlie. In this scenario Alice Unfortunately, as of yet, there is no real fully decentralised is the content creator, Bob is the annotator, Charlie is the implementation of web annotations, as all the existing ser- reader. Medium is the website and the holder (since the vices use their services to store the data. Furthermore, users information about the highlights is kept under their control), have to trust the service to not withhold data from them or and the highlight is the annotation. tamper with the data. Ideally, web annotations should have a set of desired We argue that to make web annotations resilient, two properties, which are enforced differently depending on the objectives need to be achieved. First, the annotations need to type of annotation service implementation. The main of such be provided with integrity assurances and, second, the whole properties are self-verifiability (not be dependent on third architecture needs to be decentralised, to not have centralised parties to be verified), permanency, revocability, portability points where censorship can occur.
Recommended publications
  • Twitter Discourse Analysis of US President Donald Trump
    Technium Social Sciences Journal Vol. 2, 67-75, January 2020 ISSN: 2668-7798 www.techniumscience.com Twitter Discourse Analysis of US President Donald Trump Assist. Prof. PhD. Tănase Tasențe “Ovidius” University of Constanta, Romania [email protected] Abstract. Twitter has become a very powerful channel of political communication in recent years, many times overtaking, along with Facebook, traditional channels of mass communication, such as: TV, radio or newspapers. More then 500 million tweets are sent every day (5,787 tweets every second), and 326 million people use Twitter every month, even if there are 1.3 billion Twitter accounts. From the perspective of political communication, Twitter is ahead of Facebook, according to a study conducted in 2018 by Twiplomacy, which shows that 187 governments and heads of state maintain an official presence on Twitter. This mechanism of mass communication has benefited the politicians, especially those in the United States of America, who have generated a unique phenomenon in political communication: creating a map on polarization in the online environment.. This study focused on analyzing the Key Performance Indicators (KPIs) that facilitate Twitter Communication of Donald Trump, the President of United States of America (number of followers, types of tweets, engagement rate and interaction rate etc.) and analyzing Donald Trump's Twitter speech and identify the most commonly used expressions in Social Media during the term of President. The monitoring period is 22.01.2019 - 16.08.2019. Keywords. Donald Trump; US President; Social Media; Political communication; Twitter, push-push-pull communication 1. Introduction Twitter has become a very powerful channel of political communication in recent years, many times overtaking, along with Facebook, traditional channels of mass communication, such as: TV, radio or newspapers.
    [Show full text]
  • A Call for Governments to Pause Twitter Censorship: a Cross-Sectional Study Using Twitter Data
    medRxiv preprint doi: https://doi.org/10.1101/2020.05.27.20114983; this version posted May 29, 2020. The copyright holder for this preprint (which was not certified by peer review) is the author/funder, who has granted medRxiv a license to display the preprint in perpetuity. It is made available under a CC-BY-NC-ND 4.0 International license . A call for governments to pause Twitter censorship: a cross-sectional study using Twitter data as social-spatial sensors of COVID-19/SARS-CoV-2 research diffusion Vanash M. Patel MSc PhD FRCS1,2, Robin Haunschild PhD3, Lutz Bornmann PhD4, George Garas PhD FRCS1 Affiliations: 1. Department of Surgery and Cancer, 10th floor, Queen Elizabeth the Queen Mother Wing St. Mary’s Hospital, London, W2 1NY 2. Department of Colorectal Surgery, West Hertfordshire NHS Trust, Watford General Hospital, Vicarage Road, Watford, Hertfordshire, WD18 0HB 3. Max Planck Institute for Solid State Research, Heisenbergstraße 1, 70569 Stuttgart, Germany 4. Division for Science and Innovation Studies, Administrative Headquarters of the Max Planck Society, Hofgartenstr. 8, 80539 Munich, Germany. Correspondence to: Mr. Vanash M Patel, Consultant Colorectal Surgeon, Department of Colorectal Surgery, West Hertfordshire NHS Trust, Watford General Hospital, Vicarage Road, WD18 0HB Email: [email protected] NOTE: This preprint reports new research that has not been certified by peer review and should not be used to guide clinical practice. medRxiv preprint doi: https://doi.org/10.1101/2020.05.27.20114983; this version posted May 29, 2020. The copyright holder for this preprint (which was not certified by peer review) is the author/funder, who has granted medRxiv a license to display the preprint in perpetuity.
    [Show full text]
  • The 6 Steps to Social Media Compliance What You Need to Know Before You Go Social
    WHITE PAPER The 6 Steps to Social Media Compliance What You Need to Know Before You Go Social A Publication by Hootsuite and Nexgate The 6 Steps to Social Media Compliance What You Need to Know Before You Go Social FINRA, the SEC, FFIEC, and the FDA—each has or is in the process of creating guidelines for social media communications to regulate organizations in their respective industries. As social media marketing continues to grow, nearly Secondly, for off-label information requests, such as a two-thirds of the Fortune 500 is actively engaging customer inquiring whether a drug will adversely react customers, partners, and prospects on YouTube (69%), in combination with another drug or condition, the Facebook (70%), and Twitter (77%) and the use of Social pharmaceutical company must be able to show that Relationship Platforms to expedite this engagement is they saw the request and promptly responded to it with increasing. How will regulators influence their activity? the appropriate information. Any failure to comply with either guideline may result in fines against the drug How Regulations Impact manufacturer. Social Organizations Regulated industries—in particular, financial,health care, pharmaceutical, and insurance organizations—are under great pressure to leverage the power of social media to advance their business, yet fear of the ambiguity and uncertainty of emerging regulatory guidelines and requirements, as well as legal risks, can be disruptive, and violations can prove costly. 2/3 of the Fortune 500 are actively engaging customers on social channels. For pharmaceutical organizations, for example, the FDA has two sets of guidelines governing their use of In another example, FINRA recently announced that it social media.
    [Show full text]
  • Case 4:14-Cv-04480-YGR Document 311 Filed 10/25/19 Page 1 of 32
    Case 4:14-cv-04480-YGR Document 311 Filed 10/25/19 Page 1 of 32 1 MAYER BROWN LLP ANDREW JOHN PINCUS (Pro Hac Vice) 2 [email protected] 1999 K Street, NW 3 Washington, DC 20006 Tel: (202) 263-3220 / Fax: (202) 263-3300 4 MAYER BROWN LLP 5 LEE H. RUBIN (SBN 141331) [email protected] 6 DONALD M. FALK (SBN 150256) [email protected] 7 SAMANTHA C. BOOTH (SBN 298852) [email protected] 8 Two Palo Alto Square, Suite 300 3000 El Camino Real 9 Palo Alto, CA 94306-2112 Tel: (650) 331-2000 / Fax: (650) 331-2060 10 Attorneys for Plaintiff Twitter, Inc. 11 UNITED STATES DISTRICT COURT 12 NORTHERN DISTRICT OF CALIFORNIA 13 OAKLAND DIVISION 14 TWITTER, INC., Case No. 14-cv-4480-YGR 15 TWITTER’S NOTICE OF CROSS- 16 Plaintiff, MOTION & CROSS-MOTION FOR SUMMARY JUDGMENT; 17 v. ALTERNATIVE MOTION FOR AN ORDER GRANTING CLEARED 18 COUNSEL ACCESS TO THE CLASSIFIED TABB DECLARATION 19 WILLIAM P. BARR, United States Attorney General, et al., Date: January 7, 2020 20 Time: 2:00 PM Courtroom 1, Fourth Floor 21 Defendants. Judge: Hon. Yvonne Gonzalez Rogers 22 23 24 25 26 27 28 TWITTER’S NOTICE OF CROSS-MOTION & CROSS-MOTION FOR SUMMARY JUDGMENT - Case No. 14-cv-4480-YGR Case 4:14-cv-04480-YGR Document 311 Filed 10/25/19 Page 2 of 32 1 NOTICE OF CROSS-MOTION AND CROSS-MOTION 2 PLEASE TAKE NOTICE that, on January 7, 2020 at 2:00 p.m., or as soon thereafter as 3 counsel may be heard, at 1301 Clay Street, Oakland, CA 94612, in the Oakland Courthouse, 4 Courtroom 1 – Fourth Floor, before Judge Yvonne Gonzalez Rogers, Plaintiff Twitter, Inc.
    [Show full text]
  • Sample Social Media Guidelines
    Sample Social Media Guidelines Background For the purposes of these sample guidelines, social media is being defined as any online publication and commentary outside of website and e-newsletters. This includes blogs, wikis, and social networking sites such as Facebook, Twitter, Instagram, LinkedIn, Snapchat, YouTube, etc. Publication and commentary on social media carry similar obligations to any other kind of organization publication or commentary. These sample guidelines are based on best practices. As you are setting the rules for your social media accounts and the teams behind them, you may want to include some of these suggested guidelines. These sample guidelines should be customized to meet your unique strategies and needs. Digital Team Enter your digital team members’ names and roles. You may also want to consider including cell phone numbers for each member of the team so that you can be in contact outside of office hours if the need arises. Here are two examples: • John Smith, Content Manager (202–123–4567): creates content for key activities like social media messages, email marketing, and website content. This job can also be broken down by platform, if you have multiple team members. • Judy Smith, Social Media Analyst (202–345–6789): compiles and reports any social media insights, reporting or social analytics; provides insights on how you’re performing and suggestions on how to improve from there. Social Media Accounts Enter your organization’s social media accounts (i.e., Twitter, Facebook, etc.), the profile name/URL for each account, and the name of the team member responsible for managing each account.
    [Show full text]
  • The Future of Mobile Social Media in China
    The Future of Mobile Social Media in China: Empower or Control by Huanhuan Bi Bi 2 Abstratct China, the most populated country in the world, has blocked all the global social media services, and this attracted many scholars to study what are happening in China. I use Sina Weibo, the Chinese version of Twitter, to study the political power of social media in this country and conclude that mobile social media do empower the Chinese citizens and make the Chinese society more transparent. Bi 3 Table of Contents Chapter 1: Introduction Chapter 2: Background Chapter 3: Literature Review Chapter 4: Research Design Chapter 5: Data Analysis, Discussions, and Case Study Chapter 6: Conclusions and Recommendations Bi 4 Chapter 1: Introduction Siri: “What can I do for you?” Penny: “Find me the best Chinese food restaurant near Campus Drive.” Siri: “I don’t like the word ‘best’; it’s superficial. I suggest you some popular restaurants…” Jim: “Siri sucks try Yelp, buddy.” … Ten minutes later, we go to the Shanghai café. Half an hour passed, and food is served. “Hey, looks great!” “Wait a minute, let me take a picture.” “Me too!” Everybody takes out iPhone; shoot; upload it on Facebook. What? An airplane missed! Then all check Twitter. No one knows what is happening. OK, let us try New York Times; they should do the journalist job. Everyone is looking at the mobile. “Could we have human being interactions or just eat?” Welcome to the messy world of social media. Today, nearly everyone uses social media, talks social media, no matter what one’s favorite platform is, and we are overwhelmed by social media.
    [Show full text]
  • September 2017 Tightening the Net Report
    Tightening the Net A New Cabinet and New Attempts at Control September 2017 Introduction Despite being elected on a mandate of greater freedoms ARTICLE 19 has been following government eforts to and moderation, President Hassan Rouhani’s appointment centralise data to Iran throughout the “Tightening the Net” of hardliners to cabinet positions in the months since reports and briefngs, starting with the plans for the National his re-election is a worrying confrmation that promised Information Network1, built to bring and maintain the majority improvements for freedoms online will remain unfulflled. of online content, servers, data, and networks inside the country. This goal has become a particular concern during Developments in the period covered by this brief (from mid- recent months, after the Supreme Council of Cyberspace June to the end of August 2017) exemplify the concerning released a regulatory document, writing into law the eforts situation for Internet freedoms in Iran. to put all data in the hands of the Iranian government (See Appendix). First, raising many concerns is the appointment of the new Minister of Information Communications and Technology, ARTICLE 19 continues to demand that Iran repeal vague laws Mohammad-Javad Azari Jahromi. His appointment has already and policies which erode the rights to freedom of expression stirred controversy, after a career spent in the Ministry of and privacy which are guaranteed within Iran’s constitution. Intelligence, where he was personally involved in building surveillance infrastructure, and directly took part in interrogations In this briefng, we also highlight the responsibility of and abuse of individuals involved in the 2009 Green Movement technology companies and platforms, such as Telegram and protests.
    [Show full text]
  • The Republic of Korea's Public Libraries
    THE REPUBLIC OF KOREA’S PUBLIC LIBRARIES: A CRITICAL EXAMINATION OF CENSORSHIP PRACTICES A Dissertation presented to the Faculty of the Graduate School at the University of Missouri In Partial Fulfillment Of the Requirements for the Degree Doctor of Philosophy By: DORIAN LANGE Dr. John Budd, Dissertation Supervisor May 2013 The undersigned, appointed by the dean of the Graduate School, have examined the dissertation entitled: THE REPUBLIC OF KOREA’S PUBLIC LIBRARIES: A CRITICAL EXAMINATION OF CENSORSHIP PRACTICES presented by Dorian Lange, a candidate for the degree of Doctor of Philosophy and hereby certify that, in their opinion, it is worthy of acceptance. Professor John Budd Professor Denice Adkins Professor Jenny Bossaller Professor Lee Wilkins ACKNOWLEDGEMENTS It was only with the advice, assistance, and support of many people that I was able to both pursue and successfully complete my doctoral program. My deepest gratitude goes to my advisor, Dr. John Budd who was a constant source of inspiration, motivation, and hilarity. I am extremely appreciative to Dr. Denice Adkins for always being my most ardent supporter who was willing to do anything she could to insure my success. Dr. Jenny Bossaller is due my many thanks for being a constant source of encouragement and guidance. I am very thankful to Dr. Lee Wilkins for the perspective she provided during this process and for her kindness and support. Dr. Sanda Erdelez and Dr. Charles Davis are to thank for being so helpful in my pursuit of my coursework. ii TABLE OF CONTENTS ACKNOWLEDGEMENTS ii ABSTRACT vi Chapter 1. INTRODUCTION 1 Presentation and Identification of the Problem 1 Significance of the Study 2 Research Assumptions 5 Research Goals 6 Delimitation 7 Definition of Terms 7 Conclusion 11 2.
    [Show full text]
  • Geotagging One Hundred Million Twitter Accounts with Total Variation Minimization
    Geotagging One Hundred Million Twitter Accounts with Total Variation Minimization Ryan Compton*, David Jurgens, David Allen *[email protected] Supported by the Intelligence Advanced Research Projects Activity (IARPA) via Department of Interior National Business Center (DoI/NBC) contract number D12PC00285. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of IARPA, DoI/NBC, or the U.S. Government. © 2014 HRL Laboratories, LLC All Rights Reserved 1 Introduction • Several research directions rely heavily on geographically-annotated social media (which is extremely rare in public data) • Twitter feed from April 2012 until April 2014: • 37,400,698,296 tweets • 359,583,211 users • ~77TB of data Geotag method Tweets Users GPS 584,442,852 (1.6%) 22,413,350 (6.2%) Profile text (anything, 23,236,139,825 (62%) 164,020,169 (45.6%) e.g. “beiberland”) Profile text 3,854,169,186 (10%) 45,284,996 (12.6%) (unambiguous) © 2014 HRL Laboratories, LLC All Rights Reserved 2 Related Work: Academic Academics (mostly NLP) are getting interested: - Eisenstein et al. “A latent variable model for geographic lexical variation” EMNLP 2010 - Cheng et al. “You are where you tweet: a content-based approach to geolocating twitter users” CIKM 2010 - Mahmud et al. “Where is this tweet from? inferring home locations of twitter users” ICWSM 2012 - Rahimi et al. “Exploiting Text and Network Context for Geolocation of Social Media Users” NAACL 2015 © 2014 HRL Laboratories, LLC All Rights Reserved 3 Related Work: Academic Network science approaches: - Backstrom et al.
    [Show full text]
  • Plantilla ARTICLE Hipatiapress Impar V20150312
    Instructions for authors, subscriptions and further details: http://rimcis.hipatiapress.com False News Around COVID-19 Circulated Less On Sina Weibo Than On Twitter. How To Overcome False Information? Cristina Pulido Rodríguez1, Beatriz Villarejo Carballido2, Gisela Redondo-Sama2, Mengna Guo3, Mimar Ramis3, Ramon Flecha3 1) Authonomous University of Barcelona, Spain 2) University of Deusto, Spain 3) University of Barcelona, Spain Date of publication: Online First Edition period: July 2020 – November 2020 To cite this article: Pulido Rodríguez, C., Villarejo Carballido, B., Redondo- Sama, G., Guo, M., Ramis, M., & Flecha, R. (2020). False News Around COVID-19 Circulated Less On Sina Weibo Than On Twitter. How To Overcome False Information? International and Multidisciplinary Journal of Social Sciences, 9(2), 1-22. doi: 10.17583/rimcis.2020.5386 To link this article: http://doi.org/10.17583/rimcis.2020.5386 PLEASE SCROLL DOWN FOR ARTICLE The terms and conditions of use are related to the Open Journal System and to Creative Commons Attribution License (CC-BY). RIMCIS – International and Multidisciplinary Journal of Social Sciences Vol. 9 No.2 July 2020 pp. 1-22 Untold False News Around COVID-19 Circulated Less On Sina Weibo Than On Twitter. How To Overcome False Information? Cristina Pulido Rodríguez Mengna Guo Autonomous University of University of Barcelona Barcelona Mimar Ramis Beatriz Villarejo Carballido University of Barcelona University of Deusto Ramon Flecha Gisela Redondo-Sama University of Barcelona University of Deusto Abstract Since the Coronavirus health emergency was declared, many are the fake news that have circulated around this topic, including rumors, conspiracy theories and myths. According to the World Economic Forum, fake news is one of the threats in today's societies, since this type of information circulates fast and is often inaccurate and misleading.
    [Show full text]
  • Using Social Media in Community-Based Protection
    Using Social Media in Community-Based Protection A Guide: January 2021 Table of Content Introduction .......................................................................................... 9 Acronyms .......................................................................................... 11 Glossary .....................................................................................................13 Chapter 1: Social Media Situation Analysis ......................................20 1. Desk Review .......................................................................................................................22 2. Stakeholders’ Analysis ........................................................................................................24 3. Participatory Assessments ........................................................................................................27 4. Participatory Analysis and Planning ........................................................................................33 Resourcing .......................................................................................................................................36 Dos/Don’ts .......................................................................................................................................38 Check List .......................................................................................................................................39 Chapter 2: Risk Assessment ...........................................................41
    [Show full text]
  • Redefining Censorship in the Digital Age by Kaylee Henry Presented In
    Redefining Censorship in the Digital Age by Kaylee Henry Presented in partial fulfillment of the requirements for Departmental Honors in the Department of English and Communication Arts (Communication Arts) Hood College April 2020 REDEFINING CENSORSHIP IN THE DIGITAL AGE 2 Abstract This paper explores the First Amendment and its role in online communication. Three main social media networks Facebook, Instagram and Twitter are examined throughout this study. This paper examines these social networking site’s legal obligations, or lack thereof, to the First Amendment. Supreme court cases as well as smaller, isolated, cases are outlined. Three main categories will be covered as follows: fake news, shadow banning, artificial intelligence and law. REDEFINING CENSORSHIP IN THE DIGITAL AGE 3 Redefining Censorship in the Digital Age Digital technology has broken down the walls that separate the business world – which consumes our professional lives – with the everyday activities of our personal lives. There is no longer a switch we can press to stop one life and begin the other. A more startling synthesis, however, may be occurring that has potential for greater impact. A person lives not only a physical life, but, thanks to digital technology, also leads a virtual life. Much like the merging of the workplace and personal lives, are our physical and virtual lives becoming one? While the scope of this research will focus on social media and the power that private business has on digital censorship, the digital age is transforming much more and innovating everyday objects like refrigerators, washing machines, vacuums and even door locks into smart devices.
    [Show full text]