Report from the Alan Turing Institute
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Intersectionality and Feminist Politics Yuval-Davis, Nira
www.ssoar.info Intersectionality and Feminist Politics Yuval-Davis, Nira Postprint / Postprint Zeitschriftenartikel / journal article Zur Verfügung gestellt in Kooperation mit / provided in cooperation with: www.peerproject.eu Empfohlene Zitierung / Suggested Citation: Yuval-Davis, N. (2006). Intersectionality and Feminist Politics. European Journal of Women's Studies, 13(3), 193-209. https://doi.org/10.1177/1350506806065752 Nutzungsbedingungen: Terms of use: Dieser Text wird unter dem "PEER Licence Agreement zur This document is made available under the "PEER Licence Verfügung" gestellt. Nähere Auskünfte zum PEER-Projekt finden Agreement ". For more Information regarding the PEER-project Sie hier: http://www.peerproject.eu Gewährt wird ein nicht see: http://www.peerproject.eu This document is solely intended exklusives, nicht übertragbares, persönliches und beschränktes for your personal, non-commercial use.All of the copies of Recht auf Nutzung dieses Dokuments. Dieses Dokument this documents must retain all copyright information and other ist ausschließlich für den persönlichen, nicht-kommerziellen information regarding legal protection. You are not allowed to alter Gebrauch bestimmt. Auf sämtlichen Kopien dieses Dokuments this document in any way, to copy it for public or commercial müssen alle Urheberrechtshinweise und sonstigen Hinweise purposes, to exhibit the document in public, to perform, distribute auf gesetzlichen Schutz beibehalten werden. Sie dürfen dieses or otherwise use the document in public. Dokument nicht in irgendeiner Weise abändern, noch dürfen By using this particular document, you accept the above-stated Sie dieses Dokument für öffentliche oder kommerzielle Zwecke conditions of use. vervielfältigen, öffentlich ausstellen, aufführen, vertreiben oder anderweitig nutzen. Mit der Verwendung dieses Dokuments erkennen Sie die Nutzungsbedingungen an. -
The Alt-Right Comes to Power by JA Smith
USApp – American Politics and Policy Blog: Long Read Book Review: Deplorable Me: The Alt-Right Comes to Power by J.A. Smith Page 1 of 6 Long Read Book Review: Deplorable Me: The Alt- Right Comes to Power by J.A. Smith J.A Smith reflects on two recent books that help us to take stock of the election of President Donald Trump as part of the wider rise of the ‘alt-right’, questioning furthermore how the left today might contend with the emergence of those at one time termed ‘a basket of deplorables’. Deplorable Me: The Alt-Right Comes to Power Devil’s Bargain: Steve Bannon, Donald Trump and the Storming of the Presidency. Joshua Green. Penguin. 2017. Kill All Normies: Online Culture Wars from 4chan and Tumblr to Trump and the Alt-Right. Angela Nagle. Zero Books. 2017. Find these books: In September last year, Hillary Clinton identified within Donald Trump’s support base a ‘basket of deplorables’, a milieu comprising Trump’s newly appointed campaign executive, the far-right Breitbart News’s Steve Bannon, and the numerous more or less ‘alt right’ celebrity bloggers, men’s rights activists, white supremacists, video-gaming YouTubers and message board-based trolling networks that operated in Breitbart’s orbit. This was a political misstep on a par with putting one’s opponent’s name in a campaign slogan, since those less au fait with this subculture could hear only contempt towards anyone sympathetic to Trump; while those within it wore Clinton’s condemnation as a badge of honour. Bannon himself was insouciant: ‘we polled the race stuff and it doesn’t matter […] It doesn’t move anyone who isn’t already in her camp’. -
Canadian Centre for Policy Alternatives $6.95
CANADIAN CENTRE FOR POLICY ALTERNATIVES MAY/JUNE 2018 $6.95 Contributors Ricardo Acuña is Director of Alex Himelfarb is a former Randy Robinson is a the Parkland Institute and federal government freelance researcher, sits on the CCPA’s Member’s executive with the Privy educator and political Council. Council, Treasury Board, and commentator based in Vol. 25, No. 1 numerous other departments, Toronto. Alyssa O’Dell is Media and ISSN 1198-497X and currently chairs or serves Public Relations Officer at the Luke Savage writes and Canada Post Publication 40009942 on various voluntary boards. CCPA. blogs about politics, labour, He chairs the advisory board The Monitor is published six times philosophy and political a year by the Canadian Centre for Marc Edge is a professor of of the CCPA-Ontario. culture. Policy Alternatives. media and communication Elaine Hughes is an at University Canada West Edgardo Sepulveda is an The opinions expressed in the environmental activist in in Vancouver. His last book, independent consulting Monitor are those of the authors several non-profit groups and do not necessarily reflect The News We Deserve: The economist with more than including the Council of the views of the CCPA. Transformation of Canada’s two decades of utility Canadians, where she chairs Media Landscape, was (telecommunications) policy Please send feedback to the Quill Plains (Wynyard), published by New Star Books and regulatory experience. [email protected]. Saskatchewan chapter. in 2016. He writes about electricity, Editor: Stuart Trew Syed Hussan is Co-ordinator inequality and other Senior Designer: Tim Scarth Matt Elliott is a city columnist of the Migrant Workers economic policy issues at Layout: Susan Purtell and blogger with Metro Editorial Board: Peter Bleyer, Alliance for Change. -
Setting the Record Straighter on Shadow Banning
Setting the Record Straighter on Shadow Banning Erwan Le Merrer, Benoˆıt Morgan, Gilles Tredan,´ Univ Rennes, Inria, CNRS, Irisa IRIT/ENSHEEIT LAAS/CNRS [email protected] [email protected] [email protected] Abstract—Shadow banning consists for an online social net- happens on the OSN side, collecting information about po- work in limiting the visibility of some of its users, without them tential issues is difficult. In this paper, we explore scientific being aware of it. Twitter declares that it does not use such approaches to shed light on Twitter’s alleged shadow banning a practice, sometimes arguing about the occurrence of “bugs” to justify restrictions on some users. This paper is the first to practice. Focusing on this OSN is crucial because of its central address the plausibility of shadow banning on a major online use as a public communication medium, and because potential platform, by adopting both a statistical and a graph topological shadow banning practices were recently commented. approach. Shadow banning and moderation techniques. shadow banning We first conduct an extensive data collection and analysis (SB or banning for short, also known as stealth banning [6]) campaign, gathering occurrences of visibility limitations on user profiles (we crawl more than 2:5 millions of them). In such is an online moderation technique used to ostracise undesired a black-box observation setup, we highlight the salient user user behaviors. In modern OSNs, shadow banning would refer profile features that may explain a banning practice (using to a wide range of techniques that artificially limit the visibility machine learning predictors). -
Big Data for Improved Health Outcomes — Second Edition — Arjun Panesar Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes Second Edition
Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes — Second Edition — Arjun Panesar Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes Second Edition Arjun Panesar Machine Learning and AI for Healthcare Arjun Panesar Coventry, UK ISBN-13 (pbk): 978-1-4842-6536-9 ISBN-13 (electronic): 978-1-4842-6537-6 https://doi.org/10.1007/978-1-4842-6537-6 Copyright © 2021 by Arjun Panesar This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. -
Analyzing Twitter Users' Behavior Before and After Contact By
Analyzing Twitter Users’ Behavior Before and After Contact by Russia’s Internet Research Agency UPASANA DUTTA, RHETT HANSCOM, JASON SHUO ZHANG, RICHARD HAN, TAMARA 90 LEHMAN, QIN LV, SHIVAKANT MISHRA, University of Colorado Boulder, USA Social media platforms have been exploited to conduct election interference in recent years. In particular, the Russian-backed Internet Research Agency (IRA) has been identified as a key source of misinformation spread on Twitter prior to the 2016 U.S. presidential election. The goal of this research is to understand whether general Twitter users changed their behavior in the year following first contact from an IRA account. We compare the before and after behavior of contacted users to determine whether there were differences in their mean tweet count, the sentiment of their tweets, and the frequency and sentiment of tweets mentioning @realDonaldTrump or @HillaryClinton. Our results indicate that users overall exhibited statistically significant changes in behavior across most of these metrics, and that those users that engaged with the IRA generally showed greater changes in behavior. CCS Concepts: • Applied computing ! Law, social and behavioral sciences; • Human-centered com- puting ! Collaborative and social computing. Additional Key Words and Phrases: Internet Research Agency; IRA; Twitter; Trump; democracy ACM Reference Format: Upasana Dutta, Rhett Hanscom, Jason Shuo Zhang, Richard Han, Tamara Lehman, Qin Lv, Shivakant Mishra. 2021. Analyzing Twitter Users’ Behavior Before and After Contact by Russia’s Internet Research Agency. Proc. ACM Hum.-Comput. Interact. 5, CSCW1, Article 90 (April 2021), 24 pages. https://doi.org/10.1145/3449164 INTRODUCTION For many years, the growth of online social media has been seen as a tool used to bring people together across borders and time-zones. -
PREJUDICE and DISCRIMINATION Understanding the Meanings And
PREJUDICE AND DISCRIMINATION Understanding the meanings and origins of prejudice and discrimination is essential to recognize and correct discriminatory policies and practices. "All people are prejudiced." - Prejudice is an unfavorable opinion or feelings formed beforehand or without knowledge, thought, or reason. We regularly make judgments or form opinions without examining all the information. This information, whether correct and incorrect, comes to us through books, news media, television, direct communication and other sources. We may hold preconceived opinions about people or groups of people. We base our opinions on the ideas communicated by others or exposure to some members of a group. It is important to remember that individuals within a group have their own unique characteristics and abilities. For example: If you hold an opinion that women do not like to travel in their jobs and, for this reason, you do not select a woman for a job requiring travel. You have committed a discriminatory act (based on your prejudice); this is unlawful. The "categories" or "groups" protected from discrimination under the laws are: Race and Color -- any race or color. National Origin -- any national origin. Religion -- any religion. (Reasonable accommodations for employee's religious preferences may include changing tours of duty, granting annual leave, etc.) Sex -- female or male. Sexual Harassment (sex discrimination) -- is deliberate or repeated unsolicited verbal comments, gestures or physical sexual contact that are unwelcome. Age -- must be 40 years of age or older. Physical or Mental Handicap -- a disabled person is an individual who has a physical or mental impairment substantially limiting one or more major life activities, has a record of such an impairment, or is regarded as having such an impairment. -
Alternative Spelling and Censorship: the Treatment of Profanities in Virtual Communities Laura-Gabrielle Goudet
Alternative spelling and censorship: the treatment of profanities in virtual communities Laura-Gabrielle Goudet To cite this version: Laura-Gabrielle Goudet. Alternative spelling and censorship: the treatment of profanities in virtual communities. Aspects of Linguistic Impoliteness, 2013. hal-02119772 HAL Id: hal-02119772 https://hal.archives-ouvertes.fr/hal-02119772 Submitted on 4 May 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Alternative spelling and censorship: the treatment of profanities in virtual communities Laura-Gabrielle Goudet Université Paris 13, Sorbonne Paris Cité [email protected] [Author’s version of a paper published in Aspects of Linguistic Impoliteness (2013), Cambridge Scholars Publishing] Introduction Discourse on the internet is characterized by the paradoxical ability of users to write and communicate in alternative ways, with minimal supervision or external regularization—in most, not all communities—while new norms arise and are replaced according to users of virtual communities. On most websites, there is no regulating organ, except the Terms of Service that every registered user has to abide by. The standard version (used on websites like Facebook) includes a clause stipulating that the user should not: “use the Services […] to : upload, post, transmit, share, […] any User content [deemed] harmful, threatening, unlawful, defamatory, infringing, abusive, inflammatory, harassing, vulgar, obscene, […] hateful, or racially, ethnically or otherwise objectionable”. -
Automating Data Science: Prospects and Challenges
Final m/s version of paper accepted (April 2021) for publication in Communications of the ACM. Please cite the journal version when it is published; this will contain the final version of the figures. Automating Data Science: Prospects and Challenges Tijl De Bie Luc De Raedt IDLab – Dept. of Electronics and Information Systems Dept. of Computer Science AASS Ghent University KU Leuven Örebro University Belgium Belgium Sweden José Hernández-Orallo Holger H. Hoos vrAIn LIACS Universitat Politècnica de València Universiteit Leiden Spain The Netherlands Padhraic Smyth Christopher K. I. Williams Department of Computer Science School of Informatics Alan Turing Institute University of California, Irvine University of Edinburgh London USA United Kingdom United Kingdom May 13, 2021 Given the complexity of typical data science projects and the associated demand for human expertise, automation has the potential to transform the data science process. Key insights arXiv:2105.05699v1 [cs.DB] 12 May 2021 • Automation in data science aims to facilitate and transform the work of data scientists, not to replace them. • Important parts of data science are already being automated, especially in the modeling stages, where techniques such as automated machine learning (Au- toML) are gaining traction. • Other aspects are harder to automate, not only because of technological chal- lenges, but because open-ended and context-dependent tasks require human in- teraction. 1 Introduction Data science covers the full spectrum of deriving insight from data, from initial data gathering and interpretation, via processing and engineering of data, and exploration and modeling, to eventually producing novel insights and decision support systems. Data science can be viewed as overlapping or broader in scope than other data-analytic methodological disciplines, such as statistics, machine learning, databases, or visualization [10]. -
Participatory Action Research on Gender-Based Hate Speech Online with a Karnataka-Based Youth Group
Acknowledgments Research team Bhavna Jha, Soujanya Sridharan, Aparna Kalley, Anusha Hegde, Karthik K, Shreyas Hiremath Research report Bhavna Jha, Soujanya Sridharan, Ankita Aggarwal, Tanvi Kanchan, Sneha Bhagwat, Aparna Kalley Session facilitators Soujanya Sridharan, Aparna Kalley, Karthik K, Anusha Hegde, Shreyas Hiremath, Kirana Kumari This report is part of IT for Change’s project, Recognize, Resist, Remedy: Addressing Gender-Based Hate Speech in the Online Public Sphere, supported by International Development Research Centre (IDRC), Canada. This Participatory Action Research project was co-facilitated by IT for Change and Samvada Baduku. To cite this report: IT for Change (2021). Participatory Action Research on Gender-Based Hate Speech Online with a Karnataka-Based Youth Group. Recognize, Resist, Remedy: Addressing Gender-Based Hate Speech in the Online Public Sphere. https://itforchange.net/sites/default/files/1738/PAR-on-gender-based-hate- speech-online-with-a-Karnataka-based-youth-group.pdf 2 Table of Contents Acknowledgments..............................................................................................................................................2 Executive summary.............................................................................................................................................5 1. Rationale and context...................................................................................................................................6 2. Objectives and research questions..............................................................................................................7 -
Introduction: Memories of Slavery
INTRODUCTION MEMORIES OF SLAVERY On 27 April 1848, the Second Republic abolished slavery in its French overseas colonies thus ending three centuries of African slave trade and forced plantation labor. One hundred fifty years later the government of the Fifth Republic for the first time or- ganized extensive official celebrations to commemorate this historic event. The past was resurrected, invading the present with countless memories—though undoubtedly not the same for the French nation and for the formerly enslaved popula- tions in the overseas départements of Guadeloupe, Martinique, French Guiana, and Reunion.1 The governmental commemorations of April 1998 were varied and all took place in France. President Jacques Chirac gave an opening speech, Prime Minister Lionel Jospin hon- ored the abolitionary fervor of the small village of Champag- ney, various ministers presented plaques commemorating important abolitionary figures and French Caribbean artists were invited for a variety of artistic performances. The over- seas domains also organized their own local commemorative functions including exhibitions, conferences, and theater pro- ductions as well as the inauguration of memorials. In Mar- tinique, for instance, scenes of the slave trade were reenacted with the arrival of a slave vessel, the unloading of slaves, and the reconstitution of a slave market. In Guadeloupe, a flame honoring the memory of the nèg mawon (fugitive slave) passed from township to township during the entire year preceding the 150th anniversary and was returned to its starting point amid celebrations, dances, and traditional music. 2 Catherine Reinhardt The most revealing aspects of the commemoration lie in the articles of major French and French Caribbean newspapers such as Le Monde, Libération, Le Figaro, and France-Antilles writ- ten for the occasion. -
The Fringe Insurgency Connectivity, Convergence and Mainstreaming of the Extreme Right
The Fringe Insurgency Connectivity, Convergence and Mainstreaming of the Extreme Right Jacob Davey Julia Ebner About this paper About the authors This report maps the ecosystem of the burgeoning Jacob Davey is a Researcher and Project Coordinator at ‘new’ extreme right across Europe and the US, which is the Institute for Strategic Dialogue (ISD), overseeing the characterised by its international outlook, technological development and delivery of a range of online counter- sophistication, and overtures to groups outside of the extremism initiatives. His research interests include the traditional recruitment pool for the extreme-right. This role of communications technologies in intercommunal movement is marked by its opportunistic pragmatism, conflict, the use of internet culture in information seeing movements which hold seemingly contradictory operations, and the extreme-right globally. He has ideologies share a bed for the sake of achieving provided commentary on the extreme right in a range common goals. It examines points of connectivity of media sources including The Guardian, The New York and collaboration between disparate groups and Times and the BBC. assesses the interplay between different extreme-right movements, key influencers and subcultures both Julia Ebner is a Research Fellow at the Institute for online and offline. Strategic Dialogue (ISD) and author of The Rage: The Vicious Circle of Islamist and Far-Right Extremism. Her research focuses on extreme right-wing mobilisation strategies, cumulative extremism and European terrorism prevention initiatives. She advises policy makers and tech industry leaders, regularly writes for The Guardian and The Independent and provides commentary on broadcast media, including the BBC and CNN. © ISD, 2017 London Washington DC Beirut Toronto This material is offered free of charge for personal and non-commercial use, provided the source is acknowledged.