New Trends in Social Media

Total Page:16

File Type:pdf, Size:1020Kb

New Trends in Social Media ISBN 978-9934-8644-7-6 1 NEW TRENDS IN SOCIAL MEDIA PREPARED BY THE NATO STRATEGIC COMMUNICATIONS CENTRE OF EXCELLENCE 1 ISBN 978-9934-8644-7-6 NEW TRENDS IN SOCIAL MEDIA Project director: Beata Bialy, Sanda Svetoka Text Editor: Juris Beņķis Production & Copy Editor:Linda Curika The NATO StratCom Centre of Excellence, based in Latvia, is a multinational, cross-sector organization which provides comprehensive analyses, advice and practical support to the alliance and allied nations. This report is a product of the NATO Strategic Communications Centre of Excellence (NATO StratCom COE). It is produced for NATO, NATO member countries, NATO partners, related private and public institutions and related individuals. It does not represent the opinions or policies of NATO. © All rights reserved by the NATO StratCom COE. Reports may not be copied, reproduced, distributed or publicly displayed without reference to the NATO StratCom COE. Cover photo: Alex Ingram Flickr creative commons licence Riga, December 2016 NATO Strategic Communications Centre of Excellence Riga, Kalnciema iela 11b, Latvia LV1048 www.stratcomcoe.org Ph.: 0037167335463 [email protected] 2 OUR LATEST PUBLICATIONS 3 TABLE OF CONTENTS FOREWORD ………...................................................................................................................……………………..4 INTRODUCTION………………………………………..................................................................…..……6 SOCIAL MEDIA TRENDS……………………….........................................................................................…………7 Social media – from participation to monetizing …...................................................………...7 Globalisation and consolidation of social media ……..................................................…......10 Mobile revolution as a game changer …………………..........................................……...12 Towards closed networks …………………………………….......................................................………16 Social media content: less text, more image ………….................................................….....19 Real time forms of communication…………………….....................................................………23 Future social media innovations ………………………...........................................................……...25 Social media as a source of news ……………………......................................................……….27 From social exchange to powerful weapon ………….........................................................………30 Attempts to control the internet ……………………….........................................................………36 SURVEY ON NATO STRATCOM PERSONNEL’S UNDERSTANDING AND USE OF SOCIAL MEDIA .....… 38 CONCLUSIONS ………………………………………………........................................................................................... 41 RECOMMENDATIONS…………………………………....................................................................................….......44 4 FOREWORD In the current media landscape, warfare. Since its development social media has taken on a very in the early 2000s, social media prominent role. It has evolved into a has become an important tool mainstream information channel and for influencing people’s attitudes, developed into a new online platform beliefs and behaviour. Both states through which people organise their and terrorist groups are exploiting lives. Social media influences almost social media platforms effectively and every aspect of human interaction, experimenting with the engagement and the online and offline worlds are techniques and types of content that increasingly merging. best achieve their political or military goals. Social media has become one of the main channels through which In order to be better prepared for people connect and communicate, this rapidly changing information as well as getting news, however environment, the Polish National as the technology develops, social Ministry of Defence requested media consumption habits and that the NATO StratCom Centre communication models are also of Excellence explore the current changing unpredictably, both in terms trends in social media, analyse its of speed and direction. potential development in the future, including usage patterns, models of Social media has also emerged as a communication and engagement powerful weapon, used more and techniques. more frequently in information 5 This report is the outcome of that request and will seek to: Social media has also - Identify social media trends in emerged as a powerful types of platform and content. weapon, used more - Analyse usage patterns. and more frequently in - Analyse the expectations from information warfare. the further opportunities social media offers NATO and its member states. - Discuss the threats and opportunities presented by the use of social media, as well as The report includes social media analyse current gaps in NATO’s usage statistics and a literature review, communications via social as well as lessons learned from the media. communication efforts during recent - Develop recommendations on NATO exercises. Finally, it presents the how to further improve current main outcome from the survey carried communication techniques in out by NATO StratCom COE on the order to support the strategic perception, understanding and use of communication needs of social media by NATO communication governments, armed forces and personnel. NATO in the future. The report summarises the conclusions of the expert seminar New Trends in Social Media, organised in Riga on 18-19 April 2016 by NATO StratCom COE. The seminar attracted more than 50 communication practitioners, industry representatives and academics. 6 INTRODUCTION Interest in social media development based on gender, age, country, and efforts to predict ‘the next big leisure and consumption habits, etc.1 thing’ have been hot topics for In a very broad perspective, these communicators, marketers, investors statistical data can delineate usage and governments since its advent. patterns and give a sense of how they Questions – such as which platforms have changed over time. However, for your audiences are using, how better more elaborated results and a real to approach and reach them, where understanding of which audiences they could potentially migrate to in are using which platforms and how, the future, and has any revolutionary more targeted research is required, new platform been developed that assessing the specific requirements of will replace the currently popular ones the audiences of interest. This report – have been on the agenda for anyone presents the most visible trends trying to promote brands. Hundreds observed in social media during the of research companies and think tanks last few years. provide regular statistical updates on global and regional usage patterns 1 Examples of global statistical trends can be found at: globalwebindex.net, http:// www.statista.com/,http://wearesocial.com/uk/ special-reports/digital-in-2016, http://www. smartinsights.com/social-media-marketing/ social-media-strategy/new-global-social-media- research/, as well as the websites of many other internet research companies focusing on specific countries. 7 SOCIAL MEDIA TRENDS SOCIAL MEDIA – social media corporations that today can offer a variety of services such FROM PARTICIPATION TO as instant photo/video sharing, live MONETIZING video streaming, direct messaging, match-making – all interconnected on one platform. The early history of social media goes back to the 1980s and amateur- Several factors can be identified driven discussion forums such as as having driven the development USENET groups or Bulletin Board of social media and its evolution Systems (BBS) where people gathered over time. Originally, the need for to share their views, interests and connectedness was what encouraged experiences. Over time, they grew many people to start using social into sites that connected friends and media sites. At the time Web 2.0 relatives, either people you already provided technical opportunities for knew (like Classmates.com) or people the rise of social media in the early you connect to through networks of 2000s, ‘participatory culture’ was your friends (like SixDegrees.com). the buzzword phrase designating the Friendster (based on a similar idea web’s potential to provide wide-range to SixDegrees.com), created in 2002, connections, build communities and was the first social media site to reach advance democracy. This connectivity 1 million members. From there, social quickly evolved into a valuable media gradually developed into large resource, as software engineers 8 NUMBERS OF SOCIAL NETWORK USERS WORLDWIDE FROM 2010 TO 2019 (BILLIONS) 3 2.72 2.55 2.5 2.39 2.22 2.04 2 1.87 1.59 1.5 1.4 1.22 0.97 1 Number of users in billions Number of users 0.5 0 2010 2011 2012 2013 2014 2015 2016* 2017* 2018* 2019* ©Statista 2016 found ways to code information into with clear market leader Facebook algorithms that helped commercial having 1.59 billion active users alone3. brands identify their particular form It is predicted that this number will of online sociality and so make continue to grow in line with the them profitable in online markets. rapid increase in mobile device and Large and influential platforms such smartphone usage4. as Facebook, Twitter, YouTube and LinkedIn exploded in numbers of The push for monetizing started to users and monetizing potential, along be visible even in those platforms with numerous smaller profit-based which had been previously reluctant and non-profit sites2. If we look at to
Recommended publications
  • Human Rights Protocol Considerations Research Group S
    Human Rights Protocol Considerations Research Group S. Abraham Internet-Draft CIS India Intended status: Informational MP. Canales Expires: January 16, 2018 Derechos Digitales J. Hall CDT O. Khrustaleva American University N. ten Oever ARTICLE 19 C. Runnegar ISOC S. Sahib Cisco Systems July 15, 2017 Implementation Report for HTTP Status Code 451 (RFC 7725) draft-451-imp-report-00 Abstract This report describes implementation experience between various components working with the HTTP Status Code 451 [RFC7725], a risk assessment and recommendation for improvements. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on January 16, 2018. Copyright Notice Copyright (c) 2017 IETF Trust and the persons identified as the document authors. All rights reserved. Abraham, et al. Expires January 16, 2018 [Page 1] Internet-Draft 451ImpReport July 2017 This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document.
    [Show full text]
  • REGUS Infographic Rev 1
    The changing world of work New technologies are making it easier than ever to create intercontinental workforces and put our businesses on the global map. Employees are looking to use this new connectivity to create a better work-life balance and to make their daily output more efficient. Our latest survey shows how this change has already started, and reveals many of the ideas and motivations behind the flexible working revolution. Remote working on the rise 54% 83% 54% of global respondents 83% of executives plan to already work remotely 2.5 increase their use of flexible days per week or more. employment in the coming years, meaning these numbers are set to rise. The global context Working mothers, ageing populations and young workers seeking flexibility are changing the nature of the global workforce. 6% Returning mothers 13% Older workers remaining beyond their pensionable age 19% Outsourced suppliers 22% Part-time workers 29% Freelance workers 30% Consultants 33% Other The role of technology New Cloud technology, better Wi-Fi and modern communication tools mean we’re on call 24/7. Messaging tools used in the previous month: Whatsapp Skype Facebook Messenger WeChat Viber Snapchat LINE QQ MessageMe Tango ChatOn Hike Kakaotalk Nibuzz 0% 10% 20% 30% 40% 50% 60% 70% Online flexible working tools used in the last month: Dropbox Google Drive Video conferencing Team Viewer WeTransfer Server cloud access Google Hangouts MS Remote Desktop Chrome remote desktop Virtual workgroups Apple remote desktop GoToMyPC LogMeIn Ignition Splashtop Wyse PocketCloud 0% 10% 20% 30% 40% 50% 60% 70% Relishing remote work As these tech advances help employees take their work with them, they’re increasingly seeing the advantages of flexible workspaces.
    [Show full text]
  • Best VPN Services in 2017 (Speed, Cost & Usability Reviews)
    10/8/2017 Best VPN Services in 2017 (Speed, Cost & Usability Reviews) Best VPN Services VPN Reviews & In-Depth Comparisons Brad Smith Sep 18, 2017 With the help of John & Andrey (https://thebestvpn.com/contact-us/), we’ve put together a list of best VPNs. We compared their download/upload speed, support, usability, cost, servers, countries and features. We also analyzed their TOS to see if they keep logs or not and whether they allow P2P and work with Netflix. here’s a link to the spreadsheet (https://docs.google.com/spreadsheets/d/11IZdVCBjVvbdaKx2HKz2hKB4F Z_l8nRJXXubX4FaQj4/) You want to start using a VPN, but don’t know which software/service to use? In this page, we’ve reviewed 30+ most popular VPN services (on going process). In order to find out which are best VPNs, we spent some time on research and speed testing: 1. Installed 30+ VPN software on our personal devices, such as Windows, Mac, Android and iOS and compared their usability. 2. Performed Download/Upload speed tests on speedtest.net to see which had best performing servers. 3. Double checked if they work with Netflix and allow P2P. 4. Read their TOS to verify if they keep logs or not. 5. Compared security (encryption and protocols). That means we’ve dug through a large number of privacy policies (on logging), checked their features, speed, customer support and usability. If you know a good VPN provider that is not listed here, please contact us and we’ll test it out as soon as possible. 5 Best VPNs for Online Privacy and Security Here are the top 5 VPN services of 2017 after our research, analysis, monitoring, testing, and verifying.
    [Show full text]
  • Network and Device Forensic Analysis of Android Social-Messaging Applications
    DIGITAL FORENSIC RESEARCH CONFERENCE Network And Device Forensic Analysis Of Android Social-Messaging Applications By Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Frank Breitinger and Jason Moore Presented At The Digital Forensic Research Conference DFRWS 2015 USA Philadelphia, PA (Aug 9th - 13th) DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working groups, annual conferences and challenges to help drive the direction of research and development. http:/dfrws.org Network'and'device'forensic'analysis'of'' Android'socialOmessaging'applica=ons' Daniel'Walnycky,'Ibrahim'Baggili,'Andrew'Marrington,' Jason'Moore,'Frank'Brei=nger' Graduate'Research'Assistant,'UNHcFREG'Member' Presen=ng'@'DFRWS,'Philadelphia,'PA,'2015' Agenda' • Introduc=on' • Related'work' • Methodology' • Experimental'results' • Discussion'and'conclusion' • Future'work' • Datapp' 2' Introduc=on' Tested'20'Android'messaging'apps'for'“low'hanging'fruit”'a.k.a'unencrypted'data:' • on'the'device,'in'network'traffic,'and'on'server'storage' Found'eviden=ary'traces:'passwords,'screen'shots,'text,'images,'videos,'audio,'GPS' loca=on,'sketches,'profile'pictures,'and'more…' 3' Related'work' • Forensic'value'of'smartphone'messages:' • Smartphones'may'contain'the'same'rich'variety'of'digital'evidence'which'might'be'found'on'a'computer'
    [Show full text]
  • Resolving Mobile Communique App Using Classification of Data Mining Technique
    ISSN:0975-9646 M.Mohamed Suhail et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2) , 2016, 583-587 Resolving Mobile Communique App Using Classification of Data Mining Technique M.Mohamed Suhail, Lecturer,Department of Computer Science, Jamal Mohamed College, Trichy, K.SyedKousarNiasi, Assistant Professor,Department of Computer Science, Jamal Mohamed College, Trichy, Abstract- A mobile app is a software application Data Mining refers to extracting or “mining” developed specifically for use on small, wireless computing knowledge from large amount of data.Many other terms devices, such as smartphones and tablets, rather than carry a similar or slightly different meaning to Data mining, desktop or laptop computers.On the Internet and mobile such as knowledge mining from data, knowledge app, chatting is talking to other people who are using the extraction, data/pattern analysis, Data archaeology, and Internet at the same time you are. Usually, this "talking" is Data dredging.Many people treat data mining as a synonym the exchange of typed-in messages requiring one site as the for another popularly used term, Knowledge Discovery repository for the messages (or "chat site") and a group of form Data, or KDD.Data mining has attracted a great deal users who take part from anywhere on the Internet.In this of attention in the information industry and in society as a work, we apply classification techniques of data mining whole in recent years, due to the wide availability of huge using a dataset of some mobile applications (eg. whatsapp, amounts of data and the imminent need for turning such Line…etc.,) to analyze the messengers.
    [Show full text]
  • THE ARMENIAN Ctator Volume LXXXVII, NO
    MAY 27, 2017 Mirror-SpeTHE ARMENIAN ctator Volume LXXXVII, NO. 45, Issue 4489 $ 2.00 NEWS The First English Language Armenian Weekly in the United States Since 1932 INBRIEF Flights Launched DC Police Arrest Between Yerevan and Turkish Guards Tel Aviv YEREVAN (Public Radio of Armenia) — The For Attacking Armenia Aircompany carried the first passengers from Yerevan to Tel Aviv this week. Demonstrators The maiden flight was preceded by a presenta- tion at Zvartnots Airport. Attending the event were Sergey Avetisyan, chief Turkey Chides US Envoy of the General Department of Civil Aviation of Over Handling of Brawl at Armenia, Andranik Shkhyan, deputy general man- Washington Protest ager of Armenia International Airports and Robert Oganesyan, CEO of Armenia Aircompany, directors ISTANBUL (New York Times and of tourism agencies and others. Washington Post) — The Turkish Foreign Avetisyan emphasized the importance of Ministry summoned the American ambas- Yerevan-Tel Aviv flights and wished the Air sador in Ankara on Monday, May 22, to Company safe and effective flights. The Yerevan-Tel Aviv flights will run twice a week complain about the detention of two President Trump and First Lady Melania visited the Church of the Holy Sepulchre. Turkish security officers outside the on Thursdays and Sundays. Turkish Embassy in Washington the prior week, a Turkish official said. Trump Visits Church of the Holy Sepulchre in L.A. Chamber Cancels The detentions occurred about two Jerusalem, Meets Armenian Patriarch hours after Turkish government body- Turkey Business Forum guards were filmed assaulting several pro- JERUSALEM (Armenpress) — US President Donald Trump visited the Church After Protest Beating (RUDAW PHOTO) of the Holy Sepulchre in Jerusalem on Monday, May 15.
    [Show full text]
  • VPN Report 2020
    VPN Report 2020 www.av-comparatives.org Independent Tests of Anti-Virus Software VPN - Virtual Private Network 35 VPN services put to test LANGUAGE : ENGLISH LAST REVISION : 20 TH MAY 2020 WWW.AV-COMPARATIVES.ORG 1 VPN Report 2020 www.av-comparatives.org Contents Introduction 4 What is a VPN? 4 Why use a VPN? 4 Vague Privacy 5 Potential Risks 5 The Relevance of No-Logs Policies 6 Using VPNs to Spoof Geolocation 6 Test Procedure 7 Lab Setup 7 Test Methodology 7 Leak Test 7 Kill-Switch Test 8 Performance Test 8 Tested Products 9 Additional Product Information 10 Consolidations & Collaborations 10 Supported Protocols 11 Logging 12 Payment Information 14 Test Results 17 Leak & Kill-Switch Tests 17 Performance Test 19 Download speed 20 Upload speed 21 Latency 22 Performance Overview 24 Discussion 25 General Security Observations 25 Test Results 25 Logging & Privacy Policies 26 Further Recommendations 27 2 VPN Report 2020 www.av-comparatives.org Individual VPN Product Reviews 28 Avast SecureLine VPN 29 AVG Secure VPN 31 Avira Phantom VPN 33 Bitdefender VPN 35 BullGuard VPN 37 CyberGhost VPN 39 ExpressVPN 41 F-Secure Freedome 43 hide.me VPN 45 HMA VPN 47 Hotspot Shield 49 IPVanish 51 Ivacy 53 Kaspersky Secure Connection 55 McAfee Safe Connect 57 mySteganos Online Shield VPN 59 Norton Secure VPN 63 Panda Dome VPN 65 Private Internet Access 67 Private Tunnel 69 PrivateVPN 71 ProtonVPN 73 PureVPN 75 SaferVPN 77 StrongVPN 79 Surfshark 81 TorGuard 83 Trust.Zone VPN 85 TunnelBear 87 VPNSecure 89 VPN Unlimited 91 VyprVPN 93 Windscribe 95 ZenMate VPN 97 Copyright and Disclaimer 99 3 VPN Report 2020 www.av-comparatives.org Introduction The aim of this test is to compare VPN services for consumers in a real-world environment by assessing their security and privacy features, along with download speed, upload speed, and latency.
    [Show full text]
  • Technical and Legal Overview of the Tor Anonymity Network
    Emin Çalışkan, Tomáš Minárik, Anna-Maria Osula Technical and Legal Overview of the Tor Anonymity Network Tallinn 2015 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non- profit and non-commercial purpose, provided that copies bear a full citation. www.ccdcoe.org [email protected] 1 Technical and Legal Overview of the Tor Anonymity Network 1. Introduction .................................................................................................................................... 3 2. Tor and Internet Filtering Circumvention ....................................................................................... 4 2.1. Technical Methods .................................................................................................................. 4 2.1.1. Proxy ................................................................................................................................ 4 2.1.2. Tunnelling/Virtual Private Networks ............................................................................... 5
    [Show full text]
  • July 21, 2021 Ms. Lisa R. Barton Secretary to the Commission U.S
    July 21, 2021 Ms. Lisa R. Barton Secretary to the Commission U.S. International Trade Commission 500 E Street SW Washington, D.C. 20436 Re: Investigation No. 332-585 Dear Ms. Barton: Pursuant to the notice issued by the U.S. International Trade Commission (ITC), the Computer & Communications Industry Association (CCIA) submits the following written comments in relation to Investigation No. 332-585: Foreign Censorship Part 1: Policies and Practices Affecting U.S. Businesses. These comments supplement the testimony delivered at the July 1, 2021 public hearing. Respectfully submitted, /s/ Rachael Stelly Rachael Stelly Policy Counsel Computer & Communications Industry Association 25 Massachusetts Avenue NW, Suite 300C Washington, DC 20001 [email protected] Office: (202) 534-3901 Before the Office of the United States International Trade Commission Washington, D.C. In re Foreign Censorship Part 1: Policies and Investigation No. 332-585 Practices Affecting U.S. Businesses WRITTEN COMMENTS OF THE COMPUTER & COMMUNICATIONS INDUSTRY ASSOCIATION (CCIA) Pursuant to the notice issued by the U.S. International Trade Commission (ITC), the Computer & Communications Industry Association (CCIA) submits the following written comments in relation to Investigation No. 332-585: Foreign Censorship Part 1: Policies and Practices Affecting U.S. Businesses.1 CCIA is an international, not-for-profit trade association representing a broad cross section of communications and technology firms. For nearly fifty years, CCIA has promoted open markets, open systems, and open networks. CCIA members employ more than 1.6 million workers, invest more than $100 billion in research and development, and contribute trillions of dollars in productivity to the global economy.2 CCIA welcomes the opportunity to document various regulations and policy frameworks that serve as market access barriers for Internet services.
    [Show full text]
  • Cloudera Whatsapp
    LOS ANGELES | SAN FRANCISCO | NEW YORK | BOSTON | SEATTLE | MINNEAPOLIS | MILWAUKEE August 13, 2013 Michael Pachter Steve Koenig (213) 688-4474 (415) 274-6801 [email protected] [email protected] PRISM … Progress Report for Internet and Social Media In This Issue: Cloudera, WhatsApp Cloudera Big Data analysis firm founded by four tech veterans from Facebook, Yahoo, Google and Oracle. Developed applications based on open source Apache Hadoop to process large data sets. Has raised $141 million over five rounds of funding. Annual revenue estimated at $100 million. Market expected to grow at 54% CAGR over next five years. WhatsApp Mobile instant messaging service with 250 million global monthly active users. Subscription-based revenue model; no advertisements or virtual goods. Mostly self-funded, with only $8 million raised in four years. STRATEGIES GROUP THE INFORMATION HEREIN IS ONLY FOR ACCREDITED INVESTORS AS DEFINED IN RULE 501 OF REGULATION D UNDER THE SECURITIES ACT OF 1933 OR INSTITUTIONAL INVESTORS. WEDBUSH PRIVATE COMPANY Wedbush Securities does and seeks to do business with companies covered in its research reports. Thus, investors should be aware that the firm may have a conflict of interest that could affect the objectivity of this report. Investors should consider this report as only a single factor in making their investment decision. Please see page 10 of this report for analyst certification and important disclosure information. Cloudera Cloudera offers scalable and efficient data storage and analytics solutions to companies in the enterprise, Internet and government sectors. The company, based in Palo Alto, was launched in 2008 by three top engineers from Google, Yahoo, and Facebook (Christophe Bisciglia, Amr Awadallah, and Jeff Hammerbacher, respectively) who joined former Oracle executive Michael Olson to address problems inherent in analyzing large volumes of data quickly.
    [Show full text]
  • ENSURING a FUTURE for DETECTING INTERNET DISRUPTIONS a Field Survey of the Ecosystem Around Internet Censorship, Disruptions, and Shutdowns
    ENSURING A FUTURE FOR DETECTING INTERNET DISRUPTIONS A Field Survey of the Ecosystem Around Internet Censorship, Disruptions, and Shutdowns JUNE 2017 Acknowledgements About New America Thank you to the following for their contributions to this New America is committed to renewing American politics, work: Collin Anderson, Seamus Tuohy, Liz Woolery, Georgia prosperity, and purpose in the Digital Age. We generate big Bullen, and Enrique Piracés. ideas, bridge the gap between technology and policy, and curate broad public conversation. We combine the best of a policy research institute, technology laboratory, public Thank you also to the members of the internet forum, media platform, and a venture capital fund for measurement community who took the time to participate ideas. We are a distinctive community of thinkers, writers, in this research. researchers, technologists, and community activists who believe deeply in the possibility of American renewal. Find out more at newamerica.org/our-story. About OTI The Open Technology Institute (OTI) works at the intersection of technology and policy to ensure that every community has equitable access to digital technology and its benefits. We promote universal access to communications technologies that are both open and secure, using a multidisciplinary approach that brings together advocates, researchers, organizers, and innovators. Find out more at www.newamerica.org/oti. OPEN TECHNOLOGY INSTITUTE Contents Executive Summary 2 Introduction 4 Overview of the State of Shutdown Measurement 10 Introduction to Recommendations 15 Recommendations 18 Conclusion 31 Appendices 32 Notes 43 OPEN TECHNOLOGY INSTITUTE EXECUTIVE SUMMARY When it comes to the internet, we live in a world of of researchers that study internet censorship, contradictions.
    [Show full text]
  • Playing It Safe Table of Contents
    Playing It Safe Table of Contents Chief’s Greeting ..................................................3 Appendix 4 — Specific Policies for About the Harvard University Separate Campuses ......................................... 68 Police Department ...............................................4 Appendix 5 — Calling the HUPD/Reporting a Crime ................10 Procedures for Handling Complaints Involving Students Pursuant to the Sexual and Behavioral Assessment and Gender-Based Harassment Policy ......................70 Consultation Team (BACT).................................12 Appendix 6 — Active Shooter Safety Guidelines ........................13 Procedures for Handling Complaints Involving Staff Pursuant to the Sexual and Gender- Crime Awareness ..............................................14 Based Harassment Policy .................................107 Your Role in Preventing Crime ........................... 20 Appendix 7 — Sexual Assault, Domestic Violence, Procedures for Handling Complaints Dating Violence, and Stalking ............................24 Involving Faculty Pursuant to the Sexual and Gender-Based Harassment Policy ....................121 Hate Crimes..................................................... 40 Harassment ......................................................42 Alcohol and Drug Policies ..................................42 Missing Persons Policy .......................................51 Sex Offender Registry ........................................51 Fire Safety .........................................................51
    [Show full text]