Number of Posts: 9
Posts 1 - 9
How Hate Groups Forced Online Platforms to Reveal Their True Nature
Newspaper | The New York Times
Date | 21.8.2017
Language | English
Country | U.S.
Topic Tags | censorship, politics, social media, threat
Summary | Ever since the fatal Unite the Right protest in Charlotteville, social media and other internet companies seem to be washing their hands from any connection with far-right groups. Facebook has deleted such groups off of their platform, Reddit has done the same, Spotify is deleting white supremacist music from their libraries, and so on. Now far-right groups are building online alternatives for themselves and lamenting the censorship they have been victimized by.
Image Description | Illustration of hands around some crumpled-up paper.
Image Tags | hand(s)
Germany vs. Twitter
Newspaper | The New York Times
Date | 21.6.2017
Language | English
Country | U.S.
Topic Tags | law, threat, Twitter
Summary | The German government demands that Twitter remove illegal content (some offensive language is illegal in Germany) from the platform within 24 hours. If they fail to do so, Germany threatens to fine them up to 50 million euros. Now social media platforms have begun deleting German accounts which are even just coming close to illegal content so as not to risk a fine.
Image Description | Hand holding a lens over the Twitter logo.
Image Tags | hand(s), logo, Twitter
Facebook takes a new crack at halting fake news and clickbait
Newspaper | USA Today
Date | 17.5.2017
Language | English
Country | U.S.
Topic Tags | Facebook, fake news, threat
Summary | Facebook has announced that it will work on new strategies to flag fake news on their platform by labeling them "disputed". Facebook's activism will also target click bait stories which can be equally misleading. Click bait are headlines which leave out essential content or grossly exaggerate to lure people into clicking on the link.
Image Description | Getty image of a woman's hand holding a smartphone showing the Facebook logo in front of a screen showing the Facebook sign-in page.
Image Tags | computer/laptop, Facebook, female(s), hand(s), logo, smartphone
How to Protect Your Privacy as More Apps Harvest Your Data
Newspaper | The New York Times
Date | 2.5.2017
Language | English
Country | U.S.
Topic Tags | law, marketing, privacy, smartphone, threat
Summary | Many smartphone apps can be used for free, or rather one does not have to pay money to use it. However, if the app is not from a non-profit organization, users pay in some other way that may be obscure to them. Usually free for-profit apps collect data abou their users that they can sell to advertisers. The only way to protect oneself from this is to carefully read the terms and conditions, even if they are in legalese. If one does not like the level of privacy provided by an app, the only certain way to avoid data exploitation is not to download the app.
Image Description | Illustration of a hand holding a smartphone where eyes are hidden behind the app icons.
Image Tags | hand(s), smartphone
Justice Dept. calls Apple's encryption fight 'a diversion'
Newspaper | Washington Post
Date | 10.3.2016
Language | English
Country | U.S.
Topic Tags | law, marketing, privacy, smartphone, threat
Summary | Ever since the FBI asked Apple to unlock a terrorist's iPhone, a huge debate around user privacy has ensued. Other tech companies side with Apple with the position that aiding the FBI at the expense of user privacy would open the gate for masses of future cases. The Justice Department however accuses Apple of purposefully making unbreachable smartphones, which may be good for user privacy (and thus for profit) but a huge problem for the police to be able to investigate criminal cases.
Image Description | Hand holding an iPhone.
Image Tags | hand(s), smartphone
Free Tools to Keep Those Creepy Online Ads From Watching You
Newspaper | The New York Times
Date | 18.2.2016
Language | English
Country | U.S.
Topic Tags | marketing, privacy, threat
Summary | Many companies track potential customers' internet activity so that they find out when someone, for instance, has the flu and will likely respond to flu medication advertisements. They collect data about all users when they visit a tracking website and then tailor advertising to specific target groups. This is a violation of our privacy because this process is very obscure and it is difficult to protect oneself from it but there are a few softwares one can get to stop companies from tracking one's online activity.
Image Description | Hands typing on a laptop keyboard.
Image Tags | computer/laptop, hand(s)
Revenge Porn Must Be Criminalized
Newspaper | Huffington Post
Date | 6.4.2017
Language | English
Country | U.S.
Topic Tags | cyberbullying, law, sexting, threat
Summary | There have been more and more cases of people posting intimate photographs of their ex-lovers on the internet. The practice is called revenge porn and it is horrible for the victims: their most intimate images are shared with the whole world without their consent and they cannot really erase the images from the internet afterards. New York CIty is now working on criminalizing the distribution of revenge porn - something that should already have happened long ago.
Image Description | Getty image of hands typing on a laptop.
Image Tags | computer/laptop, hand(s)
Twitter says it's cracking down on abuse (again)
Newspaper | USA Today
Date | 7.2.2017
Language | English
Country | U.S.
Topic Tags | cyberbullying, politeness, threat, Twitter
Summary | Twitter has been struggling with trolls, racists, and sexists since its advent but now a new motivation has presented itself. When investors such as Disney pull back their offers, Twitter headquarters begin to seriously look into the matter again. Twitter did very little to combat users who are only on Twitter to insult other users - they can be suspended but it is impossible to keep them from creating another anonymous account. For now, users can choose to mute certain words, posts, or threads so that they don't receive notifications for hateful content.
Image Description | Photograph of a hand-held smartphone showing the Twitter icon.
Image Tags | hand(s), smartphone, Twitter
Hysteria Over Sexting Reaches Peak Absurdity
Newspaper | The Atlantic
Date | 10.7.2014
Language | English
Country | U.S.
Topic Tags | law, sexting, threat, youth
Summary | The law’s classification of juvenile sexting as child pornography is illegitimate. Puts emphasis of legal prosecution on distinction between consensual vs. non-consensual sexting. Non-consensual sexting may then be seen as harrassment or exhibitionism in which case a restraining order could be issued rather than putting the minor who takes explicit pictures of him- or herself in prison and on the sex offenders list. The need to update child pornography laws to exclude consensual sexting among minors became very clear in a Virginia case where the police wanted to photograph a 17 year old suspects' erect penis for court evidence.
Image Description | Close-up photograph of a male-persons groin are with the genitalia covered by the hands.
Image Tags | hand(s), male(s)
Page 1 of 1