"Las periodistas mujeres son atacadas, al igual que sus colegas varones, por los temas políticos o de coyuntura que publican; pero se utilizan contra ellas muchas más expresiones discriminatorias vinculadas al género y agresiones con connotaciones sexuales. En los ataques contra las periodistas h
...
ay aproximadamente 10% más de menciones que ponen en duda su capacidad intelectual; 20% más de expresiones sexistas; 30% más de comentarios vinculados a su apariencia física. La cobertura de manifestaciones vinculadas a la agenda de género y la expresión de posiciones favorables a la misma, particularmente hacia la legalización del aborto, son una razón extra por las que son atacadas las periodistas mujeres. Las mujeres manifestaron más afectación a su subjetividad a partir de los ataques y mayor vulneración de su derecho a la libertad de expresión; a la vez fueron más proactivas en la modificación de prácticas digitales." (Resumen ejecutivo, página 10)
more
"Die Propaganda der terroristischen Miliz "Islamischer Staat" hat für Aufsehen gesorgt und die Debatte um das Internet und vor allem das "Social Web" als Risikotechnologie oder Gefahrenraum mitbestimmt. Dabei setzt der IS auf ein breites Spektrum medialer und gestalterischer Formen und Formate eine
...
r globalen, digitalen Medienkultur, um ein internationales Publikum zu erreichen: Online-Videos, anashid (Lieder) und Computerspiele; Internet-Meme, Social Media Posting oder Selfies. Der Sammelband gibt Einblick in die Bandbreite dieser jihadistischen Kommunikate, ihrer Ausdrucks- und Darstellungsweisen und zeigt dabei Möglichkeiten der Einordnung und der Auseinandersetzung auf." (Verlagsbeschreibung)
more
"Concerns surrounding the threats that digital platforms pose to the functioning of Western liberal democracies have grown since the 2016 U.S. election. Yet despite a preponderance of academic work in this area, the precise nature of these threats, empirical solutions for their redress, and their re
...
lationship to the wider digital political economy remain undertheorized. This article addresses these gaps with a semisystematic literature review that identifies and defines four prominent threats—fake news, filter bubbles/echo chambers, online hate speech, and surveillance—and constructs a typology of “workable solutions” for combating these threats that highlights the tendency to silo technical, regulatory, or culturally embedded approaches." (Abstract)
more
"You will find information and advice on everything from how to source rumours and factcheck information, to how to share actionable and practical answers to address these rumours. Internews Rumour Tracking Methodology is designed to be flexible and responsive to local context – and you should be
...
too. While there are minimum standards that every project should include in order to implement the Internews Rumour Tracking Methodology (see minimum standards, page 6), projects need to build on these standards based on local contexts." (Page 5)
more
"The cases discussed in this chapter have demonstrated how disinformation and rhetoric that is spread through social media in the developing world often meets the Benesch criteria for dangerous speech. It comes from influential sources, which can include family and friends who share it. It plays on
...
audience fears by persuading them that members of their group are being attacked by a rival group. It sometimes dehumanizes other groups and issues direct calls for violence against them. It happens where there are longstanding ethnic tensions and grievances. And where the media landscape is weak or suppressed, social media becomes a primary source of information, making it an especially influential means of transmission. There are several characteristics shared by developing countries, particularly those with a recent history of conflict and/or government repression, that make them more vulnerable to dangerous speech spread by social media. This includes low media or digital literacy, a lack of available alternative media and the prevalence of untraceable messaging platforms such as WhatsApp." (Conclusion)
more
"This review seeks to inform United States Agency for International Development (USAID) evaluation of countering violent extremism (CVE) programming in Asia and globally by exploring two research questions: 1. Under current conditions, is it possible to develop a model or methodology to test the rel
...
ationship between CVE programming and extremist violence? 2. What high-level outcomes other than violence reduction might be linked to CVE programming? What approaches could be used to measure such outcomes? USAID defines violent extremism (VE) as “…advocating, engaging in, preparing, or otherwise supporting ideologically motivated or justified violence to further social, economic, and political objectives.” In practice, the threat posed by religiously motivated violent extremist groups has drawn primary concern. Violent religious extremism can and often does function in combination with aggrieved ethnic identity groups pursuing communal advantages. VE’s defining elements include a desire to reorder society in line with a given ideology and the interests of the group proclaiming the ideology, pursuit of sociopolitical and economic objectives, and a willingness and capacity to use violence as a tactic to pursue these objectives. How individual and community incentives and risk factors, structural conditions, enabling factors, and external triggers interact to produce extremist beliefs, support for VE actors and actions, recruitment into a violent extremist organization (VEO), or violence itself is not fully understood. Correspondingly, CVE programs occur in diverse settings and encompass a variety of interventions and intermediate outcomes. The amount of USAID financial investment in CVE programming in a given country is often small relative to the scale and complexity of the VE problem and its drivers, limiting the change to which a program can aspire and for which it might reasonably be held accountable." (Executive summary)
more
"The most extreme damage inflicted by social media can be seen in South Sudan. As documented in the chapter by Theo Dolan, social media in South Sudan has contributed to hatred and conflict among ethnic groups. Many investigators, including UN investigators, have warned that South Sudan's social med
...
ia are triggering violence against ethnic groups. Since the beginning of the civil war in late 2013, social media has fuelled waves of hate speech that have provoked deadly violence and ethnic conflict in South Sudan, including massacres and other atrocities. In that sense, social media has become a new variation of the "hate radio" phenomenon that flourished in Rwanda before and during the 1994 genocide … Social media is also emerging as a powerful way to harass and intimidate the opponents of a regime or a political party. In this sense, it adds another weapon to the arsenal of a powerful regime that already has multiple weapons at its disposal. A regime can mobilize its supporters to use social media in a targeted way against its foes, or it can use its financial resources to create a fake army of fictional users on social media. In either case, it is tilting the playing field against its enemies. A targeted attack through social media can be more effective than the telephone threats or messages often deployed in the past. The use of social media can be more intimidating because it belittles the targeted person in front of a much bigger audience. The presence of this audience means that the attack is more damaging, more difficult to ignore and has the potential to mobilize large numbers of people against the victim … While social media is often used for anti-democratic purposes in Africa's authoritarian states, it has also been used as a force for reform, accountability and justice. It has helped to safeguard the fairness of elections. It has allowed greater scrutiny of potential threats, such as vote-rigging or violence, allowing citizens to be alerted when there is still a chance to prevent the worst abuses. It has put a spotlight on corruption and political wrongdoing, allowing activists to mobilize pressure on governments to resolve these long-neglected problems. In some cases, as it did in the Arab Spring, social media has played a role in toppling an authoritarian state. When an election was called in the small West African state of Gambia, where the dictator Yahya Jammeh had ruled for 22 years, opposition candidates had little access to state-controlled media. So the main opposition party created more than a dozen WhatsApp groups, allowing it to communicate with voters. Other forms of social media also proliferated. A leading independent group, the Gambia Youth and Women's Forum, discussed election issues on a public Facebook group with 55,000 members. The government blocked access to WhatsApp and eventually extended the shutdown to the entire internet, but Gambians used virtual private network (VPN) technology to bypass the shutdown. The opposition won the election and Jammeh was forced to flee the country." (Pages 419-423)
more
"The Islamic State's media strategy allows for a message that has been crafted by a handful of IS propaganda agents to be disseminated by a few primary distributors, who in turn can reach thousands of unaffiliated sympathizers, and therefore millions of Twitter users. By means of a conclusion, this
...
chapter offers four short considerations on countering some of the different actors involved in the process. First, given the highly centralized nature of IS media production, which is most likely spearheaded by a handful of well-trained, technologically savvy and talented individuals, IS media production efforts would be very sensitive to the removal of these individuals [...] Second, although there is some anecdotal evidence that banning social media accounts is an effective way to curtail the activities of unaffiliated sympathizers, relying solely on social media companies to combat the spread of extremist material on their platforms not only raises questions regarding free speech, but would also give these companies the power to control public knowledge and discourse [...] Third, and on a related note, none of the so-called "lone wolf" attacks in Western countries were perpetrated by individuals who were actively involved in disseminating IS propaganda. In fact, it may well be that distributing jihadist material is an alternate mode of participation for individuals who are unwilling to engage in actual violence [...] Finally, although the Islamic State's military defeat appears imminent, one of the greatest mistakes of the "War on Terror" was the belief that the destruction of al-Qaeda's training camps and leadership would lead to the demise of the group, its affiliated movements and its ideology." (Conclusion)
more
"This article attempts to develop a theoretical framework in order to understand how the media system has been enabling public figures to use hate speech to enhance their media prominence. The current scenario in Brazil, shaped by a high concentration of (private) media ownership, an economic crisis
...
, deep political polarization, distrust of democracy and the right turn, provides a privileged case for analysing it. In this scenario, public figures preach violence against homosexuals on TV. Black people are insulted and compared to monkeys. Based on Max Weber’s ideal types and Bourdieu’s concept of symbolic capital, four ideal types have been identified: the hate preacher, the rightwing populist, the media polemicist and the intolerant comedian. The analysis makes it evident that hate speakers tend to be ‘backbenchers’ who guarantee their media prominence (or ‘capital’) through a strongly commercialized media system, particularly on TV and the Internet." (Abstract)
more
"Policy discourse about disinformation focuses heavily on the technological dimensions of state-sponsored disinformation campaigns. Unfortunately, this myopic focus on technology has led to insufficient attention being paid to the underlying human factors driving the success of state-sponsored disin
...
formation campaigns. Academic research on disinformation strongly suggests that belief in false or misleading information is driven more by individual emotional and cognitive responses — amplified by macro social, political and cultural trends — than specific information technologies. Thus, attention given to countering the distribution and promulgation of disinformation through specific technological platforms, at the expense of understanding the human factors at play, hampers the ability of public diplomacy efforts countering it. This article addresses this lacuna by reviewing the underlying psychology of three common types of state-sponsored disinformation campaigns and identifying lessons for designing effective public diplomacy counter-strategies in the future." (Abstract)
more
"The study is comprised of three main parts: a desk study of available and accessible material – reports, documents and media material; a qualitative study comprising over 200 interviews with ordinary people, experts, and persons with direct experience with radicalization leading to violent extrem
...
ism (RVE); and a quantitative component consisting of national surveys of people’s information consumption habits. For the desk study, the effort was made to gain as broad a picture as possible, that is, to cover all five countries of Central Asia – Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan. However, predictably and unfortunately, Uzbekistan and especially Turkmenistan proved difficult cases to study in full. For both the qualitative and quantitative field research activities, for several reasons, only the first three countries were included. As a result, this study is able to report most robustly on these three countries and propose observations regarding Uzbekistan and Turkmenistan only to a limited extent. Based on the desk study, the drivers of extremist sympathies as established in existing research have been political grievances (injustice from state structures; identity-based discrimination; oppressive political regimes, etc), economic difficulties (unemployment; indebtedness; poverty; and desire for quick and greater income) and ideological motivations (resentment of false values; striving for the singularly just and true life; for reward in a perceived afterlife). To these push and pull factors are added a range of enabling factors, such as migration, young age, gender (women), and means of communication. All these drivers of RVE need to be treated with caution, as stressed by various authors and suggested by evidence gained in field research. A general observation, gained from the desk research and supported by evidence in both qualitative and quantitative field studies, was the difference among the countries in degree of control over the information space, or the degree of hegemony over public discourse. Of the three most fully studied countries, hegemonic discourse was the strongest in Tajikistan, followed by Kazakhstan, and the least in Kyrgyzstan. Uzbekistan, analyzed to a limited extent, would be closer to the extreme of Tajikistan, whereas Turkmenistan was too closed to make reasonably robust observations." (Page 3)
more
"Efforts to fight the spread of disinformation have had mixed results. Self-regulation by online platforms such as Twitter or Facebook puts a great deal of power in their hands, with potentially negative effects on independent news outlets that depend on social media for their outreach. State regula
...
tion, meanwhile, raises concerns of censorship. There is a danger that methods intended to reduce disinformation, implemented clumsily or without sufficient regard for their effects, will actually exacerbate the anti-establishment feeling that drives disinformation in the first place. Just as the disinformation problem can, to a great extent, be traced back to wider structural faults in the political system, the solution, too, must be partly structural. There must be a shift in commercial practices to disrupt the commercial motivations driving disinformation, make online platforms more fair, transparent and open, and reduce the pressure on media outlets to compete for attention." (Executive summary)
more
"Based on ethnographic research on Islamist buzzers – social media political operators tasked with making particular online conversation subjects trend – in Indonesia, this article details the process of how the proliferation of insensitive message in both the online and offline realms plays a r
...
ole in mobilizing those sympathetic to religious fundamental-ism. As this research shows, the interviewed buzzers were one of the driving forces behind the massive success of the fundamentalist Islamic Defenders Front (Front Pembela Islam, FPI) as they mobilized people to participate in the organization’s political rallies between 2016 and 2017. Driven by altruistic volunteerism and sense of community, these actors go beyond their duty as click-farmers. They maintain regular contact with sympathizers and convincing them to revive broken weblinks, hang banners on streets as part of astroturfing campaigns and gather masses to attend offline events. Detailing the activity and spatiality of buzzers in crafting new online and offline spaces as part of their innovative bottom-up propaganda management, this research concludes that right-wing political mobilization and radicalization are not simply the product of ideology but are catalyzed by technically and socially tedious, mediated messaging campaigns." (Abstract)
more
"Ce guide, conçu à partir d'une collecte des données sur l'expression de la haine en ligne sous toutes ses formes, et de leur analyse, propose des modules simples à comprendre afin d'accompagner celles et ceux qui le souhaitent dans la création d'un réseau virtuel d'échange pacifié. Les reco
...
mmandations présentes ici ne se limitent pas à l'expression de la haine en ligne mais abordent toutes les formes de violences qui peuvent exister car c'est en prévenant la violence ordinaire qu'il est possible d'enrayer la violence idéologique, principal terreau de la confrontation meurtrière entre les peuples." (Préface, page 9)
more