“YouTube’s predator problem”: Platform moderation as governance-washing, and user resistance

Author(s):  
Emily Tarvin ◽  
Mel Stanfill

YouTube experienced large-scale criticism in early 2019 for predatory behavior toward children on the platform. To address concerns about children’s safety, YouTube acted quickly by demonetizing and deactivating comments on videos featuring minors. In this paper, we analyze both the company’s response to this scandal and how users received that response. We argue that YouTube’s reaction was governance-washing, which presents the appearance of vigorous platform moderation and leverages popular perceptions of technology to create the look of authority while deflecting questions about substance. While YouTubers and users did not dispute that the pedophilic comments were heinous, they questioned the effectiveness of the company’s solutions, arguing that YouTube’s platform governance actions did not solve the problem. Ultimately, we show that users have cogent critiques of governance policies that pretend to be comprehensive but fail to solve what they purport to address, and offer up the term “governance-washing” as a useful framework to make sense of such cases.

2016 ◽  
Vol 34 (1) ◽  
pp. 27-51 ◽  
Author(s):  
Martin Ottmann

This article examines how the civilian constituencies of rebel groups affect their use of violence against civilians. While past research has acknowledged the importance of rebel constituencies, they are primarily seen as only having an indirect effect on rebel behavior. In this study, I conceptualize rebel constituencies as central political opportunity structures for rebel groups providing incentives and imposing restraints on their use of strategic violence and the violent behavior of individual rebel fighters. In particular, I hypothesize that a constituency overlap between rebels and the government of a state acts as a restraint making large-scale violence against civilians less likely. In contrast, high levels of constituency fractionalization and polarization induce strategic violence and predatory behavior, increasing the chances of large-scale civilian victimization. I conduct a statistical analysis of rebel one-sided violence in sub-Saharan Africa using newly collected data on rebel constituencies to test these hypotheses. The results only provide limited empirical support for the hypothesized relationship between constituency overlap and rebel violence against civilians. There is clear empirical evidence, however, that heavily fractionalized and polarized rebel constituencies are associated with higher levels of violence against civilians.


Land ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 66
Author(s):  
Vilém Pechanec ◽  
Lenka Štěrbová ◽  
Jan Purkyt ◽  
Marcela Prokopová ◽  
Renata Včeláková ◽  
...  

Given the significance of national carbon inventories, the importance of large-scale estimates of carbon stocks is increasing. Accurate biomass estimates are essential for tracking changes in the carbon stock through repeated assessment of carbon stock, widely used for both vegetation and soil, to estimate carbon sequestration. Objectives: The aim of our study was to determine the variability of several aspects of the carbon stock value when the input matrix was (1) expressed either as a vector or as a raster; (2) expressed as in local (1:10,000) or regional (1:100,000) scale data; and (3) rasterized with different pixel sizes of 1, 10, 100, and 1000 m. Method: The look-up table method, where expert carbon content values are attached to the mapped landscape matrix. Results: Different formats of input matrix did not show fundamental differences with exceptions of the biggest raster of size 1000 m for the local level. At the regional level, no differences were notable. Conclusions: The results contribute to the specification of best practices for the evaluation of carbon storage as a mitigation measure, as well as the implementation of national carbon inventories.


Author(s):  
V. B. Makovskiy

Successful advances of Soviet troops in Belarus created in the middle of July 1944 favorable conditions for large-scale operations on the southern flank of the Soviet-German front to complete the liberation of Ukraine and Moldova, driving Romania, Hungary, Bulgaria out of war, and driving the enemy from Czechoslovakia. During the Soviet offensive in Belorussia 1st Ukrainian Front began operation in the Lvov direction. The operation, which was later called the Lvov-Sandomierz, turned into a major offensive of more than 400 km and lasted from July 13 to August 29, 1944. The Soviet Supreme Command was seeking to crush Army Group "Northern Ukraine", liberate Western Ukraine and take the war to the south east Poland. Operations were carried out by 1st Ukrainian Front in close cooperation with the Soviet troops operating in the Belarusian direction. It was closely linked to the southern wing of the Soviet-German front, a series of successive and simultaneous front offensive operations, including operations by groups of fronts, united by a common concept and plan, such as Lvov-Sandomierz, Iasi-Kishenёvskaya, East Carpathian.


2015 ◽  
Vol 27 (1) ◽  
pp. 57-76 ◽  
Author(s):  
Tim Klaus ◽  
J. Ellis Blanton ◽  
Stephen C. Wingreen

Information Technology (IT) is often used in organizations as a tool to enable change. However, as organizations switch to different vendors, upgrade their systems, or implement new systems, widespread user resistance is often encountered. Resistant behaviors often occur in these large-scale system implementations because the implementation transforms the jobs of employees and mandates system use. In order to understand resistant behaviors better as well as management strategies to minimize these behaviors, this study uses a focus group and qualitative semi-structured interviews. Based on the data collection, this study first creates a resistant behavior framework and a management strategy framework using a data-driven approach. The findings from the user resistance behaviors are classified into four categories. Also, eight preferred management strategies are identified by users, which are grouped into three categories. Then, the Framework-based Theory of User Resistance is proposed, which examines the causes and moderating forces that affect resistant behaviors. The practical implications of these frameworks also are described.


2020 ◽  
Author(s):  
Roland Horvath ◽  
Balint Magyar ◽  
Ambrus Kenyeres

<p>The<!-- Start of main text paraghraphs. --> advances of Sentinel-1 SAR data, like its open access policy and short revisit time, gives an outstanding opportunity to conduct in-situ mapping of large scale deformations. After the requisite calibrations and corrections (radiometric, terrain), geocoding, coregistration and phase unwrapping; the unwrapped phase can be converted to Line-of-site (LOS) displacements. Although it gives a characteristic picture of the investigated phenomena only in one-dimension, but to obtain tree-dimensional (East/North/Up – ENU) deformation, it requires a more complex approach.</p><p>To obtain the complete tree-dimensional displacement field, both ascending and descending LOS displacements shall be retrieved. As well as, the corresponding unit-vector of LOS look-vectors and its parallel, along-track azimuth vector in the direction of the azimuth offsets, from the SAR sensor to all measurements (pixel) in ENU format. This lead to four observations with different incident angles for each measurements, which can be generalized as an over-determined inverse problem. The estimated model vector of the complete tree-dimensional displacement can be obtained, if the Jacobi-matrix can be represented as the look-vectors in ENU basis and the observation vector as LOS deformations acquired from the unwrapped phase of the interferogram. Then the over-determined linear equation system can be solved in the L2 norm via the Gaussian Least Squares (LSQ) approach combined with Singular Value Decomposition (SVD).<!-- OPTIONAL: if reference field exists. --></p><p>Demonstrating the aforementioned, we present the continuation of DInSAR results of the two strike-slip earthquakes between 2019.07.04-06. with foreshock M<sub>W</sub> =6.5 and mainshock M<sub> W</sub> =7.1 in the Eastern Californian Shear Zone near Ridgecrest (US).</p>


2016 ◽  
Vol 56 ◽  
pp. 2.1-2.34 ◽  
Author(s):  
W.-K. Tao ◽  
Y. N. Takayabu ◽  
S. Lang ◽  
S. Shige ◽  
W. Olson ◽  
...  

Abstract Yanai and coauthors utilized the meteorological data collected from a sounding network to present a pioneering work in 1973 on thermodynamic budgets, which are referred to as the apparent heat source (Q1) and apparent moisture sink (Q2). Latent heating (LH) is one of the most dominant terms in Q1. Yanai’s paper motivated the development of satellite-based LH algorithms and provided a theoretical background for imposing large-scale advective forcing into cloud-resolving models (CRMs). These CRM-simulated LH and Q1 data have been used to generate the look-up tables in Tropical Rainfall Measuring Mission (TRMM) LH algorithms. A set of algorithms developed for retrieving LH profiles from TRMM-based rainfall profiles is described and evaluated, including details concerning their intrinsic space–time resolutions. Included in the paper are results from a variety of validation analyses that define the uncertainty of the LH profile estimates. Also, examples of how TRMM-retrieved LH profiles have been used to understand the life cycle of the MJO and improve the predictions of global weather and climate models as well as comparisons with large-scale analyses are provided. Areas for further improvement of the TRMM products are discussed.


2020 ◽  
Author(s):  
Robert Gorwa ◽  
Reuben Binns ◽  
Christian Katzenbach

As government pressure on major technology companies builds, both firms and legislators are searching for technical solutions to difficult platform governance puzzles such as hate speech and misinformation. Automated hash-matching and predictive machine learning tools – what we define here as algorithmic moderation systems – are increasingly being deployed to conduct content moderation at scale by major platforms for user-generated content such as Facebook, YouTube and Twitter. This article provides an accessible technical primer on how algorithmic moderation works; examines some of the existing automated tools used by major platforms to handle copyright infringement, terrorism and toxic speech; and identifies key political and ethical issues for these systems as the reliance on them grows. Recent events suggest that algorithmic moderation has become necessary to manage growing public expectations for increased platform responsibility, safety and security on the global stage; however, as we demonstrate, these systems remain opaque, unaccountable and poorly understood. Despite the potential promise of algorithms or ‘AI’, we show that even ‘well optimized’ moderation systems could exacerbate, rather than relieve, many existing problems with content policy as enacted by platforms for three main reasons: automated moderation threatens to (a) further increase opacity, making a famously non-transparent set of practices even more difficult to understand or audit, (b) further complicate outstand- ing issues of fairness and justice in large-scale sociotechnical systems and (c) re-obscure the fundamentally political nature of speech decisions being executed at scale.


1999 ◽  
Vol 173 ◽  
pp. 243-248
Author(s):  
D. Kubáček ◽  
A. Galád ◽  
A. Pravda

AbstractUnusual short-period comet 29P/Schwassmann-Wachmann 1 inspired many observers to explain its unpredictable outbursts. In this paper large scale structures and features from the inner part of the coma in time periods around outbursts are studied. CCD images were taken at Whipple Observatory, Mt. Hopkins, in 1989 and at Astronomical Observatory, Modra, from 1995 to 1998. Photographic plates of the comet were taken at Harvard College Observatory, Oak Ridge, from 1974 to 1982. The latter were digitized at first to apply the same techniques of image processing for optimizing the visibility of features in the coma during outbursts. Outbursts and coma structures show various shapes.


Sign in / Sign up

Export Citation Format

Share Document