scholarly journals Terrorist Speech under Bills C-51 and C-59 and the Othman Hamdan Case: The Continued Incoherence of Canada’s Approach

2019 ◽  
pp. 203
Author(s):  
Kent Roach

It is argued that neither the approach taken to terrorist speech in Bill C-51 nor Bill C-59 is satisfactory. A case study of the Othman Hamdan case, including his calls on the Internet for “lone wolves” “swiftly to activate,” is featured, along with the use of immigration law after his acquittal for counselling murder and other crimes. Hamdan’s acquittal suggests that the new Bill C-59 terrorist speech offence and take-down powers based on counselling terrorism offences without specifying a particular terrorism offence may not reach Hamdan’s Internet postings. One coherent response would be to repeal terrorist speech offences while making greater use of court-ordered take-downs of speech on the Internet and programs to counter violent extremism. Another coherent response would be to criminalize the promotion and advocacy of terrorist activities (as opposed to terrorist offences in general in Bill C-51 or terrorism offences without identifying a specific terrorist offence in Bill C-59) and provide for defences designed to protect fundamental freedoms such as those under section 319(3) of the Criminal Code that apply to hate speech. Unfortunately, neither Bill C-51 nor Bill C-59 pursues either of these options. The result is that speech such as Hamdan’s will continue to be subject to the vagaries of take-downs by social media companies and immigration law.

Author(s):  
Molly K. Land

The internet would seem to be an ideal platform for fostering norm diversity. The very structure of the internet resists centralized governance, while the opportunities it provides for the “long tail” of expression means even voices with extremely small audiences can find a home. In reality, however, the governance of online speech looks much more monolithic. This is largely a result of private “lawmaking” activity by internet intermediaries. Increasingly, social media companies like Facebook and Twitter are developing what David Kaye, UN Special Rapporteur for the Promotion and Protection of the Right to Freedom of Opinion and Expression, has called “platform law.” Through a combination of community standards, contract, technological design, and case-specific practice, social media companies are developing “Facebook law” and “Twitter law,” displacing the laws of national jurisdictions. Using the example of content moderation, this chapter makes several contributions to the literature. First, it expands upon the idea of “platform law” to consider the broad array of mechanisms that companies use to control user behavior and mediate conflicts. Second, using human rights law as a foundation, the chapter makes the case for meaningful technological design choices that enable user autonomy. Users should be able to make explicit choices about who and what they want to hear online. It also frames user choice in terms of the right to hear, not the right to speak, as a way of navigating the tension presented by hate speech and human rights without resorting to platform law that sanitizes speech for everyone.


Author(s):  
Soraya Chemaly

The toxicity of online interactions presents unprecedented challenges to traditional free speech norms. The scope and amplification properties of the internet give new dimension and power to hate speech, rape and death threats, and denigrating and reputation-destroying commentary. Social media companies and internet platforms, all of which regulate speech through moderation processes every day, walk the fine line between censorship and free speech with every decision they make, and they make millions a day. This chapter will explore how a lack of diversity in the tech industry affects the design and regulation of products and, in so doing, disproportionately negatively affects the free speech of traditionally marginalized people. During the past year there has been an explosion of research about, and public interest in, the tech industry’s persistent diversity problems. At the same time, the pervasiveness of online hate, harassment, and abuse has become evident. These problems come together on social media platforms that have institutionalized and automated the perspectives of privileged male experiences of speech and violence. The tech sector’s male dominance and the sex segregation and hierarchies of its workforce result in serious and harmful effects globally on women’s safety and free expression.


Publications ◽  
2020 ◽  
Vol 8 (4) ◽  
pp. 52
Author(s):  
Sabina Civila ◽  
Luis M. Romero-Rodríguez ◽  
Amparo Civila

This article studies the process of demonization, its consequences, and how social media contribute to the formalization of its axiology. The demonization of societies aims to create social subjects that fit into the idea of the “other” by exposing them to compulsory invisibility. This research’s main objective was to examine how demonization is used as a weapon of oppression to devalue specific individuals through the hashtag #StopIslam and Instagram’s role in this process. The methodology used for this purpose has consisted of an empirical and quantitative analysis of the most recent (1 January 2020–31 July 2020) posts on Instagram with #StopIslam, analyzing the images and the content. The study has determined how, through social media manipulation, erroneous ideas are transmitted that prevent the Islamic collective’s integration, especially in European countries. The conclusions will reflect hate speech and how the Islamic world’s demonization results in the Muslim community’s stigmatization, racism, and Islamophobia. Although there are different articles related to demonization and hate speech, there are not many scientific resources that explain these variables on Instagram and how it affects the inclusion of the Muslim community in Europe, significantly when the time spent on the Internet is growing.


2021 ◽  
Vol 13 (3) ◽  
pp. 451-476 ◽  
Author(s):  
Mona Khattab

With the outbreak of the COVID-19 pandemic, misinformation and unscientific interpretations flooded the internet. Seeking credible information in Egypt was paramount at the time. An answer to this quest was ‘Ask Nameesa’, an award-winning Egyptian-focused chatbot that utilizes Facebook Messenger to communicate with social media users in an individualized response engagement. It relies on information validated by WHO and the Egyptian Ministry of Health. This article examines the structure of Ask Nameesa as an example of infobots and studies the interactive engagement it offers users to provide health information. The study analyses data gathered by interviewing the founder and CEO of DXwand, the company that developed Ask Nameesa as well as content analysis of conversations with Ask Nameesa to assess its user engagement. The study aims at understanding the potential Ask Nameesa has in providing information literacy and tackling public demand for information.


Author(s):  
Munganatl Khoeriyah

Pesantren, the Islamic boarding school, is the oldest Islamic education in Indonesia and is constantly undergoing changes from time to time. This research uses the qualitative approach. This study aims to describe the application of the heutagogy method in the growth of pesantren education. The results of this study indicate that the Al-Luqmaniyyah salaf Boarding School has already applied the heutagogy learning method, it means that pesantren education precedes the Westerners in terms of its utilization. Through the study and discussion of Kitab Kuning (yellow-colored textbooks about Islamic knowledge), students determine their systems, study materials, and problems to find a solution. Sources of learning for students are not only limited by the Kitab Kuning, but students can also have access through the internet, online books and applications with trusted sources. PSDS is responsible for managing the talents and interests of the santri (a term used in Pesantren to call an apprentice), as well as training santri skills by making films, recording, creativity, writing, making advertisements, making interesting contents on social media. LP2M Al-Luqmaniyyah with its various divisions is required to channel and facilitate what the community needs from the students as they can also learn from the community it self. Keywords: Heutagogy, Islamic boarding school education.


2020 ◽  
Vol 2 (1) ◽  
pp. 13-23
Author(s):  
Bima Yosua A Tarigan ◽  
Faridh Al Wajidi ◽  
K Karina

Criminal action is an act that violates the rules and punishable by crime, while the immigration administrative action is an administrative sanction given to foreigners outside the judicial process. One of the cases that have been in the public spotlight is the criminal case of Cessie Bank Balicorruption and bribery related to the deletion of the wanted list (DPO) by Djoko Tjandra. This study uses a qualitative empirical normative legal approach with data collection in the form of library materials which include statutory regulations, books, papers, and other sources. The formulation of the problem discussed in this study is how the application of criminal acts and Immigration Administrative Measures (TAK) in Law Number 6 Of 2011 concerning Immigration which is charged against Djoko Tjandra. The purpose of this research is to find out the criminal acts and administrative immigration actions given to Djoko Tjandra who was an Indonesian fugitive for many years. Based on the data analysis carried out, it was concluded that criminal and administrative actions ensnared Djoko Tjandra and the elements who helped him in accordance with the applicable rules, namely as the provisions written in the Criminal Code, Law Number 20 Of 2001 concerning the Eradication of Corruption Crime, and Law Number 6 Of 2011 concerning Immigration.


Author(s):  
Daniela Stockmann

In public discussions of social media governance, corporations such as Google, Facebook, and Twitter are often first and foremost seen as providers of information and as media. However, social media companies’ business models aim to generate income by attracting a large, growing, and active user base and by collecting and monetising personal data. This has generated concerns with respect to hate speech, disinformation, and privacy. Over time, there has been a trend away from industry self-regulation towards a strengthening of national-level and European Union-level regulations, that is, from soft to hard law. Hence, moving beyond general corporate governance codes, governments are imposing more targeted regulations that recognise these firms’ profound societal importance and wide-reaching influence. The chapter reviews these developments, highlighting the tension between companies’ commercial and public rationales, critiques the current industry-specific regulatory framework, and raises potential policy alternatives.


Author(s):  
Bernadette Rainey ◽  
Elizabeth Wicks ◽  
Andclare Ovey

This chapter examines the protection of the freedom of expression in the European Convention on Human Rights, discusses the provisions of Article 10, and explains that the majority of cases concerning Article 10 are brought by persons who have received some penalty for defaming or insulting other people. It analyses what constitutes an interference with free expression and considers the limitations on freedom of expression. The chapter also examines the judgments made by the Strasbourg Court on several related cases, including those that involved incitement to violence and hate speech, obscenity, and blasphemy. It also covers the development of case-law concerning social media and the internet.


Author(s):  
Harmandeep Singh ◽  
Arwinder Singh

From the last decade, the Internet has become a new way of communication. Business firms use the internet for communicating with their stakeholder and expanding their business. Nowadays, in the complex environment of competition, companies just don't want to communicate the information rather they require feedback and response for the particular information. This kind of problem is resolved by the use of social media. Disclosing business information through social media companies get to know about the behavior of investors towards their particular information. Thus, the present paper aims to examine the extent of corporate reporting on Facebook. The results show that 64% companies have Facebook profile. Further, it was found that most of the companies cultivate relationship by presenting information on disclosure and involvement. It was revealed that, mostly companies presented the information on marketing and ignored the financial, social and governance components.


2020 ◽  
Vol 10 (12) ◽  
pp. 4180 ◽  
Author(s):  
Komal Florio ◽  
Valerio Basile ◽  
Marco Polignano ◽  
Pierpaolo Basile ◽  
Viviana Patti

The availability of large annotated corpora from social media and the development of powerful classification approaches have contributed in an unprecedented way to tackle the challenge of monitoring users’ opinions and sentiments in online social platforms across time. Such linguistic data are strongly affected by events and topic discourse, and this aspect is crucial when detecting phenomena such as hate speech, especially from a diachronic perspective. We address this challenge by focusing on a real case study: the “Contro l’odio” platform for monitoring hate speech against immigrants in the Italian Twittersphere. We explored the temporal robustness of a BERT model for Italian (AlBERTo), the current benchmark on non-diachronic detection settings. We tested different training strategies to evaluate how the classification performance is affected by adding more data temporally distant from the test set and hence potentially different in terms of topic and language use. Our analysis points out the limits that a supervised classification model encounters on data that are heavily influenced by events. Our results show how AlBERTo is highly sensitive to the temporal distance of the fine-tuning set. However, with an adequate time window, the performance increases, while requiring less annotated data than a traditional classifier.


Sign in / Sign up

Export Citation Format

Share Document