scholarly journals Discrimination and Hate and Sexist Speech in the Italian Law

Author(s):  
Elisabetta Rosi

Sexist language is an incitement to the stigmatization of women as women or of sexual orientation so that it contributes to maintaining the discriminatory situation of these categories. It can be included as a part of conduct in different crimes, but sexist language per se isn’t criminalized in Italy (freedom to manifest one’s thought is a right constitutionally guaranteed). Criminal law has a subsidiary function with respect to the ways in which the phenomena of hate and sexist speech must be combatted. Communication on the Web must be carefully regulated, with the involvement of managers in the processing of self-regulation, in particular the managers of the social networks.

Author(s):  
Elena Roglia ◽  
Rosa Meo

Next is a presentation of the complete system architecture, followed by a discussion of the details of the various services. Amongst these services, management and simulation of tactical planning, management of data and streaming video, the system also presents a service for the annotation of the interested spatial objects. Annotation deploys the web services (Alonso, Casati, Kuno, & Machiraju, 2004) exported by OpenStreetMap (OpenStreetMap) with the purpose to exploit the on-line information sources continuously updated by the social networks communities.


Cadernos Pagu ◽  
2015 ◽  
pp. 199-228 ◽  
Author(s):  
Carolina Branco de Castro Ferreira

The present article seeks to understand the uses of the internet as a space for action and reflection among feminist groups in the Brazilian scene. It takes as its focus the relationships between new feminist generations and esthetics and the social space of the internet. Several feminist groups have emphasized the use of the internet and social networks as relevant platforms for organization, news and political expression. I thus take as my object of analysis one of the most important blogs in the Brazilian context: Blogueiras Feministas (Feminist Bloggers - BF), seeking to use this as an ethnographic resource in order to understand the set of actors and collectives working within this feminist scenario, as well as the spaces and social, political and cultural strategies that appear within it.


2020 ◽  
Vol 12 (1) ◽  
pp. 58-76
Author(s):  
David López Jiménez ◽  
Patricia Vargas Portillo ◽  
Eduardo Carlos Dittmar

Purpose ”“ The purpose is to examine the degree of privacy protection in the social networking field. In this sense, we analyze the benefits of the self-regulation of the industry as a complement to the regulations. Methodology/approach/design ”“ We study the Spanish and the European regulations regarding personal data protection with respect to social networks. Findings ”“ The legislative regulations on this subject are insufficient due to their intrinsic limitations in the field. Therefore, we should encourage the approval of good legislation that complements and fills the gaps. Practical implications ”“ The advantages that are derived from the research on this subject are useful for service providers and the public and private sectors in the information society. Therefore, they are useful for society in general. Originality/value ”“ This research article includes the examination of the general utility of society. The aspects that are addressed are applicable to the industry and those who use social networks. The government must prevent infractions that damage consumers and/or users.


2021 ◽  
Vol 16 (6) ◽  
pp. 202-210
Author(s):  
Yu. V. Gracheva ◽  
S. V. Malikov

The social network as one of the digital technologies has not only creates a platform for communications, especially relevant during a pandemic, but also provokes the emergence of various types of deviant behavior, primarily due to the fact that many communicate on the Internet under fictitious names; it liberates a person, creates a feeling of impunity, control over the situation, etc. Recently, trash streams have become popular on the Web, but not funny and silly, but associated with violence, insult, humiliation of human dignity, causing a feeling of disgust and contrary to public morality. In December 2020, during such a live broadcast, another victim died, which launched a process in society to discuss the need to introduce criminal liability for such acts. The paper assesses the draft criminal law, as well as initiatives to supplement the list of aggravating circumstances and some corpus delicti with an appropriate qualifying feature, and formulates the author’s draft criminal law on responsibility for organizing, conducting, facilitating and participating in direct air in trash streams.


Author(s):  
Hung-Cheng Chen ◽  
Eric Zhi-Feng Liu ◽  
Sheng-Yi Wu ◽  
Chin-Yu Lin

This study examines the life stories of Hakka mothers by a systematic approach in a classroom. In order to grasp a vivid portrait of the so-called “Hakka Mother”, a series of courses that allow every student to revisit the life stories of mothers are proposed. This investigation explores the life stories in two different scopes: the food habit and dressing style. Throughout the dialogues among children and mothers, the life stories embedded in those two scopes have been discovered and the parent-child relationship of each family has been revealed. The results are archived on a social network platform called Ning which enables the Web 2.0 interactions and sharing processes among different users at different platforms such as Facebook and Youtube. This feature enhances the understanding of the cultural aspect of Hakka mothers and invites more people to care about the life story and to contribute their own stories in a similar manner on the social networks.


Author(s):  
Jon Kleinberg

The growth of the Web has required us to think about the design of information systems in which large-scale computational and social feedback effects are simultaneously at work. At the same time, the data generated by Web-scale systems—recording the ways in which millions of participants create content, link information, form groups and communicate with one another—have made it possible to evaluate long-standing theories of social interaction, and to formulate new theories based on what we observe. These developments have created a new level of interaction between computing and the social sciences, enriching the perspectives of both of these disciplines. We discuss some of the observations, theories and conclusions that have grown from the study of Web-scale social interaction, focusing on issues including the mechanisms by which people join groups, the ways in which different groups are linked together in social networks and the interplay of positive and negative interactions in these networks.


2004 ◽  
Vol 7 (2) ◽  
pp. 491-511 ◽  
Author(s):  
Güünther Jakobs

ABSTRACT (1) The validity of the norms that determine society’s identity needs to be guaranteed. The reason is that there are other alternatives to this society. The guarantee is accomplished when it is valid that each person has the duty to comply with the norms (law) and that sanctioning occurs in case of not complying. Sanctioning therefore means confirming the identity of society. The confirmation is totally accomplished with the sanction. (2) On the contrary, there’s no alternative to the rules that refer to the social environment; therefore they stabilize themselves. Here lies the basis for lower sanctions in case of reckless acts due to mistakes—not due to indifference. (3) The disturbance of validity occurs in the same manner as its guarantee: by meaning, not by nature. Natural events, such as causal courses or psychological facts are not, per se, components of criminal behavior. They do so as symbol carriers. (4) Imputation begins with the distribution of competence between the offender, the victim, and third parties. (5) The so-called subjective imputation proves itself to be more a specified-personal imputation. It’s an imputation which focuses on the law-abiding citizen as a criterion person. (6) The science of criminal law arises from the distinction between meaning (culpability) and nature. Every single dogmatic concept can be traced to this distinction. The sanction contradicts the meaning of the criminal act (the norm isn’t valid). Meaningless, blameless behaviors should not (cannot) be contradicted.


Author(s):  
Tim O’Reilly ◽  
Adolfo Plasencia

In this dialogue, Tim O’Reilly begins by explaining why change is natural and good and how we have to be open to the future. Later he discusses how the logic that makes things work is related to science and not to a particular set of beliefs; to understanding what is efficient and why within this logic there is a hierarchy that is made up of a set of values. He goes on to explain how the Web 2.0 applications he formulated— for example, the social networks—use network effects by harnessing collective intelligence in such a way that the more people there are who use them, the better they become. After this, he describes how his analysis of the paradigm shift in open code is equivalent to that expressed by Thomas Kuhn in his work “The Structure of Scientific Revolutions”. Later on, O’Reilly reflects on the different possible kinds of Internet of the future before moving on to explain why the most innovative people go beyond the limits of “canonical knowledge” in their daily practice, and the way in which their artistic transgressions or discoveries make them part of the new canon.


Author(s):  
Neus Soler-Labajos ◽  
Ana Isabel Jiménez-Zarco

The advent of the web 2.0 in general and the social networks in particular has altered the consumer behavior with brands, consumer becoming the protagonist of his relationship with the companies. The consumer is no longer passive, but someone who belongs to an interactive user community, whose opinion influences the decision making of others and the company. And companies, therefore, need to understand how to structure content and branding strategies where clients not only communicate with the company, but each other, in real time: the social media. Social networks, as currently represent the opportunity to get the engagement of customers and prospects in a way that can not be achieved by other means, become a single source of information that must be integrated into the software of the company, allowing the conversion of conversation into a transaction. So having a database of clients with personal information is no longer enough, and is required to obtain qualitative features that enable the company to know more about consumers and provide, as a result, a greater brand value. The Social CRM is a tool that incorporates the information obtained from the social networks to the traditional CRM, to ensure that the company is better informed about its customers and gets a much more solid basis for decision making, customizing the offer and adding value to the customer.


Author(s):  
Mahima Goyal ◽  
Vishal Bhatnagar

The web data is growing at an immense pace. This is true for the social networks also. The data in the form of opinion of an individual is gathered to find the nuggets out of the same. The development in the application of opinion mining is rapidly growing due to various social sites which prompted us to pursue exhaustive literature survey in the field of opinion mining application in operation management and to classify the existing literature in this field. In this context the authors had identified the pros and cons of applying the opinion mining on operation management from the perspective of big data. The authors had considered the amount of data involved to be too big and for the same the big data concept is of primarily utmost significance. The authors also proposed a framework which clearly depicts the usage of the opinion mining on operation management of various domains.


Sign in / Sign up

Export Citation Format

Share Document