Technological Help to Prevent and Reduce Cyberbullying

Author(s):  
Gilberto Marzano

This chapter intends to present the most common technological solutions that can be implemented to prevent and reduce cyberbullying. Three main questions will be addressed: How can children stay safe online? What can the information technology (IT) industry do to combat cyberbullying? How effective is automatic cyberbullying detection? The chapter will illustrate the progress that has been made to reduce cyberbullying through technological means and discuss the notion of industry self-regulation. Indeed, the IT industry has a responsibility to respect societal obligations towards users, especially when users are children. While many companies in the industry are working responsibly on solutions for the safer use of technology, some global internet service providers are involved in the illicit use of users' personal data. As a consequence, problems of online safety cannot be solved locally, but through concerted actions undertaken at an international level.

Author(s):  
Gilberto Marzano

This chapter intends to present the most common technological solutions that can be implemented to prevent and reduce cyberbullying. Three main questions will be addressed: How can children stay safe online? What can the information technology (IT) industry do to combat cyberbullying? How effective is automatic cyberbullying detection? The chapter will illustrate the progress that has been made to reduce cyberbullying through technological means and discuss the notion of industry self-regulation. Indeed, the IT industry has a responsibility to respect societal obligations towards users, especially when users are children. While many companies in the industry are working responsibly on solutions for the safer use of technology, some global internet service providers are involved in the illicit use of users' personal data. As a consequence, problems of online safety cannot be solved locally, but through concerted actions undertaken at an international level.


Author(s):  
Jaani Riordan

Internet intermediaries are essential features of modern commerce, social and political life, and the dissemination of ideas. Some act as conduits through which our transmissions pass; others are custodians of our personal data and gatekeepers of the world’s knowledge. They supply the infrastructure and tools which make electronic communications possible. These services encompass a vast ecosystem of different entities: internet service providers, website operators, hosts, data centres, social networks, media platforms, search engines, app developers, marketplaces, app stores, and others—many of which are household names.


2020 ◽  
Vol 2 (1) ◽  
pp. 104-115
Author(s):  
Christine W Njuguna ◽  
Joyce Gikandi ◽  
Lucy Kathuri-Ogola ◽  
Joan Kabaria-Muriithi

There is a rise in unprecedented political infractions, disturbances and electoral violence in Africa with the youth playing a significant role. Thus, the study broadly investigated social media use and electoral violence among the youth in Kenya using two objectives that were to assess the use of social media platforms among the youth and to investigate the relationship between social media use and electoral violence among the youth. Guided by the Dependency Theory and the Social Responsibility Theory, the study was carried out in Mathare Constituency, Nairobi County, Kenya. Data collection involved questionnaires, key informant interviews and focus group discussions. Analysis of quantitative data was by descriptive statistics and regression while qualitative data was analyzed through transcription. The study findings showed that the use of social media platforms in communication has been growing with WhatsApp becoming the most ‘preferred’ platform in Kenya. The study outcome exposed the fact that social media had an important and positive effect on electoral violence among the Kenyan youth in Mathare (R = .812). On the other hand, social media (Facebook, WhatsApp, Twitter, YouTube and Instagram) had a strong explanatory strength on electoral violence among the Kenyan youth in Mathare (R2 = .659). This means that social media accounts for 65.9 percent of electoral violence among the Kenyan youth in Mathare Constituency, Nairobi County. The study, therefore, concluded that there is a relationship between social media and electoral violence among the Kenyan youth in Mathare. The study finally recommends that the government should embrace and enforce self-regulation mechanisms by Internet service providers to deter incitement. In addition, there should be increased efforts to educate and inform Internet users on the importance of assessing the credibility of information. Promotion of productive engagement as an effective instrument of dealing with online hatred is key.


2020 ◽  
Vol 12 (1) ◽  
pp. 58-76
Author(s):  
David López Jiménez ◽  
Patricia Vargas Portillo ◽  
Eduardo Carlos Dittmar

Purpose ”“ The purpose is to examine the degree of privacy protection in the social networking field. In this sense, we analyze the benefits of the self-regulation of the industry as a complement to the regulations. Methodology/approach/design ”“ We study the Spanish and the European regulations regarding personal data protection with respect to social networks. Findings ”“ The legislative regulations on this subject are insufficient due to their intrinsic limitations in the field. Therefore, we should encourage the approval of good legislation that complements and fills the gaps. Practical implications ”“ The advantages that are derived from the research on this subject are useful for service providers and the public and private sectors in the information society. Therefore, they are useful for society in general. Originality/value ”“ This research article includes the examination of the general utility of society. The aspects that are addressed are applicable to the industry and those who use social networks. The government must prevent infractions that damage consumers and/or users.


Author(s):  
T.P. Popovych

The article is devoted to the analysis of theoretical and legal aspects of the human right to the protection of personal data on the Internet. The author believes that at the present stage the field of personal data protection on the Internet is becoming especially important, linking it with the universal importance of communication that occurs within the Internet, as well as the threat of unauthorized dissemination of information through it. The right to the protection of personal data is considered as one of the forms of realization of the human right to the respect for his private, family life, in the context of his inviolability on the Internet. Scientific intelligence begins with a review of information protection models that have emerged in the world. Yes, we are talking about the American, European and mixed models. However, the article provides an overview of the acts adopted by the relevant European institutions in this area. In addition, the article examines the experience of some foreign countries in ensuring the human right to the protection of personal data on the Internet, in particular Brazil, France and the Republic of Belarus. The author notes that the protection of personal data involves a number of positive and negative obligations of the state and individuals. Negative obligations are aimed at prohibiting the processing of personal data without the consent of the person to whom the specific information relates. The positive obligations of public organizations and individuals (organizations) are to comply with the established legal regime of personal data processing, including the use of appropriate technical means. That is, the author emphasizes that the legal obligations in the context of ensuring the right to protection of personal data on the Internet are imposed not only on the state, but also on Internet service providers, owners of online services and websites, etc., given the possibility that they have access to personal information.


2015 ◽  
Vol 30 (3) ◽  
pp. 63-89
Author(s):  
Cho Sung Eun ◽  
Ahn Sang Hoon

This study examines the process of policy change, drawing on the theory of the social construction of target populations to explore South Korea???s limited Internet user self-identification policy. In the early 2000s, the government directly imposed on netizens and service providers by establishing regulations that resulted in netizens being categorized as deviants. Then, as personal data spillage became a problem and the market environment changed, netizens and Internet service providers were transformed into the advantaged group needing protection. Consequently, the government relaxed its regulations and allowed Internet users to self-regulate instead. This study verifies that the process of change in the way target populations are viewed is caused by an interaction between a structure and its actors. Furthermore, positive political and economic events and social movements can rapidly transform actors, Internet users and service providers in this case, into an advantaged group.


Obiter ◽  
2021 ◽  
Vol 32 (3) ◽  
Author(s):  
Frans E Marx ◽  
Neil O’Brien

The Electronic Communications and Transactions Act 25 of 2002 provides for the limitation of liability of Internet service providers against actions based on unlawful content placed on their websites. The legislature’s approach is to emphasize self-regulation of the Internet by providing in section 72 of the Act that only those service providers which belong to an Industry Representative Body (IRB), recognized by the Minister of Communications, will qualify for the protection accorded by the ECT Act. Such an IRB must then, through its Code of Conduct, regulate service providers belonging to it. This article evaluates the prerequisite of an IRB and investigates theguidelines for recognition of IRBs by the minister. The South African position is then compared with that in the European Union. The need for the existence of IRBs is questioned and the guidelines are criticized. It is argued that both the threshold requirements and IRB recognition requirements are unnecessary in the context of limited liability. It is submitted that these barriers to limited liability are needless and can possibly hamper the industry as a whole.


2021 ◽  
Vol 8 (3) ◽  
pp. 451-494
Author(s):  
Nina Brown

Social media is a valuable tool that has allowed its users to connect and share ideas in unprecedented ways. But this ease of communication has also opened the door for rampant abuse. Indeed, social networks have become breeding grounds for hate speech, misinformation, terrorist activities, and other harmful content. The COVID-19 pandemic, growing civil unrest, and the polarization of American politics have exacerbated the toxicity in recent months and years. Although social platforms engage in content moderation, the criteria for determining what constitutes harmful content is unclear to both their users and employees tasked with removing it. This lack of transparency has afforded social platforms the flexibility of removing content as it suits them: in the way that best maximizes their profits. But it has also inspired little confidence in social platforms’ ability to solve the problem independently and has left legislators, legal scholars, and the general public calling for a more aggressive— and often a government-led—approach to content moderation. The thorn in any effort to regulate content on social platforms is, of course, the First Amendment. With this in mind, a variety of different options have been suggested to ameliorate harmful content without running afoul of the Constitution. Many legislators have suggested amending or altogether repealing section 230 of the Communications Decency Act. Section 230 is a valuable legal shield that immunizes internet service providers—like social platforms— from liability for the content that users post. This approach would likely reduce the volume of online abuses, but it would also have the practical effect of stifling harmless—and even socially beneficial—dialogue on social media. While there is a clear need for some level of content regulation for social platforms, the risks of government regulation are too great. Yet the current self-regulatory scheme has failed in that it continues to enable an abundance of harmful speech to persist online. This Article explores these models of regulation and suggests a third model: industry self-regulation. Although there is some legal scholarship on social media content moderation, none explore such a model. As this Article will demonstrate, an industry-wide governance model is the optimal solution to reduce harmful speech without hindering the free exchange of ideas on social media.


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


Sign in / Sign up

Export Citation Format

Share Document