Opinion

SSRN and open access for non-institutional scholars

By Tiffany Li, Fellow, Internet Law & Policy Foundry | Permalink

Academics and open access advocates expressed concern when Elsevier acquired SSRN, the previously free and open social sciences research network. It appears now that those fears may have come true, as recent copyright takedowns by SSRN indicate a shift away from open access. The loss of a well-established open access research network will be deeply felt in the social sciences research community, including in my own field of law and public policy.

READ MORE

Please Can We Not Try to Rationalize Emoji

By Galen Panger, CTSP Director | Permalink

Emoji are open to interpretation, and that’s a good thing. Credit: Samuel Barnes

Emoji are open to interpretation, and that’s a good thing. Credit: Samuel Barnes

This week a study appeared on the scene suggesting an earth-shattering, truly groundbreaking notion: Emoji “may be open to interpretation.”

And then the headlines. “We Really Don’t Know What We’re Saying When We Use Emoji,” a normally level-headed Quartz proclaimed. “That Emoji Does Not Mean What You Think It Means,” Gizmodo declared. “If Emoji Are the Future of Communication Then We’re Screwed,” New York Magazine cried, obviously not trying to get anyone to click on its headline.

READ MORE

Moderating Harassment in Twitter with Blockbots

By Stuart Geiger, ethnographer and post-doctoral scholar at the Berkeley Institute for Data Science | Permalink

I’ve been working on a research project about counter-harassment projects in Twitter, where I’ve been focusing on blockbots (or bot-based collective blocklists) in Twitter. Blockbots are a different way of responding to online harassment, representing a more decentralized alternative to the standard practice of moderation — typically, a site’s staff has to go through their own process to definitively decide what accounts should be suspended from the entire site. I’m excited to announce that my first paper on this topic will soon be published in Information, Communication, and Society (the PDF on my website and the publisher’s version).

This post is a summary of that article and some thoughts about future work in this area. The paper is based on my empirical research on this topic, but it takes a more theoretical and conceptual approach given how novel these projects are. I give an overview of what blockbots are, the context in which they have emerged, and the issues that they raise about how social networking sites are to be governed and moderated with computational tools. I think there is room for much future research on this topic, and I hope to see more work on this topic from a variety of disciplines and methods.

What are blockbots?

Blockbots are automated software agents developed and used by independent, volunteer users of Twitter, who have developed their own social-computational tools to help moderate their own experiences on Twitter.

blockbot

The blocktogether.org interface, which lets people subscribe to other people’s blocklists, publish their own blocklists, and automatically block certain kinds of accounts.

READ MORE

Miscalculating the risk of crypto “backdoors”

By Deirdre K. Mulligan, Associate Professor | Permalink | Cross-posted from the Christian Science Monitor

As Britain continues to debate its revised Investigatory Powers bill, which opponents deride as the “snoopers’ charter,” it seems increasingly evident that Prime Minister David Cameron is lockstep with many US law enforcement officials when it comes to the encryption debate.

While Mr. Cameron’s government claims that the bill doesn’t mandate so-called “backdoors” into encryption on consumer devices, the bill suggests otherwise. It currently states that communication service providers must maintain the capability to remove “electronic protection” they apply to protect communications or data.

Sounds familiar, right? FBI Director James Comey recently testified that the FBI is working with the tech sector (which has publicly opposed weakening encryption standards) to find ways to decrypt communications so that investigators can more easily access it during criminal or terrorist investigations.

READ MORE