SlideShare uma empresa Scribd logo
1 de 23
Policing Content in the Quasi-Public Sphere @jilliancyork Gary Chapman International School on Digital Transformation Porto, Portugal, July 2011
The Quasi-Public Sphere Private companies, quasi-public spaces We treat these spaces as public Terms of Use are proprietary
The Privatization of Our Publics Marsh v. Alabama (1946), United States  Supreme Court: “Owners and operators of a company town could not prohibit the distribution of religious literature in the town's business district because such expression was protected by the First and 14th amendments.” New Jersey Coalition Against War in the Middle East v. J.M.B. Realty Corp. (1994) Established the right of individuals to hand out protest literature in one of the state’s shopping malls. The Coalition, which had been asked to leave various New Jersey malls on account of their trespassing, took their fight to court and won, based on the assertion that the mall owners “have intentionally transformed their property into a public square or market, a public gathering place, a downtown business district, a community.
Community Policing
Case: Facebook and Sayeb Sala7
Case: Name Identity
Case: Name Identity
Identity on Facebook
Bad Links?
Flickr and Maarten Dors
Results!  Robust Community Guidelines
3arabawy and Flickr
YouTube and Context
Case: YouTube and Graphic Content
More info: http://is.gd/k25Yar
Solutions? Built in human rights Is community policing the answer? Better community guidelines Robust processes for users
Thank you! Here’s how you can find me: @jilliancyork jilliancyork@gmail.com http://jilliancyork.com (I keep it simple.)

Mais conteúdo relacionado

Mais de dmcolab

Tomorrow’s schools start today!
Tomorrow’s schools start today!Tomorrow’s schools start today!
Tomorrow’s schools start today!dmcolab
 
Young Canadians, Participatory Digital Culture and Policy Literacy
Young Canadians, Participatory Digital Culture and Policy LiteracyYoung Canadians, Participatory Digital Culture and Policy Literacy
Young Canadians, Participatory Digital Culture and Policy Literacydmcolab
 
UIndia’s Unique Identity Number: The world’s largest biometric database
UIndia’s Unique Identity Number:  The world’s largest biometric databaseUIndia’s Unique Identity Number:  The world’s largest biometric database
UIndia’s Unique Identity Number: The world’s largest biometric databasedmcolab
 
The Gamification of Life
The Gamification of LifeThe Gamification of Life
The Gamification of Lifedmcolab
 
Fiorella De Cindio, What after protests? Design issues and software tools tow...
Fiorella De Cindio, What after protests? Design issues and software tools tow...Fiorella De Cindio, What after protests? Design issues and software tools tow...
Fiorella De Cindio, What after protests? Design issues and software tools tow...dmcolab
 
Community informatics the futurel
Community informatics   the futurelCommunity informatics   the futurel
Community informatics the futureldmcolab
 
Ci high road-low road-1
Ci high road-low road-1Ci high road-low road-1
Ci high road-low road-1dmcolab
 
Fostering collaboration iamcr_2010
Fostering collaboration iamcr_2010Fostering collaboration iamcr_2010
Fostering collaboration iamcr_2010dmcolab
 
UT-Portugal Advanced Digital Media Program Overview
UT-Portugal Advanced Digital Media Program Overview UT-Portugal Advanced Digital Media Program Overview
UT-Portugal Advanced Digital Media Program Overview dmcolab
 
Craig Watkins: Being Young, Being Digital
Craig Watkins: Being Young, Being DigitalCraig Watkins: Being Young, Being Digital
Craig Watkins: Being Young, Being Digitaldmcolab
 

Mais de dmcolab (10)

Tomorrow’s schools start today!
Tomorrow’s schools start today!Tomorrow’s schools start today!
Tomorrow’s schools start today!
 
Young Canadians, Participatory Digital Culture and Policy Literacy
Young Canadians, Participatory Digital Culture and Policy LiteracyYoung Canadians, Participatory Digital Culture and Policy Literacy
Young Canadians, Participatory Digital Culture and Policy Literacy
 
UIndia’s Unique Identity Number: The world’s largest biometric database
UIndia’s Unique Identity Number:  The world’s largest biometric databaseUIndia’s Unique Identity Number:  The world’s largest biometric database
UIndia’s Unique Identity Number: The world’s largest biometric database
 
The Gamification of Life
The Gamification of LifeThe Gamification of Life
The Gamification of Life
 
Fiorella De Cindio, What after protests? Design issues and software tools tow...
Fiorella De Cindio, What after protests? Design issues and software tools tow...Fiorella De Cindio, What after protests? Design issues and software tools tow...
Fiorella De Cindio, What after protests? Design issues and software tools tow...
 
Community informatics the futurel
Community informatics   the futurelCommunity informatics   the futurel
Community informatics the futurel
 
Ci high road-low road-1
Ci high road-low road-1Ci high road-low road-1
Ci high road-low road-1
 
Fostering collaboration iamcr_2010
Fostering collaboration iamcr_2010Fostering collaboration iamcr_2010
Fostering collaboration iamcr_2010
 
UT-Portugal Advanced Digital Media Program Overview
UT-Portugal Advanced Digital Media Program Overview UT-Portugal Advanced Digital Media Program Overview
UT-Portugal Advanced Digital Media Program Overview
 
Craig Watkins: Being Young, Being Digital
Craig Watkins: Being Young, Being DigitalCraig Watkins: Being Young, Being Digital
Craig Watkins: Being Young, Being Digital
 

Último

Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 

Último (20)

Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 

Who Owns Your Content? Best Practices for Navigating the Quasi-Public Sphere

  • 1. Policing Content in the Quasi-Public Sphere @jilliancyork Gary Chapman International School on Digital Transformation Porto, Portugal, July 2011
  • 2.
  • 3. The Quasi-Public Sphere Private companies, quasi-public spaces We treat these spaces as public Terms of Use are proprietary
  • 4. The Privatization of Our Publics Marsh v. Alabama (1946), United States Supreme Court: “Owners and operators of a company town could not prohibit the distribution of religious literature in the town's business district because such expression was protected by the First and 14th amendments.” New Jersey Coalition Against War in the Middle East v. J.M.B. Realty Corp. (1994) Established the right of individuals to hand out protest literature in one of the state’s shopping malls. The Coalition, which had been asked to leave various New Jersey malls on account of their trespassing, took their fight to court and won, based on the assertion that the mall owners “have intentionally transformed their property into a public square or market, a public gathering place, a downtown business district, a community.
  • 6. Case: Facebook and Sayeb Sala7
  • 10.
  • 11.
  • 12.
  • 13.
  • 16. Results! Robust Community Guidelines
  • 17.
  • 20. Case: YouTube and Graphic Content
  • 22. Solutions? Built in human rights Is community policing the answer? Better community guidelines Robust processes for users
  • 23. Thank you! Here’s how you can find me: @jilliancyork jilliancyork@gmail.com http://jilliancyork.com (I keep it simple.)

Notas do Editor

  1. My paper looked at these five platforms
  2. “Generic” page – e.g., pizza. Page went down, went back up.
  3. Pseudonymity – disproportionate systems for finding people using them.
  4. 2007 – early case; boy smoking cigarette, Flickr policies
  5. Piggipedia – amn el dawla – flickr internal discussion as result.
  6. Tunisia – graphic content (kids smoking) – show vid if possible
  7. Resulting policy: talk about tagging, context, unspoken policies