SlideShare uma empresa Scribd logo
1 de 29
Mobiles for Activism & Advocacy Examples, Challenges & Opportunities Patrick Meier  Director of Research DigiActive.org MobileActive08, Johannesburg
Presentation Focuses on  Grassroots Digital Activists… Limited Resources   Loose Networks   Anonymity   Individual Actors  Security   Low/No Budget
Examples…
1. Using Mobile Phones to Organize and Coordinate  Protests …
Protests…
Philippines ‘01 - “Coup de Text” Protests…
Philippines ‘01 - “Coup de Text” Spain ‘04 - “The Night of SMS” Protests…
Philippines ‘01 - “Coup de Text” Spain ‘04 - “The Night of SMS” Pakistan ‘07 - “Flash Protests” Protests…
2. Using Mobile Phone Videos to Document Human Rights  Abuses …
Videos…
Egypt - “Exposing Torture” Videos…
Tibet - “Media Blackout?” Egypt - “Exposing Torture” Videos…
Morocco ‘08 - “Exposing Abuse” Egypt - “Exposing Torture” Tibet ’08 - “Media Blackout?” Videos…
Using a Camera Phone and YouTube to Expose Police Brutality in Morocco
3. Using  Microblogging  Tools to Bridge Between Mobile Phones and Internet Activism
MicroBlogging…
MicroBlogging… Egypt - “Twitter out of Jail”
Egypt - “Twitter out of Jail” China - “Live-Twittered Arrest” MicroBlogging…
Egypt - “Twitter out of Jail” China - “Live-Twittered Arrest” MicroBlogging… Egypt - “Twitter to Safety”
Issues to Consider…
1. Network Structure centralized decentralized distributed source: http://en.wikipedia.org/wiki/Social_networks
2. Security
Surveillance Content Filtering Traceability Network Integrity 2. Security
NonID Prepaid Cards  (Anonymity) “ Mobile” Mobile Activism  (On the Move) Avoid Centralization  (Distribute Risk) 2. Security
3. Cost
NGO Budget Premium Rate Number Prepaid Cards Top-up to Subscribe? 3. Cost
4. Dissemination
Calling for Action Using Relays Distributed Public Sphere Using Complementary Tools 4. Dissemination
Thank You www.DigiActive.org [email_address] Twitter.com/DigiActive iRevolution .wordpress.com    my blog

Mais conteúdo relacionado

Semelhante a Digi Active For Mobile Active 2008 Final

Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
VincentAcapen
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
Akshay Sinha
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
South african mobile generation
South african mobile generation South african mobile generation
South african mobile generation
Akshay Sinha
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
gkurtz
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
 

Semelhante a Digi Active For Mobile Active 2008 Final (20)

Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
South african mobile generation
South african mobile generation South african mobile generation
South african mobile generation
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
 
Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Mais de Patrick Meier

Meier uav experts meeting 2014
Meier uav experts meeting 2014Meier uav experts meeting 2014
Meier uav experts meeting 2014
Patrick Meier
 
Presentation to QCRI
Presentation to QCRIPresentation to QCRI
Presentation to QCRI
Patrick Meier
 
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENAUshahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Patrick Meier
 
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENAUshahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Patrick Meier
 
Collaborative Crisis Mapping
Collaborative Crisis MappingCollaborative Crisis Mapping
Collaborative Crisis Mapping
Patrick Meier
 

Mais de Patrick Meier (20)

Meier uav experts meeting 2014
Meier uav experts meeting 2014Meier uav experts meeting 2014
Meier uav experts meeting 2014
 
Digital Humanitarians: Book Slides
Digital Humanitarians: Book SlidesDigital Humanitarians: Book Slides
Digital Humanitarians: Book Slides
 
Monitoring Humanitarian Crises in the Digital Age
Monitoring Humanitarian Crises in the Digital AgeMonitoring Humanitarian Crises in the Digital Age
Monitoring Humanitarian Crises in the Digital Age
 
Presentation to QCRI
Presentation to QCRIPresentation to QCRI
Presentation to QCRI
 
Meier where20 2012
Meier where20 2012Meier where20 2012
Meier where20 2012
 
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENAUshahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
 
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENAUshahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
 
Digital Mapping Technologies for 21st Century Democracy
Digital Mapping Technologies for 21st Century DemocracyDigital Mapping Technologies for 21st Century Democracy
Digital Mapping Technologies for 21st Century Democracy
 
Red Cross: Changing the World, One Map at a Time
Red Cross: Changing the World, One Map at a TimeRed Cross: Changing the World, One Map at a Time
Red Cross: Changing the World, One Map at a Time
 
Recampaign 2011: Changing the World, One Map at Time
Recampaign 2011: Changing the World, One Map at TimeRecampaign 2011: Changing the World, One Map at Time
Recampaign 2011: Changing the World, One Map at Time
 
Re:publica 2011: Changing the World, One Map at a Time
Re:publica 2011: Changing the World, One Map at a TimeRe:publica 2011: Changing the World, One Map at a Time
Re:publica 2011: Changing the World, One Map at a Time
 
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Introduction to Live Crisis Mapping & Checkin's with a PurposeIntroduction to Live Crisis Mapping & Checkin's with a Purpose
Introduction to Live Crisis Mapping & Checkin's with a Purpose
 
Changing the World, One Map at a Time
Changing the World, One Map at a TimeChanging the World, One Map at a Time
Changing the World, One Map at a Time
 
Ushahidi Presentation for UN IASC
Ushahidi Presentation for UN IASCUshahidi Presentation for UN IASC
Ushahidi Presentation for UN IASC
 
The Ushahidi Story: Liberation Technology in Practice
The Ushahidi Story: Liberation Technology in PracticeThe Ushahidi Story: Liberation Technology in Practice
The Ushahidi Story: Liberation Technology in Practice
 
Ushahidi Deployments
Ushahidi DeploymentsUshahidi Deployments
Ushahidi Deployments
 
Collaborative Crisis Mapping
Collaborative Crisis MappingCollaborative Crisis Mapping
Collaborative Crisis Mapping
 
Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation at Fletcher, November 2009Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation at Fletcher, November 2009
 
Crisis Mapping Presentation for UN OCHA
Crisis Mapping Presentation for UN OCHACrisis Mapping Presentation for UN OCHA
Crisis Mapping Presentation for UN OCHA
 
How to Communicate Securely in Repressive Regimes
How to Communicate Securely in Repressive RegimesHow to Communicate Securely in Repressive Regimes
How to Communicate Securely in Repressive Regimes
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Digi Active For Mobile Active 2008 Final

Notas do Editor

  1. Early warning systems HHI Ushahidi Interest in digital activism and Digiactive