Social issues involving home computing Archive

Facebook clamps down on voter-suppression misinformation

Article

Australian House of Representatives ballot box - press picture courtesy of Australian Electoral Commission

Are you sure you are casting your vote or able to cast your vote without undue influence?

Facebook Extends Ban On Election Fakery To Include Lies About Voting Requirements | Gizmodo

From the horse’s mouth

Facebook

Expanding Our Policies on Voter Suppression (Press Release)

My Comments

Over recent years, misinformation and fake news has been used as a tool to attack the electoral process in order to steer the vote towards candidates or political parties preferred by powerful interests. This has been demonstrated through the UK Brexit referendum and the the USA Presidential Election in 2016 with out-of-character results emanating from the elections. It has therefore made us more sensitive to the power of misinformation and its use in influencing an election cycle, with most of us looking towards established news outlets for our political news.

Another attack on the electoral process in a democracy is the use of misinformation or intimidation to discourage people from registering on the electoral rolls including updating their electoral-roll details or turning up to vote. This underhand tactic is typically to prevent certain communities from casting votes that would sway the vote away from an area-preferred candidate.

Even Australia, with its compulsory voting and universal suffrage laws, isn’t immune from this kind of activity as demonstrated in the recent federal byelection for the Batman electorate. Here, close to the election day, there was a robocall campaign targeted at older people north of the electorate who were likely to vote in an Australian Labour Party candidate rather than the area-preferred Greens candidate.

But this is a very common trick performed in the USA against minority, student or other voters to prevent them casting votes towards liberal candidates. This manifests in accusations about non-citizens casting votes or the same people casting votes in multiple electorates.

Facebook have taken further action against voter-suppression misinformation by including it in their remit against fake news and misinformation. This action has been taken as part of Silicon Valley’s efforts to work against fake news during the US midterm Congressional elections.

At the moment, this effort applies to information regarding exaggerated identification or procedural requirements concerning enrolment on the electoral rolls or casting your vote. It doesn’t yet apply to reports about conditions at the polling booths like opening hours, overcrowding or violence. Nor does this effort approach the distribution of other misinformation or propaganda to discourage enrolment and voting.

US-based Facebook end-users can use the reporting workflow to report voter-suppression posts to Facebook. This is through the use of an “Incorrect Voting Info” option that you select when reporting posted content to Facebook. Here, it will allow this kind of information to be verified by fact-checkers that are engaged by Facebook, with false content “buried” in the News Feed along with additional relevant content being supplied with the article when people discover it.

This is alongside a constant Facebook effort to detect and remove fake accounts existing on the Facebook platform along with increased political-content transparency across its advertising platforms.

As I have always said, the issue regarding misleading information that influences the election cycle can’t just be handled by social-media and advertising platforms themselves. These platforms need to work alongside the government-run electoral-oversight authorities and similar organisations that work on an international level to exchange the necessary intelligence to effectively identify and take action against electoral fraud and corruption.

Send to Kindle

How can social media keep itself socially sane?

BroadcastFacebook login page

Four Corners (ABC Australia) – Inside Facebook

iView – Click to view

Transcript

My Comments

I had just watched the Four Corners “Inside Facebook” episode on ABC TV Australia which touched on the issues and impact that Facebook was having concerning content that is made available on that platform. It was in relationship to recent questions concerning the Silicon Valley social-media and content-aggregation giants and what is their responsibility regarding content made available by their users.

I also saw the concepts that were raised in this episode coming to the fore over the past few weeks with the InfoWars conspiracy-theory site saga that was boiling over in the USA. There, concern was being raised about the vitriol that the InfoWars site was posting up especially in relationship to recent school shootings in that country. At the current time, podcast-content directories like Spotify and Apple iTunes were pulling podcasts generated by that site while

The telecast highlighted how the content moderation staff contracted by Facebook were handling questionable content like self-harm, bullying and hate speech.

For most of the time, Facebook took a content-moderation approach where the bare minimum action was required to deal with questionable content. This was because if they took a heavy-handed approach to censoring content that appeared on the platform, end-users would be drifting away from it. But recent scandals and issues like the Cambridge Analytica scandal and the allegations regarding fake news have been bringing Facebook on edge regarding this topic.

Drawing attention to and handling questionable content

At the moment, Facebook are outsourcing most of the content-moderation work to outside agencies and have been very secretive about how this is done. But the content-moderation workflow is achieved on a reactive basis in response to other Facebook users using the “report” function in the user-interface to draw their attention to questionable content.

This is very different to managing a small blog or forum which is something one person or a small number of people could do thanks to the small amount of traffic that these small Web presences could manage. Here, Facebook is having to engage these content-moderation agencies to be able to work at the large scale that they are working at.

The ability to report questionable content, especially abusive content, is compounded by a weak user-experience that is offered for reporting this kind of content. It is more so where Facebook is used on a user interface that is less than the full Web-based user experience such as some native mobile-platform apps.

This is because, in most democratic countries, social media unlike traditional broadcast media is not subject to government oversight and regulation. Nor is it subject to oversight by “press councils” like what would happen with traditional print media.

Handling content

When a moderator is faced with content that is identified as having graphic violence, they have the option to ignore the content – leave it as is on the platform, delete the content – remove it from the platform, or mark as disturbing – the content is subject to restrictions regarding who can see the content and how it is presented including a warning notice that requires the user to click on the notice before the content is shown. As well, they can notify the publisher who put up the content about the content and the action that has been done with it. In some cases, the content being “marked as disturbing” may be a method used to raise common awareness about the situation being portrayed in the content.

They also touched on dealing with visual content depicting child abuse. One of the factors raised is that the the more views that content depicting abuse multiplies the abuse factor against the victim of that incident.

As well, child-abuse content isn’t readily reported to law-enforcement authorities unless it is streamed live using Facebook’s live-video streaming function. This is because the video clip could be put up by someone at a prior time and on-shared by someone else or it could be a link to content already hosted somewhere else online. But Facebook and their content-moderating agencies engages child-safety experts as part of their moderating team to determine whether it should be reported to law enforcement (and which jurisdiction should handle it).

When facing content that depicts suicide, self-harm or similar situations, the moderating agencies treat these as high-priority situations. Here, if the content promotes this kind of self-destructive behaviour, it is deleted. On the other hand, other material is flagged as to show a “checkpoint” on the publisher’s Facebook user interface. This is where the user is invited to take advantage of mental-health resources local to them and are particular to their situation.

But it is a situation where the desperate Facebook user is posting this kind of content as a personal “cry for help” which isn’t healthy. Typically it is a way to let their social circle i.e. their family and friends know of their personal distress.

Another issue that has also been raised is the existence of underage accounts where children under 13 are operating a Facebook presence by lying about their age, But these accounts are only dealt with if a Facebook user draws attention to the existence of that account.

An advertising–driven platform

What was highlighted in the Four Corners telecast was that Facebook, like the other Silicon Valley social-media giants make most of their money out of on-site advertising. Here, the more engagement that end-users have with these social-media platforms, the more the advertising appears on the pages including the appearance of new ads which leads to more money made by the social media giant.

This is why some of the questionable content still exists on Facebook and similar platforms so as to increase engagement with these platforms. It is although most of us who use these platforms aren’t likely to actively seek this kind of content.

But this show hadn’t even touched on the concept of “brand safety” which is being raised in the advertising industry. This is the issue of where a brand’s image is likely to appear next to controversial content which could be seen as damaging to the brand’s reputation, and is a concept highly treasured by most consumer-facing brands maintaining the “friendly to family and business” image.

A very challenging task

Moderating staff will also find themselves in very mentally-challenging situations while they do this job because in a lot of cases, this kind of disturbing content can effectively play itself over and over again in their minds.

The hate speech quandary

The most contentious issue that Facebook, like the rest of the Social Web, is facing is hate speech. But what qualifies as hate speech and how obvious does it have to be before it has to be acted on? This broadcast drew attention initially to an Internet meme questioning “one’s (white) daughter falling in love with a black person” but doesn’t underscore an act of hatred. The factors that may be used as qualifiers may be the minority group, the role they are having in the accusation, the context of the message, along with the kind of pejorative terms used.

They are also underscoring the provision of a platform to host legitimate political debate. But Facebook can delete resources if a successful criminal action was taken against the publisher.

Facebook has a “shielded” content policy for highly-popular political pages, which is something similarly afforded to respected newspapers and government organisations; and such pages could be treated as if they are a “sacred cow”. Here, if there is an issue raised about the content, the complaint is taken to certain full-time content moderators employed directly by Facebook to determine what action should be taken.

A question that was raised in the context of hate speech was the successful criminal prosecution of alt-right activist Tommy Robinson for sub judice contempt of court in Leeds, UK. Here, he had used Facebook to make a live broadcast about a criminal trial in progress as part of his far-right agenda. But Twitter had taken down the offending content while Facebook didn’t act on the material. From further personal research on extant media coverage, he had committed a similar contempt-of-court offence in Canterbury, UK, thus underscoring a similar modus operandi.

A core comment that was raised about Facebook and the Social Web is that the more open the platform, the more likely one is to see inappropriate unpleasant socially-undesirable content on that platform.

But Facebook have been running a public-relations campaign regarding cleaning up its act in relation to the quality of content that exists on the platform. This is in response to the many inquiries it has been facing from governments regarding fake news, political interference, hate speech and other questionable content and practices.

Although Facebook is the common social-media platform in use, the issues draw out regarding the posting of inappropriate content also affect other social-media platforms and, to some extent, other open freely-accessible publishing platforms like YouTube. There is also the fact that these platforms can be used to link to content already hosted on other Websites like those facilitated by cheap or free Web-hosting services.

There may be some issues that I have covered in this article that may concern you or someone else using Facebook. Here are some

Australia

Lifeline

Phone: 13 11 14
http://lifeline.org.au

Beyond Blue

Phone: 1300 22 46 36
http://beyondblue.org.au

New Zealand

Lifeline

Phone: 0800 543 354

Depression Helpline

Phone: 0800 111 757

United Kingdom

Samaritans

Phone: 116 123
http://www.samaritans.org

SANELine

Phone: 0300 304 7000
http://www.sane.org.uk/support

Eire (Ireland)

Samaritans

Phone: 1850 60 90 90
http://www.samaritans.org

USA

Kristin Brooks Hope Center

Phone: 1-800-SUICIDE
http://imalive.org

National Suicide Prevention Lifeline

Phone: 1-800-273-TALK
http://www.suicidepreventionlifeline.org/

Send to Kindle

Are Siri and Alexa being seen as personal companions?

Article

Is Siri ending up as your personal companion?

Conversations with virtual assistants like Siri, Alexa may be signs of loneliness | First Post

Talking to Siri often? You’re probably lonely | Times Of India

Do YOU rely on your phone for company? Human-like gadgets can offer relief from loneliness in the short term | Daily Mail

Older adults buddy up with Amazon’s Alexa | MarketWatch

My Comments

Hey Siri! Why am I alone now?

A situation that has been drawn out lately is someone feeling comfortable with their iPhone in their hand or sitting at the kitchen table beside an Amazon Echo speaker, trying to build a conversation with Siri or Alexa rather than simply asking something of these voice-driven assistants.

Amazon Echo on kitchen bench press photo courtesy of Amazon USA

Is this smart speaker becoming your personal companion?

Here, a Kansas University study found that Siri, Alexa and co are being seen as a short-term panacea for social exclusion and loneliness. This is something that is being brought on by broken relationships or an increasing number of work situations where one is spending significant amounts of time away from their significant other or their normal communities. It is also symptomatic of a loss of community that has come about in this day and age.

It is also worth knowing that older and disabled adults are using Alexa or Google Home as a companion in the context of managing lights, or simply asking for the time or a music source. These devices are deliberately designed to look like other pieces of consumer-electronics or IT hardware rather than the typical bland look associated with assistive devices. They also do serve as an aide-memoire for dementia sufferers but only in early stages of this condition before it becomes worse.

But Siri, Alexa, Cortana and co are not perfect replacements for real-life friends, There is the long-term risk of you losing real human interaction if you rely on them as your companions. Here, you simply keep them serving you as a voice-operated “digital concierge” that helps with finding information or setting up your smart home rather than the be-all-and-end-all digital companion.

Send to Kindle

What needs to be answered about school-supplied technology

Lenovo ThinkPad Helix 2 connected to Wi-Fi hotspot at Bean Counter Cafe

Many questions need to be raised by knowledgeable parents about school-based IT programs

Parents often face a question when their child starts secondary school concernimg the technology that is being used as part of their education. This is more so with laptop computers that well be used at home to complete homework assignments and at school to take notes and do research.

Increasingly schools are supplying the families with the appropriate technology, typically with government and private-sector assistance. These computers may be supplied at a heavily-subsidised price so there isn’t much effect on the parent’s hip pocket.

But schools see this technology as part of their realm of control in your student’s life in a way that they see what the student does at home or away from school activities as bearing on the school’s name. This may be more so with privately-funded and similar schools where the school places a strong emphasis on their name and reputation.

These questions are worth raising during information nights or parent-teacher meetings that you will be engaging in during your child’s enrolment.

Is the technology sold or leased to your family by the school?

If you are acquiring the technology through the school, it is worth enquiring whether you are buying the computer so that you own the computer or whether you are leasing it or renting it on an annual basis where the school or school district has legal ownership over the equipment. This may include situations where you may borrow the computer for the duration of your child’s enrolment or for certain years but you may have to pay a bond on the equipment.

This can help with further issues regarding whether you can retain the computer to be used for the younger children or as a utility computer. On the other hand, it can also affect issues regarding maintaining the system and what happens in case of loss, theft or damage.

As well, it is worth finding out whether a technology-buyout program does exist where parents or students can purchase leased or rented computer equipment that they currently use from the school. This is important for equipment supplied to senior high-school students because most of the school-supplied technology programs require that the senior students relinquish their computers once they graduate from their senior years.

Such a buyout option can benefit both the school and student in different ways. The student benefits by being able to keep the computer as a personal computer through the years between their high-school graduation and their entry to tertiary or trade studies. The school also benefits because they aren’t keeping rapidly-depreciating assets on their books but can turn them over for cash which can be used to buy newer technology.

Who provides support in case of equipment failure or accident

Ask the school whether they have a maintenance programme for the school-supplied equipment. This includes what kind of minimum turnaround time exists if the equipment needs to be serviced. As well, does the maintenance programme cover for accidental equipment damage because students can easily end up being accident prone.

It may also include whether you have to pay to replace failed or damaged parts and whom you buy the replacement parts from.

Insurance coverage for theft and damage

To the same extent, it may be worth looking at your home-contents insurance policy to find out whether they provide coverage for equipment that is damaged or stolen while away from your home, including overseas. This may be of importance when your children go on the many field trips and school camps that will be part of their education; or when they engage in social activities with their friends.

Exchange-student programs

Your school may participate in an exchange-student program where one or more local students travel to another area, typically another country while the school hosts and teaches the students from one or more other areas. This is typically to encourage awareness of different cultures and increase knowledge of different languages.

Such programs typically will include overseas travel and having the participants stay in private households that are part of the participating school’s community. There are questions that will be raised if you end up hosting an exchange student or your child becomes an exchange student themselves.

If the school facilitates this program whether by itself or with a third party, you may have to find out where you or the school stands if the equipment belonging to your child who is overseas or the student you are billeting was stolen or damaged.

Similarly, your child or the student you are hosting may need assistance with connecting to different networks such as the host’s home network in the case of your child or your home network in the case of the guest student.

For that matter, it may be a good idea for schools, student-exchange agencies and students participating in exchange-student programs to read an article I wrote on this site about testing Skype across separate networks to make sure it works properly. This is because the videocall functionality in these programs can be used as a way for an exchange student to keep in contact with home and show what the “other” culture is about.

Can I configure the system myself?

An issue that is also being raised regarding school-supplied technology is whether you can configure the system yourself or perform remedial repairs on the system.

This may be to get the laptop to work with your home network, or to install any drivers to get it to work with the network-capable printers in your home. As well, you need to be sure that the school-supplied computer can gain access to other network resources and the Internet in a similar manner to other devices that exist on the home network.

Similarly, there is the issue of keeping the operating system and applications on these computers updated and patched to avoid these computers and the rest of your home network’s computers being the target for malware. Here, the kids’ computers could be updated with the latest patches whether they are at school or at home.

Different operating platforms

This issue of configuring the school-supplied laptop yourself also extends to coping with different computer platforms and operating systems. For example, you may find that the school supplies your kids a MacBook Pro as part of one of Apple’s education-technology programmes that the school is benefiting from, while you are more comfortable with the Windows-based computer you use at home. Similarly, the school may have all the computers running Windows 10 but you are pushing the barrel with Windows 7 on the work-home laptop that you normally use.

Here, you may be able to find out whether you can learn about the computing platform and operating system your school uses and how to configure it to work with your home network and peripherals.

How does the school handle a “bring-your-own” computer?

Another situation that is appealing to parents is the ability to buy their kid’s computer from a third-party retailer and have that as the computer thay use for school. This is typically due to the ability to purchase the system at a cost-effective price through a “back-to-school” special run by a major retailer or online and some governments may provide a benefit to families to assist with purchasing this education-related technology.

This concept is being facilitated also by the fact that the “bring your own device” concept is in full swing at workplaces and newer operating systems and software allows for a level of manageability in these situations.

Minimum standards for this computer

You should find out what the minimum standards are for a computer you supply yourself. The standards for the hardware should be based on the kind of CPU the computer must have, the amount of RAM and storage space the computer has, and the graphics subsystem and display resolution that the computer has to have. This also includes the minimum standard for the Wi-Fi interface for schools that implement a Wi-Fi network.

As for the software, you need to find out the minimum version and edition of the operating system along with the application software you need to have installed.  You may find that application vendors may supply a “student edition” of their software which is licensed for personal and education use only and some of these programs may be licensed for a small number of computers that are in the same household.

Use of a school-supplied disk image?

Some schools may require the use of a disk image that is managed by the school themselves in order to assure better control of the computer on the school premises. Here, you may find out whether you need to install this image and if you can get away with a dual-boot setup where you have a “home” operating environment and a “school” operating environment.

The better solution would be a USB stick or optical disk full of any courseware that is necessary for the curriculum, including any software that is required for the studies. The Internet use at the school environment can be controlled using the network hardware that runs the school’s network.

Can the system be maintained by the school’s IT staff?

It may also be worth inquiring whether the school’s IT staff are willing to provide maintenance and support for equipment that is brought to school on a BYO basis. Here, it may be about rectifying a system failure that occurs on that day or adding support for student-accessible peripherals that the school owns such as printers or sensor devices used as part of science experiments.

Computer-education courses for adults

In a lot of households where one or both parents aren’t computer-literate is that one or more of the teenage children end up providing assistance to the parents when it comes to personal-computing issues. This is typically due to the children learning many concepts regarding personal-computing through their school years.

It may also be worth finding out if your child’s school runs adult-focused courses about computer education. This may be of importance for those of you who haven’t had much education-based or workplace-based exposure to personal computing and will be of importance for people who do work that is primarily blue-collar.

Typically, the mode of delivery for these short courses would be evening classes taught by one of the school’s computing-science teachers. The school will usually charge for the courses and the students’ parents may pay a cheaper fee due to the fact that their child is attending that school.

Here, the courses should teach the essentials about knowing your way around your computer such as file management; along with safe computing practices. This should also include learning about keeping your computer system in top order like backups and keeping your software up-to-date. As well, such courses should highlight making effective use of the Internet and its online resources in a safe manner.

Some of the courses may offer tuition in other computing platforms like the Macintosh platform which may benefit adults who are used to, say, Windows learning about the other platforms and would come in handy if the school works on that different platform.

Conclusion

Once you ask the right questions from your child’s school’s staff, you can end up being an active participant in your child’s IT-focused education without fearing as though the school “owns you”.

Send to Kindle

Dealing with Internet trolls

Article

How to kill a troll | Naked Security (Sophos)

My Comments

Anyone who has a personal Internet presence on a message board, social network or similar environment or operates such a presence for their company or other organisation can end up facing the worst side of the Internet.

This is typically in the form of the “Internet trolls” who exist on message boards, social networks, blog comment trails and online chat rooms just to cause trouble. This has manifested in online harassment which is mainly in the form of schoolyard-grade activity like foul names or targeted embarrassment attempts. But there have been acts like physical threats against person, animal and property; stalking, sustained harassment and sexual harassment with young women being the main victims.

It included a situation that I faced regarding a café I regularly visited where their Facebook presence was tarnished with foul comments because the business didn’t permit a protest group to put some flyers about their campaign by their cash register. Here, I was defending the café in their stance regarding what had happened.

But what can you do? You could block the accounts where the behaviour is coming and implement technological measures that do this for you. Here, such measures work on logic like blocking relatively young accounts that mention you, accounts with very few followers that mention you or accounts that generate replies containing certain keywords.

On the other hand, you could embarrass the source of the comments. This plays on various analogies associated with social taboos like in-workplace sexual harassment where a person isn’t just hauled up before law courts but the court of public opinion doesn’t look favourably on them. This would be hard to implement in the online world due to the ease in which one can create an anonymous online presence such as with the use of multiple disposable emails or pseudonyms.

Some countries like the UK have given their online-harassment laws more teeth such as legislating for longer prison terms. To the same extent, we should be encouraged to use all of the civil and criminal laws available to us as a tool to deal with Internet trolls, but a key problem is working with the problem from a cross-jurisdictional angle. This is where you identify that the activity is appearing from another state within the same country in the case of countries like Germany, Australia and USA, or another country; such as someone residing in the UK being harassed by someone using a computer located in New York State in the USA.

As well, there have been various PR activities to pillory the trolls such as Mary Beard’s activity after being victimised by schoolyard-grade online behaviour. She wasn’t afraid to speak her mind on British TV and had her friends and supporters work together to “fight back” against the troublemakers. Businesses and organisations who have been “got at” by trolls can use their loyal support base who have an active online presence such as their regular customers to work together for this same goal. 

Let’s not forget that the channels that exist to report trouble on a social network, bulletin board, chat forum or the like do exist for you to report this kind of trouble.

Personally, I would encourage any campaign to crack down on Internet trolling to be done as a group of many people. They can pool resources and use their contacts to work together to defend the people who are being affected or make life hard for the troublemakers. This can manifest in using technological tools to limit their effect on the affected forums, using civil and criminal legal action against the troublemakers or use online and offline public-relations efforts with a view to pillory them.

Sometimes some disturbing situations that happen with social networking, Internet forums, instant messaging and the like may require you to simply ignore or block trouble on the Internet but others may require you to work actively against it.

Send to Kindle

Doncare has launched a mobile-phone app to help people in domestic-violence situations

Article

Doncare launches LiveFree App to fight domestic violence | The Weekly Review

From the horse’s mouth

Doncare Community Services

Press Release (PDF)

Facebook Page

App Site (iTunes App Store)

My Comments

Doncare Community Services, along with Doncaster Rotary Club, have just launched an iPhone app that provides information about domestic and relationship violence. This provides the general information that women need to know about handling these situations along with knowledge of legal and similar resources they can avail themselves of.

A typical situation that concerns online domestic-violence resources is that these resources are typically furnished as Web pages which can yield a privacy risk for the victim of this violence due to the fact that Web browsers list what you have browsed. This is a key risk for  lot of these victims who live in a highly-controlled abusive relationship. Here, the perpetrator is often likely to check on recent Web-browsing activity that the person has done on the computer equipment used in their home as part of wanting to know what they think and do as well as whom they see. These people even have to do this browsing from their workplace’s computer, a friend’s computer or a publicly-accessible computer like one installed in a library or café.

The native mobile app has the advantage that they can download the app from the platform’s app store, use it and delete it quickly if they fear that the perpetrator is snooping around their phone. Then they re-download the app from the app store as and when they can.

One limitation about this app is that it is focused on resources and legal options that are available and relevant to Victoria, Australia. An improvement that I would have would be to download information about options available in other jurisdictions, something that can be provided during the setup phase or at a later point. This effort could be positioned as part of a localisation effort that would take place during the app’s lifecycle.

At least this is an example of what can be done by family-violence support organisations regarding using the smartphone and tablets that people own. This is where a free, easily-downloaded, easily-uninstalled app that has this critical information and access to critical resources can be used as a tool by people who are at risk.

Send to Kindle

Facebook launches a “Safety Check” program for use during emergencies

Facebook Safety Check iPhone notification screenshot courtesy Facebook

Facebook Safety Check notification on iPhone

Articles

SAFETY CHECK: Facebook Tool Simplifies Users’ Communication During Disasters, Crisis Situations | AllFacebook

Facebook’s new Safety Check lets you tell friends you’re safe when disaster strikes | NakedSecurity (Sophos)

From the horse’s mouth

Facebook

Introducing Safety Check (Press Release)

Feature Description

My Comments

Facebook has just released a system which works during natural disasters or other civil emergencies to allow people to be sure that those friends of theirs who are in the affected areas are OK. This system, known as Safety Check, was born out of a “notice board that Facebook built in to their system during the 2011 Japanese earthquake and tsunami. It would still complement other methods like phoning or texting those you know in the affected areas.

If an emergency happens, this would affect a known geographical area and Facebook would determine if you or your friends are in that area or not. Typically, this would be brought on by emergency services and the media advising Facebook of these situations. This would be based on the City data in your Profile or rough-gauging where you are interacting with it from. It would also use the Last Location details if you opt in to and implement the “Nearby Friends” app as another metric.

Facebook Safety Check dashboard screenshots (regular computer and mobile) courtesy Facebook

Facebook Safety Check dashboard- regular and mobile (handheld) views

Here, you will have a notification that will pop up if you are in the affected area and you mark this as “I’m Safe” if you are OK and safe, or mark as being “Out Of Area” if Facebook miscalculates your location and determines that you are in that area when you are are not in that area. The latter situation can happen for people who are in a large metropolitan area or conurbation and the disaster or crisis situation only affects a small part of that area.

This status will show up to your Friends as a Notification and in their News Feed to reassure them.This is augmented by a special “dashboard” page created for the emergency that shows a filtered list of your friends who are in the area affected by the crisis so you cab know who has “called in” to say they are OK,

This same setup also benefits those of us who are outside the affected areas and want to simply be sure that none of our friends have been affected by that crisis. Here, we receive the News Feeds and Notifications about our Friends who have “checked in” as being safe or out of the affected area and can also see this on that same “dashboard” page.

As for the privacy issue, these updates are only visible to those people who are currently your Facebook Friends when it comes to “coarse” coverage and to those of us who have reciprocally enabled the “Nearby Friends” functionality on Facebook for each other.

Although Facebook is the dominant consumer-facing social network and is able to achieve this goal, various other messaging and social-network services could learn form this setup to allow “at-a-glance” notification of our loved ones’ welfare during natural disasters and other crises.

Send to Kindle

Facebook now exposes suicide-prevention resources to their users through an infographic flow-chart

Article

INFOGRAPHIC: Suicide Prevention Resources On Facebook – AllFacebook

My Comments

I have previously covered the issue of Facebook in relation to the difficult topic of suicide and self-harm with an article about some incidents where a Facebook user sought assistance to handle a suicide attempt across the other side of the world; as well as another drawing attention to teenagers using this service as a counselling resource to reach out to other at-risk teens.

Now Facebook have taken it upon themselves to provide resources to help users worried about a person who is at risk of self-harm or suicide. This is more so where a Facebook status update becomes something to vent one’s feelings as I have seen before many times.

Here, they have exposed these resources and what they can do by showing an infographic flow-chart (PDF) about what they can do to help the user who is worried about their friend. They are exposing this flow-chart using a series of public-service announcements that appear across the Website so everyone who is using Facebook is aware of the resource.

This is in addition to partnering with organisations like Lifeline and Samaritans as well as implementing protocols and procedures to handle these situations especially where it happens in another country. One of the actions can include Facebook drawing the affected person’s attention to their local resources as well as keeping the concerned friend “in the loop” through a special Web dashboard.

As well, they have made a “one-touch” reference list of these organisations in their online help so that anyone across the Internet can be aware of these resources.

What I see of this is that Facebook, due to the sheer number of regular users, has done the right thing to handle this situation and this could open up questions amongst Internet-based online communities about how to handle situations where a person expresses a desire to harm themselves through these communities.

 

Send to Kindle

Using Facebook to tackle teen suicide

Article

Teens meet on Facebook to talk about suicide

My Comments

I have often heard remarks about the negative influence of Facebook and other social networks on teenagers’ lives and how they use these services. But this article has highlighted how a group of teenagers have used this service to reach out to teenagers on this sensitive topic by setting up an open group which can act as a forum on this topic.

They took the fact that nearly every teenager has Facebook presence and they often vent their feelings on their Facebook Wall as I have seen before. This group effectively became a forum to raise a subject that is normally considered taboo. I had a look at the forum and there were even images and referenced to people who have lost people that were close to them in this manner.

I would like to see this group exposed not just to Australian media but to worldwide media because this isn’t just an Australian issue but a worldwide issue.

For further help on this topic, I have published a list of some of the organisations looking in to the suicide and depression issue but there will be a similar organisation operation close to you.

Australia
Lifeline 13 11 14
Suicide Call-Back Service 1300 659 467
Suicide Line 1300 651 251
Beyond Blue 1300 22 46 36
United Kingdom
Samaritans 08457 90 90 90
Ireland
Samaritans 1850 60 90 90
USA
1-800 SUICIDE (HopeLine)
– Kristin Brooks Hope Center
1-800-SUICIDE
Send to Kindle

Tablets–another screen for the TV viewing area

Article

The tablet will be the center of the connected lifestyle — Online Video News

My comments

Acer Iconia Tab A500 tablet computerThis article is affirming the idea of using a tablet computer like the Apple iPad or the Acer Iconia Tab in the lounge room as you watch TV. Some people may object to this because of the “too many screens” argument. But of course, you will still look at the big screen for the video content.

Small personal TV

One of the most common TV-related apps for the iPad and tablets of its ilk is as a personal screen for viewing content. This could be in the form of downloading or streaming the content to the tablet device and has been subjected to various legal strangleholds with Hollywood.

But it also has been taken further with broadcast-LAN tuner adaptors which tune in and stream TV content to these tablets once controlled via a special app. As well, the use of DLNA media player software can allow you to view video content held on your home network through these devices.

Remote control for large screen

Another application of interest is for the tablet to work as a remote control for the large-screen TV. Here, this would work with apps delivered by TV and set-top-box manufacturers to the various app stores for the tablet platforms.

It would work hand in glove with programming your PVR, use of interactive-TV applications or even using the interactive functions of a Blu-Ray disc; as well as navigating an increasing array of TV channels.

Of course, I have a doubt about this when it comes to activities where you need instant response. I would like to be sure that you tap MUTE on the tablet and you are sure that the racecaller voice that is part of that commercial isn’t heard the moment you press it for example.

As well some manufacturers may limit this function to their tablets, especially if the tablet is the same brand as the TV in question; usually as a way to reinforce brand loyalty.

Show downloaded content on large screen

In a similar way to the previous “small personal TV” application, a tablet computer can be used to show content on the large television or video projector. This can be through a direct connection from the tablet’s miniHDMI socket or AV-out jack to the TV or by pushing the content to an Apple TV or DLNA network media player.

But wait there’s more:

Internet browsing concurrent with TV viewing

A very common application that I have noticed with smartphones and tablets is to engage in Internet use while watching TV. Examples of this include researching a TV programme on IMDB or a concept that was used in the TV program; using the tablet as a persistent scoreboard during a sports game or updating the Social Web during a TV show. I have expanded on the “persistent scoreboard” application in this site by mentioning an increasing number of “scoreboard apps” that are available for most sports codes and leagues and the role of these apps in enjoying your favourite sports fixtures.

The persistent scoreboard could be an app in itself or simply an always-refreshed Web page; and could remind you of where the players stand in that match you are watching. In some cases, the apps provide access to player / team information as well as on-demand video replays or interactive progress maps. Of course, you could head over to other commentary sources for comments other than what the TV commentators are barking about.

As I have seen, a lot of TV shows are integrating the Social Web very tightly in to their programming fabric. This can be typified with selected Twitter and Facebook comments being read out by the compere or a ticker with Twitter comments crawling across the bottom of the screen. Even news and public-affairs events will have official or unofficial tickers running on Twitter or Facebook as people post up comments on these events using the Social Web.

The tablet computer may work better than the “smart TV” Social-Web apps because the TV usually works with one account at a time and you won’t see the show’s video occupying the screen as you post your comment. One or more tablets (or small computers) can perform this function in an individual manner for individual viewers,

Setup requirements

In most cases, a Wi-Fi connection to the home network and broadband connection is all that is needed if the tablet is just being used at home; and would be necessary for network-media-adaptor use. This could allow you to buy a Wi-Fi-only model if it is to stay primarily at home or not be used with an external wireless-broadband router on the road.

Conclusinon

As I have said, the tablet is now working as a supplementary screen in the TV lounge area rather than just as an ebook reader and email terminal.

Send to Kindle