of good and bad actions • There is a huge variety of the kinds of things humans are willing and motivated to do • If it’s at all possible to do a certain action on your website, assume that eventually, some (most likely very bored) person will do it
three years Steve Smith has spewed over-the-top conservative blather on Twitter, luring Senator Claire McCaskill, Christiane Amanpour and Rosie O'Donnell into arguments. A 40-year-old dad and lawyer who lives outside Tampa, he says he has become addicted to the attention. "I was totally ruined when I started this. My ex-wife and I had just separated. She decided to start a new, more exciting life without me," he says. Then his best friend, who he used to do pranks with as a kid, killed himself. Marty says his trolling has been empowering.” http://time.com/4457110/internet-trolls/
subreddits—foremost among them r/fatpeoplehate and r/CoonTown—due to violations of Reddit’s anti-harassment policy. We find that the ban worked for Reddit. More accounts than expected discontinued using the site; those that stayed drastically decreased their hate speech usage—by at least 80%. Though many subreddits saw an influx of r/fatpeoplehate and r/CoonTown “migrants,” those subreddits saw no significant changes in hate speech usage. In other words, other subreddits did not inherit the problem. ” http://comp.social.gatech.edu/papers/cscw18-chand-hate.pdf
hired as a software engineer on an exciting new product! It’s your job to check the existing features of the product for potential abuse vectors, and determine options for handling them. Your new employer has most likely never considered the possibility of harassment on their platform and is eager to hear any feedback you might have.
the workshop instructions. Your group will be looking for abuse vectors in one of these applications, and thinking of ways to fix them. You can change your mind later on if you decide you don’t like the one you picked! (P.S.: the Pokedex is a little more challenging than the others)
application you’ll be working on, then think about: • What potential abuse vectors does the application have? • What might motivate someone to take advantage of them? • Note: harassment and abuse are not the same as hacking You can review everything we’ve talked about so far in the “Addressing Abuse Vectors” section of the workshop instructions. We’ll check in after 15 minutes
address an abuse vector? • What are the changes to the UI? • What are the tradeoffs being made? • How does this affect the business? (revenue, PR, software engineering time, etc.) • What alternatives are there?
any of the options you’ve come up with :C Decide where you can use these principles instead: • Add moderation • Make it opt-in • Intervene before, during, and after harassment Each group will give a 1-2 minute presentation in 15 minutes