“Social Media ROI” by Intersection Digital is licensed under CC BY-NC 2.0.
Introduction
As the social features of online platforms become more common, bullying, harassment, violent content, hate, porn and other problematic content circulates on digital platforms. At the same time, such groups are emerging one after another in the network. Online platforms play a key role as a vehicle for these violations, often when disputes between users are involved. In addition, government rulemaking in cyberspace should also provide strong action. In this paper, I will discuss platforms as “bridges” to regulate users and protect them, as well as governmental trends in cyberspace regulation.
Platforms as “bridges” to regulate users as well as protect them
Under national policy requirements, Internet platforms act as a bridge between policymakers and regulators, assuming responsibility for the regulation of user content, as well as regulating user activity (Gillespie, 2018). “Social media platforms arose out of the exquisite chaos of the web” (Gillespie, 2019, p. 5). Social platform designers have developed and expanded cyberspace functions for users in the platform. Users achieve a sense of participation in the platform, opportunities for expression, and connections and interactions with other diverse groups in the online society. However, this seemingly cyber utopian world is a daily occurrence of the darkness of “the pornographic, the obscene, the violent, the illegal, the abusive, and the hateful” ( Gillespie, 2019, p. 5).
”
Sadness” by Pat McDonald is licensed under CC BY-NC 2.0.
Victims of Cyber Violence – Dominique Moran’s Tragic Experience
As the internet and cell phones become more and more popular, everyone can become a chronicler and purveyor of news. Because of the convenience of the internet, everyone can become an enabler or a victim of fake news and cyber violence. on November 16, 2018, Masud Ali, an African-American man recorded a video ordering from Dominique Moran, who works at a Mexican restaurant. as soon as Moran saw the group, he said to them, ” You gotta pay cause you never have money when you come in here” (Derysh, 2018). Ali, the documentarian, immediately complained about Moran’s “racist” comments in the video and posted it to Twitter. The video received 7 million views that night and was retweeted by ABC News and FOX News. Users of the platform trolled Moran, the “perpetrator” of the “racist” comments, endlessly. However, the truth of the matter is not what is presented in the video. Moran and his colleagues knew that the African-Americans were regulars who ate bully meals and could not afford to pay for the food. After the video ended, Moran and his colleagues sought the assistance of the police in dealing with the situation. But because of Ali’s video editing effects, Internet users saw only the false appearance and resorted to cyber violence against the innocent Moran. Months after the incident, the rest of the internet masses were quickly able to forget about these so-called rumours and stories. But for those parties who were hurt, the pain caused by the public opinion attacks may stay with them for the rest of their lives. Therefore, Internet platforms give appropriate reminders about the content posted by users.
Truth Emerges After Black ‘Customers’ Cry Racism, Get Manager Fired by Facts worlds.
Retrieved from: https://www.youtube.com/watch?v=xjx5HelLPIk
“retro robots 02” by byronv2 is licensed under CC BY-NC 2.0.
Artificial intelligence enhancements to help platforms identify and filter dangerous speech
The work of Internet platforms needs continuous regulation. The publishers of the platform, and the users are the ones to be protected. In addition to that, the platform has to show the perfect side of the platform for the sake of new users’ and advertisers’ cooperation. (Gillespie, 2019) Platforms should consider how to moderate to be familiar and acceptable to users, but “moderation is hard to examine” (Gillespie, 2019, p. 6). Instagram has found an effective response from the most direct entry point to online violence. This new commenting feature is designed to reduce the amount of bullying and hate and other inappropriate comments that publishers face in their comment sections. When artificial intelligence detects offensive comments typed by users in the comments section, the platform warns “Are you sure you want to post this?” followed by “learn more”. is the detailed meaning of the launch of the feature for users.
“Cyberspace” by nicolasnova is licensed under CC BY-NC 2.0
Trends in government regulation of cyberspace
The Internet as a medium provides users with a “many‐to‐many medium” format. Tavani (2007) points out that in cyberspace users do not need to spend high amounts of money to express their ideas through the approval of publishers. Regulate refers to “monitor or control a certain product, process, or set of behaviours according to certain requirements, standards, or protocols ” (Tavani, 2007, p. 39). In reality, pornographic tapes are not sold to minors and cannot be distributed for viewing by the general public through television. The Federal Drug Administration, as well as agencies such as the Board of Health, conduct regular inspections of restaurant hygiene standards. However, the online world is decentralized and cannot be strictly mapped to jurisdictional areas. (Tavani, 2007).
“Chinese national Flag Shenzhen Bao’an CBD Square China” by dcmaster is licensed under CC BY-NC 2.0.
China’s Cyberspace Regulator in 2022- “QingLang Operation”
With the rapid development of the Internet, violence, pornography, harassment and other behaviours in the network are banned repeatedly. The “QingLang Operation” strengthens the identification of information about sensitive areas and events. Timely check and verify information without authoritative sources that have great influence and wide dissemination, and actively prohibit the occurrence of cyber violence. At the same time, the “QingLang Operation” has established a traceability mechanism to seriously investigate the relevant responsibilities of serious platforms and accounts. The Chinese government’s efforts to conduct regular investigations and cleanups and to intervene promptly to address violations of the law. Since 2021, China’s internet watchdog, the Cyberspace Administration of China (CAC), has been conducting a month-long “ChingLang Operation “During 2021, the operation shut down 1.34 billion illegal accounts and 3,200 illegal websites. (Coie, 2022) This campaign can create a threat to other misbehaving user behaviour. By conducting the “ChingLang Operation”, the government can gain experience in managing the web in a multifaceted manner. This will enable the CAC and the website platform to enrich their experience in practice and reach a consensus on regulation while turning good practices into a regular working mechanism.
“European Parliament building with the national flags” by NLanja is licensed under CC BY-NC 2.0.
The inter-state how to govern cyberspace
From the perspective of the United Nations, regional organizations and countries, cyber sovereignty is an extension of national sovereignty in cyberspace, and the international consensus that all countries’ cyber sovereignty should be respected has been formed. Historically, reaching a consensus among states in dealing with and regulating new technologies in cyberspace has taken a great deal of time and effort. Henriksen (2019) suggests that the increased competition among states and the struggle for dominance in international affairs are one of the main causes of the deteriorating international security environment. Therefore, it is extremely important to have legally binding agreements between states. Once the agreement between states to manage cyberspace is lost, there will be no tension so far, just like international trade law. (Henriksen, 2019). Cyber governance is an area that belongs to international law and the United Nations should seek win-win strategies and promote good action for the global order. National hegemonism in cyberspace will bring severe risks and challenges to global cyber security. For the public, it will lead to cyber “war”. Therefore, to safeguard cyberspace security, the international community needs to reach a consensus based on cyber sovereignty. Countries should establish a new international order on the basis of mutual respect for sovereignty in cyberspace.
Reference list:
- Coie, P. (2022, April 11). Enforcement Trends From China’s Cyberspace Regulator in 2022. JDSUPRA. https://www.jdsupra.com/legalnews/enforcement-trends-from-china-
s-6060745/ - Dervish, I. (2018, November 20). Dominique Moran: 5 Fast Facts You Need to Know. Heavy.
https://heavy.com/news/2018/11/dominique-moran-masud-ali/ - Hermione. (2019, July 26). Instagram announces Comment Warning feature.
Sticksnstones. https://www.sticksnstones.co.nz/instagram-announces-
comment-warning-feature/ - Henriksen, A. (2019). The end of the road for the UN GGE process: The future regulation of
cyberspace. Journal of Cybersecurity (Oxford), 5(1). https://doi.org/10.1093/cybsec/tyy009 - Tavani, H. T. (2007). Regulating cyberspace: concepts and controversies. Library Hi Tech, 25(1),
37–46. https://doi.org/10.1108/07378830710735849 - Gillespie, T. (2018). Governance by and through Platforms. In B. Jean, M. Alice, & P. Thomas
(Eds.), The SAGE handbook of social media (pp. 254–278). SAGE Publications. - Gillespie, T. (2019). All Platforms Moderate. In Custodians of the Internet (pp. 1–23). Yale
University Press. https:// doi.org/10.12987/9780300235029-001