Merge pull request #14 from iftas-org/l10n_main2

New Crowdin updates
This commit is contained in:
Jaz-Michael King 2024-12-15 20:55:54 -05:00 committed by GitHub
commit 666b028ff0
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
34 changed files with 122 additions and 122 deletions

View file

@ -1,5 +1,5 @@
Brigading
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.
Attività di massa online coordinata, spesso pianificata, per influenzare un contenuto o un account, o un'intera comunità o un bacheca messaggi.
Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews.
Esempi includono il coordinato voto alterato per un post al fine di influenzarne la distribuzione, segnalazione di massa di un account (di solito falsamente) per abuso nel tentativo di farlo sospendere dal fornitore di servizi, o inondare un'area d'affari con buone o cattive recensioni.

View file

@ -1,9 +1,9 @@
Copyright Infringement
Infrazione dei diritti d'autore
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.
L'uso di materiale protetto dalla legge sul diritto d'autore (come testo, immagine, o video) in un modo che viola i diritti del titolare del diritto d'autore, senza il permesso del titolare del diritto e senza uneccezione o limitazione del diritto dautore applicabile.
This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works.
Ciò può includere la creazione illecita di copie, distribuzione, visione o esecuzione pubblica di un'opera coperta o la creazione non autorizzata di opere derivate.
Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user).
La violazione può comportare la responsabilità primaria (per la persona che ha commesso la violazione) o la responsabilità secondaria per altri soggetti coinvolti in tale comportamento (come una società di hosting il cui servizio ospiti immagini pubblicate da un utente).
In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law.

View file

@ -1,5 +1,5 @@
Counterfeit
Contraffazione
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.
La fabbricazione o la vendita non autorizzata di merci o servizi con un marchio non autentico, che possono indurre in errore i consumatori facendo loro credere che essi siano autentici.
The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces.
La fabbricazione o la vendita di prodotti contraffatti è una forma di violazione del marchio e la responsabilità secondaria per questo comportamento è una preoccupazione per i mercati online.

View file

@ -1,3 +1,3 @@
Astroturfing
아스트로터핑
Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources.
광범위하고 실제 같은 풀뿌리 운동이나 주어진 주제나 단체에 대해 반대하는 거 같아 보이지만 실제로는 숨겨진 단일 또는 작은 수의 숨겨진 근본으로부터 영향 받거나, 돈을 받거나, 또는 조직된 진실 같아 보이는 조직 행동

View file

@ -1,5 +1,5 @@
Brigading
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.
특정한 내용이나 계정, 또는 게시판이나 커뮤니티 전체에 대해 행해지는 조직적이고, 대부분의 경우 미리 계획된 대규모의 온라인 행동.
Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews.
예시로는 추천이나 비추천 수 조작으로 게시물의 공개 범위에 영향을 주거나, (대부분의 경우 거짓으로) 대량으로 계정을 신고해 서비스 제공자가 정지하게 하거나, 좋은 리뷰나 나쁜 리뷰를 대량으로 보내 리뷰를 조작하는 것 등이 포함이다.

View file

@ -1,5 +1,5 @@
Catfishing
网络钓鱼
The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real.
指某人在在线服务平台(如社交媒体或约会应用)上创建一个虚假身份,并与相信该身份真实的人建立关系的行为。
This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering.
该行为通常与金融诈骗和对受害者的其它形式的剥削有关,也被称为“杀猪盘”。

View file

@ -1,9 +1,9 @@
Child Sexual Exploitation/Abuse Material (CSEA/CSAM)
儿童性剥削/虐待材料CSEA/CSAM
Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming.
指展示正在参与或被描绘为参与露骨的性行为未成年人的图像或视频。 儿童性剥削和虐待 (CSEA) 指一个更广泛的类别,它既包含描绘儿童性虐待的材料,也包含其他描绘儿童的性化内容,还包括儿童性诱拐。
"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects.
“模拟儿童性剥削与虐待影像”包含对儿童的修改或虚构的描绘,不涉及任何未成年人主体直接参与。
Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties.
专家、幸存者团体与业内人员不鼓励使用“儿童色情制品”一词,但它在多个司法管辖区与国际条约中仍被用作一个法律术语。
CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services.
几乎所有司法管辖区都将 CSAM 视为非法,因此对在线服务而言,检测和删除 CSAM 是一项高度优先事项。

View file

@ -1,3 +1,3 @@
Content- and Conduct-Related Risk
内容与行为相关风险
The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service.
指特定的非法、危险或其他有害内容或行为(包括对人权的威胁)发生的可能性,这些内容或行为是被相关政策和服务条款所禁止的。

View file

@ -1,9 +1,9 @@
Coordinated Inauthentic Behavior
协同非真实行为
Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout.
指一个或多个账户(包括“虚假”的仅用于或主要用于参与此类活动的账户)通过采取行动误导他人,或以欺诈手段提升内容或账户的流行性或可见度(例如大规模关注某个账户以提高其影响力)的有组织在线活动。
In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity.
在某些情况下,单个不明来源或组织会部署许多虚假账户,以营造真实可信活动的假象。
In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content.
在其他情形下,人们使用自己的真实账户进行在线协同行动,以实现误导性目的,例如制造某种观点或信念比实际更普遍的假象,或导致特定内容或特定类型的内容被广泛传播。
Sometimes called "platform manipulation" or "content manipulation."
有时也称“平台操纵”或“内容操纵”。

View file

@ -1,9 +1,9 @@
Copyright Infringement
版权侵犯
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.
指在未经版权持有人许可,且无适用版权例外或限制的情况下,以违反版权持有人权利的方式使用受版权法保护的材料(例如文本、图像或视频)。
This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works.
这可能包括对受保护作品的复制、发行、展示或公开表演构成侵权,或未经授权创作衍生作品。
Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user).
侵权可能涉及主要责任(针对实施侵权的人)或次要责任(针对参与该行为的其他主体,例如托管用户发布图片的托管公司)。
In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law.
在美国,提供用户生成内容的数字服务在符合该法律规定的通知和移除程序的情况下,依据版权法第 512 条获得安全港保护。

View file

@ -1,5 +1,5 @@
Counterfeit
伪造
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.
未经授权制造或销售带有伪造商标的,能导致消费者误认为它们是正品的商品或服务。
The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces.
假冒商品的制造或销售是一种商标侵权行为,对此行为的次要责任是线上交易平台需要关注的问题。

View file

@ -1,9 +1,9 @@
Cross-Platform Abuse
跨平台滥用
Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services.
指不良行为者或群体利用多个在线服务组织滥用活动(例如骚扰、恶意挑衅或散布虚假信息)的情况。
This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation.
该行为导致受害者移除滥用内容更加困难和耗时,因为他们需要分别联系每个服务商并解释情况。
Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a services policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place.
在某些情形下,相同的内容会被直接转发到多个平台。 在其他情形下,不良行为者会将内容或行为进行分割,使得任何单一服务商都不承载完整的滥用内容。 因此,由于缺乏对整个活动的完整背景,或者如果服务商的政策将其调查范围限制在直接涉及该服务的内容或行为,则该服务商可能认定没有发生违规行为。
Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately.
通常,这类情况需要研究和整合来自多个服务的数据,并调查不良行为者和受害者的背景情况,以便进行更有意义的评估并做出适当的回应。

View file

@ -1,11 +1,11 @@
Defamation
诽谤
A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statements subject (the legal elements and applicable defenses vary by jurisdiction).
指针对某人发表的、与他人分享的、损害对应主体名誉的言论而提起的法律诉讼(具体的法律构成要件和适用抗辩理由因司法管辖区而异)。
Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text.
诽谤可以通过多种媒介传播,包括视觉、口头、影像或文字。
In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed.
在美国,根据宪法第一修正案的判例法,举证责任在于声称自己被诽谤的人。
In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation.
在其他司法管辖区,例如欧洲,举证责任可能在于被告,以证明他们没有实施诽谤。
These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities.
上述法律方法与相关法律风险水平的差异可能会影响各地在线服务提供商采用的诽谤争议下架流程。

View file

@ -1,5 +1,5 @@
Dehumanisation
非人化
Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases.
指以否认或贬低人性尊严的方式描述人,例如将特定群体比作昆虫、动物或疾病。
Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets.
一些该领域的专家认为,非人化言论可能是暴力的前兆(有时甚至是种族灭绝的前兆),因为它可能使针对“非人类”或“次人类”目标的暴力行为显得适当或合理。

View file

@ -1,5 +1,5 @@
Disinformation
虚假信息
False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions.
虚假信息指故意且恶意传播的虚假信息,旨在制造混乱,煽动不信任,并可能破坏政治与社会制度。
Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented.
有害信息是研究人员认定的另一类误导性信息,它基于现实,但通过改变信息呈现的上下文来对个人、组织或国家造成伤害。

View file

@ -1,7 +1,7 @@
Doxxing
人肉搜索
The act of disclosing someones personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the persons consent.
指未经本人同意,在网络论坛或其他公共场合公开披露某人的个人非公开信息的行为,例如真实姓名、家庭地址、电话号码或任何其他可用于识别个人的数据。
Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment.
人肉搜索可能导致信息被曝光者面临现实世界的威胁,因此通常被视为一种网络骚扰形式。
Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing.
某些服务也可能将以威胁方式汇总和披露某人的公开可用信息视为构成网络人肉搜索的行为。

View file

@ -1,7 +1,7 @@
Farming
内容农场与账号农场
Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message.
内容农场指创建在线内容的唯一或主要目的是吸引页面浏览量并增加广告收入,而非出于表达或传达特定信息的愿望。
Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue.
内容农场通常根据用户的热门搜索关键词创建网络内容(这种做法被称为“搜索引擎优化”),以便在搜索引擎结果中获得更高的排名。 由此产生的“耕作”内容通常质量低劣或带有垃圾信息,但仍然可以盈利,因为它们策略性地使用特定关键词来操纵搜索引擎算法,将用户引导至特定页面,从而使所有者能够“收割点击量”以获取广告收入。
Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so.
账号农场指以看似无害的方式创建和初始使用服务帐户,以积累关注者、增加帐户的“年龄”并创建记录,使帐户看起来真实可信,然后再将帐户转向发布垃圾邮件、虚假信息或其他滥用内容,或将其出售给打算这样做的人。

View file

@ -1,5 +1,5 @@
Glorification of Violence
宣扬暴力
Statements or images that celebrate past or hypothetical future acts of violence.
指颂扬过去或假设中的未来的暴力行为的言论或影像的行为。
Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it.
一些在线服务会限制或禁止美化暴力(包括恐怖主义)行为,理由是这种美化可能会煽动或加剧未来的暴力行为,并营造一种威胁性或不安全的在线环境。然而,区分对某一主题的美化与其他类型的讨论存在挑战。

View file

@ -1,5 +1,5 @@
Hate Speech
仇恨言论
Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics.
指辱骂性、仇恨性或威胁性的内容或行为,因所属群体而对某个群体或个人表达偏见,其所针对的群体特征可能受法律保护,例如宗教、民族、国籍、种族、性别认同、性取向或其他特征。
There is no international legal definition of hate speech.
目前尚无国际公认的对仇恨言论的法律定义。

View file

@ -1,5 +1,5 @@
Impersonation
冒充
Online impersonation most often involves the creation of an account profile that uses someone elses name, image, likeness or other characteristics without that persons permission to create a false or misleading impression that the account is controlled by them.
在线冒充通常指未经他人许可,创建使用他人姓名、图像、肖像或其他特征的账户资料,从而制造该账户由其本人控制的虚假或误导性印象。
Also known as "imposter accounts."
也称为“冒名帐户”。

View file

@ -1,3 +1,3 @@
Incitement
煽动
To encourage violence or violent sentiment against a person or group.
鼓动或怂恿针对个人或群体的暴力行为或暴力情绪。

View file

@ -1,13 +1,13 @@
# Introduction
As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe.
# 导言
随着数字服务信任与安全领域的重要性、复杂性和从业人员数量的不断增长,确保该领域工作人员对关键术语的理解一致变得愈发重要。
Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary.
一直以来,企业都在结合利用人员、流程和技术手段应对与内容与行为相关的风险。如今,如同网络安全和隐私等其他技术专业领域的发展轨迹一样,该领域也已到达一个关键点:开始走向正规化、成熟化,并具备了自我意识。世界各地,无论家庭、学校、企业,还是各级政府,都在就信任与安全议题展开重要讨论,探讨如何实现信任与安全才能更好地服务社会及其与互联网不断发展的关系。 但这些有意义的讨论有时受到缺乏统一术语的限制。
Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary
Led by DTSP co-founder Alex Feerst, this glossary has the following objectives
过去一年,数字信任与安全合作组织 (DTSP) 一直致力于制定业内首个信任与安全术语表。在公开征求意见的过程中DTSP 收到了来自学术组织、行业合作伙伴、监管机构以及来自世界各地的其他利益相关方的宝贵意见。现在,我们发布该术语表的第一版。
该术语表的制定由 DTSP 共同创始人 Alex Feerst 领导,具有以下目标:
1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations
2. Support the adoption of agreed interpretations of critical terms use across the industry; and
3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public
1. 促进本领域的专业化,并支持新兴的信任与安全团队开展运营
2. 推动业界对关键术语的理解达成共识;以及
3. 促进从业人员、政策制定者、监管机构和广大公众之间的知情对话。
The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here.
第一版术语表的目标是描述从业者如何使用关键术语。 这些并非法律定义,它们的发布并不意味着每个 DTSP 合作伙伴公司都完全同意此处定义的每个术语。

View file

@ -1,5 +1,5 @@
Misinformation
失实信息
False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons.
指无意传播且通常并无恶意,但却可能造成误导或增加人身伤害可能性的虚假信息。
Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented.
有害信息是研究人员认定的另一类误导性信息,它基于现实,但通过改变信息呈现的上下文来对个人、组织或国家造成伤害。

View file

@ -1,13 +1,13 @@
Non-Consensual Intimate Imagery (NCII)
非自愿亲密影像 (NCII)
Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it.
非自愿亲密影像分享(也称为“非自愿露骨影像” (NCEI) 或俗称“报复色情”)是指未经影像中人物同意而创建、发布或分享亲密图像或视频的行为或威胁。
What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public.
构成亲密影像的内容因文化背景而异。 这可能包括裸体、各种私人活动,或展示某人未穿着其通常在公共场合穿着的具有宗教或文化意义的服饰。
The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods.
影像可能是由被拍摄者本人创建或经其同意创建的,例如在亲密关系中创建,也可能是未经同意通过使用隐藏摄像头或其他监视手段创建的。
Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked.
同样,获取影像可能经过同意也可能未经同意,或者对持有影像的同意可能已被撤销。
Sharing or distributing the content to others, without the depicted persons consent, is widely regarded as a form of harassment and is illegal in some jurisdictions.
未经被拍摄者同意与他人分享或传播此类内容,被广泛认为是一种骚扰形式,并且在某些司法管辖区属于非法行为。
It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content.
需要注意的是,非自愿亲密影像不同于未经授权分享受版权保护的商业成人内容。

View file

@ -1,9 +1,9 @@
Online Harassment
网络骚扰
Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress.
指针对他人的未经事先请求的重复行为,通常意图恐吓或造成情绪困扰。
Online harassment may occur over many mediums (including email, social media, and other online services).
网络骚扰可能发生在多种媒介上(包括电子邮件、社交媒体和其他在线服务)。
May expand to include real world abuse, or offline activity can transition online.
可能扩展至现实世界的虐待,或者线下活动也可能转移到线上。
Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group.
网络骚扰可能表现为一名施害者持续对一个人或一个群体进行负面接触,或者可能表现为许多不同的个体针对一个人或一个群体。

View file

@ -1 +1 @@
The fraudulent practice of sending emails or other messages purporting to be from reputable sources in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
伪造邮件或其他消息,谎称来自可靠来源,以诱骗个人泄露密码、信用卡号等个人信息的欺诈行为。

View file

@ -1,3 +1,3 @@
Service Abuse
服务滥用
Use of a network, product or service in a way that violates the providers terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service.
指以违反服务提供商的服务条款、社区准则或其他规则的方式使用网络、产品或服务,通常是因为这种使用会对个人或群体造成或增加伤害风险,或倾向于破坏服务的目的、功能或质量。

View file

@ -1 +1 @@
Where a perpetrator threatens to expose sexually compromising information (such as sexually explicit private images or videos of the victim) unless the victim meets certain demands.
行为人威胁要公开受害人的性隐私信息(例如受害人的私密色情图片或视频),除非受害人满足其某些要求。

View file

@ -1,3 +1,3 @@
Sock Puppets
傀儡账号
Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it.
指多个虚假账号,用于制造共识或受欢迎的假象,例如通过点赞或转发内容来放大其影响力。

View file

@ -1,3 +1,3 @@
Spam
骚扰信息
Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media.
指未经事先请求的、低质量的通信内容,通常(但并非总是)为大量的商业推广信息,通过各种电子媒体发送,包括电子邮件、即时消息与社交媒体。

View file

@ -1,11 +1,11 @@
Synthetic Media
合成媒体
Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media.
指通过人工方式生成或操纵的内容,使其看起来像是基于现实,而实际上是虚构的。 也称为被操纵媒体。
Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning)
合成媒体有时(但并非总是)通过算法过程(例如人工智能或机器学习)生成。
A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said.
深度伪造是合成媒体的一种,在该种介质中,图像或录音被更改,以歪曲某人正在做或说他们没有做过或说过的事情。
Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images").
一般而言,合成媒体或操纵媒体(包括“深度伪造”)可能在滥用情境下被用于欺骗或伤害他人,例如使他们看起来像在说他们从未说过的话,或执行他们没有采取过的行动(例如“合成非自愿性剥削影像”)。
Synthetic media may also be used to depict events that have not happened.
合成媒体也有可能用于描绘未发生的事件。

View file

@ -1,9 +1,9 @@
Terrorist and Other Violent Extremist Content (TVEC)
恐怖主义及其它暴力极端主义内容 (TVEC)
Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism.
指由认定自身为或被指定为恐怖主义或暴力组织的团体制作或支持的内容,或宣扬恐怖主义或暴力极端主义行为的内容。
There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions.
目前,国际上对恐怖主义或暴力极端主义尚无普遍认同的定义,且不同司法管辖区对这些术语的定义差异很大。
Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Councils sanctions list.
界定此类别的方法包括基于行为者和基于行为的框架。为了检测和删除此类内容,在线服务提供商可能依赖于主题专家组织(例如联合国安全理事会制裁名单)的研究和恐怖主义或极端主义组织名单。
TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability.
防止 TVEC 内容获得可用性越来越受到立法者和监管机构的关注。

View file

@ -1,5 +1,5 @@
Troll
恶意挑衅
A user who intentionally provokes hostility or confusion online.
指在网络上故意挑起敌意或制造混乱的用户。
Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate.
区分恶意挑衅者或挑衅行为与其他批评可能具有挑战性。 恶意挑衅者也许会提出有效的观点,但通常其目的是为了激怒他人。

View file

@ -1,7 +1,7 @@
Violent Threat
暴力威胁
A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people.
指通过言论或其他交流方式表达对个人或群体造成身体伤害的意图。
Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent.
暴力威胁可以是直接的,例如扬言要杀死或残害他人;也可以是间接的,例如通过比喻、类比或其他修辞手法,使发言者对其含义或意图具有似是而非的否认空间。
Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so
暴力威胁通常与煽动的范围重叠,例如公开声明某人应该受到伤害,或鼓励他人这样做。