Merge pull request #5 from iftas-org/l10n_main2

New Crowdin updates
This commit is contained in:
Jaz-Michael King 2024-10-16 00:52:31 -04:00 committed by GitHub
commit a1c949f672
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
30 changed files with 38 additions and 38 deletions

View file

@ -1,4 +1,4 @@
Acceptable Use Policy Poileasaidh air cleachdadh cothromach
The set of conditions and limitations governing use of a digital service that an end user must agree to as a condition of use. The set of conditions and limitations governing use of a digital service that an end user must agree to as a condition of use.

View file

@ -1,3 +1,3 @@
Account Takeover Goid cunntais
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials.

View file

@ -1,3 +1,3 @@
Astroturfing Feall-iomairt
Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources.

View file

@ -1,4 +1,4 @@
Brigading Foireann
Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board.

View file

@ -1,4 +1,4 @@
Catfishing Fiasgach cait
The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real.

View file

@ -1,4 +1,4 @@
Child Sexual Exploitation/Abuse Material (CSEA/CSAM) Stuth dubh-shaothrachadh/mì-ghnàthachadh feiseil cloinne (CSEA/CSAM)
Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming.

View file

@ -1,3 +1,3 @@
Content- and Conduct-Related Risk Cunnart co-cheangailte ri giùlan agus susbaint
The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service.

View file

@ -1,4 +1,4 @@
Coordinated Inauthentic Behavior Giùlan neo-fhìor co-òrdanaichte
Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout.

View file

@ -1,4 +1,4 @@
Copyright Infringement Briseadh a-steach air còir-lethbhreac
The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation. The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholders permission and without an applicable copyright exception or limitation.

View file

@ -1,4 +1,4 @@
Counterfeit Feall-bhathar
The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic.

View file

@ -1,4 +1,4 @@
Cross-Platform Abuse Mì-ghnàthachadh thar-ùrlarach
Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services.

View file

@ -1,4 +1,4 @@
Defamation Cliù-mhilleadh
A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statements subject (the legal elements and applicable defenses vary by jurisdiction). A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statements subject (the legal elements and applicable defenses vary by jurisdiction).

View file

@ -1,4 +1,4 @@
Dehumanisation Dì-dhaonnachadh
Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases.

View file

@ -1,4 +1,4 @@
Disinformation Droch-fhiosrachadh
False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions.

View file

@ -1,4 +1,4 @@
Farming Àiteachas
Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message.

View file

@ -1,4 +1,4 @@
Glorification of Violence Glòrachadh ainneirt
Statements or images that celebrate past or hypothetical future acts of violence. Statements or images that celebrate past or hypothetical future acts of violence.

View file

@ -1,4 +1,4 @@
Hate Speech Cainnt-ghràin
Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics.

View file

@ -1,4 +1,4 @@
Impersonation Breug-riochd
Online impersonation most often involves the creation of an account profile that uses someone elses name, image, likeness or other characteristics without that persons permission to create a false or misleading impression that the account is controlled by them. Online impersonation most often involves the creation of an account profile that uses someone elses name, image, likeness or other characteristics without that persons permission to create a false or misleading impression that the account is controlled by them.

View file

@ -1,3 +1,3 @@
Incitement Dearg-bhrosnachadh
To encourage violence or violent sentiment against a person or group. To encourage violence or violent sentiment against a person or group.

View file

@ -10,7 +10,7 @@ where it has begun to formalize, mature, and achieve self-awareness.
Important discussions are happening all around the world, in homes, schools, Important discussions are happening all around the world, in homes, schools,
businesses, and at all levels of government, about what Trust and Safety businesses, and at all levels of government, about what Trust and Safety
should look like to best serve societies and their evolving relationships to the should look like to best serve societies and their evolving relationships to the
internet. But meaningful discussion has at times been limited by the lack of a eadar-lìon. But meaningful discussion has at times been limited by the lack of a
shared vocabulary. shared vocabulary.
Over the past year, the Digital Trust & Safety Partnership (DTSP) has been Over the past year, the Digital Trust & Safety Partnership (DTSP) has been
@ -18,10 +18,10 @@ working to develop the first industry glossary of Trust and Safety terms.
Following a public consultation, in which DTSP received valuable input from Following a public consultation, in which DTSP received valuable input from
stakeholders including academic organizations, industry partners, regulators, stakeholders including academic organizations, industry partners, regulators,
and others from around the world, we are releasing the first edition of the and others from around the world, we are releasing the first edition of the
glossary. briathrachan.
Led by DTSP co-founder Alex Feerst, this glossary has the following Led by DTSP co-founder Alex Feerst, this glossary has the following
objectives: amasan:
1. Aid the professionalization of the field and support nascent Trust and 1. Aid the professionalization of the field and support nascent Trust and
Safety teams as they build out their operations; Safety teams as they build out their operations;

View file

@ -1,4 +1,4 @@
Misinformation Mì-fhios
False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons.

View file

@ -1,4 +1,4 @@
Online Harassment Sàrachadh air loidhne
Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress.

View file

@ -1,3 +1,3 @@
Service Abuse Mì-ghnàthachadh seirbheise
Use of a network, product or service in a way that violates the providers terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. Use of a network, product or service in a way that violates the providers terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service.

View file

@ -1,3 +1,3 @@
Sock Puppets Luchd-brèige stocainn
Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it.

View file

@ -1,4 +1,4 @@
Synthetic Media Meadhan fuadain
Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media.

View file

@ -1,4 +1,4 @@
Terrorist and Other Violent Extremist Content (TVEC) Susbaint cheannairceach agus susbaint ainneartach eastramach eile (TVEC)
Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism.

View file

@ -1,4 +1,4 @@
Violent Threat Bagairt ainneartach
A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people.

View file

@ -1,3 +1,3 @@
Account Takeover 계정 탈취
The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. 해킹, 피싱, 유출된 계정 구매 등의 수단으로 허가되지 않은 사용자가 계정의 제어권을 탈취하는 시나리오.

View file

@ -1,9 +1,9 @@
Child Sexual Exploitation/Abuse Material (CSEA/CSAM) 아동 성착취물 (CSEA/CSAM)
Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. 아동 청소년이 성적인 행위를 하고 있거나 그런 것을 묘사하는 영상, 사진. 아동 성 착취 및 학대 (CSEA) 는 아동 성 착취와 그루밍 등 다른 성적인 내용을 둘 다를 포함하는 더 넓은 범주입니다.
"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. "인공 아동 성 착취 및 학대 물"은 실제 미성년자의 등장이 없는 조작된 또는 창작된 아동 청소년을 포함합니다.
Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. 전문가, 생존자 그룹, 그리고 업계에서는 아직도 여러 국가나 조약에서 법적인 용어로 사용되고 있는 "아동 포르노"라는 명칭의 사용을 지양하고 있습니다.
CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. 아동 성착취물은 대부분의 국가에서 불법이므로, 온라인 서비스에서 아동 성착취물 감지와 제거는 중요한 일로 여겨집니다.

View file

@ -1,3 +1,3 @@
Content- and Conduct-Related Risk 콘텐츠와 행동과 관련된 위험
The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. 관련된 정책과 이용 약관에 의해 금지된 인권 침해 위험을 포함한 불법적이거나, 위험하거나, 해로운 콘텐츠나 행동의 발생 가능성.