diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Account Takeover b/dtsp-trust_safety_glossary_of_terms/ar-SA/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Astroturfing b/dtsp-trust_safety_glossary_of_terms/ar-SA/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Brigading b/dtsp-trust_safety_glossary_of_terms/ar-SA/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Catfishing b/dtsp-trust_safety_glossary_of_terms/ar-SA/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/ar-SA/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/ar-SA/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/ar-SA/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/ar-SA/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Counterfeit b/dtsp-trust_safety_glossary_of_terms/ar-SA/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/ar-SA/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Defamation b/dtsp-trust_safety_glossary_of_terms/ar-SA/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/ar-SA/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Disinformation b/dtsp-trust_safety_glossary_of_terms/ar-SA/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Doxxing b/dtsp-trust_safety_glossary_of_terms/ar-SA/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Farming b/dtsp-trust_safety_glossary_of_terms/ar-SA/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/ar-SA/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Hate Speech b/dtsp-trust_safety_glossary_of_terms/ar-SA/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Impersonation b/dtsp-trust_safety_glossary_of_terms/ar-SA/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Incitement b/dtsp-trust_safety_glossary_of_terms/ar-SA/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Introduction b/dtsp-trust_safety_glossary_of_terms/ar-SA/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Misinformation b/dtsp-trust_safety_glossary_of_terms/ar-SA/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/ar-SA/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Online Harassment b/dtsp-trust_safety_glossary_of_terms/ar-SA/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Service Abuse b/dtsp-trust_safety_glossary_of_terms/ar-SA/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/ar-SA/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Spam b/dtsp-trust_safety_glossary_of_terms/ar-SA/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/ar-SA/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/ar-SA/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Troll b/dtsp-trust_safety_glossary_of_terms/ar-SA/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/ar-SA/Violent Threat b/dtsp-trust_safety_glossary_of_terms/ar-SA/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ar-SA/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Account Takeover b/dtsp-trust_safety_glossary_of_terms/bn-BD/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Astroturfing b/dtsp-trust_safety_glossary_of_terms/bn-BD/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Brigading b/dtsp-trust_safety_glossary_of_terms/bn-BD/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Catfishing b/dtsp-trust_safety_glossary_of_terms/bn-BD/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/bn-BD/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/bn-BD/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/bn-BD/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/bn-BD/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Counterfeit b/dtsp-trust_safety_glossary_of_terms/bn-BD/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/bn-BD/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Defamation b/dtsp-trust_safety_glossary_of_terms/bn-BD/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/bn-BD/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Disinformation b/dtsp-trust_safety_glossary_of_terms/bn-BD/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Doxxing b/dtsp-trust_safety_glossary_of_terms/bn-BD/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Farming b/dtsp-trust_safety_glossary_of_terms/bn-BD/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/bn-BD/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Hate Speech b/dtsp-trust_safety_glossary_of_terms/bn-BD/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Impersonation b/dtsp-trust_safety_glossary_of_terms/bn-BD/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Incitement b/dtsp-trust_safety_glossary_of_terms/bn-BD/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Introduction b/dtsp-trust_safety_glossary_of_terms/bn-BD/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Misinformation b/dtsp-trust_safety_glossary_of_terms/bn-BD/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/bn-BD/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Online Harassment b/dtsp-trust_safety_glossary_of_terms/bn-BD/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Service Abuse b/dtsp-trust_safety_glossary_of_terms/bn-BD/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/bn-BD/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Spam b/dtsp-trust_safety_glossary_of_terms/bn-BD/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/bn-BD/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/bn-BD/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Troll b/dtsp-trust_safety_glossary_of_terms/bn-BD/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/bn-BD/Violent Threat b/dtsp-trust_safety_glossary_of_terms/bn-BD/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/bn-BD/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Account Takeover b/dtsp-trust_safety_glossary_of_terms/cy-GB/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Astroturfing b/dtsp-trust_safety_glossary_of_terms/cy-GB/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Brigading b/dtsp-trust_safety_glossary_of_terms/cy-GB/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Catfishing b/dtsp-trust_safety_glossary_of_terms/cy-GB/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/cy-GB/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/cy-GB/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/cy-GB/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/cy-GB/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Counterfeit b/dtsp-trust_safety_glossary_of_terms/cy-GB/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/cy-GB/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Defamation b/dtsp-trust_safety_glossary_of_terms/cy-GB/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/cy-GB/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Disinformation b/dtsp-trust_safety_glossary_of_terms/cy-GB/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Doxxing b/dtsp-trust_safety_glossary_of_terms/cy-GB/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Farming b/dtsp-trust_safety_glossary_of_terms/cy-GB/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/cy-GB/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Hate Speech b/dtsp-trust_safety_glossary_of_terms/cy-GB/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Impersonation b/dtsp-trust_safety_glossary_of_terms/cy-GB/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Incitement b/dtsp-trust_safety_glossary_of_terms/cy-GB/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Introduction b/dtsp-trust_safety_glossary_of_terms/cy-GB/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Misinformation b/dtsp-trust_safety_glossary_of_terms/cy-GB/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/cy-GB/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Online Harassment b/dtsp-trust_safety_glossary_of_terms/cy-GB/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Service Abuse b/dtsp-trust_safety_glossary_of_terms/cy-GB/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/cy-GB/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Spam b/dtsp-trust_safety_glossary_of_terms/cy-GB/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/cy-GB/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/cy-GB/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Troll b/dtsp-trust_safety_glossary_of_terms/cy-GB/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/cy-GB/Violent Threat b/dtsp-trust_safety_glossary_of_terms/cy-GB/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/cy-GB/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Account Takeover b/dtsp-trust_safety_glossary_of_terms/de-DE/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Astroturfing b/dtsp-trust_safety_glossary_of_terms/de-DE/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Brigading b/dtsp-trust_safety_glossary_of_terms/de-DE/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Catfishing b/dtsp-trust_safety_glossary_of_terms/de-DE/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/de-DE/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/de-DE/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/de-DE/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/de-DE/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Counterfeit b/dtsp-trust_safety_glossary_of_terms/de-DE/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/de-DE/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Defamation b/dtsp-trust_safety_glossary_of_terms/de-DE/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/de-DE/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Disinformation b/dtsp-trust_safety_glossary_of_terms/de-DE/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Doxxing b/dtsp-trust_safety_glossary_of_terms/de-DE/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Farming b/dtsp-trust_safety_glossary_of_terms/de-DE/Farming new file mode 100644 index 0000000..6d28f70 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Farming @@ -0,0 +1,7 @@ +Farming + +Beim Content-Farming werden Online-Inhalte ausschließlich oder hauptsächlich zu dem Zweck erstellt, Seitenaufrufe anzuziehen und die Werbeeinnahmen zu steigern, und nicht aus dem Wunsch heraus, eine bestimmte Botschaft auszudrücken oder zu kommunizieren. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/de-DE/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Hate Speech b/dtsp-trust_safety_glossary_of_terms/de-DE/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Impersonation b/dtsp-trust_safety_glossary_of_terms/de-DE/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Incitement b/dtsp-trust_safety_glossary_of_terms/de-DE/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Introduction b/dtsp-trust_safety_glossary_of_terms/de-DE/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Misinformation b/dtsp-trust_safety_glossary_of_terms/de-DE/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/de-DE/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Online Harassment b/dtsp-trust_safety_glossary_of_terms/de-DE/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Service Abuse b/dtsp-trust_safety_glossary_of_terms/de-DE/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/de-DE/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Spam b/dtsp-trust_safety_glossary_of_terms/de-DE/Spam new file mode 100644 index 0000000..7be76df --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Spam @@ -0,0 +1,3 @@ +Spam + +Unaufgeforderte, minderwertige Mitteilungen, oft (aber nicht notwendigerweise) großvolumige kommerzielle Anfragen, die über eine Reihe von elektronischen Medien gesendet werden, einschließlich E-Mail, Messaging und soziale Medien. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/de-DE/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/de-DE/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Troll b/dtsp-trust_safety_glossary_of_terms/de-DE/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/de-DE/Violent Threat b/dtsp-trust_safety_glossary_of_terms/de-DE/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/de-DE/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Account Takeover b/dtsp-trust_safety_glossary_of_terms/es-ES/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Astroturfing b/dtsp-trust_safety_glossary_of_terms/es-ES/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Brigading b/dtsp-trust_safety_glossary_of_terms/es-ES/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Catfishing b/dtsp-trust_safety_glossary_of_terms/es-ES/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/es-ES/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/es-ES/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/es-ES/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/es-ES/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Counterfeit b/dtsp-trust_safety_glossary_of_terms/es-ES/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/es-ES/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Defamation b/dtsp-trust_safety_glossary_of_terms/es-ES/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/es-ES/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Disinformation b/dtsp-trust_safety_glossary_of_terms/es-ES/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Doxxing b/dtsp-trust_safety_glossary_of_terms/es-ES/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Farming b/dtsp-trust_safety_glossary_of_terms/es-ES/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/es-ES/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Hate Speech b/dtsp-trust_safety_glossary_of_terms/es-ES/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Impersonation b/dtsp-trust_safety_glossary_of_terms/es-ES/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Incitement b/dtsp-trust_safety_glossary_of_terms/es-ES/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Introduction b/dtsp-trust_safety_glossary_of_terms/es-ES/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Misinformation b/dtsp-trust_safety_glossary_of_terms/es-ES/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/es-ES/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Online Harassment b/dtsp-trust_safety_glossary_of_terms/es-ES/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Service Abuse b/dtsp-trust_safety_glossary_of_terms/es-ES/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/es-ES/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Spam b/dtsp-trust_safety_glossary_of_terms/es-ES/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/es-ES/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/es-ES/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Troll b/dtsp-trust_safety_glossary_of_terms/es-ES/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/es-ES/Violent Threat b/dtsp-trust_safety_glossary_of_terms/es-ES/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/es-ES/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Account Takeover b/dtsp-trust_safety_glossary_of_terms/fr-FR/Account Takeover new file mode 100644 index 0000000..7e2e3bb --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Account Takeover @@ -0,0 +1,3 @@ +Reprise de Compte + +Scénario dans lequel une personne non autorisée prend le contrôle d'un compte d'utilisateur, par des moyens tels que le piratage, l'hameçonnage ou l'achat de données d'identification fuitées. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Astroturfing b/dtsp-trust_safety_glossary_of_terms/fr-FR/Astroturfing new file mode 100644 index 0000000..e1b5620 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing (contrefaçon d'opinion) + +Activité organisée visant à créer l'apparence trompeuse d'un soutien ou d'une opposition populaire à une cause ou à une organisation donnée, alors qu'en réalité l'activité est motivée, financée ou coordonnée par une seule ou un petit nombre de sources occultes. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Brigading b/dtsp-trust_safety_glossary_of_terms/fr-FR/Brigading new file mode 100644 index 0000000..01d24b6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Brigading @@ -0,0 +1,5 @@ +Action collective coordonnée + +Activité en ligne de masse coordonnée, souvent planifiée à l'avance, visant à affecter un contenu, un compte, une communauté entière ou un forum de discussion. + +Il peut s'agir par exemple de coordonner le vote à la hausse ou à la baisse d'un message pour en modifier la diffusion, de signaler en masse un compte (généralement à tort) afin d'inciter le fournisseur de services à le suspendre, ou encore d'inonder une entreprise de bonnes ou de mauvaises critiques. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Catfishing b/dtsp-trust_safety_glossary_of_terms/fr-FR/Catfishing new file mode 100644 index 0000000..c83d258 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +Le scénario dans lequel quelqu'un crée une fausse identité en ligne, comme un réseau social ou une application de rencontres, et établit une relation avec quelqu'un qui croit que le personnage est réel. + +Ce comportement est souvent associé à la fraude financière (« Pig Butchering ») et à d'autres formes d'exploitation de la victime. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/fr-FR/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..f74f658 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Contenu pédopornographique (CSAM/CSEA) + +Le CSAM (« Child Sexual Abuse Material ») est du contenu (images ou vidéos) qui montre une personne mineure impliquée ou décrite comme engagée dans une activité sexuelle explicite. Le CSEA ( «Child Sexual Exploitation and Abuse » ) est une catégorie plus large qui englobe le CSAM, tout contenu pédopornographique, et inclut le grooming (séduction malintentionnée des enfants). + +Le terme « Imagerie simulée d'exploitation sexuelle et abus de mineurs » (Simulated Child Sexual Exploitation and Abuse Imagery) recouvre toute représentation de mineur, fictive ou modifiée, à caractère pornographique, sans la participation directe d'un mineur. + +Les experts, les groupes de survivants et les professionnels découragent l'utilisation des termes « pornographie juvénile » ou « pornographie infantile », encore utilisés dans de multiples juridictions et traités internationaux. + +Le CSAM est illégal dans presque toutes les juridictions, ce qui fait de sa détection et de sa suppression une priorité élevée pour les services en ligne. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/fr-FR/Content- and Conduct-Related Risk new file mode 100644 index 0000000..49a1497 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Risques liés au contenu et/ou au comportement en ligne + +C'est la possibilité que certains contenus ou comportements en ligne soient illégaux, dangereux ou préjudiciables par ailleurs, y compris aux droits de la personne, et sont par conséquent interdits par les politiques et conditions d'utilisation du service en ligne. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/fr-FR/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..8d4cf16 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Action coordonnée non spontanée + +Activité en ligne organisée où un compte ou un ensemble de comptes, y compris des faux comptes secondaires (créés uniquement ou principalement pour de telles interactions), agissent pour induire en erreur ou pour augmenter frauduleusement la popularité ou la visibilité d'un contenu ou d'un compte, par exemple en suivant un compte en masse pour augmenter son influence. + +Dans certains cas, c'est une source ou organisation unique occulte qui déploie de nombreux faux comptes afin de créer l'illusion d'une activité authentique et crédible. + +Dans d'autres cas, ce sont des personnes utilisant leur propre compte qui se coordonnent en ligne avec l'objectif de créer une apparence trompeuse, comme par exemple qu'une opinion ou une croyance est plus répandue qu'elle ne l'est en réalité, ou pour répandre largement un élément ou un type de contenu particulier. + +Ces actions sont parfois appelées « manipulation de contenu » ou « manipulation de la plateforme ». diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/fr-FR/Copyright Infringement new file mode 100644 index 0000000..a1b87bc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Copyright Infringement @@ -0,0 +1,9 @@ +Violation du droit d'auteur + +Il s'agit de l'utilisation de matériel protégé par la loi sur le droit d’auteur (tel que du texte, une image ou une vidéo) d’une manière qui viole les droits du titulaire du droit d’auteur, sans son autorisation, et sans que ne s'applique une exception ou une limitation au droit d’auteur. + +Cela peut inclure la création de copies, la distribution, l'affichage ou l'exécution publique d'une œuvre couverte, ou la création non autorisée d'œuvres dérivées. + +La violation peut impliquer une responsabilité principale (pour la personne qui a commis le comportement incriminé) ou une responsabilité secondaire pour d'autres personnes impliquées dans ce comportement (comme une société d'hébergement dont le service héberge des images publiées par un utilisateur). + +Aux États-Unis, les services d'hébergement de contenus numériques générés par les utilisateurs sont exemptés de responsabilité en matière de droits d'auteur, en vertu de l'article 512 de la loi sur les droits d'auteur, à condition qu'ils se conforment aux procédures applicables de notification et de retrait énoncées dans cette loi. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Counterfeit b/dtsp-trust_safety_glossary_of_terms/fr-FR/Counterfeit new file mode 100644 index 0000000..a84f1c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Counterfeit @@ -0,0 +1,5 @@ +Contrefaçon + +La fabrication ou la vente non autorisée de marchandises ou de services imitant une marque commerciale, ce qui crée une confusion chez le consommateur. + +La fabrication ou la vente de produits de contrefaçon est une infraction au droit à la propriété intellectuelle, et le risque de voir leur responsabilité engagée est un souci pour les sites marchands en ligne. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/fr-FR/Cross-Platform Abuse new file mode 100644 index 0000000..083e15a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Contenu Abusif Multiplateforme + +C'est quand une ou plusieurs personnes mal intentionnées déploient une campagne abusive (telle que du harcèlement, du trolling ou de la désinformation) sur de multiples services en ligne. + +Cela a pour effet de rendre la suppression du contenu abusif plus difficile et plus longue pour les personnes concernées, car elles devront se communiquer avec chaque service séparément et leur expliquer la situation. + +Parfois, c'est le même contenu qui est posté sur plusieurs plateformes. Dans d'autres cas, les agresseurs répartissent le contenu ou le comportement abusif sur différentes plateformes, de telle sorte qu'aucun site en particulier ne possède l'intégralité de l'abus. Par conséquent, si un service limite son enquête uniquement au contenu ou à la conduite sur son site, comme il lui manque le contexte global de la campagne abusive, il pourrait conclure qu'aucune violation n'a eu lieu. + +Généralement, une telle situation nécessite une recherche sur plusieurs services, une intégration multiplateforme de données et une enquête sur le contexte des agresseurs et des personnes affectées, si l'on veut évaluer correctement la situation et réagir de manière appropriée. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Defamation b/dtsp-trust_safety_glossary_of_terms/fr-FR/Defamation new file mode 100644 index 0000000..9552214 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Defamation @@ -0,0 +1,11 @@ +Diffamation + +La diffamation est un abus réprimé par le Droit. Il s'agit d'une affirmation publique à propos d'une personne, qui nuit à sa réputation (les régimes juridiques et les modes de défense varient selon les juridictions). + +La diffamation peut être commise par divers médias, y compris visuellement, oralement, par des images ou par du texte. + +Aux États-Unis, selon la jurisprudence du Premier amendement, c'est à la personne qui prétend avoir été diffamée qu'incombe la charge de la preuve. + +Dans d'autres juridictions, telles que l'Europe, c'est à la personne accusée de prouver qu'elle n'a pas commis de diffamation. + +Ces différences d'approches juridiques et de niveaux de risque juridique qui en découlent peuvent influer sur les processus d'élimination de contenu dans les litiges pour diffamation adoptés par les services en ligne de différents pays. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/fr-FR/Dehumanisation new file mode 100644 index 0000000..05f1def --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Dehumanisation @@ -0,0 +1,5 @@ +Déshumanisation + +Décrire des personnes de manière à nier ou à diminuer leur humanité, par exemple comparer un groupe donné à des insectes, à des animaux ou à des maladies. + +Certains experts dans ce domaine considèrent le discours déshumanisant comme un précurseur possible à la violence (parfois au point de génocide), parce qu'il peut faire paraître appropriée ou justifiée une action violente contre des cibles « non humaines » ou « moins humaines ». diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Disinformation b/dtsp-trust_safety_glossary_of_terms/fr-FR/Disinformation new file mode 100644 index 0000000..036218b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Disinformation @@ -0,0 +1,5 @@ +Désinformation + +C'est la diffusion délibérée et mal-intentionnée de fausses informations, dans le but de créer de la confusion, d'engendrer de la méfiance et potentiellement de saper les institutions politiques et sociales. + +Les chercheurs distinguent une autre catégorie d'information trompeuse, l'information malveillante. Elle est basée sur la réalité mais le contexte dans lequel elle est présentée est modifié, afin de nuire à une personne, à une organisation ou à un pays. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Doxxing b/dtsp-trust_safety_glossary_of_terms/fr-FR/Doxxing new file mode 100644 index 0000000..33b5dea --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Doxxing @@ -0,0 +1,7 @@ +Doxing + +L'acte de divulguer les informations privées d'une personne — comme son vrai nom, son adresse, son numéro de téléphone ou toute autre donnée qui pourrait permettre de l'identifier — dans un forum en ligne ou tout autre espace public, sans le consentement de la personne. + +Le doxing peut mener à des menaces réelles contre la personne dont les informations ont été diffusées, et pour cette raison, il est souvent considéré comme une forme de cyberharcèlement. + +Certains services en ligne peuvent considérer que l'agrégation et la divulgation d'informations publiques sur une personne, dans un contexte menaçant, sont suffisants pour pouvoir être qualifiés de doxing. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Farming b/dtsp-trust_safety_glossary_of_terms/fr-FR/Farming new file mode 100644 index 0000000..de0aca0 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Farming @@ -0,0 +1,7 @@ +Fermes de Contenus + +Les fermes de contenus sont des sites créés dans le but principal et parfois unique d'attirer des vues et de générer des revenus publicitaires, plutôt que par désir de diffuser un contenu en particulier. + +Ces fermes de contenu créent souvent leur contenu selon les requêtes de recherche les plus populaires (une pratique connue sous le nom d'« optimisation des moteurs de recherche ») afin de se classer plus haut dans les résultats des moteurs de recherche. Le contenu de ces sites est généralement de faible qualité, voire du spam, mais peut toutefois être rentable en raison de l'utilisation stratégique de certains mots clés pour manipuler les algorithmes des moteurs de recherche et conduire les utilisateurs à naviguer sur une page, permettant ainsi de « récolter des clics » pour les revenus publicitaires. + +Les fermes de contenus commencent généralement par créer des comptes sur des services en ligne, comptes qu'elles utilisent initialement de manière apparemment inoffensive afin de se construire une base d'abonnés, de laisser vieillir le compte, et de créer un historique, tout cela afin que le compte paraisse authentique et crédible, avant de l'utiliser pour poster du spam, de la désinformation ou tout autre contenu abusif, ou bien de le vendre à ceux qui vont l'exploiter à ces fins. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/fr-FR/Glorification of Violence new file mode 100644 index 0000000..e14c948 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification de la violence + +Il s'agit de déclarations ou d'images qui célèbrent des actes de violence, du passé ou à venir. + +Certains services en ligne restreignent ou interdisent la glorification de la violence (y compris le terrorisme) car ils considèrent qu'elle peut inciter à de futurs actes de violence ou à les intensifier, et qu'elle favorise un environnement en ligne menaçant ou dangereux. Mais il peut être difficile de déterminer ce qui constitue de la glorification dans la discussion d'un thème en particulier. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Hate Speech b/dtsp-trust_safety_glossary_of_terms/fr-FR/Hate Speech new file mode 100644 index 0000000..739cad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Hate Speech @@ -0,0 +1,5 @@ +Discours de haine + +Contenu ou comportement abusif, haineux ou menaçant qui exprime un préjugé à l'égard d'une personne ou d'un groupe en raison de leur appartenance à un groupe, qui se fonde sur des caractéristiques juridiquement protégées, telles que la religion, l'origine ethnique, la nationalité, la race, le genre, l'orientation sexuelle ou autres. + +Il n'existe pas de définition juridique internationale du discours de haine. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Impersonation b/dtsp-trust_safety_glossary_of_terms/fr-FR/Impersonation new file mode 100644 index 0000000..71c5b84 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Impersonation @@ -0,0 +1,5 @@ +Usurpation d'identité + +L’usurpation d’identité en ligne désigne généralement la création d’un faux profil qui utilise le nom, l’image, la ressemblance ou autres caractéristiques d'une autre personne sans son autorisation, afin de créer l'impression fausse ou trompeuse que le compte est contrôlé par elle. + +Aussi connu sous le nom de « compte imposteur ». diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Incitement b/dtsp-trust_safety_glossary_of_terms/fr-FR/Incitement new file mode 100644 index 0000000..4c52dd1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Incitement @@ -0,0 +1,3 @@ +Incitation à la violence + +Cela consiste à pousser à la violence ou à la haine à l'égard d'une personne ou d'un groupe. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Introduction b/dtsp-trust_safety_glossary_of_terms/fr-FR/Introduction new file mode 100644 index 0000000..109cad2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Introduction @@ -0,0 +1,13 @@ +# Introduction +Au fur et à mesure que le domaine « Confiance et Sécurité » gagne en importance, en complexité, et en nombre d'affiliés — il devient de plus en plus important de s'assurer qu'il existe une compréhension commune des termes clés utilisés par les personnes qui veillent à la sécurité des utilisateurs des services numériques. + +Les entreprises ont depuis longtemps recours à une combinaison de personnes, de procédés et de technologies pour traiter les risques liés aux contenus et aux comportements en ligne. Mais ce domaine, à l'instar d'autres spécialisations technologiques telles que la cybersécurité et la protection de la vie privée, atteint maintenant un point critique où il commence à se formaliser, à mûrir et à prendre conscience de lui-même. Des discussions importantes ont lieu partout dans le monde, dans les foyers, les centres éducatifs, les entreprises et à tous les niveaux de gouvernement, sur ce à quoi devrait ressembler les services de « Confiance et Sécurité » pour servir au mieux différentes sociétés et leur relation, en constante évolution, avec Internet. Mais le manque d'un lexique commun a parfois limité les discussions significatives. + +Au cours de l'année écoulée, le Digital Trust & Safety Partnership (DTSP) a travaillé à rédiger le premier glossaire professionnel de la Modération en Ligne. Après une consultation publique, durant laquelle le DTSP a reçu de précieuses contributions de la part de différentes parties prenantes, dont des organisations universitaires, des partenaires de cette branche, des régulateurs et d'autres organismes du monde entier, nous publions la première édition de ce glossaire. +Dirigé par Alex Feerst, co-fondateur de DTSP (Digital Trust & Safety Partnership), ce glossaire a les objectifs suivants : + +1. Contribuer à professionnaliser ce domaine et soutenir les équipes néophytes de Modération en Ligne lors de la structuration de leurs opérations, +2. Encourager l'adoption d'interprétations communes pour des termes essentiels dans ce domaine, +3. Faciliter un dialogue éclairé entre les professionnels de la Modération en Ligne, les décideurs, les législateurs et le grand public. + +Le but de cette première édition a été de décrire comment des termes clés sont utilisés par les gens qui travaillent dans ce domaine. Ce ne sont pas des définitions légales, et leur publication n'implique pas que chaque société partenaire du DTSP soit entièrement d'accord avec chaque terme tel que défini ici. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Misinformation b/dtsp-trust_safety_glossary_of_terms/fr-FR/Misinformation new file mode 100644 index 0000000..c69eb03 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Misinformation @@ -0,0 +1,5 @@ +Mésinformation + +Il s'agit d'informations fausses diffusées de bonne foi et généralement sans intention malveillante, mais qui peuvent néanmoins induire en erreur, voire causer du tort. + +La malinformation est une autre catégorie de manipulation de l'information identifiée par les chercheurs ; ce sont de vraies informations mais divulguées dans le but de nuire à une personne, à une organisation ou à un pays, en en modifiant le contexte. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/fr-FR/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Online Harassment b/dtsp-trust_safety_glossary_of_terms/fr-FR/Online Harassment new file mode 100644 index 0000000..23a5668 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Online Harassment @@ -0,0 +1,9 @@ +Cyberharcèlement + +Ce sont des messages répétés non sollicités envoyés à une personne, généralement dans l'intention de l'intimider ou de provoquer de la détresse émotionnelle. + +Le cyberharcèlement peut se produire sur de nombreux supports (y compris les courriels, les réseaux sociaux et autres services en ligne). + +Il peut s'étendre jusqu'à inclure du harcèlement dans le monde réel, ou à l'inverse, l'activité hors ligne peut passer en ligne. + +Le cyberharcèlement peut être commis par un seul agresseur contre une personne ou contre un groupe, avec qui il soutient un contact malveillant, ou bien il peut prendre la forme de plusieurs personnes distinctes ciblant un individu ou un groupe. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Service Abuse b/dtsp-trust_safety_glossary_of_terms/fr-FR/Service Abuse new file mode 100644 index 0000000..29c4599 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Service Abuse @@ -0,0 +1,3 @@ +Abus de service + +Utilisation d'un réseau, d'un produit ou d'un service en violation des conditions générales d'utilisation du fournisseur, des lignes directrices de la communauté ou d'autres règles. L'utilisation est qualifiée comme abusive généralement parce qu'elle crée ou augmente le risque de préjudice à autrui ou tend à miner le but, ou la qualité du service. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/fr-FR/Sock Puppets new file mode 100644 index 0000000..f723e59 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Sock Puppets @@ -0,0 +1,3 @@ +Faux comptes + +De multiples comptes factices (« sock puppets ») utilisés pour créer une illusion de consensus ou de popularité, par exemple en likant ou en repostant des contenus afin de les amplifier. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Spam b/dtsp-trust_safety_glossary_of_terms/fr-FR/Spam new file mode 100644 index 0000000..2d6c08d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Spam @@ -0,0 +1,3 @@ +Spam + +Ce sont des messages non sollicités et de basse qualité, souvent (mais pas nécessairement) envoyés massivement à des fins publicitaires par le biais de divers médias électroniques, y compris le courriel, la messagerie et les réseaux sociaux. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/fr-FR/Synthetic Media new file mode 100644 index 0000000..d0b7d32 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Synthetic Media @@ -0,0 +1,11 @@ +Médias synthétiques + +Il s'agit de contenu qui a été généré ou manipulé pour apparaître authentique, alors qu'il est en fait artificiel. On parle aussi de médias manipulés. + +Les médias synthétiques sont parfois (mais pas toujours) générés par des processus algorithmiques (comme l'intelligence artificielle générative ou l'apprentissage automatique). + +Un deepfake est une forme de média synthétique où l'image ou l'enregistrement d'une personne est altéré pour le représenter faisant ou disant quelque chose qui n'a pas été fait ou dit en réalité. + +Les médias synthétiques ou manipulés (y compris les deepfakes) peuvent être utilisés à des fins malveillantes, pour tromper ou pour nuire à certaines personnes, en leur faisant dire des choses qu'elles n'ont jamais dites, ou effectuer des actions qu'elles n'ont pas commises (comme dans le cas de "Synthetic Non-Consensual Exploitative Images", hypertrucages non-consensuels). + +Les médias synthétiques peuvent également être utilisés pour décrire des événements qui ne se sont pas produits. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/fr-FR/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..02c719c --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Contenus à caractère terroriste ou propagande extrémiste et violente + +C'est du contenu qui soutient ou qui est produit par des groupes qui s'identifient comme terroristes ou violents, ou qui ont été désignés comme tels, ainsi que du contenu qui promeut des actes de terrorisme ou d'extrémisme violent. + +Il n'existe pas de définition internationale du terrorisme ou de l'extrémisme violent, et les définitions de ces termes varient considérablement d'un pays à l'autre. + +Les approches pour définir cette catégorie incluent des cadres acteur-comportement, et afin de détecter et de supprimer ce contenu, les services en ligne peuvent s'appuyer sur des recherches et des listes d'organisations terroristes ou extrémistes créées par des organismes spécialisés en la matière, comme la liste des entités sanctionnées du Conseil de sécurité des Nations Unies. + +Les contenus à caractère terroriste sont de plus en plus au centre des préoccupations des législateurs et des organismes de réglementation, soucieux d'empêcher leur diffusion. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Troll b/dtsp-trust_safety_glossary_of_terms/fr-FR/Troll new file mode 100644 index 0000000..f35796c --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Troll @@ -0,0 +1,5 @@ +Troll + +Un troll est un utilisateur qui publie des propos provocants ou qui sèment la confusion. + +Il n'est pas toujours aisé de distinguer un comportement de troll d'une critique légitime. Un troll peut faire des remarques pertinentes, mais généralement il le fait dans l'intention d'agacer. diff --git a/dtsp-trust_safety_glossary_of_terms/fr-FR/Violent Threat b/dtsp-trust_safety_glossary_of_terms/fr-FR/Violent Threat new file mode 100644 index 0000000..6c3137a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/fr-FR/Violent Threat @@ -0,0 +1,7 @@ +Menace physique + +Une déclaration ou toute autre communication qui exprime l'intention d'infliger des dommages physiques à une personne ou à un groupe de personnes. + +Les menaces peuvent être directes, telles que des menaces de mort ou de mutilation ; elles peuvent aussi être sous-entendues, par une métaphore, une analogie ou toute autre rhétorique qui permet à son auteur de nier le sens ou l'intention véritable. + +Le message de menace se recoupe parfois avec l'incitation à la violence, quand par exemple un message public affirme qu'une personne mérite d'être blessée, ou encourage les autres à cela. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Account Takeover b/dtsp-trust_safety_glossary_of_terms/gd-GB/Account Takeover new file mode 100644 index 0000000..46f5d00 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Account Takeover @@ -0,0 +1,3 @@ +Goid cunntais + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Astroturfing b/dtsp-trust_safety_glossary_of_terms/gd-GB/Astroturfing new file mode 100644 index 0000000..370fcc3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Astroturfing @@ -0,0 +1,3 @@ +Feall-iomairt + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Brigading b/dtsp-trust_safety_glossary_of_terms/gd-GB/Brigading new file mode 100644 index 0000000..23cf932 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Brigading @@ -0,0 +1,5 @@ +Foireann + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Catfishing b/dtsp-trust_safety_glossary_of_terms/gd-GB/Catfishing new file mode 100644 index 0000000..38b5b03 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Catfishing @@ -0,0 +1,5 @@ +Fiasgach cait + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/gd-GB/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..cfd6898 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Stuth dubh-shaothrachadh/mì-ghnàthachadh feiseil cloinne (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/gd-GB/Content- and Conduct-Related Risk new file mode 100644 index 0000000..e8cd91a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Cunnart co-cheangailte ri giùlan agus susbaint + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/gd-GB/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..5f868af --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Giùlan neo-fhìor co-òrdanaichte + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/gd-GB/Copyright Infringement new file mode 100644 index 0000000..bc26e91 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Copyright Infringement @@ -0,0 +1,9 @@ +Briseadh a-steach air còir-lethbhreac + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Counterfeit b/dtsp-trust_safety_glossary_of_terms/gd-GB/Counterfeit new file mode 100644 index 0000000..749df48 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Counterfeit @@ -0,0 +1,5 @@ +Feall-bhathar + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/gd-GB/Cross-Platform Abuse new file mode 100644 index 0000000..38ee2e2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Mì-ghnàthachadh thar-ùrlarach + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Defamation b/dtsp-trust_safety_glossary_of_terms/gd-GB/Defamation new file mode 100644 index 0000000..c80acfc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Defamation @@ -0,0 +1,11 @@ +Cliù-mhilleadh + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/gd-GB/Dehumanisation new file mode 100644 index 0000000..4611bb4 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Dehumanisation @@ -0,0 +1,5 @@ +Dì-dhaonnachadh + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Disinformation b/dtsp-trust_safety_glossary_of_terms/gd-GB/Disinformation new file mode 100644 index 0000000..b5a7096 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Disinformation @@ -0,0 +1,5 @@ +Droch-fhiosrachadh + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Doxxing b/dtsp-trust_safety_glossary_of_terms/gd-GB/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Farming b/dtsp-trust_safety_glossary_of_terms/gd-GB/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/gd-GB/Glorification of Violence new file mode 100644 index 0000000..5fe3aba --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Glorification of Violence @@ -0,0 +1,5 @@ +Glòrachadh ainneirt + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Hate Speech b/dtsp-trust_safety_glossary_of_terms/gd-GB/Hate Speech new file mode 100644 index 0000000..294a597 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Hate Speech @@ -0,0 +1,5 @@ +Cainnt-ghràin + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Impersonation b/dtsp-trust_safety_glossary_of_terms/gd-GB/Impersonation new file mode 100644 index 0000000..5b637c6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Impersonation @@ -0,0 +1,5 @@ +Breug-riochd + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Incitement b/dtsp-trust_safety_glossary_of_terms/gd-GB/Incitement new file mode 100644 index 0000000..e14d18b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Incitement @@ -0,0 +1,3 @@ +Dearg-bhrosnachadh + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Introduction b/dtsp-trust_safety_glossary_of_terms/gd-GB/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Misinformation b/dtsp-trust_safety_glossary_of_terms/gd-GB/Misinformation new file mode 100644 index 0000000..9bb4c86 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Misinformation @@ -0,0 +1,5 @@ +Mì-fhios + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/gd-GB/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Online Harassment b/dtsp-trust_safety_glossary_of_terms/gd-GB/Online Harassment new file mode 100644 index 0000000..05b46fb --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Online Harassment @@ -0,0 +1,9 @@ +Sàrachadh air loidhne + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Service Abuse b/dtsp-trust_safety_glossary_of_terms/gd-GB/Service Abuse new file mode 100644 index 0000000..3a849b8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Service Abuse @@ -0,0 +1,3 @@ +Mì-ghnàthachadh seirbheise + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/gd-GB/Sock Puppets new file mode 100644 index 0000000..c309c56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Sock Puppets @@ -0,0 +1,3 @@ +Luchd-brèige stocainn + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Spam b/dtsp-trust_safety_glossary_of_terms/gd-GB/Spam new file mode 100644 index 0000000..9395772 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Spam @@ -0,0 +1,3 @@ +Spama + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/gd-GB/Synthetic Media new file mode 100644 index 0000000..78c69fc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Synthetic Media @@ -0,0 +1,11 @@ +Meadhan fuadain + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/gd-GB/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..a407774 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Susbaint cheannairceach agus susbaint ainneartach eastramach eile (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Troll b/dtsp-trust_safety_glossary_of_terms/gd-GB/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/gd-GB/Violent Threat b/dtsp-trust_safety_glossary_of_terms/gd-GB/Violent Threat new file mode 100644 index 0000000..45a066b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/gd-GB/Violent Threat @@ -0,0 +1,7 @@ +Bagairt ainneartach + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Account Takeover b/dtsp-trust_safety_glossary_of_terms/hi-IN/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Astroturfing b/dtsp-trust_safety_glossary_of_terms/hi-IN/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Brigading b/dtsp-trust_safety_glossary_of_terms/hi-IN/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Catfishing b/dtsp-trust_safety_glossary_of_terms/hi-IN/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/hi-IN/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/hi-IN/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/hi-IN/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/hi-IN/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Counterfeit b/dtsp-trust_safety_glossary_of_terms/hi-IN/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/hi-IN/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Defamation b/dtsp-trust_safety_glossary_of_terms/hi-IN/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/hi-IN/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Disinformation b/dtsp-trust_safety_glossary_of_terms/hi-IN/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Doxxing b/dtsp-trust_safety_glossary_of_terms/hi-IN/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Farming b/dtsp-trust_safety_glossary_of_terms/hi-IN/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/hi-IN/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Hate Speech b/dtsp-trust_safety_glossary_of_terms/hi-IN/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Impersonation b/dtsp-trust_safety_glossary_of_terms/hi-IN/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Incitement b/dtsp-trust_safety_glossary_of_terms/hi-IN/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Introduction b/dtsp-trust_safety_glossary_of_terms/hi-IN/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Misinformation b/dtsp-trust_safety_glossary_of_terms/hi-IN/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/hi-IN/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Online Harassment b/dtsp-trust_safety_glossary_of_terms/hi-IN/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Service Abuse b/dtsp-trust_safety_glossary_of_terms/hi-IN/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/hi-IN/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Spam b/dtsp-trust_safety_glossary_of_terms/hi-IN/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/hi-IN/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/hi-IN/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Troll b/dtsp-trust_safety_glossary_of_terms/hi-IN/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/hi-IN/Violent Threat b/dtsp-trust_safety_glossary_of_terms/hi-IN/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/hi-IN/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Account Takeover b/dtsp-trust_safety_glossary_of_terms/it-IT/Account Takeover new file mode 100644 index 0000000..faedfa2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Account Takeover @@ -0,0 +1,3 @@ +Acquisizione account + +Lo scenario in cui un utente non autorizzato ottiene il controllo di un account utente, attraverso mezzi come hackeraggio, furto dati o acquisto di credenziali trapelate. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Astroturfing b/dtsp-trust_safety_glossary_of_terms/it-IT/Astroturfing new file mode 100644 index 0000000..9cde77e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Astroturfing @@ -0,0 +1,3 @@ +Raggiro + +Attività organizzata destinata a creare l'aspetto ingannevole di sostegno di base ampio e autentico o opposizione a una determinata causa o organizzazione, quando in realtà l'attività è motivata, finanziata o coordinata da un numero limitato di sorgenti oscurate. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Brigading b/dtsp-trust_safety_glossary_of_terms/it-IT/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Catfishing b/dtsp-trust_safety_glossary_of_terms/it-IT/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/it-IT/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/it-IT/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/it-IT/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/it-IT/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Counterfeit b/dtsp-trust_safety_glossary_of_terms/it-IT/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/it-IT/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Defamation b/dtsp-trust_safety_glossary_of_terms/it-IT/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/it-IT/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Disinformation b/dtsp-trust_safety_glossary_of_terms/it-IT/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Doxxing b/dtsp-trust_safety_glossary_of_terms/it-IT/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Farming b/dtsp-trust_safety_glossary_of_terms/it-IT/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/it-IT/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Hate Speech b/dtsp-trust_safety_glossary_of_terms/it-IT/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Impersonation b/dtsp-trust_safety_glossary_of_terms/it-IT/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Incitement b/dtsp-trust_safety_glossary_of_terms/it-IT/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Introduction b/dtsp-trust_safety_glossary_of_terms/it-IT/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Misinformation b/dtsp-trust_safety_glossary_of_terms/it-IT/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/it-IT/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Online Harassment b/dtsp-trust_safety_glossary_of_terms/it-IT/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Service Abuse b/dtsp-trust_safety_glossary_of_terms/it-IT/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/it-IT/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Spam b/dtsp-trust_safety_glossary_of_terms/it-IT/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/it-IT/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/it-IT/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Troll b/dtsp-trust_safety_glossary_of_terms/it-IT/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/it-IT/Violent Threat b/dtsp-trust_safety_glossary_of_terms/it-IT/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/it-IT/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Account Takeover b/dtsp-trust_safety_glossary_of_terms/ja-JP/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Astroturfing b/dtsp-trust_safety_glossary_of_terms/ja-JP/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Brigading b/dtsp-trust_safety_glossary_of_terms/ja-JP/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Catfishing b/dtsp-trust_safety_glossary_of_terms/ja-JP/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/ja-JP/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/ja-JP/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/ja-JP/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/ja-JP/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Counterfeit b/dtsp-trust_safety_glossary_of_terms/ja-JP/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/ja-JP/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Defamation b/dtsp-trust_safety_glossary_of_terms/ja-JP/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/ja-JP/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Disinformation b/dtsp-trust_safety_glossary_of_terms/ja-JP/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Doxxing b/dtsp-trust_safety_glossary_of_terms/ja-JP/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Farming b/dtsp-trust_safety_glossary_of_terms/ja-JP/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/ja-JP/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Hate Speech b/dtsp-trust_safety_glossary_of_terms/ja-JP/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Impersonation b/dtsp-trust_safety_glossary_of_terms/ja-JP/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Incitement b/dtsp-trust_safety_glossary_of_terms/ja-JP/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Introduction b/dtsp-trust_safety_glossary_of_terms/ja-JP/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Misinformation b/dtsp-trust_safety_glossary_of_terms/ja-JP/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/ja-JP/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Online Harassment b/dtsp-trust_safety_glossary_of_terms/ja-JP/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Service Abuse b/dtsp-trust_safety_glossary_of_terms/ja-JP/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/ja-JP/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Spam b/dtsp-trust_safety_glossary_of_terms/ja-JP/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/ja-JP/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/ja-JP/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Troll b/dtsp-trust_safety_glossary_of_terms/ja-JP/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/ja-JP/Violent Threat b/dtsp-trust_safety_glossary_of_terms/ja-JP/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ja-JP/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Account Takeover b/dtsp-trust_safety_glossary_of_terms/ko-KR/Account Takeover new file mode 100644 index 0000000..36eddd2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Account Takeover @@ -0,0 +1,3 @@ +계정 탈취 + +해킹, 피싱, 유출된 계정 구매 등의 수단으로 허가되지 않은 사용자가 계정의 제어권을 탈취하는 시나리오. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Astroturfing b/dtsp-trust_safety_glossary_of_terms/ko-KR/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Brigading b/dtsp-trust_safety_glossary_of_terms/ko-KR/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Catfishing b/dtsp-trust_safety_glossary_of_terms/ko-KR/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/ko-KR/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..708a342 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +아동 성착취물 (CSEA/CSAM) + +아동 청소년이 성적인 행위를 하고 있거나 그런 것을 묘사하는 영상, 사진. 아동 성 착취 및 학대 (CSEA) 는 아동 성 착취와 그루밍 등 다른 성적인 내용을 둘 다를 포함하는 더 넓은 범주입니다. + +"인공 아동 성 착취 및 학대 물"은 실제 미성년자의 등장이 없는 조작된 또는 창작된 아동 청소년을 포함합니다. + +전문가, 생존자 그룹, 그리고 업계에서는 아직도 여러 국가나 조약에서 법적인 용어로 사용되고 있는 "아동 포르노"라는 명칭의 사용을 지양하고 있습니다. + +아동 성착취물은 대부분의 국가에서 불법이므로, 온라인 서비스에서 아동 성착취물 감지와 제거는 중요한 일로 여겨집니다. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/ko-KR/Content- and Conduct-Related Risk new file mode 100644 index 0000000..8854ca8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +콘텐츠와 행동과 관련된 위험 + +관련된 정책과 이용 약관에 의해 금지된 인권 침해 위험을 포함한 불법적이거나, 위험하거나, 해로운 콘텐츠나 행동의 발생 가능성. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/ko-KR/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/ko-KR/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Counterfeit b/dtsp-trust_safety_glossary_of_terms/ko-KR/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/ko-KR/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Defamation b/dtsp-trust_safety_glossary_of_terms/ko-KR/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/ko-KR/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Disinformation b/dtsp-trust_safety_glossary_of_terms/ko-KR/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Doxxing b/dtsp-trust_safety_glossary_of_terms/ko-KR/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Farming b/dtsp-trust_safety_glossary_of_terms/ko-KR/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/ko-KR/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Hate Speech b/dtsp-trust_safety_glossary_of_terms/ko-KR/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Impersonation b/dtsp-trust_safety_glossary_of_terms/ko-KR/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Incitement b/dtsp-trust_safety_glossary_of_terms/ko-KR/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Introduction b/dtsp-trust_safety_glossary_of_terms/ko-KR/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Misinformation b/dtsp-trust_safety_glossary_of_terms/ko-KR/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/ko-KR/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Online Harassment b/dtsp-trust_safety_glossary_of_terms/ko-KR/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Service Abuse b/dtsp-trust_safety_glossary_of_terms/ko-KR/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/ko-KR/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Spam b/dtsp-trust_safety_glossary_of_terms/ko-KR/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/ko-KR/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/ko-KR/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Troll b/dtsp-trust_safety_glossary_of_terms/ko-KR/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/ko-KR/Violent Threat b/dtsp-trust_safety_glossary_of_terms/ko-KR/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ko-KR/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Account Takeover b/dtsp-trust_safety_glossary_of_terms/nl-NL/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Astroturfing b/dtsp-trust_safety_glossary_of_terms/nl-NL/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Brigading b/dtsp-trust_safety_glossary_of_terms/nl-NL/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Catfishing b/dtsp-trust_safety_glossary_of_terms/nl-NL/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/nl-NL/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/nl-NL/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/nl-NL/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/nl-NL/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Counterfeit b/dtsp-trust_safety_glossary_of_terms/nl-NL/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/nl-NL/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Defamation b/dtsp-trust_safety_glossary_of_terms/nl-NL/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/nl-NL/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Disinformation b/dtsp-trust_safety_glossary_of_terms/nl-NL/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Doxxing b/dtsp-trust_safety_glossary_of_terms/nl-NL/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Farming b/dtsp-trust_safety_glossary_of_terms/nl-NL/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/nl-NL/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Hate Speech b/dtsp-trust_safety_glossary_of_terms/nl-NL/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Impersonation b/dtsp-trust_safety_glossary_of_terms/nl-NL/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Incitement b/dtsp-trust_safety_glossary_of_terms/nl-NL/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Introduction b/dtsp-trust_safety_glossary_of_terms/nl-NL/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Misinformation b/dtsp-trust_safety_glossary_of_terms/nl-NL/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/nl-NL/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Online Harassment b/dtsp-trust_safety_glossary_of_terms/nl-NL/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Service Abuse b/dtsp-trust_safety_glossary_of_terms/nl-NL/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/nl-NL/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Spam b/dtsp-trust_safety_glossary_of_terms/nl-NL/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/nl-NL/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/nl-NL/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Troll b/dtsp-trust_safety_glossary_of_terms/nl-NL/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/nl-NL/Violent Threat b/dtsp-trust_safety_glossary_of_terms/nl-NL/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/nl-NL/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Account Takeover b/dtsp-trust_safety_glossary_of_terms/pl-PL/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Astroturfing b/dtsp-trust_safety_glossary_of_terms/pl-PL/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Brigading b/dtsp-trust_safety_glossary_of_terms/pl-PL/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Catfishing b/dtsp-trust_safety_glossary_of_terms/pl-PL/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/pl-PL/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/pl-PL/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/pl-PL/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/pl-PL/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Counterfeit b/dtsp-trust_safety_glossary_of_terms/pl-PL/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/pl-PL/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Defamation b/dtsp-trust_safety_glossary_of_terms/pl-PL/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/pl-PL/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Disinformation b/dtsp-trust_safety_glossary_of_terms/pl-PL/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Doxxing b/dtsp-trust_safety_glossary_of_terms/pl-PL/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Farming b/dtsp-trust_safety_glossary_of_terms/pl-PL/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/pl-PL/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Hate Speech b/dtsp-trust_safety_glossary_of_terms/pl-PL/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Impersonation b/dtsp-trust_safety_glossary_of_terms/pl-PL/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Incitement b/dtsp-trust_safety_glossary_of_terms/pl-PL/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Introduction b/dtsp-trust_safety_glossary_of_terms/pl-PL/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Misinformation b/dtsp-trust_safety_glossary_of_terms/pl-PL/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/pl-PL/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Online Harassment b/dtsp-trust_safety_glossary_of_terms/pl-PL/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Service Abuse b/dtsp-trust_safety_glossary_of_terms/pl-PL/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/pl-PL/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Spam b/dtsp-trust_safety_glossary_of_terms/pl-PL/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/pl-PL/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/pl-PL/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Troll b/dtsp-trust_safety_glossary_of_terms/pl-PL/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/pl-PL/Violent Threat b/dtsp-trust_safety_glossary_of_terms/pl-PL/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pl-PL/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Account Takeover b/dtsp-trust_safety_glossary_of_terms/pt-BR/Account Takeover new file mode 100644 index 0000000..bba3263 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Account Takeover @@ -0,0 +1,3 @@ +Aquisição de conta + +O cenário em que um usuário não autorizado ganha acesso da conta de um usuário, que também pode ser conhecido como hacking, phishing ou comprar informações pessoais vazadas. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Astroturfing b/dtsp-trust_safety_glossary_of_terms/pt-BR/Astroturfing new file mode 100644 index 0000000..a3c4d95 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Astroturfing @@ -0,0 +1,3 @@ +Falsificação de opinião + +Atividade organizada com intenção de criar aparência enganosa de amplo apoio autêntico de base ou oposição para uma razão dita, ou uma organização, porém, na verdade, a atividade é motivada, fundida ou coordenada por um ou um pequeno número de fontes obscuras. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Brigading b/dtsp-trust_safety_glossary_of_terms/pt-BR/Brigading new file mode 100644 index 0000000..1c5fb99 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Brigading @@ -0,0 +1,5 @@ +Ação coletiva coordenada + +Atividade coordenada on-line em massa, às vezes pré-planejada, para afetar uma parte do conteúdo, ou uma conta, ou uma comunidade inteira, ou um quadro de mensagens. + +Exemplos incluem votar coordenadamente a favor ou contra uma publicação para afetar a distribuição, denunciar em massa uma conta (geralmente sendo falsamente) por abuso numa tentativa de causar o fornecedor de serviço de suspendê-la, ou inundando uma empresa de avaliações positivas ou negativas. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Catfishing b/dtsp-trust_safety_glossary_of_terms/pt-BR/Catfishing new file mode 100644 index 0000000..2faa673 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +Um cenário em que alguém cria uma pessoa falsa em um serviço on-line, como mídias sociais ou aplicativos de namoro, formando um relacionamento com alguém que acredite que a pessoa seja real. + +Este comportamento é frequentemente associado com fraude financeiro ("Pig Butchering") e outras formas de exploração da vítima. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/pt-BR/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..d15a4c5 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Conteúdo pornográfico infantil (CSEA/CSAM) + +Imagens ou vídeos em que mostra uma pessoa que seja uma criança sendo envolvida ou retratada como sendo envolvida numa atividade sexual explícita. O Child Sexual Exploitation and Abuse (CSEA) é a categoria mais ampla que abrange ambos os materiais retratando abuso sexual infantil, outros conteúdos sexualizados envolvendo crianças, e inclue asseio (grooming). + +"Exploração Sexual Infantil Simulada e Imagem de Abuso" contém modificações ou invenções de envolvimentos de criança sem o direto envolvimento de sujeitos menores de idade. + +Especialistas, grupos sobreviventes, e a indústria desencoraja o uso do termo “Pornografia infantil”, onde ainda é usado como termo legal em várias jurisdições e tratados internacionais. + +CSAM é ilegal em quase todas as jurisdições, fazendo a detecção e a remoção de CSAM uma grande prioridade para serviços on-line. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/pt-BR/Content- and Conduct-Related Risk new file mode 100644 index 0000000..372345e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Risco Relacionado a Conteúdo e Conduta + +A possibilidade de certos conteúdos ou comportamentos prejudiciais, incluindo riscos aos direitos humanos, os quais são proibidos pelas políticas e termos de serviço relevantes. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/pt-BR/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..4fbcf82 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Comportamento Coordenado Inautêntico + +Atividade online organizada onde uma conta ou um grupo de contas incluindo contas secundárias "falsas" (que existem somente para engajar em tais campanhas) agem para enganar pessoas ou elevar fraudulentamente a popularidade ou visibilidade de conteúdos ou contas, tais como seguir em massa uma conta para aumentar sua influência. + +Em alguns casos, uma única fonte oculta ou organização se utilizarão de várias contas falsas com a finalidade de criar uma falsa aparência de atividade autêntica ou confiável. + +Em outros casos, pessoas usando contas reais próprias se coordenarão para alcançar um propósito enganoso, como, por exemplo, a aparência que uma visão ou crença é mais generalizada do que é, ou para causar a distribuição de peça ou tipo de conteúdo particular. + +Às vezes chamado de "manipulação de plataforma" ou "manipulação de conteúdo." diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/pt-BR/Copyright Infringement new file mode 100644 index 0000000..08febc9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Copyright Infringement @@ -0,0 +1,9 @@ +Violação de Direitos Autorais + +O uso de material protegido por lei de direitos autorais (como textos, imagens ou vídeos) numa maneira que inflige as regras do detentor de direitos autorais, sem a permissão do detentor de direitos e sem uma exceção ou limitação de aplicação de direitos autorais. + +Nisto pode-se incluir criação ilícita de cópias, distribuição, exibição ou reprodução pública de material protegido, ou a criação não autorizada de trabalhos derivados. + +A violação pode envolver responsabilidade primária (para a pessoa que cometeu a conduta ilícita) ou responsabilidade secundária (p. e. uma companhia de hospedagem cujo serviço hospeda imagens postadas por um usuário). + +Nos Estados Unidos, um serviço digital que hospeda conteúdo gerado por usuário recebe um porto seguro segundo a Seção 512 do Copyright Act, desde que cumpra com os procedimentos de notificação e remoção aplicáveis estabelecidos nessa lei. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Counterfeit b/dtsp-trust_safety_glossary_of_terms/pt-BR/Counterfeit new file mode 100644 index 0000000..7acb527 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Counterfeit @@ -0,0 +1,5 @@ +Falsificação + +A produção não autorizada ou a venda de mercadoria ou serviços com marca registrada não autêntica, o que pode ter o efeito de induzir os consumidores a acreditarem serem autênticas. + +A produção ou venda de bens falsificados é uma forma de violação de marca registrada e a responsabilização por esta conduta é uma preocupação para as lojas online. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/pt-BR/Cross-Platform Abuse new file mode 100644 index 0000000..7012db4 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Abuso Multiplataforma + +Casos que um agente ou grupo mal-intencionado irá organizar uma campanha de abuso (como, p. e., assédio, trolagem ou desinformação) usando múltiplos serviços online. + +Isso tem o efeito de fazer que seja mais difícil e requeira mais tempo para que as vítimas terem conteúdos abusivos removidos, uma vez que serão obrigadas a entrar em contato com cada serviço separadamente e explicar a situação. + +Às vezes, o mesmo conteúdo será simplesmente repostado entre múltiplas plataformas. Em outros casos, agentes mal-intencionados dividirão o conteúdo ou a conduta de modo que nenhum serviço possua todo o conteúdo abusivo. Como resultado, a falta do contexto completo de toda campanha, ou caso um serviço restrinja sua investigação apenas ao conteúdo ou conduta que envolva a si mesmo, um dado serviço pode determinar não ter havido nenhuma violação. + +Normalmente, tais situações requerem pesquisa e integração de dados de múltiplos serviços e investigação do contexto de fundo tanto do(s) agente(s) mal-intencionado(s), quanto vítima(s) que possibilite avaliações mais significativas e que se responda mais apropriadamente. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Defamation b/dtsp-trust_safety_glossary_of_terms/pt-BR/Defamation new file mode 100644 index 0000000..06778e4 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Defamation @@ -0,0 +1,11 @@ +Difamação + +Uma reivindicação legal baseada em afirmar algo sobre uma pessoa e compartilhado com outras pessoas causando danos à reputação do objeto da declaração (os elementos legais e defesas aplicáveis variam conforme a jurisdição). + +A difamação pode ser transmitida através de um alcance de mídia, incluindo visualmente, oralmente, com imagens ou por texto. + +Nos Estados Unidos, apoiado pela Jurisprudência da Primeira Emenda, o fardo de prova para estabelecer difamação em uma pessoa alegando que elas foram difamadas. + +Em outras jurisdições, como a Europa, o ônus da prova pode recair sobre o réu para que ele prove não ter cometido a difamação. + +Estas diferenças de abordagem legal e níveis de risco legai associado pode influenciar os processos de remoção por difamação por disputas adotadas pelos serviços online em várias localidades. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/pt-BR/Dehumanisation new file mode 100644 index 0000000..aec2220 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Dehumanisation @@ -0,0 +1,5 @@ +Desumanização + +Descrevendo pessoas em maneiras que negam ou diminua suas humanidades, tais como comparar um grupo com insetos, animais ou pragas. + +Alguns especialistas nesta área cita discurso de desumanização como um possível percursor à violência (às vezes até o ponto de genocídio), pois possa fazer com que ações violentas pareçam apropriadas ou justificadas contra alvos "não humanos" ou "menos que humanos". diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Disinformation b/dtsp-trust_safety_glossary_of_terms/pt-BR/Disinformation new file mode 100644 index 0000000..6925057 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Disinformation @@ -0,0 +1,5 @@ +Desinformação + +Informação falsa divulgada intencionalmente e maliciosamente para criar confusão, encorajar desconfiança e potencialmente minar instituições políticas e sociais. + +Má-informação é outra categoria de informação enganosa identificada pelos pesquisadores, informação que é baseada na realidade, porém é usada para infligir danos a uma pessoa, organização ou país, mudando-se o contexto no qual a informação é apresentada. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Doxxing b/dtsp-trust_safety_glossary_of_terms/pt-BR/Doxxing new file mode 100644 index 0000000..57b1f2b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +O ato de divulgar as informações pessoais de alguém — como o nome real, endereço, número de telefone ou qualquer dado que pode ser usado para identificar o indivíduo — em um fórum online ou outro espaço público sem o consentimento da pessoa. + +Doxxing pode levar à ameaças no mundo real contra a pessoa cuja informação foi exposta e por essa razão é geralmente considerada como uma forma de assédio online. + +Alguns serviços podem também considerar e divulgar informações disponíveis publicamente sobre uma pessoa de maneira ameaçadora suficiente para que se constitua o doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Farming b/dtsp-trust_safety_glossary_of_terms/pt-BR/Farming new file mode 100644 index 0000000..94b0cbc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Farming @@ -0,0 +1,7 @@ +Farming + +"Farmagem" de conteúdo envolve a criação de conteúdo online para o propósito único ou principal de atrair visualizações e crescimento de receita de publicidade, ao invés do desejo de se expressar ou comunicar alguma mensagem particular. + +"Farmadores" de conteúdo geralmente criam conteúdo web baseados em termos de pesquisas populares (uma prática conhecida como "search engine optimization" — otimização de mecanismo de busca) com a finalidade de serem melhores ranqueados nos resultados dos mecanismos de busca. O conteúdo "cultivado" resultado é geralmente de baixa qualidade ou contém spam, mas pode ainda ser lucrativo por causa do uso estratégico de palavras-chave para manipular os algoritmos dos mecanismos de busca e levar usuários a navegar para uma página, permitindo ao proprietário "coletar cliques" por receita de anúncios. + +A "farmagem" de conteúdo envolve criar e inicialmente usar contas em serviços de formas aparentemente inócuas a fim de ganhar seguidores, amadurecer a conta e criar um registro, fazendo com que a conta pareça autêntica e crível, antes de redirecionar a conta para a postagem de spam, desinformação ou outro conteúdo abusivo ou vendendo-a para quem tenha intenção de fazer isso. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/pt-BR/Glorification of Violence new file mode 100644 index 0000000..5153b9d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Glorification of Violence @@ -0,0 +1,5 @@ +Glorificação da Violência + +Declarações ou imagens que celebram atos de violência passados ou hipotéticos futuros. + +Alguns serviços online restringem ou proíbem a glorificação da violência (incluindo terrorismo) com o argumento que isso pode incitar ou intensificar futuros atos de violência ou nutrir um ambiente online ameaçador ou inseguro, apesar de ser desafiador distinguir a glorificação de um assunto de outros tipos de discussão sobre o mesmo. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Hate Speech b/dtsp-trust_safety_glossary_of_terms/pt-BR/Hate Speech new file mode 100644 index 0000000..28701d1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Hate Speech @@ -0,0 +1,5 @@ +Discurso de Ódio + +Conteúdo abusivo, odioso ou ameaçador, ou conduta que expresse preconceito contra um grupo ou pessoa devido ao pertencimento a um grupo podendo ser baseado em características protegidas legalmente como, p. e.: religião, etnia, nacionalidade, raça, identificação de gênero, orientação sexual ou outras características. + +Não há definição jurídica internacional para discurso de ódio. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Impersonation b/dtsp-trust_safety_glossary_of_terms/pt-BR/Impersonation new file mode 100644 index 0000000..aacc225 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Impersonation @@ -0,0 +1,5 @@ +Falsidade Ideológica + +A falsidade ideológica online muito frequentemente envolve a criação de um perfil de conta que usa o nome, imagem, semelhança ou outras características de outra pessoa sem sua permissão, criando uma impressão falsa ou enganosa de que a conta é controlada pela mesma. + +Também é conhecido como "contas impostoras". diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Incitement b/dtsp-trust_safety_glossary_of_terms/pt-BR/Incitement new file mode 100644 index 0000000..511950d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Incitement @@ -0,0 +1,3 @@ +Incitamento + +Para encorajar violência ou sentimento de violência contra uma pessoa, ou grupo. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Introduction b/dtsp-trust_safety_glossary_of_terms/pt-BR/Introduction new file mode 100644 index 0000000..90a57ce --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Introduction @@ -0,0 +1,36 @@ +Introdução +Com o crescimento da área de Confiança e Segurança — em significância, complexidade e +número de praticantes — há um valor correspondente em assegurar que exista um +entendimento comum de termos-chave usados pelas pessoas que trabalham +para manter a segurança digital dos usuários. + +Apesar de as companhias usarem já há um longo tempo +a combinação de pessoas, processos e tecnologia para abordar riscos relacionados a conteúdo e conduta, +esta área, seguindo a trajetória de outras especializações tecnológicas +como a cibersegurança e privacidade, alcançou a um ponto crítico +em que começou a se formalizar e amadurecer, alcançando autoconsciência. +Discussões importantes estão acontecendo ao redor de todo o mundo: nas casas, escolas, +negócios e em todos os níveis de governo — sobre o que Confiança e Segurança +deve se parecer para melhor servir sociedades e suas crescentes relações com a +internet. Porém, uma discussão significativa tem sido por vezes limitada por falta de um +vocabulário compartilhado. + +Durante o ano passado, a Digital Trust & Safety Partnership (DTSP) — Parceria de Confiança e Segurança Digital — tem trabalhado para desenvolver o primeiro glossário de termos de Confiança e Segurança. +Seguindo uma consulta pública, em que a DTSP recebeu sugestões valiosas de +partes interessadas, incluindo organizações acadêmicas, parceiros da indústria, reguladores +e outros de todo o mundo, estamos publicando a primeira edição deste +glossário. +Liderado pelo cofundador da DTSP, Alex Feerst, este glossário tem os seguintes +objetivos: + +1. Contribuir para a profissionalização da área e apoiar novas equipes de +Confiança e Segurança ao passo que elas desenvolvem suas operações; +2. Apoiar a adoção de interpretações estabelecidas de termos críticos usados +pela indústria; e +3. Facilitar o diálogo informado entre a indústria, formuladores de políticas, reguladores, +e o amplo público. + +O objetivo para esta primeira edição foi o de descrever como termos-chave são usados por +praticantes na indústria. Estas não são definições jurídicas e sua publicação +não implica que toda companhia parceira da DTSP concorde completamente com cada termo +como definido aqui. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Misinformation b/dtsp-trust_safety_glossary_of_terms/pt-BR/Misinformation new file mode 100644 index 0000000..382dd7f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Misinformation @@ -0,0 +1,5 @@ +Informação Incorreta + +Informação falsa distribuída não intencionalmente e geralmente não maliciosamente, que independentemente disso pode enganar ou aumentar as chances de prejudicar as pessoas. + +Má-informação é outra categoria de informação enganosa identificada pelos pesquisadores, informação que é baseada na realidade mas que inflige danos à pessoa, organização ou país, mudando-se o contexto no qual a informação é apresentada. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/pt-BR/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Online Harassment b/dtsp-trust_safety_glossary_of_terms/pt-BR/Online Harassment new file mode 100644 index 0000000..5fc6438 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Online Harassment @@ -0,0 +1,10 @@ +Assédio Online + +Comportamento repetido não solicitado contra outra pessoa, normalmente com a intenção de intimidar ou causar sofrimento emocional. + +O assédio online pode ocorrer através de muitos meios (incluindo email, mídia social e outros serviços online). + +Pode expandir ou incluir abuso no mundo real, ou +uma atividade fora da internet pode passar para o online. + +O assédio online pode tomar a forma de um abusador atacando uma pessoa ou grupo com contato prolongado, ou pode tomar a forma de vários indivíduos atacando um individuo ou grupo. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Service Abuse b/dtsp-trust_safety_glossary_of_terms/pt-BR/Service Abuse new file mode 100644 index 0000000..dd458d1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Service Abuse @@ -0,0 +1,3 @@ +Abuso de Serviço + +Uso de uma rede, produto ou serviço de maneira que viole os termos de serviço do provedor, guias de comunidade, ou outras regras, normalmente porque cria ou aumenta o risco de danos à uma pessoa ou grupo, ou tende a enfraquecer o propósito, função ou qualidade do serviço. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/pt-BR/Sock Puppets new file mode 100644 index 0000000..33b6c3a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Sock Puppets @@ -0,0 +1,3 @@ +Contas Fantoche + +Múltiplas contas falsas usadas para criar a ilusão de consenso ou popularidade, curtindo ou repostando conteúdos com a finalidade de amplificá-los. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Spam b/dtsp-trust_safety_glossary_of_terms/pt-BR/Spam new file mode 100644 index 0000000..8ff340b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Spam @@ -0,0 +1,3 @@ +Spam + +Não solicitado, comunicações de baixa qualidade, frequentemente (porém não necessariamente) solicitações de comerciais de alto-nível, enviado através de um alcance de mídia eletrônica, incluindo e-mail, mensagem, e mídia social. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/pt-BR/Synthetic Media new file mode 100644 index 0000000..dae7043 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Synthetic Media @@ -0,0 +1,11 @@ +Mídia Sintética + +Conteúdo que é gerado ou manipulado para parecer como sendo baseado na realidade, quando na verdade é artificial. Também referido como mídia manipulada. + +A mídia manipulada pode algumas vezes (mas não sempre ser gerada através de processos algorítmicos (como inteligência artificial ou aprendizado de máquinas). + +Uma "deepfake" é uma forma de mídia sintética em que uma imagem ou gravação é alterada para deturpar que alguém está fazendo ou dizendo algo que não foi feito ou dito. + +Geralmente, mídia sintética ou manipulada (incluindo-se "deepfakes"), pode ser usada no contexto de abuso para enganar ou causar danos às pessoas, como, p. e., fazê-las parecer dizer coisas que nunca disseram, ou agir de maneira que nunca agiram (como no caso de "Imagens Abusivas não Consensuais). + +Uma mídia sintética pode também ser usada para retratar eventos que nunca ocorreram. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/pt-BR/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..db0f787 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Conteúdo Violento Extremista ou Terrorista (CVET) + +Conteúdo produzido ou que apoie grupos que se identificam, ou são designados como terrorista ou organizações violentas, ou conteúdo que promove atos de terrorismo ou extremismo violento. + +Não há uma definição universalmente aceita de terrorismo ou extremismo violento e definições para esses termos podem variar significativamente a depender da jurisdição. + +Abordagens de definição da categoria incluem estruturas baseadas em ator ou comportamento, e, objetivando sua detecção e remoção, serviços online podem depender de pesquisa e listas de organizações terroristas e extremistas criadas por organizações especialistas no assunto, como a lista de sanções do Conselho de Segurança das Nações Unidas. + +Material CVET é cada vez mais foco de legisladores e reguladores preocupados em como impedir sua disponibilidade. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Troll b/dtsp-trust_safety_glossary_of_terms/pt-BR/Troll new file mode 100644 index 0000000..fcbaad0 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Troll @@ -0,0 +1,5 @@ +Troll + +Usuário que intencionalmente provoca hostilidade ou confusão online. + +Diferenciar um troll, ou trolagem, de outros tipos de crítica pode ser desafiador. Um troll pode ter pontos válidos, mas, geralmente, os coloca com a intenção de irritar. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-BR/Violent Threat b/dtsp-trust_safety_glossary_of_terms/pt-BR/Violent Threat new file mode 100644 index 0000000..90a9c90 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-BR/Violent Threat @@ -0,0 +1,7 @@ +Ameaça de Agressão + +Uma declaração ou outra comunicação que expresse uma intenção de infligir dano físico a pessoa ou grupos de pessoas. + +Ameaças de agressão podem ser direcionadas, como, p. e, ameaças de matar ou mutilar outra pessoa; também podem ser implícitas através de metáfora, analogia ou outra retórica que permita ao autor uma negação plausível sobre seu significado ou intenção. + +Frequentemente se confundem com apologia, fazendo-se uma declaração pública de que alguém mereça ser ferido ou encorajando outros a fazê-lo, p.e. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Account Takeover b/dtsp-trust_safety_glossary_of_terms/pt-PT/Account Takeover new file mode 100644 index 0000000..a0f535f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +O cenário em que um utilizador não autorizado obtém controle de uma conta de utilizador através de meios como hacking, ‘phishing’ ou compra de credenciais vazadas. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Astroturfing b/dtsp-trust_safety_glossary_of_terms/pt-PT/Astroturfing new file mode 100644 index 0000000..8d18ca5 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Atividade organizada que visa criar a aparência enganosa de amplo e autêntico apoio ou oposição popular a uma determinada causa ou organização, quando a atividade é motivada, financiada ou coordenada por uma única ou um pequeno número de fontes obscuras. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Brigading b/dtsp-trust_safety_glossary_of_terms/pt-PT/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Catfishing b/dtsp-trust_safety_glossary_of_terms/pt-PT/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/pt-PT/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/pt-PT/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/pt-PT/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/pt-PT/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Counterfeit b/dtsp-trust_safety_glossary_of_terms/pt-PT/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/pt-PT/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Defamation b/dtsp-trust_safety_glossary_of_terms/pt-PT/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/pt-PT/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Disinformation b/dtsp-trust_safety_glossary_of_terms/pt-PT/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Doxxing b/dtsp-trust_safety_glossary_of_terms/pt-PT/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Farming b/dtsp-trust_safety_glossary_of_terms/pt-PT/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/pt-PT/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Hate Speech b/dtsp-trust_safety_glossary_of_terms/pt-PT/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Impersonation b/dtsp-trust_safety_glossary_of_terms/pt-PT/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Incitement b/dtsp-trust_safety_glossary_of_terms/pt-PT/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Introduction b/dtsp-trust_safety_glossary_of_terms/pt-PT/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Misinformation b/dtsp-trust_safety_glossary_of_terms/pt-PT/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/pt-PT/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Online Harassment b/dtsp-trust_safety_glossary_of_terms/pt-PT/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Service Abuse b/dtsp-trust_safety_glossary_of_terms/pt-PT/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/pt-PT/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Spam b/dtsp-trust_safety_glossary_of_terms/pt-PT/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/pt-PT/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/pt-PT/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Troll b/dtsp-trust_safety_glossary_of_terms/pt-PT/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/pt-PT/Violent Threat b/dtsp-trust_safety_glossary_of_terms/pt-PT/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/pt-PT/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Account Takeover b/dtsp-trust_safety_glossary_of_terms/ro-RO/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Astroturfing b/dtsp-trust_safety_glossary_of_terms/ro-RO/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Brigading b/dtsp-trust_safety_glossary_of_terms/ro-RO/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Catfishing b/dtsp-trust_safety_glossary_of_terms/ro-RO/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/ro-RO/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/ro-RO/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/ro-RO/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/ro-RO/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Counterfeit b/dtsp-trust_safety_glossary_of_terms/ro-RO/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/ro-RO/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Defamation b/dtsp-trust_safety_glossary_of_terms/ro-RO/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/ro-RO/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Disinformation b/dtsp-trust_safety_glossary_of_terms/ro-RO/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Doxxing b/dtsp-trust_safety_glossary_of_terms/ro-RO/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Farming b/dtsp-trust_safety_glossary_of_terms/ro-RO/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/ro-RO/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Hate Speech b/dtsp-trust_safety_glossary_of_terms/ro-RO/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Impersonation b/dtsp-trust_safety_glossary_of_terms/ro-RO/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Incitement b/dtsp-trust_safety_glossary_of_terms/ro-RO/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Introduction b/dtsp-trust_safety_glossary_of_terms/ro-RO/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Misinformation b/dtsp-trust_safety_glossary_of_terms/ro-RO/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/ro-RO/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Online Harassment b/dtsp-trust_safety_glossary_of_terms/ro-RO/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Service Abuse b/dtsp-trust_safety_glossary_of_terms/ro-RO/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/ro-RO/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Spam b/dtsp-trust_safety_glossary_of_terms/ro-RO/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/ro-RO/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/ro-RO/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Troll b/dtsp-trust_safety_glossary_of_terms/ro-RO/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/ro-RO/Violent Threat b/dtsp-trust_safety_glossary_of_terms/ro-RO/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ro-RO/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Account Takeover b/dtsp-trust_safety_glossary_of_terms/ru-RU/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Astroturfing b/dtsp-trust_safety_glossary_of_terms/ru-RU/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Brigading b/dtsp-trust_safety_glossary_of_terms/ru-RU/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Catfishing b/dtsp-trust_safety_glossary_of_terms/ru-RU/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/ru-RU/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/ru-RU/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/ru-RU/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/ru-RU/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Counterfeit b/dtsp-trust_safety_glossary_of_terms/ru-RU/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/ru-RU/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Defamation b/dtsp-trust_safety_glossary_of_terms/ru-RU/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/ru-RU/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Disinformation b/dtsp-trust_safety_glossary_of_terms/ru-RU/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Doxxing b/dtsp-trust_safety_glossary_of_terms/ru-RU/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Farming b/dtsp-trust_safety_glossary_of_terms/ru-RU/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/ru-RU/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Hate Speech b/dtsp-trust_safety_glossary_of_terms/ru-RU/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Impersonation b/dtsp-trust_safety_glossary_of_terms/ru-RU/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Incitement b/dtsp-trust_safety_glossary_of_terms/ru-RU/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Introduction b/dtsp-trust_safety_glossary_of_terms/ru-RU/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Misinformation b/dtsp-trust_safety_glossary_of_terms/ru-RU/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/ru-RU/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Online Harassment b/dtsp-trust_safety_glossary_of_terms/ru-RU/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Service Abuse b/dtsp-trust_safety_glossary_of_terms/ru-RU/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/ru-RU/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Spam b/dtsp-trust_safety_glossary_of_terms/ru-RU/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/ru-RU/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/ru-RU/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Troll b/dtsp-trust_safety_glossary_of_terms/ru-RU/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/ru-RU/Violent Threat b/dtsp-trust_safety_glossary_of_terms/ru-RU/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/ru-RU/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Account Takeover b/dtsp-trust_safety_glossary_of_terms/tr-TR/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Astroturfing b/dtsp-trust_safety_glossary_of_terms/tr-TR/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Brigading b/dtsp-trust_safety_glossary_of_terms/tr-TR/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Catfishing b/dtsp-trust_safety_glossary_of_terms/tr-TR/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/tr-TR/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/tr-TR/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/tr-TR/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/tr-TR/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Counterfeit b/dtsp-trust_safety_glossary_of_terms/tr-TR/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/tr-TR/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Defamation b/dtsp-trust_safety_glossary_of_terms/tr-TR/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/tr-TR/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Disinformation b/dtsp-trust_safety_glossary_of_terms/tr-TR/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Doxxing b/dtsp-trust_safety_glossary_of_terms/tr-TR/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Farming b/dtsp-trust_safety_glossary_of_terms/tr-TR/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/tr-TR/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Hate Speech b/dtsp-trust_safety_glossary_of_terms/tr-TR/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Impersonation b/dtsp-trust_safety_glossary_of_terms/tr-TR/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Incitement b/dtsp-trust_safety_glossary_of_terms/tr-TR/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Introduction b/dtsp-trust_safety_glossary_of_terms/tr-TR/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Misinformation b/dtsp-trust_safety_glossary_of_terms/tr-TR/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/tr-TR/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Online Harassment b/dtsp-trust_safety_glossary_of_terms/tr-TR/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Service Abuse b/dtsp-trust_safety_glossary_of_terms/tr-TR/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/tr-TR/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Spam b/dtsp-trust_safety_glossary_of_terms/tr-TR/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/tr-TR/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/tr-TR/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Troll b/dtsp-trust_safety_glossary_of_terms/tr-TR/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/tr-TR/Violent Threat b/dtsp-trust_safety_glossary_of_terms/tr-TR/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/tr-TR/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Account Takeover b/dtsp-trust_safety_glossary_of_terms/uk-UA/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Astroturfing b/dtsp-trust_safety_glossary_of_terms/uk-UA/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Brigading b/dtsp-trust_safety_glossary_of_terms/uk-UA/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Catfishing b/dtsp-trust_safety_glossary_of_terms/uk-UA/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/uk-UA/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/uk-UA/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/uk-UA/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/uk-UA/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Counterfeit b/dtsp-trust_safety_glossary_of_terms/uk-UA/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/uk-UA/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Defamation b/dtsp-trust_safety_glossary_of_terms/uk-UA/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/uk-UA/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Disinformation b/dtsp-trust_safety_glossary_of_terms/uk-UA/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Doxxing b/dtsp-trust_safety_glossary_of_terms/uk-UA/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Farming b/dtsp-trust_safety_glossary_of_terms/uk-UA/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/uk-UA/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Hate Speech b/dtsp-trust_safety_glossary_of_terms/uk-UA/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Impersonation b/dtsp-trust_safety_glossary_of_terms/uk-UA/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Incitement b/dtsp-trust_safety_glossary_of_terms/uk-UA/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Introduction b/dtsp-trust_safety_glossary_of_terms/uk-UA/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Misinformation b/dtsp-trust_safety_glossary_of_terms/uk-UA/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/uk-UA/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Online Harassment b/dtsp-trust_safety_glossary_of_terms/uk-UA/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Service Abuse b/dtsp-trust_safety_glossary_of_terms/uk-UA/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/uk-UA/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Spam b/dtsp-trust_safety_glossary_of_terms/uk-UA/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/uk-UA/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/uk-UA/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Troll b/dtsp-trust_safety_glossary_of_terms/uk-UA/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/uk-UA/Violent Threat b/dtsp-trust_safety_glossary_of_terms/uk-UA/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/uk-UA/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Account Takeover b/dtsp-trust_safety_glossary_of_terms/vi-VN/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Astroturfing b/dtsp-trust_safety_glossary_of_terms/vi-VN/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Brigading b/dtsp-trust_safety_glossary_of_terms/vi-VN/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Catfishing b/dtsp-trust_safety_glossary_of_terms/vi-VN/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/vi-VN/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/vi-VN/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/vi-VN/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/vi-VN/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Counterfeit b/dtsp-trust_safety_glossary_of_terms/vi-VN/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/vi-VN/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Defamation b/dtsp-trust_safety_glossary_of_terms/vi-VN/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/vi-VN/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Disinformation b/dtsp-trust_safety_glossary_of_terms/vi-VN/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Doxxing b/dtsp-trust_safety_glossary_of_terms/vi-VN/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Farming b/dtsp-trust_safety_glossary_of_terms/vi-VN/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/vi-VN/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Hate Speech b/dtsp-trust_safety_glossary_of_terms/vi-VN/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Impersonation b/dtsp-trust_safety_glossary_of_terms/vi-VN/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Incitement b/dtsp-trust_safety_glossary_of_terms/vi-VN/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Introduction b/dtsp-trust_safety_glossary_of_terms/vi-VN/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Misinformation b/dtsp-trust_safety_glossary_of_terms/vi-VN/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/vi-VN/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Online Harassment b/dtsp-trust_safety_glossary_of_terms/vi-VN/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Service Abuse b/dtsp-trust_safety_glossary_of_terms/vi-VN/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/vi-VN/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Spam b/dtsp-trust_safety_glossary_of_terms/vi-VN/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/vi-VN/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/vi-VN/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Troll b/dtsp-trust_safety_glossary_of_terms/vi-VN/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/vi-VN/Violent Threat b/dtsp-trust_safety_glossary_of_terms/vi-VN/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/vi-VN/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Account Takeover b/dtsp-trust_safety_glossary_of_terms/zh-CN/Account Takeover new file mode 100644 index 0000000..eae0e36 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Account Takeover @@ -0,0 +1,3 @@ +Account Takeover + +The scenario where an unauthorized user gains control of a user account, through means such as hacking, phishing or buying leaked credentials. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Astroturfing b/dtsp-trust_safety_glossary_of_terms/zh-CN/Astroturfing new file mode 100644 index 0000000..fae1021 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Astroturfing @@ -0,0 +1,3 @@ +Astroturfing + +Organized activity intended to create the deceptive appearance of broad, authentic grassroots support or opposition to a given cause or organization, when in reality the activity is being motivated, funded or coordinated by a single or small number of obscured sources. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Brigading b/dtsp-trust_safety_glossary_of_terms/zh-CN/Brigading new file mode 100644 index 0000000..5401ed2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Brigading @@ -0,0 +1,5 @@ +Brigading + +Coordinated, often pre-planned, mass online activity to affect a piece of content, or an account, or an entire community or message board. + +Examples include coordinated upvoting or downvoting a post to affect its distribution, mass-reporting an account (usually falsely) for abuse in an attempt to cause the service provider to suspend it, or inundating a business with good or bad reviews. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Catfishing b/dtsp-trust_safety_glossary_of_terms/zh-CN/Catfishing new file mode 100644 index 0000000..d75eebd --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Catfishing @@ -0,0 +1,5 @@ +Catfishing + +The scenario where someone creates a fake persona on an online service, such as social media or a dating application, and forms a relationship with someone who believes the persona to be real. + +This behavior is often associated with financial fraud and other forms of exploitation of the victim, also known as pig-slaughtering. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) b/dtsp-trust_safety_glossary_of_terms/zh-CN/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) new file mode 100644 index 0000000..4c798c3 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Child Sexual Exploitation and Abuse Material (CSEA, CSAM) @@ -0,0 +1,9 @@ +Child Sexual Exploitation/Abuse Material (CSEA/CSAM) + +Imagery or videos which show a person who is a child and engaged in or is depicted as being engaged in explicit sexual activity. Child Sexual Exploitation and Abuse (CSEA) is a broader category that encompasses both material depicting child sexual abuse, other sexualised content depicting children, and includes grooming. + +"Simulated Child Sexual Exploitation and Abuse Imagery" contains modified or invented depictions of children without the direct involvement of any underage subjects. + +Experts, survivor groups, and the industry discourage the use of the term “Child Pornography,” which is still used as a legal term in multiple jurisdictions and international treaties. + +CSAM is illegal in nearly all jurisdictions, making detection and removal of CSAM a high priority for online services. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Content- and Conduct-Related Risk b/dtsp-trust_safety_glossary_of_terms/zh-CN/Content- and Conduct-Related Risk new file mode 100644 index 0000000..c51258e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Content- and Conduct-Related Risk @@ -0,0 +1,3 @@ +Content- and Conduct-Related Risk + +The possibility of certain illegal, dangerous, or otherwise harmful content or behavior, including risks to human rights, which are prohibited by relevant policies and terms of service. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Coordinated Inauthentic Behavior b/dtsp-trust_safety_glossary_of_terms/zh-CN/Coordinated Inauthentic Behavior new file mode 100644 index 0000000..40b3834 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Coordinated Inauthentic Behavior @@ -0,0 +1,9 @@ +Coordinated Inauthentic Behavior + +Organized online activity where an account or groups of accounts including "fake" secondary accounts (which exist solely or mainly to engage in such campaigns) act to mislead people or fraudulently elevate the popularity or visibility of content or accounts, such as mass-following an account to raise its clout. + +In some cases, a single, hidden source or organization will deploy many fake accounts in order to create a false appearance of authentic and credible activity. + +In other cases, people using their own, real accounts will coordinate online to achieve a misleading purpose, such as the appearance that a view or belief is more widespread than it is, or to cause wide distribution of a particular piece or type of content. + +Sometimes called "platform manipulation" or "content manipulation." diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Copyright Infringement b/dtsp-trust_safety_glossary_of_terms/zh-CN/Copyright Infringement new file mode 100644 index 0000000..03cc7f6 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Copyright Infringement @@ -0,0 +1,9 @@ +Copyright Infringement + +The use of material that is protected by copyright law (such as text, image, or video) in a way that violates the rights of the copyright holder, without the rightsholder’s permission and without an applicable copyright exception or limitation. + +This can include infringing creation of copies, distribution, display, or public performance of a covered work, or the unauthorized creation of derivative works. + +Infringement may involve primary liability (for the person who did the infringing conduct) or secondary liability for others involved in that conduct (such as a hosting company whose service hosts images posted by a user). + +In the United States, a digital service hosting user-generated content receives safe harbor under Section 512 of the Copyright Act, so long as it complies with the applicable notice and takedown procedures set forth in that law. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Counterfeit b/dtsp-trust_safety_glossary_of_terms/zh-CN/Counterfeit new file mode 100644 index 0000000..c06b79d --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Counterfeit @@ -0,0 +1,5 @@ +Counterfeit + +The unauthorized manufacture or sale of merchandise or services with an inauthentic trademark, which may have the effect of deceiving consumers into believing they are authentic. + +The manufacture or sale of counterfeit goods is a form of trademark infringement, and secondary liability for this conduct is a concern for online marketplaces. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Cross-Platform Abuse b/dtsp-trust_safety_glossary_of_terms/zh-CN/Cross-Platform Abuse new file mode 100644 index 0000000..99ff7d9 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Cross-Platform Abuse @@ -0,0 +1,9 @@ +Cross-Platform Abuse + +Instances where a bad actor or group will organize a campaign of abuse (such as harassment, trolling or disinformation) using multiple online services. + +This has the effect of making it more difficult and time-consuming for affected persons to have the abusive content removed, as they will be required to contact each service separately and explain the situation. + +Sometimes, the same content will simply be re-posted across multiple platforms. In other cases, bad actors will divide content or conduct such that no one service carries the full abusive content. As a result, lacking full context of the entire campaign, or if a service’s policy restricts its inquiry only to content or conduct that directly involves that service, a given service may determine that no violation has taken place. + +Typically, such situations require research and integration of data from multiple services, and investigation of the background context of the bad actor(s) and affected person(s) to make more meaningful assessments and respond appropriately. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Defamation b/dtsp-trust_safety_glossary_of_terms/zh-CN/Defamation new file mode 100644 index 0000000..86d2d56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Defamation @@ -0,0 +1,11 @@ +Defamation + +A legal claim based on asserting something about a person that is shared with others and which causes harm to the reputation of the statement’s subject (the legal elements and applicable defenses vary by jurisdiction). + +Defamation can be conveyed through a range of media, including visually, orally, pictorially or by text. + +In the United States, supported by First Amendment jurisprudence, the burden of proof to establish defamation is on the person alleging they have been defamed. + +In other jurisdictions, such as Europe, the burden of proof may be on the defendant to establish they did not commit defamation. + +These differences in legal approach and levels of associated legal risk may influence the takedown processes for defamation disputes adopted by online services in various localities. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Dehumanisation b/dtsp-trust_safety_glossary_of_terms/zh-CN/Dehumanisation new file mode 100644 index 0000000..915cc8f --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Dehumanisation @@ -0,0 +1,5 @@ +Dehumanisation + +Describing people in ways that deny or diminish their humanity, such as comparing a given group to insects, animals or diseases. + +Some experts in this area cite dehumanizing speech as a possible precursor to violence (sometimes to the point of genocide), because it may make violent action seem appropriate or justified against "nonhuman" or "less-than-human" targets. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Disinformation b/dtsp-trust_safety_glossary_of_terms/zh-CN/Disinformation new file mode 100644 index 0000000..54b3e78 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Disinformation @@ -0,0 +1,5 @@ +Disinformation + +False information that is spread intentionally and maliciously to create confusion, encourage distrust, and potentially undermine political and social institutions. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Doxxing b/dtsp-trust_safety_glossary_of_terms/zh-CN/Doxxing new file mode 100644 index 0000000..f26e643 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Doxxing @@ -0,0 +1,7 @@ +Doxxing + +The act of disclosing someone’s personal, non-public information — such as a real name, home address, phone number or any other data that could be used to identify the individual — in an online forum or other public place without the person’s consent. + +Doxxing may lead to real world threats against the person whose information has been exposed, and for this reason it is often considered a form of online harassment. + +Some services may also consider aggregating and disclosing publicly available information about a person in a menacing manner sufficient to constitute doxxing. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Farming b/dtsp-trust_safety_glossary_of_terms/zh-CN/Farming new file mode 100644 index 0000000..c075baa --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Farming @@ -0,0 +1,7 @@ +Farming + +Content farming involves creating online content for the sole or primary purpose of attracting page views and increasing advertising revenue, rather than out of a desire to express or communicate any particular message. + +Content farms often create web content based on popular user search queries (a practice known as "search engine optimization") in order to rank more highly in search engine results. The resulting "cultivated" content is generally low-quality or spammy, but can still be profitable because of the strategic use of specific keywords to manipulate search engine algorithms and lead users to navigate to a page, allowing the owner to "harvest clicks" for ad revenue. + +Account farming involves creating and initially using accounts on services in apparently innocuous ways in order to build followers, age the account, and create a record, making the account appear authentic and credible, before later redirecting the account to post spam, disinformation, or other abusive content or selling it to those who intend to do so. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Glorification of Violence b/dtsp-trust_safety_glossary_of_terms/zh-CN/Glorification of Violence new file mode 100644 index 0000000..540d49e --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Glorification of Violence @@ -0,0 +1,5 @@ +Glorification of Violence + +Statements or images that celebrate past or hypothetical future acts of violence. + +Some online services restrict or prohibit glorification of violence (including terrorism) on the reasoning that it may incite or intensify future acts of violence and foster a menacing or unsafe online environment, though it is challenging to distinguish glorification of a subject from other types of discussion of it. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Hate Speech b/dtsp-trust_safety_glossary_of_terms/zh-CN/Hate Speech new file mode 100644 index 0000000..beb214b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Hate Speech @@ -0,0 +1,5 @@ +Hate Speech + +Abusive, hateful, or threatening content or conduct that expresses prejudice against a group or a person due to membership in a group, which may be based on legally protected characteristics, such as religion, ethnicity, nationality, race, gender identification, sexual orientation, or other characteristics. + +There is no international legal definition of hate speech. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Impersonation b/dtsp-trust_safety_glossary_of_terms/zh-CN/Impersonation new file mode 100644 index 0000000..440bc8b --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Impersonation @@ -0,0 +1,5 @@ +Impersonation + +Online impersonation most often involves the creation of an account profile that uses someone else’s name, image, likeness or other characteristics without that person’s permission to create a false or misleading impression that the account is controlled by them. + +Also known as "imposter accounts." diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Incitement b/dtsp-trust_safety_glossary_of_terms/zh-CN/Incitement new file mode 100644 index 0000000..5a44a56 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Incitement @@ -0,0 +1,3 @@ +Incitement + +To encourage violence or violent sentiment against a person or group. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Introduction b/dtsp-trust_safety_glossary_of_terms/zh-CN/Introduction new file mode 100644 index 0000000..54e26a1 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Introduction @@ -0,0 +1,13 @@ +# Introduction +As the Trust and Safety field grows — in significance, complexity, and number of practitioners — there is a corresponding value to ensuring a common understanding exists of key terms used by the people who work to keep users of digital services safe. + +Although companies have long use combinations of people, processes, and technology to address content- and conduct-related risks, this field, following the trajectory of other technology specializations like cybersecurity and privacy, has reached a critical point where it has begun to formalize, mature, and achieve self-awareness Important discussions are happening all around the world, in homes, schools businesses, and at all levels of government, about what Trust and Safet should look like to best serve societies and their evolving relationships to the internet. But meaningful discussion has at times been limited by the lack of shared vocabulary. + +Over the past year, the Digital Trust & Safety Partnership (DTSP) has bee working to develop the first industry glossary of Trust and Safety terms Following a public consultation, in which DTSP received valuable input fro stakeholders including academic organizations, industry partners, regulators and others from around the world, we are releasing the first edition of th glossary +Led by DTSP co-founder Alex Feerst, this glossary has the following objectives + +1. Aid the professionalization of the field and support nascent Trust and Safety teams as they build out their operations +2. Support the adoption of agreed interpretations of critical terms use across the industry; and +3. Facilitate informed dialogue between industry, policymakers, regulators and the wider public + +The goal for this first edition has been to describe how key terms are used by practitioners in industry. These are not legal definitions, and their publication does not imply that every DTSP partner company fully agrees with every term as defined here. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Misinformation b/dtsp-trust_safety_glossary_of_terms/zh-CN/Misinformation new file mode 100644 index 0000000..c8c0945 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Misinformation @@ -0,0 +1,5 @@ +Misinformation + +False information that is spread unintentionally and usually not maliciously, which may nonetheless mislead or increase likelihood of harm to persons. + +Mal-information is another category of misleading information identified by researchers, information that is based on reality but is used to inflict harm on a person, organization or country by changing the context in which the information is presented. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Non-Consensual Intimate Imagery (NCII) b/dtsp-trust_safety_glossary_of_terms/zh-CN/Non-Consensual Intimate Imagery (NCII) new file mode 100644 index 0000000..535ced2 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Non-Consensual Intimate Imagery (NCII) @@ -0,0 +1,13 @@ +Non-Consensual Intimate Imagery (NCII) + +Non-consensual image sharing, or non-consensual intimate image sharing (also called "non-consensual explicit imagery" (NCEI) or colloquially called "revenge porn"), refers to the act or threat of creating, publishing or sharing an intimate image or video without the consent of the individuals visible in it. + +What constitutes an intimate image will vary by cultural context. This could include nudity, private activity of various kinds, or showing someone without attire of religious or cultural significance the person would normally wear in public. + +The imagery may have been created by or with the consent of the individuals shown, such as in the context of an intimate relationship, or created without consent through the use of hidden cameras or other surveillance methods. + +Similarly, it may have been obtained with or without consent to possess it, or consent to possess it may have been revoked. + +Sharing or distributing the content to others, without the depicted person’s consent, is widely regarded as a form of harassment and is illegal in some jurisdictions. + +It should be noted that non-consensual intimate imagery is distinct from the unlicensed sharing of copyrighted, commercially-produced adult content. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Online Harassment b/dtsp-trust_safety_glossary_of_terms/zh-CN/Online Harassment new file mode 100644 index 0000000..6b4eb9a --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Online Harassment @@ -0,0 +1,9 @@ +Online Harassment + +Unsolicited repeated behavior against another person, usually with the intent to intimidate or cause emotional distress. + +Online harassment may occur over many mediums (including email, social media, and other online services). + +May expand to include real world abuse, or offline activity can transition online. + +Online harassment may take the form of one abuser targeting a person or group with sustained negative contact, or it may take the form of many distinct individuals targeting an individual or group. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Service Abuse b/dtsp-trust_safety_glossary_of_terms/zh-CN/Service Abuse new file mode 100644 index 0000000..59e5147 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Service Abuse @@ -0,0 +1,3 @@ +Service Abuse + +Use of a network, product or service in a way that violates the provider’s terms of service, community guidelines, or other rules, generally because it creates or increases the risk of harm to a person or group or tends to undermine the purpose, function or quality of the service. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Sock Puppets b/dtsp-trust_safety_glossary_of_terms/zh-CN/Sock Puppets new file mode 100644 index 0000000..73db624 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Sock Puppets @@ -0,0 +1,3 @@ +Sock Puppets + +Multiple, fake accounts used to create an illusion of consensus or popularity, such as by liking or reposting content in order to amplify it. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Spam b/dtsp-trust_safety_glossary_of_terms/zh-CN/Spam new file mode 100644 index 0000000..82bc402 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Spam @@ -0,0 +1,3 @@ +Spam + +Unsolicited, low-quality communications, often (but not necessarily) high-volume commercial solicitations, sent through a range of electronic media, including email, messaging, and social media. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Synthetic Media b/dtsp-trust_safety_glossary_of_terms/zh-CN/Synthetic Media new file mode 100644 index 0000000..3c75ad8 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Synthetic Media @@ -0,0 +1,11 @@ +Synthetic Media + +Content which has been generated or manipulated to appear as though based on reality, when it is in fact artificial. Also referred to as manipulated media. + +Synthetic media may sometimes (but not always) be generated through algorithmic processes (such as artificial intelligence or machine learning) + +A deepfake is a form of synthetic media where an image or recording is altered to misrepresent someone doing or saying something that was not done or said. + +Generally, synthetic or manipulated media (including "deepfakes"), may be used within the context of abuse to deceive or cause harm to persons, such as causing them to appear to say things they never said, or perform actions which they have not (as in the case of "Synthetic Non-Consensual Exploitative Images"). + +Synthetic media may also be used to depict events that have not happened. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Terrorist and Other Violent Extremist Content (TVEC) b/dtsp-trust_safety_glossary_of_terms/zh-CN/Terrorist and Other Violent Extremist Content (TVEC) new file mode 100644 index 0000000..3a1eefe --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Terrorist and Other Violent Extremist Content (TVEC) @@ -0,0 +1,9 @@ +Terrorist and Other Violent Extremist Content (TVEC) + +Content produced by or supportive of groups that identify as, or have been designated as terrorist or violent organizations, or content that promotes acts of terrorism or violent extremism. + +There is no universally agreed international definition of terrorism or violent extremism and definitions for these terms vary significantly across jurisdictions. + +Approaches to defining the category include actor- and behavior-based frameworks, and in order to detect and remove it, online services may rely on research and lists of terrorist or extremist organizations created by subject matter expert organizations, such as the United Nations Security Council’s sanctions list. + +TVEC content is increasingly a focus of lawmakers and regulators concerned with preventing its availability. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Troll b/dtsp-trust_safety_glossary_of_terms/zh-CN/Troll new file mode 100644 index 0000000..e1122cc --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Troll @@ -0,0 +1,5 @@ +Troll + +A user who intentionally provokes hostility or confusion online. + +Distinguishing a troll, or trollish behavior, from other criticism can be challenging. A troll may make valid points, but generally does so with the intention to irritate. diff --git a/dtsp-trust_safety_glossary_of_terms/zh-CN/Violent Threat b/dtsp-trust_safety_glossary_of_terms/zh-CN/Violent Threat new file mode 100644 index 0000000..0184862 --- /dev/null +++ b/dtsp-trust_safety_glossary_of_terms/zh-CN/Violent Threat @@ -0,0 +1,7 @@ +Violent Threat + +A statement or other communication that expresses an intent to inflict physical harm on a person or a group of people. + +Violent threats may be direct, such as threats to kill or maim another person; they may also be indirectly implied through metaphor, analogy or other rhetoric that allows the speaker plausible deniability about their meaning or intent. + +Often overlaps with incitement, such as making a public statement that a person deserves to be harmed, or encouraging others to do so