Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://webfoundation.org/feed

  1. <?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
  2. xmlns:content="http://purl.org/rss/1.0/modules/content/"
  3. xmlns:wfw="http://wellformedweb.org/CommentAPI/"
  4. xmlns:dc="http://purl.org/dc/elements/1.1/"
  5. xmlns:atom="http://www.w3.org/2005/Atom"
  6. xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  7. xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
  8. >
  9. <channel>
  10. <title>World Wide Web Foundation</title>
  11. <atom:link href="http://webfoundation.org/feed/" rel="self" type="application/rss+xml" />
  12. <link>https://webfoundation.org</link>
  13. <description>Founded by Tim Berners-Lee, inventor of the Web, the World Wide Web Foundation empowers people to bring about positive change.</description>
  14. <lastBuildDate>Tue, 12 Mar 2024 07:29:21 +0000</lastBuildDate>
  15. <language>en-US</language>
  16. <sy:updatePeriod>
  17. hourly </sy:updatePeriod>
  18. <sy:updateFrequency>
  19. 1 </sy:updateFrequency>
  20. <generator>https://wordpress.org/?v=6.4.3</generator>
  21. <image>
  22. <url>https://webfoundation.org/docs/2017/09/favicon-icon-75x75.png</url>
  23. <title>World Wide Web Foundation</title>
  24. <link>https://webfoundation.org</link>
  25. <width>32</width>
  26. <height>32</height>
  27. </image>
  28. <item>
  29. <title>Marking the Web’s 35th Birthday: An Open Letter</title>
  30. <link>https://webfoundation.org/2024/03/marking-the-webs-35th-birthday-an-open-letter/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=marking-the-webs-35th-birthday-an-open-letter</link>
  31. <dc:creator><![CDATA[Tim Berners-Lee]]></dc:creator>
  32. <pubDate>Tue, 12 Mar 2024 07:29:19 +0000</pubDate>
  33. <category><![CDATA[Featured]]></category>
  34. <category><![CDATA[General]]></category>
  35. <guid isPermaLink="false">https://webfoundation.org/?p=19986</guid>
  36. <description><![CDATA[<p><strong>Original Hope</strong></p>
  37. <p><span class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak" dir="ltr">Three and a half decades ago, when I invented the web, its trajectory was impossible to imagine. There was no roadmap to predict the course of its evolution, it was a captivating odyssey filled with unforeseen opportunities and </span>&#8230;</p>
  38. <p>The post <a href="https://webfoundation.org/2024/03/marking-the-webs-35th-birthday-an-open-letter/">Marking the Web’s 35th Birthday: An Open Letter</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></description>
  39. <content:encoded><![CDATA[<p><strong>Original Hope</strong></p>
  40. <p><span class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak" dir="ltr">Three and a half decades ago, when I invented the web, its trajectory was impossible to imagine. There was no roadmap to predict the course of its evolution, it was a captivating odyssey filled with unforeseen opportunities and challenges. Underlying its whole infrastructure was the intention to allow for collaboration, foster compassion and generate creativity &#8211; what I term the 3 C’s. It was to be a tool to empower humanity. The first decade of the web fulfilled that promise &#8211; the web was decentralised with a long-tail of content and options, it created small, more localised communities, provided individual empowerment and fostered huge value. Yet in the past decade, instead of embodying these values, the web has instead played a part in eroding them. The consequences are increasingly far reaching. From the centralisation of platforms to the AI revolution, the web serves as the foundational layer of our online ecosystem &#8211; an ecosystem that is now reshaping the geopolitical landscape, driving economic shifts and influencing the lives of people around the World. </span></p>
  41. <p data-renderer-start-pos="1295"><strong><span class="fabric-text-color-mark" data-renderer-mark="true" data-text-custom-color="#172b4d">State of Affairs</span></strong></p>
  42. <p>5 years ago, when the web turned 30, <a class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://webfoundation.org/2019/03/web-birthday-30/" href="https://webfoundation.org/2019/03/web-birthday-30/" target="_blank" rel="noreferrer noopener" aria-label="Vínculo I called out">I called out</a> some of the dysfunction caused by the web being dominated by the self-interest of several corporations that have eroded the web’s values and led to breakdown and harm. Now, 5 years on as we arrive at the Web’s 35th Birthday, the rapid advancement of AI has exacerbated these concerns, proving that issues on the web are not isolated but rather deeply intertwined with emerging technologies. </p>
  43. <p>There are two clear, connected issues to address. The first is the extent of power concentration, which contradicts the decentralised spirit I originally envisioned. This has segmented the web, with a fight to keep users hooked on one platform to optimise profit through the passive observation of content. This exploitative business model is particularly grave in this year of elections that could unravel political turmoil. Compounding this issue is the second, the personal data market that has exploited people’s time and data with the creation of deep profiles that allow for targeted advertising and ultimately control over the information people are fed.</p>
  44. <p>How has this happened? Leadership, hindered by a lack of diversity, has steered away from a tool for public good and one that is instead subject to capitalist forces resulting in monopolisation. Governance, which should correct for this, has failed to do so, with regulatory measures being outstripped by the rapid development of innovation, leading to a widening gap between technological advancements and effective oversight.</p>
  45. <p>The future hinges on our ability to both reform the current system and create a new one that genuinely serves the best interests of humanity. To achieve this, we must break down data silos to encourage collaboration, create market conditions in which a diversity of options thrive to fuel creativity, and shift away from polarising content to an environment shaped by a diversity of voices and perspectives that nurture empathy and understanding.</p>
  46. <p data-renderer-start-pos="3295"><strong><span class="fabric-text-color-mark" data-renderer-mark="true" data-text-custom-color="#172b4d">Level Set</span></strong></p>
  47. <p data-renderer-start-pos="3306"><span class="fabric-text-color-mark" data-renderer-mark="true" data-text-custom-color="#172b4d"><span class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak" dir="ltr">To truly transform the current system, we must simultaneously tackle its existing problems and champion the efforts of those visionary individuals who are actively working to build a new, improved system. A new paradigm is emerging, one that places individuals’ intention rather than attention at the heart of business models, freeing us from the constraints of the established order and returning control over our data. Driven by a new generation of pioneers, this movement seeks to create a more human-centred web, aligned with my original vision. These innovators hail from diverse disciplines &#8211; research, policy, and product design &#8211; united in their pursuit of a web, and related technologies, that serve and empower us all. Bluesky and Mastadon don’t feed off our engagement but still create group formation, Github provides online collaboration tools and podcasts contribute to community knowledge. As this emergent paradigm gains momentum, we have the opportunity to re-shape a digital future that prioritises human well-being, equity, and autonomy. The time to act and embrace this transformative potential is <strong>now</strong>.</span> </span></p>
  48. <p data-renderer-start-pos="4430"><strong><span class="fabric-text-color-mark" data-renderer-mark="true" data-text-custom-color="#172b4d">Fundamental Change</span></strong></p>
  49. <p data-renderer-start-pos="4450"><span class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak" dir="ltr">As outlined in the ‘<a class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://contractfortheweb.org/" href="https://contractfortheweb.org/" target="_blank" rel="noreferrer noopener" aria-label="Vínculo Contract for the Web">Contract for the Web</a>’ a multitude of stakeholders must collaborate to reform the web and guide the development of emerging technologies. Innovative market solutions, like those I&#8217;ve highlighted, are essential to this process. Forward-thinking legislation from governments worldwide can facilitate these solutions and help manage the current system more effectively. Finally, we as citizens all over the world need to be engaged, and demand higher standards and greater accountability for our online experiences. The time is now to confront the dominant system&#8217;s shortcomings while catalysing transformative solutions that empower individuals. This emergent system, ripe with potential, is rising, and the tools for control are within reach.</span></p>
  50. <p>Part of the solution is the <a class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://solidproject.org/" href="https://solidproject.org/" target="_blank" rel="noreferrer noopener" aria-label="Vínculo Solid Protocol">Solid Protocol</a>, a specification and a movement to provide each person with their own &#8216;personal online data store&#8217;, known as a POD. We can return the value that has been lost and restore control over personal data. With Solid, individuals decide how their data is managed, used, and shared. This approach has already begun to take root, as seen in Flanders, where every citizen now has their own POD after Jan Jambon announced four years ago that all Flanders citizens should have a POD. This is the future of data ownership and control, and it&#8217;s an example of the emergent movement that is poised to replace the outdated incumbent system.</p>
  51. <p data-renderer-start-pos="5891"><strong><span class="fabric-text-color-mark" data-renderer-mark="true" data-text-custom-color="#172b4d">Call for action</span></strong></p>
  52. <p data-renderer-start-pos="5908"><span class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak" dir="ltr">Realising this emergent movement won’t just happen &#8211; it requires support for the people leading the reform, from researchers to inventors to advocates. We must amplify and promote these positive use cases, and work to shift the collective mindset of global citizens. <a class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://webfoundation.org/" href="https://webfoundation.org/" target="_blank" rel="noreferrer noopener" aria-label="Vínculo The Web Foundation">The Web Foundation</a>, that I co-founded with Rosemary Leith, has and will continue to support and accelerate this emergent system and the people behind it. However, there is a need, an urgent need, for others to do the same, to back the morally courageous leadership that is rising, collectivise their solutions, and to overturn the online world being dictated by profit to one that is dictated by the needs of humanity. It is only then that the online ecosystem we all live in will reach its full potential and provide the foundations for creativity, collaboration and compassion.</span></p>
  53. <p> </p>
  54. <p>Tim Berners-Lee<br />12th March 2024</p>
  55. <p style="text-align: right;" data-renderer-start-pos="6777"> </p>
  56. <p></p><p>The post <a href="https://webfoundation.org/2024/03/marking-the-webs-35th-birthday-an-open-letter/">Marking the Web’s 35th Birthday: An Open Letter</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></content:encoded>
  57. </item>
  58. <item>
  59. <title>With the web becoming an increasingly monitored space, each of us has a role to play in safeguarding online privacy</title>
  60. <link>https://webfoundation.org/2022/12/with-the-web-becoming-an-increasingly-monitored-space-each-of-us-has-a-role-to-play-in-safeguarding-online-privacy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=with-the-web-becoming-an-increasingly-monitored-space-each-of-us-has-a-role-to-play-in-safeguarding-online-privacy</link>
  61. <comments>https://webfoundation.org/2022/12/with-the-web-becoming-an-increasingly-monitored-space-each-of-us-has-a-role-to-play-in-safeguarding-online-privacy/#respond</comments>
  62. <dc:creator><![CDATA[Web Foundation]]></dc:creator>
  63. <pubDate>Wed, 21 Dec 2022 17:25:26 +0000</pubDate>
  64. <category><![CDATA[General]]></category>
  65. <category><![CDATA[Contract for the Web]]></category>
  66. <category><![CDATA[privacy]]></category>
  67. <guid isPermaLink="false">https://webfoundation.org/?p=19467</guid>
  68. <description><![CDATA[<p><em>This post was written by <a href="https://webfoundation.org/about/executive-team/kaushalya-gupta/">Carlos Iglesias</a>, Senior Research Manager and originally published for <a href="https://wrp.lrfoundation.org.uk/with-the-web-becoming-an-increasingly-monitored-space-each-of-us-has-a-role-to-play-in-safeguarding-online-privacy/">The Lloyd&#8217;s Register Foundation World Risk Poll</a>.</em></p>
  69. <hr class="wp-block-separator has-css-opacity"/>
  70. <p>Across the world, in every culture and society, there is a notion of privacy and freedom. Those &#8230;</p>
  71. <p>The post <a href="https://webfoundation.org/2022/12/with-the-web-becoming-an-increasingly-monitored-space-each-of-us-has-a-role-to-play-in-safeguarding-online-privacy/">With the web becoming an increasingly monitored space, each of us has a role to play in safeguarding online privacy</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></description>
  72. <content:encoded><![CDATA[<p><em>This post was written by <a href="https://webfoundation.org/about/executive-team/kaushalya-gupta/">Carlos Iglesias</a>, Senior Research Manager and originally published for <a href="https://wrp.lrfoundation.org.uk/with-the-web-becoming-an-increasingly-monitored-space-each-of-us-has-a-role-to-play-in-safeguarding-online-privacy/">The Lloyd&#8217;s Register Foundation World Risk Poll</a>.</em></p>
  73. <hr class="wp-block-separator has-css-opacity"/>
  74. <p>Across the world, in every culture and society, there is a notion of privacy and freedom. Those may be established in different forms or fall under different categories, but they do exist, underpinned by international frameworks like the Universal Declaration of Human Rights. As our lives are increasingly played out online, the rules that protect the universal and fundamental right to privacy are of paramount importance.</p>
  75. <p>Today, the Web is one of the principal means by which individuals exercise their right to freedom of expression and information. It provides essential tools for participation and discussions concerning political and general interest issues. Online platforms are becoming the new public squares, where public discourse and debate take place. They provide a space for communities to come together, discuss, share ideas, and make change happen. They are now our town halls and our cafes, our libraries, and our newsagents.</p>
  76. <p><strong>A whole new set of privacy challenges</strong></p>
  77. <p>At the same time, fuelled by a drive towards more powerful and complex data analytics, and by the increasing amount and granularity of personal data available today, more and more of our online lives are under observation. We now face a whole new set of challenges regarding our privacy and data rights. Not just for the indelible data portions of our digital identity that we frequently and actively share ourselves, but also due to the sheer number of additional data points that are generated or attributed to us through monitoring and inference from our online activity – all too often without our knowledge.</p>
  78. <p>According to the latest Lloyd’s Register Foundation World Risk Poll report –&nbsp;<a href="https://wrp.lrfoundation.org.uk/2021-report-a-digital-world-perceptions-of-risk-from-ai-and-misuse-of-personal-data/" target="_blank" rel="noreferrer noopener"><em>A Digital World: Perceptions of risk from AI and misuse of personal data</em></a>, at least three out of four internet users worldwide are ‘very’ or ‘somewhat’ concerned that their personal information online could be stolen (77%) or used by companies for marketing purposes without their permission (74%). In addition, two-thirds of them (68%) are equally concerned that their personal data could be used by the government without their permission.</p>
  79. <p>While we are more aware of the perils of persistent online tracking, targeted advertising, and surveillance capitalism, we still don’t know much about how all that really works in the background, and to what extent it might affect our online and offline lives and privacy. This clearly limits our capacity to react, object and opt-out, generally leaving us without alternatives.</p>
  80. <p><strong>A deepening feeling of inequality</strong></p>
  81. <p>Moreover, the online world always mirrors and frequently amplifies offline harms and inequalities and, as a result, marginalized groups are also more acutely affected by safety and privacy issues. The World Risk Poll report also shows us how lower-income internet users or those who said they had experienced discrimination based on their skin colour, race/ethnicity, sex, religion, or disability status were also more likely to be very worried about possible misuses of their private information. This demonstrates how privacy challenges contribute to deepening inequality and make the web feel like a less welcoming place.</p>
  82. <p>There are increasing calls for new approaches towards respecting the data rights of individuals and communities and allowing users to retain a sphere of privacy and autonomy to explore the web freely and without the constant threat of interference or surveillance. People are demanding greater control over their privacy and stronger data rights. Strong privacy rules enable data use in a protective way. They stablish guidelines for the appropriate use of data based on its purpose and the surrounding circumstances.</p>
  83. <p>Our right to privacy demands more ambitious policy proposals and solid regulatory data protection frameworks. We need to start questioning current practices and look for more effective solutions. People and their privacy must be at the forefront of all discussions. That’s why the Web Foundation is calling on governments, companies, and citizens to build a new social&nbsp;<a href="https://contractfortheweb.org/" target="_blank" rel="noreferrer noopener">Contract for the Web</a>&nbsp;and adopt a shared set of commitments for respecting, protecting, and fulfilling people’s online data rights.</p>
  84. <p>Governments must preserve people’s personal data by establishing and enforcing comprehensive data protection frameworks and rights to foster online trust. Companies must give every user options to access online content and use online services that protect their privacy. Citizens should take proactive steps to protect their individual and collective privacy and security by demanding privacy-enhanced products and services and articulating privacy preferences accordingly.</p>
  85. <p>Everyone has a role to play in safeguarding privacy online so we can use the internet safely and without fear.</p><p>The post <a href="https://webfoundation.org/2022/12/with-the-web-becoming-an-increasingly-monitored-space-each-of-us-has-a-role-to-play-in-safeguarding-online-privacy/">With the web becoming an increasingly monitored space, each of us has a role to play in safeguarding online privacy</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></content:encoded>
  86. <wfw:commentRss>https://webfoundation.org/2022/12/with-the-web-becoming-an-increasingly-monitored-space-each-of-us-has-a-role-to-play-in-safeguarding-online-privacy/feed/</wfw:commentRss>
  87. <slash:comments>0</slash:comments>
  88. </item>
  89. <item>
  90. <title>Online Gender-Based Violence Story &#8211; Maria, Costa Rica</title>
  91. <link>https://webfoundation.org/2022/12/online-gender-based-violence-story-maria-costa-rica/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=online-gender-based-violence-story-maria-costa-rica</link>
  92. <dc:creator><![CDATA[Web Foundation]]></dc:creator>
  93. <pubDate>Thu, 01 Dec 2022 23:00:43 +0000</pubDate>
  94. <category><![CDATA[General]]></category>
  95. <category><![CDATA[women's rights online]]></category>
  96. <guid isPermaLink="false">https://webfoundation.org/?p=19447</guid>
  97. <description><![CDATA[<p><img fetchpriority="high" decoding="async" width="570" height="278" src="https://webfoundation.org/docs/2022/12/1366x768-copy-1-570x278.jpg" alt="" class="wp-image-19448" srcset="https://webfoundation.org/docs/2022/12/1366x768-copy-1-570x278.jpg 570w, https://webfoundation.org/docs/2022/12/1366x768-copy-1-280x137.jpg 280w, https://webfoundation.org/docs/2022/12/1366x768-copy-1-118x58.jpg 118w, https://webfoundation.org/docs/2022/12/1366x768-copy-1-768x375.jpg 768w, https://webfoundation.org/docs/2022/12/1366x768-copy-1-1536x750.jpg 1536w, https://webfoundation.org/docs/2022/12/1366x768-copy-1-2048x1000.jpg 2048w" sizes="(max-width: 570px) 100vw, 570px" /></p>
  98. <h2 class="wp-block-heading">Activists are particularly vulnerable to online gender-based violence, especially when they threaten profits and challenge corporate greed. Maria’s story shows the potential for what can be achieved when women feel empowered to use digital technology to advocate for their communities, </h2>
  99. <p>&#8230;</p>
  100. <p>The post <a href="https://webfoundation.org/2022/12/online-gender-based-violence-story-maria-costa-rica/">Online Gender-Based Violence Story – Maria, Costa Rica</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></description>
  101. <content:encoded><![CDATA[<figure class="wp-block-image size-large"><img decoding="async" width="570" height="278" src="https://webfoundation.org/docs/2022/12/1366x768-copy-1-570x278.jpg" alt="" class="wp-image-19448" srcset="https://webfoundation.org/docs/2022/12/1366x768-copy-1-570x278.jpg 570w, https://webfoundation.org/docs/2022/12/1366x768-copy-1-280x137.jpg 280w, https://webfoundation.org/docs/2022/12/1366x768-copy-1-118x58.jpg 118w, https://webfoundation.org/docs/2022/12/1366x768-copy-1-768x375.jpg 768w, https://webfoundation.org/docs/2022/12/1366x768-copy-1-1536x750.jpg 1536w, https://webfoundation.org/docs/2022/12/1366x768-copy-1-2048x1000.jpg 2048w" sizes="(max-width: 570px) 100vw, 570px" /></figure>
  102. <h2 class="wp-block-heading">Activists are particularly vulnerable to online gender-based violence, especially when they threaten profits and challenge corporate greed. Maria’s story shows the potential for what can be achieved when women feel empowered to use digital technology to advocate for their communities, and are able to overcome the threats that they face.</h2>
  103. <p></p>
  104. <p>Maria, 45, has been working the land since she was born. She loves the beautiful place she grew up &#8211; where the rainforest meets the sea &#8211; as well as the Afro-Caribbean culture and ways of life of her community.  Many generations of her family have lived here. Her family taught h</p>
  105. <p>er to work with a variety of crops and farm animals. It is very important for her community that the small farms can ensure food security. Together with other women in her community, she is committed to maintaining the dignity and pride of being farmers.</p>
  106. <p>In Costa Rica it is said that there are two countries, that of the great metropolitan area where the opportunities and services are centred and the coastal and border areas where people live in more vulnerable conditions. This is exacerbated by multinationals who, for the past 20 years, have been settling in the poorest areas of the country to plant monoculture crops, threatening not only the ecosystems, but also&nbsp; inhabitants of the communities who are expelled to make place for large plantations.&nbsp;&nbsp;</p>
  107. <p>Where Maria lives, pineapple cultivation has been expanding at great speed. The water of the rivers and seas has been contaminated with chemicals, and the area has been inundated with pests related to pineapple farming, such as flies.&nbsp;</p>
  108. <p>Distressed by these changes, Maria set out to defend her beloved land, culture and community&#8217;s way of life. She understands that food security must be defended, that water sources must not be damaged, that biodiversity must be preserved, and that the way her community lives, based on generations of farmers and rural culture, must be protected.&nbsp;</p>
  109. <p>So she and her companions decided to start organising the community. They began to use WhatsApp to create work groups, send documents, and make calls for people to join the struggle against the multinational. They begin to use social networks to build a network of alliances at the national and international level. They use photographs taken with their cell phones to document evidence of the environmental and social impacts of the pineapple plantation. They also used digital communication to advocate their cause with journalists, congress and lawyers, encouraging these influential individuals to take up their cause.&nbsp;</p>
  110. <p><strong>Growing a mass movement</strong></p>
  111. <p>But this digital activism opened Maria and her allies to abuse, as is often the case with highly visible female activists. The same channels Maria used to create a social movement were also used to persecute and threaten the activists and their families, especially their daughters. As Maria’s efforts expanded into a national movement against abuse by multinationals, attempts to silence and discredit Maria and her allies intensified, with personal details about her life shared in an attempt to intimidate her.&nbsp;</p>
  112. <p>Although Maria was scared by these threats, she has continued her work, as the problems which led to her activism remain in her country and community. After more than four years of work, this network of organisations led by María and her colleagues succeeded in limiting the expansion of pineapple in the country, but the multinationals have not gone away, and they are constantly pushing to appropriate land.&nbsp;&nbsp;</p>
  113. <p>Students, social movements, political parties, lawyers, journalists and, above all, other communities have joined the struggle against monoculture. All communication is done through digital media, and, because of the experiences of the women at the front of this struggle, extra has been paid to ensuring that digital safety and security is prioritised as part of planning and coordination. This is a constant struggle and women are leading the way.</p>
  114. <p></p>
  115. <p><em><strong>This story was told with assistance from <a href="http://www.sulabatsu.com/" data-type="URL" data-id="http://www.sulabatsu.com/">Sula Batsu</a>, a member of the Women’s Rights Online (WRO) network.</strong></em></p><p>The post <a href="https://webfoundation.org/2022/12/online-gender-based-violence-story-maria-costa-rica/">Online Gender-Based Violence Story – Maria, Costa Rica</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></content:encoded>
  116. </item>
  117. <item>
  118. <title>Online Gender-Based Violence Story &#8211; Aisha, Nigeria</title>
  119. <link>https://webfoundation.org/2022/12/online-gender-based-violence-story-aisha-nigeria/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=online-gender-based-violence-story-aisha-nigeria</link>
  120. <dc:creator><![CDATA[Web Foundation]]></dc:creator>
  121. <pubDate>Thu, 01 Dec 2022 22:44:14 +0000</pubDate>
  122. <category><![CDATA[General]]></category>
  123. <guid isPermaLink="false">https://webfoundation.org/?p=19441</guid>
  124. <description><![CDATA[<p><img decoding="async" width="570" height="380" src="https://webfoundation.org/docs/2022/12/Picture1-570x380.jpg" alt="" class="wp-image-19442" srcset="https://webfoundation.org/docs/2022/12/Picture1-570x380.jpg 570w, https://webfoundation.org/docs/2022/12/Picture1-280x187.jpg 280w, https://webfoundation.org/docs/2022/12/Picture1-118x79.jpg 118w, https://webfoundation.org/docs/2022/12/Picture1.jpg 602w" sizes="(max-width: 570px) 100vw, 570px" /></p>
  125. <h2 class="wp-block-heading">A prominent activist of one of the most visible online campaigns in recent years reflects on a life led with the constant threat of attacks and online gender based violence, and the need for resilience as well as policy changes </h2>
  126. <p>&#8230;</p>
  127. <p>The post <a href="https://webfoundation.org/2022/12/online-gender-based-violence-story-aisha-nigeria/">Online Gender-Based Violence Story – Aisha, Nigeria</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></description>
  128. <content:encoded><![CDATA[<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="570" height="380" src="https://webfoundation.org/docs/2022/12/Picture1-570x380.jpg" alt="" class="wp-image-19442" srcset="https://webfoundation.org/docs/2022/12/Picture1-570x380.jpg 570w, https://webfoundation.org/docs/2022/12/Picture1-280x187.jpg 280w, https://webfoundation.org/docs/2022/12/Picture1-118x79.jpg 118w, https://webfoundation.org/docs/2022/12/Picture1.jpg 602w" sizes="(max-width: 570px) 100vw, 570px" /></figure>
  129. <h2 class="wp-block-heading">A prominent activist of one of the most visible online campaigns in recent years reflects on a life led with the constant threat of attacks and online gender based violence, and the need for resilience as well as policy changes to protect online diversity.<strong> </strong></h2>
  130. <p></p>
  131. <p></p>
  132. <p><a href="https://en.wikipedia.org/wiki/Aisha_Yesufu"><strong>Aisha</strong></a><strong>, co-convener of the famous “#BringBackOurGirls” movement, a movement pushing for the rescue of the 276 girls kidnapped from a boarding high school in Northern Nigeria by a terrorist group in 2014, never calls herself an activist or even a human rights defender. She says she is an ordinary citizen, who is active.&nbsp;</strong></p>
  133. <p></p>
  134. <p></p>
  135. <p>Aisha was born and bred in Kano, in Northern Nigeria, and remembers challenging authority, from as far back as when she was only 4-years old. She was a very vocal child, sometimes to the chagrin of close family and friends. Her father was a strong vocal personality, who believed in girl-child education and encouraged his girl-children to have independent informed opinions about current issues. </p>
  136. <p>In 1992 while in the university, Aisha joined her first public protest. It had been against the clear instruction of her parents who were afraid she may be expelled from University. They had paid a huge price for Aisha to have access to quality education despite their financial difficulty which made it even difficult to feed the family at times. Aisha’s dream from childhood was to be financially independent. “When you are poor, you are nameless, faceless, and voiceless,” she says, and she gets livid when she sees politicians weaponizing poverty. “It&#8217;s a debilitating thing. It cancels you. The greatest ‘cancel culture’ is poverty, nothing else. People look right through you and don’t see you at all.”&nbsp;</p>
  137. <p><strong>The beginning of a crisis </strong></p>
  138. <p>On February 25, 2014, 59 boys were killed at the Federal Government College of Buni Yadi in Yobe State, Nigeria. 24 buildings of the school were also burned down as a result of the attack. No group claimed responsibility for the attack, but according to media and local officials, the radical Islamist militants Boko Haram were suspected to be behind the attack.&nbsp;</p>
  139. <p>Barely two months later, 276 girls were kidnapped in the dead of the night from their high school dormitory by the same terrorist group. On the 30th of April, Aisha marched in street protests for the rescue of the girls to the Nigerian National Assembly. Aisha did not even know about ‘Twitter’ until a few days afterwards. It had been planned at the protest that protesters were to share ‘the #BringBackOurGirls’ hashtag hourly. So Aisha downloaded the Twitter app, and her very first tweet was ‘#BringBackOurGirls.’&nbsp;</p>
  140. <p>The online movement grew, drawing enormous local and global attention, putting the government of the day under immense pressure and forcing them not only to focus on the kidnapped girls but the issue of terrorism happening in&nbsp; North East Nigeria more broadly.&nbsp;</p>
  141. <p><strong>An intensely personal pain&nbsp;</strong></p>
  142. <p>The kidnapping forced Aisha to sit back and reflect on her past and this forced reflection shook her deeply. “31 years ago, I was the ‘Chibok girl’ who would have been kidnapped.” says Aisha. “I was fighting to stay in and to finish school. I was fighting to take care of myself and my family.” During the protests, as she led the march to the office of the then chief of defence staff,&nbsp; Aisha had broken down and wept. “I just put my head in my hands and I cried. It was a lot of emotions to deal with. It had been very difficult for me to go to school, because many people in my community did not want the education of a girl-child. I know what it is like being insulted and attacked for being in school. And I knew if I would have been abducted while writing my final exams in high school in 1991, my parents would never have been able to challenge anyone into action because they were poor and no one would have paid them any attention. I knew I could have been abducted several years ago and not been alive today. So for me, the whole thing became quite personal.”&nbsp;</p>
  143. <p>The ‘#BringBackOurGirls’ movement continues to have up to 100 active members at any given time, and is given to peaceful protests and advocacy with government for the rescue of all kidnapped girls in captivity of terrorist groups in Nigeria. Beyond these issues, Aisha has gone on since 2014 with consistent activism to demand for government accountability and an end to impunity, pushing back against human rights violations, advocating for women’s rights and for democracy and good governance. She actively criticises government’s work in context of policies and programmes and as expected, she has attracted both good and ‘not-so-good’ attention, making quite a number of enemies.  </p>
  144. <p><strong>Refusing to be silenced</strong></p>
  145. <p>Aisha is very vocal on Twitter and is particularly critical of the Nigerian President and his government. She has, inevitably, faced abuse for her activism. “People expectedly have come after me but I typically don’t mind what people are saying. The aim of these online attacks is to silence you. And one thing I have noticed is that a lot of people&#8217;s voices have been shut down by these attacks online, especially female voices. Many are now afraid they will be attacked and are afraid of airing their views. That’s why I take on the bullies, I learned that bullies thrive on people&#8217;s silence. They will come in droves but we need to fight back.”</p>
  146. <p>Aisha has also been constantly abused online about having a “big mouth,’ with someone once tweeting a picture of her side-by-side with a baboon. She has been called “mentally challenged” due to a curse, while others accuse her of being an ‘immodest woman’ especially for leading protests wearing the Hijab. People often also spread lies online about Aisha, for instance insisting that she is being sponsored by some foreign or partisan groups, or that her husband who is a retired public servant has been convicted of corruption.&nbsp;</p>
  147. <p>In 2019, a decisive election year in Nigeria, the attacks advanced beyond being called names online. “In the year 2019, it would seem that about every two months or so, my Twitter account would be taken down. I think there was mass reporting. I didn&#8217;t do anything wrong. And I said if Twitter would get my account suspended, I&#8217;m not going to come back to Twitter again. But there were people who actually took up the case and worked on it and then Twitter kept restoring my account each time this would happen.”&nbsp;</p>
  148. <p><strong>All in a day’s work</strong></p>
  149. <p>Aisha generally thinks of being attacked offline or online as a job-hazard. She isn&#8217;t quiet in the face of bullying and doesn’t run from a fight. She had joined the 2020 #EndSARS protests in Nigeria with excitement and enthusiasm, happy that the Nigeria youth had finally woken up and were taking the lead in the struggle for human rights. She had taken to Twitter to encourage the young Nigerians leading the protests to focus and avoid all distractions, until the government met their conditions.&nbsp;</p>
  150. <p>Aisha is used to triggering people just for being a woman who does not fit the stereotypes. However, some attacks have been too sinister for Aisha to gloss over.&nbsp;</p>
  151. <p>“I can ignore a lot of things,” Aisha says. “But not things like being looked upon as a terrorist. For an investigative journalist to allude to the fact that I am a terrorist-sympathiser on Twitter? People asked me to just ignore him, but I know where he&#8217;s coming from. When someone is linking a Muslim hijab wearing woman to terrorism, that is deliberate, they know what they are doing! You can’t just ignore them.” Livid, Aisha dared the journalist to come forward publicly with any data he may have on her and she fought back.</p>
  152. <p>“Silence encourages bullies. There is such a thing as self-defence. People threaten to beat me up and say openly they&#8217;re going to kill me. People called for my killing during the #ENDSARS protest, there was an actor that mentioned that I should be lynched. I have three sisters who look like me, and some people actually confuse us for one another. One of them, her husband, has had to make her cover her face completely, because of harassment she has been subjected to publicly. Another was once attacked in the market. So online attacks sometimes are not just exchange of words, they can also have serious ramifications offline.”&nbsp;</p>
  153. <p>Aisha is very conscious about her security. Geolocations features are permanently turned off on phones and apps and she makes no posts about where exactly she is at or about where she is going to be. But she also doesn&#8217;t take threats too much to heart because she thinks that if it’s her time, she’ll die anyway. “When it&#8217;s time for my death, I&#8217;m going to die anyway, and if anyone wants to take that decision to be the one to kill me, fine and good.”</p>
  154. <p><strong>Finding a safety net</strong></p>
  155. <p>In the midst of these attacks, Aisha says she has had tremendous support from various stakeholder groups. When her Twitter account was being repeatedly taken down, people stood up for her.</p>
  156. <p>“A lot of people in tech and advocacy fought for me and reached out to help me. Nigerians defended me on Twitter. I felt Twitter’s support at this time and there were just many Nigerians from within and outside the country in the tech and advocacy ecosystem, who did everything to ensure that so I had that level of support. Honestly, I think my supporters may be the silent majority. Most of them just don&#8217;t say anything publicly for fear of backlash. But when I meet people privately, they are following my work and telling me how much what I do means to them. These people who support me publicly and privately are my support system. My family is amazing. My husband is a huge support. My husband is a gentle giant, he won’t speak or hurt a fly, just as long as you don’t touch Aisha.”&nbsp;</p>
  157. <p>Aisha thinks stakeholders are not doing enough to keep citizens safe online, especially women and girls who suffer disproportionately from online abuse as a continuum of the systemic inequalities and barriers faced offline.&nbsp;</p>
  158. <p>The Nigerian Cybercrime Act of 2015 does not specifically criminalize cyber violence against women, gender-based slurs, or misogyny online. Still the law addresses certain important aspects of cyber violence in mentioning ‘cyberstalking’ and ‘pornographic messages.’ However, there are no clear reporting mechanisms, the police hardly takes reports of violence against women online seriously, and official rate of reporting is not known. Evidence suggests that women are generally more prone to behaviours such as self-censorship or not using social media or data due to online safety concerns. In the recent context of COVID-19, the restrictions on movement and the spike in the rates of violence against women (both offline and online) limited access to justice, support systems and social services even more severely.&nbsp;</p>
  159. <p>Aisha wants a safer environment for people online, in order to bring more diverse voices to the online space and to ensure freedom of expression for everyone.  In terms of coping with online violence, Aisha doesn’t think much help is coming from ‘outside’ anytime soon. She thinks it&#8217;s best to focus on building internal resilience meanwhile and this is Aisha’s way of dealing with bullies. “Twitter is a bit more proactive than the rest. The issue with my Facebook account has still not been resolved till date. Sometimes, it seems nobody is really listening and nothing is being done. It is very important for people to know and be accepting of who they are and not be on social media to seek external validation. You have to get to the place where you can accept and assert yourself, flaws, imperfections and all. Knowledge is also very important. That&#8217;s one of the key things that you can use to engage meaningfully online. Learn more, read more, and be very open. And at the end of day, you know, develop that thick skin.” </p>
  160. <p></p>
  161. <p><em><strong>This story was told with assistance from <a href="https://techsocietal.org/" data-type="URL" data-id="https://techsocietal.org/">Tech Societal</a>, a member of the Women’s Rights Online (WRO) network.</strong></em></p><p>The post <a href="https://webfoundation.org/2022/12/online-gender-based-violence-story-aisha-nigeria/">Online Gender-Based Violence Story – Aisha, Nigeria</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></content:encoded>
  162. </item>
  163. <item>
  164. <title>Asia-Pacific IGF 2022: Takeaways on Tackling Deceptive Design Across the Asia-Pacific Region</title>
  165. <link>https://webfoundation.org/2022/11/asia-pacific-igf-2022-takeaways-on-tackling-deceptive-design-across-the-asia-pacific-region/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=asia-pacific-igf-2022-takeaways-on-tackling-deceptive-design-across-the-asia-pacific-region</link>
  166. <comments>https://webfoundation.org/2022/11/asia-pacific-igf-2022-takeaways-on-tackling-deceptive-design-across-the-asia-pacific-region/#respond</comments>
  167. <dc:creator><![CDATA[Web Foundation]]></dc:creator>
  168. <pubDate>Wed, 30 Nov 2022 12:39:32 +0000</pubDate>
  169. <category><![CDATA[General]]></category>
  170. <category><![CDATA[deceptive design]]></category>
  171. <category><![CDATA[IGF]]></category>
  172. <category><![CDATA[tpdl]]></category>
  173. <guid isPermaLink="false">https://webfoundation.org/?p=19438</guid>
  174. <description><![CDATA[<p><em>This blog post was written by Kaushalya Gupta, Policy Program Manager and Lead on the Tech Policy Design Lab on Tackling Deceptive Design and Moving Towards Trusted Design</em></p>
  175. </p>
  176. <p>The use of deceptive designs, also known as ‘dark patterns’, is harming &#8230;</p>
  177. <p>The post <a href="https://webfoundation.org/2022/11/asia-pacific-igf-2022-takeaways-on-tackling-deceptive-design-across-the-asia-pacific-region/">Asia-Pacific IGF 2022: Takeaways on Tackling Deceptive Design Across the Asia-Pacific Region</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></description>
  178. <content:encoded><![CDATA[<p><em>This blog post was written by Kaushalya Gupta, Policy Program Manager and Lead on the Tech Policy Design Lab on Tackling Deceptive Design and Moving Towards Trusted Design</em></p>
  179. <p></p>
  180. <p>The use of deceptive designs, also known as ‘dark patterns’, is harming consumer safety, privacy, and trust around the world. Default design practices like these are widespread in the Asia Pacific, preventing <a href="https://asiapacific.unfpa.org/en/populationtrends">60% of the world&#8217;s population</a> from leveraging the internet to its full potential.</p>
  181. <p>The <a href="https://www.youtube.com/watch?v=Oatre06T1GY">Web Foundation’s panel and workshop at the Asia-Pacific Internet Governance Forum</a>, held in Singapore in September 2022, brought together around 100 participants, offline and online, comprising researchers, policy experts, designers, entrepreneurs, and members of civil society. Together, we mapped out the gaps in designing for digital products and platforms and the particular challenges for the people in the region, identified major blocks in existing efforts, and discussed solution models that combine design, advocacy, and innovative policymaking to advance an alternative future with trusted design.</p>
  182. <figure class="wp-block-image"><img decoding="async" src="https://lh5.googleusercontent.com/AyACBQmrdTfmJB9CqjuA4vOvXuQ7UxILXc3Kgtx3oIqo3JZ3KbAahiXNqo2CQE7jfgTrIDD079zUniCQH4eTGsaIXAADiX7CyDG5av9d_o7sthwJBhRXBn9L1AF4j5FGolQXY9m8W_IFuc3pIpx-GKtrV1_QHQsPqHwZEYIP9V4RwdtjH5_AXWE" alt=""/></figure>
  183. <p><em>&nbsp;Sage Cheng, Access Now (left) and Kaushalya Gupta, Web Foundation (centre) at the Asia-Pacific Internet Governance Forum session moderated by Anju Mangal (right)</em></p>
  184. <p>The following five takeaways represent key challenges and opportunities in tackling deceptive designs in Asia-Pacific:</p>
  185. <ul><li><strong>The term may be unfamiliar, but the experience is widely shared</strong>: While the terms ‘deceptive design’ and ‘dark patterns’ were relatively new to the audience at the Internet Governance Forum, almost every participant in the workshop had lived experiences of being tricked by deceptive designs. In addition, participants were appreciative of Web Foundation’s <a href="https://webfoundation.org/2022/01/deceptive-design-untangled/">shift to the term ‘deceptive design’</a> from the original term ‘dark patterns’, which also served as an impetus for Harry Brignull who coined the term ‘dark patterns’ to <a href="https://www.deceptive.design/about-us">adopt the new term</a>.</li></ul>
  186. <ul><li><strong>Deceptive design leads to disempowerment</strong>: Beni Chugh’s research explores common deceptive designs and their adverse effects on consumers in India through a financial inclusion lens. In short, users are being misled into signing up for financial products they may not need. Additionally, deceptive designs interfere with democratic processes and influence citizens&#8217; political choices. As a result of these incursions into users&#8217; autonomy, web users are largely disenfranchised and disempowered. Beni Chugh’s <a href="https://www.dvara.com/research/blog/2021/04/23/unpacking-dark-patterns-understanding-dark-patterns-and-their-implications-for-consumer-protection-in-the-digital-economy/">research paper</a> concludes with open questions that India must contend with when regulating deceptive designs.&nbsp;&nbsp;</li></ul>
  187. <ul><li><strong>Deceptive design comes with a cost</strong>: Chandni Gupta’s presentation looked closely into ten of the most common deceptive designs in Australia, based on the recent <a href="https://cprc.org.au/dupedbydesign/">Duped by Design</a> report published by the Consumer Policy Research Centre. These practices take a toll on the emotional wellbeing of users, their finances, and the control over their personal information, and can also come with a cost to businesses. While 83% of Australians surveyed in the study have experienced one or more negative consequences of deceptive designs, only 58% were aware that organisations use deceptive designs to influence them to behave in a certain way. A consumer-centric approach from businesses, regulators and government could help mitigate consumer harm.&nbsp;</li></ul>
  188. <ul><li><strong>Collaboration is key to developing solutions</strong>: Kaushalya Gupta showcased the Web Foundation&#8217;s <a href="https://techlab.webfoundation.org/">Technology Policy Design Lab</a> work to spark collaborative efforts with stakeholders and to make effective policy decisions to combat deceptive designs and adopt trusted designs. The <a href="https://webfoundation.org/2022/08/towards-trusted-design-takeaways-from-prototyping-the-future/">six opportunity areas for moving toward trusted design, have been developed with input from over 100 experts from over 30 countries.</a> These include principles and guidelines mentioned above, public awareness campaigns, a crowdsourced reporting tool, an evaluation framework, a global accreditation system, and an internationally applicable regulatory framework.&nbsp;</li></ul>
  189. <p>During the co-creation workshops, public gatherings at conferences and events, consultations, and key informant interviews undertaken as part of the Web Foundation’s research, it emerged that designers do not want to make deceptive design, and most platforms do not want to perpetuate these practices but are somewhat constrained by growth models in a data-driven digital economy. Therefore, solutions must be discussed openly with stakeholders representing different sectors and regions in order to be agreed upon and implemented.</p>
  190. <ul><li><strong>A checklist of dos and don’ts can come in handy for designers and beyond</strong>: Sage Cheng gave an overview of the <a href="https://www.accessnow.org/cms/assets/uploads/2022/11/No-more-deceptive-designs_dos-and-donts-for-responsible-user-experience-practice-11-2022.pdf">Dos and Don&#8217;ts Checklist</a> that is currently under development for designers to consider in their UX/UI practices. Thigs list is an ongoing collaborative effort of a group of designers, researchers, technologists, and civil society members convened at gatherings such as <a href="https://www.rightscon.org/">RightsCon</a>, <a href="https://www.interaction22.ixda.org/">Interaction 22</a>, <a href="https://www.mozillafestival.org/en/">MozFest</a>, and the Web Foundation’s <a href="https://techlab.webfoundation.org/">Tech Policy Design Lab</a>. </li></ul>
  191. <p>By taking a design-led approach, the Web Foundation’s Tech Policy Design Lab is currently developing a portfolio of UX/UI prototypes to demonstrate a set of ‘trusted design’ principles. These principles were co-created by stakeholders across the globe through a series of workshops held in collaboration with 3&#215;3 and Simply Secure. According to these design principles, digital products and platforms should respect human rights, ensure equitability and accessibility, stay informative and transparent to people who are using them, prioritise at-risk communities, and keep the product experience burden-free.&nbsp;</p>
  192. <p>Deceptive design has been a difficult problem to tackle, partially because the language we use to address deceptive design means different things to different stakeholders. Also, the interventions often come in silos, whether it is policy and regulations or ethical design initiatives in the Asia-Pacific region, a challenge trusted and responsible design advocates are grappling with globally. While there are several actors working in similar spaces and issues, they are often not seen to be working on the ‘deceptive design’ or ‘dark patterns’ issue per se. Participants were encouraged to continue collaborating on this issue at the Web Foundation’s Tech Policy Design Lab. We will submit the outcomes of the Lab to the UN Global Digital Compact to lay out shared principles for an open, free and secure digital future.</p>
  193. <p>To learn more about the deceptive design issue in the Asia-Pacific region, we have put together a reading list below:</p>
  194. <p>Australia</p>
  195. <ul><li><a href="https://cprc.org.au/dupedbydesign/">Duped by design – Manipulative online design: Dark patterns in Australia</a> by the Consumer Policy Research Centre</li><li><a href="https://search.informit.org/doi/10.3316/agispt.20220929075061">The choice mirage: how Australian consumers are being duped online via dark patterns</a> by Chandni Gupta</li><li><a href="https://www.choice.com.au/consumers-and-data/data-collection-and-use/how-your-data-is-used/articles/deceptive-dark-patterns-explainer">Wait, what&#8217;s in my cart? The hidden cost of website &#8216;dark patterns&#8217;</a> by Chandni Gupta</li></ul>
  196. <p>India</p>
  197. <ul><li><a href="https://www.pranavainstitute.com/post/publish-alert-unboxing-tech-toolkit">Unboxing Tech Toolkit</a> by Titiksha Vashist and Shyam Krishnakumar</li><li><a href="https://www.dvara.com/research/blog/2021/04/23/unpacking-dark-patterns-understanding-dark-patterns-and-their-implications-for-consumer-protection-in-the-digital-economy/">Unpacking dark patterns: understanding dark patterns and their implications for consumer protection in the digital economy</a> by Beni Chugh and Pranjal Jain</li><li><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4178549">Positive or zero-sum game: When privacy by design meets dark patterns</a> by Karthik Venkatesh and Kamesh Shekar</li><li><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4178549">Looking at Dark Patterns in Light of the Competition Law in India</a> by Renu Gupta and Akshat Bhushan</li></ul>
  198. <p>Korea</p>
  199. <ul><li><a href="https://www.kimchang.com/en/insights/detail.kc?sch_section=4&amp;idx=24995">Expected Strengthening of Regulation of Dark Patterns</a> by Kim &amp; Chang</li></ul>
  200. <p>New Zealand</p>
  201. <ul><li><a href="https://theconversation.com/many-of-new-zealands-most-popular-websites-use-dark-patterns-to-manipulate-users-is-it-time-to-regulate-169538">Many of New Zealand’s most popular websites use ‘dark patterns’ to manipulate users – is it time to regulate?</a> By Cherie Lacey and Alex Beattie</li></ul>
  202. <p>South-East Asia</p>
  203. <ul><li><a href="https://kr-asia.com/under-the-spotlight-dark-patterns-in-southeast-asias-e-commerce-marketplaces">Under the spotlight: Dark patterns in Southeast Asia’s e-commerce marketplaces</a> by Lin Lingyi</li></ul><p>The post <a href="https://webfoundation.org/2022/11/asia-pacific-igf-2022-takeaways-on-tackling-deceptive-design-across-the-asia-pacific-region/">Asia-Pacific IGF 2022: Takeaways on Tackling Deceptive Design Across the Asia-Pacific Region</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></content:encoded>
  204. <wfw:commentRss>https://webfoundation.org/2022/11/asia-pacific-igf-2022-takeaways-on-tackling-deceptive-design-across-the-asia-pacific-region/feed/</wfw:commentRss>
  205. <slash:comments>0</slash:comments>
  206. </item>
  207. <item>
  208. <title>Online Gender-Based Violence Story &#8211; Isabella, Peru</title>
  209. <link>https://webfoundation.org/2022/11/online-gender-based-violence-story-isabella-peru/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=online-gender-based-violence-story-isabella-peru</link>
  210. <dc:creator><![CDATA[Web Foundation]]></dc:creator>
  211. <pubDate>Mon, 28 Nov 2022 13:01:04 +0000</pubDate>
  212. <category><![CDATA[General]]></category>
  213. <guid isPermaLink="false">https://webfoundation.org/?p=19436</guid>
  214. <description><![CDATA[<p><img loading="lazy" decoding="async" width="570" height="278" src="https://webfoundation.org/docs/2022/11/1366x768-copy-570x278.jpg" alt="" class="wp-image-19435" srcset="https://webfoundation.org/docs/2022/11/1366x768-copy-570x278.jpg 570w, https://webfoundation.org/docs/2022/11/1366x768-copy-280x137.jpg 280w, https://webfoundation.org/docs/2022/11/1366x768-copy-118x58.jpg 118w, https://webfoundation.org/docs/2022/11/1366x768-copy-768x375.jpg 768w, https://webfoundation.org/docs/2022/11/1366x768-copy-1536x750.jpg 1536w, https://webfoundation.org/docs/2022/11/1366x768-copy-2048x1000.jpg 2048w" sizes="(max-width: 570px) 100vw, 570px" /></p>
  215. <h2 class="wp-block-heading">When online gender-based violence is of an intimate nature, and takes the form of “revenge porn” or other sexual attacks, it is often very difficult for survivors to come forward, out of a sense of embarrasment or shame. Isabella’s story </h2>
  216. <p>&#8230;</p>
  217. <p>The post <a href="https://webfoundation.org/2022/11/online-gender-based-violence-story-isabella-peru/">Online Gender-Based Violence Story – Isabella, Peru</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></description>
  218. <content:encoded><![CDATA[<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="570" height="278" src="https://webfoundation.org/docs/2022/11/1366x768-copy-570x278.jpg" alt="" class="wp-image-19435" srcset="https://webfoundation.org/docs/2022/11/1366x768-copy-570x278.jpg 570w, https://webfoundation.org/docs/2022/11/1366x768-copy-280x137.jpg 280w, https://webfoundation.org/docs/2022/11/1366x768-copy-118x58.jpg 118w, https://webfoundation.org/docs/2022/11/1366x768-copy-768x375.jpg 768w, https://webfoundation.org/docs/2022/11/1366x768-copy-1536x750.jpg 1536w, https://webfoundation.org/docs/2022/11/1366x768-copy-2048x1000.jpg 2048w" sizes="(max-width: 570px) 100vw, 570px" /></figure>
  219. <h2 class="wp-block-heading">When online gender-based violence is of an intimate nature, and takes the form of “revenge porn” or other sexual attacks, it is often very difficult for survivors to come forward, out of a sense of embarrasment or shame. Isabella’s story shows that, with courage, survivors can come forward to educate others about their experiences, and that solutions need to place the blame on the perpetrators and deal with their actions.</h2>
  220. <p></p>
  221. <p>Isabella is a 17 year-old teenage girl. She was born in Jauja, a region in the central highlands of Perú, in a traditional household. They moved to Lima when Isabella was a child and was about to start school. She’s the oldest of 3 siblings and since there’s a 10 year gap between her and her youngest sister, she has been involved with her care and upbringing. She’s seen as a role model in her family and has developed a strong sense of security, which brings with it a lot of pressure.</p>
  222. <p>She lives in Carabayllo, in the northern area of the city of Lima. Carabayllo is known to be a lower-income district. Internet connection is not very good there and expensive given her family’s means,, and there are not many options of service providers available. During the pandemic Isabella and her classmates had a rough time adapting to online classes and feel as if they have lost a lot of time. This makes Isabella frustrated about her future and overall education, and impacts her motivation.</p>
  223. <p>But even in this difficult context, Isabella faced an even more acute and distressing challenge. She recently discovered that her ex-boyfriend &#8211; who she broke up with 2 months ago because he was becoming increasingly possessive &#8211; has shared intimate photos of her online.</p>
  224. <p>She felt very ashamed and didn&#8217;t know who to talk to. Her family was not an option, because her parents didn’t approve of her relationship and its potential impact on her studies and family responsibilities. But when she met him, she felt free and enjoyed his company, and began to trust him very quickly. As a teenager, newly exploring her sexuality, she shared intimate photos with him, thinking it was a safe way to express herself.</p>
  225. <p><strong>Knowledge is power</strong><br>At first, she didn’t even know how to put into words how she felt. She knew she had been betrayed, but also felt guilty for trusting in him in the first place. She decided to confront him and ask him for explanations. However, before doing that, she began researching online for guidance on the implications and consequences of her choice.</p>
  226. <p>Her research confirmed that she had been a victim of a type of gender-based violence. She also learnt that she would potentially have to deal with her images becoming viral, and not knowing who had access to her images. She prepared herself for retaliation if she confronted him, and for the situation to become worse, but knew it was her only option and chance to hold him accountable for his actions. As expected, her confrontation was met with threats and further abuse.</p>
  227. <p></p>
  228. <p><em><strong>This story was told with assistance from <a href="https://hiperderecho.org/" data-type="URL" data-id="https://hiperderecho.org/">Hiperderecho</a>, a member of the Women’s Rights Online (WRO) network.</strong></em></p><p>The post <a href="https://webfoundation.org/2022/11/online-gender-based-violence-story-isabella-peru/">Online Gender-Based Violence Story – Isabella, Peru</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></content:encoded>
  229. </item>
  230. <item>
  231. <title>Online Gender-Based Violence Story &#8211; Maria, Peru</title>
  232. <link>https://webfoundation.org/2022/11/online-gender-based-violence-story-maria-peru/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=online-gender-based-violence-story-maria-peru</link>
  233. <dc:creator><![CDATA[Web Foundation]]></dc:creator>
  234. <pubDate>Mon, 28 Nov 2022 13:00:12 +0000</pubDate>
  235. <category><![CDATA[General]]></category>
  236. <guid isPermaLink="false">https://webfoundation.org/?p=19437</guid>
  237. <description><![CDATA[<p><img loading="lazy" decoding="async" width="570" height="278" src="https://webfoundation.org/docs/2022/11/1366x768-copy-570x278.jpg" alt="" class="wp-image-19435" srcset="https://webfoundation.org/docs/2022/11/1366x768-copy-570x278.jpg 570w, https://webfoundation.org/docs/2022/11/1366x768-copy-280x137.jpg 280w, https://webfoundation.org/docs/2022/11/1366x768-copy-118x58.jpg 118w, https://webfoundation.org/docs/2022/11/1366x768-copy-768x375.jpg 768w, https://webfoundation.org/docs/2022/11/1366x768-copy-1536x750.jpg 1536w, https://webfoundation.org/docs/2022/11/1366x768-copy-2048x1000.jpg 2048w" sizes="(max-width: 570px) 100vw, 570px" /></p>
  238. <h2 class="wp-block-heading">All too often, online gender-based violence is perpetuated by those one knows intimately. Maria’s story illustrates the impact of this, and gives insight into measures that can be taken to protect women from their abusers, and the power of women </h2>
  239. <p>&#8230;</p>
  240. <p>The post <a href="https://webfoundation.org/2022/11/online-gender-based-violence-story-maria-peru/">Online Gender-Based Violence Story – Maria, Peru</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></description>
  241. <content:encoded><![CDATA[<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="570" height="278" src="https://webfoundation.org/docs/2022/11/1366x768-copy-570x278.jpg" alt="" class="wp-image-19435" srcset="https://webfoundation.org/docs/2022/11/1366x768-copy-570x278.jpg 570w, https://webfoundation.org/docs/2022/11/1366x768-copy-280x137.jpg 280w, https://webfoundation.org/docs/2022/11/1366x768-copy-118x58.jpg 118w, https://webfoundation.org/docs/2022/11/1366x768-copy-768x375.jpg 768w, https://webfoundation.org/docs/2022/11/1366x768-copy-1536x750.jpg 1536w, https://webfoundation.org/docs/2022/11/1366x768-copy-2048x1000.jpg 2048w" sizes="(max-width: 570px) 100vw, 570px" /></figure>
  242. <h2 class="wp-block-heading">All too often, online gender-based violence is perpetuated by those one knows intimately. Maria’s story illustrates the impact of this, and gives insight into measures that can be taken to protect women from their abusers, and the power of women working together to achieve change.</h2>
  243. <p></p>
  244. <p>Maria is a 25-year-old university student, who grew up with her family in a low-income neighbourhood in Lima, Peru. She loves art, and has ambitions to one day be a well-known and respected reporter. To this end, she decided to go to university to pursue this dream.</p>
  245. <p>In her first year of university, Maria met and started a relationship with Luis, a fellow student. After Maria ended their relationship, Luis began to threaten and harass Maria, hiding behind a series of fake email addresses and social media accounts in order to do so. He resorted to blackmail, threatening to publicly share intimate material they shared during their relationship if she refused to go back to him and rekindle their relationship.</p>
  246. <p>Although this abuse took place in online spaces, the fear Maria felt started to impact her daily activities and behaviours. She became scared of him appearing in the same classes at university, and she began altering her movements to avoid bumping into him. Eventually, Maria decided to confide in a friend.</p>
  247. <p><strong>A united front</strong><br>Fortunately for Maria, she was not alone, and within her Faculty at university there were many other women who were already calling on university authorities to address all forms of gender-based violence which occur on campus. The Women’s Assembly, a space which brings together feminist activists, had already started conversations and proposed solutions to create a safe safe for women on campus, free from harassment, to allow women to study and enjoy university life. Through her friend, who led the Assembly, Maria’s story was added to the evidence being gathered to illustrate the terrible impacts that gender-based violence,</p>
  248. <p>both offline and online, can have on women, especially in an academic environment. At Maria’s university, this cause was further championed by a feminist professor, who could influence decison-makers.</p>
  249. <p>With the help of this professor, and through the efforts of her fellow students, Maria’s concerns were heard, and taken seriously by university authorities. Although official university policy around sanctions for all forms of gender-based violence still need to be altered, measures were put in place to prevent Luis from enrolling in the same courses as Maria, allowing her to focus on her studies and future career.</p>
  250. <p>The Assembly will continue to call on authorities to codify these measures in official policy, and offer other types of support, including legal and psychological assistance. These measures will remove the pressure from students who experience abuse and who, like Maria, have to make special arguments in order to be protected. But the future looks bright: the Assembly continues to grow, and stories like Maria’s show that simple solutions focusing on sanctioning the perpetrators of online gender-based violence can have real positive impact on their victims.</p>
  251. <p></p>
  252. <p><em><strong>This story was told with assistance from <a href="https://hiperderecho.org/" data-type="URL" data-id="https://hiperderecho.org/">Hiperderecho</a>, a member of the Women’s Rights Online (WRO) network.</strong></em></p><p>The post <a href="https://webfoundation.org/2022/11/online-gender-based-violence-story-maria-peru/">Online Gender-Based Violence Story – Maria, Peru</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></content:encoded>
  253. </item>
  254. <item>
  255. <title>Online Gender-Based Violence Story &#8211; Gifty, Ghana</title>
  256. <link>https://webfoundation.org/2022/11/online-gender-based-violence-story-gifty-ghana/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=online-gender-based-violence-story-gifty-ghana</link>
  257. <dc:creator><![CDATA[Web Foundation]]></dc:creator>
  258. <pubDate>Mon, 28 Nov 2022 12:59:16 +0000</pubDate>
  259. <category><![CDATA[General]]></category>
  260. <guid isPermaLink="false">https://webfoundation.org/?p=19434</guid>
  261. <description><![CDATA[<p><img loading="lazy" decoding="async" width="570" height="278" src="https://webfoundation.org/docs/2022/11/1366x768-copy-570x278.jpg" alt="" class="wp-image-19435" srcset="https://webfoundation.org/docs/2022/11/1366x768-copy-570x278.jpg 570w, https://webfoundation.org/docs/2022/11/1366x768-copy-280x137.jpg 280w, https://webfoundation.org/docs/2022/11/1366x768-copy-118x58.jpg 118w, https://webfoundation.org/docs/2022/11/1366x768-copy-768x375.jpg 768w, https://webfoundation.org/docs/2022/11/1366x768-copy-1536x750.jpg 1536w, https://webfoundation.org/docs/2022/11/1366x768-copy-2048x1000.jpg 2048w" sizes="(max-width: 570px) 100vw, 570px" /></p>
  262. <h2 class="wp-block-heading">High-profile women such as journalists and politicians are regular targets of online gender-based violence, especially when it is weaponised as a tool to intimate and silence. Gifty’s story illustrates the power of courage and resilience.</h2>
  263. </p>
  264. <p>Gifty* is a broadcast journalist &#8230;</p>
  265. <p>The post <a href="https://webfoundation.org/2022/11/online-gender-based-violence-story-gifty-ghana/">Online Gender-Based Violence Story – Gifty, Ghana</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></description>
  266. <content:encoded><![CDATA[<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="570" height="278" src="https://webfoundation.org/docs/2022/11/1366x768-copy-570x278.jpg" alt="" class="wp-image-19435" srcset="https://webfoundation.org/docs/2022/11/1366x768-copy-570x278.jpg 570w, https://webfoundation.org/docs/2022/11/1366x768-copy-280x137.jpg 280w, https://webfoundation.org/docs/2022/11/1366x768-copy-118x58.jpg 118w, https://webfoundation.org/docs/2022/11/1366x768-copy-768x375.jpg 768w, https://webfoundation.org/docs/2022/11/1366x768-copy-1536x750.jpg 1536w, https://webfoundation.org/docs/2022/11/1366x768-copy-2048x1000.jpg 2048w" sizes="(max-width: 570px) 100vw, 570px" /></figure>
  267. <h2 class="wp-block-heading">High-profile women such as journalists and politicians are regular targets of online gender-based violence, especially when it is weaponised as a tool to intimate and silence. Gifty’s story illustrates the power of courage and resilience.</h2>
  268. <p></p>
  269. <p></p>
  270. <p>Gifty* is a broadcast journalist in her early 30s who lives in Accra. She has always been driven by a desire to improve the lives of others in her community, and uses her radio show to share stories related to service delivery, political corruption, and other sensitive issues that affect the lives of people. In high school she discovered the power of the media, when a local female reporter’s efforts and spotlight on sanitation issues in Gifty’s neighbourhood led to improvements and commitments from local authorities &#8211; something the community had not been able to achieve by themselves. From that moment, she knew that journalism would be her future.</p>
  271. <p>Even though Gifty’s life is more comfortable now than the environment she grew in, she is still confronted on a daily basis with inequality and poverty. Her community does not have a health facility or a basic school in the area. Each morning as she drives to work, she sees school children walking several kilometres to go to school. Even though she sometimes picks and drops some of them in school or closer to their schools, she is not able to help them all, and this weighs on her. As she passes through the community each day, she becomes even more fired up to talk about the socio-economic and political issues in the country.</p>
  272. <p>Inevitably, and sadly so, her criticism of those in power, who are failing to meet the needs of the people they govern, have led to attacks and intimidation. While some listeners call into her radio station, others attack her on her social media platforms and personal mobile phone And, arguably because she is a woman, these attacks are not focused on her political views. Gifty faces body shaming, rape threats and insults. The personal nature of these attacks</p>
  273. <p>make Gifty feel particularly unsafe, and, although for the most part the perpetrators hide behind anonymity, Gifty knows that they are real people, with the capacity to hurt her even further, and she has, at times, been too scared to sleep in her own house, knowing that she might be found.</p>
  274. <p>It would be easy for Gifty to retreat into self-censorship &#8211; and this was her initial response to this abuse. But then she remembered another inspiring story &#8211; about another courageous woman. The story was about a female politician who was aspiring to be the secretary of a ruling political party. In her campaign, she also faced attacks and intimidation, but took control of the situation, identified her attackers, mapped out strategies to outsmart them, and eventually won the position. It might have been fiction, but the message was powerful enough to encourage Gifty to continue fighting &#8211; especially as she realised that her silence would mean silencing the issues she had dedicated herself to championing for her community.</p>
  275. <p>So Gifty has claimed back her power. She initially sought help through the few official channels open to her in order to report and block her abusers, but says that platforms have done very little to help. So she went to the police, both to bring her abusers to book and to ensure that she is better protected in the future. She has highlighted this issue at government level too, pushing for better protections for women and children. And amid all of this she has also found professionals who can offer her psychological support, and teach her techniques and tactics for increasing her resilience.</p>
  276. <p>Gifty also knows she is not alone. This is a phenomenon far too common among female journalists, and she has reached out to a support network of others who have faced similar experiences. She is hopeful that with the support of her allies, she can continue to express herself freely and initiate public discourse. She is also hopeful that she will continue to inspire change for other female journalists and female activists.</p>
  277. <p></p>
  278. <p><em><strong>This story was told with assistance from <a href="https://www.mfwa.org/" data-type="URL" data-id="https://www.mfwa.org/">Media Foundation for West Africa</a>, a member of the Women’s Rights Online (WRO) network.</strong></em></p><p>The post <a href="https://webfoundation.org/2022/11/online-gender-based-violence-story-gifty-ghana/">Online Gender-Based Violence Story – Gifty, Ghana</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></content:encoded>
  279. </item>
  280. <item>
  281. <title>Tackling Deceptive Design Across the African Continent</title>
  282. <link>https://webfoundation.org/2022/10/tackling-deceptive-design-on-the-african-continent/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=tackling-deceptive-design-on-the-african-continent</link>
  283. <comments>https://webfoundation.org/2022/10/tackling-deceptive-design-on-the-african-continent/#respond</comments>
  284. <dc:creator><![CDATA[Web Foundation]]></dc:creator>
  285. <pubDate>Thu, 06 Oct 2022 16:56:52 +0000</pubDate>
  286. <category><![CDATA[General]]></category>
  287. <category><![CDATA[deceptive design]]></category>
  288. <category><![CDATA[tech hive advisory]]></category>
  289. <category><![CDATA[trusted design]]></category>
  290. <guid isPermaLink="false">https://webfoundation.org/?p=19368</guid>
  291. <description><![CDATA[<p><em>This post was written by Adedolapo Evelyn Adegoroye and Victoria Adaramola, </em><a href="https://techhiveadvisory.org.ng/"><em>Tech Hive Advisory</em></a><em>. We’d like to thank our partners at Tech Hive Advisory for their work spearheading deceptive design research using participatory methods across Africa. Follow Tech Hive </em>&#8230;</p>
  292. <p>The post <a href="https://webfoundation.org/2022/10/tackling-deceptive-design-on-the-african-continent/">Tackling Deceptive Design Across the African Continent</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></description>
  293. <content:encoded><![CDATA[<p><em>This post was written by Adedolapo Evelyn Adegoroye and Victoria Adaramola, </em><a href="https://techhiveadvisory.org.ng/"><em>Tech Hive Advisory</em></a><em>. We’d like to thank our partners at Tech Hive Advisory for their work spearheading deceptive design research using participatory methods across Africa. Follow Tech Hive Advisory on Twitter </em><a href="https://twitter.com/HiveAdvisory/"><em>@HiveAdvisory</em></a><em>.&nbsp;</em></p>
  294. <hr class="wp-block-separator has-alpha-channel-opacity"/>
  295. <p>Tech Hive Advisory and Ikigai Innovation Initiative, in collaboration with the World Web Foundation and the Tech Policy Design Lab, hosted the Deceptive Design Policy Hackathon in August 2022. The hackathon was a two-day virtual event aimed at raising awareness about deceptive design as well as co-creating a policy solution and deceptive design guidelines for the African continent.&nbsp;</p>
  296. <p>During the hackathon event, we had five teams of participants from all over Africa present their policy findings and solutions after conducting their research. The hackathon also featured global experts and African regulators who shared timely insights and recommendations for combating deceptive designs in the continent. The event produced some of the following recommendations:&nbsp;</p>
  297. <ul><li><strong>Legislating against deceptive designs&nbsp;</strong></li></ul>
  298. <p>The absence of a comprehensive framework makes it difficult to determine what constitutes a deceptive act or manipulative technique and the appropriate penalty for deceptive design practices. A multistakeholder approach is recommended to capture the scope of deceptive designs under the law to ensure regulators are not creating laws in a vacuum. The legal framework could either update a number of existing laws to protect against misleading designs or use a single rule or set of guidelines to deal with them. Also, the law will make it a legal requirement for people in the industry to recognise digital rights as human rights.</p>
  299. <ul><li><strong>Design audit tool and process </strong>&nbsp;</li></ul>
  300. <p>Regulators can develop independent audit processes that digital platforms can use to check compliance. A design impact assessment test could be mandated for new and existing products to check for manipulative designs and correct them. The tool or process will judge the impact of design and serve as a foundation for regulation.</p>
  301. <ul><li><strong>Complaints mechanism&nbsp;</strong></li></ul>
  302. <p>There needs to be a transparent mechanism for reporting deceptive designs to regulators. More importantly, the mechanism should be quick to respond to reports of deceptive design and look into them. In addition, reports on investigations and decisions should be published periodically.</p>
  303. <ul><li><strong>Awareness creation and advisories&nbsp;&nbsp;</strong></li></ul>
  304. <p>Regulators, civil society, and academia must shoulder greater responsibility for educating users online and researching manifestations of deceptive designs on the African continent respectively. This would give users a better understanding of their rights and the ability to boycott abusive services.&nbsp;</p>
  305. <ul><li><strong>Use of regulatory sandboxes</strong></li></ul>
  306. <p>There should also be regulatory sandboxes that companies can use to test out their products. The goal will be to ensure that products can be made within the rules from the start.</p>
  307. <ul><li><strong>Unified regulation</strong>&nbsp;</li></ul>
  308. <p>There needs to be a harmonisation of standards with regard to design across Africa. Many digital platforms either operate or aspire to operate across countries and continents. Thus, fragmented frameworks make it more difficult and less enticing for tech companies who operate cross-country to comply. The regulator should develop operational guidelines, codes of ethics, and best practices for UI/UX designers, tech associations, software engineers, digital marketers, and tech companies. The codes of practice embody design principles of no surprises, transparency, fairness, and accountability and set defined standards that a user interface must meet.</p>
  309. <hr class="wp-block-separator has-alpha-channel-opacity"/>
  310. <p><strong>Post-hackathon&nbsp;</strong></p>
  311. <p>We were happy to work with a group of researchers across Africa to develop a policy brief and set of guidelines that regulators can use to tackle deceptive designs. <a href="https://techhiveadvisory.org.ng/wp-content/uploads/2022/10/Deceptive-Design-Report.NG-KY.pdf">Our policy brief</a> provides insight into the state of play and policy of deceptive designs in Nigeria and Kenya as case studies and examines various expressions of deceptive designs on e-Commerce, e-Transactions, and flight aggregation platforms.&nbsp;</p>
  312. <p><a href="https://techhiveadvisory.org.ng/wp-content/uploads/2022/10/Deceptive-Design-Report.NG-KY.pdf">The policy brief</a> also adopted a number of the recommendations suggested during the hackathon. Our policy guidelines will also aim to create a set of rules that regulators in various countries can use to make the digital world safer and more trustworthy.</p>
  313. <div class="wp-block-advgb-button aligncenter"><a class="wp-block-advgb-button_link advgbbtn-c2c89997-49f2-49d2-8815-55b477c0186e" href="https://techhiveadvisory.org.ng/wp-content/uploads/2022/10/Deceptive-Design-Report.NG-KY.pdf" target="_blank" rel="noopener noreferrer">Read the policy brief</a></div>
  314. <hr class="wp-block-separator has-alpha-channel-opacity"/>
  315. <p><em>To learn more about the Web Foundation’s work on trusted design, visit <a href="http://www.techlab.webfoundation.org" data-type="URL" data-id="www.techlab.webfoundation.org">techlab.webfoundation.org.</a> Our team is working to synthesize findings from our workshop series that brought together stakeholders from across sectors and across the globe to co-create solutions to deceptive design. Stay tuned for more details in our upcoming publication.</em></p>
  316. <hr class="wp-block-separator has-alpha-channel-opacity"/>
  317. <p><em>For more updates, follow us on Twitter at</em><a href="http://twitter.com/webfoundation"><em> @webfoundation</em></a><em> and sign up to </em><a href="https://webfoundation.us8.list-manage.com/subscribe/post?u=b3c8e6e91fe1905e99f8b59fd&amp;id=8516b77d8a"><em>receive our newsletter</em></a><em>.</em></p>
  318. <p><strong><em>Tim Berners-Lee, our co-founder, gave the web to the world for free, but fighting for it comes at a cost. Please </em></strong><a href="https://webfoundation.org/donate/"><strong><em>support our work</em></strong></a><strong><em> to build a safe, empowering web for everyone.</em></strong></p>
  319. <style class="advgb-styles-renderer">.advgbbtn-c2c89997-49f2-49d2-8815-55b477c0186e{font-size:18px;color:#fff !important;background-color:#b30000 !important;margin:0px 0px 0px 0px !important;padding:10px 30px 10px 30px;border-width:1px !important;border-style:none;border-radius:50px !important;}.advgbbtn-c2c89997-49f2-49d2-8815-55b477c0186e:hover{box-shadow:1px 1px 12px 0px #ccc;opacity:1;transition:all 0.2s ease;}.advgbbtn-c2c89997-49f2-49d2-8815-55b477c0186e > i {display: none !important;}</style><p>The post <a href="https://webfoundation.org/2022/10/tackling-deceptive-design-on-the-african-continent/">Tackling Deceptive Design Across the African Continent</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></content:encoded>
  320. <wfw:commentRss>https://webfoundation.org/2022/10/tackling-deceptive-design-on-the-african-continent/feed/</wfw:commentRss>
  321. <slash:comments>0</slash:comments>
  322. </item>
  323. <item>
  324. <title>A web for everyone: strengthening accountability for online gender-based violence</title>
  325. <link>https://webfoundation.org/2022/09/a-web-for-everyone-strengthening-accountability-for-online-gender-based-violence/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-web-for-everyone-strengthening-accountability-for-online-gender-based-violence</link>
  326. <comments>https://webfoundation.org/2022/09/a-web-for-everyone-strengthening-accountability-for-online-gender-based-violence/#respond</comments>
  327. <dc:creator><![CDATA[Web Foundation]]></dc:creator>
  328. <pubDate>Wed, 21 Sep 2022 14:11:59 +0000</pubDate>
  329. <category><![CDATA[General]]></category>
  330. <category><![CDATA[gender equality]]></category>
  331. <category><![CDATA[online gender-based violence]]></category>
  332. <category><![CDATA[women's rights online]]></category>
  333. <guid isPermaLink="false">https://webfoundation.org/?p=19347</guid>
  334. <description><![CDATA[<p><em>This post was written by Katherine Townsend, Director of Policy (Interim). Follow Katherine on Twitter </em><a href="https://twitter.com/DiploKat"><em>@DiploKat</em></a><em>.</em></p>
  335. <hr class="wp-block-separator has-alpha-channel-opacity"/>
  336. <p>When Sir Tim Berners-Lee, co-founder of the Web Foundation, <a href="https://webfoundation.org/about/vision/history-of-the-web/">invented the World Wide Web</a>, he intended to open the technology of the &#8230;</p>
  337. <p>The post <a href="https://webfoundation.org/2022/09/a-web-for-everyone-strengthening-accountability-for-online-gender-based-violence/">A web for everyone: strengthening accountability for online gender-based violence</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></description>
  338. <content:encoded><![CDATA[<p><em>This post was written by Katherine Townsend, Director of Policy (Interim). Follow Katherine on Twitter </em><a href="https://twitter.com/DiploKat"><em>@DiploKat</em></a><em>.</em></p>
  339. <hr class="wp-block-separator has-alpha-channel-opacity"/>
  340. <p>When Sir Tim Berners-Lee, co-founder of the Web Foundation, <a href="https://webfoundation.org/about/vision/history-of-the-web/">invented the World Wide Web</a>, he intended to open the technology of the internet for the appreciation of everyone around the world. He reinforced this vision at the opening of the 2012 Olympics, <a href="https://twitter.com/timberners_lee/status/228960085672599552">tweeting of the web</a>: “This Is For Everyone”.</p>
  341. <p>The Web Foundation’s mission is to realize this original vision, and work for a safe, trusted, and empowering web. Of the greatest threats to this web we want is the pervasive presence and impact of gender-driven harassment and violence online.&nbsp;</p>
  342. <p>Women, and other minoritized genders, are harassed everyday due to their gender. Over 50% of the global population experiences or witnesses an online space that allows harassment and violence without consequences. The only response that will keep women safe at the moment is too frequently for them to remove their profiles and presence online. This may not be the first step—they file complaints with platforms, with police—but without a response many choose to take their presence, their voice, their leadership offline. Increasingly, the web becomes a place that is not for everyone, but one that is absent of women, especially women from marginalized communities including Indigenous communities, darker skinned women, LGBTQ+ communities, and minoritized ethnic groups within different countries, and a place that is populated with those who feel encouraged to abuse and attack. This leads to a dangerous World Wide Web, filled with fragmented spaces as more seek to find their own sources of comfort and support in virtual spaces—for good or for ill.</p>
  343. <p>Some of the tech companies have recognized the gravity of this problem and have made public commitments to counter online gender-based violence. For the past year, Meta, Google, Twitter, and TikTok have worked with the Web Foundation and with global civil society, particularly with gender justice and digital rights organizations, to <a href="https://techlab.webfoundation.org/ogbv/commitments">improve their reporting, increase autonomy for users, and share transparent data about their progress</a>. These companies announced their commitments over a year ago at the United Nations Generation Equality Forum, and this week during the UN General Assembly, we are <a href="https://webfoundation.org/research/strengthening-accountability-for-online-gender-based-violence-one-year-later/">sharing our accountability report</a> detailing on the progress made by these companies, what they’ve been able to accomplish, what barriers remain, and what value Web Foundation has in supporting this work.</p>
  344. <p>We found that most of the companies have made some progress, primarily on reporting and on user interface. The <a href="https://webfoundation.org/2022/09/progress-by-social-media-platforms/">collaboration between Twitter and Google</a> on the harassment manager tool helps support any user in regaining control of their own platform and reporting. TikTok and Meta have also made some inroads into easing reporting and allowing users to limit or block abusive interactions. These changes are promising, and we want to see more. We continue to be most encouraged by Twitter’s open api. While not a development of the past year, this important tool allows entrepreneurs outside of the company to build their own solutions to protect against violence online and allows access for independent researchers, both key to tackling this problem.</p>
  345. <p>Where we’re still falling short is transparency about the magnitude of violence and harassment online, and what impact any of the implemented changes are having on the number of instances and the degree of harm. To address this, we require a global and multi-stakeholder effort to agree on the standard of information and level of detail companies must share and develop mechanisms to make this information publicly available. In speaking and working with global civil society, we’ve also heard that the fundamental approach to improving the platform—one focused on what happens after the harassment occurs—relies on individuals to learn a new system of reporting their harassment, rather than taking a prevention-centered approach. Reporting systems are designed by the platforms with zero to minimal input of the communities most affected by online gender-based violence and a lack of consideration of local context outside of the Global North. Designed in this way, the act of reporting harassment can serve to retraumatize, and without clear response and action, can cause more harm than good.&nbsp;</p>
  346. <p>The Web Foundation is committed to working across tech platforms, global civil society, and other key partners to build a better web for all—the multi-dimensional nature of OGBV requires a global multi-stakeholder solution. By convening these networks and designing better policies and co-creating products, the web can be a single space that is safe, trusted, and empowering. A web that is for everyone.&nbsp;</p>
  347. <hr class="wp-block-separator has-alpha-channel-opacity"/>
  348. <p><a href="https://webfoundation.org/research/strengthening-accountability-for-online-gender-based-violence-one-year-later/"><em>Explore the report</em></a><em>.&nbsp;</em></p>
  349. <p><em>The Web Foundation is committed to working in partnership with organizations across the globe and wants to acknowledge the commitment and effort contributed by a large range of stakeholders. In particular, we would like to acknowledge the engagement of global civil society organizations, tech companies, facilitators, and report contributors.&nbsp;</em></p>
  350. <p><em>The collaboration of organizations and individuals who contributed to the writing of this report included Katherine Townsend, World Wide Web Foundation; Gabriela de Oliveira &amp; Hilary Watson, Glitch; Manon Desert &amp; Luisa Braig, Social Finance; Paulina Ibarra, Fundacion Multitudes; Marianne Diaz, Access Now; Juliet Nanfuka, Collaboration on International ICT Policy for East and Southern Africa; and Marwa Azelmat, RNW Media.</em></p>
  351. <hr class="wp-block-separator has-alpha-channel-opacity"/>
  352. <p><em>For more updates, follow us on Twitter at </em><a href="http://twitter.com/webfoundation"><em>@webfoundation</em></a><em> and sign up to </em><a href="https://webfoundation.us8.list-manage.com/subscribe/post?u=b3c8e6e91fe1905e99f8b59fd&amp;id=8516b77d8a"><em>receive our newsletter</em></a><em>.</em></p>
  353. <p><em>To receive a weekly news brief on the most important stories in tech, subscribe to </em><a href="https://webfoundation.us8.list-manage.com/subscribe?u=b3c8e6e91fe1905e99f8b59fd&amp;id=28a8d4032b"><em>The Web This Week.</em></a></p>
  354. <p><strong>Tim Berners-Lee, our co-founder, gave the web to the world for free, but fighting for it comes at a cost. Please </strong><a href="https://webfoundation.org/donate/"><strong>support our work</strong></a><strong> to build a safe, empowering web for everyone.</strong></p><p>The post <a href="https://webfoundation.org/2022/09/a-web-for-everyone-strengthening-accountability-for-online-gender-based-violence/">A web for everyone: strengthening accountability for online gender-based violence</a> first appeared on <a href="https://webfoundation.org">World Wide Web Foundation</a>.</p>]]></content:encoded>
  355. <wfw:commentRss>https://webfoundation.org/2022/09/a-web-for-everyone-strengthening-accountability-for-online-gender-based-violence/feed/</wfw:commentRss>
  356. <slash:comments>0</slash:comments>
  357. </item>
  358. </channel>
  359. </rss>
  360.  

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//webfoundation.org/feed

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda