SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
source: Flickr/
moroccanmary




                       CIVIL RESISTANCE 2.0
                  A Crowdsourced Project on 21st Century Nonviolence

                                              Mary Joyce
                                @ the International Center on Nonviolent Conflict
                                            November 29, 2012


                                                  Digital Activism Research Project
                                                  University of Washington
                                                  www.digital-activism.org
GENE SHARP




                                               source: humanfilm.no




introduction for a man who needs no introduction
GENE SHARP
                                     activist
Nobel Peace Prize nominee
                         scholar




                                     canonical list of 198 methods
                                      of nonviolent action (1973)

   most influential living theorist
     of nonviolent struggle                               source: humanfilm.no




     introduction for a man who needs no introduction
THE YOUNG TURKS




        source: Fllickr/Ushahidi




                                   source: Fllickr/Moroccanmary


who definitely do need an introduction
THE YOUNG TURKS
             Patrick Meier                                                                           Mary Joyce




                                             source: Fllickr/Ushahidi source: Fllickr/Moroccanmary


Director of Social & Humanitarian Innovation                                                Co-Founder of the
          at the Qatar Foundation                                                   Digital Activism Research Project

      PhD - Tufts University                                                      MA/PhD Student - UW
         researches digital technology and                                                    researches digital activism in
         nonviolence in repressive regimes                                                   resource-constrained societies


                        who definitely do need an introduction
THE MISSION




               source: Fllickr/Elvert Barnes



   Meld digital tools with nonviolence methods
BUT FIRST




                       source: Fllickr/Picture Perfect Pose


two notes of warning
ACTIVIST SECURITY
     Do not attempt digital activism without first considering the
               political context in your own country.

•   Social media is public, meaning the digital actions of you and the
    people you connect with can be watched by your government.

•   Governments are also getting very good at cracking passwords
    and linking accounts to physical locations, meaning you can be
    identified and harmed in the physical world.

•   Read “Digital Security for Activists” (https://oldhelp.riseup.net/assets/
    digital_security_for_activists.pdf) or “Protecting Your Security Online” (https://
    www.accessnow.org/blog/protecting-your-security-online-english-text-only1)
NETWORKED AUTHORITARIANISM
While activists are using digital tools to change the power structure,
 repressive govts are using the same tools to prevent that change.

•   Censorship of opposition content, so few people in your
    country will ever see it (particularly in MENA and China)

•   Surveillance of activists, both for chilling effect and to actually
    apprehend and punish (particularly in MENA and China)

•   Propaganda of their own position, successfully using social media
    to maintain support for the status quo (particularly in CIS)

•   Read: Rebecca MacKinnon, Katy Pearce, Evgeny Morozov (above typology is his)
WHY?
NONVIOLENCE IS NOW DIGITAL




 Whether nonviolence experts acknowledge it or not.
ACTIVISTS WILL BENEFIT




               If digital practices are
              analyzed by experts in
                     nonviolence.
bit.ly/Civi lResistance




                      source: Fllickr/lightsinmotion




      Follow me
THE PROJECT




Civil Resistance 2.0 : 198 Methods Upgraded
THE METHOD




 Open-edit crowdsourcing
ORGANIZATION




Sharp’s method + enhancement + new form + implementation
AN EXAMPLE




Method 1: Public Speeches
NOT ONLY THE GOOD NEWS




      Method 43: Public Mourning
ENHANCEMENT

 Of the 54 methods of Protest and Persuasion there
were only 2 for which we could not find digital enhancements

     Though the sections for Noncooperation and
 Intervention have received fewer notes, coordination of
      most of these methods could also be facilitated
            by digital tools like SMS, email, chat,
       and encrypted versions of these technologies.
NEW FORMS

 Most means of Protest and Persuasion can now occur
                 online as well as offline.

   Because Noncooperation and Intervention require
direct engagement with institutions of power, new forms require
 that the institution of power have an online extension that can
       be targeted, such as a “denial of service” attack on a
                        government website.
10 NEW METHODS

1. Maps and Maptivism           6. Influence Search Engine
                                  Results
2. QR Codes
                                7. Livestreaming
3. Digital File-Sharing
                                8. Check-ins
4. Nonviolent Media Hijacking
                                9. Self-Surveillance
5. “Trend” a Hashtag
                                10. Flash Mobs
MAPS AND MAPTIVISM




The digital and global amplifying the physical and local.
QR CODES
        source: frogloop.com




                               source: oneicity.com




Linking physical, mobile, and web.
DIGITAL FILE-SHARING




    this could be a tactical manual




 Use infrastructure accessible and familiar to your audience,
young people use this software for pirating movies and music.
NONVIOLENTLY HIJACK MEDIA




source: http://adkyle.com




             Using their own media presence to undermine brand power.
“TREND” A HASHTAG




A prominent position for the opposition narrative.
INFLUENCE SEARCH RESULTS




     A safer method of public satire.
LIVESTREAMING




Anyone can mass broadcast the opposition narrative.
CHECK-INS




Activists can check-in to signal participation to friends or leave
  directly after check-in, creating a protest rally of “ghosts”
SELF-SURVEILLANCE




Surveillance is not only a method of repression.
FLASH MOBS
                                   Minsk, 2006




source: smartmobs.com




                             source: feedbackagency.com




                                                          source: andrewcarr.org


                        This is a great dilemma action.
MORE CHANGES NEEDED?
                                Method 11 is
                         Records, Radio, and Television




                                                                       source: clevescene.com


source: guardian.co.uk




                                       source: cleanenergyjobact.com
AN INVITATION



                        bit.ly/
                   CivilResistance


                                                          source: Flick/Hello Turkey Toe




To advance strategic nonviolence in the 21st century
                      Digital Activism Research Project
                      University of Washington
                      www.digital-activism.org

Contenu connexe

Tendances

the history of the civil right movement in America .
the history of the civil right movement in America .the history of the civil right movement in America .
the history of the civil right movement in America .Fatine Boulaid
 
Nirbhaya movement, Delhi Rape Case Victim
Nirbhaya movement, Delhi Rape Case VictimNirbhaya movement, Delhi Rape Case Victim
Nirbhaya movement, Delhi Rape Case VictimVikram Rana
 
Development Paradigms
Development ParadigmsDevelopment Paradigms
Development ParadigmsPrashanth v
 
Nirbhaya rape case
Nirbhaya rape caseNirbhaya rape case
Nirbhaya rape caseAvinab Kumar
 
Community Policing in Kenya
Community Policing in KenyaCommunity Policing in Kenya
Community Policing in Kenyacliffordcomondi
 
Technological determinism theory powerpoint
Technological determinism theory powerpointTechnological determinism theory powerpoint
Technological determinism theory powerpointElaine Humpleby
 
feminism in ir.pptx
feminism in ir.pptxfeminism in ir.pptx
feminism in ir.pptxUday Ashish
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and TypesShaan Yaduvanshi
 
The Effect of Media on Politics
The Effect of Media on PoliticsThe Effect of Media on Politics
The Effect of Media on PoliticsMattgut21
 
Hate speech laws in india
Hate speech laws in indiaHate speech laws in india
Hate speech laws in indiaAltacit Global
 
Feminist Social and Political Thought
Feminist Social and Political ThoughtFeminist Social and Political Thought
Feminist Social and Political Thoughtnabaz4u
 
Human security basic overview
Human security basic overviewHuman security basic overview
Human security basic overviewLindsey Cottle
 
Terrorism
TerrorismTerrorism
Terrorismu439
 

Tendances (20)

the history of the civil right movement in America .
the history of the civil right movement in America .the history of the civil right movement in America .
the history of the civil right movement in America .
 
Nirbhaya movement, Delhi Rape Case Victim
Nirbhaya movement, Delhi Rape Case VictimNirbhaya movement, Delhi Rape Case Victim
Nirbhaya movement, Delhi Rape Case Victim
 
Terrorism
TerrorismTerrorism
Terrorism
 
Development Paradigms
Development ParadigmsDevelopment Paradigms
Development Paradigms
 
Nirbhaya rape case
Nirbhaya rape caseNirbhaya rape case
Nirbhaya rape case
 
Community Policing in Kenya
Community Policing in KenyaCommunity Policing in Kenya
Community Policing in Kenya
 
Technological determinism theory powerpoint
Technological determinism theory powerpointTechnological determinism theory powerpoint
Technological determinism theory powerpoint
 
Terrorism In India.
Terrorism In India.Terrorism In India.
Terrorism In India.
 
Feminism
FeminismFeminism
Feminism
 
feminism in ir.pptx
feminism in ir.pptxfeminism in ir.pptx
feminism in ir.pptx
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 
The Effect of Media on Politics
The Effect of Media on PoliticsThe Effect of Media on Politics
The Effect of Media on Politics
 
Terrorism
TerrorismTerrorism
Terrorism
 
Hate speech laws in india
Hate speech laws in indiaHate speech laws in india
Hate speech laws in india
 
Mee too movement
Mee too movementMee too movement
Mee too movement
 
Spiral of Silence
Spiral of SilenceSpiral of Silence
Spiral of Silence
 
Feminist Social and Political Thought
Feminist Social and Political ThoughtFeminist Social and Political Thought
Feminist Social and Political Thought
 
Human security basic overview
Human security basic overviewHuman security basic overview
Human security basic overview
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism Essay
Terrorism EssayTerrorism Essay
Terrorism Essay
 

En vedette

GDADS2 Coder Training Introduction v. 2.0
GDADS2 Coder Training Introduction v. 2.0GDADS2 Coder Training Introduction v. 2.0
GDADS2 Coder Training Introduction v. 2.0Mer Joyce
 
Social media activism presentation
Social media activism presentationSocial media activism presentation
Social media activism presentationPatrick Murphy
 
Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivismaligi
 
Digital Activism & Power: How to Change the World
Digital Activism & Power: How to Change the WorldDigital Activism & Power: How to Change the World
Digital Activism & Power: How to Change the WorldMer Joyce
 
Social Media Activism
Social Media ActivismSocial Media Activism
Social Media Activismedtcd
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
What is Digital Activism?
What is Digital Activism?What is Digital Activism?
What is Digital Activism?Mer Joyce
 
Anonymous Handbook Hacktivist
Anonymous Handbook HacktivistAnonymous Handbook Hacktivist
Anonymous Handbook HacktivistAnonymousLegion
 

En vedette (12)

GDADS2 Coder Training Introduction v. 2.0
GDADS2 Coder Training Introduction v. 2.0GDADS2 Coder Training Introduction v. 2.0
GDADS2 Coder Training Introduction v. 2.0
 
Social media activism presentation
Social media activism presentationSocial media activism presentation
Social media activism presentation
 
Internet Activism & Hacktivism
Internet Activism & HacktivismInternet Activism & Hacktivism
Internet Activism & Hacktivism
 
Digital Activism & Power: How to Change the World
Digital Activism & Power: How to Change the WorldDigital Activism & Power: How to Change the World
Digital Activism & Power: How to Change the World
 
Digital activism
Digital activismDigital activism
Digital activism
 
Social Media Activism
Social Media ActivismSocial Media Activism
Social Media Activism
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
What is Digital Activism?
What is Digital Activism?What is Digital Activism?
What is Digital Activism?
 
Digital Activism examples
Digital Activism examplesDigital Activism examples
Digital Activism examples
 
Digital Activism
Digital ActivismDigital Activism
Digital Activism
 
Anonymous Handbook Hacktivist
Anonymous Handbook HacktivistAnonymous Handbook Hacktivist
Anonymous Handbook Hacktivist
 
Herramientas en línea para crear reportajes multimedia
Herramientas en línea para crear reportajes multimediaHerramientas en línea para crear reportajes multimedia
Herramientas en línea para crear reportajes multimedia
 

Similaire à Upgrading Nonviolence for the Digital Age

Civil Resistance 2.0 (DRAFT)
Civil Resistance 2.0 (DRAFT)Civil Resistance 2.0 (DRAFT)
Civil Resistance 2.0 (DRAFT)Mer Joyce
 
Cittadini Sensori - Dialettica tra partecipazione passiva e collaborazione pr...
Cittadini Sensori - Dialettica tra partecipazione passiva e collaborazione pr...Cittadini Sensori - Dialettica tra partecipazione passiva e collaborazione pr...
Cittadini Sensori - Dialettica tra partecipazione passiva e collaborazione pr...NH Wikisaurus
 
LECTURE 6 - Cyberculture
LECTURE 6 - CybercultureLECTURE 6 - Cyberculture
LECTURE 6 - CybercultureKim Flintoff
 
64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docxevonnehoggarth79783
 
Digital Activism
Digital ActivismDigital Activism
Digital Activismlootra
 
Ushahidi: Made in Africa
Ushahidi: Made in AfricaUshahidi: Made in Africa
Ushahidi: Made in AfricaKeisha Taylor
 
New Media Activism - A Literature Review
New Media Activism - A Literature ReviewNew Media Activism - A Literature Review
New Media Activism - A Literature ReviewComDevGroup5
 
New Media Activism - A Literature Review
New Media Activism - A Literature ReviewNew Media Activism - A Literature Review
New Media Activism - A Literature ReviewNewMediaActivism
 
Digital development and Online Gender-Based Violence
Digital development and Online Gender-Based ViolenceDigital development and Online Gender-Based Violence
Digital development and Online Gender-Based ViolenceAnand Sheombar
 
Debunking sm revolution
Debunking sm revolutionDebunking sm revolution
Debunking sm revolutionyus121
 
New Media Activism Presentation
New Media Activism Presentation New Media Activism Presentation
New Media Activism Presentation NewMediaActivism
 
New media activism presentation
New media activism presentationNew media activism presentation
New media activism presentationNewMediaActivism
 
Cemais Williams Evening
Cemais Williams EveningCemais Williams Evening
Cemais Williams EveningPeabirus
 
Making localism a reality
Making localism a realityMaking localism a reality
Making localism a realityCatherine Howe
 
Technology, human rights & movement building around the world
Technology, human rights & movement building around the worldTechnology, human rights & movement building around the world
Technology, human rights & movement building around the worldTechSoup Canada
 
Social Machines Democratization
Social Machines DemocratizationSocial Machines Democratization
Social Machines DemocratizationDavid De Roure
 
Democratic Participation in the Technological Design Process
Democratic Participation in the Technological Design ProcessDemocratic Participation in the Technological Design Process
Democratic Participation in the Technological Design Processmolodiez
 
Digital Media Activism by S
Digital Media Activism by SDigital Media Activism by S
Digital Media Activism by Spumascomm
 

Similaire à Upgrading Nonviolence for the Digital Age (20)

Civil Resistance 2.0 (DRAFT)
Civil Resistance 2.0 (DRAFT)Civil Resistance 2.0 (DRAFT)
Civil Resistance 2.0 (DRAFT)
 
Cittadini Sensori - Dialettica tra partecipazione passiva e collaborazione pr...
Cittadini Sensori - Dialettica tra partecipazione passiva e collaborazione pr...Cittadini Sensori - Dialettica tra partecipazione passiva e collaborazione pr...
Cittadini Sensori - Dialettica tra partecipazione passiva e collaborazione pr...
 
LECTURE 6 - Cyberculture
LECTURE 6 - CybercultureLECTURE 6 - Cyberculture
LECTURE 6 - Cyberculture
 
64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx64The Empire Strikes Back Social Media Uprisings and .docx
64The Empire Strikes Back Social Media Uprisings and .docx
 
Presentation
PresentationPresentation
Presentation
 
Evgeny Morozov
Evgeny MorozovEvgeny Morozov
Evgeny Morozov
 
Digital Activism
Digital ActivismDigital Activism
Digital Activism
 
Ushahidi: Made in Africa
Ushahidi: Made in AfricaUshahidi: Made in Africa
Ushahidi: Made in Africa
 
New Media Activism - A Literature Review
New Media Activism - A Literature ReviewNew Media Activism - A Literature Review
New Media Activism - A Literature Review
 
New Media Activism - A Literature Review
New Media Activism - A Literature ReviewNew Media Activism - A Literature Review
New Media Activism - A Literature Review
 
Digital development and Online Gender-Based Violence
Digital development and Online Gender-Based ViolenceDigital development and Online Gender-Based Violence
Digital development and Online Gender-Based Violence
 
Debunking sm revolution
Debunking sm revolutionDebunking sm revolution
Debunking sm revolution
 
New Media Activism Presentation
New Media Activism Presentation New Media Activism Presentation
New Media Activism Presentation
 
New media activism presentation
New media activism presentationNew media activism presentation
New media activism presentation
 
Cemais Williams Evening
Cemais Williams EveningCemais Williams Evening
Cemais Williams Evening
 
Making localism a reality
Making localism a realityMaking localism a reality
Making localism a reality
 
Technology, human rights & movement building around the world
Technology, human rights & movement building around the worldTechnology, human rights & movement building around the world
Technology, human rights & movement building around the world
 
Social Machines Democratization
Social Machines DemocratizationSocial Machines Democratization
Social Machines Democratization
 
Democratic Participation in the Technological Design Process
Democratic Participation in the Technological Design ProcessDemocratic Participation in the Technological Design Process
Democratic Participation in the Technological Design Process
 
Digital Media Activism by S
Digital Media Activism by SDigital Media Activism by S
Digital Media Activism by S
 

Plus de Mer Joyce

About Do Big Good - March 2020
 About Do Big Good - March 2020 About Do Big Good - March 2020
About Do Big Good - March 2020Mer Joyce
 
Measuring Network Impact
Measuring Network ImpactMeasuring Network Impact
Measuring Network ImpactMer Joyce
 
Do Big Good - About Us - Oct. 2019
Do Big Good - About Us - Oct. 2019Do Big Good - About Us - Oct. 2019
Do Big Good - About Us - Oct. 2019Mer Joyce
 
Job Description: Research Assistant
Job Description: Research AssistantJob Description: Research Assistant
Job Description: Research AssistantMer Joyce
 
Job Description: Data Assistant
Job Description: Data AssistantJob Description: Data Assistant
Job Description: Data AssistantMer Joyce
 
Activism Success: A Concept Explication
Activism Success: A Concept ExplicationActivism Success: A Concept Explication
Activism Success: A Concept ExplicationMer Joyce
 
A Plea to Defend our Institutions
A Plea to Defend our InstitutionsA Plea to Defend our Institutions
A Plea to Defend our InstitutionsMer Joyce
 
The Election Blogging Guide (2006)
The Election Blogging Guide (2006)The Election Blogging Guide (2006)
The Election Blogging Guide (2006)Mer Joyce
 
Video Impact Assessment: Closing the Impact Gap
Video Impact Assessment: Closing the Impact GapVideo Impact Assessment: Closing the Impact Gap
Video Impact Assessment: Closing the Impact GapMer Joyce
 
90-Minute Guru: Communication Strategy
90-Minute Guru: Communication Strategy90-Minute Guru: Communication Strategy
90-Minute Guru: Communication StrategyMer Joyce
 
Advocacy Gardening: Help Your Campaign Grow
Advocacy Gardening: Help Your Campaign GrowAdvocacy Gardening: Help Your Campaign Grow
Advocacy Gardening: Help Your Campaign GrowMer Joyce
 
Video Advocacy Tips
Video Advocacy TipsVideo Advocacy Tips
Video Advocacy TipsMer Joyce
 
Contention Beyond Social Movements: Activism and its Benefits
Contention Beyond Social Movements: Activism and its BenefitsContention Beyond Social Movements: Activism and its Benefits
Contention Beyond Social Movements: Activism and its BenefitsMer Joyce
 
9 Quick-Start Blog Posts for Activists
9 Quick-Start Blog Posts  for Activists9 Quick-Start Blog Posts  for Activists
9 Quick-Start Blog Posts for ActivistsMer Joyce
 
Coder Training Slides (v2.3)
Coder Training Slides (v2.3)Coder Training Slides (v2.3)
Coder Training Slides (v2.3)Mer Joyce
 
Social Media Promotion in 5 Easy Steps
Social Media Promotion in 5 Easy StepsSocial Media Promotion in 5 Easy Steps
Social Media Promotion in 5 Easy StepsMer Joyce
 
Video Advocacy Styles
Video Advocacy StylesVideo Advocacy Styles
Video Advocacy StylesMer Joyce
 
Hybrid Civil Society: How New and Historic Networks Collaborate for Change
Hybrid Civil Society: How New and Historic Networks Collaborate for ChangeHybrid Civil Society: How New and Historic Networks Collaborate for Change
Hybrid Civil Society: How New and Historic Networks Collaborate for ChangeMer Joyce
 
21st Century Civil Society: Implications for Open Government
21st Century Civil Society: Implications for Open Government21st Century Civil Society: Implications for Open Government
21st Century Civil Society: Implications for Open GovernmentMer Joyce
 
The Internet of Compassion
The Internet of CompassionThe Internet of Compassion
The Internet of CompassionMer Joyce
 

Plus de Mer Joyce (20)

About Do Big Good - March 2020
 About Do Big Good - March 2020 About Do Big Good - March 2020
About Do Big Good - March 2020
 
Measuring Network Impact
Measuring Network ImpactMeasuring Network Impact
Measuring Network Impact
 
Do Big Good - About Us - Oct. 2019
Do Big Good - About Us - Oct. 2019Do Big Good - About Us - Oct. 2019
Do Big Good - About Us - Oct. 2019
 
Job Description: Research Assistant
Job Description: Research AssistantJob Description: Research Assistant
Job Description: Research Assistant
 
Job Description: Data Assistant
Job Description: Data AssistantJob Description: Data Assistant
Job Description: Data Assistant
 
Activism Success: A Concept Explication
Activism Success: A Concept ExplicationActivism Success: A Concept Explication
Activism Success: A Concept Explication
 
A Plea to Defend our Institutions
A Plea to Defend our InstitutionsA Plea to Defend our Institutions
A Plea to Defend our Institutions
 
The Election Blogging Guide (2006)
The Election Blogging Guide (2006)The Election Blogging Guide (2006)
The Election Blogging Guide (2006)
 
Video Impact Assessment: Closing the Impact Gap
Video Impact Assessment: Closing the Impact GapVideo Impact Assessment: Closing the Impact Gap
Video Impact Assessment: Closing the Impact Gap
 
90-Minute Guru: Communication Strategy
90-Minute Guru: Communication Strategy90-Minute Guru: Communication Strategy
90-Minute Guru: Communication Strategy
 
Advocacy Gardening: Help Your Campaign Grow
Advocacy Gardening: Help Your Campaign GrowAdvocacy Gardening: Help Your Campaign Grow
Advocacy Gardening: Help Your Campaign Grow
 
Video Advocacy Tips
Video Advocacy TipsVideo Advocacy Tips
Video Advocacy Tips
 
Contention Beyond Social Movements: Activism and its Benefits
Contention Beyond Social Movements: Activism and its BenefitsContention Beyond Social Movements: Activism and its Benefits
Contention Beyond Social Movements: Activism and its Benefits
 
9 Quick-Start Blog Posts for Activists
9 Quick-Start Blog Posts  for Activists9 Quick-Start Blog Posts  for Activists
9 Quick-Start Blog Posts for Activists
 
Coder Training Slides (v2.3)
Coder Training Slides (v2.3)Coder Training Slides (v2.3)
Coder Training Slides (v2.3)
 
Social Media Promotion in 5 Easy Steps
Social Media Promotion in 5 Easy StepsSocial Media Promotion in 5 Easy Steps
Social Media Promotion in 5 Easy Steps
 
Video Advocacy Styles
Video Advocacy StylesVideo Advocacy Styles
Video Advocacy Styles
 
Hybrid Civil Society: How New and Historic Networks Collaborate for Change
Hybrid Civil Society: How New and Historic Networks Collaborate for ChangeHybrid Civil Society: How New and Historic Networks Collaborate for Change
Hybrid Civil Society: How New and Historic Networks Collaborate for Change
 
21st Century Civil Society: Implications for Open Government
21st Century Civil Society: Implications for Open Government21st Century Civil Society: Implications for Open Government
21st Century Civil Society: Implications for Open Government
 
The Internet of Compassion
The Internet of CompassionThe Internet of Compassion
The Internet of Compassion
 

Dernier

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Upgrading Nonviolence for the Digital Age

  • 1. source: Flickr/ moroccanmary CIVIL RESISTANCE 2.0 A Crowdsourced Project on 21st Century Nonviolence Mary Joyce @ the International Center on Nonviolent Conflict November 29, 2012 Digital Activism Research Project University of Washington www.digital-activism.org
  • 2. GENE SHARP source: humanfilm.no introduction for a man who needs no introduction
  • 3. GENE SHARP activist Nobel Peace Prize nominee scholar canonical list of 198 methods of nonviolent action (1973) most influential living theorist of nonviolent struggle source: humanfilm.no introduction for a man who needs no introduction
  • 4. THE YOUNG TURKS source: Fllickr/Ushahidi source: Fllickr/Moroccanmary who definitely do need an introduction
  • 5. THE YOUNG TURKS Patrick Meier Mary Joyce source: Fllickr/Ushahidi source: Fllickr/Moroccanmary Director of Social & Humanitarian Innovation Co-Founder of the at the Qatar Foundation Digital Activism Research Project PhD - Tufts University MA/PhD Student - UW researches digital technology and researches digital activism in nonviolence in repressive regimes resource-constrained societies who definitely do need an introduction
  • 6. THE MISSION source: Fllickr/Elvert Barnes Meld digital tools with nonviolence methods
  • 7. BUT FIRST source: Fllickr/Picture Perfect Pose two notes of warning
  • 8. ACTIVIST SECURITY Do not attempt digital activism without first considering the political context in your own country. • Social media is public, meaning the digital actions of you and the people you connect with can be watched by your government. • Governments are also getting very good at cracking passwords and linking accounts to physical locations, meaning you can be identified and harmed in the physical world. • Read “Digital Security for Activists” (https://oldhelp.riseup.net/assets/ digital_security_for_activists.pdf) or “Protecting Your Security Online” (https:// www.accessnow.org/blog/protecting-your-security-online-english-text-only1)
  • 9. NETWORKED AUTHORITARIANISM While activists are using digital tools to change the power structure, repressive govts are using the same tools to prevent that change. • Censorship of opposition content, so few people in your country will ever see it (particularly in MENA and China) • Surveillance of activists, both for chilling effect and to actually apprehend and punish (particularly in MENA and China) • Propaganda of their own position, successfully using social media to maintain support for the status quo (particularly in CIS) • Read: Rebecca MacKinnon, Katy Pearce, Evgeny Morozov (above typology is his)
  • 10. WHY?
  • 11. NONVIOLENCE IS NOW DIGITAL Whether nonviolence experts acknowledge it or not.
  • 12. ACTIVISTS WILL BENEFIT If digital practices are analyzed by experts in nonviolence.
  • 13. bit.ly/Civi lResistance source: Fllickr/lightsinmotion Follow me
  • 14. THE PROJECT Civil Resistance 2.0 : 198 Methods Upgraded
  • 15. THE METHOD Open-edit crowdsourcing
  • 16. ORGANIZATION Sharp’s method + enhancement + new form + implementation
  • 17. AN EXAMPLE Method 1: Public Speeches
  • 18. NOT ONLY THE GOOD NEWS Method 43: Public Mourning
  • 19. ENHANCEMENT Of the 54 methods of Protest and Persuasion there were only 2 for which we could not find digital enhancements Though the sections for Noncooperation and Intervention have received fewer notes, coordination of most of these methods could also be facilitated by digital tools like SMS, email, chat, and encrypted versions of these technologies.
  • 20. NEW FORMS Most means of Protest and Persuasion can now occur online as well as offline. Because Noncooperation and Intervention require direct engagement with institutions of power, new forms require that the institution of power have an online extension that can be targeted, such as a “denial of service” attack on a government website.
  • 21. 10 NEW METHODS 1. Maps and Maptivism 6. Influence Search Engine Results 2. QR Codes 7. Livestreaming 3. Digital File-Sharing 8. Check-ins 4. Nonviolent Media Hijacking 9. Self-Surveillance 5. “Trend” a Hashtag 10. Flash Mobs
  • 22. MAPS AND MAPTIVISM The digital and global amplifying the physical and local.
  • 23. QR CODES source: frogloop.com source: oneicity.com Linking physical, mobile, and web.
  • 24. DIGITAL FILE-SHARING this could be a tactical manual Use infrastructure accessible and familiar to your audience, young people use this software for pirating movies and music.
  • 25. NONVIOLENTLY HIJACK MEDIA source: http://adkyle.com Using their own media presence to undermine brand power.
  • 26. “TREND” A HASHTAG A prominent position for the opposition narrative.
  • 27. INFLUENCE SEARCH RESULTS A safer method of public satire.
  • 28. LIVESTREAMING Anyone can mass broadcast the opposition narrative.
  • 29. CHECK-INS Activists can check-in to signal participation to friends or leave directly after check-in, creating a protest rally of “ghosts”
  • 30. SELF-SURVEILLANCE Surveillance is not only a method of repression.
  • 31. FLASH MOBS Minsk, 2006 source: smartmobs.com source: feedbackagency.com source: andrewcarr.org This is a great dilemma action.
  • 32. MORE CHANGES NEEDED? Method 11 is Records, Radio, and Television source: clevescene.com source: guardian.co.uk source: cleanenergyjobact.com
  • 33. AN INVITATION bit.ly/ CivilResistance source: Flick/Hello Turkey Toe To advance strategic nonviolence in the 21st century Digital Activism Research Project University of Washington www.digital-activism.org