Freedom, GEABSOLUTE POWERS CORRUPT ABSOLUTELY, General Election (GE15), Malaysia, Politics, polling Nov 19: Destroy Umno for the betterment of Malaysia, race, religion, Solidality, support Aliran for Justice

Share This

Showing posts with label Twitter. Show all posts
Showing posts with label Twitter. Show all posts

Saturday 24 August 2013

China's content-rich microblogs

Sites like Sina Weibo can even get Western figures and celebrities, like boxer Mike Tyson, to come aboard.


WHILE Twitter is blocked in China, there are local microblogging sites to keep me informed and entertained.

Among the providers for microblogging service include Sina, Tencent, Xinhua, Souhu, People’s, Phoenix, NetEase and more.

Sina tops the list with 500 million registered users and 46.29 million daily active users as of December 2012.

Its popularity is proven with public and media using “Weibo” to refer to its microblogging site, although Weibo stands for microblog in general.

(Twitter has over 200 million active users churning out 400 million tweets a day, according to its blog post in March this year.)

The Chinese microblogging sites have similar basic features as their US counterpart, such as tagging other users with the symbol @, trending topics with hashtags and posting within an allowed character limit.

But what sets Weibo apart from Twitter is the rich media content.

Besides photos and animated GIF, some Weibo allow users to embed video and music files, and start a poll in their posts.

These elements have enhanced the Weibo surfing experience and created an entertaining platform for all.

A unique feature on Sina Weibo is the charity platform. Users can initiate a charitable cause, pledge donation, sign up as volunteers or simply repost a cause.

I am drawn to Sina Weibo for one simple reason – you can find almost everyone on it, from celebrities to writers, and government departments to restaurants.

Many of the official accounts are well-maintained, providing frequent and useful updates.

While Chinese president Xi Jinping does not have an official account, there is an account dubbed “Xuexi Fensituan” (Learning from Xi Fan Club) dedicated to disseminate news and photos of his activities.

The account owner has denied speculations that the account was a publicity effort, claiming that he was only a supporter.

Sina Weibo, which was launched in August 2009, is celebrating its fourth anniversary this month.

In an unaudited financial report for the second quarter of 2013, Sina Corporation announced a 209% year-on-year growth for its Weibo advertising revenue, which amounted to US$30mil (RM98.74mil).
The non-advertising revenues also increased from US$23.8mil (RM79mil) in the same period last year to US$32.2mil (RM106.9mil).

Back in April, China’s e-commerce giant Alibaba invested US$586mil (RM1.9bil) to purchase an 18% stake in Sina Weibo. This deal valued Sina Weibo at US$3.3bil (RM10.86bil).

The population on Weibo continued to beckon Western figures and celebrities to come on board to reach out to their Chinese fans.

The latest to join Sina Weibo was retired American boxer Mike Tyson, whose username is “Quanwang Taisen” (King of Boxing Tyson).

After greeting Chinese fans on his maiden post on Monday, he went on to ask who is the best fighter in China.

Amid the genuine replies (Donnie Yan and Jackie Chan, for instance) came an answer that had everyone in stitches – chengguan.

The term refers to the city management officers who are often labelled as abusive for getting involved in physical brawls with street vendors.

A clueless Tyson then asked, “Who is Chengguan? A tough man? I’ve never heard it (sic).”

He mentioned it again in a post later, “So many guys talking about chengguan as a great fighter? Still not a clue about him … All I’ve heard about are Jet Li, Jackie Chan, Donnie Yen, and wait wait, the Chinese dama (middle-aged women)!”

(Local news reports said the term Chinese dama became a popular term when the women rushed to snatch up gold.)

Needless to say, Tyson’s Weibo went viral, attracting 200,000 followers in just three days.

Although Sina Weibo has a reputation for self-censorship – posts with sensitive topics or keywords are deleted – it remains largely as a platform for freedom of expression.

It was even described as China’s Hyde Park in a report by Xinhua in December 2011: “… An open space where people feel free to participate in public affairs”.

As such, Weibo is the place to gauge public sentiments and there are calls lately to urge opinion leaders to observe their social responsibility on social media network.

Contributed by Tho Xin Yi
  • Tho Xin Yi (thoxinyi@thestar.com.my) sees Weibo as a tool to get first-hand news and gain insight into the Chinese society. She follows 329 users on Sina Weibo.

Friday 5 July 2013

Don’t be ‘that’ person on social media: tips and best practices

BE MORE COURTEOUS: Following someone on social media is a lot like dating, therefore one should follow certain rules of etiquette. — AFP

For me, following someone on social media is a lot like dating. I like to learn a little about them first before going all the way.

When I follow someone, it’s because I liked what they were sharing or appreciated what they had to say.
 
But not everyone is follow material. Some people are boring, annoying and predictable. And some make mistakes that leave us scratching our heads in sheer bewilderment.

So here are a few tips and best practices to not only get you more followers, but to get you noticed instead of blocked.

• May I have your attention? Please!   

Instead of telling me what you’re doing, tell me what has your attention. Way back when Twitter had that new car smell, it got a bad rap because everyone was posting that they were eating. Or thinking about eating. I don’t care about that, but I might care if you have photos of an amazing gourmet meal. In other words, what has your attention vs. the obvious.

As Doc Brown said in the Back to the Future movies, “Marty! You’re not thinking fourth-dimensionally!” Thinking fourth-dimensionally makes social media fun.

• Not everyone cares about your schedule: Scheduling tweets or Facebook posts isn’t the worst thing you can do, but scheduling something at an inopportune time is.

There are countless examples of brands and people that had tweets set up during tragedies such as the Sandy Hook school shooting and the Boston Marathon bombings. I had an e-mail exchange with someone after Boston who defended it with, “Oh, I had that set up loooooooong before it happened.” Well, you know what? That’s not a valid excuse. You are responsible for every message you send, whether it’s automated or not. Also, scheduling tweets that far in advance can be a recipe for trouble. Be aware of what’s going on around you at all times, and make sure the message you are sending is the right one.

• Let me be direct — or not: One of the things that annoys me most on Twitter is the automatic direct message.

You know, when you follow an account and you get a tweet immediately that goes something like this: “You are awesome. Let’s be awesome together. Tell me the things that make you happy.” Besides the fact that no one talks like this and I have little interest in talking about what makes me happy with someone I just met, the automatic direct message is lazy and it’s not social.

The real-life equivalent is screening a call and letting it go to voicemail. One is more convenient, but the other is appreciated. This is social media, folks. Show me the real you, not some watered-down version. Be social.

Keeping these three things in mind when you share on social media can be the difference between being just another follow and a superstar

By SCOTT KLEINBERG . — McClatchy-Tribune Information Services 

Related posts:

Deactivate your Facebook account!
Facebook paparazzi 
Facebook Tries to Monetize By Annoying; LinkedIn Adds Value fo its Site 
Laws of attraction
Pretty woman picture all it takes for Netizens to reveal all
FB postings became street fight

Sunday 29 July 2012

Berners-Lee, Web take bow at Olympics

Web inventor Sir Tim Berners-Lee takes a star turn during the opening ceremony for the Summer Olympics in London.

Sir Tim looks on as his tweet lights up the stadium.
(Credit: Screenshot by Edward Moyer/CNET)
 
Forget about the ripped-and-rugged sprinters and shot-putters, bring on the gold-medal geeks.

The opening ceremony of this summer's London Olympics obliged that sentiment, as Web inventor Sir Tim Berners-Lee got the star treatment during the extravaganza.

A hip-hoppy dance routine featuring legions of fist-pumping club-types gave way as a stage-set suburban house rose from the ground to reveal a lone keyboard jockey surfing away in solitude.

None other than Berners-Lee it was, and with a flick of his wrist, he lit up the stadium with a grandly flashing tweet: "This is for everyone."


And so, more and more, it is. In the two decades or so since its inception, the WWW has grown from a nerdy curiosity into a tool well nigh as widespread as the telephone or TV. Twitter itself reported today that 9.66 million tweets concerning the Olympics opening ceremony were sent out as the spectacle unfolded -- that's more than the number of tweets sent out about the 2008 Beijing Olympics during the entire run of that tournament. Clearly, the Web is nothing these days if not mainstream (though it bears noting that a digital divide does still exist, even in a country as well off as the U.S.).

Berners-Lee's tweet itself generated almost 10,000 retweets, Twitter said in its blog post. Here, courtesy of Berners-Lee himself, and the Web, is a clip of Sir Tim's big Olympic moment:





Related stories
Tim Berners-Lee: Tell Facebook, Google you want your data back
Tim Berners-Lee speaks out against U.K. surveillance bill
Tim Berners-Lee: The Web is threatened
Berners-Lee calls for higher purpose of Web
Tech advice from Tim Berners-Lee
Pew: Smartphones narrow digital divide
Web accessibility no longer an afterthought
Berners-Lee in a dress and the Web's first uploaded photo


Edward Moyer



Crave writer Edward Moyer, also CNET News' Saturday editor, once built a model of the DNA molecule for a PBS science series--out of telephone cord and tapioca balls. He also worked at USA Today and other pubs--waxing philosophical with Elvis' ex and slurping spaghetti with Roller Girl of "Boogie Nights," among other things. E-mail Ed with your story ideas and insights.

Related post:
Chinese supremacy at Olympics

Medal Count as at July 30, 2012
Leaders

Total
1
China953
17
2
United States575
17
3
France313
7
4
DPR Korea3-1
4
5
Italy242
8
6
Korea222
6
7
Russia2-3
5
8
Kazakhstan2--
2
9
Japan146
11
10
Australia121
4
11
Romania12-
3
12
Brazil111
3
12
Hungary111
3
14
Netherlands11-
2
15
Ukraine1-2
3
16
Georgia1--
1
16
Lithuania1--
1
16
South Africa1--
1
19
Colombia-2-
2
20
United Kingdom-12
3
21
Cuba-1-
1
21
Germany-1-
1
21
Mexico-1-
1
21
Poland-1-
1
21
Thailand-1-
1
21
Chinese Taipei-1-
1
27
Azerbaijan--1
1
27
Belgium--1
1
27
Canada--1
1
27
Indonesia--1
1
27
India--1
1
27
Moldova--1
1
27
Mongolia--1
1
27
Norway--1
1
27
Serbia--1
1
27
Slovakia--1
1
27
Uzbekistan--1
1
Malaysia---
-
Malaysia---
-


Thursday 14 June 2012

Malaysian Internet users to become victims of Evidence Act; Rampant hacking puts online accounts at risk!

Hackers may cause Internet users to become victims of Evidence Act

Rampant hacking is putting numerous account holders at risk of being prosecuted for offensive material on their website which they did not publish with the newly-introduced Evidence Act putting the onus of proof on them.

According to Cybersecurity Malaysia, an average of eight personal accounts, blogs and websites are being hacked in Malaysia daily.

“It doesn't take an expert to hack into personal accounts such as Facebook, Twitter and e-mail,” said Cybersecurity Malaysia chief executive officer Lt-Col (Rtd) Prof Datuk Husin Jazri.

“Any computer literate person can learn how to do it.”

He added that Internet users who did not secure their personal accounts were the easiest targets.

By P. ARUNA and TASHNY SUKUMA, The Star/Asian News Network

Hackers have their ways to tap into accounts

A graphic designer was not aware that pornographic pictures appeared on his Facebook page until a friend alerted him.

The 25-year-old man, who wanted to be known only as Shan, said he had been asleep at home when he received the call from his friend.

“I found that I could no longer log in to my account as the password had been changed.

“Someone was using my account to post the content under my name,” he said, adding that he then contacted his friends and asked them to delete the compromised account from their list.

Cybersecurity Malaysia CEO Lt-Col (Rtd) Prof Datuk Husin Jazri said there were special devices in the market that enabled anyone to “sniff” WiFi networks.

Lawyers: Act will result in more cautious Net users

The newly-amended Evidence Act will potentially result in a wave of more cautious Internet users, say lawyers, as the onus is now on the person to prove they did not post or create offending material.

If one is hauled up, however, maintaining innocence might prove to be tricky unless Internet users are more thorough with safety measures, they said.

“Witnesses or documents would suffice, depending on circumstances.

“However, if you're a website owner and someone posts such comments, there's no way out,” said Bar IT Committee co-chairman Foong Cheng Leong.

> For more story in The Star today.

Related posts:
 

Sunday 27 May 2012

Warning to Malaysian Internet Users: an Amendment to Evidence Act 2012

Onus on account owners as cyber bullies and stalkers often get away because of lack of evidence

PETALING JAYA: “It wasn't me.” That's the most common response from people when a hate or threatening message is traced to their Facebook or Twitter or any other Internet account.

The Malaysian Communications and Multimedia Commission says it is almost legally impossible to take action if all that a person has to do is to deny any responsibility.

“Think of the victims. People who have been slandered or whose lives have been threatened,” commission chairman Datuk Mohamed Sharil Mohamed Tarmizi said, adding that many a time cyber bullies and stalkers who often use “the cloak of anonymity” have got away because of lack of evidence.

“As more of the young are connected online, who is going to watch over these kids when there are real people who want to harm them?” he said in an interview on the amendment to the Evidence Act passed by the Dewan Rakyat last month.


Answering critics who said the amendment was unfair in pushing the burden of proof to the accused, he said that owners of Internet accounts where hate messages had originated could easily rebut charges against them if they were innocent.

“For example, if you can produce witnesses to say that you were nowhere near your computer or any other communicating device at the time the message was sent out, you can get off,” Sharil said.

He added: “It is not easy nailing offenders to the charge. Sometimes you can find evidence and sometimes you can't.

“At least now (with the amendment), a flat denial (from the accused) cannot work anymore.”

The amendment to Section 114(a) of the Evidence Act includes the following stipulations:

> If your name, photograph or pseudonym appears on any publication depicting yourself as the author, you are deemed to have published the content.

> If a posting comes from your Internet or phone account, you are deemed to be the publisher unless the contrary is proved.

> If you have the control or custody of any computer which published any material, you are presumed to be the publisher unless proven otherwise.

Asked if the amendment infringed on Internet users' personal liberties, Sharil said the authorities would still have to carry out rigorous and thorough investigations before charging anyone.

“Then there is the trial processs to go through,” he added.

He admitted that the conviction rate of suspected cyber offenders was very low.

From 2009 to 2011, 625 cases of people making obscene or offensive comments via the Internet or phone were investigated.

Only 16 were brought to court and just three were convicted.

Minister in the Prime Minister's Department Datuk Seri Nazri Aziz said it was difficult to prosecute offenders before the amendment to the Act.

“It was especially difficult to prosecute offenders because the servers were located overseas.

“Everything was in a mess,” he said, and denied that the amendment was to curb dissent.

The Government does not want to stifle anyone. But we don't want people to slander or threaten others,” Nazri added.

By REGINA LEE  regina@thestar.com.my

Amendment not justified, say groups

PETALING JAYA: The amendment to the Evidence Act transfers the burden of proof to the accused, which is contrary to the principle of justice, said lawyers and Internet users.

“At any trial, whether criminal or civil cases, it is up to the prosecutor to prove guilt beyond reasonable doubt. Now the burden will be shifted to the accused to disprove (the allegation against them),” said human rights lawyer Edmund Bon.

He added: “All around the world where there is Internet any reasonable person would be against the posting of hate messages. But whether the Government should step in and take such control is another matter.”

Disputing that the amendment will bring more people to justice, Bon said that it will instead reduce the need for the police and other enforcement agencies to be thorough in their investigations.

He believed that current defamation and sedition laws were enough to curb offensive and criminal messages on the Internet.

Intellectual property lawyer and Kuala Lumpur Bar Information Technology Committee co-chairman Foong Cheng Leong said the amendment would be a source of harassment to people whose identities have been abused to send offensive or threatening messages.

“Say it is an elderly person who subscribes to the Internet and does not know how to secure his wifi account.

“If someone uses that unsecured wifi to upload all these offensive postings, it's the elderly man who will get into trouble,” he said.

However, he agreed that it was difficult to trace the author of the offensive material, especially when international servers or public computers are used.

“But changing the law is taking the easy way out,” said Foong, who authored an extensive article about the amendment on the Loyar Burok website. ( See below:Grave repercussions for internet users)

Meanwhile, many have tweeted their disapproval for the amendment, claiming that people would have to “flip over backwards to prove their innocence”.

At the same time, some have voiced their support for the amendment, especially those who have been on the receiving end of hate messages.



“These anonymous writers of hate messages against me are gutless and stupid.

“They help justify the Government's proposal to amend the Evidence Act,” tweeted lawyer Roger Tan who had been criticised for writing a critique on the recent Malaysian Bar extraordinary general meeting.

Grave repercussions for internet users

The Evidence (Amendment) (No. 2) Bill 2012 was one of the bills rushed and passed by the Parliament recently. Minister in the Prime Minister’s Department, Datuk Seri Mohamed Nazri Aziz, when winding up the Evidence (Amendment) Bill 2012, said the use of pseudonyms or anonymity by any party to do cyber crimes had made it difficult for the action to be taken against them. Hence, the Evidence Act 1950 must be amended to address the issue of Internet anonymity.

The amendments introduced s. 114A into the Evidence Act 1950 to provide for the presumption of fact in publication in order to facilitate the identification and proving of the identity of an anonymous person involved in publication through the internet. In simple words, s. 114A introduces 3 circumstances where an Internet user is deemed to be a publisher of a content unless proven otherwise by him or her.

Men in masks, beware of s.114A.

Although it is stated that the amendment is to cover anonymous persons on the internet, the effect of the amendment is quite wide. You see, we, especially social media network users, generally do not use our real names on the Internet. We use nicknames and pseudonyms. Our home addresses do not appear on our account. We sometimes use fictional characters or even digitalized images of ourselves as our profile picture. All these are done to protect our own privacy. So, if none of my personal details appear on my account, does this mean I am anonymous? If someone’s identity cannot be directly ascertained from his account, I would think that he would be anonymous.

The new s. 114A(1) states that “A person whose name, photograph or pseudonym appears on any publication depicting himself as the owner, host , administrator, editor or sub-editor, or who in any manner facilitates to publish or re-publish the publication is presumed to have published or re-published the contents of the publication unless the contrary is proved”. In simple words, if your name, photograph or pseudonym appears on any publication depicting yourself as the aforesaid persons, you are deemed to have published the content. So, for example, if someone creates a blog with your name, you are deemed to have published the articles there unless you prove otherwise. If you have a blog and someone posts a comment, you are deemed to have published it. If you have a Facebook page and an user posts something on your wall, you are deemed to have published it!<.

Subsection (2) provides a graver consequence. If a posting originates from your account with a network service provider, you are deemed to be the publisher unless the contrary is proved. In simple terms, if a posting originates from your TM Unifi account, you are deemed to be the publisher. In the following scenarios, you are deemed to be the publisher unless you prove the contrary:-.

(1) You have a home network with a few house mates sharing one internet account. You are deemed to be the publisher even though one of your house mates posts something offensive online..

(2) You have wireless network at home but you did not secure your network. You are deemed to be the publisher even though someone “piggybacks” your network to post something offensive..

(3) You have a party at home and allows your friends to access your PC or wireless network.You are deemed to be the publisher even though it was a friend who posted something offensive..

(4) Someone use your phone or tablet to post something offensive. You are deemed to be the publisher..

As for subsection (3), you are presumed to have published a content if you have custory or control of any computer which the publication originates from. Here, you are deemed to be the publisher so long your computer was the device that had posted the content. So if someone “tweetjacks” you or naughtily updates your Facebook with something offensive, you are deemed to be the publisher unless you prove otherwise Admittedly, the amendments certainly saves a lot of the investigator’s time. It is very difficult to trace someone on the Internet. It will make prosecution for, among others, defamation, offences under the Communication and Multimedia Act 1998 and Computer Crimes Act 1997 and, election offences much easier. But it is not impossible to trace someone. There are many cases where perpetrators are caught and charged..


The new Bill: to like or not to like? | Source: http://www.flickr.com/photos/birgerking/

I do not see the logic to deem someone to be a publisher. If an investigator is unable to trace the anonymous internet user, then why should the innocent Internet user take the rap? The onus of proof should always be on the prosecuting side. In the English case of Applause Store Productions Limited & Anor v Grant Raphael [2008] EWHC 1781 (QB), the claimants were awarded £22,000 in damages against Raphael, an old school friend, who had created a false personal profile of the claimants on Facebook. The claimants convinced the Court that Raphael was the person who created the fake profile even though he claimed that he had a party at his house and someone in that party created the account.

In summary, the new amendments force an innocent party to show that he is not the publisher. Victims of stolen identity or hacking would have a lot more problems to fix. Since computers can be easily manipulated and identity theft is quite rampant, it is dangerous to put the onus on internet users. An internet user will need to give an alibi that it wasn’t him. He needs to prove that he has no access to the computer at that time of publication and he needs to produce call witnesses to support his alibi..

Clearly, it is against our very fundamental principal of “innocent until proven guilty”. With general election looming, I fear this amendment will be used oppressively. Fortunately, the amendment is not in force yet. I strongly hope that the government will relook into this amendment.