2018
DOI: 10.48550/arxiv.1812.11430
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Applying Text Mining to Protest Stories as Voice against Media Censorship

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…At this point, Nova et al discussed the reason behind it where women face harassment markedly more during online usage [Nova, 2019]. Not taking into account other forms of harassment, profile picture-based harassment and anonymous online harassment is common in developing countries [Ahmed, 2014;Ahmed, 2016;Ali, 2015;Ahmed, 2016b;Nova, 2019] along with weak laws to protect citizens in cyberspace [Ahmed, 2019a;Mayeesha, 2018]. According to Pater et al adolescent behavior in lower-income regions over a period of four years shows possibilities of risky behaviors over technology space [Pater, 2015].…”
Section: Access To Technology Is Dividedmentioning
confidence: 99%
See 2 more Smart Citations
“…At this point, Nova et al discussed the reason behind it where women face harassment markedly more during online usage [Nova, 2019]. Not taking into account other forms of harassment, profile picture-based harassment and anonymous online harassment is common in developing countries [Ahmed, 2014;Ahmed, 2016;Ali, 2015;Ahmed, 2016b;Nova, 2019] along with weak laws to protect citizens in cyberspace [Ahmed, 2019a;Mayeesha, 2018]. According to Pater et al adolescent behavior in lower-income regions over a period of four years shows possibilities of risky behaviors over technology space [Pater, 2015].…”
Section: Access To Technology Is Dividedmentioning
confidence: 99%
“…Similarly, other South Asian countries show gender disparity on privacy concerns [Sambasivan, 2018;Sambasivan, 2017;Ahmed, 2014;Nova, 2019], which results in harassment in the digital space for women. At this point, there are weaknesses in the infrastructure and support level where the form of ICT law of Bangladesh has vaguely defined terminologies and is not adequate to support misuse over the internet [Ahmed, 2019a;Mayeesha, 2018;Khan, 2004;House 2017]. Moreover, there is a gap in understanding the technology adoption, which is common in developing regions discussed under the postcolonial computing [Ahmed, 2014;Irani, 2010;Ahmed, 2015] framework.…”
Section: Reducing Restriction On Technologymentioning
confidence: 99%
See 1 more Smart Citation