How Technology Can Facilitate Justice in Post-Conflict Zones
Offered By: Web Summit via YouTube
Course Description
Overview
Explore how technology can be leveraged to facilitate justice in post-conflict zones in this 32-minute Web Summit conference talk. Delve into the challenges faced by post-conflict societies, including lack of infrastructure, scattered populations, and weakened institutions. Learn from experts Wendy Betts, Izzeldin Abuelaish, Dixon Osburn, and Derek Mead as they discuss innovative ways to gather evidence and hold perpetrators accountable. Discover the role of social media in collecting and preserving evidence, the importance of establishing truth and understanding, and the potential of technologies like Suncalc and blockchain for provenance. Examine the double-edged nature of social media in conflict zones and the complexities of moving from atrocity to justice. Gain insights into the importance of personal connections, reconciliation, and the promise of the internet in facilitating justice. Understand the challenges of information control and explore emerging technological solutions for addressing social justice issues in post-conflict areas.
Syllabus
Introduction
How tech can help deal with atrocity
Social justice in postconflict zones
Establishing truth and understanding
Provenance
Suncalc
Trust
Social media
Social media evidence
How to preserve social media evidence
How to show that a tweet is legally relevant
Social media as a doubleedged sword
How to move from atrocity to justice
Loss of control of information
Importance of personal connection
Reconciliation and justice
What is the data out there
How do you establish truth
Where else good solutions come from
Other areas of tech
Control of information
The promise of the internet
Taught by
Web Summit
Related Courses
Foundations of Computer Science for TeachersThe University of Texas at Austin via edX Computer Forensics
Rochester Institute of Technology via edX FinTech Security and Regulation (RegTech)
The Hong Kong University of Science and Technology via Coursera Cyber Security
CEC via Swayam Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX