Skip to main content

Twitter’s new reporting process centers on a human-first design

                         


 If you’ve ever reported a Tweet, you may have been frustrated by this process, which is a typical one online. First, you report an item, then a list of violations pops up — which one is it? Is it suspicious? Abusive? Both? You tick one of the boxes.
Based on Twitter receiving millions of reports; everything from misinformation and spam, to harassment and hate speech, it’s their way of telling Twitter, hey this isn’t right or I don’t feel safe. Based on user feedback, research, and an understanding that today’s reporting process wasn’t making enough people feel safe or heard, the company decided to do something about it. 
That's why Twitter is testing an overhauled reporting process that will make it easier for people to alert them of harmful behavior. The new approach, which is currently being tested with a small group in the US, simplifies the reporting process. It lifts the burden from the individual to be the one who has to interpret the violation at hand. Instead, it asks them what happened.
This method is called symptoms-first, where Twitter first asks the person what's going on. Here’s the analogy the team uses: say you're in the midst of an emergency medical situation. If you break your leg, the doctor doesn’t say, is your leg broken? They say, where does it hurt? The idea is, first let’s try to find out what’s happening instead of asking you to diagnose the issue. 
When people are motivated to report something, chances are, they’ve just experienced or witnessed something unsettling, which is a difficult time to ask them to figure out exactly which policy might have been violated. The reported Tweet didn’t exactly break a rule in some cases but bent it. By refocusing on the experience of the person reporting the Tweet, Twitter hopes to improve the quality of the reports they get. The more first-hand information they can gather about how people are experiencing certain content, the more precise Twitter can be when it comes to addressing it or ultimately removing it. This rich pool of information, even if the Tweets in question don't technically violate any rules, still gives Twitter valuable input that they can use to improve people’s experience on the platform. 

At every stage of Twitter's research and design process, the team intentionally included people from marginalized communities — women, people of color, and people from the LGBTQ+ community, including those who identify as trans or nonbinary. The theory is, if you design for the outliers, you actually solve for the majority. In this case, Twitter was designed with them in mind because they also happen to be some of the platform's most engaged users.  
Twitter will be able to use the feedback it gains from this new process to improve it and help more people. It will help them understand better what’s happening on the platform, and even what’s happening in the outside world, in society. And to connect those learnings to enhance their policies.  
Once the person reporting a violation describes what happened, Twitter then presents them with the Terms of Service violation they think might have occurred, at which point Twitter asks: Is that right? If not, the person can say so, which will help signal to Twitter that there are still some gaps in the reporting system. All the while Twitter is gathering feedback and compiling learnings from this chain of events that will help them fine-tune the process and connect symptoms to actual policies. Ultimately, it helps Twitter take appropriate action.  
“This report essentially triggers a review of the content. If Twitter determines that the content is violating and our rules dictate that the content be removed, that will happen,” said Fay Johnson, Director of Product Management on the Health team. “We'll do some additional investigation to see if there are other things that we need to take down based on what was reported, whether it be the content itself or an account.”  
Come next year, as the new process begins to roll out to a wider audience, Twitter will be working on improving its communication process, ensuring that it's closing the loop with those who are taking the time to report. It’s a worthwhile investment because by asking people to describe what’s happening to them, as opposed to just ticking a box, Twitter gets the added benefit of collecting rich feedback that allows it to identify concerns that perhaps had not been on its radar. 
Obviously we want to have rules that help keep everyone safe while balancing freedom of speech and promoting the public conversation. We also want to make sure that if there are new issues that are emerging — ones that we may not have rules for yet — there is a method for us to learn about them,” said Johnson. “The intention of these reporting flows is to empower the customer, give Twitter actionable information that we can use to improve the product and our experiences, and also improve our trust and safety process overall.”

Comments

Popular posts from this blog

ROBOTIC PROCESS AUTOMATION

                             ROBOTIC PROCESS AUTOMATION: Robotic process automation (RPA), also known as software robotics, uses automation technology to simulate back-office functions performed by human employees, such as extracting data, filling out forms, moving files, etc. To integrate and carry out repetitive operations between enterprise and productivity applications, it mixes APIs and user interface (UI) interactions.   WORKING: RPA is not a physical robot but software running on physical and virtual machines. RPA is used when we have to handle repetitive tasks like sometimes, we fill in the same information at different places. It is operated by running a set of workflow tasks. It gives some instructions about what to do and how to do it at different stages of the workflow. Once the task is requested, the software runs and completes the whole task accordingly as many times as we want. If there is any incorrect data in bots, the software will send a request for correct

Unhackable Internet

  W hy it matters?   The internet is increasingly vulnerable to hacking; a quantum one would be unhackable. Quantum Computing    A quantum internet could be used to send unhackable messages, improve the accuracy of GPS, and enable cloud-based quantum computing. For more than twenty years, dreams of creating such a the quantum network have remained out of reach in large part because of the difficulty to send quantum signals across large distances without loss.   Now, Harvard and MIT researchers have found a way to correct for signal loss with a prototype quantum node that can catch, store and entangle bits of quantum information. The research is the missing link towards a practical quantum internet and a major step forward in the development of long-distance quantum networks.   The U.S Department of Energy (DoE) explains how a quantum link will make it happen through two quantum phenomenon: the first is quantum entanglement, where two-particle can become so inextricably li

Pegasus Spyware: Flying Through The Air

 Hundreds of millions of people can't imagine life without their smartphones. Almost every aspect of their daily lives, from the most mundane to the most intimate, is within easy reach and hearing distance of their smartphones. Only few people realize that their phones may be used as surveillance devices, with someone hundreds of miles away secretly extracting their messages, photographs, and location while also activating their microphone and recording them in real time. Such capabilities are present in Pegasus, a spyware produced by NSO Group, an Israeli maker of mass surveillance weapons. What is Pegasus? Pegasus is a hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones using either iOS or Android operating systems. The spyware is named after Pegasus, the white winged horse from Greek mythology. It is named so because it "flies through the