Skip to main content

Twitter’s new reporting process centers on a human-first design

                         


 If you’ve ever reported a Tweet, you may have been frustrated by this process, which is a typical one online. First, you report an item, then a list of violations pops up — which one is it? Is it suspicious? Abusive? Both? You tick one of the boxes.
Based on Twitter receiving millions of reports; everything from misinformation and spam, to harassment and hate speech, it’s their way of telling Twitter, hey this isn’t right or I don’t feel safe. Based on user feedback, research, and an understanding that today’s reporting process wasn’t making enough people feel safe or heard, the company decided to do something about it. 
That's why Twitter is testing an overhauled reporting process that will make it easier for people to alert them of harmful behavior. The new approach, which is currently being tested with a small group in the US, simplifies the reporting process. It lifts the burden from the individual to be the one who has to interpret the violation at hand. Instead, it asks them what happened.
This method is called symptoms-first, where Twitter first asks the person what's going on. Here’s the analogy the team uses: say you're in the midst of an emergency medical situation. If you break your leg, the doctor doesn’t say, is your leg broken? They say, where does it hurt? The idea is, first let’s try to find out what’s happening instead of asking you to diagnose the issue. 
When people are motivated to report something, chances are, they’ve just experienced or witnessed something unsettling, which is a difficult time to ask them to figure out exactly which policy might have been violated. The reported Tweet didn’t exactly break a rule in some cases but bent it. By refocusing on the experience of the person reporting the Tweet, Twitter hopes to improve the quality of the reports they get. The more first-hand information they can gather about how people are experiencing certain content, the more precise Twitter can be when it comes to addressing it or ultimately removing it. This rich pool of information, even if the Tweets in question don't technically violate any rules, still gives Twitter valuable input that they can use to improve people’s experience on the platform. 

At every stage of Twitter's research and design process, the team intentionally included people from marginalized communities — women, people of color, and people from the LGBTQ+ community, including those who identify as trans or nonbinary. The theory is, if you design for the outliers, you actually solve for the majority. In this case, Twitter was designed with them in mind because they also happen to be some of the platform's most engaged users.  
Twitter will be able to use the feedback it gains from this new process to improve it and help more people. It will help them understand better what’s happening on the platform, and even what’s happening in the outside world, in society. And to connect those learnings to enhance their policies.  
Once the person reporting a violation describes what happened, Twitter then presents them with the Terms of Service violation they think might have occurred, at which point Twitter asks: Is that right? If not, the person can say so, which will help signal to Twitter that there are still some gaps in the reporting system. All the while Twitter is gathering feedback and compiling learnings from this chain of events that will help them fine-tune the process and connect symptoms to actual policies. Ultimately, it helps Twitter take appropriate action.  
“This report essentially triggers a review of the content. If Twitter determines that the content is violating and our rules dictate that the content be removed, that will happen,” said Fay Johnson, Director of Product Management on the Health team. “We'll do some additional investigation to see if there are other things that we need to take down based on what was reported, whether it be the content itself or an account.”  
Come next year, as the new process begins to roll out to a wider audience, Twitter will be working on improving its communication process, ensuring that it's closing the loop with those who are taking the time to report. It’s a worthwhile investment because by asking people to describe what’s happening to them, as opposed to just ticking a box, Twitter gets the added benefit of collecting rich feedback that allows it to identify concerns that perhaps had not been on its radar. 
Obviously we want to have rules that help keep everyone safe while balancing freedom of speech and promoting the public conversation. We also want to make sure that if there are new issues that are emerging — ones that we may not have rules for yet — there is a method for us to learn about them,” said Johnson. “The intention of these reporting flows is to empower the customer, give Twitter actionable information that we can use to improve the product and our experiences, and also improve our trust and safety process overall.”

Comments

Popular posts from this blog

Pegasus Spyware: Flying Through The Air

 Hundreds of millions of people can't imagine life without their smartphones. Almost every aspect of their daily lives, from the most mundane to the most intimate, is within easy reach and hearing distance of their smartphones. Only few people realize that their phones may be used as surveillance devices, with someone hundreds of miles away secretly extracting their messages, photographs, and location while also activating their microphone and recording them in real time. Such capabilities are present in Pegasus, a spyware produced by NSO Group, an Israeli maker of mass surveillance weapons. What is Pegasus? Pegasus is a hacking software – or spyware – that is developed, marketed and licensed to governments around the world by the Israeli company NSO Group. It has the capability to infect billions of phones using either iOS or Android operating systems. The spyware is named after Pegasus, the white winged horse from Greek mythology. It is named so because it "flies through the...

Difference Between Analysts and Statisticians

DIFFERENCE BETWEEN ANALYSTS AND STATISTICIANS In today’s digital landscape, data has become one of the biggest and most important assets for almost all organizations. Data can be fetched from anywhere and it’s actually transforming the way we live. Statistics and analytics are two branches of data science. Analysts specialize in exploring what’s in your data, statisticians focus more on inferring what’s beyond it. Let’s have a look at basic analytics? Try googling the weather. Whenever you use a search engine, you’re doing basic analytics. You’re pulling up weather data and looking at it. What expert analysts do? They’re all about taking a huge unexplored dataset and mining it for inspiration. Analysts are lightning-fast coders who can surf vast datasets quickly, they are data storytellers. Their mandate is to summarize interesting facts and to use data for inspiration. In some organizations those facts and that inspiration become input for human deci...

HOW TO SEE INCOGNITO HISTORY AND DELETE IT

We have heard about private or incognito browsing. It’s the mode that doesn’t store anything in history. While it does store cookies, but are deleted after the session is exited. This mode is known as Incognito browsing in Google Chrome, Private Browsing in Mozilla Firefox, and InPrivate Browsing in Internet Explorer. Whatever we may want to call it, the mode works the same in all browsers. However, sometimes we might want to go back to a page that you previously opened. The question is – can you check your incognito history? Problem is, there is no easy way to go back to that page. So all are search queries we saw is effectively lost. Unless you can Google it up and it shows again. But if it’s not there on the first page of Google, it’s gone forever. But we can still get to know about the websites that have been browsed under the incognito mode. Yes, the private browsing mode has a loophole. You can see the browsing history of someone using incognito mode but only if you h...