<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2127517647835977939</id><updated>2026-03-22T11:49:54.568+02:00</updated><category term="research"/><category term="education"/><category term="software"/><category term="academic"/><category term="web2.0"/><category term="online_portfolio"/><category term="eportfolio"/><category term="apple"/><category term="design"/><category term="arts"/><category term="visual"/><category term="qualitative"/><category term="nvivo"/><category term="affordances"/><category term="south_africa"/><category term="iTunes"/><category term="students"/><category term="university"/><category term="choices"/><category term="media studies"/><category term="multimodal"/><category term="music"/><category term="cyberbullying"/><category term="coding"/><category term="art"/><category term="blog"/><category term="Carbonmade"/><category term="Twitter"/><category term="cape town"/><category term="creative production"/><category term="customer"/><category term="social media"/><category term="COVID-19"/><category term="Facebook"/><category term="META"/><category term="activitytheory"/><category term="censorship"/><category term="conference"/><category term="digital"/><category term="hardware"/><category term="social_network"/><category term="visual culture"/><category term="Blogger"/><category term="QDAS"/><category term="app"/><category term="brandjacking"/><category term="capital"/><category term="disinfodemic"/><category term="fun"/><category term="guidelines"/><category term="index"/><category term="infographic"/><category term="learners"/><category term="promotion"/><category term="scam"/><category term="scholarly"/><category term="school"/><category term="social semiotic"/><category term="social_media"/><category term="suppression"/><category term="visual arts"/><category term="website"/><category term="workshop"/><category term="writing"/><category term="Android"/><category term="CAQDAS"/><category term="Instagram"/><category term="LinkedIn"/><category term="OCC"/><category term="PhD"/><category term="WhatsApp"/><category term="X"/><category term="advert"/><category term="analysis"/><category term="argument"/><category term="article"/><category term="artwork"/><category term="bullying"/><category term="copyright"/><category term="culture"/><category term="cybercrime"/><category term="design_thinking"/><category term="development"/><category term="digital voice"/><category term="disclaimer"/><category term="download"/><category term="emoji"/><category term="framework"/><category term="green_computing"/><category term="habitus"/><category term="health communication"/><category term="higher education"/><category term="identity"/><category term="infodemic"/><category term="intellectual harassment"/><category term="laptop"/><category term="lesson"/><category term="mac"/><category term="marketing"/><category term="online publication"/><category term="output"/><category term="participatory culture"/><category term="referencing"/><category term="review"/><category term="science"/><category term="science communication"/><category term="self presentation"/><category term="stickers"/><category term="television"/><category term="workaround"/><category term="Atlas.ti"/><category term="CHAT"/><category term="Carbon made"/><category term="Comirnaty®"/><category term="Coverflow"/><category term="DJ"/><category term="DOI"/><category term="Google Play_Store"/><category term="MAXQDA"/><category term="OLPC"/><category term="Pfizer BioNTech"/><category term="QDAMiner"/><category term="Refworks"/><category term="access"/><category term="activity theory"/><category term="affinity spaces"/><category term="africa"/><category term="app_approval"/><category term="bandwidth"/><category term="banner"/><category term="bibliography"/><category term="brand"/><category term="canon"/><category term="capabilities"/><category term="cartridges"/><category term="celebrity"/><category term="changes"/><category term="citations"/><category term="connected learning"/><category term="connected_learning"/><category term="content analysis"/><category term="createwithpixels"/><category term="curricular_adoption"/><category term="customisation"/><category term="d-school"/><category term="data"/><category term="delicious"/><category term="design strategy"/><category term="diet"/><category term="digital crime"/><category term="digital platform"/><category term="digital_crime"/><category term="digitisation"/><category term="diigo"/><category term="drum&amp;bass"/><category term="eco"/><category term="educator"/><category term="email"/><category term="endorsement"/><category term="ethics"/><category term="exclusion"/><category term="exhibition"/><category term="failure"/><category term="fake"/><category term="flat"/><category term="fraud"/><category term="free speech"/><category term="friendly"/><category term="genre"/><category term="global"/><category term="harassment"/><category term="health clinician"/><category term="iPhone"/><category term="idea"/><category term="inequality"/><category term="ink"/><category term="installation"/><category term="institution"/><category term="labels"/><category term="learning"/><category term="literature review"/><category term="local"/><category term="mRNA vaccines"/><category term="macbook"/><category term="medium"/><category term="microblogging"/><category term="microfraud"/><category term="online identity"/><category term="organised persuasive communication"/><category term="participatory"/><category term="personas"/><category term="phishing"/><category term="photograph"/><category term="playlist"/><category term="post-truth"/><category term="poster"/><category term="prevention"/><category term="printer"/><category term="privacy"/><category term="propaganda"/><category term="qualitative data analysis"/><category term="recommendations"/><category term="recycle"/><category term="repair"/><category term="research method"/><category term="scams"/><category term="search"/><category term="semantic network analysis"/><category term="small data analysis"/><category term="social&#xa;semiotics"/><category term="software_comparison"/><category term="strategic design"/><category term="strategy"/><category term="tags"/><category term="technology"/><category term="titles"/><category term="toolkit"/><category term="trolls"/><category term="upgrade"/><category term="victimisation"/><category term="voice"/><category term="wrongthink"/><title type='text'>Travis Noakes&#39; research</title><subtitle type='html'>Insights into academic free speech, dissent + digital visibility risks</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>149</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-9051597957385217562</id><published>2026-02-14T17:22:00.077+02:00</published><updated>2026-03-22T09:40:23.588+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="academic"/><category scheme="http://www.blogger.com/atom/ns#" term="article"/><category scheme="http://www.blogger.com/atom/ns#" term="DOI"/><category scheme="http://www.blogger.com/atom/ns#" term="failure"/><category scheme="http://www.blogger.com/atom/ns#" term="index"/><category scheme="http://www.blogger.com/atom/ns#" term="referencing"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="search"/><title type='text'>A research article’s digital cul-de-sac. How to fix an academic paper that is hidden and/or unreachable</title><content type='html'>&lt;span style=&quot;color: #444444; font-size: x-small;&quot;&gt;Written for researchers keen to understand potential obstacles to their articles not being readily searchable via academic indexes and search engines thanks to broken linkages, a metadata mismatch or non-submission. Updated- &lt;/span&gt;&lt;span style=&quot;color: #38761d;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;22&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;March 2026&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Most researchers are keen for their works to be well-indexed, quick-to-find, and reliably linked to their academic publisher’s landing page from search engine results. This is especially true for scholars whose performance reviews include consideration of their works’ impact in reaching interested readers. Such impact scores can include citations, amplification and readership, as tracked via &lt;a href=&quot;https://www.altmetric.com/about-us/what-are-altmetrics/&quot; target=&quot;_blank&quot;&gt;altmetrics&lt;/a&gt; and other sources.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;This post provides an example to illustrate why a research author should not assume that every article of theirs will be properly indexed. As result, this work may not be seen by potentially interested parties searching for pertinent work with salient keywords, despite the work&#39;s merits. Metadata mismatches and broken linkages can unwittingly emerge during academic publishing, and may persist if not checked, flagged, and corrected. This post&amp;nbsp;gives helpful advice for correcting or working around a few key problems. It shares the practical example of errors that impacted a South African journal article&#39;s availability after its digital publication on the 1st of December, 2025:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&#39;Brandjacked for social media advert fraud&#39;- a ghost in the fog...&amp;nbsp;&lt;/h3&gt;&lt;div&gt;&lt;div&gt;The &lt;a href=&quot;https://www.travisnoakes.co.za/2025/12/brandjacked-for-social-media-advert.html&quot; target=&quot;_blank&quot;&gt;first publication&lt;/a&gt; from a research project that began in 2021, &lt;i&gt;Brandjacked for social media advert fraud: Microcelebrities&#39; experiences of digital crime,&lt;/i&gt; was published in the &lt;a href=&quot;https://journals.co.za/journal/crim&quot; target=&quot;_blank&quot;&gt;Acta Criminologica: African Journal of Criminology &amp;amp; Victimology&lt;/a&gt; journal. Ordinarily, new articles should only take a few weeks after being indexed by an&amp;nbsp;an academic metadata aggregator, such as&amp;nbsp;&lt;a href=&quot;https://www.crossref.org/&quot; target=&quot;_blank&quot;&gt;Crossref&lt;/a&gt;, before featuring on authors&#39; academic profiles. Crossref can update researchers&#39; ORCID and Google Scholar records, followed by listings on academic social networks. These may be preceded by results in search engines and in Artificial Intelligence results (such as &lt;a href=&quot;https://grok.com/&quot; target=&quot;_blank&quot;&gt;Grok&lt;/a&gt;). While search results for &lt;i&gt;Brandjacked&lt;/i&gt; were quickly available from the last two, it could not be found under any of the former by February, 2026.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This post explores such challenges, the root cause of the article not being be properly indexed for academic searches, plus the work-arounds that&amp;nbsp;&lt;i&gt;Brandjacked&#39;s&amp;nbsp;&lt;/i&gt;authors followed. While their paper technically existed, it could not efficiently be shared online by the four co-authors, with some listing results defaulting to a &#39;page not found&#39; error message, rather than the publisher&#39;s article landing page:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Multiple URLs as expected&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;A normal part of the academic publishing process sees several URLs being created for a particular publication. In &lt;i&gt;Brandjacked&lt;/i&gt;&#39;s case, these are from the handle.net&amp;nbsp; domain (pointing to &lt;a href=&quot;https://hdl.handle.net/10520/ejc-crim_v38_n3_a2&quot; target=&quot;_blank&quot;&gt;hdl.handle.net/10520/ejc-crim_v38_n3_a2&lt;/a&gt;) and journals.co.za&#39;s (onto &lt;a href=&quot;https://journals.co.za/doi/10.10520/ejc-crim_v38_n3_a2&quot; target=&quot;_blank&quot;&gt;journals.co.za/doi/10.10520/ejc-crim_v38_n3_a2&lt;/a&gt;). Sabinet African Journals (&lt;a href=&quot;http://journals.co.za&quot; target=&quot;_blank&quot;&gt;journals.co.za&lt;/a&gt;) is a searchable platform providing a comprehensive, full-text collection for over 600 African-published electronic journals. Handle.net is developed by the Corporation for National Research Initiatives (&lt;a href=&quot;https://www.cnri.reston.va.us/&quot; target=&quot;_blank&quot;&gt;CNRI&lt;/a&gt;) to support a distributed information system for persistent, unique, and actionable identifiers (handles) for digital objects over the internet.&amp;nbsp; The Handle System is the underlying technology used by the Digital Object Identifier (&lt;a href=&quot;https://www.doi.org/&quot; target=&quot;_blank&quot;&gt;DOI&lt;/a&gt;) setup for identifying content, particularly for digital publishing and commerce.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Brandjacked&#39;s DOI value changed post-publication&lt;/h3&gt;&lt;div&gt;A DOI is a unique, permanent alphanumeric string that is assigned to digital objects. DOIs include a prefix always starting with 10 and a suffix, separated by a forward slash (/). Prefacing the DOI with doi.org creates an actionable link. Originally, the &lt;i&gt;Brandjacked&lt;/i&gt; article was allocated the DOI 10.10520/ejc-crim_v2025_nse1_a2. However, this was subsequently changed to 10.10520/ejc-crim_v38_n3_a2 to reflect the article’s publication as the second in the 38th volume’s third issue. Commonly linked to journal articles, books, and research datasets, each DOI should provide a stable, long-lasting link to a research output’s internet location, regardless of whether its online address [or Uniform Research Location (URL)] gets changed.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Social media shares…&lt;/h3&gt;&lt;div&gt;On social media, academics, researchers and scholars typically share the DOI version of URLs, since a DOI&#39;s usage is the primary identifier for tracking comments and mentions via altmetrics. Attention for academic publications is typically sparse, with most not being shared via social media, and a significant portion only being shared once via popular platforms. Only a few papers, often with high public interest or &quot;quirky&quot; topics, receive the vast majority of shares. To help Brandjacked&#39;s visibility, I wrote a 31 tweet long thread at &lt;a href=&quot;https://x.com/travisnoakes/status/2001585342000898177&quot; target=&quot;_blank&quot;&gt;x.com/travisnoakes/status/2001585342000898177&lt;/a&gt;, shared a LinkedIn post at &lt;a href=&quot;https://www.linkedin.com/feed/update/urn:li:activity:7407406366052569089/&quot; target=&quot;_blank&quot;&gt;linkedin.com/feed/update/urn:li:activity:7407406366052569089/&lt;/a&gt;, and wrote this public Facebook post at &lt;a href=&quot;https://www.facebook.com/share/p/1BtsXaJtQC/&quot; target=&quot;_blank&quot;&gt;facebook.com/share/p/1BtsXaJtQC/&lt;/a&gt;.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;… but no AltMetrics listing yet&lt;/h3&gt;&lt;div&gt;&lt;div&gt;On the &lt;i&gt;Brandjacked&lt;/i&gt; article’s landing page, the altmetrics badge only shows a question mark at the date of this post&#39;s publication (see Figure 1 below).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLdeINi7UzFJAQwE8tBxTOq_iXWGDOm8XFtHOSPBNr6UE47hvBWs6YHHZDxiz8TlwZOxOVTHKnGcxUbSjRqXoPaYAes4y5EEC0KmJ6rqf7wBKyLGR9QGr68ImRiBaViARqsFOp4Vq_rscCO5J6QjSobkmd0S0D13K5vzzHPxZM_XZE5rHZx1HS8IUKujvO/s2026/No%20AltMetrics%20listing%20for%20Brandjacked%20article.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;No AltMetrics listing for Brandjacked article.png&quot; border=&quot;0&quot; data-original-height=&quot;1396&quot; data-original-width=&quot;2026&quot; height=&quot;275&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLdeINi7UzFJAQwE8tBxTOq_iXWGDOm8XFtHOSPBNr6UE47hvBWs6YHHZDxiz8TlwZOxOVTHKnGcxUbSjRqXoPaYAes4y5EEC0KmJ6rqf7wBKyLGR9QGr68ImRiBaViARqsFOp4Vq_rscCO5J6QjSobkmd0S0D13K5vzzHPxZM_XZE5rHZx1HS8IUKujvO/w400-h275/No%20AltMetrics%20listing%20for%20Brandjacked%20article.png&quot; title=&quot;No AltMetrics listing for Brandjacked article.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 1. Screenshot of&amp;nbsp;No AltMetrics listing for &lt;i&gt;Brandjacked&lt;/i&gt; article,12 Feb 2026.&amp;nbsp;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Nor are results for the Brandjacked article shown on &lt;a href=&quot;https://app.dimensions.ai/discover/publication?search_mode&quot; target=&quot;_blank&quot;&gt;app.dimensions.ai/discover/publication?search_mode&lt;/a&gt;&amp;nbsp;(see Figure 2).&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzbCXKUdymrJ3cV39KxdMpzqQtaMz1abiYl4QiVFCwAIvvdEhI8B3NAuG82jSrEJapzDu3wMo-dFumYXRCG-bqs6u7Aq9Ph4A6McdvoXAvtandeZMgyYxjIrPMd3IXAh9YhsIY9C6iXO-gXd7813C9M5biylZF2BGOH2cdnsjpmOPKIzhCt6m7WJu0rRnE/s2110/No%20results%20app.dimensions.ai%20for%20Brandjacked.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;No AltMetrics listing for Brandjacked article&quot; border=&quot;0&quot; data-original-height=&quot;986&quot; data-original-width=&quot;2110&quot; height=&quot;188&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzbCXKUdymrJ3cV39KxdMpzqQtaMz1abiYl4QiVFCwAIvvdEhI8B3NAuG82jSrEJapzDu3wMo-dFumYXRCG-bqs6u7Aq9Ph4A6McdvoXAvtandeZMgyYxjIrPMd3IXAh9YhsIY9C6iXO-gXd7813C9M5biylZF2BGOH2cdnsjpmOPKIzhCt6m7WJu0rRnE/w400-h188/No%20results%20app.dimensions.ai%20for%20Brandjacked.png&quot; title=&quot;No AltMetrics listing for Brandjacked article&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br class=&quot;Apple-interchange-newline&quot; /&gt;Figure 2.&amp;nbsp;Screenshot of&amp;nbsp;&lt;span&gt;No AltMetrics listing for &lt;i&gt;Brandjacked&lt;/i&gt; article,&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;12 Feb 2026.&amp;nbsp;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;div&gt;As a research blogger, I like to share Altmetrics badges for my &lt;a href=&quot;https://www.travisnoakes.co.za/p/peer-reviewed-research-articles.html&quot; target=&quot;_blank&quot;&gt;publications&lt;/a&gt;, but none is available for &lt;i&gt;Brandjacked&lt;/i&gt; via &lt;a href=&quot;https://badge.dimensions.ai/details/doi/10.10520/ejc-crim_v38_n3_a2?domain=https://journals.co.za&quot;&gt;badge.dimensions.ai/details/doi/10.10520/ejc-crim_v38_n3_a2?domain=https://journals.co.za&lt;/a&gt;. Nor for a PlumX badge, searching with &lt;i&gt;Branjacked&lt;/i&gt;&#39;s DOI value at&amp;nbsp;&lt;a href=&quot;https://plu.mx/plum/a/?doi=10.10520/ejc-crim_v38_n3_a2&quot; target=&quot;_blank&quot;&gt;https://plu.mx/plum/a/?doi=10.10520/ejc-crim_v38_n3_a2&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;No automatic ORCID profile article update&lt;/h3&gt;&lt;div&gt;Each of &lt;i&gt;Brandjacked&lt;/i&gt;’s four authors have an&amp;nbsp;Open Researcher and Contributor ID (&lt;a href=&quot;https://orcid.org/&quot; target=&quot;_blank&quot;&gt;ORCID&lt;/a&gt;) address. This is a 16-digit persistent digital identifier (e.g., &lt;a href=&quot;https://orcid.org/0000-0001-9566-8983&quot; target=&quot;_blank&quot;&gt;0000-0001-9566-8983&lt;/a&gt;) that uniquely identifies research-contributors all over the world. Like the DOI value does for research outputs, ORCID resolves name ambiguity. It links all research publications, datasets, and grants to an individual, regardless if their name or institution changes. Authors can set their ORCID profile to be automatically updated with research outputs that are linked to them. As at this post’s publication date, the &lt;i&gt;Brandjacked&lt;/i&gt; article had not automatically been linked to any of its authors’ ORCID profiles.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Google Scholar links to a 404 error&lt;/h3&gt;&lt;div&gt;The academic search engine, &lt;a href=&quot;https://scholar.google.com/&quot; target=&quot;_blank&quot;&gt;Google Scholar&lt;/a&gt;, is popular due to offering the widest automatic global indexing of scholars&#39; works. Its account holders can create manual entries for their research outputs, or select pre-existing records featuring their author name. In &lt;i&gt;Brandjacked&lt;/i&gt;’s case, I created a manual record in late December, since no record for this paper was available for selection (Figure 3). Since then, Google Scholar has come to list &lt;a href=&quot;https://scholar.google.co.za/scholar?cluster=4737387046202795619&amp;amp;hl=en&amp;amp;as_sdt=0,5&quot; target=&quot;_blank&quot;&gt;two versions&lt;/a&gt; of the article.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglCI9r6ReDZJWaZ8_T7XE_07lBJs8HQJyvy38x5rNfEggoY492euFLAFlwEf322AiKpXa3bxyxk4vOH4Xi4j4il7FtqJ8ha0R89cN_bhAOk0Wtc4AUfYrgUd0zNERmdQz0UfZ6zPaE62Bp22H8IwkQR363VZOnguZIe1UPonpEaJBfpfjZOuDxnk_T2iCN/s1564/Two%20versions%20on%20Google%20Scholar.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Two versions on Google Scholar&quot; border=&quot;0&quot; data-original-height=&quot;1260&quot; data-original-width=&quot;1564&quot; height=&quot;323&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglCI9r6ReDZJWaZ8_T7XE_07lBJs8HQJyvy38x5rNfEggoY492euFLAFlwEf322AiKpXa3bxyxk4vOH4Xi4j4il7FtqJ8ha0R89cN_bhAOk0Wtc4AUfYrgUd0zNERmdQz0UfZ6zPaE62Bp22H8IwkQR363VZOnguZIe1UPonpEaJBfpfjZOuDxnk_T2iCN/w400-h323/Two%20versions%20on%20Google%20Scholar.png&quot; title=&quot;Two versions on Google Scholar&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 3.Screenshot of&amp;nbsp;Two versions of &lt;i&gt;Brandjacked&lt;/i&gt; on Google Scholar,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;12 Feb 2026.&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;div&gt;&lt;div&gt;The top version, which can be Saved and Cited, produced a &#39;404 not found&#39; error when clicked through to Acta Criminologica (Figure 4).&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiJAvkxSyckPyzA-msifKVaOCuolNe3QOKvJrN4yGoDTIdPoiGc8-T6HtxbAgXpDCgne1-ZOlD-dYMOmSCIgoB0LVCWXbx9oiNj1tn7gh7XIrieg-QMFCv-2lBDP3w9v5bDCb8YSyZX6wZXByzrXG9iBb-z8HuSqESTO9iGoiQJNpsQjeMKwVwgtDfJdRy/s1862/DOI%20not%20resolved%20from%20Google%20Scholar.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;DOI not resolved from Google Scholar&quot; border=&quot;0&quot; data-original-height=&quot;1446&quot; data-original-width=&quot;1862&quot; height=&quot;311&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiJAvkxSyckPyzA-msifKVaOCuolNe3QOKvJrN4yGoDTIdPoiGc8-T6HtxbAgXpDCgne1-ZOlD-dYMOmSCIgoB0LVCWXbx9oiNj1tn7gh7XIrieg-QMFCv-2lBDP3w9v5bDCb8YSyZX6wZXByzrXG9iBb-z8HuSqESTO9iGoiQJNpsQjeMKwVwgtDfJdRy/w400-h311/DOI%20not%20resolved%20from%20Google%20Scholar.png&quot; title=&quot;DOI not resolved from Google Scholar&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 4.Screenshot of&amp;nbsp;DOI not resolved from Google Scholar,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;12 Feb 2026.&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;div&gt;Thinking that this may have been caused by the manual record I created featuring the initial DOI, I chose to delete the article from my record. Then went into Google Scholar trash and selected ‘Delete Forever’. However, the article available for manual selection (Figure 5) still links to a &#39;404 not found&#39; result.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglIw9tygvs0_8f7alWCdNiI4553t2HO2zBSG-7AQQgnnZ-crVSu2ZXg5b5DUyqFA_2ADscCSllLfsIxCeWF3625VPzNm8-DF5i_YZR9v8tJqklkfKHQ430haIftSuKRUB_cgSUFoSNmcdXqYq1LAzVrkaf2PlWRtyQAp4ghVptQKz4fn_5A0SBjBpSAis6/s1778/Google%20Scholar%20selection%20of%20Brandjacked.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;458&quot; data-original-width=&quot;1778&quot; height=&quot;82&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglIw9tygvs0_8f7alWCdNiI4553t2HO2zBSG-7AQQgnnZ-crVSu2ZXg5b5DUyqFA_2ADscCSllLfsIxCeWF3625VPzNm8-DF5i_YZR9v8tJqklkfKHQ430haIftSuKRUB_cgSUFoSNmcdXqYq1LAzVrkaf2PlWRtyQAp4ghVptQKz4fn_5A0SBjBpSAis6/s320/Google%20Scholar%20selection%20of%20Brandjacked.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;F&lt;span style=&quot;font-size: x-small;&quot;&gt;igure 5.&amp;nbsp;Screenshot of&amp;nbsp;Google Scholar manual selection of &lt;i&gt;Brandjacked,&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;12 Feb 2026.&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Report a failed DOI link via doi.org&lt;/h3&gt;&lt;div&gt;A manual entry created on ResearchGate (at&amp;nbsp; &lt;a href=&quot;https://www.researchgate.net/publication/398814505_Brandjacked_for_social_media_advert_fraud_Microcelebrities&#39;_experiences_of_digital_crime_in_South_Africa&quot; target=&quot;_blank&quot;&gt;researchgate.net/publication/398814505_Brandjacked_for_social_media_advert_fraud_Microcelebrities&#39;_experiences_of_digital_crime_in_South_Africa&lt;/a&gt;) lists the correct DOI (Figure 6), but it also showed a &#39;404 not found&#39; error when attempting to link to the digital publication.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQu7mlMHuLdagMBwLq-M8pQwa286hQ5J6EMDNlssJF8b518rvQoPWbRid-VwJrdqBnSR9E-Tj80FkRCqoTMQYvSPOGCcAlH-3IHw0jfJRFMl3jRjnkwQclCAy7YqCCptIyNnophkyeRwAVEBYCfNiTacrJXnoukD4Yo_9N_pmQeU171Yd5wWvmEvy1D-ce/s2126/ResearchGate%20DOI%20edit%20correction.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;ResearchGate DOI is correct.png&quot; border=&quot;0&quot; data-original-height=&quot;1462&quot; data-original-width=&quot;2126&quot; height=&quot;275&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQu7mlMHuLdagMBwLq-M8pQwa286hQ5J6EMDNlssJF8b518rvQoPWbRid-VwJrdqBnSR9E-Tj80FkRCqoTMQYvSPOGCcAlH-3IHw0jfJRFMl3jRjnkwQclCAy7YqCCptIyNnophkyeRwAVEBYCfNiTacrJXnoukD4Yo_9N_pmQeU171Yd5wWvmEvy1D-ce/w400-h275/ResearchGate%20DOI%20edit%20correction.png&quot; title=&quot;ResearchGate DOI is correct.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 6.Screenshot of&amp;nbsp;ResearchGate DOI being correct for &lt;i&gt;Brandjacked,&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;12 Feb 2026.&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;At least this page presented an option to report the failed DOI. So, I submitted this error report to DOI: &quot;The article &#39;Brandjacked for social media advert fraud&#39; should be available at this DOI. Related working URLs are: &lt;a href=&quot;https://journals.co.za/doi/10.10520/ejc-crim_v38_n3_a2&quot; target=&quot;_blank&quot;&gt;https://journals.co.za/doi/10.10520/ejc-crim_v38_n3_a2&lt;/a&gt; &amp;amp; &lt;a href=&quot;https://hdl.handle.net/10520/ejc-crim_v38_n3_a2&quot; target=&quot;_blank&quot;&gt;https://hdl.handle.net/10520/ejc-crim_v38_n3_a2&lt;/a&gt;. Thanks in advance for fixing this.&quot;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVqJsKNu1JyPNk9j6YPNC9LRI7F9b_f9ChacbWI-dMVNS_ju5dm4hfv8nkFFRudeEuqXLXaUNyoHHfM6KS16lxEfTb1UzCFA6Z72LVY7B60iWxN71zYvYwulDZUdbbQJzvoAe8axTtPjgEUijOVuVWnx6j4siHPadUSI7jRlNfF2ykoD04G3j6Upa-bB6Z/s1452/DOI%20error%20report%2012%20Feb%202026.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;DOI error report for Brandjacked 12 Feb 2026&quot; border=&quot;0&quot; data-original-height=&quot;1452&quot; data-original-width=&quot;1452&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVqJsKNu1JyPNk9j6YPNC9LRI7F9b_f9ChacbWI-dMVNS_ju5dm4hfv8nkFFRudeEuqXLXaUNyoHHfM6KS16lxEfTb1UzCFA6Z72LVY7B60iWxN71zYvYwulDZUdbbQJzvoAe8axTtPjgEUijOVuVWnx6j4siHPadUSI7jRlNfF2ykoD04G3j6Upa-bB6Z/w400-h400/DOI%20error%20report%2012%20Feb%202026.png&quot; title=&quot;DOI error report for Brandjacked 12 Feb 2026&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 7. Screenshot of DOI error report for Brandjacked, 12 Feb 2026.&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;As a shortcut for checking-and-reporting DOI errors, authors should open &lt;a href=&quot;https://www.doi.org&quot; target=&quot;_blank&quot;&gt;www.doi.org&lt;/a&gt;, then&amp;nbsp;scroll down to the &#39;&lt;b&gt;Try resolving a DOI name&#39;&lt;/b&gt; section. There they can enter a DOI value to check it, and report a DOI URL address that fails in throwing a &#39;404 not found&#39; error.&amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDEzqL4beKD8zMIGkhp6iWGUj-JBn6HNu5Kxiuk7YzppaCG5je4xEOMY0xNKm7XroYFTLduiyNrxPPZprQV-PDNvHlEmgVh5_aY4jmLe47-YFoi1U09UxXqurCEexdlvbO6fPvuf-BQ5T4CPmPYtfHufuU5oqAXWrvsZyzt5Tl5uQim1lw1W7pTg-qI1sq/s2108/DOI%20Prefix%2010.10520%20Not%20Found.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;DOI Prefix [10.10520] Not Found.png&quot; border=&quot;0&quot; data-original-height=&quot;1240&quot; data-original-width=&quot;2108&quot; height=&quot;235&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDEzqL4beKD8zMIGkhp6iWGUj-JBn6HNu5Kxiuk7YzppaCG5je4xEOMY0xNKm7XroYFTLduiyNrxPPZprQV-PDNvHlEmgVh5_aY4jmLe47-YFoi1U09UxXqurCEexdlvbO6fPvuf-BQ5T4CPmPYtfHufuU5oqAXWrvsZyzt5Tl5uQim1lw1W7pTg-qI1sq/w400-h235/DOI%20Prefix%2010.10520%20Not%20Found.png&quot; title=&quot;DOI Prefix [10.10520] Not Found.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 8. Screenshot showing DOI Prefix 10.10520 Not Found error message,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;12 Feb 2026.&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/h3&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Just a few downloads...&lt;/h3&gt;&lt;div&gt;Acta Criminologica’s ‘Open Access’ policy initially provides restricted access via the&amp;nbsp;South African Bibliographic and Information Network (&lt;a href=&quot;https://discover.sabinet.co.za/&quot; target=&quot;_blank&quot;&gt;SABINET&lt;/a&gt;)&#39;s archives. These are available via university libraries’ annual SABINET subscription for SABINET African Electronic Publications (SA_ePublications). There is a 12-month open access embargo from the date of publication/loading on the&amp;nbsp;Criminological Society of Africa (&lt;a href=&quot;https://crimsa.ac.za/acta-criminologica/&quot; target=&quot;_blank&quot;&gt;CRIMSA&lt;/a&gt;)’s website.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Perhaps being published before the Christmas holidays in an access-restricted versus open-journal format contributed to &lt;i&gt;Brandjacked&lt;/i&gt; only being downloaded five times in the first two months. But even achieving that readership is not been helped by a ghost-listing amidst a heavy stream of academic publications. As Trend MD &lt;a href=&quot;https://www.trendmd.com/how-it-works-readers/&quot; target=&quot;_blank&quot;&gt;reports&lt;/a&gt;, nearly 8,000 research articles are published each day. In this flood of information, the visibility of our niche publication is hampered through not being indexed in aggregators for academic (meta-)data or authorial content registries. Consequently, it is vital for scholars to work with the journal, their publisher, and co-authors to achieve work-arounds. Authors should also build awareness around remedying any root causes that undermine their visibility of their academic work.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3&gt;Emailed the editor&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Given that the landing page URL is throwing a &#39;404 not found&#39; error and the DOI is not resolving, it seemed likely that the error was a flaw on the publisher&#39;s end. In response, I wrote to the journal&#39;s editor&amp;nbsp; requesting that the Crossref metadata be updated. I hoped that the journal’s production team could soon ensure that: (i) the landing page URL for the article is correctly mapped to its DOI. And that (ii) the metadata provided to Crossref and other aggregators could be updated to reflect a functional DOI link. As this issue impacted other articles in the &lt;a href=&quot;https://journals.co.za/toc/crim/38/3&quot; target=&quot;_blank&quot;&gt;Cybercrime&lt;/a&gt; special issue, it seemed crucial to fix for the visibility of all its authors’ articles.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Subsequent investigation spotlighted that the failure for the DOI to resolve actually applied to all articles in the journal: prior to&amp;nbsp;&lt;a href=&quot;https://scispace.com/journals/acta-criminologica-southern-african-journal-of-criminology-31kobnn7&quot; target=&quot;_blank&quot;&gt;2017&lt;/a&gt;, the &#39;Acta Criminologica: African Journal of Criminology &amp;amp; Victimology&#39; journal was known as &#39;Acta Criminologica: Southern African Journal of Criminology&#39;. Its first issue started in 1988, and entering its first ever article&#39;s DOI produces exactly the same error as shown in Figure 8.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Feedback from the publisher&amp;nbsp;&lt;/h3&gt;&lt;div&gt;A product manager for content services at SABINET replied to the editor&#39;s query that the DOI link is not working as the journal is not using registered DOIs yet. The 10.10520 prefix is a &quot;dummy&quot; DOI that SABINET uses to ingest content. By contrast, the persistent link to resolve each article is at a fully-functioning https://hdl.handle.net address.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The product manager offered to reach out to the Google Scholar team to ask that they use the handle link rather than the DOI code, unless they use the complete URL. She also flagged that the DOI issue can only be addressed for future Acta Criminologica articles once their allocated actual DOIs are registered with Crossref. This issue relates to a broader problem around the visibility of African journals that Asubiaro and Onaolapo (&lt;a href=&quot;https://doi.org/10.1002/asi.24758&quot; target=&quot;_blank&quot;&gt;2023&lt;/a&gt;) have spotlighted- their &lt;i&gt;&#39;low representation in Crossref, a free indexing infrastructure that could be harnessed for building an African‐centric research indexing database, is concerning&#39;. &lt;/i&gt;This paper flags how less than fifty percent of journals&amp;nbsp;from Africa feature in Crossref.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Not being indexed there has an important knock-on effect, as it provides data for other bibliographic databases. These include &lt;a href=&quot;https://www.dimensions.ai/why-dimensions/&quot; target=&quot;_blank&quot;&gt;Dimensions&lt;/a&gt;, &lt;a href=&quot;https://about.lens.org/scholarly-search-analysis/&quot; target=&quot;_blank&quot;&gt;The Lens&lt;/a&gt; and &lt;a href=&quot;https://www.scilit.com/&quot; target=&quot;_blank&quot;&gt;Scilit&lt;/a&gt;. In the Lens&#39; case, it serves global scholarly records. These are compiled and harmonised from Crossref and PubMed, enhanced with OpenAlex and UnPaywall open access information, CORE full text and links to ORCID. Data from The Lens can be imported into ORCID records, allowing authors to synchronise their records.&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;A manual ORCID listing&lt;/h3&gt;&lt;div&gt;In the absence of such synchronisation for&amp;nbsp;&lt;i&gt;Brandjacked&lt;/i&gt;, I could not&amp;nbsp;select a DOI or handle.net address in ORCID for automatically linking&lt;i&gt;&amp;nbsp;&lt;/i&gt;to my record. Instead, I created a manual one. Its entry route provided an option to define both the DOI&#39;s &#39;identifier value&#39; (10520/ejc-crim_v38_n3_a2) and the full identifier URL&#39;s address (https://hdl.handle.net/10520/ejc-crim_v38_n3_a2) (Figure 9). I asked my co-authors to add this manuscript to their ORCID records, which correctly resolves to the publisher&#39;s article landing page.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj45UFQ4cNu48xjlYRu8kqWNaC0OOHNE25hOxg5BisTbWdSqgYI_yHOHsGZ9ialhuHjX4IKqFokvi2IYlKcPpLeOovzhrd_3aAyOMhSAWKj6rg-XlW4YPB3FkEEvzqDmSM9HJrI4-A1mvcjPfdgUxtkakqadBmnM5dQjFx0MBMvo9_KpiTZK4Tzq-K_A107/s1314/Applying%20the%20handle.net%20identified%20in%20manual%20ORCID%20listing.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Applying the handle.net identified in manual ORCID listing.png&quot; border=&quot;0&quot; data-original-height=&quot;1178&quot; data-original-width=&quot;1314&quot; height=&quot;359&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj45UFQ4cNu48xjlYRu8kqWNaC0OOHNE25hOxg5BisTbWdSqgYI_yHOHsGZ9ialhuHjX4IKqFokvi2IYlKcPpLeOovzhrd_3aAyOMhSAWKj6rg-XlW4YPB3FkEEvzqDmSM9HJrI4-A1mvcjPfdgUxtkakqadBmnM5dQjFx0MBMvo9_KpiTZK4Tzq-K_A107/w400-h359/Applying%20the%20handle.net%20identified%20in%20manual%20ORCID%20listing.png&quot; title=&quot;Applying the handle.net identified in manual ORCID listing.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 9. Screenshot of applying the handle.net identified in manual ORCID listing,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;16 Feb 2026.&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div&gt;&lt;br /&gt;However, each author was unable to select this listing for automatic addition, despite entering the assigned DOI index number, the full handle.net address (Figure 10) or the journal&#39;s URL.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdLIknEJjN-ayr55vqN8g691zJCOsg8YNdaADAC-j8ab5bTp3igHx2D60WIoFvs2TK9mKAhiei2dMmVS0bILFX9s0UA8Gj8RHp0pTgpBuesmRAd0h__4z_RRct20-AlBCt1PFGtIQvCsZexY4QG3uGKwhlv5dIlqsMS0E-d3zH0CeTpD96hvxgyPcdggPo/s1143/handle.net%20URL%20does%20not%20work%20for%20co-author%20selection.jpeg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;handle.net URL does not work for co-author selection&quot; border=&quot;0&quot; data-original-height=&quot;376&quot; data-original-width=&quot;1143&quot; height=&quot;131&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdLIknEJjN-ayr55vqN8g691zJCOsg8YNdaADAC-j8ab5bTp3igHx2D60WIoFvs2TK9mKAhiei2dMmVS0bILFX9s0UA8Gj8RHp0pTgpBuesmRAd0h__4z_RRct20-AlBCt1PFGtIQvCsZexY4QG3uGKwhlv5dIlqsMS0E-d3zH0CeTpD96hvxgyPcdggPo/w400-h131/handle.net%20URL%20does%20not%20work%20for%20co-author%20selection.jpeg&quot; title=&quot;handle.net URL does not work for co-author selection&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 10. Screenshot showing handle.net URL does not work for co-author selection via ORCID,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;16 Feb 2026.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Instead, I shared a screenshot of the details I used (Figure 11) which each author copied for adding the same details.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTa8u7vwakYiZbb-pWwAURAwsxyOv1hVUfJREZzWir8LGxgQvKFvz7vYIjfSCi6EGF5QcAosPJ5WyACDL8pw7cTL3VoXblib2glYIRBm-8ljEMCcvkbYFok2KPpMW0OfvXHuNYc7O6wGg4eBkJgsVWXJplPMOEhXyrK0-eGzMdXY1Wjyq6IphlGPssRWCM/s1610/Screengrab%20for%20manual%20ORCID%20entry%20for%20co-authors%20to%20copy.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Screengrab of manual ORCID entry for co-authors to copy&quot; border=&quot;0&quot; data-original-height=&quot;1310&quot; data-original-width=&quot;1610&quot; height=&quot;325&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTa8u7vwakYiZbb-pWwAURAwsxyOv1hVUfJREZzWir8LGxgQvKFvz7vYIjfSCi6EGF5QcAosPJ5WyACDL8pw7cTL3VoXblib2glYIRBm-8ljEMCcvkbYFok2KPpMW0OfvXHuNYc7O6wGg4eBkJgsVWXJplPMOEhXyrK0-eGzMdXY1Wjyq6IphlGPssRWCM/w400-h325/Screengrab%20for%20manual%20ORCID%20entry%20for%20co-authors%20to%20copy.png&quot; title=&quot;Screengrab of manual ORCID entry for co-authors to copy&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 11. Screengrab of manual ORCID entry for co-authors to copy,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;16 Feb 2026.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;By using the same DOI and handle.net address, we wanted to ensure that just one record was captured via ORCID for our paper (versus four separate records for all co-authors!).&lt;div&gt;&lt;span style=&quot;font-size: small; font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;A manual Academia.edu entry&lt;/h3&gt;&lt;div&gt;Like ORCID, Academia.edu&#39;s manual field entries for an article support both the entry of the DOI value, and also related Links/URL (Figure 12). This contrasts to ResearchGate&#39;s support for just one DOI address.&lt;/div&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhto9CSrd9pDioE8YSH9q_1tGvCYwoLSnCk4ky44q_VMaj7BlycBhKjt9ZfTYB2P6ICPcjVXp_fbrV36chvHR1JIP_-lWgJhSj5dzqKpEoXeZXqlKiwqGqP8ZtvJX8BvjI_xhk9U0_AA9NenD_X9W-sTJwoRIHR-gDxwWSXTeTydA4FH87m53EFuy1v3abk/s1142/Add%20handle.net%20entry%20to%20manual%20Academia.edu%20record.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Add handle.net entry to manual Academia.edu record.png&quot; border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1142&quot; height=&quot;253&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhto9CSrd9pDioE8YSH9q_1tGvCYwoLSnCk4ky44q_VMaj7BlycBhKjt9ZfTYB2P6ICPcjVXp_fbrV36chvHR1JIP_-lWgJhSj5dzqKpEoXeZXqlKiwqGqP8ZtvJX8BvjI_xhk9U0_AA9NenD_X9W-sTJwoRIHR-gDxwWSXTeTydA4FH87m53EFuy1v3abk/w400-h253/Add%20handle.net%20entry%20to%20manual%20Academia.edu%20record.png&quot; title=&quot;Add handle.net entry to manual Academia.edu record.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 12. Screenshot of adding handle.net entry to manual Academia.edu record,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;16 Feb 2026.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/h3&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Cannot get (a) Kudos (addition)&lt;/h3&gt;&lt;div&gt;&lt;a href=&quot;https://www.growkudos.com/&quot; target=&quot;_blank&quot;&gt;Kudos&lt;/a&gt; is a networking platform designed to increase the visibility, reach, and impact of published research It supports scholars with explaining their work in plain language, and adding salient context.&amp;nbsp;In theory, a DOI, article title or recent manual entry on ORCID should support Kudos with finding &#39;Brandjacked for social media advert fraud&#39;. However, none of the three searches worked (Figure 13).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJgDrbnpgvrvNurIF_QNZ4elJlnfYOMYu_XAaAJe62Vs06YxywlDfTj9-VDJAcx5mjbq94dO3_Bsc6ua7c6sf7U0zEgoDhHvIDXjaojkBxqIh0KeA-dS3ajMBd1C87dNPmQNIP3SndmdC76iefxFGAHNcFHmLyssL5sawfYO91vJn8dRPfDHyWqlKWkSim/s2018/Screenshot%20of%20Kudos%20DOI%20text%20search%20ORCID%20search%20option.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Screenshot of Kudos DOI text search ORCID search option&quot; border=&quot;0&quot; data-original-height=&quot;1348&quot; data-original-width=&quot;2018&quot; height=&quot;268&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJgDrbnpgvrvNurIF_QNZ4elJlnfYOMYu_XAaAJe62Vs06YxywlDfTj9-VDJAcx5mjbq94dO3_Bsc6ua7c6sf7U0zEgoDhHvIDXjaojkBxqIh0KeA-dS3ajMBd1C87dNPmQNIP3SndmdC76iefxFGAHNcFHmLyssL5sawfYO91vJn8dRPfDHyWqlKWkSim/w400-h268/Screenshot%20of%20Kudos%20DOI%20text%20search%20ORCID%20search%20option.png&quot; title=&quot;Screenshot of Kudos DOI text search ORCID search option&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 13. Screenshot of Kudos&amp;nbsp;search options - DOI, text search &amp;amp; ORCID,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;16 Feb 2026.&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/h3&gt;&lt;div&gt;I emailed Kudos&#39; support team to flag this issue, asking if there was an alternate route for authors to add a publication. They replied that Kudos currently depends on the entry of DOIs: &lt;i&gt;&#39;Please be aware that we do plan to create more options to add a publication to Kudos in the future and this is on our product roadmap. In the meantime we recommend that you kindly contact your publisher and ask them to send published work metadata to Crossref so it is more discoverable, and appears in Kudos and other online services&#39; &lt;/i&gt;(email correspondence, 4 March, 2026),&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;Who is responsible for submitting to Crossref?&lt;/h3&gt;The&amp;nbsp;primary responsibility for submitting and maintaining Crossref entries typically lies with the publisher in being formal Crossref members. CRIMSA publishes Acta Criminologica : African Journal of Criminology &amp;amp; Victimology. The editor ensures that high-quality metadata (such as ORCIDs and funding info) is received from authors before manuscript approval. CRIMSA would then be responsible for submitting accepted articles&#39; bibliographic metadata (including URLs and references, plus registering DOIs), then ensuring this information remains up-to-date. The publisher handles the technical side of generating &quot;Crossref XML&quot; files, or using &lt;a href=&quot;https://www.crossref.org/documentation/register-maintain-records/choose-content-registration-method/&quot; target=&quot;_blank&quot;&gt;deposit tools&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Like many small organisations though, CRIMSA&#39;s office bearers may be stretched across many roles. So,&amp;nbsp; not able to prioritise learning how to do Crossref submissions as a new responsibility, let alone find the time to do them. The extra funds to pay for such work may also not be available.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In the near future, CRIMSA&#39;s academic journal does plan to submit metadata to Crossref for new articles. I have encouraged&amp;nbsp;Acta Criminologica&#39;s editor to organise that its full archive becomes retroactively registered with Crossref. The estimated cost of $0.15 per article’s uploaded meta-data should hopefully not prove a showstopper. Supplying the correct metadata for all articles will benefit this journal&#39;s visibility, and hopefully support not just its altmetrics results being listed, but also Acta Criminologica&amp;nbsp;being listed on journal portals used to rank and compare academic journals (and country-level scientific output). Notably, the free&amp;nbsp;&lt;a href=&quot;https://www.scimagojr.com&quot; target=&quot;_blank&quot;&gt;Scimagojr&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;https://www.scilit.com/&quot;&gt;Scilit&lt;/a&gt;&amp;nbsp;portals.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Conclusion&lt;/h3&gt;&lt;div&gt;After overcoming the challenges of review, revisions, and achieving a digital publication, academic authors may face a new challenge- following up that their publications are well-indexed. As this post illustrates, this must not be assumed. Rather authors must check that their article&#39;s DOI identifier does indeed link to their article&#39;s publication page. And that their paper&#39;s social media&amp;nbsp;impact and amplification is being correctly reflected via that page&#39;s Altmetrics badge.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;If there is a problem, it is most likely to be taking place in the earliest phase of the&amp;nbsp;Research Data Lifecycle (&lt;a href=&quot;https://rdm.univie.ac.at/what-is-research-data-management/the-research-data-lifecycle/#:~:text=Planning%20data%20management%20is%20the,how%20to%20prepare%20these%20plans.&quot; target=&quot;_blank&quot;&gt;RDLC&lt;/a&gt;)- this broad concept is used to describe the &quot;cradle-to-grave&quot; journey of research data:&lt;/div&gt;&lt;div&gt;In terms of sharing research outputs, it includes curation of metadata that is standardised, ensuring outputs are both disseminated, and findable via academic search engine optimisation (&lt;a href=&quot;https://openjournalsystems.com/academic-search-engine-optimization/#:~:text=David%20Green2024%2D10%2D21T05,can%20be%20optimized%20as%20well.&quot; target=&quot;_blank&quot;&gt;ASEO&lt;/a&gt;). And that the article&#39;s reach, amplification and media interest can be measured via Altmetric statistics.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In the case of our article, the DOI indexing flaw lay in &lt;b&gt;phase 1&lt;/b&gt;&amp;nbsp;of output sharing. The journal does not supply metadata for its articles to the academic metadata aggregator,&amp;nbsp;&lt;a href=&quot;https://www.crossref.org/&quot; target=&quot;_blank&quot;&gt;Crossref&lt;/a&gt;. Instead, the journal&#39;s publisher setup a temporary DOI as a workaround. While this may work as a stopgap measure, it poses a major obstacle for scholars keen to share the work with centralised registries in &lt;b&gt;phase 2,&lt;/b&gt;&amp;nbsp;since each co-author must manually create an ORCID record. In &lt;b&gt;phase 3,&lt;/b&gt; academic aggregators (such as Google Scholar) may direct users to a &#39;page not found&#39; response on doi.org or from the journal&#39;s website. In &lt;b&gt;phase 4&lt;/b&gt;, researchers may face a similar problem on academic social networks (such as ResearchGate) which require an accurate DOI link. For &lt;b&gt;phase 5&lt;/b&gt;, the ability of altmetrics services to track an article&#39;s amplification, reach and media interest is scuppered. By contrast, the article&#39;s citations are still tracked.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;However, until this happens, authors keen to share their Acta Criminologica publications via their scholarly profiles and social networks must do a lot of extra work. My colleagues and I followed work-arounds to address the&amp;nbsp;placeholder DOI index information in &lt;b&gt;phases&lt;/b&gt; &lt;b&gt;2&lt;/b&gt; to &lt;b&gt;4&lt;/b&gt;. These included listing their article&#39;s and/or handle.net address in manual entries on ORCID&#39;s centralised registry, academic aggregators (e.g. Google Scholar or &lt;a href=&quot;https://www.base-search.net&quot; target=&quot;_blank&quot;&gt;Bielefeld Academic Search Engine&lt;/a&gt;). Plus, shifting to using the handle.net address&amp;nbsp;in&amp;nbsp;academic social network posts. These work-arounds required extra labour from the four authors, three of whom are independent and not formally affiliated to any university. As the journal publisher already covers the journal&#39;s Crossref fees, such extra work can readily be avoided. Hopefully, the journal will put aside the resources necessary for generating the required XML metadata, and for depositing its full archive, plus new publications via Crossref&#39;s&amp;nbsp;&lt;a href=&quot;https://www.crossref.org/documentation/register-maintain-records/metadata-manager/&quot; target=&quot;_blank&quot;&gt;record manager&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Related suggestions&lt;/h3&gt;&lt;div&gt;Journal publishers and editorial teams can help their authors upfront by being transparent about what the opportunities and limitations of their journal&#39;s current indexing are in relation to sharing publications online. Plus, publishers should provide advice to authors for how these strengths and weaknesses support, or limit, the online visibility and potential amplification opportunities for their new works. For example, in Acta Criminologica : African Journal of Criminology &amp;amp; Victimology&#39;s case, it has several strengths, such as indexing works in the reputable databases of SABINET and African Journals OnLine (&lt;a href=&quot;https://www.ajol.info/index.php/ajol&quot; target=&quot;_blank&quot;&gt;AJOL&lt;/a&gt;). However, its metadata is not currently submitted to Crossref, nor does the journal appear in &lt;a href=&quot;https://www.scopus.com/sources.uri?zone=TopNavBar&amp;amp;origin=searchbasic&quot; target=&quot;_blank&quot;&gt;Scopus&lt;/a&gt; title lists. As described regarding Crossref, this requires authors to make several work-arounds to ensure their articles become visible via centralised registries and academic aggregators. Authors must also accept that they cannot source altmetrics for their work, and cannot use services solely reliant on DOI link entries.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Publishers and editorial teams who provide transparency about their journals&#39; academic indexing issues, could also make public their plans to resolve them. This would be performing a helpful service, not just for their authors, but also for potential case-study research in an area for which there seems to be a dearth of detailed local descriptions to learn from. With less than half of African journals being indexed in Crossref, there must be systemic problems preventing their indexing. Learning in detail from African journal publishers and editors on why this is the case, plus how it might be addressed on the ground,&amp;nbsp;would seem a worthwhile gap for scholars to research, and close.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;b&gt;N.B. &lt;/b&gt;Kindly add a comment below if you have any related suggestions or other feedback...&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/9051597957385217562/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2026/02/a-research-articles-digital-cul-de-sac.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/9051597957385217562'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/9051597957385217562'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2026/02/a-research-articles-digital-cul-de-sac.html' title='A research article’s digital cul-de-sac. How to fix an academic paper that is hidden and/or unreachable'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLdeINi7UzFJAQwE8tBxTOq_iXWGDOm8XFtHOSPBNr6UE47hvBWs6YHHZDxiz8TlwZOxOVTHKnGcxUbSjRqXoPaYAes4y5EEC0KmJ6rqf7wBKyLGR9QGr68ImRiBaViARqsFOp4Vq_rscCO5J6QjSobkmd0S0D13K5vzzHPxZM_XZE5rHZx1HS8IUKujvO/s72-w400-h275-c/No%20AltMetrics%20listing%20for%20Brandjacked%20article.png" height="72" width="72"/><thr:total>1</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.922087 18.4231418</georss:point><georss:box>-62.232320836178843 -16.7331082 -5.6118531638211522 53.579391799999996</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-1916720522830209134</id><published>2025-12-18T11:14:00.015+02:00</published><updated>2026-01-21T12:20:49.685+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="advert"/><category scheme="http://www.blogger.com/atom/ns#" term="brandjacking"/><category scheme="http://www.blogger.com/atom/ns#" term="digital crime"/><category scheme="http://www.blogger.com/atom/ns#" term="marketing"/><category scheme="http://www.blogger.com/atom/ns#" term="microfraud"/><category scheme="http://www.blogger.com/atom/ns#" term="phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="scam"/><category scheme="http://www.blogger.com/atom/ns#" term="social media"/><category scheme="http://www.blogger.com/atom/ns#" term="south_africa"/><title type='text'>Brandjacked for social media advert fraud: Microcelebrities&#39; experiences of digital crime in South Africa</title><content type='html'>&lt;div&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Written for readers interested in the virtual epidemic of digital crime and online scams.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The Noakes Foundation established the Fake Celebrity Endorsement (FCE) research project in 2023 to address research gaps regarding the brandjacking of South African public figures in fake social media adverts. I’m delighted to share that the FCE&#39;s first &lt;a href=&quot;https://journals.co.za/doi/10.10520/ejc-crim_v38_n3_a2&quot; target=&quot;_blank&quot;&gt;peer-reviewed article &lt;/a&gt;is now available in a special Cybercrime issue from&amp;nbsp;&lt;a href=&quot;https://journals.co.za/journal/crim&quot; target=&quot;_blank&quot;&gt;Acta Criminologica: African Journal of Criminology and Victimology&lt;/a&gt;.&amp;nbsp; {&lt;span style=&quot;color: #666666;&quot;&gt;Please note that the journal&#39;s ‘Open Access’ policy initially provides restricted access via the SABINET archives. These are available via university libraries’ annual SABINET subscription for SA_ePublications (Sabinet &lt;a href=&quot;https://discover.sabinet.co.za/search?Search=&amp;amp;ProductType=africanarchivesindex&quot; target=&quot;_blank&quot;&gt;African Electronic Publications&lt;/a&gt;). There is a 12-month open access embargo from the date of publication/loading on CRIMSA’s website, so expect external access to be available from January, 2027}.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlnGBP3i5LHwqAAXmOSzX3ibc1IucKoLh6KIlzxxsANK86Wam5gCLIljvgNCpza8WMBk6WoJR28llZsPrtxWCN75H8AUc8o2Eu4K3uEvePB-5WeQNRJ48fUYqznRDg4IyZdTKwdV41XZY8p1_yl6eEicjxexvegeJEY4LRk4sTGhiAHu7D-Wv3YfzFzfEz/s1280/Japhet%20Kayomb%20Travis%20Noakes%20Karen%20Heath%20Taryn%20van%20Niekerk%202025.jpeg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Japhet Kayomb Travis Noakes Karen Heath Taryn van Niekerk 2025&quot; border=&quot;0&quot; data-original-height=&quot;1237&quot; data-original-width=&quot;1280&quot; height=&quot;386&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlnGBP3i5LHwqAAXmOSzX3ibc1IucKoLh6KIlzxxsANK86Wam5gCLIljvgNCpza8WMBk6WoJR28llZsPrtxWCN75H8AUc8o2Eu4K3uEvePB-5WeQNRJ48fUYqznRDg4IyZdTKwdV41XZY8p1_yl6eEicjxexvegeJEY4LRk4sTGhiAHu7D-Wv3YfzFzfEz/w400-h386/Japhet%20Kayomb%20Travis%20Noakes%20Karen%20Heath%20Taryn%20van%20Niekerk%202025.jpeg&quot; title=&quot;Japhet Kayomb Travis Noakes Karen Heath Taryn van Niekerk 2025&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Japhet, Travis, Karen and Taryn in &lt;a href=&quot;https://www.thecellars-hohenorthotel.com/&quot; target=&quot;_blank&quot;&gt;The Cellars-Hohenhort&lt;/a&gt;&#39;s garden.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The article was written by myself, Dr Taryn van Niekerk, Dr Karen Heath and Mr Japhet Mutomb Kayomb to begin covering the cybervictimization experiences of a hard-to-reach sample of South African public figures. This post provides some context to the (i) neglected digital crime problem that our scholarly contribution spotlights before summarising (ii) the article&#39;s literature review, (iii) the research and its key findings, (iv) their broader implications, plus (v) suggested areas for future research:&amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;i. Digital crime cybervictimisation as a neglected research problem in the Global South&lt;/b&gt;&lt;/h4&gt;&lt;div&gt;A massive footprint of digital crime looms right across South Africa. Pumped through a hypnotic body of popular social media platforms that include; Alphabet&#39;s YouTube, Bytedance&#39;s Tik Tok, Meta&#39;s Facebook, Instagram &amp;amp; WhatsApp, Microsoft&#39;s LinkedIn and xAI&#39;s X. Forced labour cybercrime compounds pump billions of scam adverts through these platforms daily into the path of locals&#39; scrolling fingers. Once clicked on, algorithms push even more scam slop to users. Once tricked, victims are completely unsupported. They have no recourse against cybercriminals cloaked behind expensive privacy services. Nor will an apology be forthcoming from unscrupulous and unrepentant advertising hosts. Notably, Meta earned 16 billions of dollars of ill-gotten gains in a year from sharing criminal clientele&#39;s adverts (&lt;a href=&quot;https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/&quot; target=&quot;_blank&quot;&gt;Horwitz, 2025&lt;/a&gt;).&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In South Africa (SA), it can be unclear to victims which authorities to report these crimes to. Financial victims will not be reimbursed by their bank, and cannot expect support from law enforcement or other local authorities (&lt;a href=&quot;https://www.travisnoakes.co.za/2025/02/celebrities-cannot-stop-their.html &quot; target=&quot;_blank&quot;&gt;Noakes, 2025&lt;/a&gt;). This complete lack of societal support for victims of &#39;digital crime&#39; distinguishes this online crime from &#39;cybercrimes&#39;. These target corporations, whose employees are often better positioned to respond with the support of corporate technical teams and cybersecurity countermeasures (&lt;a href=&quot;https://www.theepochtimes.com/epochtv/how-ai-is-fueling-an-explosion-of-digital-crime-chris-olson-5707509&quot; target=&quot;_blank&quot;&gt;Olson, 2024&lt;/a&gt;). For example, during the COVID-19 pandemic, SA businesses were targeted with spear phishing emails impersonating colleagues, line managers, and senior executives (&lt;a href=&quot;https://doi.org/10.10520/ejc-crim-v33-n3-a3&quot; target=&quot;_blank&quot;&gt;Minnaar, 2020&lt;/a&gt;: 45). Executives in blue-chip companies using cyber defence services, such as ZeroFox, benefit from proactive monitoring and countermeasures versus executive impersonation. In stark contrast, even the most influential public figures outside corporate cannot access such costly support for fighting digital crimes.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Their scale approximates an epidemic, with Africa being among the fastest growing regions in terms of cybercrime activities (&lt;a href=&quot;https://doi.org/10.1080/1097198x.2019.1603527 &quot; target=&quot;_blank&quot;&gt;Kshetri, 2019&lt;/a&gt;). Its rapid growth of digital crime follows patterns in the Global North, where cybercrime now represents up to half of all crime (&lt;a href=&quot;https://static1.squarespace.com/static/5b7ea2794cde7a79e7c00582/t/65dccee272e94e45197d3ab5/1708969698853/Measuring+cybercrime+in+Europe_+The+role+of+crime+statistics+and+victimisation+surveys.pdf&quot; target=&quot;_blank&quot;&gt;Aebi, Caneppele &amp;amp; Molnar, 2020&lt;/a&gt;). Growing at 15 percent a year, the economy of cybercrime would be the third largest in the world if it were considered a nation. Only the economies of the United States and China are larger (&lt;a href=&quot;https://www.versobooks.com/en-gb/products/3234-scam?srsltid=AfmBOoqgSUyqX1dByLkDG_UY9xEItHGyESVaSlctqHM4QQM9cQDnsT-V&quot; target=&quot;_blank&quot;&gt;Bo, Franceschini &amp;amp; Li, 2025&lt;/a&gt;). A recent taxonomy of scams (&lt;a href=&quot;https://doi.org/10.1007/978-3-031-76821-7_27&quot; target=&quot;_blank&quot;&gt;Zhou et al., 2024&lt;/a&gt;) identifies that many different types contribute to a rapidly evolving fraudulent economy:&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;1 &lt;b&gt;Financial fraud&lt;/b&gt; (e.g. phishing “employment” scams)&lt;br /&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;2 &lt;b&gt;Identity theft &lt;/b&gt;(impersonation and brandjacking of small businesses)&lt;br /&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; 3&amp;nbsp;&lt;/span&gt;&lt;b&gt;Internet health scams &lt;/b&gt;(weightloss ads brandjacking doctors)&lt;br /&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; 4&amp;nbsp;&lt;/span&gt;&lt;b&gt;Advert fraud&lt;/b&gt; (marketing fake “pop concert” tickets)&lt;br /&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; 5&amp;nbsp;&lt;/span&gt;&lt;b&gt;E-commerce and product scams&lt;/b&gt; (non-existent “flash sales”)&lt;br /&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; 6&amp;nbsp;&lt;/span&gt;&lt;b&gt;Online harassment&lt;/b&gt; (cyberstalking, cyberbullying and doxxing)&lt;br /&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; 7&amp;nbsp;&lt;/span&gt;&lt;b&gt;Social engineering&lt;/b&gt; (business phone fraud and cold calling scams)&lt;br /&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; 8&amp;nbsp;&lt;/span&gt;&lt;b&gt;Crowdfunding and charity scams&lt;/b&gt; (a fake crowdfunding site purportedly linked to a political party’s “fundraiser for student bursaries and groceries”)&lt;br /&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; 9&amp;nbsp;&lt;/span&gt;&lt;b&gt;Lottery and prize scams &lt;/b&gt;(unsolicited messages claiming recipients have won prizes, and that they should pay a fee or provide their bank details)&lt;br /&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; 10&amp;nbsp;&lt;/span&gt;&lt;b&gt;Employment scams &lt;/b&gt;(impersonate hiring companies to request fees for job placements)&lt;br /&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; 11&amp;nbsp;&lt;/span&gt;&lt;b&gt;Romance and relationship fraud&lt;/b&gt; (cyberdating that leads to “employment” offers)&lt;br /&gt;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;12 &lt;b&gt;Spam&lt;/b&gt; (unsolicited SMS and email communications featuring marketing offers or scams)&lt;br /&gt;&lt;span&gt;&amp;nbsp; &amp;nbsp; 13&amp;nbsp;&lt;/span&gt;&lt;b&gt;Miscellaneous&lt;/b&gt; (QR phishing code scams that elude email security software)&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In stark contrast to the high prevalence of digital crime, little research addresses people’s cybervictimisation experiences in responding to online scams. In response, we wrote a paper that starts covering South African public figures whose reputations were brandjacked for fake endorsements. This ever-evolving digital crime can involve six scam types: 1. financial fraud, 2. identity theft,&amp;nbsp; 3. internet health scams, 4. advert fraud, 5. e-commerce and product scams, plus 7. social engineering.We also address how digital crime content spans a myriad of digital services: from (A) ads on popular social networks to &quot;research reports&quot; on academic networks; across (B) search engine results, blogs and online forums; from (C) clickbait news to fake business index listings, plus shopfronts; and (D) onto local fulfilment via global retailers or local sellers.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The inspiration for our paper started in 2019, from when the reputations of Prof Tim Noakes and Dr Michael Mol were repeatedly brandjacked for fake endorsements, primarily in Facebook ads for non-existent products (e.g. ketogummies). Dr Karen Heath, myself and other reps worked to &lt;a href=&quot;https://reportfakeendorsement.com/&quot; target=&quot;_blank&quot;&gt;raise public awareness &lt;/a&gt;of these scams, and to stop them on social networks. We didn’t have much success with the latter, especially on Meta’s Facebook and Instagram, where most victims reported being scammed. With Prof Noakes and Dr Mol&#39;s revictimization being an intractable problem in 2022, I identified a gap in scholarship on this particular digital crime. The Noakes Foundation&#39;s &lt;a href=&quot;https://thenoakesfoundation.org/research/academic-free-speech-and-digital-voices/&quot; target=&quot;_blank&quot;&gt;Academic Free Speech and Digital Voices&lt;/a&gt; project launched the FCE as a new Digital Visibility Risks theme.&amp;nbsp; It catalysed novel interdisciplinary work between health communication, psychological and digital forensic experts for understanding cybercriminals’ fake endorsement adverts on social media platforms, and celebrities experiences in responding. In 2023, &lt;a href=&quot;https://www.linkedin.com/in/adrie-stander-25946015/?originalSubdomain=za&quot; target=&quot;_blank&quot;&gt;Dr Adrie Stander&lt;/a&gt; (Advanced Digital Forensics) did an Open Source Intelligence investigation&amp;nbsp; that established the vast extent of the scam. This investigation also revealed that the scammers used professional tools, such as CloudFlare. This made even locating their continental origin impossible.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;ii. Literature review&lt;/h3&gt;&lt;div&gt;The team’s ongoing literature review suggested an opportunity to respond to an urgent call for &#39;exploratory cybervictimisation research that can help address ever-expanding patterns of online victimisation’ (&lt;a href=&quot;https://www.routledge.com/Cyber-Victimology-Decoding-Cyber-Crime-Victimisation/Halder/p/book/9781032107523?srsltid=AfmBOoopdwVF8BY6kj8Zu_MJ_pVzxYTwM3IjZxMsGC9Q4stwkT356XWQ&quot; target=&quot;_blank&quot;&gt;Halder, 2021&lt;/a&gt;, 4-6). Just as FCE micro-frauds typically evade detection by authorities, they also seem by-in-large to have escaped scholarship.&amp;nbsp;There seemed to be no scholarly accounts of SA celebrity influencers’ lived experiences of cyber-victimisation, brandjacking, and impersonation. This contrasted to many press reports- we tracked how over 50 SA celebrities had been brandjacked by 2024. Brandjacking is the allegedly illegal use of trademarked brand names on social network sites (&lt;a href=&quot;https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1498557#&quot; target=&quot;_blank&quot;&gt;Ramsey, 2010,&lt;/a&gt; p. 851).&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The psychologist and victimisation expert, &lt;a href=&quot;https://www.linkedin.com/in/dr-taryn-van-niekerk-big-q/&quot; target=&quot;_blank&quot;&gt;Dr Taryn van Niekerk&lt;/a&gt;,&amp;nbsp;led our interpretative phenomenological analysis (IPA) of celebrities&#39; and their reps&#39; accounts. Taryn also led a literature review on cybervictimisation across the North-South divide. It unpacks the development of Northern scholarship on cybervictimology, plus the growing literature on this topic from the global South. Importantly, it highlights the gap in knowledge around the subjective experiences of digital victims, and more specifically, microcelebrities. Our paper proposes that the ‘how’ and ‘what’ of victim identity within global Southern cybercriminological scholarship can be reimagined. We further suggest what is required to develop a body of scholarship that yields insights into cybervictims&#39; needs, and routes to recourse.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&amp;nbsp;iii. Research and key findings&lt;/h3&gt;&lt;div&gt;&lt;div&gt;During the preliminary research process, we tested our approach by interviewing representatives from The Noakes Foundation. In late 2024, &lt;a href=&quot;https://pricegreen.co.za/&quot; target=&quot;_blank&quot;&gt;Price Green Creative Studio&lt;/a&gt; approached over 50 SA celebrities’ agents to request they participate in cybervictimisation research. Almost all in this hard-to-reach sample declined, despite generous incentives. Such research resistance is an interesting topic in itself, as &lt;a href=&quot;https://www.michelanteby.net/&quot; target=&quot;_blank&quot;&gt;Professor Michel Anteby&lt;/a&gt; describes in The Interloper (&lt;a href=&quot;https://www.perlego.com/book/4266174/the-interloper-lessons-from-resistance-in-the-field-pdf&quot; target=&quot;_blank&quot;&gt;2024&lt;/a&gt;). The agents’ common feedback was that their celebrities were concerned about the potential for revictimisation. They seemed unfamiliar with how research ethics would protect them. For example, as part of securing ethical approval, the FCE organised cybervictimisation experts to provide psychological support should interviews have proved traumatising.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;We completed fieldwork in early 2025, with: Dr Michael Mol and a rep; Shashi Naidoo; Prof Tim Noakes; and his representatives having done separate, semi-structured interviews. Their feedback supported an exploration of how individuals’ positions as public figures shaped their lived experiences as victims of complex webs of digital crime.&amp;nbsp;The findings showed how fake endorsements and brandjacking were experienced as relentless and as interwoven with other forms of online fraud, highlighting the deep intricacies of their mechanisms.&amp;nbsp;These digital crimes varied in their severity, ranging from impersonation to sextortion for child pornography, leaving trauma and emotional chaos in their wake. They were furthermore aggravated by their unknowable and unpredictable nature, leaving many unanswered questions. Each celebrity victim was left without closure i.e., who the cybercriminals were, where the crime originated, where they might next be brandjacked online, and if it would ever end! Finally, as novices in cybercrime fighting, both the celebrities and their representatives attempted varied techniques to stop the work of ‘savvy cybercriminals’; however, many described this battle as grim and having minimal impact.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;iv. Broader implications from our research&lt;/h3&gt;&lt;div&gt;&lt;div&gt;These findings have important practical implications for SA’s regulatory environment, digital crime reporting and law enforcement authorities, plus victim support:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;New laws are urgently needed to regulate social media platforms that profit significantly from scam advertisements. For example, Meta’s internal documents describe how it fears regulation as the only credible threat to its scam advertisement business (&lt;a href=&quot;https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/&quot; target=&quot;_blank&quot;&gt;Horwitz, 2025&lt;/a&gt;). Regulation could mandate reporting on advertising fraud, impose penalties for slow takedowns of scams, and provide local micro-agencies (e.g., Meta Trusted Partners based in South Africa) with the opportunity to take down scammers’ accounts and content. Artificial intelligence watermarking could also be mandated for identifying AI-generated content to aid in tracing its provenance.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The epidemic of digital crime may largely go unreported and remain invisible to local law enforcement authorities. This gap must be addressed by the state increasing support for formal channels to report digital crime. Regular, publicly accessible reports on digital crime and cybervictimisation could be mandated to raise awareness while also supporting platform accountability.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;It seems likely that there will be a long wait before regulatory and enforcement measures are in place to protect victims of cybercrime. In the interim, an anti-digital crime network could be established to advocate for and provide support to victims and future targets of online scammers’ digital crimes. This network could raise funds for the neglected area of digital crime scholarship in the Global South, tackling important gaps, such as who is vulnerable and what types of preventative education are most impactful.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Addressing this paper’s meaningful questions about ‘risk’ and victimhood in the online domain can offer opportunities for more extensive dialogue about cybervictimisation experienced by the broader public.&amp;nbsp;As a digital crime, fake celebrity endorsements target private individuals and the general public with limited access to resources for combating fraud. Many of the financial victims are elderly, with little disposable income.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;We trust that our research may additionally inform legal and social media policies that can better support South African victims of this crime. Such a contribution seems highly salient for the challenging environment that SA law enforcement faces in resolving online crimes.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;v. Suggested areas for future research&lt;/h3&gt;&lt;div&gt;&lt;span&gt;&lt;div&gt;Our study offers an exploratory focus on a novel area of research and recommends that future studies develop this focus on microfrauds and their cybervictimisation of civilians. Research on cyber victims must gain traction to motivate digital platforms and law enforcement to better assist individual victims.&amp;nbsp;&lt;span&gt;&lt;span&gt;This study illuminated just three SA public figures’ cybervictimisation experiences, but other local&amp;nbsp;&lt;/span&gt;celebrities’ experiences may differ according to their contrasting roles and types of exposure. There is also an opportunity to explore public figures&#39; experiences in the&amp;nbsp;Global North.&amp;nbsp;&lt;/span&gt;Scholars can also address how realities ‘on the ground’ prevent brandjacking cases from being stopped, and what some solutions might be.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;There are many future research directions that could enhance the understanding of digital crimes and cybervictimisation in the Global South. In particular, researchers could expand our understanding of the online experiences of victimisation beyond public figures to include everyday citizens. Scholars can urgently contribute to our understanding of who may be vulnerable, how they are targeted online, and the damage they experience. Academics can also contribute to a growing understanding of how individuals can be better empowered to guard against the myriad of digital crimes from which labour compounds and Big Tech profit. For example, little is known about how multi-cultural anti-crime communications might be improved for more effective outreach. The development of knowledge by SA scholars on cybervictimisation, digital crime reporting, and regulatory remedies, along with anti-crime education, seems vital for assisting citizens in combating the overlooked frontline of digital crime.&lt;/div&gt;&lt;/span&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span&gt;&lt;div style=&quot;font-weight: normal;&quot;&gt;&lt;div&gt;&lt;span&gt;To further mobilise this body of work to ensure SA’s protection of digital consumers, this study offers several recommendations for future research and the development of policy. In stark contrast to the well-resourced cybercrime fighting efforts in the corporate sector, digital crimes that target ordinary individuals are often neglected. Therefore, there are significant incentives for expanding this body of work on digital crime, particularly from a Global South perspective, where cybercriminological scholarship is growing and requires further insights into victims’ experiences and support. In terms of theoretical contributions, this study’s utilisation of IPA as a qualitative tool to gain insights offered meaningful observations into the relational experience of victimhood shared by the participants. It demonstrated how cybervictimisation is experienced as persons-in-context and contributes to the extensive literature on IPA by providing novel insights into digital forms of victimisation.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Help support our future research&lt;/h3&gt;&lt;div&gt;The size of the digital crime problem is vast, but little scholarship of it exists. This is directly related to how the global leaders behind research funding far prefer prioritising making grants to tackle the &quot;harms&quot; (unproven) of (mis-, dis- and malinformation). This MDM- with no A focus, seems to be an addictive topic for censorious &#39;hall monitors&#39; in the Communication and Media Studies fields. &lt;br /&gt;&lt;br /&gt;Not so for The Noakes Foundation which has worked with Price Green Creative Studio to prepare a funding proposal &#39;Protecting South Africans from “petty” digital crimes: a case for urgent funding&#39;. It proposes to tackle key areas in (v) future digital research, and research funders are welcome to contact me for a copy on &lt;a href=&quot;mailto:noakest@cput.ac.za&quot;&gt;noakest@cput.ac.za&lt;/a&gt;. I also welcome advice on any related external funding opportunities linked to digital crime in SA.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Gratitude&lt;/h3&gt;&lt;div&gt;Our article developed from a collaboration between two public benefit organisations.&amp;nbsp;I greatly appreciate The Noakes Foundation’s and Dr Mol&#39;s support, plus the research participants’ contributions.&amp;nbsp;The qualitative research contribution of psychologist Dr Taryn van Niekerk was integral to our manuscript. In particular for leading the literature review and applying a critical interpretative phenomenological approach’s analysis from Big Q Qualitative Specialists (Pty) Ltd. Thanks too, Dr Adrie Stander and Dr Alize Pistidda-Scheenstra for digital forensic advice. And Mrs Megan Lofthouse for assisting with the project’s fieldwork, plus Dohne Green from Price Green Creative Studio for driving outreach to celebrities&#39; agents. The authors also greatly appreciate the legal advice of John Spengler and Adam Pike of Pike Law regarding local laws and regulations that cover fake celebrity endorsements and social media advertising frauds.&amp;nbsp;Thanks too to Dr Ashwill Phillips and Professor Francois Steyn for their journal’s positive response to our abstract&#39;s submission. Plus for their assistance in the review process and organising helpful reviews that helped particularly with addressing our article’s context and contributions to the field. We also appreciate The Criminological Society of Africa (&lt;a href=&quot;https://crimsa.ac.za/&quot; target=&quot;_blank&quot;&gt;CRIMSA&lt;/a&gt;)&#39;s for its role in supporting and publishing Acta Criminologica.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3&gt;In the press&lt;/h3&gt;Lyse Comins from the Mail and Guardian has covered our concerns in&amp;nbsp;&lt;a href=&quot;https://mg.co.za/business/2024-09-26-meta-criticised-for-slow-action-as-deepfake-adverts-target-south-african-celebrities/&quot;&gt;Meta criticised for slow action as deepfake adverts target South African celebrities&lt;/a&gt;&amp;nbsp;(2024).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Comments welcome&lt;/h3&gt;&lt;div&gt;I am particularly interested in comments related to scholarly collaborations,&amp;nbsp;digital crime&amp;nbsp;research funding leads, or offers related to anti-digital crime networking support.&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/1916720522830209134/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2025/12/brandjacked-for-social-media-advert.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/1916720522830209134'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/1916720522830209134'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2025/12/brandjacked-for-social-media-advert.html' title='Brandjacked for social media advert fraud: Microcelebrities&#39; experiences of digital crime in South Africa'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlnGBP3i5LHwqAAXmOSzX3ibc1IucKoLh6KIlzxxsANK86Wam5gCLIljvgNCpza8WMBk6WoJR28llZsPrtxWCN75H8AUc8o2Eu4K3uEvePB-5WeQNRJ48fUYqznRDg4IyZdTKwdV41XZY8p1_yl6eEicjxexvegeJEY4LRk4sTGhiAHu7D-Wv3YfzFzfEz/s72-w400-h386-c/Japhet%20Kayomb%20Travis%20Noakes%20Karen%20Heath%20Taryn%20van%20Niekerk%202025.jpeg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.922087 18.4231418</georss:point><georss:box>-62.232320836178843 -16.7331082 -5.6118531638211522 53.579391799999996</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-7368234663661333078</id><published>2025-10-20T09:37:00.015+02:00</published><updated>2025-11-03T16:03:18.168+02:00</updated><title type='text'>Understanding the resistance health experts face in dissenting from medical science orthodoxy and challenging its dogmas during COVID-19 #WNS2025</title><content type='html'>&lt;span style=&quot;color: #999999;&quot;&gt;Written for those keen to understand the resistance that health experts face in challenging dogma, plus &amp;nbsp;why &lt;span style=&quot;caret-color: rgb(153, 153, 153);&quot;&gt;new knowledge might not change&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(153, 153, 153); color: #999999;&quot;&gt;public health policy, or&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;span style=&quot;caret-color: rgb(153, 153, 153);&quot;&gt;the Medical Sciences&lt;/span&gt;&amp;nbsp;field.&amp;nbsp;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;On Saturday the 18th, I gave a talk that addressed the World Nutrition Summit (&lt;a href=&quot;https://thenoakesfoundation.org/wns2025/&quot; target=&quot;_blank&quot;&gt;2025&lt;/a&gt;)&#39;s theme- &#39;Rewriting the Rules: Nutrition, Science and Chronic Disease&#39;. My speech focused on two cases of  evidence-based contributions from health experts being confronted by heavy resistance for challenging COVID-19 policy. This talk’s three sections addresses the&amp;nbsp;many ways in which even the agency of eminent experts is not as free to shape public health policy as they might hope, or even reasonably expect. This talk&#39;s insights emerge from a new research project with &lt;a href=&quot;https://piersrobinson.com&quot; target=&quot;_blank&quot;&gt;Dr Piers Robinson&lt;/a&gt;&amp;nbsp;aiming to develop a framework for the challenges that eminent experts negotiate whilst criticising dogmas. Below is the talks slides on&amp;nbsp;&lt;a href=&quot;https://www.slideshare.net/slideshow/resistance-versus-covid-19-dissenters-wns-2025-pptx/283860654&quot; target=&quot;_blank&quot;&gt;Slideshare&lt;/a&gt;, and the transcript that I read:&lt;div&gt;&lt;div&gt;
&lt;iframe frameborder=&quot;0&quot; height=&quot;400&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/jL2sjqUzDqDGr9?hostedIn=slideshare&amp;amp;page=upload&quot; width=&quot;476&quot;&gt;&lt;/iframe&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Section 1 &lt;/b&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;- Two cases of resistance&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;SLIDE 1&lt;/b&gt;&lt;div&gt;&lt;div&gt;Given the great lies that &lt;a href=&quot;https://www.linkedin.com/in/nick-hudson-988aa323/&quot; target=&quot;_blank&quot;&gt;Nick Hudson&lt;/a&gt; identifies&lt;span style=&quot;color: red;&quot;&gt;*&lt;/span&gt;, it&#39;s important to understand how the evidence-based contributions from health experts can confront heavy resistance for challenging supposedly scientific guidelines.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: red;&quot;&gt;* &lt;/span&gt;Nick spoke earlier about &#39;Hudson&#39;s Razor&#39;- how false scientific propaganda can readily be identified in it featuring; (i) a global crisis, (ii) a need for a global solution to this threat, and (iii) being accompanied by strong censorship. His talk addressed the large scale scams of (a) statins, (b) the COVID-19 phenomenon, and (c) &quot;man-made&quot; climate change.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;b&gt;#2&lt;/b&gt;&lt;br /&gt;As regards “Rewriting the rules&quot; this talk’s three sections speaks to the many ways in which even the agency of eminent experts is not as free to shape public health policy, as they might hope, or even reasonably expect. This presentation’s insights emerge from a new research project aiming to develop a framework for the challenges that eminent experts negotiate whilst criticising dogmas. Hopefully, such research helps us better understand all the ways in which critics&#39; autonomy is reduced. Particularly as they become vulnerable to strategic campaigns from powerful decision makers.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#3&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Here follows two cases from very different contexts: The first is for a frontline doctor in Mitchell’s Plain who was censored against sharing his successful COVID-19 treatment protocol. The second is for a US presidential health adviser whose evidence-based challenge to lockdowns, etc. became sidelined. Both cases suggest the high levels of resistance that experts face in attempting to “rewrite the rules” with their individual contributions. Even during a “public health emergency” that should necessitate health experts challenging each others&#39; ideas to uncover the best scientific explanations!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#4&lt;/b&gt;&lt;/div&gt;&lt;div&gt;In his practice just 30 kilometers away, &lt;a href=&quot;https://www.drrapiti.com&quot; target=&quot;_blank&quot;&gt;Dr Rapiti &lt;/a&gt;was one of a few brave doctors who continued to see patients at the start of COVID. This was despite him being 72 years old then, placing him at higher risk. Early into COVID, both international and local authorities advised clinicians that there was no treatment for the “novel coronavirus”. In stark contrast, Dr Rapiti developed a successful, low-cost protocol for treating almost 4,000 patients. He’s drafting a 100+page book that shares Table 10 on the right. It illustrates this protocol&#39;s success across each COVID wave.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#5&lt;/b&gt;&lt;/div&gt;&lt;div&gt;His practice believed that health authorities’ guidance disagreed with the foundational principle of medicine- to treat early and prevent deterioration. Its patients were treated with an aggressive, high-dose protocol of: Ivermectin, corticosteroids, anti-inflammatories, anticoagulants, and targeted nutritional supplementation. This protocol’s cost ranged from R 400 to 700 per patient (so under $30). Interestingly, his practice avoided COVID-19 testing as being a needless expense that often-produced false positives. He argued that to do testing was not cost-effective medicine, when many of his patients could barely afford food. Plus, the obvious diagnosis was pneumonia&lt;span style=&quot;color: red;&quot;&gt;*&lt;/span&gt; requiring urgent treatment.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;color: red;&quot;&gt;* &lt;/span&gt;Dr Rapiti adds (email correspondence, 21.10.2025), &lt;i&gt;&#39;A major contributing factor for my huge success during the Delta phase was that I discovered a set of simple clinical tools which helped me to predict COVID pneumonia and to treat it before it was detectable on X-ray or on MRI scans. With approach I was able to nip the disease in the bud, ensure rapid recovery and prevent major complications. I was never recognised for this finding which could have been widely used by under-resourced countries in Africa, Asia and South America.&#39;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#6&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Instead of learning from Dr Rapiti’s direct patient experience and early therapeutic successes, academic institutions and policy makers ignored it. Similarly, the video content that he shared on his successful protocol was censored by YouTube and Facebook. Plus, his interviews on BiZNews, and talks to the Good Hope Christian Church.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#7&lt;/b&gt;&lt;/div&gt;&lt;div&gt;On Instagram and Medium, he was deplatformed entirely for &quot;contravening community standards&quot;. He also experienced interference against speaking out for Ivermectin on Heart 104FM. Several doctors wrote to Radio 786, warning against featuring Dr Rapitis’ outspoken views on COVID-19 vaccines and the pandemic. His scheduled talk there was cancelled and he was never invited to speak on 786 again. Instead of radio audiences having access to open views in SA&#39;s &quot;free society&quot;, the airwaves were dominated by official COVID narratives.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#8&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Dr Rapiti’s outreach on the US’ National Public Radio became an opportunity for a journalist to smear his practice’s use of Ivermectin… drawing on Professor Salim Abdool Karim’s critique of this “untested” drug... by then proven to work on over 700 of Robert&#39;s patients! Dr Rapiti was smeared in Google’s search results, and by fact checkers. In response to content takedowns by major social networks, his practice’s weekly Sunday communications shifted to Rumble, Substack, Telegram and Twitter (now X). These platforms did not remove content, such as his 300 videos showcasing successes.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#9&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Dr Rapiti continued with community outreach on Loving Life internet TV, Dr Tess Lawrie’s show, the Good Hope Christian Centre, and the station LN42. Many people then began contacting him regarding treatments for their post- mRNA vaccination injuries. Many were also affected by mental illness, which his practice was unusual in addressing via psychotherapy.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#10&lt;/b&gt;&lt;/div&gt;&lt;div&gt;His practice continues to develop its holistic psychological approach- promoting the low-carb lifestyle, and prescribing a 14 hour digestive break. Learn more about this innovative work on Dr Rapiti&#39;s website, Substack, or by reading his book on addiction treatments.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#11&lt;/b&gt;&lt;/div&gt;&lt;div&gt;During COVID, Robert gathered many testimonials, which included this pertinent example. His intervention supported a daughter in releasing her 71-year-old father from hospital where he was receiving a poor quality of care.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#12&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Benefiting from home-care and following Dr Rapiti’s protocol, the patient recovered within six weeks. He moved off oxygen and could shower, eat and move freely. Such success as evidenced in this testimonial would seem valuable information?&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#13&lt;/b&gt;&lt;/div&gt;&lt;div&gt;A public health response typically requires non-conventional thinkers to develop low-cost solutions for rapid treatment innovation. In Dr Rapiti’s chats with me, he raised an interesting point about “missing information” in COVID-19 being itself a source of misinformation. He flagged that it should be a point of concern that the learnings of many frontline doctors seemed ignored, despite their successes. At the same time, the voices of academic experts who did not treat patients were dominant in setting policy. He did not believe it was sound that his observational studies, and the empirical results from his practice, should face vilification and censorship.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#14&lt;/b&gt;&lt;/div&gt;The next case is very different in foregrounding how a pro-vaccine US presidential health advisor’s argument for ending lockdown measures, and their negative impacts, became ignored for reasons of political perception. The title of Dr Atlas’ 2021 book “A Plague Upon Our House’ references Shakespeare’s Romeo and Juliet in which Mercutio curses the feuding Montague and Capulet families, he was no member of. Like Mercutio, &lt;a href=&quot;https://www.scottatlas.com&quot;&gt;Dr Atlas&lt;/a&gt; blamed the heavily polarised Republican versus Democrat struggle for the persistence of bad policy choices. In particular, lockdowns’ catastrophic economic harms that worst impacted America’s working class, and African Americans. Instead, Dr Atlas argued for focused protection in two 2020 articles for the Hill. The second foregrounded the five key facts, in pink here, that seemed ignored by advocates for total lockdowns.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#15&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Due to his public health expertise and prominent criticism of the poor scientific basis for lockdowns, Dr Atlas was approached to be a presidential health adviser. In visiting the White House to be screened for this role, &amp;nbsp;he became concerned at how simple PCR testing indicators still informed the government’s response after six months. By contrast, he believed that the five points in pink should have by then have been in use. He was also concerned that the COVID-19 Task Force did not have a public health expert on it, believing this contributed to that Force ignoring an analysis of the steep costs that lockdowns cause, particularly to society’s most vulnerable- children, the poor and the elderly.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#16&lt;/b&gt;&lt;/div&gt;&lt;div&gt;At the same time, Dr Atlas was concerned at the negative bias of America’s mainstream pro-Democrat broadcast media, who keenly flagged any poor outcomes to spotlight Trump administration was &quot;not listening to The Science™️&quot;. The expert presence of Dr Atlas at media briefings threatened this narrative.&lt;/div&gt;&lt;div&gt;Likewise, providing scientific support for reopening businesses and schools challenged official COVID-19 policy. As Dr Atlas’ activities were also perceived as potentially aiding Trump’s re-election, he describes becoming a target for smears in the mainstream media, censorship on social media platforms, plus criticism from senior academic peers. Many examples are provided in his book, but my talk is short, so I’ll cover key examples: For starters YouTube pulled down a Hoover interview in which Dr Atlas spoke to why reopening schools would be safe, with children’s low-risk of COVID. Likewise, an expert panel discussion on the flawed scientific rationale behind the extended lockdowns, outdoor masking, plus masking of children, was removed under YouTube’s ‘medical misinformation policy’ in March, 2021.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#17&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Twitter also temporarily banned Dr Atlas’ account after he questioned the efficacy of masks. Despite quoting sources, such as the CDC, WHO, and Oxford, and reiterating official mitigation protocols. He was reinstated after recognizing his Twitter censorship, but remains highly concerned at the implications for science in a supposedly “free society” that such censorship holds. This includes Facebook’s removal of 7 million pieces of COVID-19 dissent and an unfair Wikipedia profile claiming Atlas spread “misinformation”. In a seemingly unprecedented move, the Stanford Faculty Senate issued a resolution claiming that Dr Atlas had “fostered” falsehoods and misrepresentation of science. Prof John Cochrane wrote an interesting critique of this resolution, asking its authors to provide concrete examples of the opinions and statements they took issue with before he might sign it. They did not reply.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#18&lt;/b&gt;&lt;/div&gt;&lt;div&gt;In addition to chilling open debate, the resolution also catalysed threats to Dr Atlas that necessitated a police presence outside his home and the installation of expensive home security equipment. While Dr Atlas was successful in providing more protection for people in nursing homes, he was ultimately frustrated in changing policies around testing, lockdowns and re-opening education. A strong example of policy inertia was evidenced in attempt to redefine the CDC’s guidelines on COVID testing: To improve timely results for priority cases, Dr Atlas had motivated that new guidelines should provide clearer guidance on both focused testing for the vulnerable, and for the public. After this new testing guidance was published it received pushback from talking heads on TV, senior Democrat politicians and public health organisations.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#19&lt;/b&gt;&lt;/div&gt;&lt;div&gt;After a two-week flurry of attacks, the CDC posted guidance that reverted to the old measures- the power of public perception seeming to trump scientific revisions. Media control was also evidenced both via the White House’s failure to publicise a meeting between its Secretary of Health and Human Services, and Professors Bhattacharya, Gupta and Kulldorff. Likewise, the BBC pulled out of interviewing them unless a perspective for the lockdown narrative could be included. This after the BBC had featured only pro-lockdowners for months! Alongside CNN, Forbes, Politico, New York Times, The Washington Post and other media, dissenters were demonized after calling for focused protection and reopening. &quot;Herd immunity&quot; became a weaponized term, while COVID-19 fears were exaggerated to manipulate support for lockdowns.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#20&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Such fear-mongering pushed unhinged individuals to harass Dr Atlas in Washington DC, and via social media. He resigned from his public health advisor position in December. Despite presenting stong arguments, he was unable to change the COVID Task Force’s policies for mass testing, business lockdowns and educational closures. His case serves as another cautionary tale on “Rewriting the rules” as it bridges many concerns: Political polarisation infecting medical science and academia, contributing to a desire to censor alternate viewpoints. The power of the mainstream media in propagandising for a fake scientific consensus, and smearing dissenters. Finally, scientific discovery can be actively suppressed by bureaucrats, when enabled by conflicted politicians, and further abetted via censorship on Big Tech.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#21&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Despite being a public health policy expert, Dr Atlas’ most valuable contributions were blocked by bureaucrats. They ensured that lockdowns, mass testing, masking, and educational facility closures were applied, whilst their negative impacts went largely undiscussed.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#22&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Drs Atlas and Rapiti’s cases suggests 11 key points on resistance: Both doctors were well-positioned to challenge COVID-19 narratives due to their extensive medical knowledge. Each had to negotiate a huge asymmetry between their resourcing versus the orthodoxy’s. A sanctions stack’s pressure influenced the duration and motivation of their respective resistance- while Dr Scott Atlas left the White House in anger and disgust, Dr Rapiti has become even more motivated to challenge the status-quo. During COVID-19 he was leading his practice at all hours, so could not formally contribute to the academic literature on his successes. This suggests how during an emergency the scholarly literature will exclude important frontline knowledge as “missing information”. Many scholars may not appreciate the extent of this, thanks to The Science™️’s heavily controlled “health communication for consensus” architecture.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#23&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Despite their expertise, both doctors were quickly presented as part of a medical “fringe” for raising inconvenient questions. In terms of changing policy, Dr Atlas&#39; opportunity to contribute as a presidential adviser proved not to be as influential as he expected, given that powerful networks he seemed unfamiliar with were actually controlling COVID-19 policy. These two slides help explain why changing policy, knowledge to ‘Rewriting the Rules&#39; is so hard, even for the most eminent dissidents. At a meta-level, there is also the challenge of a lack of explicit disclosure around what the Undone Science is. Likewise, scientific suppression’s role in supporting bias is under-researched. A lack of awareness around health communication as propaganda, scientific suppression and Undone Science, are all important blind-spots in the academic Health Sciences, and its literature.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#24&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Blindness to all three pose an obstacle for academics and their students understanding what is taught as truth. A topical example is the recent promotion for the EAT-LANCET’s “planetary health diet”&lt;/div&gt;&lt;div&gt;(see &lt;a href=&quot;https://cluelessdoctors.com/2019/01/19/the-eat-lancet-commission-the-worlds-biggest-lie/&quot; target=&quot;_blank&quot;&gt;https://cluelessdoctors.com/2019/01/19/the-eat-lancet-commission-the-worlds-biggest-lie/&lt;/a&gt;).&lt;/div&gt;&lt;div&gt;First funded by mega billionaire Gunhild Stordalen and launched in 2019, this diet was updated by the EAT-Lancet Commission 2025. 20 of the most influential critics of the original diet were targeted for pre-bunking in advance through the Meat vs EAT LANCET report. It falsely claims that the meat industry not only funded criticism of the original “planetary health diet” but also directed dissenters in their successful backlash. This report is just one of many “health communication” pieces planned by the GPPP’s plant-based, processed food stakeholders for their One Health approach.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3&gt;&lt;b&gt;Section 2 -&amp;nbsp;&lt;/b&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Unanswered questions from the COVID-19 “public health” response (AKA a Global Biodefence Public-Private Partnership’s Chorus Effect)&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#25&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Such an example points to how the “public health” response context in which experts operate in&lt;/div&gt;&lt;div&gt;can serve as a mirage, concealing the apposite agendas of funders.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#26&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Here are some questions that required answering but seem not to have been prioritized during COVID-19. Both doctors contributed to this knowledge in the brackets shown here. Framing resistance to their answers, helps us learn how authoritarian networks block knowledge contributions that might catalyze social change.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#27&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Experts’ free speech and civil rights were heavily constrained during COVID-19. Like most countries, South Africa did not see the practice of active academic freedom with robust debate on campuses, or even in many journals. Nor did its national science organisations fund unorthodox research, notably as regarding personal health prevention, or into brave physicians&#39; development of successful, low-cost protocols.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#28&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Before COVID-19, such brave frontline work would be a key part of a standard public health emergency response. As per (ii) in a list of five guidelines described in Debbie Lerman’s book. While COVID saw the healthcare capacity increase, points (i), (ii), (iv) and (v) were ignored. &lt;a href=&quot;https://brownstone.org/articles/the-deep-state-goes-viral-introduction/&quot; target=&quot;_blank&quot;&gt;The Deep State goes Viral&lt;/a&gt;&#39;s compelling explanation is that by mid-March the COVID response had been transferred in many countries from Departments of Health to Military and National Security agencies. This shift supported a “quarantine until vaccine” approach, previously applicable for countering bio-terrorism. With this change, public health planning switched to non-stop ‘lockdown until vaccination’ communications.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#29&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Such an unprecedented shift reflected the triumph of a ‘dual-use’ endeavour: The National Biodefence complex’s collaboration with the Global Public-Private Partnership (GPPP). Its agents are shown in the table on the right. ’Dual use’ describes efforts that may serve both military and civilian objectives.&lt;/div&gt;&lt;div&gt;Pathogens can be bioweapons, but they can also spread naturally. Countermeasures from the Pandemic Preparedness Industry can be used against both natural outbreaks and bio-terror attacks. After 9/11, biodefence research grew dramatically, supported by government and non-profits keen to support the study of pandemic counter-measures. The civilian side of this research was mostly funded by public health agencies and mega-nonprofits interested in vaccine development to control natural disease outbreaks.&lt;/div&gt;&lt;div&gt;As these were potentially useful against bio-terror attacks too, it was unsurprising that these fields merged into a dual-use entity called ‘biodefense’ or “health security”. This symbiotic military/civilian enterprise could attract more funding and exert greater influence than biodefence or pandemic preparedness alone.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#30&lt;/b&gt;&lt;/div&gt;&lt;div&gt;The growth of such collaboration in the USA, also coincided with a shift of power away from nation states, as capital and political power migrated into the GPPP. This is the context of a “health security” leviathan for mRNA vaccination emerging during COVID-19, as an indispensable system “too big to fail”. Its alignment to long term GPPP Great Reset ambitions, provides an interesting context to ground&lt;/div&gt;&lt;div&gt;resistance in each case: Dr Rapiti proved that a viable, low-cost treatment existed, which would pose a threat to Emergency Use Authorisation of the experimental “vaccines”. Likewise, Dr Atlas’ questioning of lockdowns, mass testing, and masking challenged the environment of fear necessary for maintaining social control past the roll-out of mass vaccination. Do read the books below for more on this nefarious reality.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#31&lt;/b&gt;&lt;/div&gt;&lt;div&gt;The Global biodefence PPP builds on the large influence of Big Pharma, which already exerts a huge amount of financial control via the ‘Chorus effect’. Journalist John MacGregor’s &lt;a href=&quot;https://thirddraftdemocracy.com/&quot; target=&quot;_blank&quot;&gt;book&lt;/a&gt; spotlights this effect. There is huge commercial buy-in across all key social agents, which poses a challenge for them&lt;/div&gt;&lt;div&gt;appreciating any value in “heretical” vaccine critiques, such as in the books on the right.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#32&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Research into the resistance dissidents face can help us better appreciate the complicated context of why experts confront suppression of evidence-based contributions. Resistance research can also help scholars appreciate how scientific suppression impacts what is neglected, or entirely absent in the scholarly literature.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3&gt;Section 3 -&amp;nbsp;&lt;span style=&quot;font-weight: normal;&quot;&gt;Flagging the impacts of powerful resistance to experts&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#33&lt;/b&gt;&lt;/div&gt;&lt;div&gt;This section addresses how the field of resistance studies help us understand suppression versus those attempting to ‘rewrite the rules’. Resistance studies supports understanding marginalized social agents who aim at developing intellectual autonomy and oppositional ways of thinking for combating epistemic injustice from networks of power exercising domination. Unusually, we focus on cases where resistance is readily identifiable, since COVID-19 dissenters inevitably must strive to gain visibility for their contributions.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#34&lt;/b&gt;&lt;/div&gt;&lt;div&gt;In preliminary research, we are collating cases for varied types of experts&#39; COVID-19 contributions, where individuals describe facing strong resistance.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#35&lt;/b&gt;&lt;/div&gt;&lt;div&gt;These myriad of examples presents an opportunity to address a neglected topic; how institutional and other structural constraints work against dissident experts. Answering the first question entails exploring the concern of systematic bias against dissent in the top medical journals. While the second addresses how experts felt constrained in making their critical contributions. The third covers the myriad of constraints that led to a bias for the official COVID-19 narrative in medical academia.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#36&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Due to its broad interdisciplinary nature, resistance studies is well-suited for describing the Undone Science of COVID, plus the varied tactics that authorities can use to suppress legitimate academic contributions from a diverse group of experts.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#37&lt;/b&gt;&lt;/div&gt;&lt;div&gt;For example, the typology of ‘Internal Challenges in Medicine’ spotlights a continuum from resistance into rebellion, and onto heresy. Heresy is a suitable concept for our cases since medical orthodoxy has the power to define which COVID contributions were “unacceptable”, meriting greater resistance and marginalisation.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#38&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Delborne’s conceptual framework is useful for describing the contrarian science of COVID dissidents and the types of impedance and outright suppression their contributions faced in failing to be reviewed, or to receive strong counter-arguments against their ideas. Plus, resistance to their research program, and even dissidents’ entire scientific field.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#39&lt;/b&gt;&lt;/div&gt;&lt;div&gt;The “Classification for Suppression Methods in Science” will also be referenced, since it is likely that the experts we interview will describe self-censorship, experiencing external complaints, blocking of their outputs, with attempts to stigmatise and discredit their work. And direct attacks on career prospects.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#40&lt;/b&gt;&lt;/div&gt;&lt;div&gt;The first characteristic, in pink here, that Prof Martin flagged in ‘Censorship in Science: Deeper Processes &#39; (2024) flags how scholarship would seem dangerously one-sided if it does not fairly address treatment paradigms outside of costly mRNA vaccination. The 13 unanswered questions spotlighted in the previous section speak to ‘Undone Science’. Last, the issue of incorporated science is flagged- GPPP investors are not disinterested parties, as the COVID-19 response transferred trillions of dollars of wealth from us, as private citizens, to the GPPP’s supporters.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#41&lt;/b&gt;&lt;/div&gt;&lt;div&gt;The previous frameworks are just a small sample of what’s been written on institutional resistance against dissenting individuals. We will be writing a review article to define what’s been done. This will ground our research plans and help us develop a comprehensive framework for undergirding our hard cases and research articles. The two cases shared with you today spotlight that the suppression of experts’ contributions is not a minor matter. Hopefully, our project will raise greater awareness for this, whilst contributing to policies that can better support the rights of individuals to express credible dissent, and to over-write bad rules, and the lying rulers who enforce them.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#42&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Thank you for listening to our work.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#43&lt;/b&gt;&lt;/div&gt;&lt;div&gt;And thanks to the team that supports TNF’s &lt;a href=&quot;https://thenoakesfoundation.org/research/academic-free-speech-and-digital-voices/&quot; target=&quot;_blank&quot;&gt;Academic Free Speech&lt;/a&gt; focus, and to CPUT and the &lt;a href=&quot;https://propagandastudies.org/about/&quot;&gt;Organisation for Propaganda Studies&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#44&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Thanks too to the &lt;a href=&quot;https://nutrition-network.org&quot; target=&quot;_blank&quot;&gt;Nutrition Network&lt;/a&gt; for this opportunity.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;#45&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Please &lt;a href=&quot;https://www.travisnoakes.co.za/p/contact.html&quot; target=&quot;_blank&quot;&gt;contact me&lt;/a&gt; on with any questions, comments or concerns about this presentation…&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/7368234663661333078/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2025/10/understanding-resistance-health-experts.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/7368234663661333078'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/7368234663661333078'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2025/10/understanding-resistance-health-experts.html' title='Understanding the resistance health experts face in dissenting from medical science orthodoxy and challenging its dogmas during COVID-19 #WNS2025'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-8125367415748871094</id><published>2025-10-06T00:41:00.039+02:00</published><updated>2025-12-10T13:14:04.463+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="health communication"/><category scheme="http://www.blogger.com/atom/ns#" term="propaganda"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><title type='text'>The Meat vs EAT-LANCET report as a targeted smear - the example of misinformation on Emeritus Professor Tim Noakes</title><content type='html'>&lt;p&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Written to highlight bias in a report with a covert agenda, plus to defend Prof Noakes’ online reputation from yet another Big Food-funded smear.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Published in September 2025, The Changing Markets Foundation’s &lt;a href=&quot;https://changingmarkets.org/report/meat-vs-eat-lancet-the-dynamics-of-an-industry-orchestrated-online-backlash/&quot;&gt;Meat vs EAT LANCET&lt;/a&gt; publication positions itself as a credible, investigative report. By contrast, I argue that it should rather be understood as a covert &#39;smear&#39; communication event. &lt;span&gt;In simple terms, a smear is &#39;an effort to manipulate opinion by promulgating an overblown, scandalous and damaging narrative&#39;&amp;nbsp;&lt;a href=&quot;https://www.harpercollins.com/products/the-smear-sharyl-attkisson?variant=32216080056354&quot; target=&quot;_blank&quot;&gt;(Attkisson, 2017)&lt;/a&gt;. The goal is often &#39;to destroy ideas by ruining the people who are most effective at communicating them&#39; (p.3).&amp;nbsp;&lt;/span&gt;The ‘Meat vs EAT-LANCET’ report fulfils a smear&#39;s&amp;nbsp;criteria; its investigation uses inconclusive evidence to defame critics of the original “planetary health” diet (&lt;a href=&quot;https://doi.org/10.1016/S0140-6736(18)31788-4&quot; target=&quot;_blank&quot;&gt;Willett et al, 2019&lt;/a&gt;) as shills for the meat industry.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;As a communication event, ‘Meat vs EAT-LANCET’ is located within a long-running scientific argument and diet controversy. This concerns; what constitutes a healthy diet for individuals, the best food systems to support this, who gets to decide, and what research merits funding. In the Health Sciences and related fields, this rivalry pits two sides against each other. The dominant orthodoxy promotes high carbohydrate diets that suit the interests of the plant-based and processed food industry. In contrast, dissenting experts advocate for low carb lifestyles, plus real foods from the farming of livestock and regenerative agriculture (&lt;a href=&quot;https://www.simonandschuster.com/books/The-Big-Fat-Surprise/Nina-Teicholz/9781451624434&quot; target=&quot;_blank&quot;&gt;Teicholz, 2014)&lt;/a&gt;. It is not co-incidental that the Meat vs EAT-LANCET report&#39;s release occurred shortly before the next communication from the orthodoxy- the EAT-Lancet Commission report (&lt;a href=&quot;https://www.thelancet.com/commissions-do/EAT-2025&quot; target=&quot;_blank&quot;&gt;2025&lt;/a&gt;). The former&#39;s release was planned to pre-empt criticism of 2025&#39;s report by smearing the most influential critics of its 2019 pre-cursor. Such blowback seems motivated by the low-carb critics&#39; initial successes- for example, a flagship launch event was planned at the World Health Organisation (WHO) in Geneva, Switzerland, but&amp;nbsp; the WHO pulled out. Its withdrawal ‘followed a massive online backlash, which had concentrated on one of the report’s recommendations: to cut global red meat consumption by 50 percent’ (&lt;a href=&quot;https://www.desmog.com/2025/04/10/meat-industry-red-flag-animal-agriculture-alliance-behind-attacks-flagship-climate-friendly-diet-report-eat-lancet/&quot; target=&quot;_blank&quot;&gt;Carlile, 2025&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;As described in Lars Magne Sunnanå’s Substack post (‘&lt;a href=&quot;https://lams.substack.com/p/a-diet-to-save-the-planet-brought&quot; target=&quot;_blank&quot;&gt;A diet to save the planet - brought to you by a Wall Street bet on margarine&lt;/a&gt;’), the supporters of&amp;nbsp;&lt;span style=&quot;white-space-collapse: preserve;&quot;&gt;Environment, Agriculture, and Transformation (&lt;/span&gt;EAT)&#39;s Commission learnt from this failure. The EAT-Lancet Commission 2025 report&#39;s release will be better co-ordinated- with 70 scientists, new safeguards against &quot;misinformation&quot;, plus many more partners and allies ready to defend the research. Other plans include involving scientific institutions like Harvard and Cornel to produce and publish a range of translation articles, alongside a campaign with a “celebrity influencer group”. Funders that include the Rockefeller Foundation and Gates Foundation, plus sponsors such as the Flora Food Group are providing additional support. Widespread coverage can be expected in scientific publications and key media to promote the revised diet. It merits consideration why the steep fees of a large PR campaign were supported by the report&#39;s funders to make this the report &#39;du jour&#39;, versus funding other forms of outreach (such as open debates on its merits?).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Published on the 3rd of October, The EAT-Lancet Commission 2025 report is part of a broader campaign for EAT and its collaborators to establish themselves as an “independent Intergovernmental Panel on Climate Change (IPCC) for food systems. Should they succeed, their IPCC will likely be able to increase its sponsorship and attract more funders. At the same time, the proposed IPCC for Food is part of an agenda to &quot;streamline&quot; decisions on food systems. Driven by an few highly influential actors, this initiative has the risk of imposing a narrow view of science by excluding many voices on food systems (&lt;a href=&quot;https://ipes-food.org/report/an-ipcc-for-food/&quot; target=&quot;_blank&quot;&gt;IPES, 2021&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;From a PR perspective, the Meat vs EAT-LANCET communication event is part of a pre-emptive campaign. Its funders hope that by framing the most influential critics of the “planetary health” diet (PHD 🙄) as surrogates for the meat industry, the content of their arguments can be ignored. The report frames critics of the 2019 report as: (i) being funded by an “evil” meat industry; (ii) taking funds from its PR agencies; and (iii) being co-ordinated by them in an attempt to discredit “the science”. This frame suggests that influential individuals&#39; criticism of the “planetary health” diet is commercially-driven, anti-science heresy. Such framing illustrates Wolpe&#39;s (&lt;a href=&quot;https://doi.org/10.1016/0277-9536(94)90346-8&quot; target=&quot;_blank&quot;&gt;1994&lt;/a&gt;) insight that &quot;heresy&quot; is socially constructed by orthodoxy. Its defenders have the power to define which views are unacceptable and will face marginalisation. Here the orthodoxy presents critics of the EAT-LANCET commission to be an amoral group of duplicitous outsiders. They are “attacking” a virtuous group of meat-industry-fighting truth seekers, whose noble role is to “defend the science”. In stark contrast, critics of the PHD are presented as basely-motivated. They are defamed as reliant on the meat industry’s financing and planning for launching a significant online “backlash”. &amp;nbsp;This publication&#39;s argument is very close to calling for action to get rid of influential experts who have dared to contest the EAT-Lancet&#39;s scientific guidance (&lt;a href=&quot;https://cluelessdoctors.com/2025/10/11/understanding-the-eat-lancet-2-0/&quot; target=&quot;_blank&quot;&gt;Stanton, 2025&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;A biased “research” report with a covert agenda&lt;/h3&gt;&lt;p&gt;As a communication event, the report is a patently transparent smear tool which seeks to create a digital pillory for the critics of the original EAT-Lancet 1999 reports’ many flaws (&lt;span style=&quot;white-space-collapse: preserve;&quot;&gt;&lt;a href=&quot;https://doi.org/10.1016/S2214-109X(19)30447-4&quot; target=&quot;_blank&quot;&gt;Hirvonen et al., 2020&lt;/a&gt;, &lt;/span&gt;&lt;span style=&quot;white-space-collapse: preserve;&quot;&gt;Zagmutt et al. &lt;a href=&quot;https://doi.org/10.1016/S0140-6736(19)31903-8&quot; target=&quot;_blank&quot;&gt;2019&lt;/a&gt;, &lt;a href=&quot;https://doi.org/10.1093/jn/nxaa020&quot; target=&quot;_blank&quot;&gt;2020&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;white-space-collapse: preserve;&quot;&gt;)&lt;/span&gt;. The Meat vs EAT-LANCET report is biased, its authorship is opaque, and its funding sources are hidden:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The obfuscation of funding sources is typical for the network funding man-made climate change research (&lt;a href=&quot;https://www.skyhorsepublishing.com/9781510780217/rockefeller/&quot; target=&quot;_blank&quot;&gt;Nordangård, 2024&lt;/a&gt;A), plus other projects that support of &lt;a href=&quot;https://sdgs.un.org/2030agenda&quot; target=&quot;_blank&quot;&gt;Agenda 2030&lt;/a&gt; (&lt;a href=&quot;https://www.skyhorsepublishing.com/9781510782037/the-global-coup-detat/&quot; target=&quot;_blank&quot;&gt;Nordangård, 2024B&lt;/a&gt;). The Meat vs EAT-LANCET report does not disclose who its funders are, nor does it make an ethical acknowledgment for how that funding shapes its choice of subject and potential biases. The report is a&amp;nbsp;&lt;a href=&quot;https://www.rippleresearch.ai/work-meat-dairy-misinformation-case-study&quot; target=&quot;_blank&quot;&gt;co-production of two non-profits&lt;/a&gt;&amp;nbsp;embedded within the Davocracy (&lt;a href=&quot;https://www.renaud-camus.net/journal&quot; target=&quot;_blank&quot;&gt;Camus, 2022&lt;/a&gt;). Renaud Camus&#39; neologism blends &quot;Davos&quot; (referring to the World Economic Forum and its global elites) with &quot;-cracy,&quot; describing a managerial, cybernetic regime. Its financial powers—such as banks, multinational corporations and Big Tech - strive to exert sovereign control over human populations. This is facilitated via Global Public-Private Partnerships (GPPP) that stoke exaggerated fears, such as climate change catastrophism (&lt;a href=&quot;https://thegwpf.org/content/uploads/2023/07/West-Catastrophe-Culture6by9-v28.pdf&quot; target=&quot;_blank&quot;&gt;West, 2023&lt;/a&gt;), that the GPPP&#39;s Social Development Goals (SDG) grant it the mandate to address. Dovetailing with this ideology, The&amp;nbsp;&lt;a href=&quot;https://changingmarkets.org/about/&quot; target=&quot;_blank&quot;&gt;Changing Markets Foundation&lt;/a&gt;&amp;nbsp;strives to ‘shift market share away from unsustainable products and companies, and onto environmentally and socially beneficial solutions’.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;Changing Market’s analysis in the Meat vs EAT-LANCET report was built off original research done by&amp;nbsp;&lt;a href=&quot;https://www.rippleresearch.ai/about-mission&quot; target=&quot;_blank&quot;&gt;Ripple Research&lt;/a&gt;&amp;nbsp;an “AI-for-Good advisory firm”, owned by the NPO Śrāvaṇa in Switzerland. Ripple is committed to ‘designing solutions for the most pressing global challenges and to effectuate enduring large-scale social impact through our unique Human+AI approach.’ Both non-profits are are bedfellows in having GPPP stakeholder clients who benefit directly from scientific dissent to their industries being miscast as “misinformation”. As part of an &quot;Infodemic&quot;, all dissent versus climate change, mRNA vaccines and the WHO’s COVID-19 policies can be simplistically grouped. All such content becomes labelled as &quot;misinformation&quot; from amoral “misinfluencers&quot;, even when produced by eminent experts with decades of scholarship in their field! Such simplistic analysis for an &quot;Infodemic&quot; ignores the fact that disinformation, misinformation and malinformation (MDM) from authorities may well have far worse impacts than voices raising dissent, as was evident during COVID-19 (Noakes, Bell, &amp;amp; Noakes, &lt;a href=&quot;https://doi.org/10.4102/td.v18i1.1263&quot; target=&quot;_blank&quot;&gt;2022&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;It the Meat vs EAT-LANCET report was ethical, it would disclose that its creation is riddled with conflicts of interest. Even with such disclosure, this negative PR exercise would not warrant being placed in the ‘research report’ genre. As an academic report, it would be desk-rejected as unworthy of peer review; it is not a fair-minded exploration of evidence, but merely serves to support a witch-hunt based on tendentious allegations stretched to seem credible. This is another hallmark of the smear, it salaciously works to confirm what a lot of people (e.g. vegetarians, vegans and processed food addicts) want to believe. A smear works by confirming its audiences&#39; pre-existing suspicions (Attkisson, 2017, p.4). As Goebbels observed in his diary, propaganda works best when those who are being manipulated are confident that they acting in their own free will. In this case, sympathetic readers are primed to ignore that it was not poor science that motivated the independent experts&#39; critique. Instead they are asked to believe the Meat vs EAT-LANCET report&#39;s claim that the &quot;potential of the report to lead to regulation and societal change&quot; posed a serious threat to the interests of Big Meat and Dairy. In response it co-ordinated a &#39;significant online backlash – against the report’s findings and the Commission itself&#39; (p.5).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Misinformation in the report regarding @ProfTimNoakes&lt;/h3&gt;&lt;br /&gt;Despite being four years in the making, the Meat vs EAT-LANCET report is riddled with errors and falsehoods. This post&#39;s focus is on the errors in my father&#39;s example, Emeritus Professor Tim Noakes, following the example of Dr Georgia Ede&#39;s line-by-line rebuttal on &lt;a href=&quot;https://x.com/GeorgiaEdeMD/status/1974202753464582556&quot;&gt;X&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Mentioned by name 18 times in the report, he is often referred to as “mis-influencer Tim Noakes”, instead of by his hard-earned academic titles (Dr or Emeritus Prof). The &quot;mis-influencer&quot; GPPP neologism describes ‘individuals or entities actively spreading or amplifying mis- or disinformation within digital spaces, to influence wider narratives and opinions&#39;. (p.3) Presumably the report’s choice strives to hypnotise readers- hoping a lie repeated often enough becomes true. Smearing also demeans its target, following another tactic of Goebbels. Propaganda must facilitate the displacement of aggression by specifying the targets for hatred. In this reports&#39; case, all twenty mis-influencers are demeaned. At the same time, this open report&#39;s smear seems also to be an attempt at tying the term &quot;mis-influencer&quot; to &quot;Tim Noakes&quot; results via search engine results and AI answers that have crawled Meat vs EAT-LANCET&#39;s pages.&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;p&gt;On page &lt;b&gt;14,&lt;/b&gt; the report shows that @ProfTimNoakes has not shared original tweets featuring the &lt;a href=&quot;https://x.com/search?q=%23ClimateFoodFacts&amp;amp;src=typed_query&quot; target=&quot;_blank&quot;&gt;#ClimateFoodFacts&lt;/a&gt; or &lt;a href=&quot;https://x.com/search?q=%23Yes2Meat&amp;amp;src=typed_query&amp;amp;f=top&quot; target=&quot;_blank&quot;&gt;#Yes2Meat&lt;/a&gt; hashtags. The report asserts that the ClimateFoodFacts tag was co-ordinated via the Red Flag agency, “likely on behalf of” the Animal Agriculture Alliance (AAA). By its own criteria, this page suggests that Emeritus Professor Tim Noakes was NOT involved in the AAA influence campaign via Red Flag. He never posted any original (e.g. &quot;sponsored&quot;) #Yes2Meat tweets.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Page &lt;b&gt;16&lt;/b&gt;’s two-sentence smear “biography” for the &#39;Doctor/health influencer&#39; Tim Noakes alleges he has a “Career built out of promotion of high meat diets. Red Flag consulting identifies his content in a report back about the success of its campaign to discredit EAT-Lancet. He is also likely one of the ‘experts’ Red Flag refers to having briefed.&quot; Firstly, Emeritus Professor Tim Noakes only endorsed the low-carb lifestyle from 2010, having taught a high-carb diet for the previous thirty years of his academic career. To claim that his career was “built out” of promoting red meat is defamatory and false. Secondly, neither Emeritus Professor Tim Noakes nor The Noakes Foundation even knew that Red Flag consulting existed before the report. Nor has either ever been approached by the Animal Agriculture Alliance or any other of its representatives. Just as it is defamatory and false to term Tim Noakes a “mis-influencer”, it is also patently false to claim that he and/or his foundation have been paid to critique a seriously flawed&amp;nbsp;EAT-Lancet report. That said, the Meat vs EAT-LANCET&amp;nbsp;report does use plenty of hedging expressions and false innuendo, instead of factual statements. A wise choice, as the use of insinuation, not stating facts, protects the Changing Markets Foundation from being at risk for a defamation suit from this report&#39;s twenty targets.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;On page &lt;b&gt;22&lt;/b&gt;, the report continues its smear of red meat funding collusion by asserting that Tim Noakes and other experts were identified as “relevant” to Red Flag’s campaign in its leaked document. Given the high Twitter visibility of &lt;a href=&quot;https://x.com/ProfTimNoakes&quot; target=&quot;_blank&quot;&gt;@ProfTimNoakes&lt;/a&gt; and the other 19 accounts, it is not surprising that they would be mentioned in any report on influential low-carb, keto and/or carnivore lifestyle accounts. However, this should not be conflated with them being social media “influencers”- individuals desirous of using their large audience reach to peddle marketing campaigns for advertisers. Based on the Changing Markets Foundation and Ripple’s analysis of the engagement levels of these accounts, “it is likely that these are the ‘experts’ Red Flag highlights as having briefed and who ‘substantively engaged’ with criticising EAT!Lancet.” Again, the analysts hedge their false claims with “it is likely”, and do not not explain the basis for asserting such a &quot;likelihood&quot;.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;On page&lt;b&gt; 29&lt;/b&gt;, &quot;Tim Noakes&quot; is described as a “Health influencer” here, rather than the doctor, scientist and academic (or Professor Emeritus) that he is. In contrast, page &lt;b&gt;36&lt;/b&gt;&#39;s section, Doctors, and health and wellness ‘experts’, acknowledges that “Tim Noakes” has medical training. But it claims that he, Shawn Baker and Gary Fettke have all had “issues with their medical licences because of the dietary advice they promote.” Again this is a false assertion, Emeritus Professor Tim Noakes has never had any concern with “issues” regarding his medical license. Any issues were in the minds of the diet dictators that tried, and failed, to end his academic career (&lt;a href=&quot;http://www.realfoodontrial.com/&quot; target=&quot;_blank&quot;&gt;Noakes and Sboros, 2022&lt;/a&gt;). Their attacks had no legitimate basis, and therefor no credible chance for success. Further, the claim that since Prof Noakes fell under the category of doctor mis-influencer that he “played a pivotal role in the pushback against EAT!Lancet, unleashing #Yes2Meat…” is false. As the report states on page 14, @ProfTimNoakes did not share original tweets featuring the #Yes2Meat hashtag.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Instead of focusing on Emeritus Professor Tim Noakes’ significant contribution to the academic literature on nutrition in page &lt;b&gt;37&lt;/b&gt;, the report’s profile for him one-sidedly focuses on controversies. This is a hallmark of authors more intent on writing a smear than preparing a balanced appraisal (&lt;a href=&quot;https://www.harpercollins.com/products/the-smear-sharyl-attkisson?variant=32216080056354&quot; target=&quot;_blank&quot;&gt;Attkisson, 2017&lt;/a&gt;). For example, the Changing Markets Foundation writes: ‘&lt;i&gt;Noakes was investigated by South African health authorities in 2014, after a dietician complained about a tweet in which he had told a mother she should wean her baby onto low-carbohydrate, high-fat foods. He was cleared of misconduct in April 2017.’&amp;nbsp;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Another clear indicator of bias in The Changing Markets Foundation&#39;s and Ripple Research’s report lies on page &lt;b&gt;63&lt;/b&gt;. None of Professor Tim Noakes’ books or seminal articles are referenced in this one-sided bibliography. Perhaps if the reports&quot;investigators&quot; had read &lt;a href=&quot;https://www.penguinrandomhouse.co.za/book/challenging-beliefs/9781770224612&quot; target=&quot;_blank&quot;&gt;Challenging Beliefs&lt;/a&gt;, &lt;a href=&quot;https://www.human-kinetics.co.uk/9781492577843/waterlogged/&quot; target=&quot;_blank&quot;&gt;Waterlogged&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.penguinrandomhouse.co.za/book/lore-nutrition-challenging-conventional-dietary-beliefs/9781776092611&quot; target=&quot;_blank&quot;&gt;Lore of Nutrition&lt;/a&gt;&amp;nbsp;or &lt;a href=&quot;http://www.realfoodontrial.com/&quot; target=&quot;_blank&quot;&gt;Real Food on Trial,&lt;/a&gt; they would appreciate that Prof Noakes if highly critical of industry’s influence on science. A red flag (pun alert 😉!) that he is highly unlikely to be persuaded to participate in a paid-for campaign by Red Flag, or any other funder. Rather his participation in the debate is driven by a concern for the actual science that the EAT-LANCET Commission neglects. This is due to the false-beliefs associated with a plant-based, climate catastrophe ideology (well-described by &lt;a href=&quot;https://thegwpf.org/content/uploads/2023/07/West-Catastrophe-Culture6by9-v28.pdf&quot; target=&quot;_blank&quot;&gt;West, 2023&lt;/a&gt;). It is therefor unsurprising that ‘Meat vs EAT-LANCET’ report&amp;nbsp;is shockingly inaccurate, written to serve as the propaganda smear agenda of the EAT-LANCET Committee. As Dr Zoe Harcombe wisely stated, the report is “the very epitome of misinformation - disinformation indeed - of which it accuses others.”&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;A report mirroring the Davocracy groupthinkers&#39; biases&lt;/h3&gt;&lt;p&gt;The globalist group, EAT-Lancet, is a well-funded by NGOs and corporations. Like most GPPP linked charities, it is unaccountable to the public. Its funders are keen for a high -carbohydrate, mostly plant-based “planetary diet&quot; to be prescribed everywhere, and for everyone. EAT-Lancet and its co-believers work primarily through cities to force/&quot;nudge&quot; reductions in red meat, aiming to drastically reduce livestock for reducing climate emissions. This planetary friendly diet is apparently intended to provide a scientific basis for a ’1.5 degree-aligned’ global food system. While beautifully designed by Pietro Bruni of &lt;a href=&quot;http://www.toshi.ltd&quot;&gt;www.toshi.ltd&lt;/a&gt;, this report’s tosh (pun #2 alert 😉!)&amp;nbsp;conceals the funding money grabbing aims of researchers behind it. As too, the nefarious globalist agenda of GPPP stakeholders keen to sideline meat and dairy in favour of the industrial slop that its stakeholders would prefer we eat to “save the planet” (not incidentally reducing our health, boosting the wealth of billionaire &quot;philanthropists&quot;, and aiding depopulation).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The GPPP has been criticised as being an unelected network of governments, corporations, and international organisations, that use manipulative control mechanisms to seize global resources and achieve economic dominance. Critics including civil society groups and organisations, such as &lt;a href=&quot;https://publicservices.international/resources/news/why-public-private-partnerships-dont-work?id=6501&amp;amp;lang=en&quot; target=&quot;_blank&quot;&gt;Public Services International&lt;/a&gt;, have highlighted concerns with the GPPP. These include its lack of transparency, accountability, and undue private influence over public policy. The GPPP skirts these issues through deploying deceptive terminology. Terms like &quot;inclusive,&quot; &quot;sustainable,&quot; &quot;equity,&quot; and &quot;resilience&quot; mask the GPPPs true intentions, promoting a false image of environmental care, whilst advancing a covert agenda. Notably, the GPPP has created an asset rating system tied to Sustainable Development Goals and Stakeholder Capitalism Metrics, that serve to support technocratic economic and social control by redefining and commodifying the &quot;global commons.&quot; Hubristic claims like the &quot;planetary diet&quot; are all part of a well-considered propaganda approach to shape and control media discourse via definitional pattern control. The authors of the&amp;nbsp;‘Meat vs EAT-LANCET’ report use of the neologism &quot;mis-influencer&quot; serves as an example of this in enabling them to determine who falls under this new category, rather than speak to earlier examples. In addition to such control, another aim of the report is to serve as&amp;nbsp;a wrap-up smear that can be linked in results from Search Engines, Artificial Intelligence chats, plus on Wikipedia to the twenty &quot;mis-influencers&quot; profiles. This is a contemporary tactic through which high-profile dissidents are targeted by the playbook of &#39;Big Food&#39;... who copied and built on the Tobacco industry’s original edition (&lt;a href=&quot;https://doi.org/https://doi.org/10.1111/j.1468-0009.2009.00555&quot; target=&quot;_blank&quot;&gt;Brownell et al., 2009&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div&gt;Don&#39;t believe the Meat vs EAT-LANCET report&#39;s hype, the EAT-Lancet Commission&#39;s 2025 report is just a bad GPP sequel. If the planetary health diet was a product of honest science, it would not fear critics pointing out the PHD&#39;s faulty reasoning. And it would not need to smear experts with made-up claims in a fake &quot;report&quot; for pre-bunking an inevitable &quot;backlash&quot; of well-deserved critique.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;If you have suggestions for improving this post, do comment below, or &lt;a href=&quot;https://www.travisnoakes.co.za/p/contact.html&quot; target=&quot;_blank&quot;&gt;contact me&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Online resources&lt;/h3&gt;&lt;div&gt;&lt;div&gt;Brownell, K. D., &amp;amp; Warner, K. E. (2009). The Perils of Ignoring History: Big Tobacco Played Dirty and Millions Died. How Similar Is Big Food? The Milbank Quarterly, 87(1), 259–294. &lt;a href=&quot;https://doi.org/https://doi.org/10.1111/j.1468-0009.2009.00555&quot; target=&quot;_blank&quot;&gt;doi.org/https://doi.org/10.1111/j.1468-0009.2009.00555&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Camus, R. (2022, August 10). [Journal entry on davocratie and global remplacisme].&amp;nbsp;&lt;a href=&quot;https://www.renaud-camus.net/journal&quot;&gt;renaud-camus.net/journal&lt;/a&gt;. Defined the term &#39;Davocracy&#39; in his French journal. Vauban Books is his English publisher,&amp;nbsp;&lt;a href=&quot;https://www.vaubanbooks.com&quot; target=&quot;_blank&quot;&gt;vaubanbooks.com&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.aleph2020.org/opinion/activist-tactics-and-the-discrediting-of-scientists-leroy-et-al-2023&quot; target=&quot;_blank&quot;&gt;aleph2020.org/opinion/activist-tactics-and-the-discrediting-of-scientists-leroy-et-al-2023&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;Professor Frédéric Leroy and colleagues wrote an opinion piece examining a coordinated effort by a small group of animal rights activists, backed by aligned media outlets (e.g., DeSmog, Sentient Media, The Guardian, Vox), to discredit established experts and organisations in the domain of livestock agriculture.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://lams.substack.com/p/a-diet-to-save-the-planet-brought&quot; target=&quot;_blank&quot;&gt;lams.substack.com/p/a-diet-to-save-the-planet-brought&lt;/a&gt;&amp;nbsp;Lars Magne Sunnanå’s Substack English post describes new industry backers of the EAT-Lancet 2.0 report, and their communication concerns after the backlash to the first version.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Nina Teicholz, PhD and Dr Gary Taubes&#39; Substack addresses industrial-strength corruption of nutrition science and guidelines, focused on the US, at&amp;nbsp;&lt;a href=&quot;https://unsettledscience.substack.com/archive?sort=new&quot; target=&quot;_blank&quot;&gt;unsettledscience.substack.com/archive?sort=new&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;Noakes, T. M., Bell, D., &amp;amp; Noakes, T. D. (2022). Who is watching the World Health Organisation? ‘Post-truth’ moments beyond infodemic research [COVID-19; divisions in knowledge labour; intergroup contradictions; international health organisation; mRNA vaccines; pandemic.]. Transdisciplinary Research Journal of Southern Africa, 18(1), 1–13.&amp;nbsp;&lt;a href=&quot;https://doi.org/10.4102/td.v18i1.1263 &quot; target=&quot;_blank&quot;&gt;doi.org/10.4102/td.v18i1.1263&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;a href=&quot;https://thenoakesfoundation.org/questioning-the-science-is-not-misinformation-its-the-essence-of-progress/&quot; target=&quot;_blank&quot;&gt;thenoakesfoundation.org/questioning-the-science-is-not-misinformation-its-the-essence-of-progress&lt;/a&gt;&amp;nbsp;is a short response from The Noakes Foundation to the Meat vs EAT-LANCET report.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-size: 14px; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variant: normal; font-variation-settings: normal; font-width: normal; line-height: normal; margin: 0px 0px 0px 36px; text-indent: -36px;&quot;&gt;Stanton, A. A. (2025, October 11, 2025). &lt;i&gt;Understanding The EAT-Lancet 2.0&lt;/i&gt;. cluelessdoctors.com. Retrieved&lt;/p&gt;&lt;p style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-size: 14px; font-style: normal; font-variant-alternates: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-ligatures: normal; font-variant-numeric: normal; font-variant-position: normal; font-variant: normal; font-variation-settings: normal; font-width: normal; line-height: normal; margin: 0px 0px 0px 36px; text-indent: -36px;&quot;&gt;10/14 from &lt;a href=&quot;https://cluelessdoctors.com/2025/10/11/understanding-the-eat-lancet-2-0/&quot;&gt;https://cluelessdoctors.com/2025/10/11/understanding-the-eat-lancet-2-0/&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Wolpe, P. R. (1994). The dynamics of heresy in a profession. Social science &amp;amp; medicine, 39(9), 1133–1148.&amp;nbsp;&lt;a href=&quot;https://doi.org/10.1016/0277-9536(94)90346-8&quot;&gt;https://doi.org/10.1016/0277-9536(94)90346-8&lt;/a&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.zoeharcombe.com/2019/01/the-eat-lancet-diet-is-nutritionally-deficient/&quot; target=&quot;_blank&quot;&gt;zoeharcombe.com/2019/01/the-eat-lancet-diet-is-nutritionally-deficient/&lt;/a&gt;&amp;nbsp;features a factual dissection of the nutritional deficiency of the EAT Lancet diet by Dr Zoe Harcombe. The Meat vs EAT-LANCET report makes no attempt to critique her blog, because its nutritional analysis that confirms dangerous deficiencies is correct.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Books&lt;/b&gt;&lt;/h3&gt;&lt;div&gt;Attkisson, S. (2017). The smear: How shady political operatives and fake news control what you see, what you think, and how you vote (1 ed.). HarperCollins.&amp;nbsp;&lt;a href=&quot;https://www.harpercollins.com/products/the-smear-sharyl-attkisson?variant=32216080056354&quot; target=&quot;_blank&quot;&gt;harpercollins.com/products/the-smear-sharyl-attkisson?variant=32216080056354&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Noakes, T., &amp;amp; Vlismas, M. (2012). Challenging beliefs : memoirs of a career (2 ed.). Zebra Press.&amp;nbsp;&lt;a href=&quot;https://www.penguinrandomhouse.co.za/book/challenging-beliefs/9781770224612&quot; target=&quot;_blank&quot;&gt;penguinrandomhouse.co.za/book/challenging-beliefs/9781770224612&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Noakes, T. (2012). Waterlogged: the serious problem of overhydration in endurance sports (1 ed.). Human Kinetics.&amp;nbsp;&lt;a href=&quot;https://www.human-kinetics.co.uk/9781492577843/waterlogged/&quot; target=&quot;_blank&quot;&gt;human-kinetics.co.uk/9781492577843/waterlogged/&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Noakes, T., &amp;amp; Sboros, M. (2017). Lore of Nutrition: Challenging conventional dietary beliefs (1 ed.). Penguin Random House South Africa.&amp;nbsp;&lt;a href=&quot;https://www.penguinrandomhouse.co.za/book/lore-nutrition-challenging-conventional-dietary-beliefs/9781776092611&quot; target=&quot;_blank&quot;&gt;penguinrandomhouse.co.za/book/lore-nutrition-challenging-conventional-dietary-beliefs/9781776092611&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Noakes, T., &amp;amp; Sboros, M. (2019). Real food on trial: How the diet dictators tried to destroy a top scientist (1 ed.). Columbus Publishing.&amp;nbsp;&lt;a href=&quot;http://www.realfoodontrial.com/&quot; target=&quot;_blank&quot;&gt;realfoodontrial.com&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Nordangård, J. (2024). Rockefeller: Controlling the Game.&amp;nbsp;&amp;nbsp;(1 ed.). Skyhorse Publishing.&amp;nbsp;&lt;a href=&quot;https://www.skyhorsepublishing.com/9781510780217/rockefeller/&quot; target=&quot;_blank&quot;&gt;skyhorsepublishing.com/9781510780217/rockefeller/&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Nordangård, J. (2024). The Global Coup D&#39;etat: The Fourth Industrial Revolution and the Great Reset.&amp;nbsp;&amp;nbsp;(1 ed.).&amp;nbsp;&amp;nbsp;Skyhorse Publishing.&amp;nbsp;&lt;a href=&quot;https://www.skyhorsepublishing.com/9781510782037/the-global-coup-detat/&quot; target=&quot;_blank&quot;&gt;skyhorsepublishing.com/9781510782037/the-global-coup-detat/&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Teicholz, N. (2014). The big fat surprise: why butter, meat and cheese belong in a healthy diet (1 ed.). Simon and Schuster.&amp;nbsp;&lt;a href=&quot;https://www.simonandschuster.com/books/The-Big-Fat-Surprise/Nina-Teicholz/9781451624434&quot;&gt;simonandschuster.com/books/The-Big-Fat-Surprise/Nina-Teicholz/9781451624434&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;West, A. A. (2023). The Grip of Culture - The social psychology of climate change catastrophism (1 ed.). The Global Warming Policy Foundation.&amp;nbsp;&lt;a href=&quot;https://thegwpf.org/content/uploads/2023/07/West-Catastrophe-Culture6by9-v28.pdf&quot; target=&quot;_blank&quot;&gt;thegwpf.org/content/uploads/2023/07/West-Catastrophe-Culture6by9-v28.pdf&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/8125367415748871094/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2025/10/the-meat-vs-eat-lancet-report-as.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/8125367415748871094'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/8125367415748871094'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2025/10/the-meat-vs-eat-lancet-report-as.html' title='The Meat vs EAT-LANCET report as a targeted smear - the example of misinformation on Emeritus Professor Tim Noakes'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.922087 18.4231418</georss:point><georss:box>-83.814478341575125 -122.2018582 15.970304341575122 159.0481418</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-6240414956419031765</id><published>2025-09-04T10:54:00.018+02:00</published><updated>2025-09-18T15:32:58.746+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="apple"/><category scheme="http://www.blogger.com/atom/ns#" term="DJ"/><category scheme="http://www.blogger.com/atom/ns#" term="drum&amp;bass"/><category scheme="http://www.blogger.com/atom/ns#" term="index"/><category scheme="http://www.blogger.com/atom/ns#" term="labels"/><category scheme="http://www.blogger.com/atom/ns#" term="music"/><category scheme="http://www.blogger.com/atom/ns#" term="playlist"/><category scheme="http://www.blogger.com/atom/ns#" term="tags"/><title type='text'>How to label DJ mixes in Apple Music and organise them into a playlist - an Atmospheric Drum &amp; Bass Revival exemplar</title><content type='html'>&lt;span style=&quot;color: #999999; font-size: x-small;&quot;&gt;Written for Apple Music users interested in better curating their favourite DJ mixes under one playlist.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://soundcloud.com/travis-noakes&quot;&gt;Bedroom&lt;/a&gt; DJ &lt;a href=&quot;https://www.mixcloud.com/travis-noakes/&quot;&gt;TraVice&lt;/a&gt; here- poorly tagged music files are a pet peeve of mine. I like &#39;em well-tagged for easy selection. Hopefully this post suggests the value of doing this with the example of a proper playlists creation from &lt;a href=&quot;https://soundcloud.com/atmosphericdrumandbass&quot; target=&quot;_blank&quot;&gt;Atmospheric Drum &amp;amp; Bass Revival&lt;/a&gt;&#39;s downloads: This Facebook community is dedicated to the &#39;past, present and future of the atmospheric genre’s sound&#39;, as championed by its pioneers &lt;a href=&quot;https://soundcloud.com/ltj-bukem&quot; target=&quot;_blank&quot;&gt;LTJ Bukem&lt;/a&gt; &amp;amp; &lt;a href=&quot;https://www.facebook.com/djfabiodnb/&quot; target=&quot;_blank&quot;&gt;DJ Fabio&lt;/a&gt; from the early 1990’s. Building on &lt;a href=&quot;https://www.facebook.com/share/g/16JMzzdxzA&quot;&gt;facebook.com/share/g/16JMzzdxzA&lt;/a&gt;, this group’s leadership launched a mix series to showcase its community’s  DJ mixing talent in 2023. At the time of writing, 20 mixes are available to stream off  Soundcloud at&amp;nbsp;&lt;a href=&quot;https://soundcloud.com/atmosphericdrumandbass&quot;&gt;soundcloud.com/atmosphericdrumandbass&lt;/a&gt;, with 13 offered for free downloaded (see example in Figure 1).&lt;div&gt;&lt;p class=&quot;p1&quot; style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-size: 13px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEj3MR8lE-50V4DalAPzI96xz_e2ggKvuiaeSoI94TRXv9Yy28UJTSWdqNhwwzbm4hMyX6HxywzuRrb3iUSEnLrc49z2k7S_Kp_WpgLdKYEHYqfN-vKWw9j8lM6kuLX4omVrniRVn1a2EDb_Mpl9IQnJXd8d_UMVSY40x4iNteNbOQvnepYxTKZzYSVa2_pu&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 1. Atmospheric Drum &amp;amp; Bass Revival soundcloud download selection.png&quot; data-original-height=&quot;1534&quot; data-original-width=&quot;1282&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEj3MR8lE-50V4DalAPzI96xz_e2ggKvuiaeSoI94TRXv9Yy28UJTSWdqNhwwzbm4hMyX6HxywzuRrb3iUSEnLrc49z2k7S_Kp_WpgLdKYEHYqfN-vKWw9j8lM6kuLX4omVrniRVn1a2EDb_Mpl9IQnJXd8d_UMVSY40x4iNteNbOQvnepYxTKZzYSVa2_pu=w335-h400&quot; title=&quot;Figure 1. Atmospheric Drum &amp;amp; Bass Revival soundcloud download selection.png&quot; width=&quot;335&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 1. Atmospheric Drum &amp;amp; Bass Revival soundcloud download selection&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;In Apple Music a new playlist is simply created by pressing Apple and N at the same time. After downloading the mixes, they can be placed in a playlist by dragging them there from Songs, or simply right clicking on the mix and selecting &amp;lt;Add to playlist&amp;gt;, then choosing ’ Atmospheric Drum &amp;amp; Bass Revival’.&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgudOU1dyEkFDic3x5AHumRk7-CPpgB5dWP6h-jfJTXWhvXZSdyWRvchVo32Z5xRsYXM3spxN1NNTYsYgPnbCGyuesHAtonwzje5AzvZr8KAh3w_UScu1oHbJjhCPv6yjCXOpbueMFwfOnT0m62H16AmTdwCQOA4FjnrDiI9fiTo0mJ34Xrabr3UffxawFZ&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 2. Atmospheric Drum &amp;amp; Bass Revival mixes playlist in Apple Music&quot; data-original-height=&quot;1765&quot; data-original-width=&quot;2304&quot; height=&quot;306&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgudOU1dyEkFDic3x5AHumRk7-CPpgB5dWP6h-jfJTXWhvXZSdyWRvchVo32Z5xRsYXM3spxN1NNTYsYgPnbCGyuesHAtonwzje5AzvZr8KAh3w_UScu1oHbJjhCPv6yjCXOpbueMFwfOnT0m62H16AmTdwCQOA4FjnrDiI9fiTo0mJ34Xrabr3UffxawFZ=w400-h306&quot; title=&quot;Figure 2. Atmospheric Drum &amp;amp; Bass Revival mixes playlist in Apple Music&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 2. Atmospheric Drum &amp;amp; Bass Revival mixes playlist in Apple Music&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;&lt;/p&gt;While playlists can be ordered any number of ways for viewing via &amp;lt;Viewing Options&amp;gt;, I like to use the filenames to clearly indicate the order of release (01 - 13). They must also clearly indicate the series they are from through a consistently applied title (yes, the exact same one for readily displaying the entire series in searches!).&lt;br /&gt;&lt;br /&gt;With all 13 mixes in the playlist (see Figure 2), it’s now time to improve the labelling of each mix. To improve on Figure 3’s example below, I must enter labels into &lt;a href=&quot;https://soundcloud.com/atmosphericdrumandbass/episode-1-illesta?si=24b0bd3665ab4ab1bc1ffcd43d0da581&amp;amp;utm_source=clipboard&amp;amp;utm_medium=text&amp;amp;utm_campaign=social_sharing&quot;&gt;DJ Illesta’s mix&lt;/a&gt;’s fields.&lt;p class=&quot;p1&quot; style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-size: 13px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjZwI1kCC8hAwugQyGMI6b12Yz3iPcu7QbhnZ1uJiBLi9rH70CwRCEDu8nFpPPVz-_NMYf2ctBGLapwXwbcnaXabHQCHd7mYXAh-45bXZHOAKHWvT6irj_STFErbKdD49z7_usJq1OsgiYZXLA8xPaqDLqizxQotbxANFzsbm_nSaoGj6ZcTS3QzSldpMzl&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 3. DJ Illesta Atmospheric Drum &amp;amp; Bass Revival 1 Apple Music info start.png&quot; data-original-height=&quot;1604&quot; data-original-width=&quot;1210&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjZwI1kCC8hAwugQyGMI6b12Yz3iPcu7QbhnZ1uJiBLi9rH70CwRCEDu8nFpPPVz-_NMYf2ctBGLapwXwbcnaXabHQCHd7mYXAh-45bXZHOAKHWvT6irj_STFErbKdD49z7_usJq1OsgiYZXLA8xPaqDLqizxQotbxANFzsbm_nSaoGj6ZcTS3QzSldpMzl=w302-h400&quot; title=&quot;Figure 3. DJ Illesta Atmospheric Drum &amp;amp; Bass Revival 1 Apple Music info start.png&quot; width=&quot;302&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 3. DJ Illesta Atmospheric Drum &amp;amp; Bass Revival 1 Apple Music info&#39;s starting point&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;There&#39;s much that can be added- artist, album, album artist composer, year, rating, bpm and comments. The extent of which depends on your interest(s). Likewise some labelling choices will be fairly subjective. Take genre for example, I use “drum and bass”, because most of this genre in my library defaults to the softer atmospheric style. However, aficionados of the hard jungle style may choose that to be their default. They may also prefer using DnB or drum &amp;amp; bass, while I use “drum and bass - hardstep” for grittier tracks/mixes.&lt;br /&gt;&lt;br /&gt;It’s also important to appreciate that Apple Music’s labelling/tagging system is not designed around labelling DJ mix-sets. This is a meta-problem, since DJs are musicians whose medium is often a blend of other musical artists’ production and sounds. Apple Music’s labelling is understandably geared to the latter’s conventional works. It would struggle to cope with the &quot;meta-mentalness&quot; of a DJ doing a continuous remix of another DJs productions and remixes- for example, try labelling the producer DJ Lenzman’s 2020 mix of DJ Redeyes&#39; tracks!&lt;br /&gt;&lt;br /&gt;With an academic hat on, this challenge suggests the multimodal difficulty of labelling DJ’s music work via Apple Music (and iTunes)&#39;s textual labels. Its indexing system caters to original musicians/composers, versus producers, remixers and DJs. For example, there is no dedicated option for adding a DJs setlist. Instead one can appropriate &amp;lt;Comments&amp;gt; (for very short set-lists) or &amp;lt;Custom Lyrics&amp;gt; (for more typical ones, eg. over thirty minutes). Since Atmospheric Drum &amp;amp; Bass Revival provides setlists for each mix, these are easy enough to copy-and-paste as “Custom Lyrics”- see Figure 4.&lt;br /&gt;&lt;p class=&quot;p1&quot; style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhqHFZV8T8eYSe28vwZYNL1wVxZWu9H3KTsmF4xJ44AVCXsF63cFqkQzES_A2KdcoCtmjQvNjIjC31PNMS83DS2zjdWrqyi_ayC0P1Y3ZTqApXzTOkpf8R4vKX2Jv_jJ1blpUfbFK-kL4KjbQK1O0eEvR6XeT1M06HMHSWDsP_n1KhPsha5ZA0uFT6SG6wi&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 4.  DJ Illesta Atmospheric Drum &amp;amp; Bass Apple Music track listing in lyrics&quot; data-original-height=&quot;1120&quot; data-original-width=&quot;1204&quot; height=&quot;372&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhqHFZV8T8eYSe28vwZYNL1wVxZWu9H3KTsmF4xJ44AVCXsF63cFqkQzES_A2KdcoCtmjQvNjIjC31PNMS83DS2zjdWrqyi_ayC0P1Y3ZTqApXzTOkpf8R4vKX2Jv_jJ1blpUfbFK-kL4KjbQK1O0eEvR6XeT1M06HMHSWDsP_n1KhPsha5ZA0uFT6SG6wi=w400-h372&quot; title=&quot;Figure 4.  DJ Illesta Atmospheric Drum &amp;amp; Bass Apple Music track listing in lyrics&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 4.&amp;nbsp; DJ Illesta Atmospheric Drum &amp;amp; Bass Apple Music track listing in lyrics&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;Since there is no &amp;lt;DJ&amp;gt; identifier, I often add DJ before an artist&#39;s name. This makes it easier to select from DJs under the Artists view, depending on one’s mood… Also for a mix of one artist’s work by another DJ (such as Sasha’s “&lt;a href=&quot;https://www.youtube.com/watch?v=_MhSL4QSUMg&quot;&gt;Voyage of Ima&lt;/a&gt;” remix of producer BT’s album), it seems apt to use  “Composer” to reflect the DJ’s role. {That said, for popular/mainstream DJs, I do lose the DJ to ensure Apple Music manages them by their artist name}.&lt;br /&gt;&lt;br /&gt;Figure 5 shows what the completed details page looks like- much better than Figure 2&#39;s starting point!&lt;p class=&quot;p1&quot; style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-size: 13px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhM6-YI0UzaR95QDfYTRNfxQas7P7rX1CwSOsiTYIgJLaeOIwnjfa4OqXCox3gTYdVTQhMCJaQIw0fqtc2dHzN5snrOwEPVhSEMrc5b2fU6aVoiKDkS9Xt4ixa7hj2x4F7oN4aMdoVixOiB_TNWnWlYtaUsA0zL1KtREkJyHI-uI25ydINnCOL-_q53kqWD&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 5. DJ Illesta Atmospheric Drum &amp;amp; Bass Revival 1 Apple Music info complete + cover.png&quot; data-original-height=&quot;1306&quot; data-original-width=&quot;1208&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhM6-YI0UzaR95QDfYTRNfxQas7P7rX1CwSOsiTYIgJLaeOIwnjfa4OqXCox3gTYdVTQhMCJaQIw0fqtc2dHzN5snrOwEPVhSEMrc5b2fU6aVoiKDkS9Xt4ixa7hj2x4F7oN4aMdoVixOiB_TNWnWlYtaUsA0zL1KtREkJyHI-uI25ydINnCOL-_q53kqWD=w370-h400&quot; title=&quot;Figure 5. DJ Illesta Atmospheric Drum &amp;amp; Bass Revival 1 Apple Music info complete + cover.png&quot; width=&quot;370&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 5. DJ Illesta Atmospheric Drum &amp;amp; Bass Revival 1 Apple Music info complete + cover&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Working to update the labels of many files is a schlep, so speed things up by creating a cut-and-paste file. This also helps ensure consistency across labelling.  &lt;br /&gt;&lt;br /&gt;My txt file simply contained the:&lt;br /&gt;&lt;b&gt;Album title format&lt;/b&gt;&lt;br /&gt;0# Atmospheric Drum &amp;amp; Bass Revival Mix Series - DJ&lt;br /&gt;&lt;b&gt;Album&lt;/b&gt;&lt;br /&gt;0# Atmospheric Drum &amp;amp; Bass Revival Mix Series&lt;br /&gt;&lt;b&gt;Grouping&lt;/b&gt;&lt;br /&gt;Atmospheric Drum &amp;amp; Bass Revival Mix Series&lt;br /&gt;&lt;b&gt;Date&lt;/b&gt;&lt;/div&gt;&lt;div&gt;2022&amp;nbsp;2023 2024 2025&lt;br /&gt;&lt;b&gt;Track&lt;/b&gt;&lt;br /&gt;1&lt;/div&gt;&lt;div&gt;&lt;b&gt;Disc number&lt;/b&gt;&lt;/div&gt;&lt;div&gt;13&lt;/div&gt;&lt;div&gt;&lt;br /&gt;In each song, I set the track number to be 1 of 1 to reflect an entire DJ&#39;s mix. In contrast, the disc number follows the Atmospheric Drum &amp;amp; Bass Revival mix series&#39; order, e.g. disc number of 1 to start my curation of 13. This seems apt in being similar to the sequential serialisation of podcasts.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;b&gt;N.B. &lt;/b&gt;As you work to add information to each &quot;song&quot; please note that these  updates do not automatically reflect in your Apple Music playlist’s display. So, click to another list, then return to yours for updating its view.&amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;br /&gt;And here’s Figure 6&#39;s end result- an Atmospheric Drum &amp;amp; Bass Revival playlist with all mixes extensively labelled, plus all album covers added.&lt;div&gt;&lt;br /&gt;&lt;p class=&quot;p2&quot; style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px; min-height: 15px;&quot;&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjK8i6fSaZX86W1Q5qymTFIEO5bFPhEqwVmbSb2brSoGsSlTg40Xgfpog_PURC9OjKQGMQrK_qiXp74CZwh3L28o8WEheDfDDVs-ypaiCnRszRR0Yre68YXiIHBdoUle92J1MVL1FthLYz1eRoe3nOsRjgjbdjmQBJmq9T0fFTY8NvXCuo2qSCcEdHQ2fCM&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 6. Atmospheric Drum &amp;amp; Bass Revival Mix Series playlist with full information&quot; data-original-height=&quot;1944&quot; data-original-width=&quot;1918&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjK8i6fSaZX86W1Q5qymTFIEO5bFPhEqwVmbSb2brSoGsSlTg40Xgfpog_PURC9OjKQGMQrK_qiXp74CZwh3L28o8WEheDfDDVs-ypaiCnRszRR0Yre68YXiIHBdoUle92J1MVL1FthLYz1eRoe3nOsRjgjbdjmQBJmq9T0fFTY8NvXCuo2qSCcEdHQ2fCM=w395-h400&quot; title=&quot;Figure 6. Atmospheric Drum &amp;amp; Bass Revival Mix Series playlist with full information&quot; width=&quot;395&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 6. Atmospheric Drum &amp;amp; Bass Revival Mix Series playlist with full information&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div&gt;Nice one, selecta DJ TraVice! Your drum-n-bass playlist is now optimally prepared to rinse out...&lt;br /&gt;&lt;br /&gt;Fellow trainspotters welcome to rant-&amp;amp;-RAVE in the moderated comments below 👇&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/6240414956419031765/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2025/09/how-to-label-dj-mixes-in-apple-music.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/6240414956419031765'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/6240414956419031765'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2025/09/how-to-label-dj-mixes-in-apple-music.html' title='How to label DJ mixes in Apple Music and organise them into a playlist - an Atmospheric Drum &amp; Bass Revival exemplar'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEj3MR8lE-50V4DalAPzI96xz_e2ggKvuiaeSoI94TRXv9Yy28UJTSWdqNhwwzbm4hMyX6HxywzuRrb3iUSEnLrc49z2k7S_Kp_WpgLdKYEHYqfN-vKWw9j8lM6kuLX4omVrniRVn1a2EDb_Mpl9IQnJXd8d_UMVSY40x4iNteNbOQvnepYxTKZzYSVa2_pu=s72-w335-h400-c" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.922087 18.4231418</georss:point><georss:box>-62.232320836178843 -16.7331082 -5.6118531638211522 53.579391799999996</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-8526864852755065350</id><published>2025-06-12T16:59:00.018+02:00</published><updated>2025-07-04T17:38:45.674+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="arts"/><category scheme="http://www.blogger.com/atom/ns#" term="createwithpixels"/><category scheme="http://www.blogger.com/atom/ns#" term="design"/><category scheme="http://www.blogger.com/atom/ns#" term="digital"/><category scheme="http://www.blogger.com/atom/ns#" term="software"/><category scheme="http://www.blogger.com/atom/ns#" term="visual"/><category scheme="http://www.blogger.com/atom/ns#" term="web2.0"/><title type='text'>From Sand Based (1997) to the createwithpixels app (2025)</title><content type='html'>&lt;meta content=&quot;BF2A56483342F97F8DF452EC7F36B969&quot; name=&quot;msvalidate.01&quot;&gt;&lt;/meta&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;Written for those interested in the createwithpixels app&#39;s development history.&lt;/span&gt;&lt;div&gt;&lt;br /&gt;&lt;a href=&quot;https://www.createwith.net/&quot;&gt;Create With&lt;/a&gt; has recently released its createwithpixels app on &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.createwithpixels.createwith&amp;amp;hl=en&amp;amp;gl=US&quot;&gt;Google Play&lt;/a&gt;&amp;nbsp;and the &lt;a href=&quot;https://apps.apple.com/za/app/create-with/id6473702233&quot; target=&quot;_blank&quot;&gt;Apple Store&lt;/a&gt;. This amateur bitmap editor is for  novices wanting do low-resolution raster designs on their mobile phones, or tablets. Easy to learn, the app offers a resizable pencil, plus web-friendly colour palette. Images can be exported locally, or shared via a&amp;nbsp;&lt;a href=&quot;http://createwithpixels.com&quot;&gt;createwithpixels.com&lt;/a&gt;&amp;nbsp;library. Here&#39;s a short, visual story on key developments towards the app:&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;1997 &quot;Sand Based&quot;exhibit&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Fellow Middlesex MA in Digital Art graduate, &lt;a href=&quot;https://www.linkedin.com/in/stephendwolff/?originalSubdomain=uk&quot; target=&quot;_blank&quot;&gt;Stephen Wolff&lt;/a&gt;, and Travis worked on a concept inspired by his &#39;Sand Based&#39; exhibit. Figure 1&#39;s&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;screenshot showed how a sprite created interesting aesthetic trails. They originally wanted to design software that would give its end-user more control over the serendipitous effects of algorithmic rendering...&lt;/span&gt;&lt;/div&gt;&lt;div&gt;
&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG0SSaYqg1hLbBSG5ADQL7oG_k2CEWXJFLc8rrQtuG1gxUdfWfYatzek4aYAzlWtewhIhIlgfWmoKc9LeId3ICaW6li3OHuyuISfyZOtkWl31l2zxMuOMO2ds7l_XDwA_JMtwOUXKa64HUhZYzgvIP8DKzi_jKiMN196YYG0WQ_GDStVrKKXspGzu5YOZr/s1693/Sand%20Based%20installation%201997%20graphic%2013.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG0SSaYqg1hLbBSG5ADQL7oG_k2CEWXJFLc8rrQtuG1gxUdfWfYatzek4aYAzlWtewhIhIlgfWmoKc9LeId3ICaW6li3OHuyuISfyZOtkWl31l2zxMuOMO2ds7l_XDwA_JMtwOUXKa64HUhZYzgvIP8DKzi_jKiMN196YYG0WQ_GDStVrKKXspGzu5YOZr/w400-h321/Sand%20Based%20installation%201997%20graphic%2013.jpg&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;Figure 1. Almonds and pomegranates (cycle 3), Sand based exhibit (1997)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;h4&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Figure 2&#39;s from Travis&#39;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;exhibit as part of the&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;MA Digital Arts 1996-97 group&#39;s year-end show.&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Middlesex University&#39;s&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Centre for Electronic Arts&#39;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;exhibited&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;at &lt;a href=&quot;https://oxotowerrestaurant.com/&quot; target=&quot;_blank&quot;&gt;OXO towers&lt;/a&gt;, London&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;).&lt;/span&gt;&lt;/h4&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixqMH5sgsFPXHUrC8rsrz8_xtKyD-_ClCss89C0qBBW8-hyj8qWC6fSx51fjEY_802H-HXFu4pvl3LOoWqNKGaqbG_trCr_uXhyphenhyphensitsIgYC9xA0N-1CS7XNs0IVBTT7HDDpLeM9luj8h5Vzqa4qcz8cQOBPToqIw0sWNjqVhl0aRA-sBlws-_JGsUDqJr1/s1389/Sand%20Based%20installation%201997.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixqMH5sgsFPXHUrC8rsrz8_xtKyD-_ClCss89C0qBBW8-hyj8qWC6fSx51fjEY_802H-HXFu4pvl3LOoWqNKGaqbG_trCr_uXhyphenhyphensitsIgYC9xA0N-1CS7XNs0IVBTT7HDDpLeM9luj8h5Vzqa4qcz8cQOBPToqIw0sWNjqVhl0aRA-sBlws-_JGsUDqJr1/w400-h301/Sand%20Based%20installation%201997.jpg&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;Figure 2. Sand Based installation by Travis Noakes for his Middlesex University MA in Digital Art year-end&#39;s exhibit (1997).&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div&gt;
&lt;div style=&quot;color: red;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEim6jJbydtZtkeDu3gMfG2_HqiendefCimVk8B6asvMpMVoSn5Mf_7lT7yerINEli-1kfFkSI11-7trgZT9uQcaqkW5hEDfRPxYQeIG1P1cqwnbUrrwsqVUW2ThGMlBdDw1XUYMZjBHtJKjtlXepTYMdjAhiY1GOO46fWycUX4x75caHnOiiMB65hFuI_iM&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Jython test bitmap graphic capture (2001)&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;1024&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEim6jJbydtZtkeDu3gMfG2_HqiendefCimVk8B6asvMpMVoSn5Mf_7lT7yerINEli-1kfFkSI11-7trgZT9uQcaqkW5hEDfRPxYQeIG1P1cqwnbUrrwsqVUW2ThGMlBdDw1XUYMZjBHtJKjtlXepTYMdjAhiY1GOO46fWycUX4x75caHnOiiMB65hFuI_iM=w200-h200&quot; title=&quot;Jython test bitmap graphic capture (2001)&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;Figures 3 &amp;amp; 4. Jython test bitmap graphic captures (2001)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjP-hhO5X8GL7-qjE0z3DrdqeYDeXryBL55gGeC-mfkQ9egyQJ4MKlUkaXiKOX8W4rxYSi26VH7dafDq49k3xbFQ_jO4QoG1LTwUsuzpCWhtW_UgwEmbV7Dl_K52nwidZeWIrD-jIFVZ_pACNckppW85RfcGI1c_vDQsMIdICksfXNaG2I7Ml15sWtyZCrM&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Jython test bitmap graphic capture 2 (2001)&quot; data-original-height=&quot;1024&quot; data-original-width=&quot;1024&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjP-hhO5X8GL7-qjE0z3DrdqeYDeXryBL55gGeC-mfkQ9egyQJ4MKlUkaXiKOX8W4rxYSi26VH7dafDq49k3xbFQ_jO4QoG1LTwUsuzpCWhtW_UgwEmbV7Dl_K52nwidZeWIrD-jIFVZ_pACNckppW85RfcGI1c_vDQsMIdICksfXNaG2I7Ml15sWtyZCrM=w200-h200&quot; title=&quot;Jython test bitmap graphic capture 2 (2001)&quot; width=&quot;200&quot; /&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;h4&gt;&lt;b&gt;&lt;a href=&quot;https://www.linkedin.com/in/michael-cope-082053268/?originalSubdomain=za&quot; style=&quot;font-weight: 400;&quot;&gt;Michael Cope&lt;/a&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;wrote Jython scripts for Travis to achieve a similar effect in a&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;PC&#39;s&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;browser (see Figures 3 &amp;amp; 4).&lt;/span&gt;&lt;/b&gt;&lt;/h4&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;2003 Pixel Player&lt;br /&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;In doing a student project for the CTI Education Internet Development Specialist Diploma, Travis developed a mock website&#39;s graphic user interface (GUI) for a bitmap animator.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiZclYsTSc1gfdmXnkuPQzbkMTL6NQE1LifAgmWu8xiIFV_VwbOHUnr9AZt0jqW5Z08NYBA2Yvbfa4NcyvyiFL1O6hNVkn6u7H6JK1DEUd7YRXD-cwRbdJDZHXRP4yGkYwdd1o3jARVahK8OEy8nJEUedLgNakmJshgqYhG87ycbzHd6OgySRThMsnR3ejw&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Pixel Player graphic user interface concept page 5&quot; data-original-height=&quot;819&quot; data-original-width=&quot;1024&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiZclYsTSc1gfdmXnkuPQzbkMTL6NQE1LifAgmWu8xiIFV_VwbOHUnr9AZt0jqW5Z08NYBA2Yvbfa4NcyvyiFL1O6hNVkn6u7H6JK1DEUd7YRXD-cwRbdJDZHXRP4yGkYwdd1o3jARVahK8OEy8nJEUedLgNakmJshgqYhG87ycbzHd6OgySRThMsnR3ejw=w400-h320&quot; title=&quot;Pixel Player graphic user interface concept page 5&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Figure 5. Pixel Player graphic user interface concept page 5 (2004)&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div&gt;He first named it Pixel Player, then Easy Pixels (see Figure 5). Workwise, Stephen and Travis were busy for Loopo/Max Gate Digital and Winning Wellness/BODYiQ/Virgin Life Care, respectively. Nonetheless, work on the bitmap animator continued as fun &#39;digital art for bitmaps sake&#39; diversion. In 2008, Travis setup Crafty Pixels CC (T/A &lt;a href=&quot;https://www.createwith.net/&quot;&gt;Create With&lt;/a&gt;) as a vehicle for pursuing his auteur-ish visual design projects.&lt;br /&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;2008-9 Crafty Pixels GUI concept&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;div&gt;&lt;b style=&quot;color: #666666;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEj-SttWsBclrV3-4DRLOCbGlaicwHIpstO9oTpzQc_ptvVOafDHohaW0Z5iTvangUClBOPF20UIlHJLpnY5mvTp1kxzEo_yxvK8XaBxsVYDsxEEsOnU2ypCaZz9ZsZ1FkSrL8FY_rDDEadIfa9-MqMIFNASjCrQGxwE0pths9AWBZ9CfrCmt49fYO-c8G-z&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Crafty Pixels website mockup (2009)&quot; data-original-height=&quot;733&quot; data-original-width=&quot;1048&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEj-SttWsBclrV3-4DRLOCbGlaicwHIpstO9oTpzQc_ptvVOafDHohaW0Z5iTvangUClBOPF20UIlHJLpnY5mvTp1kxzEo_yxvK8XaBxsVYDsxEEsOnU2ypCaZz9ZsZ1FkSrL8FY_rDDEadIfa9-MqMIFNASjCrQGxwE0pths9AWBZ9CfrCmt49fYO-c8G-z=w320-h224&quot; title=&quot;Crafty Pixels website mockup (2009)&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Figure 6. craftypixels.com mockup (2009)&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;color: #666666; margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhNJFq9cox_ojj-q_HgSZfxSdOemL9aNaSLQKb94IRat39nE7CfP5zJBu9KJOfekPWV1dY7LcEhs6SVSPWILUYDjIIUFB8jVW-JYfJK_x3-lrOqJ1bMpVyZn2CMccEE5nIIlDNMhxks0NQYaUJsx-f3W-j4IfKPNVhbUYVsHyXrPFfa8yQE_QT3V7fgEQuT&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Crafty Pixels desktop application GUI mockup (2009)&quot; data-original-height=&quot;748&quot; data-original-width=&quot;1051&quot; height=&quot;228&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhNJFq9cox_ojj-q_HgSZfxSdOemL9aNaSLQKb94IRat39nE7CfP5zJBu9KJOfekPWV1dY7LcEhs6SVSPWILUYDjIIUFB8jVW-JYfJK_x3-lrOqJ1bMpVyZn2CMccEE5nIIlDNMhxks0NQYaUJsx-f3W-j4IfKPNVhbUYVsHyXrPFfa8yQE_QT3V7fgEQuT=w320-h228&quot; title=&quot;Crafty Pixels desktop application GUI mockup (2009)&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Figure 7. Crafty Pixels desktop application GUI mockup (2009)&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div&gt;One of which was to mock-up a Crafty Pixels website (Figure 6) and desktop application (7)- this fancy screensaver&#39;s pre-sets could be adjusted in real time. Stephen Wolff developed a private prototype for Travis and he to experiment with.&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgYdxQRHBJyiQOAoEmgC2VrFoV6gfeGR0fjdXKWfpHacbY5MaKyirmt-g4n68rMdz5NG9gJO8yl7KIlR_Pgs1YwQMhU25IsAl9YyuszCElWTILHgXHwS9hK8vFkRsVKTStiHjnl3DVF_UwKChIRI9cGCMZQIHgdm2_DRdMtjYcbNbzzNBoestVyulJb5jRh&quot; style=&quot;font-weight: 400; margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;img alt=&quot;Pixel Player bitmap output (2008)&quot; data-original-height=&quot;398&quot; data-original-width=&quot;598&quot; height=&quot;133&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgYdxQRHBJyiQOAoEmgC2VrFoV6gfeGR0fjdXKWfpHacbY5MaKyirmt-g4n68rMdz5NG9gJO8yl7KIlR_Pgs1YwQMhU25IsAl9YyuszCElWTILHgXHwS9hK8vFkRsVKTStiHjnl3DVF_UwKChIRI9cGCMZQIHgdm2_DRdMtjYcbNbzzNBoestVyulJb5jRh=w200-h133&quot; title=&quot;Pixel Player bitmap output (2008)&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;Figures 8 &amp;amp; 9. Pixel Player bitmap outputs (2008)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhTqUawfjuwjyDw1xK-YSSAF8sOFdUTt0_Ya0RzOcxjy7_nOaUB6hhJE4FNz72yfoU_55hY6Rttko1RJaqUr38fX7Mr0UBBYun3kSqKqWb0GctsmH4sOSW6W-2hqXHVKBNT7j79KfRxXUhrkFTvrqJfTuCy6au1yddm4ikd_sYeFjGo3TPqIy59VtErysw4&quot; style=&quot;font-weight: 400; margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img data-original-height=&quot;685&quot; data-original-width=&quot;1024&quot; height=&quot;134&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhTqUawfjuwjyDw1xK-YSSAF8sOFdUTt0_Ya0RzOcxjy7_nOaUB6hhJE4FNz72yfoU_55hY6Rttko1RJaqUr38fX7Mr0UBBYun3kSqKqWb0GctsmH4sOSW6W-2hqXHVKBNT7j79KfRxXUhrkFTvrqJfTuCy6au1yddm4ikd_sYeFjGo3TPqIy59VtErysw4=w200-h134&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;The prototype was promising in supporting some pleasing aesthetic outputs (yebo, yes, Figures 8 &amp;amp; 9!)&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;2010 createwithpixels.com - private Alpha for desktop&lt;/h3&gt;Travis wrote a PhD in Media Studies proposal to study the use of &lt;a href=&quot;https://creatwithpixels.com&quot;&gt;creatwithpixels.com&lt;/a&gt; and other bitmap drawing software in High Schools. However, his preliminary research at an elite one suggested that focusing on free online portfolio software would be more worthwhile for the Visual Arts. In response, he pivoted to developing a &lt;a href=&quot;https://www.travisnoakes.co.za/p/online-portfolio-lessons.html&quot;&gt;visual arts e-portfolio syllabus&lt;/a&gt; (2011-13) at a private school with its HOD, and a repurposed one for a government school... &lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;2012 createwithpixels.com - public Alpha&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span&gt;&lt;div&gt;Max Gate Digital released a public website at&amp;nbsp;&lt;a href=&quot;https://createwithpixels.com&quot;&gt;createwithpixels.com&lt;/a&gt;, and a test hosting site at&amp;nbsp;&lt;a href=&quot;https://beta.createwithpixels.com&quot;&gt;beta.createwithpixels.com&lt;/a&gt;. Travis&#39; lead supervisor,&amp;nbsp;&lt;a href=&quot;https://humanities.uct.ac.za/cfms/cfms/contacts/marion-walton&quot; target=&quot;_blank&quot;&gt;Dr Marion Walton&lt;/a&gt;&amp;nbsp;kindly permitted him to reference Processing bitmap code she wrote for a coding outreach project at an&amp;nbsp;&lt;a href=&quot;http://ikamvayouth.org/&quot; target=&quot;_blank&quot;&gt;iKamva Youth&lt;/a&gt;&amp;nbsp;branch.&amp;nbsp;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4MXs2RDY8qFcqwCD7NmKnqEDgeLsBwC1wNH9tNEgGV2RN7whIDjPuUN7_anFxUfSRi4FDhDsAGi3opeYvdiV3p0UQBIQU5AB64O4RGNiQHSwQn8jO-MNWfJ4ifOirPSHamLfQ1gDVnTo6/s1600/createwithpixels+Private+Alpha+version+May+2012.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 10. Create With Pixels homepage (2012)&quot; border=&quot;0&quot; height=&quot;287&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4MXs2RDY8qFcqwCD7NmKnqEDgeLsBwC1wNH9tNEgGV2RN7whIDjPuUN7_anFxUfSRi4FDhDsAGi3opeYvdiV3p0UQBIQU5AB64O4RGNiQHSwQn8jO-MNWfJ4ifOirPSHamLfQ1gDVnTo6/w400-h287/createwithpixels+Private+Alpha+version+May+2012.png&quot; title=&quot;Figure 10. Create With Pixels homepage (2012)&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;color: #666666;&quot;&gt;&lt;td class=&quot;tr-caption&quot;&gt;Figure 10. Create With Pixels homepage (2012)&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div&gt;&lt;b style=&quot;color: #666666;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR82J0lN5B9dr3lrdPVDFN9YQLcoBNaC0d5JNuObWNmQxP0vzkAvblSBILBNKiZ2IhnuQmmK2TnDmw-jSeCRf0gjOrQdP5smMBv6Qy4MWjcYZpLakaq5wCiQlLSd8eAKK9WoPwvEQd9LPhN23V273VS3FeGsrO9WRZZfTUM1AXa67CextCoG0TzWsYWUnC/s640/2014%201%20createwithpixels.com%20configure%20wizard%20GUI.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 11. createwithpixels.com configure wizard GUI (2014)&quot; border=&quot;0&quot; data-original-height=&quot;456&quot; data-original-width=&quot;640&quot; height=&quot;228&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR82J0lN5B9dr3lrdPVDFN9YQLcoBNaC0d5JNuObWNmQxP0vzkAvblSBILBNKiZ2IhnuQmmK2TnDmw-jSeCRf0gjOrQdP5smMBv6Qy4MWjcYZpLakaq5wCiQlLSd8eAKK9WoPwvEQd9LPhN23V273VS3FeGsrO9WRZZfTUM1AXa67CextCoG0TzWsYWUnC/w320-h228/2014%201%20createwithpixels.com%20configure%20wizard%20GUI.png&quot; title=&quot;Figure 11. createwithpixels.com configure wizard GUI (2014)&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Figure 11. createwithpixels.com configure wizard GUI (2014)&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Gn35XzFc8g7nkikFvZhuxVxkK5JiVLKxPLrobs3_gWX1zWjpW36m2QqiNkFQYGcHQh9NzvbpTcMdRFjN7-hKIAgWAbpEA0rkkSiNPZyz4qyVnJ7ciw_dnzNrphaikhmtLQeymKhUVKOgp0tXx4bDmMHXoqu61j9-WLHq18lHBWbuJilUXxVezw9bdS5O/s640/2014%203%20createwithpixels.com%20elements%20wizard.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 12. createwithpixels.com elements wizard GUI (2014)&quot; border=&quot;0&quot; data-original-height=&quot;436&quot; data-original-width=&quot;640&quot; height=&quot;218&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Gn35XzFc8g7nkikFvZhuxVxkK5JiVLKxPLrobs3_gWX1zWjpW36m2QqiNkFQYGcHQh9NzvbpTcMdRFjN7-hKIAgWAbpEA0rkkSiNPZyz4qyVnJ7ciw_dnzNrphaikhmtLQeymKhUVKOgp0tXx4bDmMHXoqu61j9-WLHq18lHBWbuJilUXxVezw9bdS5O/w320-h218/2014%203%20createwithpixels.com%20elements%20wizard.png&quot; title=&quot;Figure 12. createwithpixels.com elements wizard GUI (2014)&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;Figure 12.&amp;nbsp;&lt;/span&gt;createwithpixels.com elements wizard GUI (2014)&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;2016-18 Beta GUI for a mobile createwithpixels app&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlogNLZRLfCHkDbLGUro0oCMPfxBGuWYcSFiKfO_GFEoirmOk8EqPh7MybGfmrFqjEZWEuSgrk9JxmnBjjLnrdSKGv6hLl42HsY2kFDzQn7qNmvbTX3oa-mGYMnY07bretF88Fi2u1fWbbOrNvNktkiJcvshLlPky1eEvmOFXepqYY_0Yp7ur-uG801Ssj/s1658/Screenshot%202025-06-12%20at%2015.59.28.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 13. createwithpixels library GUI (2016)&quot; border=&quot;0&quot; data-original-height=&quot;1658&quot; data-original-width=&quot;934&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlogNLZRLfCHkDbLGUro0oCMPfxBGuWYcSFiKfO_GFEoirmOk8EqPh7MybGfmrFqjEZWEuSgrk9JxmnBjjLnrdSKGv6hLl42HsY2kFDzQn7qNmvbTX3oa-mGYMnY07bretF88Fi2u1fWbbOrNvNktkiJcvshLlPky1eEvmOFXepqYY_0Yp7ur-uG801Ssj/w180-h320/Screenshot%202025-06-12%20at%2015.59.28.png&quot; title=&quot;Figure 13. createwithpixels library GUI (2016)&quot; width=&quot;180&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;Figure 13. createwithpixels library GUI (2016)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4eDm72XQp_0b5Asrj0Vlx_BpRFULEUBOPf02K8vsxaOjs6PY51Kq1rLb1ySM7cjQRStMat-hyUn2W36D3ubf2StolkuvT_GfTXVJYrdsvwN64Bn5fDwK8si4vWbD2ZlWQeOvUpsdORrchF7X_IdzzR-aibqW8dLC45lopIos_l6rRffHhpgzlM0zFE0To/s1654/Screenshot%202025-06-12%20at%2015.59.44.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 14. Color selection in the createwithpixels bitmap editor GUI (2016)&quot; border=&quot;0&quot; data-original-height=&quot;1654&quot; data-original-width=&quot;930&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4eDm72XQp_0b5Asrj0Vlx_BpRFULEUBOPf02K8vsxaOjs6PY51Kq1rLb1ySM7cjQRStMat-hyUn2W36D3ubf2StolkuvT_GfTXVJYrdsvwN64Bn5fDwK8si4vWbD2ZlWQeOvUpsdORrchF7X_IdzzR-aibqW8dLC45lopIos_l6rRffHhpgzlM0zFE0To/w180-h320/Screenshot%202025-06-12%20at%2015.59.44.png&quot; title=&quot;Figure 14. Color selection in the createwithpixels bitmap editor GUI (2016)&quot; width=&quot;180&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;Figure 14. Color selection in the createwithpixels bitmap editor GUI (2016)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div&gt;Following &lt;a href=&quot;http://createwith.net&quot; target=&quot;_blank&quot;&gt;createwith.net&lt;/a&gt;&#39;s launch, with fresh Create With branding by&amp;nbsp;&lt;a href=&quot;https://www.jonathanwhelan.com/&quot; target=&quot;_blank&quot;&gt;Jon Whelan consulting&lt;/a&gt;, Jon developed a matching, revised front-end for createwithpixels (see Figures 13 &amp;amp; 14).&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx6rmKOdB9zdmQxLSogFpDqTATSGvqkxt_HsRsqkcrMylr9RPIsGRlM4WzMLQM_RcWH_JG6aOTzNhox-LwZI9_Qi1YehIxGIjXIn0-spXdnvN0bM0Z9iVg7EL_fs0sPHjaHn07fK-M-CCmd6KQfAuF9Y-HyBwAunu8yJFDYOd_bcxxd7GmyluqCCzfNem8/s640/412da0c8-6024-4181-98e3-6d2d6d8d4a11.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 15. createwithpixels.com testing on iMac&quot; border=&quot;0&quot; data-original-height=&quot;360&quot; data-original-width=&quot;640&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx6rmKOdB9zdmQxLSogFpDqTATSGvqkxt_HsRsqkcrMylr9RPIsGRlM4WzMLQM_RcWH_JG6aOTzNhox-LwZI9_Qi1YehIxGIjXIn0-spXdnvN0bM0Z9iVg7EL_fs0sPHjaHn07fK-M-CCmd6KQfAuF9Y-HyBwAunu8yJFDYOd_bcxxd7GmyluqCCzfNem8/w320-h180/412da0c8-6024-4181-98e3-6d2d6d8d4a11.png&quot; title=&quot;Figure 15. createwithpixels.com testing on iMac&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;text-align: start;&quot;&gt;Figure 15. createwithpixels.com testing on iMac&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;This new GUI focused on bitmap illustration, versus serendipitous animations. It also added a scalable version for small-screen, mobile phone use (NOT shown in Figure 15!)&amp;nbsp;&lt;span style=&quot;text-align: center;&quot;&gt;An MA in Digital Art colleague, Dr Julie Freeman (&lt;/span&gt;&lt;a href=&quot;https://translatingnature.org/&quot; style=&quot;text-align: center;&quot; target=&quot;_blank&quot;&gt;Translating Nature&lt;/a&gt;&lt;span style=&quot;text-align: center;&quot;&gt;) reviewed the app, and provided many helpful suggestions on its improvement, plus future development possibilities.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;2023-25 createwithpixels app v.1 development&lt;/h3&gt;&lt;a href=&quot;https://www.linkedin.com/in/michael-pretorius-05256518a/&quot; target=&quot;_blank&quot;&gt;Michael Pretorius&lt;/a&gt; and &lt;a href=&quot;https://www.linkedin.com/in/rafeeq-weideman-85b8b5250/?originalSubdomain=za&quot; target=&quot;_blank&quot;&gt;Rafeeq Weideman&lt;/a&gt;, both then at &lt;a href=&quot;https://www.younglings.academy/&quot; target=&quot;_blank&quot;&gt;Younglings Africa&lt;/a&gt;, worked to prepare createwithpixels&#39; front-end for Apple iOS and Google Android apps. Michael continued work on the app&#39;s front-end as a freelancer, liaising with Stephen Wolff to integrate with the back-end. In 2025, the &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.createwithpixels.createwith&amp;amp;hl=en&amp;amp;gl=US&quot; target=&quot;_blank&quot;&gt;Android version&lt;/a&gt; was approved by the Google Play Store. Likewise, the &lt;a href=&quot;https://apps.apple.com/za/app/create-with/id6473702233&quot; target=&quot;_blank&quot;&gt;iOS version&lt;/a&gt; was approved by Apple&#39;s app store.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;&#39;Art is long, life is short.&#39; Hippocrates.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/8526864852755065350/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2025/06/from-sand-based-1997-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/8526864852755065350'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/8526864852755065350'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2025/06/from-sand-based-1997-to.html' title='From Sand Based (1997) to the createwithpixels app (2025)'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG0SSaYqg1hLbBSG5ADQL7oG_k2CEWXJFLc8rrQtuG1gxUdfWfYatzek4aYAzlWtewhIhIlgfWmoKc9LeId3ICaW6li3OHuyuISfyZOtkWl31l2zxMuOMO2ds7l_XDwA_JMtwOUXKa64HUhZYzgvIP8DKzi_jKiMN196YYG0WQ_GDStVrKKXspGzu5YOZr/s72-w400-h321-c/Sand%20Based%20installation%201997%20graphic%2013.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.9248685 18.4240553</georss:point><georss:box>-34.346497500000005 17.7923413 -33.5032395 19.055769299999998</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-1751297073697492053</id><published>2025-06-06T09:46:00.024+02:00</published><updated>2025-07-21T16:44:24.709+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="censorship"/><category scheme="http://www.blogger.com/atom/ns#" term="COVID-19"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="LinkedIn"/><category scheme="http://www.blogger.com/atom/ns#" term="META"/><category scheme="http://www.blogger.com/atom/ns#" term="science"/><category scheme="http://www.blogger.com/atom/ns#" term="science communication"/><category scheme="http://www.blogger.com/atom/ns#" term="social media"/><category scheme="http://www.blogger.com/atom/ns#" term="suppression"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter"/><category scheme="http://www.blogger.com/atom/ns#" term="X"/><title type='text'>Techniques for suppressing health experts&#39; social media accounts (7 - 12, part 2) - The Science™ versus key opinion leaders challenging the COVID-19 narrative</title><content type='html'>&lt;p&gt;&lt;span style=&quot;color: #666666;&quot;&gt;Written for&amp;nbsp;researchers and others interested in the many techniques used to suppress COVID-19 dissidents&#39; social media accounts, and digital voices.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;This is the second post alerting readers to the myriad of techniques that social media companies continue to use against key opinion leaders that question the dominant&amp;nbsp;consensus&amp;nbsp;from &lt;a href=&quot;https://thenoakesfoundation.org/questioning-the-science/&quot; target=&quot;_blank&quot;&gt;The Science™&lt;/a&gt;. While examples are provided for techniques versus prominent critics of the official COVID-19 narrative, these are also readily applied for stifling the emergence of other issue arenas. These range from the United States of America&#39;s support for forever wars via a ghost budget (&lt;a href=&quot;https://www.degruyterbrill.com/document/doi/10.7312/guzm18672-022/html&quot; target=&quot;_blank&quot;&gt;Bilmes, 2018&lt;/a&gt;), to man-made climate change, and from low carbohydrate diets to transgender &quot;gender affirming&quot; medical surgery ideology. These dogmatic prescriptions by the global policy decision makers of the Global Private Partnership (G3P or GPPP) are presented as a &quot;scientific consensus&quot;, but are unscientific when protected from being questioned- especially by legitimate experts with dissenting arguments.&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;In COVID-19&#39;s case, its proponents may claim that lockdowns, masking, distancing and genetic vaccines were based on science. In reality though, these measures were policy directives decided well in advance inside the G3P (&lt;a href=&quot;https://iaindavis.com/pnnt/&quot; target=&quot;_blank&quot;&gt;Iain Davis, 2021&lt;/a&gt;). At the same time, its macro-level stakeholders have been busy for decades developing a &#39;consensus architecture&#39; that precludes radically different interpretations from its preferred scientific dogmas. For example, &quot;man made climate change&quot; has become anchored as an issue, both scientifically and politically, through a decades-long program of sponsorship from the Rockefeller family, one of the world&#39;s leading private research funders (&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-size: 14px;&quot;&gt;&lt;a href=&quot;https://www.skyhorsepublishing.com/9781510780217/rockefeller/&quot; target=&quot;_blank&quot;&gt;Nordangård, 2024&lt;/a&gt;)&lt;/span&gt;. This has shaped the&amp;nbsp;&lt;span style=&quot;white-space-collapse: preserve;&quot;&gt;climate science &lt;/span&gt;field, where scientists&amp;nbsp;selectively present data to align with policy goals that promote a fear-led&amp;nbsp;&lt;span style=&quot;white-space-collapse: preserve;&quot;&gt;narrative of urgent action (&lt;a href=&quot;https://sciencepolicy.colorado.edu/publications/special/climate_fix/index.html&quot; target=&quot;_blank&quot;&gt;Pielke, 2010&lt;/a&gt;). &lt;/span&gt;The climate science community, particularly the Intergovernmental Panel on Climate Change (IPCC), relies on panic and &quot;pro-social&quot; censorship versus irrefutable evidence for advancing the anthropogenic model, sidelining dissenting perspectives and stifling critical debate as inherently unworthy. In pro-social censorship, work is &lt;i&gt;&#39;rejected, and individuals cancelled, not because the work is substandard or flawed, but because it threatens to undermine a cherished ideology or someone else’s concept of societal safety and harmony. Such censorship is never portrayed as such, of course; the reason given is always that the individual(s) concerned were peddling substandard work leading to harmful misinformation.&#39; &lt;/i&gt;(&lt;a href=&quot;https://wattsupwiththat.com/2025/01/27/the-scourge-of-prosocial-censorship/&quot; target=&quot;_blank&quot;&gt;Ridgway, 2025&lt;/a&gt;).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Professor Brian Martin&#39;s&amp;nbsp;&lt;a href=&quot;https://scholarworks.sjsu.edu/secrecyandsociety/vol3/iss2/2/&quot;&gt;framework for information control&lt;/a&gt;&amp;nbsp;(2025) addresses the key aspects of overarching censorship, often miscast as being &quot;pro-social&quot; counter-&quot;disinformation&quot;. The framework describes that the methods for information control against contrarian views are classifiable into four types, which form an interrelated ecology: (i) flooding, (ii) ignoring, (iii) censoring, and (iv) attacking: (i) Information flooding sees dominant views presented in a unified front, overwhelming contrary views by volume and consistency. (ii) Ignoring includes the absence of research on alternative approaches, failure to report on dissenting research, and not mentioning challenging views. (iii) Censoring involves active measures to prevent the circulation of contrary information and views. (iv) Attacking includes steps taken to silence and penalise individuals with heterodox views, and campaigns to discredit alternatives to the officially-sanctioned approaches. My blog discusses how&amp;nbsp;&lt;a href=&quot;https://www.travisnoakes.co.za/2025/03/techniques-for-suppressing-health.html&quot;&gt;dissident accounts&lt;/a&gt;&amp;nbsp;and their&amp;nbsp;&lt;a href=&quot;https://www.travisnoakes.co.za/2024/07/content-suppression-techniques-against.html&quot;&gt;content&lt;/a&gt;&amp;nbsp;have been (iii) censored in the Fifth Estate&#39;s most popular social media platforms. This post focuses on social media censorship techniques against accounts that are more serious than the six described in &lt;a href=&quot;https://www.travisnoakes.co.za/2025/03/techniques-for-suppressing-health.html&quot; target=&quot;_blank&quot;&gt;part 1&lt;/a&gt;. Such c&lt;span style=&quot;font-family: inherit;&quot;&gt;ontent suppression is best contextualised as just one strategy within a broader propaganda&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://link.springer.com/content/pdf/10.1007/978-3-031-41850-1_1&quot; style=&quot;font-family: inherit;&quot;&gt;omniwar&lt;/a&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;that has weaponised language and made deceit ubiquitous (&lt;/span&gt;&lt;a href=&quot;https://link.springer.com/book/10.1007/978-3-031-41850-1&quot; style=&quot;font-family: inherit;&quot;&gt;Hughes, 2024&lt;/a&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;)&lt;/span&gt;:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;#7 Concealing the sources behind dissidents&#39; censorship&lt;/h3&gt;&lt;p&gt;An important aspect of information control is that the sources behind it will be very well hidden from the public. For the organisers of propaganda, their ideal targets do not appreciate that they are receiving propaganda, nor should they recognise its source. Their audiences&#39; ignorance is a key aspect of psychological warfare (otherwise known as 5th generation warfare (Abbot, 2010, &lt;a href=&quot;https://www.routledge.com/Fifth-Generation-Warfare-Dominating-the-Human-Domain/Krishnan/p/book/9781032501192?srsltid=AfmBOooCMIYX0z_zP-mIy-jOX9r8bYk_iWHi5xjvbzJdQXWBic5eGJal&quot;&gt;Krishnan, 2024&lt;/a&gt;). Likewise for censors, its targets and their followers should ideally not be aware that they are being censored, nor able to identity the sources of their censorship.&amp;nbsp;Accordingly, there is significant deception around the primary sources for social media censorship being the platforms themselves, and their policies. Instead, these platforms are largely responding to co-ordinated COVID-19 narrative control from G3P members who span each of the six estates&lt;span style=&quot;color: red;&quot;&gt;*&lt;/span&gt;.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div&gt;&lt;span style=&quot;color: red;&quot;&gt;{*&amp;nbsp;&lt;/span&gt;Departing from the original &#39;French Estates of the Realm&#39; framework, the contemporary estates can be defined as: A &lt;b&gt;First Estate&lt;/b&gt; that consists of the government or ruling class. The &lt;b&gt;Second Estate&lt;/b&gt; comprises the economic or social elite—think wealthy business magnates, corporate leaders, or influential families who hold disproportionate power through money and networks. The &lt;b&gt;Third Estate&lt;/b&gt; is the general populace who don’t wield concentrated wealth or political authority - the working and middle classes who form the bulk of citizenry. The &lt;b&gt;Fourth Estate&lt;/b&gt; consists of journalists and news outlets who can be a distinct force where holding power to account and shaping public opinion. The &lt;b&gt;Fifth Estate&lt;/b&gt; describes the rise of digital platforms that support the more independent collectivity of networked individuals (&lt;a href=&quot;https://global.oup.com/academic/product/the-fifth-estate-9780190688370?cc=za&amp;amp;lang=en&amp;amp;#&quot; target=&quot;_blank&quot;&gt;Dutton, 2023&lt;/a&gt;). This&amp;nbsp;contributes to a more pluralist role of individuals in shaping democratic political accountability, whilst impacting nearly every sector of society.&amp;nbsp;&amp;nbsp;During the COVID-19 event, the BMGF rivalled corporations and governments in its influence. This reflects the growing importance of the Sixth Estate (multinational non-profit organisations) in driving consensus for The Science™. The vast scale of international philanthropy from trillionaires arguably constitutes a contemporary &lt;b&gt;Sixth Estate&lt;/b&gt;, since these charities operate as a distinct force with a unique role. In most societies, large public benefit organisations (PBOs) typically operate outside government, corporate, and traditional media spheres, while focusing on advocacy, social change, or public welfare. Large charities can mobilise resources, influence policy, and amplify disenfranchised voices in ways that neither the mainstream press, nor online platforms can do alone. Charities assumed independence from profit motives or government control gives a different kind of credibility and reach to PBOs, arguably qualifying them as a separate &quot;estate.&quot; At the same time, large charities have greater opportunities and leverage for working towards long-term goals. In contrast, most political figures, listed companies, and other organisations have to deliver on short-term objectives, and are more exposed to critique&lt;span style=&quot;color: red;&quot;&gt;}&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Opaque choices to suppress COVID-19 counter-narratives via the Fourth and Fifth media estates were largely demanded by external Global Private Partnership parties- G3Ps are structured collaborations between international intergovernmental organisations, such as the UN, WHO and WEF, and private companies to achieve shared goals and objectives. The G3Ps form a worldwide network of stakeholder capitalists and their partners who co-operate with global governance (UN), above state and society. The UN co-operates with G3P partners to set global agendas and policies, which then cascade to people in every nation via a policy intermediary, such as the International Monetary Fund (IMF). As a product of G3P collaborators,  COVID-19 thought-policing is just one topic that the global industrial censorship complex&#39;s (GICC) broader work addresses. The GICC&#39;s activities seek to protect lucrative fabricated crises narratives as &quot;settled science&quot;. The Science™ dictates urgent, universal solutions, which directly benefit the G3P&#39;s policy makers and corporate members- In the case of the COVID-19 event, the UN, WEF, WHO and its G3P corporate partners circumvented national sovereignty (whereby a nation’s laws cannot be subject to those of an outsider) to promote a monopolistic “World Health” policy. Its implementation primarily benefited an ‘elite cabal of media-, tech-, large pharma-, centralized finance, nongovernmental “pathophilanthropic,” and transnational corporations’ (&lt;a href=&quot;https://www.skyhorsepublishing.com/9781510782952/psywar/&quot; target=&quot;_blank&quot;&gt;Malone et al. 2024, p. 338&lt;/a&gt;). This corporatism (AKA fascism) contributed to a massive wealth gain for billionaires of&amp;nbsp;$5 trillion from 2020–2021 (&lt;a href=&quot;https://policy-practice.oxfam.org/resources/inequality-kills-the-unparalleled-action-needed-to-combat-unprecedented-inequal-621341/&quot; target=&quot;_blank&quot;&gt;Oxfam, 2022&lt;/a&gt;).&amp;nbsp;Oxfam notes that this was a larger increase than in the previous 14 years combined!&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;The well-funded, complicity theorists for a COVID-19 &quot;Infodemic&quot; (for example-&amp;nbsp;&lt;a href=&quot;https://infodemiology.jmir.org/2021/1/e30979&quot; target=&quot;_blank&quot;&gt;Calleja et al., 2021&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.degruyter.com/document/doi/10.1515/9780776636429-015/pdf?licenseType=restricted&quot; target=&quot;_blank&quot;&gt;Caulfield, 2020&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://purl.stanford.edu/mx395xj8490&quot; target=&quot;_blank&quot;&gt;DiResta, 2022&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.pass.va/content/dam/casinapioiv/pass/pdf-volumi/studia-selecta/studiaselecta07pass.pdf&quot; target=&quot;_blank&quot;&gt;Schiffrin, 2022&lt;/a&gt;) may genuinely believe in advocating for censorship as a legitimate, organic counterweight to &quot;malinformation&quot;. In contrast, researchers at the&amp;nbsp;&lt;a href=&quot;https://unlimitedhangout.com/content-blocks/author/&quot; target=&quot;_blank&quot;&gt;Unlimited Hangout&amp;nbsp;&lt;/a&gt;point out that this censorship is highly centralised, aiming at opinions that are deemed &quot;illegitimate&quot; merely for disagreeing with the positions of the most powerful policy makers at the &lt;a href=&quot;https://en.wikipedia.org/wiki/Global_public–private_partnership&quot; target=&quot;_blank&quot;&gt;G3P&lt;/a&gt;&#39;s macro-level.&amp;nbsp;Ian Davis&amp;nbsp;&lt;a href=&quot;https://unlimitedhangout.com/2021/12/investigative-reports/the-new-normal-the-civil-society-deception/&quot; target=&quot;_blank&quot;&gt;writes&lt;/a&gt;&amp;nbsp;that the G3P policy makers are&amp;nbsp;&lt;a href=&quot;https://www.chathamhouse.org/&quot; target=&quot;_blank&quot;&gt;Chatham House&lt;/a&gt;, the&amp;nbsp;&lt;a href=&quot;https://www.clubofrome.org/&quot; target=&quot;_blank&quot;&gt;Club of Rome&lt;/a&gt;, the&amp;nbsp;&lt;a href=&quot;https://www.cfr.org/&quot; target=&quot;_blank&quot;&gt;Council of Foreign Relations&lt;/a&gt;, the&amp;nbsp;&lt;a href=&quot;https://www.rockefellerfoundation.org/&quot; target=&quot;_blank&quot;&gt;Rockefellers&lt;/a&gt;&amp;nbsp;and the&amp;nbsp;&lt;a href=&quot;https://www.weforum.org/&quot; target=&quot;_blank&quot;&gt;World Economic Forum&lt;/a&gt;. Each guides international policy distributors, including the;&amp;nbsp;&lt;a href=&quot;https://www.imf.org/en/Home&quot; target=&quot;_blank&quot;&gt;International Monetary Fund,&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;https://www.ipcc.ch/&quot; target=&quot;_blank&quot;&gt;The Intergovernmental Panel on Climate Change&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.un.org/en/&quot; target=&quot;_blank&quot;&gt;United Nations&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://www.who.int/&quot; target=&quot;_blank&quot;&gt;World Health Organisation&lt;/a&gt;, plus &quot;philanthropists&quot; {eg. the Bill and Melinda Gates Foundation (BMGF)}, multinational corporations and global non-governmental organisations..&lt;br /&gt;&lt;br /&gt;Mr Bill Gates serves as an example of the Sixth Estate exercising undue influence on public health, especially Africa&#39;s: His foundation is the largest private benefactor of the World Health Organization. The BMGF finances the health ministries in virtually every African country. Mr Gates can place conditions on that financing, such as vaccinating a certain percentage of a country’s population. Some vaccines and health-related initiatives that these countries purchase are developed by companies that Gates’ Cascade Investment LLC invests in. As a result, he can benefit indirectly from stock appreciation. This is alongside tax savings from his donations, whilst his reputation as a ‘global health leader’ is further burnished. In South Africa, the BMGF have directly funded the Department of Health, SA’s regulator SAHPRA, plus its Medical Research Council, top medical universities and the media (such as the Mail and Guardian’s health journalism centre, Bhekisisa). All would seem highly motivated to protect substantial donations by not querying Mr Gates’ vaccine altruism. However, the many challenges of the Gates Foundation’s dominating role in its transnational philanthropy must not be ignored. Such dominance poses a challenge to justice- locals’ rights to control the institutions that can profoundly impact their basic interests (&lt;a href=&quot;https://doi.org/10.1093/ia/iiac022&quot;&gt;Blunt, 2022&lt;/a&gt;). While the BMGF cannot be directly tied to COVID-19 social media account censorship, it is indisputable that Mr Gates&#39; financial power and partner organisations indirectly suppressed dissenting voices by prioritising certain COVID-19 treatment narratives (Politico, &lt;a href=&quot;https://www.politico.com/news/2022/09/14/global-covid-pandemic-response-bill-gates-partners-00053969&quot;&gt;2022A&lt;/a&gt;, &lt;a href=&quot;https://www.politico.com/newsletters/politico-pulse/2022/09/15/how-the-gates-foundation-helped-guide-the-global-covid-response-00056796&quot;&gt;2022B&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;At a meso-level, select G3P policy enforcers organise that macro-level&#39;s policy directives are followed by both national governments (and their departments, such as health) and scientific authorities (including the AMA, CDC, EMA, FDA, ICL, JCVI, NERVTAG, NIH, MHRA and SAGE). Enforcers strive to prevent rival scientific ideas gaining traction, and thereby challenging its policymakers&#39; dictates. These bodies task psychological &#39;nudge&#39; specialists (&lt;a href=&quot;https://www.cureus.com/articles/236547-ethics-of-nudging-in-the-covid-19-crisis-and-the-necessary-return-to-the-principles-of-shared-decision-making-a-critical-review#!/&quot;&gt;Junger and Hirsch, 2024&lt;/a&gt;), propagandists and other experts with convincing the public to accept, and ideally buy-into, G3P policies. This involves censorship and psychological manipulation via public relations, propaganda, disinformation and misinformation. The authors of such practices are largely unattributed. Dissidents facing algorithmic censorship through social media companies&#39; opaque processes of content moderation are unlikely to be able to identify the true originator of their censorship in a complex process. Content moderation is a &#39;multi-dimensional process through which content produced by users is monitored, filtered, ordered, enhanced, monetised or deleted on social media platforms&#39; (Badouard and Bellon, 2025). This process spans a &#39;great diversity of actors&#39; who develop specific practices of content regulation (p3). Actors may range from activist users and researchers who flag content, to fact-checkers from non-governmental organisations and public authorities. If such actors disclose their involvement in censorship, this may only happen much later. For example, &lt;a href=&quot;https://www.americanrhetoric.com/speeches/PDFFiles/Mark-Zuckerberg-Letter-on-Govt-Censorship.pdf&quot;&gt;Mark Zuckerberg’s 2024 letter &lt;/a&gt;to the House Judiciary Committee revealed that the Biden administration pressured Meta to censor certain COVID-19 content, including humour and satire, in 2021.&lt;/p&gt;&lt;h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/h3&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;#8 Blocking a user’s access to his or her account&lt;/h3&gt;&lt;p&gt;A social media platform may stop a user from being able to login to his or her account. Where the platform does not make this blocking obvious to a users&#39; followers, this is deceptive. For example, Emeritus&amp;nbsp;Professor Tim Noakes&#39;&amp;nbsp;&lt;a href=&quot;https://thenoakesfoundation.org/what-happened-to-freedom-of-dialogue-prof-noakes-banned-on-twitter/&quot; target=&quot;_blank&quot;&gt;Twitter account was deactivated for months&lt;/a&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;after querying health authorities&#39; motivations in deciding on interventions during the COVID-19 &quot;pandemic&quot;.&amp;nbsp;Many&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;viewers would not recognise that his seemingly live profile was in fact inactive, since it looked to be active. The only clue was that @&lt;a href=&quot;https://x.com/ProfTimNoakes&quot; target=&quot;_blank&quot;&gt;ProfTimNoakes&lt;/a&gt; had not tweeted for a long time. This was highly unusual.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;This suspension followed Twitter&#39;s introduction of a “five-strike” system, with repeat offenders or egregious violations leading to permanent bans. Twitter&#39;s&amp;nbsp;system tracked violations, with the first and second strikes resulting in a warning or temporary lock. A third strike resulted in a 12-hour suspension, while a 7-day suspension followed a 4th strike. Users faced a permanent ban for a 5th strike. In Professor Tim Noakes&#39; case, he was given a vague warning regarding &lt;i&gt;&#39;breaking community rules etc.&#39; &lt;/i&gt;(email correspondence, 24.10.2022), this followed him noticing a loss of followers and his tweets reach being restricted. Twitter &#39;&lt;i&gt;originally said I was banned for 10 hours. But after 10 hours when I&amp;nbsp; tried to re-access it they would not send me a code to enter. When I complained they just told me I was banned. When I asked for how long, they did not answer.&#39; &lt;/i&gt;In reviewing his tweets, Prof. Noakes noticed that some had been (mis-)labelled by Twitter to be &quot;misleading&quot; before his suspension (see Figure 1 below).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7pHmI1sYtKDHZav9PGDOsL8cptqZMgKgmRsqF05P8s7aPLNsTpApj3KhopW9W5wWZZhsZAkrSssK48ehLrS-BW69b0O8Nx5uAqsVM3kzSnMlYriG-IvL7MdpPCRiZBFZK7H1lOwe0nNLgPJP5LNnrUeG_UNL9rMG88BuujhNn2DbfncZUIhHRuLmc8ujo/s822/@ProfTimNoakes%20controversial%20Macron%20tweet%2024%20Oct%202022.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;@ProfTimNoakes controversial Macron tweet 24 Oct 2022&quot; border=&quot;0&quot; data-original-height=&quot;822&quot; data-original-width=&quot;450&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7pHmI1sYtKDHZav9PGDOsL8cptqZMgKgmRsqF05P8s7aPLNsTpApj3KhopW9W5wWZZhsZAkrSssK48ehLrS-BW69b0O8Nx5uAqsVM3kzSnMlYriG-IvL7MdpPCRiZBFZK7H1lOwe0nNLgPJP5LNnrUeG_UNL9rMG88BuujhNn2DbfncZUIhHRuLmc8ujo/s16000/@ProfTimNoakes%20controversial%20Macron%20tweet%2024%20Oct%202022.jpg&quot; title=&quot;@ProfTimNoakes controversial Macron tweet 24 Oct 2022&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Figure 1. Screenshot of @ProfTimNoakes&#39; &quot;controversial&quot; tweet on President Macron not taking&amp;nbsp;COVID-19 &#39;experimental gene therapy&#39; (24 October, 2022)&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;Prof Noakes had also tweet-quoted Alec Hogg’s BizNews article regarding &lt;a href=&quot;https://www.biznews.com/news/pandas-final-bear-hug-for-slim-karim&quot; target=&quot;_blank&quot;&gt;Professor Salim Abdool Karim’s conflicts of interest&lt;/a&gt;,&amp;nbsp;adding &#39;something about&#39; cheque book science. The @ProfTimNoakes account was in a state of limbo after seven days, but was never permanently banned. Usually, accounts placed on “read-only” mode, or temporary lockouts, required tweet deletion to regain full access. However, @ProfTimNoakes latest tweets were not visible, and he was never asked to delete any. In addition to account login blocks, platforms may also suspend accounts from being visible. But this was not applied to @ProfTimNoakes. In response to being locked out, Prof Noakes shifted to using his alternate &lt;a href=&quot;https://x.com/LoreofRunning1&quot; target=&quot;_blank&quot;&gt;@loreofrunning&lt;/a&gt; account- its topics of nutrition, running and other sports seemed safe from the reach of unknown censors&#39; Twitter influence.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;#9  Temporary suspensions of accounts (temporary user bans)&lt;/h3&gt;&lt;div&gt;Several dissident COVID-19 experts reported temporary suspensions of their Twitter accounts after contradicting&amp;nbsp;official public health narratives, or Twitter’s &quot;COVID-19 misinformation policies&quot;. Two examples are the epidemiologist&#39;s Dr. Martin Kulldorff&#39;s account,&amp;nbsp;&lt;span color=&quot;inherit&quot; style=&quot;font-family: inherit; font-size: inherit; font-style: inherit; font-variant-caps: inherit; font-variant-ligatures: inherit; font-weight: inherit; text-align: inherit; white-space: inherit;&quot;&gt;&lt;a href=&quot;https://x.com/MartinKulldorff&quot; target=&quot;_blank&quot;&gt;@MartinKulldorff&lt;/a&gt;, and the journalist Mr&amp;nbsp;&lt;/span&gt;Alex Berenson&#39;s, &lt;a href=&quot;https://x.com/AlexBerenson&quot; target=&quot;_blank&quot;&gt;@AlexBerenson&lt;/a&gt;:&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;@MartinKulldorff was temporarily suspended after a March 15, 2021 tweet stating that not everyone needed the COVID-19 vaccine, especially those with prior natural infection or young children. As this diverged from CDC guidelines, Twitter flagged the tweet to be misleading, disabling user&#39;s options to reply or like that tweet.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Alex Berenson faced multiple suspensions, also for questioning the necessity of mRNA vaccines, plus their efficacy. @AlexBerenson was temporarily suspended in the summer of 2021, with a permanent ban following shortly after. Internal Twitter communications obtained through Berenson’s lawsuit against the platform, revealed that White House officials had raised concerns about Berenson’s account during a meeting in April with Twitter executives. Senior COVID adviser Andy Slavitt asked why Berenson &#39;hasn’t been kicked off the platform&#39;, suggesting that Berenson was a key source of vaccine misinformation.&amp;nbsp;Berenson’s lawsuit against Twitter resulted in his reinstatement in July 2022.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;#10 Permanent suspension of accounts, pages and groups (complete bans)&lt;/h3&gt;&lt;p&gt;In contrast to Twitter&#39;s five-strikes system, Meta&#39;s&amp;nbsp;&lt;span&gt;Facebook&#39;s&lt;/span&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;was&amp;nbsp;not as formalised.&amp;nbsp;It tracked violations on accounts, pages and groups. The latter serve different functions in Facebook’s system architecture (&lt;a href=&quot;https://www.science.org/doi/abs/10.1126/sciadv.adh2132&quot; target=&quot;_blank&quot;&gt;Broniatowski, et al. 2023&lt;/a&gt;): only page administrators may post in pages, which are designed for brand promotion and marketing. In contrast, any member may post in groups. These serve as a forum for members to build community and discuss shared interests. In addition, pages may serve as group administrators. From December 2020, Meta began removing &quot;false claims about COVID-19 vaccines&quot; that were &quot;debunked by public health experts&quot;. This included &quot;misinformation&quot; about their efficacy, ingredients, safety, or side effects. Repeatedly sharing &quot;debunked claims&quot; risked escalating penalties to individual users/administrators, pages and groups. Penalties ranged from reduced visibility to removal and permanent suspension.&amp;nbsp; For example, if a user posted that &#39;COVID vaccines cause infertility&#39; &quot;without evidence&quot;, this violated policy thresholds. The user was then asked to acknowledge the violation, or appeal. Appeals were often denied if the content clashed with official COVID-19 narratives.&lt;/p&gt;&lt;p&gt;Meta could choose to permanently ban individual-, fan page- and group- accounts on Facebook. For example, high-profile repeated offenders were targeted for removals. In November 2020, the page &quot;Stop Mandatory Vaccination&quot;, which was one of the platform’s largest &quot;anti-vaccine&quot; fan pages was removed. Robert F. Kennedy Jr.’s Instagram account was permanently removed in 2021 for &quot;sharing debunked COVID-19 vaccine claims&quot;. The non-profit he founded, Children’s Health Defense was suspended from both Facebook and Instagram in August 2022 for its repeated violations of Meta’s COVID-19 misinformation policies.&lt;br /&gt;&lt;br /&gt;Microsoft&#39;s LinkedIn generally has stricter content moderation for professional content than other social networks. It updated its &#39;Professional Community Policies&#39; for COVID-19 to prohibit content contradicting guidance from global health organisations, like the CDC and WHO. This included promoting unverified treatments and downplaying the &quot;pandemic&quot;’s severity. Although LinkedIn has not disclosed specific thresholds, high-profile cases evidence that the persistent sharing of contrarian COVID-19 views—especially if flagged by users, or contradicting official narratives—would lead to removal. Dr. Mary Talley Bowden, Dr. Aseem Malhotra, Dr Robert Malone, and Mr Steve Kirsch and accounts have all been permanently suspended.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;#11 Non-disclosure of information around banning&#39;s rationale for account-holders&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Social media platforms&#39; Terms of Service (TOS) may ensure that these companies are not legally obligated to share information with their users on the precise reasons for their accounts being suspended. Popular platforms like Facebook, LinkedIn and X can terminate accounts at their sole discretion without providing detailed information to users. Such suspensions are typically couched opaquely in terms of policy violation (such as being in breach of community standards). &lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Less opaque details may be forthcoming if the platform&#39;s TOS is superseded by a country, or regional bloc&#39;s, laws. In the US, section 230 of its Communications Decency Act allows platforms to moderate content as they see fit. They are only obligated to disclose reasons under a court order, or if a specific law applies (such as one related to data privacy). By contrast, companies operating under European Union countries are expected to comply with the EU&#39;s Digital Services Act (DSA). Here, platforms must provide a &#39;statement of reasons&#39; for content moderation decisions, including suspensions, with some level of detail about the violation. Whilst compliant feedback must be clear and user-friendly, granular specifics may not be a DSA requirement. In the EU and USA, COVID-19 dissidents could only expect detailed explanations in response to legal appeals,&amp;nbsp;or significant public pressure. Internal whistleblowing and investigative reports, such as the Facebook and Twitter files, also produced some transparency.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;One outcome of this opaque feedback is that the reasons for dissidents&#39; COVID-19 health experts&#39; accounts being suspended are seldom made public. Even where dissidents have shared their experiences, the opaque processes and actors behind COVID-19 censorship remain unclear. Even reports from embedded researchers, such as The Center for Countering Digital Hate&#39;s &quot;&lt;a href=&quot;https://counterhate.com/research/the-disinformation-dozen/&quot; target=&quot;_blank&quot;&gt;Disinformation Dozen&lt;/a&gt;&quot;, lack specificity. While it reported how Meta permanently banned 16 accounts, and restricted 22 others, for &quot;sharing anti-vaccine content&quot; in response to public reporting in 2021. However, the CCDH did not explicitly name the health experts given permanent suspensions. Hopefully, a recent 171-page federal civil rights suit by half of the dissidents mentioned in this report against the CCDH, Imran Ahmed, U.S. officials &amp;amp; tech giants will expose more about who is behind prominent&amp;nbsp; transnational censorship &amp;amp; reputational warfare (&lt;a href=&quot;https://sayerji.substack.com/p/reputation-as-a-weapon-breakingfederal&quot; target=&quot;_blank&quot;&gt;Ji, 2025&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;#12 No public reports from platforms regarding account suspensions and censorship requests&lt;/h3&gt;&lt;div&gt;&lt;div&gt;Another important aspect of deception around social media censorship is that the most popular digital platforms have never provided ongoing, public reports for the number of accounts they suspend, and why. Nor do platforms that exercise censorship share ongoing information on who requests what accounts be suspended, and their rationales. Consequently, researchers and the public are unlikely to appreciate the scope of censorship that does occur on social media platforms, and who the authors behind it are, G3P policy enforcers, or otherwise.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOsN3AIucqTVUvlArdOhzzbMDU9505pjoZwje3KMra1Vb6XZzNC-pvIA9K0aSBjqDl-tcTMkY1alzRuHLqQnBrxM0ptr98qFRDidor2YJoXL0AIBwLniWFeQASmrHuIuRF4vhMCh_vkHtaYArWl7p-gWlUvHruPBNcnTjdWpoZhUCGzrlsseORNvgQVMw6/s960/Critical%20social%20justice%20as%20a%20protected%20ideology%20%20in%20Higher%20Education%20.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Critical social justice as a protected ideology in Higher Education&quot; border=&quot;0&quot; data-original-height=&quot;540&quot; data-original-width=&quot;960&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOsN3AIucqTVUvlArdOhzzbMDU9505pjoZwje3KMra1Vb6XZzNC-pvIA9K0aSBjqDl-tcTMkY1alzRuHLqQnBrxM0ptr98qFRDidor2YJoXL0AIBwLniWFeQASmrHuIuRF4vhMCh_vkHtaYArWl7p-gWlUvHruPBNcnTjdWpoZhUCGzrlsseORNvgQVMw6/s16000/Critical%20social%20justice%20as%20a%20protected%20ideology%20%20in%20Higher%20Education%20.png&quot; title=&quot;Critical social justice as a protected ideology in Higher Education&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;text-align: left;&quot;&gt;Figure 2.&amp;nbsp;&lt;/span&gt;Slide on &#39;Critical social justice as a protected ideology in Higher Education, but contested in social media hashtag communities&#39; (Noakes, 2024)&lt;/td&gt;&lt;td class=&quot;tr-caption&quot;&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This is an important gap due to its implications for free speech. Many &#39;Critical Social Justice&#39; assumptions and beliefs seem protected from debate in Higher Education and in the Fourth Estate. Likewise, the most popular social networks of the Fifth Estate may also be providing stealthy protection for G3P agenda dogmas via censorship. As this is never made available as part of the public record, it remains mostly hidden from the public, and largely inaccessible to scholarship.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3&gt;&lt;span&gt;&lt;div style=&quot;font-size: medium; font-weight: 400;&quot;&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;More about censorship techniques against dissenters on social networks&lt;/h3&gt;&lt;/div&gt;&lt;/span&gt;&lt;/h3&gt;&lt;a href=&quot;https://www.travisnoakes.co.za/2025/03/techniques-for-suppressing-health.html&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.travisnoakes.co.za/2025/03/techniques-for-suppressing-health.html&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;&lt;li&gt;&lt;a href=&quot;https://www.travisnoakes.co.za/2025/03/techniques-for-suppressing-health.html&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://www.travisnoakes.co.za/2025/03/techniques-for-suppressing-health.html&quot; target=&quot;_blank&quot;&gt;Techniques for suppressing health experts&#39; social media accounts, part 1 - The Science™ versus key opinion leaders challenging the COVID-19 narrative&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.travisnoakes.co.za/2024/07/content-suppression-techniques-against.html#google_vignette&quot; target=&quot;_blank&quot;&gt;Content suppression techniques against dissent in the Fifth Estate - examples of COVID-19 censorship on social media&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;N.B. I am writing a third post on account censorship during COVID-19, that will cover at least three more serious techniques. Do follow me on &lt;a href=&quot;https://x.com/travisnoakes&quot;&gt;X&lt;/a&gt;&amp;nbsp;to learn when that is published. Please suggest improvements to this post in the comments below, or reply to my tweet thread&amp;nbsp;at &lt;a href=&quot;https://x.com/travisnoakes/status/1930989080231203126&quot; target=&quot;_blank&quot;&gt;https://x.com/travisnoakes/status/1930989080231203126&lt;/a&gt;.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/1751297073697492053/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2025/06/techniques-for-suppressing-health.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/1751297073697492053'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/1751297073697492053'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2025/06/techniques-for-suppressing-health.html' title='Techniques for suppressing health experts&#39; social media accounts (7 - 12, part 2) - The Science™ versus key opinion leaders challenging the COVID-19 narrative'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7pHmI1sYtKDHZav9PGDOsL8cptqZMgKgmRsqF05P8s7aPLNsTpApj3KhopW9W5wWZZhsZAkrSssK48ehLrS-BW69b0O8Nx5uAqsVM3kzSnMlYriG-IvL7MdpPCRiZBFZK7H1lOwe0nNLgPJP5LNnrUeG_UNL9rMG88BuujhNn2DbfncZUIhHRuLmc8ujo/s72-c/@ProfTimNoakes%20controversial%20Macron%20tweet%2024%20Oct%202022.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.922087 18.4231418</georss:point><georss:box>-62.232320836178843 -16.7331082 -5.6118531638211522 53.579391799999996</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-2950350764523850861</id><published>2025-04-09T19:02:00.006+02:00</published><updated>2025-04-11T15:28:10.611+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Comirnaty®"/><category scheme="http://www.blogger.com/atom/ns#" term="COVID-19"/><category scheme="http://www.blogger.com/atom/ns#" term="health communication"/><category scheme="http://www.blogger.com/atom/ns#" term="mRNA vaccines"/><category scheme="http://www.blogger.com/atom/ns#" term="organised persuasive communication"/><category scheme="http://www.blogger.com/atom/ns#" term="Pfizer BioNTech"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="review"/><title type='text'>Wanted - Fair critics of &#39;Promoting Vaccines in South Africa: Consensual or Non-Consensual Health Science Communication?&#39; </title><content type='html'>&lt;p&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Written for health science communication researchers concerned with genetic vaccination promotion being non-consensual and a form of propaganda.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;Since June 2023, Dr Piers Robinson, myself and Dr David Bell have submitted the titular manuscript to nine journals with no strong reviews, and many desk rejects without solid explanation. This is despite our journal search from 2024 focusing on seemingly suitable journals that met the criteria of tackling (i) health communication, (ii) propaganda, and (iii) previously having shared controversial articles questioning the official COVID-19 narrative.&amp;nbsp;Since we&amp;nbsp;cannot identify any viable new targets, we have decided to share our manuscript as a pre-print on SSRN and &lt;a href=&quot;https://www.researchgate.net/publication/390161992_Promoting_Vaccines_in_South_Africa_Consensual_or_Non-Consensual_Health_Science_Communication_pre-print_version&quot; target=&quot;_blank&quot;&gt;ResearchGate&lt;/a&gt;. We hope that readers there can at least offer solid, constructive criticism of our work.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;As scholars know, every journal submission can take many hours for preparing the related documentation, plus formatting the manuscript to a journal&#39;s stylistic specifications, etc. To compensate for such lengthy academic labour, authors might reasonably expect that editorial teams will be highly ethical in providing detailed reasoning behind desk-rejections. Where there is a strong pattern of such feedback being absent, or poor, on controversial topics, dissident authors may justifiably perceive that they are negotiating an academic journal publication firewall. Why would editors be reluctant to go on record for their reasons for desk-rejection, if they are indisputable? Even when editorial staff&#39;s feedback is highly critical, this is still constructive for authors. They can then completely revise their manuscript for submission to new journals. Or perhaps save time, by confronting the reality that their manuscript&#39;s non- or weak-contribution means it must be abandoned!&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Our frustration with not receiving constructive criticism is similar to accounts from many other dissenters against the official COVID-19 narrative. Notably, Professors Bhattacharya and Hanke (&lt;a href=&quot;https://ideas.repec.org/a/ejw/journl/v20y2023i2p450-459.html&quot; target=&quot;_blank&quot;&gt;2023&lt;/a&gt;) documented dissidents’ censorship experiences via popular pre-print options. And Professor Norman Fenton (in &lt;a href=&quot;https://wherearethenumbers.substack.com/p/our-book-out-now-fighting-goliath&quot; target=&quot;_blank&quot;&gt;Fighting Goliath&lt;/a&gt;, 2024) and Dr Robert Malone (in &lt;a href=&quot;https://www.skyhorsepublishing.com/9781510782952/psywar/&quot; target=&quot;_blank&quot;&gt;PsyWar&lt;/a&gt;, 2024) provide compelling accounts of shifting from being welcome journal authors and conference speakers, to unpublishable for any manuscript critical of COVID-19 statistics or treatment policies. Such experts would seem unlikely to have produced fallacious research unsuited to peer review given their high levels of expertise, plus long publication records.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Our wannabe-journal article tackles an important, albeit controversial, question,&lt;i&gt;&amp;nbsp;How might pharma- or medical propaganda be distinguished from health communication?&lt;/i&gt;&amp;nbsp;South Africa&#39;s (SA) case of COVID-19 genetic vaccine promotion is described for how incentivization, coercion and deceptive messaging approximated to a non-consensual approach- preventing informed consent for pregnant women. In terms of generalisability, this case study can be described as a hard case- given the status of pregnant women as perhaps the most vulnerable and protected category in society, one expects health communicators to be extremely cautious about adopting non-consensual methods of persuasion. We show that this was indeed the case in South Africa, making it more likely that such tactics were used for other less vulnerable groups.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In desk rejecting our work, editors and reviewers may well have thought that evaluating persuasive communication in terms of whether or not it is deceptive and non-consensual is not, in some sense, a legitimate research question. In stark contrast, as Dr Piers Robinson argues (at the end of this&amp;nbsp;&lt;a href=&quot;https://www.linkedin.com/posts/travis-noakes-57289613_rejected-censors-covid-activity-7312841602933088256-6NrY?utm_source=share&amp;amp;utm_medium=member_desktop&amp;amp;rcm=ACoAAALM1KYBjm6y96tXVJ0qZHSJbl7XSnZWz-s&quot; target=&quot;_blank&quot;&gt;Linked thread&lt;/a&gt;),&amp;nbsp;our research question is indeed,&amp;nbsp;&lt;i&gt;&#39;an essential part of evaluating whether any given persuasion campaign can be said to meet appropriate ethical/democratic standards. With the attention to fake news and disinformation, there is in fact much in the way of scholarly attention to questions of deceptive or manipulative communication. So we are not asking a question that is not asked by many others and across a wide range of issue areas.&amp;nbsp;And we utilised a conceptual framework developed and published elsewhere.&#39;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Another concern may be that our manuscript it &quot;biased&quot; to &#39;reach a predetermined outcome&#39;. This ignores the possibility that our work could have found no evidence of deceptive communication, and none for incentivization. However, the evidence presented does strongly support a major concern that pregnant women were incentivised, deceived and coerced into taking (poorly-tested) genetic vaccines (whose side-effects are also poorly tracked). In the absence of detailed editor rejection feedback, it&#39;s hard for us to improve our argument for a hoped-for peer review that&#39;s fair.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;It&#39;s also important to acknowledge the context in which our paper was written, which is of considerable scientific concern over the COVID-19 event. Notably, rushed guidance based on weak evidence from international health organisations could well have perpetuated negative health and other societal outcomes, rather than ameliorating them (&lt;a href=&quot;https://td-sa.net/index.php/td/article/view/1263&quot; target=&quot;_blank&quot;&gt;Noakes, Bell &amp;amp; Noakes, 2022&lt;/a&gt;). In particular, health authorities rushed approval of genetic vaccines as the primary response, and their &quot;health promotion&quot; seems a ripe target for robust critique. Particularly when successful early treatments were widely reported to have been suppressed so that Emergency Use Authorisation for genetic vaccines could be granted (&lt;a href=&quot;https://www.skyhorsepublishing.com/9781510766808/the-real-anthony-fauci/&quot; target=&quot;_blank&quot;&gt;Kennedy, 2021&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;An unworthy topic?&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;Our negative experience of repeated, poorly (or un-) explained rejections would seem to suggest that presenting South Africa&#39;s case of COVID-19 genetic vaccine promotion as pharmaceutical/medical propaganda was not worthy of academic journals&#39; review- even for those promising to tackle scientific controversies and challenging topics.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Not unexpectedly, SSRN removed our pre-print after a week, providing the following email rationale: &#39;Given the need to be cautious about posting medical content, SSRN is selective on the papers we post. Your paper has not been accepted for posting on SSRN.&#39; So, no critique of the paper&#39;s facts or methods, just rapid removal of our COVID 19 &quot;health communication&quot; critique. In SSRN &#39;s defence, its website&#39;s FAQs do flag that &#39;Medical or health care preprints at SSRN are designed for the rapid, early dissemination of research findings; therefore, in most instances, we do not post reviews or opinion-led pieces, as well as editorials and perspectives.&#39; So perhaps the latter concern was indeed the most significant factor in SSRN&#39;s decision... But with no explicit/specific explanation for its rationale for its decision, it&#39;s also possible that our critique of COVID-19 &quot;health science communication&quot; weighed more heavily as a factor by human decision makers. Alternately,&lt;span&gt;&amp;nbsp;an Artificial Intelligence agent wrote the rejection email, triggered by our sensitive keywords. COVID-19 + proganda = (a must reject routine.)&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span&gt;A history of a manuscript&#39;s rejection in one image&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;We acknowledge that the initial submissions of our manuscript may well have been out-of-scope for the preliminary journals, or outside of the particular contributions to knowledge that they consider.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;h4&gt;&lt;div style=&quot;font-weight: 400;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdMhZnx9zP55cHKZWnJVP9TQv7SWq_-K9TAl7tTBFU1hj_mMGuXbCNVqZec2mIe8iPygJe1sS-W4bTptmA_-zyul0plgPYPcOR8OnkXZyY_cEhWDv5CO-9w92XiwKsg01PzdVKacmo0SLGxGJyQgQQ6CFJsBSaWwVCULyCI6yftrZWKluqkmgYAXb7ICSu/s960/Submission%20attempts%20versus%20journal%20publication%20firewall.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Submission attempts versus journal publication firewall.png&quot; border=&quot;0&quot; data-original-height=&quot;540&quot; data-original-width=&quot;960&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdMhZnx9zP55cHKZWnJVP9TQv7SWq_-K9TAl7tTBFU1hj_mMGuXbCNVqZec2mIe8iPygJe1sS-W4bTptmA_-zyul0plgPYPcOR8OnkXZyY_cEhWDv5CO-9w92XiwKsg01PzdVKacmo0SLGxGJyQgQQ6CFJsBSaWwVCULyCI6yftrZWKluqkmgYAXb7ICSu/w640-h360/Submission%20attempts%20versus%20journal%20publication%20firewall.png&quot; title=&quot;Submission attempts versus journal publication firewall.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 1. Nine journals that rejected &#39;Promoting Vaccines in South Africa&#39; (2025)&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: 400;&quot;&gt;Over two years, we also refined our manuscript to narrowly focus on &#39;non-consensual Health Science Communication&#39;, versus propaganda. While the latter is accurate, we recognised that it could be too contentious for some editors and reviewers, so revised the initial title. Our&amp;nbsp;analysis was clearly bounded to describe the ways in which non-consensual persuasion tactics were employed in South Africa to promote uptake of the COVID-19 vaccines. There are several vulnerable categories (such as&amp;nbsp; teenagers), and we decided to focus on pregnant women, or women wanting to be mothers. We explored the local incentives and coercive measures (both consensual and non-consensual) that were used in South Africa during the COVID-19 event. Our manuscript then critiqued deceptive messaging on the safety of the Pfizer BioNTech Comirnaty® vaccine in a Western Cape government flyer. We also contrasted the South Africa Health Products Regulatory Authority&#39;s vaccine safety monitoring and reporting of adverse events following immunisation (SAHPRA AEFI) infrormation, contrasting how it (does not) report on outcomes for women&#39;s health, versus the Vaccine Adverse Report System (VAERS SA). If there is a methodological flaw in this approach, we are open to suggestions on improving it.&lt;/div&gt;&lt;div style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/h4&gt;&lt;/div&gt;&lt;div&gt;&lt;h4&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;That said, there are some changes that we would like an opportunity to argue against. For example, our&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;title might be criticised for not addressing harms to &quot;pregnant people&quot;. However, following such advice would distract from how genetic vaccines have proven especially damaging to&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;biological females. Likewise, our definition of&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&quot;health science communication&quot; can be criticised as a narrow one, especially for South Africa&#39;s myriad of health contexts. While this is true and we should gloss this limitation, we must also&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;prioritise what is core to focus on within&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;a 10,000 word limit. Expanding our focus to include a broad view of s&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;cience communication in SA&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;would inevitably require the removal of evidence related to the&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Organised Persuasive Communication&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;Framework&#39;s consensual versus non-consensual aspects. This would distract from our paper&#39;s core focus.&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;div&gt;The demands above may well be intended to create a more &#39;open minded&#39; and &#39;less binary&#39; paper. Nonetheless, should they be the primary reason for desk-rejection, they actually serve to undermine the broader academic discourse. Particularly the contribution our critique can play in supporting consideration for what constitutes genuine health communication in public health emergencies. Our paper&#39;s departure from a &quot;progressive&quot; imperative in its title and focused concepts, should not trump the paper&#39;s potential role for catalysing valuable discussions around medical/pharmaceutical propaganda. Especially around the consequences of health communications from SA authorities being deceptive, and potentially ill-suited for supporting informed consent. When combined with hefty financial reward incentives, and the coercion of losing one&#39;s livelihood, it seems irrational to argue against a non-consensual approach&#39;s existence. One&amp;nbsp; threatening pregnant women, their foetuses and babies. Surely, this warrants concern for academia in being apposite to genuine health communication via persuasion that allows for free and informed consent?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!?!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;h4&gt;&lt;div style=&quot;font-weight: 400;&quot;&gt;&lt;div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/h4&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;The inspiration for our original manuscript&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;The original paper was drafted for a special issue of the Transdisciplinary Research Journal of Southern Africa. It focuses on ‘&lt;a href=&quot;https://aosis.co.za/news-call-for-submissions-journal-for-transdisciplinary-research-in-southern-africa-special-issue/&quot; target=&quot;_blank&quot;&gt;Efficacy in health science communication in a post-pandemic age&lt;/a&gt;: Implications for Southern Africa’. &amp;nbsp;In a small way, our review article was inspired as a critique of two assumptions in the call for the special issue&#39;s opening paragraph: (1)&lt;i&gt; &#39;Much of the broad population and indeed more of the intelligentsia than one would imagine arguably remain to a greater or lesser degree sceptical of science&#39; &lt;/i&gt;and (2) &#39;&lt;i&gt;widespread suspicion of the origin of the virus seemingly fuelled by conspiracy theories, and of surprising levels of vaccine hesitancy voiced in a range of guises.&#39;&amp;nbsp;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;In the first place, there is a different between science, and following&amp;nbsp;&lt;a href=&quot;https://thenoakesfoundation.org/questioning-the-science/&quot; target=&quot;_blank&quot;&gt;The Science™&lt;/a&gt;&amp;nbsp;from a transglobal vaccine cartel. Individuals or groups did have sound scientific grounds to reject genetic vaccination. Indeed, individuals with PhDs were most likely to reject being &quot;vaccinated&quot; with a rushed and poorly-tested product. Secondly, the theory that COVID-19 emerged from the Wuhan lab is not a &quot;conspiracy theory&quot;, but just one of &lt;a href=&quot;https://www.travisnoakes.co.za/2024/07/content-suppression-techniques-against.html&quot; target=&quot;_blank&quot;&gt;four possible explanations&lt;/a&gt;&amp;nbsp;{the others being zoonotic (animal-to-human) origins, a&amp;nbsp;deliberate bio-weapon release, or a&amp;nbsp;prior endemicity ‘discovered’ by an outbreak of testing}.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;To flag the danger of assumptions, such as (1) and (2) being presented as &quot;fact&quot;, our review originally sought to spotlight a major, but neglected, issue in the health communication field: what is pharmaceutical propaganda and how does it differ from health communication. Media studies and health communication scholars should be exercising hyper-reflexivity in considering how the communications they study typically emerge in an externally directed field. Their field&#39;s solutionist emphasis is often driven by powerful external groupings’ motives, such as national government departments or multinational pharmaceutical companies. Such actors can be incentivised to manipulate messaging for reasons other than the simple concern to protect the public&#39;s wellbeing during a perceived crisis or emergency.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Our reflexive article was originally rejected without explanation by one of the special issue’s editors. I have &lt;a href=&quot;https://x.com/travisnoakes/status/1676583550332665857&quot; target=&quot;_blank&quot;&gt;tweeted about how such behaviour is unacceptable&lt;/a&gt;, plus&amp;nbsp;how AOSIS could update its policy to specify that an editor must provide explicit feedback on the reasons for desk rejection. This would meet COPE’s guideline that editors meet the needs of authors. Otherwise rejected authors might suspect that an AOSIS journal is not championing freedom of expression (and rather practicing scientific suppression) and is not precluding business needs (e.g. pharmaceutical support) from compromising intellectual standards. Tackling the danger of “successful” communications for dangerous pharmaceutical interventions as pharmaceutical propaganda is important, particularly given the rise of health authoritarianism during a “pandemic”.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Constructive criticism, plus new journal targets welcome?&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h4&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;We believe that our topic of how incentivization, coercion and deceptive COVID-19 messaging approximates a non-consensual approach is highly salient.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Without sound rationales for the rejections of our paper, academic social networks seem the most promising fora for receiving constructive criticism. Drs Robinson, Bell and I welcome such feedback.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Kindly also let me know in the comments below should you know of a health communication journal that supports COVID-19 dissent, champions academic freedom and would be interested in giving our submission a fair review?&lt;/span&gt;&lt;/h4&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Future research&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Dr Robinson &amp;amp; I are collating the accounts of prominent health experts who have described negotiating an academic journal publication firewall. There is an opportunity to formalise research into the problems of censorship and bias during COVID-19, documenting case studies and further evaluating what this tells us about academia.&amp;nbsp;We will work on a formal research proposal that also includes developing an original definition for dissenters&#39; &#39;academic journal publication firewall&#39; experience(s).&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/2950350764523850861/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2025/04/wanted-fair-critics-of-promoting.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/2950350764523850861'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/2950350764523850861'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2025/04/wanted-fair-critics-of-promoting.html' title='Wanted - Fair critics of &#39;Promoting Vaccines in South Africa: Consensual or Non-Consensual Health Science Communication?&#39; '/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdMhZnx9zP55cHKZWnJVP9TQv7SWq_-K9TAl7tTBFU1hj_mMGuXbCNVqZec2mIe8iPygJe1sS-W4bTptmA_-zyul0plgPYPcOR8OnkXZyY_cEhWDv5CO-9w92XiwKsg01PzdVKacmo0SLGxGJyQgQQ6CFJsBSaWwVCULyCI6yftrZWKluqkmgYAXb7ICSu/s72-w640-h360-c/Submission%20attempts%20versus%20journal%20publication%20firewall.png" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.9248685 18.4240553</georss:point><georss:box>-62.235102336178848 -16.7321947 -5.6146346638211568 53.5803053</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-1580684133196948238</id><published>2025-03-29T21:18:00.009+02:00</published><updated>2025-07-19T11:48:49.329+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="censorship"/><category scheme="http://www.blogger.com/atom/ns#" term="COVID-19"/><category scheme="http://www.blogger.com/atom/ns#" term="cyberbullying"/><category scheme="http://www.blogger.com/atom/ns#" term="disinfodemic"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Instagram"/><category scheme="http://www.blogger.com/atom/ns#" term="intellectual harassment"/><category scheme="http://www.blogger.com/atom/ns#" term="LinkedIn"/><category scheme="http://www.blogger.com/atom/ns#" term="META"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="social media"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter"/><title type='text'>Techniques for suppressing health experts&#39; social media accounts, part 1 - The Science™ versus key opinion leaders challenging the COVID-19 narrative</title><content type='html'>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #666666;&quot;&gt;Written for&amp;nbsp;researchers and others interested in the many techniques used to suppress COVID-19 dissidents&#39; social media accounts, and digital voices.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;There has been extensive censorship of legitimate, expert criticism during the COVID-19 event (&lt;a href=&quot;https://www.skyhorsepublishing.com/9781684513888/the-new-abnormal/&quot; target=&quot;_blank&quot;&gt;Kheriaty, 2022&lt;/a&gt;.&amp;nbsp;&lt;a href=&quot;https://doi.org/10.1007/s11024-022-09479-4&quot; target=&quot;_blank&quot;&gt;Shir-Raz et al, 2023&lt;/a&gt;.&amp;nbsp;&lt;a href=&quot;https://www.springerprofessional.de/en/covid-19-psychological-operations-and-the-war-for-technocracy/26991184&quot; target=&quot;_blank&quot;&gt;Hughes, 2024&lt;/a&gt;).&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;Such scientific suppression makes the&amp;nbsp;narrow frame visible for what the sponsors of global health authoritarianism permit for questioning of The Science™. In contrast to genuine science which innovates through critique, incorporated science does not welcome questioning. Like fascism, corporatist science views critiques of its interventions to be heresy. In the COVID-19 event, key opinion leaders who criticised the lack of scientific rigour behind public health measures (such as genetic vaccine mandates) were treated as heretics by a contemporary version of the Inquisition (&lt;a href=&quot;Malone et al., 2024&quot; target=&quot;_blank&quot;&gt;Malone et al., 2024&lt;/a&gt;). Dissidents were accused of sharing &quot;MDM&quot; (Misinformation, Disinformation and Malinformation) assumed to place the public&#39;s lives at risk. Particularly in prestigious medical universities, questioning the dictates of health authorities and their powerful sponsors was viewed as being unacceptable, completely outside an Overton Window that had become far more restrictive due to fear- mongering around a &quot;pandemic&quot; (see &lt;b&gt;Figure 1&lt;/b&gt;).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2zzuZrlPPHArVgvODJ1wzkBCowK6au8CePrfdx_xJ1cT6ytxftpCAilgxqHUus7l80y1efSvcW6Jyyv8jTlDHzMqPZZiHNMH45_TemqTM1QdiGc28TwUxLMPA0o2L0N5qS7s-qMEF6p0GX6GloQAXnceyrk69kpIkUN6trLgL-cVUIb8Hn12Og6st8UwU/s1741/Overton%20window%20for%20COVID-19%202025%20crop.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Narrowed Overton Window for COVID-19.&quot; border=&quot;0&quot; data-original-height=&quot;748&quot; data-original-width=&quot;1741&quot; height=&quot;274&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2zzuZrlPPHArVgvODJ1wzkBCowK6au8CePrfdx_xJ1cT6ytxftpCAilgxqHUus7l80y1efSvcW6Jyyv8jTlDHzMqPZZiHNMH45_TemqTM1QdiGc28TwUxLMPA0o2L0N5qS7s-qMEF6p0GX6GloQAXnceyrk69kpIkUN6trLgL-cVUIb8Hn12Og6st8UwU/w640-h274/Overton%20window%20for%20COVID-19%202025%20crop.png&quot; title=&quot;Narrowed Overton Window for COVID-19. Figures copied from (p137-138) in Dr Joseph Fraiman Fraiman, J. (2023). The dangers of self-censorship during the COVID-19 pandemic. In R. Malone, E. Dowd, &amp;amp; G. Fareed (Eds.), Canary In a Covid World: How Propaganda and Censorship Changed Our (My) World (pp. 132-147). Amazon Digital Services LLC - Kdp.&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;Figure 1.&lt;/b&gt; Narrowed Overton Window for COVID-19. Figures copied from (p137-138) in Dr Joseph Fraiman (2023). The dangers of self-censorship during the COVID-19 pandemic. In R. Malone, E. Dowd, &amp;amp; G. Fareed (Eds.), &lt;a href=&quot;https://www.amazon.com/Canary-Covid-World-Propaganda-Censorship/dp/1739052536&quot; target=&quot;_blank&quot;&gt;Canary In a Covid World: How Propaganda and Censorship Changed Our (My) World&lt;/a&gt; (pp. 132-147). Amazon Digital Services LLC - Kdp.&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Higher Education is particularly susceptible to this groupthink, as it lends itself to a purity spiral, which in turn contributes to the growing spiral of silence for &quot;unacceptable views&quot;. A &lt;i&gt;purity spiral&lt;/i&gt; is a form of groupthink in which it is more beneficial to hold some views than to not hold them. In a process of &lt;i&gt;moral outbidding&lt;/i&gt;, individual academics with more extreme views are rewarded. This was evidenced at universities where genetic vaccine proponents loudly supported the mandatory vaccination of students, despite them having minimal, if any, risk. In contrast, scholars expressing moderation, doubt or nuance faced ostracism as &quot;anti-vaxxers&quot;. In universities, there are strong social conformity factors within its tight-knit community. Grants, career-support and other forms of institutional support depend on collegiality and alignment with prevailing norms. Being labeled a contrarian for questioning a ‘sacred cow’, such as &quot;safe and effective&quot; genetic vaccines, is likely to jeopardise one’s reputation, and academic future. Academic disciplines coalesce around shared paradigms and axiomatic truths, routinely amplifying groupthink. Challenging reified understandings as shibboleths can lead to exclusion from conferences, journals and cost scholars departmental, faculty, and even university support. Particularly where powerful funders object to such dissent!&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Here, administrative orthodoxy can signal an “official” position for the university that chills debate. Dissenters fears of isolation and reprisal (such as poor evaluations and formal complaints for not following the official line) may convince them to self-censor. Particularly where the nonconformist assesses that the strength of opinion against his or her opinion is virulent, alongside high costs to expressing a disagreeable viewpoint- such as negotiating cancelation culture. Individuals who calculate that they have a low chance of success to convince others, and are likely to pay a steep price, self censor and contribute to the growing spiral of silence. The COVID-19 event serves as an excellent example for this growing spiral’s chilling effect versus free speech and independent enquiry.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;COVID-19 is highly pertinent for critiquing censorship in the Medical and Health Sciences. Particularly as it featured conflicts of interest that contributed to global health &quot;authorities&quot; policy guidance. Notably, the World Health Organisation promoted poorly substantiated and even unscientific guidelines (&lt;a href=&quot;https://journals.co.za/doi/abs/10.4102/td.v18i1.1263&quot; target=&quot;_blank&quot;&gt;Noakes et al., 2021&lt;/a&gt;), that merit being considered MDM.&amp;nbsp;In following such dictates from the top policy makers of the Global Public-Private Partnership (GPPP or G3P), most governments&#39; health authorities seemed to ignore key facts. Notably: i. COVID-19&amp;nbsp;risk was steeply age-stratified&amp;nbsp;&lt;span&gt;(&lt;a href=&quot;https://www.sciencedirect.com/science/article/pii/S1473309920302437&quot; target=&quot;_blank&quot;&gt;Verity et al, 2019&lt;/a&gt;. &lt;a href=&quot;https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0241824&quot; target=&quot;_blank&quot;&gt;Ho et al, 2020&lt;/a&gt;.&amp;nbsp;&lt;a href=&quot;https://link.springer.com/article/10.1007/s10654-021-00732-w&quot; target=&quot;_blank&quot;&gt;Bergman et al, 2021&lt;/a&gt;)&lt;/span&gt;; ii. Prior COVID-19 infection can provide substantial immunity&amp;nbsp;&lt;span&gt;(&lt;a href=&quot;https://onlinelibrary.wiley.com/doi/10.1111/imm.13475&quot; target=&quot;_blank&quot;&gt;Nattrass et al., 2021&lt;/a&gt;)&lt;/span&gt;; iii. COVID-19&amp;nbsp;genetic vaccines did not stop disease transmission (&lt;a href=&quot;https://www.nejm.org/doi/full/10.1056/NEJMoa2116597&quot; target=&quot;_blank&quot;&gt;Eyre et al. 2022&lt;/a&gt;, &lt;a href=&quot;https://pmc.ncbi.nlm.nih.gov/articles/PMC8554481/&quot; target=&quot;_blank&quot;&gt;Wilder-Smith, 2022&lt;/a&gt;); iv. mass-masking was ineffective&amp;nbsp;&lt;span&gt;(&lt;a href=&quot;https://www.cochrane.org/CD006207/ARI_do-physical-measures-such-hand-washing-or-wearing-masks-stop-or-slow-down-spread-respiratory-viruses&quot; target=&quot;_blank&quot;&gt;Jefferson et al., 2023&lt;/a&gt;. &lt;a href=&quot;https://pmc.ncbi.nlm.nih.gov/articles/PMC11077603/&quot; target=&quot;_blank&quot;&gt;Halperin, 2024&lt;/a&gt;)&lt;/span&gt;; v. school closures were unwarranted&amp;nbsp;&lt;span&gt;(&lt;a href=&quot;https://royalsocietypublishing.org/doi/10.1098/rsta.2021.0124&quot; target=&quot;_blank&quot;&gt;Wu et al., 2021&lt;/a&gt;)&lt;/span&gt;; and, vi. there were better alternatives to lengthy, whole-society lockdowns&amp;nbsp;&lt;span&gt;(&lt;a href=&quot;https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3838587&quot; target=&quot;_blank&quot;&gt;Coccia, 2021&lt;/a&gt;, &lt;a href=&quot;https://e-hir.org/journal/view.php?doi=10.4258/hir.2021.27.4.325&quot; target=&quot;_blank&quot;&gt;Gandhi and Venkatesh, 2021&lt;/a&gt;.&amp;nbsp;&lt;a href=&quot;https://link.springer.com/article/10.1007/s11127-024-01216-7&quot; target=&quot;_blank&quot;&gt;Herby et al., 2024&lt;/a&gt;). Both international policy makers&#39; and local h&lt;/span&gt;ealth authorities&#39; flawed guidance must be open debate and rigorous critique. If public health interventions had been adapted to such key facts during the COVID-19 event, the resultant revised guidance could well have contributed to better social-, health-, and economic outcomes for billions of people!&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;This post focuses on six types of suppression techniques that were used against dissenting accounts whose voices are deemed illegitimate &quot;disinformation&quot; spreaders by the Global public-Private Partnerships (G3P)-sponsored&amp;nbsp;industrial censorship complex. This an important concern, since claims that the suppression of free speech&#39;s digital&amp;nbsp;reach can &quot;protect public safety&quot; were proved false during COVID-19. A case in point is the censorship of criticism against employee&#39;s vaccine mandates. North American employers&#39; mandates are directly linked to excess disabilities and deaths for hundreds and thousands of working-age employees (&lt;a href=&quot;https://www.skyhorsepublishing.com/9781648210730/cause-unknown/&quot; target=&quot;_blank&quot;&gt;Dowd, 2024&lt;/a&gt;). Deceptive censorship of individuals&#39; reports of vaccine injuries as &quot;malinformation&quot;, or automatically-labelling criticism of Operation Warp Speed as &quot;disinformation&quot;, would hamper US employee&#39;s abilities to make fully-informed decisions on the safety of genetic vaccines. Such deleterious censorship must be critically examined by academics. In contrast, &#39;Disinformation-for-hire&#39; scholars (&lt;a href=&quot;https://journals.sagepub.com/doi/abs/10.1177/20563051231224732&quot; target=&quot;_blank&quot;&gt;Harsin, 2024&lt;/a&gt;) will no doubt remain safely ensconced behind their profitable MDM blinkers.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;This post is the first in a series that spotlights the myriad of account suppression techniques that exist. For each, examples of censorship against health experts&#39; opinions are provided. Hopefully, readers can then better appreciate the asymmetric struggle that dissidents face when their accounts are targeted by the&amp;nbsp;&lt;a href=&quot;https://adfinternational.org/commentary/what-is-censorship-industrial-complex&quot; target=&quot;_blank&quot;&gt;censorship industrial complex&lt;/a&gt;&amp;nbsp;with a myriad of these strategies spanning multiple social media platforms:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;Practices for @Account suppression&lt;/h2&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;#1 Deception - users are not alerted to unconstitutional limitations on their free speech&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;div&gt;Social media users might assume that their constitutional right to free speech&amp;nbsp;as citizens will be protected within, and across, digital platforms. However, global platforms may not support such rights in practice. No social media company openly discloses the extent to which users&#39; accounts have, and are, being censored for expressing opinions on controversial topics. Nor do these platforms explicitly warn users what they consider to be impermissible opinions. Consequently, their users are not be forewarned regarding what may result in censorship. For example, many COVID19 dissidents were surprised that their legitimate critiques&amp;nbsp;could result in account suspensions and bans (&lt;a href=&quot;https://link.springer.com/article/10.1007/s11024-022-09479-4&quot; target=&quot;_blank&quot;&gt;Shir-Raz, 2022&lt;/a&gt;). Typically, such censorship was justified by Facebook, Google, LinkedIn, Tik Tok, Twitter and YouTube, due to users&#39; violation of &quot;community rules&quot;. In most countries, the freedom of speech is a citizen’s constitutional right that should be illegal to over-ride. It should be deeply concerning that such protections were not supported in the Fourth Estate of the digital public square during the COVID-19 event. Instead, the supra-national interests of health authoritarians came to supersede national laws to prevent (unproven) harms. This pattern of censorship is noticeable in many other scientific issue arenas, ranging from criticism against man-made climate change to skeptics challenging transgender medical ideology.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;#2 Cyberstalking - facilitating the virtual and physical targeting of dissidents&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;An individual who exercises his or her voice against official COVID-19 narratives can expect to receive both legitimate, pro-social and unfair, anti-social criticism. While cyberstalking should be illegal, social media platforms readily facilitate the stalking and cyber-harassment of dissidents. An extreme example of this was Dr Christine Cotton&#39;s experiences on LinkedIn. Dr Cotton was an early whistleblower (Jan, 2022) against Pfizer&#39;s COVID-19 clinical trial&#39;s false claims of 95% efficacy for its treatments.&amp;nbsp;&lt;/div&gt;&lt;div&gt;Her report identified the presence of bias and major deviations from good clinical practice. In press interviews, she reported that the trial did ‘not support validity in terms of efficacy, immunogenicity and tolerance of the results provided in the various Pfizer clinical reports that were examined in the emergency by the various health authorities. Christine shared this report with her professional network on LinkedIn, asking for feedback from former contacts in the pharmaceutical industry. The reception was mostly positive, but it and related posts were subject to a rapid content takedown by LinkedIn, ostensibly for not meeting community standards. At the same time, her profile became hypersurveiled. It attracted unexpected visits from 133 lawyers, the Ministry of Defence, employees of the US Department of State, the World Health Organisation, and others (p142). None of these profile viewers contacted her directly.&lt;br /&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;#3 Othering - enabling public character assassination via cyber smears&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;i&gt;Othering&lt;/i&gt; is a process whereby individuals or groups are defined, labeled or targeted as not fitting in within the norms of a social group. This influences how people perceive and treat those who are viewed as being part of the in-group, versus those in an out-group. At a small scale, othering can result in a scholar being ostracised from their university department following academic mobbing and online academic bullying (&lt;a href=&quot;https://doi.org/10.1016/j.heliyon.2021.e06326&quot; target=&quot;_blank&quot;&gt;Noakes &amp;amp; Noakes, 2021&lt;/a&gt;). At a large scale, othering entails a few dissidents on social media platforms being targeted for hypercriticism by gangstalkers.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Cyber gangstalking is a process of cyber harassment that follows cyberstalking, whereby a group of people target an individual online to harass him or her. Such attacks can involve gossip, teasing and bad-jacketing, repeated intimidation and threats, plus other fear-inducing behaviours. Skeptics&#39; critical contributions can become swamped by pre-bunkers and fellow status-quo defenders. Such pseudo-skeptics may be sponsored to trivialise dissenters&#39; critiques, thereby contributing to a fact choke against unorthodox opinions.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div&gt;In Dr Christine Cotton&#39;s &lt;a href=&quot;https://christinecotton.com/support-me&quot; target=&quot;_blank&quot;&gt;case&lt;/a&gt; in March 2022 her&amp;nbsp; name was disclosed in a list as part of a French Senate investigation into adverse vaccine events. A ‘veritable horde of trolls seemingly emerged out of nowhere and started attacking’ her ‘relentlessly’ (p143). These trolls were inter-connected through subscribing to each others’ accounts, which allowed them to synchronise their attacks. They attempted to propagate as much negative information on Dr Cotton as possible in a ‘Twitter harassment scene’. Emboldened by their anonymity, the self-proclaimed “immense scientists” with masters in virology, vaccines, clinical research and biostatistics, launched a character assassination. They attacked her credentials and work history, whilst creating false associations (“Freemasonry” and “Illuminati”).&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This suggests how identity politics sensibilities and slurs are readily misused against renegades. In the US, those questioning COVID-19 policies were labelled “far right” or “fascist”, despite promoting a libertarian critique of healthcare authoritarianism! In addition, orchestrators of cybermobbing tagged dissidents accounts to be those of someone who is: &#39;anti-science&#39;, &#39;an anti-vaxxer&#39;, &#39;biased&#39;, &#39;charlatan&#39;, &#39;celebrity scientist&#39;, &#39;conspiracy theorist&#39;, &#39;controversial&#39;, &#39;COVID-19 denier&#39;, &#39;disgraced scientist&#39;, &#39;formerly-respected&#39;, &#39;fringe expert&#39;, &#39;grifter&#39;, &#39;narcissist with a Galileo complex&#39;, &#39;pseudo-scientist&#39;, &#39;quack&#39;, &#39;salesman&#39;, &#39;sell-out&#39; and &#39;virus&#39;, amongst other perjoratives.&amp;nbsp; Such terms are used as a pre-emptive cognitive vaccine whose hypnotic language patterns (&quot;conspiracy theorist&quot;) are intended to thwart audience engagement with critical perspectives. Likewise, these repeatedly used terms help grow a digital pillory that becomes foregrounded in the pattern of automated suggestions in search engine results.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In this&amp;nbsp;&lt;a href=&quot;https://x.com/i/broadcasts/1YqKDkMjwmexV&quot; target=&quot;_blank&quot;&gt;Council of the Cancelled&lt;/a&gt;, Mike Benz,&amp;nbsp;Prof Jay Bhattacharya, Nicole Shanahan and Dr Eric Weinstein speculate about hidden censorship architectures. One example is Google&#39;s automated tagging for &quot;controversial&quot; public figures. These can automatically feature in major mainstream news articles featuring COVID-19 dissidents. This is not merely a visual tag, but a cognitive tag. It marks &quot;controversial&quot; individuals with a contemporary (digital) scarlet letter.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In Dr Cotton&#39;s case, some trolls smeared her work in raising awareness of associations for the vaccine injured to be helping “anti-vaccine conspiracy sites”. She shares many cases of these injuries in&amp;nbsp;&lt;a href=&quot;https://christinecotton.com/support-me&quot; target=&quot;_blank&quot;&gt;her book&lt;/a&gt;&amp;nbsp;and was amazed at the lack of empathy that Twitter users showed not just her, but also those suffering debilitating injuries.&amp;nbsp;In response she featured screenshots of select insults on her blog at&amp;nbsp;&lt;a href=&quot;https://christinecotton.com/critics&quot; target=&quot;_blank&quot;&gt;https://christinecotton.com/critics&lt;/a&gt;&amp;nbsp;and blocked ‘hundreds of accounts’ online. In checking the Twitter profiles attacking her, she noticed that many with ‘behavioural issues were closeby’. Dr Cotton hired a ‘body and mind’ guard from a security company for 24-hour protection. Her account was reported for “homophobia”, which led to its temporary closing. After enduring several months of cyber-harassment by groups, a behaviour that can be severely be punished by EU law, Dr Cotton decided to file complaints against some of them. Christine crowdfunded filing legal complaints against Twitter harassers from a wide variety of countries. This complaint sought to work around how cyber harassers think anonymity is suitable for avoiding lawsuits for defamation, harassment and public insults.&lt;br /&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;#4 Not blocking impersonators or preventing brandjacked accounts&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;caret-color: rgb(61, 133, 198);&quot;&gt;Impersonator&#39;s accounts claiming to belong to dissidents can quickly p&lt;/span&gt;&lt;span&gt;op up on social media platforms. While a few may be genuine parodies, others serve identity jacking purposes. These may serve criminal purposes, in which scammers use &lt;a href=&quot;https://reportfakeendorsement.com/&quot; target=&quot;_blank&quot;&gt;fake celebrity endorsements&lt;/a&gt; to phish &quot;customers&quot; financial details for fraud. Alternately, intelligence services may use brandjacking for covert character assassination smears against dissidents.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;caret-color: rgb(61, 133, 198);&quot;&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;caret-color: rgb(61, 133, 198);&quot;&gt;&lt;span&gt;The independent investigative journalist, &lt;a href=&quot;https://unlimitedhangout.com/author/whitney-webb/&quot; target=&quot;_blank&quot;&gt;Whitney Webb&lt;/a&gt;, has tweeted about her ongoing&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(61, 133, 198);&quot;&gt;YouTube&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(61, 133, 198);&quot;&gt;experience of having her channel&#39;s content buried under a &lt;a href=&quot;https://www.travisnoakes.co.za/2024/07/content-suppression-techniques-against.html&quot; target=&quot;_blank&quot;&gt;fact choke&lt;/a&gt;&amp;nbsp;of short videos created by other accounts:&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span&gt;&lt;h4 style=&quot;font-weight: 400;&quot;&gt;&lt;span style=&quot;caret-color: rgb(61, 133, 198); font-weight: 400;&quot;&gt;&lt;blockquote class=&quot;twitter-tweet&quot;&gt;&lt;p dir=&quot;ltr&quot; lang=&quot;en&quot;&gt;Instead of blanket censorship, I am having YouTube bury all my actual interviews/content with videos that use short, out of context clips from interviews to promote things I would never and have never said. Below is what happens when you search my name on YouTube, every single… &lt;a href=&quot;https://t.co/xNGrfMMq52&quot;&gt;pic.twitter.com/xNGrfMMq52&lt;/a&gt;&lt;/p&gt;— Whitney Webb (@_whitneywebb) &lt;a href=&quot;https://twitter.com/_whitneywebb/status/1822998570036830295?ref_src=twsrc%5Etfw&quot;&gt;August 12, 2024&lt;/a&gt;&lt;/blockquote&gt; &lt;script async=&quot;&quot; charset=&quot;utf-8&quot; src=&quot;https://platform.twitter.com/widgets.js&quot;&gt;&lt;/script&gt;  
&lt;/span&gt;&lt;/h4&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Whether such activities are from&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;intelligence&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;services or cybercriminals, they are very hard for dissidents and/or their representatives to respond effectively against. Popular social media companies (notably META, X and TikTok) seldom respond quickly to scams, or to the digital &quot;repersoning&quot; discussed in a &lt;a href=&quot;https://corbettreport.com/repersoning-whitney-webb/&quot; target=&quot;_blank&quot;&gt;Corbett Report&lt;/a&gt;&amp;nbsp;discussion between James&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Corbett and&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://unlimitedhangout.com/2024/12/press/the-corbett-report-2/&quot; style=&quot;font-weight: 400;&quot; target=&quot;_blank&quot;&gt;Whitney Webb&lt;/a&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;In Corbett&#39;s case, after his account was scrubbed from YouTube, many accounts featuring his identity started &lt;/span&gt;&lt;a href=&quot;https://corbettreport.com/futurecensorship/&quot; style=&quot;font-weight: 400;&quot; target=&quot;_blank&quot;&gt;cropping up there&lt;/a&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;. In Webb&#39;s case, she does not have a public profile outside of X, but these were created featuring her identity on Facebook and YouTube. &quot;Her&quot; channels clipped old interviews she did and edited them into documentaries on material Whitney has never publicly spoken about, such as Bitcoin and CERN. They also misrepresented her views on the transnational power structure behind the COVID-19 event, suggesting she held just Emmanuel Macron and Klaus Schwab responsible for driving it. They used AI thumbnails of her, and superimposed her own words in the interviews.&amp;nbsp;Such content proved popular and became widely reshared via legitimate accounts, pointing to the difficulty of dissidents countering it. She could not get Facebook to take down the accounts, without supplying a&amp;nbsp;government-issued ID to verify her own identity.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;p&gt;&lt;span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Digital platforms may be disinterested in offering genuine support- they may not take any corrective action when following proxy orders from the&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;a href=&quot;https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4593599&quot; target=&quot;_blank&quot;&gt;US Department of State (aka &#39;jawboning&#39;&lt;/a&gt;)&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;or&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;members of the &lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Five_Eyes&quot; style=&quot;font-weight: 400;&quot; target=&quot;_blank&quot;&gt;Five Eyes&lt;/a&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt; (FVEY) intelligence agency.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;In stark contrast to marginalised dissenters, VIPS in multinationals enjoy access to online threat protection services (such as &lt;a href=&quot;https://www.zerofox.com/&quot; target=&quot;_blank&quot;&gt;ZeroFox&lt;/a&gt;) for executives that cover brandjacking and over 100 other cybercriminal use-cases.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;#5 Filtering an account&#39;s visibility through ghostbanning&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;As the Google Leaks (2019) and Facebook- (2021) and Twitter Files (2022) revelations have spotlighted, s&lt;span&gt;ocial media platforms have numerous algorithmic censorship options, such as the filtering the&amp;nbsp;&lt;/span&gt;&lt;span&gt;visibility of users&#39;&amp;nbsp;&lt;/span&gt;&lt;span&gt;accounts. Targeted users may be isolated and throttled for breaking &quot;community standards&quot; or government censorship rules. During the&amp;nbsp;&lt;/span&gt;&lt;span&gt;COVID-19 event, dissenters&#39; accounts were p&lt;/span&gt;&lt;span&gt;laced in silos,&amp;nbsp;&lt;/span&gt;&lt;span&gt;de-boosted, and also subject to r&lt;/span&gt;&lt;span&gt;eply de-boosting. Contrarians&#39; accounts were subject to &lt;/span&gt;ghostbanning (AKA shadow-banning)- this practice will reduce an account’s visibility or reach secretly, without explicitly notifying its owner. Ghostbanning limits who can see the posts, comments, or interactions. This includes muting replies and excluding targeted accounts&#39; results under trends, hashtags, searches and in followers’ feeds (except where users seek a &amp;nbsp;filtered account&#39;s profile directly). Such suppression effectively silences a user&#39;s digital voice, whilst he or she continues to post under the illusion of normal activity. Ghostbanning is thus a &quot;stealth censorship&quot; tactic linked to content moderation agendas.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;This term gained prominence with the example of the &lt;a href=&quot;https://gbdeclaration.org&quot; target=&quot;_blank&quot;&gt;Great Barrington Declaration&lt;/a&gt;&#39;s authors, Professors Jay Bhattacharya, Martin Kulldorff, and Sunetra Gupta. Published on October 4, 2020, this public statement and proposal flagged grave concerns about the damaging physical and mental health impacts of the dominant COVID-19 policies. It argued that an approach for focused protection should rather be followed than&amp;nbsp;blanket lockdowns, and that&amp;nbsp;allowing controlled spread among low-risk groups would eventually result in herd immunity. Ten days later, a counter- &lt;a href=&quot;https://www.johnsnowmemo.com/john-snow-memo.html&quot; target=&quot;_blank&quot;&gt;John Snow Memorandum&lt;/a&gt; was published in defence of the official COVID-19 narrative&#39;s policies. Mainstream media and health authorities amplified it, as did social media given the memorandum&#39;s alignment with prevailing platform policies against &quot;misinformation&quot; circa-2020. In contrast,&amp;nbsp;&amp;nbsp;the Great Barrington Declaration was targeted indirectly through platform actions against its proponents and related content:&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Stanford Professor of Medicine, Dr Jay Bhattacharya’s Twitter account was revealed (via the 2022 &lt;a href=&quot;https://x.com/mtaibbi/status/1598822959866683394?lang=en&quot; target=&quot;_blank&quot;&gt;Twitter Files&lt;/a&gt;) to have been blacklisted, reducing its visibility. His tweets questioning lockdown efficacy and vaccine mandates were subject to &lt;i&gt;algorithmic suppression&lt;/i&gt;. Algorithms could flag his offending content with terms like “Visibility Filtering” (VF) or “Do Not Amplify”, reducing its visibility. For instance, Bhattacharya reported that his tweets about the Declaration and seroprevalence studies (showing wider COVID-19 spread than official numbers suggested) were throttled. Journalist Matt Taibbi&#39;s reporting on the &quot;Twitter Files&quot; leaks confirmed that Twitter had blacklisted Prof Bhattacharya&#39;s account, limiting its reach due to his contrarian stance. YouTube also removed videos in which he featured, such as interviews in which he criticised lockdown policies.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The epidemiologist and biostatistician, Prof Kulldorff observed that social media censorship stifled opportunities for scientific debate. He experienced direct censorship on multiple platforms, which included shadowbans. Twitter temporarily suspended his account in 2021 for tweeting that not everyone needed the COVID-19 vaccine (&#39;Those with prior natural infection do not need it. Nor children&#39;). Posts on X and web reports indicate Kulldorff was shadowbanned beyond this month-long suspension. The Twitter Files, released in 2022, revealed he was blacklisted, meaning his tweets’ visibility was algorithmically reduced. Twitter suppressed Kulldorff&#39;s accurate genetic vaccine critique, preventing comments and likes. Internal Twitter flags like “Trends Blacklisted” or “Search Blacklisted” (leaked during the 2020 Twitter hack) suggest Kulldorff&#39;s&amp;nbsp;account was throttled in searches and trends, a hallmark of shadowbanning where reach is curtailed without notification. Algorithmic deamplification excluded Prof Kulldorff&#39;s tweets from being seen under trends, search results, or followers’ feeds- except where users sought his profile directly. This reflects how social media companies may apply visibility filters (such as a Not Safe For Work (NSFW) view). Kulldorff also flagged that LinkedIn’s censorship pushed him to platforms like Gab, implying a chilling effect on his professional network presence.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;An Oxford University epidemiologist, Professor Gupta faced less overt account-level censorship, but still had to negotiate content suppression. Her interviews and posts on Twitter advocating for herd immunity via natural infection amongst the young and healthy were often flagged, or down-ranked.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;h4&gt;&lt;/h4&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;#6 Penalising accounts that share COVID-19 &quot;misinformation&quot;&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span&gt;&lt;span&gt;In addition to ghostbanning, social media platforms could target accounts for sharing &lt;/span&gt;&lt;/span&gt;content on COVID-19 that contradicted guidance from the Global Private Partnership (GP3)&#39;s macro-level stakeholders, such as the Centre for Disease Control or the World Health Organisation. In Twitter&#39;s case, it introduced a specific COVID-19 misinformation policy in March, 2020, which prohibited claims about transmission, treatments, vaccines, or public health measures that the COVID-19 hegemony deemed “false or misleading.” Such content either had warning labels added to it, or was automatically deleted:&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;div&gt;Tweets with suspected MDM were tagged with warnings like “This claim about COVID-19 is disputed” or with labels linking to curated &quot;fact-checks&quot; on G3P health authority pages. This was intended to reduce a tweet’s credibility without immediate removal, whilst also diminishing its poster&#39;s integrity.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Tweets that broke this policy were deleted outright after flagging by automated systems or human moderators. For instance, &lt;a href=&quot;https://x.com/AlexBerenson&quot; target=&quot;_blank&quot;&gt;Alex Berenson&lt;/a&gt;’s tweets questioning lockdown efficacy were removed, contributing to his eventual ban in August 2021. In Dr Christine Cotton&#39;s case, Twitter classified her account as “sensitive content”. It gradually lost visibility with the tens of thousands of followers it had attracted. In response, she created a new account to begin ‘from scratch’ in August 2022. The Twitter Files revealed that such censorship was linked to United States government requests (notably from the Joe Biden administration and Federal Bureau of Investigations). For example, 250,000 tweets flagged by Stanford’s Virality Project in 2021 were removed by Twitter.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span&gt;&lt;span&gt;In March 2020, Meta expanded its misinformation policies to target COVID-19-related MDM.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;Facebook and Instagram applied c&lt;/span&gt;&lt;/span&gt;ontent labelling and down-ranking, with posts allegedly featuring MDM being labeled with warnings (such as &#39;False Information&#39; or &#39;See why health experts say this is wrong&#39;) that linked to official sources. Such posts were also down-ranked in the News Feed to reduce their visibility.&amp;nbsp;Users were notified of violations and warned that continued sharing could further limit reach or lead to harsher action. In late 2021, down-ranking also became applied to “vaccine-skeptical” content not explicitly violating rules but potentially discouraging vaccination.&amp;nbsp;Posts violating policies were removed outright.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span&gt;&lt;span&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;With LinkedIn&#39;s smaller, professional user base, and the platform&#39;s lower emphasis on real-time virality, led it to prefer the outright removal of accounts over throttling via shadow-bans. Accounts identified as posting MDM could face temporary limits, such as restricted posting privileges or inability to share articles for a set period. LinkedIn users received warnings after a violation, often with a chance to delete the offending post themselves to avoid further action. Such notices cited the policy breach, linking to LinkedIn’s stance on official health sources. This approach to COVID-19 MDM followed LinkedIn’s broader moderation tactics for policy violations.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In Dr Cotton&#39;s case, she shared her Pfizer COVID-19 clinical trial&#39;s critique on LinkedIn to get feedback from her professional network of former contacts in the pharmaceutical industry. This first post was removed within 24 hours (p.142), and her second within an hour. This hampered her ability to have a debate on the methodology of Pfizer&#39;s trial with competent people. Prof Kulldorff also had two posts deleted in August 2021: one linking to an interview on vaccine mandate risks and another reposting Icelandic health official comments on herd immunity.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;&lt;span&gt;&lt;div style=&quot;font-weight: 400;&quot;&gt;&lt;span&gt;Accounts that posted contents with links to external, alternate, independent media (such as Substack articles or videos on Rumble) also saw such posts down-ranked, hidden or automatically removed.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;This is the first post on techniques for suppressing health experts&#39; social media accounts (and the second on COVID-19 censorship in the &lt;a href=&quot;https://www.travisnoakes.co.za/2024/07/content-suppression-techniques-against.html#google_vignette&quot; target=&quot;_blank&quot;&gt;Fifth Estate&lt;/a&gt;).&amp;nbsp;&lt;/span&gt;&lt;span&gt;My next addresses &lt;a href=&quot;https://www.travisnoakes.co.za/2025/06/techniques-for-suppressing-health.html&quot; target=&quot;_blank&quot;&gt;more extreme measures&lt;/a&gt; against&amp;nbsp;&lt;/span&gt;COVID-19 dissidents.&amp;nbsp;Do follow me on X to be alerted when new posts are published. &lt;br /&gt;&lt;br /&gt;Do share your views by commenting below, or reply to this tweet thread at &lt;a href=&quot;https://x.com/travisnoakes/status/1906250555564900710&quot; target=&quot;_blank&quot;&gt;https://x.com/travisnoakes/status/1906250555564900710&lt;/a&gt;.&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/1580684133196948238/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2025/03/techniques-for-suppressing-health.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/1580684133196948238'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/1580684133196948238'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2025/03/techniques-for-suppressing-health.html' title='Techniques for suppressing health experts&#39; social media accounts, part 1 - The Science™ versus key opinion leaders challenging the COVID-19 narrative'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2zzuZrlPPHArVgvODJ1wzkBCowK6au8CePrfdx_xJ1cT6ytxftpCAilgxqHUus7l80y1efSvcW6Jyyv8jTlDHzMqPZZiHNMH45_TemqTM1QdiGc28TwUxLMPA0o2L0N5qS7s-qMEF6p0GX6GloQAXnceyrk69kpIkUN6trLgL-cVUIb8Hn12Og6st8UwU/s72-w640-h274-c/Overton%20window%20for%20COVID-19%202025%20crop.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-6371371650436141862</id><published>2025-02-05T12:40:00.035+02:00</published><updated>2025-02-25T12:35:32.593+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="brandjacking"/><category scheme="http://www.blogger.com/atom/ns#" term="cybercrime"/><category scheme="http://www.blogger.com/atom/ns#" term="digital_crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="Instagram"/><category scheme="http://www.blogger.com/atom/ns#" term="META"/><category scheme="http://www.blogger.com/atom/ns#" term="scams"/><category scheme="http://www.blogger.com/atom/ns#" term="social media"/><title type='text'>Celebrities cannot stop their brandjacking, since many authorities are unable to help!</title><content type='html'>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #666666;&quot;&gt;Written for cyber- and digital crime researchers and reporters. Plus, brandjacked celebrities and their representatives.&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;color: #666666; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div&gt;In discussion with reporters and PR experts, most seemed to be under the mistaken impression that celebrities enjoy a viable route to stop their brandjacking in scam adverts on social media platforms. I wrote this post to explain that although SA public figures seem well-resourced and influential, none have a viable route to prosecuting their brandjackers due to an absence of support from many authorities:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;Since 2019, &lt;a href=&quot;https://thenoakesfoundation.org/&quot; target=&quot;_blank&quot;&gt;The Noakes Foundation&lt;/a&gt; has supported research into the brandjacking of influential celebrities&#39; reputations on social media, and other poorly moderated platforms. The Fake Celebrity Endorsement (FCE) research team is documenting how this digital crime is an inscrutable, traumatic experience for celebrities, their representatives, and the financial victims who &lt;a href=&quot;https://reportfakeendorsement.com/&quot; target=&quot;_blank&quot;&gt;report being conned by fake endorsements&lt;/a&gt;. In addition to being traumatised by being featured in fake adverts, microcelebrities are further traumatised by the many reports from fans of their upset at being conned. A few celebrities have become targets for recurring cybervictimisation with no recourse, resulting in repeat trauma.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The FCE distinguishes &#39;digital crimes&#39; from &#39;cybercrimes&#39;: Micro-fraudsters typically target private individuals with limited access to resources for combating digital crime. This contrasts to cybercrimes in which corporations are attacked (&lt;a href=&quot;https://www.theepochtimes.com/epochtv/how-ai-is-fueling-an-explosion-of-digital-crime-chris-olson-5707509&quot; target=&quot;_blank&quot;&gt;Olson, 2024&lt;/a&gt;). They are often well positioned to support their employees with costly resources that private individuals cannot afford. Research into the latter is well-resourced, as is interventions to stop it. By contrast, the fighting of digital crimes that impact private citizens are poorly resourced, particularly in the Global South. In the case of fake celebrity endorsements, press reports of this scam suggest that the problem grows each year- eleven South African celebrities fell victim to it in 2024, up from two in the first reports of 2014.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Fake celebrity endorsement is a digital crime that may require many authorities in society to combat it. Below is a &lt;b&gt;list &lt;/b&gt;of the roleplayers that might potentially help prevent digital crimes:&lt;/p&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;1) celebrity influencers,&lt;/div&gt;&lt;div&gt;2) financial victims,&amp;nbsp;&lt;/div&gt;&lt;div&gt;3) social media advertising providers,&lt;/div&gt;&lt;div&gt;4) Poorly-moderated content hosts,&amp;nbsp;&lt;/div&gt;&lt;div&gt;5) banks,&amp;nbsp;&lt;/div&gt;&lt;div&gt;6) cyber defence companies,&lt;/div&gt;&lt;div&gt;7) cybercrime reporters and statistics gatherers (industry researchers),&lt;/div&gt;&lt;div&gt;8) cybercrime educators,&amp;nbsp;&lt;/div&gt;&lt;div&gt;9) anti-crime activists (PBOs and NGOs),&amp;nbsp;&lt;/div&gt;&lt;div&gt;10) social media platforms (eg Big Tech),&lt;/div&gt;&lt;div&gt;11) financial investors,&amp;nbsp;&lt;/div&gt;&lt;div&gt;12) government politicians,&lt;/div&gt;&lt;div&gt;13) the police,&amp;nbsp;&lt;/div&gt;&lt;div&gt;14) international law enforcement,&lt;/div&gt;&lt;div&gt;15) local law,&lt;/div&gt;&lt;div&gt;16) Higher Education and its funders,&lt;/div&gt;&lt;div&gt;17) Product regulators.&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;While digital crime victims might expect support from these thirteen other role-players, this post spotlights their limitations. Some simply are unable to prioritise fighting fake celebrity endorsements, while others&#39; interests may not be served in tackling this crime!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj55nIM3k9kReqFvScXna6EnNnvKn5Y65bwEy3tG5D2Lx5z6s8i7OhFBSZd9PcZEvv3xL8vh_2HbIMA8LtlfEL63q6E7QCWqlVpHsUJoYQtzmu4wK2M4-1-8nYIxIKFDvA02GgH4a5_Ssq9JGzL3uHSxW3rUuDLNRf5mPsxy5cdwHlGoJwdUJDw0tnqnKqD/s3296/Map%201%20of%20the%20brandjacking%20crime.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Figure 1. The brandjacking digital crime process&quot; border=&quot;0&quot; data-original-height=&quot;703&quot; data-original-width=&quot;3296&quot; height=&quot;136&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj55nIM3k9kReqFvScXna6EnNnvKn5Y65bwEy3tG5D2Lx5z6s8i7OhFBSZd9PcZEvv3xL8vh_2HbIMA8LtlfEL63q6E7QCWqlVpHsUJoYQtzmu4wK2M4-1-8nYIxIKFDvA02GgH4a5_Ssq9JGzL3uHSxW3rUuDLNRf5mPsxy5cdwHlGoJwdUJDw0tnqnKqD/w640-h136/Map%201%20of%20the%20brandjacking%20crime.png&quot; title=&quot;Figure 1. The brandjacking digital crime process&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;i style=&quot;text-align: left;&quot;&gt;Figure 1 - the brandjacking digital crime process&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Figure 1&lt;span style=&quot;font-weight: 400;&quot;&gt; shows a simplified process of the fake endorsement phishing scam. The authors of this digital crime are unknown- they can range from gangs, to the invisible threat of AI and bot armies, to even military intelligence agencies raising funds. Not only do these cybercriminals exploit scamming ecosystems inside popular social media platforms, they also exploit related&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;ecosystems on platforms such as&amp;nbsp;&lt;a href=&quot;https://www.wired.com/story/the-largest-illicit-online-marketplace-ever-is-growing-at-an-alarming-rate/&quot; target=&quot;_blank&quot;&gt;Huione Guarantee&lt;/a&gt;&amp;nbsp;(now &quot;Haowang Guarantee&quot;), a&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Cambodian conglomerate&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;. It&amp;nbsp;offers a messaging app, stable coin, and crypto exchange, and has facilitated $2 billion in transactions. Such platforms are integral to the industrialisation and scaling-up of online scams, for example through supporting the outsourcing of scammers&#39; money-laundering activities (&lt;a href=&quot;https://www.economist.com/briefing/2025/02/06/online-scams-may-already-be-as-big-a-scourge-as-illegal-drugs&quot; target=&quot;_blank&quot;&gt;The Economist, 2025&lt;/a&gt;).&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/h4&gt;&lt;div&gt;&lt;h4&gt;&lt;/h4&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;1) Celebrity influencers&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;On digital media, celebrity influencers are &#39;micro-celebrities&#39;, who can also be &#39;influencers&#39; (if paid to share content). M&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;icro-celebrities may not be aware of the dangers of&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;hyper-visibility, since there are no &#39;Here Be Dragons&#39; signs at the on-ramps to creating their digital profiles. Here, celebrities agree to&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;legal contracts that are heavily one-sided in favour of social media platforms versus users (&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=7CnbEt-R81U&amp;amp;t=42s&quot; target=&quot;_blank&quot;&gt;Sarafian, 2023&lt;/a&gt;). These contracts do&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;not place an onus on social networks to warn or&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;protect their users from digital visibility risks; such as brandjacking and impersonation.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;The FCE project has approached almost 50 South African celebrities via their agents&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;to participate in its research. Each&#39;s&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;reputation was reported to have been stolen for scam adverts. Despite offering incentives, only three (plus select representatives) agreed to participate.&amp;nbsp;&lt;/span&gt;&lt;span&gt;Most may want to put their negative experiences behind them, while fearing reputational risks from being involved in a research process they are unfamiliar with, and&amp;nbsp;&lt;/span&gt;&lt;span&gt;whose outputs may be misperceived as potentially damaging.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span&gt;So, a big challenge exists in persuading&amp;nbsp;&lt;/span&gt;&lt;span&gt;micro-celebrities to contribute their&amp;nbsp;&lt;/span&gt;&lt;span&gt;experiences to research, so that they can be shared to inform digital crime fighters&#39; responses.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;h4&gt;&lt;/h4&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;2) Financial victims&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Fans who have developed a parasocial relationship with a particular celebrity they follow, may&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;genuinely believe that the fake endorsement&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;adverts are a legitimate offer. Notwithstanding,&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;the product’s promise seeming to be too good to be true. Having been conned, its victims may be&amp;nbsp;ashamed, or in denial. Many may consider&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;their financial loss not worth&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;reporting (as a&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;micro-fraud versus a serious crime).&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Even if victims are willing to report the digital crime, it may not be obvious which authority the crime is best reported to.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;3) Social media advertising services&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;Online advertisers, and digital platforms, may not understand or monitor the threat of digital crimes, such as celebrity brandjacking. It is not well-defined and may also be challenging to report on, since it spans several crimes itself: 1) impersonation; 2) non-consensual image sharing; and 3) the infringement of a public figure&#39;s intellectual property (through copyright violation of still images and audio-video). In addition, the crime causes; 4) reputational damage by suggesting a public figure’s association with a scam that often involves 5) financial fraud and hacking. Social media advertising complaint reporting formats only permit the reporting of one type of infringement at a time. This potentially leaves a blindspot, as users cannot report all the aspects that characterise the celebrity brandjacking crime. If it is a widespread problem, social media advertisers may also prefer not to flag it as a concern, thereby protecting their public reputations. Albeit, at the expense of celebrity and other financial victims.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h4&gt;&lt;/h4&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;4) Poorly-moderated content hosts&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;To make their offers seem more credible, scammers also post fake content on poorly-moderated sites (such as &quot;clickbait news&quot;, &quot;positive reviews&quot; on online forums, and &quot;scientific papers&quot; on academic social networks). Even if such fake content is reported and removed, it can be quickly shifted by scammers to worse-moderated hosts...&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;5) Banks&lt;/span&gt;&lt;/h3&gt;&lt;h4 style=&quot;font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;As the financial victims legitimately authorise payments off their own accounts, victims do no enjoy recourse via their banks. To avoid new transactions from scammers, these victims often have to pay banks for new cards after terminating their old ones. It is unclear what role banks could adopt in combating digital crimes, wherein clients are defrauded whilst following a seemingly legitimate payment process.&lt;/span&gt;&lt;/h4&gt;&lt;p class=&quot;p1&quot; style=&quot;color: #1080b7; font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-size: 13px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; font-weight: 400; line-height: normal; margin: 0px;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;p1&quot; style=&quot;color: #1080b7; font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-size: 13px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; font-weight: 400; line-height: normal; margin: 0px;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6jjp9oGGY0Kkbx_Y367cZJHvEQLkfj6Q1PiZZnNvsywAvmHftzBsoQwLKnJkmX_LlTDQiRsQV8cogs4d-PDrNu7U-4vz7dWbk1-VSX2P0MMCrrfzjosMQXkwAkMKUlHW2bB0Ug0tyFzc2ZBxCfL7jhCYksunbHdiwbJrYJBjgGQLXN3d5Cx_mob7qT8mG/s2292/Map%202%20for%20fighting%20the%20brandjacking%20crime.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Figure 2 - Authorities who could contribute to fighting digital crimes&quot; border=&quot;0&quot; data-original-height=&quot;1565&quot; data-original-width=&quot;2292&quot; height=&quot;272&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6jjp9oGGY0Kkbx_Y367cZJHvEQLkfj6Q1PiZZnNvsywAvmHftzBsoQwLKnJkmX_LlTDQiRsQV8cogs4d-PDrNu7U-4vz7dWbk1-VSX2P0MMCrrfzjosMQXkwAkMKUlHW2bB0Ug0tyFzc2ZBxCfL7jhCYksunbHdiwbJrYJBjgGQLXN3d5Cx_mob7qT8mG/w400-h272/Map%202%20for%20fighting%20the%20brandjacking%20crime.png&quot; title=&quot;Figure 2 - Authorities who could contribute to fighting digital crimes&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-size: 13px; font-weight: normal;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i&gt;Figure 2 - Authorities who could contribute to fighting digital crimes&lt;/i&gt;&lt;/div&gt;&lt;/span&gt;&lt;p class=&quot;p1&quot; style=&quot;color: #1080b7; font-family: &amp;quot;Helvetica Neue&amp;quot;; font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-size: 13px; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; font-weight: 400; line-height: normal; margin: 0px;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;6) Cyber defence companies&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Cyber defence businesses are focused on providing profitable services to corporates. Such services are often unaffordable to even the wealthiest celebrities in SA. However, some may be fortunate to work for companies that use cyber defence services that pro-actively monitor cyberspace, and warn employees against digital impersonation and related risks. Such services include &lt;a href=&quot;https://potech.global/darkivore&quot;&gt;Darkivore&lt;/a&gt;, &lt;a href=&quot;https://flashpoint.io/ignite/brand-intelligence/&quot;&gt;Flashpoint&lt;/a&gt;, &lt;a href=&quot;https://www.netcraft.com/?&quot;&gt;Netcraft&lt;/a&gt; (FraudWatch International), &lt;a href=&quot;https://www.sgs.com/en-za/our-services/connectivity-and-products/brand-protection&quot;&gt;SGS&lt;/a&gt; and &lt;a href=&quot;https://www.zerofox.com/&quot;&gt;ZeroFox&lt;/a&gt;. It does not seem that cyber defence companies can produce a profitable service that supports rapid responses to fake endorsements and related crimes. Even if it such a service was not unaffordable, most SA celebrities have not been targeted for revictimization. So it seems unlikely they would subscribe to such a service annually.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;7) Cybercrime reporters and statistics gatherers&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;While there have been many reports for weight-loss and money-making cryptocurrency scams featuring particular celebrities, the media, celebrities agents and PR companies seem to report on these brandjackings as once-off events. Reports typically cover the latest flare-up to negatively impact one or two stars, plus their fans. At the same time, cybercrime statistics do not include this digital crime, whose costs to victims in SA are unknown, and difficult to aggregate. This points to a need for developing an holistic view of digital crime from consolidated reports. Research into digital crimes that can bridge the work of journalists and crime statisticians seems urgently needed to describe such crime&#39;s extant, frequency and costs to society. Developing robust reporting mechanisms for&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;digital crimes (particularly&amp;nbsp;&lt;/span&gt;&lt;span&gt;ones that are&amp;nbsp;&lt;/span&gt;&lt;span&gt;challenging like &#39;fake social media adverts for phishing&#39; {as they&lt;/span&gt;&lt;span&gt;&amp;nbsp;include several sub-crimes}) would&amp;nbsp;&lt;/span&gt;&lt;span&gt;seem an important contribution that law enforcement, researchers and statisticians can make. Reporters and researchers&amp;nbsp;&lt;/span&gt;&lt;span&gt;can also develop robust definitions of emergent digital crimes to grow awareness of them. This should aid more accurate reports.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;h4&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;8) Cybercrime researchers, and educators, in companies&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;In a similar collaborative vein, cybercrime researchers and educators in companies are working together to help combat digital crimes targeting their employees and clients. In particular, banks and insurance companies in SA are pro-actively raising awareness around phishing and other common digital crimes. This is done in communications that range from email newsletters, to pop-up warnings that clients must acknowledge reading post log-in.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;9) Anti-crime activists (PBOs and NGOs)&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Anti-digital crime education tends to focus on educating high school students and working professionals with preventative knowledge in English. However, our research into fake celebrity endorsement victims&#39; online commentary suggest that most are over fifty five, with English being their second language, at best. In response, The Noakes Foundation has supported the development of modules in English for educating silver surfers on the most common digital crimes. Ideally, though, these modules (and &lt;a href=&quot;http://reportfakeendorsement.com/&quot;&gt;reportfakeendorsement.com&lt;/a&gt;&#39;s content) should be available in South Africa&#39;s 11 official languages.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;p class=&quot;p1&quot; style=&quot;font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;span style=&quot;font-size: 13px; font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;10) Social media platforms and their Big Tech owners&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Social media companies, and their Big Tech owners,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;would seem to have a particular responsibility for protecting users from digital crime threats on their platforms. In contrast,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;there is a decade-long history in SA of even influential celebrities not being well-supported via speedy responses to their brandjacking, and scam adverts are seldom taken down based on celebrities&#39;, their representatives&#39; and other victims&#39; reports.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;The most popular platform for this scam in SA is Meta&#39;s Facebook and Instagram. Meta does not&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;understand the content that its users share&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;(&lt;a href=&quot;https://www.penguinrandomhouse.co.za/book/broken-code-inside-facebook-and-fight-expose-its-toxic-secrets/9781911709039#:~:text=Broken%20Code%3A%20Inside%20Facebook%20and%20the%20fight%20to%20expose%20its%20toxic%20secrets,-Download%20Cover%20Image&amp;amp;text=About%20the%20book%3A,whether%20it%20was%20beyond%20saving.&quot; target=&quot;_blank&quot;&gt;Horwitz, 2023&lt;/a&gt;). Further, it&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;does not report on&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;scam ecosystems based inside its own platforms. Consequently, neither Facebook nor Instagram can&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;pro-actively identify digital crimes, let alone quickly adapt their systems to stop emergent&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;threats from&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;micro-fraudsters. It&#39;s left up to&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;whistleblowers, former employees, investigative journalists and &lt;a href=&quot;https://www.techtransparencyproject.org/platform/facebook&quot; target=&quot;_blank&quot;&gt;researchers&lt;/a&gt; to create awareness on these platforms&#39; serious flaws, such as it being used as a scammers&#39; ecosystem&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;tied to scam-as-service ones. This would seems at odds with corporate responsibility- &lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Meta should publicly report regarding its progress in tackling&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;scam-ecosystems on its FB, WhatsApp and Instagram platforms. It could also pro-actively&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;warn vulnerable users, such as the aged, against the latest scam risks.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;In a sense, digital crimes by cybercriminals on social networks can be considered a parasitic attack within a larger&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;parasitic host:&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Meta’s Facebook and Instagram are infomediaries that misrepresent themselves as symbionts in supporting users’ communal connections online. In reality, Meta’s business model is parasitic in relying on 3 000 000 000 users to share content (&lt;a href=&quot;https://technologyandsociety.org/if-technology-is-a-parasite-masquerading-as-a-symbiont-are-we-the-host/#:~:text=Technology%20is%20indeed%20a%20double,and%20be%20and%20create%20otherwise.&quot;&gt;Robbins, 2018&lt;/a&gt;).&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Much of this content is not the work of original/creative producers, but rather sampled from content that&#39;s proved popular on other platforms. In essence, social media platforms are middlemen between content creators and their audiences, taking most of the profits from advertising. These platforms also take the intellectual property of online content creators. In the Global South this serves as a form of neocolonial data extraction as Big Tech multinationals from the Global North extract its data, with little being reciprocated. For example, while powerful celebrities in the US can enjoy access to dedicated Facebook support, there is no equivalent offering for influential SA users. Instead, they are lucky to stumble onto internal staff or Trusted Partners who can best help them respond to the Facebookjacking or Instajacking crimes.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;In contrast to the usefulness of human insiders, reports to Meta&#39;s&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;AI that manages users&#39; reports of dubious accounts and content is simply not capable of recognising malicious advertisers&#39; accounts;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;At face value, there is in nothing “wrong” with how the scammers’ accounts are set up - They have have a human profile (fake name) managing a business profile (fake name and business). Reporting the scam accounts is useless, since the fraudsters fill-in all the right criteria to fly under the radar! &lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;The scammers use &#39;Like Farms&#39; and a network of fake profiles to all create a sense of legitimacy through &#39;liking, sharing and commenting&#39; on posts and ads. The criminals also use a “legitimate website” - this is a bought domain and hosing and (questionable design) - selling a “product” and accumulating data of visitors&#39; info and credit card details.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;All this seems to be legitimate business behaviour to AI, but is malicious and AI cannot detect that. Scammers use a (stolen) credit card, or hijacked meta Ads manager profile and run advertIf this content had truly been verified by a human it would have been taken down immediately. Even to the most untrained eye it was obvious that this content was a deep fake.s through their “business page”. This works for a short while until the card or the account are stopped, and then they just create another one. These ADs are selling a product online, the product is seemly harmless and well within the legal parameters of Meta&#39;s Community standards. The fact that its a fake product is immaterial to Meta, the onus in on the customer to know when they are being scammed, and if users try to report this to be a harmful product, it doesn’t work” as that is deemed a matter of personal opinion! Where such content is checked by a human moderators, the content is so obviously fake that they taken it down quickly.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;div&gt;It appears that Meta&#39;s Facebook and Instagram are turning a blind eye to this digital advertising crime. The benefit to META is clear with them reaping the rewards through advertisers&#39; spending: Trustfull&#39;s &lt;a href=&quot;https://trustfull.com/articles/fraud-trends-and-statistics-in-2024&quot; target=&quot;_blank&quot;&gt;2024 report&lt;/a&gt;&amp;nbsp;expects Deep Fake Fraud to reach $ 15.7 billion in 2024. Meta is set to take a large chunk of that ad-spend revenue in distributing fake, malicious content. It’s hard not to draw to the conclusion that it seems irrelevant to META if the content is genuine or a scam, or if the account used to promote these scams has been hacked or cloned. Either way, META and Facebook still profits.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;/h4&gt;&lt;h4&gt;&lt;/h4&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;11) Financial investors&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Investors are focused on the bottom-line of financial profit. To achieve it, social media platforms&#39; developers spotlight the metrics of an ever-increasing flow of communication marking their platforms&#39; commercial expansion. Given this all-consuming quantitative focus, it&#39;s unsurprising that these platforms&#39; developers and investors are largely disinterested in paying the costs to understand the negative experiences on platforms. Particularly when combating these might impede their growth and monetisation!&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;12) Government politicians&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;SA&#39;s parasitic political class has been slow to take action for protecting its citizenry from the excesses of social media platforms, and digital crimes on them. For example, it has not protected the intellectual rights of original digital content producers by passing a Creators Bill of Rights to limit their online exploitation. On social media, SA creatives do not retain copyright, have rights of termination and appeal, etc. Globally, most online content creators struggle to make a living from the work that they do. Social media companies&#39; oligarchic power and their poor regulation by the law contributes to this. Further, policy inactivity may suggest that government decision makers&#39; are guided by Big Tech&#39;s funding and political support, more-so than its digital creatives&#39; rights and needs.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;13) Local police&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;Brandjacking is not viewed as a serious crime by SA authorities who might be expected to intervene as guardians. Cybercrime experts in the SA police have to focus their limited resources on fighting severe digital crimes (like the online trafficking of children, drugs, and guns). They simply cannot address digital crimes that have not been shown to have serious impacts on their victims, such as phishing micro-frauds.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;14) International law enforcement&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;In contrast to under-resourced local law enforcement authorities, global ones (such as Interpol) are better resourced to potentially offer some form of response to digital crimes on social media. However, until decent stats and reports for digital micro-frauds are documented and shared with global authorities, these digital crimes are not notifiable, so cannot be directly investigated at an international level.&lt;/div&gt;&lt;p class=&quot;p1&quot; style=&quot;font-feature-settings: normal; font-kerning: auto; font-optical-sizing: auto; font-size-adjust: none; font-stretch: normal; font-variant-alternates: normal; font-variant-east-asian: normal; font-variant-emoji: normal; font-variant-numeric: normal; font-variant-position: normal; font-variation-settings: normal; line-height: normal; margin: 0px;&quot;&gt;&lt;span style=&quot;font-family: Helvetica Neue;&quot;&gt;&lt;span style=&quot;font-size: 13px; font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;15) Local law&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;Even if a foreign criminal network behind a scam is found though investigation, and the legal frameworks exist for their extradition, the costs for local law enforcement to prosecute scammers may well prove prohibitive to the State. The global proceeds of online fraud are probably more than $500bn a year, so another major concern is that online fraudsters have become rich and powerful enough to corrupt entire governments (&lt;a href=&quot;https://www.economist.com/audio/podcasts/scam-inc&quot; target=&quot;_blank&quot;&gt;Scam Inc podcasts, 2025&lt;/a&gt;). Scam &quot;businesses&quot; can turn countries into the cyber-scam equivalent of narco-states, and their operations can be found all over the world. Broadly, 1.5 million scammers are at work, from Namibia up to the Isle of Man, and from Mexico across to Fiji &amp;nbsp;(&lt;a href=&quot;https://www.economist.com/briefing/2025/02/06/online-scams-may-already-be-as-big-a-scourge-as-illegal-drugs&quot; target=&quot;_blank&quot;&gt;The Economist, 2025&lt;/a&gt;). Where scam bosses have strong clout within a political system, it becomes impossible to enact policies that undermine their fraud. Corrupted states, such as Cambodia, would seem unlikely to extradite criminals who pose a reputational risk in potentially implicating senior state officials. Extradition from lawless places, such as Myanmar, is also impossible.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;16) Higher Education and research funders&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;Like banks, universities are stepping up their preventative digital crime awareness communications, and attracting research funding to build scholarship into cyber- and digital crimes. More generally, universities can lead discourse on the digital crimes issue, catalysing inter- and trans-disciplinary collaborations. Funders of university grants might support design thinking, or strategic design activities to develop solutions for the seemingly intractable brandjacking micro-fraud. Likewise, ethical research into the issues that emerge in researching digital crimes under fake personas. Given that the brandjacking of influential scholars would seem to also pose reputational risks to their university-as-employer, related research could be motivated as a neglected, but potentially valuable contribution.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;17) Product regulators&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;Fake celebrity endorsements typically promote dubious products, that may actually be delivered. As such, customers may assume that they are protected by local regulators for those particular product types. For example, British doctors have been brandjacked to market &quot;wonder drugs&quot; that cure blood pressure. &quot;Their&quot; customers might assume that they are protected by the UK&#39;s&amp;nbsp;General Medical Council. However, this falls outside the GMCs remit, which can only address with promotions from genuine doctors on its register. The GMC cannot tackle &#39;computer generated videos&#39; by unknown fraudsters (&lt;a href=&quot;https://www.bmj.com/content/bmj/386/bmj.q1319.full.pdf&quot; target=&quot;_blank&quot;&gt;Stokel-Walker, 2014&lt;/a&gt;). It seems unlikely that any product regulator can help with tackling fake products marketed by unregistered and anonymous cybercriminals.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Celebrity, you are on your own in responding to digital crime?!&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;It should be clear that celebrities are unlikely to be supported in stopping fake social media adverts. While five key authorities are working to raise awareness against digital crimes (5, 7, 8, 9 &amp;amp; 16), there is little-to-no help available from eight (3, 4,&amp;nbsp; 6, 12, 13, 14, 15 &amp;amp; 17). At the digital crime&#39;s fountainhead (10 &amp;amp; 11), social media platforms are actually disincentivised against tackling the problem. In the absence of support from criminal prosecutors, the law or cybercrime fighting businesses, it should be clear that the guardianship role of social media companies is non-negotiable. Social media platforms that are heavily used by scammers, could take responsibility for this by entrusting micro teams of moderators around the world to review adverts. Verification by well-trained human resources who can disable fraudulent accounts seems to be the best answer to stopping brandjacking on social media. The current AI approach is failing miserably, with counter-technologies many steps behind cybercriminals&#39; &quot;innovations&quot;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;There is not enough being done at an entry level to assist smaller companies and the general public who are constantly being attacked by digital crimes. The accounts of celebrities, plus their representatives, whom we&#39;ve interviewed suggest that pressure must urgently be placed on social media platforms to provide effective brandjacking reporting, and prevention, tools. Without these,&amp;nbsp;&lt;a href=&quot;https://www.travisnoakes.co.za/2024/08/after-half-million-views-dr-noakes.html&quot; target=&quot;_blank&quot;&gt;deep fake adverts&lt;/a&gt;&amp;nbsp;can spread quickly- reaching tens-of-thousands of people a day. At the same time, celebrities must focus on building rapid awareness in the media, plus at the site of the digital crimes, to alert potential victims.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Just as celebrity co-operation is important, so is that by civil society organisations who can collaborate for pressuring authorities to act in a more responsible and pro-active manner in tackling digital crime. For example, &lt;a href=&quot;https://www.linkedin.com/in/anna-collard-🌻-606817/&quot; target=&quot;_blank&quot;&gt;Anna Collard&lt;/a&gt; (SVP Content Strategy and Evangelist at &lt;a href=&quot;https://www.knowbe4.com&quot; target=&quot;_blank&quot;&gt;KnowBe4 Africa&lt;/a&gt;) is doing important work in building networks that can collaborate in educating the public around the dangers of cyber- and digital crimes. Likewise, international and local networks must motivate for sounder strategic interventions from key role players to thwart global networks.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Serious funding is also needed to support awareness programs for educating vulnerable groups. In particular, communities like the elderly are a very high risk, though being less tech- and media savvy. Public benefactors are also needed to assist educational initiatives, like &lt;a href=&quot;https://reportfakeendorsement.com&quot; target=&quot;_blank&quot;&gt;ReportFakeEndorsement,&lt;/a&gt; with reaching a broad audience and for greatly increasing the research being done into new digital crimes, and how to thwart them.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Please comment with suggestions to improve this post&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;I am not an expert on all 13 authorities and their responses, so welcome any constructive corrections for improving what&#39;s been shared above. Please comment below, so that I can review your feedback, and perhaps update this blogpost, acknowledging you for your advice, below.&lt;br /&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Acknowledgements&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Thanks to &lt;a href=&quot;https://www.linkedin.com/in/dr-taryn-van-niekerk-19934833/&quot; target=&quot;_blank&quot;&gt;Dr Taryn van Niekerk&lt;/a&gt; for proposing the term ‘unchartered territory’ to describe celebrities’ (and their reps) challenges as novices responding to a brandjacking. That insight helped inspire this post, which maps authorities in an &#39;unknown territory&#39;, and the support they might offer, or cannot. Also, The Noakes Foundation&amp;nbsp;and the FCE team appreciate &lt;a href=&quot;https://www.linkedin.com/in/byron-davel-7348a775/&quot; target=&quot;_blank&quot;&gt;Mr Byron Davel&lt;/a&gt;&#39;s&amp;nbsp;advice regarding the ZeroFox offering. Plus the broader field of brand protection, and cyber-defence against dark web operations. TNF also appreciates the journalist &lt;a href=&quot;https://www.linkedin.com/in/lyse-comins-ba569648/?originalSubdomain=za&quot; target=&quot;_blank&quot;&gt;Lyse Comins&lt;/a&gt;&#39;&amp;nbsp;critique of&amp;nbsp;Meta&#39;s slow action in her news article-&amp;nbsp;&lt;a href=&quot;https://mg.co.za/business/2024-09-26-meta-criticised-for-slow-action-as-deepfake-adverts-target-south-african-celebrities/?login=success&quot; target=&quot;_blank&quot;&gt;Meta criticised for slow action as deepfake adverts target South African celebrities&lt;/a&gt;.&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/6371371650436141862/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2025/02/celebrities-cannot-stop-their.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/6371371650436141862'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/6371371650436141862'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2025/02/celebrities-cannot-stop-their.html' title='Celebrities cannot stop their brandjacking, since many authorities are unable to help!'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj55nIM3k9kReqFvScXna6EnNnvKn5Y65bwEy3tG5D2Lx5z6s8i7OhFBSZd9PcZEvv3xL8vh_2HbIMA8LtlfEL63q6E7QCWqlVpHsUJoYQtzmu4wK2M4-1-8nYIxIKFDvA02GgH4a5_Ssq9JGzL3uHSxW3rUuDLNRf5mPsxy5cdwHlGoJwdUJDw0tnqnKqD/s72-w640-h136-c/Map%201%20of%20the%20brandjacking%20crime.png" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.922087 18.4231418</georss:point><georss:box>-62.232320836178843 -16.7331082 -5.6118531638211522 53.579391799999996</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-3797368314854488880</id><published>2024-12-22T14:01:00.019+02:00</published><updated>2024-12-24T15:57:24.083+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="content analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="microblogging"/><category scheme="http://www.blogger.com/atom/ns#" term="QDAS"/><category scheme="http://www.blogger.com/atom/ns#" term="qualitative data analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="research method"/><category scheme="http://www.blogger.com/atom/ns#" term="science communication"/><category scheme="http://www.blogger.com/atom/ns#" term="semantic network analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="small data analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="social&#xa;semiotics"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter"/><category scheme="http://www.blogger.com/atom/ns#" term="X"/><title type='text'>A role for qualitative methods in researching Twitter data on a popular science article&#39;s communication</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;color: #666666;&quot;&gt;Written for scholars and students who are interested in using&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;qualitative research&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&amp;nbsp;methods for research with&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;small data, such as tweets on X.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://orcid.org/0000-0001-9566-8983&quot; target=&quot;_blank&quot;&gt;Myself&lt;/a&gt;, Dr&amp;nbsp;&lt;a href=&quot;https://orcid.org/0000-0002-0313-3875&quot; target=&quot;_blank&quot;&gt;Corrie Uys&lt;/a&gt;, Dr&amp;nbsp;&lt;a href=&quot;https://orcid.org/0000-0003-2447-5521&quot; target=&quot;_blank&quot;&gt;Pat Harpur&lt;/a&gt;&amp;nbsp;and Prof&amp;nbsp;&lt;a href=&quot;https://orcid.org/0000-0001-8494-6968&quot; target=&quot;_blank&quot;&gt;Izak van Zyl&lt;/a&gt;&#39;s open-access paper, &#39;&lt;a href=&quot;https://www.frontiersin.org/journals/research-metrics-and-analytics/articles/10.3389/frma.2024.1431298/&quot; target=&quot;_blank&quot;&gt;A role for qualitative methods in researching Twitter data on a popular science article&#39;s communication&lt;/a&gt;&#39; identifies several potential qualitative research contributions in analysing small data from microblogging communications:&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Qualitative research&amp;nbsp;can provide a rich contextual framing for how micro-practices (such as tweet shares for journal articles...) relate to important social dynamics (... like debates on paradigms within higher-level social strata in the Global Health Science field) plus professionals&#39; related identity work. Also, in-depth explorations of microblogging data following qualitative methods can contribute to the research process by supporting meta-level critiques of missing data, (mis-) categorisations, and flawed automated (and manual) results.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Published in&amp;nbsp;&lt;a href=&quot;https://www.frontiersin.org/journals/research-metrics-and-analytics&quot; target=&quot;_blank&quot;&gt;Frontiers in Research Metrics and Analytics&lt;/a&gt;&amp;nbsp;journal&#39;s special topic,&amp;nbsp;&lt;a href=&quot;https://www.frontiersin.org/research-topics/41263/network-analysis-of-social-media-texts&quot; target=&quot;_blank&quot;&gt;Network Analysis of Social Media Texts&lt;/a&gt;, our&amp;nbsp;paper responds to calls from Big Data communication researchers for qualitative analysis of online science conversations to better explore their meaning. We identified a scholarly gap in the Science Communication field regarding the role that qualitative&amp;nbsp;methods might play in researching small data regarding micro-bloggers&#39; article communications. Although social media attention assists with academic article dissemination, qualitative research into related microblogging practices is scant. To support calls for the qualitative analysis of such communications, we provided a practical example:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Mixed methods were applied for better understanding an unorthodox, but popular, article (&lt;a href=&quot;https://www.tandfonline.com/doi/full/10.2147/DMSO.S227090&quot; target=&quot;_blank&quot;&gt;Diet, Diabetes Status, and Personal Experiences of Individuals with Type 2 diabetes Who Self-Selected and Followed a Low Carbohydrate High Fat diet&lt;/a&gt;) and its &lt;a href=&quot;https://dove.altmetric.com/details/72148983/twitter&quot; target=&quot;_blank&quot;&gt;Twitter users&#39; shares&lt;/a&gt; over two years. Big Data studies describe patterns in micro-bloggers&#39; activities from large sets of data. In contrast, this small data set was analysed in NVivo™ by me (a pragmatist), and in MAXQDA™ by Corrie (a statistician). As part of the data preparation and cleaning, a comprehensive view of hyperlink sharing and conversations was developed, which quantitative extraction alone could not support. For example, through neglecting the general publication paths that fall outside listed academic publications, and related formal correspondence (such as academic letters, and sharing via open resources).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;My multimodal content analysis found that links related to the article were largely shared by health professionals. Its popularity related to its position as a communication event within a longstanding debate in the Health Sciences. This issue arena sees an emergent Insulin Resistance (IR) paradigm contesting the&amp;nbsp;dominant “cholesterol” model of chronic disease development. Health experts mostly shared this article, and their profiles reflected support for the emergent IR paradigm. We identified that these professionals followed a wider range of deliberation practices, than previously described by quantitative SciComm Twitter studies. Practices ranged from being included as part of a lecture-reading list, to language localisation in translating the article&#39;s title from English to Spanish, and study participants mentioning being involved. Contributing under their genuine identities, expert contributors carried the formal norms for civil communication into the scientific Twitter genre. There were no original URL shares from IR critics, suggesting how sharing evidence for an unconventional low-carbohydrate, healthy fats approach might be viewed as undermining orthodox identities. However, critics did respond with pro-social replies, and constructive criticism linked to the article&#39;s content, and its methodological limitations.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;The statistician&#39;s semantic network analysis (SNA) confirmed that terms used by the article&#39;s tweeters related strongly to the article&#39;s content, and its discussion was pro-social. A few prominent IR individual advocates and organisations shared academic links to the article repeatedly, with its most influential tweeters and sharers being from England and South Africa. In using Atlas.ti and MAXQDA&#39;s tools for automated sentiment analysis, the statistician found many instances where sentiment was inaccurately described as negative when it should have been positive. This suggested a methodological limitation of quantitative approaches, such as QDAS, in (i) accurately analysing microblogging data. The SNA also uncovered concerns with (ii) incorrect automated counts for link shares. Concerns i &amp;amp; ii indicate how microblogging statistics may oversimplify complex categories, leading to inaccurate comparisons. In response, close readings of microblogging data present a distinct opportunity for meta-critique. Qualitative research can support critiques of microblogging data sources, as well as its use in QDAS. A lack of support for static Twitter data spreadsheet analysis was concerning.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Meta-inferences were then derived from the two methods&#39; varied claims above. These findings flagged the importance of contextualising a health science article&#39;s sharing in relation to tweeters&#39; professional identities and stances on what is healthy. In addition, meta-critiques spotlighted challenges with preparing accurate tweet data, and their analysis via qualitative data analysis software. Such findings suggest the valuable contributions that qualitative research can make to research with microblogging data in science communication.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;The manuscript&#39;s development history&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;In 2020, Dr Pat Harpur and I selected an outlier IR scientific publication based on its unusually high Twitter popularity. At that time, the editorial, &#39;&lt;a href=&quot;http://dx.doi.org/10.1136/bjsports-2015-094911&quot; target=&quot;_blank&quot;&gt;It is time to bust the myth of physical inactivity and obesity: you cannot outrun a bad diet&lt;/a&gt;&#39; had been tweeted about over 3,000 times (now nearing 4,000 according to&amp;nbsp;&lt;a href=&quot;https://bmj.altmetric.com/details/3932693/twitter&quot; target=&quot;_blank&quot;&gt;Altmetric&lt;/a&gt;!). However analysing this highly popular outlier stalled after its static export in qualitative data analysis software proved unsuitable for efficient coding. The large quantum of tweet data also proved very difficult to analyse. Accordingly, we shifted focus to a &lt;a href=&quot;https://dove.altmetric.com/details/72148983/twitter &quot; target=&quot;_blank&quot;&gt;popular article&lt;/a&gt; that had been shared as an &lt;a href=&quot;https://bit.ly/38GF8Ha&quot; target=&quot;_blank&quot;&gt;episode&lt;/a&gt; of a broader, long-running IR versus cholesterol debate. Even with its relatively small volume of tweets, organising this data for qualitative analysis proved challenging. For example, it was necessary to refine the Python extraction code, while cross-checks of static vs Twitter search results necessitated the capture of “missing” conversations.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;We originally developed a multimodal analysis of these tweets, which focused on their relationship to Twitter user&#39;s profiles, potentially reflecting a wide range of communication goals. Our manuscript was submitted in 2022 to&amp;nbsp;&lt;a href=&quot;Science Communication&quot; target=&quot;_blank&quot;&gt;Science Communication&lt;/a&gt;, where Professor Susanna Priest kindly gave in-depth feedback on changing the original manuscript&#39;s contribution to a methodological one. We tackled this through developing a rationale for qualitative research with small data in the majorly revised article, which Dr Corrie Uys did a semantic network analysis for, while I revisited the social semiotic analysis.&lt;/p&gt;&lt;p&gt;If you have any questions, comments or concerns about our article, please comment below.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Acknowledgements&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;Funding is scarce, and often non-existent, for South African social media research projects. The article is the fifth in the&amp;nbsp;&lt;a href=&quot;https://thenoakesfoundation.org/research/academic-free-speech-and-digital-voices/&quot; target=&quot;_blank&quot;&gt;Academic Free Speech and Digital Voices&lt;/a&gt; theme, thanks to The Noakes Foundation’s ongoing support. We appreciate&amp;nbsp;Jana Retief and Jayne Bullen&#39;s assistance with related funding applications, plus the launch at&amp;nbsp;&lt;a href=&quot;https://www.younglings.academy/&quot; target=&quot;_blank&quot;&gt;Younglings Africa&lt;/a&gt;&#39;s&amp;nbsp;&lt;a href=&quot;https://thenoakesfoundation.org/younglings-launches-the-social-media-and-internet-lab-for-research/&quot; target=&quot;_blank&quot;&gt;Social Media Internet Laboratory for Research&lt;/a&gt;&amp;nbsp;(SMILR) in 2019. The authors also appreciate the Cape Peninsula University of Technology and the Department of Higher Education for providing additional internal funding.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikzCZMGUy-NOT5noSKkezd5K7GAYdyNtf8bHtIs9fE9sa9zoiuKS-zU88hCG-xo21kKqfdKzMWpefeIvRLBerrik53Nzm2q0W3XsP_glK0goqdtFdyQuoIYSDyNssBCeltHgfkqsxuioMRmN3TZbwXIx0I6OQg21iazwFFbbczIzATgNQlf9lWNEU3uIhB/s1354/SMILR%20logo%202021.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1354&quot; data-original-width=&quot;1310&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikzCZMGUy-NOT5noSKkezd5K7GAYdyNtf8bHtIs9fE9sa9zoiuKS-zU88hCG-xo21kKqfdKzMWpefeIvRLBerrik53Nzm2q0W3XsP_glK0goqdtFdyQuoIYSDyNssBCeltHgfkqsxuioMRmN3TZbwXIx0I6OQg21iazwFFbbczIzATgNQlf9lWNEU3uIhB/s320/SMILR%20logo%202021.jpg&quot; width=&quot;310&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;The authors would like to thank Younglings Africa&#39;s founder, &lt;a href=&quot;https://www.linkedin.com/in/alwynvanwykyounglingsafrica/&quot; target=&quot;_blank&quot;&gt;Alwyn van Wyk&lt;/a&gt;, and all the SMILR project team members who assisted us: &lt;a href=&quot;https://www.linkedin.com/in/shane-abrahams-007/&quot; target=&quot;_blank&quot;&gt;Shane Abrahams&lt;/a&gt;, &lt;a href=&quot;https://www.linkedin.com/in/tia-d-955554104/&quot; target=&quot;_blank&quot;&gt;Tia Demas&lt;/a&gt;, &lt;a href=&quot;https://www.linkedin.com/in/scott-logan-dennis/&quot; target=&quot;_blank&quot;&gt;Scott Dennis&lt;/a&gt;, &lt;a href=&quot;https://www.linkedin.com/in/ruan-erasmus-72a4a1182/&quot; target=&quot;_blank&quot;&gt;Ruan Erasmus&lt;/a&gt;, &lt;a href=&quot;https://www.linkedin.com/in/paul-geddes-20324414b/&quot; target=&quot;_blank&quot;&gt;Paul Geddes&lt;/a&gt;, &lt;a href=&quot;https://www.linkedin.com/in/sonwabilelanga1/&quot; target=&quot;_blank&quot;&gt;Sonwabile Langa&lt;/a&gt;, &lt;a href=&quot;https://www.linkedin.com/in/rustymags/?originalSubdomain=uk&quot; target=&quot;_blank&quot;&gt;Russell Magaya&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.linkedin.com/in/joshua-schell-0b2226182/&quot; target=&quot;_blank&quot;&gt;Joshua Schell&lt;/a&gt; and &lt;a href=&quot;https://www.linkedin.com/in/zander-swanepoel/&quot; target=&quot;_blank&quot;&gt;Zander Swanepoel&lt;/a&gt;. In addition, we are grateful to the senior software data analysts, &lt;a href=&quot;https://www.linkedin.com/in/cheryl-mitchell-2159a61b/&quot; target=&quot;_blank&quot;&gt;Cheryl Mitchell&lt;/a&gt; (2021-22) and &lt;a href=&quot;https://www.linkedin.com/in/darryl-chetty-77836a7/&quot; target=&quot;_blank&quot;&gt;Darryl Chetty&lt;/a&gt; (2019-20), who guided Younglings in their Twitter data extractions, and QDAS import preparations.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;We also thank the Design and Research Activities Workgroup in &lt;a href=&quot;https://www.cput.ac.za/academic/faculties/informaticsdesign/research&quot; target=&quot;_blank&quot;&gt;CPUT&#39;s Faculty of Informatics and Design&lt;/a&gt;, plus the &lt;a href=&quot;https://www.researchgate.net/lab/Centre-for-Communication-Studies-Nic-Theo&quot; target=&quot;_blank&quot;&gt;Centre for Communication Studies&lt;/a&gt; for feedback on our work-in-progress presentation in 2021.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;P.S. Related research manuscript from the team&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div&gt;In reducing our manuscript’s word count, we cut a fair amount of content that we intend to use for our next collaboration: &lt;i&gt;‘Overcoming qualitative analysis challenges when using small data -&amp;nbsp; workarounds in exploring Twitter conversations’&lt;/i&gt;. Expressions-of-interest from journal editors are most welcome.&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/3797368314854488880/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2024/12/a-role-for-qualitative-methods-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/3797368314854488880'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/3797368314854488880'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2024/12/a-role-for-qualitative-methods-in.html' title='A role for qualitative methods in researching Twitter data on a popular science article&#39;s communication'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikzCZMGUy-NOT5noSKkezd5K7GAYdyNtf8bHtIs9fE9sa9zoiuKS-zU88hCG-xo21kKqfdKzMWpefeIvRLBerrik53Nzm2q0W3XsP_glK0goqdtFdyQuoIYSDyNssBCeltHgfkqsxuioMRmN3TZbwXIx0I6OQg21iazwFFbbczIzATgNQlf9lWNEU3uIhB/s72-c/SMILR%20logo%202021.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.922087 18.4231418</georss:point><georss:box>-62.232320836178843 -16.7331082 -5.6118531638211522 53.579391799999996</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-1892322706431151586</id><published>2024-08-29T16:54:00.026+02:00</published><updated>2024-09-16T11:00:16.757+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="advert"/><category scheme="http://www.blogger.com/atom/ns#" term="brandjacking"/><category scheme="http://www.blogger.com/atom/ns#" term="celebrity"/><category scheme="http://www.blogger.com/atom/ns#" term="cybercrime"/><category scheme="http://www.blogger.com/atom/ns#" term="endorsement"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="fake"/><category scheme="http://www.blogger.com/atom/ns#" term="META"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="scam"/><title type='text'>After half-a-million views, &quot;Dr Noakes&quot; erection dysfunction &quot;advert&quot; taken down by Facebook + suggested actions for META to do better</title><content type='html'>I am pleased to report that The Noakes Foundation has succeeded in getting a &lt;a href=&quot;https://www.travisnoakes.co.za/2024/08/meta-profits-off-fake-celebrity.html&quot; target=&quot;_blank&quot;&gt;fake &#39;Dr Noakes&#39; advert for erectile dysfunction pills&lt;/a&gt; removed from META. This is after a month of trying varied methods without success to stop the brandjacking of Professor Tim Noakes&#39; identity, and his impersonation via deepfake reels and accounts on Facebook.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Brandjacking is the ‘allegedly illegal use of trademarked brand names - on social network sites’ (&lt;a href=&quot;https://ssrn.com/abstract=1498557&quot; target=&quot;_blank&quot;&gt;Ramsey&lt;/a&gt;, 2010 p851). Cybercriminals misuse the trademarks of others without authorization. For example, ‘Facebookjacking’ and ‘Instajacking’ see public figures’ usernames, account names, and/or digital content being used for fake accounts and video &quot;adverts&quot; on Meta’s respective popular social networks- Facebook and Instagram. Such brandjacking via fake celebrity endorsement spans several types of crime: (1) Impersonation, (2) Non-consensual image sharing, and (3) the Infringement of a public figure&#39;s&amp;nbsp; intellectual property through copyright violation of still images and audio-video. In addition to causing (4) Reputation damage to the public figure through suggesting association with a scam, cybercriminals may use it for (5) Financial fraud and hacking. Given that these are serious crimes, it is worrying that public figures in South Africa seem to receive minimal, if any, support from social media companies for stopping the fake endorsement digital crime. There is also a gap in scholarship for how public figures worldwide, and in SA, might best tackle this persistent crime.&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA4qQIkYSi-PdMOEVGuqvjXVu-fQHrKfm-NurjhaxfGUeETvj6h6bsuoQm5Y0wAPB2WoZ7IIkbZuG1d59UUxpwQAqhWeZn2RG9408Lq1IdqmPYl3MlaYe5FeUXE6Sxv0PvO0pMn9ODv-zJlKso7zuBni4C33Wlkn-o26oJwhzCRcH3tXvQjouphYI7US4_/s1778/Dr%20Tim%20Noakes%20deep%20fake%20advert%202024.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1778&quot; data-original-width=&quot;1722&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA4qQIkYSi-PdMOEVGuqvjXVu-fQHrKfm-NurjhaxfGUeETvj6h6bsuoQm5Y0wAPB2WoZ7IIkbZuG1d59UUxpwQAqhWeZn2RG9408Lq1IdqmPYl3MlaYe5FeUXE6Sxv0PvO0pMn9ODv-zJlKso7zuBni4C33Wlkn-o26oJwhzCRcH3tXvQjouphYI7US4_/w388-h400/Dr%20Tim%20Noakes%20deep%20fake%20advert%202024.png&quot; width=&quot;388&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 1. Screenshot from the fake &#39;Dr Noakes&#39; erection dysfunction advert on Facebook (2024)&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;On Thursday the 25th of July we were first alerted to a deep fake advert featuring &lt;a href=&quot;https://thenoakesfoundation.org/prof-tim-noakes/&quot; target=&quot;_blank&quot;&gt;Emeritus Professor Tim Noakes&lt;/a&gt; that ran on META&#39;s Facebook, and Tik Tok. As Figure 1 shows, the Facebook advert had been viewed over 584,000 times, liked by 637 accounts, and received 56 comments. While much of the likes and comments may be from bots, such high viewership of the reel itself is highly concerning. It suggests how rapidly a cybercriminals&#39; adverts spread to potential victims- at over 16,000 views per day!&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8PZZaz8hyphenhyphenE3yE5OVBBUZEScI-QHh8GpH2ATSMiJ6Dg4rJ4MqOy0i39nJduWrB8vAcSDAUjoRxsuFiZ5gt7xW5yLuc1HS2lG1NI3cLLEEKNWJ3awQctE9spts5_qN8qGK0xEOQot5eLBcS49vEWNVUOwM25K2vnclKySH0MVv5h_kH85aKqnMUm45zy2CL/s1600/Fake%20Dr%20Tim%20Noakes%20advert%20Facebook%20account%20launches%20four%20versions.jpeg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 2. Screenshot of scammers&#39; Facebook account featuring &amp;quot;Dr Tim Noakes&amp;quot; erection pill adverts (2024).jpg&quot; border=&quot;0&quot; data-original-height=&quot;645&quot; data-original-width=&quot;1600&quot; height=&quot;258&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8PZZaz8hyphenhyphenE3yE5OVBBUZEScI-QHh8GpH2ATSMiJ6Dg4rJ4MqOy0i39nJduWrB8vAcSDAUjoRxsuFiZ5gt7xW5yLuc1HS2lG1NI3cLLEEKNWJ3awQctE9spts5_qN8qGK0xEOQot5eLBcS49vEWNVUOwM25K2vnclKySH0MVv5h_kH85aKqnMUm45zy2CL/w640-h258/Fake%20Dr%20Tim%20Noakes%20advert%20Facebook%20account%20launches%20four%20versions.jpeg&quot; title=&quot;Figure 2. Screenshot of scammers&#39; Facebook account featuring &amp;quot;Dr Tim Noakes&amp;quot; erection pill adverts (2024)&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 2. Screenshot of scammers&#39; Facebook account featuring &quot;Dr Tim Noakes&quot; erection pill adverts&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;(2024)&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpnnrHUAaHm4YnimyZ0sMzrMMaoT8waSpuBrhS-NaCbG3omsWdxNsk_1mbb6SQh4cFp9G1nFNA5CPEe29D3FjJ08w7umPIBsZN6VuiRE65oiVM9vWOF4KtyvjAjNFo-TbaH0hOZq0NZH6uhwfIlvjW3TjMlF2awF9rDAL9lQwnWdx2UIgiia2Bu7QHpo3y/s712/Scammer%20account%20location%20behind%20fake%20Facebook%20Dr%20Tim%20Noakes%20adverts.jpeg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;216&quot; data-original-width=&quot;712&quot; height=&quot;97&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpnnrHUAaHm4YnimyZ0sMzrMMaoT8waSpuBrhS-NaCbG3omsWdxNsk_1mbb6SQh4cFp9G1nFNA5CPEe29D3FjJ08w7umPIBsZN6VuiRE65oiVM9vWOF4KtyvjAjNFo-TbaH0hOZq0NZH6uhwfIlvjW3TjMlF2awF9rDAL9lQwnWdx2UIgiia2Bu7QHpo3y/s320/Scammer%20account%20location%20behind%20fake%20Facebook%20Dr%20Tim%20Noakes%20adverts.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 3.&amp;nbsp;Scammer account location behind fake Facebook Dr Tim Noakes adverts&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;(2024)&amp;nbsp;&amp;nbsp;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;Our initial Facebook advert lookup revealed that one page was running four adverts (Figure 2). This account (&quot;Tristan&quot;) was managed from Nepal and India (Figure 3).&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAjxYz9zCJzP_bNztkfOzj2i-Zq51KJG0k6rL2UY18x8mqA3gWBlEfc59uqU-rhJf8parhJayrGRkom_Wey2M0r-FBcEHUhqMsXged82g8yKu5iG502sNespJyFk-_nk0-7iPMPoUUbERrNnsU_Ujt5_lVNqICu1UVj1SLZPGNPivIm1-pFlqL11RQWfGd/s1600/Fake%20Facebook%20account%20Tristan.jpeg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 4. Screenshot of fake Tristan account header behind Dr Tim Noakes adverts on Facebook.jpg&quot; border=&quot;0&quot; data-original-height=&quot;730&quot; data-original-width=&quot;1600&quot; height=&quot;183&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAjxYz9zCJzP_bNztkfOzj2i-Zq51KJG0k6rL2UY18x8mqA3gWBlEfc59uqU-rhJf8parhJayrGRkom_Wey2M0r-FBcEHUhqMsXged82g8yKu5iG502sNespJyFk-_nk0-7iPMPoUUbERrNnsU_Ujt5_lVNqICu1UVj1SLZPGNPivIm1-pFlqL11RQWfGd/w400-h183/Fake%20Facebook%20account%20Tristan.jpeg&quot; title=&quot;Figure 4. Screenshot of fake Tristan account header behind Dr Tim Noakes adverts on Facebook&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 4. Screenshot of fake Tristan account header behind Dr Tim Noakes adverts on Facebook&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;(2024)&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;blockquote style=&quot;border: none; margin: 0px 0px 0px 40px; padding: 0px;&quot;&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;This fake account page also leveraged fake interactions to suggest that it was liked, and followed (Figures 4 and 5).&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihE0BvCM-0CR0K56hEUr6dDOPiRhsnxfta_6_usS9ypWOmXi6j8lxF_x8WZKhYN6bzM0-vtzld8K1CYpcF7U1-lQMGkzjwag3JeUNnXBdLT1tPunihH45t7X-YgIiSo6n4od8ZfZhBchQb9V9R_0QB3mZmpIbT7_hxd_YPfjNsjAXuIe2wQaIik-oD5AL3/s1600/Fake%20Tristan%20Facebook%20account%20behind%20Dr%20Tim%20Noakes%20adverts%20on%20Facebook%20grows.jpeg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 5. Screenshot of fake Tristan account header behind Dr Tim Noakes adverts on Facebook&quot; border=&quot;0&quot; data-original-height=&quot;769&quot; data-original-width=&quot;1600&quot; height=&quot;309&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihE0BvCM-0CR0K56hEUr6dDOPiRhsnxfta_6_usS9ypWOmXi6j8lxF_x8WZKhYN6bzM0-vtzld8K1CYpcF7U1-lQMGkzjwag3JeUNnXBdLT1tPunihH45t7X-YgIiSo6n4od8ZfZhBchQb9V9R_0QB3mZmpIbT7_hxd_YPfjNsjAXuIe2wQaIik-oD5AL3/w640-h309/Fake%20Tristan%20Facebook%20account%20behind%20Dr%20Tim%20Noakes%20adverts%20on%20Facebook%20grows.jpeg&quot; title=&quot;Figure 5. Screenshot of fake Tristan account header behind Dr Tim Noakes adverts on Facebook&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 5. Screenshot of fake &quot;Tristan&quot; Facebook account details behind Dr Tim Noakes adverts&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;(2024)&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;This account was reported to Facebook via a third-party. During this “warning period”, the account&#39;s owners launched four new &quot;Dr Tim Noakes&quot; campaigns. Each was documented and reported to Facebook. Interestingly, the links to the online store “sites” were dead ends. However, a &#39;Call Now&#39; button could still support a call agent&#39;s phishing of victims financial details.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The absence of a link for data gathering suggested that this scam was primarily not for phishing such sensitive data, or selling fake products. Rather the advert&#39;s design seems geared for stealing advertising revenue via deepfake creation. The scammers hack into the &quot;advertiser&quot;&#39;s Meta account to distribute fake adverts that run up tens-of-thousands of dollars in spend. In this case it was a government-based account from an unknown location. Such adverts may also carry malware, with users clicking on them being vulnerable to hacking. These paid ads also have the impact of pushing potential followers to the advertiser’s page. More followers results in more people seeing the content, and Meta indirectly benefiting from the cybercrime&#39;s increased visibility by achieving higher advertising rates.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoCmvPTL6nxwPnn6JFrSGfMlyVVpEXT-MYk9Wt1hXyEUs37LoHyCWgDuLciIzAMtrzqLXjims-VHxeK9PwZ7kc7IRPzUrFP_U0bRz7lUewzCoyEIdaBtl1zHCkx1wipAHO1j4sIndy4OsBNNYvS-T-Z3g3esjQAo9ZpbLOMQ5poYa-cq3vkkIg9VzBNi4y/s1335/Screenshot%20of%20scammers&#39;%20Hughles%20Facebook%20account%202024.jpeg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 6. Screenshot of scammers&#39; &amp;quot;Hughles&amp;quot; Facebook account (2024).jpg&quot; border=&quot;0&quot; data-original-height=&quot;650&quot; data-original-width=&quot;1335&quot; height=&quot;312&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoCmvPTL6nxwPnn6JFrSGfMlyVVpEXT-MYk9Wt1hXyEUs37LoHyCWgDuLciIzAMtrzqLXjims-VHxeK9PwZ7kc7IRPzUrFP_U0bRz7lUewzCoyEIdaBtl1zHCkx1wipAHO1j4sIndy4OsBNNYvS-T-Z3g3esjQAo9ZpbLOMQ5poYa-cq3vkkIg9VzBNi4y/w640-h312/Screenshot%20of%20scammers&#39;%20Hughles%20Facebook%20account%202024.jpeg&quot; title=&quot;Figure 6. Screenshot of scammers&#39; &amp;quot;Hughles&amp;quot; Facebook account (2024)&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 6. Screenshot of scammers&#39; &quot;Hughles&quot; Facebook account&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;(2024)&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZKSlVPy7XeN6xLt-eGNpopdZCD3hBwSS6PrJAFtlVW1wtN_t1VwluW2QsiidZjona9TEWspsf5Cdjdr-1KwNzxL4Z2H3onB9RuGSqB58gZXfomgUddnCwLpsd-PNzgBzy2yW1Nab1cYz5PkTbRZo2rXiO2RUB8bU9GjZJlGscgqdVocuZN0g4YV9w8XHB/s729/Screenshot%20of%20scammers&#39;%20Hughles%20Facebook%20account%20details%202024.jpeg.jpeg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 7. Screenshot of scammers&#39; &amp;quot;Hughles&amp;quot; Facebook account&#39;s Dr Tim Noakes adverts (2024).jpg&quot; border=&quot;0&quot; data-original-height=&quot;505&quot; data-original-width=&quot;729&quot; height=&quot;444&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZKSlVPy7XeN6xLt-eGNpopdZCD3hBwSS6PrJAFtlVW1wtN_t1VwluW2QsiidZjona9TEWspsf5Cdjdr-1KwNzxL4Z2H3onB9RuGSqB58gZXfomgUddnCwLpsd-PNzgBzy2yW1Nab1cYz5PkTbRZo2rXiO2RUB8bU9GjZJlGscgqdVocuZN0g4YV9w8XHB/w640-h444/Screenshot%20of%20scammers&#39;%20Hughles%20Facebook%20account%20details%202024.jpeg.jpeg&quot; title=&quot;Figure 7. Screenshot of scammers&#39; &amp;quot;Hughles&amp;quot; Facebook account&#39;s Dr Tim Noakes adverts (2024)&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;Figure 7. Screenshot of scammers&#39; &quot;Hughles&quot; Facebook account&#39;s Dr Tim Noakes adverts&amp;nbsp;&lt;/span&gt;&lt;span&gt;(2024)&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;The scammers flick-flacked between varied accounts in committing this cybercrime- they initially used &quot;Hughles&quot; (Figures 6 and 7), &quot;Cameron Sullivan Setting&quot;, and &quot;Murthyrius&quot; in launching the same deepfake ads. By the 28th of July, 13 of these &quot;adverts were taken down by Facebook, but the scammers shifted to new accounts, &quot;Longjiaren.com&quot; (Figure 8) and &quot;Brentlinger&quot; (renamed &quot;Brentlingerkk&quot; after we reported it). On the 29th of August, these accounts and their adverts were disabled by Facebook.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1E9IUiZZQDdRzq2Uhi-qgi7a8gIvlMNhH4HyGbnlO2e9SZIiIx-lMByPSpVUet_sFmrE6cg74abl4LhkX07aJsmIGqayhALCIeQ8YfP3FHOo0yx48JjOaApXJrR79R-6-rAGmskD0r3HP5SIbwaTrpYcqjvaEHLAjbVj7cJHesPuAyfa3eJQWYUt10baH/s1376/Screenshot%20of%20Longjiaren.com%20scammers%20Facebook%20account%20for%20fake%20adverts.jpeg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Screenshot of Longjiaren.com scammers Facebook account for fake adverts.jpeg&quot; border=&quot;0&quot; data-original-height=&quot;282&quot; data-original-width=&quot;1376&quot; height=&quot;133&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi1E9IUiZZQDdRzq2Uhi-qgi7a8gIvlMNhH4HyGbnlO2e9SZIiIx-lMByPSpVUet_sFmrE6cg74abl4LhkX07aJsmIGqayhALCIeQ8YfP3FHOo0yx48JjOaApXJrR79R-6-rAGmskD0r3HP5SIbwaTrpYcqjvaEHLAjbVj7cJHesPuAyfa3eJQWYUt10baH/w640-h133/Screenshot%20of%20Longjiaren.com%20scammers%20Facebook%20account%20for%20fake%20adverts.jpeg&quot; title=&quot;Screenshot of Longjiaren.com scammers Facebook account for fake adverts&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 8. Screenshot of Longjiaren.com scammers Facebook account for fake adverts&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;(2024)&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Such adverts typically reach viewers outside The Noakes Foundation, &lt;a href=&quot;https://nutrition-network.org/&quot; target=&quot;_blank&quot;&gt;Nutrition Network&lt;/a&gt; and &lt;a href=&quot;https://eatbetter.org.za/&quot; target=&quot;_blank&quot;&gt;Eat Better&lt;/a&gt; South Africa’s networks. Their audiences know Professor Noakes &lt;a href=&quot;https://www.youtube.com/watch?v=Pwo-UjGXTak&quot; target=&quot;_blank&quot;&gt;does not endorse miracle weight loss and other cures&lt;/a&gt;. To reach vulnerable publics, The Noakes Foundation has run Facebook alerts to warn about this latest cybercrime. Ironically, the most recent advert attempting to flag the &quot;Dr Noakes&quot; scam was blocked by Facebook advertising (Figure 9)!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7bUHdwjJinS0P4hf-dEEQsVZicZ1qR6s2yzfxslrJehfQ_lFlBxZoSw4kSh0HDKCYo2Nc0QBQA60cpb7YdB2FCxceBjkGhmNQAq-M_E5deU58wEcRPacpFBU80norprEM3sxqdMTF4bBUCWmDIyvWVhdQHbx304xoMh7dXGpIQDE-nNxs-67NPc4pcxlE/s1443/Facebook%20rejects%20anti%20scam%20ad%20from%20The%20Noakes%20Foundation.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Screenshot of Facebook rejecting anti scam ad from The Noakes Foundation.jpg&quot; border=&quot;0&quot; data-original-height=&quot;842&quot; data-original-width=&quot;1443&quot; height=&quot;373&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7bUHdwjJinS0P4hf-dEEQsVZicZ1qR6s2yzfxslrJehfQ_lFlBxZoSw4kSh0HDKCYo2Nc0QBQA60cpb7YdB2FCxceBjkGhmNQAq-M_E5deU58wEcRPacpFBU80norprEM3sxqdMTF4bBUCWmDIyvWVhdQHbx304xoMh7dXGpIQDE-nNxs-67NPc4pcxlE/w640-h373/Facebook%20rejects%20anti%20scam%20ad%20from%20The%20Noakes%20Foundation.jpg&quot; title=&quot;Screenshot of Facebook rejecting anti scam ad from The Noakes Foundation&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 9. Facebook rejects anti scam ad from The Noakes Foundation&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;(2024)&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Actions for META to do better in fighting cybercrime on its platforms&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;As &lt;a href=&quot;https://www.annacollard.com/&quot; target=&quot;_blank&quot;&gt;Anna Collard&lt;/a&gt; (&lt;a href=&quot;https://www.knowbe4.com/&quot; target=&quot;_blank&quot;&gt;KnowBe4&lt;/a&gt;) spotlights in her recent interview with &lt;a href=&quot;https://storage.googleapis.com/bcclips/20240826/8420886-0_1B557D0.mp4&quot; target=&quot;_blank&quot;&gt;eNews&lt;/a&gt;, social media platforms are a vital source for news in Africa. Consequently, these platforms must be held more accountable for any slow responses to synthetic- and deep-fakes. It is greatly concerning that META&#39;s Facebook platform is so rife with many serious crimes (ranging from &lt;a href=&quot;https://www.annacollard.com/post/financial-sextortion-101-quick-help-and-resources&quot; target=&quot;_blank&quot;&gt;sextortion&lt;/a&gt; and &lt;a href=&quot;https://www.theguardian.com/global-development/2024/jan/31/meta-worlds-single-largest-marketplace-for-paedophiles-new-mexico-attorney-general-facebook-instagram&quot; target=&quot;_blank&quot;&gt;child-trafficking&lt;/a&gt; to &lt;a href=&quot;https://www.techtransparencyproject.org/platform/facebook&quot; target=&quot;_blank&quot;&gt;drug pushing&lt;/a&gt;).&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;META can be more pro-active in tackling such cybercrimes {plus less serious ones like fake celebrity endorsement}, by prioritising these seven steps below:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;1) Actively communicate that all users&#39; must have a &#39;&lt;a href=&quot;https://reportfakeendorsement.com/what-to-do-if-you-have-been-scammed/&quot; target=&quot;_blank&quot;&gt;zero trust&lt;/a&gt;&#39; mindset;&lt;br /&gt;2) Create a compliance team that is dedicated to thwarting cybercriminals&#39; activities;&lt;br /&gt;3) Offer at least one human contact on each META platform for serious reports of criminal misuse;&lt;br /&gt;4) Promote frequent reporters of cybercrime by referring them to META&#39;s &lt;a href=&quot;https://transparency.meta.com/en-gb/policies/improving/bringing-local-context/&quot; target=&quot;_blank&quot;&gt;Trusted Partners&lt;/a&gt; or &lt;a href=&quot;https://www.facebook.com/business/partner-directory&quot; target=&quot;_blank&quot;&gt;Business Partners&lt;/a&gt; for rapid aid;&lt;br /&gt;5) Encourage external research on every platform regarding cybercriminals&#39; activities (such initiatives could develop inexpensive tools. For example, for celebrities&#39; reps to protect public figures from being deep faked in &quot;adverts&quot;);&lt;br /&gt;6) Provide more feedback on what was influential in reporting cybercrime for accounts and content to be removed. Without such feedback, fraud reporters may not be sure which reports are most effective;&lt;br /&gt;7) Have a recommendation system in place for support networks that cybervictims can approach (such as referring South Africans to its national &lt;a href=&quot;https://www.cybersecurityhub.gov.za/&quot; target=&quot;_blank&quot;&gt;CyberSecurity hub&lt;/a&gt;).&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In addition, META might consider &lt;a href=&quot;https://thenoakesfoundation.org/the-perils-of-cybercrime-how-meta-can-better-protect-users-from-scams-and-brandjacking&quot; target=&quot;_blank&quot;&gt;these suggestions&lt;/a&gt; from The Noakes Foundation&#39;s &lt;a href=&quot;https://reportfakeendorsement.com/&quot; target=&quot;_blank&quot;&gt;Report Fake Endorsement&lt;/a&gt; initiative, to: (8)&amp;nbsp;enhance deepfake detection technology, (9) apply stricter verification processes, (10) increase transparency and reporting tools, (11) support local educational initiatives, (12) promote collaborations with local cybercrime experts, (13) implement proactive monitoring systems to detect unusual patterns in ads, and (14)&amp;nbsp;reinforced consequences for violations.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;By sharing this &quot;Dr Noakes&quot; case study (and developing others), The Noakes Foundation hopes to raise awareness of the &lt;a href=&quot;https://reportfakeendorsement.com/&quot; target=&quot;_blank&quot;&gt;fake celebrity endorsement &lt;/a&gt;cybercrime, plus the importance of Big Tech guardians stepping up to fulfil their responsibilities. We are also liaising with sympathetic allies (&lt;a href=&quot;https://www.knowbe4.com/&quot;&gt;KnowBe4® Africa Security Awareness&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.orangecyberdefense.com/&quot; target=&quot;_blank&quot;&gt;Orange Defence&lt;/a&gt;, &lt;a href=&quot;https://wolfpackrisk.com/&quot; target=&quot;_blank&quot;&gt;Wolfpack&amp;nbsp;Information Risk&lt;/a&gt; and others)&amp;nbsp;to grow the networks necessary to better support cybercrime prevention in South Africa.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Much can be done for targeted digital literacy education for vulnerable targets of cybercrime (such as #StopTheScam for silver surfers). We will also continue advocating that capable guardians (such as META, Twitter and TikTok) become more pro-active in protecting vulnerable publics on their platforms. Their gatekeeping role is vital, as the traditional bulwarks against crime (education, the police and the law) seem unable to catch-up with the &quot;evolution&quot;of global cybercrimes!&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/1892322706431151586/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2024/08/after-half-million-views-dr-noakes.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/1892322706431151586'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/1892322706431151586'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2024/08/after-half-million-views-dr-noakes.html' title='After half-a-million views, &quot;Dr Noakes&quot; erection dysfunction &quot;advert&quot; taken down by Facebook + suggested actions for META to do better'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA4qQIkYSi-PdMOEVGuqvjXVu-fQHrKfm-NurjhaxfGUeETvj6h6bsuoQm5Y0wAPB2WoZ7IIkbZuG1d59UUxpwQAqhWeZn2RG9408Lq1IdqmPYl3MlaYe5FeUXE6Sxv0PvO0pMn9ODv-zJlKso7zuBni4C33Wlkn-o26oJwhzCRcH3tXvQjouphYI7US4_/s72-w388-h400-c/Dr%20Tim%20Noakes%20deep%20fake%20advert%202024.png" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.922087 18.4231418</georss:point><georss:box>-62.232320836178843 -16.7331082 -5.6118531638211522 53.579391799999996</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-8247965414443102143</id><published>2024-08-22T13:34:00.030+02:00</published><updated>2024-08-26T10:42:37.235+02:00</updated><title type='text'>META profits off fake celebrity endorsement ads (&amp; no, &quot;Dr Noakes&quot; cannot help your erection problem 🙄!)</title><content type='html'>&lt;div&gt;Yes, the &quot;Dr Noakes&quot; advert below for men’s erection problems is the latest brandjack of Prof Noakes&#39; identity on Facebook (and Tik Tok). So-called &quot;Bretlinger&quot;&#39;s&amp;nbsp;recent deep fake advert (Figure 1) features &quot;Tim Noakes&quot; promising a &quot;second youth&quot; through &quot;science&quot; for those suffering from erectile dysfunction. This Facebook reel is accompanied with the text; &lt;i&gt;&#39;I⁣&#39;⁣v⁣e⁣ ⁣d⁣o⁣n⁣e⁣ ⁣t⁣h⁣i⁣s⁣ ⁣t⁣h⁣r⁣e⁣e⁣ ⁣t⁣i⁣m⁣e⁣s⁣ ⁣–⁣ ⁣a⁣n⁣d⁣ ⁣f⁣o⁣r⁣ ⁣f⁣i⁣v⁣e⁣ ⁣y⁣e⁣a⁣r⁣s⁣ ⁣n⁣o⁣w⁣,⁣ ⁣I⁣ ⁣h⁣a⁣v⁣e⁣n⁣&#39;⁣t⁣ ⁣h⁣a⁣d⁣ ⁣a⁣n⁣y⁣ ⁣i⁣s⁣s⁣u⁣e⁣s⁣ ⁣w⁣i⁣t⁣h⁣ ⁣e⁣r⁣e⁣c⁣t⁣i⁣l⁣e⁣ ⁣d⁣y⁣s⁣f⁣u⁣n⁣c⁣t⁣i⁣o⁣n⁣.⁣ ⁣W⁣r⁣i⁣t⁣e⁣ ⁣d⁣o⁣w⁣n⁣ ⁣m⁣y⁣ ⁣p⁣r⁣e⁣s⁣c⁣r⁣i⁣p⁣t⁣i⁣o⁣n⁣ ⁣f⁣r⁣o⁣m⁣ ⁣D⁣r⁣.⁣ ⁣T⁣i⁣m⁣ ⁣N⁣o⁣a⁣k⁣e⁣s⁣:⁣ ⁣a⁣n⁣ ⁣e⁣a⁣s⁣y⁣ ⁣w⁣a⁣y⁣ ⁣t⁣o⁣ ⁣r⁣e⁣s⁣t⁣o⁣r⁣e⁣ ⁣y⁣o⁣u⁣r⁣ ⁣m⁣a⁣n⁣h⁣o⁣o⁣d⁣ ⁣i⁣n⁣ ⁣s⁣e⁣c⁣o⁣n⁣d⁣s⁣.&#39;&lt;/i&gt; (Don&#39;t expect many men will be reporting to Facebook, or publicly commenting for being scammed with this particular health problem 😡).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwlQHyFbYtSlgWBwQF5gsYZMenqcA5sCj_dmuq6-6HkMG7notUROjpJ6cGJr2wE8Q23PhyphenhyphenrjF-bA4fVzp94baTpHykS8iyteEy9aXgcqYh55Cl3aVlGfJcoLoQSb8tLvrJ0ueqvjXEux2NZRTsCfWwckR6Afqc2-iWkyIKOzl2__j0PDmZz3TJxSCLQtRY/s1770/Bretlinger%20%22Dr%20Noakes%22%20social%20media%20advert%201.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 1. Screenshot of fake &amp;quot;Bretlinger&amp;quot; company&#39;s advert reel for &amp;quot;Dr Noakes&amp;quot; erection product on Facebook&quot; border=&quot;0&quot; data-original-height=&quot;1617&quot; data-original-width=&quot;1770&quot; height=&quot;292&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwlQHyFbYtSlgWBwQF5gsYZMenqcA5sCj_dmuq6-6HkMG7notUROjpJ6cGJr2wE8Q23PhyphenhyphenrjF-bA4fVzp94baTpHykS8iyteEy9aXgcqYh55Cl3aVlGfJcoLoQSb8tLvrJ0ueqvjXEux2NZRTsCfWwckR6Afqc2-iWkyIKOzl2__j0PDmZz3TJxSCLQtRY/w320-h292/Bretlinger%20%22Dr%20Noakes%22%20social%20media%20advert%201.png&quot; title=&quot;Figure 1. Screenshot of fake &amp;quot;Bretlinger&amp;quot; company&#39;s advert reel for &amp;quot;Dr Noakes&amp;quot; erection product on Facebook&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 1. Screenshot of fake &quot;Bretlinger&quot; company&#39;s advert reel for &quot;Dr Noakes&quot; erection product on Facebook (2024)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The Noakes Foundation and friends have reported this cybercriminals&#39;&lt;span style=&quot;color: #3d85c6;&quot;&gt;*&lt;/span&gt;&lt;span style=&quot;color: #ffa400;&quot;&gt; &lt;/span&gt;advert many times to META. BUT guess what, just like &lt;a href=&quot;https://en.wikipedia.org/wiki/Bump_n%27_Grind_(R._Kelly_song)&quot; target=&quot;_blank&quot;&gt;R Kelly&lt;/a&gt;... META Facebook&#39;s bots and human reviewers &quot;&lt;i&gt;do not see anything wrong&lt;/i&gt;&quot; with the ad! Apparently adverts stealing a person&#39;s reputation, plus Facebook users&#39; hard-earned money is no problem for META, since the scam is not going &quot;against Facebook&#39;s &lt;a href=&quot;https://transparency.meta.com/en-gb/policies/ad-standards/community-standards/&quot; target=&quot;_blank&quot;&gt;community standards&lt;/a&gt;&quot; (Figure 2).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO1GAih1Qb9Ub_3Fsd-zC7L2EkSyYj_rw9ZENXpUpgBmxW2pKR-TJev2BGiUsH8PcfrlGBZSQRsSnRi1yTEzIQMGvTRuYN1K4Sj1QQDZSSRsZ3xRIWWr4C21FmJQH5t1Ys0oR4eH0QgBByeZw4HKES4J2853_ZFj5SIyAHD6iECJ7vqaqqJ_AbObw3Q15P/s724/Facebook%20support%20message%20Dr%20Noakes%20erection%20ad%202024%20crop.jpeg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;724&quot; data-original-width=&quot;557&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO1GAih1Qb9Ub_3Fsd-zC7L2EkSyYj_rw9ZENXpUpgBmxW2pKR-TJev2BGiUsH8PcfrlGBZSQRsSnRi1yTEzIQMGvTRuYN1K4Sj1QQDZSSRsZ3xRIWWr4C21FmJQH5t1Ys0oR4eH0QgBByeZw4HKES4J2853_ZFj5SIyAHD6iECJ7vqaqqJ_AbObw3Q15P/s320/Facebook%20support%20message%20Dr%20Noakes%20erection%20ad%202024%20crop.jpeg&quot; width=&quot;246&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 2. Facebook support message reply to fake &quot;Dr Noakes erection advert&quot; report (2024)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Even if Facebook is just a conduit for sharing ads that are strictly the advertiser&#39;s responsibility, META still faces a legal risk in benefiting from crime (receiving &quot;advertising&quot; fees repeatedly!). For several months, The Noakes Foundation&#39;s representatives have provided a third-party with spreadsheets of scam accounts and hyperlinks for META&#39;s reference. This seemed effective in blunting the persistent brandjacking of Professor Tim Noakes&#39; reputation across Facebook and Instagram. However, META has shifted position and will no longer use these spreadsheets. Paraphrasing, META thinks that &lt;i&gt;&#39;none of the adverts are threatening or will lead to grievous bodily harm or death&#39;&lt;/i&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;As previously described for&amp;nbsp;&lt;a href=&quot;https://www.travisnoakes.co.za/2023/06/twitter-support-must-do-better-for.html&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt;&amp;nbsp;(now X), there is a familiar pattern of popular social media platforms turning a blind eye to cybercriminals&#39; creation of imposter accounts to launch phishing attacks via fake adverts. Our preliminary research (2022-23) revealed that Facebook and Instagram were the most popular platforms reported by&amp;nbsp;the financial victims of the Dr Michael Mol and Tim Noakes brandjackings. Cybercriminals are now also making use of Tik Tok for widespread promotion of the &quot;Dr Noakes&#39; erection solution&#39;. While their earlier brandjacks have used synthetic content, the latest feature deep fake videos of Tim speaking for most of the &quot;advert&quot;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;As &quot;Tim&#39;s&quot; Facebook advert is accompanied by negative comments from victims (such as &quot;You stole my money!&quot;) it is seems inconceivable that a genuine, impartial, humane reviewer can argue that such scamming content is &quot;acceptable&quot;.&amp;nbsp;&lt;span style=&quot;color: #3d85c6;&quot;&gt;*&amp;nbsp;&lt;/span&gt;Perhaps an alternate explanation is that META is following orders from powerful outsiders in not applying its own policies!&lt;span style=&quot;color: #3d85c6;&quot;&gt;&amp;nbsp;&lt;/span&gt;In exploring the patterns of this cybercrime&#39;s victims, it is notable that low-carbohydrate experts were targeted across continents. Amongst the fake advertising for them, Emeritus Professor Tim Noakes&#39; stands out for his likeness/reputation having been re-used the most. It is not unrealistic to hypothesise that Western intelligence agencies may ask social media platforms to ignore content that degrades the reputations of prominent state propaganda&amp;nbsp;critics.&amp;nbsp;&lt;a href=&quot;https://piersrobinson.com/&quot; target=&quot;_blank&quot;&gt;Dr Piers Robinson&lt;/a&gt; suggested this hypothesis based on experiences in facing character assassination via corporate media&amp;nbsp;after setting up the &lt;a href=&quot;https://syriapropagandamedia.org/about&quot; target=&quot;_blank&quot;&gt;Working Group on Syria, Media and Propaganda&lt;/a&gt;. It stumbled upon a strategic deception, perpetrated by the US, UK and French governments, regarding chemical weapons attacks in Syria, and their &lt;a href=&quot;https://propagandainfocus.com/five-years-on-the-opcw-douma-deception-continues/&quot; target=&quot;_blank&quot;&gt;improper investigation&lt;/a&gt;. As Piers&amp;nbsp;&lt;a href=&quot;https://x.com/PiersRobinson1/status/1826929416338817081&quot; target=&quot;_blank&quot;&gt;tweeted&lt;/a&gt;, &lt;i&gt;&#39;from detaining and interrogating journalists such as Julian Assange, Richi Medhurst, Vanessa Beeley and Kit Klarenberg, through to smearing/character assassination across social media against Sharyl Attkisson, there are a myriad of ways used to suppress dissent.&#39;&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Prof Noakes has also faced character assassination after publicly challenging health propaganda related to &lt;a href=&quot;https://thenoakesfoundation.org/questioning-the-science/&quot; target=&quot;_blank&quot;&gt;&quot;The Science&quot;™&lt;/a&gt; behind&amp;nbsp;the US government&#39;s (high-carbohydrate-promoting) food pyramid, plus the worldwide promotion of (poorly/untested) COVID-19 genetic &quot;vaccinations&quot;. Perhaps META&#39;s repeated failure to block these adverts is not an oversight of its responsibility to its users, but rather deliberate in following external directives. Worse, some scams may not be just the work of cybercriminals, but also be supported by intelligence agencies experimenting with fake endorsements as a new tool in their character assassination arsenal?!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In an interview on the &lt;a href=&quot;https://mg.co.za/business/2024-08-20-deepfake-content-explosion-lies-ahead/&quot; target=&quot;_blank&quot;&gt;Deepfake content &#39;explosion&#39;&lt;/a&gt;,&amp;nbsp;a Facebook spokesperson recently stated that &lt;i&gt;&#39;Content that purposefully intends to deceive or exploit others for money violates our policies, and we remove violating content when its found.&#39;&lt;/i&gt; Interestingly, this spokesperson did not detail what META&#39;s response is to content being reported. There is also a missed opportunity to check whether the Facebook response to the reported victims and their representatives (Leanne Manas, Patrice Motsepe, Elon Musk, Nicky Oppenheimer, President Cyril Ramaphosa and Johann Rupert) actually corroborates this PR claim. In the case of the Noakes Foundation and Prof Noakes, certainly not!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Regardless of the scam&#39;s sources, The Noakes Foundation, its associates and I will continue to raise public awareness (via &lt;a href=&quot;https://reportfakeendorsement.com&quot; target=&quot;_blank&quot;&gt;reportfakeendorsement.com&lt;/a&gt;&amp;nbsp;and other channels) against fake celebrity endorsement ads. Such activism helps the general public develop zero trust in any &quot;endorsements&quot;. These are NO endorsements from Professor Tim Noakes (or his associates at&amp;nbsp;&lt;a href=&quot;https://thenoakesfoundation.org/&quot; target=&quot;_blank&quot;&gt;The Noakes Foundation&lt;/a&gt;, the &lt;a href=&quot;https://nutrition-network.org/&quot; target=&quot;_blank&quot;&gt;Nutrition Network&lt;/a&gt; and&amp;nbsp;&lt;a href=&quot;https://eatbetter.org.za/&quot; target=&quot;_blank&quot;&gt;Eat Better South Africa NPC&lt;/a&gt;). We will continue to research and advocate for social media platforms to take pro-active steps for preventing a decade long micro-fraud. It costs vulnerable South Africans millions of Rands each year, whilst also harming celebrities&#39; reputations-and-wellbeing.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Online companies and social media platforms must do more to protect vulnerable audiences from fraudsters. Ironically, The Noakes Foundation&#39;s &lt;a href=&quot;TNF FB https://www.facebook.com/share/p/n1JmmwvLbCrLYa7D/&quot; target=&quot;_blank&quot;&gt;recent post&lt;/a&gt; warning about the latest scam has a comment section that then gets used as the next fraud trap. Scammers offer &quot;help&quot; to victims on it, promising that they can &quot;find the criminals&quot; and get a victim&#39;s &quot;money back&quot;. These FB accounts may be bots that are automated to add comments to posts featuring tags such as &#39;hack(ed)&#39;, &#39;scam(med)&#39;, &#39;deepfake&#39;, etc.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS6jU15SyaWYf2xIKmv5QdWywICrvFQKfRi1vZftyhFZIxuiPLhDBc1y21MpExLIJDTZTUJ4c3AG9wkEZzXHpz1O53XZ1dx5baMcatYdigb_APzJyazC5y-2a4DkwD4mrNq-YZNIDlqP_LPeC9bsjl1gI2ymw1lahpsIco-_9h5qRD5OzCsMGO6P8yoh5X/s1948/The%20Noakes%20Foundation%20scam%20alert%20post%20on%20Dr%20Noakes%20scam%20with%20scammer%20comments.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;img alt=&quot;Figure 3 The Noakes Foundation scam alert post on Dr Noakes scam with scammer comments&quot; border=&quot;0&quot; data-original-height=&quot;1948&quot; data-original-width=&quot;1210&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS6jU15SyaWYf2xIKmv5QdWywICrvFQKfRi1vZftyhFZIxuiPLhDBc1y21MpExLIJDTZTUJ4c3AG9wkEZzXHpz1O53XZ1dx5baMcatYdigb_APzJyazC5y-2a4DkwD4mrNq-YZNIDlqP_LPeC9bsjl1gI2ymw1lahpsIco-_9h5qRD5OzCsMGO6P8yoh5X/w249-h400/The%20Noakes%20Foundation%20scam%20alert%20post%20on%20Dr%20Noakes%20scam%20with%20scammer%20comments.png&quot; title=&quot;Figure 3 The Noakes Foundation scam alert post on Dr Noakes scam with scammer comments&quot; width=&quot;249&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 3. Screenshot of The Noakes Foundation scam alert post on Dr Noakes scam with scammer comments, top&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;(2024)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&amp;nbsp;&lt;br /&gt;&lt;div&gt;This scam alert attracted 16 comments, almost all of which seem dubious. Whilst the comments seem to be from &quot;individual&quot; accounts, they may also be synchronised from a &quot;bot farm&quot; to reduce a post&#39;s visibility. On X, tweets that are replied to by dodgy accounts are algorithmically penalised by being adding to a blacklist. If true on Facebook, then this co-ordinated commentary might also be evidence of a malicious actor trying to reduce the visibility of The Noakes Foundation&#39;s response to a scam.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgomBVQKNEdQsksmzKLsJ9JxjDgQSrgZpWLDHpkX4s3YPXF5dhf15D9cTAI21tAcCYay2vHdCRxVlVdcxZP2sXl_nGrvnFieNlKgC_mi3FlSkhYssD8X5Ipk-TTL_VnRk2lEPvveuA_9IGbRD8nY1TyzepuFDR8PgXF3t8b0GAOwgHviLKebQpEcL3BPwro/s1678/Screenshot%20of%20scammer%20comments%20to%20The%20Noakes%20Foundation&#39;s%20scam%20alert%20post%202024.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 4. Screenshot of scammer comments to The Noakes Foundation&#39;s scam alert post for the Dr Noakes scam, bottom (2024)&quot; border=&quot;0&quot; data-original-height=&quot;1678&quot; data-original-width=&quot;1110&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgomBVQKNEdQsksmzKLsJ9JxjDgQSrgZpWLDHpkX4s3YPXF5dhf15D9cTAI21tAcCYay2vHdCRxVlVdcxZP2sXl_nGrvnFieNlKgC_mi3FlSkhYssD8X5Ipk-TTL_VnRk2lEPvveuA_9IGbRD8nY1TyzepuFDR8PgXF3t8b0GAOwgHviLKebQpEcL3BPwro/w265-h400/Screenshot%20of%20scammer%20comments%20to%20The%20Noakes%20Foundation&#39;s%20scam%20alert%20post%202024.png&quot; title=&quot;Figure 4.  Screenshot of scammer comments to The Noakes Foundation&#39;s scam alert post for the Dr Noakes scam, bottom (2024)&quot; width=&quot;265&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 4.&amp;nbsp;&amp;nbsp;Screenshot of&amp;nbsp;scammer comments to&amp;nbsp;The Noakes Foundation&#39;s scam alert post for the Dr Noakes scam, bottom (2024)&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;META&#39;s Facebook and Instagram do not offer its public page managers any option to quickly respond to a barrage of scammy, fake comments. As a result, in addition to responding to fake ads, organisations must also use scarce resources to manage this scammy commentary. Each dodgy Facebook user&#39;s comment (Figure 4) must be- hidden and reported (as false information) one-at-a-time. Likewise for blocking each account, and hiding their feed. The Noakes Foundation is going to flag to META that it must provide page administrators with decent tools to efficiently tackle the &#39;fake comments&#39; threat. Let&#39;s just hope that META is not turning a blind eye to that threat, too...&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;To paraphrase &lt;a href=&quot;https://en.wikipedia.org/wiki/Alien_(film)&quot; target=&quot;_blank&quot;&gt;ALIEN&lt;/a&gt;&#39;s Ash synthetic&#39;s sardonic comment to humans faced confronting the Xenormorph threat, &lt;i&gt;&#39;I can&#39;t lie to you about your chances, but you have my sympathies... in dealing with META (and the CIA)!&#39;&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0tQndWdOM-bwvlRsLT47CAKlUYrbV8XqUgdkHijmkoya4mnCIQoiiKLVevUN8fwv63BzjtCycLjTPgvhkKfhZnmsrOZglnLFYhwovpZ3r7SXWwYkc10z32rArnFTJNQqYsYf9qlTeZyekSNdXW3UB0gDUr_EZHmdsDXwruLIJGQc-LKyr-JXfOYfnnsMC/s694/ALIEN%20Ash%20sympathies%20meme.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Figure 5. ALIEN Ash sympathies meme&quot; border=&quot;0&quot; data-original-height=&quot;500&quot; data-original-width=&quot;694&quot; height=&quot;289&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0tQndWdOM-bwvlRsLT47CAKlUYrbV8XqUgdkHijmkoya4mnCIQoiiKLVevUN8fwv63BzjtCycLjTPgvhkKfhZnmsrOZglnLFYhwovpZ3r7SXWwYkc10z32rArnFTJNQqYsYf9qlTeZyekSNdXW3UB0gDUr_EZHmdsDXwruLIJGQc-LKyr-JXfOYfnnsMC/w400-h289/ALIEN%20Ash%20sympathies%20meme.jpg&quot; title=&quot;Figure 5. ALIEN Ash sympathies meme&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 5. ALIEN Ash sympathies meme&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/8247965414443102143/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2024/08/meta-profits-off-fake-celebrity.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/8247965414443102143'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/8247965414443102143'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2024/08/meta-profits-off-fake-celebrity.html' title='META profits off fake celebrity endorsement ads (&amp; no, &quot;Dr Noakes&quot; cannot help your erection problem 🙄!)'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwlQHyFbYtSlgWBwQF5gsYZMenqcA5sCj_dmuq6-6HkMG7notUROjpJ6cGJr2wE8Q23PhyphenhyphenrjF-bA4fVzp94baTpHykS8iyteEy9aXgcqYh55Cl3aVlGfJcoLoQSb8tLvrJ0ueqvjXEux2NZRTsCfWwckR6Afqc2-iWkyIKOzl2__j0PDmZz3TJxSCLQtRY/s72-w320-h292-c/Bretlinger%20%22Dr%20Noakes%22%20social%20media%20advert%201.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-4768640082178237419</id><published>2024-07-26T12:36:00.060+02:00</published><updated>2025-04-08T17:47:09.437+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="capital"/><category scheme="http://www.blogger.com/atom/ns#" term="censorship"/><category scheme="http://www.blogger.com/atom/ns#" term="digital platform"/><category scheme="http://www.blogger.com/atom/ns#" term="digital voice"/><category scheme="http://www.blogger.com/atom/ns#" term="disinfodemic"/><category scheme="http://www.blogger.com/atom/ns#" term="infodemic"/><category scheme="http://www.blogger.com/atom/ns#" term="science"/><category scheme="http://www.blogger.com/atom/ns#" term="social media"/><category scheme="http://www.blogger.com/atom/ns#" term="suppression"/><category scheme="http://www.blogger.com/atom/ns#" term="wrongthink"/><title type='text'>Content suppression techniques against dissent in the Fifth Estate - examples of COVID-19 censorship on social media</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;color: #666666;&quot;&gt;Written for researchers and others interested in the many methods available to suppress dissidents&#39;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;digital voices. These techniques support&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;contemporary censorship&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;online, posing a&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&amp;nbsp;digital visibility risk for&amp;nbsp; dissidents challenging orthodox narratives in science.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;The Fourth Estate emerged in the eighteenth century as the printing press enabled the rise of an independent press that could help check the power of governments, business, and industry. In similar ways, the internet supports a more independent collectivity of networked individuals, who contribute to a &lt;a href=&quot;https://global.oup.com/academic/product/the-fifth-estate-9780190688370?cc=gb&amp;amp;lang=en&amp;amp;#&quot; target=&quot;_blank&quot;&gt;Fifth Estate&lt;/a&gt; (Dutton, 2023). This concept acknowledges how a network power shift results from individuals who can search, create, network, collaborate, and leak information in strategic ways. Such affordances can enhance individuals&#39; informational and communicative power vis-à-vis other actors and institutions. A network power shift enables greater democratic accountability, whilst empowering networked agents in their everyday life and work. Digital platforms do enable online content creators to generate and share news that digital publics amplify via networked affordances (such as 💌 likes, &quot; quotes &quot; and sharing via # hashtag communities).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div&gt;In an ideal world, social media platforms would be considered to be a public accommodation, and the Fifth Estate&#39;s users would benefit from legal protection of their original content, including strong measures against unjustified suppression and censorship. The latter should recognise the asymmetric challenges that individual dissenters, whistleblowers and their allies must confront in contradicting hegemonic social forces that can silence their opponents&#39; (digital) voices: As recently evidenced in the COVID-19&amp;nbsp;&lt;a href=&quot;https://www.conservativewoman.co.uk/are-novel-viruses-really-that-new/&quot; target=&quot;_blank&quot;&gt;&quot;pandemic&quot;&lt;/a&gt;, the&amp;nbsp;&lt;a href=&quot;https://x.com/mtaibbi/status/1598822959866683394?lang=en&quot; target=&quot;_blank&quot;&gt;Twitter Files&lt;/a&gt;&amp;nbsp;and other investigations reveal how multinational pharmaceutical companies, unelected global &quot;health&quot; organisations, national governments, social media and traditional broadcast companies all conspired to silence dissent that oppossed costly COVID-19 interventions. Regardless of their levels of expertise, critics who questioned this narrative in the Fourth or Fifth Estate were forced to negotiate censorship for the wrong-think of sharing &quot;dangerous&quot; opinions.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Such sanctions reflect powerful authorities&#39; interests in controlling (scientific) language, the window of permissable opinion, and the social discourses that the public might select from, or add. Under the pretext of public &quot;safety&quot;, the censorship industrial complex strong arms the broadcast media and social media companies into restricting dissidents&#39; voices as &quot;misinformation&quot; that is &quot;unsafe&quot;. Facing no contest, the views of powerful officialdoms earn frequent repetition within a tightly controlled, narrow narrative window. At the same legitimate reports of mRNA injuries are falsely redefined to be &quot;malinformation&quot;, and censored.&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;Consequently, instead of a pluralist distribution of power in the Fifth Estate that can support vital expression,&amp;nbsp; powerful authorities are enforcing internet policy interventions that increasingly surveil and censor users&#39;&amp;nbsp;digital voices. &lt;a href=&quot;https://td-sa.net/index.php/td/article/view/1263&quot;&gt;Infodemic&lt;/a&gt; scholars whose work endorses such suppression would seem to be ignorant of how &lt;a href=&quot;https://www.tandfonline.com/doi/full/10.1080/02691728.2024.2346127#d1e799&quot; target=&quot;_blank&quot;&gt;problematic it is to define disinformation&lt;/a&gt;, in general. Particularly in contemporary science, where:&amp;nbsp;&lt;a href=&quot;https://big-lies.org/knowledge-monopolies-research-cartels-jse_18_4_bauer.pdf&quot; target=&quot;_blank&quot;&gt;knowledge monopolies and research cartels&lt;/a&gt;&amp;nbsp;may be dominant; dissenting minds should be welcomed for great science, and a flawed scientific consensus can itself be dangerous. Silencing dissent has important public health ramifications, particularly where the potential for suggesting, and exploring, better interventions becomes closed. Science-, health communication, and media studies scholars may also ignore the inability of medical experts to accurately define what disinformation is, particularly where global policy makers face conflicts of interest (as in the&amp;nbsp;&lt;a href=&quot;https://td-sa.net/index.php/td/article/view/1263&quot; target=&quot;_blank&quot;&gt;World Health Organisation&lt;/a&gt;&#39;s support for genetic vaccines).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Censorship and the suppression of legitimate COVID-19 dissent is dangerously asymmetrical: health authorities already benefit from ongoing capital cascades whose exchange largely serve their interests. Such exchanges span financial, social, cultural, symbolic and even other (e.g. embodied) forms of capital (Bourdieu, 1986:2018). By contrast, individual critics can quickly be silenced by attacks on their limited capital, effectively preventing their exercise of the&amp;nbsp; basic right to free speech, and delivering sustained critiques. A related concern is that the censorial actions of artificial intelligence designers and digital platform moderators are often opaque to a platforms&#39; users. Original content creators may be unaware that they will be de-amplified for sharing unorthodox views, as algorithms penalise the visibility of content on &#39;banned&#39; lists, and any accounts that amplify &quot;wrongthink&quot;.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Content suppression on social media is an important, but neglected topic, and this post strives to flag the wide variety of techniques that may be use in digital content suppression. Techniques are listed in order of seemingly increasingly severe techniques:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4&gt;&lt;span style=&quot;color: #674ea7; font-weight: normal;&quot;&gt;#1 Covering up algorithmic manipulation&lt;/span&gt;&lt;/h4&gt;&lt;h4&gt;&lt;span style=&quot;color: #674ea7;&quot;&gt;&lt;/span&gt;&lt;/h4&gt;&lt;h4&gt;&lt;span style=&quot;color: #674ea7;&quot;&gt;&lt;/span&gt;&lt;/h4&gt;&lt;h4&gt;&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Social media users who are not aware about censorship are unlikely to be upset about it (&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;a href=&quot;https://ijoc.org/index.php/ijoc/article/view/2498&quot; target=&quot;_blank&quot;&gt;Jansen &amp;amp; Martin, 2015&lt;/a&gt;).&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Social media platforms have not been transparent about how they&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;manipulated their recommender algorithms to provide&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;higher visibility for the official COVID-19 narrative&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;, or in&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;crowding out original contributions from dissenters on social media timelines, and in search results.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Such boosting ensured that dissent was seldom seen, or perceived as&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;fringe minority&#39;s concern. As Dr Robert Malone&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://x.com/RWMaloneMD/status/1463896427004936192&quot; style=&quot;font-weight: 400;&quot; target=&quot;_blank&quot;&gt;tweeted&lt;/a&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;, the computational algorithm-based method now &#39;supports the objectives of a Large Pharma- captured and politicised global public health enterprise&#39;. Social media algorithms have come to serve a medical propaganda purpose that crafts and guides the &#39;public perception of scientific truths&#39;. While algorithmic manipulation underpins most of the techniques listed below, it is concealed from s&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;ocial media platform users.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/h4&gt;&lt;h4&gt;&lt;span style=&quot;color: #674ea7; font-weight: normal;&quot;&gt;#2 Fact choke versus counter-narratives&lt;/span&gt;&lt;/h4&gt;&lt;div style=&quot;text-align: left;&quot;&gt;A&lt;span&gt;&amp;nbsp;fact choke involves burying unfavourable commentary amongst a myriad of content. This term was coined by&amp;nbsp;&lt;a href=&quot;https://boriquagato.substack.com/p/at-what-point-do-we-have-to-rename/comment/3668646&quot; target=&quot;_blank&quot;&gt;Margaret Anna Alice&lt;/a&gt;&amp;nbsp;to describe how &quot;fact checking&quot; was abused to suppress legitimate dissent.&lt;br /&gt;&lt;a href=&quot;https://x.com/Smackenziekerr/status/1762387607189868808&quot; target=&quot;_blank&quot;&gt;An example&lt;/a&gt; she tweeted about was the BBC&#39;s Trusted New Initiative warning in&lt;/span&gt;&amp;nbsp;2019 about anti-vaxxers gaining traction across the internet, requiring algorithmic intervention to neutralise &quot;anti-vaccine&quot; content. In response, social media platforms were urged to flood users&#39; screens with repetitive pro-(genetic)-vaccine messages normalising these experimental treatments. Simultaneously, messaging attacked alternate treatments that posed a threat to the vaccine agenda. Fact chokes also included &#39;warning screens&#39; that were displayed before users could click on content flagged by &quot;fact checkers&quot; as &quot;misinformation&quot;.&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;With the &quot;unvaccinated&quot; demonised by the mainstream media to create division, susceptible audiences were nudged to become vaccine compliant to confirm their compassionate virtue. At the same time to retain belief in mRNA genetic vaccine &quot;safety&quot;, personal accounts, aggregated reports (such as &quot;died suddenly&quot; on &lt;a href=&quot;https://markcrispinmiller.substack.com&quot;&gt;markcrispinmiller.substack.com&lt;/a&gt;) and statistical reports (see&amp;nbsp;&lt;a href=&quot;https://www.skyhorsepublishing.com/9781648210730/cause-unknown/&quot; target=&quot;_blank&quot;&gt;Cause Unknown&lt;/a&gt;)&amp;nbsp;for genetic vaccine injuries became suppressed as &quot;malinformation&quot; despite their factual accuracy. Other &quot;controversial content&quot;, such as medical professionals&#39; criticism of dangerous COVID-19 treatment protocols (see&amp;nbsp;&lt;a href=&quot;https://www.amazon.com/What-Nurses-Saw-Investigation-Corruption-ebook/&quot; target=&quot;_blank&quot;&gt;What the Nurses Saw&lt;/a&gt;) or criticism of a social media platform&#39;s policies (such as application of lifetime bans and critiques of platform speech codes) have been algorithmically suppressed.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;Critical commentary may also be drowned out when platforms, such as YouTube, bury long format interviews amongst short &#39;deep fake&#39; videos. These can range from featuring comments the critic never made, to&amp;nbsp;&lt;a href=&quot;https://reportfakeendorsement.com&quot; target=&quot;_blank&quot;&gt;fake endorsements&lt;/a&gt; from cybercriminals (as described on X by &lt;a href=&quot;https://x.com/_whitneywebb/status/1822998570036830295?s=43&amp;amp;t=JHrXr-6-sGfX4uU06cgMeQ&quot; target=&quot;_blank&quot;&gt;Whitney Webb&lt;/a&gt;, or &lt;a href=&quot;https://thenoakesfoundation.org/phishing-scam/&quot; target=&quot;_blank&quot;&gt;Professor Tim Noakes&lt;/a&gt; on &lt;a href=&quot;https://youtu.be/Pwo-UjGXTak&quot; target=&quot;_blank&quot;&gt;YouTube&lt;/a&gt;).&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4&gt;&lt;span style=&quot;color: red; font-weight: 400;&quot;&gt;&lt;/span&gt;&lt;/h4&gt;&lt;h4&gt;&lt;span style=&quot;color: #674ea7; font-weight: normal;&quot;&gt;#3 Title-jacking&lt;/span&gt;&lt;/h4&gt;&lt;h4&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;For the rare dissenting content that can achieve high viewership, another challenge is that title-jackers will leverage this popularity for very different outputs under exactly the same (or very similar) production titles. This makes&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;it less easy for new viewers to find the original work. For example, &lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Liz Crokin&#39;s &#39;&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;a href=&quot;https://www.imdb.com/title/tt12131262/&quot; target=&quot;_blank&quot;&gt;Out of the Shadows&lt;/a&gt;’ documentary describes how&amp;nbsp;Hollywood and the mainstream media manipulate audiences with propaganda. Since this&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;documentary&#39;s release, several videos &lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;were published with the&lt;/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&amp;nbsp;same title.&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;h4&gt;&lt;span style=&quot;color: #674ea7; font-weight: normal;&quot;&gt;&lt;span&gt;#4 B&lt;/span&gt;lacklisting trending dissent&lt;/span&gt;&lt;/h4&gt;Social media search engines typically allow their users to see what is currently the most popular content. In Twitter,&amp;nbsp;dissenting hashtags and keywords that proved popular enough to feature amongst trending content, were quickly added to a &#39;trend blacklist&#39; that hid unorthodox viewpoints. Tweets posted by accounts on this blacklist  are prevented from trending regardless of how many likes or retweets they receive. On Twitter, Stanford Health Policy professor Jay Bhattacharya argues he was &lt;a href=&quot;https://www.congress.gov/118/meeting/house/115561/witnesses/HHRG-118-IF16-Wstate-BhattacharyaJ-20230328.pdf&quot; target=&quot;_blank&quot;&gt;added to this blacklist&lt;/a&gt; for tweeting on a focused alternative to the indiscriminate COVID-19 lockdowns that many governments followed. In particular, The&amp;nbsp;&lt;a href=&quot;https://gbdeclaration.org/&quot; target=&quot;_blank&quot;&gt;Great Barrington Declaration&lt;/a&gt;&amp;nbsp;he wrote with Dr. Sunetra Gupta and Dr. Martin Kulldorff, which attracted over 940,000 supporting signatures.&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;After its publication, all three authors experienced censorship on search engines (Google deboosted results for&amp;nbsp;the declaration), social media platforms (Facebook temporarily removed the declaration&#39;s page, while Reddit removed links to its discussion) and on video (Youtube removed a roundtable discussion with Florida&#39;s Governor Ron DeSantis whose participants questioned the efficacy and appropriateness of requiring children to wear face masks).&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;div&gt;&lt;h4&gt;&lt;span style=&quot;color: #674ea7; font-weight: normal;&quot;&gt;&lt;span&gt;&lt;span&gt;#5 Blacklisting content due to&lt;/span&gt;&amp;nbsp;dodgy account&amp;nbsp;&lt;/span&gt;interactions or external platform links&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;Limited visibility filtering also occurs when comments are automatically commented on by pornbots, or feature engagement by other undesirable accounts. For example, posts mentioning the keywords/subjects such as &#39;vaccine, Pfizer&#39; may receive automated forms of engagement, which then sees posts receiving such &quot;controversial&quot; engagement becoming added to a list ensuring these posts censorship (see 32 mins into Alex Kriel&#39;s talk on the &#39;&lt;a href=&quot;https://rumble.com/v4v0l32-the-role-of-fake-bot-traffic-on-twitterx-alex-kriel.html&quot; target=&quot;_blank&quot;&gt;The Role of Fake Bot Traffic on Twitter/X&lt;/a&gt;&#39;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Social media platforms&#39; algorithms may also blacklist content from external platforms that are not viewed to be credible sources (for example, part of an alternative {alt-right} media), or seen as competing rivals (X penalises the visibility of posts that feature links to external platforms).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4&gt;&lt;span style=&quot;color: #674ea7; font-weight: normal;&quot;&gt;#6 Making content unlikeable and unsharable&lt;/span&gt;&lt;/h4&gt;&lt;h4&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;a href=&quot;https://kirschsubstack.com/p/can-you-spot-the-problem-with-this?&quot;&gt;This&lt;/a&gt; newsletter from Dr Steven Kirsch&#39;s (29.05.2024) described how a Rasmussen Reports video on YouTube had its &#39;like&#39; button removed. As Figure 1 shows, users could only select a &#39;dislike&#39; option. This button was restored for &lt;a href=&quot;https://www.youtube.com/watch?v=NS_CapegoBA&quot;&gt;www.youtube.com/watch?v=NS_CapegoBA&lt;/a&gt;.&lt;/span&gt;&lt;span&gt;&lt;div style=&quot;color: black; font-weight: 400;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5lwbJYLfU99P0khVy_U3Fi5r4yTBU4l5CiYOXjRO6g0Cbcv_db8Cb7UxKPJBgtqlroPB5N0VxdXpFVZolkACOwbG3ZyKoEfQXR80L1x5nS93DIMFrXMty3XSKtSGXdp5vshiqNJjZggqYtxl4AzDhp7XFKMkRbuLKrZlCi1WtowQMUWQWh1Xj_pBkmJX7/s2522/Youtube%20dislike%20Rassmussen%20Reports%20video%20on%20Vaccine%20Deaths.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Youtube dislike Rassmussen Reports video on Vaccine Deaths&quot; border=&quot;0&quot; data-original-height=&quot;1712&quot; data-original-width=&quot;2522&quot; height=&quot;272&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5lwbJYLfU99P0khVy_U3Fi5r4yTBU4l5CiYOXjRO6g0Cbcv_db8Cb7UxKPJBgtqlroPB5N0VxdXpFVZolkACOwbG3ZyKoEfQXR80L1x5nS93DIMFrXMty3XSKtSGXdp5vshiqNJjZggqYtxl4AzDhp7XFKMkRbuLKrZlCi1WtowQMUWQWh1Xj_pBkmJX7/w400-h272/Youtube%20dislike%20Rassmussen%20Reports%20video%20on%20Vaccine%20Deaths.jpg&quot; title=&quot;Figure 1. Youtube dislike Rassmussen Reports video on Vaccine Deaths&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #666666; font-size: x-small;&quot;&gt;Figure 1. Youtube only offers dislike option for Rassmussen Reports video on Vaccine Deaths- sourced from&amp;nbsp;Dr Steven Kirsch&#39;s newsletter&amp;nbsp;(29.05.2024)&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Social media platforms may also prevent resharing such content, or prohibit links to external websites that are not supported by these platforms&#39; backends, or have been flagged for featuring inappropriate content.&lt;/span&gt;&lt;span style=&quot;color: #674ea7;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #674ea7; font-weight: normal;&quot;&gt;#7 Disabling public commentary&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;Social media platforms may limit the mentionability of content, by not offering the opportunity to quote public posts. User&#39;s right-to-reply may be blocked, and critiques may be concealed by preventing them from being linked to from replies.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;h4&gt;&lt;span style=&quot;color: #674ea7; font-weight: normal;&quot;&gt;#8 Making content unsearchable within, and across, digital platforms&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;Social media companies applied search blacklists to prevent their users from finding blacklisted content. Content contravening COVID-19 &quot;misinformation&quot; policies was hidden from search users. For example, Twitter applied a COVID-19 misleading information policy that ended in November, 2022. In June 20023, META began to end its&amp;nbsp;policy for curbing the spread of &quot;misinformation&quot; related to COVID-19 on&amp;nbsp; Facebook and Instagram.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4&gt;&lt;span style=&quot;color: #674ea7;&quot;&gt;&lt;div style=&quot;color: black; font-weight: 400;&quot;&gt;&lt;/div&gt;&lt;/span&gt;&lt;/h4&gt;&lt;h4&gt;&lt;span style=&quot;color: #674ea7; font-weight: normal;&quot;&gt;#9&amp;nbsp; Rapid content takedowns&lt;/span&gt;&lt;/h4&gt;Social media companies could ask users to take down content that was in breach of COVID-19 &quot;misinformation&quot; policies, or automatically remove such content without its creators&#39; consent. In 2021, META &lt;a href=&quot;https://about.fb.com/news/2021/03/how-were-tackling-misinformation-across-our-apps/&quot; target=&quot;_blank&quot;&gt;reported&lt;/a&gt; that it had removed more than 12 million pieces of content on COVID-19 and vaccines that global health experts had flagged as misinformation. YouTube has a &lt;a href=&quot;https://support.google.com/youtube/answer/13813322?hl=en&quot; target=&quot;_blank&quot;&gt;medical misinformation policy&lt;/a&gt;&amp;nbsp;that follows the &lt;a href=&quot;https://www.who.int/teams/digital-health-and-innovation/digital-channels/combatting-misinformation-online&quot; target=&quot;_blank&quot;&gt;World Health Organisation&lt;/a&gt;&amp;nbsp;(WHO) and local health authorities guidance. In June 2021, YouTube&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://x.com/KanekoaTheGreat/status/1621290582248390656&quot; target=&quot;_blank&quot;&gt;removed&lt;/a&gt; a podcast in which the evidence of a reproductive hazard of mRNA shots was discussed between Dr Robert Malone and Steve Kirsch on Prof&amp;nbsp;Bret Weinstein&#39;s&amp;nbsp;&lt;a href=&quot;https://www.youtube.com/@DarkHorsePod&quot; target=&quot;_blank&quot;&gt;DarkHorse&lt;/a&gt;&amp;nbsp;channel. Teaching material that critiqued genetic vaccine efficacy data was automatically removed within seconds for going against its guidelines (see &lt;a href=&quot;https://doi.org/10.1007/s11024-022-09479-4&quot; target=&quot;_blank&quot;&gt;Shir Raz, Elisha, Martin, Ronnel, Guetzkow, 2022&lt;/a&gt;). The WHO reports that its guidance contributed to 850,000 videos related to harmful or misleading COVID-19 misinformation being removed from YouTube between February 2020 and January 2021.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://propagandainfocus.com/deafening-silences-propaganda-through-censorship-smearing-and-coercion/&quot; target=&quot;_blank&quot;&gt;PropagandaInFocus&lt;/a&gt; describes how LinkedIn users are subject to a policy of misinformation that prevents content being shared that &lt;i&gt;&#39;directly contradicts guidance from leading global health organisations and public health authorities&#39;&lt;/i&gt;. Dr&amp;nbsp;&lt;a href=&quot;https://davidthunder.substack.com/p/linkedins-community-policies-are?&quot; target=&quot;_blank&quot;&gt;David Thunder&lt;/a&gt;&amp;nbsp;shared an example of his automated LinkedIn post removal for (1) sharing a scientific study that confirmed that children are at negligible risk of suffering severe disease from COVID-19, and (2) questioning the FDA decision to approve Emergency Use Authorisation for COVID-19 vaccines for children as young as 6 months old. No matter that many other studies confirm both positions, LinkedIn took this post down and threatened to restrict his account.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #674ea7; font-weight: normal;&quot;&gt;#10 Creating memory holes&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;Extensive content takedowns can serve a memory-holing aim, whereby facts and memories of the past become suppressed, erased or forgotten for political convenience. Long after the COVID-19&#39;s &quot;pandemic&quot;, an Orwellian Ministry of Truth continues to memory-hole many health authority decision makers&#39; failures, plus those of the mainstream media&#39;s and most national governments. As discussed &lt;a href=&quot;https://www.youtube.com/live/3kyFT3FXL9Q?si=J8KO6JkZvOSNiuzS&amp;amp;t=1813&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; on YouTube by&amp;nbsp;Mary Lou Singleton, Meghan Murphy and Jennifer Sey, such failures included: mandating masking and school-closures for children (who were never at risk); never questioning the official COVID-19 statistics (such as CNN&#39;s &#39;death ticker&#39;); straight quoting Pfizer press releases as &quot;journalism&quot;, whilst mocking individuals who chose to &#39;do their own research&#39;.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Dr Mark Changizi presents four science moments on memory-holing. In&amp;nbsp;&lt;a href=&quot;https://x.com/MarkChangizi/status/1818323547229434114&quot; target=&quot;_blank&quot;&gt;X video 1&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;https://x.com/MarkChangizi/status/1818323547229434114&quot; target=&quot;_blank&quot;&gt;X video 2&lt;/a&gt;, he highlights how memory-holing on social media is very different from its traditional form. He uses X (formerly X) as an autobiographical tool, creating long threads that serve as a form of visual memory that he can readily navigate. The unique danger of social media account removal/suspension for censorship extends beyond losing one&#39;s history-of-&#39;&lt;u&gt;use&lt;/u&gt;&#39; on that platform, to include all &#39;&lt;u&gt;mentions&lt;/u&gt;&#39; related to its content (ranging from audience likes, to their reply and quote threads). This changes the centrally-controlled communication history of what has occurred on a social media platform. Such censorship violates the free speech rights of all persons who have engaged with that removed account, even its fiercest critics, as they also lose an historical record of what they said.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;By contrast decentralised publications (such as hardcopy publications) are very hard for authorities to memory hole, since sourcing all hardcopies can be nearly impossible for censors. While winners can write history, historians who have access to historical statements can rewrite it. As COVID-19 memory-holing on social media platforms challenges such rewriting, its users must think around creating uncensorable records (such as the book &lt;a href=&quot;https://www.amazon.com/Team-Reality-Fighting-Pandemic-Uninformed/dp/B09XZ34H6V&quot; target=&quot;_blank&quot;&gt;Team Reality: Fighting the Pandemic of the Uninformed&lt;/a&gt;). In&amp;nbsp; &lt;a href=&quot;https://x.com/MarkChangizi/status/1818323547229434114&quot; target=&quot;_blank&quot;&gt;X video 3&lt;/a&gt;, he highlights that freedom of expression is a liability, as expressions push reputation chips on the table. The more claims one stake&#39;s, the greater the risk to one&#39;s reputation if they&#39;re wrong. So, another aspect of memory holing lies in an individual&#39;s potential desire for memory-holing their own platform content, should they prove to be wrong. In &lt;a href=&quot;https://x.com/MarkChangizi/status/1818323547229434114&quot; target=&quot;_blank&quot;&gt;X video 4&lt;/a&gt;, Dr Changizi also spotlights that the best form of memory-holing is self-censorship, whereby individuals see other accounts been suspended, or removed for expressing particular opinions. The witnesses then decide not to express such opinions, since it might endanger their ability to express other opinions. While such absence of speech is immeasurable, it would seem the most powerful memory-holing technique. Individuals&#39; silencing their own voices do not create history.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #674ea7; font-weight: normal;&quot;&gt;#11 Rewriting history&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;Linking back to the Fact Choke technique are attempts at historical revisionism by health authoritians, and their allies. An example of this are claims in the mainstream media that critics of the orthodox narrative were &quot;right for the wrong reasons&quot; regarding the failure of COVID-19 lockdowns, the many negative impacts of closing schooling, businesses, and enforcing mandatory vaccination policies.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #674ea7; font-weight: normal;&quot;&gt;#12 Concealing the motives behind censorship, and who its real enforcers are&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;Social media platforms not only hide algorithmic suppression from users, but may also be misused to hide from users the full rationale for censorship, or who is ultimately behind it. Professor David Hughes prepared a &lt;a href=&quot;https://www.springerprofessional.de/en/cognitive-attack/26991194&quot; target=&quot;_blank&quot;&gt;glossary of deceptive terms and their true meanings&lt;/a&gt; (2024, pp 194-195) to highlight how the meaning of words is damaged by propaganda. A term resonating with technique #9 is &lt;i&gt;“Critical”&lt;/i&gt; - pretending to speak truth to power whilst turning a blind eye to deep state power structures.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The official narrative positioned COVID-19 as a (i) pandemic that had zoonotic (animal-to-human) origins, and alternate explanations were strongly suppressed. As this is the &lt;a href=&quot;https://wherearethenumbers.substack.com/p/virus-origins-and-gain-claim-of-function&quot; target=&quot;_blank&quot;&gt;least likely&lt;/a&gt; explanation, other hypotheses merit serious investigation as they are more plausible. SARS-COV-2 might have stemmed from (ii) an outbreak at the Wuhan Lab&#39;s &quot;gain of function&quot; research, or a (iii) deliberate release in several countries from a biological weapons research project? (iv) Critics of these three explanations allege that a prior endemicity was ‘discovered’ by an &lt;a href=&quot;https://wherearethenumbers.substack.com/p/claim-of-function-it-wasnt-a-lab&quot; target=&quot;_blank&quot;&gt;outbreak of testing&lt;/a&gt;. Some critics even dispute the existence of SARS-COV-2, alleging that (iv) viral transmission is &lt;a href=&quot;https://drmikeyeadon.substack.com/p/fph-the-arguments-for-no-virus?utm_medium=android&amp;amp;triedRedirect=true&quot; target=&quot;_blank&quot;&gt;unproven&lt;/a&gt;, and that the entire&amp;nbsp; COVID-19 &quot;pandemic&quot; is a &lt;a href=&quot;https://www.amazon.com/Covid-19-Psychological-Operations-War-Technocracy/dp/3031418492/ref=sr_1_1?dib=eyJ2IjoiMSJ9.uQ80i1d0RWaWwbDD7l_Wdg.xkO7cP_WFlwwvSkvf-E3X-5R3MfwSRM6XR81rCC51Hs&amp;amp;dib_tag=se&amp;amp;keywords=9783031418495&amp;amp;linkCode=qs&amp;amp;qid=1723189495&amp;amp;s=books&amp;amp;sr=1-1&quot; target=&quot;_blank&quot;&gt;psychological propaganda operation&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;By silencing dissident views like these, social media platforms stop their users from learning about the many legitimate COVID-19 debates that are taking place between experts. This is not a matter of keeping users &quot;secure&quot; from &quot;unsafe&quot; knowledge, but rather networked publics being targeted for social control in the interests of powerful conspirators. In particular, the weaponised deception of social media censorship suits the agenda of the&amp;nbsp;Global Public-Private Partnership (GPPP or G3P), and its many stakeholders. As described by Dr Joseph Mercola in &lt;a href=&quot;https://childrenshealthdefense.org/defender/global-police-un-sustainable-development-goals-cola/&quot; target=&quot;_blank&quot;&gt;The Rise of the Global Police State&lt;/a&gt;, each organisational stakeholder plays a policy enforcement role in a worldwide network striving to centralise authority at a global level.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDdSV5kkKHP6yEAwITmbe0mURQdMHYoPiZZZsCxuO86E60S9KpjLas7KVAEy78Ivu52ckABhXqBh1hTIOpmj7KECHla0mdK1bzYcSaFzPCorJC2rPEFZ2ubzky2zAYfeB6yxDOzhMYn13HQKLKKmBnSth31_eRb8zksFFWJBgZqiiPgV6YnNCQpX82CSwI/s1920/Global%20Public-Private%20Partnership%20G3P%20organogram.jpeg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Global Public-Private Partnership G3P organogram&quot; border=&quot;0&quot; data-original-height=&quot;1081&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDdSV5kkKHP6yEAwITmbe0mURQdMHYoPiZZZsCxuO86E60S9KpjLas7KVAEy78Ivu52ckABhXqBh1hTIOpmj7KECHla0mdK1bzYcSaFzPCorJC2rPEFZ2ubzky2zAYfeB6yxDOzhMYn13HQKLKKmBnSth31_eRb8zksFFWJBgZqiiPgV6YnNCQpX82CSwI/w640-h360/Global%20Public-Private%20Partnership%20G3P%20organogram.jpeg&quot; title=&quot;Global Public-Private Partnership (G3P) organogram&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #666666; font-size: x-small;&quot;&gt;Figure 2. Global Public-Private Partnership (G3P) stakeholders - sourced from &lt;a href=&quot;https://iaindavis.com/UH/G3P-Chart.png&quot; target=&quot;_blank&quot;&gt;IainDavis.com&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #666666; font-size: small;&quot;&gt;(2021) &lt;/span&gt;&lt;span style=&quot;color: #666666; font-size: x-small;&quot;&gt;article at&lt;a href=&quot;https://unlimitedhangout.com/2021/12/investigative-reports/the-new-normal-the-civil-society-deception/&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;https://unlimitedhangout.com/2021/12/investigative-reports/the-new-normal-the-civil-society-deception&lt;/a&gt;.&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;G3P stakeholders have a strong stake in growing a&amp;nbsp;&lt;a href=&quot;https://www.tftc.io/mike-benz/&quot; target=&quot;_blank&quot;&gt;censorship industrial complex&lt;/a&gt;&amp;nbsp;to thwart legitimate dissent. Critiques of the official COVID-19 &quot;pandemic&quot; measures are just one example&amp;nbsp; The industrial censorship complex also strives to stifle robust critiques of (1) climate change &quot;&lt;a href=&quot;https://childrenshealthdefense.org/defender/global-police-un-sustainable-development-goals-cola/&quot; target=&quot;_blank&quot;&gt;science&lt;/a&gt;&quot;, (2) &quot;gender affirming&quot; (transgender) surgery, (3) mass migration (aka the&amp;nbsp;&lt;a href=&quot;https://europeanconservative.com/articles/essay/a-short-step-from-the-great-replacement-to-the-great-turmoil/&quot; target=&quot;_blank&quot;&gt;Great Replacement&lt;/a&gt;), (4) and rigged &quot;democratic&quot; elections, amongst other &quot;unacceptable&quot; opinions. Rather than being for the public&#39;s good, such censorship actually serves the development of a transhumanist, global technocratic society. The&amp;nbsp; digital surveillance dragnet of the &lt;a href=&quot;https://unlimitedhangout.com/2022/02/investigative-reports/technocracy-the-operating-system-for-the-new-international-rules-based-order-1/&quot; target=&quot;_blank&quot;&gt;technocracy&lt;/a&gt; suits the interests of a transnational ruling class in maintaining social control of Western society, and other vassals. This will be expanded upon in a future post tackling the many censorship and suppression techniques that are being against (ii) accounts.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&lt;b&gt;N.B.&lt;/b&gt; This post is a work-in-progress and the list above is not exhaustive- kindly comment to recommend techniques that should be added, and suggestions for salient examples are most welcome.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/4768640082178237419/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2024/07/content-suppression-techniques-against.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/4768640082178237419'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/4768640082178237419'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2024/07/content-suppression-techniques-against.html' title='Content suppression techniques against dissent in the Fifth Estate - examples of COVID-19 censorship on social media'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5lwbJYLfU99P0khVy_U3Fi5r4yTBU4l5CiYOXjRO6g0Cbcv_db8Cb7UxKPJBgtqlroPB5N0VxdXpFVZolkACOwbG3ZyKoEfQXR80L1x5nS93DIMFrXMty3XSKtSGXdp5vshiqNJjZggqYtxl4AzDhp7XFKMkRbuLKrZlCi1WtowQMUWQWh1Xj_pBkmJX7/s72-w400-h272-c/Youtube%20dislike%20Rassmussen%20Reports%20video%20on%20Vaccine%20Deaths.jpg" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.922087 18.4231418</georss:point><georss:box>-62.232320836178843 -16.7331082 -5.6118531638211522 53.579391799999996</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-8032945523493598454</id><published>2024-01-08T10:40:00.010+02:00</published><updated>2024-01-08T11:36:57.003+02:00</updated><title type='text'>Presentation notes for Cybermobs for online academic bullying - a new censorship option to protect The Science™ ’s status-quo </title><content type='html'>&lt;p&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Written for viewers of the Slideshare presentation.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Here is the transcript of the talk that accompanied &lt;a href=&quot;https://www.slideshare.net/TravisNoakes/cybermobs-for-online-academic-bullying-2023pptx&quot; target=&quot;_blank&quot;&gt;https://www.slideshare.net/TravisNoakes/cybermobs-for-online-academic-bullying-2023pptx&lt;/a&gt;. For more on its background, click&amp;nbsp;&lt;a href=&quot;https://www.travisnoakes.co.za/2023/12/cybermobs-for-online-academic-bullying.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;
&lt;/p&gt;&lt;div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;iframe frameborder=&quot;0&quot; height=&quot;400&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/2PjFHoMkkumxaF?hostedIn=slideshare&amp;amp;page=upload&quot; width=&quot;476&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;p&gt;Slide #1&lt;br /&gt;Thanks for the joining this talk on how academic cybermobs can serve as a new censorship option for protecting scientific orthodoxy. Mobs that seek to silence dissenters are a small part of a much greater concern regarding the censorship of legitimate disagreement… and scientific truths online.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;#2&lt;br /&gt;You can all read faster than I can speak, so please do for this organizer of my presentation. After introducing yours truly and The Noakes Foundation (TNF), I am going to define the key concepts of The Science, scientific suppression, undone science, digital voice and online censorship&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;#3&lt;br /&gt;And how digital voice in the Fifth Estate is useful for working around scientific suppression, changing science and guidelines. Dissidents who succeed in gaining public attention can face hard and soft forms of censorship, which include the distinctive actions of an academic cybermobs, plus facing as a myriad of forms of censorship on digital platforms. The talk closes with the challenges of researching academic cybermobs and a brief intro into celebrity cybermobbing research that TNF assists.&lt;/p&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#4&lt;/div&gt;&lt;div&gt;My doctorate was in Media Studies and my research is qualitative and highly interdisciplinary. It spans the fields of culture, digital media, education and the health sciences. A common thread is exploring how individual’s communicative agency relates to social structure. I am an Adjunct Scholar at CPUT, whilst also volunteering at The Noakes Foundation (TNF) for its brand development as evidenced via its new website, plus you’ll see emoji sticker designs from my Create With business in this presentation too.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#5&lt;/div&gt;&lt;div&gt;TNF largely supports research into low-carbohydrate lifestyles as Big Food and Big Pharma generally don’t. I lead TNF’s Academic Free Speech and Digital Voices research project to explore how dissident researchers use digital voice for promoting their research, whilst negotiating scientific suppression and censorship from supporters of The (Current) Science™. The Science™️ is a phenomenon in Higher Education whereby tenured staff must defend the correct science of their time, arguing against alternate explanations. It has a religious overtone, as orthodox scientists strive to protect their life-long contribution of “correct beliefs” against questioning from heretical outsiders. Measures to protect The Science™️’s body of knowledge can include suppression and even “legitimate” censorship of “harmful” counter-opinions and interpretations. The Science™️ is unscientific as it does not encourage dissent’s radically different interpretations of the data.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#6&lt;/div&gt;&lt;div&gt;&lt;div&gt;It’s important to recognise that scientific censorship of differing opinions may only be a last-resort, because the formal assimilation of what is considered prestigious research is so powerful. Therefor before my presentation tackles academic cybermobs, the ‘safe’, incremental knowledge that Higher Education’s funders and leadership support must be critiqued: In media, a few powerful social agents can effectively control research capacity by only funding research directions that serve their business interests. At the same time, false ethical concerns can be used to delimit what’s good to research in a field. TNF’s research beneficiaries have plenty of experience with submitting research proposals that are repeatedly blocked because of dogma that “Eating fat is harmful”, so participants who are urged to do so (and eat less “healthy” sugar in highly processed foods) WILL BE harmed. Ethical compliance in academia can serve unethical ends in slowing, if not preventing, competition between paradigms. Another concern is that conflicts of interest in supporting the silent long-term interests of third-party funders are often undisclosed. Mr Bill Gates is much wealthier now that when he promised to give away his fortune… In part, thanks to the BMGF’s philanthropic support for genetic vaccine research and Mr Gates’ investments in the companies that sell this product. At worst, academic research can be likened to a buyer’s market for real-estate in which the funders as buyers strongly dictate the agenda. In the Health Sciences, huge competition exists between many researchers keen to secure scarce funding from the few large funders who might provide it.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#7&lt;/div&gt;&lt;div&gt;&lt;div&gt;Such public critical reflection on how funders impact academic freedom is disincentivized as career-limiting for most academics. For PANDA, TNF and any research beneficiary, Bourdieusian epistemic reflexivity can provides a vital tool to interrogate their scientific interrogation. The concept of reflexivity helps to spotlight how scholars make judgements of which research problems to focus on and what gets excluded… Perhaps a dominant paradigm can be identified that is a restrictive gatekeeper to new challengers, or a relativist ‘anything goes’ approach is missing the woods for the trees? Pierre Bourdieu’s relational critique helps us fit how our and other scholars’ interpretations link not just to disciplinary fields as agents, but are structured in relation to broader, dynamic social patterns and causalities.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#8&lt;/div&gt;&lt;div&gt;&lt;div&gt;For example the sociology of scientific knowledge helps us understand why economic capital is foundation to developing the other academic capitals shown here. Economic capital from donors (or long-term knowledge investors like Mr Gates) not only support the fieldwork, outputs, academic relationships and prestige in different types of capital exchange within the Higher Educaton field, but contribute to the ongoing development of academic fields and what’s considered legitimate and most valuable in them. Likewise, what is neglected or ignored as shown in the example on the right. That may range from low-cost COVID-19 treatments… to the related deprioritisation of other major health concerns, such as HIV, TB and Malaria in Africa, as described by Dr David Bell. Capital exchange also helps situate whether symbolic recognition for research is high (such for mRNA innovation), low or non-existent.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;#9&lt;/div&gt;&lt;div&gt;&lt;div&gt;Clearly, a complex inter-relationship of extant (and future) capitals is at work in Higher Education (HE) relationships. They typically underpin a “safety first” knowledge landscape where the ideas on the right are endorsed as unquestionably “beneficial”. It is in the interest of The Science™’s business funders to maintain such a beneficient impression with HE experts serving as a bulwark of talking heads versus “science deniers”. The Science™ favors an absence of scientific controversy in HE. This absence suggests universal, expert consensus, and that there is no no need to consider new explanations as the truth is settled. Where debates do occur, Scientific Controversy research methods {such as Venturini and Munk’s ‘Controversy Mapping’ (2022)} can be applied. These help scholars frame the actors, their networks and alliances, plus the debates themselves. However, an economic focus on how capacity for which viewpoints receive funding and develop the strongest capacity would seem the most useful avenue for a sociology of scientific knowledge to develop an holistic picture for what scientific explanations are routinely supported in Higher Education… Conversely, which promising ones receive no support (or are incapacitated) as Undone Science... These evidence potential areas of scientific suppression.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#10&lt;/div&gt;There is important research that could be done, but is not encouraged by the dominant orthodoxy of The Science™. Undone Science exists where research projects’ potential findings may be counter to The Science™’s funders publicity and other interests. For example, international health organisations are unlikely to fund communication studies into how the guidelines they endorsed and paid to amplify caused harms that outweighed overstated risks and inflated benefits. Similarly, multinational genetic vaccine manufacturers will not fund research regarding personal responsibility and low-cost treatments… Related findings may pose an existential threat to Big Pharma’s businesses- especially those that profits from experimental drugs being mandated and tested on so-called “patients” at their own risk.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#11&lt;/div&gt;&lt;div&gt;&lt;div&gt;In contrast to ‘undone science’, scientific suppression speaks to impedance of research that is unfair, unjust and counter to academic standards of behaviour. In theory, academics should enjoy the right to context the prescribed orthodoxy in their academic work and lives. This right seeks to protect academics from the vested interests of other parties, giving those who’ve earned the right an opportunity to speak their truth. It’s a foundational right that should support scholars with advancing and expanding knowledge, for example by accommodating diverse voices. Without strong support for this right, scientific autonomy is unsustainable where funders’ and administrators’ needs subsume any independent scholarship.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#12&lt;/div&gt;&lt;div&gt;&lt;div&gt;True scientific autonomy poses a risk to the powerful, especially where its findings suggest an improved, alternative way of doing things (such as eating low-carb diets for controlling diabetes, versus solely injecting Insulin meds daily). So, in our contemporary marketized universities, which increasingly rely on corporate funding, the on-the-ground financial realities of pleasing long-term funders will contradict the ideals of autonomy, objectivity and free speech. Powerful internal and external groups do not support building capacity for risky research or controversial debates that might upset powerful funders. Rather they fund incrementalistic research in support of more-of-the-same. ‘Revolutionary technology’ mRNA products simply boost Big Pharma’s existing business models. Embedded academics are keen to create debates on the importance of mandatory vaccination, rather than whether the mRNA platform is sufficiently tested to merit being termed a ‘vaccine’. Aware that there is no equal treatment or due process, especially for dissidents with a public following,&amp;nbsp;skeptics protect their reputations and career trajectories by self-censoring, avoiding the time-drain of debating The Science™’s truth. If academics or students have challenging conversations, these may be policed for “wrongthink” leading to career cancelation, especially if their pursuit of objective scientific truth conflicts with the “current thing”. A university may promote “safe spaces”, but these seldom include research into controversial ideas that must confront complex ethical challenges.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#13&lt;/div&gt;&lt;div&gt;&lt;div&gt;The market university is just one site of knowledge production in which social groups try to dominate the development of educational knowledge. Professor Henry Kwok et al. argues that the global health crisis of COVID-19 presents…a fertile ground for exploring the complex division of knowledge labour in a ‘post-truth’ era. In contrast to post-truth which has many definitions and a broad conceptualisation, knowledge production is positioned as a narrow concept well suited for exploring the social conditions of knowledge. This slide’s example shows three ‘fields’ under Rules- Each transformation of knowledge takes place in a particular field (see Table 1), within which different expert agents work. Discourse is produced in HE by a range of agents; A process of Pedagogisation then occurs in which specialist medical knowledge that is inaccessible to the public is recontextualized. Knowledge becomes translated into novel forms that non-specialist audiences might access and understand more readily. What counts as ‘valid’ knowledge and practice in the division of knowledge labour is determined by evaluative rules. Here government officials decide how COVID-19 policy should impact the public in response to guidance from experts. This analysis clarifies that researchers should explore the relations between and within each division’s fields. Such analysis reveals areas of contradiction and conflict between fields, and even agents within them.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#14&lt;/div&gt;&lt;div&gt;&lt;div&gt;Contradictions occur between agents and agencies with different interests, which are directed by and reflected in their divergent goals. An analysis of these contradictions is helpful for broadening our understanding of where ‘post-truth’ moments lie… In this example for the WHO’s infodemic research agenda, it can illustrate examples of disinformation that the WHO’s infodemic research agenda might miss or neglect. As Dr David Bell, my father and I wrote, the WHO leads the infodemic research agenda and positions itself and its international health organisation partners to be evaluators of what “misinformation” is.&amp;nbsp; This has the potential to create an intragroup contradiction, when infodemic scholars at universities research the WHO’s decisions but learn that these and related guidance have shifted dramatically, sometimes with no clear justification!&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#15&lt;/div&gt;&lt;div&gt;&lt;div&gt;For example, Abir Balan’s work here lists the key guidelines provided by the WHO for ‘mitigating the risk and impact of epidemic and pandemic influenza’. However, a cursory glance shows that the public health measures applied in 2019 would be radically altered just months later. Scholars who are dependent on research funding from the WHO (or those whose funding sustains it, such as BMGF) would seem unlikely to criticise such sudden and unexplained shifts in guidance.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#16&lt;/div&gt;&lt;div&gt;&lt;div&gt;Conventional division of knowledge labour diagrams place the tertiary academic field as the leader of discourse production. By contrast, the division for mRNA vaccine research (see Table 3) highlights how companies manufacturing vaccines drive contemporary research and the distributive rules in knowledge labour. Only wealthy pharmaceutical companies have the financial and other resources to drive mRNA research at scale and at warp speed. This of course creates a massive conflict of interest because whether the company producing these therapies will ultimately benefit financially from the future sales of these therapies depends entirely on the published efficacy and safety results from their own research! Another contradiction exists between the deliberation and recontextualisation fields, where vaccine-manufacturing pharmaceutical companies can use their large online advertising budgets to influence content on digital platforms and fact-checking. For example, dissident health professionals and academic scholars who promoted personal responsibility faced censorship, not just on campus and by medical authorities, but also on the most popular social media platforms (such as Facebook and Twitter).&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#17&lt;/div&gt;&lt;div&gt;&lt;div&gt;Such censorship of digital platforms is an important concern, since social media platforms have enabled dissident experts to network their expertise and launch conventional science projects that evolved from anecdotes into published research. As Holmberg’s scholarship shows, online low carb high fat diet advocacy was very important for contesting the flawed nutritional guidelines of the National Swedish Food Agency. This raised political awareness around low carb diets and provided vital opportunities to contest the nutritional authorities with academic research that helped to change Sweden’s nutritional guidelines.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#18&lt;/div&gt;&lt;div&gt;&lt;div&gt;Professor William H Dutton argues in his recent The Fifth Estate book that social media platforms now form part of a Fifth Estate. In a recent email to the Association of Internet Researchers he describes how his book ‘makes a case for the internet and related media and communication technologies enabling the most important power shift of the digital age. A network power shift has been driven by enabling ordinary people to search, originate, network, collaborate, and leak information in ways than enhance their informational and communicative power. In such ways, the internet is empowering many ordinary individuals to form a more independent collectivity of networked individuals—a Fifth Estate. This network power shift enables greater democratic accountability, whilst empowering networked individuals in their everyday life and work. Suggesting these platforms importance in how digital content creators generate and share news that digital publics amplify via networked affordances.&#39;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#19&lt;/div&gt;&lt;div&gt;&lt;div&gt;Professor Holmberg is one of very few scholars who have written how dissident scientists have successfully exercised digital voice to change both science and government guidelines. There is a large research gap concerning empirical research into scientific censorship. We do know that it has two forms: hard and soft. Authorities try to prevent dissemination with the former… or pressurize dissidents with threats of reputational damage and exclusion from their fields of knowledge production. With dissenters’ digital voices emerging as as potent force for creating social movements via the powerful Fifth Estate&lt;/div&gt;&lt;div&gt;authorities’ desires to exercise censorship via Big Tech’s social media platforms is an emergent reality.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#20&lt;/div&gt;&lt;div&gt;&lt;div&gt;Naim and Bennett (2014) proposed this 21st century censorship matrix for government influence on the production and dissemination of information and opinion. Such censorship can be obvious, in being direct and visible. In contrast, it may be hard to sport as stealthy and/or indirect.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#21&lt;/div&gt;&lt;div&gt;&lt;div&gt;This is a similar matrix for what has been evidenced against low-carb scholars, from Australasia to South Africa, the USA onto Scandinavia. Various roleplayers aim to prevent research and teaching into the insulin resistance model inside Academia, and to create the perception amongst online audiences that the science behind LCHF is illegitimate, unscientific and promoted by self-serving charlatans.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#22&lt;/div&gt;&lt;div&gt;&lt;div&gt;Senior scientific dissidents with a public following will be a lightning rod for such attacks, since their position highlights that the science is not settled. My father, Emeritus Professor Noakes, has made this major contribution to his institutional employer over a long academic career. He shifted to a low carb, or Banting lifestyle in 2011 and shared the benefits of a low-carb lifestyle which supported the reversal of diabetes.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#23&lt;/div&gt;&lt;div&gt;&lt;div&gt;Heavily processed, Big Food industries and insulin-pushing Big Pharma businesses want to limit the public’s attention to low-carb science as it threatens their profits. Such powerful companies can support these strategies for breaking the causal chain between Prof Noakes’ information dissemination and individuals’ willingness to act. In Prof Noakes’ case, they could support critics who sought to delegitimate his research journal publications and books he wrote on low carb; pseudo-skeptics questioned his credibility and that of &quot;Tim Hoax&quot;’s associates in a myriad of publications. Their attacks could involve many forms of cyber harassment.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#24&lt;/div&gt;&lt;div&gt;&lt;div&gt;Daniel Citron’s excellent book, ‘Hate Crimes in Cyberspace’, provides this common definition for harassment on page 124- ‘Harassment is typically understood as a willful and malicious ‘course of conduct’ directed at a person that would cause a reasonable person to suffer substantial emotional distress and that does cause the person to suffer distress.’&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#25&lt;/div&gt;&lt;div&gt;&lt;div&gt;The term ‘cyber harassment’ is necessary, as Citron points out, for describing how the reach and pervasiveness of the internet can exacerbate the injuries that targets suffer; In cyber harassment, there is an interesting paradox between how the texts, images, sounds and videos shared by cyber harassers seem banal and trivial BUT the impact of this content can actually threaten families, careers and lives! Repeated privacy invasions, threats of violence and attacks on a target’s reputation may sabotage their professional and family lives, future opportunities…and even lead to suicide or its recipient “going postal”.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#26&lt;/div&gt;&lt;div&gt;&lt;div&gt;Fortunately, Professor Noakes is very tough and has survived nearly a decade of such cyber harassment with such experiences shared in this partially pseudonymized case.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;#27&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;There are many activities that the perpetrators of cyber harassment can follow… All should be regarded seriously as they can result in emotional, physical and professional harm to their targets. Using Tim’s example, I’ll talk through two threats that you may be unfamiliar with: The first is ‘Google bombing’ in which a search engine page is gamed to elevate the rankings of negative and destructive pages… in this case, if you search for Prof’s ‘Lore of Nutrition’ book, but what first appears is a biased, negative review from a pediatrician… versus the many positive reviews that this book earned. A technical explanation for this high-ranking of the review is certainly not its quality… rather that it is cited on Wikipedia, which Google deems a credible source. The second threat are “digital pariah” profiles created by Wikipedia’s and Rationalwiki’s editors’ choices. Such “crowdsourced” profiles are strongly shaped by an anti-dissident editorial bias. Remember that when next you are asked to donate by the “independent” Wikipedia.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#28&lt;/div&gt;&lt;div&gt;&lt;div&gt;Digital pariah profiles and Google Bombs are digital extensions of academic workplace mobbing techniques. Academic mobbing seeks to eject scholars from academia, involving aggressive techniques for ostracization. Recontextualising an A1 rated scientist’s career and books as flawed are clearly an example of this. Unlike organic trolling from complete strangers, colleagues in an academic cybermob can launch concerted attacks. This makes academic cybermobbing a distinct, emergent threat.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#29&lt;/div&gt;&lt;div&gt;&lt;div&gt;Dissidents voicing pro Insulin Resistance model and offering low carbohydrate advice communicate in diverse issue arenas, ranging from the model’s science to the lifestyle’s impact on agriculture. These are PR areas that corporations, institutions and their employees have high stakes in. Dissidents may attract direct and indirect criticism from any of these agents concerned about such issues.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#30&lt;/div&gt;&lt;div&gt;&lt;div&gt;What was notable in Prof Noakes’ case was the vast number of South African and International bodies who had stakes in challenging his opinions. Health organisations and academic institutions may also become involved in correspondence.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#31&lt;/div&gt;&lt;div&gt;&lt;div&gt;The criticisms from work colleagues here would seem unethical and unacceptable in most workplaces. They also create a problem for the recipient in how to respond appropriately to such criticism with no germane successful examples to follow. Here we see the types of slurs used on Twitter and elsewhere &amp;nbsp;that hypercritical interlocutors used in arguing that Professor Tim Noakes had morphed into a dangerous “anti-science” hack.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#32&lt;/div&gt;&lt;div&gt;&lt;div&gt;Academic cybermobbing differs from workplace mobbing which is defined as an embodied covert process inside a university employee’s faculty’s department. Here are 16 key points covering the ways in which academic cybermobbing can be worse. In particular, the network of attacking groups and individuals is often visible, making it easy to jump on the bandwagon. Sensationalist criticism is encouraged by digital platform algorithms that reward controversy with attention - cyber mobs drive circles of outrage that contribute to spiraling cyber harassment. A dissident can easily exhaust him or herself trying to respond to many phases of criticism from different groups on many platforms across different timezones. And there may well be no institutional recourse against colleagues whose freedom of speech ironically undermines the aforesaid for dissidents. Overall there is complete asymmetry between a dissident’s capabilities to respond, and critics myriad of opportunities for attack.&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#33&lt;/div&gt;&lt;div&gt;&lt;div&gt;The agents in an academic cybermobbing can also differ to those in academic mobbing, While the latter will have private orchestrators and supporters who are all academics in a shared field, an academic cybermobbing can involve recontexualisers from other fields. For example, public criticism from trolls keen to syphon off a dissident’s public views. As a public spectacle, it is also concerning for dissidents when their colleagues simply act as witnesses and bystanders to cyber harassment.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#34&lt;/div&gt;&lt;div&gt;&lt;div&gt;Participating in criticism of dissidents can also be used for capital exchange. Pseudo-skeptics can gain hypervisibility as thought leaders, that they cannot achieve without holding PhDs and making real contributions to academia. Likewise, reaping symbolic capital in terms of the numbers of followers they attract. Dogmatists can earn social capital bridging them with to new groups, plus their defence of the orthodoxy may reap rewards ranging from content payments to securing better academic positions.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#35&lt;/div&gt;&lt;div&gt;&lt;div&gt;While I use negative terms such as dogmatist and pseudo-skeptic, it is important to keep in mind that the academic defenders of The Science™ do readily justify their censorship activities as well-meaning, &amp;nbsp;benevolent for their peers and the public, and pro-social overall for human wellbeing.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#36&lt;/div&gt;&lt;div&gt;&lt;div&gt;Overt censorship tactics are not only applied by platforms, but can be requested and applied by defenders of the Science™ in certain instances. For example, mobs can launch matrix attacks for deplatforming their targets. Dissidents can be reported for being in breach of platform safety… such as Twitter’s pre-Musk COVID-19 communication policy.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;#37&lt;/div&gt;&lt;div&gt;&lt;div&gt;Digital platforms have many covert censorship mechanisms that can be used for stifling free speech. Around 24 of them are listed on this slide and the next…&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#38&lt;/div&gt;&lt;div&gt;&lt;div&gt;While academic cybermobs may not be responsible for such tactics, they certainly may take actions to promote systematic censorship against the misinformation from dissidents to prevent its assumed harms. This itself may have a serious harm in serving as scientific censorship that will suppress accurate information, such as supporting a fake consensus for dysfunctional interventions.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#39&lt;/div&gt;&lt;div&gt;&lt;div&gt;It is hard to research such censorship and there are many obstacles to researching academic cybermobs even if you can find scarce funding. These include: there not being a strong rationale or examples one can follow. One must access data under highly restrictive research user agreements. There can be much missing data (cyber harassment from private, deleted or banned accounts is not provided via APIs). Data is provided in structures that can make it hard to track key analytical foci (e.g. conversation threads on X (healthy conversations). There are challenges in cleaning the data and representing the original users’ experience (spreadsheet data vs multimodal tweets). There are also important ethical challenges in researching colleagues’ anti-social activities and producing research outputs from them!&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#40&lt;/div&gt;&lt;div&gt;&lt;div&gt;One challenging, but less ethically difficult proposition is to explore the activity of cybermobs outside academia. For example, The Noakes Foundation, Younglings Africa and the SMILR lab support PhD candidate Pinky Motshware with studying celebrity cybermobs. Their attacks led to life changing outcomes for local black male celebrities, which Pinky is preparing case studies for.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;#41&lt;/div&gt;&lt;div&gt;&lt;div&gt;Thank you for your attention and continued support.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/8032945523493598454/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2024/01/presentation-notes-for-cybermobs-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/8032945523493598454'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/8032945523493598454'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2024/01/presentation-notes-for-cybermobs-for.html' title='Presentation notes for Cybermobs for online academic bullying - a new censorship option to protect The Science™ ’s status-quo '/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-4642690754124420233</id><published>2023-12-11T14:09:00.007+02:00</published><updated>2023-12-11T16:31:18.331+02:00</updated><title type='text'>Cybermobs for online academic bullying - a new censorship option to protect The Science™ ’s status-quo</title><content type='html'>&lt;div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;color: #666666;&quot;&gt;Written for individuals interested in what&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;academic cybermobbing and&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;the Science™is, plus how both stifle opportunities for challenging research and academic free speech in Higher Education.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;I prepared the presentation below for a talk to&amp;nbsp;&lt;a href=&quot;https://rumble.com/c/PANDATA19&quot;&gt;PANDATA’s Open Society&lt;/a&gt; on December the 6th, 2023. Thank you to&amp;nbsp;&lt;a href=&quot;https://twitter.com/GordonDomini&quot; target=&quot;_blank&quot;&gt;Domini Gordon&lt;/a&gt;&amp;nbsp;for organising the talk, and&amp;nbsp;&lt;a href=&quot;https://piersrobinson.com/&quot; target=&quot;_blank&quot;&gt;Dr Piers Robinson&lt;/a&gt;&amp;nbsp;for facilitating the questions.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;iframe frameborder=&quot;0&quot; height=&quot;400&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/2PjFHoMkkumxaF?hostedIn=slideshare&amp;amp;page=upload&quot; width=&quot;476&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;This talk addresses how how academic cybermobs now serve as a new censorship option for protecting scientific orthodoxy. Such mobs attempts at silencing dissenters are a small part of a much greater concern regarding the censorship of legitimate disagreement and scientific truths at university, and online. This presentation has extensive notes, so should be easy to follow (or you can follow the Open Society Rumble account and view my uploaded talk once it&#39;s shared there).&lt;br /&gt;&lt;br /&gt;Feedback to the presentation was positive, with the audience agreeing that it is necessary to formalise a critical space within universities where viewpoint diversity and boundary-breaking research can be promoted. For example, universities could consider how to support apolitical funding for adversarial research collaborations. Universities must also motivate for funding from government to address the lack of funding outside medicine for innovative, and potentially controversial, research. Without action to support such academic freedom, funders&#39; biases will continue to constrain all research conflicting with their interests.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;There is also an opportunity to highlight institutional entanglements from corporates (for example,&amp;nbsp;AstraZeneca and Oxford University), plus to contribute research on the drivers for censorship across different issue arenas, and the agents involved (stretching across broadcast media, multinational companies, political lobbies, intelligence agencies and government).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://thenoakesfoundation.org/research/academic-free-speech-and-digital-voices/&quot; target=&quot;_blank&quot;&gt;The Noakes Foundation&lt;/a&gt;, &lt;a href=&quot;https://pandata.org/&quot; target=&quot;_blank&quot;&gt;Pandata&lt;/a&gt; and other dissident research supporters should also work to connect to groups working for academic free speech, and mutually promote their work. These include:&lt;br /&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The recently launched &lt;a href=&quot;https://www.uaustin.org/&quot; target=&quot;_blank&quot;&gt;University of Austin&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.thefire.org/&quot; target=&quot;_blank&quot;&gt;FIRE Foundation&lt;/a&gt; for Individual Rights and Free Expression&lt;/li&gt;&lt;li&gt;The &lt;a href=&quot;https://brownstone.org/&quot; target=&quot;_blank&quot;&gt;Brownstone Institute&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://quillette.com/&quot; target=&quot;_blank&quot;&gt;Quilette&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://heterodoxacademy.org&quot; target=&quot;_blank&quot;&gt;Heterodox Academy&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://freespeechunion.org/join/&quot; target=&quot;_blank&quot;&gt;Free Speech Union&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.academicfreedomforall.com/&quot; target=&quot;_blank&quot;&gt;Academic Freedom for All&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.dobetteracademia.co.uk/&quot; target=&quot;_blank&quot;&gt;Do Better Academia&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.freex.group/&quot; target=&quot;_blank&quot;&gt;FreeX&lt;/a&gt; and &lt;a href=&quot;https://www.loofwired.com/&quot; target=&quot;_blank&quot;&gt;LoofWired&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Likewise, for anti-bullying groups, such as:&lt;br /&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Academic &lt;a href=&quot;https://paritymovement.org/&quot; target=&quot;_blank&quot;&gt;Parity movement&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.speakoutrevolution.co.uk/&quot; target=&quot;_blank&quot;&gt;Speak Out Revolution&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://warn-honor.com/&quot; target=&quot;_blank&quot;&gt;Whistleblower Anti Bullying&amp;nbsp;&lt;/a&gt;Network&lt;/li&gt;&lt;/ol&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;P.S. My X (formerly Twitter) list for &#39;&lt;a href=&quot;https://twitter.com/i/lists/1365972041321570305&quot; target=&quot;_blank&quot;&gt;Anti workplace bullying&lt;/a&gt;&#39; features these and other groups.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The audience suggested several individuals who have been targets of academic cybermobbing for germane case studies. These included three past speakers to Open Society, &lt;a href=&quot;https://rumble.com/v2t35x0-is-society-caught-up-in-a-death-spiral-prof-michala-schippers.html&quot; target=&quot;_blank&quot;&gt;Professor Michaela Schippers&lt;/a&gt;, &lt;a href=&quot;https://rumble.com/v2xt1ru-censorship-and-academic-freedom-laurens-buijs.html&quot; target=&quot;_blank&quot;&gt;Dr Laurens Buijs&lt;/a&gt;&amp;nbsp;and &lt;a href=&quot;https://rumble.com/v3t0cto-nova-academia-a-new-academic-initiative-prof-paul-frijters.html&quot; target=&quot;_blank&quot;&gt;Professor Paul Frijters&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;I enjoyed learning from the audience, and hope to present to the Open Society in the not-too-distant future with in-depth research examples for academic cybermobbing. These may present interesting contrasts to the Emeritus Professor&#39;s case written about in &#39;&lt;a href=&quot;https://www.sciencedirect.com/science/article/pii/S240584402100431X&quot; target=&quot;_blank&quot;&gt;Distinguishing online academic bullying&lt;/a&gt;&#39;!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;If you have any questions about this presentation or concerns, please post a blog comment below.&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/4642690754124420233/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2023/12/cybermobs-for-online-academic-bullying.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/4642690754124420233'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/4642690754124420233'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2023/12/cybermobs-for-online-academic-bullying.html' title='Cybermobs for online academic bullying - a new censorship option to protect The Science™ ’s status-quo'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-4679270222802704175</id><published>2023-09-26T17:36:00.006+02:00</published><updated>2023-09-27T08:26:28.042+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="academic"/><category scheme="http://www.blogger.com/atom/ns#" term="analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="CAQDAS"/><category scheme="http://www.blogger.com/atom/ns#" term="QDAS"/><category scheme="http://www.blogger.com/atom/ns#" term="qualitative"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="social_network"/><category scheme="http://www.blogger.com/atom/ns#" term="software_comparison"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter"/><title type='text'>Noteworthy disparities with four CAQDAS tools: explorations in organising live Twitter (now known as X) data</title><content type='html'>&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-6968435661405157031&quot; itemprop=&quot;description articleBody&quot; style=&quot;border: 0px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px; overflow: hidden; padding: 16px; vertical-align: baseline; width: auto;&quot;&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Written for researchers interested in extracting live X (formerly&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;caret-color: rgb(153, 153, 153); color: #999999;&quot;&gt;Twitter)&lt;/span&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&amp;nbsp;data via Qualitative Data Analysis Software tools&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;a href=&quot;https://journals.sagepub.com/home/ssc&quot;&gt;Social Science &lt;/a&gt;&lt;a href=&quot;https://journals.sagepub.com/home/ssc&quot;&gt;Computer Review&lt;/a&gt; (SSRC) has just published a paper by yours truly, Dr &lt;a href=&quot;https://scholar.google.co.za/citations?user=n1-qgFAAAAAJ&amp;amp;hl=en&quot; target=&quot;_blank&quot;&gt;Pat Harpur&lt;/a&gt; and Dr &lt;a href=&quot;https://www.researchgate.net/profile/Corrie-Uys&quot; target=&quot;_blank&quot;&gt;Corrie Uys&lt;/a&gt;&amp;nbsp;to&amp;nbsp;&lt;a href=&quot;https://doi.org/10.1177/08944393231204163&quot; target=&quot;_blank&quot;&gt;https://doi.org/10.1177/08944393231204163&lt;/a&gt;. As the article&#39;s title suggests, we focus on the contrasting the &lt;a href=&quot;https://www.surrey.ac.uk/computer-assisted-qualitative-data-analysis/resources/software-information&quot; target=&quot;_blank&quot;&gt;Qualitative Data Analysis Software&lt;/a&gt; (QDAS) packages that currently support live Twitter data imports.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;QDAS tools that support live data extraction are a relatively recent innovation.&amp;nbsp;At the time of our fieldwork, four prominent QDAS provided this: only&amp;nbsp;&lt;a href=&quot;https://atlasti.com&quot;&gt;ATLAS.ti&lt;/a&gt;™, &lt;a href=&quot;https://lumivero.com/products/nvivo/&quot;&gt;NVivo&lt;/a&gt;™, &lt;a href=&quot;https://www.maxqda.com/&quot;&gt;MAXQDA&lt;/a&gt;™ and &lt;a href=&quot;https://provalisresearch.com/products/qualitative-data-analysis-software/&quot; target=&quot;_blank&quot;&gt;QDA Miner&lt;/a&gt;™ had Twitter data import functionalities.&amp;nbsp;Little has been written concerning the research implications of differences between their functionalities, and how such disparities might contribute to contrasting analytical opportunities. Consequently, early-stage researchers may experience difficulties in choosing an apt QDAS to extract live data for &lt;a href=&quot;https://developer.twitter.com/en/use-cases/do-research/academic-research&quot; target=&quot;_blank&quot;&gt;Twitter academic research&lt;/a&gt;.&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-6968435661405157031&quot; itemprop=&quot;description articleBody&quot; style=&quot;border: 0px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px; overflow: hidden; padding: 16px; vertical-align: baseline; width: auto;&quot;&gt;In response to both methodological gaps, we spent almost a year working on a software comparison to address the research question (RQ) &#39;How do QDAS packages differ in what they offer for live Twitter data research during the organisational stage of qualitative analysis?&#39;.&amp;nbsp;Comparing their possible disparities seems worthwhile since what QDAS cannot, or poorly, support may strongly impact researchers’ microblogging data, its organisation, and scholars’ potential findings. In the preliminary phase of research, we developed a features checklist for each package, based on their online manuals, product descriptions and forum feedback related to live Twitter imports. This checklist confirmed wide-ranging disparities between QDAS, which were not unexpected since they are priced very differently- ranging from $600 for an ATLAS.ti subscription, to $3,650 for a QDAMiner (as part of the&amp;nbsp;Provalis Research’s ProSuite package, which also includes&amp;nbsp;WordStat 10 &amp;amp; Simstat).&lt;br /&gt;&lt;br /&gt;To ensure that each week&#39;s Twitter data extractions could produce much data for potential evaluation, we&amp;nbsp;focused on extracting and organising communiqués from the national electrical company, the&amp;nbsp;&lt;a href=&quot;https://www.eskom.co.za/&quot; target=&quot;_blank&quot;&gt;Electricity Supply Commission&lt;/a&gt;&amp;nbsp;(Eskom). ‘Load-shedding’ is the Pan South African Language Board’s word of the year for 2022 (&lt;a href=&quot;https://www.pansalb.org/load-shedding-declared-sa-word-of-the-year-2022/&quot; target=&quot;_blank&quot;&gt;PanSALB, 2022&lt;/a&gt;), due to it most frequent use in credible print, broadcast and online media. Invented as a euphemism by Eskom’s public-relations team, load-shedding describes electricity blackouts. Since 2007, planned rolling blackouts have been used in a rotating schedule for periods ‘where short supply threatens the integrity of the grid’ (&lt;a href=&quot;https://www.amazon.com/Load-Shedding-Writing-South-Africa-ebook/dp/B00CCTWQP4&quot; target=&quot;_blank&quot;&gt;McGregor &amp;amp; Nuttall, 2013&lt;/a&gt;). In the weeks up to, and during, the researchers’ fieldwork, Eskom, and the different stages of loadshedding strongly trended on Twitter. These tweets reflected the depth of public disapproval, discontent, anger, frustration, and general concern.&lt;br /&gt;&lt;br /&gt;QDAS packages commonly serve as tools that researchers can use for four broad activities in the qualitative analysis process (&lt;a href=&quot;https://doi.org/10.1007/978-1-4614-3185-5_18&quot; target=&quot;_blank&quot;&gt;Gilbert, Jackson, &amp;amp; di Gregorio, 2014&lt;/a&gt;). These are (a) organising- coding sets, families and hyperlinking; (b) exploring - models, maps, networks, coding and text searches; (c) reflecting - through memoing, annotating and mapping; and (d) integrating qualitative data through memoing with hyperlinks and merging projects (&lt;a href=&quot;https://www.amazon.com/SAGE-Handbook-Qualitative-Research-Handbooks/dp/1412974178/ref=sr_1_2?crid=3NG6Z9MZK5SAB&amp;amp;keywords=The+SAGE+Handbook+of+Qualitative+Research&amp;amp;qid=1693911902&amp;amp;sprefix=the+sage+handbook+of+qualitative+research%2Caps%2C407&amp;amp;sr=8-2&quot; target=&quot;_blank&quot;&gt;Davidson &amp;amp; di Gregorio, 2011&lt;/a&gt;; &lt;a href=&quot;https://www.researchgate.net/publication/224123219_Using_Web_20_Tools_for_Qualitative_Analysis_An_Exploration&quot; target=&quot;_blank&quot;&gt;Di Gregorio, 2010&lt;/a&gt;; &lt;a href=&quot;https://methods.sagepub.com/book/using-software-in-qualitative-research-2e&quot; target=&quot;_blank&quot;&gt;Lewins &amp;amp; Silver, 2014&lt;/a&gt;).&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-6968435661405157031&quot; itemprop=&quot;description articleBody&quot; style=&quot;border: 0px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px; overflow: hidden; padding: 16px; vertical-align: baseline; width: auto;&quot;&gt;Notwithstanding the contrasts in the costs for different QDAS packages, it was still surprising how much the QDAS tools varied for the first activity, (a) ‘organising data’ in our qualitative research project: Notably, the quantum of data extracted for the same query differed, largely due to contrasts in the types and amount of data that the four QDAS could extract. Variations in how each supported visual organisation and thematic analysis also shaped researchers’ opportunities for becoming familiar with Twitter users and their tweet content.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-6968435661405157031&quot; itemprop=&quot;description articleBody&quot; style=&quot;border: 0px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px; overflow: hidden; padding: 16px; vertical-align: baseline; width: auto;&quot;&gt;Such disparities suggest that choosing a suitable QDAS for organising live Twitter data must dovetail with a researcher’s focus: ATLAS.ti accommodates scholars focused on wrangling unstructured data for personal meaning-making, while MAXQDA suits the mixed-methods researcher. QDA Miner’s easy-to-learn user interface suits a highly efficient implementation of methods, whilst NVivo supports relatively rapid analysis of tweet content.&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-6968435661405157031&quot; itemprop=&quot;description articleBody&quot; style=&quot;border: 0px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px; overflow: hidden; padding: 16px; vertical-align: baseline; width: auto;&quot;&gt;We hope that these findings might help guide Twitter social science researchers and others in QDAS tool selection. Our research has suggested recommendations for these tools&amp;nbsp;developers to follow for &lt;a href=&quot;https://www.travisnoakes.co.za/2023/06/recommendations-for-qdas-developers.html&quot; target=&quot;_blank&quot;&gt;potentially improving the user experience for Twitter researchers&lt;/a&gt;. Future research might explore disparities in other qualitative research phases, or contrast data extraction routes for a variety of microblogging services.&amp;nbsp; More broadly,&amp;nbsp; an opportunity for a methodological contribution exists regarding research that can define a strong rationale for the software comparison method.&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot; id=&quot;post-body-6968435661405157031&quot; itemprop=&quot;description articleBody&quot; style=&quot;border: 0px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px; overflow: hidden; padding: 16px; vertical-align: baseline; width: auto;&quot;&gt;The authors greatly appreciate the SSRC&#39;s editor, &lt;a href=&quot;https://anthrosteve.wordpress.com/&quot; target=&quot;_blank&quot;&gt;Professor Stephen Lyon&lt;/a&gt;, advice on improving our final manuscript. We also thank&amp;nbsp;&lt;a href=&quot;https://thenoakesfoundation.org/&quot; target=&quot;_blank&quot;&gt;The Noakes Foundation&lt;/a&gt;&amp;nbsp;for its grant AFSDV02- our interdisciplinary&amp;nbsp;software comparison would not have been possible without funding to&amp;nbsp;cover subscriptions to the most extensive versions of MAXQDA Analytics Pro and QDA Miner. All authors are affiliated with the &lt;a href=&quot;https://www.cput.ac.za&quot; target=&quot;_blank&quot;&gt;Cape Peninsula University of Technology&lt;/a&gt;&amp;nbsp;(CPUT) and appreciate CPUT&#39;s provision of&amp;nbsp;licensed versions of ATLAS.ti.&lt;br /&gt;&lt;br /&gt;Please comment below if you have any questions or comments regarding our paper?&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/4679270222802704175/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2023/09/noteworthy-disparities-with-four-caqdas.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/4679270222802704175'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/4679270222802704175'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2023/09/noteworthy-disparities-with-four-caqdas.html' title='Noteworthy disparities with four CAQDAS tools: explorations in organising live Twitter (now known as X) data'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.9248685 18.4240553</georss:point><georss:box>-62.235102336178848 -16.7321947 -5.6146346638211568 53.5803053</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-6698387419301588737</id><published>2023-08-21T10:23:00.060+02:00</published><updated>2025-08-01T15:57:50.462+02:00</updated><title type='text'>Four categories for Anti-Bullying Apps (ABAs), with examples for each</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Written for people interested in learning about the wide range of anti cyber harassment apps that exist.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;There are many &lt;b&gt;Anti Bullying Apps&lt;/b&gt; (ABAs) seeking to inform and assist recipients of cyber harassment. Some ABAs may even assist cyberbullies with curbing their anti-social behaviours.&amp;nbsp;ABAs vary in their specific functions and features. These can be categorised into three groups [1]: (1) general protection, (2) information, and (3) reporting to authorities. This post suggests a fourth, (4) in-platform interventions (such as Instagram&#39;s anti-bullying tools). This accommodates tools that are distinct in being specifically developed to exist inside a particular platforms (such as WhatsApp, versus being a standalone app outside it). Such sub-apps&amp;nbsp;(or tools) may also combine different aspects of the top three categories:&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;1 General protection&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;color: #7f6000;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;b&gt;1.1 Bark&lt;/b&gt; at &lt;a href=&quot;https://www.bark.us/learn/cyberbullying&quot; target=&quot;_blank&quot;&gt;https://www.bark.us/learn/cyberbullying&lt;/a&gt; is an online protection tools for US parents to limit the amount of time their children spend on various websites, view their children’s browsing history, and for receiving alerts when keywords and phrases that might indicate bullying or harassment in their child’s electronic communications (such as text messages). Mentioned in [1].&lt;div&gt;&lt;br /&gt;&lt;p&gt;&lt;b&gt;1.2 BullStop&lt;/b&gt; at&amp;nbsp;&lt;a href=&quot;https://www.bullstop.io/&quot; target=&quot;_blank&quot;&gt;https://www.bullstop.io/&lt;/a&gt;&amp;nbsp;aims to help young people&#39;s proactive combating of cyberbullying, and monitors social media accounts by regularly reviewing messages as they are received. It uses artificial intelligence for analysing these- flagging offensive content like abuse, bullying,&amp;nbsp;insults, pornography, spam and threats. [1]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;2 Information&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;color: #7f6000;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.1 &lt;/b&gt;&lt;b&gt;&amp;nbsp;ActionPoint&amp;nbsp;&lt;/b&gt;aims to help families build stronger communication skills, set healthy boundaries for social media use, define a teen&#39;s cyberbullying risk and identify instances of cyberbullying. Ultimately its designers seek to decrease the negative outcomes associated with cyberbullying (view app&#39;s research at&amp;nbsp;&lt;a href=&quot;https://ysilva.cs.luc.edu/BullyBlocker/publications&amp;amp;posters.html&quot; target=&quot;_blank&quot;&gt;https://ysilva.cs.luc.edu/BullyBlocker/publications&amp;amp;posters.html&lt;/a&gt;).&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.2 Bully Mysteries &lt;/b&gt;(available as an Android package to download and install from&amp;nbsp;&lt;a href=&quot;https://apkcombo.com/bully-mysteries-4cv/udk.android.apptoapp.mystery.l1c5/&quot; target=&quot;_blank&quot;&gt;https://apkcombo.com/bully-mysteries-4cv/udk.android.apptoapp.mystery.l1c5/&lt;/a&gt;) is an interactive mystery app that includes the chapter, &#39;The Case of the Cyberbully&#39;- In it, &#39;A defenseless victim is being mercilessly harassed by someone. But who could it be and for what purpose? Katie and TC are extra motivated to solve this case and help protect those who can’t protect themselves!&#39;. [6]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.3 ClearCyberbullying &lt;/b&gt;(available as an Android package to download and install from &lt;a href=&quot;https://apkcombo.com/clearcyberbullying/com.Clear.CyberBullying/&quot; target=&quot;_blank&quot;&gt;https://apkcombo.com/clearcyberbullying/com.Clear.CyberBullying/&lt;/a&gt;) uses Drama Education for creating awareness on cyber-bullying among students and then develop an education video-games exploiting traditional “Puppet characters” or “shadow theatres” coming from the six partners countries. The project at&amp;nbsp;&lt;a href=&quot;https://www.clearcyberbullying.eu/&quot; target=&quot;_blank&quot;&gt;https://www.clearcyberbullying.eu/&lt;/a&gt; seems to have been discontinued.&amp;nbsp; [6]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.4&amp;nbsp;&lt;/b&gt;&lt;b&gt;Cyberbullying&lt;/b&gt;&lt;b&gt;&amp;nbsp;by Grey Lab&amp;nbsp;&lt;/b&gt;(available as an Android package to download and install from&amp;nbsp;&lt;a href=&quot;https://apkgk.com/com.iggnovation.cyberbull&quot; target=&quot;_blank&quot;&gt;https://apkgk.com/com.iggnovation.cyberbull&lt;/a&gt;) provides information on &#39;what cyberbullying is, why it works and how to prevent it&#39;. [6]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.5&amp;nbsp;&lt;/b&gt;&lt;b&gt;Cyberbullying First-Aid &lt;/b&gt;was developed in Germany by the &lt;a href=&quot;https://www.klicksafe.de/youthpanel&quot; target=&quot;_blank&quot;&gt;klicksafe Youth panel&lt;/a&gt;&amp;nbsp;for Android and Apple users.&amp;nbsp;&lt;a href=&quot;https://www.klicksafe.de/en/materialien/cyber-mobbing-erste-hilfe-app&quot; target=&quot;_blank&quot;&gt;https://www.klicksafe.de/en/materialien/cyber-mobbing-erste-hilfe-app&lt;/a&gt;&amp;nbsp;described how the app includes short videos from the coaches Tom and Emilia for recipients of cyberbullying. The app gives &#39;those affected concrete tips on how to behave, encourage them and accompany in the first steps to take action against cyberbullying. In addition to legal background information and links to anonymous counseling centers, there are tutorials on how to report, block or delete offensive comments on social media platforms such as Instagram, YouTube and TikTok or in the messenger WhatsApp.&#39; The app is available in English, French, German, Luxembourgish, Lithuanian and Slovenian, dependant on the user&#39;s device&#39;s language setting. [6]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.6 Cyberbullying Vaccine&lt;/b&gt;&amp;nbsp;(&lt;a href=&quot;https://www.koreaherald.com/view.php?ud=20230327000595&quot; target=&quot;_blank&quot;&gt;available in Korea&lt;/a&gt;) aims to provide parents, guardians and other adults with an indirect experience of cyberbullying. [2]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.7 Klikd&lt;/b&gt; at&amp;nbsp;&lt;a href=&quot;https://klikd.co.za/the-app/&quot; target=&quot;_blank&quot;&gt;https://klikd.co.za/the-app/&lt;/a&gt;&amp;nbsp;covers many topics, ranging from how to manage tricky people online and cyberbullying, to online reputation to phone addiction. Each module contains multi-faceted components for keeping t/weens engaged throughout their learning journey. The app includes talks by teens, card games and quizzes, and offers plenty of opportunity for reflection. Parents and schools as also supported through updates. [9]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.8 Know Bullying&lt;/b&gt;&amp;nbsp;&lt;b&gt;app&lt;/b&gt; at &lt;a href=&quot;https://healthysafechildren.org/knowbullying-app&quot; target=&quot;_blank&quot;&gt;https://healthysafechildren.org/knowbullying-app&lt;/a&gt; gives US guardians and parents information on how to discuss online risks and cyberbullying with their children. The app was developed by the U.S. Department of Health and Human Services to; explain the warning signs of bullying, and to offer advice for parents on talking to their kids about bullying. It includes important strategies for preventing bullying for kids in varied age groups (3-6, 7-12, and older). [3]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.9 Sit With Us&amp;nbsp;&lt;/b&gt;is a US &lt;a href=&quot;https://www.sitwithus.io/#!/Home&quot; target=&quot;_blank&quot;&gt;Apple app&lt;/a&gt; developed by a 16 year old.&amp;nbsp;Natalie Hampton wanted to help&amp;nbsp;pupils set up inclusive lunches with classmates&amp;nbsp;who typically eat alone. [7]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.10 SpeakOut! &lt;/b&gt;aims to help children and other vulnerable people with accessing the internet safely. The UK &lt;a href=&quot;https://speakout.thecybertrust.org/&quot; target=&quot;_blank&quot;&gt;app&lt;/a&gt; presents storylines that tackle the topics of cyber bullying, grooming, sexting, fake news, body image and racism. The app was developed in response to &#39;the &lt;a href=&quot;https://cybersecuritychallenge.org.uk/who-we-are/our-partners/speakout-from-the-cyber-trust&quot; target=&quot;_blank&quot;&gt;growing need for support specifically targeting 10-14 year olds&lt;/a&gt; as they face increased challenges as preteens and young teenagers growing up in a highly connected environment.&#39; For example, the app tackles cyberbullying by featuring tools and techniques that help users recognise online bullying, and how to respond. [7]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.11 Stand Up to Bullying &lt;/b&gt;shows an&amp;nbsp;&lt;a href=&quot;https://appadvice.com/app/stand-up-to-bullying/543301297&quot; target=&quot;_blank&quot;&gt;interactive educational video&lt;/a&gt; featuring Lucky Kat,&amp;nbsp;&amp;nbsp;The Kat Patrol, The Cheese Posse and Daren the Lion. It teaches children to identify the different types bullying and to know what to do when they see it happening.&amp;nbsp; The app contains five (5) chapters of informative animation that cover verbal bullying, physical attack and nonverbal bullying. The final chapter instructs them on how to make a plan for when they see any of these situations. Each chapter closes with question and answer sections to support open discussion with kids and students. [7]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;2+ Informational games&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;&lt;br /&gt;&lt;b&gt;2.12 Cyberbully Zombies Attack&lt;/b&gt; at &lt;a href=&quot;https://toucharcade.com/games/cyberbully-zombies-attack&quot; target=&quot;_blank&quot;&gt;https://toucharcade.com/games/cyberbully-zombies-attack&lt;/a&gt; was developed by NetSmartz® Workshop, a program of the National Center for Missing &amp;amp; Exploited Children® and Gamelearn. The online game helps kids, tweens and teens learn how to handle cyberbullying [6]. It was funded by Sprint through its 4NetSafety(SM) program.&amp;nbsp;&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2.13 Cybersafe&lt;/b&gt; is a game for &lt;a href=&quot;https://play.google.com/store/apps/details?id=air.com.excited.cybersafe&amp;amp;hl=en&amp;amp;gl=US&quot; target=&quot;_blank&quot;&gt;Android&lt;/a&gt; and &lt;a href=&quot;https://apps.apple.com/gb/app/cybersafe/id670926962&quot; target=&quot;_blank&quot;&gt;Apple&lt;/a&gt; that Goffs School UK students created to help children&amp;nbsp; deal with cyberbullying. [6] The app contains 3 fun mini games - each tackling a different issue chosen by the students: &#39;&lt;i&gt;Detective Charlee:&lt;/i&gt; An endless flying game which teaches children to collect cyberbully evidence, by taking screenshots of nasty comments on social networks, to email to a trusted friend or adult.&amp;nbsp;&lt;i&gt;PaS$w0rdBlockr: &lt;/i&gt;A challenging puzzle game which encourages children to keep their passwords safe and be wary of people hacking their online accounts.&amp;nbsp;&lt;i&gt;Goof Run: &lt;/i&gt;An endless running game with helpful cyberbully advice along the way, set in a colourful chatroom.&#39;&lt;/p&gt;&lt;p&gt;&lt;b&gt;2.14 Professor Garfield Cyberbullying&lt;/b&gt;&amp;nbsp;features a Garfield comic strip with examples of cyberbullying and advice on how to deal with it. These are followed by a short interactive quiz that tests what kids have learned. It is available on &lt;a href=&quot; https://professor-garfield-cyberbullying.appstor.io/&quot; target=&quot;_blank&quot;&gt;Apple&lt;/a&gt;.&amp;nbsp;[6]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;3 Reporting to authorities&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;color: #7f6000;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;3.1 117 Chat&amp;nbsp;&lt;/b&gt;at&amp;nbsp;&lt;a href=&quot;https://apkcombo.com/117-chat/com.ucs.police_chat/&quot; target=&quot;_blank&quot;&gt;https://apkcombo.com/117-chat/com.ucs.police_chat/&lt;/a&gt;&amp;nbsp;provides school violence-related real-time chatting in consultation with South Korea&#39;s National Police Agency. [2]&lt;br /&gt;&lt;br /&gt;&lt;b&gt;3.2&amp;nbsp;BRIM: Bullying Reduction Intervention and Monitoring&lt;/b&gt; provides &lt;a href=&quot;https://antibullyingsoftware.com/about/&quot; target=&quot;_blank&quot;&gt;tools and resources&lt;/a&gt; to US teachers, principals, counselors, and others in school communities to help tackle bullying.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;b&gt;3.3 Bully Button&lt;/b&gt; from &lt;a href=&quot;https://bullybutton.fortresgrand.com&quot; target=&quot;_blank&quot;&gt;https://bullybutton.fortresgrand.com&lt;/a&gt; complements US schools&#39; anti-bullying programs by providing a multi-platform process for administrative intervention in situations of; abuse, bullying, cyberbullying, and social aggression.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;3.4&amp;nbsp;CyberBully Hotline apk (&lt;/b&gt;available as an Android package to download and install from&amp;nbsp;&lt;a href=&quot;https://www.apkmonk.com/app/com.groupcast.android.cyberbullingapp/&quot; target=&quot;_blank&quot;&gt;https://www.apkmonk.com/app/com.groupcast.android.cyberbullingapp/&lt;/a&gt;) provides &#39;schools with their own unique local phone number, to which students and parents can send a 100% anonymous text or voice message. School administrators can then send back replies which go directly to the person sending the report, without ever knowing their phone number or identity. This guaranteed anonymity provides a welcoming environment for addressing issues of bullying, violence, fighting, theft, harassment, and safety.&#39; [6]&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;3.5 Dunk A Bully &lt;/b&gt;at&amp;nbsp;&lt;a href=&quot;https://www.dunkabully.com&quot; target=&quot;_blank&quot;&gt;https://www.dunkabully.com&lt;/a&gt;&amp;nbsp;aims to educate users about bullying by providing examples and questions and answers to learn from. It also enables users to select a counselor for messaging anonymously [8].&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;3.6 FamiSafe&amp;nbsp;&lt;/b&gt;at&amp;nbsp;&lt;a href=&quot;https://famisafe.wondershare.com&quot; target=&quot;_blank&quot;&gt;https://famisafe.wondershare.com&lt;/a&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;is one of five apps described in resource [3] which parents/guardians can install on their child/ward&#39;s phone. Available on Android, Chrome, Kindle, iOS, Mac and Windows,&amp;nbsp; FamiSafe empowers users to &#39;locate their kid’s phone, monitor app usage, site usage, and screen time&#39;. The app also allows parents/guardians to filter web content and block certain apps.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;3.7 Guardian Angel &lt;/b&gt;at &lt;a href=&quot;https://guardianangelmobile.com&quot; target=&quot;_blank&quot;&gt;https://guardianangelmobile.com&lt;/a&gt; is available on Android and Apple. It is&amp;nbsp;designed to help children and teenagers &#39;cope with the horrors of childhood violence such as bullying and family related problems.&#39; It includes: access to a 24hr crisis hotlines; optional, anonymous reporting directly to the child’s counsellor or social worker; playlists for affirmation, meditation and motivation; and journaling options. [6]&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;3.8 Speak Up! For Someone &lt;/b&gt;at&amp;nbsp;&lt;a href=&quot;https://www.gospeakup.com&quot; target=&quot;_blank&quot;&gt;https://www.gospeakup.com&lt;/a&gt;&amp;nbsp;enables students to record bullying and to report it anonymously and securely to school officials. It&#39;s available for&amp;nbsp;&lt;a href=&quot;https://apps.apple.com/in/app/speak-up-for-someone/id974338910&quot; target=&quot;_blank&quot;&gt;Apple&lt;/a&gt; users, and &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.p3tips.katy&amp;amp;hl=en&amp;amp;gl=US&quot; target=&quot;_blank&quot;&gt;Android&lt;/a&gt; ones. [8]&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;b&gt;3.9 STOPit Solutions &lt;/b&gt;at&amp;nbsp;&lt;a href=&quot;https://www.stopitsolutions.com&quot; target=&quot;_blank&quot;&gt;https://www.stopitsolutions.com&lt;/a&gt; allows individuals (including parents, peers, and community members) to anonymously report harmful images, messages, and videos to government entities that can provide victims with help. Individuals can also connect with trained crisis counsellors from the Crisis Text Line™ for assistance. [3]&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;3.10 Toot Toot &lt;/b&gt;is an &lt;a href=&quot;https://apps.apple.com/gb/app/tootoot-safeguarding-made/id1054315255&quot; target=&quot;_blank&quot;&gt;Apple&lt;/a&gt; app funded by the UK&#39;s Department for Education which gives &#39;pupils and parents a voice by providing a safe and anonymous way to speak about concerns such as bullying, harassment, mental health and racism.&#39; Its key features are: anonymous reporting from parents and pupils, from anywhere. Staff can log safeguarding and behaviour incidents to create a full picture. Admins and mentors receive notifications when new cases are logged. Users can quickly and simply manage their cases. Admins and mentors get a whole organisation overview to identify key trends in data. [7]&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;3.11 Upstander&lt;/b&gt; is an Android app at &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.ayaan.upstander&quot; target=&quot;_blank&quot;&gt;https://play.google.com/store/apps/details?id=com.ayaan.upstander&lt;/a&gt; develop as a student initiative to make schools bullying-free. It is a mobile platform through which students can report bullying instances at varying degrees of anonymity. [8]&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #93c47d;&quot;&gt;&lt;b&gt;3+ Reporting to self&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;&lt;b&gt;3.12 ReThink – Stop Cyberbullying &lt;/b&gt;at&amp;nbsp;&lt;a href=&quot;https://www.rethinkwords.com/whatisrethink&quot; target=&quot;_blank&quot;&gt;https://www.rethinkwords.com/whatisrethink&lt;/a&gt;&amp;nbsp;is a non-intrusive service that seeks to detect and stop cyberbullying before it does damage. Its users are flagged to reconsider potentially offensive content before re-sharing it. [5]&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #6aa84f;&quot;&gt;4 Platform-specific&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;color: #7f6000;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;4.1 BullyBlock&lt;/b&gt;&amp;nbsp;or&amp;nbsp;&lt;b&gt;BullyBlocker for Facebook&lt;/b&gt;&amp;nbsp;(&lt;a href=&quot;https://www.facebook.com/thebullyblocker&quot;&gt;https://www.facebook.com/thebullyblocker&lt;/a&gt;) seems to have been superseded by the Action Point app (see 2.1) . BullyBlock resulted from research that &#39;designed, implemented and evaluated automated cyberbullying identification tools for social networks&#39;.&amp;nbsp; The mobile app for Facebook included several such tools. [1]&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;4.2&lt;/b&gt;&amp;nbsp;&lt;b&gt;Instagram&#39;s Rethink&lt;/b&gt; and &lt;b&gt;Restrict&lt;/b&gt; are described in&amp;nbsp;&lt;a href=&quot;https://www.bbc.com/news/technology-48916828&quot; target=&quot;_blank&quot;&gt;https://www.bbc.com/news/technology-48916828&lt;/a&gt;. Rethink uses &#39;artificial intelligence to recognise when text resembles the kind of posts that are most often reported as inappropriate by users&#39;. &lt;b&gt;Rethink&lt;/b&gt; prompts users to pause and consider what they are saying before sharing content flagged as potentially being inappropriate. &lt;b&gt;Restrict&lt;/b&gt; is &#39;designed to help teens filter abusive comments without resorting to blocking others - a blunt move that could have repercussions in the real world&#39;.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;4.3&lt;/b&gt;&amp;nbsp;&lt;b&gt;Shushmoji® for WhatsApp&lt;/b&gt;&amp;nbsp;is an anti-chat harassment resource (for&amp;nbsp;&lt;a href=&quot;https://apps.apple.com/za/app/shushmoji/id1639680705&quot; target=&quot;_blank&quot;&gt;Apple&lt;/a&gt;&amp;nbsp;or &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.createwith.shushmoji&amp;amp;hl=en&amp;amp;gl=US&quot; target=&quot;_blank&quot;&gt;Android&lt;/a&gt;&amp;nbsp;users) that provides end-of-conversation stickers and information on tactics individuals can use against chat harassment. See general FAQs at&amp;nbsp;&lt;a href=&quot;https://www.createwith.net/shushmoji-app-faqs&quot; target=&quot;_blank&quot;&gt;https://www.createwith.net/shushmoji-app-faqs&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;4.4&amp;nbsp;Vodafone’s #BeStrong Emoji Keyboard&lt;/b&gt;&amp;nbsp;is available on&amp;nbsp;&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.snaps.be_strong&amp;amp;hl=en_ZA&amp;amp;gl=RU&quot; target=&quot;_blank&quot;&gt;Android&lt;/a&gt;&amp;nbsp;devices. This keyboard developed from the&amp;nbsp;&lt;a href=&quot;https://www.vodafone.com/news/inclusion/be-strong-online-emojis&quot; target=&quot;_blank&quot;&gt;Be Strong Online anti-bullying&lt;/a&gt;&amp;nbsp;initiative. A suite of #BeStrong support emojis aimed help young people convey compassion and support to friends who are being bullied online. The idea for a support emoji was first brought to Vodafone by anti-bullying ambassador &lt;a href=&quot;https://www.vanityfair.com/news/2016/02/monica-lewinsky-emoji-safer-internet&quot; target=&quot;_blank&quot;&gt;Monica Lewinsky&lt;/a&gt;. The app&#39;s emojis were chosen by &#39;almost 5,000 young people around the world, who identified with them as symbols of compassion and solidarity&#39;. [7]&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #38761d;&quot;&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;The examples of apps above are largely from the developed world&#39;s Anglo- and Asian spheres, with the full usability of these apps often being restricted to their country of origin (notably, Korea, the UK and US). Kindly let me know of any other interesting resources and/or ABAs in the moderated comments section below? Or you &lt;a href=&quot;https://www.travisnoakes.co.za/p/contact.html&quot; target=&quot;_blank&quot;&gt;contact me directly&lt;/a&gt;. I will update this post on an ongoing basis with suitable recommendations for new apps/resources, plus new ones my research uncovers.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;P.S. There are several apps listed in the resources below that are not highly-ranked for Google searches, nor available via the Apple or Android app stores (or may be hidden from searches from South Africa).&amp;nbsp; These are Back Off Bullies [6], Be Cybersafe Game [6],&amp;nbsp;&lt;a href=&quot;https://appadvice.com/app/cyber-bullying/500995254&quot; target=&quot;_blank&quot;&gt;Cyberbullying by Maple Tree&lt;/a&gt; [6],&amp;nbsp;Cyberbully Hotline [6], Delete Cyberbullying [6],&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://apkfab.com/i-am-a-witness-keyboard/com.snaps.adcouncil_keyboard&quot; target=&quot;_blank&quot;&gt;I Am Witness&lt;/a&gt;&amp;nbsp;and Put an End to Cyberbullying [6].&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;N.B. The many discontinued anti-bullying apps suggest the importance of ongoing investment of human and financial capital. Sustaining ABAs availability requires costly resources to address code updates, app promotion and ongoing refinement.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #274e13;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #38761d;&quot;&gt;Resources&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;&lt;span style=&quot;color: #7f6000;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;[1]&lt;i&gt;&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/science/article/pii/S240584402306838X&quot; target=&quot;_blank&quot;&gt;U.S. Parents&#39; Intentions to Use Anti-Bullying Apps: Insights from a Comprehensive Model&lt;/a&gt;&lt;/i&gt;&lt;a href=&quot;https://www.sciencedirect.com/science/article/pii/S240584402306838X&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;&lt;/a&gt;(2023) by Brittany Wheeler, Katie Baumel, Deborah Hall and Yasin Silva describes new technological avenues for parents and other guardians to reduce their child’s cyberbullying risk. The authors focus on understanding the factors that predict parents&#39; intentions to use ABAs.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;[2]&amp;nbsp;&lt;i&gt;&#39;The application of anti-bullying smartphone apps for preventing bullying in South Korea&#39; &lt;/i&gt;by Insoo Oh in &lt;a href=&quot;https://www.routledge.com/Tackling-Cyberbullying-and-Related-Problems-Innovative-Usage-of-Games/Toda-Oh/p/book/9780367610807&quot; target=&quot;_blank&quot;&gt;Tackling Cyberbullying and Related Problems - Innovative Usage of Games, Apps and Manga&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;[3]&amp;nbsp;&lt;i&gt;&#39;Most useful bullying apps&#39;&lt;/i&gt; at&amp;nbsp;&lt;a href=&quot;https://famisafe.wondershare.com/anti-bullying/usefull-anti-bullying-apps-or-ideas-for-parental-control.html&quot; target=&quot;_blank&quot;&gt;https://famisafe.wondershare.com/anti-bullying/usefull-anti-bullying-apps-or-ideas-for-parental-control.html&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt;[4]&amp;nbsp;&lt;a href=&quot;https://www.tulsakids.com/5-anti-bullying-apps-every-family-should-have/&quot; target=&quot;_blank&quot;&gt;5 Anti-Bullying Apps Every Family Should Have&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;[5] &lt;i&gt;Anti-bullying apps are popular, but do they work?&lt;/i&gt;, Wyman, Christina (2022) in Wired magazine features an interesting critique of ABAs&#39;&amp;nbsp;limits, and their potential value,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://www.wired.com/story/anti-bullying-apps-schools-children/&quot; target=&quot;_blank&quot;&gt;https://www.wired.com/story/anti-bullying-apps-schools-children&lt;/a&gt;.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;[6] Topcu-Uzer, C., &amp;amp; Tanrıkulu, İ. (2018). 3 - Technological solutions for cyberbullying. In M. Campbell &amp;amp; S. Bauman (Eds.), Reducing Cyberbullying in Schools (pp. 33-47). Academic Press. &lt;a href=&quot;https://doi.org/https://doi.org/10.1016/B978-0-12-811423-0.00003-1&quot; target=&quot;_blank&quot;&gt;https://doi.org/https://doi.org/10.1016/B978-0-12-811423-0.00003-1&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;[7]&amp;nbsp;Top 10 anti-bullying apps at &lt;a href=&quot;https://www.kcom.com/home/discover/categories/tech-corner/top-10-anti-bullying-apps/&quot;&gt;https://www.kcom.com/home/discover/categories/tech-corner/top-10-anti-bullying-apps/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;[8] Searching #Antibullyingapp via Instagram -&amp;nbsp;&lt;a href=&quot;https://www.instagram.com/explore/tags/antibullyingapp/&quot; target=&quot;_blank&quot;&gt;https://www.instagram.com/explore/tags/antibullyingapp/&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;[9] Recommended by this blog&#39;s readers.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;[10] Pilkington, Ben. (2018/2025) A Comprehensive Cyberbullying Guide for Parents. &lt;a href=&quot;https://www.wizcase.com/blog/a-comprehensive-cyberbullying-guide-for-parents&quot;&gt;https://www.wizcase.com/blog/a-comprehensive-cyberbullying-guide-for-parents&lt;/a&gt;.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/6698387419301588737/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2023/08/four-categories-for-anti-bullying-apps.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/6698387419301588737'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/6698387419301588737'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2023/08/four-categories-for-anti-bullying-apps.html' title='Four categories for Anti-Bullying Apps (ABAs), with examples for each'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-3419136914412619579</id><published>2023-06-29T16:04:00.034+02:00</published><updated>2023-07-05T13:32:14.501+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="diet"/><category scheme="http://www.blogger.com/atom/ns#" term="fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="scam"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter"/><title type='text'>Twitter Support must do better for helping celebrity and public victims of a global diet phishing scam!</title><content type='html'>Worldwide, diet scammers are marketing fake “endorsements” from celebrities across social media adverts, search engine ads and online content to phish victims’ financial details. The sheer volume of content the fraudsters produce is very difficult for celebrities and their representatives to tackle alone. One major obstacle to stopping the false marketing of “miracle weightloss products” is the reluctance of social media platforms to take down fake accounts and ads timeously. The fraudsters typically run the ads regionally for a few days in which they are displayed to hundreds of thousands of people. Just a fraction of an ad’s viewers need to share their financial details for the scam to be highly profitable!&lt;br /&gt;&lt;br /&gt;This post presents the underwhelming example of reporting diet phishing accounts to Twitter Support as a way to spotlight the difficulties of tackling fraud via social media platforms. Hopefully publicly shaming &lt;a href=&quot;https://twitter.com/TwitterSupport&quot;&gt;@TwitterSupport&lt;/a&gt; will encourage its leaders to help address the global diet phishing scam properly, whilst also providing decent reporting options for celebrities and their representatives:&lt;div&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;South African celebrities hijacked in fake diet adverts&lt;/h3&gt;A major factor in the “success&quot; of this global scam (it has been running since 2014!) is the poor response from Facebook, Instagram, Twitter and other social media companies to formal requests to close fake accounts and their advertisement campaigns. Their ineffective responses are legally shortsighted: social media companies that repeatedly permit diet phishing ads on their platforms are complicit in a fraud, and possibly in the delict of passing off. For example, in South Africa, the diet phishing scam has undoubtedly harmed the reputation of &lt;a href=&quot;https://twitter.com/ProfTimNoakes&quot; target=&quot;_blank&quot;&gt;Prof Tim Noakes&lt;/a&gt; and &lt;a href=&quot;https://thenoakesfoundation.org/&quot; target=&quot;_blank&quot;&gt;The Noakes Foundation&lt;/a&gt; through its fraudulent, direct misrepresentation, of fake products. These have certainly confused the public and &lt;a href=&quot;https://twitter.com/TheNoakesF&quot; target=&quot;_blank&quot;&gt;@TheNoakesF&lt;/a&gt; has lost goodwill from the many victims of the fraud’s misrepresentation!&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Prof Noakes, is just one of many well-known individuals whose identities have been hijacked. The South African version of the scam has seen: Minki van der Westhuizen, Jeannie D (&lt;a href=&quot;https://twitter.com/Jeannieous&quot; target=&quot;_blank&quot;&gt;@Jeannieous&lt;/a&gt;), Basetsana Kumalo (&lt;a href=&quot;https://twitter.com/basetsanakumalo&quot; target=&quot;_blank&quot;&gt;@basetsanakumalo&lt;/a&gt;), Nkhensani Nkosi (&lt;a href=&quot;https://twitter.com/NkhensaniNkosi1&quot; target=&quot;_blank&quot;&gt;@NkhensaniNkosi1&lt;/a&gt;), Shashi Naidoo (&lt;a href=&quot;https://twitter.com/SHASHINAIDOO&quot; target=&quot;_blank&quot;&gt;@SHASHINAIDOO&lt;/a&gt;), Tumi Morake (&lt;a href=&quot;https://twitter.com/tumi_morake&quot; target=&quot;_blank&quot;&gt;@tumi_morake&lt;/a&gt;), Dawn King (&lt;a href=&quot;https://twitter.com/DawnTKing&quot; target=&quot;_blank&quot;&gt;@DawnTKing&lt;/a&gt;), Ina Parmaan (&lt;a href=&quot;https://twitter.com/inapaarman&quot; target=&quot;_blank&quot;&gt;@inapaarman&lt;/a&gt;) and Dr Shabir Madhi (&lt;a href=&quot;https://twitter.com/ShabirMadh&quot; target=&quot;_blank&quot;&gt;@ShabirMadh&lt;/a&gt;) all having their reputations tarnished.&lt;br /&gt;&lt;br /&gt;Since Prof Noakes’ identity was first hijacked in 2020, The Noakes Foundation (TNF) and partners (such as &lt;a href=&quot;https://twitter.com/DrMichaelMol&quot; target=&quot;_blank&quot;&gt;Dr Michael Mol&lt;/a&gt; and &lt;a href=&quot;https://twitter.com/Hello_DoctorSA&quot; target=&quot;_blank&quot;&gt;Hello Doctor&lt;/a&gt;) have tried many options to stop the scam. For example, TNF developed and publicised content against it via blogposts, such as &lt;a href=&quot;https://bit.ly/3KP71A4&quot;&gt;Keto Extreme Scams Social Media Users Out of Thousands&lt;/a&gt;.  TNF also produced these videos:  &lt;a href=&quot;https://bit.ly/3r1yp7H&quot;&gt;Professor Tim Noakes vs. Diet Phishing: Exposing a Global Scam with Fake Celebrity Endorsements&lt;/a&gt;, &lt;a href=&quot;https://bit.ly/3NuTqPR&quot;&gt;Dr Michael Mol highlighting Diet Scams&lt;/a&gt; and &lt;a href=&quot;https://bit.ly/45juuTA&quot;&gt;Prof Noakes Speaks Out Against The Ongoing Diet Scam&lt;/a&gt;. Sadly, The Noakes Foundation’s repeated warnings to the public don’t seem to be making much difference in preventing new victims!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;American, Australian, British and Swedish celebs hijacked, too!&lt;/h3&gt;In the United States, the diet phishing scam has also stolen the identities of major celebrities. Most are in popular TV franchises: Oprah Winfrey (&lt;a href=&quot;https://twitter.com/Oprah&quot; target=&quot;_blank&quot;&gt;@Oprah&lt;/a&gt;), Dr Mehmet Oz (&lt;a href=&quot;https://twitter.com/DrOz&quot; target=&quot;_blank&quot;&gt;@DrOz&lt;/a&gt;) Dr Phil (&lt;a href=&quot;https://twitter.com/DrPhil&quot; target=&quot;_blank&quot;&gt;@DrPhil&lt;/a&gt;), Dolly Parton (&lt;a href=&quot;https://twitter.com/DollyParton&quot; target=&quot;_blank&quot;&gt;@DollyParton&lt;/a&gt;), Kelly Clarkson (&lt;a href=&quot;https://twitter.com/kellyclarkson&quot; target=&quot;_blank&quot;&gt;@kellyclarkson&lt;/a&gt;), the Kardashian Family (&lt;a href=&quot;https://twitter.com/kardashianshulu&quot; target=&quot;_blank&quot;&gt;@kardashianshulu&lt;/a&gt; + &lt;a href=&quot;https://twitter.com/KimKardashian&quot; target=&quot;_blank&quot;&gt;@KimKardashian&lt;/a&gt;), Kelly Osbourne (&lt;a href=&quot;https://twitter.com/KellyOsbourne&quot; target=&quot;_blank&quot;&gt;@KellyOsbourne&lt;/a&gt;), Chrissy Teigen (&lt;a href=&quot;https://twitter.com/chrissyteigen&quot; target=&quot;_blank&quot;&gt;@chrissyteigen&lt;/a&gt;), Martha Maccallum   (&lt;a href=&quot;https://twitter.com/marthamaccallum&quot; target=&quot;_blank&quot;&gt;@marthamaccallum&lt;/a&gt;), Blake Shelton (&lt;a href=&quot;https://twitter.com/blakeshelton&quot; target=&quot;_blank&quot;&gt;@blakeshelton&lt;/a&gt;) and &lt;a href=&quot;https://twitter.com/search?q=%23TomSelleck&amp;amp;src=typed_query&quot; target=&quot;_blank&quot;&gt;#TomSelleck&lt;/a&gt; 🥸. It’s a Magnum opus of fraud!&lt;br /&gt;&lt;br /&gt;Amazing female celebs in the United Kingdom have also seen their identities stolen. Diet phishing scammers have hijacked the IDs of Holly Willis (&lt;a href=&quot;https://twitter.com/hollywills&quot; target=&quot;_blank&quot;&gt;@hollywills&lt;/a&gt;), Amanda Holden (&lt;a href=&quot;https://twitter.com/AmandaHolden&quot; target=&quot;_blank&quot;&gt;@AmandaHolden&lt;/a&gt;), Anne Hegerty (&lt;a href=&quot;https://twitter.com/anne_hegerty&quot; target=&quot;_blank&quot;&gt;@anne_hegerty&lt;/a&gt;) and Dawn French (&lt;a href=&quot;https://twitter.com/Dawn_French&quot; target=&quot;_blank&quot;&gt;@Dawn_French&lt;/a&gt;). Even the British (&lt;a href=&quot;https://twitter.com/RoyalFamily&quot; target=&quot;_blank&quot;&gt;@RoyalFamily&lt;/a&gt;) has not been immune, with the targeting of Catherine, the Princess of Wales (&lt;a href=&quot;https://twitter.com/KensingtonRoyal&quot; target=&quot;_blank&quot;&gt;@KensingtonRoyal&lt;/a&gt;) and the Former Queen Elisabeth II, RIP and God Bless. Sadly, Meghan Duchess of Sussex, has been targeted too...&lt;br /&gt;&lt;br /&gt;Down Under, well-known Australian personalities, such as its national treasure Maggie Beer (&lt;a href=&quot;https://twitter.com/maggie_beer&quot; target=&quot;_blank&quot;&gt;@maggie_beer&lt;/a&gt;) and Farmer Wants A Wife host Sam Armytage (&lt;a href=&quot;https://twitter.com/sam_armytage&quot; target=&quot;_blank&quot;&gt;@sam_armytage&lt;/a&gt;) have had their identities misused for fake #weightloss endorsements. And also Mr Embarrassing Bodies Down Under himself, Dr Brad McKay (&lt;a href=&quot;https://twitter.com/DrBradMcKay&quot; target=&quot;_blank&quot;&gt;@DrBradMcKay&lt;/a&gt;).&lt;/div&gt;&lt;div&gt;&lt;br /&gt;In Sweden, Dr Andreas Eenfeldt (&lt;a href=&quot;https://twitter.com/DrEenfeldt&quot; target=&quot;_blank&quot;&gt;@DrEenfeldt&lt;/a&gt; from &lt;a href=&quot;https://twitter.com/DietDoctor&quot; target=&quot;_blank&quot;&gt;@DietDoctor&lt;/a&gt;), another leader in the low carbohydrate movement, has been targeted in promotions of fake #keto products. Sadly, the fake ads seem to generate far more attention and action than his or my father&#39;s health advice!&lt;br /&gt;&lt;br /&gt;N.B. The examples above are not extensive in terms of all victims. We largely know of celebrities in the Anglosphere whose identities were stolen, then featured in English language reports and related search engine results.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Deceptive &quot;Tim Noakes&quot; Twitter accounts market Keto Gummies&lt;/h3&gt;Just as the celebrity names stolen for the fake ads change often, so do the product names. A few examples of these fake names are Capsaicin, FigurWeightLossCapsules, Garcinia, Ketovatru and KetoLifePlus. Be warned that new &quot;products&quot; are added every month! One particularly common term used in the scammers&#39; &amp;nbsp;product names is &quot;Keto Gummies&quot;. A recent Twitter search for &quot;&lt;a href=&quot;https://twitter.com/search?q=Tim%20Noakes%20keto%20gummies&amp;amp;src=typed_query&quot; target=&quot;_blank&quot;&gt;Tim Noakes keto gummies&lt;/a&gt;&quot; suggested many fake accounts in Figure 1  (just the top view!), plus diverse &quot;product&quot; names.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjYpJ1h3WsziMpQHZ70y3iHHh8e2fMAnFwSingDu_I6f77dccyIgbcfyxL4CFZt_SpD2nSUKvsTqlk_nHIm3ijSZmWhkDl1A0uHFutD4Q5Z4t66Mn9C1sejaqQOOt7RWJwDzlu_dJu99ETBECENhi3lTeevKq7boF-z8-MMotL59bMkFIL7MN4tc-_z0vbN&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjYpJ1h3WsziMpQHZ70y3iHHh8e2fMAnFwSingDu_I6f77dccyIgbcfyxL4CFZt_SpD2nSUKvsTqlk_nHIm3ijSZmWhkDl1A0uHFutD4Q5Z4t66Mn9C1sejaqQOOt7RWJwDzlu_dJu99ETBECENhi3lTeevKq7boF-z8-MMotL59bMkFIL7MN4tc-_z0vbN=w517-h882&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;Figure 1. Twitter search results for Tim Noakes keto gummies (fake product accounts) (20 June, 2023)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Twitter Support does not think fake accounts are misleading and deceptive?!&lt;/h3&gt;These accounts have clearly been setup to fraudulently market &quot;keto gummies&quot; by suggesting an&amp;nbsp; association with &quot;Tim Noakes&quot;. So, the logical response for any representative of The Noakes Foundation would seem to be reporting each fake account for violating Twitter’s &lt;a href=&quot;https://help.twitter.com/rules-and-policies/twitter-impersonation-and-deceptive-identities-policy&quot;&gt;misleading and deceptive identities policy&lt;/a&gt;, right?&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEicHAl72difmt4ozg2MhX6Gv9cdLa-08A4miU_1fImLG7jOgmkpQcNezYnX38ie60lcQw6jkNvKwau0_fG-UJnP9KHjm4qE4J2iuZJqMxj4Wf9HIbECUUM4EOIcMdCj1xyOJh9CzBKn_6YjEbMXzFbiyu8Pa3-vghVKX3oyKei_ARosdW7jPt5bJOG7b_N1&quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEicHAl72difmt4ozg2MhX6Gv9cdLa-08A4miU_1fImLG7jOgmkpQcNezYnX38ie60lcQw6jkNvKwau0_fG-UJnP9KHjm4qE4J2iuZJqMxj4Wf9HIbECUUM4EOIcMdCj1xyOJh9CzBKn_6YjEbMXzFbiyu8Pa3-vghVKX3oyKei_ARosdW7jPt5bJOG7b_N1=w410-h600&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 2. Reporting the fake Tim Noakes Keto Gummies account to Twitter support&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;This is a very time consuming process- in the first place, the same complaint must be individually submitted for each account. Secondly, the representative reporting these complaints must also upload and/or email related proof of ID, business and legal documentation to Twitter Support before it will consider investigating whether impersonation is taking place.&lt;br /&gt;&lt;br /&gt;Fake Twitter accounts, including those below, were reported to Twitter, with support documentation:&lt;br /&gt;@NoakesGumm28693 0327118996 &lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;@TimNoakesHoax 0327120384&lt;br /&gt;@TimGummies 0327119602 &lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;@NoakesGumm91126 0327119675&lt;br /&gt;@gummies_tim 0327120030 &lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;@TimNoakes_ZA 0327119741&lt;br /&gt;@tim_gummies 0327118910 &lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;@NoakesSouth         0327118634&lt;br /&gt;@timnoakesketo0 0327119362 &lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;@NoakesGumm22663 0327119487&lt;br /&gt;&lt;br /&gt;In each case, @TwitterSupport replied that the following accounts are NOT in violation of Twitter’s misleading and deceptive identities policy. This would seem to contradict the obvious evidence that Tim Noakes&#39; name has been hijacked by scammers for misleading victims with a fake product!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The Noakes Foundation has supplied its legal team with Twitter&#39;s related correspondence for review. I will update this post as developments progress (or fail to!) with the remarkably unhelpful and potentially criminally negligent @TwitterSupport.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;This &quot;Tim Noakes keto gummies&quot; Twitter account is not deceptive?!&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1iMMBqarZzL5OVQAMuI5PMLw3df7hO1xxWbSJL2tZGrpkiRARBhI_Q-QASDi7RSAEzajQvUpHBjXvb7mq-nWnhqsU1arqXErpytNalYTULnX4IZV9R4JDfj6n0ilb51AInFlbUP_uIHv17Br-HPpPxSLjqiEJRt5XTqYBhSU6B3ls_KJ0TQEyFxAivZ53/s1628/Tim%20Noakes%20Keto%20Gummies%20fake%20account%202023.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Figure 3. Fake @TimNoakesKetoGummies account&quot; border=&quot;0&quot; data-original-height=&quot;1628&quot; data-original-width=&quot;596&quot; height=&quot;1134&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1iMMBqarZzL5OVQAMuI5PMLw3df7hO1xxWbSJL2tZGrpkiRARBhI_Q-QASDi7RSAEzajQvUpHBjXvb7mq-nWnhqsU1arqXErpytNalYTULnX4IZV9R4JDfj6n0ilb51AInFlbUP_uIHv17Br-HPpPxSLjqiEJRt5XTqYBhSU6B3ls_KJ0TQEyFxAivZ53/w415-h1134/Tim%20Noakes%20Keto%20Gummies%20fake%20account%202023.png&quot; title=&quot;Figure 3. Fake @TimNoakesKetoGummies account&quot; width=&quot;415&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 3. Fake @TimNoakesKetoGummies account&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp; &lt;br /&gt;Figure 3 shows a typical example of a fake account&#39;s style. It uses Tim Noakes&#39; name, plus stock photography in marketing a non-existent product. It only tweeted on May the 24th, and is followed by one person. Any knowledgeable complaint reviewer would surely consider this to be a case of a scammer creating a misleading and deceptive account for gaming Twitter&#39;s search engine. However, Twitter Support does not agree, nor explain why in its generic correspondence around each scam account.&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;From stealing victims&#39; banking details to delivering dubious products&lt;/h3&gt;&lt;div&gt;As fitness expert Reggie Wilson (&lt;a href=&quot;https://twitter.com/fitforfreelance&quot; target=&quot;_blank&quot;&gt;@fitforfreelance&lt;/a&gt;) deftly explains in his &lt;a href=&quot;https://twitter.com/fitforfreelance/status/1534301085891960833 &quot;&gt;30 second video&lt;/a&gt;, Keto Gummies cannot work.  It is most concerning that The Noakes Foundation has received reports that scammers are now delivering a physical product to South African victims. Not only are fake #KetoGummies  products being marketed locally via &lt;a href=&quot;https://takealot.com&quot; target=&quot;_blank&quot;&gt;takealot.com&lt;/a&gt; BUT are also offered internationally via &lt;a href=&quot;https://Amazon.com&quot;&gt;Amazon.com&lt;/a&gt;, and possibly other major online retailers!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Just as the scammers link themselves to celebs on Twitter, they also target the popular television franchises they&#39;re from. Notably: AmericasNextTopModel, DragonsDen, The Kardashians, The Oprah Show and Shark Tank. On Twitter, national businesses are also being misrepresented as selling these fake products, such as Walmart in the US, Jean Coutu pharmacies in Canada and Dischem in South Africa. Type in keto gummies into these retailers search engines and you will see that many options pop up, some seemingly associated with popular celebrities and TV franchises.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The Noakes Foundation is keen to work with affected celebrities, their representatives and business to raise the pressure on social media companies to make a proper response to the scammers and fake ads they host. Do let us know if you would like to help using the comments below, or by emailing &lt;a href=&quot;mailto:reportdietscam@gmail.com&quot;&gt;reportdietscam@gmail.com&lt;/a&gt;.&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/3419136914412619579/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2023/06/twitter-support-must-do-better-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/3419136914412619579'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/3419136914412619579'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2023/06/twitter-support-must-do-better-for.html' title='Twitter Support must do better for helping celebrity and public victims of a global diet phishing scam!'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEjYpJ1h3WsziMpQHZ70y3iHHh8e2fMAnFwSingDu_I6f77dccyIgbcfyxL4CFZt_SpD2nSUKvsTqlk_nHIm3ijSZmWhkDl1A0uHFutD4Q5Z4t66Mn9C1sejaqQOOt7RWJwDzlu_dJu99ETBECENhi3lTeevKq7boF-z8-MMotL59bMkFIL7MN4tc-_z0vbN=s72-w517-h882-c" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.9248685 18.4240553</georss:point><georss:box>-62.369078833509256 -16.7321947 -5.4806581664907483 53.5803053</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-4001724519984487566</id><published>2023-06-22T16:47:00.001+02:00</published><updated>2023-06-22T16:53:48.218+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Atlas.ti"/><category scheme="http://www.blogger.com/atom/ns#" term="CAQDAS"/><category scheme="http://www.blogger.com/atom/ns#" term="development"/><category scheme="http://www.blogger.com/atom/ns#" term="MAXQDA"/><category scheme="http://www.blogger.com/atom/ns#" term="nvivo"/><category scheme="http://www.blogger.com/atom/ns#" term="QDAMiner"/><category scheme="http://www.blogger.com/atom/ns#" term="QDAS"/><category scheme="http://www.blogger.com/atom/ns#" term="recommendations"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="software"/><title type='text'>Recommendations for QDAS developers from &#39;Noteworthy disparities with four CAQDAS tools- explorations in organising live Twitter data&#39;, forthcoming</title><content type='html'>&lt;a href=&quot;https://orcid.org/0000-0002-0313-3875&quot;&gt;Dr Corrie Uys&lt;/a&gt;, &lt;a href=&quot;https://orcid.org/0000-0003-2447-5521&quot;&gt;Dr Pat Harpur&lt;/a&gt; and I are working on a manuscript that explores the research implications of differences in Qualitative data analysis software (QDAS) packages’ support for live Twitter data imports. This paper&#39;s software comparison contrasts the four prominent QDAS tools that support such imports, namely&amp;nbsp;&lt;a href=&quot;http://ATLAS.ti&quot; target=&quot;_blank&quot;&gt;ATLAS.ti&lt;/a&gt;™, &lt;a href=&quot;https://lumivero.com/products/nvivo/&quot; target=&quot;_blank&quot;&gt;NVivo&lt;/a&gt;™, &lt;a href=&quot;https://www.maxqda.com/&quot; target=&quot;_blank&quot;&gt;MAXQDA&lt;/a&gt;™ and &lt;a href=&quot;https://provalisresearch.com/products/qualitative-data-analysis-software/&quot; target=&quot;_blank&quot;&gt;QDA Miner&lt;/a&gt;™. We discuss key discrepancies in their use during the organisational phase of qualitative research and address related methodological issues.&lt;br /&gt;&lt;br /&gt;  Outside the paper&#39;s scope, our software comparison also uncovered several suggestions that developers of these QDAS tools might follow to improve the user experience for Twitter researchers:&lt;div&gt;&lt;br /&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;i&gt;&lt;span style=&quot;color: #7f6000; font-size: medium;&quot;&gt;1 Make tweets easier to sort &amp;amp; link them to their original context&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/h4&gt;&lt;div&gt;QDAS typically present a myriad of isolated tweets in one spreadsheet document that seems to divorce tweets from their conversational context. Researchers would benefit from being able to order and sort tweets as data. QDAS should also provide the option to quickly link to the original tweet in Twitter. Only NVivo made it relatively efficient to see the&amp;nbsp;original context of a tweet in a Twitter discussion.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #7f6000;&quot;&gt;2 Provide more extensive support for modes and Twitter affordances&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;Linking to the original context with Twitter is particularly important where audio, emoji, font, image, and video modes and Twitter affordances for hashtagging and @mentions disappear. These may not be imported into QDAS spreadsheets as QDAS tools differ widely in the data they extract for Twitter affordances and modes.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #7f6000;&quot;&gt;3 Support conversational analysis&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;Research into Twitter conversations was poorly supported by all four QDAS tools. Each presented a myriad of isolated tweets, with no way to display the original conversational thread. QDAS and Twitter should work together for providing qualitative researchers with ready access to Twitter exchanges. The added benefits of API2 functionality (such as conversation tracking) seem MIA in QDAS. Such integration would seem a useful step for promoting wider research into healthy conversations that Twitter described in &lt;a href=&quot;https://blog.twitter.com/official/en_us/topics/company/2018/measuring_healthy_conversation.html&quot; target=&quot;_blank&quot;&gt;2018&lt;/a&gt;&amp;nbsp;as an important business priority.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #7f6000;&quot;&gt;4 Provide examples for live Twitter data analysis&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;QDAS companies that provide Twitter import functionality should provide resources that address not only how to extract data, but also examples of how their software is used in analysing microblogging data. While Twitter is actively encouraging and training academic researchers to transform raw JSON into CSV files for research purposes, QDAS companies seem to provide scant examples for live Twitter data analysis. The online resources they provide could be improved by adding examples. For example, we look forward to seeing how QDAS are used in analysing Twitter conversation threads.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #7f6000;&quot;&gt;5 Spotlight the black box of Twitter data organisation&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;QDAS developers could make the ‘black box’ of Twitter data organisation visible by showing a model of the data undergirding the tweets, and also the spreadsheet&#39;s data excludes. Researchers could benefit from such an overview for the great deal of Twitter fields that are missing.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #7f6000;&quot;&gt;6 Missing in extraction&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;Another black box concerns the process of data extraction from Twitter. While the functionality of running live imports for select criteria is efficient, more information could be shared regarding the context of the extraction. For example, what are the internal and external limits on the maximum number of tweets a QDAS can import.&lt;br /&gt;&lt;br /&gt;Do let us know what you think of these suggestions by submitting a comment below, or &lt;a href=&quot;https://www.travisnoakes.co.za/p/contact.html&quot; target=&quot;_blank&quot;&gt;contacting me&lt;/a&gt;.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/4001724519984487566/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2023/06/recommendations-for-qdas-developers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/4001724519984487566'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/4001724519984487566'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2023/06/recommendations-for-qdas-developers.html' title='Recommendations for QDAS developers from &#39;Noteworthy disparities with four CAQDAS tools- explorations in organising live Twitter data&#39;, forthcoming'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.9248685 18.4240553</georss:point><georss:box>-62.235102336178848 -16.7321947 -5.6146346638211568 53.5803053</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-2736299510158467919</id><published>2023-04-15T13:55:00.009+02:00</published><updated>2023-04-15T14:10:23.003+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="app"/><category scheme="http://www.blogger.com/atom/ns#" term="apple"/><category scheme="http://www.blogger.com/atom/ns#" term="CHAT"/><category scheme="http://www.blogger.com/atom/ns#" term="cyberbullying"/><category scheme="http://www.blogger.com/atom/ns#" term="emoji"/><category scheme="http://www.blogger.com/atom/ns#" term="harassment"/><category scheme="http://www.blogger.com/atom/ns#" term="prevention"/><category scheme="http://www.blogger.com/atom/ns#" term="stickers"/><category scheme="http://www.blogger.com/atom/ns#" term="toolkit"/><category scheme="http://www.blogger.com/atom/ns#" term="trolls"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp"/><title type='text'>Use the Shushmoji app to learn anti chat harassment tactics and end anti-social conversations with WhatsApp chat stickers</title><content type='html'>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Written for people wanting to learn strategies for ending chat harassment in WhatsApp and use chat stickers for this.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;Apple users can now feed their trolls with Shushmoji chat stickers in WhatsApp using the free Shushmoji app at&amp;nbsp;&lt;a href=&quot;https://apps.apple.com/us/app/shushmoji/id1639680705&quot; target=&quot;_blank&quot;&gt;https://apps.apple.com/us/app/shushmoji/id1639680705&lt;/a&gt;. The app works on Mac, iPhone, iPad and iPods with an M1 chip (or later) and running Mac OS.11 (or later).&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;The Shushmoji app&#39;s sticker packs cover garden-variety &lt;i&gt;trolls, academic bullies, silly asses, pesky sinners and torturous types&lt;/i&gt;. Check out two examples of their use below&amp;nbsp;{or there&#39;s five &lt;a href=&quot;https://www.createwith.net/best-whatsapp-sticker-packs/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;,&amp;nbsp;thirty examples&amp;nbsp;&lt;a href=&quot;https://www.createwith.net/shushmoji-app-examples/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&amp;nbsp;or via &lt;a href=&quot;https://za.pinterest.com/createwithcapetown/shushmojis/-&quot; target=&quot;_blank&quot;&gt;Pinterest&lt;/a&gt;&amp;nbsp;!} Download the app to use its free set with 30 stickers; premium sets are available for in-app purchase.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.createwith.net/&quot; target=&quot;_blank&quot;&gt;Create With Cape Town&#39;s&lt;/a&gt;&amp;nbsp;Shushmoji app is also available for Android users at&amp;nbsp;&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.createwith.shushmoji&amp;amp;hl=en&amp;amp;gl=US&quot; target=&quot;_blank&quot;&gt;https://play.google.com/store/apps/details?id=com.createwith.shushmoji&amp;amp;hl=en&amp;amp;gl=US&lt;/a&gt;. It&#39;s compatible with Android phones and tablets.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;
&lt;p&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;table style=&quot;background-color: lightyellow;&quot;&gt;
&lt;tbody&gt;&lt;tr style=&quot;background-color: darkkhaki; color: white;&quot;&gt;
&lt;th&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Stop silly troll! &lt;a href=&quot;https://www.createwith.net/whatsapp-sticker-examples/#troll&quot; target=&quot;_blank&quot;&gt;chat sticker &lt;/a&gt;example&lt;/span&gt;&lt;/th&gt;
&lt;th&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Stop sinner! &lt;a href=&quot;https://www.createwith.net/whatsapp-sticker-examples/#sinner&quot; target=&quot;_blank&quot;&gt;chat sticker&lt;/a&gt; example&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;
  &lt;tr&gt;&lt;td&gt;&lt;a href=&quot;https://createwith.net/wp-content/uploads/2022/07/Virus-Conv.png&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;800&quot; data-original-width=&quot;365&quot; height=&quot;640&quot; src=&quot;https://createwith.net/wp-content/uploads/2022/07/Virus-Conv.png&quot; width=&quot;293&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;&lt;a href=&quot;https://createwith.net/wp-content/uploads/2022/07/bystander_sinner3.png&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-align: center;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;610&quot; data-original-width=&quot;376&quot; height=&quot;640&quot; src=&quot;https://createwith.net/wp-content/uploads/2022/07/bystander_sinner3.png&quot; width=&quot;394&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The Shushmoji app also offers&amp;nbsp;twenty anti-chat harassment tactics cards. These fall under four strategies for stopping trolls: &lt;i&gt;ignore, report, respond and prevent. &lt;/i&gt;Install the app to scroll through all twenty cards on your phone or tablet.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;table style=&quot;background-color: lightyellow;&quot;&gt;&lt;tbody&gt;&lt;tr style=&quot;background-color: darkkhaki; color: white;&quot;&gt;&lt;th&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Ignore strategy index card&lt;/span&gt;&lt;/th&gt;&lt;th&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Ignore tactic card&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgos1uyN6HYZgnkJe-N5kojdCZU7xQPX_q2toq8f3INz4VulxRw8Q0U-YqIp3xYk0l4XTfS1Bj35gC7qCqwz-P9z-ePvpVGf34ZjFOvLZkS8xLnDSJSnnCL0uE74EKMTA4ChXe-iFem_pPJcappNpYzr5CpJBmx1__sTDs9I4_CdN8tPC5a70YSe5xtlw&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Shushmoji app ignore strategy index card&quot; data-original-height=&quot;2600&quot; data-original-width=&quot;1462&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEgos1uyN6HYZgnkJe-N5kojdCZU7xQPX_q2toq8f3INz4VulxRw8Q0U-YqIp3xYk0l4XTfS1Bj35gC7qCqwz-P9z-ePvpVGf34ZjFOvLZkS8xLnDSJSnnCL0uE74EKMTA4ChXe-iFem_pPJcappNpYzr5CpJBmx1__sTDs9I4_CdN8tPC5a70YSe5xtlw=w360-h640&quot; title=&quot;Shushmoji app Ignore strategy index card&quot; width=&quot;360&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;&lt;td&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEj95QpfB2Nz7dWvZQ1PYr2KhEXH2usJBFb48MsPAfBafWa5JwLyFLLoBxu55MkIExW8JsxcvzA1w586ojmhlXX6Gh_lkZUN5bdU5-r_JjGDWRBf6WOfPk97TV4KlQjuf-Uq-coGJ4EPZInWiLTMd_8-eyE1lDl1eSq63SvFHXa8pj622jsVDk8UNfEYDg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Shushmoji app ignore tactic card&quot; data-original-height=&quot;2601&quot; data-original-width=&quot;1463&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEj95QpfB2Nz7dWvZQ1PYr2KhEXH2usJBFb48MsPAfBafWa5JwLyFLLoBxu55MkIExW8JsxcvzA1w586ojmhlXX6Gh_lkZUN5bdU5-r_JjGDWRBf6WOfPk97TV4KlQjuf-Uq-coGJ4EPZInWiLTMd_8-eyE1lDl1eSq63SvFHXa8pj622jsVDk8UNfEYDg=w360-h640&quot; title=&quot;Shushmoji app ignore tactic card&quot; width=&quot;360&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Why develop a Shushmoji app?&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In the first place, there are few end-of-conversation chat sticker designs. Secondly, there also seemed a need for an&amp;nbsp;anti-chat harassment cyber toolkit that targets of cyberbullying could quickly access for tactics. Hopefully knowledge of these can helps expand cyberbullying recipients&#39; understanding of what else is possible than simply being silent and enduring harassment!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;Being silent echoes the conventional advice, Do Not Feed the Trolls (DNFTT). It reflects how there are many downsides to communicating with harassers, since they are likely to be mentally unstable (Barnes, 2018). Online trolls score low in the Big Five Personality scores of agreeability and conscientiousness, but score high in Dark Tetrad traits of- narcissism, Machiavellianism, sub-clinical psychopathy and/or everyday sadism. Attempting rational engagement with perpetrators of cyber harassment is likely to provoke retaliatory attacks in excess of the original abuse. This may be further escalated via circling cyber vultures and mobs. Such amplification is common to unmoderated platforms where destructive, hostile and bigoted behaviour is rewarded with likes and re-shares.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;While the responsibility for harassment should lie with its perpetrators, society often blames the victims for “putting themselves out there”&amp;nbsp;(Citron, 2014). This reflects a slow-changing social reality in which support for targets of cyber harassment grows at a glacial pace; whether in institutional and organisational culture and policies, or in law and its enforcement. Individuals who fight back against cyber harassment must take a risky gamble in weighing up this battle&#39;s pros and cons. For many, the potential benefits of nudging discussion towards norms of respect, whilst repairing any reputational damage, seem unlikely to outweigh the severe downsides of escalating cyber-harassment.&lt;br /&gt;&lt;br /&gt;Create With Cape Town&#39;s end-of-conversation stickers were designed to support targets&#39; ability to disengage from cyberbullies. Unlike the DNFTT tactic, it does not mute their voice and right-of-reply. &lt;br /&gt;These chat stickers can help end chats-gone-bad, whilst showing trolls and their audiences what one thinks of their behaviour.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Support using the Shushmoji app&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Helpful FAQs on using the Shushmoji app are available at &lt;a href=&quot;https://www.createwith.net/shushmoji-app-faqs/&quot; target=&quot;_blank&quot;&gt;https://www.createwith.net/shushmoji-app-faqs/&lt;/a&gt;: These cover general users at &lt;a href=&quot;http://bit.ly/3RfrAIG&quot; target=&quot;_blank&quot;&gt;http://bit.ly/3RfrAIG&lt;/a&gt;, Android users at &lt;a href=&quot;http://bit.ly/3Hlt2VB&quot; target=&quot;_blank&quot;&gt;http://bit.ly/3Hlt2VB&lt;/a&gt; and Apple users at &lt;a href=&quot;http://bit.ly/3Y5akZ5&quot;&gt;http://bit.ly/3Y5akZ5&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Shushmoji app credits&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Two intern teams from &lt;a href=&quot;https://www.younglings.academy&quot; target=&quot;_blank&quot;&gt;Younglings Africa&lt;/a&gt; coded the Shushmoji app in 2020 and 2021: Led by Russel Magaya, 2020’s Android development team comprised Diego Mizero, Shane Abrahams, Ethan Jansen and Johan van der Merwe.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;In 2021 the development team focused on Apple and Android versions. It was led by Joshua Schell with Lindani Masinga and consisted of Zaakirah Abrams, Arthur Butler, Rayaan Karlie and Zainab Hartley.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Younglings Developer Solutions&#39; Michael Pretorius completed the Android development in 2022 and the Apple roll-out in early 2023.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;Shushmoji feedback&lt;/h3&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;We trust you enjoy using the Shushmoji app. Any comments, concerns or suggestions on the #Shushmoji app, can be shared with me via Create with Cape Town’s email form at &lt;a href=&quot;https://www.createwith.net/contact/.&quot;&gt;https://www.createwith.net/contact/.&lt;/a&gt; Do be patient for a reply- it may take one full working week for non-urgent correspondence.&lt;br /&gt;&lt;br /&gt;Alternately, hashtag #Shushmoji and #CreateWithCapeTown and give a shout-out to our&amp;nbsp;&lt;a href=&quot;https://www.facebook.com/createwithcapetown/&quot; target=&quot;_blank&quot;&gt;Facebook&lt;/a&gt;, &lt;a href=&quot;https://www.instagram.com/createwithcapetown/&quot; target=&quot;_blank&quot;&gt;Instagram&lt;/a&gt;, &lt;a href=&quot;https://www.linkedin.com/company/67926439/admin/&quot; target=&quot;_blank&quot;&gt;LinkedIn&lt;/a&gt; or &lt;a href=&quot;https://twitter.com/Create_With_CT&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt;&amp;nbsp;accounts. Cheers!&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/2736299510158467919/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2023/04/use-shushmoji-app-to-learning-about.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/2736299510158467919'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/2736299510158467919'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2023/04/use-shushmoji-app-to-learning-about.html' title='Use the Shushmoji app to learn anti chat harassment tactics and end anti-social conversations with WhatsApp chat stickers'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEgos1uyN6HYZgnkJe-N5kojdCZU7xQPX_q2toq8f3INz4VulxRw8Q0U-YqIp3xYk0l4XTfS1Bj35gC7qCqwz-P9z-ePvpVGf34ZjFOvLZkS8xLnDSJSnnCL0uE74EKMTA4ChXe-iFem_pPJcappNpYzr5CpJBmx1__sTDs9I4_CdN8tPC5a70YSe5xtlw=s72-w360-h640-c" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.9248685 18.4240553</georss:point><georss:box>-62.235102336178848 -16.7321947 -5.6146346638211568 53.5803053</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-3403625272297173089</id><published>2022-12-23T09:51:00.007+02:00</published><updated>2023-01-04T08:41:55.512+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="academic"/><category scheme="http://www.blogger.com/atom/ns#" term="article"/><category scheme="http://www.blogger.com/atom/ns#" term="COVID-19"/><category scheme="http://www.blogger.com/atom/ns#" term="disinfodemic"/><category scheme="http://www.blogger.com/atom/ns#" term="infodemic"/><category scheme="http://www.blogger.com/atom/ns#" term="post-truth"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><title type='text'>A summary of &#39;Who is watching the World Health Organisation? ‘Post-truth’ moments beyond infodemic research&#39;</title><content type='html'>&lt;div&gt;&lt;span style=&quot;color: #674ea7;&quot;&gt;Written for infodemic/disinfodemic researchers and those interested in the scientific suppression of COVID-19 dissidents.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://twitter.com/bell00david?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor&quot; target=&quot;_blank&quot;&gt;Dr David Bell&lt;/a&gt;, &lt;a href=&quot;https://twitter.com/ProfTimNoakes&quot; target=&quot;_blank&quot;&gt;Emeritus Professor Tim&lt;/a&gt; &lt;a href=&quot;https://twitter.com/LoreofRunning1&quot; target=&quot;_blank&quot;&gt;Noakes&lt;/a&gt; and my opinion piece &#39;Who is watching the World Health Organisation? ‘Post-truth’ moments beyond infodemic research’ is available at &lt;a href=&quot;https://td-sa.net/index.php/td/article/view/1263&quot;&gt;https://td-sa.net/index.php/td/article/view/1263&lt;/a&gt;. It was written for a special issue, &#39;Fear and myth in a post-truth age’ from the Journal for Transdisciplinary Research in Southern Africa (see call at&amp;nbsp;&lt;a href=&quot;https://aosis.co.za/call-for-papers-special-collection-in-journal-for-transdisciplinary-research/&quot;&gt;https://aosis.co.za/call-for-papers-special-collection-in-journal-for-transdisciplinary-research/&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;A major criticism this paper raises is that infodemic research lacks earnest discussion on where health authorities’ own choices and guidelines might be contributing to ‘misinformation’, ‘disinformation’ and even ‘malinformation’. Rushed guidance based on weak evidence from international health organisations can perpetuate negative health and other societal outcomes, not ameliorate them! If health authorities’ choices are not up for review and debate, there is a danger that a hidden goal of the World Health Organisation (WHO) infodemic (or related disinfodemic funders’ research) could be to direct attention away from funders&#39; multitude of failures in fighting pandemics with inappropriate guidelines and measures.&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;In The regime of ‘post-truth’: COVID-19 and the politics of knowledge (at&amp;nbsp;&lt;a href=&quot;https://www.tandfonline.com/doi/abs/10.1080/01596306.2021.1965544&quot; target=&quot;_blank&quot;&gt;https://www.tandfonline.com/doi/abs/10.1080/01596306.2021.1965544&lt;/a&gt;), Kwok, Singh and Heimans (2019) describe how the global health crisis of COVID-19 presents a fertile ground for exploring the complex division of knowledge labour in a ‘post-truth’ era. Kwok et al. (2019) illustrates this by describing COVID-19 knowledge production at university. Our paper focuses on the relationships between health communication, public health policy and recommended medical interventions. &lt;br /&gt;&lt;br /&gt;Divisions of knowledge labour are described for (1) the ‘infodemic/disinfodemic research agenda’, (2) ‘mRNA vaccine research’ and (3) ‘personal health responsibility’. We argue for exploring intra- and inter relationships between influential knowledge development fields. In particular, the vaccine manufacturing pharmaceutical companies that drive and promote mRNA knowledge production. Within divisions of knowledge labour (1-3), we identify key inter-group contradictions between the interests of agencies and their contrasting goals. Such conflicts are useful to consider in relation to potential gaps in the WHO’s infodemic research agenda:&lt;br /&gt;&lt;br /&gt;For (1), a key contradiction is that infodemic scholars benefit from health authority funding may face difficulties questioning their “scientific” guidance. We flag how the WHO ’s advice for managing COVID-19 departed markedly from a 2019 review of evidence it commissioned (see&amp;nbsp;&lt;a href=&quot;https://www.ncbi.nlm.nih.gov/pubmed/35444988&quot;&gt;https://www.ncbi.nlm.nih.gov/pubmed/35444988&lt;/a&gt;). &lt;br /&gt;&lt;br /&gt;(2)’s division features very different contradictions. Notably, the pivotal role that pharmaceutical companies have in generating vaccine discourse is massively conflicted. Conflict of interest arises in pursuing costly research on novel mRNA vaccines because whether the company producing these therapies will ultimately benefit financially from the future sales of these therapies depends entirely on the published efficacy and safety results from their own research. The division of knowledge labour for (2) mRNA vaccine development should not be considered separately from COVID-19’s in Higher Education or the (1) infodemic research agenda. Multinational pharmaceutical companies direct the research agenda in academia and medical research discourse through the lucrative grants they distribute. Research organisations dependant on external funding for covering budget shortfalls will be more susceptible to the influence of those funders on their research programs.&lt;br /&gt;&lt;p class=&quot;p2&quot; style=&quot;font-family: &amp;quot;Helvetica Neue&amp;quot;; font-size: 13px; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal; margin: 0px; min-height: 15px;&quot;&gt;&lt;br /&gt;&lt;/p&gt;We spotlight the overwhelming evidence for the importance of (3) personal responsibility. In the COVID-19 pandemic, its  discourses seemed largely ignored by Higher Education leadership and government. We flag how contradictions in (3)’s division of knowledge labour in a pandemic can explain such neglect. Personal responsibility is not a commercial site for generating large profits, some of which may be donated in supporting academic research. Research into effective, low-cost interventions seems to be at odds with the economic interests of both grant recipients and Big Pharma donors. Replacing costly treatments with low-cost alternatives would not only greatly diminish the profitability of existing funders, but also reduce the pool of new ones, plus the size of future donations. It is also important to reflect on how else the scientific enterprise at university lends itself to being an arena for misinformation. New information in science that refutes existing dogma does not become accepted immediately. Therefore a period exists when new ideas will be considered as misinformation especially by those with an agenda to suppress its acceptance.&lt;br /&gt;&lt;br /&gt;However, from the perspective of orthodoxy, views that support new paradigms are unverified knowledge (and potentially &quot;misinformation&quot;). Any international health organisation that wishes to be an evaluator must have the scientific expertise for managing this ongoing ‘paradox’, or irresolvable contradiction. Organisations such as the WHO may theoretically be able to convene such knowledge, but their dependency on funding from conflicted parties would normally render them ineligible to perform such a task. This is particularly salient where powerful agents can collaborate across divisions of knowledge labour for establishing an institutional oligarchy. Such hegemonic collaboration can suppress alternative viewpoints that contest and query powerful agents’ interests.&lt;br /&gt;&lt;br /&gt;&lt;div&gt;It is concerning how many Communication and Media Studies researchers are ignoring such potential abuse of power, whilst supporting censorship of dissenters based on unproven &quot;harms&quot;. Embedded researchers seem to ignore that the Centers for Disease Control, National Institute for Health and the WHO’s endorsement of multinational pharmaceutical companies’ products is a particularly troubling development: it marks a ‘new normal’ of institutional capture by industry sponsoring regulators who become their ‘lobbyists’. This contrasts to the silo efforts of external influence in the past, for example by lobbyists working for Big Tobacco or Big Food. They spun embedded scientific research touting the ‘benefits’ of smoking and processed foods. At the same time, evidence of harm was attacked as &quot;junk science&quot;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;At least with cigarettes and ultra-processed foods, many individuals have the choice to buy or avoid paying. In stark contrast, tax-paying publics have no such option in avoiding the steep costs of mRNA vaccines. Public taxes pay for these treatments, while less expensive and potentially more effective interventions are ignored. Paying for vaccines takes funding away from interventions that would address wider and more pressing global health needs, in particular, &lt;a href=&quot;https://www.pandata.org/covid-19-the-vaccine-and-the-betrayal-of-sub-saharan-africa/&quot; target=&quot;_blank&quot;&gt;poverty, malaria, tuberculosis and T2DM&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;This paper alerts researchers to a broad range of ‘post-truth’ moments and flags the danger of relying on global health authorities to be the sole custodians of who is allowed to define what comprises an information disorder. Challenges to scientific propaganda&amp;nbsp;from authorities captured by industry should not automatically be (mis-) characterised as low quality or harmful information. Rather, the digital voices of responsible dissenters can be valuable in protecting scientific integrity and public health (for example, &lt;a href=&quot;https://drive.google.com/file/d/106Q76X25qOEDaFdPByHgpNmSqLDx2Xcs&quot; target=&quot;_blank&quot;&gt;@ProfTimNoakes&lt;/a&gt;&amp;nbsp;should not be &lt;a href=&quot;https://change.org/p/twitter-account-of-prof-tim-noakes-permanently-banned-call-for-restoration-and-clarity&quot; target=&quot;_blank&quot;&gt;blocked from his Twitter account&lt;/a&gt;&amp;nbsp;for expressing dissent!)&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://pbs.twimg.com/media/FlmkAKzWQAAh6Sg?format=jpg&amp;amp;name=900x900&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Image ™ @TexasLindsay_&quot; border=&quot;0&quot; data-original-height=&quot;640&quot; data-original-width=&quot;800&quot; height=&quot;512&quot; src=&quot;https://pbs.twimg.com/media/FlmkAKzWQAAh6Sg?format=jpg&amp;amp;name=900x900&quot; title=&quot;Image ™ @TexasLindsay_&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Our article results from collaboration between &lt;a href=&quot;https://thenoakesfoundation.org/research-and-teams&quot;&gt;The Noakes Foundation&lt;/a&gt; and &lt;a href=&quot;https://www.pandata.org/&quot;&gt;PANDA&lt;/a&gt;. The authors thank JTSA’s editors for the opportunity to contribute to its special issue, the paper’s critical reviewers for their helpful suggestions and &lt;a href=&quot;https://aosis.co.za/&quot;&gt;AOSIS&lt;/a&gt; for editing and proof-reading the paper.&lt;br /&gt;&lt;br /&gt;This is the third publication from The Noakes Foundation’s Academic Free Speech and Digital Voices (AFSDV) project. Do follow me on &lt;a href=&quot;https://twitter.com/travisnoakes&quot;&gt;Twitter&lt;/a&gt; or  &lt;a href=&quot;https://www.researchgate.net/project/Academic-Free-Speech-and-Digital-Voices-AFSDV&quot;&gt;https://www.researchgate.net/project/Academic-Free-Speech-and-Digital-Voices-AFSDV&lt;/a&gt; for updates regarding it. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I welcome you sharing constructive comments, below.&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/3403625272297173089/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2022/12/a-summary-of-who-is-watching-world.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/3403625272297173089'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/3403625272297173089'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2022/12/a-summary-of-who-is-watching-world.html' title='A summary of &#39;Who is watching the World Health Organisation? ‘Post-truth’ moments beyond infodemic research&#39;'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.9248685 18.4240553</georss:point><georss:box>-62.235102336178848 -16.7321947 -5.6146346638211568 53.5803053</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-475467403699495817</id><published>2022-08-29T08:39:00.000+02:00</published><updated>2022-08-29T08:39:08.441+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="app_approval"/><category scheme="http://www.blogger.com/atom/ns#" term="banner"/><category scheme="http://www.blogger.com/atom/ns#" term="changes"/><category scheme="http://www.blogger.com/atom/ns#" term="design"/><category scheme="http://www.blogger.com/atom/ns#" term="Google Play_Store"/><category scheme="http://www.blogger.com/atom/ns#" term="marketing"/><category scheme="http://www.blogger.com/atom/ns#" term="review"/><title type='text'>Banner design changes for Google Play Store&#39;s approval of the Shushmoji app</title><content type='html'>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Written for designers and marketers submitting edgy banners for approval&amp;nbsp;with Google Play Store&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #999999;&quot;&gt;apps&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;In submitting the &lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.createwith.shushmoji&amp;amp;gl=ZA&quot; target=&quot;_blank&quot;&gt;Shushmoji app&lt;/a&gt; &lt;/span&gt;to the &lt;a href=&quot;https://play.google.com/store/apps&quot; target=&quot;_blank&quot;&gt;Google Play store&lt;/a&gt;, several changes were required to the app&#39;s promotional banners before Google Play&amp;nbsp;approved the app. The changes that&amp;nbsp;&lt;a href=&quot;https://www.createwith.net/&quot; target=&quot;_blank&quot;&gt;Create With Cape Town&lt;/a&gt;&amp;nbsp;made may be of interest to other designers preparing edgy campaigns, given Google Play Store&#39;s somewhat opaque feedback- the store simply flags which designs are rejected, but does not specify exactly which elements must change.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Below is a Slideshare presentation featuring the varying banner iterations - see if you can spot the differences? The answers follow below...&lt;/p&gt;&lt;p style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;iframe frameborder=&quot;0&quot; height=&quot;400&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/moBfKh8t2NIBsT?hostedIn=slideshare&amp;amp;page=upload&quot; width=&quot;476&quot;&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;b&gt;&lt;div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;Adding an age-restriction to all banners (slides 8 to 14)&lt;/b&gt;&lt;br /&gt;The first major change was adding a 13+ graphic in the bottom right of the presentation to comply with the policy that ‘app’s marketing imagery and text must make it clear that the app is only for young people aged 13 or older’. Subsequently, the Google Play Store calculated this rating for each country based on its app questionnaire. It decided on to a revised age restriction of 12+, so this banner is not inaccurate but will be updated with the next app version&#39;s submission.&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Changing banner 3 (contrast slide 5 vs 17 &amp;amp; 18)&lt;/b&gt;&lt;br /&gt;&lt;div&gt;&quot;Mother Grundy Google” does not like zap signs or mentions of &#39;ass&#39;, let alone &#39;a**&#39;! The latter are a particular problem when Create With Cape Town wants to promote a &lt;a href=&quot;https://www.createwith.net/silly-ass-vectors/&quot; target=&quot;_blank&quot;&gt;&#39;silly ass&#39; emoji sticker set.&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhoePzmQv_HRTYuBpqatwxgW9PmB_e9RPUBemErMpeQ-IohpVSI9VthEEQIItLktFLWN7FLHp8Zt16A5wo2Dt0jDvsCxPwa9-CgkwngGt0Cgu9diKpk583ap_IE0fFgz5oQRwdICXGCEHqVSInnBvmfakBj47ZXKPzAcfu9aCqUcYWG4H1EUZRDfeVDJA&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Shushmoji banner app - end conversations with dumb asses v1&quot; data-original-height=&quot;1313&quot; data-original-width=&quot;1875&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhoePzmQv_HRTYuBpqatwxgW9PmB_e9RPUBemErMpeQ-IohpVSI9VthEEQIItLktFLWN7FLHp8Zt16A5wo2Dt0jDvsCxPwa9-CgkwngGt0Cgu9diKpk583ap_IE0fFgz5oQRwdICXGCEHqVSInnBvmfakBj47ZXKPzAcfu9aCqUcYWG4H1EUZRDfeVDJA=w400-h280&quot; title=&quot;Shushmoji banner app - end conversations with dumb asses&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;So, the banner&#39;s title was changed to &#39;End conversations with silly donkeys&#39;. The WhatsApp screen graphics were also changed-&amp;nbsp; the &#39;silly ass&#39; part of &#39;Hey, silly ass&#39; sticker set was blurred to make it obvious that the banner title is &quot;censored&quot;. Lastly, in the left’s WhatsApp exchange ’the same species as you’ was changed to simply ‘humanity’. Out of an excess of caution, End it! was changed to End the chat! We did not want our AI Google overlord&#39;s algorithm to misinterpret &#39;End it!&#39; as telling someone to end their life.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhEJJ3aEp3UjkRhL6zNiLj5c8rilyu-jGhWWBQzR9sn3sEgwiXDbf2OMlnTZRgLnm38FgXgnAbnDeWCJvGyXwRZ2Y1uKLbTAWKWtqlUwSY-qJE102WoPk5gtRwrOX6XQaQ-_rWGHxRlUNfVPBmAKOmcg9dK3fUqISReN5P2l8aNYgFxnxwhYPo8pgo-5w&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Shushmoji banner app - end conversations with dumb asses version 2&quot; data-original-height=&quot;1313&quot; data-original-width=&quot;1875&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhEJJ3aEp3UjkRhL6zNiLj5c8rilyu-jGhWWBQzR9sn3sEgwiXDbf2OMlnTZRgLnm38FgXgnAbnDeWCJvGyXwRZ2Y1uKLbTAWKWtqlUwSY-qJE102WoPk5gtRwrOX6XQaQ-_rWGHxRlUNfVPBmAKOmcg9dK3fUqISReN5P2l8aNYgFxnxwhYPo8pgo-5w=w400-h280&quot; title=&quot;Shushmoji banner app - end conversations with dumb asses v2&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;Changing banner 4&lt;/b&gt;&amp;nbsp;&lt;b&gt;(contrast slide 4 vs 21)&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Surprisingly, this &lt;a href=&quot;https://www.createwith.net/silly-troll-vectors/&quot; target=&quot;_blank&quot;&gt;Stop, silly troll! &lt;/a&gt;set&#39;s banner was not initially flagged in the review process, despite it also featuring a zap sign.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiGXSHTzt_kV9_zaQ1Ja-RITIVgqNFVDP0OWxXarZivU1rBdAb8-IklbIWj5V_PdjMYghA-0klN6FUz55agZxtvXlhxphJREET5T6x_zi0-mFeahVduLmOq48UP5nTjrUk2d897T9yDkm8QVB3dTHJfm681xLuA-rSgG3tYCO9W5BZckF2wVp0tTQ1HGQ&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Shushmoji banner app - end conversations with trolls version 1&quot; data-original-height=&quot;1313&quot; data-original-width=&quot;1875&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiGXSHTzt_kV9_zaQ1Ja-RITIVgqNFVDP0OWxXarZivU1rBdAb8-IklbIWj5V_PdjMYghA-0klN6FUz55agZxtvXlhxphJREET5T6x_zi0-mFeahVduLmOq48UP5nTjrUk2d897T9yDkm8QVB3dTHJfm681xLuA-rSgG3tYCO9W5BZckF2wVp0tTQ1HGQ=w400-h280&quot; title=&quot;Shushmoji banner app - end conversations with trolls&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;That risqué &#39;ass hole’ Shushmoji in the bottom right was also removed.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEj5TS5ZoBhordx15PoR__rc1ghYqVQ6Zi7agJUbU0vvrAPLT2CmV0uKjjWblaqEpSbsC0YZcROJ6-pHQvDAwNk5pY-NFS8rijTrVJ820ObOprBBmwLyZdfbioE8bsAbRPHMsj8RSmEXdopgOs3HUzLRlRIK7GfzK6Pjgomqds2A2YvvrpEGNlg4zP5bww&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Shushmoji banner app - end conversations with trolls version 2&quot; data-original-height=&quot;1313&quot; data-original-width=&quot;1875&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEj5TS5ZoBhordx15PoR__rc1ghYqVQ6Zi7agJUbU0vvrAPLT2CmV0uKjjWblaqEpSbsC0YZcROJ6-pHQvDAwNk5pY-NFS8rijTrVJ820ObOprBBmwLyZdfbioE8bsAbRPHMsj8RSmEXdopgOs3HUzLRlRIK7GfzK6Pjgomqds2A2YvvrpEGNlg4zP5bww=w400-h280&quot; title=&quot;Shushmoji banner app - end conversations with trolls v2&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;All the changes above proved sufficient to meet the Google Play Store&#39;s approval of the Shushmoji app.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;If you experienced similar challenges with your app&#39;s submission, kindly let us know in the comments below, cheers 👍!&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/475467403699495817/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2022/08/banner-design-changes-for-google-play.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/475467403699495817'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/475467403699495817'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2022/08/banner-design-changes-for-google-play.html' title='Banner design changes for Google Play Store&#39;s approval of the Shushmoji app'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEhoePzmQv_HRTYuBpqatwxgW9PmB_e9RPUBemErMpeQ-IohpVSI9VthEEQIItLktFLWN7FLHp8Zt16A5wo2Dt0jDvsCxPwa9-CgkwngGt0Cgu9diKpk583ap_IE0fFgz5oQRwdICXGCEHqVSInnBvmfakBj47ZXKPzAcfu9aCqUcYWG4H1EUZRDfeVDJA=s72-w400-h280-c" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.9248685 18.4240553</georss:point><georss:box>-62.235102336178848 -16.7321947 -5.6146346638211568 53.5803053</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-8619566034517139030</id><published>2022-08-26T09:12:00.017+02:00</published><updated>2022-08-26T11:12:39.253+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><category scheme="http://www.blogger.com/atom/ns#" term="app"/><category scheme="http://www.blogger.com/atom/ns#" term="cyberbullying"/><category scheme="http://www.blogger.com/atom/ns#" term="design"/><category scheme="http://www.blogger.com/atom/ns#" term="emoji"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="stickers"/><category scheme="http://www.blogger.com/atom/ns#" term="WhatsApp"/><title type='text'>Want emoji stickers to end #WhatsApp chats with #cyberbullies? The #Shushmoji app on #Android is here!</title><content type='html'>&lt;span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;Written for&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;emoji sticker fans and recipients of&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&amp;nbsp;harassment via&amp;nbsp;WhatsApp.&lt;/span&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;The &lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.createwith.shushmoji&amp;amp;hl=en&amp;amp;gl=US&quot; target=&quot;_blank&quot;&gt;Shushmoji app for WhatsApp on Android&lt;/a&gt;&lt;/span&gt; is now available via Google Play.&amp;nbsp; This app was developed as an easy method of using Shushmojis as end-of-conversation points versus cyberbullies. As the Shushmoji&amp;nbsp;® name suggests, the app&#39;s emoji stickers are intended to silence irritating noise, just like a &#39;shush!’ silencing noisy brats.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://play-lh.googleusercontent.com/b-RpCaVS8fhNeLS6rSPYkhlJo0Fa1_CLq9-dLiaR5qrEl5Bn2UJK9PkspWR_X71xJA=s1024-rw&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Shushmoji banner advert&quot; border=&quot;0&quot; data-original-height=&quot;592&quot; data-original-width=&quot;1024&quot; height=&quot;370&quot; src=&quot;https://play-lh.googleusercontent.com/b-RpCaVS8fhNeLS6rSPYkhlJo0Fa1_CLq9-dLiaR5qrEl5Bn2UJK9PkspWR_X71xJA=w640-h370&quot; title=&quot;Shushmoji banner advert&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Check out examples for Shushmoji use in WhatsApp on &lt;a href=&quot;https://pin.it/5nw1QBR&quot; target=&quot;_blank&quot;&gt;Pinterest&lt;/a&gt;&amp;nbsp;or &lt;a href=&quot;https://www.createwith.net/whatsapp-sticker-examples/&quot; target=&quot;_blank&quot;&gt;createwith.net&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://createwith.net/wp-content/uploads/2022/07/Flamer-1.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;611&quot; data-original-width=&quot;376&quot; height=&quot;611&quot; src=&quot;https://createwith.net/wp-content/uploads/2022/07/Flamer-1.png&quot; width=&quot;376&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The app was initially developed for&amp;nbsp;&lt;a href=&quot;https://www.createwith.net/&quot; target=&quot;_blank&quot;&gt;Create With&lt;/a&gt;&amp;nbsp;by interns at &lt;a href=&quot;https://www.linkedin.com/company/younglingsafrica/?originalSubdomain=za&quot; target=&quot;_blank&quot;&gt;Younglings Africa&lt;/a&gt;.&amp;nbsp;&lt;a href=&quot;https://michaelpretorius.com/&quot; target=&quot;_blank&quot;&gt;Michael Pretorius&lt;/a&gt; at Younglings Development Studio (YDS) completed the app for the &lt;a href=&quot;https://play.google.com/store/apps&quot; target=&quot;_blank&quot;&gt;Google Play Store&lt;/a&gt;&#39;s vetting. An Android version was developed first, since Younglings Africa had experience developing for it. It&#39;s also the easiest to develop and secure approval for. {P.S. Mac fans, YDS is working on an Apple iOS version for release in the fourth quarter}.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;As this &lt;a href=&quot;https://www.slideshare.net/TravisNoakes/shushmoji-app-for-younglings-developers-2021&quot; target=&quot;_blank&quot;&gt;Slideshare&amp;nbsp;presentation&lt;/a&gt;&amp;nbsp;explains, my research into online academic bullying and&amp;nbsp;strategies for countering cyber-harassment&amp;nbsp;inspired both the Shushmoji ® concept and its apps. I maintain a Google research spreadsheet (&lt;a href=&quot;http://bit.ly/2D8qv0k&quot; target=&quot;_blank&quot;&gt;http://bit.ly/2D8qv0k&lt;/a&gt;) that shares many strategies against cyber-harassment, plus links to salient online resources. One strategy is for a recipient of cyber-harassment to use emoji stickers for flagging the end-point of a low-value/anti-social conversation. However, high-quality designs that address a wide range of cyber-harassment activities seem to be M.I.A!&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The Shushmoji emoji sticker sets were developed in response to this visual aesthetic communication&amp;nbsp;gap. In the app, 30 stickers are available to use for free. Users may purchase sticker sets for the themes they like.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;There are currently five sets to buy:&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.createwith.net/whatsapp-sticker-examples/&quot; target=&quot;_blank&quot;&gt;Stop, silly troll!&lt;/a&gt;&amp;nbsp;was designed by&amp;nbsp;&lt;a href=&quot;https://www.behance.net/JanineVenter&quot; target=&quot;_blank&quot;&gt;Janine Venter&lt;/a&gt;&amp;nbsp;to poke fun at all-too-common types of cyber-harassment.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://createwith.net/wp-content/uploads/2022/07/Virus-Conv.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;800&quot; data-original-width=&quot;365&quot; height=&quot;800&quot; src=&quot;https://createwith.net/wp-content/uploads/2022/07/Virus-Conv.png&quot; width=&quot;365&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.createwith.net/whatsapp-sticker-examples/&quot; target=&quot;_blank&quot;&gt;Stop, sinner!&lt;/a&gt;&amp;nbsp;was also drawn by Janine to flag many naughty (and not nice!) behaviours.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://createwith.net/wp-content/uploads/2022/07/bystander_sinner3.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;610&quot; data-original-width=&quot;376&quot; height=&quot;610&quot; src=&quot;https://createwith.net/wp-content/uploads/2022/07/bystander_sinner3.png&quot; width=&quot;376&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.createwith.net/whatsapp-sticker-examples/&quot; target=&quot;_blank&quot;&gt;Stop, academic bully!&lt;/a&gt;&amp;nbsp;was illustrated by&amp;nbsp;&lt;a href=&quot;https://www.instagram.com/i_art_marlon/&quot; target=&quot;_blank&quot;&gt;Marlon Albertyn&lt;/a&gt;&amp;nbsp;to spotlight the different kinds of academic bullies one can meet in the Ivory Tower.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://createwith.net/wp-content/uploads/2022/07/Schill.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;800&quot; data-original-width=&quot;223&quot; height=&quot;800&quot; src=&quot;https://createwith.net/wp-content/uploads/2022/07/Schill.png&quot; width=&quot;223&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.createwith.net/whatsapp-sticker-examples/&quot; target=&quot;_blank&quot;&gt;Stop, silly ass!&lt;/a&gt;&amp;nbsp;was drawn by&amp;nbsp;&lt;a href=&quot;http://www.buyadonkey.co.za/about/&quot; target=&quot;_blank&quot;&gt;Dominique Whelan&lt;/a&gt;, who&amp;nbsp;loves drawing donkeys and worked on the&amp;nbsp;set for &quot;a(ss) laugh&quot;.&amp;nbsp; These stickers flag a**holes with silly ass emoji stickers speaking to their asinine behaviours.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://createwith.net/wp-content/uploads/2022/07/gear_ass.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;618&quot; data-original-width=&quot;376&quot; height=&quot;618&quot; src=&quot;https://createwith.net/wp-content/uploads/2022/07/gear_ass.png&quot; width=&quot;376&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;https://www.createwith.net/torturer-vectors.html&quot; target=&quot;_blank&quot;&gt;Stop, torturer!&lt;/a&gt;&amp;nbsp;was illustrated by&amp;nbsp;&lt;a href=&quot;https://studiodolby.com/&quot; target=&quot;_blank&quot;&gt;Studio Dolby&lt;/a&gt;&amp;nbsp;and spotlights torturous &quot;conversationalists&quot;.&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.createwith.net/wp-content/uploads/2022/08/Stop_your_schadenfreude-Chat-627x1024.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;800&quot; data-original-width=&quot;490&quot; height=&quot;800&quot; src=&quot;https://www.createwith.net/wp-content/uploads/2022/08/Stop_your_schadenfreude-Chat-627x1024.png&quot; width=&quot;490&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;An educational rationale also exists where Shushmojis can illustrate the particular dodgy roles and/or anti-social strategies that cyber harassers follow. For those interested in sampling these stickers, the vector designs for each set are for sale via:&amp;nbsp;&lt;a href=&quot;https://www.createwith.net/silly-troll-vectors/&quot; target=&quot;_blank&quot;&gt;Silly Troll&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.createwith.net/academic-bully-vectors/&quot; target=&quot;_blank&quot;&gt;Academic bully&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://www.createwith.net/silly-ass-vectors/&quot; target=&quot;_blank&quot;&gt;Silly Ass&lt;/a&gt;,&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://www.createwith.net/sinner-vectors/&quot; target=&quot;_blank&quot;&gt;Sinner&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;https://www.createwith.net/stop-torturer-emoji-stickers/&quot; target=&quot;_blank&quot;&gt;Torturer&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.createwith.net/wp-content/uploads/2022/07/ass_setB_1_980x624.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;509&quot; data-original-width=&quot;800&quot; height=&quot;509&quot; src=&quot;https://www.createwith.net/wp-content/uploads/2022/07/ass_setB_1_980x624.jpg&quot; width=&quot;800&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;New Shushmoji sets are planned (such as Stop, Dumb Bot!) to close visual gaps for different roles and types of harassment (vs. doxxers and bot farm orchestrators). Hopefully, each set will prove useful for those wanting to express disinterest in continuing chats with cyberbullies. WhatsApp stickers should prove useful to flag this and a perp’s particular style of harassment. Of course, the stickers may also be used to poke fun at tactless friends and colleagues…&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Please download the app, use it and let the world know of your good experience via a Google Play Store app review.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;N.B. For updates on the Shushmoji ®&amp;nbsp;app versions, you can follow Create With on&amp;nbsp;&lt;a href=&quot;https://www.facebook.com/createwithcc&quot; target=&quot;_blank&quot;&gt;Facebook&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.instagram.com/createwithcapetown/&quot; target=&quot;_blank&quot;&gt;Instagram&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.tiktok.com/@createwith_capetown?lang=en&quot; target=&quot;_blank&quot;&gt;TikTok&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://twitter.com/CreateWith1&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href=&quot;https://www.linkedin.com/company/create-with-cape-town/&quot; target=&quot;_blank&quot;&gt;LinkedIn&lt;/a&gt;, ta.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;P.S. Several app iterations were trialed by Younglings Africa before the app&#39;s approval. Zaakirah Abrams&amp;nbsp;led the most recent testing- her 2022 Shushmoji app&amp;nbsp;report&amp;nbsp;is &lt;a href=&quot;https://www.createwith.net/wp-content/uploads/2022/08/Younglings-testing-report-for-Create-With-Shushmoji-app-for-WhatsApp-on-Android.pdf&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/8619566034517139030/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2020/03/stop-bully-emoji-stickers-app-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/8619566034517139030'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/8619566034517139030'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2020/03/stop-bully-emoji-stickers-app-for.html' title='Want emoji stickers to end #WhatsApp chats with #cyberbullies? The #Shushmoji app on #Android is here!'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://play-lh.googleusercontent.com/b-RpCaVS8fhNeLS6rSPYkhlJo0Fa1_CLq9-dLiaR5qrEl5Bn2UJK9PkspWR_X71xJA=s72-w640-h370-c" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.9248685 18.4240553</georss:point><georss:box>-62.235102336178848 -16.7321947 -5.6146346638211568 53.5803053</georss:box></entry><entry><id>tag:blogger.com,1999:blog-2127517647835977939.post-2965669113128268771</id><published>2022-04-23T11:31:00.011+02:00</published><updated>2022-06-20T18:03:24.738+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="academic"/><category scheme="http://www.blogger.com/atom/ns#" term="bullying"/><category scheme="http://www.blogger.com/atom/ns#" term="cyberbullying"/><category scheme="http://www.blogger.com/atom/ns#" term="higher education"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><title type='text'>Eight conceptual challenges in developing the &#39;online academic bullying&#39; framework</title><content type='html'>&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;color: #666666;&quot;&gt;Written for scholars interested in understanding online harassment from academic cyberbullies, plus the&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;development of the&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #666666;&quot;&gt;online academic bullying routine activity theory (OABRAT) framework&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwhJtcsjyPqZCsG4G3itB49gDZmm6jmZG9QdMM4VjxaDi60DYdAuCXieFyHSkbvBsDwZB6holWz7zNXCNtbl_tzl-gczaIOruD9oDzKdnfom1rhk5VhZ8ywqckwdHpFpuonbag4cKW1W7KQ2oXVbF5zL5Juy19eeSlKxLlPZV-aMTksRiaPxS5WR5alA/s512/26_enjoys_attacking_academic_leaders.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;troll enjoys attacking academic leaders&quot; border=&quot;0&quot; data-original-height=&quot;512&quot; data-original-width=&quot;512&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwhJtcsjyPqZCsG4G3itB49gDZmm6jmZG9QdMM4VjxaDi60DYdAuCXieFyHSkbvBsDwZB6holWz7zNXCNtbl_tzl-gczaIOruD9oDzKdnfom1rhk5VhZ8ywqckwdHpFpuonbag4cKW1W7KQ2oXVbF5zL5Juy19eeSlKxLlPZV-aMTksRiaPxS5WR5alA/w320-h320/26_enjoys_attacking_academic_leaders.png&quot; title=&quot;troll enjoys attacking academic leaders&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;In developing our &#39;&lt;a href=&quot;https://doi.org/10.1016/j.heliyon.2021.e06326&quot; target=&quot;_blank&quot;&gt;Distinguishing online academic bullying&lt;/a&gt;&#39; article, &lt;a href=&quot;https://www.researchgate.net/profile/Timothy-Noakes&quot; target=&quot;_blank&quot;&gt;Prof Tim Noakes&lt;/a&gt; and I trimmed the manuscript several times. Reworking some of these cuts in this post may offer value through addressing the methodological challenges we encountered in proposing our article&#39;s&amp;nbsp;&lt;a href=&quot;https://www.travisnoakes.co.za/2021/02/some-background-for-distinguishing.html&quot; target=&quot;_blank&quot;&gt;OABRAT framework&lt;/a&gt;. Seven conceptual challenges were overcome its development, while an eighth was encountered post-publication:&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;#1&quot;&gt;1 NEW FORMS OF POWER IMBALANCE&lt;/a&gt;&lt;/div&gt;
  &lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;#2&quot;&gt;2 BEYOND TROLLS: ACADEMIC CYBERBULLIES AS DECEIVERS, FLAMERS, ETC.&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;#3&quot;&gt;3 CYBER HARASSMENT AS SCIENTIFIC SUPPRESSION VERSUS &quot;HERESY&quot;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;#4&quot;&gt;4 FOREGROUNDING THE VICTIM’S PERSPECTIVE&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;#5&quot;&gt;5 ACADEMIC CYBERMOBBING, SEPARATE FROM AN ACADEMIC MOB&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;#6&quot;&gt;6 GUARDIANS AGAINST VICTIMS OF ACADEMIC CYBERBULLYING&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;#7&quot;&gt;7 ACADEMIC BULLIES MAY TARGET OUTSIDERS FROM ANYWHERE&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;#8&quot;&gt;8 A COMPLEX FORM FOR AN EXTREME CASE&lt;/a&gt;&lt;/div&gt; 
  &lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span id=&quot;1&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;1&amp;nbsp; NEW FORMS OF POWER IMBALANCE&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;a&gt;
&lt;/a&gt;Conventional definitions of cyber-bullying suggest a power imbalance in which one aggressor is more powerful than his or her victim (&lt;a href=&quot;https://www.publications.aap.org/pediatrics/article-split/140/Supplement_2/S148/34183/Defining-Cyberbullying&quot; target=&quot;_blank&quot;&gt;Englander, Donnerstein, Kowalski, Lin, &amp;amp; Parti, 2017&lt;/a&gt;). By contrast, an established academic may be easily be targeted by individuals of varied statuses; who can mount frequent attacks as part of cybermobs. OAB differs from the conventional definition of cyberbullying in that there need not be a one-to-one power-imbalance in favour of the bully. It can include varied power relationships between a victim and his or her attackers: a standard power-imbalance may exist in the victim being on a lower rung of an academic cultural hierarchy within a particular field than the bullies (e.g. Cardiology has greater prestige than Sports Medicine in the medical field). However, a senior scholar may still be the subject of collegial mobbing (&lt;a href=&quot;https://www.mobbing-usa.com/&quot; target=&quot;_blank&quot;&gt;Davenport, Elliot and Schwartz, 1999&lt;/a&gt;). For example, the Emeritus Professor was attacked online by junior academics and non-scholars, from within his field and from other disciplines (see Figure 1 for his university).&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhg_mHaX2cCt15I-eJcf__TFzv0gdGAEeGYmA7jBmJW5moBOVGEt0uYbTh6N7F8xfPw0g_OoE8SxMoykUKhwkbZCR9fqkOQjjI9KDTxdQ32cRT1r6o6XABn2z1ebCkZ59_mmfXgBEdMhSwt7tbAahQmwdZzQVPcvOfKW3RoDMe1X35z8ZWnL55d5bdRbA&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Faculties and departments in which employees persistently criticized the Emeritus Professor on social media&quot; data-original-height=&quot;492&quot; data-original-width=&quot;294&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhg_mHaX2cCt15I-eJcf__TFzv0gdGAEeGYmA7jBmJW5moBOVGEt0uYbTh6N7F8xfPw0g_OoE8SxMoykUKhwkbZCR9fqkOQjjI9KDTxdQ32cRT1r6o6XABn2z1ebCkZ59_mmfXgBEdMhSwt7tbAahQmwdZzQVPcvOfKW3RoDMe1X35z8ZWnL55d5bdRbA=w239-h400&quot; title=&quot;Figure 1. Faculties and departments in which employees persistently criticized the Emeritus Professor on social media (Travis Noakes, 2020)&quot; width=&quot;239&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 1. Faculties and departments in which employees persistently criticised the Emeritus Professor on social media (Travis Noakes, 2020)&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Attacking a scientific dissident as a pre-defined target seemed to provide attackers with an instant form of credibility- they did not have to prove their symbolic credentials to gain visibility. Few of the professor&#39;s blogging critics were Health Science scholars. Despite making no scholarly contribution to the debate, some academic cyberbullies seemed to achieve visibility as opinion &quot;leaders&quot; online. This shows how micro-celebrity hijacking can apply for Higher Education (HE) employees. Academic bloggers criticise public intellectuals for &quot;wrongthink&quot; thereby gaining attentional capital- blogged critiques by &quot;independent&quot; critical thinkers can convert into appearances on broadcast media.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;a&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
Power imbalances may also result from other differences in a victim’s status versus his or her attackers. These can span inequalities in capital (&lt;a href=&quot;https://home.iitk.ac.in/~amman/soc748/bourdieu_forms_of_capital.pdf&quot; target=&quot;_blank&quot;&gt;Bourdieu, 1986&lt;/a&gt;), notably social and cultural capital- a scholar who defends an unorthodox position is at a disadvantage in terms of her social capital. She will struggle to draw support against unfair criticism by organic groups of academic cyberbullies.&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 107%; text-align: justify;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt; &lt;br /&gt; Another dimension of power imbalance may lie in technical cultural capital- an OAB recipient who has less knowledge of the digital platform(s) on which she is being attacked may be at a serious disadvantage. For example, cyberbullies can use advantages in their ‘digital dimensions’ (&lt;a href=&quot;https://journals.sagepub.com/doi/pdf/10.1177/0038040712456556&quot; target=&quot;_blank&quot;&gt;Paino &amp;amp; Renzulli, 2013&lt;/a&gt;) of cultural capital for gaining greater visibility. They can leverage a myriad of online presences for amplifying their attacks, whilst leveraging multiple chains of digital publication that are difficult for a victim to reply to.&lt;br /&gt;&lt;br /&gt;This suggests another imbalance whereby OAB recipients will struggle to defend themselves against asymmetrical cyber-critiques.  It may be exhausting to respond to frequent criticisms, across a myriad of digital platforms and conflicting timezones.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;h4&gt;&lt;span id=&quot;2&quot; style=&quot;font-family: inherit; font-weight: normal; text-align: left; text-indent: -18pt;&quot;&gt;
    2&amp;nbsp; BEYOND TROLLS: ACADEMIC CYBERBULLIES AS DECEIVERS, FLAMERS, ETC.&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span style=&quot;font-family: inherit; font-weight: normal; text-align: left; text-indent: -18pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;Definitions of cyberbullying are in themselves broad, since
they may also cover electronic bullying and internet harassment &lt;w:sdt docpart=&quot;86A2DB4154ECFA4CBD6AF6351AA4FBDE&quot; id=&quot;1350606376&quot; osflinked=&quot;t&quot; sdttag=&quot;doc:5d5e4aaae4b0f8e115d421b1;body&quot;&gt;(&lt;a href=&quot;http://rzukausk.home.mruni.eu/wp-content/uploads/Cyberbullying-assessment-instruments-A-systematic-review.pdf&quot; target=&quot;_blank&quot;&gt;Berne et al., 2013&lt;/a&gt;)&lt;/w:sdt&gt;. &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Likewise, classifications for academic cyberbullies’ roles and behaviours must be wide-ranging to address how bullies can readily draw on many repertoires for anti-social communication. A&lt;span lang=&quot;EN-US&quot;&gt;&amp;nbsp;highly agentive cyberbully could draw on practices that meet several characteristics- the mocking &quot;jokes&quot; of a&amp;nbsp;&lt;/span&gt;malevolent troll&lt;span lang=&quot;EN-US&quot;&gt;, the&amp;nbsp;&lt;/span&gt;swearing attacks of a &#39;flamer&#39; and&amp;nbsp;a &#39;deceiver&#39;&#39;s&amp;nbsp; misrepresentations in their self-presentation (e.g. a self-proclaimed &quot;philosophe(r)&quot;/&quot;scholar&quot; without a PhD).&amp;nbsp;&lt;span lang=&quot;EN-US&quot;&gt;We chose not make &lt;/span&gt;sharp distinctions between an academic bully’s and
other online deviants&#39; roles and behaviours, since this could actually include areas that strongly overlap.&amp;nbsp;&lt;span style=&quot;text-align: start;&quot;&gt;At the same time, we were mindful that defining OAB as a particular form of harassment by HE employees was important to ensure OAB does not become a catchall. There is a danger that definitions of harassment that are generalised can be misused in bad faith to apply to mere criticisms or mildly unpleasant language (&lt;a href=&quot;https://cdn.vox-cdn.com/uploads/chorus_asset/file/12599893/The_Internet_of_Garbage.0.pdf&quot; target=&quot;_blank&quot;&gt;Jeong, 2018&lt;/a&gt;).&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;A flexible OAB framework for academic cyberbullies also had to be future-proof in accommodating new methods. While there are many characteristic behaviours that mark cyberbullying, the denigration of a scholar’s symbolic capital via scholarly publications that tie-in with weaponised micro-celebrity is another unique layer that other forms of cyberbullying lack. Weaponised micro-celebrity considers how highly prolific micro-celebrities, whose content has the potential to polarise public opinion, are hijacked for attention by traditional media through disproportionate and sensationalist coverage. Their viral persona, fame and content becomes reappropriated as place-holders for various causes by broadcast media (&lt;a href=&quot;https://www.emerald.com/insight/publication/doi/10.1108/9781787560765&quot; target=&quot;_blank&quot;&gt;Abidin and Brown, 2018&lt;/a&gt;). This resonates with the examples of unscrupulous advertisers who illegally use micro-celebrities&#39; profiles and made-up quotes in fake campaigns that market non-existent products.&amp;nbsp;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif; text-align: start;&quot;&gt;Such&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif; text-align: start;&quot;&gt;&amp;nbsp;as the Emeritus Professor&#39;s image and name being hijacked to market&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif; text-align: start;&quot;&gt;&quot;&lt;/span&gt;&lt;span style=&quot;font-family: Times New Roman, serif; text-align: start;&quot;&gt;products&quot; by&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif; text-align: start;&quot;&gt;&amp;nbsp;&quot;Keto Extreme&quot;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif; text-align: start;&quot;&gt;&amp;nbsp;(2022) and &quot;&lt;/span&gt;&lt;span style=&quot;font-family: Times New Roman, serif; text-align: start;&quot;&gt;Ketovatru”&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif; text-align: start;&quot;&gt;(2021) &lt;/span&gt;&lt;span style=&quot;font-family: Times New Roman, serif; text-align: start;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif; text-align: start;&quot;&gt;(&lt;/span&gt;&lt;a href=&quot;https://thenoakesfoundation.org/news/keto-extreme-scams-social-media-users-out-of-thousands&quot; style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif; text-align: start;&quot; target=&quot;_blank&quot;&gt;The Noakes Foundation, 2022&lt;/a&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif; text-align: start;&quot;&gt;).&lt;/span&gt;&lt;div&gt;&lt;div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span&gt;
&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span id=&quot;3&quot; style=&quot;font-weight: normal;&quot;&gt;
    3&amp;nbsp; SCIENTIFIC SUPPRESSION VERSUS BIO-MEDICAL HERESY &quot;JUSTIFIES&quot; HARASSMENT&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;Another conceptual challenge lay in framing how academic cyberbullies&#39; hyper-agentive practices could potentially threaten academic free speech and scientific innovation. Both are threatened where a powerful grouping lays claim to a monopoly on scientific truth. It will follow a win-or-lose competitive approach in defending its belief system as the dominant set of ideas (&lt;a href=&quot;https://www.sciencedirect.com/science/article/abs/pii/S0277953603002235&quot; target=&quot;_blank&quot;&gt;Martin, 2004&lt;/a&gt;). The term ‘heresy’ remains useful for describing ideological challenges that threaten the values of a dominant orthodoxy, such as biomedicine. In the Emeritus Professor&#39;s case, the supporters of the dominant “cholesterol” model of chronic disease development (CMCDD) can view a rival scientific model, such as the Insulin Resistance Model of Chronic Ill Health (IRMCIH) paradigm, as a heretical field. The beliefs of health experts who promote IRMCIH are viewed as heretical because they threaten the current health care model for the treatment of many chronic diseases. Dissidents question past research findings and the resulting interventions prescribed for treating most patients with chronic diseases.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;When a challenger to orthodoxy begins to attract attention from patients, the general public and the press, then those in power will take active steps to protect the reigning paradigms (&lt;a href=&quot;https://www.sciencedirect.com/science/article/abs/pii/S0277953603002235&quot; target=&quot;_blank&quot;&gt;Martin, 2004&lt;/a&gt;). Adherents to the dominant ideology will view such individuals&#39; questioning of the central values of their CMCDD orthodoxy as performing heresy. Heresy is created by the response of the orthodoxy when its views&#39; delineate attacks as beyond the pale (&lt;a href=&quot;https://www.sciencedirect.com/science/article/abs/pii/0277953694903468&quot; target=&quot;_blank&quot;&gt;Wolpe, 1994&lt;/a&gt;). Defenders of CMCDD might justify their harassment in believing that only high carbohydrate/low fat diets are “healthy”. Followers of this belief have argued that pursuing any other ideas or approaches constitute a &quot;threat to public health&quot;. Following this rationale, such critics may argue for censorship of dissidents&#39; &quot;dangerous&quot; work and to limit digital publics&#39; exposure to state-of-the-art IRMCIH science news.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;In highly-polarised debates, HE employees can develop social capital for themselves, and &#39;negative social capital&#39; for opponents, by using digital platforms to confront heretics, apostates, rebels and dissenters. Negative social capital (&lt;a href=&quot;https://link.springer.com/article/10.1007/BF02496932&quot; target=&quot;_blank&quot;&gt;Wacquant, 1998&lt;/a&gt;) is the engineered dislike and distrust of a person or group by other people and groups. This capital is the antithesis of social capital as it results in its wilful destruction. The examples of cyberbullies creates a chilling effect whereby witnesses of harassment will be reluctant to engage with the proponents of heresy. Their future vocational trajectories may be at risk when grouped with heretical &quot;outsiders&quot;.&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoT0TNYbmXw9bnfyTBgmiKxS1RO--76GxBTzXglrbrnfJQMvF_AnvbRSb6BwFXpNsAsLshaToM5ZqEAOaZD3YEhI-N157gLUBj50T5Wb6tpxsiaCxF56PKHYhdu4Wj8pZd4ph0gkZzrZsu909OqV9i_NcXwRAk1L_i4_KunYNKGt4sB7DtxK_JPk6ncg/s512/25_enjoys_attacking_superiors.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;troll enjoys attacking superiors&quot; border=&quot;0&quot; data-original-height=&quot;512&quot; data-original-width=&quot;512&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoT0TNYbmXw9bnfyTBgmiKxS1RO--76GxBTzXglrbrnfJQMvF_AnvbRSb6BwFXpNsAsLshaToM5ZqEAOaZD3YEhI-N157gLUBj50T5Wb6tpxsiaCxF56PKHYhdu4Wj8pZd4ph0gkZzrZsu909OqV9i_NcXwRAk1L_i4_KunYNKGt4sB7DtxK_JPk6ncg/w320-h320/25_enjoys_attacking_superiors.png&quot; title=&quot;troll enjoys attacking superiors&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;Defenders of the status-quo enjoy visibility as part of dominant networks and can readily spotlight “heretics” for criticism via formal and informal channels, such as social media. Recipients must negotiate rapidly-spreading disinformation, defamation, misrepresentation-of-argument and even character assassination  HE employees involved in such adverse actions typically explain their actions as being justified in maintaining &#39;academic standards&#39;&#39; (&lt;a href=&quot;https://bmartin-41667.medium.com/what-ive-learned-about-suppression-of-dissent-3a3836fc6053&quot; target=&quot;_blank&quot;&gt;Martin, 2020&lt;/a&gt;). However, such actions are detrimental in silencing dissenters&#39; and whistleblowers&#39; free speech, thereby stifling scientific debate and potential innovations.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif; margin: 0cm; text-align: justify;&quot;&gt;
    
&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span id=&quot;4&quot; style=&quot;font-weight: normal;&quot;&gt;    
    4&amp;nbsp; FOREGROUNDING THE VICTIM’S PERSPECTIVE&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;p class=&quot;Normal&quot; style=&quot;font-family: Constantia, serif; font-size: 11pt; margin: 0cm 0cm 0cm 2.05pt; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;/div&gt;The perspective of the victim is frequently neglected in research into online hostility (&lt;a href=&quot;https://link.springer.com/article/10.1007/s10676-015-9362-0&quot; target=&quot;_blank&quot;&gt;Jane, 2015&lt;/a&gt;). Our initial drafts of the manuscript focused on different styles of attack from academic cyberbullies. Subsequent drafts shifted to developing a unique, decade-long, pilot study for a cyberbullying recipient&#39;s case. We hoped his experiences of novel forms of OAB harassment might resonate with other recipients. Since we could not find any similar lengthy example of a scholar&#39;s online victimisation, we trusted his case would be informative for cyberbullying researchers, plus anti-bullying policy decision makers in HE.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;5&amp;nbsp; ACADEMIC CYBERMOBBING- SEPARATE FROM AN ACADEMIC MOB&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;The Emeritus Professor&#39;s case study was closely linked to a formal mobbing at his former academic institutional employer. In the initial manuscript, we foregrounded this strong overlap:&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;His employer&#39;s&amp;nbsp;&lt;/span&gt;neglect of rules and policies against harassment by its employees provides a fertile space for harassment (&lt;a href=&quot;https://books.google.co.za/books/about/The_Fall_of_the_University_of_Cape_Town&quot; target=&quot;_blank&quot;&gt;Benatar, 2021&lt;/a&gt;). Senior&lt;span lang=&quot;EN-GB&quot; style=&quot;font-family: Times New Roman, serif;&quot;&gt;&amp;nbsp;leaders followed a &lt;a href=&quot;https://www.travisnoakes.co.za/2020/06/&quot; target=&quot;_blank&quot;&gt;dominating conflict culture (DCC)&lt;/a&gt; approach&amp;nbsp;(&lt;a href=&quot;https://www.taylorfrancis.com/chapters/edit/10.4324/9781315148113-10/theory-bullying-conflict-cultures-nathalie-desrayaud-fran-dickson-lynne-webb&quot; target=&quot;_blank&quot;&gt;Desrayaud et al., 2018&lt;/a&gt;) in&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;protecting the Faculty of Health Science&#39;s (FHS) CMCDD orthodoxy from criticism&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;. Although DCC actively encourages discourse about incompatible goals and ideas, DCC does not acknowledge the validity of opposing views. In a toxic DCC workplace, dissent is ignored and support for dissenters is withheld. Explicit bullying is seen as an acceptable response to intellectual differences and overt mobbing is also condoned. In this respect, attacks on the Emeritus Professor were similar to the bullying of other senior scholars that university leadership clearly tolerated (&lt;a href=&quot;https://www.politicsweb.co.za/opinion/ucts-climate-turns-toxic&quot; target=&quot;_blank&quot;&gt;Benatar, 2017&lt;/a&gt;; &lt;a href=&quot;http://www.theconmag.co.za/2015/03/25/the-day-of-the-jekyll/&quot; target=&quot;_blank&quot;&gt;Coovadia, 2015&lt;/a&gt;; &lt;a href=&quot;http://timguineacrowe.blogspot.com/2017/10/wasis-uct-institutionally.html&quot; target=&quot;_blank&quot;&gt;Crowe, 2017&lt;/a&gt;; &lt;a href=&quot;https://rationalstandard.com/the-academic-mob-strikes-back-how-to-get-away-with-murder-at-uct-pt-2/&quot; target=&quot;_blank&quot;&gt;Crowe, 2019&lt;/a&gt;; &lt;a href=&quot;https://www.news24.com/news24/southafrica/news/uct-prof-at-centre-of-race-storm-hits-back-accuses-varsity-of-hatchet-job-response-20200606&quot; target=&quot;_blank&quot;&gt;McCain, 2020&lt;/a&gt;; &lt;a href=&quot;https://martinplaut.com/2020/06/22/the-bitter-debate-about-academic-freedom-at-the-university-of-cape-town/&quot; target=&quot;_blank&quot;&gt;Plaut, 2020;&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;https://www.iol.co.za/capetimes/opinion/uct-stands-devoted-to-debate-1844882&quot; target=&quot;_blank&quot;&gt;Soudien, 2015&lt;/a&gt;; &lt;a href=&quot;https://www.samedical.org/files/cape_doctor/CAPE_DOCTOR_VOL_52.pdf&quot; target=&quot;_blank&quot;&gt;Steer, 2019&lt;/a&gt;; &lt;a href=&quot;https://vernacnews.co.za/2019/05/15/a-collective-of-concerned-law-students-speak-out-against-unpalatable-legacy-of-racism-and-alienation-of-students-at-uct-law-faculty-a-call-for-change-read-full-statement-below/&quot; target=&quot;_blank&quot;&gt;Vernac News, 2019&lt;/a&gt;). In 2019, his employer&#39;s institution acknowledged that bullying was a major concern amongst staff (&lt;a href=&quot;https://www.news.uct.ac.za/article/-2019-09-19-update-and-next-steps-on-the-inclusivity-survey&quot; target=&quot;_blank&quot;&gt;Feris, 2019&lt;/a&gt;), but has yet to recognise the importance of addressing DCC in its FHS. One positive recent development is that an anti-bullying policy was passed (&lt;a href=&quot;https://www.hr.uct.ac.za/hr/employee_relations/bullying_policy&quot; target=&quot;_blank&quot;&gt;2021&lt;/a&gt;). Albeit, a very late response to its former Ombudsman&#39;s recommendation from 2012 (&lt;a href=&quot;http://webcms.uct.ac.za/sites/default/files/image_tool/images/29/annual_report/UCT%20Ombud%20report%202019%2009072020.pdf&quot; target=&quot;_blank&quot;&gt;Makamandela-Mguqulwa, 2020&lt;/a&gt;).&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;In university workplaces, bullies can use a justification of “academic freedom” to condone actions that would be unacceptable in other workplaces (&lt;a href=&quot;https://www.taylorfrancis.com/chapters/edit/10.4324/9781315189406-18/faculty-members-bullies-jon-driver&quot; target=&quot;_blank&quot;&gt;Driver, 2018&lt;/a&gt;). For example, an academic lecturer (who is neither a scholar nor a scientist) published thirty blog posts that criticised the Emeritus Professor&#39;s popularisation of LCHF science. Although by no means an academic peer, this junior lecturer might justify such fervent criticism of a fellow employee at the same university as a necessary part of academic freedom in an institute of higher learning. Nevertheless, such obsessive behaviour from a low-ranking, under-qualified employee seems unlikely to be acceptable at any other place of employment.&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6u8-UgO-Ak3Q-te_8qfjyJVxiIF3mcMp9all8EJzTTNTpu-7vxGZvYXP75RfBiNaVDbxb6EPKWzeyQ2LIugEqMuL90ofxbOVkOQEwONmLuEfRXMkyOW_hSEJ8kEm51oYhWk3cvtufhnDUGHSAIyuXEuyOV7XlXIcqQ_Pi-KeSjVUGdKqLdvGlm1rTpg/s512/40_failblog_troll.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;academic failblog troll&quot; border=&quot;0&quot; data-original-height=&quot;512&quot; data-original-width=&quot;512&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6u8-UgO-Ak3Q-te_8qfjyJVxiIF3mcMp9all8EJzTTNTpu-7vxGZvYXP75RfBiNaVDbxb6EPKWzeyQ2LIugEqMuL90ofxbOVkOQEwONmLuEfRXMkyOW_hSEJ8kEm51oYhWk3cvtufhnDUGHSAIyuXEuyOV7XlXIcqQ_Pi-KeSjVUGdKqLdvGlm1rTpg/w320-h320/40_failblog_troll.png&quot; title=&quot;academic failblog troll&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;&lt;div&gt;&lt;span style=&quot;font-family: Times New Roman, serif;&quot;&gt;In collating the varied forms of harassment from &quot;academic colleagues&quot;, it was unsurprising that we initially considered a recipient&#39;s OAB as being inseparable&amp;nbsp;from an experience of academic mobbing&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&amp;nbsp;in the HE context. However, the manuscript&#39;s r&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;eviewers flagged that it could be separate- especially for&amp;nbsp; targets outside HE. In response, we designed the OABRAT framework to accommodate a&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&amp;nbsp;separate phenomenon.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Such separation also addressed concerns that the private, departmental ostracisation of ‘academic mobbing’ in HE (&lt;a href=&quot;https://www.universityaffairs.ca/opinion/in-my-opinion/academic-mobbing-become-campus-tormentors/&quot; target=&quot;_blank&quot;&gt;Seguin, 2016&lt;/a&gt;. &lt;a href=&quot;https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4170397/&quot; target=&quot;_blank&quot;&gt;Khoo, 2010&lt;/a&gt;) is a&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;very different&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&amp;nbsp;negative phenomenon from the public attacks that academic cyberbullies launch. Unlike the largely concealed backstabbing of an academic mob,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;academic cyberbullies criticisms are&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;public. OAB recipients can readily spot&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;critics and their networks in digital criticisms, such as group petitions.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Like others &lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;cybermobbers, public&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&amp;nbsp;attacks fall&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&amp;nbsp;within&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;a spectrum that can include: i. drive-by harassment, ii. low-level mobbing, iii. sustained hounding and iv. sustained orchestration (&lt;a href=&quot;https://cdn.vox-cdn.com/uploads/chorus_asset/file/12599893/The_Internet_of_Garbage.0.pdf&quot; target=&quot;_blank&quot;&gt;Jeong, 2018&lt;/a&gt;). Professor Noakes and I are working on&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;a manuscript that explores this spectrum for defining an&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;‘academic cybermobbing’&#39;s particular&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;characteristics.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit; font-weight: normal;&quot;&gt;6&amp;nbsp; GUARDIANS AGAINST VICTIMS OF ACADEMIC BULLYING&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span style=&quot;font-family: inherit; font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;In addition to considering academic cyberbullies practices and their&amp;nbsp;recipients experiences, it is also vital to address the role of guardians.&amp;nbsp;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: inherit;&quot;&gt;RAT supports addressing the activities of both the targets of crime, plus their&amp;nbsp;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: inherit;&quot;&gt;guardians. In academic cyberbullying, it is important to consider how the online activities of a victim could be placing him or her at added risk. It is also worthwhile considering how the lack of action from guardians of civility, whether they be at the scholar’s academic institution or moderators for social media platforms, has an impact.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Prevention would seem better than cure for the negative phenomenon of&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;persistent cyber harassment. In OAB, this emerges when a&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;large quantum of criticism from academic cyberbullies creates an easily searchable footprint.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Policies protecting employees at HE institutes from workplace persecution have largely focused on sexual and racial harassment. The danger exists that other forms of persecution may be neglected as seeming relatively unimportant by comparison (&lt;a href=&quot;https://www.hup.harvard.edu/catalog.php?isbn=9780674659902&quot; target=&quot;_blank&quot;&gt;Citron, 2007&lt;/a&gt;). For example, aggressive behaviours in the workplace may be considered acceptable by default (&lt;a href=&quot;https://psycnet.apa.org/record/2006-03272-007&quot; target=&quot;_blank&quot;&gt;Rayner, Hoel, &amp;amp; Cooper, 2002&lt;/a&gt;).&amp;nbsp;&lt;span style=&quot;font-family: inherit;&quot;&gt;Informal expectations and norms can increase the sense of a lack of accountability online and boost the likelihood of deviant behaviours. Without deterrents or any consequences for academic cyberbullying, bullies may believe that they will not be held accountable for their actions. Worse, hegemonic leadership may actually&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;reward those whose cyberbullying seems to maintain perceptions&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;of consensus.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In HE, such rewards are unethical in undermining academic free speech, scientific innovation and motivating academic cyberbullying.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiayfIOCe0PWIFH1R11WuSXZjeVoJenl-QxdMddRqaV02Bjq7bR_tOou5lsm64lMqSOkykE7U42tMPm5vOXw77Yu-HgTi5PlG3scEPjyOX4KFC5zCWGr64UF0GJe2nV3Kp70S5M8WWMYURBfR2Ns7R_zcTlEy4MOKk7UBXsH8-QLTqEqjlL3PbZGVyACQ/s512/38_academic_white_knight.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;fake academic white knight troll&quot; border=&quot;0&quot; data-original-height=&quot;512&quot; data-original-width=&quot;512&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiayfIOCe0PWIFH1R11WuSXZjeVoJenl-QxdMddRqaV02Bjq7bR_tOou5lsm64lMqSOkykE7U42tMPm5vOXw77Yu-HgTi5PlG3scEPjyOX4KFC5zCWGr64UF0GJe2nV3Kp70S5M8WWMYURBfR2Ns7R_zcTlEy4MOKk7UBXsH8-QLTqEqjlL3PbZGVyACQ/w320-h320/38_academic_white_knight.png&quot; title=&quot;fake academic white knight troll&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;Dubious research and related fake news may be amplified online with impunity where university employers are unwilling to confront their source(s) and defend their scholarly recipients. Even where HE leaders uncover such falsehoods, they may have little enthusiasm for organising retraction or the censure of those who create and spread them. A&amp;nbsp;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;HE&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&amp;nbsp;l&lt;/span&gt;eadership that models being&amp;nbsp;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;bystanders in the face of&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&amp;nbsp;cyber harassment from its own&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&amp;nbsp;employees, would be hypocritical to expect staff to respond as&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;upstanders against OAB.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span id=&quot;3&quot; style=&quot;font-weight: normal;&quot;&gt;
    7&amp;nbsp; ACADEMIC BULLIES MAY TARGET OUTSIDERS FROM ANYWHERE&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;In conceptualising OAB, we came to argue that the victims of academic cyberbullies need not be&amp;nbsp;HE employees. Feedback from IRMCIH proponents in varied health professions, plus LCHF entrepreneurs, confirmed attacks from cyberbullies in HE. While our literature review produced many examples of dissenting scientists and academic whistleblowers being confronted academic mobs, there is a gap concerning cases for bullying victims outside HE. This is another area that &lt;a href=&quot;https://thenoakesfoundation.org/portfolio-items/online-academic-bullying&quot;&gt;The Noakes Foundation&#39;s Academic Free Speech and Digital Voices&lt;/a&gt; (AFSDV) project can address for the IRMCIH scientific issue arena.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjL0tjnABUySa53dATBrK5ziW7gclI0lVOEVvGysgpw4RZFJkZGaBgrvc-q2FBkcvL_YDuCVjImgDRDu53wLrQyiedvL58NnyJXHyJ-IeHnbT4IKZXnvsgqJEnDu4Q2-OQryUjwDCgENVJ_aOXpDdgxpuXPrTRD2Qn9Oypt7mZlsoGoDOJ0nGoB9DY7A/s512/39_line_crosser.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;academic troll line crosser&quot; border=&quot;0&quot; data-original-height=&quot;512&quot; data-original-width=&quot;512&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjL0tjnABUySa53dATBrK5ziW7gclI0lVOEVvGysgpw4RZFJkZGaBgrvc-q2FBkcvL_YDuCVjImgDRDu53wLrQyiedvL58NnyJXHyJ-IeHnbT4IKZXnvsgqJEnDu4Q2-OQryUjwDCgENVJ_aOXpDdgxpuXPrTRD2Qn9Oypt7mZlsoGoDOJ0nGoB9DY7A/w320-h320/39_line_crosser.png&quot; title=&quot;academic troll line crosser&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;After Professor Noakes and I submitted the article for publication, we identified another concern to explore under the AFSDV theme:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit; font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span id=&quot;8&quot; style=&quot;font-weight: normal;&quot;&gt;
    8&amp;nbsp; A COMPLEX FORM FOR AN EXTREME CASE&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span style=&quot;font-family: inherit; font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;Our article shared a reporting instrument for OAB recipients. We hoped that targets of academic cyberbullies could use the Google form at &lt;a href=&quot;https://bit.ly/3pnyE6w&quot; target=&quot;_blank&quot;&gt;https://bit.ly/3pnyE6w&lt;/a&gt; for developing reports on their experiences of cyber harassment. However, based on some OAB recipients&#39; feedback, we must prepare a simplified version of the form. The questionnaire speaks to all aspects of cyber harassment the Emeritus Professor&amp;nbsp;experienced by over a ten year period. So while his outlier experience informed the development of a comprehensive and wide-ranging questionnaire, there is considerable scope to shorten it and simplify its questions via new &lt;a href=&quot;https://www.researchgate.net/project/Academic-Free-Speech-and-Digital-Voices-AFSDV&quot; target=&quot;_blank&quot;&gt;AFSDV research&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;GRAPHIC CREDITS&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://createwith.net/academic.html&quot;&gt;Stop, academic bully!&lt;/a&gt; shushmoji™ graphics courtesy of &lt;a href=&quot;https://createwith.net/&quot;&gt;Create With&lt;/a&gt;&amp;nbsp;Cape Town.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;All posts and comments published to www.travisnoakes.co.za are licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License at https://creativecommons.org/licenses/by-nc-sa/4.0/.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://www.travisnoakes.co.za/feeds/2965669113128268771/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.travisnoakes.co.za/2022/04/conceptual-challenges-in-developing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/2965669113128268771'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2127517647835977939/posts/default/2965669113128268771'/><link rel='alternate' type='text/html' href='http://www.travisnoakes.co.za/2022/04/conceptual-challenges-in-developing.html' title='Eight conceptual challenges in developing the &#39;online academic bullying&#39; framework'/><author><name>Travis Noakes</name><uri>http://www.blogger.com/profile/12001873863913970420</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwhJtcsjyPqZCsG4G3itB49gDZmm6jmZG9QdMM4VjxaDi60DYdAuCXieFyHSkbvBsDwZB6holWz7zNXCNtbl_tzl-gczaIOruD9oDzKdnfom1rhk5VhZ8ywqckwdHpFpuonbag4cKW1W7KQ2oXVbF5zL5Juy19eeSlKxLlPZV-aMTksRiaPxS5WR5alA/s72-w320-h320-c/26_enjoys_attacking_academic_leaders.png" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Cape Town, South Africa</georss:featurename><georss:point>-33.9248685 18.4240553</georss:point><georss:box>-62.235102336178848 -16.7321947 -5.6146346638211568 53.5803053</georss:box></entry></feed>