Tag Archives: offense

Schools & Courts: you need to accept historical transcription online projects as community service

Projects abound where online volunteers transcribe scanned documents for universities, nonprofits and government archives. By doing this, the documents become more searchable for researchers and more accessible to everyone. Through these programs, online volunteers are helping to amplify and preserve the stories of escaped enslaved people, the thoughts of and to people like Abraham Lincoln, Theodore Roosevelt, people who attended political meetings held at the state and national levels in the 1800s to free enslaved people or gain women the vote, and on and on. It can be a surprisingly intimate experience for the volunteer, one that benefits many thousands of people for years – for generations – to come.

I’ve done this myself as an online volunteer, and it was quite an emotional experience for me, transcribing newspaper ads seeking people who had escaped enslavement in the 1800s in the USA, part of the Freedom on the Move (FOTM) project. I have a list of every online transcription project for online volunteers that I know about at this resource on finding virtual volunteering roles and activities.

These historical transcription projects are wonderful virtual volunteering experiences, but most schools and courts will not accept this volunteering for required community service because they have a piece of paper that must be signed by someone from the project affirming that the volunteer did the service.

YA’LL NEED TO CHANGE.

These historical transcription projects are PERFECT for both students seeking community service hours required for graduation and for people who are ordered by the courts to do so.

Using suggestions already in The Last Virtual Volunteering Guidebook: Fully Integrating Online Service Into Volunteer Involvement and a previous blog on supervising online volunteers in court-ordered settings as guidance, here’s how high schools and courts could verify community service hours via online historical transcription projects:

  • Require the volunteer to keep track of service hours on a Google Doc spreadsheet that that person gives you access to for viewing, so you can check-in at any time to see if they have updated it. It should have the name of the project or organization, a web address for more info, the date and time of volunteering service provided by the volunteer, the hours or minutes spent, and a summary of what the volunteer did (“transcribed a letter by George Washington to Alexander Hamilton from June 1775.”). Check into that spreadsheet weekly or every other week to see if it’s been updated.
  • Require that the volunteer take a photo on their smartphone every time they start transcribing a new document and every time they finish, and that they upload this photo to a private Flickr account album (Flickr is free), one that only the user (the volunteer) and you can see. You can spot check the time and date stamps on photos to see if the data corresponds to the aforementioned spreadsheet data (just spot check – you don’t have to do them all).
  • Require the volunteer take a screenshot of each document they are going to transcribe, and each transcription they complete, and to upload these screenshots to the aforementioned Flickr account album. This provides more documentation for confirming if a person did the assignment.
  • Require the volunteer take a selfie of himself or herself at the computer, about to do the work and then again at the completion, and upload these screenshots to the aforementioned Flickr account private album that only you and that volunteer can see. This provides more documentation for confirming if a person did the assignment.

Give the volunteer one to two hours of credit for service hours JUST for setting up and maintaining the Google Doc and the Flickr account correctly.

Could a volunteer fake all this? Yes, and it would take that volunteer about as many hours to create the fake documents, screenshots and summaries as it would for them to do the ACTUAL volunteering and record-keeping – meaning they would still have had to do all this time to fulfill community service hours, even if they didn’t end up doing what they said they were doing.

Could someone else do all of this service for the person? Yes: a parent, a sibling, a friend, or someone the person pays could do all of this. And this happens in onsite, in-person volunteering. People also frequently show up to volunteer at a beach clean up as community service, sign in, go sit in their cars and smoke or listen to music, then come back at the end and get their paperwork signed off that they did the hours. It’s the chance every program takes in not supervising people doing community service every moment. While Lindsay Lohan probably had her assistance do her online court-ordered community service, I don’t think most people do.

Doesn’t this create a lot of followup by the assigning body? Yes. For schools, keeping track of this is a GREAT assignment for an online volunteer, or group of online volunteers. For courts: sorry, but you all have never done well in this department with onsite, face-to-face folks – I’ve seen the forged paperwork first-hand for nonprofits that don’t exist or for nonprofits that have never seen or heard of the person that supposedly did the service. Let this be your opportunity to up your game in terms of confirming court-ordered community service completion.

cover of Virtual Volunteering book with hands raising up various Internet connected devices

There’s also my book, co-written with Susan Ellis which goes into a great deal of detail on supervising and supporting online volunteers, and how to track their progress: The Last Virtual Volunteering Guidebook: Fully Integrating Online Service Into Volunteer Involvement. In this time of a global pandemic, as well as this time where every program should be looking at how to be more inclusive and accommodating for working parents, people with home care requirements (for children for parents, for other relatives, etc.), people with transportation issues and people with disabilities, every program that relates to people completing community service for a graduation requirement or a court requirement should read this book.

Here are all of my blogs about some aspect of court-ordered community service.

If you have benefited from this blog or other parts of my web site or my YouTube videos and would like to support the time that went into researching information, developing material, preparing articles, updating pages, etc. (I receive no funding for this work), here is how you can help

How to be active & anonymous online – a guide for women in religiously-conservative countries

In the world in which we all live, most people have to be online, regularly:

  • There is essential government and business information that can be accessed only online, or can be accessed most cheaply and easily online.
  • There is breaking news that can affect a person’s life or livelihood and, therefore, needs to be learned as close to real-time as possible – and that could happen only online.
  • There is information related to our work that is most quickly, easily accessed online.

And “online” includes using social media, such as Facebook and Twitter.

However, in many religiously-conservative communities around the world, women take a huge risk by being online, specifically in using social media. I explore this in a blog I wrote called virtue & reputation in the developing world. Because of threats to their reputation and safety, many women in religiously-conservative countries such as Afghanistan and Pakistan have given up on having a virtual identity at all – I personally know two such women, both professionals. This greatly hinders their ability to connect with potential colleagues abroad that could help them in their work, to build up a professional reputation beyond the walls of their office or beyond the staff of the organization, and to access information essential for their work and life.

There are some ways for women to develop an online profile on social media, including Facebook, that allows them to access essential information, to post information and to network with professionals in their field of expertise, but still protect identities online. Here are some guidelines:

Choose a first and last name you will use online only
These should be names that are different from your real names. However, also try to create a name that isn’t a real name for someone else. You can also use just an initial for your first name – one letter.

Create an email address for your anonymous profile
Gmail is a good choice. Use something that in no way involves your real name. Associate this with social media accounts, rather than your work or university email address.

Be vague online about your employer or university
On any social media site, such as Facebook, do not say the full, real name of your employer or the university where you currently attend. Identify yourself more vaguely, such as:

  • employee of an Afghan government ministry
  • assistant at a Egyptian dental office
  • nurse at a hospital in Kuwait
  • student at a university in Kabul

Be careful who you friend on Facebook.
Talk to people face-to-face that you trust and that know your real name if you want to friend them on Facebook, if you can, and tell them why it is so important that they keep your identity a secret if you link on social media. If you have an argument with that person, will he or she reveal your true identity online? You must friend only people who you can trust who know your real name, and those people need to understand that they must NOT tell others who you are online or make comments that would reveal who you are. When in doubt, don’t friend local people at all and just focus on international colleagues who fully understand your situation or do not know you offline at all.

Do not share photos of yourself where your face can be seen
You can share photos of yourself on social media where your identity cannot be determined. For instance, if you were standing with your back to the camera, and not wearing distinctive clothing. Or a photo of just your hands.

Do not share photos of family or friends
This could make it easier for people to figure out who you are.

Have a physical address that isn’t your home or workplace
Sometimes, to register on a particular web site, you must provide a physical address of either your home or work place. Pick a public place as the address you will use: a public library or a book store are good choices. Those places may end up getting paper mail addressed to your fake identity, and that’s okay: there is no way for this to be traced back to you and it won’t be mail you want. Never use your actual home, work place or university address for your anonymous profile.

Post status updates that do not indicate your identity
You can share memes and news stories (always verify them first and ensure they are true), write status updates about the weather, write your opinion of current affairs, or offer advice related to your country or your profession. But don’t write specifics, such as “I just attended a great class on the state of water and sanitation in Luxor”, as that’s too specific and could be used by someone who reads it to figure out who you are.

Be careful when commenting on the Facebook status updates of friends
If one of your colleagues posts a status update, and you comment that “I look forward to talking to you about this at the staff meeting on Monday at 4”, one of their other friends who is NOT your online friend may figure out who you are. Instead, you could say, “I look forward to talking to you about this soon.”

Never use this anonymous account from work
The risk is too great of someone seeing your screen, or your walking away from your desktop and someone using the “back” button to scroll through the screens you have visited and find that you forgot to log out of Facebook – they will be able to see your anonymous profile as a result.

Be careful about posting in online discussion groups
There are online discussion groups regarding topics related to your work. By all means, join such a forum and read the posts. But be careful about posting, including replying to others. When you post, you reveal your IP address. This will NOT reveal your name, your home address, your age, etc. But your IP address may reveal where you work IF you are accessing the group from your workplace’s Internet connection and if that connection is configured a certain way.

Practice denying your online activities
People are going to ask you if you are on Facebook or Twitter. Practice saying no. Also practice your response to someone who says, “Is so-and-so on Facebook really you?”

If someone you do not know starts messaging your fake account, be careful about engaging with them. If they are asking “Who are you?” or “Why did you say that?”, ignore them. If they are asking how you know a shared friend, ignore them. If they become insulting, block them. If they say they are a reporter and they saw your post somewhere and would like to interview you, ask them what newspaper or TV station they work for, ask for their full name, and then look up that organization online and call them and ask if that person works there. In other words, make absolutely sure it’s a REAL journalist that is asking you questions!

If anyone threatens you online, screen capture those messages and save them. If anyone threatens you online with physical harm in any way and you believe that person could figure out who you are, it may be best for you to block them and delete your account. Your safety is always paramount and you should do what you need to do to stay safe.

Why am I not recommending that a person contact the company that operates the platform or social media site to report harassment, or to contact local police department? That is certainly an option if you live in a country that has rule of law. However, if you live in a developing country or a country that has laws that censor Internet access, such reporting could actually put you in danger. Even so, hold on to your screen captures of threatening messages and share them with a person you trust if you feel they represent a real threat to you or your family.

Update April 16, 2019: The Kandahar field office of UN Assistance Mission in Afghanistan (UNAMA) hosted a discussion with 20 women representatives of civil society, local media, provincial council members, teachers and university students active on social media. The participants agreed that social media campaigns and platforms are important means of advocacy for women to play their role in peace process. Balancing the pros with the cons -such as risks of harassment from trolls and others- they created a closed social media group dedicated to empowering women. In southern Afghanistan, as in other parts of the country, women are largely left out of decision-making and peace processes. Gender-based violence is prevalent and women are not visible in many public domains because of family and other cultural restrictions. The limitations apply to social media as well with indicators showing that, despite the potential, very few women in the southern region are active in this sphere. See more via this UNAMA Facebook update.

Update February 5, 2021: Use a virtual private network (VPN), an encrypted internet connection that allows users to safely transmit sensitive data, preventing unauthorized user access. A VPN can hide your location – start the software and pick a different city than where you actually are, so that if anyone has sophisticated tech tools and skills, they CANNOT see what city or even what country you are really in. Here’s a decent article comparing VPNs. Put the software on your computer AND your smart phone!

Also see:

Orange Day: UNiTE to End Violence Against Women campaign

The United Nations Secretary-General’s UNiTE to End Violence against Women campaign, managed by UN Women, has proclaimed every 25th of the month as “Orange Day” – a day to take action to raise awareness and prevent violence against women and girls. Orange Day calls upon activists, governments and UN partners to mobilize people and highlight issues relevant to preventing and ending violence against women and girls, not only once a year, on 25 November (International Day for the Elimination of Violence against Women), but every month.

Orange Day 2017 action themes so far:

February: Violence Against Women and Girls and Women’s Economic Empowerment

March: Violence against Women and Girls with Disabilities

April: Violence against indigenous women and girls

May: Mobilizing resources to end violence against women and girls

June: Violence against women and girl refugees

July’s theme was Cyber violence against women. The official statement from UNiTe notes: “Although children have long been exposed to violence and exploitation, ICTs have changed the scale, form, impact and opportunity for the abuse of children everywhere. While both girls and boys are vulnerable to the different risks and harms related to the misuse of ICTs, girls have been disproportionately victimized in sexual abuse and exploitation through the production and distribution of child sexual abuse materials. In 2013, 81 per cent of child sexual abuse materials depicted girls. Girls are also particularly vulnerable to being groomed online for sexual encounters and sometimes exploited through live streaming of their sexual abuse. Many children are experiencing widespread victimization through online bullying, harassment, and intimidation, where girls are particularly targeted due to gender norms and power dynamics. Gender discrimination, lack of confidence, difficulty with language, poverty, and cultural factors can adversely affect girls and lead to their heightened vulnerability to these crimes and victimization.” SDG 5 of the Sustainable Development Goals (SDGs) is focused on Gender Equality, and places women’s access to technological empowerment as one of the core indicators for progress. “To achieve this goal, we must make sure that the internet will be a safe and more secure place that allows all women and girls to fulfill their potential as valued members of society and live a life free from violence.”

UNiTE has curated several resources related to such:

  • The Broadband Commission Working Group on Digital Gender Divide recently published a set of recommendations that specifically addresses threats aimed both at promoting better understanding and awareness of the ways in which women experience threats, and ensuring that stakeholders help to make the Internet and its use safer for women (page 32). Proposed actions include researching and understanding threats, increasing awareness of threats and how they can be addressed or reduced, developing safety applications and services and strengthening protection measures and reporting procedures.
  • The “Perils and Possibilities: Growing up Online” report, recently published by UNICEF, provides a glimpse into young people’s opinions and perspectives on the risks they face coming of age in a digital world.UNICEF is collaborating with companies, governments and civil society to promote children’s rights related to the Internet and associated technologies. Take a look at their online depository of new business tools and guidance on child online protection which among others includes useful resources, learning materials, and tools for companies.
  • UNICEF is collaborating with companies, governments and civil society to promote children’s rights related to the Internet and associated technologies. Take a look at UNICEF’s online depository of new business tools and guidance on child online protection which among others includes useful resources, learning materials, and tools for companies.
  • The Guidelines for Child Online Protection, prepared by ITU, outline best practices and key recommendations for different interest groups, including policy makers, industry, children, as well as parents, guardians, and educators. More resources on Child Online Protection from ITU’s database.
  • INHOPE is an active and collaborative global network of Hotlines, dealing with illegal online content and committed to stamping out child sexual abuse from the Internet. The network offers a way of anonymously reporting Internet material including child sexual abuse material they suspect to be illegal.
  • Launched in January, HeartMob is a project of Hollaback!, a non-profit organization powered by a global network of local activists who are dedicated to ending harassment in public spaces. The platform provides real-time support to individuals experiencing online harassment and empowers bystanders to act.

It’s also worth reading Women’s Rights Online, a report from 2015 from the Web Foundation that shows that the dramatic spread of mobile phones is not enough to get women online, or to achieve empowerment of women through technology. The study, based on a survey of thousands of poor urban men and women across nine developing countries, found that while nearly all women and men own a mobile phone, women are still nearly 50% less likely to access the Internet than men in the same communities, with Internet use reported by just 37% of women surveyed (vs 59% of men). Once online, women are 30-50% less likely than men to use the Internet to increase their income or participate in public life. The report says young people are most likely to have suffered harassment online, with over six in 10 women and men aged 18 – 24 saying they had suffered online abuse. The Web Foundation was established by Web inventor Sir Tim Berners-Lee

Also see:

Virtue & reputation in the developing world

womantargetMy Facebook newsfeed is filled with posts from my male Afghan colleagues, talking about their travels, their work, their children, sharing photos, etc. But rare is the post from Afghan women I’ve worked with. And recently, I was reminded yet again of why that is.

In some countries, a woman’s reputation regarding her virtue is every bit as important as food and health care, in terms of prosperity, let alone survival. When you are a girl or a woman in Afghanistan, or many other countries, you can’t just shrug at insults regarding your morals or honor. You do not have that privilege. You have to care deeply about what neighbors and co-workers and, really, what anyone might say about your virtue. Damage to your reputation regarding your virginity, your marriage, your care for your children, your sexuality, how you dress, how you behave in social settings, and everything else that makes up one’s moral character can cost a woman a job, her family, her marriage – even her life.

I was gobsmacked to find out just how true this was when I lived in Afghanistan for six months back in 2007 – my Afghan female co-workers were immobilized at times by fear of gossip about their honor. But it’s not just in that country: I heard a few comments when I lived in Ukraine that made me realize that, to a degree, it can be true there as well.

I was reminded of all this per an article in the Washington Post regarding women in Afghanistan who are being virtually assaulted, their Facebook profiles duped to create a second, fake profile, their friends invited to “friend” that profile, and then come the fake posts boasting of drug use and illicit behavior, attributed to the person being targeted. The identity thieves steal the women’s photos and steal and repost personal information publicly. Or, the woman’s actual account is hacked, the password changed so that she can no longer control the account – and the same tactic used: fake posts boasting of illicit behavior, altered photos of the woman drinking alcohol, etc. “Respectable reputations are demolished with a few keystrokes.” In addition, a woman on Facebook in Afghanistan may end up with an inbox deluged with pornography and violent threats from aggressive suitors and alleged militants. It leaves the women terrified of even their own family members, as the article details.

In the article, an Internet cafe owner talks about his attempts to help the many young women who are devastated to find out their profile has been duped or hacked with such reputation-destroying information and frantic to get the information removed. Sadly, his reports to Facebook aren’t taken seriously. The article says, “He suspects that the threats are so culturally specific — a profile photo showing a woman’s face or a beer Photoshopped into a photo of a female gathering, for example — that they often go unnoticed by Facebook administrators reviewing flagged accounts. What may look like an innocent account in the United States can be full of menacing innuendo to Afghan eyes.”

But there’s another reason that keeps so many women in Afghanistan and other countries off of social media as well: the Tall Poppy Syndrome. People talking about an accomplishment can be seen as bragging, and many feel that tall flower has to be cut down to the same size as all the others. The phrase is particularly popular in Australia, though some people say it isn’t success that offends Australians but, rather, someone that acts superior. But in many places, a woman saying anything on social media, except for praising the deity of her religion, is seen as bragging – and she becomes a target for her “tall” reputation being cut down. If you don’t believe that, search for malala yousafzai criticized on Google.

For all these reasons, many women in Afghanistan and other countries have given up on having a virtual identity at all – I personally know of two such women. This greatly hinders their ability to connect with potential colleagues abroad that could help them in their work, to build up a professional reputation beyond the walls of their office or beyond the staff of the organization, and build a career.

Of course, it hasn’t always been so easy in the Western world for a woman to shrug off gossip. In Pride and Prejudice, published in 1813, the heroine, Elizabeth Bennet, warns her father that the consequences of her sister Lydia’s reputation as a flirt affects “our importance, our respectability in the world”, noting that when a girl is perceived as being a flirt, it is the girl’s family members that pay the price: “Oh! my dear father, can you suppose it possible that they will not be censured and despised wherever they are known, and that their sisters will not be often involved in the disgrace?” 200 years later, no girl in the USA has to have that scene explained to her, even in our world of celebrity sex tapes and leaked nude photos and wardrobe malfunctions. Many women worldwide, even in “the West,” still fear loss of reputation through gossip, even if the consequences aren’t nearly as dire as in other countries.

By contrast, I now live in a privileged world where I can choose to shrug at personal insults thrown my way regarding my virtue, my moral behavior, etc. I know who I am, that I strive for integrity in my professional world and in personal matters, I know that the people I love and respect in my life know my true character and morals, and for me, that’s all that matters. If someone calls me a whore, I can simply roll my eyes and say, “Please call me Her Royal Highness and Whore, as it is my correct title,” and then I can go on about my day.

I’m from the Bible belt, and I’ve lived all over the USA, and I find that “but what will people think?!” is a mentality that still very much exists back home. I’m not sure when exactly I shed that mentality, but I do remember the first time I heard a story that says there was a man who constantly harassed and insulted the Buddha, but the Buddha never seemed fazed by it. When someone asked why he didn’t take offense to the insults, he replied, “If someone gives you a gift and you refuse to accept it, the gift stays with the giver.” I remember thinking: that’s what I want to strive for. Though, full disclosure: insults about my looks, my age, my weight, etc., still feel like punches in my gut, anc criticism of my work, and my approach to work, can sting. But insults about my virtue? Have at it – I don’t care.

So we, in the West, do understand, to a degree, the perils of gossip regarding moral behavior for our sisters in other countries. But what’s to be done? We certainly need to pressure social media companies like Facebook and Twitter to better respond to complaints of duping and hacking. But should we also encourage a new way of thinking: “Sticks and stones can break my bones but words can never hurt me”? I’m not sure it’s possible to become unoffendable – but could an entire culture be taught, deliberately, to become less so? Would that be a part of women’s empowerment, of the United Nations Sustainable Development Goals (SDGs), particularly #5 Achieve gender equality and empower all women and girls?

Regardless, it should serve as a caution to humanitarian and development workers wanting NGOs and government agencies to engage more on social media; you need to provide guidance for the women who would be expected to manage online activities on how to stay safe and protect their personal reputations.

January 4, 2016 update: See this post on TechSoup that summarizes an article about the risks taken by women in Pakistan, particularly female students, who use social media, and highlights the work of Nighat Dad, a lawyer in Pakistan who works to help women stay safe online.

Also consider this real-world example: The book Kabul Beauty School by Deborah Rodriguez chronicled her time running a beauty school in Kabul, where she trained and managed Afghan beauticians. The book ended up on The New York Times bestseller list, made an overnight sensation of Rodriguez, and was slated to become a movie, with Sandra Bullock playing the lead. But then her Afghan husband turned on her, demanding proceeds from the book. Other people showed up at the beauty school, demanding money from the women that worked there and threatening to bring dishonor to their families by showing photos Rodriguez had taken with her cell phone inside the shop of women behaving in an “un-Islamic” manner – photoss that, at the time of this blog, can still be found online. The book and those photos exposed the women to risks. Several of the Afghan women who worked at the beauty school and whose private lives she documents in her book went into hiding and applied for political asylum within the United States. They feel abandoned by Rodriguez. In an article a year after fleeing Afghanistan, she said “If I could give them what they want, I would. I don’t know how to help anymore.” The fate of the women remains unknown. Photos and stories shared in moments of joy, fun and sisterhood have ended up the very people she was trying to help.

Update April 16, 2019: The Kandahar field office of UN Assistance Mission in Afghanistan (UNAMA) hosted a discussion with 20 women representatives of civil society, local media, provincial council members, teachers and university students active on social media. The participants agreed that social media campaigns and platforms are important means of advocacy for women to play their role in peace process. Balancing the pros with the cons -such as risks of harassment from trolls and others- they created a closed social media group dedicated to empowering women. In southern Afghanistan, as in other parts of the country, women are largely left out of decision-making and peace processes. Gender-based violence is prevalent and women are not visible in many public domains because of family and other cultural restrictions. The limitations apply to social media as well with indicators showing that, despite the potential, very few women in the southern region are active in this sphere. See more via this UNAMA Facebook update.

Updated April 15, 2021: A comic strip demonstrates the challenges women face online. It’s developed by Kenya ICT Action Network (KICTANet). In a story of three differently aged, differently shaped and differently employed women, we see what violence can look like online, how the seemingly harmless can actually contribute to it, and what we can all do to prevent it and to create a safer space for women online.

Also see: