Clicky

Subscribe for premier reporting on free speech, privacy, Big Tech, media gatekeepers, and individual liberty online.

38% of “abusive” Twitter content is flagged by algorithms, not users

If you’re tired of censorship and surveillance, subscribe to Reclaim The Net.

Jack Dorsey, co-founder, and CEO of Twitter has developed new tools to fight abusive content on the platform. During a TED interview on Tuesday, April 16, the CEO gave a status update on the latest tools employed which has flagged 38% of the abusive content.

“Our purpose is to serve the public conversation, and we have seen several attacks on it,” the CEO said. “We’ve seen abuse, we’ve seen harassment, we’ve seen manipulation, automatic and human coordination, misinformation. What worries me most is our ability to address it in a systemic way that is scalable.”

At the Ted talk, Twitter users were allowed to send questions to Dorsey using the hashtag #AskJackAtTED, and the questions were displayed live on screens behind the stage.

In the interview, Jack mentioned that Twitter has new tools in place to remove content, adding that 38 percent of the abusive content was taken down by the new tool and not reported by users.

However, 38 percent of the abusive content taken down was still subjected to human review before the final decision.

After the Tuesday’s TED talk, Twitter Vice President Donald Hicks wrote that the social media platform has made meaningful progress in reducing abusive content and actually boasting that more abusive accounts are automatically getting suspended compared to last year.

Twitter also claims that repeat offenders of such abusive content are restricted from opening new accounts. The company reported that a massive 100,000 accounts were suspended between January and March 2019.

Users can still expect more changes in the platform aimed at regulating “offensive” tweets.

If you’re tired of censorship and surveillance, subscribe to Reclaim The Net.

Read more

Join the pushback against online censorship, cancel culture, and surveillance.

Already a member? Login.

Share