{"id":5784,"date":"2015-04-28T11:46:27","date_gmt":"2015-04-28T09:46:27","guid":{"rendered":"https:\/\/internetrepublica.com\/?p=5784"},"modified":"2016-08-16T14:05:14","modified_gmt":"2016-08-16T12:05:14","slug":"twitter-adopta-medidas-para-controlar-el-ciberacoso-2","status":"publish","type":"post","link":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/","title":{"rendered":"Twitter adopta medidas para controlar el ciberacoso"},"content":{"rendered":"<p><a href=\"https:\/\/internetrepublica.com\/wp-content\/uploads\/2015\/04\/Twitter-ciberacoso.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5208 size-large\" src=\"https:\/\/internetrepublica.com\/wp-content\/uploads\/2015\/04\/Twitter-ciberacoso-1024x768.jpg\" alt=\"Twitter ciberacoso\" width=\"1024\" height=\"768\" \/><\/a><\/p>\n<p>La paciencia tiene un l\u00edmite: <a href=\"https:\/\/blog.twitter.com\/es\/2015\/actualizamos-nuestras-pol-ticas-y-productos-para-combatir-el-abuso-0\">Twitter ha extendido su pol\u00edtica de privacidad<\/a> para proteger a sus usuarios del acoso por la red, o ciberacoso. Esta actualizaci\u00f3n consiste en el lanzamiento de nuevas herramientas para tratar de eliminar, de manera absoluta, las amenazas de violencia y abuso en la plataforma. Vamos\u2026 que se acabaron las tonter\u00edas.<\/p>\n<p>Uno de los prop\u00f3sitos principales de Twitter, la segunda red social m\u00e1s grande del mundo en n\u00famero de usuarios registrados, es promover la libertad de expresi\u00f3n sin sufrir consecuencias. Es decir, construir un terreno virtual que sea seguro para todos los usuarios, tanto para relacionarse entre ellos como para leer y compartir informaci\u00f3n que se aleje de lo discriminante, ofensivo y violento.<\/p>\n<blockquote><p>\u201cNuestra pol\u00edtica anterior era excesivamente limitada y reduc\u00eda nuestra capacidad de actuar ante ciertos tipos de comportamiento amenazador. El lenguaje utilizado ahora describe mejor el \u00e1mbito de los contenidos prohibidos y nuestra intenci\u00f3n de actuar cuando los usuarios crucen esa l\u00ednea.\u201d<br \/>\n<em>Vijaya Gadde, Consejera General de Twitter<\/em><\/p><\/blockquote>\n<p>Twitter ha identificado dos problemas clave. El primero est\u00e1 relacionado con el tipo de contenido que fluye por la plataforma, y el segundo, con la manera de lidiar con quienes incumplen las pol\u00edticas de la red social.<\/p>\n<p>Pero como el pajarillo azul est\u00e1 siempre a todo, se han adoptado medidas para solucionar estos problemas. Referente a lo primero, se ha restringido la publicaci\u00f3n de ciertos contenidos. La versi\u00f3n antigua de la pol\u00edtica de abuso afectaba \u00fanicamente a las \u201camenazas espec\u00edficas directas\u201d, que son las que de manera directa, atacan contra usuarios determinados. La nueva adaptaci\u00f3n luchar\u00e1 tambi\u00e9n en contra de aquellos tuits que estimulen la violencia de usuarios contra los dem\u00e1s.<\/p>\n<p>Con respecto al segundo punto, Twitter cuenta con un m\u00e9todo de seguridad que consiste en comprobar el n\u00famero de tel\u00e9fono del usuario y obligarle a eliminar contenidos abusivos. Pero ahora, adem\u00e1s, se le suma la capacidad de bloquear cuentas que sean abusivas o tengan intenci\u00f3n de serlo, durante un tiempo determinado.<\/p>\n<p><a href=\"https:\/\/internetrepublica.com\/wp-content\/uploads\/2015\/04\/Pol\u00edtica-de-abuso.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5213 size-large\" src=\"https:\/\/internetrepublica.com\/wp-content\/uploads\/2015\/04\/Pol\u00edtica-de-abuso-496x1024.png\" alt=\"Pol\u00edtica de abuso\" width=\"496\" height=\"1024\" \/><\/a><\/p>\n<p>Adem\u00e1s de estas novedades, Twitter est\u00e1 trabajando con una nueva herramienta que tiene como fin identificar tuits y mensajes abusivos de manera autom\u00e1tica, para as\u00ed poder evitar su propagaci\u00f3n. El mecanismo de esta nueva funcionalidad se basa en la asociaci\u00f3n de contextos, cuentas y t\u00e9rminos que ya hayan sido considerados como abusivos en un pasado.<\/p>\n<p>Es cierto que aun quedan detalles por mejorar, pero este salto es, sin duda, un gran comienzo hacia un mundo virtual m\u00e1s seguro. Que la seguridad nos acompa\u00f1e a todos\u2026<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La paciencia tiene un l\u00edmite: Twitter ha extendido su pol\u00edtica de privacidad para proteger a sus usuarios del acoso por la red, o ciberacoso. Esta&#8230;<\/p>\n","protected":false},"author":19,"featured_media":5208,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[120],"tags":[148,222,243,513,597],"class_list":["post-5784","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-social-media","tag-acoso-online","tag-ciberacoso","tag-contenido-abusivo","tag-redes-sociales","tag-twitter"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Twitter adopta medidas para controlar el ciberacoso<\/title>\n<meta name=\"description\" content=\"Twitter introduce nuevas herramientas para controlar contenido violento y abusivo, garantizando una red social m\u00e1s c\u00f3moda, libre y segura.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Twitter adopta medidas para controlar el ciberacoso\" \/>\n<meta property=\"og:description\" content=\"Twitter introduce nuevas herramientas para controlar contenido violento y abusivo, garantizando una red social m\u00e1s c\u00f3moda, libre y segura.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Internet Rep\u00fablica\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-28T09:46:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-08-16T12:05:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2022\/05\/destacado.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"489\" \/>\n\t<meta property=\"og:image:height\" content=\"299\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Laura Blanco Toro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laura Blanco Toro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/\"},\"author\":{\"name\":\"Laura Blanco Toro\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/c268a6958efcf1f08c1b4cc0d263ec26\"},\"headline\":\"Twitter adopta medidas para controlar el ciberacoso\",\"datePublished\":\"2015-04-28T09:46:27+00:00\",\"dateModified\":\"2016-08-16T12:05:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/\"},\"wordCount\":451,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"Acoso online\",\"Ciberacoso\",\"Contenido abusivo\",\"Redes sociales\",\"Twitter\"],\"articleSection\":[\"Social Media\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/\",\"url\":\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/\",\"name\":\"Twitter adopta medidas para controlar el ciberacoso\",\"isPartOf\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2015-04-28T09:46:27+00:00\",\"dateModified\":\"2016-08-16T12:05:14+00:00\",\"author\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/c268a6958efcf1f08c1b4cc0d263ec26\"},\"description\":\"Twitter introduce nuevas herramientas para controlar contenido violento y abusivo, garantizando una red social m\u00e1s c\u00f3moda, libre y segura.\",\"breadcrumb\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Agencia Marketing Digital\",\"item\":\"https:\/\/internetrepublica.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Media\",\"item\":\"https:\/\/internetrepublica.com\/blog\/social-media\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Twitter adopta medidas para controlar el ciberacoso\",\"item\":\"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/#website\",\"url\":\"https:\/\/internetrepublica.com\/blog\/\",\"name\":\"Internet Rep\u00fablica\",\"description\":\"Agencia SEO y Marketing Digital\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/internetrepublica.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/c268a6958efcf1f08c1b4cc0d263ec26\",\"name\":\"Laura Blanco Toro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/41e8c77f4a343252112e5a991e85061a0f84146d8e2faf54ed04add58569dd41?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/41e8c77f4a343252112e5a991e85061a0f84146d8e2faf54ed04add58569dd41?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/41e8c77f4a343252112e5a991e85061a0f84146d8e2faf54ed04add58569dd41?s=96&d=mm&r=g\",\"caption\":\"Laura Blanco Toro\"},\"url\":\"https:\/\/internetrepublica.com\/blog\/author\/laura-blanco\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Twitter adopta medidas para controlar el ciberacoso","description":"Twitter introduce nuevas herramientas para controlar contenido violento y abusivo, garantizando una red social m\u00e1s c\u00f3moda, libre y segura.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/","og_locale":"es_ES","og_type":"article","og_title":"Twitter adopta medidas para controlar el ciberacoso","og_description":"Twitter introduce nuevas herramientas para controlar contenido violento y abusivo, garantizando una red social m\u00e1s c\u00f3moda, libre y segura.","og_url":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/","og_site_name":"Internet Rep\u00fablica","article_published_time":"2015-04-28T09:46:27+00:00","article_modified_time":"2016-08-16T12:05:14+00:00","og_image":[{"width":489,"height":299,"url":"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2022\/05\/destacado.jpg","type":"image\/jpeg"}],"author":"Laura Blanco Toro","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Laura Blanco Toro","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#article","isPartOf":{"@id":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/"},"author":{"name":"Laura Blanco Toro","@id":"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/c268a6958efcf1f08c1b4cc0d263ec26"},"headline":"Twitter adopta medidas para controlar el ciberacoso","datePublished":"2015-04-28T09:46:27+00:00","dateModified":"2016-08-16T12:05:14+00:00","mainEntityOfPage":{"@id":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/"},"wordCount":451,"commentCount":0,"image":{"@id":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#primaryimage"},"thumbnailUrl":"","keywords":["Acoso online","Ciberacoso","Contenido abusivo","Redes sociales","Twitter"],"articleSection":["Social Media"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/","url":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/","name":"Twitter adopta medidas para controlar el ciberacoso","isPartOf":{"@id":"https:\/\/internetrepublica.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#primaryimage"},"image":{"@id":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#primaryimage"},"thumbnailUrl":"","datePublished":"2015-04-28T09:46:27+00:00","dateModified":"2016-08-16T12:05:14+00:00","author":{"@id":"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/c268a6958efcf1f08c1b4cc0d263ec26"},"description":"Twitter introduce nuevas herramientas para controlar contenido violento y abusivo, garantizando una red social m\u00e1s c\u00f3moda, libre y segura.","breadcrumb":{"@id":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Agencia Marketing Digital","item":"https:\/\/internetrepublica.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Social Media","item":"https:\/\/internetrepublica.com\/blog\/social-media\/"},{"@type":"ListItem","position":3,"name":"Twitter adopta medidas para controlar el ciberacoso","item":"https:\/\/internetrepublica.com\/blog\/twitter-adopta-medidas-para-controlar-el-ciberacoso-2\/"}]},{"@type":"WebSite","@id":"https:\/\/internetrepublica.com\/blog\/#website","url":"https:\/\/internetrepublica.com\/blog\/","name":"Internet Rep\u00fablica","description":"Agencia SEO y Marketing Digital","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/internetrepublica.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/c268a6958efcf1f08c1b4cc0d263ec26","name":"Laura Blanco Toro","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/41e8c77f4a343252112e5a991e85061a0f84146d8e2faf54ed04add58569dd41?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/41e8c77f4a343252112e5a991e85061a0f84146d8e2faf54ed04add58569dd41?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/41e8c77f4a343252112e5a991e85061a0f84146d8e2faf54ed04add58569dd41?s=96&d=mm&r=g","caption":"Laura Blanco Toro"},"url":"https:\/\/internetrepublica.com\/blog\/author\/laura-blanco\/"}]}},"_links":{"self":[{"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/posts\/5784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/comments?post=5784"}],"version-history":[{"count":1,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/posts\/5784\/revisions"}],"predecessor-version":[{"id":60596,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/posts\/5784\/revisions\/60596"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/media?parent=5784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/categories?post=5784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/tags?post=5784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}