10,000 Matching Annotations
  1. Last 7 days
    1. Summarize: Some annotations merely summarize the source. What are the main arguments? What is the point of this book or article? What topics are covered? If someone asked what this article/book is about, what would you say? The length of your annotations will determine how detailed your summary is. For more help, see our handout on paraphrasing sources. Assess: After summarizing a source, it may be helpful to evaluate it. Is it a useful source? How does it compare with other sources in your bibliography? Is the information reliable? Is this source biased or objective? What is the goal of this source? For more help, see our handouts on evaluating resources. Reflect: Once you've summarized and assessed a source, you need to ask how it fits into your research. Was this source helpful to you? How does it help you shape your argument? How can you use this source in your research project? Has it changed how you think about your topic?

      This section shows that annotations are meant to summarize, assess, and reflect on sources. I like how it breaks it down because it makes the assignment feel less confusing it also shows that we're supposed to form our own opinions instead of just repeating information.

    2. an annotated bibliography includes a summary and/or evaluation

      This part explains that an annotated bibliography is more than just listing sources. It includes a summary and an evaluation, which means you have to actually think about whether a source is useful. I didn't realize before that we were supposed to judge the quality of sources instead of just using them.

    1. place students' academic struggles in the larger context of social failure including health, wealth, and funding gaps that impede their school success.

      Still thinking about the comment made that SAT does not predict post-secondary success but rather it predicts future earned income potential.

    1. I discovered a surprising number volunteering that what they liked most about reading in print was the smell of books.20

      Reading hard copy books unlocks many more senses to readers, making it more enjoyable to read.

    2. The more difficult the text, the more regressive saccades readers make. Also, as we might anticipate, we fixate longer on unfamiliar words than on words we easily recognize.

      I have noticed this habit when helping younger family members beginning to read, they tend to fixate on words that are unfamiliar to them.

    3. The problem? The new mass audience of readers might encounter vulgar materials, radical ideas, or unrealistic expectations for life’s possibilities. People could also suffer exhaustion, given all there now was to read.

      I feel as though social media and technology plays a part in affecting how much people are reading as well.

    4. the more exposure readers have to the written word, the better their overall language skills (including oral language, comprehension, word recognition, and spelling) through their years of formal schooling.

      This is because exposure to written words helps to grow your vocabulary.

    5. the idea of literacy has to go beyond reading and writing words.

      I agree with this statement; there is a difference between reading and writing something and understanding deeply what is being read and written.

    6. That is, the ways we use our hands to interact with text on screens and in print are not the same.

      I know many people, like myself, who prefer reading print rather than reading texts on screens, which I feel like is because we cannot use our senses fully with on screen texts.

    7. the slow and meditative possession of a book. We don’t just read the words, we dream our lives in their vicinity.6

      I can see deep reading to be done when reading novels.

    8. “Given a reading diet of appropriate length and complexity, reading has the potential to foster mental focus, patience and discipline, offers emotional and aesthetic experiences, increases linguistic knowledge and enhances economic and personal well-being. Skimming texts doesn’t bring such benefits.”

      I heavily agree on the idea of appropriate length and complexity, because it is very easy to say that you "read" something when it was a short passage that was skimmed, making it hard to fully understand and digest the text.

    9. as well as whether screen reading and audio are suited to the task.

      This is something that I constantly debate, and I think it depends on how the student is retaining the information.

    10. “affordances”.

      defined as "the perceived and actual properties of an object or environment that suggest how it can be used, acting as visual or physical cues for interaction"

    11. Are we as likely to re-listen to an audiobook as to reread a text version?

      I think the reason we are more likely to reread a text version rather than an audiobook is because when you are already familiar with the text, it is easier to naviagte

    1. The challenge of digital annotation has many faces.

      I can see why many other may find challenges in digital annotating, but I believe once you get used to it, it becomes a lot easier.

    2. A recent study found that 55 percent of faculty surveyed in the U.S. believed cost was the primary reason students didn’t procure textbooks.

      I believe that the cost of textbooks are a reason why students may not read from textbooks often.

    3. Over the centuries, a more mentally engaging form of annotation has been marginalia, meaning writing your own comments in the margins.

      While I enjoy reading on hardcopy books, I prefer to annotate on digital texts because I feel as though I have more room to annotate what I want.

    4. One study we’ll mention showed that when students self-regulate, they tend to take less time with the digital task and do worse on comprehension.

      Time regulation can make students feel rushed when it comes to their work, causing students to not do their best because they are focused on getting it done, not doing it right.

    5. The experiment bombed. No sign of distraction or multitasking on either task.

      I can see why this may have not worked because everyone works differently, so it is hard to do a test on it.

    6. Is it important that students read fiction?

      I believe that it is; when reading fiction, specifically realistic fiction, it opens creativity to the mind and allows students to grow empathy.

    7. there’s evidence that both children and adults tend to find informational text harder to read than narrative, given the seeking, integrating, and interpreting skills that making sense of informational texts may demand.1

      Reading narrative can be seen as easier than reading informational because there's less effort from the mind to read a narrative text than an informational text.

    1. Strategic planning that simultaneously integrates conservation objectives with the needs of the transitioning energy sector, setting clear limits on development within important conservation areas is urgently needed

      Could be a good resolution statement

    2. Out of 12,658 large-scale renewable energy facilities distributed globally, we found that 2,206 (17.4%) currently operate inside important conservation areas (Table 1). Of these facilities, 1,018 overlap with 634 PAs (1.5% of the total number of PAs), of which 122 are classified as strictly managed PAs (IUCN Categories I–IV), where no development activity should occur (Table 2; Figure 1). These 122 strictly managed PAs contain 169 renewable energy facilities (Table 2). We identified 42 facilities overlapping with 25 contiguous wilderness areas (2.7% of total wilderness blocks), and 1,147 facilities within 583 KBAs (3.2% of the total number of KBAs). Wind power overlaps with the largest number of important conservation areas (n = 543 PAs, KBAs and wilderness areas combined).

      This is excellent information to bring it all together.

    3. Our results show that renewable energy development has already encroached on many of the world's most important places for conserving biodiversity, with 2,206 facilities already operational within PAs, KBAs and wilderness areas (Figure S2). Furthermore, the number of active renewable energy facilities inside important conservation areas could increase by ~42% by 2028, suggesting conflicts will likely intensify in the near future

      With a focus on biodiversity, this information would be key.

    4. Despite the strong and often negative feedbacks between biodiversity conservation and renewable energy expansion, policies to promote these two objectives are almost always planned separately (Koppel, Dahmen, Helfrich, Schuster, & Bulling, 2014)

      We can probably utilize policy to back these points

    5. Wind power turbines negatively affect birds and bats, which collide with the turbine blades, with ramifications for species in other trophic levels too, and they also modify the natural airflow of local climates (Arnett et al., 2016; Saidur, Rahim, Islam, & Solangi, 2011; Schuster, Bulling, & Koppel, 2015; Thaker, Zambre, & Bhosale, 2018; Zhou et al., 2012)

      These might be good sources to look into.

    6. Both conservation action and renewable energy production can require large areas of land, with the latter requiring up to ten times more land area than fossil fuel thermal facilities to produce equivalent amounts of energy (Lee & David, 2018; Trainor, McDonald, & Fargione, 2016; UNCCD, 2018)

      This is essentially saying it takes up more room, which will potentially affect biodiversity.

    7. We identified 2,206 fully operational renewable energy facilities within the boundaries of these conservation areas, with another 922 facilities under development. Combined, these facilities span and are degrading 886 PAs, 749 KBAs and 40 distinct wilderness areas

      This is essentially saying that 2,206 fully operational renewable energy facilities with another 922 under development. These facilities are degrading protected areas and Key biodiversity areas. My reasoning leads me to believe that renewable energy which might be good for energy conservation may not always be good for Biodiversity.

    1. It is important for educators to recognize that children with disabilities can learn not only from the teacher, but also from their peers. I have seen students thrive in inclusive classroom settings where peer interaction supports both academic and social growth. Individualized Education Plans (IEPs) play a critical role in a student’s learning because they are developed in collaboration with families and are designed to meet each student’s unique needs. When implemented effectively, IEPs help create the best possible learning environment for students.

    1. Clinical significance

      Suggesting I'm a low A/BNP, high Vasopressin state: hypertension, arterial vasoconstriction, concentrated urine, hypokalemia, high pair bonding, dilated cardio hypertrophy. Low eGFR. Vasopressin associates with stress. Don't sweat. Sympathetic failure. Blurry vision, intraocular control. Na excretion plus sympathetic control is required for sweating.

      Vasopressin is reacting to high ECM osmolarity. Activating aquaporin channels for diH2O outflow, attempting to deconcentrate ECM interstitial spaces. Saline provides symptom improvement. Dex, B adrenergic, sympathetic activation improves symptoms. Missing ANP energy metabolic regulation?

      It kind of seems vasopressin is a cell flush and rebuild (anabolic, rest and digest program) mechanism allowing high pressure free osmotic flow compensation for permissive active transport. This theoretically would suppress high frequency passive channel signaling (ion signaling, thus especially cognition) due to prevention of high substrate osmotic gradients. If so, perhaps intracellular dysregulated/infected/stress would rapidly cause a UPR/ISR, then perhaps a synucleinopathy or taupathy, which rapidly cause intracellular hyperosmolor trash build up, especially upon exertion, which quickly activate H2O influx and cognition/sympathetic shutdown, the trash and damage activate PRRs activating an amplified and prolonged immune response and high intracellular swelling, and thus prolonged and deep cognition signaling suppression (drowsy, stupor, sleep, coma). Perhaps then excessive deregulation and repair causing excess sympathetic shutdown then causes sympathetic drive failure and is causal explanation for: central sleep apnea, ataxia, reward circuit, PFC impairment, anxiety, disassociation/schizophrenia, BPD, fear, thought disorder, ocular ataxia, inability to sweat, hypothalamic-brainstem homeostatic control, POTS, immune deficiency (huge because this is your repair system)

    1. affirm their racial identity

      If the target is comfortable with sharing their experience with a family member or friend, then they can give them support and encouragement. An example from my personal life would be like from my example in my previous paragraph but after I called my mom and she assured me and offered encouragement. This gave me the motivation I needed to go back to class and sit with a new group of people and make new friends.

    2. What is your current understanding of the term microaggression?

      A microaggression is when someone makes remark or action against another of a marginalized group such as a race or ethnic minority. I've experienced a situation like this where I was the only one of my race and someone of a different race blocked me off from talking with the rest of the group of the same race as them. We were at a long straight table and I was at the end trying to lean over to hear what people were saying. This makes me question why people do this and what do they get from doing it? If I were a bystander, I would do my best to include this person. I would try to invite them to sit next to me or ask for their input in a conversation to make them feel included.

    3. Which could be a “comfortably uncomfortable” opportunity for you to try in the future?

      I think I could be comfortably uncomfortable in trying to "Open the Front Door" more often. I am someone who very much avoids confrontation, but I have tried to make it a goal for myself to be kindly confrontational in situations that warrant it. I think microaggressions are things that I can address in this way. Hopefully, using this strategy of microresistance is away I can help people be aware of what they might do unintentionally.

      I think the part that scares me the most about this, aside from the confrontation, is providing relevant data. I think this is the best way to back up a point, but I find myself being hesitant of quoting the research wrong, so I say nothing at all. Hopefully by practicing this, I can get more confident in using this strategy. I also think the desire part of this strategy can be tricky because I don't find it easy to request things of other people, but I am finding that good leaders need to be able to communicate in this way, so I am motivated to get better at it.

    4. The chart below explains a little about each category.

      After reading the chart below, which basis of power was the President of the United States designed to have? I find this role fitting many of the different categories, not just one.

    5. Think of a time when someone was singled out in a group as “other” in some way or another. How was that “othering” communicated? How did it make you feel at the time? How does it make you feel now?

      When people are singled out in a group, they seem to be ignored above all things. Even the people that what to claim that they are exclusive also want to show that they are being "inclusive" to the one singled out by choice. I've seen a lot of people purposefully act a different way to the one known as different to show they rest of the public that their interactions aren't truly genuine and related. A lot of us want to be friends with the "outcast" but not associated with them or their group I believe, and this is even noticeable in the most loving communities. It makes me feel uncomfortable, but I can also relate to those insecurities. It is human nature to want to flip in, and this is where the necessity for countering culture comes in.

    1. Integrating TEK into scientific research might provide a more complete understanding of ecosystems.

      By incorporating TEK and scientific research can offer more holistic picture of ecosystems through a combination of long-term and place-based observations of empirical data. This partnership enhances precision in the evaluation of the environment and promotes the aspect of making decisions that are culturally inclusive. The combination of both knowledge systems is the ultimate way to more sustainable and context specific management.

    2. Studies by Folke et al. (2003) have shown how TEK builds resilience in social-ecological systems by enabling a community to adapt to environmental change and uncertainty. This is a testament to the depth of ecological knowledge and the purposeful use of sustainable practices enshrined in TEK.

      Carl Folke et al. (2003) demonstrate that Traditional Ecological Knowledge (TEK) increases the resilience in the social-ecological systems as it assists community to adapt to the environmental change using experience-based practices. Resilience can be defined as the capacity of a system to absorb disruptions and go on with its normal operations. This points to the need to combine local knowledge with scientific management in order to develop more sustainable and adaptive environmental solutions.

    3. The role of TEK in contemporary environmental management is increasingly recognized in the academic literature. Agrawal (1995) criticizes the artificial dichotomy between traditional and scientific knowledge and refers to TEK as not inferior to scientific knowledge but supplementary.

      Agrawal (1995) is critical about the unrealistic distinction between Traditional Ecological Knowledge (TEK) and scientific knowledge as a false distinction, which is socially constructed and not significant. As he stresses, TEK is complementary, not inferior, and provides useful place-based knowledge, which has been formed by experience over a long period. This view holds the stance that it is necessary to combine the two knowledge systems so as to produce more effective and culturally responsive environmental management practices.

    1. Ethnic Studies exposes us to larger historical issues, broad socio-cultural topics, philosophies both inherited from our ancestors and rooted in our daily experiences, and the discipline helps us analyze and break down systems of power.

      In today's society, racism and prejudice is still an issue, especially with all the deportations going on today and families being separated.

    1. Once you begin narrowing down your topic, depending on the type of paper, you may be ready to start drafting.

      You can then start pre-writing your ideas to begin your paper.

    2. Once you begin narrowing down your topic, depending on the type of paper, you may be ready to start drafting. The best point to begin writing your draft also depends on the genre of essay you are writing. If you are writing a research paper, then you will need to follow more steps, which are covered in detail later in this book.

      It's easier when you know what the topic will be about. You can start generating ideas on how to begin, and this will depend on the audience or the people who will read or listen to it. Start putting your ideas on paper and writing a draft to make it useful and organize your thoughts before you begin presenting the topic.

    1. When activated, the extension button will darken and the Hypothesis side bar will appear collapsed

      My screen looks slightly different. however, I knew what to look for from the first annotation assignment I did. I was lost that time!

    2. All you’ll need to sign up for a Hypothesis account is an email address and a username.

      Any time someone says (all you need/all you have to do/all we need to see etc.) I get leery. This wording implies simplicity with no added steps, although there is almost always more steps preceding after the first steps were made. In this case you need a password as well to create the account so the statement "all you need to sign up" is a bit misleading. You also need extension's, particular browsers etc. According to the article Broken Promises: The Impact of Misleading Marketing on Consumer Trust and Brand Loyalty, the authors assert when a company engages in misleading, selective information disclosure they can break trust with their consumers leading to frustration or skepticism.

      https://www.researchgate.net/publication/392107586_Broken_Promises_The_Impact_of_Misleading_Marketing_on_Consumer_Trust_and_Brand_Loyalty

    1. The passage emphasizes the difference between the expectation of users regarding their privacy on social media and how these companies actually provide security for their data. It talks about how passwords need to be encrypted so that they cannot be easily read, but how some companies failed to do so, putting their users’ private information at risk, as shown in the cases of Facebook and Adobe.

    2. Employees at the company misusing their access, like Facebook employees using their database permissions to stalk women

      Internally, there should be more security to prevent employees from abusing their power. There are many ways to do this technologically and socially. An important thing to do is ensure that employees follow strict rules and encryption should be stronger.

    3. While we have our concerns about the privacy of our information, we often share it with social media platforms under the understanding that they will hold that information securely. But social media companies often fail at keeping our information secure.

      Yeah, it’s kind of a weird trade—we hand over a ton of personal info because we assume the platform will protect it, but breaches still happen all the time. It makes “trust” feel more like a gamble than a guarantee. What also bugs me is that once your data is out there, you can’t really take it back, even if the company apologizes or improves security later. It definitely makes me think twice about what I share and what permissions I give apps.

    4. 9.2. Security# While we have our concerns about the privacy of our information, we often share it with social media platforms under the understanding that they will hold that information securely. But social media companies often fail at keeping our information secure. For example, the proper security practice for storing user passwords is to use a special individual encryption process for each individual password. This way the database can only confirm that a password was the right one, but it can’t independently look up what the password is or even tell if two people used the same password. Therefore if someone had access to the database, the only way to figure out the right password is to use “brute force,” that is, keep guessing passwords until they guess the right one (and each guess takes a lot of time). But while that is the proper security for storing passwords. So for example, Facebook stored millions of Instagram passwords in plain text, meaning the passwords weren’t encrypted and anyone with access to the database could simply read everyone’s passwords. And Adobe encrypted their passwords improperly and then hackers leaked their password database of 153 million users. From a security perspective there are many risks that a company faces, such as: Employees at the company misusing their access, like Facebook employees using their database permissions to stalk women Hackers finding a vulnerability and inserting, modifying, or downloading information. For example: hackers stealing the names, Social Security numbers, and birthdates of 143 million Americans from Equifax hackers posting publicly the phone numbers, names, locations, and some email addresses of 530 million Facebook users, or about 7% of all people on Earth Hacking attempts can be made on individuals, whether because the individual is the goal target, or because the individual works at a company which is the target. Hackers can target individuals with attacks like: Password reuse attacks, where if they find out your password from one site, they try that password on many other sites Hackers tricking a computer into thinking they are another site, for example: the US NSA impersonated Google Social engineering, where they try to gain access to information or locations by tricking people. For example: Phishing attacks, where they make a fake version of a website or app and try to get you to enter your information or password into it. Some people have made malicious QR codes to take you to a phishing site. Many of the actions done by the con-man Frank Abagnale, which were portrayed in the movie Catch Me If You Can One of the things you can do as an individual to better protect yourself against hacking is to enable 2-factor authentication on your accounts. { requestKernel: true, binderOptions: { repo: "binder-examples/jupyter-stacks-datascience", ref: "master", }, codeMirrorConfig: { theme: "abcdef", mode: "python" }, kernelOptions: { kernelName: "python3", path: "./ch09_privacy" }, predefinedOutput: true } kernelName = 'python3' previous 9.1. Privacy next 9.3. Additional Privacy Violations By Kyle Thayer and Susan Notess © Copyright 2022.

      This section helped me realize that security failures are often not just technical problems, but also human and organizational ones. Even when proper security practices are well known, companies still choose convenience or cost-saving over protecting users’ data. What stood out to me most was how easily individuals can become targets through things like password reuse or phishing, which makes personal security practices like two-factor authentication feel necessary rather than optional.

    1. This section discusses the importance of privacy in everyday life. It argues that privacy is not just about covering up something bad, but also about comfort, dignity, and context. For example, someone may want to keep something private because they are embarrassed about it, or they want to avoid misunderstandings due to context collapse. However, the main idea of the text is that privacy is important for an individual because it helps them avoid the consequences of public exposure.

    2. “right to be forgotten”

      The right to be forgotten in the EU is kind of "funny" because everyone can make use of it e.g. call a company who has your information and demand to be deleted from the system. As someone who worked in customer support in a big danish company I would receive my fair share of these. The thing is, most people do it because they feel as if they've been treated badly, and then when you tell them that it's a whole process and not something that can be done by the push of a button, they don't want to do it anymore. So even though it's a possibility, a lot of people opt out because it takes time from both the company and the customer.

    3. such as if someone was sending us death threats.

      This is a particularly important note in my opinion. There are cases about sex trafficking victims who were found and the predator prosecuted because of social media giant having access to private messages and information. Of course it isn't something they should throw about, but when it's such a big part of our lives, it makes sense that it should help the police in investigation.

    4. For example, a social media application might offer us a way of “Private Messaging” (also called Direct Messaging) with another user. But in most cases those “private” messages are stored in the computers at those companies, and the company might have computer programs that automatically search through the messages, and people with the right permissions might be able to view them directly.

      This makes me think of the Tea app data leak in which almost all users had their information leaked because the developer allegedly stored it all in a public Google Drive. Certain ethical situations should be mandatory to follow when creating a social platform, even (or especially) if a developer is inexperienced.

    5. For example, a social media application might offer us a way of “Private Messaging” (also called Direct Messaging) with another user. But in most cases those “private” messages are stored in the computers at those companies, and the company might have computer programs that automatically search through the messages, and people with the right permissions might be able to view them directly.

      That’s such a good reminder that “private” messaging usually just means “not public,” not “only between two people.” It makes me want to be more careful about what I assume is truly confidential when I DM. I also think it’s wild how much of this is automated—like filtering, scanning, or flagging messages without us noticing. It raises a real question of how much privacy we’re actually trading for convenience.

    6. For example, a social media application might offer us a way of “Private Messaging” (also called Direct Messaging) with another user. But in most cases those “private” messages are stored in the computers at those companies, and the company might have computer programs that automatically search through the messages, and people with the right permissions might be able to view them directly. In some cases we might want a social media company to be able to see our “private” messages, such as if someone was sending us death threats. We might want to report that user to the social media company for a ban, or to law enforcement (though many people have found law enforcement to be not helpful), and we want to open access to those “private” messages to prove that they were sent.

      This highlights the tension between privacy and accountability on social media. Messages are labeled “private,” but that privacy is conditional and mediated by the platform. While access to private messages can be essential for safety and harm prevention, it also requires strong safeguards so that surveillance and misuse don’t become the default rather than the exception.

    1. Pluralist and deconstructionist archival theorists havechallenged these dominant evidence-based definitions ofrecords. Indigenous Australian scholar Shannon Faulkhead,for example, offers a pluralist view of records as "anyaccount, regardless of form, that preserves memory orknowledge of facts and events. A record can be a document,an individual's memory, an image, or a recording. It canalso be an actual person, a community, or the landitself.'[xviii] For Faulkhead, the defining characteristicof a record is not its ability to serve as evidence, but asa springboard for memory.

      I find this pluralist view of records to be very interesting. It reminds me of the recordings of interviews and oral histories I helped document and preserve while working at my last job. I wonder if those scholars pushing for a more evidence-based definition of records would even consider them to be records.

    1. What incentives do social media companies have to be careless with privacy?

      Companies may be careless because prioritizing rapid product growth and innovation often takes precedence over the slow, costly process of implementing rigorous security protocols. When the cost of a potential data breach settlement is lower than the profit gained from aggressive data collection, companies may view privacy risks simply as a manageable "cost of doing business."

    2. What are your biggest concerns around privacy on social media?

      My primary concern involves the creation of invasive behavioral profiles that track my interests and location without explicit, ongoing consent. I worry that this data could be leaked or sold to third parties, leading to identity theft or the subtle manipulation of my personal decisions through targeted algorithms.

  2. academic-oup-com.rocky.iona.edu academic-oup-com.rocky.iona.edu
    1. . Were these ancient societies ‘nations’? Such divisions, where one group differentiates itself from and opposes another, continue at the beginning of the 21st century: both Chechens and Ukrainians consider themselves to be different from Russians; Kurds distinguish themselves from both Iraqis and Turks; the Taiwanese seek an existence separate from mainland China; Slovaks and Czechs have separated, forming distinct (page 4)p. 4national states; Kashmir is considered by some not to be part of India; and so on

      Remember this

    2. Were these ancient societies ‘nations’? Such divisions, where one group differentiates itself from and opposes another, continue at the beginning of the 21st century: both Chechens and Ukrainians consider themselves to be different from Russians; Kurds distinguish themselves from both Iraqis and Turks; the Taiwanese seek an existence separate from mainland China; Slovaks and Czechs have separated, forming distinct (page 4)p. 4national states; Kashmir is considered by some not to be part of India; and so on

      remember this

    1. many search engines use a  language-based model generated by deep neural networks.

      I think understanding the difference between indexing and ranking is useful. Once the information is indexed, it is organized, while ranking is judgments made about quality, popularity and relevance. The use of neural language models is interesting, but there is still room for improvement. It makes me think about transparency and accountability, since we as users never see which results get priority over others.

    2. As parts of a word, the total number of different tokens that need to be stored is reduced

      This clarifies how AI processes language, and it is interesting how it is pieced together as opposed to simply being complete ideas. I do believe that it improves efficiency, but it does show a gap between human meaning and artificial intelligence. Once the language is broken up into tokens, I think it's easier to identify patterns, but it doesn't necessarily equate to better understanding which is an inherent weakness of ai.

    3. “Index” by Ben Weiner is licenced under CC BY-ND 2.0. To view a copy of this licence, visit https://creativecommons.org/licenses/by-nd/2.0/?ref=openverse. Once the data is tucked away in BigTables

      I think it is interesting how documents are transformed into structured data. Metadata, titles, and links are given preference which can influence how certain Publications are formatted or writing styles. This also makes me think that information is not necessarily neutral once it is entered into the AI system, it's more about predefined categories. It also makes me wonder how bias comes into play especially if the data is misleading or unevenly applied.

    4. Web crawlers are pieces of code that find and down

      The description of web crawlers highlights how information is shaped before a query is even inputted. I did not know that Crawlers only index sites that allow access, so there is much of the internet that may not be available due to policy restrictions. It also makes me wonder who regulates the ethical decisions that are made as far as which information is presented and what is invisible. With that in mind, I think it puts smaller organizations at a disadvantage due to how it's set up.

    1. served as tools for the faithful to access the spiritual world—they served as spiritual gateways.

      I never thought of how powerful the icons and mosaics is and how it function as a spiritual gateway for worshipper to feel closer and more connected to the divine rather than something distant or abstract.

    1. ABSTRACT

      SHORTCOMING: What were the derivatives they created? They don't mention it in the abstract, and it would be nice to know what they actually made.

    2. ABSTRACT

      STRENGTH: The diagram explains a lot about their methods, which makes it easier to understand and makes the mechanism more obvious. It improves readability!

    3. ABSTRACT:

      STRENGTH: I understand what they set out to do in their experiment. They did a good job of describing the theory in a way that I as an Organic Chem student understand.

    4. ABSTRACT

      SHORTCOMING: The purpose and conclusions were not found in the abstract, meaning that the abstract did not provide any connection to the broader scientific community or the applications of this new technique.

    5. applications and reactivity of the azulene derivatives accessiblethrough this methodology are currently ongoing in ourlaboratory

      CONCLUSIONS: Not found in the abstract. Next steps include using their discovered derivatives in other applications to check their reactivity, exploring how this fits into the existing research.

    1. the prevailing functional character of AfricanAmerican artistic expression renders problematic any move to divorceits production and any criticism thereof from the realm of rhetoricalinquiry

      I wonder if the author has any specific artistic expressions in mind in this section.

      to better understand: he is discussing how essential these two forms of rhetoric are to AA rhet as a whole "any attempt to remove them is problematic"

    2. “Black rhetoric, with its con-centration on Nommo, rhythmical patterns, audience assertiveness, andso on, cannot be dealt with by simply applying the conventional Eu

      discussed in class; Notions proposed by Smitherman, ++: traditional models and limited notions such as "persuasion" to be too static to account for the richness, dynamism, and cultural content relative to speaker audience dynamics.

    3. The civil-rights leaders faced a formidable rhetorical prob-lem; several questions about their persuasion had to be an-swered: To whom was their persuasion to be directed? Seg-regationists? Moderate whites? Negroes? What form shouldthe protest take? What effect would the persuasion have onthe audience?

      discussed in class: the role of the audience. the weight of it, who are these actions for? what should the words do to them?

    4. ctions themselves weredecidedly rhetorical in that campaign; the sit-ins, freedom rides, picket-ing, marches, wade-ins, read-ins, and jail-ins were perhaps the moreeffective forms of persuasion.

      discussed in class. connected to other discussions about whether or not violence is rhetorical. Is it violence or protest? made connection to the use of the body as rhetorical.

    5. TO ENCAPSULATE ALL THE VARIOUS EFFORTS IN THE SCHOLARLYstudy of African American rhetoric would be a task virtually as daunt-ing as if the object were to summarize all reportage and analysis of theBlack experience overall

      discussed in class. a central point. connected it to the other pieces. the idea that rhetoric doesn't have one definition. expands the discussions booth had. the study cannot be reduced.

    6. He argues that while Black oratorsused the same degree of induction, deduction, and causal reasoningemployed by White rhetors of similar training and educational levels,

      discussed in class

    7. The harder taskis to fulfill the requirement that the rhetoric be consistent with or over-come an audience’s mythology.

      discussed in class.

    8. certain critical sacrifices.

      What he cannot discuss. Does not diminish the necessity or importance of what he does not cover. (Implied in wording)

    9. ave asserted their collective humanity in the face of an endur-ing White supremacy and tried to persuade, cajole, and gain acceptancefor ideas relative to Black survival and Black liberation.

      Context as well as purpose behind the rhetoric

    Annotators

    1. We have been taught to have confidence in books. Publishers, librarians, professors and subject-matter special

      Well, we've also been told to make these assumptive inferences about the validity of the Bible. Just because it is a written book, doesn't qualify it as a work to have confidence in.

    1. An algorithm is a fixed sequence of instructions for carrying out a task. It breaks down the task into easy, confusion-free steps, like a well written recipe.

      I typically hear about algorithms all the time when utilizing social media such as Facebook or Instagram, and youtube. It's really interesting how they determine what videos are put into the algorithm, and which ones are not.

    1. How does your message impact your receiver? Or, in other words, what’s in it for them?

      The message will impact the receiver because it will change their morning plans and what they have to do to prepare for it. It shows that I am a resposinble workers and let them know ahead of time that I would be absent, giving them any necessary details that I needed to provide. Which will help in a positive relationship going forward, which will leave a good impact

    2. What does your receiver need to know?

      My receiver needs to know why I won't be at work in the morning, I am sick. She needs to know the work I have already done for the morning meeting. When I will be back in the office and when I will be available to make up any lost time.

    1. similar

      The abstract presents a clear progression from methods to results, making it easy for readers to understand the synthetic transformation being reported. The inclusion of both regioselectivity and mechanistic information (SN2-type) provides depth that helps readers assess the methods.

    2. In most cases, this ring-opening transformation proceeds with highregioselectivity, favoring nucleophilic attack at the more substituted position of theepoxide

      This presents the experimental observation that the reaction shows regioselective preference for attack at the more substituted epoxide carbon.

    3. he reactionbetween azulene derivatives and epoxides efficiently affords azulenylethanolderivatives

      This section establishes the main objective of the research: to demonstrate a synthetic route for producing azulenylethananol derivatives through a reaction between azulene derivatives and epoxides.

    1. and peace was restored between America and Great Britain, which diffused universal joy among all parties, except us, who had escaped from slavery and taken refuge in the English army; for a report prevailed at New-York, that all the slaves, in number 2000,

      This shows how unfair it was. After enslaved people were the most people to lose a lot because of the war, even though they joined to escape enslavement, about 2000 were sent back to enslavement after the colonies won

    1. Society in every state is a blessing, but Government, even in its best state, is but a necessary evil…

      That is very interesting, I wonder what he saw and or what gave him the idea of that. I also wonder what this idea would look like in our modern society

    1. What kind of relationship do you have or want to have with your receiver?

      Since this relationship is new, there is not a ton to go off of, but our relationship has gone well so far. I want to continue that by having honesty, respect, and my dedication to the position. Apologies, and still expressing how much this intership means to you could also aid in the relationship to continue going well

    2. What outcome do you want to achieve?

      I will inform my boss as soon as possible about my illness and that I am unable to attend work tomorrow. Letting her know I have done some prep for the meeting (listing what I have done), and that once I feel better, I will be able to make up my lost time.

    1. I am he who made heaven and earth, the trees, lakes, rivers, all men, and all that thou seest, and all that thou hast seen on earth

      Is he saying that he created the heaven and the earth as a prophet, or is he trying to spread the word of God and that God is the creator?

    1. they know not how to provide so well for themselves generally; neither did they live so plentifully nor (many of them) so easily in their own country, where they are made slaves to one another, or taken captive by their enemies.

      seems like a subtle portayal that they just don't have the capabilities to do so

    1. ou will be a vessel of wrath fitted to destruction

      I am not sure what the point he is trying to make is really, is he under the impression that there is a great punishment coming through christianity? Or is he using sarcasm?

    1. shall happen to be killed in such correction, it shall not be accounted felony; but the master, owner, and every such other person so giving correction, shall be free and acquit of all punishment and accusation for the same, as if such incident had never happened:

      no punishment for killing enslaved ppl

    2. servants shall faithfully and obediently, all the whole time of their service, do all their masters’ or owners’ just and lawful commands. And if any servant shall resist the master, or mistress, or overseer, or offer violence to any of them, the said servant shall, for every such offence, be adjudged to serve his or her said master or owner, one whole year after the time, by indenture, custom, or former order of court, shall be expired.

      very lax

    3. no master or owner of any servant shall during the time of such servant’s servitude, make any bargain with his or her said servant for further service, or other matter or thing relating to liberty, or personal profit, unless the same be made in the presence, and with the approbation, of the court of that county where the master or owner resides:

      enslavers didn't have the power to free the enslaved

    1. a blockchain with a computer embedded in it. then as a world compputer, it allows the foundton for building apps and organization. they have to be in a decentralized, permissionless, and censorship-resistant way.

    2. these groups,( containg the data and state), are connected to previious and future groups(blocks), leading to a long chian of blocks, thes blocks are related in such a way that any change in a block, will affect the state/data in other blocks.

    1. Be ye doers of the word, not hearers only.

      Clinton uses the bible to gain moral authority as well as this specific quote to refere back to MLK's constant message for action is need for change to happen.

    1. 4.1.2. Basic Data Types# First, we’ll look at a few basic data storage types. We’ll also be including some code examples you can look at, though don’t worry yet if you don’t understand the code, since we’ll be covering these in more detail throughout the rest of the book. Booleans (True / False)# Binary consisting of 0s and 1s make it easy to represent true and false values, where 1 often represents true and 0 represents false. Most programming languages have built-in ways of representing True and False values. Fig. 4.4 A blue checkmark is something an account either has or doesn’t so it can be stored as a binary value.# Booleans are often created when doing sort of comparison or test, like: Do I have enough money in my wallet to pay for the item? Does this tweet start with “hello” (meaning it is a greeting)? Click to see example Python code # Save a boolean value in a variable called does_user_have_blue_checkmark does_user_have_blue_checkmark = True # Save a boolean value in a variable based on a comparison. # The code checks if a wallet has more in it than the cost of the item # which will be True or False, and be saved in has_enough_money has_enough_money = money_in_wallet > cost_of_item # Save a boolean value in a variable based on a function call. # The code checks if the text of a tweet (stored in tweet_text) starts # with "Hello", which will be True or False, and be saved in is_greeting is_greeting = tweet_text.starts_with("Hello") Copy to clipboard Numbers# Numbers are normally stored in two different ways: Integer: whole numbers like 5, 37, -10, and 0 Floating point numbers: these can represent decimals like: 0.75, -1.333, and 3 x 10 ^ 8 Fig. 4.5 The number of replies, retweets, and likes can be represented as integer numbers (197.8K can be stored as a whole number like 197,800).

      This section helped me clearly see how different data types represent different kinds of information. Booleans are especially interesting because they force complex situations into true/false decisions, which can oversimplify reality. It also made me realize how choices about numbers and strings affect what computers can accurately store and how much meaning might be lost through rounding or categorization.

    1. Dictionaries# The other method of grouping data that we will discuss here is called a “dictionary” (sometimes also called a “map”). You can think of this as like a language dictionary where there is a word and a definition for each word. Then you can look up any name or word and find the value or definition. Example: An English Language Dictionary with definitions of three terms: Social Media: An internet-based platform used for people to form connections to each other and share things. Ethics: Thinking systematically about what makes something morally right or wrong, or using ethical systems to analyze moral concerns in different situations Automation: Making a process or activity that can run on its own without needing a human to guide it. The Dictionary data type allows programmers to combine several pieces of data by naming each piece. When we do this, the dictionary will have a number of names, and for each of those names a piece of information (called a “value” in this context). Dictionary: Name 1: Value 1 Name 2: Value 2 Name 3: Value 3 So if we look at the example tweet, we can combine all the data in a dictionary. Fig. 4.9 A tweet with photos of a cute puppy! (source)# Dictionary (with some of the data): user_name: “WeRateDogs®” user_handle: “@dog_rates” user_has_blue_checkmark: True tweet_text: “This is Woods. He’s here to help with the dishes. Specifically the pre-rinse, where he licks every item he can. 12/10” number_of_replies: 1533 number_of_retweets: 26200 number_of_likes: 197800 Click to see example Python code # Save some info about a tweet in a variable called tweet_info tweet_info = { "user_name": "WeRateDogs®", "user_handle": "@dog_rates", "user_has_blue_checkmark": True, "tweet_text": "This is Woods. He’s here to help with the dishes. Specifically the pre-rinse, where he licks every item he can. 12/10", "number_of_replies": 1533, "number_of_retweets": 26200, "number_of_likes": 197800 } Copy to clipboard Note: We’ll demonstrate dictionaries later in Chapter 5: History of Social Media, and Chapter 8: Data Mining. Groups within Groups# We can use dictionaries and lists together to make lists of dictionaries, lists of lists, dictionaries of lists, or any other combination. So for example, I could make a list of Twitter users. Each Twitter user could be a dictionary with info about that user, and one piece of information it might have is a list of who that user is following. List of users: User 1: Username: kylethayer (a String) Twitter handle: @kylemthayer (a String) Profile Picture: [TODO picture here] (an image) Follows: @SusanNotess, @UW, @UW_iSchool, @ajlunited, … (a list of Strings) User 2: Username: Dr Susan Notess (a String) Twitter handle: @SusanNotess (a String) Profile Picture: [TODO picture here] (an image) Follows: @kylemthayer, @histoftech, @j_kalla, @dbroockman, @qaxaawut, @shengokai, @laniwhatison (a list of Strings)

      I like the dictionary analogy because it makes clear how data gets structured and labeled. By assigning names to values, dictionaries don’t just store information, they also shape how programmers interpret and access it. This made me realize that how data is organized can influence what questions are easy—or hard—to ask later.

    1. 3.4. Bots and Responsibility# As we think about the responsibility in ethical scenarios on social media, the existence of bots causes some complications. 3.4.1. A Protesting Donkey?# To get an idea of the type of complications we run into, let’s look at the use of donkeys in protests in Oman: “public expressions of discontent in the form of occasional student demonstrations, anonymous leaflets, and other rather creative forms of public communication. Only in Oman has the occasional donkey…been used as a mobile billboard to express anti-regime sentiments. There is no way in which police can maintain dignity in seizing and destroying a donkey on whose flank a political message has been inscribed.” From Kings and People: Information and Authority in Oman, Qatar, and the Persian Gulf by Dale F. Eickelman1 In this example, some clever protesters have made a donkey perform the act of protest: walking through the streets displaying a political message. But, since the donkey does not understand the act of protest it is performing, it can’t be rightly punished for protesting. The protesters have managed to separate the intention of protest (the political message inscribed on the donkey) and the act of protest (the donkey wandering through the streets). This allows the protesters to remain anonymous and the donkey unaware of it’s political mission. 3.4.2. Bots and responsibility# Bots present a similar disconnect between intentions and actions. Bot programs are written by one or more people, potentially all with different intentions, and they are run by others people, or sometimes scheduled by people to be run by computers. This means we can analyze the ethics of the action of the bot, as well as the intentions of the various people involved, though those all might be disconnected. 3.4.3. Reflection questions# How are people’s expectations different for a bot and a “normal” user? Choose an example social media bot (find on your own or look at Examples of Bots (or apps).) What does this bot do that a normal person wouldn’t be able to, or wouldn’t be able to as easily? Who is in charge of creating and running this bot? Does the fact that it is a bot change how you feel about its actions? Why do you think social media platforms allow bots to operate? Why would users want to be able to make bots? How does allowing bots influence social media sites’ profitability? 1 We haven’t been able to get the original chapter to load to see if it indeed says that, but I found it quoted here and here. We also don’t know if this is common or representative of protests in Oman, nor that we fully understand the cultural importance of what is happening in this story. Still, we are using it at least as a thought experiment. { requestKernel: true, binderOptions: { repo: "binder-examples/jupyter-stacks-datascience", ref: "master", }, codeMirrorConfig: { theme: "abcdef", mode: "python" }, kernelOptions: { kernelName: "python3", path: "./ch03_bots" }, predefinedOutput: true } kernelName = 'python3'

      I found the donkey protest example helpful for understanding how responsibility can be separated from action. Just like the donkey does not understand the protest it carries, bots can perform actions without intention or awareness. This makes it harder to assign responsibility, since the people who design, deploy, or benefit from a bot may all have different roles and intentions.

    1. 3.1. Definition of a bot# There are several ways computer programs are involved with social media. One of them is a “bot,” a computer program that acts through a social media account. There are other ways of programming with social media that we won’t consider a bot (and we will cover these at various points as well): The social media platform itself is run with computer programs, such as recommendation algorithms (chapter 12). Various groups want to gather data from social media, such as advertisers and scientists. This data is gathered and analyzed with computer programs, which we will not consider bots, but will cover later, such as in Chapter 8: Data Mining. Bots, on the other hand, will do actions through social media accounts and can appear to be like any other user. The bot might be the only thing posting to the account, or human users might sometimes use a bot to post for them. Note that sometimes people use “bots” to mean inauthentically run accounts, such as those run by actual humans, but are paid to post things like advertisements or political content. We will not consider those to be bots, since they aren’t run by a computer. Though we might consider these to be run by “human computers” who are following the instructions given to them, such as in a click farm: Fig. 3.1 A photo that is likely from a click-farm, where a human computer is paid to do actions through multiple accounts, such as like a post or rate an app. For our purposes here, we consider this a type of automation, but we are not considering this a “bot,” since it is not using (electrical) computer programming.# { requestKernel: true, binderOptions: { repo: "binder-examples/jupyter-stacks-datascience", ref: "master", }, codeMirrorConfig: { theme: "abcdef", mode: "python" }, kernelOptions: { kernelName: "python3", path: "./ch03_bots" }, predefinedOutput: true } kernelName = 'python3' previous 3. Bots next

      This section helped clarify that not all automation on social media counts as a bot. I found it especially useful that the definition focuses on whether the account is operated by computer code rather than by humans, even if those humans behave mechanically, like in click farms. This distinction makes it easier to think more precisely about responsibility and accountability when automation affects online spaces.

    1. 9.3. Additional Privacy Violations# Besides hacking, there are other forms of privacy violations, such as: Unclear Privacy Rules: Sometimes privacy rules aren’t made clear to the people using a system. For example: If you send “private” messages on a work system, your boss might be able to read them. When Elon Musk purchased Twitter, he also was purchasing access to all Twitter Direct Messages Others Posting Without Permission: Someone may post something about another person without their permission. See in particular: The perils of ‘sharenting’: The parents who share too much Metadata: Sometimes the metadata that comes with content might violate someone’s privacy. For example, in 2012, former tech CEO John McAfee was a suspect in a murder in Belize, John McAfee hid out in secret. But when Vice magazine wrote an article about him, the photos in the story contained metadata with the exact location in Guatemala. Deanonymizing Data: Sometimes companies or researchers release datasets that have been “anonymized,” meaning that things like names have been removed, so you can’t directly see who the data is about. But sometimes people can still deduce who the anonymized data is about. This happened when Netflix released anonymized movie ratings data sets, but at least some users’ data could be traced back to them. Inferred Data: Sometimes information that doesn’t directly exist can be inferred through data mining (as we saw last chapter), and the creation of that new information could be a privacy violation. This includes the creation of Shadow Profiles, which are information about the user that the user didn’t provide or consent to Non-User Information: Social Media sites might collect information about people who don’t have accounts, like how Facebook does

      This section made me realize that privacy violations don’t always involve hacking or illegal access. Even data that seems harmless—like metadata or anonymized datasets—can still expose people in ways they never agreed to. I was especially surprised by how companies can infer new information or create shadow profiles about both users and non-users, which shows how limited individual control over personal data really is.

    2. Unclear Privacy Rules: Sometimes privacy rules aren’t made clear to the people using a system. For example: If you send “private” messages on a work system, your boss might be able to read them. When Elon Musk purchased Twitter, he also was purchasing access to all Twitter Direct Messages Others Posting Without Permission: Someone may post something about another person without their permission. See in particular: The perils of ‘sharenting’: The parents who share too much Metadata: Sometimes the metadata that comes with content might violate someone’s privacy. For example, in 2012, former tech CEO John McAfee was a suspect in a murder in Belize, John McAfee hid out in secret. But when Vice magazine wrote an article about him, the photos in the story contained metadata with the exact location in Guatemala. Deanonymizing Data: Sometimes companies or researchers release datasets that have been “anonymized,” meaning that things like names have been removed, so you can’t directly see who the data is about. But sometimes people can still deduce who the anonymized data is about. This happened when Netflix released anonymized movie ratings data sets, but at least some users’ data could be traced back to them. Inferred Data: Sometimes information that doesn’t directly exist can be inferred through data mining (as we saw last chapter), and the creation of that new information could be a privacy violation. This includes the creation of Shadow Profiles, which are information about the user that the user didn’t provide or consent to Non-User Information: Social Media sites might collect information about people who don’t have accounts, like how Facebook does

      This list shows how privacy risks often come less from a single bad action and more from how data travels and persists across systems. Even when users think they are acting safely or anonymously, metadata, inference, and platform ownership can quietly undermine consent and control, making privacy feel fragile and conditional rather than guaranteed.

    1. It explodes the myths and deplores the chicanery. This is just a brief synopsis of his long survey.

      Jim Shapiro tried, Jonathan Bate tried, the SBT tried, we tried. How long will it last?

    1. Editing and proofreading can work well with a partner. You can offer to be another pair of eyes for peers in exchange for them doing the same for you. Whether you are editing and proofreading your work or the work of a peer, the process is basically the same.

      In case that you are not 100 percent sure, you can ask a colleague for help or their opinion to find out what's missing or either what's unnecessary.

    1. s of a working draft of the play (foul papers), with the last page blank. Two or three of the original leaves have been torn out, and seven leaves and two smaller pieces of paper have been inser

      Foul papers comment

    1. When you are ready to write your introduction, there are multiple strategies available to help you craft a great first paragraph. Ideally the end of your first paragraph will clarify the thesis statement you will support in the rest of your paper. The video provides a quick overview of how to create an effective introduction.

      Find a good way to learn to write better. Make sure you're writing in the specific format, generate ideas, and jot them down on a piece of paper to make it easier and more practical to get started.

    1. advancing technology

      I hope I can advance enough in using the Hypothesis technology to make this useful for more assignments.

      This annotation is in Public

    1. In such a community oflearning there is no fail-ure.

      The author here is trying to reiterate the importance of critical thinking and how it allows students to be more passionate and express ideas more openly. In summary, critical thinking creates a learning environment where there is no failure and ensures everyone leaves the classroom sharing something and thus contributing to the classroom discussion as well as learning something in return too!

    1. The additional funding sources and high likelihood of successful prosecution drove police forces toward more aggressive and inequitable tactics. After training by the Drug Enforcement Agency, police forces around the country began racial profiling in a focused, consistent manner. Black and Hispanic people were many times more likely than White people to be pulled over for routine traffic stops. Local police forces focused on patrolling minority-inhabited neighborhoods, resulting in more arrests and prosecutions of Black and Hispanic people (Harris

      Did the DEA as a part of their police force trainings teach the to use racial profiling as a methods when investigating potential drug crimes?

    2. The motivation behind hate crimes can arise quickly, singling out specific groups who endure a rash of abuses in a short period of time. For example, beginning in 2020, people increasingly began committing violent crimes against people of Asian descent, with evidence that the attackers associated the victims with the coronavirus pandemic (Asian American Bar Association 2021).

      Also after 09/11 many middle eastern people ( which includes many varying nationalities, most of which had nothing to do with 09/11, were profiled and detained at airports, pulled over and harassed by cops, assaulted and ridiculed by people who just lumped the middle east into one pot.

    3. Attacks based on a person’s race, religion, or other characteristics are known as hate crimes. Hate crimes in the United States evolved from the time of early European settlers and their violence toward Native Americans. Such crimes weren’t investigated until the early 1900s, when the Ku Klux Klan began to draw national attention for its activities against Black people and other groups. The term “hate crime,” however, didn’t become official until the 1980s (Federal

      It is shocking to me that Hate crimes were not investigated prior to the early 1900's. No wonder they go unreported! Our world has not taken the seriously in the least bit until the 1900's. I would imagine many victims feel as though there is no point

    4. Driving with a blood alcohol percentage over the state’s limit is a crime. Like other forms of deviance, however, ambiguity exists concerning what constitutes a crime and whether all crimes are, in fact, “bad” and deserve punishment. For example, during the 1960s, civil rights activists often violated laws intentionally as part of their effort to bring about racial equality. In hindsight, we recognize that the laws that deemed many of their actions crimes—for instance, Rosa Parks refusing to give up her seat to a White man—were inconsistent with social equality. As you have learned, all societies have informal and formal ways of maintaining social control. Within these systems of norms, societies have legal codes that maintain formal social control through laws, which are rules adopted and enforced by a political authority.

      In my opinion, these laws were unjust to begin with, and it is sad that people like Rosa Parks had to fight so hard simply to sit where she wanted to on the bus, or that anyone was deprived their right to an education, or their right to vote. People had to die just to bring attention to the fact that these laws were discriminatory and unjust.

    5. FunctionalismAssociated TheoristDeviance arises from:Strain TheoryRobert MertonA lack of ways to reach socially accepted goals by accepted methodsSocial Disorganization TheoryUniversity of Chicago researchersWeak social ties and a lack of social control; society has lost the ability to enforce norms with some groupsConflict TheoryAssociated TheoristDeviance arises from:Unequal SystemKarl MarxInequalities in wealth and power that arise from the economic systemPower EliteC. Wright MillsAbility of those in power to define deviance in ways that maintain the status quoSymbolic InteractionismAssociated TheoristDeviance arises from:Labeling TheoryEdwin LemertThe reactions of others, particularly those in power who are able to determine labelsDifferential Association TheoryEdwin SutherlandLearning and modeling deviant behavior seen in other people close to the individualControl TheoryTravis HirschiFeelings of disconnection from society Table 7.2

      Refer. back to this when writing my discussion topic and essay .

    6. Sutherland’s theory may explain why crime is multigenerational. A longitudinal study beginning in the 1960s found that the best predictor of antisocial and criminal behavior in children was whether their parents had been convicted of a crime (Todd and Jury 1996). Children who were younger than ten years old when their parents were convicted were more likely than other children to engage in spousal abuse and criminal behavior by their early thirties. Even when taking socioeconomic factors such as dangerous neighborhoods, poor school systems, and overcrowded housing into consideration, researchers found that parents were the main influence on the behavior of their offspring (Todd and Jury 1996).

      My husband and his siblings were raised by the same mother and father. One son, my husband, the middle child, always stayed between the lines and followed tall of he rules, he was well liked, got good grades, put himself through college while working full time and became an aeronautical engineer.and would often accept punishment for deviant behavior committed by his brother to keep the peace.He also got the least attention. He is the most conscientious loving , trustworthy and loyal person I know. To me this contradicts Edwin Sutherlands differential association theory.

      His older brother, began using drugs at a very early age, sniffed glue at 9, took downers or reds at 12, and essentially became sexually active at 12 or 13m because their adult neighbor seduced him. Much of this his parents were oblivious to. He was put on behavioral medications as a child, and commanded a lot of attention. As a young man he joined the military and after going AWOL several times was ulitimatley dishonorably discharged. In later life he became an i.v. meth user, contracted HIV from sharing needles, went through countless rehabs, and ultimately died as an overdose. To this day his parents are in denial about who he had become.

      His youngest brother by 7 years also became sexually active at a very young age. The same neighbor sexually abused him. He became a womanizer often having 3 to 4 women who all thought the were the only one. He has never held a real job, Had two children that he loves but never really helped the Mom with any sort of support , financially or in caring for the kids. but has managed to find women with lots of money support him. He lived with their parents on and off into his 50's. Just recently at 60 years old he seems to have settled down with one woman. She is also a very wealthy woman who is happy to take care of him.

    7. Under the Fourteenth Amendment, states are allowed to deny voting privileges to individuals who have participated in “rebellion or other crime” (Krajick 2004). Although there are no federally mandated laws on the matter, most states practice at least one form of felony disenfranchisement. Is it fair to prevent citizens from participating in such an important process? Proponents of disfranchisement laws argue that felons have a debt to pay to society. Being stripped of their right to vote is part of the punishment for criminal deeds. Such proponents point out that voting isn’t the only instance in which ex-felons are denied rights; state laws also ban released criminals from holding public office, obtaining professional licenses, and sometimes even inheriting property (Lott and Jones 2008).

      Yet we allow our sitting president with 28 felony conviction, hold public office, vote, and literally face zero consequences for his actions. what male privilege to it's core.

    8. Labeling theory examines the ascribing of a deviant behavior to another person by members of society. Thus, what is considered deviant is determined not so much by the behaviors themselves or the people who commit them, but by the reactions of others to these behaviors. As a result, what is considered deviant changes over time and can vary significantly across cultures.

      In the opinion of the religious right if a woman chooses to have an abortion they are murderers, where others strongly believe it's my body it's my choice.

    9. The student is reprimanded frequently by teachers and school staff, and soon enough, develops a reputation as a “troublemaker.” As a result, the student starts acting out even more and breaking more rules; the student has adopted the “troublemaker” label and embraced this deviant identity. Secondary deviance can be so strong that it bestows a master status on an individual. A master status is a label that describes the chief characteristic of an individual. Some people see themselves primarily as doctors, artists, or grandfathers. Others see themselves as beggars, convicts, or addicts.

      If you are continually tell someone they are bad they become bad. refer back to book whale done.

    10. Conflict theory was greatly influenced by the work of German philosopher, economist, and social scientist Karl Marx. Marx believed that the general population was divided into two groups. He labeled the wealthy, who controlled the means of production and business, the bourgeois. He labeled the workers who depended on the bourgeois for employment and survival the proletariat. Marx believed that the bourgeois centralized their power and influence through government, laws, and other authority agencies in order to maintain and expand their positions of power in society. Though Marx spoke little of deviance, his ideas created the foundation for conflict theorists who study the intersection of deviance and crime with wealth and power.

      How is it that over 100 years later we are still living under this system?

    11. High rates of poverty and single-parent homes correlated with high rates of juvenile violence. Research into social disorganization theory can greatly influence public policy. For instance, studies have found that children from disadvantaged communities who attend preschool programs that teach basic social skills are significantly less likely to engage in criminal activity. (Lally 1987)

      This alligns with the fact that the first 3 to 4 years of life play the largest role in who we become.

    12. : Those who conform choose not to deviate. They pursue their goals to the extent that they can through socially accepted means. Innovation: Those who innovate pursue goals they cannot reach through legitimate means by instead using criminal or deviant means. Ritualism: People who ritualize lower their goals until they can reach them through socially acceptable ways. These members of society focus on conformity rather than attaining a distant dream. Retreatism: Others retreat and reject society’s goals and means. Some people who beg and people who are homeless have withdrawn from society’s goal of financial success. Rebellion: A handful of people rebel and replace a society’s goals and means with their own. Terrorists or freedom fighters look to overthrow a society’s goals through socially unacceptable

      Conformity ex: People who stay within the lines. they may be very goal oriented, will not go outside of the acceptable means to get there. Innovation exp: Also goal oriented, and will do whatever it takes to achieve those goals even it that means going outside of acceptable norms. Ritualism: These are people that just lower the bar and reduce their goals until they can reach whatever they can achieve within the acceptable means. Retreatism: These are people that for whatever reason just give up. they do not see themselves able or worthy to achieve or have any goals Many homeless people have retreated from society's goal of financial success. These could have been people that had resources, but perhaps were beaten down to feel that they were not worthy. Rebellion: People who rebel tend to reject societal norms, bringing there own agenda into place. I believe there can be both positive and negative forms of rebellion.

    13. which notes that access to socially acceptable goals plays a part in determining whether a person conforms or deviates. From birth, we’re encouraged to achieve the “American Dream” of financial success.

      which notes that access to socially acceptable goals plays a part in determining whether a person conforms or deviates. From birth, we’re encouraged to achieve the “American Dream” of financial success. How do we solve this system of inequity? The more money you have the more opportunities you receive, People with less money do not have access to those same opportunities. Think of all of the brilliant people that have been left behind, that we won't ever know about simply because they never got the opportunity . potential inventors, thought leaders, presidents. The system is not fair, and it surpresses growth

    14. For example, in large, industrialized societies that were largely bound together by the interdependence of work (the division of labor), punishments for deviance were generally less severe. In smaller, more homogeneous societies, deviance might be punished more severely.

      The sad thing is that with current leadership in the U.S. we are going backwards. The inequities are almost worse than ever before.

    1. u Bois continues to affirm these imaginative possibilities through the graphical innovation of the second series of charts, which focuses on the “condition of the descendants of former African slaves now resident in the United States of America,” as its introductory chart explains. In this series, Du Bois was also joined by his students as co-designers, as a later section of this chapter will further explore. Here, what is significant is how, in documenting the upward progress of Black Americans in a national and international context, Du Bois and his students make use of comparisons to other populations—and to other charts—in order to affirm a narrative of progress and possibility with respect to Black Americans' social, intellectual, and economic lives.

      I see a parallel in the display of charts and graphs presented by DuBois in Paris, and the effects of the release of the long-awaited Epstein files. It seems that all the carefully collated and refined gathering of and release of information can have no effect on a population that seems not to care at all. I wonder if the graphs and charts were found to be moving, eliciting empathy, from the Parisian viewing public as a whole? Was it only the abolitionist-minded and the Blacks themselves who were moved by the information contained therein? James Baldwin found a willing audience for his views on the Black experience in America, except his work was several decades after DuBois' exhibit. The exhibit offers a more positive image of the living conditions of the disenfranchised masses of rural Blacks that migrated to the cities in search of a better life than they had on the plantation. The amount of succinct information that was comprised by DuBois and his team was and is astounding and hard to disregard. Prejudices are hardly based in fact and these continue into our current century. I question whether the best and most articulate argument could then or now change the mind and opinion of those long-held biases regarding the worth of an entire race of people.

    2. about

      When enslaved, Blacks were not allowed under law to read. There were some whites, family members of slave owners, who disagreed with the law and saw no harm in teaching some slaves to read. The punishment for TEACHING was probably minor, no more than a slap on the wrist. For a slave who was discovered to have learned to read, the punishment was severe, so as to make an example to other slaves who might follow their lead. Once the slaves were emancipated, the statistics show that learning to read was a desired skill and one which was enthusiastically sought. The power of the white society tried to stifle the former slaves and their quest for education, if not for themselves, at the very least for their children and grandchildren.

    1. come California, Utah, Nevada, Arizona, Colorado, and Wyoming. This vast acquisition of land would have thousands of Mexicans faced a choice of leaving their land and homes to move within the new borders of their nation or remaining where they were to become Americans.

      I doubt our president knows this history

    1. Panel Aalso shows that farm value was not affected by tax policy. Overall, thereis little evidence that tax policy broke up farms or lowered farm value

      so where did the actual money go?

    2. $0.96 in 1870 to $0.98 in1880, while for counties with black politicians, revenue went from $1.56in 1870 to $0.89 in 1880.

      How was this also not no negative for the gov?

    3. This is the first quantitative evidence suggesting a strong effect of blackpolitical leadership on local public finance.

      I am more interested in the effect on education

    4. he existing scholarship about the known black politicianswas often incorrect and narratives about the illiteracy and poverty of theblack politicians was repeated in the historical narrative until the archivalwork in Foner (1996) and other histories were compiled. Indeed, thehistories of Reconstruction that noted black officials often did so deri-sively.

      Black politicians actually were not dumb, thank you very much

    5. notes that while some white officials sought to drasti-cally reduce all education expenditures after Redemption, the popularityof public schooling among whites led to fewer reductions in educationalexpenditures for whites

      Whites do more damage to the property taxes (more tied up in race and economy) than to public schools

    6. In Alabama, a property tax was proposed; inTexas, the sale of public lands was offered; in Maryland, changes to thestate tax code to allow local taxation were put forth; in South Carolina,Murray suggested that unclaimed Civil War bounties could be used; andNorth Carolina debated a specific consumer tax for education. GovernorHarrison Reed’s plan in Florida was to increase land assessments to fundpublic goods, and this model was followed in other Southern states byblack political leaders

      Needed to raise money for a school system

    7. The results here show that black political leadershipis an important and omitted factor in black socioeconomic outcomes afterthe Civil War.

      And also probably a significant lack afterwards

    8. Put another way, the tax effects of black poli-cymakers left no lasting effects on local public finance.

      In part because it wasn't given the chance to, the other reading of this is that redemption was a notably bad development.

    Annotators

    1. All

      The text and background are contrasting colours, which helps those with visual disabilities read the text clearly. Users can also easily recognize which page they are on as the call-to-action button is highlighted using the contrasting colour. The "All" button is white with black text when users are on it while all other buttons are black with white text.

    2. Home Home

      This page layout is very organized and thought out allowing those living with cognitive disabilities to easily navigate the website. Using icons on the side bar allows users to use visual cues to digest the text.

    3. Settings Sign in

      (I'm trying to add the annotation on the microphone icon beside the search bar, but the website won't allow me to highlight it.) This speech to text function allows those living with motor disabilities to search verbally rather than use a keyboard.

    1. When you interact with your classmates in your English class and learn the language of writing processes, for example, determining your rhetorical situation, you are participating in a specific discourse community

      Get to know your classmates and the community surrounding.

    1. In this textbook, we’ll cover the conventions of writing, and we’ll also cover some of the resources available to you as a CNM student. And since this book is free and available on the internet, you can keep it…forever!

      I would keep the book for any future references.

    1. Has meaningful experience(s)/insight to working on a team with examples

      Provided meaningful experience(s) that showed responsibility within the team, being communicative and supportive as well as possibly a moment of growth from a challenge and how they plan to use that in being an outstanding peer advisor.

    2. No meaningful experience working in a team/no insight without examples

      No meaningful experience provided or Applicant spoke ill of teammates/downgraded team support to highlight their own, no examples of responsibility within the team and showcased language/examples of being argumentative, hot-headed or even egotistical

    3. Clearly states how their qualities, skills and experiences would make them an outstanding Peer Advisor/how they will add to the Peer Advising Program. Provided specific examples.

      Offers an answer where organizational skills, resourcefulness, communication, and leadership/mentorship skills are main highlights. Supported by detailed examples of lived experiences where these skills are evident seen as intentional with room to grow, ask for support and makes it clear that community is a priority.

    4. Does not clearly state how their qualities, skills and experiences would make them an outstanding Peer Advisor/how they will add to the Peer Advising Program. Did not provide specific examples.

      Does not clearly state how their qualities, skills and experiences would make them an outstanding Peer Advisor/how they will add to the Peer Advising Program. Focuses on listing off leadership experience and lacks humility. Did not provide specific examples.

    5. Clearly states why they would like to become a Peer Advisor, what aspects of the position they find most appealing, and what they hope to gain from the position. Provides specific examples.

      Provides a well thought out and in-depth answer/explanation of what aspects of the position they found most appealing and what they hope to gain from this position; supported by concrete examples that showcases mental and emotional care towards others.

    1. This announcement of 15 May 2024 raised my curiosity. I found a review for the concert reporting that the CBS Sunday Morning segment on the song was featured on a big screen in-between songs (Anderson). Subsequently, Dupré “performed ‘Where That Came From,’ pausing to allow the audience to take in the rebirth of the Grammy winner’s soothing sound for a portion of the track” (Anderson).

      Impetus for the article!

    2. The media coverage of “Where That Came From” during the two-week period spanning the song’s release follows a clear and consistent pattern, and closely follows the narrative arc provided by the promotional strategies of Travis and Warner Nashville. In this dominant framing, the making of the song is reported as a human-interest story about how Travis was, after years, “given back” his voice, thanks to cutting-edge AI techniques. As I argue with the help of studies of similar dynamics in relation to technological advances in the field of biotechnology (Dow; Estreich), such a framing of the story as a human-interest story contributes to the normalization of AI, as it provides readers and viewers with a familiar point of reference for a new and potentially disruptive or controversial technology.

      Restates point of article -- what's being examined.

    3. For anyone familiar with Travis’s life story, the significance of this pledge was immediately apparent, considering the singer had been left with irreparable damage to the parts of the brain that are needed to sing or speak after a serious stroke in 2013. “Where That Came From” marks his first release of newly recorded music in over a decade.

      Background -- facts.

    4. Other concerns remain implicit in the reporting of the case; for instance, how this initiative is used by the record company to position itself as a key player in the development of ethical and responsible uses of AI, or how it may be integrated into lobbying efforts for further regulation of AI. In other words, we are witnessing here what Crawford has argued to be true for AI in general: that artificial intelligence involves an interplay of “technical and social practices, institutions and infrastructures, politics and culture” (8), but also a tendency to downplay the social and political interests that are at stake. With the help of work at the intersection of disability studies and sound studies (Friedner and Helmreich; Mills), I have argued that we are likely dealing with a case where a technology, which was originally presented with the promise of helping to compensate for a disability, will end up preparing the ground for other uses of the technology that are stripped of such lofty promises. To return to Mara Mills’s notion of an “assistive pretext” to describe this type of dynamic, one may wonder what this specific assistive pretext of helping the singer who had lost his voice to sing again, may turn out to be a precursor to. In the long run, after all, it seems unlikely that use of similar applications of AI will be limited to recreating the voices of singers who have lost their ability to sing, but not their ability to make public appearances affirming their consent.

      Other considerations- future expectations re AI and singers.

    5. In the social media campaign leading up to the release of the song in early May 2024, Travis reassured his fans: “In the meantime, just know that when it comes to me singing songs for you, there’s always more where that came from” (qtd. in Bartiromo and Petrulis)

      Some evidence

    6. In developing my analysis, I will draw on insights from the academic fields of sound studies and popular music studies, concerning ongoing developments and challenges related to the application of AI tools to the production of music (Keith et al.; Sterne and Razlogova; Bonini and Magaudda), the use of sound in assistive technologies for people with disabilities (Friedner and Helmreich; Mills), as well as notions of aesthetics and authenticity in country music (Peterson; Pecknold; Stimeling; Malone). Additionally, I will make use of scholarship in the field of science and technology studies (STS), which have studied similar dynamics in relation to new and controversial technologies not only in artificial intelligence (Gray and Suri; Crawford), but also in domains such as biotechnology (Dow; Estreich).

      Argument and a bit of Method -- states which experts and areas are examined and used to formulate this analysis.

    1. often require manual intervention or complex mapping logic in Clickpipes to prevent the pipeline from breaking.

      It's not as simple as just using CDC - there are a ton of downstream issues like these schema issues that makes it harder

    2. atency between a write in Postgres and its visibility in ClickHouse), meaning analytical queries may reflect stale data compared to the live transactional state.

      This delay is a big reason why having operationg and OLAP data together is useful

    1. These are not anomalies. The National Institutes of Health has stated, “Therapeutic development is a costly, complex and time-consuming process. The average length of time from target discovery to approval of a new drug is about 14 years. The failure rate during this process exceeds 95 percent, and the cost per successful drug can be $1 billion or more.”12

      anti side

    1. These choices as to selection and arrangement, so long as they are made independently by the compiler and entail a minimal degree of creativity, are sufficiently original

      So, creative decisions lead to originality of a work...creativity makes something original

    2. Originality is a constitutional requirement

      What's the distinction between originality and creativity? From the way it's used in this opinion it seems like creativity leads to originality...you can't have originality without creativity?

    1. Wer glaubt, kleine Airdrops oder Staking-Erträge auf dezentralen Plattformen (DeFi) blieben unsichtbar, unterschätzt die neuen Forensik-Tools der Steuerfahndung, die Geldflüsse auf der Blockchain heute präzise mit realen Identitäten verknüpfen.

      Delete this paragraph and replace it with the following:

      Besonders tückisch: Viele DeFi-Nutzer erhalten diese Rewards täglich oder wöchentlich automatisiert in ihre Wallets. Was sich wie ein netter Bonus anfühlt, summiert sich im Hintergrund schnell zu einer steuerpflichtigen Lawine, die dank der neuen Transparenzregeln ab 2026 sichtbar wird.

      Also make a note that we double check thios with Birgit, our text expert.

    2. Das Kryptowerte-Steuertransparenzgesetz, das Ende 2025 in Kraft trat, breitet sich auf über 30 Seiten aus und bietet ein Regelwerk zur Melde- und Dokumentationspflicht, wie es sich für einen bürokratischen Apparat gehört.

      Delete the following text in this sentence: "wie es sich für einen bürokratischen Apparat gehört"

    3. Erhebungsdefizit bei Krypto-Gewinnen 97% unversteuert 3% 97% unversteuert 3% korrekt versteuert Experten schätzen, dass bislang nur etwa 3 % der Krypto-Gewinne korrekt versteuert wurden. Die Steuerfahndung NRW hat im September 2025 rund 4.000 Konto-Datensätze einer Kryptobörse übernommen. Quellen: Finanzministerium Hessen, Stellungnahme Deutsche Steuergewerkschaft & Crypto Tax Report 2025 Germany

      delete the following text: "Experten schätzen, dass bislang nur etwa 3 % der Krypto-Gewinne korrekt versteuert wurden. Die Steuerfahndung NRW hat im September 2025 rund 4.000 Konto-Datensätze einer Kryptobörse übernommen."

    4. Aber, wenn du dachtest, Bitcoin & Co. seien nur was für Tech-Geek-Memes und Tesla-Jünger, dann aufgepasst: Rund zwölf Prozent der Deutschen besitzen Kryptowährungen. Das sind rund 7 Millionen Menschen. Und allein 2024 realisierten diese Krypto-Nutzer geschätzte 47,3 Mrd. Euro Gewinn. Eine ordentliche Summe, an der das Finanzamt durchaus interessiert ist.

      After this paragraph add a new paragraph with the following text: "Experten schätzen, dass aktuell gerade einmal 3 % dieser Gewinne korrekt versteuert werden."

    5. 6.000 Datensätze von Social-Media-Influencernwerden aktuell analysiert 300 Mio. € strafrechtlich relevantesSteuervolumen Quelle: Landesamt zur Bekämpfung der Finanzkriminalität NRW

      correct this image with the following copy:

      Left Side (under 6.000): "Geprüfte Social-Media-Datensätze auf Verdacht von Unregelmäßigkeiten"

      Right Side (under 300 Mio. €): "Daraus resultierendes, steuerlich relevantes Volumen"

      The text on the bottom ("Quelle: .... " stays the same)

    6. Wir haben deshalb die kritischsten Schnittstellen identifiziert, an denen Algorithmen heute Unstimmigkeiten finden, und erklären, wie du diese entschärfst.

      add a paragraph between this sentence and the previous paragraph.

    7. Countdown zur Transparenz: Wie sich das digitale Netz des Fiskus schließt Januar 2023 PStTG tritt in Kraft Juli 2024 Erste Meldepflichten greifen Juli 2025 Kryptowerte-Steuertransparenzgesetz Dezember 2025 Technische Schnittstellen finalisiert 31. Januar 2026 Erste Meldefrist unter neuem System März 2026 ELSTER-Update / Datenintegration Mitte 2026 Flächendeckende Auswertung startet Januar 2027 Automatischer Datenabgleich vollständig aktiv Viele technische Schnittstellen zwischen dem Bundeszentralamt für Steuern (BZSt) und den Landesfinanzbehörden werden erst im Laufe des Jahres 2025 finalisiert, sodass die flächendeckende Auswertung im Veranlagungszeitraum 2026 Premiere feiert.

      Please update the text in this table as follows:

      Januar 2023 (keep as it is) Juli 2024 (keep as it is, but add "131k Datensätze gehen an die Finanzämter") Juli 2025 (delete "Kryptowerte-Steuertransparenzgesetz" instead write "157k Datenzätze gehen an die Finanzämter, ein Ansteig von 20% zum Vorjahr) Dezember 2025 (delete "Technische Schnittstellen finalisiert" instead write "Kryptowerte-Steuertransparenzgesetz") Januar 2026 (delete "Erste Meldefrist unter neuem System" instead write "Kryptobörsen müssen Nutzeridentitäten und Transaktionen lückenlos erfassen") März 2026: (delete "ELSTER-UPDATE/DAtenintegration" instead write "Datenintegration" Januar 2027: (keep as it is)

      text on the bottom: keep as it is.

    1. differences in the composition of income growth and its translation into housing demand—as opposed to differences in housing supply—can explain both the higher average price growth and low growth in quantity in some metro areas

      Housing market dynamics

    1. the term ‘civil society’ refers to the broad network of community and voluntary organisations and associations that operate neither as part of government, nor as private market organisations (S

      definition of Civil Society

    2. due to growing animosity towards NGOs, the Commission’s perception of CSOs as sources of legitimation has been altered; the Commission is now more suspicious of their capacity to enhance the democratic credentials of the EU. However, the Commission has framed CSOs as important contributors to the output legitimacy of EU policies, emphasising the role of civil society in the implementation of migration policies through socioeconomic reforms, providing services and ‘debunking’ migration-related information.

      Okay (conc) - Basically have become WARY of emphasising role of CSOs (which are NGOs ultimately) in democratic legitimisation process as INPUTS -> POPULIST TURN HAS LEFT PEOPLE SUSPICIOUS OF "ELITES" AND EXPERT BODIES, see CSOs as one such example - Instead see CSOs more as output / legitimisers of EU policy -> need PARTICIPATION OF "CIVIL SOCIETY" in order to enact EU democracy / make it more democratic - So still a legitimization tool, if perhaps from a different angle. - Commission FRAMES role of CSOs in EU democracy differently - CSOs as consultative bodies are radioactive (elite-adjjacent) -> but as sheriffs in EU legislation are okay

    3. Moreover, while in 2013 and 2014 the Commission frequently associated civil society with democracy in its documents, the frequency of these associations has plunged since the populist turn. These findings may indicate that the Commission – following the populist turn and growing animosities towards NGOs – indeed uses civil society less as a legitimising tool understood in terms of input legitimacy and the contribution of CSOs to EU democratic governance.

      Confused about the definition of "Civil Society" -> says Commission has downplayed rhetoric about role of civil society since crisis -> uses it LESS as input legitimising tool and more as output?

    4. hus, this article is concerned with the question of whether civil society is still performing a legitimising function in the new context characterised by the growing animosity against CSOs. We expect the Commission to use to a lesser extent CSOs as an input legitimacy source; however, in the specific context of the refugee crisis, we expect the Commission to rely on CSOs when it comes to output legitimacy,

      AHA -> I understand. Commission's "attitude" towards CSOs is not one of favouring/disfavouring -> instead one of USE. CSOs are supposed to be INPUT bodies -> BUT NOW SINCE REFUGEE CRISIS ARE ALSO OUTPUT BODIES IN THIS SPECIFIC CONTEXT -> i.e., they do not just consult on legislation, they help ENACT IT