22 Matching Annotations
  1. Last 7 days
    1. A meme is a piece of culture that might reproduce in an evolutionary fashion, like a hummable tune that someone hears and starts humming to themselves, perhaps changing it, and then others overhearing next. In this view, any piece of human culture can be considered a meme that is spreading (or failing to spread) according to evolutionary forces. So we can use an evolutionary perspective to consider the spread of:

      It's intriguing to consider memes from an evolutionary perspective, where their "fitness" could be determined by their ability to capture attention and compel sharing. This view challenges us to question which aspects of a meme make it more likely to survive and proliferate in the competitive environment of social media, akin to biological traits in natural selection.

    2. Replication (with Inheritance) An organism can make a new copy of itself, which inherits its characteristics Variations / Mutations The characteristics of an organism are sometimes changed, in a way that can be inherited by future copies Natural Selection Some characteristics make it more or less likely for an organism to compete for resources, survive, and make copies of itself

      As habitats transform due to shifting climates, we observe real-time natural selection where only those species that can adapt to new conditions, or migrate to more suitable habitats, will survive. This demonstrates a dynamic example of Darwin's principles at work in the modern world, highlighting the urgent need for conservation efforts to preserve biodiversity.

    1. Now, how these algorithms precisely work is hard to know, because social media sites keep these algorithms secret, probably for multiple reasons: They don’t want another social media site copying their hard work in coming up with an algorithm They don’t want users to see the algorithm and then be able to complain about specific details They don’t want malicious users to see the algorithm and figure out how to best make their content go viral

      The rationale for keeping recommendation algorithms secret raises significant ethical questions about transparency and user control on social media platforms. While the reasons for secrecy are understandable from a business perspective, they can be frustrating for users who wish to understand and possibly influence what they see online. This lack of transparency can also hinder academic and regulatory efforts to assess the fairness and biases of these algorithms. It prompts me to question whether there should be more public oversight or standards that these platforms need to meet, similar to other industries that significantly influence public opinion and behavior.

    2. When social media platforms show users a series of posts, updates, friend suggestions, ads, or anything really, they have to use some method of determining which things to show users. The method of determining what is shown to users is called a recommendation algorithm, which is an algorithm (a series of steps or rules, such as in a computer program) that recommends posts for users to see, people for users to follow, ads for users to view, or reminders for users.

      theoretical discussions about the consequences of personalized technology. It also raises questions about the responsibility of tech companies in managing these algorithms to avoid societal fragmentation. I'd be interested in exploring more recent studies that examine whether users are becoming more aware of these bubbles and if that awareness affects their interaction with content differently.

  2. Apr 2024
    1. Some disabilities are visible disabilities that other people can notice by observing the disabled person (e.g., wearing glasses is an indication of a visual disability, or a missing limb might be noticeable). Other disabilities are invisible disabilities that other people cannot notice by observing the disabled person

      People with conditions like chronic pain, mental health issues, or sensory impairments that are not immediately apparent face significant barriers not only in accessing support but also in having their conditions recognized as legitimate. This calls for a broader understanding and sensitivity towards all forms of disability, emphasizing that not all disabilities are apparent and that all deserve equal recognition and accommodation.

    2. A disability is an ability that a person doesn’t have, but that their society expects them to have.1 For example: If a building only has staircases to get up to the second floor (it was built assuming everyone could walk up stairs), then someone who cannot get up stairs has a disability in that situation. If a physical picture book was made with the assumption that people would be able to see the pictures, then someone who cannot see has a disability in that situation.

      One of the sources cited in the chapter discusses the principles of universal design in architecture. This source emphasizes that designing environments and products to be usable by all people, to the greatest extent possible, without the need for adaptation or specialized design, not only assists individuals with disabilities but also benefits the broader population.

    1. Some governments and laws protect the privacy of individuals (using a Natural Rights ethical framing). These include the European Union’s General Data Protection Regulation [i3] (GDPR), which includes a “right to be forgotten”, and the United State’s Supreme Court has at times inferred a constitutional right to privacy [i4].

      The detail about the "right to be forgotten" offers a compelling juxtaposition to how data permanency is handled in the U.S., which lacks a direct counterpart. This highlights a significant cultural and legal divide in attitudes toward data privacy and individual autonomy, underscoring the need for a more harmonized global approach to privacy rights.

    2. But in most cases those “private” messages are stored in the computers at those companies, and the company might have computer programs that automatically search through the messages, and people with the right permissions might be able to view them directly.

      This chapter's examination of data privacy in digital communications sparked an emotional reaction in me, particularly the discussion on how "private" messages aren't truly private. It's disconcerting to realize the extent to which our supposed confidential interactions are accessible to company algorithms and potentially employees. This highlights a significant gap in public understanding about what privacy means in the digital age, underscoring the need for clearer regulations and transparency from tech companies about data handling practices.

    1. So, if an advertiser sees their ad is being displayed on an Amazon page for shoes, then the advertiser can start showing shoe ads to that same user when they go to another website.

      The chapter's discussion on advertisers tracking user behavior across websites using ad displays, like on Amazon for shoes, brings up mixed feelings. While I understand the commercial value and efficiency this provides in marketing, it also raises concerns about privacy. It makes me question where the line should be drawn between effective marketing and respecting user privacy.

    1. If you are interested in learning more about what you can do with praw and what information you can get back, you can look at the official documentation for those. But be warned they are not organized in a friendly way for newcomers and take some getting used to to figure out what these documentation pages are talking about.

      Navigating the official PRAW documentation can be quite daunting due to its complex organization, reminiscent of my early days learning programming. Community forums and blogs are essential, as they break down complex topics into more digestible parts, providing a gentler introduction to newcomers. This experience highlights the crucial role of community support in mastering new technologies.

    1. If the immediate goal of the action of trolling is to cause disruption or provoke emotional reactions, what is it that makes people want to do this disruption or provoking of emotional reactions?

      My personal opinion is that the chapter could further delve into psychological and societal contexts that fuel such behaviors. I have observed that environments lacking in constructive engagement or facing conflict often become fertile grounds for trolls. How can platforms better design their community rules or algorithms to not only deter trolling but also encourage positive engagement

    2. Trolling is when an Internet user posts inauthentically (often false, upsetting, or strange) with the goal of causing disruption or provoking an emotional reaction. When the goal is provoking an emotional reaction, it is often for a negative emotion, such as anger or emotional pain.

      The definition of "trolling" provided prompts me to consider its impact on online communities. Trolling often deteriorates meaningful discourse and can alienate positive contributors. This experience leads me to question whether internet platforms should enforce stricter regulations to curb such behaviors, balancing the need to protect free speech while fostering a respectful community environment.

    1. Does anonymity discourage authenticity and encourage inauthentic behavior?

      The question of whether anonymity discourages authenticity and encourages inauthentic behavior touches on a complex interplay between identity, social interaction, and moral behavior. Anonymity online can indeed create a double-edged sword. On one hand, it provides a veil that can embolden individuals to express opinions or perform actions they would not normally undertake in identifiable contexts, potentially leading to inauthentic expressions or harmful behaviors shielded by anonymity. This phenomenon can be observed in various online platforms where anonymous users engage in trolling or cyberbullying, behaviors they might not exhibit under their real identities due to social and legal repercussions.

    1. Many users were upset that what they had been watching wasn’t authentic. That is, users believed the channel was presenting itself as true events about a real girl, and it wasn’t that at all. Though, even after users discovered it was fictional, the channel continued to grow in popularity.

      The scenario where viewers felt misled by a channel's content, believing it to depict real events when it was actually fictional, touches on the delicate balance between storytelling and authenticity in digital media. This incident illustrates the importance of transparency between content creators and their audience, as trust can be easily jeopardized by perceived deception. It raises questions about the value we place on creativity and storytelling versus our desire for genuine content, urging a reflection on the evolving nature of authenticity in the digital era.

    1. For example, ads in mobile games make the “x” you need to press incredibly small and hard to press to make it harder to leave their ad:

      The use of an incredibly small “x” button is particularly insidious because it preys on the user's intention to dismiss the ad, leveraging the fine motor skills challenge it poses to instead increase the likelihood of a mis-click that benefits the advertiser through click-through rates. This strategy, while potentially beneficial for the ad's metrics, raises significant ethical concerns. It undermines trust between the user and the application by prioritizing ad revenue over user experience and comfort.

    1. One of the early ways of social communication across the internet was with Email [e5], which originated in the 1960s and 1970s. These allowed people to send messages to each other, and look up if any new messages had been sent to them.

      The advent of email changed the way information is shared and how people interact with each other, paving the way for the internet to serve as a global communication platform. It's particularly interesting to compare the original intent and use of email to its role in today's digital ecosystem. In the early days, the purpose was to send simple messages or share information within a small group or organization. Now, email has become an important tool for personal communication, business transactions, marketing, and more.

    1. Can you think of an example of pernicious ignorance in social media interaction? What’s something that we might often prefer to overlook when deciding what is important?

      One example is the dissemination of unverified health information, such as false self-medication methods or vaccine rumors. The dissemination of such information not only misleads people, but can also pose a real threat to public health. When deciding on the importance of information, we often overlook the reliability and scientific basis of the source, leading to misbelief and dissemination of inaccurate or harmful information. It is therefore crucial to develop the habit of critical thinking and of verifying sources of information.

    1. Metadata is information about some data. So we often think about a dataset as consisting of the main pieces of data (whatever those are in a specific situation), and whatever other information we have about that data (metadata).

      This passage on the difference between data and metadata reminds us that metadata is more than just background information; it actually gives deeper meaning and context to the primary data. Like when taking a photo, the photo itself is the data, and the information about when and where it was taken is the metadata that enriches our understanding of the photo. This makes me think about how we rely on metadata to organize and interpret information in the digital age, and the privacy and data protection issues behind it.

    1. Bots present a similar disconnect between intentions and actions. Bot programs are written by one or more people, potentially all with different intentions, and they are run by others people, or sometimes scheduled by people to be run by computers.

      Bots present a similar disconnect between intentions and actions. Bot programs are written by one or more people, potentially all with different intentions, and they are run by others people, or sometimes scheduled by people to be run by computers.

    1. Bots, on the other hand, will do actions through social media accounts and can appear to be like any other user. The bot might be the only thing posting to the account, or human users might sometimes use a bot to post for them.

      I know a little bit about this. As far as I know there are some webcasters who will plant quite a few bots in their own booths, and a large portion of them he will swipe simple comments in the booth to act as if they have a lot of popularity. There are also some bots that will video record the entire broadcast and send it in batches to short video platforms to get traffic.

  3. Mar 2024
    1. Being and becoming an exemplary person (e.g., benevolent; sincere; honoring and sacrificing to ancestors; respectful to parents, elders and authorities, taking care of children and the young; generous to family and others). These traits are often performed and achieved through ceremonies and rituals (including sacrificing to ancestors, music, and tea drinking), resulting in a harmonious society.

      Confucianism seems to me to be the greater influence on me personally. When I grew up in Chinese education, I was often taught the writings of Confucius. And the overall education is trying to make us exemplary people. So I think Confucianism has had a profound influence on China.

    2. Act with unforced actions in harmony with the natural cycles of the universe. Trying to force something to happen will likely backfire.

      I think the Taoist view is more in line with my inner thoughts. "Trying to force something to happen can be counterproductive" and I'm sure it's not just me, a lot of people feel that way. The more you try to do something right, the more likely you tend to make mistakes. I often do tell myself to focus and be calm, but the more I think about it the harder it is to get into the zone.