38 Matching Annotations
  1. Mar 2024
    1. 21.3.2. As a Member of Society# As a member of society, we hope you are informed about the role social media plays in shaping society, such as how design decisions and bots can influence social movements (polarizing, spreading, or stifling different them), and the different economic, social, and governmental pressures that social media platforms operate under. We hope you are then able to advocate for ways of improving how social media operates in society. That might be through voting, or pressuring government officials, or spreading ideas and information, or organizing coordinated actions or protests.

      As a society, we should recognize the important role that social media plays in shaping society and actively work to improve the way it operates. This means that we need to pay attention to the impact of social media platforms on social movements and public opinion, and how they are affected by economic, social and political pressures.

    1. 21.2. Ethics in Tech# In the first chapter of our book we quoted actor Kumail Nanjiani on tech innovators’ lack of consideration of ethical implications of their work. Of course, concerns about the implications of technological advancement are nothing new. In Plato’s Phaedrus (~370BCE), Socrates tells (or makes up1) a story from Egypt critical of the invention of writing: Now in those days the god Thamus was the king of the whole country of Egypt, […] [then] came Theuth and showed his inventions, desiring that the other Egyptians might be allowed to have the benefit of them; […] [W]hen they came to letters, This, said Theuth, will make the Egyptians wiser and give them better memories; it is a specific both for the memory and for the wit.

      In this story, Socrates alludes to the possible ill effects of technological advances, or at least the challenges that could be posed to the social order and power structure, by raising the concerns of the Egyptian king, the god Thamus, about the invention of writing.

    1. 19.5. Imagining Alternatives# Now try thinking about different ways online social media could work. Are these alternatives good ideas? 🤷 Reflect on these prompts and try to work out what the consequences would be for different ways of social media working: What if government regulations said that social media sites weren’t allowed to make money based on personal data / targeted advertising? What other business models could they use? How would social media sites be different? What if government regulations were made to encourage a free market by requiring that users could switch social media sites easily (interoperability). How would this work? Would you be able to move all your data? Would you still be able to see the content your friends post on the site you used to be on? What if there were a social media site funded by the government as a government service (e.g., democratic socialism)? What could this social media site do differently? What do you think would work well, what would work poorly? Private companies are allowed to restrict speech in ways government entities are not. How would this impact content moderation if government funds were used? What if social media sites were publicly funded or crowd-funded (like NPR for radio, and PBS for TV, Wikipedia)? Note: Mastodon is trying to do this.

      The question triggers deeper thinking about the different ways in which social media operate. Encouraging interoperability may increase user choice, but may also pose challenges of data privacy and content consistency. Eliminating personal data/targeted advertising monetisation models may drive social media towards more transparent and user-orientated business models, but may also lead to changes in the functionality and experience of social media sites.

    1. 19.3.1. Competition# When Facebook started, there were already other social media platforms in use that Facebook had to compete against, but Facebook became dominant. Since then other companies have tried to compete with Facebook, with different levels of success. Google+ tried to mimic much of what Facebook did, but it got little use and never took off (not enough people to benefit from the network effect). Other social media sites have used more unique features to distinguish themselves from Facebook and get a foothold, such as Twitter with its character limit (forcing short messages, so you can see lots of posts in quick succession), Vine and then TikTok based on short videos, etc. Mastodon (Fediverse set of connected social media platforms that it is part of) has a different way of distinguishing itself as a social media network, in that it is an open-source, community-funded social media network (no ads), and hopes people will join to get away from corporate control. Other social media networks have focused on parts of the world where Facebook was less dominant, and so they got a foothold there first, and then spread, like the social media platforms in China (e.g., Sina Weibo, QQ, and TikTok).

      This passage summarises the competitive landscape and strategies between different social media platforms. It explains that successful social media platforms usually need to find differentiation in terms of user experience, functional innovation and market positioning in order to attract and retain users.

  2. Feb 2024
    1. 8.3.2. Schadenfreude# Another way of considering public shaming is as schadenfreude, meaning the enjoyment obtained from the troubles of others. A 2009 satirical article from the parody news site The Onion satirizes public shaming as being for objectifying celebrities and being entertained by their misfortune: Media experts have been warning for months that American consumers will face starvation if Hollywood does not provide someone for them to put on a pedestal, worship, envy, download sex tapes of, and then topple and completely destroy. Nation Demands Fresh Celebrity Meat - The Onion

      Schadenfreude, the phenomenon of deriving pleasure from the misfortunes of others. I think this article is trying to tell us that this phenomenon is a kind of invasion of celebrities' private lives and disregard for privacy, as well as the media's excessive attention to celebrities' personal lives.

    1. While public criticism and shaming have always been a part of human culture, the Internet and social media have created new ways of doing so. We’ve seen examples of this before with Justine Sacco and with crowd harassment (particularly dogpiling). For an example of public shaming, we can look at late-night TV host Jimmy Kimmel’s annual Halloween prank, where he has parents film their children as they tell the parents tell the children that the parents ate all the kids’ Halloween candy. Parents post these videos online, where viewers are intended to laugh at the distress, despair, and sense of betrayal the children express. I will not link to these videos which I find horrible, but instead link you to these articles: Jimmy Kimmel’s Halloween prank can scar children. Why are we laughing? (archived copy) Jimmy Kimmel’s Halloween Candy Prank: Harmful Parenting? We can also consider events in the #MeToo movement as at least in part public shaming of sexual harassers (but also of course solidarity and organizing of victims of sexual harassment, and pushes for larger political, organizational, and social changes).

      While the show was an entertaining success, some were critical of the public shaming of the children.

    1. Ethics and Harassment# 17.4.1. Moderation and Violence# You might remember from Chapter 14 that social contracts, whether literal or metaphorical, involve groups of people all accepting limits to their freedoms. Because of this, some philosophers say that a state or nation is, fundamentally, violent. Violence in this case refers to the way that individual Natural Rights and freedoms are violated by external social constraints. This kind of violence is considered to be legitimated by the agreement to the social contract. This might be easier to understand if you imagine a medical scenario.

      It has provoked profound reflection on the complex relationship between the social contract and individual freedom. In particular, it challenges the traditional view of the State as a symbol of peace and order, suggesting instead that the State itself may exist on the basis of legitimized encroachments on individual freedoms.

    1. Harassment can also be done through crowds. Crowd harassment has also always been a part of culture, such as riots, mob violence, revolts, revolution, government persecution, etc. Social media then allows new ways for crowd harassment to occur. Crowd harassment includes all the forms of individual harassment we already mentioned (like bullying, stalking, etc.), but done by a group of people. Additionally, we can consider the following forms of crowd harassment: Dogpiling: When a crowd of people targets or harasses the same person. Public Shaming (this will be our next chapter) Cross-platform raids (e.g., 4chan group planning harassment on another platform) Stochastic terrorism The use of mass public communication, usually against a particular individual or group, which incites or inspires acts of terrorism which are statistically probable but happen seemingly at random. See also: An atmosphere of violence: Stochastic terror in American politics

      The possible negative impact of group behavior on individuals is emphasized, and the potential for such behavior to spread in the modern social media environment is noted. At the same time, it serves as a reminder that as technology evolves, society's understanding of and coping strategies for dealing with these behaviors will need to evolve and adapt.

    1. Example Crowdsourcing Tasks# You probably already have some ideas of how crowds can work together on things like editing articles on a site like Wikipedia or answer questions on a site like Quora, but let’s look at some other examples of how crowds can work together. Fold-It is a game that lets players attempt to fold proteins. At the time, researchers were having trouble getting computers to do this task for complex proteins, so they made a game for humans to try it. Researchers analyzed the best players’ results for their research and were able to publish scientific discoveries based on the contributions of players.

      This approach capitalizes on the collective problem-solving abilities of diverse groups, often leading to creative solutions that may not be found with traditional computational methods. This means that when people are motivated by fun and competition, they can contribute greatly to the scientific endeavor, sometimes leading to breakthroughs that professional scientists and advanced algorithms miss.

    1. 6.3.1. “Solving” a “Problem”# When social media users work together, we can consider what problem they are solving. For example, for some of the Tiktok Duet videos from the virality chapter, the “problem” would be something like “how do we create music out of this source video” and the different musicians contribute their own piece to the solution. For some other examples:

      This review emphasizes the participatory and community-driven nature of content creation on social media platforms, where "problem solving" can lead to rich content. The "problem" here is creative in nature-seeking innovative ways to build on the original video-while the "solution" is a colorful series of derivative works that enhance, reinterpret, or respond to the original.

    1. 15.2.1. Reddit# Reddit is divided into subreddits which are often about a specific topic. Each subreddit is moderated by volunteers who have special permissions, who Reddit forbids from making any money: Reddit is valued at more than ten billion dollars, yet it is extremely dependent on mods who work for absolutely nothing. Should they be paid, and does this lead to power-tripping mods? A post starting a discussion thread on reddit about reddit In addition to the subreddit moderators, all Reddit users can upvote or downvote comments and posts. The reddit recommendation algorithm promotes posts based on the upvotes and downvotes, and comments that get too many downvotes get automatically hidden. Finally, Reddit itself does some moderation as a platform in determining which subreddits can exist and has on occasion shut down some.

      This led to a discussion about whether these mods should be paid at all. Does paying change their motivation and behavior? This question really deserves deep consideration. On the one hand, paying a module may motivate more people to participate, improving the quality of management and user experience. On the other hand, paid mods may introduce commercialization factors, change the nature of the Reddit community, and may even lead to some negative consequences, such as conflicts of interest or abuse of power.

    1. Individual User Controls# Individual users are often given a set of moderation tools they can use themselves, such as: Block an account: a user can block an account from interacting with them or seeing their content Mute an account: a user can allow an account to try interacting with them, but the user will never see what that account did. Mute a phrase or topic: some platforms let users block content by phrases or topics (e.g., they are tired of hearing about cryptocurrencies, or they don’t want spoilers for the latest TV show). Delete: Some social media platforms let users delete content that was directed at them (e.g., replies to their post, posts on their wall, etc.) Report: Most social media sites allow users to report or flag content as needing moderation. And there are other options and nuances as well, depending on the platform.

      The responses to comments reflect users' attitudes and opinions about the content. Although it can be difficult to track down spammers, it is indeed a way to spot spam by watching the latest honest trailers on channels like ScreenJunkies, sorting the comments by "latest first" and then viewing the responses. If you find spam in your reply, it's important to report it proactively. Spam not only disrupts the order of the comment section, it may also contain harmful content and cause distress to other users. By reporting, you can help maintain a clean environment for social media platforms and protect the normal user experience.

    1. 12.4.1. Building on the original intention# Content is sometimes shared without modification fitting the original intention, but let’s look at ones where there is some sort of modification that aligns with the original intention.

      Describes creative interaction on social media, especially on platforms like TikTok, where users can add their own creativity to original content through a "duet" feature, forming a unique collaborative art form.

    2. Antagonistic to original intention# Sometimes content goes viral in a way that is against the intended purpose of the original content. For example, this TikTok started as a slightly awkward video of a TikToker introducing his girlfriend. Other TikTokers then used the duet feature to add an out-of-frame gun pointed at the girlfriend’s head, and her out-of-frame hands tied together, being held hostage. TikTokers continued to build on this with hostage negotiators, press conferences and news sources. All of this is almost certainly not the impression the original TikToker was trying to convey.a TikToker introducing his girlfriend. Other TikTokers then used the duet feature to add an out-of-frame gun pointed at the girlfriend’s head, and her out-of-frame hands tied together, being held hostage. TikTokers continued to build on this with hostage negotiators, press conferences and news sources. All of this is almost certainly not the impression the original TikToker was trying to convey.

      This text describes a situation in which content on social media may be distributed in a way that is contrary to the intended purpose of the original content. Comments could indicate the impact that this situation may have on the author of the original content and how social media platforms should respond to this situation to protect the interests of users and preserve the original intent of the content.

    1. When physical mail was dominant in the 1900s, one type of mail that spread around the US was a chain letter. Chain letters were letters that instructed the recipient to make their own copies of the letter and send them to people they knew. Some letters gave the reason for people to make copies might be as part of a pyramid scheme where you were supposed to send money to the people you got the letter from, but then the people you send the letter to would give you money. Other letters gave the reason for people to make copies that if they made copies, good things would happen to them, and if not bad things would, like this:

      It reflects people's belief in luck and chance at that time, and also reflects the germination of early pyramid marketing forms. The way chain letters are spread and the motivations behind them shed light on the psychological workings of humans in the face of temptation, as well as how beliefs and patterns of behavior are spread across social networks. So people need to have critical thinking.

    1. For social media content, replication means that the content (or a copy or modified version) gets seen by more people. Additionally, when a modified version gets distributed, future replications of that version will include the modification (a.k.a., inheritance). There are ways of duplicating that are built into social media platforms: Actions such as: liking, reposting, replying, and paid promotion get the original posting to show up for users more Actions like quote tweeting, or the TikTok Duet feature let people see the original content, but modified with new context. Social media sites also provide ways of embedding posts in other places, like in news articles There are also ways of replicating social media content that aren’t directly built into the social media platform, such as: copying images or text and reposting them yourself taking screenshots, and cross-posting to different sites

      This text explains in detail copying behaviour in a social media environment and its possible effects. The many forms of copying behaviour within social media platforms are explored, including actions such as liking, retweeting and replying, as well as methods of embedding posts on other websites.

    1. 11.3.1. How recommendations can go well or poorly# Friends or Follows:# Recommendations for friends or people to follow can go well when the algorithm finds you people you want to connect with. Recommendations can go poorly when they do something like recommend an ex or an abuser because they share many connections with you.

      This passage emphasises the impact of recommendation algorithms on the user experience. When recommendation algorithms are successful in recommending people for users that they want to connect with, this will have a positive effect. However, if the algorithm incorrectly recommends ex-boyfriends or individuals involved in abusive behaviour, this will have a negative impact on the user's experience. This highlights the challenge for recommendation algorithms in balancing the needs of the user with the safety of the individual, and the need to consider multiple factors to ensure algorithmic accuracy and user satisfaction.

    1. Similarly, recommendation algorithms are rules set in place that might produce biased, unfair, or unethical outcomes. This can happen whether or not the creators of the algorithm intended these outcomes. Once these algorithms are in place though, the have an influence on what happens on a social media site. Individuals still have responsibility with how they behave, but the system itself may be set up so that individual efforts cannot not be overcome the problems in the system.

      Indeed, biased, unfair or unethical results due to the rules set by recommendation algorithms is a problem that needs to be addressed. This can occur whether or not the algorithm creators intended it. Once implemented, these algorithms can have a significant impact on activity on social media platforms.

    1. Making a tool adapt to users# When creating computer programs, programmers can do things that aren’t possible with architecture (where Universal Design came out of), that is: programs can change how they work for each individual user. All people (including disabled people) have different abilities, and making a system that can modify how it runs to match the abilities a user has is called Ability based design. For example, a phone might detect that the user has gone from a dark to a light environment, and might automatically change the phone brightness or color scheme to be easier to read. Or a computer program might detect that a user’s hands tremble when they are trying to select something on the screen, and the computer might change the text size, or try to guess the intended selection.

      It was emphasised that when creating computer programs, programmers can adapt to the needs and ability levels of different users by implementing capability-based design. Competency-based design aims to enable systems to sense and respond to users' abilities, thereby providing a more personalised and inclusive user experience.

    2. 残疾人经常找到应对残疾的方法,即找到解决他们遇到的困难的方法,并寻找适合他们的地方和策略(无论是否意识到自己有残疾)。此外,残疾人可能会改变他们的行为(无论是有意还是无意)以隐藏他们有残疾的事实,这称为掩盖,可能会对掩盖的人造成精神或身体伤害,而周围的其他人不会意识到这一点。

      This quote emphasises the ability of persons with disabilities to adapt and their willingness to seek solutions in the face of disability. They often actively seek ways to cope with difficulties and try to adapt to their environment and situation, whether or not they realise they have a disability. However, it also refers to a possible phenomenon whereby persons with disabilities may choose to hide their disability and those around them may not be aware of it.

  3. Jan 2024
    1. Hacking attempts can be made on individuals, whether because the individual is the goal target, or because the individual works at a company which is the target. Hackers can target individuals with attacks like:

      The security of our information is dangerous because both individuals and companies can be targeted by hackers to break your passwords and access your personal information.

    2. For example, the proper security practice for storing user passwords is to use a special individual encryption process for each individual password. This way the database can only confirm that a password was the right one, but it can’t independently look up what the password is or even tell if two people used the same password. Therefore if someone had access to the database, the only way to figure out the right password is to use “brute force,” that is, keep guessing passwords until they guess the right one (and each guess takes a lot of time).

      This security approach demonstrates a strong strategy for protecting user passwords, emphasising the importance of encryption and limiting database functionality.

    1. One of the main goals of social media sites is to increase the time users are spending on their social media sites. The more time users spend, the more money the site can get from ads, and also the more power and influence those social media sites have over those users. So social media sites use the data they collect to try and figure out what keeps people using their site, and what can they do to convince those users they need to open it again later.

      The passage reveals the core of the social media business model of social media sites by stating that one of the main goals of social media sites is to increase the amount of time users spend on the platforms. The close connection between time investment and financial gain is emphasised. The relationship between user time and advertising revenue. Reveals the critical role of user time in its success.

    1. Data mining is the process of taking a set of data and trying to learn new things from it. Fig. 8.1 Clip from movie Everything Everywhere All at Once where the IRS agent talks about what information (“story”) she can mine from tax data.# For example, social media data about who you are friends with might be used to infer your sexual orientation. Social media data might also be used to infer people’s: Race Political leanings Interests Susceptibility to financial scams Being prone to addiction (e.g., gambling)

      This passage discusses the concept of data mining, the process of acquiring a set of data to learn new insights. The reference to tracking the ups and downs of life through a stack of receipts adds a narrative dimension to the otherwise abstract nature of data. Additionally, the reference to social media data being used to infer a person's friendships and perhaps even their sexual orientation highlights the powerful impact of data mining in revealing personal information. This passage emphasises the transformative potential of data mining.

    1. RIP trolling is where trolls find a memorial page and then all work together to mock the dead person and the people mourning them. Here’s one example from 2013: A Facebook memorial page dedicated to Matthew Kocher, who drowned July 27 in Lake Michigan, had attracted a group of Internet vandals who mocked the Tinley Park couple’s only child, posting photos of people drowning with taunting comments superimposed over the images.

      This is a form of egregious cyber-behaviour, whereby cyber-vandals ridicule the unethical behaviour of deceased persons and mourners on memorial pages. The actual existence of this behaviour and the negative impact on the victims and their families is conveyed through this case. It highlights the trend of inappropriate use of platforms by some users in the Internet space, which needs to be a cause for social concern and reflection.

    1. Before the internet, there were many activities that we would probably now call “trolling”, such as: Hazing: Causing difficulty or suffering for people who are new to a group Satire: (e.g., A Modest Proposal) which takes a known form, but does something unexpected or disruptive with it. Practical jokes / pranks

      the statement highlights that behaviour similar to what is now knows as "trolling" existed before the advent of the internet. Including bullying, satire and pranks, it reveals that "trolling"-like behaviour existed in a variety of forms and settings before the internet became the primary platform for such behaviour. It shows that the propensity to engage in disruptive or provocative behaviour has manifested itself in different historical contexts, revealing the persistence of certain human behaviours.

    1. 6.6.1. Anonymity encouraging inauthentic behavior# Anonymity can encourage inauthentic behavior because, with no way of tracing anything back to you1, you can get away with pretending you are someone you are not, or behaving in ways that would get your true self in trouble.

      This explores the impact of anonymity in encouraging inauthentic behaviours, provoking reflection on the deeper implications of anonymity for online behaviour and social dynamics. Anonymity can lead to engaging in behaviours that can get real identities into trouble. For example, actions or statements made in anonymity can have serious consequences when identified. Anonymity therefore sometimes provides an opportunity for people to avoid responsibility.

    1. While modified behaviors to present a persona or code switch may at first look inauthentic, they can be a way of authentically expressing ourselves in each particular setting. For example: Speaking in a formal manner when giving a presentation or answering questions in a courtroom may be a way of authentically sharing your experiences and emotions, but tailored to the setting Sharing those same experiences and emotions with a close friend may look very different, but still can be authentic Different communities have different expectations and meanings around behavior and presentation. So what is appropriate authentic behavior depends on what group you are from and what group you are interacting with, like this gif of President Obama below:

      This statement emphasises the relativity of behaviour, i.e. the same behaviour may present different expressions in different contexts. This quote emphasises that authenticity is a relative concept that depends on the specific environment and social context in which an individual finds themselves. For example, through the example of sharing an experience with a close friend, it emphasises that authenticity in an intimate relationship may be expressed in a more relaxed and natural way.

    1. 2003 saw the launch of several popular social networking services: Friendster, Myspace, and LinkedIn. These were websites where the primary purpose was to build personal profiles and create a network of connections with other people, and communicate with them. Facebook was launched in 2004 and soon put most of its competitors out of business, while YouTube, launched in 2005 became a different sort of social networking site built around video.

      This quote provides important information about the development of social networking services between 2003 and 2005, highlighting the rise of a number of key platforms and market changes. This period marks a rapid evolution of social networking that has had a profound impact on the way the Internet socializes.

    1. One of the early ways of social communication across the internet was with Email, which originated in the 1960s and 1970s. These allowed people to send messages to each other, and look up if any new messages had been sent to them.

      This quote describes the early form of social communication on the Internet, known as e-mail, which traces its origins back to the 1960s and 1970s. The early ways of social communication on the Internet mentioned in the quote emphasizes the evolution of social communication. Email, as an initial social networking tool, set the stage for the development of many more social platforms and tools that followed.

    2. 通过互联网进行社交交流的早期方式之一是与电子邮件,起源于20世纪60年代和1970年代。这些允许人们互相发送消息,并查看是否有新消息发送给他们。

      This quote describes the early form of social communication on the Internet, known as e-mail, which traces its origins back to the 1960s and 1970s. The early ways of social communication on the Internet mentioned in the quote emphasizes the evolution of social communication. Email, as an initial social networking tool, set the stage for the development of many more social platforms and tools that followed.

    1. There are many types of list data structures in different programming languages with subtle differences (we won’t worry about those in this book). Python has lists, tuples, and sets. Other languages have a list type called arrays. We will just focus on lists and not worry about the other similar data types.

      This sentence describes the diversity of list data structures in programming languages, emphasizes several list data structures in Python, and mentions possible differences in other languages. The author clarifies the focus for a more in-depth discussion in the text.

    2. 不同的编程语言中有多种类型的列表数据结构,并且存在细微的差异(我们不会担心本书中的那些)。Python 有列表、元组和集合。其他语言有一个名为的列表类型数组。我们将只关注列表,而不担心其他类似的数据类型。

      This sentence describes the diversity of list data structures in programming languages, emphasizes several list data structures in Python, and mentions possible differences in other languages. The author clarifies the focus for a more in-depth discussion in the text.

    1. Metadata is information about some data. So we often think about a dataset as consisting of the main pieces of data (whatever those are in a specific situation), and whatever other information we have about that data (metadata).

      Metadata Definition: First, the sentence states that metadata is information about certain data. This is the basic conceptual definition of metadata, i.e., it is information that describes or explains the data, not the data itself. Taken together, the sentence describes the concept of metadata and the role of metadata in a dataset, emphasizing the indispensability of metadata for effective management and understanding of data.

    1. Fig. 3.1 A photo that is likely from a click-farm, where a human computer is paid to do actions through multiple accounts, such as like a post or rate an app. For our purposes here, we consider this a type of automation, but we are not considering this a “bot,” since it is not using (electrical) computer programming.

      Click-farm is a very new topic to me, and this kind of behavior of pulling up software ratings by swiping is inherently unethical. If it does turn into bots doing this, then the efficiency will increase exponentially and the problem of false ratings created is getting worse.

    2. any

      The emergence of bots on social media is a double-edged sword. Bots have the unique ability to perform actions through their social media accounts while maintaining a normalcy similar to human users. This quote summarizes the multifaceted role of bots in social media, exploring their ability to mimic human behavior. But at the same time this ability to mimic can be intimidating, and bots can ai a lot of falsehoods.

    1. They don’t even have a pat rehearsed answer. They are shocked at being asked. Which means nobody is asking those questions. “We’re not making it for that reason but the way ppl choose to use it isn’t our fault. Safeguard will develop.” But tech is moving so fast.

      Kumail Nanjiani's reflection on the ethics of technology encapsulates the problem of the rapid advancement of technology versus the lag that often accompanies its use. We didn't make it for this reason, but the way people choose to use it is not our fault. The phrase 'safeguards will evolve' clearly reflects a common phenomenon in the technology industry, distancing itself between the creation of technology and its subsequent use. The rapid pace of technological development emphasizes the urgency of addressing ethical issues alongside technological advances.

    1. Twitter users were able to deduce which flight Justine was on.

      This quote captures contemporary concerns about privacy and the impact of social media on personal lives. It raises questions about the boundaries between the public and private spheres. The power and influence of social media platforms is further emphasized by the contact with Justine at the airport and the subsequent tweets. This incident demonstrates the speed at which information can be disseminated and the potential for personal experiences to become public fodder. Demonstrating that we are now in an age where every move may be recorded and broadcast.