36 Matching Annotations
  1. Mar 2025
  2. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Shalini Kantayya. Coded Bias. November 2020. URL: https://www.netflix.com/title/81328723 (visited on 2023-12-10).

      I watched coded bias's documentary. I learned about MIT researcher Joy Buolamwini's work on algorithmic bias in facial ten-fold technology. I was particularly impressed that the facial recognition system couldn't accurately identify her until she was wearing a white mask.

    1. We covered a number of topics in relation to social media:

      I think I have gained a lot of new perspectives and opinions on social media through this course. I used to look at social media from a user's point of view, but now I can look at things like accessibility, content moderation, and so on from a designer's point of view.

    1. Therefore it is the company leaders’ fiduciary duty [s11] to maximize the profits of the company (called the Friedman Doctrine [s12]).

      I learned a new concept through this passage. The fiduciary duty is that executives have a fiduciary duty to shareholders, which means that they need to make decisions that are beneficial to the company with the interests of shareholders as the center rather than their own interests as the center. The friedman doctrine is the shareholder primacy.

  3. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. James Chen. Corner A Market: What it is, How it Works, Legality. Investopedia, April 2022. URL: https://www.investopedia.com/terms/c/corneramarket.asp (visited on 2023-12-10).

      Through link I learned about the monopoly market. What I understand is that one company has the majority of the market. But I think the emergence of a monopoly market is actually very bad for consumers and other companies, because it is difficult for other companies to own a part of the field. And consumers don't have a choice so if the monopolistic institutions raise prices maliciously they may just have to pay.

  4. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Apartheid. December 2023. Page Version ID: 1189221484. URL: https://en.wikipedia.org/w/index.php?title=Apartheid&oldid=1189221484 (visited on 2023-12-10).

      When I read this link I fully understood the concept of apartheid. I was not familiar with this concept before because in my country there are not many people of different races and colors, but I know that in some other countries, such as the United States or South Africa introduced in the article, there is a policy of racial segregation. I think this policy just stratifies people and does harm to a lot of people especially black people who are judged to be low status.

    1. In at least some views about shame and childhood[1], shame and guilt hold different roles in childhood development [r1]: Shame is the feeling that “I am bad,” and the natural response to shame is for the individual to hide, or the community to ostracize the person. Guilt is the feeling that “This specific action I did was bad.” The natural response to feeling guilt is for the guilty person to want to repair the harm of their action. In this view [r1], a good parent might see their child doing something bad or dangerous, and tell them to stop. The child may feel shame (they might not be developmentally able to separate their identity from the momentary rejection). The parent may then comfort the child to let the child know that they are not being rejected as a person, it was just their action that was a problem. The child’s relationship with the parent is repaired, and over time the child will learn to feel guilt instead of shame and seek to repair harm instead of hide.

      I find the discussion of these two concepts very interesting. Shame is the rejection and denial of oneself but guilt is the realization that one's behavior is wrong and the desire to change it. On reflection, I also feel that I need to realize this. I should feel guilty instead of ashamed when I do something wrong or when I don't do something perfectly. I always seem to encounter the wrong things and I will negate my whole person like not doing well in the exam and I will think that I am a fool.

  5. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Roni Jacobson. I’ve Had a Cyberstalker Since I Was 12. Wired, 2016. URL: https://www.wired.com/2016/02/ive-had-a-cyberstalker-since-i-was-12/ (visited on 2023-12-10).

      When I read this article I felt very shocked. Because I had never experienced cyberstalking, it was very difficult for me to see the experience described in such detail because being a victim is supposed to be terrified for a long time. The harasser in the article has been stalking the author online and offline for up to 15 years. With advances in social media technology, harassers have even sent hundreds of defamatory letters to people close to many of the authors. When I thought it would definitely be a crime, I was as surprised as the author that such egregious behavior could not be punished. This makes me even more worried about the network security of social platforms.

    1. Individual harassment can also be done publicly before an audience (such as classmates or family). For example: Bullying: like posting public mean messages Impersonation: Making an account that appears to be from someone and having that account say things to embarrass or endanger the victim. Doxing [q1]: Publicly posting identifying information about someone (e.g., full name, address, phone number, etc.). Revenge porn / deep-fake porn Etc.

      I haven't experienced social media harassment but I have seen some. For example, there are a lot of girls who share their private messages with some very malicious remarks. Some of the words were offensive to their appearance and some were malicious in their desire to get to know them. I think this falls under the "bullying" mentioned above. In addition, I often see people searching for other people and then maliciously publishing private information online and leading malicious public opinions to hurt others. I think these actions are very bad.

  6. Feb 2025
  7. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Jeremy Gray. Missing hiker rescued after Twitter user tracks him down using his last-sent photo. DPReview, April 2021. URL: https://www.dpreview.com/news/0703531833/missing-hiker-rescued-after-twitter-user-tracks-him-down-using-a-photo (visited on 2023-12-08).

      When I read this example of ad-hoc crowdsourcing I felt amazing and lucky. Some twitter users are helping the search by looking at the last photos left by missing hikers as evidence of location. This is a good example to help solve the problem.

    1. When looking at who contributes in crowdsourcing systems, or with social media in generally, we almost always find that we can split the users into a small group of power users who do the majority of the contributions, and a very large group of lurkers who contribute little to nothing. For example, Nearly All of Wikipedia Is Written By Just 1 Percent of Its Editors [p33], and on StackOverflow “A 2013 study has found that 75% of users only ask one question, 65% only answer one question, and only 8% of users answer more than 5 questions.” [p34]. We see the same phenomenon on Twitter:

      This phenomenon of Internet lurkers is something I've experienced in real life. For example, I rarely post on social media, I usually just read other people's posts. But the data still surprised me that there were so few people active on social media and so many lurkers.

  8. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Karen Hao. How Facebook got addicted to spreading misinformation. MIT Technology Review, March 2021. URL: https://www.technologyreview.com/2021/03/11/1020600/facebook-responsible-ai-misinformation/ (visited on 2023-12-08).

      This article explores facebook's impact on ai governance and content recommendation algorithms. They focus on PR rather than solving problems. While Facebook addresses algorithmic bias through its responsible ai team, it has not taken substantial steps to reduce the spread of misinformation and extreme statements.

    1. 14.1.4. Potentially Offensive# Another category is content that users or advertisers might find offensive. If users see things that offend them too often, they might leave the site, and if advertisers see their ads next to too much offensive content, they might stop paying for ads on the site. So platforms might put limits on language (e.g., racial slurs), violence, sex, and nudity. Sometimes different users or advertisers have different opinions on what should be allowed or not. For example, “The porn ban of 2018 was a defining event for Tumblr that led to a 30 percent drop in traffic and a mass exodus of users that blindsided the company” [n3].

      I think this point is very necessary. Because social platforms spread quickly and are still frequently used by many teenagers, it will certainly have a bad impact if the bad content such as racial discrimination, violence, sex and nudity appear on social platforms without restriction. It's good to see that this kind of content is rarely seen on social platforms today. Forming a green and healthy network environment is also our goal.

  9. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Anya Kamenetz. Selfies, Filters, and Snapchat Dysmorphia: How Photo-Editing Harms Body Image. Psychology Today, February 2020. URL: https://www.psychologytoday.com/us/articles/202002/selfies-filters-and-snapchat-dysmorphia-how-photo-editing-harms-body-image (visited on 2023-12-08).

      Social media feeds can exacerbate our anxiety. Maybe some people post pictures that were taken by a whole team of professionals. It is not as simple as we think to take a perfect picture. But we compare ourselves over and over again and think that our appearance is really ugly or flawed. When we post a photo, we also repeatedly worry about whether our appearance is approved by others. Photo editing technology adds to the anxiety. But I didn't realize that there are even a lot of teenagers who want to have plastic surgery to achieve perfect results, as mentioned in this article. I think it's too extreme.

    1. 13.2.2. Trauma Dumping# While there are healthy ways of sharing difficult emotions and experiences (see the next section), when these difficult emotions and experiences are thrown at unsuspecting and unwilling audiences, that is called trauma dumping [m11]. Social media can make trauma dumping easier. For example, with parasocial relationships, you might feel like the celebrity is your friend who wants to hear your trauma. And with context collapse, where audiences are combined, how would you share your trauma with an appropriate audience and not an inappropriate one (e.g., if you re-post something and talk about how it reminds you of your trauma, are you dumping it on the original poster?). Trauma dumping can be bad for the mental health of those who have this trauma unexpectedly thrown at them, and it also often isn’t helpful for the person doing the trauma dumping either:

      I think it's an interesting concept. I see this all the time on some social platforms. I always get a lot of negative feelings and extreme comments from people. In fact, I don't like the idea of having to listen to other people's traumas when I open a social media platform, and it seems like I have to persuade others even when I'm not in a good mood myself. It seems like it just aggravates the negative emotions instead of being a healthy way to get rid of them and find a solution.

  10. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Monica Lewinsky. December 2023. Page Version ID: 1187944516. URL: https://en.wikipedia.org/w/index.php?title=Monica_Lewinsky&oldid=1187944516 (visited on 2023-12-08). [l14] Monica Lewinsky (she/her) [@MonicaLewinsky]. 👀. May 2021. URL: https://twitter.com/MonicaLewinsky/status/1395734868407984136 (visited on 2023-12-08). [l15] Clinton–Lewinsky scandal. November 2023. Page Version ID: 1187645037. URL: https://en.wikipedia.org/w/index.php?title=Clinton%E2%80%93Lewinsky_scandal&oldid=1187645037 (visited on 2023-12-08).

      The book uses Monica Lewinsky's introductory tweet about the side-eyed expression as an example of variations/mutations. This is an effective way to create a new version of the post that can be spread. In the example, Monica used this way to let the audience understand that she was referring to her affair with then-US President Bill Clinton. Because I don't know much about American history and I haven't heard this story before, so this link in the bibliography helps me understand the background and helps me understand the example better.

    1. 12.2.2. Chain letters# When physical mail was dominant in the 1900s, one type of mail that spread around the US was a chain letter [l7]. Chain letters were letters that instructed the recipient to make their own copies of the letter and send them to people they knew. Some letters gave the reason for people to make copies might be as part of a pyramid scheme [l8] where you were supposed to send money to the people you got the letter from, but then the people you send the letter to would give you money. Other letters gave the reason for people to make copies that if they made copies, good things would happen to them, and if not bad things would, like this:

      The chain letter struck me as surprising yet familiar. On the social platforms in my country, I can often see that someone posts a post and notes that the people who see it need to forward it and what consequences will be if they do not forward it. Such words make many people repost and most of the content of such posts are rumors or hoaxes. But this approach has unwittingly created a viral impact.

    2. 12.2.2.连锁信件# 20 世纪,当实体邮件占据主导地位时,一种在美国广为流传的邮件类型就是连锁信 [ l7 ]。连锁信会要求收信人自己复印信件,然后将其寄给认识的人。有些信件给出的理由是,人们复印信件可能是金字塔骗局的一部分 [ l8 ],即你应该把钱寄给收信人,但收信人会给你钱。还有一些信件给出的理由是,如果他们复印了信件,好事就会降临到他们头上,坏事也会降临到他们头上,就像这样:

      The chain letter struck me as surprising yet familiar. On the social platforms in my country, I can often see that someone posts a post and notes that the people who see it need to forward it and what consequences will be if they do not forward it. Such words make many people repost and most of the content of such posts are rumors or hoaxes. But this approach has unwittingly created a viral impact.

    1. When social media platforms show users a series of posts, updates, friend suggestions, ads, or anything really, they have to use some method of determining which things to show users. The method of determining what is shown to users is called a recommendation algorithm, which is an algorithm (a series of steps or rules, such as in a computer program) that recommends posts for users to see, people for users to follow, ads for users to view, or reminders for users.

      When I saw this paragraph, I was very interested in this chapter. Because usually when I use social platforms such as tiktok and rednote, I can feel that if I give a "like" to a topic I am interested in or stay in this interface for a long time, then I will be repeatedly recommended related content in the future. It's a great experience for me because it seems like big data is getting to know my preferences. I can also see the content of the software getting more and more interesting. So I was curious about how social media algorithms capture users' preferences.

    2. 当社交媒体平台向用户展示一系列帖子、更新、好友建议、广告或任何其他内容时,他们必须使用某种方法来确定向用户展示哪些内容。确定向用户展示什么内容的方法称为推荐算法,它是一种算法(一系列步骤或规则,例如在计算机程序中),用于推荐用户要看的帖子、要关注的人、要查看的广告或要提醒的用户。

      When I saw this paragraph, I was very interested in this chapter. Because usually when I use social platforms such as tiktok and rednote, I can feel that if I give a "like" to a topic I am interested in or stay in this interface for a long time, then I will be repeatedly recommended related content in the future. It's a great experience for me because it seems like big data is getting to know my preferences. I can also see the content of the software getting more and more interesting. So I was curious about how social media algorithms capture users' preferences.

  11. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Fair Sentencing Act. May 2023. Page Version ID: 1153436887. URL: https://en.wikipedia.org/w/index.php?title=Fair_Sentencing_Act&oldid=1153436887 (visited on 2023-12-07).

      I learned about the background of the Fair Sentencing Act through link. Because crack cocaine is more common among blacks and powder cocaine is more common among whites, the sentencing gap leads to longer sentences for possession of smaller amounts of the drug. The Fair Sentencing Act corrected this racial injustice. This example in the book is an example of individual analysis. This led me to understand how important it is to consider the difference between individual analysis and systems analysis when we think about the ethics and responsibility of algorithms.

  12. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Inclusive design. December 2023. Page Version ID: 1188074097. URL: https://en.wikipedia.org/w/index.php?title=Inclusive_design&oldid=1188074097 (visited on 2023-12-07). [j20]

      I was introduced to the term "inclusive design" by looking at Wikipedia. Because I have not seen this term before, my understanding of it is very shallow. I learned that inclusive design is the process of designing products, services and environments that work for as many people as possible. I think this concept is particularly important. Because disability scenarios are everywhere, we should consider inclusive design when designing ai or anything else.

  13. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Many of the disabilities we mentioned above were permanent disabilities, that is, disabilities that won’t go away. But disabilities can also be temporary disabilities, like a broken leg in a cast, which may eventually get better. Disabilities can also vary over time (e.g., “Today is a bad day for my back pain”). Disabilities can even be situational disabilities, like the loss of fine motor skills when wearing thick gloves in the cold, or trying to watch a video on your phone in class with the sound off, or trying to type on a computer while holding a baby.

      I thought that was a great quote. Because when I saw this title I was actually confused because I was wondering what accessibility has to do with info. In addition, my understanding of disabled people has always been that they have physical defects or can not adapt to the society and can not live a normal life. When in fact disability can also be a situational disorder such as the example in the book (loss of fine motor skills while wearing thick gloves in the cold). This actually shows that disability is everywhere in life. We should design for as many scenarios as possible.

    1. Jacob Kastrenakes. Facebook stored millions of Instagram passwords in plain text. The Verge, April 2019. URL: https://www.theverge.com/2019/4/18/18485599/facebook-instagram-passwords-plain-text-millions-users (visited on 2023-12-06).

      The article describes how Facebook stores the passwords of millions of instagram users in plain text. This incident shows that Facebook has a big hole in the protection of user data, but also makes people more concerned about data privacy protection. I think it was shocking to me because Facebook is what I thought was a big social media platform but I didn't think there was such an unimaginable breach in data protection.

  14. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. For example, a social media application might offer us a way of “Private Messaging” [i1] (also called Direct Messaging) with another user. But in most cases those “private” messages are stored in the computers at those companies, and the company might have computer programs that automatically search through the messages, and people with the right permissions might be able to view them directly. In some cases we might want a social media company to be able to see our “private” messages, such as if someone was sending us death threats. We might want to report that user to the social media company for a ban, or to law enforcement (though many people have found law enforcement to be not helpful), and we want to open access to those “private” messages to prove that they were sent.

      Reading this paragraph, I began to reflect on my previous thoughts. I have always felt that social platforms requiring us to authorize this behavior before using it violates our privacy rights. But because we need to use the platform we have to agree to this agreement. Previously, I understood that privacy is absolute privacy, but when I read the examples in this paragraph, I realized that perhaps selective privacy is appropriate. There are situations where we have open access to private messages that are useful. So how to maintain this balance is very delicate.

  15. Jan 2025
  16. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Is It Funny or Offensive? Comedian Impersonates FBI on Twitter, Makes MLK Assassination Joke. January 2020. URL: https://isitfunnyoroffensive.com/comedian-impersonates-fbi-on-twitter-makes-mlk-assassination-joke/ (visited on 2023-12-05).

      To be honest, I think it's terrible. To create this kind of malicious public opinion because there is no evidence for their alleged assassination will allow some people who are not capable of judging to spread such rumors. Maybe their motive is that they think it is funny, but I think such unwise behavior makes me feel disgusted with the Internet world.

    1. Meet Dr. Troll [g8] (Whitney Phillips)

      Don't feed the trolls! Don't feed the trolls! That's my attitude. My understanding of "trolling" is malicious behavior that deliberately provokes disorder. There are even trollers who pretend to take sides. The best way to deal with these groups is to ignore them. They like to see a bad opinion so we don't follow it. And we can also try to report it.

  17. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Sarah Z. How Fans Treat Creators. January 2020. URL: https://www.youtube.com/watch?v=f0l_biTU3Vg (visited on 2023-11-24).

      This video is about a blogger talking about what she believes is the relationship between fans and creators. She thinks the relationship between fans and creators has always been a little bit weird and a little bit tense because the idolization and demonization of creators has always been there. Now the situation becomes more frightening because the Internet world gives fans more opportunities to communicate with their idols. Those who get their fame entirely from the Internet are even more famous because it directly depends on their ability to communicate effectively with their fans. I agree with her. This status has advantages and disadvantages. When a blogger has some problems, this approach can help her more quickly, but also if too many people know her, her personal life will become more difficult.

  18. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. When someone presents themselves as open and as sharing their vulnerabilities with us, it makes the connection feel authentic. We feel like they have entangled their wellbeing with ours by sharing their vulnerabilities with us. Think about how this works with celebrity personalities. Jennifer Lawrence became a favorite of many when she tripped at the Oscars [f2], and turned the moment into her persona as someone with a cool-girl, unpolished, unfiltered way about her. She came across as relatable and as sharing her vulnerabilities with us, which let many people feel that they had a closer, more authentic connection with her. Over time, that persona has come to be read differently, with some suggesting that this open-styled persona is in itself also a performance. Does this mean that her performance of vulnerability was inauthentic?

      When I read this paragraph, I think this phenomenon is very interesting. In particular, the example of Jennifer Lawrence makes me instantly understand what is expressed in topic sentence. When someone presents a very perfect feeling, maybe not many people like them because it gives others the impression that this person is very fake and unfamiliar. However, if some weaknesses or shortcomings are properly exposed, it may appear that the person is very friendly and sincere. I also looked up some relevant materials and found that we can make use of this psychological state to help us narrow the distance with others in the process of making friends.

  19. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Web 2.0. October 2023. Page Version ID: 1179906793. URL: https://en.wikipedia.org/w/index.php?title=Web_2.0&oldid=1179906793#Web_1.0 (visited on 2023-11-24).

      These links give me a better understanding of some background information about web1.0 and 2.0. I was very curious about this because I was born in 2005 so I didn't know much about the history of the web before, and I didn't feel a big leap forward. This historical data allows me to better understand the situation at that time. I think this is a really great breakthrough.

    1. This history is all very US focused. In future versions of this book, I hope to incorporate a more global history of social media.

      Weibo, China's still-popular social platform, was launched in August 2009 by Sina Corp. Users can release dynamic information through web pages, WAP pages, mobile phone programs, etc., and can also upload pictures and videos to achieve instant sharing. Some call it China's version of Twitter.

  20. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. W3Schools. Python Lists. URL: https://www.w3schools.com/python/python_lists.asp (visited on 2023-11-24). [d8] W3Schools. Python Tuples. URL: https://www.w3schools.com/python/python_tuples.asp (visited on 2023-11-24). [d9] W3Schools. Python Sets. URL: https://www.w3schools.com/python/python_sets.asp (visited on 2023-11-24).

      I like W3school very much. Because I have seen a lot of detailed knowledge about coding displayed in the website. It helps me a lot because I can look it up when I have questions. And it also has a code that I can try online. I think it makes me understand better.

    1. So for example, I could make a list of Twitter users. Each Twitter user could be a dictionary with info about that user, and one piece of information it might have is a list of who that user is following.例如,我可以列出 Twitter 用户的列表。每个 Twitter 用户都可以是一本包含该用户信息的字典,其中可能包含的一条信息是该用户关注者的列表。 List of users:  用户列表: User 1:  用户1: Username: kylethayer (a String)用户名:kylethayer(字符串) Twitter handle: @kylemthayer (a String)Twitter 句柄:@kylemthayer(字符串) Profile Picture: [TODO picture here] (an image)个人资料图片:[这里的 TODO 图片](图片) Follows: @SusanNotess, @UW, @UW_iSchool, @ajlunited, … (a list of Strings)如下:@SusanNotess、@UW、@UW_iSchool、@ajluunited、...(字符串列表) User 2:  用户2: Username: Dr Susan Notess (a String)用户名:Susan Notess 博士(字符串) Twitter handle: @SusanNotess (a String)Twitter 句柄:@SusanNotess(字符串) Profile Picture: [TODO picture here] (an image)个人资料图片:[这里的 TODO 图片](图片) Follows: @kylemthayer, @histoftech, @j_kalla, @dbroockman, @qaxaawut, @shengokai, @laniwhatison (a list of Strings)如下:@kylemthayer、@histoftech、@j_kalla、@dbroockman、@qaxaawut、@shengokai、@laniwhatison(字符串列表)

      This example made me understand that data grouping in social media is classified like a dictionary. I also became familiar with the representation of numbers and strings. I think it's very interesting because it's very organized. I can't help but wish I knew more about how to use this data. I'm looking forward to the data mining in Chapter 8.

  21. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. teven Tweedie. This disturbing image of a Chinese worker with close to 100 iPhones reveals how App Store rankings can be manipulated. February 2015. URL: https://www.businessinsider.com/photo-shows-how-fake-app-store-rankings-are-made-2015-2 (visited on 2024-03-07).

      This picture struck me deeply. Because I didn't realize that rankings like the app store were controlled by someone. Of course, it's not a robot because it's being operated by a human, even though it looks like a robot facing 100 phones. This worker needs to uninstall and download apps repeatedly to manipulate the app store rankings. It also made me think that it would be much easier if this kind of work could be done automatically by robots.

    1. Auto caption: https://twitter.com/headlinerclip [c3]自动字幕: https://twitter.com/headlinerclip [ c3 ]

      The actual use of bots in social media was not clear to me, but it became clear to me when I saw the first example of a friendly bot with automatic captioning. Because I think this robot with automatic subtitles is widely used in real life, when I watch some videos on Youtube, automatic subtitles will be generated to help me understand the content of videos more clearly. I really like this function.

    1. As an example of how religion and divine command theory can work with other frameworks, let’s consider a few different versions of Christian thinking. In the white Evangelical Christian community the authors grew up in, we often tried to figure out deontology-type rules based on Bible verses (e.g., based on Exodus 20:16 [b107], we might conclude that lying is always wrong regardless of the consequences). But this is quite different from the Archbishop Desmond Tutu [b67] who helped popularize Ubuntu philosophy globally and chaired the Truth and Reconciliation Commission [b108], or George E. Tinker [b109] of the Osage Nation [b110], who wrote American Indian Liberation: A Theology of Sovereignty [b111].

      In addition to the many moral frameworks mentioned in the article, I think religious moral frameworks are also common. Like Buddhism from my country, China. Buddhism focuses more on compassion and kindness and leads people to abandon their attachments and get away from their troubles.

    1. As a cast member on a show about tech, our job entails visiting tech companies/conferences etc. We meet ppl eager to show off new tech.作为科技节目的演员,我们的工作需要参观科技公司/会议等。我们会遇到渴望炫耀新技术的人。 Often we’ll see tech that is scary. I don’t mean weapons etc. I mean altering video, tech that violates privacy, stuff w obv ethical issues.我们经常会看到令人恐惧的技术。我指的不是武器等。我的意思是改变视频、侵犯隐私的技术以及明显的道德问题。 And we’ll bring up our concerns to them. We are realizing that ZERO consideration seems to be given to the ethical implications of tech.我们将向他们提出我们的担忧。我们意识到,人们似乎对技术的道德影响进行了零考虑。 They don’t even have a pat rehearsed answer. They are shocked at being asked. Which means nobody is asking those questions.他们甚至没有事先排练过的答案。他们对被问到感到震惊。这意味着没有人问这些问题。 “We’re not making it for that reason but the way ppl choose to use it isn’t our fault. Safeguard will develop.” But tech is moving so fast.“我们不是因为这个原因才制作它的,但人们选择使用它的方式不是我们的错。保障将会发展。”但科技发展如此之快。 That there is no way humanity or laws can keep up. We don’t even know how to deal with open death threats online.人性或法律都无法跟上。我们甚至不知道如何应对网上公开的死亡威胁。 Only “Can we do this?” Never “should we do this? We’ve seen that same blasé attitude in how Twitter or Facebook deal w abuse/fake news.只有“我们可以这样做吗?”永远不要“我们应该这样做吗?我们在 Twitter 或 Facebook 处理滥用/虚假新闻的方式上也看到了同样的漠不关心的态度。 You can’t put this stuff back in the box. Once it’s out there, it’s out there. And there are no guardians. It’s terrifying. The end.你不能把这些东西放回盒子里。一旦它在那里,它就在那里。而且没有监护人。太可怕了。结束。 Kumail Nanjiani  库梅尔·南贾尼 1.2.1. Reflection questions:#

      The content of Kumail Nanjiani's reflection on the ethics of technology has aroused my thinking on the ethics of science and technology. I agree with him that people are very indifferent to the impact of technology ethics because they feel that some data leakage seems to be too far away from their lives or even accustomed to sharing their data. I didn't pay enough attention to data breaches and the ethics of technology until after the COVID-19 outbreak when I found out that some apps were collecting people's private data in bulk and that in the early days of the outbreak some of the data of people who were sick was exposed and therefore attacked by other people in real life. It got me thinking about whether there is a lot of social media or artificial intelligence that has this problem. In my opinion, people should attach importance to and strengthen the management of science and technology ethics, because it is conducive to the rational use of science and technology to avoid the occurrence of harmful situations to human beings.