- Last 7 days
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
Assassination of Martin Luther King Jr. November 2023. Page Version ID: 1186577416. URL: https://en.wikipedia.org/w/index.php?title=Assassination_of_Martin_Luther_King_Jr.&oldid=1186577416#Alleged_government_involvement
This source highlights a tweet that comedian Jaboukie Young-White made back in 2020, impersonating the FBI making a foul comment about the assassination of Martin Luther King. This is not the first time Young has impersonated a public figure, which highlights an important issue regarding digital media. Not only does trolling include leaving comments and insults for other users, but another form of trolling is impersonating someone you're not. This is especially interesting because in this class we are learning to code bots to make posts for us, would that be a form of impersonation?
-
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
What do you think is the best way to deal with trolling?
I think the best way to deal with trolling would be block the users and report them, although it may be hard ignoring them would be the best strategy to stop further damage. Arguing back may not be the best, just because you will get more invested in the situation.
-
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
Todd Vaziri [@tvaziri]. Every non-hyperbolic tweet is from iPhone (his staff). Every hyperbolic tweet is from Android (from him). August 2016. URL: https://twitter.com/tvaziri/status/762005541388378112 (visited on 2023-11-24).
This post by Todd Vaziri highlights a pattern in Donald Trump’s tweets during his 2016 presidential campaign—suggesting that hyperbolic tweets came from an Android device (likely Trump himself), while more measured tweets came from an iPhone (likely his staff). The tweet became notable for its insight into how device data revealed differences in tone and authorship.
-
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
How do you think about the authenticity of the Tweets that come from Trump himself?
The authenticity of the Tweet that come from Trump seems very important to users all across the world because as the president of the United States, he has a lot of status that comes with that role. Personally, president Trump has said a lot of questionable things, and made a lot of false claims in the past so I don't really believe most of the stuff that he posts on social media but any information in general needs to be backed up no matter who it's coming from.
-
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
e6] Bulletin board system. November 2023. Page Version ID: 1184559343. URL: https://en.wikipedia.org/w/index.php?title=Bulletin_board_system&oldid=1184559343 (visited on 2023-11-24).
This website overviews the history of bulletin boards and their creation. From this source I was able to learn more about their origin as well as the coding format to make them, this makes them more interesting to me now and I realize how much I use bullet points during my day to day.
-
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
5.5.2. 4Chan# 4Chan [e18] was created in 2003 by copying the code from a Japanese image-sharing bulletin board called Futaba or 2chan [e19]. 4Chan has various image-sharing bulletin boards, where users post anonymously. Perhaps the most infamous board is the “/b/” board for “random” topics. This board emphasizes “free speech” and “no rules” (with exceptions for child sexual abuse material [CSAM] and some other illegal content). In these message boards, users attempt to troll each other and post the most shocking content they can come up with. They also have a history of collectively choosing a target website or community and doing a “raid” where they all try to join and troll and offend the people in that community. Many memes, groups, and forms of internet slang come from 4Chan, such as: lolcats [e20] Rickroll [e21] ragefaces [e22] “Anonymous [e23]” the hacker group Bronies [e24] (male My Little Pony fans) much of trolling culture (we will talk more about in Chapter 7: Trolling) But one 4Chan user found 4chan to be too authoritarian and restrictive and set out to create a new “free-speech-friendly” image-sharing bulletin board, which he called 8chan. 5.5.3. 8Chan (now 8Kun)# 8Chan [e25] (now called 8Kun) is an image-sharing bulletin board site that was started in 2013. It has been host to white-supremacist, neo-nazi and other hate content. 8Chan has had trouble finding companies to host its servers and internet registration due to the presence of CSAM, and for being the place where various mass shooters spread their hateful manifestos. 8Chan is also the source and home of the false conspiracy theory QAnon [e26]
This section highlights the blogging website, 4Chan which is a site that is pretty loose on restrictions so a lot of users will post harmful content and started multiple toxic internet trends. This serves as a primary example of toxic cyber environment, which has raised a lot of issues especially in recent years because of increased online trolling and exploitation of underaged users. This really shows how social media may not always be glamorous and good.
-
- Apr 2025
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
W3Schools. Introduction to HTML. URL: https://www.w3schools.com/html/html_intro.asp (visited on 2023-11-24).
The W3Schools HTML Introduction page explains that HTML is the basic language used to build web pages. It talks about how HTML uses tags (like labels) to mark things like titles, headings, and paragraphs. For example, you use one tag type to create a heading and another for a paragraph. It even shows a simple example of what a basic web page looks like in code. It also mentions that your web browser (like Chrome or Safari) reads this code and turns it into the websites you see. And there’s a special line at the top of the page that helps the browser understand it’s working with HTML.
-
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
Data and Metadata
This definition of metadata makes me reflect on how often we underestimate its significance in our daily interactions with technology, particularly concerning privacy. For example, a tweet's content might seem harmless, but its metadata can uncover personal patterns, routines, or even reveal someone’s identity. It’s unsettling to realize how companies can exploit this seemingly minor information for profiling or targeted advertising.
-
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
Steven Tweedie. This disturbing image of a Chinese worker with close to 100 iPhones reveals how App Store rankings can be manipulated. February 2015. URL: https://www.businessinsider.com/photo-shows-how-fake-app-store-rankings-are-made-2015-2 (visited on 2024-03-07).
This citation mainly focuses on the image captured by the news outlet with a woman sitting in front of multiple phones. Showing how easy it is to manipulate the App Store by one person downloading and deleting apps to increase download numbers. If even one person can be using this many phones at once, it's scary to even think how much a factory of workers can do.
-
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
What bots do you find surprising?
I was surprised that antagonistic bots existed, especially since there were so many types. I find it pretty interesting that these bots are placed into so many different types of situations and the different uses for each type. Especially because a lot of these applications will have multiple types of the bots and the different types of functions for each.
-
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
What do you think is the responsibility of tech workers to think through the ethical implications of what they are making?
I believe that the responsibilities of tech workers to think through the ethical implications of what they are making need to ensure that they are curating technology that is helping people more than harming them. While social media search engines are helpful, it also creates privacy issues, especially surrounding safety and possible ways for online stalkers to gain more information on their victims. Another thing is ethics courses workers should go through during employment because I know that most engineering degrees will require their students to attend ethics classes to educate them on the importance of making ethical decisions and how their jobs can impact the lives of millions of people.
-
-
social-media-ethics-automation.github.io social-media-ethics-automation.github.io
-
Being and becoming an exemplary person (e.g., benevolent; sincere; honoring and sacrificing to ancestors; respectful to parents, elders and authorities, taking care of children and the young; generous to family and others). These traits are often performed and achieved through ceremonies and rituals (including sacrificing to ancestors, music, and tea drinking), resulting in a harmonious society.
The moral framework often represents how it will always be the morally correct choice and that's not always true. especially with Confucianism which focuses on honoring your elders and being generous to the young. Although this may be morally correct it is not an individual's responsibility to fend for each elderly or younger person in their life, especially if that person has done something bad to them. An example would be Korean sports teams where the respect culture is something that they tend to focus on and this promotes bullying of younger members from elder members which really creates an issue for the morality of that team as well as their interpersonal relationships.
-