34 Matching Annotations
  1. Last 7 days
  2. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Meg van Achterberg. Jimmy Kimmel’s Halloween prank can scar children. Why are we laughing? Washington Post, October 2017. URL: https://www.washingtonpost.com/outlook/jimmy-kimmel-wants-to-prank-kids-why-are-we-laughing/2017/10/20/9be17716-aed0-11e7-9e58-e6288544af98_story.html (visited on 2023-12-10).

      This article talks about how adult pranks on children can have a damaging effect on them in the future. The article dives into the psychological side of parent pranks and how it causes lost in trust and betrayal.

    1. What do you consider to be the most important factors in making an instance of public shaming bad?

      I think an important factor in making an instance of public shaming bad is the animosity and extent of people's comments. People use the internet mainly as a shield because they feel unstoppable and won't get punished for how they shame or bully people. Often the comments can be very brutal.

  3. Nov 2025
  4. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Constance Grady. Chrissy Teigen’s fall from grace. Vox, June 2021. URL: https://www.vox.com/culture/22451970/chrissy-teigen-courtney-stodden-controversy-explained (visited on 2023-12-10).

      This article highlights the career of Chrissy Teigen and how she has been encapsulated by cancel culture on social media due to her comments and remarks that she makes. Cancel culture has seen a big rise, and Chrissy has seen the full throttle of that due to her remarks.

    1. Have you experienced or witnessed harassment on social media (that you are willing to share about)?

      I haven't seen an excessive form of harassment on social media, but I can think about comment sections of like sports teams, and they are just making fun of people for their fandom. Knowing sports fans, they are very blunt, and their comments can come off as rude.

  5. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Jim Hollan and Scott Stornetta. Beyond being there. In Proceedings of the SIGCHI conference on Human factors in computing systems - CHI '92, 119–125. Monterey, California, United States, 1992. ACM Press. URL: http://portal.acm.org/citation.cfm?doid=142750.142769 (visited on 2023-12-08), doi:10.1145/142750.142769.

      This article mentions the potential opportunity faced by technology in trying to facilitate the aspects of real-life face-to-face interactions. People can use technology for more ways to improve their communication skills and use it as a tool to interact with people around the world.

    1. In what ways do you think you’ve participated in any crowdsourcing online?

      I think I've participated in crowdsourcing online by liking or rating something on social media. I think this contributed to the platform’s ranking algorithms and helped determine what gets shown to others.

  6. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Sarah T. Roberts. Behind the Screen. Yale University Press, September 2021. URL: https://yalebooks.yale.edu/9780300261479/behind-the-screen (visited on 2023-12-08).

      This article is very interesting because it dives into the 100,000 people who moderate and delete posts to keep the internet safe. They endure and are exposed to so many posts that can be disturbing and damaging to their mental. Their impact is so overlooked, but they are essential to the safety of others scoping the internet.

    1. What dangers are posed with languages that have limited or no content moderation?

      The dangers of having no moderation include the potential spread of false information. For example, someone can post a harmful post in one of the languages that aren't moderated, and they can spread a whole slew of hurtful comments with no consequences. The potential for danger is heightened with no moderation.

  7. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Spamming. December 2023. Page Version ID: 1187995774. URL: https://en.wikipedia.org/w/index.php?title=Spamming&oldid=1187995774 (visited on 2023-12-08).

      Spamming is when a mass group of people is sent multiple unsolicited messages from someone they don't know. People do fall into the trap of these messages, and it's a problem when they are potentially hacked, etc. An example of this I can think of is when my phone got multiple messages sent to me about my SSN has been compromised, etc, but i knew it was spam because it was sent by a Gmail user on iMessage.

    1. Have you ever faced consequences for breaking social media rules (or for being accused of it)?

      I have been accused of breaking a social media rule, but it was rather small. I posted a photo with a song, which was later removed from social media due to the artist being controversial in the news. This wasn't specifically my fault, but they did have to restrict my post.

  8. Oct 2025
  9. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Anya Kamenetz. Selfies, Filters, and Snapchat Dysmorphia: How Photo-Editing Harms Body Image. Psychology Today, February 2020. URL: https://www.psychologytoday.com/us/articles/202002/selfies-filters-and-snapchat-dysmorphia-how-photo-editing-harms-body-image (visited on 2023-12-08).

      This article highlights how people, such as famous influencers, create unrealistic body standards through editing and Photoshop. Through these standards, it can harm people's mental health since they have a thought to compare themselves to others. These comparisons are very damaging, and they're causing people to resort to surgery to compete with the comparisons.

    1. In what ways have you found social media bad for your mental health and good for your mental health?

      Personally, Social media hasn't negatively affected my mental health; rather, it's time-consuming. I often find myself doom-scrolling down a rabbit hole of posts, but I must admit that I do learn a lot of information. So there are positives and negatives.

  10. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Tom Standage. Writing on the Wall: Social Media - The First 2,000 Years. Bloomsbury USA, New York, 1st edition edition, October 2013. ISBN 978-1-62040-283-2.

      In this article, the author talks about how human communication and social media have evolved over time. The interesting fact I took away from this is that the concept of social media isn't entirely new and has similarities of human traditions in the past.

    1. How do you think attribution should work when copying and reusing content on social media (like if you post a meme or gif on social media)? When is it ok to not cite sources for content? When should sources be cited, and how should they be cited?

      The way I think this should be approached is credit to the original user. Acknowledging that the repost does help the popularity of the content. For example a simple tag or credit label to the original poster should be more than enough.

  11. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Zack Whittaker. Facebook won't let you opt out of its phone number 'look up' setting. TechCrunch, March 2019. URL: https://techcrunch.com/2019/03/03/facebook-phone-number-look-up/ (visited on 2023-12-07).

      This article talks about how Facebook limits its users from opting out their phone number for the "look up" feature. This makes the user's number visible to users searching, even though the intention of inputting the number was for extra security. Facebook has viewed this more as a tool rather than a threat, so it doesn't look like they will offer a solution to users' concerns.

    1. What people near you have been liking, interacting with, or hovering over (they can find your approximate location, like your city, from your internet IP address, and they may know even more precisely) This perhaps explains why sometimes when you talk about something out loud it gets recommended to you (because someone around you then searched for it). Or maybe they are actually recording what you are saying and recommending based on that.

      This is interesting, and I have personally experienced this firsthand with one of my friends searching up merch from a local brand near me. In about the next 5 scrolls on social media, that brand pops up as an ad for me, which exemplifies the algorithm working with people nearby.

  12. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Social model of disability. November 2023. Page Version ID: 1184222120. URL: https://en.wikipedia.org/w/index.php?title=Social_model_of_disability&oldid=1184222120#Social_construction_of_disability (visited on 2023-12-07).

      This article talks about the people who are affected by societal barriers and how there is more work to be done to include people. However, there are innovations to be talked about, like the new traffic lights to help people who are color blind and can't distinguish the various lights. There is still a lot of work to be done, but there is an effort being made to include everyone.

    1. When creating computer programs, programmers can do things that aren’t possible with architecture (where Universal Design came out of), that is: programs can change how they work for each individual user. All people (including disabled people) have different abilities, and making a system that can modify how it runs to match the abilities a user has is called Ability based design [j18].

      Ability-based design is very crucial today when it comes to new products. The way your device can adapt to your personalizations and environment is a big draw for consumers and helpful for everyone. An ability-based design that comes to mind for me is Apple CarPlay, adjusting the map brightness dependent on your surroundings and time of day.

    1. General Data Protection Regulation. November 2023. Page Version ID: 1187294017. URL: https://en.wikipedia.org/w/index.php?title=General_Data_Protection_Regulation&oldid=1187294017 (visited on 2023-12-05).

      The General Data Protection Regulation is in place to create a bigger barrier for data privacy within the EU. This is very different from the United States, since user privacy is more lenient here. The EU had this regulation in place to restrain illegal data sharing.

    1. Metadata: Sometimes the metadata that comes with content might violate someone’s privacy. For example, in 2012, former tech CEO John McAfee was a suspect in a murder in Belize [i22], John McAfee hid out in secret. But when Vice magazine wrote an article about him, the photos in the story contained metadata with the exact location in Guatemala [i23].

      Metadata is so tiny yet contains so much information that it can expose privacy. The CEO and murder case is an example of how dangerous it can be. If people were able to find him in Guatemala, it just shows that anyone can be found, which can be kind of scary.

  13. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Spurious relationship. November 2023. Page Version ID: 1184161183. URL: https://en.wikipedia.org/w/index.php?title=Spurious_relationship&oldid=1184161183 (visited on 2023-12-05).

      Spurious relationships are two variables that seem to be correlated with each other, but in the end, it turns out they have no effect on one another. This can be challenging for data scientists to decipher, as the human brain is prone to making connections.

    1. Social media sites then make their money by selling targeted advertising, meaning selling ads to specific groups of people with specific interests. So, for example, if you are selling spider stuffed animal toys, most people might not be interested, but if you could find the people who want those toys and only show your ads to them, your advertising campaign might be successful, and those users might be happy to find out about your stuffed animal toys.

      This is very interesting to think about in the grand scheme of things. On our phones, all of these social media apps/sites are free to the public, which brings up the question of how these platforms have the money/capital to support the development. This brings up a thought of mine about how much these platforms make for each client/user and how it is measured.

  14. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Spaghetti-tree hoax. November 2023. Page Version ID: 1187320430. URL: https://en.wikipedia.org/w/index.php?title=Spaghetti-tree_hoax&oldid=1187320430 (visited on 2023-12-05).

      This was a prank done in 1957 however, I have heard about it in recent years. Basically, the BBC pranked British people into believing that spaghetti grew from trees. They were able to fool so many people since not many people in Britain knew about the origins of pasta, but this form of trolling is rather light compared to what's going on nowadays.

    1. In the early Internet message boards that were centered around different subjects, experienced users would “troll for newbies” by posting naive questions that all the experienced users were already familiar with. The “newbies” who didn’t realize this was a troll would try to engage and answer, and experienced users would feel superior and more part of the group knowing they didn’t fall for the troll like the “newbies” did. These message boards are where the word “troll” with this meaning comes from.

      I think this concept of internet trolling newbies has essentially become easier on X now with the whole payment system for verification. Prior, you can probably tell who's real and who's fake based on profile picture, profile info, etc, but now it's a whole new ball game. Everyone can pay $10 for a verification check, so there's no real distinction between what's real or fake.

  15. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Code-switching. November 2023. Page Version ID: 1185649746. URL: https://en.wikipedia.org/w/index.php?title=Code-switching&oldid=1185649746 (visited on 2023-11-24).

      This basically links to a Wikipedia page about code switching. Essentially, it means to change the way you speak depending on your surroundings or who you are interacting with. I find myself doing this more based on who I am interacting with but it varies by different people.

  16. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Authenticity is a rich concept, loaded with several connotations. To describe something as authentic, we are often talking about honesty, in that the thing is what it claims to be. But we also describe something as authentic when we want to say that it offers a certain kind of connection. A knock-off designer item does not offer the purchaser the same sort of connection to the designer brand that an authentic item does. Authenticity in connection requires honesty about who we are and what we’re doing; it also requires that there be some sort of reality to the connection that is supposedly being made between parties.

      This concept definition really resonated with me and made me think about the reality of the old and new twitter, specifically the verified tag. People used to listen and authenticate people online based on their verification tags, such as celebrities. Nowadays, that aspect is taken away because the verification tag can be bought now so it removes that barrier from fake/real.

  17. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Federal Trade Commission. FTC Alleges Facebook Resorted to Illegal Buy-or-Bury Scheme to Crush Competition After String of Failed Attempts to Innovate. August 2021. URL: https://www.ftc.gov/news-events/news/press-releases/2021/08/ftc-alleges-facebook-resorted-illegal-buy-or-bury-scheme-crush-competition-after-string-failed (visited on 2023-11-24).

      This article highlights Facebook's buy or bury technique in order to maintain its monopoly on other apps. Facebook failed to innovate when going mobile, which forced its hand to resort to this method. Facebook either bought out platforms or restricted access, which imposed their monopoly and stifled competition. This method caused the FTC to create a claim against facebook

    1. One of the early ways of social communication across the internet was with Email [e5], which originated in the 1960s and 1970s. These allowed people to send messages to each other, and look up if any new messages had been sent to them.

      Emailing has shown to withstand the test of time despite being invented in the 1960s and 1970s. Email is a core platform for communications by businesses, people, etc. I found the date of origination of the email to be the biggest shocker.

  18. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Manuela López Restrepo. How the porn bots took over Twitter. NPR, March 2024. URL: https://www.npr.org/2024/03/07/1235784919/twitter-x-bots-social-media-elon-musk (visited on 2024-03-31).

      The writer talks about how Elon Musk greatly affected the state of Twitter with the acquisition. The number of bots on the site increased over timelines, while the company itself wasn't making much revenue. With the addition of more bots, the author quotes how there are many more controversial topics arising and causing misinformation to those who don't know much.

    1. Now, there are many reasons one might be suspicious about utilitarianism as a cheat code for acting morally, but let’s assume for a moment that utilitarianism is the best way to go. When you undertake your utility calculus, you are, in essence, gathering and responding to data about the projected outcomes of a situation. This means that how you gather your data will affect what data you come up with.

      This is very important because data collection and application for utilitarianism can be complicated and flawed. If data is collected and skewed towards one opinion rather than the other, those who don't have the same views will be affected. This brings up the question. What is the appropriate data collection and interpretation for total utilitarianism?

  19. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Sean Cole. Inside the weird, shady world of click farms. January 2024. URL: https://www.huckmag.com/article/inside-the-weird-shady-world-of-click-farms (visited on 2024-03-07).

      This article really shows how click farming works and gives readers a look into the number of devices that are used for the whole operation. As well as show how dangerous it can be with authenticating true or false headlines, articles, etc. We usually depend on the number of views/likes something has in order to gain a perspective, but with click farming, any article can go viral. This article does a nice job putting things into perspective for social media/internet users like myself

    1. What bots do you like?

      The bot that I like is on Discord called Musico bot, which allows users to queue up songs, playback controls, and listen to the same songs with friends in your voice chat. I find it very convenient, helpful, and interactive for the whole Discord party.

    1. How often do you hear phrases like “social media isn’t real life”?

      I don't hear this as much as my other peers, but I can see how they view that. Some people present themselves differently on social media than in real life. They may act totally differently than what they actually post, which brings up the thought that social media isn't real life.

    1. Kantianism: “Act only according to that maxim whereby you can, at the same time, will that it should become a universal law.” Meaning: only follow rules that you are ok with everyone else following. For example, you might conclude that it is wrong to lie no matter what the consequences are. Kant certainly thought so, but many have disagreed with him.

      I find Deontology interesting, but I rather disagree because everyone has a different perception of what they view as right or wrong. How is someone punished by others for wrongdoing when they view it as right? The paragraph then goes on to talk about Immanuel Kant being a baseline for ethics, but it states it doesn't need to be based on him, so how would this be derived by others?