18 Matching Annotations
  1. Feb 2026
    1. Some users might not be able to see images on websites for a variety of reasons. The user might be blind or low-vision. Their device or internet connection might not support images. Or perhaps all the images got deleted (like what happened to The Onion).

      I first learned about alt-text in INFO 201, and I was both surprised and grateful to be introduced to it. It really opened my eyes to how thoughtful design can make a huge difference for users with disabilities. Since then, I’ve become more aware of how important accessibility is for creating inclusive digital spaces.

    1. Assistive technologies give tools to disabled people to help them become more “normal.” So the disabled person becomes able to move through a world that was not designed for them. But there is still an expectation that disabled people must become more “normal,” and often these assistive technologies are very expensive.

      This section reminds me of an Apple ad I saw about how their accessibility features help students with disabilities succeed in college. I once watched an Apple employee with a visual disability independently complete an entire customer transaction using only voice and listening tools on his iPhone. It really shows how designing with accessibility in mind can open up more equal opportunities and everyday independence for people with disabilities.

    1. When we use social media platforms though, we at least partially give up some of our privacy.

      Eli Pariser's quote in The Filter Bubble, “You’re getting a free service, and the cost is information about you,” is a powerful reminder of the hidden trade-offs in digital life. We often enjoy the convenience of online platforms without realizing we are paying with our personal data. This invisible exchange feels especially concerning because most users never fully understand what they are giving up.

    1. Unclear Privacy Rules: Sometimes privacy rules aren’t made clear to the people using a system. For example: If you send “private” messages on a work system, your boss might be able to read them. When Elon Musk purchased Twitter, he also was purchasing access to all Twitter Direct Messages

      This quote made me think about the long and complex consent agreements that users must accept before using many platforms. These documents often hide important privacy rules in dense language, making it difficult for users to fully understand what they are agreeing to. It raises the concern that companies might intentionally design these agreements to obscure their true data practices, taking advantage of users' lack of time or legal knowledge.

    1. People working with data sets always have to deal with problems in their data, stemming from things like mistyped data entries, missing data, and the general problem of all data being a simplification of reality. Sometimes a dataset has so many problems that it is effectively poisoned or not feasible to work with.

      This section is an important reminder that data quality is critical before drawing insights or conclusions. If the data is biased or low quality, it can lead to misleading results that affect decision-making. In some cases, this could harm certain groups by reinforcing unfair patterns or promoting incorrect assumptions.

    1. Additionally, social media might collect information about non-users, such as when a user posts a picture of themselves with a friend who doesn’t have an account, or a user shares their phone contact list with a social media site, some of whom don’t have accounts (Facebook does this).

      This reminds me of growing concerns about data privacy on social media, especially when platforms collect information not only from users but also from non-users. It raises an ethical question about whether people need to get consent before posting content that includes others, like friends or family. This is especially important for children, whose digital lives are often shared by their parents before they are old enough to understand or express concern.

  2. Jan 2026
    1. While trolling can be done for many reasons, some trolling communities take on a sort of nihilistic philosophy

      I think nihilism is a meaningful way to explain some forms of trolling, especially when the goal is to provoke a reaction without concern for truth or harm. However, it makes me question whether trolls actually see themselves as nihilists, or if that label is applied afterward to describe their behavior. Maybe nihilism is less of a motive and more of a framework we use to make sense of actions that seem chaotic, harmful, or detached from moral concern.

    1. Additionally, the enjoyment of causing others pain or distress (“lulz”) has also been part of the human experience for millennia:

      This history of pre-internet trolling made me think more deeply about the psychology behind online trolling and verbal bullying in real life. It makes me wonder whether people who troll on the internet and those who engage in verbal harm offline share similar intentions. Are they both seeking attention, power, or entertainment, or does the online environment shape a different kind of motivation?

    1. She highlights the emotional labor of keeping emotional expressions consistent with their public persona, even when they are having different or conflicted feelings.

      Influencers, and even ordinary users, often create and maintain a consistent public or social media persona. For example, a beauty influencer might present themselves as a dedicated skincare expert who puts an extreme amount of effort into their routines, hoping others will follow their example. This kind of carefully curated identity can feel authentic to viewers but may blur the line between genuine self-expression and performance.

    1. Many users were upset that what they had been watching wasn’t authentic. That is, users believed the channel was presenting itself as true events about a real girl, and it wasn’t that at all. Though, even after users discovered it was fictional, the channel continued to grow in popularity.

      Authenticity builds trust between people, whether they are close friends or complete strangers. When that trust is broken, even just once, as in the lonelygirl15 case, it can cause lasting skepticism. As a result, people may become less empathetic toward future online content, even when it turns out to be real.

    1. Friction is anything that gets in the way of a user performing an action.

      This reminds me of how following someone on social media is often quick and effortless, while unfollowing brings up a confirmation pop-up. Reading this made me reflect on how friction is designed into everyday digital interactions, sometimes to guide behavior. It also inspired me to think about how intentional friction could be added to personal devices to help reduce addictive usage.

    1. 8Chan is also the source and home of the false conspiracy theory QAnon

      It’s surprising how dissatisfaction with restrictions on one site can lead to the creation of even less regulated platforms. But as shown by 8Chan, removing content rules entirely can open the door to serious harm, including hate speech and real-world violence. Total free speech without accountability can hurt innocent people.

    1. In addition to the main components of the images, sound, and video data, this information is often stored with metadata, such as: The time the image/sound/video was created The location where the image/sound/video was taken The type of camera or recording device used to create the image/sound/video etc.

      This clearly explains the use and importance of metadata. Although I often hear the term in computer science classes, I hadn’t fully understood why it is so important. In this context, I’ve learned that beyond the visible content in images, sounds, or videos, there is additional information such as time, location, or device type. This metadata may not interest the viewer directly but can be valuable for platform management, data analysts, or other stakeholders.

    1. If we download information about a set of tweets (text, user, time, etc.) to analyze later, we might consider that set of information as the main data, and our metadata might be information about our download process, such as when we collected the tweet information, which search term we used to find it, etc.

      This example provides a very clear explanation of what metadata is. I used to struggle with understanding or defining metadata, but this helped me realize that metadata refers to the contextual details about the main data. For instance, if a product’s ingredients are the main data, then information about when the ingredients were purchased or the composition of those ingredients would be the metadata.

    1. On the other hand, some bots are made with the intention of harming, countering, or deceiving others. For example, people use bots to spam advertisements at people. You can use bots as a way of buying fake followers, or making fake crowds that appear to support a cause (called Astroturfing).

      Although bot programs are written by one or more people, the individuals who decide the content and deploy the posts often have clear intentions. While responsibility may partially lie with those who develop the bots, the primary accountability for harmful consequences should rest with those who create and control the content.

    1. Bots present a similar disconnect between intentions and actions. Bot programs are written by one or more people, potentially all with different intentions, and they are run by others people, or sometimes scheduled by people to be run by computers.

      This situation is similar to the Ship of Theseus philosophical paradox, which questions identity and responsibility when parts of an object are gradually replaced. A social media post can be created and disseminated by either a human or a bot, and bots themselves are designed by humans with different intentions. When a bot-generated post causes harm or social disruption, responsibility becomes unclear, raising ethical questions about whether accountability lies with the original creators, the operators, or the system itself.

    1. Zhuangzi

      Taoism does not rigorously enforce rules, consequences, or duties. Instead, it encourages a shift in perspective that allows ethical responses to emerge without being constrained by rigid judgments or social expectations. As illustrated in Free and Easy Wandering by Zhuangzi, Taoist ethics emphasizes the limits of individual perspectives and flow with nature rather than forcing moral decisions.

    1. It means that we have even more tools at our disposal for thinking through the ethical considerations packed into a situation, as we learn from those who see things differently.

      This sentence resonated with a question I often think about. At times, I regret or even reprimand myself for initially disagreeing with an opinion that I later realize is very reasonable. This passage helps me understand that such reactions do not necessarily reflect a flawed ethical framework, but rather limited exposure to diverse perspectives. It suggests that ethical growth comes from learning to engage with new viewpoints and acquiring additional “tools” for ethical reasoning.