27 Matching Annotations
  1. Dec 2023
    1. But even people who thought they were doing something good regretted the consequences of their creations, such as Eli Whitney who hoped his invention of the cotton gin would reduce slavery in the United States, but only made it worse, or Alfred Nobel who invented dynamite (which could be used in construction or in war) and decided to create the Nobel prizes, or Albert Einstein regretting his role in convincing the US government to invent nuclear weapons, or Aza Raskin regretting his invention infinite scroll.

      The statement cites cases in which people lamented the unforeseen outcomes of their works after being initially inspired by positive intentions. For example, Eli Whitney created the cotton gin in an attempt to lessen slavery, but it unintentionally made matters worse. The Nobel Prizes were established by dynamite creator Alfred Nobel in an effort to counteract the potentially disastrous effects of his creation. Even though he was a key player in the development of nuclear weapons during World War II, Albert Einstein later expressed regret for the terrible effects of these weapons. These illustrations highlight the intricacy and unpredictable nature of technical advancements as well as the unintended repercussions that can occur even in the case of well-intentioned designers.

    1. As a social media user, we hope you are informed about things like: how social media works, how they influence your emotions and mental state, how your data gets used or abused, strategies in how people use social media, and how harassment and spam bots operate. We hope with this you can be a more informed user of social media, better able to participate, protect yourself, and make it a valuable experience for you and others you interact with.

      Knowing how social media works, how it affects feelings and mental health, and how to protect personal information are all necessary components of being an informed user. Algorithms on social media shape content depending on user interactions. It modulates emotions, resulting in both positive and bad sentiments, even though it might promote connection. Users need to check and modify settings with caution in order to protect their data privacy. Managing screen time, reporting harassment, and evaluating crucial content are some strategies for using social media effectively. It's critical to be aware of false information and proper online behavior. Users can help create a beneficial and positive social media experience for themselves and others by being informed and practicing mindfulness.

  2. Nov 2023
    1. Most programming languages are based in English, and there are very few non-English programming languages, and those that exist are rarely used. The reason few non-English programming languages exist is due to the network effect, which we mentioned last chapter. Once English became the standard language for programming, people who learn programming learn English (or enough to program with it). Attempts to create a non-English programming language face an uphill battle, since even those that know that language would still have to re-learn all their programming terms in the non-English language.

      Most programming languages ​​are based on English because of the network effect that made English the programming standard. Attempts to adopt non-English programming languages ​​face challenges because programmers, even those fluent in another language, would have to reteach programming terms in a non-English language. This reinforces the dominance of English in the software industry.

    1. Colonialism is when one group or country subjugates another group, often imposing laws, religion, culture, and languages on that group, and taking resources from them. Colonialism is often justified by belief that the subjugated people are inferior (e.g., barbaric, savage, godless, backwards), and the superiority of the group doing the subjugation (e.g., civilized, advanced).

      Colonialism, on the other hand, is the practice of ruling over a group or nation by imposing laws, religious beliefs, culture, and languages on the conquered people, as well as extracting resources from them. This practice is often justified on the grounds that the conquered people are subservient, often portrayed as savages or backward peoples, while the colonized group is seen as superior and civilised. The colonialist superiority complex serves as a justification for the subjugation of the conquered people, reinforcing the power imbalance and justifying the use of resources from colonized territories.

    1. Surveillance capitalism began when internet companies started tracking user behavior data to make their sites more personally tailored to users. These companies realized that this data was something that they could profit from, so they began to collect more data than strictly necessary (“behavioral surplus”) and see what more they could predict about users. Companies could then sell this data about users directly, or (more commonly), they could keep their data hidden, but use it to sell targeted advertisements. So, for example, Meta might let an advertiser say they want an ad to only go to people likely to be pregnant. Or they might let advertizes make ads go only to “Jew Haters” (which is ethically very bad, and something Meta allowed).

      Surveillance capitalism began when internet companies monitored user behavior to personalize sites. They collected surplus data beyond what was necessary to predict user behavior, and monetized this surplus through direct sales or more often, targeted advertising. Meta, for example, allowed advertisers to target groups, including controversial groups like “Jew Haters.” This raises ethical questions about surveillance capitalism.

    1. Free Market Businesses set their own prices and customers decide what they are willing to pay, so prices go up or down as each side decides what they are willing to charge/spend (no government intervention) See supply and demand What gets made is theoretically determined by what customers want to spend their money on, with businesses competing for customers by offering better products and better prices Especially the people with the most money, both business owners and customers

      In a free market, businesses set prices independently, customers decide how much they’re willing to pay, and prices fluctuate based on supply- and demand-side dynamics. The system works with little government interference, creating a consumer-oriented economy where companies compete by offering attractive products and reasonably priced services. In theory, what gets produced is in line with consumer preferences. What matters most, however, is how wealth is distributed, especially among business owners and wealthy consumers, which influence market trends and dynamics in this economic system.

    1. Another way of considering public shaming is as schadenfreude, meaning the enjoyment obtained from the troubles of others. A 2009 satirical article from the parody news site The Onion satirizes public shaming as being for objectifying celebrities and being entertained by their misfortune: Media experts have been warning for months that American consumers will face starvation if Hollywood does not provide someone for them to put on a pedestal, worship, envy, download sex tapes of, and then topple and completely destroy. Nation Demands Fresh Celebrity Meat - The Onion

      This passage presents a different viewpoint on public humiliation by characterizing it as an example of schadenfreude, or the enjoyment one takes from the suffering of others. It calls attention to a 2009 satirical article from the parody news website The Onion. The phenomenon of public shaming is hilariously criticized in the article, which satirizes it as a way for the public to objectify celebrities and take pleasure in their problems. A humorous element is added when media experts are cited as expressing concern about the public's ravenous need for a star to worship, belittle, and eventually destroy. This emphasizes the seemingly cyclical nature of celebrity culture and the public's consumption of such storylines.

    1. In this view, a good parent might see their child doing something bad or dangerous, and tell them to stop. The child may feel shame (they might not be developmentally able to separate their identity from the momentary rejection). The parent may then comfort the child to let the child know that they are not being rejected as a person, it was just their action that was a problem. The child’s relationship with the parent is repaired, and over time the child will learn to feel guilt instead of shame and seek to repair harm instead of hide.

      According to this viewpoint, good parenting entails responding to a child's wrongdoing by first letting them know that you disapprove of it and giving them instructions on how to stop. The youngster might feel ashamed, especially if they are not yet at a developmental stage where they can differentiate between the temporary rejection they are experiencing as a result of their actions and who they are. After that, the parent tries to lessen this guilt by consoling and assuring the youngster that the behavior is what is wrong and not them personally. The parent-child bond is strengthened as a result of this process. When the child becomes older, the goal is for them to go from shame to guilt, which will encourage them to take the initiative to make things right instead of hiding misbehavior.

    1. One useful way to think about harassment is that it is often a pattern of behavior that exploits the distinction between things that are legally proscribed and things that are hurtful, but not so harmful as to be explicitly prohibit by law given the protection of freedoms

      According to this remark, harassment is essentially a tactic that exploits the thin line that separates behaviors that are illegally prohibited from those that, although harmful, do not cause enough harm to be declared illegal. It draws attention to the abuse of this ambiguity, using the protection of rights to partake in actions that, although harmful to society, do not strictly violate the law. This viewpoint highlights the complex character of harassment, which can function within the law yet nonetheless do great harm because of its capacity to take advantage of these discrepancies.

    1. Additionally, we can consider the following forms of crowd harassment: Dogpiling: When a crowd of people targets or harasses the same person. Public Shaming (this will be our next chapter) Cross-platform raids (e.g., 4chan group planning harassment on another platform) Stochastic terrorism The use of mass public communication, usually against a particular individual or group, which incites or inspires acts of terrorism which are statistically probable but happen seemingly at random. See also: An atmosphere of violence: Stochastic terror in American politics

      Apart from explicit online harassment, crowd harassment can also take the form of dogpiling, in which multiple individuals are targeted by a group; public shaming, which is a widespread condemnation usually intensified through social media; cross-platform raids, in which groups plot harassment on one platform and carry it out on another; and stochastic terrorism, which is the use of mass communication to incite statistically probable but seemingly random acts of terrorism. The interdependence of these actions highlights the complexity of online harassment, since each type contributes to a larger environment that may incite violence, as seen by the political climate in the United States.

    1. Social media crowdsoucing can also be used for harassment, which we’ll look at more in the next couple chapters. But for some examples: the case of Justine Sacco involved crowdsourcing to identify and track her flight, and even get a photo of her turning on her phone.

      The statement highlights the duality of social media crowdsourcing by admitting that it can lead to harassment—a subject that will be covered in more detail in later chapters. This sinister side is demonstrated by the case of Justine Sacco, when her flight was tracked and identified using crowdsourcing. People even took the unsettling step of taking a picture of her while she was turning on her phone, highlighting the intrusive and unfavorable effects of crowdsourcing information in specific circumstances. This suggests a more thorough investigation of the possible harm and misuse of crowdsourcing on social media platforms.

    1. Fold-It is a game that lets players attempt to fold proteins. At the time, researchers were having trouble getting computers to do this task for complex proteins, so they made a game for humans to try it. Researchers analyzed the best players’ results for their research and were able to publish scientific discoveries based on the contributions of players.

      In order to solve the complexity that computers find difficult to handle in protein folding simulations, players in the University of Washington's Foldit online game use their spatial reasoning abilities to fold proteins. Science has benefited from this novel technique, as players have occasionally outperformed algorithms. The cooperative endeavor between researchers and gamers serves as an example of how crowdsourcing may be used to solve complex scientific issues.

    1. One thing these sites do ban though, is spam. While much of spam is certainly legal, and a form of speech, this speech is restricted on these sites. If the chat boards filled up with spam, the users would find it boring and leave, so for practical reasons, these sites still moderate for spam (though they may allow some uses of ironic spam, copypasta).

      Even though spam is frequently lawful and a form of communication, social media sites generally prohibit it in order to preserve a nice user experience. Even though spam can be considered a form of expression in and of itself, its uncontrolled existence on these sites is likely to cause user discontent and disengagement. For these reasons, moderating spam is done for pragmatic purposes. While certain platforms might allow ironic spam or copypasta in particular contexts, the general intention is to avoid overuse of these techniques, which could harm the user community and drive away people.

    1. Another concern is for the safety of the users on the social media platform (or at least the users that the platform cares about). Users who don’t feel safe will leave the platform, so social media companies are incentivized to help their users feel safe. So this often means moderation to stop trolling and harassment.

      Social media companies place a high priority on user safety in order to keep users and uphold their good name. To quickly resolve harassing and offensive content, they make use of automatic tools, human moderators, and content moderation policies. Users are empowered by community guidelines, reporting systems, and educational materials; on the other hand, privacy settings and blocking tools offer individual control. In extreme circumstances, cooperation with law enforcement may be required. Finding a balance between safety and freedom of speech is a never-ending task that calls for regular adjustment to deal with new problems.

    1. One of the ways social media can be beneficial to mental health is in finding community (at least if it is a healthy one, and not toxic like in the last section). For example, if you are bullied at school (and by classmates on some social media platform), you might find a different online community online that supports you.

      When used in a supportive and healthy setting, social media can improve mental health by creating a feeling of community. It can provide a safe haven for people dealing with issues like bullying by providing a different kind of online community. But the warning about the toxicity of some social media platforms highlights the harm that may result from unfavorable encounters, so it's important to make sure the online groups you choose promote mental health rather than hinder it.

    1. by placing the blame on the use of technology itself and making not using technology (a digital detox) the solution, we lose our ability to deal with the nuances of how we use technology and how it is designed:

      Technology's use and design involve humans, which is overlooked when we hold it responsible for our incapacity to handle its complexity. Even though a digital detox is frequently suggested as a remedy, it only provides an interim fix. Rather, the emphasis ought to be on developing a thoughtful, balanced relationship with technology. This entails learning how to correctly comprehend and negotiate its subtleties. Promoting digital literacy, ethical design concerns, and an intentional engagement with technology are essential for its constructive and thoughtful use, as opposed to completely rejecting it.

    1. It isn’t clear what should be considered as “nature” in a social media environment (human nature? the nature of the design of the social media platform? are bots unnatural?), so we’ll just instead talk about selection. When content (and modified copies of content) is in a position to be replicated, there are factors that determine whether it gets selected for replicated or not. As humans look at the content they see on social media they decide whether they want to replicate it for some reason, such as: “that’s funny, so I’ll retweet it” “that’s horrible, so I’ll respond with an angry face emoji” “reposting this will make me look smart” “I am inspired to use part of this to make a different thing”

      In a social media landscape, the definition of “nature” becomes ambiguous, including human nature, the design of a social media platform, and the presence of artificial entities such as bots. To avoid this confusion, let’s focus on selection. When content and its iterations are in the process of being replicated, there are several factors that play a role in whether or not it will be selected for replication. These factors all depend on how humans interact with the content they see on social media. People decide whether or not to replicate content on social media based on various motivations. For example, they may find something funny and retweets it, or react to something upsetting with an angry emojis. They may share content to look intelligent, or they may feel inspired to reuse part of it and create something new. This selection process is an essential part of the way information and ideas spread in the social media ecosystem. It reflects the diverse and often complicated motivations that drive human behavior in this digital world.

    1. A meme is a piece of culture that might reproduce in an evolutionary fashion, like a hummable tune that someone hears and starts humming to themselves, perhaps changing it, and then others overhearing next. In this view, any piece of human culture can be considered a meme that is spreading (or failing to spread) according to evolutionary forces. So we can use an evolutionary perspective to consider the spread of: Technology (languages, weapons, medicine, writing, math, computers, etc.), religions philosophies political ideas (democracy, authoritarianism, etc.) art organizations etc.

      The term meme was first proposed by Richard Dawkins in his book The Selfish Gene. A meme is a unit of human culture that reproduces and evolves, similar to a catchy tune that people share and mutate. From this point of view, any aspect of human culture could be considered a meme, as long as it follows the evolutionary rules of culture. From this evolutionary point of view, we can look at the spread of different aspects of our culture, such as technology (languages, weapons, medicine, written language, mathematics, computers, etc.), religion, philosophy, political ideology (from democracy to autocracy), art, organization, and much more. Each cultural element undergoes transmission, adaptation and selection, similar to biological evolution, resulting in the spread or decline of those cultural phenomena within our society.

    1. Advertisements shown to users can go well for users when the users find products they are genuinely interested in, and for making the social media site free to use (since the site makes its money from ads). Advertisements can go poorly if they become part of discrimination (like only showing housing ads to certain demographics of people), or reveal private information (like revealing to a family that someone is pregnant)

      The statement draws attention to the fact that adverts that users see on online platforms are dual in nature. On the one hand, adverts benefit users when they find things that match their true interests. They also help to keep social media platforms free of charge because these sites rely on advertising for money. On the other hand, ads may have unfavorable effects if they support discriminatory practices by favoring particular demographics in housing advertisements or if they unintentionally divulge private information, like when a person's family is unaware of their pregnancy. This contradiction highlights the possible advantages and disadvantages of online advertising while highlighting the delicate balance between delivering pertinent material and protecting user privacy and moral considerations.

    1. The method of determining what is shown to users is called a recommendation algorithm, which is an algorithm (a series of steps or rules, such as in a computer program) that recommends posts for users to see, people for users to follow, ads for users to view, or reminders for users.

      This part clarifies that the process used to choose which material consumers see is called a recommendation algorithm. It describes this algorithm as a collection of guidelines or procedures, usually applied in a computer software, that suggests different information to users, such as posts, accounts to follow, advertisements, or prompts. Its main purpose is to improve user experience and engagement by personalizing and suggesting relevant information on online platforms based on user choices and habits.

  3. Oct 2023
    1. Another strategy for managing disability is to use Universal Design, which originated in architecture. In universal design, the goal is to make environments and buildings have options so that there is a way for everyone to use it2. For example, a building with stairs might also have ramps and elevators, so people with different mobility needs (e.g., people with wheelchairs, baby strollers, or luggage) can access each area. In the elevators the buttons might be at a height that both short and tall people can reach. The elevator buttons might have labels both drawn (for people who can see them) and in braille (for people who cannot), and the ground floor button may be marked with a star, so that even those who cannot read can at least choose the ground floor.

      Universal Design, which comes from architecture, is all about making spaces as accessible as possible for people with different needs. For example, a building with stairs also has ramps and lifts, so people with different mobility needs can get in and out, like someone in a wheelchair, a parent with a stroller, or someone carrying luggage. The elevator controls are set up at a height that's accessible for short and tall people, and they're labeled in both braille and visual formats. Symbolic cues like a star on the ground floor also help people with different abilities get in and out of the building.

    1. Most humans are trichromats, meaning they can see three base colors (red, green, and blue), along with all combinations of those three colors. Human societies often assume that people will be trichromats. So people who can’t see as many colors are considered to be color blind, a disability. But there are also a small number of people who are tetrachromats and can see four base colors2 and all combinations of those four colors. In comparison to tetrachromats, trichromats (the majority of people), lack the ability to see some colors. But our society doesn’t build things for tetrachromats, so their extra ability to see color doesn’t help them much. And trichromats’ relative reduction in seeing color doesn’t cause them difficulty, so being a trichromat isn’t considered to be a disability.

      Most people can see three basic colors and their combinations, which is what society usually thinks of as color blindness. However, a tiny minority of people can see four basic colors and their variations, which is called tetrachromatism. Tetrachromats can see more colors than trichromat people, but society doesn't accept their extra abilities. Trichromats' limited color vision doesn't affect their day-to-day life, so they're not considered disabled. This is because society doesn't accept people with heightened color perception, so they can't be classified as disabled.

    1. Some governments and laws protect the privacy of individuals (using a Natural Rights ethical framing). These include the European Union’s General Data Protection Regulation (GDPR), which includes a “right to be forgotten”, and the United State’s Supreme Court has at times inferred a constitutional right to privacy.

      Some governments and legal systems place a lot of emphasis on people's privacy. This is usually based on Natural Rights ethics. For example, the European Union's GDPR has something called the right to be forgotten, and the US Supreme Court has sometimes said that people have a "right to privacy" in its decisions. These laws and court cases try to protect the idea that people have a natural right to their privacy and data protection.

    1. While we have our concerns about the privacy of our information, we often share it with social media platforms under the understanding that they will hold that information securely. But social media companies often fail at keeping our information secure. For example, the proper security practice for storing user passwords is to use a special individual encryption process for each individual password. This way the database can only confirm that a password was the right one, but it can’t independently look up what the password is or even tell if two people used the same password. Therefore if someone had access to the database, the only way to figure out the right password is to use “brute force,” that is, keep guessing passwords until they guess the right one (and each guess takes a lot of time).

      Privacy is a big concern when it comes to sharing your info with social media sites, and it's hard to know how to keep it safe. That's why it's important to use special encryption for individual passwords. That way, the database won't show your real password or know who you've shared it with. If there was a breach, hackers would have to use brute force to get your password, so it's really important to have strong data protection measures in place to keep your info safe.

    1. As a rule, humans do not like to be duped. We like to know which kinds of signals to trust, and which to distrust. Being lulled into trusting a signal only to then have it revealed that the signal was untrustworthy is a shock to the system, unnerving and upsetting. People get angry when they find they have been duped. These reactions are even more heightened when we find we have been duped simply for someone else’s amusement at having done so.

      Through reading this part I learned that people generally do not like to be tricked and prefer reliable signals. We look for predictability in distinguishing reliable signals from those that are unreliable. When we find out that a reliable signal is untrustworthy, it is emotionally upsetting and can cause anger. This reaction is heightened when the deception is done for the sole purpose of amusement, emphasizing the breach in trust and the illegality of such deception.

    1. The user interface of a computer system (like a social media site), is the part that you view and interact with. It’s what you see on your screen and what you press or type or scroll over. Designers of social media sites have to decide how to layout information for users to navigate and decide how the user performs various actions (like, retweet, post, look up user, etc.). Some information and actions will be made larger and easier to access while others will be smaller or hidden in menus or settings.

      This passage talks about the user interface of computer systems, especially when it comes to social media sites. It's all about what people see on the screen and how they use it. Designers decide how the info is displayed and how users can do things like retweet, post, and look up user. They also decide how easy it is to find certain elements. Some are easy to find, while others are hidden away in the menus or settings. Basically, it's all about how good UI design is when it comes to making it easier for people to use social media.

    1. Before this centralization of media in the 1900s, newspapers and pamphlets were full of rumors and conspiracy theories. And now as the internet and social media have taken off in the early 2000s, we are again in a world full of rumors and conspiracy theories.

      Rumors and conspiracy theories have been a part of the media for centuries, and this statement draws attention to the fact that both the 1900s and 2000s saw the rise of centralized media, as well as the emergence of the internet and the rise of social media.