28 Matching Annotations
  1. Mar 2024
    1. As a social media user, we hope you are informed about things like: how social media works, how they influence your emotions and mental state, how your data gets used or abused, strategies in how people use social media, and how harassment and spam bots operate. We hope with this you can be a more informed user of social media, better able to participate, protect yourself, and make it a valuable experience for you and others you interact with. For example, you can hopefully recognize when someone is intentionally posting something bad or offensive (like the bad cooking videos we mentioned in the Virality chapter, or an intentionally offensive statement) in an attempt to get people to respond and spread their content. Then you can decide how you want to engage (if at all) given how they are trying to spread their content.

      Knowing the mechanics behind social media can drastically improve how we engage and protect our mental well-being. It's crucial to discern the intent behind posts to navigate online spaces more wisely. Thanks for emphasizing the importance of being an informed user.

    1. In the first chapter of our book we quoted actor Kumail Nanjiani on tech innovators’ lack of consideration of ethical implications of their work. Of course, concerns about the implications of technological advancement are nothing new. In Plato’s Phaedrus (~370BCE), Socrates tells (or makes up1) a story from Egypt critical of the invention of writing: Now in those days the god Thamus was the king of the whole country of Egypt, […] [then] came Theuth and showed his inventions, desiring that the other Egyptians might be allowed to have the benefit of them; […] [W]hen they came to letters, This, said Theuth, will make the Egyptians wiser and give them better memories; it is a specific both for the memory and for the wit. Thamus replied: […] this discovery of yours will create forgetfulness in the learners’ souls, because they will not use their memories; they will trust to the external written characters and not remember of themselves. The specific which you have discovered is an aid not to memory, but to reminiscence, and you give your disciples not truth, but only the semblance of truth; they will be hearers of many things and will have learned nothing; they will appear to be omniscient and will generally know nothing; they will be tiresome company, having the show of wisdom without the reality.

      I think the ancient debate in Plato's "Phaedrus" strikingly mirrors today's tech concerns. It shows how our excitement for new gadgets should be balanced with thoughtful consideration of their impacts. This age-old wisdom reminds us to ponder deeply on the true costs and benefits of technological advancements.

  2. Feb 2024
    1. Limits of Reconciliation# When we think about repair and reconciliation, many of us might wonder where there are limits. Are there wounds too big to be repaired? Are there evils too great to be forgiven? Is anyone ever totally beyond the pale of possible reconciliation? Is there a point of no return? One way to approach questions of this kind is to start from limit cases. That is, go to the farthest limit and see what we find there by way of a template, then work our way back toward the everyday. Let’s look at two contrasting limit cases: one where philosophers and cultural leaders declared that repairs were possible even after extreme wrongdoing, and one where the wrongdoers were declared unforgivable.1 Nuremberg Trials# After the defeat of Nazi Germany, prominent Nazi figures were put on trial in the Nuremberg Trials. These trials were a way of gathering and presenting evidence of the great evils done by the Nazis, and as a way of publicly punishing them. We could consider this as, in part, a large-scale public shaming of these specific Nazis and the larger Nazi movement. Some argued that there was no type of reconciliation or forgiveness possible given the crimes committed by the Nazis. Hannah Arendt argued that no possible punishment could ever be sufficient: The Nazi crimes, it seems to me, explode the limits of the law; and that is precisely what constitutes their monstrousness. For these crimes, no punishment is severe enough. It may well be essential to hang Göring, but it is totally inadequate.

      I think the Nuremberg Trials illustrate a critical boundary in the concept of reconciliation. In my view, they show that while legal justice is vital, it may not always provide complete closure or moral resolution, especially for vast atrocities. This challenges us to think deeply about the limits of forgiveness and justice.

    1. While public criticism and shaming have always been a part of human culture, the Internet and social media have created new ways of doing so. We’ve seen examples of this before with Justine Sacco and with crowd harassment (particularly dogpiling). For an example of public shaming, we can look at late-night TV host Jimmy Kimmel’s annual Halloween prank, where he has parents film their children as they tell the parents tell the children that the parents ate all the kids’ Halloween candy. Parents post these videos online, where viewers are intended to laugh at the distress, despair, and sense of betrayal the children express. I will not link to these videos which I find horrible, but instead link you to these articles: Jimmy Kimmel’s Halloween prank can scar children. Why are we laughing? (archived copy) Jimmy Kimmel’s Halloween Candy Prank: Harmful Parenting? We can also consider events in the #MeToo movement as at least in part public shaming of sexual harassers (but also of course solidarity and organizing of victims of sexual harassment, and pushes for larger political, organizational, and social changes). 18.2.1. Aside on “Cancel Culture”# The term “cancel culture” can be used for public shaming and criticism, but is used in a variety of ways, and it doesn’t refer to just one thing. The offense that someone is being canceled for can range from sexual assault of minors (e.g., R. Kelly, Woody Allen, Kevin Spacey), to minor offenses or even misinterpretations. The consequences for being “canceled” can range from simply the experience of being criticized, to loss of job or criminal charges. Given the huge range of things “cancel culture” can be referring to, we’ll mostly stick to talking here about “public shaming,” and “public criticism.”

      Public shaming on social media, particularly practices like Jimmy Kimmel's Halloween prank, raises ethical concerns. While intended as humor, they can cause real distress. The blending of public criticism and entertainment highlights the need for more empathy and consideration in what we share and consume online.

    1. Harassment can also be done through crowds. Crowd harassment has also always been a part of culture, such as riots, mob violence, revolts, revolution, government persecution, etc. Social media then allows new ways for crowd harassment to occur. Crowd harassment includes all the forms of individual harassment we already mentioned (like bullying, stalking, etc.), but done by a group of people. Additionally, we can consider the following forms of crowd harassment: Dogpiling: When a crowd of people targets or harasses the same person. Public Shaming (this will be our next chapter) Cross-platform raids (e.g., 4chan group planning harassment on another platform) Stochastic terrorism The use of mass public communication, usually against a particular individual or group, which incites or inspires acts of terrorism which are statistically probable but happen seemingly at random. See also: An atmosphere of violence: Stochastic terror in American politics In addition, fake crowds (e.g., bots or people paid to post) can participate in crowd harassment. For example: “The majority of the hate and misinformation about [Meghan Markle and Prince Henry] originated from a small group of accounts whose primary, if not sole, purpose appears to be to tweet negatively about them. […] 83 accounts are responsible for 70% of the negative hate content targeting the couple on Twitter.”

      Crowd harassment on social media, such as dogpiling and cross-platform raids, magnifies the harm of individual harassment. It's disturbing how quickly a targeted attack can escalate and spread. Social media platforms need to address this collective behavior more aggressively to protect individuals from widespread, coordinated abuse.

    1. Individual harassment (one individual harassing another individual) has always been part of human cultures, bur social media provides new methods of doing so. There are many methods by which through social media. This can be done privately through things like: Bullying: like sending mean messages through DMs Cyberstalking: Continually finding the account of someone, and creating new accounts to continue following them. Or possibly researching the person’s physical location. Hacking: Hacking into an account or device to discover secrets, or make threats. Tracking: An abuser might track the social media use of their partner or child to prevent them from making outside friends. They may even install spy software on their victim’s phone. Death threats / rape threats Etc. Individual harassment can also be done publicly before an audience (such as classmates or family). For example: Bullying: like posting public mean messages Impersonation: Making an account that appears to be from someone and having that account say things to embarrass or endanger the victim. Doxing: Publicly posting identifying information about someone (e.g., full name, address, phone number, etc.). Revenge porn / deep-fake porn Etc.

      I think individual harassment on social media is a significant issue that requires urgent attention. These platforms should not be spaces where people fear bullying, stalking, or privacy invasions. It's crucial to enforce stricter regulations and provide better support for victims to foster a safer, more respectful online community.

    1. Some online platforms are specifically created for crowdsourcing. For example: Wikipedia: Is an online encyclopedia whose content is crowdsourced. Anyone can contribute, just go to an unlocked Wikipedia page and press the edit button. Institutions don’t get special permissions (e.g., it was a scandal when US congressional staff edited Wikipedia pages), and the expectation that editors do not have outside institutional support is intended to encourage more people to contribute. Quora: An crowdsourced question and answer site. Stack Overflow: A crowdsourced question-and-answer site specifically for programming questions. Amazon Mechanical Turk: A site where you can pay for crowdsourcing small tasks (e.g., pay a small amount for each task, and then let a crowd of people choose to do the tasks and get paid). Upwork: A site that lets people find and contract work with freelancers (generally larger and more specialized tasks than Amazon Mechanical Turk. Project Sidewalk: Crowdsourcing sidewalk information for mobility needs (e.g., wheelchair users).

      I've found that these platforms demonstrate diverse applications of crowdsourcing, utilizing the collective knowledge, skills, or inputs of a large group of people. Some enable anyone to contribute to a large knowledge base, democratizing information creation and maintenance. There are also those that connect freelancers with clients, facilitating the crowdsourcing of professional services and projects. Each platform meets different needs and demonstrates how crowdsourcing can be customized to collect specific types of data or services.

    1. Different Ways of Collaborating and Communicating# There have been many efforts to use computers to replicate the experience of communicating with someone in person, through things like video chats, or even telepresence robots]. But there are ways that attempts to recreate in-person interactions inevitably fall short and don’t feel the same. Instead though, we can look at different characteristics that computer systems can provide, and find places where computer-based communication works better, and is Beyond Being There (pdf here). Some of the different characteristics that means of communication can have include (but are not limited to): Location: Some forms of communication require you to be physically close, some allow you to be located anywhere with an internet signal. Time delay: Some forms of communication are almost instantaneous, some have small delays (you might see this on a video chat system), or have significant delays (like shipping a package). Synchronicity: Some forms of communication require both participants to communicate at the same time (e.g., video chat), while others allow the person to respond when convenient (like a mailed physical letter). Archiving: Some forms of communication automatically produce an archive of the communication (like a chat message history), while others do not (like an in-person conversation) Anonymity: Some forms of communication make anonymity nearly impossible (like an in-person conversation), while others make it easy to remain anonymous. -Audience: Communication could be private or public, and they could be one-way (no ability to reply), or two+-way where others can respond. Because of these (and other) differences, different forms of communication might be preferable for different tasks. For example, you might send an email to the person sitting next at work to you if you want to keep an archive of the communication (which is also conveniently grouped into email threads). Or you might send a text message to the person sitting next to you if you are criticizing the teacher, but want to do so discretely, so the teacher doesn’t notice. These different forms of communication can then support different methods of crowdsourcing.

      Different forms of communication each have unique characteristics, such as location flexibility, time delay, synchronization, archiving, anonymity and audience reach. These attributes make certain media more suitable for specific tasks. Understanding these differences can help optimize the efficiency and appropriateness of communication, thereby enhancing personal and professional interactions. This approach can also influence various crowdsourcing methods by capitalizing on the advantages of different forms of communication.

    1. Individual users are often given a set of moderation tools they can use themselves, such as: Block an account: a user can block an account from interacting with them or seeing their content Mute an account: a user can allow an account to try interacting with them, but the user will never see what that account did. Mute a phrase or topic: some platforms let users block content by phrases or topics (e.g., they are tired of hearing about cryptocurrencies, or they don’t want spoilers for the latest TV show). Delete: Some social media platforms let users delete content that was directed at them (e.g., replies to their post, posts on their wall, etc.) Report: Most social media sites allow users to report or flag content as needing moderation. And there are other options and nuances as well, depending on the platform. Fig. 14.1 Two YouTubers Tweeting about YouTube’s comment moderation options vs. Twitter.

      These tools vary by platform, affecting user experience and content ownership. Such differences highlight the importance of customizable moderation for user safety and comfort, while also impacting community engagement and dialogue.

    1. Quality Control# In order to make social media sites usable and interesting to users, they may ban different types of content such as advertisements, disinformation, or off-topic posts. Almost all social media sites (even the ones that claim “free speech”) block spam, mass-produced unsolicited messages, generally advertisements, scams, or trolling. Without quality control moderation, the social media site will likely fill up with content that the target users of the site don’t want, and those users will leave. What content is considered “quality” content will vary by site, with 4chan considering a lot of offensive and trolling content to be “quality” but still banning spam (because it would make the site repetitive in a boring way), while most sites would ban some offensive content.

      Content review practices on social media platforms are a critical and complex issue that requires balancing the needs of free speech with maintaining a safe and enjoyable user experience. This delicate balancing act requires careful consideration and ongoing dialog between platforms, users, and stakeholders to draw the line between censorship and freedom and ensure that platforms maintain inclusive and respectful spaces.

    1. Since social media platforms can gather so much data on their users, they can try to use data mining to figure out information about their users’ moods, mental health problems, or neurotypes (e.g., ADHD, Autism). For example, Facebook has a suicide detection algorithm, where they try to intervene if they think a user is suicidal (Inside Facebook’s suicide algorithm: Here’s how the company uses artificial intelligence to predict your mental state from your posts). As social media companies have tried to detect talk of suicide and sometimes remove content that mentions it, users have found ways of getting around this by inventing new word uses, like “unalive.” Larger efforts at trying to determine emotions or mental health through things like social media use, or iPhone or iWatch use, have had very questionable results, and any claims of being able to detect emotions reliably are probably false. Additionally, these attempts at detecting mental health can be part of violating privacy or can be used for unethical surveillance, such as: your employer might detect that you are unhappy, and consider firing you since they think you might not be fully committed to the job someone might build a system that tries to detect who is Autistic, and then force them into an abusive therapy system to try and “cure” them of their Autism (see also this more scientific explanation of that linked article)

      I feel that as we navigate the digital age, technological advances aimed at identifying and addressing mental health issues must be grounded in ethical practices that prioritize the privacy and agency of the individual, complemented by human judgment and professional mental health support. The conversation around these issues must continue to evolve to ensure that technological tools enhance, rather than compromise, the well-being and dignity of individuals.

    1. While there are healthy ways of sharing difficult emotions and experiences (see the next section), when these difficult emotions and experiences are thrown at unsuspecting and unwilling audiences, that is called trauma dumping. Social media can make trauma dumping easier. For example, with parasocial relationships, you might feel like the celebrity is your friend who wants to hear your trauma. And with context collapse, where audiences are combined, how would you share your trauma with an appropriate audience and not an inappropriate one (e.g., if you re-post something and talk about how it reminds you of your trauma, are you dumping it on the original poster?). Trauma dumping can be bad for the mental health of those who have this trauma unexpectedly thrown at them, and it also often isn’t helpful for the person doing the trauma dumping either: Venting, by contrast, is a healthy form of expressing negative emotion, such as anger and frustration, in order to move past it and find solutions. Venting is done with the permission of the listener and is a one-shot deal, not a recurring retelling or rumination of negativity. A good vent allows the venter to get a new perspective and relieve pent-up stress and emotion. While there are benefits to venting, there are no benefits to trauma dumping. In trauma dumping, the person oversharing doesn’t take responsibility or show self-reflection. Trauma dumping is delivered on the unsuspecting. The purpose is to generate sympathy and attention not to process negative emotion. The dumper doesn’t want to overcome their trauma; if they did, they would be deprived of the ability to trauma dump. How to Overcome Social Media Trauma Dumping

      I think dealing with the complexities of sharing difficult emotions on social media requires a delicate balance between seeking support and respecting the boundaries of others. It is important to consider context and audience when sharing personal trauma online. Choosing a more private or controlled environment where the audience is willing and ready to offer support can prevent unintended negative consequences.

    1. Activity: Value statements in what goes viral# 12.7.1. Choose three scenarios# When content goes viral there may be many people with a stake in it’s going viral, such as: The person (or people) whose content or actions are going viral, who might want attention, or get financial gain, or might be embarrassed or might get criticism or harassment, etc. Different people involved might have different interests. Some may not have awareness of it happening at all (like a video of an infant). Different audiences might have interests such as curiosity or desire to bring justice to a situation or desire to get attention for themselves or their ideas based on engaging the viral content, or desire to troll or harass others. Social networking platforms might have interests such as increased attention to their platform or increased advertising, or increased or decreased reputation (in views of different audiences). List at least three different scenarios of content going viral and list out the interests of different groups and people in the content going viral. 12.7.2. Create value statements# Social media platforms have some ability to influence what goes viral and how (e.g., recommendation algorithms, what actions are available, what data is displayed, etc.), though they only have partial control, since human interaction and organization also play a large role. Still, regardless of whether we can force any particular outcome, we can still consider of what you think would be best for what content should go viral, how much, and in what ways. Create a set of value statements for when and how you ideally would want content to go viral. Try to come up with at least 10 value statements. We encourage you to consider different ethics frameworks as you try to come up with ideas.

      As we engage with viral content, whether as creators, participants, or observers, these value statements require us to reflect on the broader implications of online interactions. Behind every viral phenomenon lies a complex web of human stories, aspirations and responsibilities that deserve our thoughtful consideration.

    1. In the 1976 book The Selfish Gene, evolutionary biologist Richard Dawkins1 said rather than looking at the evolution of organisms, it made even more sense to look at the evolution of the genes of those organisms (sections of DNA that perform some functions and are inherited). For example, if a bee protects its nest by stinging an attacking animal and dying, then it can’t reproduce and it might look like a failure of evolution. But if the gene that told the bee to die protecting the nest was shared by the other bees in the nest, then that one bee dying allows the gene to keep being replicated, so the gene is successful evolutionarily. Since genes contained information about how organisms would grow and live, then biological evolution could be considered to be evolving information. Dawkins then took this idea of the evolution of information and applied it to culture, coining the term “meme” (intended to sound like “gene”). A meme is a piece of culture that might reproduce in an evolutionary fashion, like a hummable tune that someone hears and starts humming to themselves, perhaps changing it, and then others overhearing next. In this view, any piece of human culture can be considered a meme that is spreading (or failing to spread) according to evolutionary forces. So we can use an evolutionary perspective to consider the spread of:

      Modalities as units of cultural transmission, spread through imitation and mutation, echoing the processes of genetic inheritance and mutation. Their survival and proliferation depend on their adaptation and resonance in the cultural environment, like organisms in a biological ecosystem. This analogy emphasizes the dynamic and competitive nature of cultural evolution, in which ideas and practices evolve to meet the challenges of the environment.

    1. Individual analysis focuses on the behavior, bias, and responsibility an individual has, while systemic analysis focuses on the how organizations and rules may have their own behaviors, biases, and responsibility that aren’t necessarily connected to what any individual inside intends. For example, there were differences in US criminal sentencing guidelines between crack cocaine vs. powder cocaine in the 90s. The guidelines suggested harsher sentences on the version of cocaine more commonly used by Black people, and lighter sentences on the version of cocaine more commonly used by white people. Therefore, when these guidelines were followed, they had have racially biased (that is, racist) outcomes regardless of intent or bias of the individual judges. (See: https://en.wikipedia.org/wiki/Fair_Sentencing_Act).

      This example illustrates the far-reaching effects of systemic biases within institutions and how they can perpetuate inequality, even when there is no explicit intent on the part of the individual. It emphasizes the importance of reviewing and reforming policies and guidelines that, while seemingly neutral, may produce discriminatory results based on race or other factors. Recognizing and addressing these systemic issues is critical to creating a more equitable society.

    1. When social media platforms show users a series of posts, updates, friend suggestions, ads, or anything really, they have to use some method of determining which things to show users. The method of determining what is shown to users is called a recommendation algorithm, which is an algorithm (a series of steps or rules, such as in a computer program) that recommends posts for users to see, people for users to follow, ads for users to view, or reminders for users. Some recommendation algorithms can be simple such as reverse chronological order, meaning it shows users the latest posts (like how blogs work, or Twitter’s “See latest tweets” option). They can also be very complicated taking into account many factors, such as: Time since posting (e.g., show newer posts, or remind me of posts that were made 5 years ago today) Whether the post was made or liked by my friends or people I’m following How much this post has been liked, interacted with, or hovered over Which other posts I’ve been liking, interacting with, or hovering over What people connected to me or similar to me have been liking, interacting with, or hovering over What people near you have been liking, interacting with, or hovering over (they can find your approximate location, like your city, from your internet IP address, and they may know even more precisely) This perhaps explains why sometimes when you talk about something out loud it gets recommended to you (because someone around you then searched for it). Or maybe they are actually recording what you are saying and recommending based on that. Phone numbers or email addresses (sometimes collected deceptively) can be used to suggest friends or contacts. And probably many more factors as well! Now, how these algorithms precisely work is hard to know, because social media sites keep these algorithms secret, probably for multiple reasons: They don’t want another social media site copying their hard work in coming up with an algorithm They don’t want users to see the algorithm and then be able to complain about specific details They don’t want malicious users to see the algorithm and figure out how to best make their content go viral

      Social media platforms use complex recommendation algorithms to curate content for users, considering factors like post timing, user interactions, and network connections. The secrecy surrounding these algorithms prevents imitation, user manipulation, and abuse. Understanding these systems' intricacies can enhance our awareness of our digital environment and the tailored experiences we receive online.

    1. Some users might not be able to see images on websites for a variety of reasons. The user might be blind or low-vision. Their device or internet connection might not support images. Or perhaps all the images got deleted (like what happened to The Onion). In order for these users to still get the information intended from the images, the image can come with alt-text. You can read more about alt-text in this New York Times feature Reddit unfortunately doesn’t allow alt-text for their images. So while we were going to have a programming demo here to look up the alt-text, there is no alt-text on images uploaded to Reddit to look up, meaning this site is unfriendly to blind or low-vision users.

      This highlights a key aspect of web design that is often overlooked. Ensuring that alternative text can be used for images is not just about complying with accessibility standards; it's about making the web a more inclusive place for everyone.

    1. A disability is an ability that a person doesn’t have, but that their society expects them to have.1 For example: If a building only has staircases to get up to the second floor (it was built assuming everyone could walk up stairs), then someone who cannot get up stairs has a disability in that situation. If a physical picture book was made with the assumption that people would be able to see the pictures, then someone who cannot see has a disability in that situation. If tall grocery store shelves were made with the assumption that people would be able to reach them, then people who are short, or who can’t lift their arms up, or who can’t stand up, all would have a disability in that situation. If an airplane seat was designed with little leg room, assuming people’s legs wouldn’t be too long, then someone who is very tall, or who has difficulty bending their legs would have a disability in that situation.

      This perspective on disability emphasizes the role of social structures and assumptions in defining what constitutes disability. It emphasizes that disability is not merely an attribute of the individual, but is often the result of an environment that fails to meet diverse needs. For example, if information is usually shared in an auditory form, this may be a challenge for people who are deaf or hard of hearing. The concept emphasizes the need for inclusive and accessible design in all aspects of society and recognizes that disability is often the result of an environment that lacks accommodation of diverse abilities.

    1. Unclear Privacy Rules: Sometimes privacy rules aren’t made clear to the people using a system. For example: If you send “private” messages on a work system, your boss might be able to read them. When Elon Musk purchased Twitter, he also was purchasing access to all Twitter Direct Messages

      Then there's the fact that many apps and services that are not explicitly related to location sharing continuously track and record user locations. This information is often shared with third parties for advertising or analytics. This pervasive tracking can reveal information about a person's habits, daily activities, and the places they frequent, often without the user's explicit consent and without understanding the scope of this surveillance.

    1. When we use social media platforms though, we at least partially give up some of our privacy. For example, a social media application might offer us a way of “Private Messaging” (also called Direct Messaging) with another user. But in most cases those “private” messages are stored in the computers at those companies, and the company might have computer programs that automatically search through the messages, and people with the right permissions might be able to view them directly. In some cases we might want a social media company to be able to see our “private” messages, such as if someone was sending us death threats. We might want to report that user to the social media company for a ban, or to law enforcement (though many people have found law enforcement to be not helpful), and we want to open access to those “private” messages to prove that they were sent.

      I think using social media inherently involves some privacy sacrifices. These platforms often require personal information such as name, location and interests to set up an account. Through postings and interactions, users voluntarily share aspects of their lives, which the platforms can track and analyze. In addition, social media companies often collect data on user behavior both on and off the platform for targeted advertising and content management, further eroding individual privacy.

  3. Jan 2024
    1. Data can be poisoned intentionally as well. For example, in 2021, workers at Kellogg’s were upset at their working conditions, so they agreed to go on strike, and not work until Kellogg’s agreed to improve their work conditions. Kellogg’s announced that they would hire new workers to replace the striking workers: Kellogg’s proposed pay and benefits cuts while forcing workers to work severe overtime as long as 16-hour-days for seven days a week. Some workers stayed on the job for months without a single day off. The company refuses to meet the union’s proposals for better pay, hours, and benefits, so they went on strike. Earlier this week, the company announced it would permanently replace 1,400 striking workers. People Are Spamming Kellogg’s Job Applications in Solidarity with Striking Workers – Vice MotherBoard People in the antiwork subreddit found the website where Kellogg’s posted their job listing to replace the workers. So those Redditors suggested they spam the site with fake applications, poisoning the job application data, so Kellogg’s wouldn’t be able to figure out which applications were legitimate or not (we could consider this a form of trolling). Then Kellogg’s wouldn’t be able to replace the striking workers, and they would have to agree to better working conditions. Then Sean Black, a programmer on TikTok saw this and decided to contribute by creating a bot that would automatically log in and fill out applications with random user info, increasing the rate at which he (and others who used his code) could spam the Kellogg’s job applications:

      This demonstrates the potential of coordinated online campaigns to disrupt corporate behavior and amplify worker demand. By weaponizing data through the mass submission of fake job applications, protesters have leveraged technology to make a tangible impact. This tactic, while controversial, demonstrates a novel form of digital strike that blurs the line between activism and online disruption and raises questions about the ethics and effectiveness of such methods in labor disputes.

    1. One thing to note in the above case of candle reviews and COVID is that just because something appears to be correlated, doesn’t mean that it is connected in the way it looks like. In the above, the correlation might be due mostly to people buying and reviewing candles in the fall, and diseases, like COVID, spreading most during the fall. It turns out that if you look at a lot of data, it is easy to discover spurious correlations where two things look like they are related, but actually aren’t. Instead, the appearance of being related may be due to chance or some other cause. For example: Fig. 8.3 An example spurious correlation from Tyler Vigen’s collection of Spurious Correlations# By looking at enough data in enough different ways, you can find evidence for pretty much any conclusion you want. This is because sometimes different pieces of data line up coincidentally (coincidences happen), and if you try enough combinations, you can find the coincidence that lines up with your conclusion. If you want to explore the difficulty of inferring trends from data, the website fivethirtyeight.com has an interactive feature called “Hack Your Way To Scientific Glory” where, by changing how you measure the US economy and how you measure what political party is in power in the US, you can “prove” that either Democrats or Republicans are better for the economy. Fivethirtyeight has a longer article on this called “Science Isn’t Broken: It’s just a hell of a lot harder than we give it credit for.”

      An example is that a graph showing the number of people wearing red shirts correlates with the stock market performance. The graph from 2010 to 2020 shows peaks in red shirt sightings aligning with market upswings and fewer red shirts worn during downturns. This suggests a correlation, but it’s likely a coincidence without causative connection, as clothing choice is not related to stock market dynamics.

    1. But the essayist Film Crit Hulk argues against this in Don’t feed the trolls, and other hideous lies. That piece argues that the “don’t feed the trolls” strategy doesn’t stop trolls from harassing: Ask anyone who has dealt with persistent harassment online, especially women: [trolls stopping because they are ignored] is not usually what happens. Instead, the harasser keeps pushing and pushing to get the reaction they want with even more tenacity and intensity. It’s the same pattern on display in the litany of abusers and stalkers, both online and off, who escalate to more dangerous and threatening behavior when they feel like they are being ignored.

      I used to see a popular female gamer and streamer, despite her attempts to ignore and not respond to sexist and derogatory comments from trolls in her live chat, the trolling escalated. The trolls persisted and began to target her with increasingly offensive and threatening messages.

    1. If the immediate goal of the action of trolling is to cause disruption or provoke emotional reactions, what is it that makes people want to do this disruption or provoking of emotional reactions? Some reasons people engage in trolling behavior include: Amusement: Trolls often find the posts amusing, whether due to the disruption or emotional reaction. If the motivation is amusement at causing others’ pain, that is called doing it for the lulz. Gatekeeping: Some trolling is done in a community to separate out an ingroup from outgroup (sometimes called newbies or normies). The ingroup knows that a post is just trolling, but the outgroup is not aware and will engage earnestly. This is sometimes known as trolling the newbies. Feeling Smart: Going with the gatekeeping role above, trolling can make a troll or observer feel smarter than others, since they are able to see that it is trolling while others don’t realize it. Feeling Powerful: Trolling sometimes gives trolls a feeling of empowerment when they successfully cause disruption or cause pain.** Advance and argument / make a point: Trolling is sometimes done in order to advance an argument or make a point. For example, proving that supposedly reliable news sources are gullible by getting them to repeat an absurd gross story. Punish or stop: Some trolling is in service of some view of justice, where a person, group or organization is viewed as doing something “bad” or “deserving” of punishment, and trolling is a way of fighting back.

      One more reason people engage in trolling behavior is to seek attention or recognition. Trolls may crave the spotlight and use trolling as a means to stand out, gain notoriety, or garner a sense of importance within online communities. This desire for attention can drive individuals to engage in disruptive and provocative behavior to achieve their goal.

    1. As an example of the ethically complicated nature of parasocial relationships, let’s consider the case of Fred Rogers, who hosted a children’s television program from 1968 to 2001. In his television program, Mr. Rogers wanted all children to feel cared for and loved. To do this, he intentionally fostered a parasocial relationship with the children in his audience (he called them his “television friends”):

      Fred Rogers' unique approach in fostering parasocial relationships through his television show exemplified a positive and ethical use of media influence, where he used his platform to promote messages of self-worth and acceptance to children. His genuine interaction, both on-screen and through personal responses like letters, reinforced the authenticity and heartfelt impact of his message, distinguishing his approach as a nurturing and trustworthy connection with his young audience.

    1. Early in the days of YouTube, one YouTube channel (lonelygirl15) started to release vlogs (video web logs) consisting of a girl in her room giving updates on the mundane dramas of her life. But as the channel continued posting videos and gaining popularity, viewers started to question if the events being told in the vlogs were true stories, or if they were fictional. Eventually, users discovered that it was a fictional show, and the girl giving the updates was an actress.

      The "lonelygirl15" series, while initially deceiving viewers into believing it was a real-life vlog, eventually revealed itself to be a scripted series, featuring professional actors and a well-crafted storyline. This revelation shifted the audience's perception, transforming the series into a pioneering form of online entertainment that combined traditional storytelling with the then-emerging platform of YouTube.

    1. In 1997, the internet service provider AOL introduced a chat system called AOL Instant Messenger (AIM) that anyone could join and maintain a list of friends. You could then see what friends were currently available, and start sending them messages. You could also leave away messages or profile quotes.

      Launched in 1997, AOL Instant Messenger (AIM) was a groundbreaking development in online social interaction. In addition to messaging, AIM's innovative features, such as personalized away messages and profile references, provided users with a novel way to express themselves and manage their online status, setting a precedent for many aspects of today's social media platforms.

    1. The book Writing on the Wall: Social Media - The First 2,000 Years by Tom Standage outlines some of the history of social media before internet-based social media platforms such as in times before the printing press:

      This book can be an important addition, especially for those studying the historical trajectory of social media. It particularly emphasizes the parallels between ancient practices such as graffiti and hand-copied texts and today's digital platforms. This perspective is crucial to understanding the cyclical nature of information dissemination, from the rumor-filled pamphlets of the past to the conspiracy-filled environment of modern Internet-based social media.