32 Matching Annotations
  1. May 2023
    1. While the example from The Onion above focuses on celebrity, in the time since it was written, social media has taken a larger role in society and democratized celebrity. As comedian Bo Burnham puts it: “[This] celebrity pressure I had experienced on stage has now been democratized and given to everybody [through social media]. And everyone is feeling this pressure of having an audience, of having to perform, of having a sort of, like, proper noun version of your own name and then the self in your heart.” (NPR Fresh Air Interview) Also, Rebecca Jennings worries about how public shaming is used against “normal” people who are plucked out of obscurity to be shamed by huge crowds online: “Millions of people became invested in this (niche! not very interesting!) drama because it gives us something easy to be angry or curious or self-righteous about, something to project our own experiences onto, and thereby contributing even more content to the growing avalanche. Naturally, some decided to go look up the central character’s address, phone number, and workplace and share it on the internet. […] ‘It’s on social media, so it’s public!’ one could argue as a case for people’s right to act like forensic analysts on social media, and that is true. But this justification is typically valid when a) the person posting is someone of note, like a celebrity or a politician, and b) when the stakes are even a little bit high. In most cases of normal-person canceling, neither standard is met. Instead, it’s mob justice and vigilante detective work typically reserved for, say, unmasking the Zodiac killer, except weaponized against normal people. […] Platforms like TikTok, where even people with few or no followers often go viral overnight, expedite the shaming process. Stop canceling normal people who go viral

      With the virality and potential for virality that modern social media has, it becomes an ever-increasing issue for people to jump on the bandwagon of hate that might arise. What is usually reserved for social media figures, spreads more often to normal people who have happened to find themselves viral and on the trending page, for supposed atrocities they may or may not have committed.

    1. The term “cancel culture” can be used for public shaming and criticism, but is used in a variety of ways, and it doesn’t refer to just one thing. The offense that someone is being canceled for can range from sexual assault of minors (e.g., R. Kelly, Woody Allen, Kevin Spacey), to minor offenses or even misinterpretations. The consequences for being “canceled” can range from simply the experience of being criticized, to loss of job or criminal charges. Given the huge range of things “cancel culture” can be referring to, we’ll mostly stick to talking here about “public shaming,” and “public criticism.”

      Especially in modern times, we see cancel culture being flung around as a common term on the internet as a way to ridicule a person's actions, whether that be justified or not. It is quite interesting to see the increasing power of the internet and how ridiculing someone online can lead to more severe consequences, depending on the actions being addressed.

    1. Moderation and Violence# You might remember from Chapter 14 that social contracts, whether literal or metaphorical, involve groups of people all accepting limits to their freedoms. Because of this, some philosophers say that a state or nation is, fundamentally, violent. Violence in this case refers to the way that individual Natural Rights and freedoms are violated by external social constraints. This kind of violence is considered to be legitimated by the agreement to the social contract. This might be easier to understand if you imagine a medical scenario. Say you have broken a bone and you are in pain. A doctor might say that the bone needs to be set; this will be painful, and kind of a forceful, “violent” action in which someone is interfering with your body in a painful way. So the doctor asks if you agree to let her set the bone. You agree, and so the doctor’s action is construed as being a legitimate interference with your body and your freedom. If someone randomly just walked up to you and started pulling at the injured limb, this unagreed violence would not be considered legitimate. Likewise, when medical practitioners interfere with a patient’s body in a way that is non-consensual or not what the patient agreed to, then the violence is considered illegitimate, or morally bad. We tend to think of violence as being another “normatively loaded” word, like authenticity. But where authenticity is usually loaded with a positive connotation–on the whole, people often value authenticity as a good thing–violence is loaded with a negative connotation. Yes, the doctor setting the bone is violent and invasive, but we don’t usually call this “violence” because it is considered to be a legitimate exercise of violence. Instead, we reserve the term “violence” mostly for describing forms of interference that we consider to be morally bad.

      The mention of violence seems a little awkward when translated to the internet. While damage done over the internet is not physical, harassment could technically be seen as violence due to its ability to mentally, emotionally, etc. hurt someone.

    1. Harassment can also be done through crowds. Crowd harassment has also always been a part of culture, such as riots, mob violence, revolts, revolution, government persecution, etc. Social media then allows new ways for crowd harassment to occur. Crowd harassment includes all the forms of individual harassment we already mentioned (like bullying, stalking, etc.), but done by a group of people. Additionally, we can consider the following forms of crowd harassment: Dogpiling: When a crowd of people targets or harasses the same person. Public Shaming (this will be our next chapter) Cross-platform raids (e.g., 4chan group planning harassment on another platform) Stochastic terrorism The use of mass public communication, usually against a particular individual or group, which incites or inspires acts of terrorism which are statistically probable but happen seemingly at random. See also: An atmosphere of violence: Stochastic terror in American politics In addition, fake crowds (e.g., bots or people paid to post) can participate in crowd harassment. For example: “The majority of the hate and misinformation about [Meghan Markle and Prince Henry] originated from a small group of accounts whose primary, if not sole, purpose appears to be to tweet negatively about them. […] 83 accounts are responsible for 70% of the negative hate content targeting the couple on Twitter.” Twitter Data Has Revealed A Coordinated Campaign Of Hate Against Meghan Markle

      It is interesting to see just how many forms of harassment exist. It is especially interesting when realizing that while many of these can take place in real life, it is much more common to find this taking place over the internet. One particular example is twitter and other social media where opinions are quickly and simply created based on the traction and popularity of the post, which might be directing hate towards an individual or group.

    1. 16.3.4. Crowd harassment# Social media crowdsoucing can also be used for harassment, which we’ll look at more in the next couple chapters. But for some examples: the case of Justine Sacco involved crowdsourcing to identify and track her flight, and even get a photo of her turning on her phone.

      Mob mentality definitely is an aspect of the internet and also life that tends to show itself when multiple individuals get together. Especially on the internet, where people are so easily connected, "crowds" can be created and/or banded together in order to spread negativity towards a certain person or group.

    1. 16.2.1. Crowdsourcing Platforms# Some online platforms are specifically created for crowdsourcing. For example: Wikipedia: Is an online encyclopedia whose content is crowdsourced. Anyone can contribute, just go to an unlocked Wikipedia page and press the edit button. Institutions don’t get special permissions (e.g., it was a scandal when US congressional staff edited Wikipedia pages), and the expectation that editors do not have outside institutional support is intended to encourage more people to contribute.

      Wikipedia is probably the most notable mention when it comes to crowdsourcing platforms, especially given it's image as a database. However, wikipedia also shows off the negative possibilities with crowdsourcing on a database site, which happens to be misinformation and its ability to be spread easily.

    1. 15.1.6. Automated Moderators (bots)# Another strategy for content moderation is using bots, that is computer programs that look through posts or other content and try to automatically detect problems. These bots might remove content, or they might flag things for human moderators to review.

      I think that overall having automated mods/bots that flag/withhold content until it is reviewed by a human is most effective as it allows for a quick sift through a large amount of content. Along with this is the human review aspect which allows a more thorough analysis on whether content was correctly muted.

    1. Social media platforms themselves have their own options for how they can moderate comments, such as: Delete: Platforms can delete posts or comments. Suspend: Platforms can temporarily lock a user out until, for a set amount of time, or until they agree to delete some content and behave differently Ban: Platforms can permanently ban users and also try to ban users coming from certain internet connections Auto-detect: Platforms can also use computer programs to automatically detect potential violations of content to automatically block, or flag for follow-up.

      I think that the control placed on platforms is overall a good thing, as it can often act as a quick fix. However, with something like auto-detection, some comments might be unjustly silenced due to a certain blacklisted word.

    1. First let’s consider that, while social media use is often talked of as an “addiction” or as “junk food,” there might be better ways to think about social media use, as a place where you might enjoy, connect with others, learn new things, and express yourself.

      I like how they mention this aspect of social media opposed to the negatives. Social media can be a great way for people to interact with and discovers groups and activities that they enjoy, that they otherwise wouldn't be exposed to offline.

    1. Some people view internet-based social media (and other online activities) as inherently toxic and therefore encourage a digital detox, where people take some form of a break from social media platforms and digital devices. While taking a break from parts or all of social media can be good for someone’s mental health (e.g., doomscrolling is making them feel more anxious, or they are currently getting harassed online), viewing internet-based social media as inherently toxic and trying to return to an idyllic time from before the Internet is not a realistic or honest view of the matter. In her essay “The Great Offline,” Lauren Collee argues that this is just a repeat of earlier views of city living and the “wilderness.” As white Americans were colonizing the American continent, they began idealizing “wilderness” as being uninhabited land (ignoring the Indigenous people who already lived there, or kicking them out or killing them).

      I agree with how they mention the "dangers/downfall" of the internet and social media, but also bring up how it is not inherently toxic. Rather, I agree with how the internet is a tool/resource that we have that, like other things can become bad when used too much. Ultimately, the responsibility of how we use social media and the internet falls on us as users, and the blame cannot be blindly placed on social media as a whole.

    1. When physical mail was dominant in the 1900s, one type of mail that spread around the US was a chain letter. Chain letters were letters that instructed the recipient to make their own copies of the letter and send them to people they knew. Some letters gave the reason for people to make copies might be as part of a pyramid scheme where you were supposed to send money to the people you got the letter from, but then the people you send the letter to would give you money. Other letters gave the reason for people to make copies that if they made copies, good things would happen to them, and if not bad things would, like this:

      Either fortunately or unfortunately, with physical mail falling out of fashion, these types of memes involving chain letters has definitely taken a hit. Instead we now have spam emails, which more often than not are overlooked and sent to the junk bin of our emails. It is certainly interesting to see some forms of memeing adapting to the evolving world, while some simply fall out of fashion.

    1. A meme is a piece of culture that might reproduce in an evolutionary fashion, like a hummable tune that someone hears and starts humming to themselves, perhaps changing it, and then others overhearing next. In this view, any piece of human culture can be considered a meme that is spreading (or failing to spread) according to evolutionary forces. So we can use an evolutionary perspective to consider the spread of: Technology (languages, weapons, medicine, writing, math, computers, etc.), religions philosophies political ideas (democracy, authoritarianism, etc.) art organizations etc.

      The definition that meme is given here makes me think of the telephone game, where through constant lines of thinking, the end product is an amalgamation of ideas. I think that with the way memes are used today, the definition still holds weight, as it is quite interesting to see how the word meme and the culture around it has evolved.

    1. Sometimes though, individuals are still blamed for systemic problems. For example, Elon Musk, who has the power to change Twitters recommendation algorithm, blames the users for the results: Fig. 11.2 A tweet from current Twitter owner Elon Musk blaming users for how the recommendation algorithm interprets their behavior.# Elon Musk’s view expressed in that tweet is different than some of the ideas of the previous owners, who at least tried to figure out how to make Twitter’s algorithm support healthier conversation.

      It is almost funny in the situation that Elon Musk mentions. At the end of the day, recommendations are a sequence of code so "hate-posting" or replying would only get more content of that kind pushed to you, unless you explicitly report or ask the social media site to stop recommending the content relevant.

    1. Some recommendation algorithms can be simple such as reverse chronological order, meaning it shows users the latest posts (like how blogs work, or Twitter’s “See latest tweets” option). They can also be very complicated taking into account many factors, such as: Time since posting (e.g., show newer posts, or remind me of posts that were made 5 years ago today) Whether the post was made or liked by my friends or people I’m following How much this post has been liked, interacted with, or hovered over Which other posts I’ve been liking, interacting with, or hovering over What people connected to me or similar to me have been liking, interacting with, or hovering over What people near you have been liking, interacting with, or hovering over (they can find your approximate location, like your city, from your internet IP address, and they may know even more precisely) This perhaps explains why sometimes when you talk about something out loud it gets recommended to you (because someone around you then searched for it). Or maybe they are actually recording what you are saying and recommending based on that. Phone numbers or email addresses (sometimes collected deceptively) can be used to suggest friends or contacts. And probably many more factors as well!

      It is interesting how many things go into consideration for recommendations. Something that I find a lot of people worrying about is the following of your IP and listening in on you, but more often than not this is probably the best way to gather accurate estimates for recommendations

  2. Apr 2023
    1. In how we’ve been talking about accessible design, the way we’ve been phrasing things has implied a separation between designers who make things, and the disabled people who things are made for. And unfortunately, as researcher Dr. Cynthia Bennett points out, disabled people are often excluded from designing for themselves, or even when they do participate in the design, they aren’t considered to be the “real designers.” You can see Dr. Bennet’s research talk on this in the following Youtube Video:

      I find it interesting how it is pointed out that disabled people are often not the target audience of intuitive designs. In fact, many of the designs and innovations we have are meant to increase quality of life in able-bodied people. In a way this makes sense given how those with disabilities are in the minority, yet it should be that we accommodate accordingly.

    1. When creating computer programs, programmers can do things that aren’t possible with architecture (where Universal Design came out of), that is: programs can change how they work for each individual user. All people (including disabled people) have different abilities, and making a system that can modify how it runs to match the abilities a user has is called Ability based design. For example, a phone might detect that the user has gone from a dark to a light environment, and might automatically change the phone brightness or color scheme to be easier to read. Or a computer program might detect that a user’s hands tremble when they are trying to select something on the screen, and the computer might change the text size, or try to guess the intended selection. In this way of managing disabilities, the burden is put on the computer programmers and designers to detect and adapt to the disabled person.

      The ability to adapt to a user seems like the most advanced and useful ability for a tool meant to assist its user. The idea of ability based design seems very interesting as it opens up a lot of possibility in how systems and tools can be utilized.

    1. Password reuse attacks, where if they find out your password from one site, they try that password on many other sites Hackers tricking a computer into thinking they are another site, for example: the US NSA impersonated Google Social engineering, where they try to gain access to information or locations by tricking people. For example: Phishing attacks, where they make a fake version of a website or app and try to get you to enter your information or password into it. Some people have made malicious QR codes to take you to a phishing site. Many of the actions done by the con-man Frank Abagnale, which were portrayed in the movie Catch Me If You Can

      I find that password reuse is problematic for many given how we tend to find a password that we like and use it often. As for phishing attacks, these are probably more effective against those who are of older age or are not as in touch with technology. That being said, all it takes sometimes is an accidental click on a malicious link that was seemingly harmless at first glance.

    2. From a security perspective there are many risks that a company faces, such as: Employees at the company misusing their access, like Facebook employees using their database permissions to stalk women Hackers finding a vulnerability and inserting, modifying, or downloading information. For example: hackers stealing the names, Social Security numbers, and birthdates of 143 million Americans from Equifax hackers posting publicly the phone numbers, names, locations, and some email addresses of 530 million Facebook users, or about 7% of all people on Earth

      It is certainly a little daunting to think about this technology that we have. Being able to store such a huge amount of data online is nothing short of amazing, yet it also places some doubt in the security of it all. At the end of the day, someone is left with the responsibility of all this data, and it could easily be misused in a way that could be detrimental to millions.

    1. One thing to note in the above case of candle reviews and COVID is that just because something appears to be correlated, doesn’t mean that it is connected in the way it looks like. In the above, the correlation might be due mostly to people buying and reviewing candles in the fall, and diseases, like COVID, spreading most during the fall.

      I find it important to stress this fact due to how we happen to assume that there is a correlation between variables at the slightest hint of a trend. The reading goes on to mention the ratings of candles and COVID-19, in which there certainly could be a correlation, but realistically, there are far too many factors to rely on these findings.

    1. After looking at your ad profile, ask yourself the following: What was accurate, inaccurate, or surprising about your ad profile? How comfortable are you with Google knowing (whether correctly or not) those things about you?

      Taking a look at my ad profile was interesting as it really does log anything and everything that I looked up and expressed interest in over the past few weeks. Through these searches I can see that Google was able to pinpoint my age between 18-21 and use that information to create ads they expected would cater to my interest. Overall, I think that most of the information is pretty surface level, but it does raise questions as to just how much information they have that is not disclosed so easily.

    1. These trolling communities eventually started compiling half-joking sets of “Rules of the Internet” that both outlined their trolling philosophy: Rule 43. The more beautiful and pure a thing is - the more satisfying it is to corrupt it and their extreme misogyny: Rule 30. There are no girls on the internet Rule 31. TITS or GTFO - the choice is yours [meaning: if you claim to be a girl/woman, then either post a photo of your breasts, or get the fuck out]

      The idea of rules of the internet and trolling seem to highlight the more extreme side of internet users. More often than not these kinds of actions and words are weakly policed, leading to trolls being more prevalent across the expanse of the internet.

    2. We can trace Internet trolling to early social media in the 1980s and 1990s, particularly in early online message boards and in early online video games.

      I find the origins of trolling quite interesting. Dating back way further than I had anticipated, it is almost like it is inevitable for trolls to exist when so many people are connected. The idea of trolling is so simple that even during these more technologically primitive times we see people succumbing to the urge to troll.

    1. There are many ways inauthnticity shows up on internet-based social media, such as: Catfishing: Create a fake profile that doesn’t match the actual user, usually in an attempt to trick or scam someone Sockpuppet (or a “burner” account): Creating a fake profile in order to argue a position (sometimes intentionally argued poorly to make the position look bad) Fig. 6.5 US Congressional candidate Dean Browning in 2020 posting what appears to be a post intended for a sockpuppet account where he was pretending to be a gay Black man.# Astroturfing: An artificially created crowd to make something look like it has popular support Parody accounts: An account that is intentionally mimicking a person or position, but intended to be understood as fake. Schrodinger’s asshole: the guy who says awful shit, and decides if he was “only kidding” depending on your reaction. Various types of trolling, which we will cover in the next chapter

      The concept of inauthenticity is not something that is uncommon across the internet, however I found the Schrodinger's asshole to be hilarious. While things like sockpuppets and parody accounts are pretty easily discernible and are usually taken as a joke, I find that Schrodinger's Assholes are quite prevalent on the internet and often times mean what they say. That being said, I find it very fitting that it falls under the term inauthenticity and almost into the concept of trolling.

    1. Authenticity in connection requires honesty about who we are and what we’re doing; it also requires that there be some sort of reality to the connection that is supposedly being made between parties. Authentic connections frequently place high value on a sense of proximity and intimacy.

      I find it interesting that we correlate authenticity with not just the idea of being unique, but the concept of intimacy and closeness. I find it holds even more weight when considering that this closeness is not just physical but also emotional, metaphorical, etc.

    1. 4Chan has various image-sharing bulletin boards, where users post anonymously. Perhaps the most infamous board is the “/b/” board for “random” topics. This board emphasizes “free speech” and “no rules” (with exceptions for child pornography and some other illegal content). In these message boards, users attempt to troll each other and post the most shocking content they can come up with. They also have a history of collectively choosing a target website or community and doing a “raid” where they all try to join and troll and offend the people in that community. Many memes, groups, and forms of internet slang come from 4Chan, such as: lolcats Rickroll ragefaces “Anonymous” the hacker group Bronies (male My Little Pony fans) much of trolling culture (we will talk more about in Chapter 7: Trolling) But one 4Chan user found 4chan to be too authoritarian and restrictive and set out to create a new “free-speech-friendly” image-sharing bulletin board, which he called 8chan. 5.5.3. 8Chan (now 8Kun)# 8Chan (now called 8Kun) is an image-sharing bulletin board site that was started in 2013. It has been host to white-supremacist, neo-nazi and other hate content. 8Chan has had trouble finding companies to host its servers and internet registration due to the presence of child sexual abuse material (CSAM), and for being the place where various mass shooters spread their hateful manifestos. 8Chan is also the source and home of the false conspiracy theory QAnon

      I find the creation of 4Chan and 8Chan to be quite interesting. Obviously the restrictions on content are set for a reason, yet users continue to look for more freedom in what they can post and view. This is especially true in 8Chan where we see little to no restrictions on the grotesque content that acts as a cesspool for the horrors of the internet.

    1. 2003 saw the launch of several popular social networking services: Friendster, Myspace, and LinkedIn. These were websites where the primary purpose was to build personal profiles and create a network of connections with other people, and communicate with them. Facebook was launched in 2004 and soon put most of its competitors out of business, while YouTube, launched in 2005 became a different sort of social networking site built around video. Note This history is all very US focused. In future versions of this book, I hope to incorporate a more global history of social media.

      As mentioned here, a lot of the examples shown seem to draw upon the US. This brings into question whether similar patterns can be seen in international alternatives to social media services we have here in the states.

    1. In most cases, after the initial data representation is created, the computer runs a compression algorithm, which takes the image, sound, or video, and finds a way of storing it in much less computer memory, often losing some of the quality when doing so.

      I find it really interesting how compressing these files work as such an efficient way to save memory. That being said, compressed images are quite difficult to understand especially when text is involved. If the image is of a person, I feel there is still enough detail to understand what the person looks like.

    1. The account that posted it: User handle is @dog_rates User name is WeRateDogs® User profile picture is a circular photo of a white dog This user has a blue checkmark

      All of these factor into how noticeable the post is along with the traction that it will have. However, possibly most notable is the blue checkmark, which tends to be associated with trustworthy/note-worthy accounts within the space. That being said, in current twitter, the blue checkmark can now be purchased via subscription as a way to promote and get your tweets some more attention than without the blue checkmark.

    1. Choose an example social media bot (find on your own or look at Examples of Bots (or apps).) What does this bot do that a normal person wouldn’t be able to, or wouldn’t be able to as easily?

      An example is bots that are programmed to leave an automated message under another person's post. Twitter and Instagram seem to have the most prevalent bots, under more successful posts that garner a lot of attention. These bots are able to leave a comment almost instantly, much quicker than the average human would be able to.

    1. Though we might consider these to be run by “human computers” who are following the instructions given to them, such as in a click farm: Fig. 3.1 A photo that is likely from a click-farm, where a human computer is paid to do actions through multiple accounts, such as like a post or rate an app. For our purposes here, we consider this a type of automation, but we are not considering this a “bot,” since it is not using (electrical) computer programming.

      I find the mention of this being a form of automation rather than a bot interesting. While yes, it is not using computer programming, the action is just a series of a certain action repeated seemingly infinitely. At this point, the human performing the task is practically a bot programed to

  3. Mar 2023
    1. “The internet isn’t real life.”

      This statement opens many different arguments. While it can be said that the internet is a display of real life, it is certainly true to also say that the internet is far from the whole truth we see in real life. An example of this is in social media platforms like Instagram. While it is certainly true that the events one might post are from real life, we as users get the choice to pick out which photos and videos are posted to create a desired effect/image. Personally, I would agree that the internet, in the form of social media, is simply smoke and mirrors and far from real life.

    1. Being and becoming an exemplary person (e.g., benevolent; sincere; honoring and sacrificing to ancestors; respectful to parents, elders and authorities, taking care of children and the young; generous to family and others). These traits are often performed and achieved through ceremonies and rituals (including sacrificing to ancestors, music, and tea drinking), resulting in a harmonious society.

      As mentioned by others, I think that Confucianism continues to be prevalent today. Mostly within the context of family, we tend to follow the ideals of Confucianism, albeit not as strictly as in 300BCE, China. It is mentioned that Confucianism is most notably traced to Eastern Asia and I think it would be fair to expect for many modern Asian families to practice Confucianism to some degree.