23 Matching Annotations
  1. Last 7 days
    1. Oliver Tearle. Who Said, ‘A Lie Is Halfway Round the World Before the Truth Has Got Its Boots On’? June 2021. URL: https://interestingliterature.com/2021/06/lie-halfway-round-world-before-truth-boots-on-quote-origin-meaning/ (visited on 2023-12-08).

      Abstracts: Dr. Oliver Teller's article explores the origins of the phrase “a lie has traveled halfway around the world before the truth puts on its boots,” debunking this common misattribution by Winston Churchill. He traces the essence of the quote to the ancient Roman poet Virgil and further discusses its evolution through different iterations and misattributions. Details from the source: In 859, Charles H. Spurgeon included a version of this proverb in one of his sermons, suggesting that it was already familiar by then.

    1. Professor Henry Farrell points out some of the dangers of trying to maintain attention when someone does go viral [l56]:

      It highlights an important ethical dilemma of the digital age: the commodification of personality. This is not merely a case of individuals changing their behaviour in order to become famous, but a social shift in which the value of authenticity is often overshadowed by the lure of popularity and monetization.

    1. Steven Tweedie. This disturbing image of a Chinese worker with close to 100 iPhones reveals how App Store rankings can be manipulated. February 2015. URL: https://www.businessinsider.com/photo-shows-how-fake-app-store-rankings-are-made-2015-2 (visited on 2024-03-07).

      The source discussed a disturbing image of a Chinese worker surrounded by nearly 100 iPhones allegedly used to manipulate App Store rankings. The image, originally posted on Weibo, shows the worker in the cold, reinstalling apps on multiple devices to artificially boost their downloads and rankings on Apple's App Store. The manipulation involves services that can charge up to $65,000 per week for top rankings.

    1. Note that sometimes people use “bots” to mean inauthentically run accounts, such as those run by actual humans, but are paid to post things like advertisements or political content. We will not consider those to be bots, since they aren’t run by a computer. Though we might consider these to be run by “human computers” who are following the instructions given to them, such as in a click farm

      It is intriguing to see how the line between human and automated behavior on social media is becoming increasingly blurred. From a practical perspective, this blurring creates challenges in recognizing real interactions. From an ethical perspective, it also raises questions about accountability and transparency.

    1. magine a debate on this question between someone using the Aztec Virtue Ethics framework, and someone using the Natural Rights framework.

      In this debate, “Taoists” may be inclined to wait to introduce “alt-text”, emphasizing natural integration and user readiness to maintain harmony. Consequentialists, by contrast, may argue for immediate implementation, focusing on the benefits of accessibility and considering the ethical costs of delaying the provision of these features to users who need them.

    1. Virtue is a group effort. Individuals can’t be virtuous on their own because “the earth is slippery, slick” (meaning it is easy for an individual to fall into bad actions, they need support and moderation)

      The view that virtue is a group effort, not just an individual effort, emphasizes the importance of social and community support in sustaining moral behavior. In contrast to an individualistic approach that focuses on individual autonomy and self-reliance to cultivate virtue, this view holds that our moral lives are deeply intertwined with the norms and values of the communities to which we belong. It also reinforces the notion that “the earth is slippery.”

    1. Kurt Wagner. Inside Twitter’s ambitious plan to clean up its platform. Vox, March 2019. URL: https://www.vox.com/2019/3/8/18245536/exclusive-twitter-healthy-conversations-dunking-research-product-incentives (visited on 2023-12-07).

      The article discusses Twitter's relentless efforts to create a healthier conversational environment on its platform. Recognizing the prevalence of snarky and often toxic interactions such as 'Twitter dunks,' Twitter CEO Jack Dorsey announced plans to develop new metrics to assess the 'healthiness' of conversations. Despite working with academic researchers and developing in-house metrics, progress has been slow and complex due to legal and privacy issues, as well as technical challenges in defining and measuring the health of conversations. Twitter has enlisted the help of academic partners to create new metrics for measuring the health of conversations, such as mutual recognition and diversity of viewpoints. However, the collaboration has faced delays due to difficulties in finalizing data-sharing agreements, especially in the wake of privacy scandals such as Cambridge Analytica, which have increased the sensitivity of user data.

    1. For example, there were differences in US criminal sentencing guidelines between crack cocaine vs. powder cocaine in the 90s. The guidelines suggested harsher sentences on the version of cocaine more commonly used by Black people, and lighter sentences on the version of cocaine more commonly used by white people.

      I believe it is important to focus on the important distinction between individual and systemic analysis. This perspective is particularly important when discussing issues of equity and equality in social structures. The perspective of systems analysis goes beyond the actions and intentions of individuals to consider the broader structures and policies that influence outcomes and that often unintentionally perpetuate disparities.

  2. Apr 2024
    1. David Robson. The women with superhuman vision. BBC, February 2022. URL: https://www.bbc.com/future/article/20140905-the-women-with-super-human-vision (visited on 2023-12-07).

      The article discusses Tetrachromatopsia, a rare genetic disorder that enables some people, primarily women, to see multiple colors that most people do not. Concetta Antico, an artist with this disorder, experiences and represents this vivid spectrum in her paintings, offering a unique view of the world that highlights the differences in human color perception. Concetta Antico, who has tetrachromatic iridism, sees richer colors in everyday objects, such as on a cobblestone trail, where she feels the cobblestones shine like jewels displayed by a jeweler in vivid oranges, yellows, greens, blues, and pinks-colors normally invisible to normal eyes.

    1. Those with disabilities often find ways to cope with their disability, that is, find ways to work around difficulties they encounter and seek out places and strategies that work for them (whether realizing they have a disability or not). Additionally, people with disabilities might change their behavior (whether intentionally or not) to hide the fact that they have a disability, which is called masking and may take a mental or physical toll on the person masking, which others around them won’t realize. For example, kids who are nearsighted and don’t realize their ability to see is different from other kids will often seek out seats at the front of classrooms where they can see better. As for us two authors, we both have ADHD and were drawn to PhD programs where our tendency to hyperfocus on following our curiosity was rewarded (though executive dysfunction with finishing projects created challenges)1. This way of managing disabilities puts the burden fully on disabled people to manage their disability in a world that was not designed for them, trying to fit in with “normal” people.

      Persons with disabilities often “mask” their challenges to fit into environments that do not provide accommodations, a practice that can lead to stress and mental health issues. They may also seek roles that match their abilities, highlighting the need for more inclusive environments that recognize and support diverse ways of working.

    1. i10 Lyra Hale. New Book Says Facebook Employees Abused Access to Track and Stalk Women. The Mary Sue, July 2021. URL: https://www.themarysue.com/facebook-employees-abused-access-target-women/ (visited on 2023-12-06).

      The book "The Ugly Truth: Facebook's Battle for Internal Domination " by Sheera Frenkel and Cecilia Kang reveals serious allegations against Facebook. The report alleges that Facebook employees abused access to user data to stalk and harass women. This misbehavior occurred in the context of mishandling user data, spreading fake news, and amplifying harmful and polarizing content. The book outlines multiple incidents where employees were fired for abusing their authority, including the specific case of an engineer who used his privileges to stalk a woman during a trip to Europe. Despite being informed of the issues, Facebook's CEO Mark Zuckerberg has met resistance from the board in his attempts to change data access policies. Between 2014 and August 2015, Facebook fired 52 employees for abusing access to confidential data for personal purposes. This included an engineer who used his position to find and confront a woman who had left him during a European vacation, following her to a new hotel.

    1. When we use social media platforms though, we at least partially give up some of our privacy.

      People want to keep certain information private for a variety of reasons, ranging from personal comfort and security to avoiding unwanted consequences and maintaining control over their data. It's like the way we wear clothes to cover up our body parts, illustrating our natural inclination towards privacy in our daily lives.

    1. Kurt Wagner. This is how Facebook collects data on you even if you don’t have an account. Vox, April 2018. URL: https://www.vox.com/2018/4/20/17254312/facebook-shadow-profiles-data-collection-non-users-mark-zuckerberg (visited on 2023-12-05).

      The article discusses how Facebook collects data from individuals who do not have a Facebook account and the limitations that prevent such data collection. The article explains that Facebook collects information from non-users' browsing histories on websites with Facebook plugins, as well as from contact lists uploaded by users. The term "shadow profiles" is mentioned to describe profiles created from this collected data, but Facebook denies actively creating such profiles. However, Facebook does not offer non-users the option to opt out of data collection, and while it will delete browsing data from non-users after a short period of time, contact information may remain indefinitely unless the uploader removes it.

    1. Online advertisers can see what pages their ads are being requested on, and track users [h1] across those sites. So, if an advertiser sees their ad is being displayed on an Amazon page for shoes, then the advertiser can start showing shoe ads to that same user when they go to another website. Additionally, social media might collect information about non-users, such as when a user posts a picture of themselves with a friend who doesn’t have an account, or a user shares their phone contact list with a social media site, some of whom don’t have accounts (Facebook does this [h2]). Social media platforms then use “data mining” to search through all this data to try to learn more about their users, find patterns of behavior, and in the end, make more money.

      These paragraphs highlight key aspects of digital advertising and data privacy issues. Advertisers track users' browsing activities, such as browsing footwear ads on Amazon.com, in order to tailor ads to other websites. This tracking also extends to social media platforms, which may even collect information from non-users through shared content or contact lists

    2. Online advertisers can see what pages their ads are being requested on, and track users [h1] across those sites. So, if an advertiser sees their ad is being displayed on an Amazon page for shoes, then the advertiser can start showing shoe ads to that same user when they go to another website. Additionally, social media might collect information about non-users, such as when a user posts a picture of themselves with a friend who doesn’t have an account, or a user shares their phone contact list with a social media site, some of whom don’t have accounts (Facebook does this [h2]). Social media platforms then use “data mining” to search through all this data to try to learn more about their users, find patterns of behavior, and in the end, make more money.

      These paragraphs highlight key aspects of digital advertising and data privacy issues. Advertisers track users' browsing activities, such as browsing footwear ads on Amazon.com, in order to tailor ads to other websites. This tracking also extends to social media platforms, which may even collect information from non-users through shared content or contact lists

    1. s It Funny or Offensive? Comedian Impersonates FBI on Twitter, Makes MLK Assassination Joke. January 2020. URL: https://isitfunnyoroffensive.com/comedian-impersonates-fbi-on-twitter-makes-mlk-assassination-joke/ (visited on 2023-12-05).

      The source discusses comedian Jaboukie Young-White's controversial tweet in which he posed as the FBI and made a joke about the assassination of Martin Luther King, Jr. The article explores the line between humor and offense in satire, especially when it comes to sensitive historical topics. One detail provided by the source is that as part of the satire, Young-White changed his Twitter display name and profile picture to mimic the official FBI account.

    1. s this class discusses trolling, as well as many of the other topics of social media behavior coming up in the weeks ahead, you are encouraged to bear this duality of value in mind. Trolling is a term given to describe behavior that aims to disrupt (among other things). To make value judgments or ethical judgments about instances of disruptive behavior, we will need to be thoughtful and nuanced about how we decide to pass judgments. One way to begin examining any instance of disruptive behavior is to ask what is being disrupted: a pattern, a habit, a norm, a whole community? And how do we judge the value of the thing being disrupted? Returning to the difference between a coup and a revolution, we might say that a national-level disruption is a coup if it fails, and a revolution if it succeeds.

      The paragraph discusses the concept of trolling as a form of vandalism that can affect social structures and practices. The paragraph notes that trolling, like other acts of sabotage, can be morally ambiguous. The text emphasizes the importance of context in judging such acts, i.e. the difference between being labeled a traitor or a hero also depends on who controls the storytelling. I believe that to understand and assess "trolling" behavior, it is important to consider in a nuanced way exactly what is being disturbed and the value of those being disturbed.

    1. lonelygirl15. November 2023. Page Version ID: 1186146298. URL: https://en.wikipedia.org/w/index.php?title=Lonelygirl15&oldid=1186146298 (visited on 2023-11-24).

      "Lonelygirl15" is an American science fiction thriller web series. The show tells the story of Bree Avery, a 16-year-old governess, played by Jessica Lee Roth, who becomes involved in a dangerous cult called The Order because of her special blood type. The show is known for its innovative use of video blogs to tell the story, initially convincing viewers that Bree is a real person. The project began as a storytelling experiment and quickly went viral, becoming the most subscribed channel on YouTube. Despite being considered a fictional series, it has grown in viewership and won several awards, influencing the future of online video content and video blogging. One detail is that in September 2006, the series "Lonelygirl15" was revealed to be a fictional project as viewers began to question its authenticity. A story published in the Los Angeles Times and a blog post on the Silicon Valley Observer's website revealed that Jessica Lee Rose was Bree's character. Nonetheless, the Silicon Valley series continued to be a hit, reaching a ratings peak in 2007.

    1. We value authenticity because it has a deep connection to the way humans use social connections to manage our vulnerability and to protect ourselves from things that threaten us. When we form connections, it is like all our respective vulnerabilities get entangled and tied together. We depend on each other, so if you betray me I face a loss in wellbeing. But also, since you did that, now you face a loss in wellbeing, as I no longer have your back. That means that both of us have an incentive not to betray or take advantage of each other, for our mutual protection

      Of course, authenticity plays a pivotal role in the intricacies of human relationships . When we make connections, we are essentially intertwining our vulnerabilities with those of others, forming a web of interdependence. This interdependence forms the basis for trust and mutual support.

    1. Mark R. Cheathem. Conspiracy Theories Abounded in 19th-Century American Politics. URL: https://www.smithsonianmag.com/history/conspiracy-theories-abounded-19th-century-american-politics-180971940/ (visited on 2023-11-24).

      This essay discusses how conspiracy theories permeated nineteenth-century American politics, shaping public perceptions and influencing the course of events. Highlighting the prevalence of rumors, such as the belief that Abraham Lincoln was secretly Catholic, the essay demonstrates how conspiracy theories have long been intertwined with American political discourse.

    1. While the Something Awful forums had edgy content, one 15-year-old member of the Something Awful forum called “Anime Death Tentacle Rape Whorehouse” was frustrated by content restrictions on Something Awful, and created his own new site with less restrictions: 4Chan.

      While the creation of 4chan can't be entirely attributed to one of the members of Something Awful, dissatisfaction with the content restrictions likely contributed to its emergence. 4chan's less-restrictive environment appealed to those looking for more freedom in their online discussions, leading to its eventual emergence as a notable image board platform.

    1. Julia Evans. Examples of floating point problems. January 2023. URL: https://jvns.ca/blog/2023/01/13/examples-of-floating-point-problems/ (visited on 2023-11-24).

      The blog post on Julia Evans' website discusses various examples of floating point problems encountered in programming. The article explains the unexpected behavior of floating-point operations due to loss of precision and rounding errors. The author also provides specific examples of how these problems manifest themselves in real-world programming scenarios, emphasizing the importance of understanding the floating-point representation to avoid potential errors and inaccuracies in calculations.

    1. Metadata is information about some data. So we often think about a dataset as consisting of the main pieces of data (whatever those are in a specific situation), and whatever other information we have about that data (metadata).

      In database management, what types of information are typically included in metadata? My understanding is that metadata is a tool that helps us identify and describe data.