33 Matching Annotations
  1. Mar 2024
    1. Meta’s way of making profits fits in a category called Surveillance Capitalism. Surveillance capitalism began when internet companies started tracking user behavior data to make their sites more personally tailored to users. These companies realized that this data was something that they could profit from, so they began to collect more data than strictly necessary (“behavioral surplus”) and see what more they could predict about users. Companies could then sell this data about users directly, or (more commonly), they could keep their data hidden, but use it to sell targeted advertisements. So, for example, Meta might let an advertiser say they want an ad to only go to people likely to be pregnant. Or they might let advertizes make ads go only to “Jew Haters” (which is ethically very bad, and something Meta allowed).

      Meta utilizes sophisticated algorithms and machine learning techniques to analyze the data it collects. By mining this data, Meta can make predictions about users' future behaviors, interests, and preferences.

    1. n what ways do you see capitalism, socialism, and other funding models show up in the country you are from or are living in?

      In countries with a predominantly capitalist system, such as the United States, there is typically a strong emphasis on free markets, private property rights, and limited government intervention in economic affairs. Characteristics of capitalism may include a wide income gap between the wealthy and the poor, a focus on economic growth and consumerism, and a reliance on market forces to allocate resources.

  2. Feb 2024
    1. What do you consider to be the most important factors in making an instance of public shaming good (if you think that is possible)?

      The cultural and social context in which public shaming occurs should be taken into account. Practices that may be acceptable or effective in one cultural context could be harmful or inappropriate in another. It's essential to consider the broader societal norms, values, and power dynamics at play.

    2. In the philosophy paper Enforcing Social Norms: The Morality of Public Shaming, Paul Billingham and Tom Parr discuss under what conditions public shaming would be morally permissible. They are concerned not with actions primarily intended to induce shame in the target, but rather actions that may cause a person to shame, but are motivated by “seeking to draw attention to a social norm violation, and to rally others to their cause.”

      Public shaming should primarily target behavior that violates widely accepted social norms or ethical standards. The intention is to highlight the discrepancy between the individual's actions and the expectations of society.

    1. Do you believe crowd harassment is ever justified?

      In general, the justification of crowd harassment depends on the context, the methods employed, and the underlying motivations. In general, actions that respect human dignity, uphold principles of fairness and justice, and avoid causing harm to others are more likely to be considered justifiable, while those that violate these principles are not.

    1. Individual harassment (one individual harassing another individual) has always been part of human cultures, bur social media provides new methods of doing so.

      Harassments are severe everywhere, both in the real world and on the internet. We can see that nowadays many social media platforms have implemented policies and tools to combat harassment, such as reporting systems, content moderation, and algorithms to detect and remove abusive content. However, despite these efforts, individual harassment remains a significant challenge in online spaces, and further action is needed to effectively address it.

    1. Some ad hoc crowdsourcing can be part of a social or political movement. For example, Social media organizing played a role in the Arab Spring revolutions in the 2010s, and Social Media platforms were a large part of the #MeToo movement, where victims of sexual abuse/harassment spoke up and stood together.

      Social media platforms such as Twitter, Facebook, and YouTube played a crucial role in organizing protests, disseminating information. Activists used these platforms to coordinate demonstrations, share images and videos of government crackdowns, and galvanize international support for their causes.

    1. There have been many efforts to use computers to replicate the experience of communicating with someone in person, through things like video chats, or even telepresence robots]. But there are ways that attempts to recreate in-person interactions inevitably fall short and don’t feel the same. Instead though, we can look at different characteristics that computer systems can provide, and find places where computer-based communication works better, and is Beyond Being There (pdf here).

      Virtual communication offers unparalleled convenience, enabling individuals to engage in conversations and collaborations without the need for physical proximity. This convenience extends to scheduling meetings, sharing information, and accessing resources, fostering efficiency and productivity.

    1. 15.1.4. Individuals moderating their own spaces

      Platforms should provide privacy settings that allow users to control who can access their content and interact with them. By adjusting these settings, users can manage who can view, comment, or share their posts, thereby exerting control over their online presence.

    1. Without quality control moderation, the social media site will likely fill up with content that the target users of the site don’t want, and those users will leave. What content is considered “quality” content will vary by site, with 4chan considering a lot of offensive and trolling content to be “quality” but still banning spam (because it would make the site repetitive in a boring way), while most sites would ban some offensive content.

      Platforms typically have policies against hate speech, harassment, or content that promotes violence. However, the threshold for what is considered offensive may vary, and some platforms might allow controversial discussions within certain bounds.

    1. One form of digital self-harm is self-bullying, where people set up fake alternate accounts which they then use to post bullying messages at themselves.

      Individuals may engage in self-bullying as a cry for help or to garner sympathy and attention from others. Some individuals may use self-bullying as a form of self-punishment or self-destructive behavior, reflecting underlying issues such as low self-esteem or self-hatred.

    1. So, what does social media do to the mental health of teenage girls, and to all its other users?

      Social media platforms can be breeding grounds for cyberbullying and online harassment, which can have severe emotional consequences for victims. Teenage girls may be particularly vulnerable to cyberbullying, which can lead to anxiety, depression, and even suicidal thoughts.

    1. Sometimes content goes viral in a way that is against the intended purpose of the original content. For example, this TikTok started as a slightly awkward video of a TikToker introducing his girlfriend. Other TikTokers then used the duet feature to add an out-of-frame gun pointed at the girlfriend’s head, and her out-of-frame hands tied together, being held hostage. TikTokers continued to build on this with hostage negotiators, press conferences and news sources. All of this is almost certainly not the impression the original TikToker was trying to convey.

      In instances where content goes viral in a manner that diverges significantly from the original creator's intended purpose, it underscores the unpredictable and often uncontrollable nature of social media virality. The TikTok example provided highlights how users can utilize the platform's features, such as the Duet feature, to remix and reinterpret content in ways that may be unforeseen and unintended by the original creator.

    1. Actions such as: liking, reposting, replying, and paid promotion get the original posting to show up for users more

      When users engage with content by liking, reposting, or replying to it, they contribute to its replication by increasing its visibility within their social networks. These actions signal to the platform's algorithms that the content is engaging or relevant, prompting it to show up more frequently in other users' feeds.

    1. Elon Musk’s view expressed in that tweet is different than some of the ideas of the previous owners, who at least tried to figure out how to make Twitter’s algorithm support healthier conversation. Though even modifying a recommendation algorithm has limits in what it can do, as social groups and human behavior may be able to overcome the recommendation algorithms influence.

      Elon Musk's tweet exemplifies this perspective, as he places the responsibility on users for the outcomes generated by Twitter's recommendation algorithm. This view contrasts with previous owners who sought to improve the algorithm to foster healthier conversations.

    1. When social media platforms show users a series of posts, updates, friend suggestions, ads, or anything really, they have to use some method of determining which things to show users. The method of determining what is shown to users is called a recommendation algorithm, which is an algorithm (a series of steps or rules, such as in a computer program) that recommends posts for users to see, people for users to follow, ads for users to view, or reminders for users.

      I've heard the recommendation algorithm from CSE 416, this is something that can sort based on users' preference. These algorithms analyze various factors such as user engagement history, demographics, interactions with other users, and content relevance to generate personalized recommendations. The goal is to enhance user experience by providing relevant and engaging content while maximizing user engagement and platform usage.

    1. When designers and programmers don’t think to take into account different groups of people, then they might make designs that don’t work for everyone. This problem often shows up in how designs do or do not work for people with disabilities. But it also shows up in other areas as well.

      For web construction, application development, and product design, and all those that do not consider accessibility features such as screen reader compatibility, alternative text for images, or keyboard navigation can create barriers for people with visual, auditory, motor, or cognitive impairments. Inclusive design goes beyond addressing the needs of people with disabilities. It involves considering a wide range of users with diverse characteristics and ensuring that the design is usable by as many people as possible. These include factors such as age, cultural background, language proficiency, and technological literacy.

    1. Which abilities are expected of people, and therefore what things are considered disabilities, are socially defined. Different societies and groups of people make different assumptions about what people can do, and so what is considered a disability in one group, might just be “normal” in another.

      Disability is not solely determined by an individual's physical or cognitive capabilities but is deeply influenced by societal expectations, norms, and the environment. The social model of disability emphasizes that disability is a result of the interaction between individuals and a society that is not accommodating to their needs.

    1. assword reuse attacks, where if they find out your password from one site, they try that password on many other sites

      If hackers obtain a user's password from one site, they may attempt to use the same password on multiple sites. A preventing way i s to use unique and strong passwords for each account. Consider using a password manager to generate and store complex passwords.

    1. When we use social media platforms though, we at least partially give up some of our privacy. For example, a social media application might offer us a way of “Private Messaging” (also called Direct Messaging) with another user. But in most cases those “private” messages are stored in the computers at those companies, and the company might have computer programs that automatically search through the messages, and people with the right permissions might be able to view them directly

      Using social media platforms often involves a trade-off between convenience and privacy. While these platforms provide features like private messaging, it's crucial to recognize that the data shared, even in supposedly private interactions, is typically stored on the company's servers.

  3. Jan 2024
    1. Datasets can be poisoned unintentionally. For example, many scientists posted online surveys that people can get paid to take. Getting useful results depended on a wide range of people taking them. But when one TikToker’s video about taking them went viral, the surveys got filled out with mostly one narrow demographic, preventing many of the datasets from being used as intended.

      The unintentional poisoning of datasets maybe caused by sampling bias, inappropriate data collection strategies, ethical considerations and so on. This is a critical issue that data collection must be vigilant in ensuring that their datasets accurately represent the diversity of the populations

    1. Social media sites then make their money by selling targeted advertising, meaning selling ads to specific groups of people with specific interests. So, for example, if you are selling spider stuffed animal toys, most people might not be interested, but if you could find the people who want those toys and only show your ads to them, your advertising campaign might be successful, and those users might be happy to find out about your stuffed animal toys. But targeting advertising can be used in less ethical ways, such as targeting gambling ads at children, or at users who are addicted to gambling, or the 2016 Trump campaign ‘target[ing] 3.5m black Americans to deter them from voting’

      Social media platforms leverage the vast amount of user data they collect to personalize content, including advertisements. Algorithms can capture user behavior, preferences, and interactions to deliver content tailored to individual users, creating a more engaging experience.

    1. Some people do not need to think loads about how they present in order to come across to people in ways that are accurate and supportive of who they really are. Some people think very carefully about how they curate a set of signals that enable them to accurately let people know who they are or to conceal who they are from people outside their squad.

      To address the challenges posed by stereotypes involves fostering awareness, promoting cultural competence, and encouraging critical thinking about preconceived notions. Emphasizing individual uniqueness and recognizing the limitations of stereotypes can contribute to a more nuanced and respectful understanding of human diversity.

    1. What do you think is the best way to deal with trolling?

      To deal with trolling, the platforms online communities shousld establish community guidelines to outline acceptable behavior, with consequences for trolling. In severe cases, they can also empower users with tools to block, report, and manage their online experience, and thereby encouraging users to take control of their digital spaces.

    1. Different communities have different expectations and meanings around behavior and presentation. So what is appropriate authentic behavior depends on what group you are from and what group you are interacting with, like this gif of President Obama below:

      I agree on this point. The concept of appropriateness is highly dependent on the social and cultural context. Different communities indeed have distinct expectations and norms, and individuals often adjust their behavior authentically to align with those expectations.

    1. Do you think it matters which human typed the Tweet? Does the emotional expression (e.g., anger) of the Tweet change your view of authenticity?

      Whether it matters which human typed the tweet depends on individual perspectives. Some may prioritize the content of the message over the specific person typing it, while others may find authenticity in knowing that the individual themselves wrote the tweet.

    1. While mainstream social media platforms grew in popularity, there was a parallel growth of social media platforms that were based on having “no rules”, and were sources for many memes and pieces of internet culture, as well as hubs of much anti-social behavior (e.g., trolling, harassment, hate-groups, murders, etc.).

      Social media platforms may become popular fro various internet subcultures, memes, and internet culture, but they might also get criticism due to the prevalence of anti-social behaviors. Therefore it's important to establish restrictions for online safety and user trust.

    1. Many types of data on social media platforms are organized as lists, such as lists of friends or followers lists of posts lists of photos in a post lists of people who liked a post etc.

      Using lists is an efficient way to structure and present information, making it more manageable for users to navigate and interact with the vast amount of data on social media platforms. I've also lists to function a music playlist in one of the CSE courses, and I think the principle is quite similar to posting or following/unfollowing on social media platforms.

    1. Thus, when designers of social media systems make decisions about how data will be saved and what constraints will be put on the data, they are making decisions about who will get a better experience. Based on these decisions, some people will fit naturally into the data system, while others will have to put in extra work to make themselves fit, and others will have to modify themselves or misrepresent themselves to fit into the system.

      Decisions about data storage, constraints, and algorithms can contribute to divergent user experiences. Some users may find the system accommodating and aligned with their needs, while others might face challenges or feel excluded.

    1. When looking at real-life data claims and datasets, you will likely run into many different problems and pitfalls in using that data. Any dataset you find might have: missing data erroneous data (e.g., mislabeled, typos) biased data manipulated data

      Addressing these challenges requires careful data preprocessing, validation, and a deep understanding of the context in which the data was collected. It's also important to document changes happened during data cleaning process to maintain transparency in research or analysis.

    1. Bots present a similar disconnect between intentions and actions. Bot programs are written by one or more people, potentially all with different intentions, and they are run by others people, or sometimes scheduled by people to be run by computers. This means we can analyze the ethics of the action of the bot, as well as the intentions of the various people involved, though those all might be disconnected.

      When designing bots, human ethics and logic should be taken in to consideration. Basically, they help people to"live" on internet, it's important for bots to be unbiased so that the environment of social media can evolve peacefully.

    1. Jefferson in the Declaration of Independence: “We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.” Discussions of “human rights” fit in the Natural Rights ethics framework

      This is a great and idealistic statement, and I would say I really admire the central idea of the Declaration of Independence, though it might be difficult to entirely live up to that. I think one thing that's hard to fully explain is what the range of human right is. When the rights of individual and the interests of the collective conflict, how can everyone balance the gain and lose between human rights and freedom?

    1. One Twitter user got a photo of Justine turning on her phone after getting off the plane. That user also talked to her father at the airport and tweeted about the photo and their responses.

      The spread of information on social media is extremely fast, this is useful in drawing attentions and encouraging users' activations. But it might also cause privacy and security issues, as the power of internet makes the shield for privacy protection transparent and controllable.