34 Matching Annotations
  1. May 2024
    1. Plato. Phaedrus: Translated by Benjamin Jowett. January 2013. Page Version ID: 1189255462.

      Nicholson's book delves into the philosophical themes presented in Phaedrus, particularly focusing on the concept of love (eros) and its significance in Plato’s work. Nicholson argues that Phaedrus is not only about rhetoric and dialectic but also about the transformative power of love. He highlights how Plato uses the dialogue to explore the idea that true love can lead the soul towards the divine and the eternal forms.

    1. In England in the early 1800s, Luddites [u2] were upset that textile factories were using machines to replace them, leaving them unemployed, so they sabotaged the machines. The English government sent soldiers to stop them, killing and executing many. (See also Sci-Fi author Ted Chiang on Luddites and AI [u3])

      I find it crucial to strike a balance between embracing innovation and ensuring that the benefits of technological advancements are equitably distributed. Reflecting on the Luddite movement underscores the importance of proactive measures to support workers during periods of technological change, preventing history from repeating itself in the face of new, transformative technologies like AI.

    1. Merriam-Webster. Definition of CAPITALISM. December 2023. URL: https://www.merriam-webster.com/dictionary/capitalism (visited on 2023-12-10).

      In reviewing the Merriam-Webster definition of capitalism, I found it succinct and precise, emphasizing the economic system where private individuals or businesses own capital goods. This definition highlights the core aspects of capitalism: private ownership, capital accumulation, and competitive markets. However, what struck me was the lack of discussion on the potential social and economic disparities that can arise within capitalist systems. For instance, capitalism can lead to significant wealth concentration and income inequality, which are crucial issues in contemporary economic discussions.

    1. Shares / Stocks Shares or stocks are ownership of a percentage of a business, normally coming with getting a percentage of the profits and a percentage of power in making business decisions.

      Unlike traditional business ownership, where owning a business was often limited to wealthy individuals or families, the stock market allows people from various economic backgrounds to own a part of a company. This democratization can foster a sense of participation and involvement in the economic success of companies one believes in.

    1. Guilt–shame–fear spectrum of cultures. November 2023. Page Version ID: 1184808072. URL: https://en.wikipedia.org/w/index.php?title=Guilt%E2%80%93shame%E2%80%93fear_spectrum_of_cultures&oldid=1184808072 (visited on 2023-12-10).

      The concept of the "guilt–shame–fear spectrum of cultures" as detailed in the Wikipedia article highlights how different cultures prioritize and experience these emotions, shaping their social norms and individual behaviors. The spectrum classifies cultures based on which emotion predominantly governs social control and conformity.

    1. In at least some views about shame and childhood1, shame and guilt hold different roles in childhood development [r1]: Shame is the feeling that “I am bad,” and the natural response to shame is for the individual to hide, or the community to ostracize the person. Guilt is the feeling that “This specific action I did was bad.” The natural response to feeling guilt is for the guilty person to want to repair the harm of their action.

      The distinction between shame and guilt in childhood development, as discussed in the chapter, highlights a crucial aspect of emotional growth and socialization. My personal opinion is that understanding this distinction is fundamental not only for parents and educators but also for society at large. Shame, which internalizes a sense of being inherently bad, can be detrimental to a child's self-esteem and overall psychological health. It often leads to avoidance behaviors and a desire to hide, which can hinder social integration and personal development.

    1. Roni Jacobson. I’ve Had a Cyberstalker Since I Was 12. Wired, 2016. URL: https://www.wired.com/2016/02/ive-had-a-cyberstalker-since-i-was-12/ (visited on 2023-12-10).

      Jacobson's story highlights the pervasive fear and anxiety caused by an online stalker, showing how digital harassment can persist over many years and significantly affect one's mental health and sense of security. This source underscores the urgent need for more effective protective measures and legal actions against cyberstalking to support victims who face such relentless harassment.

    1. Bullying: like sending mean messages through DMs Cyberstalking: Continually finding the account of someone, and creating new accounts to continue following them. Or possibly researching the person’s physical location.

      The chapter’s discussion on bullying and cyberstalking highlights how technology intensifies harassment, making it more pervasive and invasive. The relentless nature of cyberstalking, where perpetrators continuously create new accounts or track a person's physical location, is particularly alarming. This not only invades digital privacy but can also lead to severe emotional distress. It underscores the need for stricter regulations, improved reporting mechanisms on social media platforms, and increased awareness to help individuals protect themselves and seek justice effectively.

    1. WIRED. How to Not Embarrass Yourself in Front of the Robot at Work. September 2015. URL: https://www.youtube.com/watch?v=ho1RDiZ5Xew (visited on 2023-12-08).

      This video provides practical tips and insights into navigating human-robot interactions in the workplace, addressing the evolving dynamics as automation and robotics become increasingly integrated into various industries. By highlighting the nuances of etiquette and communication in this context, the video offers valuable guidance for individuals adapting to working alongside robotic counterparts.

    1. Some of the different characteristics that means of communication can have include (but are not limited to): Location: Some forms of communication require you to be physically close, some allow you to be located anywhere with an internet signal.

      Location is indeed a crucial characteristic of communication methods. Traditional face-to-face interactions require physical proximity, fostering a sense of intimacy and immediacy. On the other hand, digital communication platforms transcend geographical barriers, enabling connections across vast distances. However, despite the convenience of remote communication, it's essential to recognize its limitations in capturing nuances like body language and tone, which are crucial for effective interpersonal communication. This dichotomy highlights the importance of adapting communication methods to suit specific contexts and objectives.

    1. Elizabeth de Luna. The inside story of how Tumblr lost its way. Mashable, February 2022. URL: https://mashable.com/article/how-tumblr-lost-its-way (visited on 2023-12-08).

      One striking aspect is the examination of Tumblr's struggle to balance its commitment to fostering a diverse community with the pressures of corporate ownership. This aligns with the theme of community dynamics and corporate influence discussed in the chapter, shedding light on the complexities inherent in managing online platforms. It prompts reflection on how platforms navigate the tension between maintaining their original ethos and adapting to market demands, ultimately shaping user experiences and content moderation policies.

    1. Governments might also have rules about content moderation and censorship, such as laws in the US against CSAM. China additionally censors various news stories in their country, like stories about protests. In addition to banning news on their platforms, in late 2022 China took advantage of Elon Musk having fired almost all Twitter content moderators to hide news of protests by flooding Twitter with spam and porn [n10].

      It's chilling to see how governments wield their power over content moderation and censorship, shaping the narrative according to their agendas. The example of China leveraging Elon Musk's decision to fire content moderators on Twitter to flood the platform with spam and porn in order to suppress news of protests is particularly alarming. It underscores the importance of robust and independent moderation systems to safeguard free speech and ensure the dissemination of accurate information. This raises the question: How can we strike a balance between preventing harmful content and preserving the freedom of expression in the digital age, especially in the face of governmental interference?

    1. Robinson Meyer. Everything We Know About Facebook’s Secret Mood-Manipulation Experiment. The Atlantic, June 2014. URL: https://www.theatlantic.com/technology/archive/2014/06/everything-we-know-about-facebooks-secret-mood-manipulation-experiment/373648/ (visited on 2023-12-08).

      Meyer's investigative piece sheds light on the ethical implications of conducting psychological experiments on users without their explicit consent, raising important questions about the boundaries of data manipulation and user autonomy in online environments. This source highlights the need for greater transparency and ethical oversight in the design and implementation of algorithms that shape users' experiences on social media platforms.

    1. While there are healthy ways of sharing difficult emotions and experiences (see the next section), when these difficult emotions and experiences are thrown at unsuspecting and unwilling audiences, that is called trauma dumping [m11]. Social media can make trauma dumping easier. For example, with parasocial relationships, you might feel like the celebrity is your friend who wants to hear your trauma. And with context collapse, where audiences are combined, how would you share your trauma with an appropriate audience and not an inappropriate one (e.g., if you re-post something and talk about how it reminds you of your trauma, are you dumping it on the original poster?).

      Trauma dumping is indeed a serious concern, especially in today's digital age where social media platforms provide a seemingly endless outlet for expression. It's crucial to recognize the boundaries of sharing personal trauma and the impact it can have on both oneself and the audience. One way to navigate this is by considering the concept of consent in communication. Just as we seek consent before sharing intimate details in face-to-face conversations, the same principle should apply online.

  2. Apr 2024
    1. Oliver Tearle. Who Said, ‘A Lie Is Halfway Round the World Before the Truth Has Got Its Boots On’? June 2021. URL: https://interestingliterature.com/2021/06/lie-halfway-round-world-before-truth-boots-on-quote-origin-meaning/ (visited on 2023-12-08).

      Tearle traces the quote back to a sermon by the English clergyman Charles Haddon Spurgeon in the late 19th century. This sheds new light on the quote's history and emphasizes the importance of accurate attribution in scholarly discourse. It also highlights the complexity of tracing the origins of popular sayings and the need for careful research and scrutiny when citing sources.

    1. We’ll include several examples on this page from the TikTok Duet feature, which allows people to build off the original video by recording a video of themselves to play at the same time next to the original. So for example, This tweet thread of TikTok videos (cross-posted to Twitter) starts with one Tiktok user singing a short parody musical [l19] of an argument in a grocery store.

      After reading about the TikTok Duet feature and how it allows users to build off original videos, I couldn't help but think about the creative potential and collaborative nature of social media platforms. This feature not only enables users to engage with content in new ways but also fosters a sense of community and connection among creators. It's fascinating to see how technology continues to evolve to facilitate artistic expression and storytelling, and I'm excited to see how users will continue to innovate and collaborate using platforms like TikTok.

    1. Mayo Clinic Staff. Generalized anxiety disorder - Symptoms and causes. 2017. URL: https://www.mayoclinic.org/diseases-conditions/generalized-anxiety-disorder/symptoms-causes/syc-20360803 (visited on 2023-12-07).

      One detail from the Mayo Clinic article that stands out is its thorough exploration of the symptoms and causes of GAD. It discusses how GAD can manifest in both physical and psychological symptoms, such as excessive worrying, restlessness, irritability, muscle tension, and difficulty concentrating. Additionally, the article delves into the potential causes of GAD, including genetic factors, brain chemistry, and life experiences.

    1. The elevator buttons might have labels both drawn (for people who can see them) and in braille (for people who cannot), and the ground floor button may be marked with a star, so that even those who cannot read can at least choose the ground floor.

      It's heartening to see the consideration for accessibility in the design of elevator buttons described in the chapter. By incorporating features like raised labels and Braille, as well as using symbols like a star for the ground floor button, elevator designers are making sure that people with various abilities can navigate and use elevators comfortably and independently.

    1. Salt (cryptography). November 2023. Page Version ID: 1187264416. URL: https://en.wikipedia.org/w/index.php?title=Salt_(cryptography)&oldid=1187264416 (visited on 2023-12-08).

      One detail from the Wikipedia page that stood out to me is the explanation of how salt helps mitigate the risk of dictionary attacks and rainbow table attacks. By appending a unique salt value to each password before hashing, even if two users have the same password, their hashed passwords will be different due to the unique salt values. This makes it significantly more difficult for attackers to precompute hashes for commonly used passwords and undermines their ability to crack hashed passwords efficiently.

    1. But while that is the proper security for storing passwords. So for example, Facebook stored millions of Instagram passwords in plain text [i8], meaning the passwords weren’t encrypted and anyone with access to the database could simply read everyone’s passwords. And Adobe encrypted their passwords improperly and then hackers leaked their password database of 153 million users [i9].

      It's concerning to see such high-profile instances of improper password storage and encryption. These cases highlight the critical importance of implementing robust security measures, especially when handling sensitive user data like passwords. As users, we trust companies to safeguard our personal information, including our passwords, and incidents like these erode that trust.

    1. Kurt Wagner. This is how Facebook collects data on you even if you don’t have an account. Vox, April 2018. URL: https://www.vox.com/2018/4/20/17254312/facebook-shadow-profiles-data-collection-non-users-mark-zuckerberg (visited on 2023-12-05).

      Boe's expertise shines through in the clarity and depth of explanation provided, making it an indispensable resource for anyone diving into PRAW development. This documentation not only elucidates the intricacies of PRAW's model architecture but also serves as a testament to the collaborative spirit of open-source communities, where knowledge sharing fuels innovation and growth.

    1. One particularly striking example of an attempt to infer information from seemingly unconnected data was someone noticing that the number of people sick with COVID-19 correlated with how many people were leaving bad reviews of Yankee Candles saying “they don’t have any scent” (note: COVID-19 can cause a loss of the ability to smell):

      It highlights the importance of thinking creatively and critically when examining data, as well as the potential for serendipitous discoveries. It also underscores the significance of considering broader contextual factors when interpreting data, as understanding the underlying mechanisms behind correlations is crucial for drawing meaningful conclusions. This story could spark interesting discussions on the role of intuition and curiosity in data analysis, as well as the ethical considerations surrounding the use of personal data for predictive purposes.

    1. FBI–King suicide letter. November 2023. Page Version ID: 1184939326. URL: https://en.wikipedia.org/w/index.php?title=FBI%E2%80%93King_suicide_letter&oldid=1184939326 (visited on 2023-12-05).

      The letter's content, which attempted to coerce Dr. Martin Luther King Jr. into committing suicide, is a chilling reminder of the lengths to which government agencies went to undermine dissent and activism. It's crucial to consider the broader context in which this letter was sent and its implications for civil liberties and democracy. The source provided offers valuable insights into this dark chapter of American history and underscores the importance of vigilance in safeguarding fundamental rights and freedoms.

    1. In the early Internet message boards that were centered around different subjects, experienced users would “troll for newbies” by posting naive questions that all the experienced users were already familiar with. The “newbies” who didn’t realize this was a troll would try to engage and answer, and experienced users would feel superior and more part of the group knowing they didn’t fall for the troll like the “newbies” did. These message boards are where the word “troll” with this meaning comes from.

      It's fascinating how the term "troll" originated from these early Internet message boards. This practice of trolling for newbies highlights a kind of elitism and exclusionary behavior that unfortunately still persists in some online communities today. It's a reminder of the importance of fostering inclusivity and empathy, especially in online spaces where people from diverse backgrounds come together. It's also interesting to think about how online dynamics and behaviors have evolved since then, and what new challenges have emerged in the digital landscape.

    1. Comedy Central. Drunk History - John Adams and Thomas Jefferson Had Beef. February 2018. URL: https://www.youtube.com/watch?v=l6Ove4_JsCM (visited on 2023-11-24).

      While Drunk History may not be a conventional scholarly source, its humorous portrayal of historical events can still provide valuable insights and spark interest in viewers to delve deeper into the subject matter. Additionally, this episode serves as a reminder that history can be presented in various formats, catering to different audiences and engaging them in unexpected ways.

    2. Mark R. Cheathem. Conspiracy Theories Abounded in 19th-Century American Politics. URL: https://www.smithsonianmag.com/history/conspiracy-theories-abounded-19th-century-american-politics-180971940/ (visited on 2023-11-24).

      Cheathem delves into the political climate of the 19th century, highlighting how conspiracy narratives shaped public discourse and influenced political dynamics. One particularly intriguing aspect discussed in the article is the role of print media in disseminating and perpetuating these conspiracy theories, underscoring the significance of mass communication in shaping societal beliefs and attitudes. Cheathem's research offers valuable insights into the historical roots of conspiracy thinking in American politics, shedding light on enduring patterns that continue to resonate in contemporary discourse.

    1. 4Chan has various image-sharing bulletin boards, where users post anonymously. Perhaps the most infamous board is the “/b/” board for “random” topics. This board emphasizes “free speech” and “no rules” (with exceptions for child sexual abuse material [CSAM] and some other illegal content). In these message boards, users attempt to troll each other and post the most shocking content they can come up with. They also have a history of collectively choosing a target website or community and doing a “raid” where they all try to join and troll and offend the people in that community.

      This raises questions about the responsibility of online platforms in regulating harmful behavior while also upholding principles of free speech. Additionally, the notion of collective raids targeting other websites or communities is deeply troubling, as it demonstrates a coordinated effort to harass and offend individuals who may have done nothing to provoke such attacks. It highlights the dark side of internet culture and the potential consequences of unchecked online behavior. As we navigate the complexities of online discourse, it's crucial to prioritize empathy, respect, and responsible use of freedom of expression to create a safer and more inclusive online environment for everyone.

    1. 2003 saw the launch of several popular social networking services [e11]: Friendster, Myspace, and LinkedIn. These were websites where the primary purpose was to build personal profiles and create a network of connections with other people, and communicate with them.

      Reflecting on this chapter, it's fascinating to see how these early platforms paved the way for the digital social interactions that have become such an integral part of our lives. As someone who has witnessed the evolution of social media firsthand, it's incredible to think about how far we've come since the early days of Friendster and Myspace. It also raises questions about the future of social networking and how it will continue to evolve in the years to come.

    1. If we think of a tweet’s contents (text and photos) as the main data of a tweet, then additional information such as the user, time, and responses would be considered metadata.

      The distinction between main data and metadata in analyzing tweets reflects the importance of context in data analysis. Main data, like tweet content, is central, while metadata provides essential background information, like collection methods. This understanding is crucial for ensuring accurate and reliable analysis.

    1. Complex number. November 2023. Page Version ID: 1186512779. URL: https://en.wikipedia.org/w/index.php?title=Complex_number&oldid=1186512779 (visited on 2023-11-24).

      The article also explores various operations involving complex numbers, such as addition, subtraction, multiplication, and division, as well as concepts like the complex conjugate and modulus. Additionally, it discusses the geometric interpretation of complex numbers on the complex plane and their significance in fields such as mathematics, physics, and engineering. Overall, the article serves as a valuable resource for understanding the fundamentals of complex numbers and their relevance in diverse contexts.

  3. Mar 2024
    1. John Hartley. Pushing Back: Social Media as an Evolutionary Phenomenon. In The SAGE Handbook of Social Media, pages 13–34. SAGE Publications Ltd, 55 City Road, 2018. URL: https://sk.sagepub.com/reference/the-sage-handbook-of-social-media/i296.xml (visited on 2023-11-03), doi:10.4135/9781473984066.

      John Hartley's chapter on "Pushing Back: Social Media as an Evolutionary Phenomenon" offers a thought-provoking perspective on the role of social media in shaping societal dynamics. Hartley explores how social media platforms serve as catalysts for social change, allowing individuals and groups to challenge established norms and power structures. His analysis sheds light on the transformative potential of social media as a tool for grassroots activism and political mobilization.

    1. Antagonistic bots can also be used as a form of political pushback that may be ethically justifiable. For example, the “Gender Pay Gap Bot [c12]” bot on Twitter is connected to a database on gender pay gaps for companies in the UK. Then on International Women’s Day, the bot automatically finds when any of those companies make an official tweet celebrating International Women’s Day and it quote tweets it with the pay gap at that company:

      For the mention of the "Gender Pay Gap Bot" on Twitter, it's intriguing to see technology being used as a tool for political activism and social change. While the bot undoubtedly sheds light on an important issue, one wonders about the accuracy and impact of its data, as well as the potential for backlash from targeted companies. It raises questions about the ethical boundaries of using bots for advocacy and the broader implications for online activism in the digital age.

    1. Existentialism

      The exploration of existentialism in this paragraph offers a thought-provoking insight into the philosophical concept of creating meaning and morality in the absence of inherent values. The idea that individuals are tasked with forging their own significance resonates with the complexities of human existence and the quest for personal fulfillment.

    2. There are many different types of moral nihilism. But they all boil down, one way or another, to the idea that moral reasoning or trying to think about ethics is not real, or is based on a mistake.

      In considering ethical frameworks, it's important to expand beyond the traditional perspectives highlighted in the article, such as consequentialism, deontology, and virtue ethics. A notable framework that warrants attention is feminist ethics, which offers a distinct lens shaped by considerations of gender, intersectionality, and power dynamics. Unlike conventional approaches, feminist ethics prioritizes values like care, empathy, and relationality, underscoring the significance of marginalized perspectives in moral deliberations. Integrating feminist insights into discussions on ethics not only broadens our understanding but also fosters a more inclusive approach to addressing moral responsibilities and promoting social justice.