20 Matching Annotations
  1. Last 7 days
  2. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Meme. December 2023. Page Version ID: 1187840093. URL: https://en.wikipedia.org/w/index.php?title=Meme&oldid=1187840093#Etymology (visited on 2023-12-08).

      By the definition that a meme is a gene like organize that replicates and adapts, to a degree it can be argued that languages, or words in a language are also a form of memes. Certain words can adapt and change depending on circus stances in order to best suit the time's culture. This is also the case with words that become memes, as seen through the usually uninteresting number "67", which has since become a viral meme. Due to its meme status, this also changes how people perceive existing instances of the number "67".

    1. When content (and modified copies of content) is in a position to be replicated, there are factors that determine whether it gets selected for replicated or not. As humans look at the content they see on social media they decide whether they want to replicate it for some reason, such as:

      It is due to this phenomena of replication and reposting that created the common idea that anything on the interest will forever stay on the interest, and be impossible for any party to completely scrub of the interest. This is also the case for memes, and specifically the people who are features in the memes. Often times, due to different factors, the people in a given meme might face back clash from other users on the interest, resulting in the person being harassed and bullies, such was the case with the star wars kid back in the late 2000s. This also is the catalyst for interest cringe culture and the reasoning for the effectiveness of mutual surveillance by other users.

  3. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Echo chamber (media). December 2023. Page Version ID: 1188142141. URL: https://en.wikipedia.org/w/index.php?title=Echo_chamber_(media)&oldid=1188142141#Echo_chambers_vs_epistemic_bubbles (visited on 2023-12-07).

      Echo chambers are often the cause for the creation and execution of extremist ideologies and actions. That said, the ethnicity of moderating such groups could be problematic, as for some ethical frame works, this could violate a common pillar, that of freedom of speech. However, in some other frame works, the need to stop any potential dangers caused by these echo chambers might out weight the need to maintain freedom of speech. However, this then brings into question the extent of control and moderation a governing body should have on any group.

    1. What experiences do you have of social media sites making particularly good recommendations for you?

      I often use social medias such as intergram to recommend me ad of different clothing brands that I might be interested in, instead of seeking it out myself. I found that by doing my own research for clothing, it has been difficult to find brands that I actually like. However, with the amount of ads along with the algorithm understanding my interests, they often do show me brands and items that I quite like, and would purchase.

  4. Oct 2025
  5. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Ableism. December 2023. Page Version ID: 1188412565. URL: https://en.wikipedia.org/w/index.php?title=Ableism&oldid=1188412565 (visited on 2023-12-07).

      Ableism could be a difficult problem to tackle, especially on the internet. As often times, intentional ableism can be seen as just ignorance or stupidity. Some people can justify the problem with the explanation that the problem was simple not realized or known, instead or attributing it directly to malice.

    1. When creating computer programs, programmers can do things that aren’t possible with architecture (where Universal Design came out of), that is: programs can change how they work for each individual user. All people (including disabled people) have different abilities, and making a system that can modify how it runs to match the abilities a user has is called Ability based design [j18]. For example, a phone might detect that the user has gone from a dark to a light environment, and might automatically change the phone brightness or color scheme to be easier to read. Or a computer program might detect that a user’s hands tremble when they are trying to select something on the screen, and the computer might change the text size, or try to guess the intended selection.

      With the flexibility and simplicity of the internet, this allows for most people with physical disabilities to complete practically all tasks they they will need to on the internet. With the introduction and further development of neuro link implants, this can allow even the paralyzed to utilize the internet. On the other hand, with the amount of information on the internet, people with mental illnesses might find it more difficult to utilize the internet and all the information on it to its full extent.

    1. Right to privacy. November 2023. Page Version ID: 1186826760. URL: https://en.wikipedia.org/w/index.php?title=Right_to_privacy&oldid=1186826760 (visited on 2023-12-05).

      While privacy laws exist, like any other rules, they need to be reinforces. If not, there is no reason for people or entities to obey and follow them. As such, entities without solid governing such as some branches of the government could have the ability to do as they wish. If certain bad actors gained control over the ability to monitor people through the web, they would be able to monitor and find large amounts of information about its population and target certain demographics.

  6. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Hackers finding a vulnerability and inserting, modifying, or downloading information. For example:

      I wonder if there is any way a company is able to store secure information in a way such that even despite a breach in security, the information is still inaccessible to hackers. Would it be possible for the information to be stored instead on the users platform, and whenever the server needs to access it, it will instead request from the users computer? While this is less convenient and I assume it would require more processing time, it would be more secure as all information is not centralized.

  7. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. 4chan. December 2023. Page Version ID: 1187992915. URL: https://en.wikipedia.org/w/index.php?title=4chan&oldid=1187992915 (visited on 2023-12-05).

      Anonymous forum boards such as 4chan and so many others both clearly display the benefits but also the drawbacks of the internet. Using the internet, a whole new personality can be created that is separated from your own self, allowing for freedom of expression about not only the self but also other issues. However, this also means that for most people, the interest is detached from real life and devoid of consequence, meaning when trolls pray on vulnerable members of the net might go to far, and end up causing real physical damage for not only the victim but their relationships. There has been multiple instances of users on 4chan causing physical harm either through physical real work actions by the 4chan-ers or by the victim themselves. 4chan has also continuously mocked dead victums as a sort of inside joke.

    1. In the early Internet message boards that were centered around different subjects, experienced users would “troll for newbies” by posting naive questions that all the experienced users were already familiar with. The “newbies” who didn’t realize this was a troll would try to engage and answer, and experienced users would feel superior and more part of the group knowing they didn’t fall for the troll like the “newbies” did. These message boards are where the word “troll” with this meaning comes from.

      While the act of trolling and its many other forms have always existed throughout social interaction and media, the invention and wide spread adaptation of the internet has made trolling more readily available and easily accessible. Having access to different social platforms, this gives potential trollers easy access to different victim to harassed. The mostly anonymous nature of the internet also voids the bad actors of consequence, often resulting in the trolling becoming more and more extrema. Such examples including users on platforms like 4chan moving discussions and topics that originated on the forum and realizing them in real life.

  8. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Text analysis of Trump's tweets confirms he writes only theAndroid half was published on. Text analysis of Trump's tweets confirms he writes only the (angrier) Android half. August 2016. URL: http://varianceexplained.org/r/trump-tweets/ (visited on 2023-11-24).

      With modern improvements in AI and other text based programs. It will presumably be increasingly difficult to distinguish between what content is created authentically by a human and what is artificial. With increase usage of AI, the desire for authentic creations full by humans might increase.

    1. Parasocial relationships are when a viewer or follower of a public figure (that is, a celebrity) feel like they know the public figure, and may even feel a sort of friendship with them, but the public figure doesn’t know the viewer at all.

      A parasocial relationship while undesirable in most cases might in fact be the end goal of some figures like politicians or cult leaders. This dynamic can be manipulated for personal gain by the leader, in order to fulfill their own desires. This can vary from influencing or straight up telling their followers what to do.

  9. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Web 2.0. October 2023. Page Version ID: 1179906793. URL: https://en.wikipedia.org/w/index.php?title=Web_2.0&oldid=1179906793#Web_1.0 (visited on 2023-11-24).

      With web 1.0 mainly being content created by independent companies, 2.0 being content created by individual people, and web 3.0 being the integration of AI which we are rapidly approaching that possibility, it makes me wonder about the possibilities of web 4.0. I assume it would be content created by a community, with individual ideas seamlessly integrated into a cohesive media, able to be easily understood.

    1. Graffiti and other notes left on walls were used for sharing updates, spreading rumors, and tracking accounts

      As the work media entails, and form of interaction with the physical world can count as a form of media. And as such, any interaction with the physical world can also count as a form of social media. Mediums can also become social through the exposure to other people, but this also brings up the question of is a media only social if shared or perceived by some body else.

  10. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Zero-based numbering. September 2023. Page Version ID: 1176111995. URL: https://en.wikipedia.org/w/index.php?title=Zero-based_numbering&oldid=1176111995#Origin (visited on 2023-11-24).

      Use usage of 0 in mathematics, specifically the "0th derivative" of a function is interesting, as it represents the unaltered state of the function, as no change has been done to it yet. This say of thinking can also be uses on other elements that change quite often, with the number not representing the order of change, but the degree of change.

    1. The data in question here is over what percentage of Twitter users are spam bots, which Twitter claimed was less than 5%, and Elon Musk claimed is higher than 5%.

      A lot of large accounts on social media are ran by bots, or either human bots, as they have a systematic way of reposting something after a period of time. Often times, popular tweets are retweeted as new in order to farm likes and interactions. With the blue check Elon added allowed revenue to be created through tweets, further incentivizing such practices.

  11. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Zack Sharf. ‘Star Wars: The Last Jedi’ Backlash: Academic Study Reveals 50% of Online Hate Caused by Russian Trolls or Non-Humans. October 2018. URL: https://www.indiewire.com/features/general/star-wars-last-jedi-backlash-study-russian-trolls-rian-johnson-1202008645/ (visited on 2023-12-02).

      With the knowledge that a lot of the discord over twitter was actually due to bots and political reasons, I wonder if the consensus around the movie would have been significantly more positive without the negative bots farm. As the period of time after the movie was released, I do remember the general impression of the movie was quite negative. Could have these negative twitter bots swayed the opinions of other real human, thus creating a repeating cycle? or were negative comments just more apparent as they generate more conversation and clicks?

    1. In this example, some clever protesters have made a donkey perform the act of protest: walking through the streets displaying a political message. But, since the donkey does not understand the act of protest it is performing, it can’t be rightly punished for protesting. The protesters have managed to separate the intention of protest (the political message inscribed on the donkey) and the act of protest (the donkey wandering through the streets). This allows the protesters to remain anonymous and the donkey unaware of it’s political mission.

      There is also the in between scenario of the riot dog. In rare occasions, stray dogs might show up in during a period of civil unrest and join the side of the protesters. While the dog is unable to complete grasp the scope of the situation nor understand the reasoning behind the riot, the dog is still actively being aggressive towards the riot police and being hostile.

  12. Sep 2025
    1. One widespread ethical principle is what English speakers sometimes call the “Golden Rule [b8]”:

      The concept of a golden rule is inherently flawed and contradictory. The method of using ones own selfish desire to be treated in a way is in turn a selfish act, with the goal of gaining something from said interaction. The golden rule also works in only social situations, which gets thrown out the window when a individual is in a situation without judgement or consequence,, as seen by the shopping cart dilemma.

    1. One Twitter user got a photo of Justine turning on her phone after getting off the plane. That user also talked to her father at the airport and tweeted about the photo and their responses.

      With the wide spread access of phones and cameras, this inadvertently creates mass surveillance through the masses themselves. Any action someone does can now be easily recorded and uploaded to thousands of uses and institutions, which the recorded can then face both social and institutional repercussions. In my opinion this is largely the catalyst of modern "cringe culture", where actions seen as "cringy" by the masses posted online for people to see and judge. The ethics of this is questionable, while said cringy action is a medium meant to communicate with others, but posting the content on social media unnecessary exposed the actions to unwarned attention and unintended audience that might not understand the actions in the first place.