22 Matching Annotations
  1. Mar 2025
  2. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Britney Nguyen. Ex-Twitter engineer says he quit years ago after refusing to help sell identifiable user data, worries Elon Musk will 'do far worse things with data'. November 2022. URL: https://www.businessinsider.com/former-twitter-engineer-worried-how-elon-musk-treat-user-data-2022-11 (visited on 2023-12-10).

      I'm not sure about the rest of the facts, but I'm sure Musk is now using users' data to research AI, and that's a clear infringement for users - especially those who are artists. Everything the user tweets about their artistic output could potentially be fused by the AI, thus allowing the AI to produce different styles of art in a more sophisticated way, and what the AI generates in seconds is something that would take an artist hundreds of hours or even months to accomplish. What's even scarier is that AI will gradually deprive artists of their employment space, and the commercial deprivation at the artistic level is terrifying - it's the beginnings of the replacement of the human mind by AI. While it is true that AI is still rooted in human beings themselves, the commercial erosion deprives people of the possibility of utilizing their minds to make a living in a practical sense.

    1. As a social media user, we hope you are informed about things like: how social media works, how they influence your emotions and mental state, how your data gets used or abused, strategies in how people use social media, and how harassment and spam bots operate.

      I think these contents should be mandatory to be known and viewed in primary schools, or when users first sign up for a social platform. The threshold of the Internet is so low that there are all kinds of people, some of whom pollute the surrounding Internet environment with their own hostility, and some of whom are slowly influenced by some bad words and gradually lose their own values because they have no understanding of the Internet. Therefore, I believe that Internet education should not only be emphasized verbally, but should be actually implemented in life.

  3. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Land Back. December 2023. Page Version ID: 1188237630. URL: https://en.wikipedia.org/w/index.php?title=Land_Back&oldid=1188237630 (visited on 2023-12-10).

      In my opinion, the biggest problem faced by such organizations is how to integrate them with modern society. First of all, other groups in society should be supportive of these organizations, and these organizations should actively try to integrate with other parts of society, so that their spirit and ideas can be better disseminated, the public can understand and support them as soon as possible, and peaceful exchanges between the two sides can be the basis for the development of human thought.

    1. Most programming languages are based in English, and there are very few non-English programming languages [t26], and those that exist are rarely used. The reason few non-English programming languages exist is due to the network effect, which we mentioned last chapter. Once English became the standard language for programming, people who learn programming learn English (or enough to program with it). Attempts to create a non-English programming language face an uphill battle, since even those that know that language would still have to re-learn all their programming terms in the non-English language. Now, since many people do speak other languages, you can often find comments, variable names, and even sometimes coding libraries which use non-English languages, but the core coding terms (e.g., for, if, etc.), are still almost always in English. See also this academic paper: Non-Native English Speakers Learning Computer Programming: Barriers, Desires, and Design Opportunities [t27]

      I'm skeptical of this paragraph being defined as an act of colonization for two main reasons: the first reason is that programming, as a tool that is needed all over the world, a unified language would be easier to communicate on a large scale, and English, as a more widely used language, is a suitable choice to become a programming language. The second reason is that the original code was compiled in English, so I don't think there's anything wrong with keeping English as a programming language.

  4. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Thaddeus Metz. What Archbishop Tutu's ubuntu credo teaches the world about justice and harmony. The Conversation, October 2017. URL: http://theconversation.com/what-archbishop-tutus-ubuntu-credo-teaches-the-world-about-justice-and-harmony-84730 (visited on 2023-12-10).

      Most of the discrimination, humiliation, and unequal treatment between races is due to the fact that the bullies do not treat people of different races as "human beings" like them, but rather classify them through race like a biological chain, so most of the racial conflicts are manifested by the fact that one of the parties does not receive the basic human rights guarantees. Therefore, the problem of most racial conflicts is that one of the parties is not guaranteed basic human rights, which is a lack of respect for human rights and even a lack of respect for life. It was true that there were differences in customs and needs between different races, but those differences should have been resolved peacefully, not turned into unilateral repression and inequality.

    1. For an example of public shaming, we can look at late-night TV host Jimmy Kimmel’s annual Halloween prank, where he has parents film their children as they tell the parents tell the children that the parents ate all the kids’ Halloween candy. Parents post these videos online, where viewers are intended to laugh at the distress, despair, and sense of betrayal the children express. I will not link to these videos which I find horrible, but instead link you to these articles: Jimmy Kimmel’s Halloween prank can scar children. Why are we laughing? [r4] Jimmy Kimmel’s Halloween Candy Prank: Harmful Parenting? [r5] We can also consider events in the #MeToo movement as at least in part public shaming of sexual harassers (but also of course solidarity and organizing of victims of sexual harassment, and pushes for larger political, organizational, and social changes).

      I think there are two types of humiliation, the first one is to consciously humiliate others, and the other one is to do something to others without realizing that it is humiliating in the eyes of others, and this example is obviously the second type. For children, unconscious shaming from their parents can create a huge psychological shadow, which can increase their insecurity and powerlessness, and even affect their daily psychological state. And at this time the Internet instead plays a role in criticizing and correcting these behaviors, because the Internet somehow eliminates the generation gap between the views of people of different qualities and different age groups. It is hoped that with the advancement of the Internet unconscious humiliating behaviors will become less and less.

  5. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. [q23] Jane Dalton. Dentist who slaughtered Cecil the lion ‘hunts and kills protected wild ram’ just four years on. The Independent, July 2020. URL: https://www.independent.co.uk/news/world/asia/walter-palmer-cecil-lion-hunt-ram-sheep-mongolia-a9613856.html (visited on 2023-12-10).

      A person should be punished by the law if he/she does something more than what is required by the law, but the moral condemnation on the Internet will in some cases stimulate a person's rebellious mentality, i.e., the more the Internet criticizes something, the more that person will want to do something. However, moral criticism on the internet cannot be limited, so I think there are only two ways to alleviate this situation: the first is to strengthen the legal regulation of that person, and if they do something more serious, let that person take the harsher legal consequences; the second is to force psychological counseling while giving legal punishment, although this method is rather clumsy, but at least

    1. 17.5. Justifying Harassment# So let’s look at how harassment gets justified. One research paper (Morally Motivated Networked Harassment as Normative Reinforcement [q16]) suggests a process that often happens with online harassment, where the harassers feel their actions are justified. They say these play out as follows: A target is identified as breaking the norm of a community (often not their own community, so this is a case of context collapse). This provides a justification for people to harass the target. A key social media account (the amplifier), promotes the accusation in their community (again, often not the one the target is in). The amplifier’s audience then harasses the target. The target experiences negative emotions (stress, depression, etc.), and self-censors and withdraws. The targets’ speech (and others who might have said something similar) is therefore silenced. The amplifier’s network found a common enemy and cause, and this reinforces their values and norms. Does this sound bad? Let’s look at some more specific examples and see what you think.

      I think there are two ways for individuals on the Internet to defend themselves against harassment before it escalates to the legal level: the first is to point it out directly to the other party when they feel they are being harassed, because there are cases where the other party thinks they are just chatting, but in reality they are harassing in disguise, so pointing it out is very important to avoid any further discomfort or conflict between the two parties. The second is to report the harassment or give feedback to the customer service when you feel that you are being harassed and the other party doesn't stop after pointing out the harassment. The fact is that most social media platforms nowadays do not have enough customer service expertise to deal with harassment, and this is a problem that should be addressed by the law, which should strengthen the company's supervision of employee training.

  6. Feb 2025
  7. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Jeremy Gray. Missing hiker rescued after Twitter user tracks him down using his last-sent photo. DPReview, April 2021. URL: https://www.dpreview.com/news/0703531833/missing-hiker-rescued-after-twitter-user-tracks-him-down-using-a-photo (visited on 2023-12-08).

      This is an example of the positive use of croudsourcing on the web, and I have seen examples in other news of netizens being mobilized to republish and collect information in large numbers in order to find people. However, this method is undoubtedly risky, there will be people with ulterior motives to publish wrong information to delay the rescue team, so I think croudsourcing can only be regarded as an auxiliary means in many major incidents, because it is too uncontrollable.

    1. 16.2.1. Crowdsourcing Platforms# Some online platforms are specifically created for crowdsourcing. For example: Wikipedia [p12]: Is an online encyclopedia whose content is crowdsourced. Anyone can contribute, just go to an unlocked Wikipedia page and press the edit button. Institutions don’t get special permissions (e.g., it was a scandal when US congressional staff edited Wikipedia pages [p13]), and the expectation that editors do not have outside institutional support is intended to encourage more people to contribute. Quora [p14]: An crowdsourced question and answer site. Stack Overflow [p15]: A crowdsourced question-and-answer site specifically for programming questions. Amazon Mechanical Turk [p16]: A site where you can pay for crowdsourcing small tasks (e.g., pay a small amount for each task, and then let a crowd of people choose to do the tasks and get paid). Upwork [p17]: A site that lets people find and contract work with freelancers (generally larger and more specialized tasks than Amazon Mechanical Turk. Project Sidewalk [p18]: Crowdsourcing sidewalk information for mobility needs (e.g., wheelchair users).

      Croudsourcing is actually used in many parts of life, such as roadside interviews and company product questionnaires, all of which are widely used forms of croudsourcing in life. It's just that the information uploaded to search sites such as Wikipedia needs to be as rigorous as possible, so croudsourcing on the web needs to be more strictly scrutinized. Of course, most resource sites are open to error correction, and try to make the information accurate under the scrutiny of many Internet users. At the same time, I believe that when more important information is posted on the web, the website should allow the person behind the information to provide real information to ensure the order of the web and provide legal protection for the users.

  8. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Jules Montague. Münchausen by internet: the sickness bloggers who fake it online. The Guardian, April 2015. URL: https://www.theguardian.com/society/2015/apr/29/jules-gibson-munchausen-by-internet-sickness-bloggers-fake-it-whole-pantry (visited on 2023-12-08).

      Whether it is faking illnesses to gain traffic, cheating money or sharing fake treatments to mislead others, these behaviors have turned into extremely bad but hard-to-prevent threats on the Internet. I think the only measures that can reduce such behaviors at present are real names on the Internet and increased penalties that can be imposed on the person concerned in the legal sense if found. Pretending to be anything, not just a patient, can be extremely misleading to others on the Internet, and there is still a need for stronger online regulation.

    1. 13.2.2. Trauma Dumping# While there are healthy ways of sharing difficult emotions and experiences (see the next section), when these difficult emotions and experiences are thrown at unsuspecting and unwilling audiences, that is called trauma dumping [m11]. Social media can make trauma dumping easier. For example, with parasocial relationships, you might feel like the celebrity is your friend who wants to hear your trauma. And with context collapse, where audiences are combined, how would you share your trauma with an appropriate audience and not an inappropriate one (e.g., if you re-post something and talk about how it reminds you of your trauma, are you dumping it on the original poster?). Trauma dumping can be bad for the mental health of those who have this trauma unexpectedly thrown at them, and it also often isn’t helpful for the person doing the trauma dumping either:

      Internet trauma can have real-life consequences. Sometimes people just go online to vent their emotions, but venting too much or seeing excessively negative information about others, or becoming a victim or aggressor of others due to emotional distress, can make them aggressive or afraid to interact with others in real life as well. However, it is very difficult to prevent these invisible traumas on the Internet, so I think the psychological education of Internet surfing still needs to be popularized.

  9. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Joe Hernandez. A parents' lawsuit accuses Amazon of selling suicide kits to teenagers. NPR, October 2022. URL: https://www.npr.org/2022/10/09/1127686507/amazon-suicide-teenagers-poison (visited on 2023-12-07).

      I think this is meaningful to the parents' allegation that dangerous chemicals should be set up with vetting conditions when they are purchased, otherwise letting young people or unsuspecting people get them easily will pose a threat to social security. At the same time shopping platforms should also set up data control, for different age groups of buyers, should be pushed on the home page of different products, try not to let the dangerous goods appear in the young people's field of vision.

    1. 11.4.1. Filter Bubbles# One concern with how recommendation algorithms is that they can create filter bubbles (or “epistemic bubbles” or “echo chambers” [k14]), where people get filtered into groups and the recommendation algorithm only gives people content that reinforces and doesn’t challenge their interests or beliefs. These echo chambers allow people in the groups to freely have conversations among themselves without external challenge. The filter bubbles can be good or bad, such as forming bubbles for: Hate groups, where people’s hate and fear of others gets reinforced and never challenged Fan communities, where people’s appreciation of an artist, work of art, or something is assumed, and then reinforced and never challenged Marginalized communities can find safe spaces where they aren’t constantly challenged or harassed (e.g., a safe space [k15])

      This concept is akin to the "information cocoon" often referred to by the Internet these days. The birth of the Internet has made it easier for people to access information, but at the same time, due to the push of data, people generally only see what they are interested in or want to see on websites and social media, and over time, they will feel that the world is just like this side of the Internet, and this push mechanism prevents people from experiencing the diversity of the world. Therefore, it is very important to limit the use of the Internet, we have to use the Internet to retrieve information, but we should not trap ourselves in the world of the Internet, otherwise our thinking will be solidified by the network data, and ultimately lead to our inability to face the diverse reality of the world.

  10. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Inclusive design. December 2023. Page Version ID: 1188074097. URL: https://en.wikipedia.org/w/index.php?title=Inclusive_design&oldid=1188074097 (visited on 2023-12-07).

      Technology has shown great potential for helping persons with disabilities, but existing designs in society are often centered on the needs imagined by the general public, ignoring the diverse needs of persons with disabilities and making it difficult for them to use new technologies. Inclusive design emphasizes understanding and embracing the diversity of users so that technology products can better serve the disabled community and enhance their quality of life.

    1. 10.2.2. Modifying the Person# Another way of managing disabilities is assistive technology [j13], which is something that helps a disabled person act as though they were not disabled. In other words, it is something that helps a disabled person become more “normal” (according to whatever a society’s assumptions are). For example: Glasses help people with near-sightedness see in the same way that people with “normal” vision do Walkers and wheelchairs can help some disabled people move around closer to the way “normal” people can (though stairs can still be a problem) A spoon might automatically balance itself [j14] when held by someone whose hands shake Stimulants (e.g., caffeine, Adderall) can increase executive function in people with ADHD, so they can plan and complete tasks more like how neurotypical people do. Assistive technologies give tools to disabled people to help them become more “normal.” So the disabled person becomes able to move through a world that was not designed for them. But there is still an expectation that disabled people must become more “normal,” and often these assistive technologies are very expensive. Additionally, attempts to make disabled people (or people with other differences) act “normal” can be abusive, such as Applied Behavior Analysis (ABA) therapy for autistic people [j15], or “Gay Conversion Therapy” [j16].

      This approach is one of the most common and practicable ways used in our society today, that is, to provide social facilities to accommodate each of the several types of disabilities that exist in the largest numbers. However, what I have seen so far is that many of these facilities do not serve any practical purpose, the most typical example being blind alleys. There are many blind alleys in irregular and incomplete condition, and there are even blind alleys connecting stairs, pools, manhole covers and other dangerous areas for the blind, and the roads are not equipped with barriers or cues that the blind can receive, and most of the blind still rely on their clumsy canes or expensive guide dogs to move around. There are many calls for better accommodations for other types of disabilities, but I think it might be more immediately helpful to focus on the accommodations that are already in place.

    2. 10.2.3。创造一个适合所有人的环境# 另一个管理残疾的策略是使用起源于建筑的通用设计[j17]。在通用设计中,目标是使环境和建筑有选择,以便每个人都能使用它[2]。例如,带楼梯的建筑也可能有坡道和电梯,因此有不同行动需求的人(例如,有轮椅、婴儿车或行李的人)可以进入每个区域。在电梯里,按钮的高度可能高个子和高个子都能够到。电梯按钮可能既有画标签(为能看到它们的人)又有盲文(为看不到它们的人),一楼按钮可能标有星星,这样即使是那些不会阅读的人至少也可以选择一楼。 在这种管理残

      This approach is one of the most common and practicable ways used in our society today, that is, to provide social facilities to accommodate each of the several types of disabilities that exist in the largest numbers. However, what I have seen so far is that many of these facilities do not serve any practical purpose, the most typical example being blind alleys. There are many blind alleys in irregular and incomplete condition, and there are even blind alleys connecting stairs, pools, manhole covers and other dangerous areas for the blind, and the roads are not equipped with barriers or cues that the blind can receive, and most of the blind still rely on their clumsy canes or expensive guide dogs to move around. There are many calls for better accommodations for other types of disabilities, but I think it might be more immediately helpful to focus on the accommodations that are already in place.

    1. Emma Bowman. After Data Breach Exposes 530 Million, Facebook Says It Will Not Notify Users. NPR, April 2021. URL: https://www.npr.org/2021/04/09/986005820/after-data-breach-exposes-530-million-facebook-says-it-will-not-notify-users (visited on 2023-12-06).

      This article focuses on the news that the data of 530 million Facebook users has been quietly leaked and the company does not intend to tell users. I found one of the lines interesting, "the company does not have complete confidence in knowing which users would need to be notified". This statement shows that the company does not pay enough attention to the rights of the users, and is not even considering whether the most basic right of the users to use the product, the right to information, needs to be satisfied. This is actually a reflection of the lack of binding laws. Even a large company like this can leak data and not tell users, it is hard to imagine how much data can be leaked from small companies' social media and websites, and there is a long way to go in data protection and cybersecurity.

    1. Unclear Privacy Rules: Sometimes privacy rules aren’t made clear to the people using a system. For example: If you send “private” messages on a work system, your boss might be able to read them [i19]. When Elon Musk purchased Twitter, he also was purchasing access to all Twitter Direct Messages [i20] Others Posting Without Permission: Someone may post something about another person without their permission. See in particular: The perils of ‘sharenting’: The parents who share too much [i21]

      I think the root cause of these situations is the inadequacy of the law, or the insufficient regulation of high technology by the law. Although the law clearly stipulates "protection of personal privacy", when private companies or social media collect employee or user data, it is difficult for the law to detect these behaviors in order to find strong evidence, and sometimes even the users are told to respect privacy, and then the company quietly collects user data and quietly disseminates it on other websites without the user's knowledge. This actually reflects the "double-edged sword" attribute of technology. Developed technology makes it easier for people to communicate with each other, but personal data and privacy are also gradually lost in unrestricted communication.

  11. Jan 2025
    1. While trolling can be done for many reasons, some trolling communities take on a sort of nihilistic philosophy: it doesn’t matter if something is true or not, it doesn’t matter if people get hurt, the only thing that might matter is if you can provoke a reaction. We can see this nihilism show up in one of the versions of the self-contradictory “Rules of the Internet:”

      The part about nihilism is actually part of the philosophy of life. My teacher taught me before that apart from physical ailments, all discomfort comes from the three views and my reactions to the outside world, and that these can be avoided by adjusting my mind. While it does take a strong mind to be at peace in the face of all ridicule, this is ultimately where everyone grows, and everyone needs to exercise this mindset.

  12. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Jasper Jackson. Donald Trump 'writes angrier and more negative Twitter posts himself'. The Guardian, August 2016. URL: https://www.theguardian.com/media/2016/aug/10/donald-trump-twitter-republican-candidate-android-iphone (visited on 2023-11-24).

      This tweet demonstrates the difference in style and attitude of the Trump team when posting from different cell phones. The feature of labeling the source of the phone is really confusing in the short term, but in the long term I think it's a good feature, just like this example, the longer it goes on, the more people can see the guiding intent behind the statements made using different phones, and there are many other cases where the police have searched for suspects and collected evidence by looking at the source of the device on which the article was posted.

  13. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Dr. McLaughlin, through the @Sciencing_Bi account, pretended to have an illness she didn’t have (COVID). She made false accusations against Arizona State University’s role in the (fake) person getting sick, and she was able to get attention and sympathy through the fake illness and fake death of the fake @Sciencing_

      I think this kind of case where even the person behind the social account is not authentic is the scariest, maybe in this case in the book the person who fabricated the account can still be held accountable, but in today's age where AI is prevalent, if someone fabricates AI that can be used to defraud for money, and use this AI model to generate accounts, maybe the law won't be able to even protect the internet user, and may not even be able to pin down the person who initially cultivated the AI, leading to no recourse .