25 Matching Annotations
  1. Mar 2024
    1. Now in those days the god Thamus was the king of the whole country of Egypt, […] [then] came Theuth and showed his inventions, desiring that the other Egyptians might be allowed to have the benefit of them; […] [W]hen they came to letters, This, said Theuth, will make the Egyptians wiser and give them better memories; it is a specific both for the memory and for the wit. Thamus replied: […] this discovery of yours will create forgetfulness in the learners’ souls, because they will not use their memories; they will trust to the external written characters and not remember of themselves. The specific which you have discovered is an aid not to memory, but to reminiscence, and you give your disciples not truth, but only the semblance of truth; they will be hearers of many things and will have learned nothing; they will appear to be omniscient and will generally know nothing; they will be tiresome company, having the show of wisdom without the reality.

      The narrative from "Phaedrus" draws attention to a persistent conundrum in the relationship between humans and technology: the trade-off between strengthening some cognitive processes and perhaps impairing others. This historical viewpoint helps us better comprehend the present debates around the moral consequences of technological advancements by serving as a reminder that these issues are not only modern; they also have historical roots.

    2. In the first chapter of our book we quoted actor Kumail Nanjiani on tech innovators’ lack of consideration of ethical implications of their work. Of course, concerns about the implications of technological advancement are nothing new.

      Concerns about how digital technology affects learning and cognition now are echoed in Socrates' caution against writing because it can lead to forgetting and shallow understanding. It's interesting to think about how discussions about the impact of information overload and the internet on memory and knowledge retention now match historical criticisms of technical developments.

    1. 20.1. What is Colonialism?# As most social media platforms are headquartered in a very set of locations (e.g., Silicon Valley in the US, and Beijing China), but used all over the world, it is important for us to look at the concepts and history of colonialism to understand what it means for social media to be controlled in these few places. So let’s start by defining colonialism and some related concepts.

      Understanding the ramifications of such centralized authority requires an awareness of colonialism, given the concentration of social media platform headquarters in a few select global locales, including Beijing and Silicon Valley. Examining colonialism shows how historical trends and power structures affect the current effect and global reach of social media.

    1. 19.1. What is Capitalism?# Why do social media platforms make decisions that harm users? And why do social media platforms sometimes go down paths of self-destruction and alienating their users? Sometimes these questions can be answered by looking at the economic forces that drive decision-making on social media platforms, in particular with capitalism. So let’s start by defining capitalism.

      As an economic system, capitalism influences social media companies' operational and strategic choices, frequently resulting in actions that put user welfare last in favor of profit. Gaining knowledge about capitalism helps one to understand why these platforms might take actions that appear illogical or harmful to their user base.

  2. Feb 2024
    1. 18.1. Shame vs. Guilt in childhood development# Before we talk about public criticism and shaming and adults, let’s look at the role of shame in childhood. In at least some views about shame and childhood1, shame and guilt hold different roles in childhood development: Shame is the feeling that “I am bad,” and the natural response to shame is for the individual to hide, or the community to ostracize the person. Guilt is the feeling that “This specific action I did was bad.” The natural response to feeling guilt is for the guilty person to want to repair the harm of their action. In this view, a good parent might see their child doing something bad or dangerous, and tell them to stop. The child may feel shame (they might not be developmentally able to separate their identity from the momentary rejection). The parent may then comfort the child to let the child know that they are not being rejected as a person, it was just their action that was a problem. The child’s relationship with the parent is repaired, and over time the child will learn to feel guilt instead of shame and seek to repair harm instead of hide.

      It is crucial for parents to console their children following an incident in which they may have felt ashamed. It not only provides the foundation for the kid to acquire the more positive feeling of guilt, but it also serves to mitigate any bad self-perception the youngster may have. This method helps teach kids important life lessons like accountability and the value of owning up to errors.

    2. Before we talk about public criticism and shaming and adults, let’s look at the role of shame in childhood. In at least some views about shame and childhood1, shame and guilt hold different roles in childhood development: Shame is the feeling that “I am bad,” and the natural response to shame is for the individual to hide, or the community to ostracize the person. Guilt is the feeling that “This specific action I did was bad.” The natural response to feeling guilt is for the guilty person to want to repair the harm of their action. In this view, a good parent might see their child doing something bad or dangerous, and tell them to stop. The child may feel shame (they might not be developmentally able to separate their identity from the momentary rejection). The parent may then comfort the child to let the child know that they are not being rejected as a person, it was just their action that was a problem. The child’s relationship with the parent is repaired, and over time the child will learn to feel guilt instead of shame and seek to repair harm instead of hide.

      The explanation of the difference between guilt and shame draws attention to a crucial part of children's emotional growth. Recognizing that guilt is connected to an action, but shame can result in a sense of being intrinsically evil, emphasizes how crucial it is for parents to react to their children's errors. It's essential for developing in kids a positive feeling of accountability and self-worth.

    1. Harassment can also be done through crowds. Crowd harassment has also always been a part of culture, such as riots, mob violence, revolts, revolution, government persecution, etc. Social media then allows new ways for crowd harassment to occur. Crowd harassment includes all the forms of individual harassment we already mentioned (like bullying, stalking, etc.), but done by a group of people. Additionally, we can consider the following forms of crowd harassment: Dogpiling: When a crowd of people targets or harasses the same person. Public Shaming (this will be our next chapter) Cross-platform raids (e.g., 4chan group planning harassment on another platform) Stochastic terrorism The use of mass public communication, usually against a particular individual or group, which incites or inspires acts of terrorism which are statistically probable but happen seemingly at random. See also: An atmosphere of violence: Stochastic terror in American politics

      Crowd harassment on social media amplifies the impact of individual abuse acts and frequently results in more severe consequences for the victim by turning them into a collective force. This event highlights the negative aspects of online groups, where numbers and anonymity may encourage destructive conduct and spread violence beyond geographical bounds.

    1. Individual harassment (one individual harassing another individual) has always been part of human cultures, bur social media provides new methods of doing so. There are many methods by which through social media. This can be done privately through things like: Bullying: like sending mean messages through DMs Cyberstalking: Continually finding the account of someone, and creating new accounts to continue following them. Or possibly researching the person’s physical location. Hacking: Hacking into an account or device to discover secrets, or make threats. Tracking: An abuser might track the social media use of their partner or child to prevent them from making outside friends. They may even install spy software on their victim’s phone. Death threats / rape threats Etc. Individual harassment can also be done publicly before an audience (such as classmates or family). For example: Bullying: like posting public mean messages Impersonation: Making an account that appears to be from someone and having that account say things to embarrass or endanger the victim. Doxing: Publicly posting identifying information about someone (e.g., full name, address, phone number, etc.). Revenge porn / deep-fake porn Etc.

      Although social media may be a useful tool for fostering connections and communication, it has also unintentionally been used as a venue for different types of personal harassment, which has expanded the scope of conventional bullying into a more intrusive and widespread abuse. To safeguard people from these contemporary concerns, the digital age demands more stringent privacy regulations and more knowledge.

    1. There have been many efforts to use computers to replicate the experience of communicating with someone in person, through things like video chats, or even telepresence robots]. But there are ways that attempts to recreate in-person interactions inevitably fall short and don’t feel the same. Instead though, we can look at different characteristics that computer systems can provide, and find places where computer-based communication works better, and is Beyond Being There (pdf here). Some of the different characteristics that means of communication can have include (but are not limited to): Location: Some forms of communication require you to be physically close, some allow you to be located anywhere with an internet signal. Time delay: Some forms of communication are almost instantaneous, some have small delays (you might see this on a video chat system), or have significant delays (like shipping a package). Synchronicity: Some forms of communication require both participants to communicate at the same time (e.g., video chat), while others allow the person to respond when convenient (like a mailed physical letter). Archiving: Some forms of communication automatically produce an archive of the communication (like a chat message history), while others do not (like an in-person conversation) Anonymity: Some forms of communication make anonymity nearly impossible (like an in-person conversation), while others make it easy to remain anonymous. -Audience: Communication could be private or public, and they could be one-way (no ability to reply), or two+-way where others can respond.

      Richer interactions can result from the capacity to communicate asynchronously, which enables deliberate, contemplative replies. In addition, it has the advantage of archiving, which lets users review and consider conversations, improving the breadth and depth of communication beyond what is feasible in in-person, real-time interactions.

    2. There have been many efforts to use computers to replicate the experience of communicating with someone in person, through things like video chats, or even telepresence robots]. But there are ways that attempts to recreate in-person interactions inevitably fall short and don’t feel the same. Instead though, we can look at different characteristics that computer systems can provide, and find places where computer-based communication works better, and is Beyond Being There (pdf here). Some of the different characteristics that means of communication can have include (but are not limited to): Location: Some forms of communication require you to be physically close, some allow you to be located anywhere with an internet signal. Time delay: Some forms of communication are almost instantaneous, some have small delays (you might see this on a video chat system), or have significant delays (like shipping a package). Synchronicity: Some forms of communication require both participants to communicate at the same time (e.g., video chat), while others allow the person to respond when convenient (like a mailed physical letter). Archiving: Some forms of communication automatically produce an archive of the communication (like a chat message history), while others do not (like an in-person conversation) Anonymity: Some forms of communication make anonymity nearly impossible (like an in-person conversation), while others make it easy to remain anonymous. -Audience: Communication could be private or public, and they could be one-way (no ability to reply), or two+-way where others can respond.

      Geographical and physical obstacles can no longer be overcome by computer-based communication, enabling equitable participation from everyone—even those in remote locations or with mobility challenges. This goes beyond the constraints of face-to-face communication by creating a setting in which all parties may take part.

    1. 14.1.1. Quality Control# In order to make social media sites usable and interesting to users, they may ban different types of content such as advertisements, disinformation, or off-topic posts. Almost all social media sites (even the ones that claim “free speech”) block spam, mass-produced unsolicited messages, generally advertisements, scams, or trolling.

      This understanding of content moderation procedures provides an insightful look at the challenges involved in running virtual communities. It emphasizes how crucial it is to have customized moderation guidelines that reflect the unique beliefs and inclinations of a platform's user community in order to keep the platform interesting and pertinent for its target market.

    2. In order to make social media sites usable and interesting to users, they may ban different types of content such as advertisements, disinformation, or off-topic posts. Almost all social media sites (even the ones that claim “free speech”) block spam, mass-produced unsolicited messages, generally advertisements, scams, or trolling. Without quality control moderation, the social media site will likely fill up with content that the target users of the site don’t want, and those users will leave. What content is considered “quality” content will vary by site, with 4chan considering a lot of offensive and trolling content to be “quality” but still banning spam (because it would make the site repetitive in a boring way), while most sites would ban some offensive content.

      The diversity of online communities and the arbitrary nature of value in digital environments are reflected in the differences in what constitutes "quality" material across different websites. It's interesting to observe how content-moderation platforms such as 4chan, which are renowned for their uncomplicated approach, nevertheless enforce anti-spam policies, acknowledging that users will only tolerate so much repetition and mediocrity in content, even in settings that encourage controversial or offensive content.

    1. In 2019 the company Facebook (now called Meta) presented an internal study that found that Instagram was bad for the mental health of teenage girls, and yet they still allowed teenage girls to use Instagram. So, what does social media do to the mental health of teenage girls, and to all its other users? The answer is of course complicated and varies. Some have argued that Facebook’s own data is not as conclusive as you think about teens and mental health.

      Cosmetic surgeons have provided anecdotal evidence on the impact of picture editing tools on social media. This underscores the necessity of having a more comprehensive discussion about body image, self-esteem, and how the digital world shapes our views of beauty.

    2. In 2019 the company Facebook (now called Meta) presented an internal study that found that Instagram was bad for the mental health of teenage girls, and yet they still allowed teenage girls to use Instagram. So, what does social media do to the mental health of teenage girls, and to all its other users? The answer is of course complicated and varies. Some have argued that Facebook’s own data is not as conclusive as you think about teens and mental health. Many have anecdotal experiences with their own mental health and those they talk to. For example, cosmetic surgeons have seen how photo manipulation on social media has influenced people’s views of their appearance:

      The relationship between social media and the mental health of young females is complicated; research from Facebook suggests that there may be drawbacks. It's vital to evaluate the ways in which social media sites such as Instagram impact mental health and self-perception, arguing in favor of more open research and responsible usage policies.

    1. 12.3.2. Variations / Mutations# When content is replicated on social media, it may be modified. The Social media system might have built-in ways to do this, like a quote tweet or reply adding some sort of comment to the original post, effectively making a new version of the post that can spread around.

      Social media users may offer their own unique perspectives to ongoing conversations by editing and quoting information, which adds a creative and personalized element. This enhances communication and creates a lively atmosphere where concepts grow and disseminate in original and frequently surprising ways. It's interesting to see how these changes may occasionally offer information an entirely new interpretation or orientation, emphasizing how collaborative digital culture is.

    1. A meme is a piece of culture that might reproduce in an evolutionary fashion, like a hummable tune that someone hears and starts humming to themselves, perhaps changing it, and then others overhearing next. In this view, any piece of human culture can be considered a meme that is spreading (or failing to spread) according to evolutionary forces. So we can use an evolutionary perspective to consider the spread of

      Memes may be analyzed from the standpoint of evolution to show how cultural components change and adapt as a result of social transmission. Memes that connect with a large audience or blend in well with a particular culture spread more quickly, much like genes do. This method highlights the importance of adaptation and selection in the sphere of human culture and provides an intriguing perspective through which to view why particular jokes, trends, or concepts become viral.

    1. Individual analysis focuses on the behavior, bias, and responsibility an individual has, while systemic analysis focuses on the how organizations and rules may have their own behaviors, biases, and responsibility that aren’t necessarily connected to what any individual inside intends.

      Systemic analysis examines how larger institutions and norms influence behaviors and results, implying that institutional or social changes—rather than just individual actions—are frequently necessary to resolve complicated challenges.

    2. Individual analysis focuses on the behavior, bias, and responsibility an individual has, while systemic analysis focuses on the how organizations and rules may have their own behaviors, biases, and responsibility that aren’t necessarily connected to what any individual inside intends.

      Human analysis highlights the influence of human choices on results, emphasizing personal accountability and the inherent biases of individuals. By recognizing that organizational policies and societal norms can influence behavior and outcomes independently of individual intentions, systemic analysis, on the other hand, sheds light on the larger structural and institutional frameworks. This emphasizes the significance of examining both layers for a comprehensive understanding of issues.

    1. When social media platforms show users a series of posts, updates, friend suggestions, ads, or anything really, they have to use some method of determining which things to show users. The method of determining what is shown to users is called a recommendation algorithm, which is an algorithm (a series of steps or rules, such as in a computer program) that recommends posts for users to see, people for users to follow, ads for users to view, or reminders for users.

      By selecting information that corresponds with personal tastes, recommendation algorithms improve user experience and make social media platforms more customized and engaging. Users' online interactions and information exposure may be enhanced by this focused strategy, which can assist users in finding new material and connections that they might otherwise overlook.

    2. When social media platforms show users a series of posts, updates, friend suggestions, ads, or anything really, they have to use some method of determining which things to show users. The method of determining what is shown to users is called a recommendation algorithm, which is an algorithm (a series of steps or rules, such as in a computer program) that recommends posts for users to see, people for users to follow, ads for users to view, or reminders for users.

      Because they prioritize interaction above quality, recommendation algorithms have a big impact on how we interact with social media by customizing the material we view. However, they also run the danger of propagating misinformation and echo chambers. There are worries about manipulation and privacy because it is opaque how these algorithms operate and use our data. It is imperative that users and developers evaluate these algorithms thoroughly and take steps to mitigate the wider effects they have on public discourse and information consumption.

    1. If a building only has staircases to get up to the second floor (it was built assuming everyone could walk up stairs), then someone who cannot get up stairs has a disability in that situation.

      This illustration emphasizes how crucial inclusive design is to architecture. The structure only has staircases, which means that anyone who are unable to utilize them are excluded, illustrating how environmental obstacles may lead to disability. This circumstance emphasizes the requirement

    1. Hacking attempts can be made on individuals, whether because the individual is the goal target, or because the individual works at a company which is the target. Hackers can target individuals with attacks like:

      The fact that people might be the target of hacking efforts owing to their associations with specific corporations as well as their personal significance is concerning. This emphasizes how crucial it is to maintain good digital hygiene, which includes using strong, one-of-a-kind passwords and exercising caution when sharing personal information online. Gaining knowledge about the different types of cyberattacks helps us defend our networks and digital identities more effectively.

    1. For example, a social media application might offer us a way of “Private Messaging” (also called Direct Messaging) with another user. But in most cases those “private” messages are stored in the computers at those companies, and the company might have computer programs that automatically search through the messages, and people with the right permissions might be able to view them directly.

      It's crucial to understand that because of these platforms' possible storage and review policies, the word "private" could not completely ensure the privacy of our discussions. Knowing this makes one more careful about sharing information in these kinds of messages, especially private or sensitive information.

  3. Jan 2024
    1. In order to test out data mining on Twitter, we are going to use a Natural Language Processing library, which gives us functions to work with langauge data such as sentences, words, etc.

      In NLP applications, maintaining accuracy and managing linguistic complexity (such as sarcasm, idioms, or changing contexts) may be difficult.

    1. 8.3.1. Spurious Correlations# One thing to note in the above case of candle reviews and COVID is that just because something appears to be correlated, doesn’t mean that it is connected in the way it looks like. In the above, the correlation might be due mostly to people buying and reviewing candles in the fall, and diseases, like COVID, spreading most during the fall. It turns out that if you look at a lot of data, it is easy to discover spurious correlations where two things look like they are related, but actually aren’t. Instead, the appearance of being related may be due to chance or some other cause. For example:

      It is crucial to realize this and a great lesson to remember when engaging in data mining and analysis. More careful research is needed to draw further conclusions about correlation. Simply looking at a graph does not provide us with definitive conclusions.