40 Matching Annotations
  1. Mar 2024
    1. As a social media user, we hope you are informed about things like: how social media works, how they influence your emotions and mental state, how your data gets used or abused, strategies in how people use social media, and how harassment and spam bots operate. We hope with this you can be a more informed user of social media, better able to participate, protect yourself, and make it a valuable experience for you and others you interact with. For example, you can hopefully recognize when someone is intentionally posting something bad or offensive (like the bad cooking videos we mentioned in the Virality chapter, or an intentionally offensive statement) in an attempt to get people to respond and spread their content. Then you can decide how you want to engage (if at all) given how they are trying to spread their content.

      As enthusiastic users of social media, it's imperative that we thoroughly understand the complex dynamics of these platforms. Comprehending the underlying principles of social media, their effects on our emotional and psychological health, the risks associated with the mishandling of our private information, tactics used by users, and the presence of harassment and spam bots is vital for our effective and conscientious engagement in these online environments.

    1. In Plato’s Phaedrus (~370BCE), Socrates tells (or makes up1) a story from Egypt critical of the invention of writing: Now in those days the god Thamus was the king of the whole country of Egypt, […] [then] came Theuth and showed his inventions, desiring that the other Egyptians might be allowed to have the benefit of them; […] [W]hen they came to letters, This, said Theuth, will make the Egyptians wiser and give them better memories; it is a specific both for the memory and for the wit. Thamus replied: […] this discovery of yours will create forgetfulness in the learners’ souls, because they will not use their memories; they will trust to the external written characters and not remember of themselves. The specific which you have discovered is an aid not to memory, but to reminiscence, and you give your disciples not truth, but only the semblance of truth; they will be hearers of many things and will have learned nothing; they will appear to be omniscient and will generally know nothing; they will be tiresome company, having the show of wisdom without the reality.

      This age-old discussion underscores a perennial issue: the unexpected moral and societal effects of technological progress. It underscores the essential need to contemplate the wider repercussions of our developments, resonating with a topic that continues to be pertinent in our current technology-oriented world.

    1. Most programming languages are based in English, and there are very few non-English programming languages, and those that exist are rarely used. The reason few non-English programming languages exist is due to the network effect, which we mentioned last chapter. Once English became the standard language for programming, people who learn programming learn English (or enough to program with it). Attempts to create a non-English programming language face an uphill battle, since even those that know that language would still have to re-learn all their programming terms in the non-English language. Now, since many people do speak other languages, you can often find comments, variable names, and even sometimes coding libraries which use non-English languages, but the core coding terms (e.g., for, if, etc.), are still almost always in English. See also this academic paper: Non-Native English Speakers Learning Computer Programming: Barriers, Desires, and Design Opportunities

      The term "colonialism in programming" may describe scenarios where the cultural aspects of users are overlooked in the software development lifecycle. This oversight could perpetuate a kind of cultural dominance, as it results in software that fails to respect diverse languages, cultural practices, or user experiences.

    1. The tech industry is full of colonialist thinking and practices, some more subtle than others. To begin with, much of the tech industry is centralized geographically, specifically in Silicon Valley, San Francisco, California. The leaders and decisions in how tech operates come out of this one wealthy location in a wealthy nation. Then, much of tech is dependent on exploiting cheap labor, often in dangerous conditions, in other countries (thus extracting the resource of cheap labor, from places with “inferior” governments and economies). This labor might be physical labor, or dealing with dangerous chemicals, or the content moderators who deal with viewing horrific online content. Tech industry leaders in Silicon Valley then take what they made with exploited labor, and sell it around the world, feeling good about themselves, believing they are benefitting the world with their “superior” products.

      From what I comprehend, a significant part of the tech industry hinges on utilizing inexpensive labor from abroad, frequently in conditions that are risky or morally questionable. It appears to me that this often entails exploiting the lax regulatory environments and weaker economic states in these regions. The nature of the tasks involved can be quite diverse.

    1. When Facebook started, there were already other social media platforms in use that Facebook had to compete against, but Facebook became dominant. Since then other companies have tried to compete with Facebook, with different levels of success. Google+ tried to mimic much of what Facebook did, but it got little use and never took off (not enough people to benefit from the network effect). Other social media sites have used more unique features to distinguish themselves from Facebook and get a foothold, such as Twitter with its character limit (forcing short messages, so you can see lots of posts in quick succession), Vine and then TikTok based on short videos, etc. Mastodon (Fediverse set of connected social media platforms that it is part of) has a different way of distinguishing itself as a social media network, in that it is an open-source, community-funded social media network (no ads), and hopes people will join to get away from corporate control. Other social media networks have focused on parts of the world where Facebook was less dominant, and so they got a foothold there first, and then spread, like the social media platforms in China (e.g., Sina Weibo, QQ, and TikTok).

      It's intriguing to observe how Facebook, which was a market leader in the early 2010s, has now declined significantly in popularity and even garnered disdain from numerous users. Presently, on the app store, its rating stands at a mere 2.2 out of 5 stars, based on more than 1.6 million reviews.

    1. Meta’s way of making profits fits in a category called Surveillance Capitalism. Surveillance capitalism began when internet companies started tracking user behavior data to make their sites more personally tailored to users. These companies realized that this data was something that they could profit from, so they began to collect more data than strictly necessary (“behavioral surplus”) and see what more they could predict about users. Companies could then sell this data about users directly, or (more commonly), they could keep their data hidden, but use it to sell targeted advertisements. So, for example, Meta might let an advertiser say they want an ad to only go to people likely to be pregnant. Or they might let advertizes make ads go only to “Jew Haters” (which is ethically very bad, and something Meta allowed).

      This explanation of surveillance capitalism sheds light on the intrusive strategies employed by companies such as Meta to engage in targeted advertising and data harvesting. It underscores the ethical implications of these practices and illustrates the extent to which individual freedom and privacy are compromised for commercial gain.

  2. Feb 2024
    1. Another way of considering public shaming is as schadenfreude, meaning the enjoyment obtained from the troubles of others. A 2009 satirical article from the parody news site The Onion satirizes public shaming as being for objectifying celebrities and being entertained by their misfortune: Media experts have been warning for months that American consumers will face starvation if Hollywood does not provide someone for them to put on a pedestal, worship, envy, download sex tapes of, and then topple and completely destroy. Nation Demands Fresh Celebrity Meat - The Onion

      I think it is frequently connected with horrible qualities like envy and harshness, Fun at others' expense may likewise epitomize a sensation of decency or equilibrium when those considered meriting face misfortune. Likewise with any inclination, Fun at others' expense doesn't have inborn moral characteristics; it's only one component of the wide cluster of human close to home encounters. Its ethical importance generally pivots upon the conditions of its event and the manner in which it shapes activities and reactions.

    1. While public criticism and shaming have always been a part of human culture, the Internet and social media have created new ways of doing so. We’ve seen examples of this before with Justine Sacco and with crowd harassment (particularly dogpiling). For an example of public shaming, we can look at late-night TV host Jimmy Kimmel’s annual Halloween prank, where he has parents film their children as they tell the parents tell the children that the parents ate all the kids’ Halloween candy. Parents post these videos online, where viewers are intended to laugh at the distress, despair, and sense of betrayal the children express. I will not link to these videos which I find horrible, but instead link you to these articles: Jimmy Kimmel’s Halloween prank can scar children. Why are we laughing? (archived copy) Jimmy Kimmel’s Halloween Candy Prank: Harmful Parenting? We can also consider events in the #MeToo movement as at least in part public shaming of sexual harassers (but also of course solidarity and organizing of victims of sexual harassment, and pushes for larger political, organizational, and social changes).

      I believe it's essential to delve into the phenomenon of "cancel culture" and public shaming because of their profound impact on social justice, ethical conduct, personal welfare, and the dynamics within digital communities. Understanding and addressing these phenomena require a thorough examination of their various repercussions and the development of compassionate and equitable solutions.

    1. You might remember from Chapter 14 that social contracts, whether literal or metaphorical, involve groups of people all accepting limits to their freedoms. Because of this, some philosophers say that a state or nation is, fundamentally, violent. Violence in this case refers to the way that individual Natural Rights and freedoms are violated by external social constraints. This kind of violence is considered to be legitimated by the agreement to the social contract. This might be easier to understand if you imagine a medical scenario. Say you have broken a bone and you are in pain. A doctor might say that the bone needs to be set; this will be painful, and kind of a forceful, “violent” action in which someone is interfering with your body in a painful way. So the doctor asks if you agree to let her set the bone. You agree, and so the doctor’s action is construed as being a legitimate interference with your body and your freedom. If someone randomly just walked up to you and started pulling at the injured limb, this unagreed violence would not be considered legitimate. Likewise, when medical practitioners interfere with a patient’s body in a way that is non-consensual or not what the patient agreed to, then the violence is considered illegitimate, or morally bad. We tend to think of violence as being another “normatively loaded” word, like authenticity. But where authenticity is usually loaded with a positive connotation–on the whole, people often value authenticity as a good thing–violence is loaded with a negative connotation. Yes, the doctor setting the bone is violent and invasive, but we don’t usually call this “violence” because it is considered to be a legitimate exercise of violence. Instead, we reserve the term “violence” mostly for describing forms of interference that we consider to be morally bad.

      The significance of consent as a cornerstone in ethical decision-making is fascinating. This principle underlines the necessity of consent and mutual agreement across different facets of life, such as in academic partnerships and research endeavors.

    1. Individual harassment (one individual harassing another individual) has always been part of human cultures, bur social media provides new methods of doing so. There are many methods by which through social media. This can be done privately through things like: Bullying: like sending mean messages through DMs Cyberstalking: Continually finding the account of someone, and creating new accounts to continue following them. Or possibly researching the person’s physical location. Hacking: Hacking into an account or device to discover secrets, or make threats. Tracking: An abuser might track the social media use of their partner or child to prevent them from making outside friends. They may even install spy software on their victim’s phone. Death threats / rape threats Etc. Individual harassment can also be done publicly before an audience (such as classmates or family). For example: Bullying: like posting public mean messages Impersonation: Making an account that appears to be from someone and having that account say things to embarrass or endanger the victim. Doxing: Publicly posting identifying information about someone (e.g., full name, address, phone number, etc.). Revenge porn / deep-fake porn Etc.

      It's important to acknowledge that social media platforms can amplify harassment, making it more invasive and with consequences that can extend far and wide. Although harassment is not a new concept and has been part of human interactions for a long time, these digital spaces offer novel ways for it to manifest.

    1. Sometimes even well-intentioned efforts can do significant harm. For example, in the immediate aftermath of the 2013 Boston Marathon bombing, FBI released a security photo of one of the bombers and asked for tips. A group of Reddit users decided to try to identify the bomber(s) themselves. They quickly settled on a missing man (Sunil Tripathi) as the culprit (it turned out had died by suicide and was in no way related to the case), and flooded the Facebook page set up to search for Sunil Tripathi, causing his family unnecessary pain and difficulty. The person who set up the “Find Boston Bomber” Reddit board said “It Was a Disaster” but “Incredible”, and Reddit apologized for online Boston ‘witch hunt’.

      I believe that when individuals collaborate to achieve goals, such as locating the subjects of a proposal to extend good wishes and share photos, the power of crowdsourcing can be harnessed effectively. Yet, the possibility of internet trolls causing disruption and the infringement on the couple's privacy cannot be ignored. On a personal note, the uncertainties associated with crowdsourcing lead me to view it as a double-edged sword, making me hesitant to fully embrace it.

    1. When tasks are done through large groups of people making relatively small contributions, this is called crowdsourcing. The people making the contributions generally come from a crowd of people that aren’t necessarily tied to the task (e.g., all internet users can edit Wikipedia), but then people from the crowd either get chosen to participate, or volunteer themselves. When a crowd is providing financial contributions, that is called crowdfunding (e.g., patreon, kickstarter, gofundme). Humans have always collaborated on tasks, and crowds have been enlisted in performing tasks long before the internet existed. What social media (and other internet systems) have done is expand the options for how people can collaborate on tasks.

      The idea of crowdsourcing and crowdfunding deeply intrigues me as they represent the modern evolution of collective human effort. They showcase the transformative power of the internet in enabling connections and contributions towards shared goals. The notion that individuals from across the world, many of whom have never met face-to-face, can collaborate to enhance an article on Wikipedia or finance an innovative project on Kickstarter is profoundly impactful. These practices democratize creation and innovation, eliminating traditional geographical and social hurdles. As an observer and participant in these movements, I view them as reflections of our collective intelligence and the generous nature of the human spirit. However, they also present challenges, such as maintaining quality and navigating the complexities of varied opinions.

    1. 15.1. Types of Content Moderator Set-Ups# There are a number of different types of content moderators and ways of organizing them, such as: 15.1.1. No Moderators# Some systems have no moderators. For example, a personal website that can only be edited by the owner of the website doesn’t need any moderator set up (besides the person who makes their website). If a website does let others contribute in some way, and is small, no one may be checking and moderating it. But as soon as the wrong people (or spam bots) discover it, it can get flooded with spam, or have illegal content put up (which could put the owner of the site in legal jeopardy). 15.1.2. Untrained Staff# If you are running your own site and suddenly realize you have a moderation problem you might have some of your current staff (possibly just yourself) start handling moderation. As moderation is a very complicated and tricky thing to do effectively, untrained moderators are likely to make decisions they (or other users) regret. 15.1.3. Dedicated Moderation Teams# After a company starts working on moderation, they might decide to invest in teams specifically dedicated to content moderation. These teams of content moderators could be considered human computers hired to evaluate examples against the content moderation policy of the platform they are working for. 15.1.4. Individuals moderating their own spaces# You can also have people moderate their own spaces. For example: when you text on the phone, you are in charge of blocking numbers if you want to (though the phone company might warn you of potential spam or scams) When you make posts on Facebook or upload videos to YouTube, you can delete comments and replies Also in some of these systems, you can allow friends access to your spaces to let them help you moderate them. 15.1.5. Volunteer Moderation# Letting individuals moderate their own spaces is expecting individuals to put in their own time and labor. You can do the same thing with larger groups and have volunteers moderate them. Reddit does something similar where subreddits are moderated by volunteers, and Wikipedia moderators (and editors) are also volunteers. 15.1.6. Automated Moderators (bots)# Another strategy for content moderation is using bots, that is computer programs that look through posts or other content and try to automatically detect problems. These bots might remove content, or they might flag things for human moderators to review.

      Platform owners must acknowledge the significance of implementing basic moderation measures or automated filters to protect the user experience, preserve the platform's integrity, and uphold legal standards. Taking a proactive approach in this regard contributes to establishing a safer and more trustworthy online environment for both users and the platform owner.

    1. Wikipedia is an online encyclopedia that is crowdsourced by volunteer editors. You can go right now and change a Wikipedia page’s content if you want (as long as the page isn’t locked)! You can edit anonymously, or you can create an account. The Wikipedia community gives some editors administrator access, so they can perform more moderation tasks like blocking users or locking pages. Editors and administrators are generally not, paid, though they can be paid by other groups if they disclose and fill out forms Wikipedia exists in multiple languages (each governed somewhat independently). When looking at the demographics of who writes the English Wikipedia articles, editors of Wikipedia skew heavily male (around 80% or 90%), and presumably administrators skew heavily male as well. This can produce bias in how things are moderated. For example, Donna Strickland had no Wikipedia page before her Nobel. Her male collaborator did:

      I believe there are both advantages and disadvantages to Wikipedia's policy of allowing users to contribute to its content. On one hand, the accessibility of editing increases the potential for misinformation to spread, potentially diminishing the site's reliability as a resource. However, on the other hand, when misinformation is added to a page, individuals with real-life expertise or knowledge on the topic can intervene, correct inaccuracies, and provide genuine and trustworthy additional resources for deeper understanding.

    1. In order to make social media sites usable and interesting to users, they may ban different types of content such as advertisements, disinformation, or off-topic posts. Almost all social media sites (even the ones that claim “free speech”) block spam, mass-produced unsolicited messages, generally advertisements, scams, or trolling. Without quality control moderation, the social media site will likely fill up with content that the target users of the site don’t want, and those users will leave. What content is considered “quality” content will vary by site, with 4chan considering a lot of offensive and trolling content to be “quality” but still banning spam (because it would make the site repetitive in a boring way), while most sites would ban some offensive content.

      In my opinion, effectively moderating content on social media platforms is vital for fostering a positive user experience. Although some platforms advocate for "free speech," it's imperative to filter out content such as advertisements, disinformation, and spam to uphold an environment that is engaging and trustworthy for users.

    1. One concept that comes up in a lot of different ethical frameworks is moderation. Famously, Confucian thinkers prized moderation as a sound principle for living, or as a virtue, and taught the value of the ‘golden mean’, or finding a balanced, moderate state between extremes. This golden mean idea got picked up by Aristotle—we might even say ripped off by Aristotle—as he framed each virtue as a medial state between two extremes. You could be cowardly at one extreme, or brash and reckless at the other; in the golden middle is courage. You could be miserly and penny-pinching, or you could be a reckless spender, but the aim is to find a healthy balance between those two. Moderation, or being moderate, is something that is valued in many ethical frameworks, not because it comes naturally to us, per se, but because it is an important part of how we form groups and come to trust each other for our shared survival and flourishing.

      I believe we've been veering off course from this overarching concept. Our present society seems to promote embracing one extreme viewpoint or another on any topic we discuss, be it politics, education, employment, or any other subject. Extremism is increasingly prevalent, partly due to the influence of social media.

    1. While there are healthy ways of sharing difficult emotions and experiences (see the next section), when these difficult emotions and experiences are thrown at unsuspecting and unwilling audiences, that is called trauma dumping. Social media can make trauma dumping easier. For example, with parasocial relationships, you might feel like the celebrity is your friend who wants to hear your trauma. And with context collapse, where audiences are combined, how would you share your trauma with an appropriate audience and not an inappropriate one (e.g., if you re-post something and talk about how it reminds you of your trauma, are you dumping it on the original poster?). Trauma dumping can be bad for the mental health of those who have this trauma unexpectedly thrown at them, and it also often isn’t helpful for the person doing the trauma dumping either: Venting, by contrast, is a healthy form of expressing negative emotion, such as anger and frustration, in order to move past it and find solutions. Venting is done with the permission of the listener and is a one-shot deal, not a recurring retelling or rumination of negativity. A good vent allows the venter to get a new perspective and relieve pent-up stress and emotion. While there are benefits to venting, there are no benefits to trauma dumping. In trauma dumping, the person oversharing doesn’t take responsibility or show self-reflection. Trauma dumping is delivered on the unsuspecting. The purpose is to generate sympathy and attention not to process negative emotion. The dumper doesn’t want to overcome their trauma; if they did, they would be deprived of the ability to trauma dump. How to Overcome Social Media Trauma Dumping

      It's crucial to distinguish between venting and trauma dumping to uphold respect for others' boundaries and mental health. Venting, when done with consent, can serve as a constructive outlet for expressing negative emotions. In contrast, trauma dumping can be detrimental as it ignores emotional boundaries and lacks a sincere intention for resolution.

    1. “If [social media] was just bad, I’d just tell all the kids to throw their phone in the ocean, and it’d be really easy. The problem is it - we are hyper-connected, and we’re lonely. We’re overstimulated, and we’re numb. We’re expressing our self, and we’re objectifying ourselves. So I think it just sort of widens and deepens the experiences of what kids are going through. But in regards to social anxiety, social anxiety - there’s a part of social anxiety I think that feels like you’re a little bit disassociated from yourself. And it’s sort of like you’re in a situation, but you’re also floating above yourself, watching yourself in that situation, judging it. And social media literally is that. You know, it forces kids to not just live their experience but be nostalgic for their experience while they’re living it, watch people watch them, watch people watch them watch them. My sort of impulse is like when the 13 year olds of today grow up to be social scientists, I’ll be very curious to hear what they have to say about it. But until then, it just feels like we just need to gather the data.”

      Indeed, social media yields a dual impact on our lives, comprising both favorable and unfavorable consequences. On one hand, it serves as a conduit for global connectivity, fostering relationships across geographical boundaries. Conversely, it often instigates feelings of isolation and excessive mental stimulation. This paragraph underscores the exacerbating effect of social media on the existing challenges confronting youngsters. Acknowledging these hurdles is crucial, prompting efforts to navigate a harmonious equilibrium in our technological engagement.

    1. The online community activity of copying and remixing can be a means of cultural appropriation, which is when one cultural group adopts something from another culture in an unfair or disrespectful way (as opposed to a fair, respectful cultural exchange). For example, many phrases from Black American culture have been appropriated by white Americans and had their meanings changed or altered (like “woke”, “cancel”, “shade”, “sip/spill the tea”, etc.). Additionally, white Americans often use images and gifs of Black people reacting and expressing emotions. This modern practice with gifs has been compared to the earlier (and racist) art forms of blackface, where white actors would paint their faces black and then act in exaggerated unintelligent ways.

      I wish metadata about the post was more evident. On account of reposting images, it would be more straightforward to recognize an image that doesn't start from the client on the off chance that the virtual entertainment stage incorporated that the photograph posted was really a screen capture. I likewise feel that it is generally moral to ascribe unique substance maker assuming one who is remixing is or has plans to benefit off of the remixed content; however, this can be hard to watch.

    1. For social media content, replication means that the content (or a copy or modified version) gets seen by more people. Additionally, when a modified version gets distributed, future replications of that version will include the modification (a.k.a., inheritance). There are ways of duplicating that are built into social media platforms: Actions such as: liking, reposting, replying, and paid promotion get the original posting to show up for users more Actions like quote tweeting, or the TikTok Duet feature let people see the original content, but modified with new context. Social media sites also provide ways of embedding posts in other places, like in news articles There are also ways of replicating social media content that aren’t directly built into the social media platform, such as: copying images or text and reposting them yourself taking screenshots, and cross-posting to different sites

      It is such a ton simpler to become famous online today than in the past due to how much the web and virtual entertainment has created. The way web-based entertainment applications are made will be made for individuals all over the planet to associate and share their data. From this, everyone can glance through every others post and like or offer them, making these posts circulate around the web.

    1. One concern with how recommendation algorithms is that they can create filter bubbles (or “epistemic bubbles” or “echo chambers”), where people get filtered into groups and the recommendation algorithm only gives people content that reinforces and doesn’t challenge their interests or beliefs. These echo chambers allow people in the groups to freely have conversations among themselves without external challenge. The filter bubbles can be good or bad, such as forming bubbles for: Hate groups, where people’s hate and fear of others gets reinforced and never challenged Fan communities, where people’s appreciation of an artist, work of art, or something is assumed, and then reinforced and never challenged Marginalized communities can find safe spaces where they aren’t constantly challenged or harassed (e.g., a safe space)

      Albeit this nature of web-based entertainment calculations encourages local area in a valuable way to clients, the similarly viable capacity of this innovation to multiply despise gatherings and hurtful way of talking renders it morally questionable. I'm interested concerning what degree calculations have become characteristic for the idea of virtual entertainment itself, and despite the fact that it existed before the presentation of algorithmically suggested content, I keep thinking about whether given they are hypothetically considered excessively socially perilous to proceed, on the off chance that web-based entertainment could exist without them given the manner in which it as of now works.

    1. When social media platforms show users a series of posts, updates, friend suggestions, ads, or anything really, they have to use some method of determining which things to show users. The method of determining what is shown to users is called a recommendation algorithm, which is an algorithm (a series of steps or rules, such as in a computer program) that recommends posts for users to see, people for users to follow, ads for users to view, or reminders for users. Some recommendation algorithms can be simple such as reverse chronological order, meaning it shows users the latest posts (like how blogs work, or Twitter’s “See latest tweets” option). They can also be very complicated taking into account many factors, such as: Time since posting (e.g., show newer posts, or remind me of posts that were made 5 years ago today) Whether the post was made or liked by my friends or people I’m following How much this post has been liked, interacted with, or hovered over Which other posts I’ve been liking, interacting with, or hovering over What people connected to me or similar to me have been liking, interacting with, or hovering over What people near you have been liking, interacting with, or hovering over (they can find your approximate location, like your city, from your internet IP address, and they may know even more precisely) This perhaps explains why sometimes when you talk about something out loud it gets recommended to you (because someone around you then searched for it). Or maybe they are actually recording what you are saying and recommending based on that. Phone numbers or email addresses (sometimes collected deceptively) can be used to suggest friends or contacts. And probably many more factors as well!

      The specifics of how social media platforms select content for users are discussed in the sentences. The explanation explains that when clients connect with web-based entertainment stages, they experience different substance, including posts, companion ideas, and promotions. To arrange and introduce this substance, stages utilize proposal calculations, which are characterized as calculations intended to recommend posts, individuals to follow, promotions, or suggestions to clients. This explanation clarifies the job of suggestion calculations in forming clients' encounters via online entertainment stages and features their capability in satisfied curation and client commitment.

    1. Some users might not be able to see images on websites for a variety of reasons. The user might be blind or low-vision. Their device or internet connection might not support images. Or perhaps all the images got deleted (like what happened to The Onion). In order for these users to still get the information intended from the images, the image can come with alt-text. You can read more about alt-text in this New York Times feature Reddit unfortunately doesn’t allow alt-text for their images. So while we were going to have a programming demo here to look up the alt-text, there is no alt-text on images uploaded to Reddit to look up, meaning this site is unfriendly to blind or low-vision users.

      I've recently discovered alt text and find it to be a fantastic innovation. I've also observed an increasing number of Tumblr users incorporating alt text into their posts. Given the prevalence of technology and the internet in our lives, whether for education, employment, or leisure, it's crucial that everyone is included and considered.

    1. If a building only has staircases to get up to the second floor (it was built assuming everyone could walk up stairs), then someone who cannot get up stairs has a disability in that situation. If a physical picture book was made with the assumption that people would be able to see the pictures, then someone who cannot see has a disability in that situation. If tall grocery store shelves were made with the assumption that people would be able to reach them, then people who are short, or who can’t lift their arms up, or who can’t stand up, all would have a disability in that situation. If an airplane seat was designed with little leg room, assuming people’s legs wouldn’t be too long, then someone who is very tall, or who has difficulty bending their legs would have a disability in that situation.

      As a person without disabilities, understanding life with a disability can be difficult. However, this paragraph skillfully employs everyday examples to foster empathy and help me grasp the perspectives of individuals with disabilities. It has heightened my awareness of the various facets of daily life that may not be accessible to everyone.

    1. While we have our concerns about the privacy of our information, we often share it with social media platforms under the understanding that they will hold that information securely. But social media companies often fail at keeping our information secure. For example, the proper security practice for storing user passwords is to use a special individual encryption process for each individual password. This way the database can only confirm that a password was the right one, but it can’t independently look up what the password is or even tell if two people used the same password. Therefore if someone had access to the database, the only way to figure out the right password is to use “brute force,” that is, keep guessing passwords until they guess the right one (and each guess takes a lot of time).

      The discussions regarding safeguarding personal information on social media platforms and within the broader digital landscape are not only intriguing but also highly relevant. The narrative highlights events like the Facebook data breach, illustrating the widespread impact of such incidents on millions of individuals and underscoring the magnitude of personal data compromises. Given the ubiquity of digital services in today's society, concerns about data security have become pervasive. Furthermore, the intricate task of upholding robust digital security in the presence of evolving threats presents a substantial challenge for organizations.

    1. There are many reasons, both good and bad, that we might want to keep information private. There might be some things that we just feel like aren’t for public sharing (like how most people wear clothes in public, hiding portions of their bodies) We might want to discuss something privately, avoiding embarrassment that might happen if it were shared publicly We might want a conversation or action that happens in one context not to be shared in another (context collapse) We might want to avoid the consequences of something we’ve done (whether ethically good or bad), so we keep the action or our identity private We might have done or said something we want to be forgotten or make at least made less prominent We might want to prevent people from stealing our identities or accounts, so we keep information (like passwords) private We might want to avoid physical danger from a stalker, so we might keep our location private We might not want to be surveilled by a company or government that could use our actions or words against us (whether what we did was ethically good or bad) When we use social media platforms though, we at least partially give up some of our privacy. For example, a social media application might offer us a way of “Private Messaging” (also called Direct Messaging) with another user. But in most cases those “private” messages are stored in the computers at those companies, and the company might have computer programs that automatically search through the messages, and people with the right permissions might be able to view them directly. In some cases we might want a social media company to be able to see our “private” messages, such as if someone was sending us death threats. We might want to report that user to the social media company for a ban, or to law enforcement (though many people have found law enforcement to be not helpful), and we want to open access to those “private” messages to prove that they were sent.

      The privacy section exposes the paradox of desiring privacy while engaging with digital platforms, underscoring the ethical obligations of social media companies. It underscores the necessity for striking a balance between safeguarding user privacy and ensuring platform security, emphasizing the crucial role of regulations in preventing unwarranted surveillance. This encourages a reevaluation of our expectations and norms regarding privacy in light of technological progress, advocating for a more discerning stance on digital privacy.

  3. Jan 2024
    1. People in the antiwork subreddit found the website where Kellogg’s posted their job listing to replace the workers. So those Redditors suggested they spam the site with fake applications, poisoning the job application data, so Kellogg’s wouldn’t be able to figure out which applications were legitimate or not (we could consider this a form of trolling). Then Kellogg’s wouldn’t be able to replace the striking workers, and they would have to agree to better working conditions.

      I find this to be an interesting and significant form of data activism. A programmer, recognizing the struggle of workers seeking better conditions, developed a bot to disrupt hiring processes and secure raises. However, I also see the downside, as legitimate job seekers willing to accept Kellogg's offered wages may now face challenges in securing employment due to the interference caused by the bot.

    1. One thing to note in the above case of candle reviews and COVID is that just because something appears to be correlated, doesn’t mean that it is connected in the way it looks like. In the above, the correlation might be due mostly to people buying and reviewing candles in the fall, and diseases, like COVID, spreading most during the fall.

      Spurious correlation refers to the deceptive appearance of a statistical connection between two variables, when in reality, it stems from chance or the influence of a third variable. Despite the visual similarity in their graphs, there is no causal relationship between them. An illustrative instance involves the spurious correlation observed between ice cream sales and crime rates during summer. In this scenario, the common factor is temperature, as elevated temperatures prompt both increased ice cream sales and heightened agitation among individuals, potentially contributing to a rise in crime rates.

    1. Ask anyone who has dealt with persistent harassment online, especially women: [trolls stopping because they are ignored] is not usually what happens. Instead, the harasser keeps pushing and pushing to get the reaction they want with even more tenacity and intensity. It’s the same pattern on display in the litany of abusers and stalkers, both online and off, who escalate to more dangerous and threatening behavior when they feel like they are being ignored.

      Addressing this question is quite challenging. On one side, ignoring the troll might result in them losing interest, especially if their trolling is driven by the immediate satisfaction of causing annoyance or disruption. However, if the troll is persistent and aims to disrupt your activities, there's a risk that their tactics could evolve. This evolution may involve more sophisticated trolling methods or even the acquisition of personal information that could pose a physical threat.

    1. One set of the early Internet-based video games were Multi-User Dungeons (MUDs), where you were given a text description of where you were and could say where to go (North, South, East, West) and text would tell you where you were next. In these games, you would come across other players and could type messages or commands to attack them. These were the precursors to more modern Massively multiplayer online role-playing games (MMORPGS). In these MUDs, players developed activities that we now consider trolling, such as “Griefing” where one player intentionally causes another player “grief” or distress (such as a powerful player finding a weak player and repeatedly killing the weak player the instant they respawn), and “Flaming” where a player intentionally starts a hostile or offensive conversation.

      Exploring the roots of trolling behavior, especially its progression from early internet message boards and multiplayer games such as MUDs, is intriguing. The idea of seasoned users trolling newcomers to establish dominance provides insights into the psychology of online interactions. It serves as a reminder of the evolving nature of online culture and behavior. Additionally, it underscores the importance of adopting a more considerate and empathetic approach to online communication.

    1. As an example of the ethically complicated nature of parasocial relationships, let’s consider the case of Fred Rogers, who hosted a children’s television program from 1968 to 2001. In his television program, Mr. Rogers wanted all children to feel cared for and loved. To do this, he intentionally fostered a parasocial relationship with the children in his audience (he called them his “television friends”): I give an expression of care every day to each child, to help him realize that he is unique. I end the program by saying, “You’ve made this day a special day, by just your being you. There’s no person in the whole world like you, and I like you, just the way you are.”

      Mr. Rogers' case highlights the complexities of parasocial relationships, particularly in the realm of children's television. Although his aim was to offer comfort and encouragement to young audiences, ethical concerns arise regarding the boundaries and consequences of such connections. While his messages of care and acceptance had a heartwarming and likely positive influence on numerous children, it is essential to consider the potential blending of reality and screen content. This blending could give rise to unrealistic expectations or attachments among viewers.

    1. Since we have different personas and ways of behaving in different groups of people, what happens if different groups of people are observing you at the same time? For example, someone might not know how to behave if they were at a restaurant with their friends and they noticed that their parents were seated at the table next to them. This is phenomenon is called “context collapse.” On social media, context collapse is a common concern, since on a social networking site you might be connected to very different people (family, different groups of friends, co-workers, etc.). Additionally, something that was shared within one context (like a private message), might get reposted in another context (publicly posted elsewhere).

      Navigating the diverse social norms and expectations of various groups can result in confusion and discomfort. Social media frequently presents the challenge of context collapse, as our connections encompass a broad spectrum of individuals, including family, friends, co-workers, and others.

    1. As we talked about previously in a section of Chapter 2 (What is Social Media?), pretty much anything can count as social media, and the things we will see in internet-based social media show up in many other places as well. The book Writing on the Wall: Social Media - The First 2,000 Years by Tom Standage outlines some of the history of social media before internet-based social media platforms such as in times before the printing press: Graffiti and other notes left on walls were used for sharing updates, spreading rumors, and tracking accounts Books and news write-ups had to be copied by hand, so that only the most desired books went “viral” and spread Later, sometime after the printing press, Stondage highlights how there was an unusual period in American history that roughly took up the 1900s where, in America, news sources were centralized in certain newspapers and then the big 3 TV networks. In this period of time, these sources were roughly in agreement and broadcast news out to the country, making a more unified, consistent news environment (though, of course, we can point out how they were biased in ways like being almost exclusively white men). Before this centralization of media in the 1900s, newspapers and pamphlets were full of rumors and conspiracy theories. And now as the internet and social media have taken off in the early 2000s, we are again in a world full of rumors and conspiracy theories.

      In general, this text adeptly illustrates the shifts in information dissemination and their influence on how the public accesses information. Each era presents distinctive challenges, ranging from the uncontrolled spread of information in the early newspaper era to the centralized reporting of the 20th century, and finally, to the boundless expansion of the Internet and social media in the present day. These transformations underscore the continuous tension between facilitating the free flow of information and ensuring journalistic accuracy and reliability.

    1. The user interface of a computer system (like a social media site), is the part that you view and interact with. It’s what you see on your screen and what you press or type or scroll over. Designers of social media sites have to decide how to layout information for users to navigate and decide how the user performs various actions (like, retweet, post, look up user, etc.). Some information and actions will be made larger and easier to access while others will be smaller or hidden in menus or settings. As we look at these interfaces, there are two key terms we want you to know: Affordances are what a user interface lets you do. In particular, it’s what a user interface makes feel natural to do. So for example, an interface might have something that looks like it should be pressed, or an interface might open by scrolling a little so it is clear that if you touch it you can make it scroll more (see a more nuanced explanation here) Friction is anything that gets in the way of a user performing an action. For example, if you have to open and navigate through several menus to find the privacy settings, that is significant friction. Or if one of the buttons has a bug and doesn’t work when you press it, so you have to find another way of performing that action, which is significant friction. Designers sometimes talk about trying to make their user interfaces frictionless, meaning the user can use the site without feeling anything slowing them down.

      UI, short for User Interface, pertains to the arrangement of elements on a web page, making the visual presentation the primary concern for UI designers. Well-designed User Interfaces, exemplified by platforms like Instagram and YouTube, not only draw in users but also enhance the overall user experience (UX) through their straightforward and visually appealing interfaces. Consequently, I believe that both UI and UX play pivotal roles in ensuring the success of a well-crafted app or website.

    1. When we think about how data is used online, the idea of a utility calculus can help remind us to check whether we’ve really got enough data about how all parties might be impacted by some actions. Even if you are not a utilitarian, it is good to remind ourselves to check that we’ve got all the data before doing our calculus. This can be especially important when there is a strong social trend to overlook certain data. Such trends, which philosophers call ‘pernicious ignorance’, enable us to overlook inconvenient bits of data to make our utility calculus easier or more likely to turn out in favor of a preferred course of action.

      This perspective on the utility calculus for online data usage is insightful. Stressing the importance of considering all parties and avoiding "pernicious ignorance" is a valuable reminder. It encourages a conscientious approach to decision-making, highlighting the need for comprehensive data analysis.

    1. Sounds are represented as the electric current needed to move a speaker’s diaphragm back and forth over time to make the specific sound waves. The electric current is saved as a number, and those electric current numbers are saved at each time point, so the sound information is saved as a list of numbers.

      This explanation succinctly captures how sounds are converted into digital data, emphasizing the representation of electric current numbers over time. This numerical sequence enables accurate storage and reproduction of diverse sound waves, providing a fundamental insight into the digitization of audio.

    1. Note that sometimes people use “bots” to mean inauthentically run accounts, such as those run by actual humans, but are paid to post things like advertisements or political content. We will not consider those to be bots, since they aren’t run by a computer. Though we might consider these to be run by “human computers” who are following the instructions given to them, such as in a click farm:

      it's important to remember that not all "bots" are actually bots. When we talk about bots, we're usually thinking of automated computer programs. But sometimes, real people get paid to post stuff like ads or political messages. These aren't bots because there's a human behind them, kind of like workers in a click farm just following instructions. So, it's good to keep in mind the difference between these human-run accounts and actual computer-run bots.

    1. Bots present a similar disconnect between intentions and actions. Bot programs are written by one or more people, potentially all with different intentions, and they are run by others people, or sometimes scheduled by people to be run by computers.

      bots represent a complex blend of the intentions of their creators and the actions of their users. Different developers may embed varying goals into a bot, and those who deploy the bot might use it in ways the creators didn't anticipate. This can lead to unexpected results, especially when bots are scheduled to run automatically. It's a reminder of the importance of aligning design, deployment, and use of technology with ethical and responsible practices.

    1. Additionally, some sites are primarily built for other purposes but have a social media component as well, such as the Amazon online store that has user reviews and customer questions & answers, or news sites that have comment sections.

      Websites like Amazon and news sites are integrating social media elements like user reviews and comment sections. This trend boosts user engagement, fosters community, provides valuable feedback, and enhances credibility. However, it also presents challenges in moderating content and ensuring interaction quality. This blending of e-commerce, news, and social media showcases the increasingly interconnected nature of the digital landscape.

    1. Existential ethics: your actions have consequences, but the consequences are unknowable. Even though you desire to do what’s right, there is no objective morality to follow (part of existential angst). You are forced to invent some sort of meaning-giving basis for life that can tell you what to care about. This might include constructing a kind of “morality” to follow.

      Existential ethics is the idea that we create our own values and meaning in a world that doesn't hand them to us. It's about dealing with the fact that our actions have unpredictable outcomes and there’s no fixed moral guide. This can cause some stress, known as existential angst, because we're left to figure out our own path. Despite the challenges and uncertainty, this also gives us a unique freedom to define who we are and what we stand for. In short, existential ethics is about the responsibility and liberty of forging our own way and deciding what's truly important to us.