25 Matching Annotations
  1. Jun 2025
  2. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Luddite. December 2023. Page Version ID: 1189255462. URL: https://en.wikipedia.org/w/index.php?title=Luddite&oldid=1189255462 (visited on 2023-12-10).

      This link points to a specific archived version of the Wikipedia page on Luddites, a group historically known for resisting industrial technology they believed threatened their livelihoods. Visiting this version ensures you’re seeing the page exactly as it appeared on December 10, 2023, which is helpful for citation accuracy and tracking how ideas about technology resistance have been framed at that time.

    1. Now in those days the god Thamus was the king of the whole country of Egypt, […] [then] came Theuth and showed his inventions, desiring that the other Egyptians might be allowed to have the benefit of them; […] [W]hen they came to letters, This, said Theuth, will make the Egyptians wiser and give them better memories; it is a specific both for the memory and for the wit. Thamus replied: […] this discovery of yours will create forgetfulness in the learners’ souls, because they will not use their memories; they will trust to the external written characters and not remember of themselves. The specific which you have discovered is an aid not to memory, but to reminiscence, and you give your disciples not truth, but only the semblance of truth; they will be hearers of many things and will have learned nothing; they will appear to be omniscient and will generally know nothing; they will be tiresome company, having the show of wisdom without the reality.

      This passage reflects an ancient skepticism about new technology—in this case, writing. Thamus worries that relying on written words will weaken memory and create the illusion of knowledge without true understanding. It's a reminder that tools meant to help us can also change how we think and learn, not always for the better.

    2. This passage reflects an ancient skepticism about new technology—in this case, writing. Thamus worries that relying on written words will weaken memory and create the illusion of knowledge without true understanding. It's a reminder that tools meant to help us can also change how we think and learn, not always for the better.

  3. May 2025
    1. Pick a situation where someone is being publicly shamed. Who is responsible for accepting or rejecting their apology/repentance?

      A situation where someone is being publicly shamed is the Amber Heard and Johnny Depp situation, where Amber had claimed that she experienced DV throughout their marriage. As a response, Johnny Depp was canceled as many big name campaigns ended their contracts with him. After their hearing it was discovered that Heard had also abused Depp through out their relationship and both of their public reputations were tarnished. Both members in this situation is responsible for accepting their apology because both were in the wrong for the situation and it's only because they're public figures under the limelight that exposes this situation to the public

  4. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. MeToo movement. December 2023. Page Version ID: 1188872853. URL: https://en.wikipedia.org/w/index.php?title=MeToo_movement&oldid=1188872853 (visited on 2023-

      The MeToo movement was a movement that started on platform MySpace in 2006 and this is important to talk in this context because this was one of the first social media movements that brought public attention to the magnitude of the issue which was how a lot of the sexual assault cases in Hollywood would get swept under the carpet

    1. What do you think a social media company’s responsibility is for the crowd actions taken by users on its platform?

      I think that a social media company's responsibility for the crowd actions taken by users on its platform mainly has to do with making sure they are communicating with users of their platform as well as assuring them that they are aware what is going on as well as releasing a public statement expressing their concern as well as what their next steps are. The most important part is definitely actually taking actions that are a part of their plan proving users that they will make a difference.

  5. Apr 2025
  6. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. https://en.wikipedia.org/w/index.php?title=Social_model_of_disability&oldid=1184222120#Social_construction_of_disability

      The social model of disability suggests that people are disabled more by societal barriers than by their physical or mental differences. Historically, societies have defined disability based on moral or biological standards, often labeling those who don't fit as "less than" or "unhealthy." For instance, during the 2000 Paralympics, the lack of live coverage compared to the Olympics highlighted how society can undervalue disabled individuals, reinforcing their marginalization. This model encourages us to change environments and attitudes to be more inclusive, rather than trying to "fix" individuals.

    1. What assumptions do the site and your device make about individuals or groups using social media, which might not be true or might cause problems? List as many as you can think of (bullet points encouraged).

      Some assumptions made about users who use twitter may be that everyone can see what you're posting including certain fan bases, and they know that most times there are bots utilized on Twitter to push for a certain narrative when there is something controversial going on.

    1. Jacob Kastrenakes. Facebook stored millions of Instagram passwords in plain text. The Verge, April 2019. URL: https://www.theverge.com/2019/4/18/18485599/facebook-instagram-passwords-plain-text-millions-users (visited on 2023-12-06).

      This article talks about how Facebook stored millions of Instagram passwords in plain text, and because of the format it's being stored in, it's easier for hackers to access, and in turn creates a big risk in data privacy as well as accounts being hacked. This is very alarming because I've personally seen accounts that I follow be hacked and the hackers usually upload some advertisement for bitcoin or a pyramid scheme, causing more people to succumb to being hacked.

    1. What are your biggest concerns around privacy on social media?

      I think my biggest concerns around privacy on social media would be getting sensitive information leaked such as bank passwords or maybe even my address. Something else is the risk of hacking and hidden cameras which not only exposes your information but the hacker will be able to know your day to day habits and just the feeling of being watched scares me.

  7. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Catherine Stinson. The Dark Past of Algorithms That Associate Appearance and Criminality. American Scientist, January 2021. URL: https://www.americanscientist.org/article/the-dark-past-of-algorithms-that-associate-appearance-and-criminality (visited on 2023-12-05).

      This article highlights the study of phrenology which is the study of the conformation of the skull as indicative of mental faculties and traits of character. Scientists in China have recently created a technology that detects the expressions that someone makes and the AI feature helps the government detect criminals. This is super intriguing because it's so interesting to think that just by analyzing someone's facial expressions you'd be able to learn so much about them.

    2. Catherine Stinson. The Dark Past of Algorithms That Associate Appearance and Criminality. American Scientist, January 2021. URL: https://www.americanscientist.org/article/the-dark-past-of-algorithms-that-associate-appearance-and-criminality (visited on 2023-12-05).

      This article highlights the importance of phrenology and how scientists in China are utilizing this practice to create a AI monitor that detects the facial expressions and patterns of a subject then uses that to identify criminals. Similar tools have also been use to detect students paying attention in class as well as finding the "gaydar".

    1. 8.5.1. Reflection# After looking at your ad profile, ask yourself the following: What was accurate, inaccurate, or surprising about your ad profile? How comfortable are you with Google knowing (whether correctly or not) those things about you?

      It wasn't very accurate, I do see websites or brands that I have purchased products from, but most of the stuff is pretty irrelevant or just not places I'm very interested in. I think the reason behind this might be that I don't use my computer as much when it comes to making online purchases, so the algorithm isn't as familiar w my habits as my phone would be. I am comfortable to an extent with Google knowing these things about me, because knowing the modern-day digital world, it's impossible for whatever device or platform you're using to not collect data about you.

  8. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Assassination of Martin Luther King Jr. November 2023. Page Version ID: 1186577416. URL: https://en.wikipedia.org/w/index.php?title=Assassination_of_Martin_Luther_King_Jr.&oldid=1186577416#Alleged_government_involvement

      This source highlights a tweet that comedian Jaboukie Young-White made back in 2020, impersonating the FBI making a foul comment about the assassination of Martin Luther King. This is not the first time Young has impersonated a public figure, which highlights an important issue regarding digital media. Not only does trolling include leaving comments and insults for other users, but another form of trolling is impersonating someone you're not. This is especially interesting because in this class we are learning to code bots to make posts for us, would that be a form of impersonation?

    1. What do you think is the best way to deal with trolling?

      I think the best way to deal with trolling would be block the users and report them, although it may be hard ignoring them would be the best strategy to stop further damage. Arguing back may not be the best, just because you will get more invested in the situation.

  9. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Todd Vaziri [@tvaziri]. Every non-hyperbolic tweet is from iPhone (his staff). Every hyperbolic tweet is from Android (from him). August 2016. URL: https://twitter.com/tvaziri/status/762005541388378112 (visited on 2023-11-24).

      This post by Todd Vaziri highlights a pattern in Donald Trump’s tweets during his 2016 presidential campaign—suggesting that hyperbolic tweets came from an Android device (likely Trump himself), while more measured tweets came from an iPhone (likely his staff). The tweet became notable for its insight into how device data revealed differences in tone and authorship.

    1. How do you think about the authenticity of the Tweets that come from Trump himself?

      The authenticity of the Tweet that come from Trump seems very important to users all across the world because as the president of the United States, he has a lot of status that comes with that role. Personally, president Trump has said a lot of questionable things, and made a lot of false claims in the past so I don't really believe most of the stuff that he posts on social media but any information in general needs to be backed up no matter who it's coming from.

  10. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. e6] Bulletin board system. November 2023. Page Version ID: 1184559343. URL: https://en.wikipedia.org/w/index.php?title=Bulletin_board_system&oldid=1184559343 (visited on 2023-11-24).

      This website overviews the history of bulletin boards and their creation. From this source I was able to learn more about their origin as well as the coding format to make them, this makes them more interesting to me now and I realize how much I use bullet points during my day to day.

    1. 5.5.2. 4Chan# 4Chan [e18] was created in 2003 by copying the code from a Japanese image-sharing bulletin board called Futaba or 2chan [e19]. 4Chan has various image-sharing bulletin boards, where users post anonymously. Perhaps the most infamous board is the “/b/” board for “random” topics. This board emphasizes “free speech” and “no rules” (with exceptions for child sexual abuse material [CSAM] and some other illegal content). In these message boards, users attempt to troll each other and post the most shocking content they can come up with. They also have a history of collectively choosing a target website or community and doing a “raid” where they all try to join and troll and offend the people in that community. Many memes, groups, and forms of internet slang come from 4Chan, such as: lolcats [e20] Rickroll [e21] ragefaces [e22] “Anonymous [e23]” the hacker group Bronies [e24] (male My Little Pony fans) much of trolling culture (we will talk more about in Chapter 7: Trolling) But one 4Chan user found 4chan to be too authoritarian and restrictive and set out to create a new “free-speech-friendly” image-sharing bulletin board, which he called 8chan. 5.5.3. 8Chan (now 8Kun)# 8Chan [e25] (now called 8Kun) is an image-sharing bulletin board site that was started in 2013. It has been host to white-supremacist, neo-nazi and other hate content. 8Chan has had trouble finding companies to host its servers and internet registration due to the presence of CSAM, and for being the place where various mass shooters spread their hateful manifestos. 8Chan is also the source and home of the false conspiracy theory QAnon [e26]

      This section highlights the blogging website, 4Chan which is a site that is pretty loose on restrictions so a lot of users will post harmful content and started multiple toxic internet trends. This serves as a primary example of toxic cyber environment, which has raised a lot of issues especially in recent years because of increased online trolling and exploitation of underaged users. This really shows how social media may not always be glamorous and good.

  11. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. W3Schools. Introduction to HTML. URL: https://www.w3schools.com/html/html_intro.asp (visited on 2023-11-24).

      The W3Schools HTML Introduction page explains that HTML is the basic language used to build web pages. It talks about how HTML uses tags (like labels) to mark things like titles, headings, and paragraphs. For example, you use one tag type to create a heading and another for a paragraph. It even shows a simple example of what a basic web page looks like in code. It also mentions that your web browser (like Chrome or Safari) reads this code and turns it into the websites you see. And there’s a special line at the top of the page that helps the browser understand it’s working with HTML.

    1. Data and Metadata

      This definition of metadata makes me reflect on how often we underestimate its significance in our daily interactions with technology, particularly concerning privacy. For example, a tweet's content might seem harmless, but its metadata can uncover personal patterns, routines, or even reveal someone’s identity. It’s unsettling to realize how companies can exploit this seemingly minor information for profiling or targeted advertising.

  12. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Steven Tweedie. This disturbing image of a Chinese worker with close to 100 iPhones reveals how App Store rankings can be manipulated. February 2015. URL: https://www.businessinsider.com/photo-shows-how-fake-app-store-rankings-are-made-2015-2 (visited on 2024-03-07).

      This citation mainly focuses on the image captured by the news outlet with a woman sitting in front of multiple phones. Showing how easy it is to manipulate the App Store by one person downloading and deleting apps to increase download numbers. If even one person can be using this many phones at once, it's scary to even think how much a factory of workers can do.

    1. What bots do you find surprising?

      I was surprised that antagonistic bots existed, especially since there were so many types. I find it pretty interesting that these bots are placed into so many different types of situations and the different uses for each type. Especially because a lot of these applications will have multiple types of the bots and the different types of functions for each.

    1. What do you think is the responsibility of tech workers to think through the ethical implications of what they are making?

      I believe that the responsibilities of tech workers to think through the ethical implications of what they are making need to ensure that they are curating technology that is helping people more than harming them. While social media search engines are helpful, it also creates privacy issues, especially surrounding safety and possible ways for online stalkers to gain more information on their victims. Another thing is ethics courses workers should go through during employment because I know that most engineering degrees will require their students to attend ethics classes to educate them on the importance of making ethical decisions and how their jobs can impact the lives of millions of people.

    1. Being and becoming an exemplary person (e.g., benevolent; sincere; honoring and sacrificing to ancestors; respectful to parents, elders and authorities, taking care of children and the young; generous to family and others). These traits are often performed and achieved through ceremonies and rituals (including sacrificing to ancestors, music, and tea drinking), resulting in a harmonious society.

      The moral framework often represents how it will always be the morally correct choice and that's not always true. especially with Confucianism which focuses on honoring your elders and being generous to the young. Although this may be morally correct it is not an individual's responsibility to fend for each elderly or younger person in their life, especially if that person has done something bad to them. An example would be Korean sports teams where the respect culture is something that they tend to focus on and this promotes bullying of younger members from elder members which really creates an issue for the morality of that team as well as their interpersonal relationships.