18 Matching Annotations
  1. Last 7 days
  2. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. The Selfish Gene. December 2023. Page Version ID: 1188207750. URL: https://en.wikipedia.org/w/index.php?title=The_Selfish_Gene&oldid=1188207750 (visited on 2023-12-08).

      I found The Selfish Gene really thought-provoking because it completely changes how we think about evolution. Instead of seeing living things as the main focus, Dawkins makes us see genes—and even ideas—as the real “survivors.” Personally, I think this idea is still very relevant today, especially when we think about how memes and online trends spread. It’s amazing how something written in 1976 can explain how the internet works now.

    1. the 1976 book The Selfish Gene [l3], evolutionary biologist Richard Dawkins[1] said rather than looking at the evolution of organisms, it made even more sense to look at the evolution of the genes of those organisms (sections of DNA that perform some functions and are inherited). For example, if a bee protects its nest by stinging an attacking animal and dying, then it can’t reproduce and it might look like a failure of evolution. But if the gene that told the bee to die protecting the nest was shared by the other bees in the nest, then that one bee dying allows the gene to keep being replicated, so the gene is successful evolutionarily. Since genes contained information about how organisms would grow and live, then biological evolution could be considered to be evolving information. Dawkins then took this idea of the evolution of information and applied it to culture, coining the term “meme” (intended to sound like “gene” [l4]). A meme is a piece of culture that might reproduce in an evolutionary fashion, like a hummable tune that someone hears and starts humming to themselves, perhaps changing it, and then others overhearing next. In this view, any piece of human culture can be considered a meme that is spreading (or failing to spread) according to evolutionary forces. So we can use an evolutionary perspective to consider the spread of: Technology (languages, weapons, medicine, writing, math, computers, etc.), religions philosophies political ideas (democracy, authoritarianism, etc.) art organizations etc. We can even consider the evolutionary forces that play in the spread of true and false information (like an old saying: “A lie is halfway around the world before the truth has got its boots on.” [l5]) [1] While we value Dawkin’s contribution to evolutionary theory, we don’t want to make this an endorsement of any of his later statements or views. { requestKernel: true, binderOptions: { repo: "binder-examples/jupyter-stacks-datascience", ref: "master", }, codeMirrorConfig: { theme: "abcdef", mode: "python" }, kernelOptions: { name: "python3", path: "./ch12_virality" }, predefinedOutput: true } kernelName = 'python3' previous 12. Virality and Memes next 12.2. Pre-internet Virality Examples Contents 12.1.1. Biological Evolution 12.1.2. Memes By Kyle Thayer and Susan Notess © Copyright 2024. { "showHighlights": "whenSidebarOpen" }

      Reading this section about The Selfish Gene really amazed me. I never realized how deeply connected biology and culture could be. The idea that memes evolve in the same way as genes made me think differently about how fast ideas spread on social media today. Personally, I find it both exciting and a little scary—exciting because creativity can spread so quickly, but scary because misinformation can too. It made me realize how powerful our sharing behavior is in shaping modern “evolution.”

  3. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Elon Musk [@elonmusk]. Trashing accounts that you hate will cause our algorithm to show you more of those accounts, as it is keying off of your interactions. Basically saying if you love trashing *that* account, then you will probably also love trashing *this* account. Not actually wrong lol. January 2023. URL:

      This post perfectly illustrates a systemic feedback loop: when ranking models optimize for engagement (clicks, replies, dwell time), any interaction— even hate-watching or “dunking” — becomes a positive signal. The system can then amplify exactly what you say you dislike, because your behavior says “I’m interested.” A concrete example: if I constantly quote-tweet an account to criticize it, the recommender learns that content keeps me on the platform and will surface more of that account and similar ones, deepening an echo chamber of outrage. We all should be caution for this.

    1. Individual analysis focuses on the behavior, bias, and responsibility an individual has, while systemic analysis focuses on the how organizations and rules may have their own behaviors, biases, and responsibility that aren’t necessarily connected to what any individual inside intends. For example, there were differences in US criminal sentencing guidelines between crack cocaine vs. powder cocaine in the 90s. The guidelines suggested harsher sentences on the version of cocaine more commonly used by Black people, and lighter sentences on the version of cocaine more commonly used by white people. Therefore, when these guidelines were followed, they had have racially biased (that is, racist) outcomes regardless of intent or bias of the individual judges. (See: https://en.wikipedia.org/wiki/Fair_Sentencing_Act) [k3].

      I think alogorithms recommendation creates filter bubbles and echo chambers: people see more of the same views, products, or communities, while different or challenging content gets hidden. They will then only see what they want to see. Over time, this can reduce diversity of information, reinforce stereotypes, and polarize groups—even if no one person wanted that outcome.

  4. Oct 2025
    1. General Data Protection Regulation. November 2023. Page Version ID: 1187294017. URL: https://en.wikipedia.org/w/index.php?title=General_Data_Protection_Regulation&oldid=1187294017 (visited on 2023-12-05).

      Using the GDPR Wikipedia page is fine for a quick overview, but it’s shaky for details—pages change and legal wording is picky. If the chapter is arguing about privacy “rules” being unclear, it would be stronger to cite the actual text of GDPR (esp. Article 5 on purpose-limitation/data-minimization and Article 6 on lawful basis) and maybe an EDPB guideline. Quick win: keep the Wikipedia link for context, but add primary sources to back any claims about what GDPR requires.

    1. Unclear Privacy Rules: Sometimes privacy rules aren’t made clear to the people using a system. For example: If you send “private” messages on a work system, your boss might be able to read them [i19]. When Elon Musk purchased Twitter, he also was purchasing access to all Twitter Direct Messages [i20]

      This part reminded me that the scariest privacy leaks aren’t big hacks—they’re everyday stuff. Work chats feel “private,” but admins can read them. Most people don’t know that. And parents posting kid pics? It feels loving, but the photo can carry location/time info that gives away routines. My quick rules: assume work tools are reviewable, turn off location on your camera, ask before posting other people (especially kids), and apps should make it super clear who can see your post and auto-strip metadata by default.

  5. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Kurt Wagner. This is how Facebook collects data on you even if you don’t have an account. Vox, April 2018. URL: https://www.vox.com/2018/4/20/17254312/facebook-shadow-profiles-data-collection-non-users-mark-zuckerberg (visited on 2023-12-05).

      Great, accessible explainer of “shadow profiles”—how contact uploads, embedded pixels/Like buttons, and partner data let Facebook infer identities beyond users. Its strength is concreteness; its limitation is age: it predates GDPR enforcement UX changes, Facebook’s “Off-Facebook Activity” tool, and Apple ITP/ATT. The pipes largely persist even if consent flows look nicer. For class, pair it with a mini-lab: check “Off-Facebook Activity,” download your data archive, and watch requests to facebook.com/tr in DevTools to see tracking in the wild. Ethically, it spotlights “consent by proxy”: your friends’ uploads can deanonymize you—an argument for collective privacy rights, not just individual settings.

    1. For example, social media data about who you are friends with might be used to infer your sexual orientation [h9]. Social media data might also be used to infer people’s: Race Political leanings Interests Susceptibility to financial scams Being prone to addiction (e.g., gambling)

      I think these tell us a dangerous shift that from expressed identity to inferred identity. When platforms guess traits like sexuality, politics, or “addiction risk” from friends and clicks, they create shadow labels you never consented to—labels that can trail you into credit, insurance, hiring, or campus discipline. I think platform should give notification for this actually.

  6. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Whitney Phillips. Internet Troll Sub-Culture's Savage Spoofing of Mainstream Media [Excerpt]. Scientific American, May 2015. URL: https://www.scientificamerican.com/article/internet-troll-sub-culture-s-savage-spoofing-of-mainstream-media-excerpt/ (visited on 2023-12-05).

      Phillips argues that trolling isn’t some fringe glitch—it feeds on the same attention economy that mainstream media uses, which is why hoaxes and outrage travel so well. A helpful detail from her piece is how “it’s just a joke” functions as a shield: ambiguity lets trolls toggle between sincerity and irony to avoid accountability while still harvesting attention. That framework reframes cases like the “Forever Alone Flashmob” as not only individual cruelty but also a media-system problem: amplification (retweets, headlines, livestreams) is the fuel. My takeaway is that platform and newsroom practices—e.g., not linking to troll content, slowing virality for unverifiable claims, and de-incentivizing engagement spikes—are as important as user education for reducing harm.

    1. A meme spread on 4chan trying to recruit 4chan trolls to catfish single men and have all the single men show up to the same location at the same time with no one there to meet them. Then 4chan users can watch a webcam to laugh at the lonely m

      I notice how the instructions weaponize ordinary tools (dating apps, webcams, public livestreams); nothing here is “high-tech,” which suggests that prevention is more about norms and platform rules than about advanced security. If we treat this as a design problem, I think dating sites could rate-limit new accounts, require stronger photo verification, and flag patterns like many “new users” inviting different men to the same place and time. Culturally, the meme also normalizes group bonding through dehumanizing outsiders; it is worth asking whether some online communities teach people that empathy is weakness. Personally, I feel angry and a bit scared, because the prank depends on making a private hope (a date) into public shame; it punishes people for trying to connect.

  7. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. Peter Aldhous. At First It Looked Like A Scientist Died From COVID. Then People Started Taking Her Story Apart. BuzzFeed News, August 2020. URL: https://www.buzzfeednews.com/article/peteraldhous/bethann-mclaughlin-twitter-suspension-fake-covid-death (visited on 2023-12-07).

      This piece unpacks the @sciencing_bi hoax—where a well-known activist fabricated a “Native American professor” who supposedly died of COVID—and shows how the lie unraveled through open-source verification (timestamps, language patterns, overlapping social graphs). What struck me is how a sympathetic identity can still be weaponized to mobilize outrage and donations, which blurs “authentic vs. inauthentic” far beyond simple anonymity. The article also documents the platform response (account suspension after community sleuthing), underscoring a reactive moderation gap: detection lag lets harmful narratives peak before correction. For me, it strengthens the case for reputation signals on pseudonyms and lightweight provenance checks on high-impact claims, so empathy isn’t exploited by manufactured personas.

    1. Anonymity can encourage inauthentic behavior because, with no way of tracing anything back to you[1], you can get away with pretending you are someone you are not, or behaving in ways that would get your true self in trouble.

      I feel this too. When people think there’s no consequence, some go extreme—hate raids, doxxing help-threads, or “sock-puppet” pile-ons feel way too easy under full anonymity. But I’ve also seen anonymity protect the right people: a student reporting harassment, a queer kid seeking help, a worker blowing the whistle. So I don’t want a blanket ban; I want guardrails: stable pseudonyms with reputation, stronger friction for brand-new throwaways, and a clear, due-process path to unmask only in severe cases (credible threats, coordinated harm). That balance keeps space for the vulnerable while making it harder to weaponize the mask.

  8. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. AIM (software). November 2023. Page Version ID: 1186190869. URL: https://en.wikipedia.org/w/index.php?

      Reading the Wikipedia entry on AIM (AOL Instant Messenger) brought back a lot of nostalgia. AIM was my first experience with real-time online communication, and it shaped how my generation learned to talk online. The concept of having a screen name, an "away message," and even custom sounds for incoming messages was revolutionary at the time. What really stood out from the source was how AIM not only popularized online chatting, but also introduced early forms of status updates and even emoticons—features we now take for granted on modern platforms like WhatsApp, Discord, or Slack. It’s fascinating to see how many of today’s messaging habits were born out of tools like AIM. It makes me appreciate how even "outdated" tech plays a role in shaping current digital culture.

    1. 2003 saw the launch of several popular social networking services [e11]: Friendster, Myspace, and LinkedIn. These were websites where the primary purpose was to build personal profiles and create a network of connections with other people, and communicate with them. Facebook was launched in 2004 and soon put most of its competitors out of business, while YouTube, launched in 2005 became a different sort of social networking site built around video. Note This history is all very US focused. In future versions of this book, I hope to incorporate a more global history of social media.

      One thing that really stood out to me in this chapter was the discussion about how social networking platforms evolved from early services like Friendster and MySpace to the dominant platforms we know today, like Facebook and YouTube. It made me think about how quickly digital trends shift and how easily one platform can completely overtake another. Personally, I remember having a MySpace account in middle school, and it was a big part of how we socialized online. But within just a few years, everyone moved to Facebook, and MySpace basically disappeared. It makes me wonder: will the same thing happen to today's dominant platforms like Instagram or TikTok? Are they just temporary until the next big shift happens?.

  9. social-media-ethics-automation.github.io social-media-ethics-automation.github.io
    1. W3Schools. Introduction to HTML. URL: https://www.w3schools.com/html/html_intro.asp (visited on 2023-11-24).

      I checked out the W3Schools page on Python Lists ([d7]) and it actually helped me understand lists way better than before. It showed that lists can hold different data types at the same time, like strings, numbers, and even other lists. I didn’t realize you could mix them like that! It also explained how you can use list methods like append() and remove(), which I had seen before in examples but never fully got. The examples were simple but made it easier to connect what the book said about indexing and list operations.

    1. 1st item has index 0 2nd item has index 1 3rd item has index 2 etc.

      I used to think it was weird that Python starts counting from 0 instead of 1. Like, why not just start with 1 like normal people? But after reading that it’s because of how programming languages were developed, it actually makes a bit more sense now. I also didn’t realize strings are kind of like lists too—that’s pretty cool. The example with the authors and the word “ethics” really helped me see how indexing works in real code.

  10. Sep 2025
    1. What ‘reasons’ felt most compelling to you? Some will seem unpersuasive, and some will seem to really get to the heart of the issue. Which framework best supports your decision to intervene? Which framework best supports your decision not to intervene?

      The reasons that felt most compelling to me were from Care Ethics and Consequentialism. Care Ethics emphasizes responsibility in close relationships, which makes me feel that intervening is an act of love for my parents. Consequentialism reminds me that while intervention may upset them now, it prevents more serious harm later.

      I especially feel this way because of my grandfather’s story. He delayed surgery, and we respected his choice. He might delay cause of fear or other conerns but we agree with his choice. Later, when his condition worsened, the chance of survival was much lower, and we regretted not intervening earlier. That experience makes me believe that sometimes respecting wishes can also mean avoiding responsibility since for me i think part of the reason that i agree with my grandfather is i am ear of losing him on surgery. Then, due to my experience, i will must intervening since i believe intervening is better for their wellbeing in long term.

      The framework that best supports intervening is Care Ethics, because it emphasizes the responsibility of love and the moral duty to protect those who cannot fully protect themselves. The framework that best supports not intervening is Natural Rights, since it prioritizes respecting an individual’s freedom and decision-making, even when those decisions may carry risks.

    1. Rejects Confucian focus on ceremonies/rituals. Prefers spontaneity and play. Like how water (soft and yielding), can, over time, cut through rock.

      I find it interesting that Confucianism and Taoism, as ancient ethics frameworks, often seem like opposites. Confucianism emphasizes order, ritual, and fulfilling social roles to create harmony in society, while Taoism emphasizes naturalness, spontaneity, and living in harmony with the Dao. This contrast made me think of the poet Tao Yuanming. He entered official life five times, reflecting the Confucian ideal of service to society, but he also resigned because of political corruption and turned to a simple rural life. His gentle and carefree poems, such as those on drinking wine and enjoying nature, show strong Taoist influence. In this way, Tao Yuanming embodies how the two traditions could coexist in one person’s life.