SlideShare a Scribd company logo
Kaitlyn Creney
 “While courtship norms and practices are
less formal and more varied than they
were in the early and mid-twentieth
century, our research on teens’ new
media use shows that the rituals are no
less elaborate or important than those of
their historical counterparts” (118).
 Basically a framework has been in place
for generations and those same standards
or dating wants/needs are not only
relevant act as the same guiding force.
 Era of the Industrial Revolution sparked
the rituals that last today.
 The development, and recognition, of
the life stage of adolescence also
created explicit dating norms.
 In the 1950s the contemporary teen
dating culture had been established.
Influenced by: working-class “calling,”
involvement in public schools, school
dances, and the independence
allowed by the car.
 Use of symbols to construct their unified
and external image as a couple
(exchange of class rings etc.)
 Want public recognition from their peers
 Want independence from parents
 Want to be able to label the relationship
as they see fit (shift from courtship to
hanging out with someone)
 Social media sites provide the communal
aspect that is missing in today’s
fragmented society.
 Here the external construction of a
couple takes place. The development of
an image comes from status updates,
pictures, and posts.
 This perpetuates the need for public
recognition which is satisfied by the
number of likes or comments.
 Technology supersedes time and space.
 Parents are almost excluded from the social
media sphere.
 There is a generational divide in tech.
literacy that prohibits them from monitoring
teen’s interactions.
 Passwords as an advancement for teen
privacy.
 These environments allow the individual
to have more control over their actions
and emotions.
 Both careful construction and analysis
goes into a message. Diction is a sign of
teen’s activeness.
 Saving face based techniques and
technology.
 Selective sociality- teens are making
choices about who to communicate with
and allow to be affiliated with.
 The Internet allows someone to do their
research on who they are interested in.
 Trivial information, such as similar tastes in
film, is what guides the idea that a match
would be compatible.
 Mutual friends are a great unifier in the
linking process.
 How are you going to be seen as an
individual and as part of a couple?
 Choices in digital
symbolism.
 Boundaries: What
is private? What is
public?
 Must meet or have an interaction with someone
offline before initiating contact online.
 Loose online connection can provide the perfect
context for flirting or feeling the other person out.
Only considered a relationship when moved offline.
 Sharing of password(s) and granting access to
online sphere is a monumental indicator of trust.
 Breaking up via online is disrespectful and harmful.
 Allows marginalized teens to meet others like
themselves.
 Is flexible to our continually connected nature.
 Ability to surpass geographical or institutional
constraints (different states, schools, parental
issues etc.)
 Allows more control over external appearance,
reduction in anxiety.
 “Leash” factor. Intimacy in an online
context carries the burden of frequent
contact and updates.
 Conflict arises more frequently and
publically.
 Highly efficient stalkers, indirect control of a
an ex. When monitoring or posting leads to
emotional control or abuse.
 Contemporary teen intimacy practices need
to be analyzed as they shape the
dating/intimacy standards for the next
generation.
 They also have an effect on overall societal
relations.
 “The new possibilities of self-expression
available online, characterized by more casual
and personal forms of public communication,
complicate our existing norms about the
boundaries between the public and the
private” (147).
Kaitlyn Creney

More Related Content

What's hot

Chapter 3 presentation
Chapter 3 presentationChapter 3 presentation
Chapter 3 presentationChelsea Marie
 
Cyber Issues
Cyber IssuesCyber Issues
Cyber Issues
Hiram Cuevas
 
L11 yem ethical fault_lines_participation
L11 yem ethical fault_lines_participationL11 yem ethical fault_lines_participation
L11 yem ethical fault_lines_participation
Chormvirak Moulsem
 
Cms 298 social media presentation
Cms 298 social media presentationCms 298 social media presentation
Cms 298 social media presentationSarah Mears
 
Understanding the role of community in online dating copypasteads.com
Understanding the role of community in online dating copypasteads.comUnderstanding the role of community in online dating copypasteads.com
Understanding the role of community in online dating copypasteads.com
jackpot201
 
L6 yem good play
L6 yem good playL6 yem good play
L6 yem good play
Chormvirak Moulsem
 
Designing for (Local) Community
Designing for (Local) CommunityDesigning for (Local) Community
Designing for (Local) Community
Shelly D. Farnham, Ph.D.
 
Elaine kasket
Elaine kasketElaine kasket
L8 yem ethical fault lines privacy
L8 yem ethical fault lines privacyL8 yem ethical fault lines privacy
L8 yem ethical fault lines privacy
Chormvirak Moulsem
 
The Past, Present And Future Of Online
The Past, Present And Future Of OnlineThe Past, Present And Future Of Online
The Past, Present And Future Of Onlineguestf6b870
 
Whole Through the Presence of Others? Integrity and Participation in Blogs, ...
Whole Through the Presence of Others? Integrity and Participation in Blogs, ...Whole Through the Presence of Others? Integrity and Participation in Blogs, ...
Whole Through the Presence of Others? Integrity and Participation in Blogs, ...
dcambrid
 
communication and social media
communication and social mediacommunication and social media
communication and social media
Nagendrasahu6
 
Effects of social media on society
Effects of social media on societyEffects of social media on society
Effects of social media on society
IshtiakH0ssain
 

What's hot (20)

Chapter 3 presentation
Chapter 3 presentationChapter 3 presentation
Chapter 3 presentation
 
Cyber Issues
Cyber IssuesCyber Issues
Cyber Issues
 
Cms 298 chapter 2 pres
Cms 298 chapter 2 presCms 298 chapter 2 pres
Cms 298 chapter 2 pres
 
Sociology
SociologySociology
Sociology
 
L11 yem ethical fault_lines_participation
L11 yem ethical fault_lines_participationL11 yem ethical fault_lines_participation
L11 yem ethical fault_lines_participation
 
Cms 298 social media presentation
Cms 298 social media presentationCms 298 social media presentation
Cms 298 social media presentation
 
Understanding the role of community in online dating copypasteads.com
Understanding the role of community in online dating copypasteads.comUnderstanding the role of community in online dating copypasteads.com
Understanding the role of community in online dating copypasteads.com
 
L6 yem good play
L6 yem good playL6 yem good play
L6 yem good play
 
Designing for (Local) Community
Designing for (Local) CommunityDesigning for (Local) Community
Designing for (Local) Community
 
Elaine kasket
Elaine kasketElaine kasket
Elaine kasket
 
L8 yem ethical fault lines privacy
L8 yem ethical fault lines privacyL8 yem ethical fault lines privacy
L8 yem ethical fault lines privacy
 
Intimacy
IntimacyIntimacy
Intimacy
 
The Past, Present And Future Of Online
The Past, Present And Future Of OnlineThe Past, Present And Future Of Online
The Past, Present And Future Of Online
 
I poke you, you poke me
I poke you, you poke meI poke you, you poke me
I poke you, you poke me
 
Whole Through the Presence of Others? Integrity and Participation in Blogs, ...
Whole Through the Presence of Others? Integrity and Participation in Blogs, ...Whole Through the Presence of Others? Integrity and Participation in Blogs, ...
Whole Through the Presence of Others? Integrity and Participation in Blogs, ...
 
GCAA 2010 Southeastern Colloquium On Racial Inequality and Poverty
GCAA 2010 Southeastern Colloquium On Racial Inequality and PovertyGCAA 2010 Southeastern Colloquium On Racial Inequality and Poverty
GCAA 2010 Southeastern Colloquium On Racial Inequality and Poverty
 
communication and social media
communication and social mediacommunication and social media
communication and social media
 
CMS 298 Chapter 2 Presentation
CMS 298 Chapter 2 PresentationCMS 298 Chapter 2 Presentation
CMS 298 Chapter 2 Presentation
 
Effects of social media on society
Effects of social media on societyEffects of social media on society
Effects of social media on society
 
Cms298 presentation
Cms298 presentationCms298 presentation
Cms298 presentation
 

Viewers also liked

Entidades encargadas de las pruebas
Entidades encargadas de las pruebasEntidades encargadas de las pruebas
Entidades encargadas de las pruebasMaria Pino
 
Casewise EA Foundation (FR) - Episode 1/4
Casewise EA Foundation (FR) - Episode 1/4Casewise EA Foundation (FR) - Episode 1/4
Casewise EA Foundation (FR) - Episode 1/4
Jean-Patrick Ascenci
 
Els deserts
Els desertsEls deserts
Els desertsblai10
 
Tylers electronic media
Tylers electronic mediaTylers electronic media
Tylers electronic media
Tyler95
 
10 Things to Love or Hate about Tax Day
10 Things to Love or Hate about Tax Day10 Things to Love or Hate about Tax Day
10 Things to Love or Hate about Tax DayEmmett Brennan
 
Realidad
RealidadRealidad
Realidad
Irene Iturriaga
 
Sesion 3
Sesion 3Sesion 3
Sesion 3
candidatavale
 
Website
Website Website
Website
clairehrodgers
 
70381 echeverria los_cuatro
70381 echeverria los_cuatro70381 echeverria los_cuatro
70381 echeverria los_cuatroValeria Esposito
 
Revisao 8 serie_1_trim
Revisao 8 serie_1_trimRevisao 8 serie_1_trim
Revisao 8 serie_1_trimRafaa Colinii
 
Presentación11111
Presentación11111Presentación11111
Presentación11111mmgambin
 
OCP Server Memory Channel Testing DRAFT
OCP Server Memory Channel Testing DRAFTOCP Server Memory Channel Testing DRAFT
OCP Server Memory Channel Testing DRAFTBarbara Aichinger
 
Setmana cívica i cultural
Setmana cívica i culturalSetmana cívica i cultural
Setmana cívica i cultural
Fav Terrassa
 

Viewers also liked (20)

Presentation1
Presentation1Presentation1
Presentation1
 
Entidades encargadas de las pruebas
Entidades encargadas de las pruebasEntidades encargadas de las pruebas
Entidades encargadas de las pruebas
 
Palabras palabritas-palabrotas
Palabras palabritas-palabrotasPalabras palabritas-palabrotas
Palabras palabritas-palabrotas
 
Casewise EA Foundation (FR) - Episode 1/4
Casewise EA Foundation (FR) - Episode 1/4Casewise EA Foundation (FR) - Episode 1/4
Casewise EA Foundation (FR) - Episode 1/4
 
Cuál es-la-naturaleza-del-cielo
Cuál es-la-naturaleza-del-cieloCuál es-la-naturaleza-del-cielo
Cuál es-la-naturaleza-del-cielo
 
Pimientos
PimientosPimientos
Pimientos
 
Els deserts
Els desertsEls deserts
Els deserts
 
Tylers electronic media
Tylers electronic mediaTylers electronic media
Tylers electronic media
 
10 Things to Love or Hate about Tax Day
10 Things to Love or Hate about Tax Day10 Things to Love or Hate about Tax Day
10 Things to Love or Hate about Tax Day
 
Danilo
DaniloDanilo
Danilo
 
Realidad
RealidadRealidad
Realidad
 
Sesion 3
Sesion 3Sesion 3
Sesion 3
 
Website
Website Website
Website
 
70381 echeverria los_cuatro
70381 echeverria los_cuatro70381 echeverria los_cuatro
70381 echeverria los_cuatro
 
Revisao 8 serie_1_trim
Revisao 8 serie_1_trimRevisao 8 serie_1_trim
Revisao 8 serie_1_trim
 
Valentina
ValentinaValentina
Valentina
 
Presentación11111
Presentación11111Presentación11111
Presentación11111
 
OCP Server Memory Channel Testing DRAFT
OCP Server Memory Channel Testing DRAFTOCP Server Memory Channel Testing DRAFT
OCP Server Memory Channel Testing DRAFT
 
Setmana cívica i cultural
Setmana cívica i culturalSetmana cívica i cultural
Setmana cívica i cultural
 
Pluralismo y-el-creyente-en-cristo3
Pluralismo y-el-creyente-en-cristo3Pluralismo y-el-creyente-en-cristo3
Pluralismo y-el-creyente-en-cristo3
 

Similar to Intimacy p point

6Social NetworksNo inventions of the 20th Century surpas.docx
6Social NetworksNo inventions of the 20th Century surpas.docx6Social NetworksNo inventions of the 20th Century surpas.docx
6Social NetworksNo inventions of the 20th Century surpas.docx
evonnehoggarth79783
 
Aqeel R AlnemerMr. copleyENGLISH 101Feb222016Social .docx
Aqeel R AlnemerMr. copleyENGLISH 101Feb222016Social .docxAqeel R AlnemerMr. copleyENGLISH 101Feb222016Social .docx
Aqeel R AlnemerMr. copleyENGLISH 101Feb222016Social .docx
justine1simpson78276
 
Social Networking
Social NetworkingSocial Networking
Social Networking
guest1b0960
 
Sociological Interaction And Social Interaction
Sociological Interaction And Social InteractionSociological Interaction And Social Interaction
Sociological Interaction And Social Interaction
Sheila Guy
 
Digital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE ProgrammeDigital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE Programme
Claudia Megele
 
Social Identity: True Identity or Persona
Social Identity: True Identity or PersonaSocial Identity: True Identity or Persona
Social Identity: True Identity or Persona
dbala23
 

Similar to Intimacy p point (9)

6Social NetworksNo inventions of the 20th Century surpas.docx
6Social NetworksNo inventions of the 20th Century surpas.docx6Social NetworksNo inventions of the 20th Century surpas.docx
6Social NetworksNo inventions of the 20th Century surpas.docx
 
Friendship
FriendshipFriendship
Friendship
 
Aqeel R AlnemerMr. copleyENGLISH 101Feb222016Social .docx
Aqeel R AlnemerMr. copleyENGLISH 101Feb222016Social .docxAqeel R AlnemerMr. copleyENGLISH 101Feb222016Social .docx
Aqeel R AlnemerMr. copleyENGLISH 101Feb222016Social .docx
 
CMS 298 Chapter 2 Presentation
CMS 298 Chapter 2 PresentationCMS 298 Chapter 2 Presentation
CMS 298 Chapter 2 Presentation
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Sociological Interaction And Social Interaction
Sociological Interaction And Social InteractionSociological Interaction And Social Interaction
Sociological Interaction And Social Interaction
 
Ch3 intimacy
Ch3 intimacyCh3 intimacy
Ch3 intimacy
 
Digital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE ProgrammeDigital literacy skills for social workers - North West London ASYE Programme
Digital literacy skills for social workers - North West London ASYE Programme
 
Social Identity: True Identity or Persona
Social Identity: True Identity or PersonaSocial Identity: True Identity or Persona
Social Identity: True Identity or Persona
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Intimacy p point

  • 2.  “While courtship norms and practices are less formal and more varied than they were in the early and mid-twentieth century, our research on teens’ new media use shows that the rituals are no less elaborate or important than those of their historical counterparts” (118).  Basically a framework has been in place for generations and those same standards or dating wants/needs are not only relevant act as the same guiding force.
  • 3.  Era of the Industrial Revolution sparked the rituals that last today.  The development, and recognition, of the life stage of adolescence also created explicit dating norms.  In the 1950s the contemporary teen dating culture had been established. Influenced by: working-class “calling,” involvement in public schools, school dances, and the independence allowed by the car.
  • 4.  Use of symbols to construct their unified and external image as a couple (exchange of class rings etc.)  Want public recognition from their peers  Want independence from parents  Want to be able to label the relationship as they see fit (shift from courtship to hanging out with someone)
  • 5.
  • 6.  Social media sites provide the communal aspect that is missing in today’s fragmented society.  Here the external construction of a couple takes place. The development of an image comes from status updates, pictures, and posts.  This perpetuates the need for public recognition which is satisfied by the number of likes or comments.
  • 7.  Technology supersedes time and space.  Parents are almost excluded from the social media sphere.  There is a generational divide in tech. literacy that prohibits them from monitoring teen’s interactions.  Passwords as an advancement for teen privacy.
  • 8.  These environments allow the individual to have more control over their actions and emotions.  Both careful construction and analysis goes into a message. Diction is a sign of teen’s activeness.  Saving face based techniques and technology.
  • 9.  Selective sociality- teens are making choices about who to communicate with and allow to be affiliated with.  The Internet allows someone to do their research on who they are interested in.  Trivial information, such as similar tastes in film, is what guides the idea that a match would be compatible.  Mutual friends are a great unifier in the linking process.
  • 10.  How are you going to be seen as an individual and as part of a couple?  Choices in digital symbolism.  Boundaries: What is private? What is public?
  • 11.  Must meet or have an interaction with someone offline before initiating contact online.  Loose online connection can provide the perfect context for flirting or feeling the other person out. Only considered a relationship when moved offline.  Sharing of password(s) and granting access to online sphere is a monumental indicator of trust.  Breaking up via online is disrespectful and harmful.
  • 12.  Allows marginalized teens to meet others like themselves.  Is flexible to our continually connected nature.  Ability to surpass geographical or institutional constraints (different states, schools, parental issues etc.)  Allows more control over external appearance, reduction in anxiety.
  • 13.  “Leash” factor. Intimacy in an online context carries the burden of frequent contact and updates.  Conflict arises more frequently and publically.  Highly efficient stalkers, indirect control of a an ex. When monitoring or posting leads to emotional control or abuse.
  • 14.  Contemporary teen intimacy practices need to be analyzed as they shape the dating/intimacy standards for the next generation.  They also have an effect on overall societal relations.  “The new possibilities of self-expression available online, characterized by more casual and personal forms of public communication, complicate our existing norms about the boundaries between the public and the private” (147).