Antonio A. Casilli ‘Participatory surveillance and privacy negotiation in social media’, presentation at the Congreso Internacional Globernance Internet y el Futuro de la Democracia, Basque Parliament, Vitoria-Gasteiz, 20th December 2011
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Bodyspacesociety Blog
Lecture By Antonio Casilli (Sociologist and Professor of Digital Humanities), September 18th 2015, Centennial Memorial Hall of the College of Liberal Arts, Yonsei University
Transformed media landscape - and how we can make best use of itcentrumcyfrowe
The document discusses how the media landscape has been transformed by the internet and new technologies. Key points include:
1. The internet has created a new form of mass-self communication that is interactive, horizontal and allows many-to-many communication in real-time.
2. Web 2.0 and social media have enabled a new form of civil society through ubiquitous communication and sharing of images, sounds and ideas.
3. Commons-based peer production has created a new economic model where large projects are completed through coordinated creative effort, often without traditional hierarchy or financial compensation.
The document discusses the tensions between privacy and sharing information online in the digitally networked era. It explores how the concept of privacy is evolving as the line between public and private information is blurred by social media. While social media satisfies people's desire for socialization and identity curation, it also commodifies private data and exposes people to risks for their reputations and privacy through involuntary information sharing. The document questions whether individuals are sufficiently aware of how their online activities impact their privacy and control over personal information.
How does social influence work in the current world of social media?
This presentation delves into the idea of what is social influence and how we can see influence at work online. It explores what an influencer is, and the different kinds of influence they can exert.
Acsm jakob linaa jensen social media and the siloization of the public sphereJakob Jensen
This document discusses the transformation of public space with the rise of social media. It begins by reviewing classic concepts of the public sphere from thinkers like Habermas, Dewey, and Kant. It then acknowledges critiques of these ideals and proposes updated concepts must focus on inclusion, visibility, and spatial aspects across different media settings. The document examines how social media can democratize by amplifying visibility but also risks "siloization" as people tend to confirm existing views. It contrasts the potential for "smooth public spheres" online with efforts by governments, corporations, and institutions to impose "striated" controls. In the end, it argues the key issues are whether a coherent public sphere remains possible across fragmented media and the
Clay Shirky argues that changes in media change the nature of public arguments over time, with significant social and political effects. He focuses on how decentralized technologies like peer-to-peer networking, wireless connectivity, and open-source development enable new cooperative structures for getting things done as alternatives to traditional centralized institutions. Shirky believes groups tend to limit themselves, and that digital networks have increased the volume of ideas and arguments in circulation worldwide.
The document discusses issues around privacy, social media, and the changing boundaries between public and private information in the digital era. It notes that private information is increasingly shared publicly through platforms like Facebook and lifecasting, and that both corporations and governments are engaging in more surveillance. Questions are raised about how willing sharing of personal information online could impact individuals' reputations and about the degree to which social media has reshaped traditional concepts of public and private.
This document summarizes a presentation on updating Gene Sharp's 198 methods of nonviolent action for the digital age. It introduces the project to crowdsource enhancing the methods through online collaboration. Examples are given of how traditional methods like public speeches, mourning, and protests can be augmented with tools like hashtags, livestreaming, and check-ins. New digital methods are also proposed such as using maps, QR codes, and file-sharing. Concerns about online surveillance and censorship in repressive regimes are raised. Overall, the project aims to help activists utilize digital tools while considering context and security.
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Bodyspacesociety Blog
Lecture By Antonio Casilli (Sociologist and Professor of Digital Humanities), September 18th 2015, Centennial Memorial Hall of the College of Liberal Arts, Yonsei University
Transformed media landscape - and how we can make best use of itcentrumcyfrowe
The document discusses how the media landscape has been transformed by the internet and new technologies. Key points include:
1. The internet has created a new form of mass-self communication that is interactive, horizontal and allows many-to-many communication in real-time.
2. Web 2.0 and social media have enabled a new form of civil society through ubiquitous communication and sharing of images, sounds and ideas.
3. Commons-based peer production has created a new economic model where large projects are completed through coordinated creative effort, often without traditional hierarchy or financial compensation.
The document discusses the tensions between privacy and sharing information online in the digitally networked era. It explores how the concept of privacy is evolving as the line between public and private information is blurred by social media. While social media satisfies people's desire for socialization and identity curation, it also commodifies private data and exposes people to risks for their reputations and privacy through involuntary information sharing. The document questions whether individuals are sufficiently aware of how their online activities impact their privacy and control over personal information.
How does social influence work in the current world of social media?
This presentation delves into the idea of what is social influence and how we can see influence at work online. It explores what an influencer is, and the different kinds of influence they can exert.
Acsm jakob linaa jensen social media and the siloization of the public sphereJakob Jensen
This document discusses the transformation of public space with the rise of social media. It begins by reviewing classic concepts of the public sphere from thinkers like Habermas, Dewey, and Kant. It then acknowledges critiques of these ideals and proposes updated concepts must focus on inclusion, visibility, and spatial aspects across different media settings. The document examines how social media can democratize by amplifying visibility but also risks "siloization" as people tend to confirm existing views. It contrasts the potential for "smooth public spheres" online with efforts by governments, corporations, and institutions to impose "striated" controls. In the end, it argues the key issues are whether a coherent public sphere remains possible across fragmented media and the
Clay Shirky argues that changes in media change the nature of public arguments over time, with significant social and political effects. He focuses on how decentralized technologies like peer-to-peer networking, wireless connectivity, and open-source development enable new cooperative structures for getting things done as alternatives to traditional centralized institutions. Shirky believes groups tend to limit themselves, and that digital networks have increased the volume of ideas and arguments in circulation worldwide.
The document discusses issues around privacy, social media, and the changing boundaries between public and private information in the digital era. It notes that private information is increasingly shared publicly through platforms like Facebook and lifecasting, and that both corporations and governments are engaging in more surveillance. Questions are raised about how willing sharing of personal information online could impact individuals' reputations and about the degree to which social media has reshaped traditional concepts of public and private.
This document summarizes a presentation on updating Gene Sharp's 198 methods of nonviolent action for the digital age. It introduces the project to crowdsource enhancing the methods through online collaboration. Examples are given of how traditional methods like public speeches, mourning, and protests can be augmented with tools like hashtags, livestreaming, and check-ins. New digital methods are also proposed such as using maps, QR codes, and file-sharing. Concerns about online surveillance and censorship in repressive regimes are raised. Overall, the project aims to help activists utilize digital tools while considering context and security.
This document summarizes a study that compares the use of Facebook Groups and Causes as tools for cyberactivism in Chile and the Concepción area. The study aimed to determine if these applications are used for cyberactivism related to real-world issues and places in Chile. It also sought to identify trends in topics of discussion and whether there are correlations between topics discussed nationally and locally. The main findings were that Facebook is mainly used to strengthen existing social ties rather than create new connections, and that it allows for distributed organization without centralized control of information.
The document discusses several topics related to democracy and the internet, including how electronic technologies can impact private spaces and democratic rights, how online communities like Second Life and social media can promote activism and discussion, and debates around public versus private spheres in digital spaces. It also examines issues of surveillance, control of online spaces, and the potential for the internet to reinvigorate public discourse.
Network Society: A Presentation to the CMI Guernseyguernseywebdesign
The document provides an overview of a presentation on social media and the network society. The presentation covers several topics:
1. The history of networks from railroads in the 1800s to the development of the internet and social media.
2. A discussion on media convergence and Rupert Murdoch's influence over news production, distribution, and consumption.
3. How Barack Obama successfully used social media tools like Facebook and Twitter in his 2008 presidential campaign.
4. The role of social media in social changes in North Africa like the Arab Spring uprisings in Tunisia and Egypt.
5. Issues around who controls the internet and debate around western vs. Chinese influence online.
Suazo%2c martínez & elgueta english version2011990
This document summarizes a study that analyzed the use of Facebook Groups and Causes as tools for cyberactivism in Chile and the Concepción area. The study found that social networks mainly strengthen existing social ties rather than create new connections. It also found that Facebook's horizontal structure and lack of centralized control enables strong information sharing. Finally, the study aimed to determine if Groups or Causes were better for generating cyberactivism campaigns and setting independent social media agendas.
The document discusses various topics related to surveillance, including Jeremy Bentham's Panopticon model of surveillance, increased surveillance of both public and virtual spaces, and examples of creative practitioners using online strategies to critique surveillance and globalization. It also shares several news articles about issues like government censorship of Wikipedia, data breaches at the tax office, and a student cracking the government's internet porn filter.
Alter-globalization arises as a response to how globalization personally affects everyday people. As global processes impact individuals' cultural identity, jobs, family lives, and communication, people realize globalization can displace them. The movement protests how globalization corners democracy, culture, and the productive power of ordinary citizens. While global vs local describes globalization in media, a more accurate dichotomy is global vs personal, as what is most important and mobile for individuals are their own preferences and ability to connect to organizations protecting their needs. The internet, as a vast network, allows individuals worldwide influence to spread anti-globalization ideas.
New Media Activism - A Literature ReviewComDevGroup5
This document discusses new media activism and related topics. It defines new media activism as relying more on technology and being more geographically dispersed than traditional activism. It examines gender issues in new media activism and whether online or public sphere activism is more effective. It also discusses perspectives on intellectual property, surveillance, and hacktivism in the context of new media activism. The presentation aims to scrutinize the influence of the internet on activism and discuss how to effectively engage people in both online and public spheres of activism.
This is lecture 5 of a course on social media at the University of Winchester. This covers a brief overand history of blogs, microbloggs and Twitter, the public sphere and some of the research on # hastags and the consequences of using twitter.
This document discusses echo chambers and filter bubbles in the spread of fake news on social media. It examines whether these are man-made through human behavior or produced by algorithms. The document outlines two research questions: 1) How do algorithms that produce filter bubbles work? 2) What cognitive patterns do people exhibit when reacting to fake news that could lead to echo chambers? It then provides background on key terms and discusses theories of knowledge, information, and truth online before analyzing how social media algorithms rank content.
Towards Distributed Citizen Participation: Lessons from WikiLeaks and the Qu...Axel Bruns
This document discusses lessons for e-democracy from two case studies: WikiLeaks and the 2011 Queensland floods in Australia. It finds that both events saw rapid self-organization and participation on social media to share information and coordinate responses. Key lessons include keeping barriers to participation low, distributing across multiple platforms, allowing organic community structures to form, being useful to earn trust, and conceptualizing engagement as an ongoing series of focused events. Overall, the document argues these case studies demonstrate the potential for more distributed models of citizen participation online.
This paper intends to show a positive view on changes occurring in communities and social relationships in the age of the network society. With the emergence of new technologies, the meaning of “community” is changing from the traditional neighborhood community, to a group of people that are more tied together in terms of social networks, connected through various networks including computer networks. The hypothesis is that in such communities there are formations of weak ties that connect people with different social backgrounds or communities and thus bring in useful information and connections into one’s life. The effect of weak ties is also significant in process of innovations, which enables small contributions by a large number of people in order to complete a task or an event. Despite early criticism that network society would fragment social ties and families, this essay will explain the positive side of the changes.
1. Social media has impacted collective action under autocracies by faster information diffusion, changing the shape of connectivity networks, and (re)uniting or (re)segmenting audiences.
2. It allows for rapid many-to-many communication, complicating state efforts to suppress dissent through censorship or isolating protests.
3. However, social media does not guarantee unity - it can strengthen existing dynamics and polarization, with outcomes like civil war and brutal repression in some cases.
Slides for Guest Lecture Skype with COMM 4370 New Media Technologies and Communicationat Schreiner University, February 28, 2013. Focuses on the role of the Internet and social media in democracy, protest, activism, and social change.
New media and old media are converging, allowing us to interact with both simultaneously. While we still engage with traditional media like TV and books, we now do so while also commenting on social media. This convergence has democratized the media by allowing anyone to produce and share content online, giving equal opportunity for exposure compared to traditional gatekept media. Citizen journalism and user-generated content have grown with sharing of photos and videos on sites like YouTube, though traditional edited news still dominates.
The document discusses challenges with using blogs and online forums to facilitate public consultation and debate on controversial issues. It notes that the government's Digital Economy Blog attracted criticism and discussion that strayed from selected topics. It also discusses options for designing online deliberative spaces and tools to better enable civil debate on the topic of digital images of young people, including research archives, citizen juries, moderated discussions, and citizen-drafted policy summaries.
This document discusses how digital technologies and social media have transformed the news landscape. It notes that smartphones and tablets have become very common, allowing people to instantly capture and share information. Studies found that most Americans now get news online or through social media. The document discusses how social media played an important role in spreading information about the 2008 Sichuan earthquake in China, with people on the ground sharing updates that spread faster than official reports. Social media allows for more interactive news and can help with humanitarian efforts during crises.
"Online activism in latin america" - Presentation by Bert Hoffmann at FoME 2012 Symposium in Berlin. http://forum-medien-entwicklung.de
(c) Bert Hoffmann, 2012
CC 2.0 BY NC (de)
The document discusses models of citizen consultation in Australian politics, including top-down government-run initiatives, bottom-up non-government organization (NGO)-run initiatives, and individual social media accounts. It analyzes examples like the Digital Economy blog launched by the Australian government and GetUp!'s Project Democracy site. It also examines politicians' use of social media and the potential for and challenges of direct engagement between citizens and their representatives online.
Understanding personal privacy in the age of big online dataMathieu d'Aquin
The document discusses the challenges of privacy in the age of big online data. It reviews experts' definitions of privacy as control over personal information. Regulations like the EU Data Protection Directive establish principles of transparency, legitimate purpose, and consent in data collection and processing. The concept of "social translucence" is introduced as making information flows and activities visible. Technological challenges in ensuring privacy include data fragmentation, user identification across systems, and limitations of data analysis at large scales. Semantic web technologies and reasoning approaches show promise in addressing some challenges through interoperability, collection proxies, and modeling access policies.
Keynote: The Future Internet [Dewandre] :: SESERV Workshopictseserv
This document discusses the societal impact of digital technologies and policies. It outlines two lessons learned from sustainable development: integration and diversity, as well as the link between science and policy. The digital transition brings changes to human/technology/nature relationships and challenges of scarcity/abundance and reality/virtuality. Public sectors are expected to balance classic and radical approaches, and foster interoperability between organizations, individuals, policies and scientific disciplines. Collective learning and digital social sciences are needed to understand and sustain smart synthesis regarding these issues.
When communication innovations lead to social exclusionPetr Lupac
1) The document summarizes research on the digital divide conducted between 2006-2013. It analyzed over 900 articles on the topic and identified patterns in the arguments.
2) A key finding is that an unequal access to the Internet is a new source of social inequality that requires intervention. However, the benefits of Internet access are dependent on existing offline resources and may be irrelevant or detrimental for some.
3) Non-users are often blamed individually rather than considering the systemic factors involved. The digital divide policies aim to create a perfectly connected digital society but could be viewed as a cultural project.
This document summarizes a study that compares the use of Facebook Groups and Causes as tools for cyberactivism in Chile and the Concepción area. The study aimed to determine if these applications are used for cyberactivism related to real-world issues and places in Chile. It also sought to identify trends in topics of discussion and whether there are correlations between topics discussed nationally and locally. The main findings were that Facebook is mainly used to strengthen existing social ties rather than create new connections, and that it allows for distributed organization without centralized control of information.
The document discusses several topics related to democracy and the internet, including how electronic technologies can impact private spaces and democratic rights, how online communities like Second Life and social media can promote activism and discussion, and debates around public versus private spheres in digital spaces. It also examines issues of surveillance, control of online spaces, and the potential for the internet to reinvigorate public discourse.
Network Society: A Presentation to the CMI Guernseyguernseywebdesign
The document provides an overview of a presentation on social media and the network society. The presentation covers several topics:
1. The history of networks from railroads in the 1800s to the development of the internet and social media.
2. A discussion on media convergence and Rupert Murdoch's influence over news production, distribution, and consumption.
3. How Barack Obama successfully used social media tools like Facebook and Twitter in his 2008 presidential campaign.
4. The role of social media in social changes in North Africa like the Arab Spring uprisings in Tunisia and Egypt.
5. Issues around who controls the internet and debate around western vs. Chinese influence online.
Suazo%2c martínez & elgueta english version2011990
This document summarizes a study that analyzed the use of Facebook Groups and Causes as tools for cyberactivism in Chile and the Concepción area. The study found that social networks mainly strengthen existing social ties rather than create new connections. It also found that Facebook's horizontal structure and lack of centralized control enables strong information sharing. Finally, the study aimed to determine if Groups or Causes were better for generating cyberactivism campaigns and setting independent social media agendas.
The document discusses various topics related to surveillance, including Jeremy Bentham's Panopticon model of surveillance, increased surveillance of both public and virtual spaces, and examples of creative practitioners using online strategies to critique surveillance and globalization. It also shares several news articles about issues like government censorship of Wikipedia, data breaches at the tax office, and a student cracking the government's internet porn filter.
Alter-globalization arises as a response to how globalization personally affects everyday people. As global processes impact individuals' cultural identity, jobs, family lives, and communication, people realize globalization can displace them. The movement protests how globalization corners democracy, culture, and the productive power of ordinary citizens. While global vs local describes globalization in media, a more accurate dichotomy is global vs personal, as what is most important and mobile for individuals are their own preferences and ability to connect to organizations protecting their needs. The internet, as a vast network, allows individuals worldwide influence to spread anti-globalization ideas.
New Media Activism - A Literature ReviewComDevGroup5
This document discusses new media activism and related topics. It defines new media activism as relying more on technology and being more geographically dispersed than traditional activism. It examines gender issues in new media activism and whether online or public sphere activism is more effective. It also discusses perspectives on intellectual property, surveillance, and hacktivism in the context of new media activism. The presentation aims to scrutinize the influence of the internet on activism and discuss how to effectively engage people in both online and public spheres of activism.
This is lecture 5 of a course on social media at the University of Winchester. This covers a brief overand history of blogs, microbloggs and Twitter, the public sphere and some of the research on # hastags and the consequences of using twitter.
This document discusses echo chambers and filter bubbles in the spread of fake news on social media. It examines whether these are man-made through human behavior or produced by algorithms. The document outlines two research questions: 1) How do algorithms that produce filter bubbles work? 2) What cognitive patterns do people exhibit when reacting to fake news that could lead to echo chambers? It then provides background on key terms and discusses theories of knowledge, information, and truth online before analyzing how social media algorithms rank content.
Towards Distributed Citizen Participation: Lessons from WikiLeaks and the Qu...Axel Bruns
This document discusses lessons for e-democracy from two case studies: WikiLeaks and the 2011 Queensland floods in Australia. It finds that both events saw rapid self-organization and participation on social media to share information and coordinate responses. Key lessons include keeping barriers to participation low, distributing across multiple platforms, allowing organic community structures to form, being useful to earn trust, and conceptualizing engagement as an ongoing series of focused events. Overall, the document argues these case studies demonstrate the potential for more distributed models of citizen participation online.
This paper intends to show a positive view on changes occurring in communities and social relationships in the age of the network society. With the emergence of new technologies, the meaning of “community” is changing from the traditional neighborhood community, to a group of people that are more tied together in terms of social networks, connected through various networks including computer networks. The hypothesis is that in such communities there are formations of weak ties that connect people with different social backgrounds or communities and thus bring in useful information and connections into one’s life. The effect of weak ties is also significant in process of innovations, which enables small contributions by a large number of people in order to complete a task or an event. Despite early criticism that network society would fragment social ties and families, this essay will explain the positive side of the changes.
1. Social media has impacted collective action under autocracies by faster information diffusion, changing the shape of connectivity networks, and (re)uniting or (re)segmenting audiences.
2. It allows for rapid many-to-many communication, complicating state efforts to suppress dissent through censorship or isolating protests.
3. However, social media does not guarantee unity - it can strengthen existing dynamics and polarization, with outcomes like civil war and brutal repression in some cases.
Slides for Guest Lecture Skype with COMM 4370 New Media Technologies and Communicationat Schreiner University, February 28, 2013. Focuses on the role of the Internet and social media in democracy, protest, activism, and social change.
New media and old media are converging, allowing us to interact with both simultaneously. While we still engage with traditional media like TV and books, we now do so while also commenting on social media. This convergence has democratized the media by allowing anyone to produce and share content online, giving equal opportunity for exposure compared to traditional gatekept media. Citizen journalism and user-generated content have grown with sharing of photos and videos on sites like YouTube, though traditional edited news still dominates.
The document discusses challenges with using blogs and online forums to facilitate public consultation and debate on controversial issues. It notes that the government's Digital Economy Blog attracted criticism and discussion that strayed from selected topics. It also discusses options for designing online deliberative spaces and tools to better enable civil debate on the topic of digital images of young people, including research archives, citizen juries, moderated discussions, and citizen-drafted policy summaries.
This document discusses how digital technologies and social media have transformed the news landscape. It notes that smartphones and tablets have become very common, allowing people to instantly capture and share information. Studies found that most Americans now get news online or through social media. The document discusses how social media played an important role in spreading information about the 2008 Sichuan earthquake in China, with people on the ground sharing updates that spread faster than official reports. Social media allows for more interactive news and can help with humanitarian efforts during crises.
"Online activism in latin america" - Presentation by Bert Hoffmann at FoME 2012 Symposium in Berlin. http://forum-medien-entwicklung.de
(c) Bert Hoffmann, 2012
CC 2.0 BY NC (de)
The document discusses models of citizen consultation in Australian politics, including top-down government-run initiatives, bottom-up non-government organization (NGO)-run initiatives, and individual social media accounts. It analyzes examples like the Digital Economy blog launched by the Australian government and GetUp!'s Project Democracy site. It also examines politicians' use of social media and the potential for and challenges of direct engagement between citizens and their representatives online.
Understanding personal privacy in the age of big online dataMathieu d'Aquin
The document discusses the challenges of privacy in the age of big online data. It reviews experts' definitions of privacy as control over personal information. Regulations like the EU Data Protection Directive establish principles of transparency, legitimate purpose, and consent in data collection and processing. The concept of "social translucence" is introduced as making information flows and activities visible. Technological challenges in ensuring privacy include data fragmentation, user identification across systems, and limitations of data analysis at large scales. Semantic web technologies and reasoning approaches show promise in addressing some challenges through interoperability, collection proxies, and modeling access policies.
Keynote: The Future Internet [Dewandre] :: SESERV Workshopictseserv
This document discusses the societal impact of digital technologies and policies. It outlines two lessons learned from sustainable development: integration and diversity, as well as the link between science and policy. The digital transition brings changes to human/technology/nature relationships and challenges of scarcity/abundance and reality/virtuality. Public sectors are expected to balance classic and radical approaches, and foster interoperability between organizations, individuals, policies and scientific disciplines. Collective learning and digital social sciences are needed to understand and sustain smart synthesis regarding these issues.
When communication innovations lead to social exclusionPetr Lupac
1) The document summarizes research on the digital divide conducted between 2006-2013. It analyzed over 900 articles on the topic and identified patterns in the arguments.
2) A key finding is that an unequal access to the Internet is a new source of social inequality that requires intervention. However, the benefits of Internet access are dependent on existing offline resources and may be irrelevant or detrimental for some.
3) Non-users are often blamed individually rather than considering the systemic factors involved. The digital divide policies aim to create a perfectly connected digital society but could be viewed as a cultural project.
Optimizing interconnectivity inhabiting virtual cities of common practiceJonathan Buffa
This document discusses the design of online social environments and virtual communities. It argues that online spaces should be designed as social technologies that facilitate human interaction, rather than just as tools for sharing information. The author proposes using the city as a metaphor to think about designing virtual spaces, and discusses how identity formation works differently online compared to in-person due to the lack of physical cues. The document outlines the author's thesis, which develops approaches for creating online spaces that better support social interaction and the communication of identity through visualization tools and information architectures.
The document describes an agent-based computer simulation that models online social network formation and privacy behaviors, finding that two stable configurations emerge - many small isolated social networks or a single large network, and that privacy settings evolve based on connectivity and openness over time, potentially leading to periods where privacy is more important again after initial openness.
The document discusses the evolution of the social web and internet of things. It describes how early giants like Google harnessed collective intelligence by treating every link as a vote. It also discusses concepts like ubiquitous computing, the internet of things, and how technologies are aiming to make the human and natural environment legible to computers. However, others argue this could diminish the distinct competencies of humans and machines. The document advocates for an internet of people that enhances lives through open collaboration. Affect and emotion may serve as connection points between individuals and their environment in a networked future.
An Essay On Social Implications Of The Internet And Social MediaMartha Brown
The Internet began as a project of the U.S. Department of Defense but was commercialized in the 1990s, spreading rapidly worldwide. While some argue it increases isolation, research finds that the Internet and social media increase sociability by allowing constant global communication and forming online communities. The network society is now based on personal networks powered by digital connections. Though online relationships differ from in-person, studies show that Internet and social media users actually have more social interactions and capital offline. While online communication raises issues when translating to real-life, overall the Internet seems to supplement and extend social contact rather than replace intimacy.
Social Media: Digital Content Creation & Sharing - Symposium Nov 2010Middlesex University
This document summarizes a research study investigating how three age groups (18-28, 40-50, 65-75) create and share digital content online. The study will use qualitative methods including questionnaires, interviews, and an online forum to examine differences in digital literacy and content creation across age groups.
Presentazione di Paolo Massa nell'ambito del Seminario residenziale “L’approccio territoriale tra aiuto e crescita” - 22-23 giugno 2012 - Villa Flangini - Asolo - Organizzato dal SerAT (Servizio Alcologia e Tabagismo Ulss 8)
Con il contributo di ACAT-ULSS 8 onlus e Cooperativa Sonda. Con il patrocinio di Alcologia Ecologica
Learning in, with and for the Social WebJan Schmidt
Dr. Jan-Hinrik Schmidt presents on learning in, with and for the Social Web. The document discusses how the Social Web is changing practices of identity management, relationship management and information management for digital natives. It also explores how the Social Web is blurring distinctions between public and private spheres by enabling new types of personal networks and information flows. Finally, the document outlines some consequences including the need for media literacy and political participation to navigate these changes.
Imageability today. Telling stories in images.
In the context of this conference, my talk will not be about the representation of the image, but about the imageability of digital images. I’m particularly interested in what actually takes place inside the image and how this affects the value of the image – so not what is the story of image but what is the story in images. Storytelling here is no longer telling stories in a narrative way, but rather storytelling as an abstracted form that creates shifts in agency, which I will argue is constructed by human-machine relationships. It is clear that today’s images are not made through light and chemical processes anymore, and while even those materials could be used and manipulated in various ways to show or hide certain things, what happens when more and more images are made by webcams, satellites, security cameras, traffic cops, eBay sellers, Google StreetView cars, and tourists on a quest for the exact same photograph? Or, as Trevor Paglan mentioned, when referring to machine-vision, what happens when “the overwhelming majority of images are now made by machines for other machines, with humans rarely in the loop” [Invisible Images (Your Pictures Are Looking at You), 2016].
In this new ecology of images, the actual taking of a photograph –if that is still the case– is merely one step in a long chain of abstractions in which the image is manipulated, recontextualized, sometimes in combinations with other images, at times these processes happen in unpredictable or irreverent ways. In other words, where does the image begin and end? While there is an over-abundance of photos and images around today, I will highlight 3 different positions that I think are crucial when discussing these specific aspects of contemporary images, and show how they relate to storytelling. This is an abstracted sense of storytelling taking place below the surface, while different narratives start to emerge. First, the digital as a tool in which traditional models of institutional cultural authority and disciplinary expertise still rule, here a digital image emphasizes but also questions the power of the original image through different modes of circulation; Secondly, the effect of optimization or automatic evaluation of image content in semi-automated algorithms; and related to that 3. The construction of value through machine vision [obscure algorithmic processes].
1. Contemporary social theories describe how digital technologies have shifted communication away from traditional face-to-face and print media towards functions like social media that follow an escalating logic and erase humanism.
2. The rise of social software, open access, and just-in-time knowledge enabled by the internet challenges traditional structures of gathering and sharing knowledge by allowing information to be more freely distributed and accessed.
3. However, merely distributing information does not necessarily lead to growth of knowledge, as knowledge requires information to be meaningfully modeled and analyzed rather than just believed. The internet allows "downloadable beliefs" but risks knowledge being reduced to beliefs without justification.
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, ConnectedDachis Group
1) Volatile change is creating risks and opportunities that require navigating big transitions through new digital capabilities that enable connection.
2) Examples like NATO's policy jam show how distributed networks can create shared knowledge to inform decisions.
3) The shift is occurring in three waves: infrastructure, knowledge flows, and institutions, moving power to citizens, employees, and consumers.
4) A resilient state improves connection between distributed expertise, manages transitions, renews self-government, and redefines the center-edge relationship.
This document summarizes a research article about the effect of social media on identity construction. The article explores how social media platforms allow people to showcase their experiences and reflect various dimensions of their social lives. It analyzes how individuals feel the need to create virtual identities and experiment with identity expression online. The document also discusses how social networks and virtual communities emerging on these platforms take on social and cultural qualities.
The document discusses the concept of cyberbalkanization, where internet users seek out only like-minded groups and avoid exposure to alternative views. This fragmentation is caused by both autonomous factors like personalized news feeds and heteronomous factors like opaque algorithmic filtering. Some political consequences of cyberbalkanization include the formation of echo chambers, group polarization, and the spread of unchecked information. This undermines the democratic goal of a diverse public discourse and exchange of ideas. While technology is not inherently good or bad, evidence suggests current systems can fragment online discussions and limit exposure to differing perspectives.
Structure for Collective Learning Organizations Version 5Jaap van Till
The document discusses how traditional hierarchical organizations are no longer effective for dealing with today's complex environments. It suggests nature and evolution provide examples of how living systems solve similar problems through distributed and interconnected structures. Specifically, it notes that organisms like slime molds, bacteria colonies, and the human brain function collectively without centralized control by sharing information through interconnected networks of individual parts. The human brain in particular handles patterns of information rather than raw data, using interconnected areas to process visual information in parallel through techniques like edge detection and movement detection.
Social capital and virtual communitiesMiia Kosonen
This document discusses social capital and virtual communities. It defines social capital as the resources available through social networks, including trust, norms, and information sharing. Virtual communities are groups of people who interact online through repeated contact on a shared platform. Prior research indicates that social capital can exist in online communities through networks, norms, and volunteerism. However, more research is needed on how technology and social processes can encourage active participation and community commitment. The author plans to study several online gaming and interest-based communities to understand how site features and social interactions influence social capital building. Preliminary results suggest subgroups, norms, identity policies, and recognition contribute to successful communities for social activity focused on shared interests.
Similar to Participatory surveillance and privacy negotiation in social media (20)
Elinor Wahal - Amazon Mechanical Turk: Structure et fonctionnement de la plat...Bodyspacesociety Blog
Intervention d'Elinor Wahal (Università di Trento/EHESS) dans le cadre du séminaire #ecnEHESS "Etudier les Cultures du Numériques" d'Antonio Casilli, EHESS, Paris, 7 mars 2016.
Jérôme Denis - Avant le déluge : le travail invisible des donnéesBodyspacesociety Blog
Intervention de Jérôme Denis (Télécom ParisTech) dans le cadre du séminaire #ecnEHESS "Etudier les Cultures du Numériques" d'Antonio Casilli, EHESS, Paris, 7 mars 2016.
Enchères en temps réel et données personnelles : une expérimentationBodyspacesociety Blog
Intervention de Martin Quinn (Télécom ParisTech CVPIP) et Vincent Toubiana (CNIL) dans le séminaire EHESS d'Antonio Casilli "Etudier les cultures du numérique (Ce que les plateformes numériques font au travail)" 04.01.2016
“Combien vaut un clic ? Données, industries culturelles, plateformes”Bodyspacesociety Blog
Slides de la présentation de Geoffrey Delcroix (CNIL) dans le cadre du séminaire EHESS d'Antonio Casilli "Etudier les cultures du numérique" (Ce que les plateformes numériques font au travail) #ecnEHESS 04.01.2016
L'Economie collaborative - Séminaire EHESS Benjamin Tincq, Arthur de GraveBodyspacesociety Blog
Intervention de Benjamin Tincq et Arthur de Grave dans le cadre du séminaire EHESS d'Antonio A. Casilli "Etudier les cultures du numérique" (16 février 2015)
Intervention d'Irène BASTARD et Christophe PRIEUR lors du séminaire EHESS "Étudier les cultures du numérique" animé par Antonio A. CASILLI. 15 déc 2014.
Anne Dalsuet "Y a-t-il une philia numérique ?" (notes 16 déc. 2013)Bodyspacesociety Blog
Intervention du 16 décembre 2013. Anne Dalsuet au séminaire EHESS d'Antonio A. Casilli « Étudier les cultures du numérique : approches théoriques et empiriques »
Paola Tubaro ANAMIA INSNA Sunbelt2014 St. Pete's Beach FL 22.02.2014Bodyspacesociety Blog
This document discusses body image and eating disorders behaviors and the effects of personal networks. It summarizes research on how personal networks can influence individuals' perceptions of their own body image. The study uses survey data from 284 individuals with eating disorders to analyze their ego-centric networks and relate network features to discrepancies between self-perceived, ideal, and perceived-by-others body images. The results suggest that network structure, composition, and relational proximity influence body image distortions, especially for overweight individuals. Characteristics like gender heterogeneity, medical treatment, age, and sports activity were also found to impact body image gaps.
"Visualisations de données et étude des communautés en ligne : le cas du web des troubles alimentaires" : présentation lors des journées d'étude 'Rendre sensible, rendre visible. Pour une cartographie des formes'.
The document discusses social networks, complexity, and privacy. It begins by exploring how social network analysis can be used to represent human groups as networks of nodes (individuals) and ties (relationships). It then examines how computer-mediated interactions may be changing the structure of human networks, with findings that online networks today have four degrees of separation versus six in the past. The document also discusses using agent-based modeling to simulate social systems and emergence of behaviors from simple rules. Finally, it raises issues around privacy in social media and debates around whether privacy is ending due to people oversharing online versus still valuing privacy controls.
Antonio CASILLI - Le rôle des visualisations de données dans la recherche sur...Bodyspacesociety Blog
Slides de la première séance 2013/14 su séminaire EHESS d'Antonio A. Casilli "Étudier les cultures du numérique : approches théoriques et empiriques" (18 nov. 2013).
Visualizing personal network data. Examples from a study on EDs websitesBodyspacesociety Blog
Presentation by Antonio A. Casilli and Paola Tubaro of the data visualization tools developed for the ANAMIA research project (ANR-09-ALIA-001). CBNA Seminar, Hamilton House, University of Greenwich, London. 18 November 2013.
Antonio CASILLI - Régimes de production des visualisations de donnéesBodyspacesociety Blog
Slides de la conférence 'Régimes de production des visualisation de données : un regard critique' d'Antonio A. Casilli (ParisTech/EHESS) dans le cadre de l’Action Nationale de Formation (ANF) "Visualiser les données de la recherche en SHS : un nouvel horizon pour les humanités numériques ?" (24 septembre 2013).
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.