In mid 2012 the highest court in Russia ruled against gay pride parades in Moscow for the next 100 years. In 2013 a federal bill banned the distribution of "propaganda of non-traditional sexual relations" to minors. Homophobia thrives not just at legal and political levels but is widespread among the general population; according to a 2013 survey 74% believe that homosexuality should not be accepted by society. As gay teens struggle to find support in public space they increasingly find affirmation online, in closed groups like Deti-404 (The Observer, 2013).
Meanwhile, Chelsea Manning, at the centre of a WikiLeaks scandal in 2010, has come out as transgender and has requested that ‘starting today you refer to me by my new name and use the feminine pronoun’ (press release, Aug 22, 2013). Chelsea Manning is currently serving 35 years in a male prison facility where she has been informed that the army will not support hormone therapy or sex-reassignment therapy.
As surveillance of everyday engagement online is increasingly acknowledged by government and private enterprise (including Google’s gmail service) and young people around the world are being alerted to the dangers of cyber-bullying and online predators, how are social perceptions of privacy and safety shifting? Is a closed group on ‘VK’ (the second biggest social network service in Europe, after Facebook) private enough to provide assurance to young queer Russians? Where will Chelsea seek affirmation with restricted online access in a male prison? Can the Dark Web provide an alternative for subaltern publics? Or does the technical expertise and tenacity required to access these spaces of supposedly amplified security make them unattainable for disenfranchised minorities?
This paper draws on current case studies to explore shifting understandings of privacy and networked identity work in cultures where public expression of queer sexuality remains taboo.
These are my slides from the Internet Researcher's Conference (#IR15.0) in Daegu, Korea in October 2014... you can read more about it at my research blog over at www.incitestories.com.au
1) While early views saw CMC as gender-neutral due to anonymity, research found gender differences persist both in asynchronous and synchronous communication.
2) Studies found women tended to use more polite, aligned language while men used assertive, adversarial styles. Women were also more likely to leave hostile groups.
3) Even with anonymity, gender is revealed through linguistic styles. Pseudonyms also failed to fully hide gender over time.
4) The document discusses implications including women preferring private email over public forums, and controlled-access groups growing in popularity.
Digital Sociology: Making the Digital Central to Sociological ResearchJessie Daniels
Digital sociology examines how digital technologies influence society and should be central to sociological research. The document outlines the history and development of digital sociology from the 1990s to present. Key areas that digital sociology can influence include theoretical approaches, research methods, and understanding how digital media impacts issues like hate groups, incarceration, health, and education. Digital sociology is still emerging but growing rapidly in relevance and importance given society's increasing digitalization.
The document discusses methods for analyzing how communication ties between nations change over time and whether they become more homogeneous or heterogeneous. Statistical analysis of international telephony data from 1989 to 1999 found increasing clustering of nations with similar cultural and linguistic attributes, indicating growing homogeneity in telecommunicative space. A few exceptions were the Arabic and Islamic areas, which showed less connection between similar nations, potentially signifying loss of local ties. Overall, the findings provide evidence that countries of a common heritage are more likely to communicate with each other over time.
This document summarizes Sarah Fihe's presentation at the 4th Annual VCARA Conference on preserving history through digital stewardship and knowledge dissemination in the 21st century. It discusses how social media like blogs, personal websites, and social network feeds are preserving personal histories in new ways. It also notes that the Library of Congress has received over 400 requests to use its archive of public tweets since acquiring it in 2010. Finally, it concludes that social networks now provide real-time news and are an important part of recording social history, but their content is vulnerable to constant change on the internet.
This document summarizes a study investigating online communication and attitudes towards Islam within online communities. The study used grounded theory to analyze comments from various online forums, social media sites, and news articles. Three main themes emerged from the analysis: 1) the formation of and exclusion from online communities centered around anti-Islamic views, 2) the tendency for arguments across platforms to utilize multiple approaches to justify rejecting others' beliefs, and 3) how intelligence is used to justify rejecting Islamic beliefs and actions. A sub-theme found comments mirroring previous research that Muslims are often portrayed negatively in British media.
These are my slides from the Internet Researcher's Conference (#IR15.0) in Daegu, Korea in October 2014... you can read more about it at my research blog over at www.incitestories.com.au
1) While early views saw CMC as gender-neutral due to anonymity, research found gender differences persist both in asynchronous and synchronous communication.
2) Studies found women tended to use more polite, aligned language while men used assertive, adversarial styles. Women were also more likely to leave hostile groups.
3) Even with anonymity, gender is revealed through linguistic styles. Pseudonyms also failed to fully hide gender over time.
4) The document discusses implications including women preferring private email over public forums, and controlled-access groups growing in popularity.
Digital Sociology: Making the Digital Central to Sociological ResearchJessie Daniels
Digital sociology examines how digital technologies influence society and should be central to sociological research. The document outlines the history and development of digital sociology from the 1990s to present. Key areas that digital sociology can influence include theoretical approaches, research methods, and understanding how digital media impacts issues like hate groups, incarceration, health, and education. Digital sociology is still emerging but growing rapidly in relevance and importance given society's increasing digitalization.
The document discusses methods for analyzing how communication ties between nations change over time and whether they become more homogeneous or heterogeneous. Statistical analysis of international telephony data from 1989 to 1999 found increasing clustering of nations with similar cultural and linguistic attributes, indicating growing homogeneity in telecommunicative space. A few exceptions were the Arabic and Islamic areas, which showed less connection between similar nations, potentially signifying loss of local ties. Overall, the findings provide evidence that countries of a common heritage are more likely to communicate with each other over time.
This document summarizes Sarah Fihe's presentation at the 4th Annual VCARA Conference on preserving history through digital stewardship and knowledge dissemination in the 21st century. It discusses how social media like blogs, personal websites, and social network feeds are preserving personal histories in new ways. It also notes that the Library of Congress has received over 400 requests to use its archive of public tweets since acquiring it in 2010. Finally, it concludes that social networks now provide real-time news and are an important part of recording social history, but their content is vulnerable to constant change on the internet.
This document summarizes a study investigating online communication and attitudes towards Islam within online communities. The study used grounded theory to analyze comments from various online forums, social media sites, and news articles. Three main themes emerged from the analysis: 1) the formation of and exclusion from online communities centered around anti-Islamic views, 2) the tendency for arguments across platforms to utilize multiple approaches to justify rejecting others' beliefs, and 3) how intelligence is used to justify rejecting Islamic beliefs and actions. A sub-theme found comments mirroring previous research that Muslims are often portrayed negatively in British media.
Mobile Social Media in Social Internations FINAL PAPERKelsey Harris
This study used applied behavior analysis to reduce a participant's use of mobile social media applications during social interactions. During the baseline period, the participant recorded their normal social media usage. In the intervention, the participant's phone was kept out of sight during interactions and $1 was added to a bag for every time social media was accessed. This immediately decreased social media usage during interactions from the baseline. The results suggest mobile social media use during social interactions can be reduced through behavioral techniques.
Effect of technology on personal communicationAbid Momand
The document discusses the undesirable effects of technology on personal communication. While technology has enabled new forms of communication, it has negatively impacted valuable in-person interactions. Face-to-face communication is more effective than electronic communication as it allows people to connect on a deeper level through body language, facial expressions, and empathy. Several studies have shown that as internet and technology use increases, time spent socializing in person decreases, and empathy and social skills among youth have declined. True emotional support and meaningful exchanges of information require in-person communication that virtual interactions cannot replace.
The document summarizes research on female use of entertainment technology compared to males. It finds that while females are more likely to use communication technologies like email, males engage with social media and online communities more. A study was conducted using an anonymous online survey of Facebook users and forum members, and found that males scored higher in most areas of social technology use. However, females engaged more with Neopets, while males preferred PC games. Overall the research suggests technology is still perceived as a masculine domain and female mastery is limited by a lack of relatable entertainment venues exemplifying femininity.
Esten OAH18: Digital Public Humanities for HistoriansEmilyEsten
The document discusses digital public humanities for historians. It defines digital public humanities as using digital humanities tools and methods to make the humanities accessible to public audiences. A framework for digital public humanities centers the public, has a critical, artistic, and research side, and engages with technology appropriately. For historians, digital public humanities builds on digital history by facilitating interdisciplinary conversations and flipping the viewpoint from input to output. It also exposes graduate students in history to the limits of the discipline and how to make contributions as a 21st century scholar.
The document discusses analyzing communication flows between nations from 1989-1999 to see if nations that share cultural or civilizational characteristics communicate more with each other. It uses data on international telephone traffic between 107 nations to create "telecommunicative neighbor" networks based on which countries send at least 5% of their traffic to each other. Statistical analysis using Moran's I shows an increasing tendency over time for countries with similar languages, religions, or civilizations to cluster together in telecommunicative space, providing evidence for heterogenization.
Journal of social and personal relationships 2004-chan-305-20Raluca Vas
The document compares the qualities of offline and online friendships at different stages of relationship development. It finds that offline friendships have higher levels of interdependence, depth, understanding and other qualities compared to online friendships. However, the differences between offline and online friendships diminish as the duration of the relationships increase. Additionally, contrary to evidence for offline relationships, qualities of cross-sex online friendships were found to be higher than same-sex online friendships. The study suggests that structural and normative constraints that influence offline relationships may be different for online relationships.
1. The document discusses computer-mediated communication (CMC) and how it has influenced relationship formation and online identities. Early CMC included email and online forums.
2. Research on CMC examined how online communities and social networks develop through identity presentation and relationship building. However, CMC lacks the richness of in-person interaction and can blur reality and fantasy.
3. The spread of internet memes is also discussed in the context of CMC. Memes spread and evolve through imitation, similar to genes, as they compete for attention online.
The document defines cyberbullying as the willful use of electronic communication to harass or threaten others repeatedly. It describes how cyberbullying differs from traditional bullying in that bullies have greater access to victims, audiences can grow rapidly online, and anonymity may enable harsher bullying. The document recommends that victims report abusive behavior to websites and seek help from parents and teachers rather than respond to bullies themselves.
1. CMC has influenced relationship formation by allowing people to connect globally at all hours but relationships may not be genuine since identity is unknown.
2. A visualization of social networks would show weak communication patterns for the individual since they prefer texting over social media and only share videos, news, and images rather than build relationships.
3. The individual's favorite internet meme is the ongoing rapper feud between Drake and Meek Mill which has produced many memes and possibly transfers cultural views by influencing opinions of Meek Mill through the memes that side with the winning Drake.
Internet & Social Life Zineb Boukilizinebboukili
This document discusses research on the social impacts of internet use. It finds that while the internet increases connectivity, it can also weaken community ties and interpersonal relationships by replacing face-to-face interactions. Additionally, the anonymity of the internet facilitates behaviors like pornography, crime, and the expression of taboo ideas. However, the internet also allows people to connect with others who share interests and identities, and can help those with stigmatized identities feel less isolated. Overall, the internet both positively and negatively impacts social interactions and relationships.
Exploring addiction to social networking service among young Chinese adultsDigital Society
This document outlines a research proposal to examine addictive tendencies of using social networking sites (SNS) among Chinese young adults. The study aims to explore how specific activities on SNS correlate with addiction and examine psychological dependence. A literature review discusses factors influencing SNS use such as feedback received and virtual interactions. The methodology will use quantitative surveys of SNS usage patterns and perceptions of addiction administered to university students in China. Hypotheses predict more responses/comments and interactions will correlate with increased addiction.
In search of a better understanding of social presence: An investigation into...Patrick Lowenthal
This document summarizes a study that analyzed how researchers define social presence in highly cited social presence research. The study found that the most common definitions referred to social presence as being salient, being real, or being there. Specifically, 36% of definitions described social presence as the degree of salience between communicators, 38% defined it as the degree to which a person is perceived as real, and additional definitions focused on feelings of connection, belonging, or being present. While many definitions referenced the Community of Inquiry framework, the study found there is still variability in how social presence is conceptualized among researchers.
This document provides an overview of a research project studying college students' use of social networking sites like MySpace and Facebook for networking and communication. It defines blogs and the most popular social networking sites. Previous research on related topics like self-presentation, relationship formation, and virtual communities is summarized. Issues around free speech and privacy are discussed. The goal is to research whether social networking sites are effective means of interpersonal communication for college students and address a gap in previous research.
This document discusses social network analysis and provides examples of social networks. It begins by defining what a social network is - a set of nodes connected by edges that can represent people and their relationships. It then provides examples of social networks from different domains like disease transmission, collaboration networks, and online networks. Key concepts in social network analysis like centrality, clustering, distance, and community structure are introduced. The document emphasizes that network structure can influence outcomes more than individual traits and discusses using network analysis to understand topics like information diffusion and disease spread.
Exploring Addiction to Social Networking Service among Young Chinese AdultsDigital Society
This document outlines a proposed study on addiction to social networking sites among young Chinese adults. The study would examine college students' usage of popular SNSs in China and their potential psychological dependence. A literature review discusses research on SNS addiction and factors that could influence it, such as feedback received, interactions, and loneliness. The proposed methodology involves a quantitative survey measuring SNS activities and perceptions of addiction. Hypotheses predict greater addiction risk from more responses to posts and interactions. The schedule outlines drafting the survey, data collection and analysis, and thesis writing from January to June.
This document summarizes a study on the demographics of social media users. It discusses how personality traits like extroversion and openness impact social media use, with extroverts and those open to new experiences being more likely to use social media. It also overviewed different types of specialized social networking sites for different races, ethnic groups, and interests. Major social networks like LinkedIn, Facebook, and Twitter were examined along with their target demographics. The study was conducted through an online survey of 3,000 participants and analyzed 340,000 online friendships and 200,000 interpersonal messages.
How journalists can improve online discourse with the audience. Presentation given at 2015 Excellence in Journalism conference in Orlando, FL on September 18, 2015
This document summarizes a research article about the effect of social media on identity construction. The article explores how social media platforms allow people to showcase their experiences and reflect various dimensions of their social lives. It analyzes how individuals feel the need to create virtual identities and experiment with identity expression online. The document also discusses how social networks and virtual communities emerging on these platforms take on social and cultural qualities.
Research Proposal : Political Representation of Different types of voters on ...Joshua Wong
This document proposes research on political representation of different voter types on Facebook. It will examine which voter types (defined by gender and ethnicity) are more politically engaged on Facebook by analyzing interactions with UK politicians' Facebook pages around the Brexit referendum. The literature review discusses research on factors influencing political engagement by gender and ethnicity both online and offline. The proposed data collection will categorize Facebook users and count their likes, comments and replies to politician posts to measure political representation. The research aims to provide insight into how well Facebook captures diverse political preferences.
From Mass Media to the Networked Public SphereMsifry
Using the Cluetrain Manifesto and the Wealth of Networks, we discussed how networked media changes the relationship between ordinary people and powerful institutions.
This document discusses various aspects of networked literacies. It covers topics such as blogging, social networking, open teaching, crowdsourcing content, real-time collaboration, issues with inappropriate content and verifiability online. It also discusses concepts like new media texts, the abundance of information, multimodal expression, complex authorship, expanding audiences, and the importance of social connections and digital reputation. Overall, the document examines how networks and new media are changing literacy and the skills needed to navigate online spaces.
Mobile Social Media in Social Internations FINAL PAPERKelsey Harris
This study used applied behavior analysis to reduce a participant's use of mobile social media applications during social interactions. During the baseline period, the participant recorded their normal social media usage. In the intervention, the participant's phone was kept out of sight during interactions and $1 was added to a bag for every time social media was accessed. This immediately decreased social media usage during interactions from the baseline. The results suggest mobile social media use during social interactions can be reduced through behavioral techniques.
Effect of technology on personal communicationAbid Momand
The document discusses the undesirable effects of technology on personal communication. While technology has enabled new forms of communication, it has negatively impacted valuable in-person interactions. Face-to-face communication is more effective than electronic communication as it allows people to connect on a deeper level through body language, facial expressions, and empathy. Several studies have shown that as internet and technology use increases, time spent socializing in person decreases, and empathy and social skills among youth have declined. True emotional support and meaningful exchanges of information require in-person communication that virtual interactions cannot replace.
The document summarizes research on female use of entertainment technology compared to males. It finds that while females are more likely to use communication technologies like email, males engage with social media and online communities more. A study was conducted using an anonymous online survey of Facebook users and forum members, and found that males scored higher in most areas of social technology use. However, females engaged more with Neopets, while males preferred PC games. Overall the research suggests technology is still perceived as a masculine domain and female mastery is limited by a lack of relatable entertainment venues exemplifying femininity.
Esten OAH18: Digital Public Humanities for HistoriansEmilyEsten
The document discusses digital public humanities for historians. It defines digital public humanities as using digital humanities tools and methods to make the humanities accessible to public audiences. A framework for digital public humanities centers the public, has a critical, artistic, and research side, and engages with technology appropriately. For historians, digital public humanities builds on digital history by facilitating interdisciplinary conversations and flipping the viewpoint from input to output. It also exposes graduate students in history to the limits of the discipline and how to make contributions as a 21st century scholar.
The document discusses analyzing communication flows between nations from 1989-1999 to see if nations that share cultural or civilizational characteristics communicate more with each other. It uses data on international telephone traffic between 107 nations to create "telecommunicative neighbor" networks based on which countries send at least 5% of their traffic to each other. Statistical analysis using Moran's I shows an increasing tendency over time for countries with similar languages, religions, or civilizations to cluster together in telecommunicative space, providing evidence for heterogenization.
Journal of social and personal relationships 2004-chan-305-20Raluca Vas
The document compares the qualities of offline and online friendships at different stages of relationship development. It finds that offline friendships have higher levels of interdependence, depth, understanding and other qualities compared to online friendships. However, the differences between offline and online friendships diminish as the duration of the relationships increase. Additionally, contrary to evidence for offline relationships, qualities of cross-sex online friendships were found to be higher than same-sex online friendships. The study suggests that structural and normative constraints that influence offline relationships may be different for online relationships.
1. The document discusses computer-mediated communication (CMC) and how it has influenced relationship formation and online identities. Early CMC included email and online forums.
2. Research on CMC examined how online communities and social networks develop through identity presentation and relationship building. However, CMC lacks the richness of in-person interaction and can blur reality and fantasy.
3. The spread of internet memes is also discussed in the context of CMC. Memes spread and evolve through imitation, similar to genes, as they compete for attention online.
The document defines cyberbullying as the willful use of electronic communication to harass or threaten others repeatedly. It describes how cyberbullying differs from traditional bullying in that bullies have greater access to victims, audiences can grow rapidly online, and anonymity may enable harsher bullying. The document recommends that victims report abusive behavior to websites and seek help from parents and teachers rather than respond to bullies themselves.
1. CMC has influenced relationship formation by allowing people to connect globally at all hours but relationships may not be genuine since identity is unknown.
2. A visualization of social networks would show weak communication patterns for the individual since they prefer texting over social media and only share videos, news, and images rather than build relationships.
3. The individual's favorite internet meme is the ongoing rapper feud between Drake and Meek Mill which has produced many memes and possibly transfers cultural views by influencing opinions of Meek Mill through the memes that side with the winning Drake.
Internet & Social Life Zineb Boukilizinebboukili
This document discusses research on the social impacts of internet use. It finds that while the internet increases connectivity, it can also weaken community ties and interpersonal relationships by replacing face-to-face interactions. Additionally, the anonymity of the internet facilitates behaviors like pornography, crime, and the expression of taboo ideas. However, the internet also allows people to connect with others who share interests and identities, and can help those with stigmatized identities feel less isolated. Overall, the internet both positively and negatively impacts social interactions and relationships.
Exploring addiction to social networking service among young Chinese adultsDigital Society
This document outlines a research proposal to examine addictive tendencies of using social networking sites (SNS) among Chinese young adults. The study aims to explore how specific activities on SNS correlate with addiction and examine psychological dependence. A literature review discusses factors influencing SNS use such as feedback received and virtual interactions. The methodology will use quantitative surveys of SNS usage patterns and perceptions of addiction administered to university students in China. Hypotheses predict more responses/comments and interactions will correlate with increased addiction.
In search of a better understanding of social presence: An investigation into...Patrick Lowenthal
This document summarizes a study that analyzed how researchers define social presence in highly cited social presence research. The study found that the most common definitions referred to social presence as being salient, being real, or being there. Specifically, 36% of definitions described social presence as the degree of salience between communicators, 38% defined it as the degree to which a person is perceived as real, and additional definitions focused on feelings of connection, belonging, or being present. While many definitions referenced the Community of Inquiry framework, the study found there is still variability in how social presence is conceptualized among researchers.
This document provides an overview of a research project studying college students' use of social networking sites like MySpace and Facebook for networking and communication. It defines blogs and the most popular social networking sites. Previous research on related topics like self-presentation, relationship formation, and virtual communities is summarized. Issues around free speech and privacy are discussed. The goal is to research whether social networking sites are effective means of interpersonal communication for college students and address a gap in previous research.
This document discusses social network analysis and provides examples of social networks. It begins by defining what a social network is - a set of nodes connected by edges that can represent people and their relationships. It then provides examples of social networks from different domains like disease transmission, collaboration networks, and online networks. Key concepts in social network analysis like centrality, clustering, distance, and community structure are introduced. The document emphasizes that network structure can influence outcomes more than individual traits and discusses using network analysis to understand topics like information diffusion and disease spread.
Exploring Addiction to Social Networking Service among Young Chinese AdultsDigital Society
This document outlines a proposed study on addiction to social networking sites among young Chinese adults. The study would examine college students' usage of popular SNSs in China and their potential psychological dependence. A literature review discusses research on SNS addiction and factors that could influence it, such as feedback received, interactions, and loneliness. The proposed methodology involves a quantitative survey measuring SNS activities and perceptions of addiction. Hypotheses predict greater addiction risk from more responses to posts and interactions. The schedule outlines drafting the survey, data collection and analysis, and thesis writing from January to June.
This document summarizes a study on the demographics of social media users. It discusses how personality traits like extroversion and openness impact social media use, with extroverts and those open to new experiences being more likely to use social media. It also overviewed different types of specialized social networking sites for different races, ethnic groups, and interests. Major social networks like LinkedIn, Facebook, and Twitter were examined along with their target demographics. The study was conducted through an online survey of 3,000 participants and analyzed 340,000 online friendships and 200,000 interpersonal messages.
How journalists can improve online discourse with the audience. Presentation given at 2015 Excellence in Journalism conference in Orlando, FL on September 18, 2015
This document summarizes a research article about the effect of social media on identity construction. The article explores how social media platforms allow people to showcase their experiences and reflect various dimensions of their social lives. It analyzes how individuals feel the need to create virtual identities and experiment with identity expression online. The document also discusses how social networks and virtual communities emerging on these platforms take on social and cultural qualities.
Research Proposal : Political Representation of Different types of voters on ...Joshua Wong
This document proposes research on political representation of different voter types on Facebook. It will examine which voter types (defined by gender and ethnicity) are more politically engaged on Facebook by analyzing interactions with UK politicians' Facebook pages around the Brexit referendum. The literature review discusses research on factors influencing political engagement by gender and ethnicity both online and offline. The proposed data collection will categorize Facebook users and count their likes, comments and replies to politician posts to measure political representation. The research aims to provide insight into how well Facebook captures diverse political preferences.
From Mass Media to the Networked Public SphereMsifry
Using the Cluetrain Manifesto and the Wealth of Networks, we discussed how networked media changes the relationship between ordinary people and powerful institutions.
This document discusses various aspects of networked literacies. It covers topics such as blogging, social networking, open teaching, crowdsourcing content, real-time collaboration, issues with inappropriate content and verifiability online. It also discusses concepts like new media texts, the abundance of information, multimodal expression, complex authorship, expanding audiences, and the importance of social connections and digital reputation. Overall, the document examines how networks and new media are changing literacy and the skills needed to navigate online spaces.
Avatar was directed by James Cameron and produced by 20th Century Fox. It had a budget of $237 million and was filmed using performance capture technology developed by Cameron. The film was distributed worldwide by 20th Century Fox in December 2009 on over 14,000 screens. It became the highest grossing film of all time with $2.78 billion in global box office sales. While praised for its visual effects, the film also received some criticism for its plot and messaging.
Japanese Personal Information Protection Act (PIPA) was passed the diet in Sep.2015. De-identified Information is introduced. It is the data anonymized enough not to de-anonymized easily. It is permitted to freely use without the consent of data subject. Notice that pseudonymized is not regarded as De-identified Information. Boarder line between pseudonymized and anonymized is a critical issue. I discuss this topic in this slide.
This document outlines a plan to create a new satellite city for creative professionals and remote workers. The city would be located on farmland in San Benito County, California and be car-free with co-housing, outdoor spaces, and shuttle transportation. The plan involves using Kickstarter to bring an initial 500 residents to live in an RV campground, with the goal of growing the community and developing the surrounding farmland into a high-density, walkable new city. The business model would involve renting land and providing high-speed internet and financial services to residents.
This document provides an overview of scholarly open access resources and services for academic excellence. It discusses the concept of open access and key initiatives that have advanced open access, including the Berlin Declaration and Budapest Open Access Initiative. Open access strategies of self-archiving in repositories and open access journals are described. Several examples of open scholarly resources are provided, including the Directory of Open Access Journals, Intute, and open access repositories that use the EPrints platform.
This document discusses the concepts of forensics for information technology. It defines forensics for IT as the process of acquiring, analyzing, and reporting digital evidence from IT devices like computers, phones, and networks. The document outlines the role of forensics for IT in supporting crime investigations involving complex information systems. It also describes the common process and steps, techniques and tools, and key issues in forensics for IT like developing laws and guidelines for digital evidence handling. Finally, it discusses the integration of forensics for IT with auditing to improve investigation efficiency.
The document discusses a school district's technology plan which is required to qualify for discounted internet access through the E-Rate program. The district has 41 campuses, over 26,000 students, and spends $3.6 million on technology annually. The technology plan outlines goals for using technology, professional development, and infrastructure needs. It also provides data on the percentage of students meeting academic standards and technology expenditures per student.
This document describes a proposal for improving the throughput of complex event processing techniques. It summarizes the existing SASE technique which uses a non-deterministic finite automaton and active instance stack to detect patterns in a stream and output occurrences. The proposal extends SASE by performing "bulk evaluation" - generating multiple pattern matches simultaneously when the accepting state is reached, rather than generating them one by one. An evaluation shows the proposal can improve throughput by up to 5.24 times compared to SASE on a pattern of A->B->D. Future work includes implementing the proposal in the Falcon stream processing system.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help alleviate symptoms of mental illness and boost overall mental well-being.
The document discusses plagiarism and proper citation. It defines plagiarism as copying someone else's work and passing it off as your own without giving proper credit. This includes directly copying text, turning in another's paper, using someone else's ideas without citation, or paraphrasing without attribution. The document provides guidelines for integrating and citing others' work, such as using quotation marks for direct quotes and citing sources of ideas. It also discusses reasons why students plagiarize and encourages teaching proper citation to avoid plagiarism.
Mathematical modelling of extractive distillationerdete23
1. Dokumen tersebut membahas model matematis ekstraksi distilasi untuk memisahkan dua komponen dengan menggunakan solvent.
2. Terdapat beberapa asumsi yang digunakan seperti ekstraksi berlangsung cepat dan kesetimbangan uap-cair untuk menghitung komposisi setiap tahapan.
3. Perhitungan dilakukan untuk setiap tahapan kolom distilasi untuk mendapatkan suhu, aliran, dan komposisi seti
The presentation will illustrate how the ACCESS-PRO pre-booked system functions to provide maximum security for estates. The system assigns unique identification numbers to residents, visitors, and golf members prior to their arrival. These numbers are generated by the software and expire after exit. Additional security features include fingerprint scanning, license plate recognition, and the ability to check for outstanding offenses. The goal is to make estates safer environments through integrated access management.
This document defines key concepts in experimental design including experiments, causation versus correlation, control groups, random assignment, internal and external validity, and the pros and cons of experimental methods. It explains that experiments manipulate independent variables to determine their effect on dependent variables and discusses strategies for establishing evidence of causality, such as time order of events and ruling out other possible causes. The document also covers how much control researchers have in different types of studies from observations to full experiments and notes important considerations for conducting experiments like specifying treatment variables, levels, and designs and ensuring validity.
O documento descreve uma decisão judicial sobre um pedido do Procurador-Geral da República para realizar busca e apreensão em endereços de políticos suspeitos de integrar uma organização criminosa para embaraçar investigações da Operação Lava Jato. O pedido foi concedido com base em conversas gravadas que revelam um plano em andamento para paralisar a Lava Jato por meio de mudanças legislativas e um acordo com o STF.
O documento lista os materiais necessários para um projeto com seus preços individuais e quantidades. Uma segunda tabela detalha o preço normal, preço com imposto e preço total de um item, além da quantidade comprada a cada preço.
The ethics of privacy in sharing culture 2016Zoetanya Sujon
1. The document summarizes a study on privacy and sharing culture among young people in London. It examines how they understand and manage privacy through diary entries and surveys.
2. It finds that respondents care deeply about social privacy and control over personal information. They see privacy as a way to protect their individuality and choose what to share.
3. Respondents also curate a "public persona" on social media, depicting a happier version of themselves. They employ strategies like private sharing on apps and depersonalizing content to balance privacy and sharing.
Nadia naffi-Learning About Oneself an Essential Process to Confront Social Me...Nadia Naffi, Ph.D.
Civic educators, social workers, curriculum developers, policy makers and parents concerned with the takeover of social media by hate speech proponents can apply these findings and help youth withstand manipulation and fight racism, hate speech, radicalization, and cyberbullying through the Get Ready to Act Against Social Media Propaganda model generated by this study. The model includes five iterative stages: Question, analyze, design, prepare and evaluate.
This document discusses anonymity on social media and its effects. It notes that while anonymity allows people to discuss difficult topics privately, it can also enable bullying and harassment with few repercussions. The document examines both the benefits of anonymity, such as allowing privacy and exploration of identity, and the drawbacks, like cyberbullying and the disinhibition effect leading to more aggressive behaviors online. It concludes that while anonymity has value, social media sites should regulate anonymous interactions to curb bullying.
Stefanie Duguay, Jean Burgess, and Ben Light
Digital Media Research Centre, Queensland University of Technology
Draft working paper for the Digital Intimate Publics Symposium, 19-20 November 2015, University of Queensland, Brisbane, Australia
Abstract
This paper focuses on images of sexual desire that shape digital intimate publics of same-sex attracted women through related hashtags on social media platforms. While previous research has focused on same-sex attracted men’s use of digital technology to perform sexuality, studies of same-sex attracted women are sparse, focused on older technologies, and complicated by debates around gendered power relations. This is investigated by examining sexual content organised through hashtags related to same-sex attracted women (e.g., #lesbian, #gaygirl) on Instagram and Vine. Textual and visual analysis of user-generated content is paired with walkthroughs interrogating these platforms’ design, activity flows and features, identifying mediators that shape performances of sexual desire. Preliminary analysis shows that performances on Instagram can be divided into four categories: pornography and advertisements; memes, animations, and popular media; images of idealised ‘lesbians’; and personal selfies and sexy photos. On Vine, popular media and idealised lesbians are represented in fan mash-ups of YouTube celebrities while the majority of sexual performances involve sensual lip dubs and dancing to rap and hip hop music. Each platform provides unique affordances for these performances, such as Instagram’s filters and Vine’s audio track tools, as well as shared affordances like co-hashtags. Further analysis will allow for a better understanding of these multiple components of performances of sexual desire, presenting a view of Instagram and Vine’s digital intimate publics relating to same-sex attracted women.
This document discusses trends, cautions, and opportunities in social media. It notes that 8% of online Americans use Twitter, 4% use location-based services, and 71% seek health information online. While social media sites are popular among college students, some myths exist, such as that they are just for teens or that people will automatically fill user-generated content. The document outlines research on social media being conducted at Michigan State University, including published academic papers and excursions into some social media platforms.
This document discusses how changes in higher education and knowledge production have led to increased incentives for academics to develop public profiles and online followings, referred to as "micro-celebrity". It notes that while going public can be liberating, it also shifts the risks of maintaining institutional status onto individuals. Furthermore, the risks and incentives differ for different types of scholars, and becoming more publicly visible can exacerbate existing inequalities, such as fewer protections against online harassment for minority scholars. The document calls for institutions to provide more support for academics navigating these changes.
These are the slides for my opening remarks for "Representing Race, Silence in the Digital Humanities," a roundtable for the Modern Language Association Annual Meeting in 2013. Meeting: Friday, 10.15am, Sheraton, Gardner. #MLA13 #s239
1) Anonymity online enables political freedom and dissent by allowing people to organize protests and share opinions without fear of reprisal.
2) While anonymity can enable harmful behavior, it also protects vulnerable groups and enables beneficial outcomes like honest self-disclosure, experimentation, and collective action.
3) Demanding social media sites provide privacy, pseudonyms, and anonymity supports democratic rights and freedoms by allowing for robust political debate and dissent protected by the First Amendment.
The View from Here and Here: Making the Invisible Visible in the Hypertextual...Michelle Ferrier
Dr. Michelle Ferrier presented on making the invisible visible in hypertextual spaces. She discussed her research on digital story quilts and using tactics like fragmentation, condensation and juxtaposition to communicate community knowledge online. She also discussed her media deserts project that maps areas lacking access to news and information using GIS tools. Additionally, she presented on her work with TrollBusters, which uses technologies like natural language processing and online community support to counter cyber harassment targeting women journalists.
Is being #instagay different from an #lgbttakeover?Stefanie Duguay
*Edited version; see full conference paper here: http://eprints.qut.edu.au/85139/
This paper introduces research in progress that examines how queer women perform sexual identity across social media platforms. Applying a lens of queer theory and Actor Network Theory, it discusses women’s embodied self-representations as taking on forms that both conform to and elaborate upon the selfie genre of digital representation. Acknowledging similarities and differences across platforms, specifically between Instagram and Vine, a novel walkthrough method is introduced to identify platform characteristics that shape identity performances. This method provides insights into the role of platforms in identity performances, which can be combined with analysis of user-generated content and interviews to better understand digital media’s constraints and affordances for queer representation.
Presentation for the Seminar on Contemporary Issues of Communication and Culture, Escola de Sociologia e Políticas Públicas, Lisbon University Institute, Lisbon, Portugal, 29 April 2021.
This document provides an agenda for a class on social media that includes discussions on various social media terms and concepts. It outlines activities for students, such as defining social media and discussing the differences between social media "visitors" and "residents". It also lists various readings and resources for students to explore key topics in social media research, such as network analysis, tie strength, and strategic planning for social media initiatives. The document provides links to external resources and materials to support the activities and assignments for the class.
This document discusses issues related to youth and social networking. It provides an overview of popular social networking sites and their purposes. It then examines questions and challenges around privacy, safety, and intellectual freedom on social networks. Finally, it outlines the roles and responsibilities of libraries and advocates in educating users and complying with relevant laws and policies.
Digital Media & Youth Safety - Ricky Lewis & Jacqueline VickeryJacqueline Vickery
This document discusses various aspects of internet and social media literacy. It defines social literacy as understanding how to operate successfully in social environments. Network literacy refers to effectively spreading one's own ideas through social networks. Expanding digital literacy is important so people can use digital media to enhance learning and civic engagement. The document emphasizes balancing risks and harms of technology with strategies facilitated by engaged adults and developing multiple literacies.
This document discusses fan cultures and performances of fan audiencehood in Italian networked publics. It examines the case study of ::Italian Subs Addicted::, an Italian fan community that translates and shares subtitles of American TV shows. The community acts as both an egocentric network and networked collectivism, bringing fans together through a shared passion while also allowing for individual participation and performances of identity. Members strive to become "amateur experts" through their interpretive work, acquiring cultural and social capital within the group.
Libraries as a Bridge: The Role of Libraries in Closing the Digital Skills ...Bobbi Newman
This document discusses the role of libraries in addressing the digital skills gap. It begins by outlining the digital divide, noting that 1 in 5 Americans lack broadband access at home, with even less access among poorer, minority, elderly, and rural populations. It then discusses the concept of digital literacy, which involves more than just access but the ability to use technology to find, evaluate, create and communicate information. The document proposes that libraries can help bridge the digital skills gap through resources and training in areas like digital tools, authorship, social media, and more. It positions libraries as powerful partners in closing this divide.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
24. References:
Berlant, L. (2008). The Female Complaint: the unfinished business of sentimentality in American Culture. Durham & London: Duke University
Press.
boyd, danah. (2008, Fall). Taken Out of Context: American Teen Sociality in Networked Publics (PHD in Information Management and
Systems). University of California, Berkeley.
boyd, danah. (2012, August). The politics of “real names.” Communications of the ACM, 55(8), 29–31.
Fraser, N. (1990). Rethinking the Public Sphere: A Contribution to the Critique of Actually Existing Democracy. Social Text, (25/26), 56–80.
Giddens, A. (1992). The Transformation of Intimacy: Sexuality, Love and Eroticism in Modern Societies. Stanford, California: Stanford
University Press.
Goffman, E. (1963). Stigma: Notes on the Management of Spoiled Identity. New York: Simon & Schuster.
Hogan, B. (2010). The Presentation of Self in the Age of Social Media: Distinguishing Performances and Exhibitions Online. Bulletin of Science,
Technology & Society, 30(6), 377 –386. doi:10.1177/0270467610385893
Jurgenson, N. (2011, February 24). Digital Dualism versus Augmented Reality » Cyborgology. Cyborgology. Retrieved November 20, 2013,
from http://thesocietypages.org/cyborgology/2011/02/24/digital-dualism-versus-augmented-reality/
Lange, P. (2008). Publicly Private and Privately Public: Social Networking on YouTube. Journal of Computer-Mediated Communication, 13,
361–380. doi:doi:10.1111/j.1083-6101.2007.00400.x
Livingstone, S. M. (2005). Audiences and publics: when cultural engagement matters for the public sphere. Bristol: Intellect.
Papacharissi, Z. A. (2010). A Private Sphere: Democracy in a Digital Age. Cambridge: Polity.
Plummer, K. (2003). Intimate Citizenship: Private Decisions and Public Dialogues. University of Washington Press.
Rainie, H., Rainie, L., & Wellman, B. (2012). Networked: The New Social Operating System. MIT Press.
Vivienne, S. (2009). Rainbow Family Tree. Retrieved from www.rainbowfamilytree.com
Vivienne, S. (2013). Digital Storytelling as Everyday Activism: Queer Identity, Voice and Networked Publics. Queensland University of
Technology, Brisbane.
Weintraub, J. A., & Kumar, K. (1997). Public and Private in Thought and Practice: Perspectives on a Grand Dichotomy. Chicago: University of
Chicago Press.
Young, I. M. (1997). Intersecting Voices: Dilemmas of Gender, Political Philosophy, and Policy. Princeton: Princeton University Press.
Young, I. M. (2011). Justice and the Politics of Difference. Princeton: Princeton University Press.
25. Attributions:
Pseudonymity
http://compfight.com/search/pseudonym/1-3-1-1
Anonymity
http://compfight.com/search/anonymity/1-3-1-1
404 support
http://s3-ec.buzzfed.com/static/enhanced/webdr01/2013/7/29/19/grid-cell-1149-1375140183-29.jpg
Lena 404
http://www.buzzfeed.com/katiezavadski/in-russia-breaking-the-law-to-tell-gay-teens-it-gets-better?sub=2474697_1435183
Nym wars
http://shockwaveplasma.blogspot.com.au/2011/08/nymwars-and-propaganda-of-botgirl.html
SMC blog:
http://socialmediacollective.org/2013/09/24/monitoring-youth/
‘Cyberbullying Law and the New School Year’ by CT Senate Democrats: http://www.flickr.com/photos/44616579@N05/6124355293
via Compfight - cc - by-nc-nd
‘Privacy, health, fears over airport X-ray’ by publik16 http://www.flickr.com/photos/22941790@N02/2904857669 via Compfight - cc
- by-nc-nd
‘From Music to microfluidics’ by Steve Jurvetson http://www.flickr.com/photos/44124348109@N01/6884784313 via Compfight - cc by-nc-nd
Russia’s neo-nazi sport:
http://www.theverge.com/2013/8/7/4595246/russia-anti-gay-neo-nazis-bully-teens-on-social-media-occupy-pedofilyay
http://en.wikipedia.org/wiki/File:Chelsea_Manning_with_wig.jpg
http://www.privatemanning.org/learn-more/in-his-own-words
Email from Manning to Lim, U.S. Army Records Management and Declassification Agency, April 24, 2010.
Barbie low angle:
http://keepingupwiththeholsbys.files.wordpress.com/2012/07/barbie.jpg?w=490&h=367
‘Networked’ Cover:
http://ecx.images-amazon.com/images/I/413hdpXZ2IL.jpg
‘The Female Complaint’ Cover:
http://www.dukeupress.edu/Assets/Books/978-0-8223-4202-1_pr.jpg
‘A Private Sphere’ Cover:
http://www.polity.co.uk/digitalmediaandsociety/images/covers/large/private_sphere.jpg
‘Intimate Citizenship’ Cover:
http://www.mqup.ca/filebin/images/products/zoom/9780773526570.jpg
‘2nd Anoniversary 13’ by Anonymous9000 http://www.flickr.com/photos/25414324@N02/4280254856 via Compfight - cc - by-nc-nd
Editor's Notes
Thanks for coming – today I’m presenting on behalf of Sonja Vivienne, a post-doc researcher at the Centre for Communication and Social Change at University of Queensland. While she can’t be with us… she’d like to welcome any feedback via email, twitter or me… and she’d like to thank me very much for my generosity of spirit and intellectual camaraderie… and hopes to one day repay the favour!
This paper draws on current case studies in order to explore shifting understandings of privacy and publicness…
…in particular, in cultures where public expression of queer sexuality and non-normative gender performance are socially maligned and risky.
Sonja proposes a framework of ‘networked intimate citizenship’ that might support stigmatised people, and others, in navigating privacy…
Since what have become know as the ‘nymwars’ in 2011, in which Google + insisted on use of legal names as profiles, there has been increased debate about a ‘right to privacy’.
So, why do we need privacy? What are the strengths and weaknesses of pseudonymity?
Building on the ‘online dis-inhibition effect’ some people maintain the use of ‘real’ names reduces flaming and vitriol.
On the other hand, others believe that anonymity, or at the very least pseudonymity, is necessary in order to facilitate safe and genuine engagement of diverse voices.
So – a quick roadmap… First I’m going to outline a theoretical and social landscape for this presentation, then describe and analyse 2 particular case studies… before raising some research questions for further discussion and investigation…
Let’s start ‘context’ with a brief exploration of understandings of pseudonymity and anonymity… The distinction may be clear to this audience, however to many internet users it is not…
While a pseudonym is a fictitious substitute for a legal name, it does not guarantee anonymity.
Images that are partially obscured may confound facial recognition software and render their subjects unidentifiable to an unknown audience, however, to anyone who has even minimal knowledge of the subject, they are recognisable – and this thread can lead to them then being identified and located.
Anonymity, on the other hand, assumes no threads link physical identity with its representation. Anonymity is extremely difficult to achieve when sharing personal stories – arguably impossible. Even untraceable ISPs are useless if an anecdote is specific in its nature…
Imagine that you identify as ‘gay’ or that you see yourself as an ‘ally of same sex attracted people’ and that you live in Russia…
As you probably know, in 2013 a federal bill banned the distribution of "propaganda of non-traditional sexual relations" to minors. In Russia, homophobia thrives, not just at legal and political levels, but is widespread among the general population… according to a 2013 survey, 74% believe that homosexuality should not be accepted by society.
In numerous well-documented examples gay or sympathetic people, have lost their jobs for offering empathy and affirmation in supposedly ‘private’ online groups, like Deti-404.
Deti-404 translates as ‘Children-404’ and plays on the ‘error 404 – page not found’ warning. It was established by 17 year old Lena Klimova, in March 3013 on VKontakte, which is the second biggest social network service in Europe following Facebook, and has the motto ‘Children-404. LGBT teens. We exist!’.
Presumably, group moderators must approve membership of the group, however, while pseudonyms are available to all, it is not difficult to infiltrate a closed group in order to gather information about other members.
The association between a perceived degree of privacy and a degree of safety has broader social significance – for people, young and old, wealthy, privileged… or not – out of date or poorly negotiated expectations of privacy and publicness can cost jobs, relationships and, in some cases, lives…
Can the so-called ‘darknet’ or ‘deep’ web provide an alternative? If you wish to conceal illegal activity it might be useful to employ multiple ISPs to hide locations of engagement, but ill-conceived pseudonyms or accidental half-revelations can still be traced to source…
For those who wish to find a secret space in which to seek support… it is, unfortunately, likely that others can find them there too…
Drawing on work by boyd, Papacharissi, Hogan, Warner and Lange… and my doctoral research with queer digital storytellers, I have started employing a theoretical construct that I call ‘Networked Intimate Citizenship’.
This is an attempt to acknowledge the labour involved in…
negotiating identity simultaneously in
face to face and online environments with
publics who are both familiar and unknown,
now and in the future…
It involves…
building bridges across difference while
maintaining personal congruence…
In other words having…
agency and ownership of the
production and distribution of identity on one’s own terms…
This frame requires moving beyond simplistic digital dualisms – comparisons between face to face interactions, and online self-representations.
Like this photo – an airport scanner – the vast majority of people simultaneously inhabit a body and maintain connection to a digital trace of that identity.
Who controls how that identity is represented and where that representation travels, is a more complex issue… and worthy of lengthy exploration.
Bernie Hogan argues that, unlike Goffman’s ‘front and back stage’, digital self-representation is an ‘exhibition’ - curated by platforms like Facebook...
Building on this argument, and taking into account the mediating influence of platforms, digitally literate users at least have POTENTIAL to seize agency (over the process of self-representation) and ownership (of it’s distributed and evolving form)
Control over self-representation – or if you like ‘curation of your personal online exhibition’ - is central in many arguments about surveillance, however, in the examples I’m about to describe, it is the unanticipated consequences of self-exposure or a lack of digital literacy in managing the boundaries of that exposure that are proving increasingly problematic for marginalised people.
In the last year or so there have been numerous international examples of the tangled complications of online privacy and publicness, and I’ll now briefly explore 2 of those – the case of queer youth in Russia and that of Chelsea (formerly Bradley) Manning…
This image was picked up in late 2013 by online tech/science/art/culture news aggregator ‘The Verge’. It depicts representatives from a loose collective of neo-Nazis and Russian nationalists known as ‘Occupy Pedophilia’ who use social media in 2 ways:
luring gay people (sometimes by posing as prospective dates) into violent face to face encounters and then
distributing triumphant images of those encounters
There are hundreds of active homophobic VKontakte (VK) groups and the largest has 75,000 followers. The leader of ‘Occupy Pedophilia’ regularly publishes stylized videos of ‘sting operations’ or ‘safaris’ and holds regional seminars to help build their following.
Among varied reports of attacks in May last year, a gay man was burned to death in Volgograd after his assailants sodomized him with beer bottles and, weeks later, 3 men killed a gay man by stabbing and trampling him to death. Incidents like these are notable for the absence of police intervention.
While groups like Deti-404 have lobbied VK to close down group pages with some success, many others flourish in their place and, anecdotally, VK appears to be taking a ‘hands off’ approach to the widespread circulation of visual evidence of the homophobe group activities.
Obviously, social network platforms can be utilised for any political and moral affiliation, and in this case have facilitated growth of both ‘Occupy Pedophilia’ and ‘Deti-404’ – however the expectation of privacy and security they offer is largely an illusion…
Meanwhile, Chelsea Manning, at the centre of the WikiLeaks scandal in 2010, has come out as transgender and has requested that ‘starting today you refer to me by my new name and use the feminine pronoun’ (press release, Aug 22, 2013).
During the trial, Manning's lawyers presented an email Manning wrote to a former supervisor:
"This is my problem. I've had signs of it for a very long time," the email reads. "I thought a career in the military would get rid of it. It's not something I seek out for attention and I've been trying very very hard to get rid of it by placing myself in situations where it would be impossible."
Since Manning came out, transcripts of conversations with notorious hacker, Adrian Lamo, the person who eventually revealed his/her identity, have also been leaked… and as you can see, they read like a personal confession…
Some of Manning’s friends say they wonder whether his desperation for acceptance may have inadvertently led him to disclose the large trove of government secrets that he had access to.
Of course the irony of this lies in the fact that, while hacking and Wikileaks have come to mean a lot of different things, at core, is the philosophy that information should be free and accessible to all…
In both these case studies there are some striking similarities…
the people involved are both living in environments in which their chosen identities must be concealed to preserve personal safety
arguably, this leads them to seek affirmation in closed or private spaces online…
in both cases vulnerable people had (not unreasonable) expectations that they were speaking in a safe place
in both instances their pseudonyms, or the personal information they disclosed, linked directly to their physical, locatable identity
and finally… the consequences were dramatic and violent
Of course there are distinct points of difference too – Manning was clearly digitally literate and possibly should have known that his pseudonym – ‘bradass87’ - was fragile… also, the punitive consequences he experienced were not directly linked to his transgressive identity, so much as his violation of military codes of secrecy…
But the transcripts also clearly link his understandings of ‘transparency of information’ and his desire to live his identity visibly and in the open…
The similarities in these case studies lead me to a preliminary hypothesis – firstly – that the privacy strategies employed by those most at risk and with the greatest desire to see social and cultural change – offer some insights that can be mapped onto a much broader population of vulnerable identities…
And secondly – that – privacy is not purely an issue that can be addressed with regulation of platforms or progressive social policy… individuals also need to understand the nuances and potential consequences of sharing personal information in dangerous, or inhospitable, social contexts… this does not necessarily mean that individuals should be blamed for unintentional self-exposure… rather that our shifting and varied cultural understandings of privacy need greater investigation…
To return to the complex intersections between
sharing intimate aspects of identity,
mediated networks of self-representation and the
way we regard ourselves as citizens…
both ‘apart of’ and ‘apart from’ the numerous publics we engage with…
How might better understanding of privacy and publicness change our approach to education, policy, advertising and platform regulation? Does existing scholarship provide any clues to a path forward?
Wellman & Rainie (2012) tell us that 'Networked Individualism' in daily life is ‘perpetual connectedness’, thanks to the 'triple revolution' of:
social networking,
internet capacity to facilitate voice,
always on connectivity of mobile devices
Berlant (1997) tells that ‘Intimate Publics’ equate, not to chest-baring autobiographical confession (although some of it is), rather participants sharing a worldview - shaping both the content they consume, their experience of belonging, and their self-representation…
Livingstone (2005) & Papacharissi (2010) tell us that, in order to participate publicly, we draw on private lived experiences & constraints and…
Fraser (1990) and Young (1997, 2011) tell us that a public sphere should accommodate diverse speaking styles & narrative modalities along with capacity to listen across difference…
Meanwhile, Plummer (2003) argues that ‘Intimate Citizenship’ involves ‘asserting the right to choose what we do with ‘our bodies, our feelings, our identities, our relationships, our genders, our eroticisms and our representations’ (Plummer, 2002, p17).
…and boyd uses ‘social convergence’ (2008) to illustrate the fact that what may formerly have been isolated audiences are increasingly brought together to witness inconsistencies in our self-presentations… She points out that our digital traces are both persistent and searchable… meaning that the future ramifications of incidental over-sharing now are difficult to anticipate…
In the gaps between, and intersections among, these bodies of scholarship, I offer…
Networked Intimate Citizenship
the individual capacity to speak across differences in values, capabilities, social capital, locative time & space
it requires digital agency, and ownership of fluid but congruent self-representation, and
negotiation of shifting terrains of privacy and publicness and
an understanding of self-exposure in the face of surveillance and risks of retribution
Privacy and publicness is a shifting socio-cultural terrain, as different people decide what is appropriate to share on Facebook or VK, and what information they are happy or unhappy to share with government or advertisers…
Networked Intimate Citizenship, in the case of queer Russian youth or even Chelsea Manning, might have looked something like this –
Individuals understand that the identities that they are sharing are socially maligned,
And that online self-representation, even pseudonymous, carries risks, even if they are different to face to face risks
Caution in building trust with divergent publics (both online AND face to face)
Awareness of balance between risk and reward – connoting ownership of congruent identity and agency in it’s production
Meticulous management of pseudonymity AND anonymity – enabling speaking across differences, affirming trust and, gradually, hopefully, bringing about cultural change…
…like this photograph privacy and publicness also have many layers and meanings… while ‘don’t worry we’re from the internet’ is a popular meme, the guy fawkes masks worn by members of ‘anonymous’ also conceal their identity in public... And enable an activist voice...
So, to conclude… and in response to the questions I raised earlier -
No, I don’t think our concept of pseudonymity is enough… and we, all of us, stigmatised or not, need to better understand the navigation of privacy and publicness in order to seek support… while this does not wholly liberate socially maligned people from the burden of stigma the concept of ‘networked intimate citizenship’ supports individual, agentive development of a safe engaged presence and voice in public, on an individual’s own terms…
Thank you very much for listening… and please don’t hesitate to email if you have further thoughts to discuss…