This document discusses democratic social networks and how they work. It examines sites like Reddit and YikYak, which allow users to vote on content. The presentation analyzes whether these sites truly promote democracy and free speech or if moderation and the voting system discourage unpopular opinions. It also looks at how user behavior, like upvoting provocative content, can influence what types of posts become most visible. The document describes experiments conducted to test hypotheses about how social influence and anonymity impact voting patterns on social media.
The document discusses principles for designing social websites and features. It covers understanding user needs and motivations using theories like Maslow's hierarchy of needs and Kollock's motivations for contributing. It also discusses designing for identity, presence, reputation, relationships, activity, and viral distribution. Key elements include profiles, groups, attention, collaborating, communicating, sharing, and optimizing signups and invitations.
The document discusses principles for designing social websites and features. It covers understanding user needs and motivations using theories like Maslow's hierarchy and Kollock's motivations. It also discusses designing for identity, presence, reputation, relationships, activity, and viral distribution. Key elements include understanding users, identifying social objects, and choosing appropriate social features.
In Defense of Anonymous Commenters - Jen Eyer at TEDx (script)Jen Strayer Eyer
The document discusses anonymity in online commenting on news sites. It summarizes that:
1) Requiring real names reduces participation, especially from vulnerable groups, and does not guarantee civility as offensive comments still occur under real names.
2) Anonymity allows for whistleblowing and discussion of sensitive local issues. Comment moderation through clear rules, engagement, and an evolution to higher quality discussions is more effective than real names at improving civility.
3) Research shows anonymous commenters on well-moderated sites contribute valuable local information and have more positive, productive discussions than those using real names. Anonymity with moderation enables important community conversations.
This document discusses various aspects of designing sociable online communities and platforms. It examines how identity, presence, relationships, groups, conversations, sharing, and reputation can be manifested through design choices. Key points discussed include how allowing different levels of identity disclosure can influence a site, using avatars or indicators to show who is active, categorizing relationships between users, whether groups are explicitly chosen or implicitly formed, providing places for open and private conversations, encouraging sharing of content and ideas to build connections, and establishing reputation systems to provide context to contributions.
This document provides an overview of a unit on social media products. It discusses Instagram, Facebook, and Snapchat. For each platform, it outlines the purpose, typical content, target users, sources of revenue, legal and ethical issues, and positives and negatives. It also includes a survey on social media preferences and effects of social media like eroding social behavior, moral panic among parents, and media convergence. The document serves to analyze key aspects of several major social media platforms.
A Presentation About Community, By The CommunityNeil Perkin
A crowdsourced presentation about how online communities work with contributions from 30 planners, strategists, digital specialists and some of the most reknowned thinkers in social media strategy.
While the public relations landscape seems to change at rapid speed, there are certain things that never change. With the exploding growth of social media, the need for strategic thinking has never been more important. Find out how to manage a social media campaign. Learn how your insight and deep understanding of strategy, paired with the skills and enthusiasm of technically savvy junior pros, can result in social media success.
The document discusses the history of online social networking and privacy concerns. It outlines the evolution of technologies from early computer networks and email to modern social media sites. It then examines perceptions of privacy and the risks of oversharing personal information online. Tools for teaching privacy and managing online profiles are presented. Users are encouraged to be aware of what they post and who may have access to their information to avoid potential issues like identity theft, embarrassment, or legal problems.
The document discusses principles for designing social websites and features. It covers understanding user needs and motivations using theories like Maslow's hierarchy of needs and Kollock's motivations for contributing. It also discusses designing for identity, presence, reputation, relationships, activity, and viral distribution. Key elements include profiles, groups, attention, collaborating, communicating, sharing, and optimizing signups and invitations.
The document discusses principles for designing social websites and features. It covers understanding user needs and motivations using theories like Maslow's hierarchy and Kollock's motivations. It also discusses designing for identity, presence, reputation, relationships, activity, and viral distribution. Key elements include understanding users, identifying social objects, and choosing appropriate social features.
In Defense of Anonymous Commenters - Jen Eyer at TEDx (script)Jen Strayer Eyer
The document discusses anonymity in online commenting on news sites. It summarizes that:
1) Requiring real names reduces participation, especially from vulnerable groups, and does not guarantee civility as offensive comments still occur under real names.
2) Anonymity allows for whistleblowing and discussion of sensitive local issues. Comment moderation through clear rules, engagement, and an evolution to higher quality discussions is more effective than real names at improving civility.
3) Research shows anonymous commenters on well-moderated sites contribute valuable local information and have more positive, productive discussions than those using real names. Anonymity with moderation enables important community conversations.
This document discusses various aspects of designing sociable online communities and platforms. It examines how identity, presence, relationships, groups, conversations, sharing, and reputation can be manifested through design choices. Key points discussed include how allowing different levels of identity disclosure can influence a site, using avatars or indicators to show who is active, categorizing relationships between users, whether groups are explicitly chosen or implicitly formed, providing places for open and private conversations, encouraging sharing of content and ideas to build connections, and establishing reputation systems to provide context to contributions.
This document provides an overview of a unit on social media products. It discusses Instagram, Facebook, and Snapchat. For each platform, it outlines the purpose, typical content, target users, sources of revenue, legal and ethical issues, and positives and negatives. It also includes a survey on social media preferences and effects of social media like eroding social behavior, moral panic among parents, and media convergence. The document serves to analyze key aspects of several major social media platforms.
A Presentation About Community, By The CommunityNeil Perkin
A crowdsourced presentation about how online communities work with contributions from 30 planners, strategists, digital specialists and some of the most reknowned thinkers in social media strategy.
While the public relations landscape seems to change at rapid speed, there are certain things that never change. With the exploding growth of social media, the need for strategic thinking has never been more important. Find out how to manage a social media campaign. Learn how your insight and deep understanding of strategy, paired with the skills and enthusiasm of technically savvy junior pros, can result in social media success.
The document discusses the history of online social networking and privacy concerns. It outlines the evolution of technologies from early computer networks and email to modern social media sites. It then examines perceptions of privacy and the risks of oversharing personal information online. Tools for teaching privacy and managing online profiles are presented. Users are encouraged to be aware of what they post and who may have access to their information to avoid potential issues like identity theft, embarrassment, or legal problems.
This document summarizes the key terms of Facebook's terms of use policies regarding ownership of content, privacy, surveillance, censorship, and freedom of expression. The policies state that content uploaded to Facebook becomes their property, and they can collect data on users from user activity and information shared by others. While privacy settings allow some control, Facebook retains the right to make some content public. The extensive data collection raises privacy concerns. The policies also give Facebook the ability to censor content and limit expression, though this aims to create a safe environment for users. Overall, the terms highlight tensions between Facebook's business interests and users' control over personal information and expression.
The document discusses the issue of measuring influence on social media and some of the potential negative consequences. It provides examples of social media campaigns that backfired or had unintended consequences, such as discouraging genuine engagement and risk-taking in favor of superficial metrics. The document also discusses how social media can negatively impact children by increasing cyberbullying, narcissism, and risky behaviors.
Filipinos as netizens darna in cyberspaceMilen Ramos
This document discusses factors affecting how Filipinos behave online as "netizens". It finds that Filipinos spend significant time on the internet through smartphones, are more tolerant of slower loading sites than other Southeast Asians, and prefer mobile access over desktop. It also examines two types of internet trolls in the Philippines: those who openly disregard social norms to provoke reactions, and those who police online behavior and justify trolling to correct views they see as misguided.
This document discusses the negative effects of social media that have become more prominent. It begins by highlighting how social media has negatively impacted people's behavior by causing them to constantly focus on their mobile devices rather than engage with their real-world surroundings. The document then analyzes ten serious consequences of social media for modern society, such as addiction, security issues, economic deficits, and more. It concludes by proposing ways to address these problems, including promoting concepts like "Slow Tech" that encourage more mindful social media use.
This document discusses anonymity on social media and its effects. It notes that while anonymity allows people to discuss difficult topics privately, it can also enable bullying and harassment with few repercussions. The document examines both the benefits of anonymity, such as allowing privacy and exploration of identity, and the drawbacks, like cyberbullying and the disinhibition effect leading to more aggressive behaviors online. It concludes that while anonymity has value, social media sites should regulate anonymous interactions to curb bullying.
Social media? It’s serious! Understanding the dark side of social mediaIan McCarthy
Research and practice have mostly focused on the “bright side” of social media, aiming to understand and help in leveraging the manifold opportunities afforded by this technology. However, it is increasingly observable that social media present enormous risks for individuals, communities, firms, and even the whole of society. Examples for this “dark side” of social media include cyberbullying, addictive use, trolling, online witch hunts, fake news, and privacy abuse. In this article, we aim to illustrate the multidimensionality of the dark side of social media and describe the related various undesirable outcomes. To do this, we adapt the established social media honeycomb framework to explain the dark side implications of each of the seven functional building blocks: conversations, sharing, presence, relationships, reputation, groups, and identity. On the basis of these reflections, we present a number of avenues for future research, so as to facilitate a better understanding and use of social media.
Presentation a BGIedu (Bainbridge Graduate Institute) alumni workshop "Introduction to the Social Web". Topics included Shared Language, Definitions of Social Web, Social Networking, Social Media, Web 2.0, Blogs, etc.
Independent study--Social Media and Group DynamicsJared Laswell
This document provides an overview of social media and group dynamics. It begins by defining social media and discussing some of the major social media platforms like Facebook and Twitter. It then explores how people communicate interpersonally on social media through features like status updates, direct messages, hashtags and more. The document also provides background on group dynamics and interpersonal communication. Finally, it compares and contrasts how group dynamics and social media impact each other, noting how social media has both been influenced by and influenced traditional group dynamics and communication.
The document discusses the rise of blogging and social media. It describes how blogs began as online diaries and became a new form of journalism and communication. It outlines how bloggers use various social media platforms, content aggregators, and linking to build audiences and influence. The mainstream media now adopts practices from blogs while blogs continue to break news faster and more transparently than traditional media.
A herd of freely associating, autonomous cats: how a Facebook group helped tu...NomadWarMachine
The document discusses why participants in the #rhizo14 MOOC used Facebook as their primary platform for discussion and community building. Facebook was convenient as many participants already used it regularly. Its openness welcomed diverse voices and perspectives. Interactions on Facebook led to deeper relationships and discussions beyond what was found on blogs and Twitter. However, some faced barriers due to Facebook's requirement to create an account and concerns about privacy and information overload. Alternatives like Google+ saw less activity.
This document discusses the issue of cyberbullying and its effects. It notes that with the rise of social media, bullying is no longer limited to face-to-face interactions but can occur online through platforms like Facebook, texting, and emails. This anonymity online empowers bullies and makes it difficult for victims to escape. The document also highlights statistics on how cyberbullying causes many students to miss school to avoid harassment. While social media connects people of all ages, it has also enabled new forms of bullying behavior. Solutions proposed include laws holding telecom companies and internet users accountable for spreading inappropriate images or online harassment. Overall, the document examines the growing problem of cyberbullying in the digital age.
In this thesis I address the fundamental elements of Facebook’s makeup that affect resulting social behaviors from participation with the site. In my exploration I first define the relationship between communication and social realities. It is through this relationship we begin to understand Facebook’s significance in our culture. I then consider the forms of communication media by which Facebook exists and their qualities. After briefly describing the inclination of news media interactions to embody entertainment, I argue for Facebook’s presence as a news media platform. Once establishing this I discuss inconsistencies in the site’s social qualification and legitimacy due to the localization of users’ participation within the realm of a vast network of the possibly accessible information. Facebook space is qualified; that is, it has degrees of value that differ among users. These inconsistencies are the cause of new yet subtle movements within socially acceptable behaviors. It is the trust and reliance of other users to give and gain information, inter-user dependency, which realizes and perpetuates these movements.
The document discusses both the positive and negative aspects of social media use. It notes that while social media is a useful tool, irresponsible use can enable online shaming, cyberbullying, and spread of misinformation. It provides examples like a woman who lost her job due to an insensitive tweet, and a case of cyberbullying that led to suicide. The document advocates thinking before posting and verifying information to minimize social media's downsides.
This document summarizes a talk on web spam and propaganda techniques. The talk discusses how web spam has evolved alongside search engines to manipulate rankings. Early spam involved keyword stuffing, while later spam focused on link farms and mutual admiration societies. The talk argues that web spam can be viewed as a form of propaganda that aims to modify the web graph for the spammer's benefit. It then discusses experimental results from an algorithm that identifies bi-connected components of distrusted sites to propagate distrust. The conclusions discuss how spam has become necessary as the web grows and how personalization, education and cyber-social networks could help address the problem.
Community Memory 1973 was the first public bulletin board system experiment in Berkeley, California. It aimed to understand how people would exchange information via computer.
Online communities have evolved significantly since the 1970s, beginning with Usenet in 1979 and organized into topic-based newsgroups. Multi-user dungeons in the 1980s allowed for text-based virtual worlds. Chat rooms and bulletin board systems hosted on individual systems also emerged. Today, threaded internet forums and social networks facilitate online communities.
The document discusses how Instagram has made the author and her friends perfectionists. It explores how people, especially young girls, curate their Instagram profiles to appear perfect by carefully selecting and editing photos. They obsess over getting the perfect photo and many likes and comments. However, the document notes that what people portray on social media is only a partial truth and highlights the story of a girl who seemed happy on Instagram but died by suicide. It analyzes Instagram through several mass media effects frameworks to understand how it influences behaviors and identities.
This document discusses how to identify influential people in online communities and build relationships with them. It explains that a small percentage of users, called "influentials", are responsible for most information sharing. The key is to provide value to these influentials by supporting and promoting their content, then they will support your content in return. Following basic social etiquette like commenting, sharing links respectfully is important for gaining influence online.
Becoming A Successful Online Ambassador to Online Communitieswaterwordsthatwork
This document discusses how to identify influential people in online communities and build relationships with them. It explains that a small percentage of users, called "influentials", are responsible for most information sharing. The key is to provide value to these influentials by supporting and promoting their content, then they will support your content in return. Following basic social etiquette like commenting, sharing links respectfully is important for gaining influence online.
This document summarizes the key terms of Facebook's terms of use policies regarding ownership of content, privacy, surveillance, censorship, and freedom of expression. The policies state that content uploaded to Facebook becomes their property, and they can collect data on users from user activity and information shared by others. While privacy settings allow some control, Facebook retains the right to make some content public. The extensive data collection raises privacy concerns. The policies also give Facebook the ability to censor content and limit expression, though this aims to create a safe environment for users. Overall, the terms highlight tensions between Facebook's business interests and users' control over personal information and expression.
The document discusses the issue of measuring influence on social media and some of the potential negative consequences. It provides examples of social media campaigns that backfired or had unintended consequences, such as discouraging genuine engagement and risk-taking in favor of superficial metrics. The document also discusses how social media can negatively impact children by increasing cyberbullying, narcissism, and risky behaviors.
Filipinos as netizens darna in cyberspaceMilen Ramos
This document discusses factors affecting how Filipinos behave online as "netizens". It finds that Filipinos spend significant time on the internet through smartphones, are more tolerant of slower loading sites than other Southeast Asians, and prefer mobile access over desktop. It also examines two types of internet trolls in the Philippines: those who openly disregard social norms to provoke reactions, and those who police online behavior and justify trolling to correct views they see as misguided.
This document discusses the negative effects of social media that have become more prominent. It begins by highlighting how social media has negatively impacted people's behavior by causing them to constantly focus on their mobile devices rather than engage with their real-world surroundings. The document then analyzes ten serious consequences of social media for modern society, such as addiction, security issues, economic deficits, and more. It concludes by proposing ways to address these problems, including promoting concepts like "Slow Tech" that encourage more mindful social media use.
This document discusses anonymity on social media and its effects. It notes that while anonymity allows people to discuss difficult topics privately, it can also enable bullying and harassment with few repercussions. The document examines both the benefits of anonymity, such as allowing privacy and exploration of identity, and the drawbacks, like cyberbullying and the disinhibition effect leading to more aggressive behaviors online. It concludes that while anonymity has value, social media sites should regulate anonymous interactions to curb bullying.
Social media? It’s serious! Understanding the dark side of social mediaIan McCarthy
Research and practice have mostly focused on the “bright side” of social media, aiming to understand and help in leveraging the manifold opportunities afforded by this technology. However, it is increasingly observable that social media present enormous risks for individuals, communities, firms, and even the whole of society. Examples for this “dark side” of social media include cyberbullying, addictive use, trolling, online witch hunts, fake news, and privacy abuse. In this article, we aim to illustrate the multidimensionality of the dark side of social media and describe the related various undesirable outcomes. To do this, we adapt the established social media honeycomb framework to explain the dark side implications of each of the seven functional building blocks: conversations, sharing, presence, relationships, reputation, groups, and identity. On the basis of these reflections, we present a number of avenues for future research, so as to facilitate a better understanding and use of social media.
Presentation a BGIedu (Bainbridge Graduate Institute) alumni workshop "Introduction to the Social Web". Topics included Shared Language, Definitions of Social Web, Social Networking, Social Media, Web 2.0, Blogs, etc.
Independent study--Social Media and Group DynamicsJared Laswell
This document provides an overview of social media and group dynamics. It begins by defining social media and discussing some of the major social media platforms like Facebook and Twitter. It then explores how people communicate interpersonally on social media through features like status updates, direct messages, hashtags and more. The document also provides background on group dynamics and interpersonal communication. Finally, it compares and contrasts how group dynamics and social media impact each other, noting how social media has both been influenced by and influenced traditional group dynamics and communication.
The document discusses the rise of blogging and social media. It describes how blogs began as online diaries and became a new form of journalism and communication. It outlines how bloggers use various social media platforms, content aggregators, and linking to build audiences and influence. The mainstream media now adopts practices from blogs while blogs continue to break news faster and more transparently than traditional media.
A herd of freely associating, autonomous cats: how a Facebook group helped tu...NomadWarMachine
The document discusses why participants in the #rhizo14 MOOC used Facebook as their primary platform for discussion and community building. Facebook was convenient as many participants already used it regularly. Its openness welcomed diverse voices and perspectives. Interactions on Facebook led to deeper relationships and discussions beyond what was found on blogs and Twitter. However, some faced barriers due to Facebook's requirement to create an account and concerns about privacy and information overload. Alternatives like Google+ saw less activity.
This document discusses the issue of cyberbullying and its effects. It notes that with the rise of social media, bullying is no longer limited to face-to-face interactions but can occur online through platforms like Facebook, texting, and emails. This anonymity online empowers bullies and makes it difficult for victims to escape. The document also highlights statistics on how cyberbullying causes many students to miss school to avoid harassment. While social media connects people of all ages, it has also enabled new forms of bullying behavior. Solutions proposed include laws holding telecom companies and internet users accountable for spreading inappropriate images or online harassment. Overall, the document examines the growing problem of cyberbullying in the digital age.
In this thesis I address the fundamental elements of Facebook’s makeup that affect resulting social behaviors from participation with the site. In my exploration I first define the relationship between communication and social realities. It is through this relationship we begin to understand Facebook’s significance in our culture. I then consider the forms of communication media by which Facebook exists and their qualities. After briefly describing the inclination of news media interactions to embody entertainment, I argue for Facebook’s presence as a news media platform. Once establishing this I discuss inconsistencies in the site’s social qualification and legitimacy due to the localization of users’ participation within the realm of a vast network of the possibly accessible information. Facebook space is qualified; that is, it has degrees of value that differ among users. These inconsistencies are the cause of new yet subtle movements within socially acceptable behaviors. It is the trust and reliance of other users to give and gain information, inter-user dependency, which realizes and perpetuates these movements.
The document discusses both the positive and negative aspects of social media use. It notes that while social media is a useful tool, irresponsible use can enable online shaming, cyberbullying, and spread of misinformation. It provides examples like a woman who lost her job due to an insensitive tweet, and a case of cyberbullying that led to suicide. The document advocates thinking before posting and verifying information to minimize social media's downsides.
This document summarizes a talk on web spam and propaganda techniques. The talk discusses how web spam has evolved alongside search engines to manipulate rankings. Early spam involved keyword stuffing, while later spam focused on link farms and mutual admiration societies. The talk argues that web spam can be viewed as a form of propaganda that aims to modify the web graph for the spammer's benefit. It then discusses experimental results from an algorithm that identifies bi-connected components of distrusted sites to propagate distrust. The conclusions discuss how spam has become necessary as the web grows and how personalization, education and cyber-social networks could help address the problem.
Community Memory 1973 was the first public bulletin board system experiment in Berkeley, California. It aimed to understand how people would exchange information via computer.
Online communities have evolved significantly since the 1970s, beginning with Usenet in 1979 and organized into topic-based newsgroups. Multi-user dungeons in the 1980s allowed for text-based virtual worlds. Chat rooms and bulletin board systems hosted on individual systems also emerged. Today, threaded internet forums and social networks facilitate online communities.
The document discusses how Instagram has made the author and her friends perfectionists. It explores how people, especially young girls, curate their Instagram profiles to appear perfect by carefully selecting and editing photos. They obsess over getting the perfect photo and many likes and comments. However, the document notes that what people portray on social media is only a partial truth and highlights the story of a girl who seemed happy on Instagram but died by suicide. It analyzes Instagram through several mass media effects frameworks to understand how it influences behaviors and identities.
This document discusses how to identify influential people in online communities and build relationships with them. It explains that a small percentage of users, called "influentials", are responsible for most information sharing. The key is to provide value to these influentials by supporting and promoting their content, then they will support your content in return. Following basic social etiquette like commenting, sharing links respectfully is important for gaining influence online.
Becoming A Successful Online Ambassador to Online Communitieswaterwordsthatwork
This document discusses how to identify influential people in online communities and build relationships with them. It explains that a small percentage of users, called "influentials", are responsible for most information sharing. The key is to provide value to these influentials by supporting and promoting their content, then they will support your content in return. Following basic social etiquette like commenting, sharing links respectfully is important for gaining influence online.
The document discusses key aspects of designing online communities and social software. It outlines patterns for community elements like identity, presence, reputation, relationships, groups, conversations, and sharing. It emphasizes designing for user handles, recognizing contributions, and limiting group size to support conversations. It also notes motivations for user participation, like reciprocity, reputation, and attachment to groups.
The document discusses key considerations for designing online communities and social software. It outlines patterns for building community, including focusing on user identity, reputation systems, groups, conversations, and sharing. It also discusses motivations for user participation like reciprocity, reputation, and sense of belonging. Community software should support presence, conversations, relationships, groups, reputation, and identity.
The document summarizes a study of the "rec. motorcycles" online forum from 2000. It discusses how forum members establish credibility through detailed responses using technical jargon. It also notes how anonymity online can reduce inhibitions, allowing "trolls" to disrupt discussions. Finally, it compares individual and group behaviors, suggesting online forums resemble "groups" where people act differently than alone due to less accountability.
Gunalan Ranganahan is presenting a final year project on the negative impacts of social networking. The project will use projection mapping to demonstrate how social networking can negatively impact individuals and society through teasing. Research found that while users are aware of potential downsides, many underestimate the risks or become addicted. The presentation will last 2-5 minutes and use text, images, video, animation and sound effects to metaphorically portray social networking's downsides like privacy issues, stress on families, and addiction. The goal is to educate viewers on social media's realities beyond communication.
The document discusses various ethical issues related to social media use and mobile access of social media. It notes that mobile access of social networking sites has grown significantly in recent years. It also presents a scenario where a professor took a photo of other professors at an event without their permission, raising questions about ethics and consent. Finally, it outlines some of the ethical perspectives like utilitarianism, rights, fairness and virtue that can be used to analyze social media and privacy issues.
Social networking sites like Facebook, MySpace, and Twitter allow people to connect with friends and share information, but they also pose risks if personal details are shared publicly. While social media can benefit relationships and businesses, young users are especially vulnerable to threats from predators if not properly monitored by parents. The document discusses both the positive and negative aspects of social networking and emphasizes the importance of privacy and parental oversight for teen users.
The document discusses the psychology behind social media use and behaviors. It explains that social media taps into human desires for dopamine, which creates wanting, and oxytocin, which promotes feelings of love, trust and empathy. These biochemical reactions help explain why social media is addictive and why people feel good after use. The document also analyzes common social media behaviors like posting, sharing, liking, and commenting, tying each back to psychological motivations around self-presentation, relationships, and social influence.
The document discusses various ethical issues related to social media use and mobile access of social media. It provides statistics on growing mobile access and use of social networking apps. It raises questions about getting permission before posting photos of people online and discusses different ethical perspectives like utilitarianism, rights, fairness and virtue. It also mentions guidelines from organizations like AP on retweeting and potential social media pitfalls.
Ethics in social media - targeted to journalists, but applicable to students and professionals. This was done as a "quiz" to promote discussion - presenter should show the first slide and ask the question - then show the answer on the next slide.
Delivered at SMX Social Media 2014, this presentation explores the user social sharing behavior and how to craft a user experience that capitalizes on user preference for social search.
Presentation to Rockland County Capacity Building Initiative - Cornell Cooper...Howard Greenstein
This document provides an overview of implementing social networks for non-profits. It discusses various social media tools including websites, Facebook, YouTube, blogs and more. It emphasizes the importance of defining goals for social media use and measuring outcomes. Key aspects covered include listening to constituents, participating in discussions, creating owned media spaces, and enabling supporters to promote your cause through their own networks. The document also provides examples and tips for using specific social networks effectively.
CISummit 2013: Ron Burt, The Social Origins of Your Reputation: The Social Ps...Steven Wardell
The document discusses Ronald Burt's work on social networks and competitive advantage. It summarizes some of his key concepts including brokerage, closure, and structural holes. It provides links to download related teaching materials from Burt's website that cover these topics. It also includes a graph showing how investment bankers with a positive reputation had higher compensation and occupied more brokered positions in the network that enabled them to bridge structural holes.
Effects of Social Media on Young AdultsRatan Rajpal
The document discusses the effects of social media on young adults. It notes that while social media allows people to easily connect with others, it may also negatively impact real-life interactions and communication. Some disadvantages include reduced face-to-face interactions, increased online bullying, and the prioritization of online popularity over real-world connections. The document also examines how social media influences business communication and trends in social networking sites.
The document discusses designing social websites and communities. It covers defining identity through profiles and presence, building relationships through contacts, attention and groups, encouraging activity through sharing, conversations and collaboration, and using social space for distribution and viral growth. Key aspects include reducing friction, having an impact, targeting features for most useful users, and outreach. Community management topics like norms, moderation and adapting to users are also addressed.
The document discusses media literacy and the impact of social media. It defines media literacy as the ability to access, analyze, evaluate, and create media. Regarding social media's impact, it notes that many people use social media daily and teens in particular rely on mobile phones to communicate. Both positive and negative impacts are discussed, such as social media helping people connect but also potentially leading to isolation, addiction, and oversharing. The document provides scenarios of cyberbullying situations and recommends talking regularly with kids, setting rules for social media use, and having them consider how their posts might affect others. It concludes by listing resources for parents on media literacy and cyberbullying prevention.
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANEFebless Hernane
CapCut is an easy-to-use video editing app perfect for beginners. To start, download and open CapCut on your phone. Tap "New Project" and select the videos or photos you want to edit. You can trim clips by dragging the edges, add text by tapping "Text," and include music by selecting "Audio." Enhance your video with filters and effects from the "Effects" menu. When you're happy with your video, tap the export button to save and share it. CapCut makes video editing simple and fun for everyone!
Connect Conference 2022: Passive House - Economic and Environmental Solution...TE Studio
Passive House: The Economic and Environmental Solution for Sustainable Real Estate. Lecture by Tim Eian of TE Studio Passive House Design in November 2022 in Minneapolis.
- The Built Environment
- Let's imagine the perfect building
- The Passive House standard
- Why Passive House targets
- Clean Energy Plans?!
- How does Passive House compare and fit in?
- The business case for Passive House real estate
- Tools to quantify the value of Passive House
- What can I do?
- Resources
ARENA - Young adults in the workplace (Knight Moves).pdfKnight Moves
Presentations of Bavo Raeymaekers (Project lead youth unemployment at the City of Antwerp), Suzan Martens (Service designer at Knight Moves) and Adriaan De Keersmaeker (Community manager at Talk to C)
during the 'Arena • Young adults in the workplace' conference hosted by Knight Moves.
Architectural and constructions management experience since 2003 including 18 years located in UAE.
Coordinate and oversee all technical activities relating to architectural and construction projects,
including directing the design team, reviewing drafts and computer models, and approving design
changes.
Organize and typically develop, and review building plans, ensuring that a project meets all safety and
environmental standards.
Prepare feasibility studies, construction contracts, and tender documents with specifications and
tender analyses.
Consulting with clients, work on formulating equipment and labor cost estimates, ensuring a project
meets environmental, safety, structural, zoning, and aesthetic standards.
Monitoring the progress of a project to assess whether or not it is in compliance with building plans
and project deadlines.
Attention to detail, exceptional time management, and strong problem-solving and communication
skills are required for this role.
Technoblade The Legacy of a Minecraft Legend.Techno Merch
Technoblade, born Alex on June 1, 1999, was a legendary Minecraft YouTuber known for his sharp wit and exceptional PvP skills. Starting his channel in 2013, he gained nearly 11 million subscribers. His private battle with metastatic sarcoma ended in June 2022, but his enduring legacy continues to inspire millions.
Decormart Studio is widely recognized as one of the best interior designers in Bangalore, known for their exceptional design expertise and ability to create stunning, functional spaces. With a strong focus on client preferences and timely project delivery, Decormart Studio has built a solid reputation for their innovative and personalized approach to interior design.
PDF SubmissionDigital Marketing Institute in NoidaPoojaSaini954651
https://www.safalta.com/online-digital-marketing/advance-digital-marketing-training-in-noidaTop Digital Marketing Institute in Noida: Boost Your Career Fast
[3:29 am, 30/05/2024] +91 83818 43552: Safalta Digital Marketing Institute in Noida also provides advanced classes for individuals seeking to develop their expertise and skills in this field. These classes, led by industry experts with vast experience, focus on specific aspects of digital marketing such as advanced SEO strategies, sophisticated content creation techniques, and data-driven analytics.
Practical eLearning Makeovers for EveryoneBianca Woods
Welcome to Practical eLearning Makeovers for Everyone. In this presentation, we’ll take a look at a bunch of easy-to-use visual design tips and tricks. And we’ll do this by using them to spruce up some eLearning screens that are in dire need of a new look.
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page pmgdscunsri
Figma is a cloud-based design tool widely used by designers for prototyping, UI/UX design, and real-time collaboration. With features such as precision pen tools, grid system, and reusable components, Figma makes it easy for teams to work together on design projects. Its flexibility and accessibility make Figma a top choice in the digital age.
International Upcycling Research Network advisory board meeting 4Kyungeun Sung
Slides used for the International Upcycling Research Network advisory board 4 (last one). The project is based at De Montfort University in Leicester, UK, and funded by the Arts and Humanities Research Council.
Fonts play a crucial role in both User Interface (UI) and User Experience (UX) design. They affect readability, accessibility, aesthetics, and overall user perception.
1. PATRICK:
Social media has established new and innovative ways for people to get in touch with
each other. Now the use of social media is not just limited to discussing family events
or sharing photos and videos but can actually create history and make a difference in
the real world. In this presentation we will be examining democratic social networks
such as Reddit & Yik-Yak whilst also examining a range of issues such as:
Does the anonymity provided by these networks breed unsavoury and distasteful
behaviour?
Are sites like reddit truly as democratic as they claim? Do sites like these enhance the
possibility for or in some cases stifle free speech?
Do the actions of other users effect the types of content that becomes popular?
Our hypothesisis is that upvotes on a post often promotes more upvotes, That
provocative content begets more provocative content & that anonymity makes users
more critical.
1
2. BRYAN:
An example of a democratic social network is Reddit.
Reddit is an entertainment, social networking, and news website where registered
community members can submit content, such as text posts or direct links, making it
essentially an online bulletin board system. Users can then vote submissions up or
down to organize the posts and determine their position on the site's pages. Content
entries are organized by areas of interest called "subreddits". The subreddit topics
include news, gaming, movies, music, books, fitness, food, and photosharing, among
many others.
One of the big criticisms of reddit is that: whilst it's important for people to have a
platform to express their views, even if those views may be unpopular or downright
offensive, The voting system means that unpopular opinions tend to get quickly
hidden, and subreddit moderators are given full reign to turn their subreddits into
echo chambers.
2
3. BRYAN:
Anonymous social media is a subcategory of social media where the main social
functionality is to share and interact around content and information anonymously on
mobile and web-based platforms.
Yik Yak is a social media smartphone application. It is available for iOS and Android
and it allows people anonymously to create and view posts or "Yaks" within a 5-mile
radius. It is intended for sharing primarily with those in proximity to the user,
potentially making it more intimate and relevant for people reading the posts. All
users have the ability to contribute to the stream by writing, responding, and "voting
up" or "voting down" (liking or disliking) yaks.
As well as being anonymous YikYak is also a democratic social network, following the
lead of forums like reddit that use upvoting as "community sourced decisions." The
idea behind both is that compelling, unique posts will float to the top, and weak ones
will sink to the bottom.
One of the biggest criticisms of social media sites and applications is their inherent
3
4. potential to feed the growing problem of cyber-bullying. Due to the widespread
bullying and harassment committed through Yik Yak, many schools and school
districts have taken action to ban the app.
On October 3, 2014, The Huffington Post published an editorial titled "Why Your
College Campus Should Ban Yik Yak," which asserted that Yik Yak's anonymous
messaging boards "are like bathroom stalls without toilets. They're useless, they're
sources of unhelpful or harmful conversations, and they're a complete eyesore.”
3
5. PATRICK:
Voting on sites such as reddit are supposed to be indicative of the quality of the post
and not the users personal opinion. A lot of users tend to forget this and vote with a
personal bias anyway. With this in mind…
For this activity we would like to simulate an online thread. We will show you some
reddit posts. You will upvote or downvote certain statements, images & content using
only sticky notes. Write your name on the sticky note and draw an arrow indicating
whether it is an upvote or downvote.
4
6. For this activity we would like to simulate an online thread. Using sticky notes you will
show your feelings towards certain statements, images & content using only upvotes
and downvotes.
Write name on sticky note.
5
7. For this activity we would like to simulate an online thread. Using sticky notes you will
show your feelings towards certain statements, images & content using only upvotes
and downvotes.
Write name on sticky note.
6
8. For this activity we would like to simulate an online thread. Using sticky notes you will
show your feelings towards certain statements, images & content using only upvotes
and downvotes.
Write name on sticky note.
7
9. For this activity we would like to simulate an online thread. Using sticky notes you will
show your feelings towards certain statements, images & content using only upvotes
and downvotes.
Write name on sticky note.
8
10. For this activity we would like to simulate an online thread. Using sticky notes you will
show your feelings towards certain statements, images & content using only upvotes
and downvotes.
Write name on sticky note.
9
11. For this activity we would like to simulate an online thread. Using sticky notes you will
show your feelings towards certain statements, images & content using only upvotes
and downvotes.
Write name on sticky note.
10
12. For this activity we would like to simulate an online thread. Using sticky notes you will
show your feelings towards certain statements, images & content using only upvotes
and downvotes.
Write name on sticky note.
11
13. For this activity we would like to simulate an online thread. Using sticky notes you will
show your feelings towards certain statements, images & content using only upvotes
and downvotes.
Write name on sticky note.
12
14. For this activity we would like to simulate an online thread. Using sticky notes you will
show your feelings towards certain statements, images & content using only upvotes
and downvotes.
Write name on sticky note.
13
15. For this activity we would like to simulate an online thread. Using sticky notes you will
show your feelings towards certain statements, images & content using only upvotes
and downvotes.
Write name on sticky note.
14
16. BRYAN:
For this activity we would like you to vote on the exact same posts you just seen, but
this time using the sheet we have provided. You don’t need to write your name, make
sure no one sees.
You have two minutes.
15
17. PATRICK
The ‘online disinhibition effect’ is a loosening (or complete abandonment) of social
restrictions and inhibitions that would otherwise be present in normal face-to-face
interaction during interactions with others on the Internet. This effect is caused by
many factors, including dissociative anonymity, invisibility, and minimization of
authority.
Because of this loss of inhibition, some users may exhibit benign (pronounced
BEENINE) tendencies, including becoming more affectionate, more willing to open up
to others, and less guarded about emotions, all in an attempt to achieve emotional
catharsis. According to psychologist John Suler, this particular occurrence is called
benign disinhibition.
With respect to bad behavior, users on the Internet can frequently do or say as they
wish without fear of any kind of meaningful reprisal. In most Internet forums, the
worst kind of punishment one can receive for bad behavior is usually being banned
from a particular site. In practice, however, this serves little use; the person involved
can usually circumvent the ban by simply registering another username and
16
18. continuing the same behavior as before. Suler calls this toxic disinhibition.
Perhaps one of the most serious consequences of the online disinhibition effect is the
advent of cyberbulling . The website overcomebullying.org states that "with the
advent of modern communications such as email, chat, text messaging and
smartphones as well as the ability to publish online on websites, blogs and social
networking sites such as Facebook making their message instantly available to
millions, the bully's reach and powers of social manipulation have been increased
exponentially".
In regards to ACTIVITY 2: We wanted to see if everyone's votes from the first activity
had changed at all when done anonymously, whether they would be more critical
towards the posts they where viewing and to see if they voted differently when they
did not see the votes of their peers. Which brings us on to…
16
19. PATRICK:
So, are upvotes democratic? Reddit is a democracy! much like The United States.
However, in both cases, the notion of true democracy may well be an illusion. Does
seeing upvotes on a post promotes more upvotes? Does provocative content beget
more provocative content? These are all issues we wished to explore through our
experiments.
The Internet has increased the likelihood that our decisions will be influenced by
those being made around us. On the one hand, group decision-making can lead to
better decisions, but it can also lead to “herding effects” that have resulted in
unsavoury or provocative posts rising to the top.
According to Muchnik, Aral & Taylor “negative social influence inspired users to
correct manipulated ratings, positive social influence increased the likelihood of
positive ratings by 32% and created accumulating positive herding that increased final
ratings by 25% on average. “
So ,for our first activity we actually manipulated the votes by asking a range of
17
20. people in the class to upvote every post they seen (Can these people please stand
up). We did this to test whether or not the class seeing others voting affected their
decisions in any way.
Source: Muchnik, L, Aral, S, & Taylor, S n.d., 'Social Influence Bias: A Randomized
Experiment', Science, 341, 6146, pp. 647-651, Social Sciences Citation Index,
EBSCOhost, viewed 24 October 2015.
17
21. BRYAN:
So during the course of our experiments we wished to see if anonymity changed the
opinions of those when voting on posts.
We also wanted to explore the concept of social influence and its applications both
online and off. We wanted to find out if the manipulating the votes could influence
the actions of others in the room and to what extent. From the data we have
collected today we will able to further investigate these issues and determine
whether our original hypothesisis was correct or not.
NOTES on hypothesisis : (that upvotes on a post often promotes more upvotes, That
provocative content begets more provocative content & that anonymity makes users
more critical.)
18