In this session, we talk about the mobile and social web, and how it shapes economy, individual behavior and well-being, political events, and society as a whole.
Social Technology
by Marti A. Hearst
We are in the midst of extraordinary
change in how people interact with one
another and with information. A
combination of advances in technology
and change in people's expectations is
altering the way products are sold,
scientific problems are solved, software
is written, elections are conducted, and
government is run.
People are social animals, and as Shirky
notes, we now have tools that are
flexible enough to match our in-built
social capabilities. Things can get
done that weren't possible before
because the right expertise, the missing
information, or a large enough group of
people can now be gathered together at
low cost.
These developments open a number of
interesting questions for NSF and CISE.
What are the key research problems? How
should these developments change how
research is conducted? How can the
intersection of social science and
technology research be aided or
improved? And how should this effect
how NSF researchers get involved with
relevant government efforts, including
transparent government, emergency
response, and citizen science?
In this talk I attempt to summarize
and put some structure around some of
these developments.
As our lives are more and more digital, more and more personal data travels. Consumers are becoming aware & worry, especially in a context of scandals around privacy on internet. Brands have to change their approach to big data to establish a real trusting relationship with their consumers.
A version of these slides are used in my Going Social programme workshop, Your Digital Identity, for staff and postgraduate researchers at the University of Leeds.
In this session, we talk about the mobile and social web, and how it shapes economy, individual behavior and well-being, political events, and society as a whole.
Social Technology
by Marti A. Hearst
We are in the midst of extraordinary
change in how people interact with one
another and with information. A
combination of advances in technology
and change in people's expectations is
altering the way products are sold,
scientific problems are solved, software
is written, elections are conducted, and
government is run.
People are social animals, and as Shirky
notes, we now have tools that are
flexible enough to match our in-built
social capabilities. Things can get
done that weren't possible before
because the right expertise, the missing
information, or a large enough group of
people can now be gathered together at
low cost.
These developments open a number of
interesting questions for NSF and CISE.
What are the key research problems? How
should these developments change how
research is conducted? How can the
intersection of social science and
technology research be aided or
improved? And how should this effect
how NSF researchers get involved with
relevant government efforts, including
transparent government, emergency
response, and citizen science?
In this talk I attempt to summarize
and put some structure around some of
these developments.
As our lives are more and more digital, more and more personal data travels. Consumers are becoming aware & worry, especially in a context of scandals around privacy on internet. Brands have to change their approach to big data to establish a real trusting relationship with their consumers.
A version of these slides are used in my Going Social programme workshop, Your Digital Identity, for staff and postgraduate researchers at the University of Leeds.
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxdavieec5f
Web 2.0: 2001–Present
Assignment Overview
It is a truism in the study of human technology that any tool that gets the public’s attention will eventually be used for purposes entirely unforeseen by its inventor(s) and probably contrary to the general public interest. This has certainly been the case with information technologies and the Internet. E-mail is great, but spam is not. Online video of the grandkids is wonderful; online pornography accessible to little Johnny, not so much. Despite much breast beating, it is difficult to have the good without the bad—and even differentiating the good from the bad is often a matter of opinion. As
Miles’ Law
says, “Where you stand depends upon where you sit.”
Recently, we have become so saturated with and dependent upon social media such as Facebook and Twitter that we have not always noticed the potential “dark side”—most specifically, the ability to use these tools not only to connect individuals in cyberspace but also to mobilize groups for action in the real world. One example is the “flash mob”—defined most generally as a group of people voluntarily assembled at a particular place and time for a particular purpose, coordinated through shared access to social media. This is not altogether a new invention—the telephone and, before that, the telegraph or even a good strong voice have been tools for assembling flash mobs in the past. But what has been recently discovered is how easy it is using modern social media, and how effective such mobs can be.
As we said, whether or not you consider this to be a good development or a bad development depends a lot on how you evaluate the purpose of the mob. Public assemblies to install democracy in an authoritarian state sound pretty good; assembling gang members to break windows and burn cars would not strike most of us as all that great. Here is a sampling of different points of view on this general subject:
Tavoulareas, E. (2011, August 22). Social media: The Jekyll & Hyde of media?
Changemakers
. Retrieved from
http://www.changemakers.com/blog/social-media-jekyll-hyde-media
Goodman, J. (2011, August 17). Debate over social media incitement as flash mobs strike. The Lede: Blogging the News.
New York Times
. Retrieved from
http://thelede.blogs.nytimes.com/2011/08/17/debate-over-social-media-incitement-as-flash-mobs-strike/
Brennan, E. (2011, August 19). Flash Mobs – The dark side of social media revealed. Retrieved from
http://www.i-policy.org/2011/08/flash-mobs-the-dark-side-of-social-media-revealed.html
Lum, R. (2011) Spreading the happiness one flash mob at a time.
CreativeGuerillaMarketin
g. Retrieved from
http://www.creativeguerrillamarketing.com/guerrilla-marketing/spreading-happiness-flash-mob-time/
Optional Reading
Kelly, L. (2011, March 22). Advertising with flash mobs.
JSNCafe
. Retrieved from
http://www.jsncafe.com/advertising-with-flash-mobs/
Heaney, F. (n.d.) The short life of flash mobs.
Stay Free!.
Retrieved from
http://www.alternet.
Internet Privacy Essay
Internet Privacy Essays
Internet Privacy
Essay On Internet Privacy
Internet and Personal Privacy Essay
Essay on Internet Privacy
Internet Privacy Essay
Internet Privacy.
Internet Privacy Essay
Internet Privacy Analysis
Social Media Introduction for Communications and PR Professionals - by Jos Sc...Jos Schuurmans
An introduction to social media, prepared for a seminar for communications and public relations professionals in Helsinki, Finland, January 2009, by Jos Schuurmans, http://www.josschuurmans.com/contact
Part 1 Information networking as technology tools, uses, and soci.docxherbertwilson5999
Part 1: Information networking as technology: tools, uses, and socio-technical interactions
Information overload! The phrase alone is enough to strike terror into the hardiest of managers; it presages the breakdown of society as we know it and the failure of management to cope with change. The media constantly dissect the forthcoming collapse brought on by TMI ("Too Much Information"), even as they themselves pile up larger and larger dossiers on the subject, and we are frequently informed that it is our own damn fault that we are drowning in data, since we simply can't discriminate between the important stuff and everything else. Hence, the info-tsunami warning signs posted all along what we once so naively called the "information superhighway".
Of course, this is arrant nonsense -- human beings have been suffering from information overload in varying forms since about the time we hit the ground and found ourselves simultaneously running after the antelope and away from the lion. There's no question that the human mind has a limited capacity to process information, but after several million years we've gotten pretty good at figuring out how to handle a lot. The two basic tricks turn out to be distinguishing between short-term and long-term information storage, and "chunking" -- putting things in a limited number of baskets. This isn't primarily a course in the psychology of memory -- it's about information tools and systems -- but in fact the same things that make our information tools and systems work are the same things that have kept us near the antelopes and away from the lions (mostly) for the last million years or so. So we're beginning this course by thinking about information tools, what makes them like and unlike other kinds of tools, how the concept of a socio-technical system (in which social and behavioral functions shape results as much as does the technology itself) helps make sense of what we're facing, and why the technology just might win after all.
Let's start with a little historical review. Amy Blair has recently done a very intriguing summary of just why information overload isn't something that we, or still less our kids, dreamed up -- people have been drowning in data for ages regardless of the tools at their disposal:
Blair, A. (2010) Information Overload, Then and Now. The Chronicle of Higher Education Review. November 28.Retrieved November 15, 2010 from http://chronicle.com/article/Information-Overload-Then-and/125479/?sid=cr&utm_source=cr&utm_medium=en
We thought we had it all nailed down when the information theorists came up with their typology distinguishing between "data" (raw stuff), "information" (cooked stuff), and "knowledge" (cooked stuff that we've eaten). This rather elegant approach did have the virtue of emphasizing that information processing is a human task, even though we might delegate part of it to machinery, and that the tests of that task are the results for humans. It helps return us to .
Rise of the machines: Social media meets Artificial intelligenceArmend Ukshini
How does social media use our data to make money from us? How does AI influence our buying decisions through ad targeting? How are bots used in customer service? How is Youtube fighting terrorism? Does social media know us better than our friends? How is Facebook trying to prevent suicide? How has Pinterest visual search transformed itself from a social media into an e-commerce? How will the social media of the future be based on a virtual environment?
Trying to give an answer to the questions of one of the hottest topics on technology and media ‘Rise of the machines: Social media meets Artificial intelligence’ at KosbitTalks.
Keynote on "Social Machines: Democratisation, Disintermediation, and Citizens at Scale" presented at the Web Science and Big Data Analytics Conference on Information Transparency and Digital Democracy, Tuesday, 25th August 2015, Jakarta Indonesia
Tutorial for ACM Multimedia 2016, given together with Gerald Friedland, with contributions from Julia Bernd and Yiannis Kompatsiaris. The presentation covered an introduction to the problem of disclosing personal information through multimedia sharing, the associated security risks, methods for conducting multimodla inferences and technical frameworks that could help alleviate such risks.
Data fluency in today’s connected world has become a leverage point, inaccessible to many, leaving them unable to assess critical factors to act in their own or their communities’ interests. Data is a language that many people don’t speak, thus being conversant is becoming a societal “gap.” Data seed narratives. Powerful narratives can drive actions or they can distract and misinform. At a time with less institutional protection and fewer objective referees, those of us fluent in data need to help our communities understand data-driven systems and learn to speak the language.
Shaking Hands with the Future: Culture and Heritage at a Moment Full of ChangeMichael Edson
Keynote for the congress of the Network Oorlogsbronnen (Netherlands WWII data network), Amsterdam, The Netherlands
2 November 2021.
Note that some of the text/callouts seem hard to read w. SlideShare's new compression scheme — sorry about that! Probably best to download the show and view it in PowerPoint, or, I've put a link to a PDF version on slide 2 (and the links work on the PDF version too!)
(This is the second version of these slides. The previous version was for some reason flagged as suspicious by SlideShare and made irrevocably un-shareable.)
Digital Culture and the Shaking Hand of ChangeMichael Edson
The presentation shows how to create and use a "problem space" to organize complex challenges. The central metaphor for the talk is the "civic handshake" — a process by which different parts of society cooperate through the informal exchange of information and the sharing of responsibilities.
More Related Content
Similar to The Web We Want: Dealing with the dark side of social media (work in progress)
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxdavieec5f
Web 2.0: 2001–Present
Assignment Overview
It is a truism in the study of human technology that any tool that gets the public’s attention will eventually be used for purposes entirely unforeseen by its inventor(s) and probably contrary to the general public interest. This has certainly been the case with information technologies and the Internet. E-mail is great, but spam is not. Online video of the grandkids is wonderful; online pornography accessible to little Johnny, not so much. Despite much breast beating, it is difficult to have the good without the bad—and even differentiating the good from the bad is often a matter of opinion. As
Miles’ Law
says, “Where you stand depends upon where you sit.”
Recently, we have become so saturated with and dependent upon social media such as Facebook and Twitter that we have not always noticed the potential “dark side”—most specifically, the ability to use these tools not only to connect individuals in cyberspace but also to mobilize groups for action in the real world. One example is the “flash mob”—defined most generally as a group of people voluntarily assembled at a particular place and time for a particular purpose, coordinated through shared access to social media. This is not altogether a new invention—the telephone and, before that, the telegraph or even a good strong voice have been tools for assembling flash mobs in the past. But what has been recently discovered is how easy it is using modern social media, and how effective such mobs can be.
As we said, whether or not you consider this to be a good development or a bad development depends a lot on how you evaluate the purpose of the mob. Public assemblies to install democracy in an authoritarian state sound pretty good; assembling gang members to break windows and burn cars would not strike most of us as all that great. Here is a sampling of different points of view on this general subject:
Tavoulareas, E. (2011, August 22). Social media: The Jekyll & Hyde of media?
Changemakers
. Retrieved from
http://www.changemakers.com/blog/social-media-jekyll-hyde-media
Goodman, J. (2011, August 17). Debate over social media incitement as flash mobs strike. The Lede: Blogging the News.
New York Times
. Retrieved from
http://thelede.blogs.nytimes.com/2011/08/17/debate-over-social-media-incitement-as-flash-mobs-strike/
Brennan, E. (2011, August 19). Flash Mobs – The dark side of social media revealed. Retrieved from
http://www.i-policy.org/2011/08/flash-mobs-the-dark-side-of-social-media-revealed.html
Lum, R. (2011) Spreading the happiness one flash mob at a time.
CreativeGuerillaMarketin
g. Retrieved from
http://www.creativeguerrillamarketing.com/guerrilla-marketing/spreading-happiness-flash-mob-time/
Optional Reading
Kelly, L. (2011, March 22). Advertising with flash mobs.
JSNCafe
. Retrieved from
http://www.jsncafe.com/advertising-with-flash-mobs/
Heaney, F. (n.d.) The short life of flash mobs.
Stay Free!.
Retrieved from
http://www.alternet.
Internet Privacy Essay
Internet Privacy Essays
Internet Privacy
Essay On Internet Privacy
Internet and Personal Privacy Essay
Essay on Internet Privacy
Internet Privacy Essay
Internet Privacy.
Internet Privacy Essay
Internet Privacy Analysis
Social Media Introduction for Communications and PR Professionals - by Jos Sc...Jos Schuurmans
An introduction to social media, prepared for a seminar for communications and public relations professionals in Helsinki, Finland, January 2009, by Jos Schuurmans, http://www.josschuurmans.com/contact
Part 1 Information networking as technology tools, uses, and soci.docxherbertwilson5999
Part 1: Information networking as technology: tools, uses, and socio-technical interactions
Information overload! The phrase alone is enough to strike terror into the hardiest of managers; it presages the breakdown of society as we know it and the failure of management to cope with change. The media constantly dissect the forthcoming collapse brought on by TMI ("Too Much Information"), even as they themselves pile up larger and larger dossiers on the subject, and we are frequently informed that it is our own damn fault that we are drowning in data, since we simply can't discriminate between the important stuff and everything else. Hence, the info-tsunami warning signs posted all along what we once so naively called the "information superhighway".
Of course, this is arrant nonsense -- human beings have been suffering from information overload in varying forms since about the time we hit the ground and found ourselves simultaneously running after the antelope and away from the lion. There's no question that the human mind has a limited capacity to process information, but after several million years we've gotten pretty good at figuring out how to handle a lot. The two basic tricks turn out to be distinguishing between short-term and long-term information storage, and "chunking" -- putting things in a limited number of baskets. This isn't primarily a course in the psychology of memory -- it's about information tools and systems -- but in fact the same things that make our information tools and systems work are the same things that have kept us near the antelopes and away from the lions (mostly) for the last million years or so. So we're beginning this course by thinking about information tools, what makes them like and unlike other kinds of tools, how the concept of a socio-technical system (in which social and behavioral functions shape results as much as does the technology itself) helps make sense of what we're facing, and why the technology just might win after all.
Let's start with a little historical review. Amy Blair has recently done a very intriguing summary of just why information overload isn't something that we, or still less our kids, dreamed up -- people have been drowning in data for ages regardless of the tools at their disposal:
Blair, A. (2010) Information Overload, Then and Now. The Chronicle of Higher Education Review. November 28.Retrieved November 15, 2010 from http://chronicle.com/article/Information-Overload-Then-and/125479/?sid=cr&utm_source=cr&utm_medium=en
We thought we had it all nailed down when the information theorists came up with their typology distinguishing between "data" (raw stuff), "information" (cooked stuff), and "knowledge" (cooked stuff that we've eaten). This rather elegant approach did have the virtue of emphasizing that information processing is a human task, even though we might delegate part of it to machinery, and that the tests of that task are the results for humans. It helps return us to .
Rise of the machines: Social media meets Artificial intelligenceArmend Ukshini
How does social media use our data to make money from us? How does AI influence our buying decisions through ad targeting? How are bots used in customer service? How is Youtube fighting terrorism? Does social media know us better than our friends? How is Facebook trying to prevent suicide? How has Pinterest visual search transformed itself from a social media into an e-commerce? How will the social media of the future be based on a virtual environment?
Trying to give an answer to the questions of one of the hottest topics on technology and media ‘Rise of the machines: Social media meets Artificial intelligence’ at KosbitTalks.
Keynote on "Social Machines: Democratisation, Disintermediation, and Citizens at Scale" presented at the Web Science and Big Data Analytics Conference on Information Transparency and Digital Democracy, Tuesday, 25th August 2015, Jakarta Indonesia
Tutorial for ACM Multimedia 2016, given together with Gerald Friedland, with contributions from Julia Bernd and Yiannis Kompatsiaris. The presentation covered an introduction to the problem of disclosing personal information through multimedia sharing, the associated security risks, methods for conducting multimodla inferences and technical frameworks that could help alleviate such risks.
Data fluency in today’s connected world has become a leverage point, inaccessible to many, leaving them unable to assess critical factors to act in their own or their communities’ interests. Data is a language that many people don’t speak, thus being conversant is becoming a societal “gap.” Data seed narratives. Powerful narratives can drive actions or they can distract and misinform. At a time with less institutional protection and fewer objective referees, those of us fluent in data need to help our communities understand data-driven systems and learn to speak the language.
Similar to The Web We Want: Dealing with the dark side of social media (work in progress) (20)
Shaking Hands with the Future: Culture and Heritage at a Moment Full of ChangeMichael Edson
Keynote for the congress of the Network Oorlogsbronnen (Netherlands WWII data network), Amsterdam, The Netherlands
2 November 2021.
Note that some of the text/callouts seem hard to read w. SlideShare's new compression scheme — sorry about that! Probably best to download the show and view it in PowerPoint, or, I've put a link to a PDF version on slide 2 (and the links work on the PDF version too!)
(This is the second version of these slides. The previous version was for some reason flagged as suspicious by SlideShare and made irrevocably un-shareable.)
Digital Culture and the Shaking Hand of ChangeMichael Edson
The presentation shows how to create and use a "problem space" to organize complex challenges. The central metaphor for the talk is the "civic handshake" — a process by which different parts of society cooperate through the informal exchange of information and the sharing of responsibilities.
Ignite talk for the Museum Computer Network 2019 conference.
Annotated script with links and references.
A video of the talk: https://youtu.be/Psf-1C3ocDA
A blog post with some context and links: https://www.usingdata.com/usingdata/2019/11/5/the-web-we-want
Keynote for the Prague Platform on the Future of Cultural Heritage, convened by the European Commission, October 7-8, 2019. The Prague Platform talks about
“Enhanced digitally enabled cultural heritage participation for all citizens.”
But what do these words mean? And how might we approach them — as practitioners, communities, governments and institutions, and citizens?
Michael Peter Edson — Robot vs. Human: Who Will Win?Michael Edson
Presentation for the VIII St. Petersburg International Cultural Festival, St. Petersburg, Russia. 16 November 2019. See https://usingdata.com for updates and new versions.
Conference: https://culturalforum.ru.
Panel: https://culturalforum.ru/event/1565208895246-robot-vs-chelovek-kakie-navyki-pobedyat
An overview of how change works, and what can be done to accelerate transformational change in an industry. Created for the Openlab Workshop, December 1-2, 2015 in Washington, DC.
Think Big, Start Small, Move Fast: Digital Strategy in a Changing WorldMichael Edson
Keynote for MMEx digital strategy symposium, Randers, Denmark, August 2015. This presentation discusses the shortcomings of traditional strategy processes and suggests alternatives that emphasize speed, iteration, and a bias for action.
Dark Matter - - the dark matter of the internet is open, social, peer-to-peer...Michael Edson
Keynote for Europeana Creative, Kulturstyrelsen - Danish Agency for Culture, Internet Librarian International (London), Southeastern Museum Conference (USA), Library of Congress Reference Forum, St. John's University Library Forum, University of Oklahoma Digital Humanities Presidential Lecture, Smith Leadership Symposium (Balboa Park, USA)...
The Dark Matter of the Internet - - the dark matter of the internet is open, social, peer-to-peer and read write...and it's the future of libraries, museums, archives, and institutions of all kinds.
Also see the essay on which this talk is based: Dark Matter - - https://medium.com/@mpedson/dark-matter-a6c7430d84d1
And a video of me presenting these slides at the 2014 Southeastern Museums Conference (USA): http://youtu.be/-tdLD5rdRTQ
Boom: Openness and Sharing in the Cultural Heritage SectorMichael Edson
My essay for the book Sharing is Caring: Openness and sharing in the cultural sector, Merete Sanderhoff, editor, published by the National Gallery of Denmark, 2014.
Free download at http://sharingiscaring.smk.dk/en
"Michael opens this anthology by establishing why it is crucial for the cultural heritage sector to seize the opportunity offered by the Internet and digitization to reach global populations and make a difference in their lives. Through many years of pioneering efforts within the field of digital technologies, and generous sharing of expertise and advice, Michael has inspired institutions worldwide to dare working more openly and inclusively with the users’ knowledge and creativity."
Try Not: Do (New Zealand National Digital Forum, Closing Remarks)Michael Edson
Text from a short video for the closing plenary of the 2013 New Zealand National Digital Forum. This was cooked up - - improvised - - with no advanced planning a few hours before Andy Fenton's conference wrap-up.
Many thanks to Andy and everyone at the #ndfnz for allowing me to be there with you, if only for a few minutes, virtually.
The Tortoise and the Hare, Netherlands Museum CongresMichael Edson
Remarks to the Netherlands Museum Congress, October 3, 2013 plenary session keynote. Footnotes and citations are coming later, in an edited version, but let me know if you need sources/links. - - Mike
"Scope, Scale, Speed" -- for the Journal of the American Association of Schoo...Michael Edson
Text (and a few, adapted/simplified graphics) of an article in the May/June 2013 issue (Volume 41, No. 5) of Knowledge Quest, the journal of the American Association of School Librarians. I have included a few adapted /simplified graphics from the article, and I have added hyperlinks and an update/note or two. The original publication was sent to 7,000 school libraries and members of the American Association of School Librarians, and it is also available via several research databases.
The article is published in Knowledge Quest as CC-BY
Keynote for Wikimedia UK GLAM-WIKI conference, British Library, London, April 12, 2013.
https://uk.wikimedia.org/wiki/GLAM-WIKI_2013
Also presented at the National Museum, Denmark; Danish Broadcasting; Danskkulturarv.dk; the FIAT/IFTA conference; National Museum Congress, the Netherlands; Arts Council Norway annual conference; J. Boye, Copenhagen
Scope, scale, and speed are the focus of most of my work this year.
"Click to Add Title"/ Thoughts on PresentingMichael Edson
Short presentation for the Museums and the Web Speaker Training webinar.
The session was lead by Loic Tallon and Nancy Proctor, and Peter Samis, Dana Mitroff-Silvers, Amy Heibel and Susan Chun all gave short talks that are well worth looking at ;)
http://mw2013.museumsandtheweb.com/mw2013-speaker-training-free-webinars/
Are museums a dial that only goes to 5? Michael Edson
For Social Media Week, Washington, D.C., "Defining and measuring social media success in museums and arts organizations." http://socialmediaweek.org/blog/event/are-you-remarkable-defining-and-measuring-social-media-success-in-museums-and-arts-organizations/#.US4XyOtARCQ
Super-Successful GLAMs (Text version with notes)Michael Edson
Opening remarks for The Commons and Digital Humanities in Museums
Sponsored by the City University of New York Digital Humanities Initiative, November 28, 2012
Organized by Neal Stimler and Matt Gold, with Will Noel and Christina DePaolo.
http://cunydhi.commons.gc.cuny.edu/2012/11/07/wednesday-november-28-the-commons-and-digital-humanities-in-museums/
Jack the Museum (Museums in the Age of Scale) -- Text versionMichael Edson
Ignite talk (text version with footnotes) for the Museum Computer Network 2012 annual conference, November 7, 2012, Seattle, WA.
Slides at Slides at
http://www.slideshare.net/edsonm/jack-the-museum-museums-in-the-age-of-scale-15089314
European Cultural Commons Workshop, Introductory Remarks (transcript)Michael Edson
YouTube video of this talk: http://youtu.be/VlHC0uPqdRY.
This is a transcript of a short introductory video recorded for Europeana’s European Cultural Commons workshop in Limassol Cyprus on October 30, 2012.
Unlock TikTok Success with Sociocosmos..SocioCosmos
Discover how Sociocosmos can boost your TikTok presence with real followers and engagement. Achieve your social media goals today!
https://www.sociocosmos.com/product-category/tiktok/
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...SocioCosmos
Get more Pinterest followers, reactions, and repins with Sociocosmos, the leading platform to buy all kinds of Pinterest presence. Boost your profile and reach a wider audience.
https://www.sociocosmos.com/product-category/pinterest/
“To be integrated is to feel secure, to feel connected.” The views and experi...AJHSSR Journal
ABSTRACT: Although a significant amount of literature exists on Morocco's migration policies and their
successes and failures since their implementation in 2014, there is limited research on the integration of subSaharan African children into schools. This paperis part of a Ph.D. research project that aims to fill this gap. It
reports the main findings of a study conducted with migrant children enrolled in two public schools in Rabat,
Morocco, exploring how integration is defined by the children themselves and identifying the obstacles that they
have encountered thus far. The following paper uses an inductive approach and primarily focuses on the
relationships of children with their teachers and peers as a key aspect of integration for students with a migration
background. The study has led to several crucial findings. It emphasizes the significance of speaking Colloquial
Moroccan Arabic (Darija) and being part of a community for effective integration. Moreover, it reveals that the
use of Modern Standard Arabic as the language of instruction in schools is a source of frustration for students,
indicating the need for language policy reform. The study underlines the importanceof considering the
children‟s agency when being integrated into mainstream public schools.
.
KEYWORDS: migration, education, integration, sub-Saharan African children, public school
Enhance your social media strategy with the best digital marketing agency in Kolkata. This PPT covers 7 essential tips for effective social media marketing, offering practical advice and actionable insights to help you boost engagement, reach your target audience, and grow your online presence.
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
Multilingual SEO Services | Multilingual Keyword Research | Filosemadisonsmith478075
Multilingual SEO services are essential for businesses aiming to expand their global presence. They involve optimizing a website for search engines in multiple languages, enhancing visibility, and reaching diverse audiences. Filose offers comprehensive multilingual SEO services designed to help businesses optimize their websites for search engines in various languages, enhancing their global reach and market presence. These services ensure that your content is not only translated but also culturally and contextually adapted to resonate with local audiences.
Visit us at -https://www.filose.com/
Surat Digital Marketing School is created to offer a complete course that is specifically designed as per the current industry trends. Years of experience has helped us identify and understand the graduate-employee skills gap in the industry. At our school, we keep up with the pace of the industry and impart a holistic education that encompasses all the latest concepts of the Digital world so that our graduates can effortlessly integrate into the assigned roles.
This is the place where you become a Digital Marketing Expert.
Grow Your Reddit Community Fast.........SocioCosmos
Sociocosmos helps you gain Reddit followers quickly and easily. Build your community and expand your influence.
https://www.sociocosmos.com/product-category/reddit/
The Web We Want: Dealing with the dark side of social media (work in progress)
1. The Web We Want
Or, Dealing with the Dark Side of Social Media
Michael Peter Edson | @mpedson
Let’s Get Real conference, London
2 March 2020
Work In Progress
3. Framing questions
Are we compromising the safety of our audiences if we invite them to engage
with us on 3rd party social media?
● Are we complicit?
● Do we have an obligation to protect our audiences?
● Do we have an obligation to protect/shepherd technology platforms
(Internet, web, mobile, etc)?
Hypothesis:
I say yes, we have an obligation here. There are few perfect choices in front of us,
but consequential short-term action is possible, and necessary, to mitigate the
harms and establish clearer paths forward for ourselves and our communities.
4. I have a new scar on my face from some
recent surgery, so I’ve been thinking
about knots and surgeons,
Knowledge and practice…
6. https://www.ted.com/talks/ed_gavagan_a_story_about_knots_and_surgeons/transcript?language=en
“So he starts to tell them, and he's like, ’No, this is
very important here. You know, when you're
needing these knots, it's going to be, you know,
everything's going to be happening at the same
time, it's going to be -- you're going to have all this
information coming at you, there's going to be
organs getting in the way, it's going to be
slippery, and it's just very important that you be
able to do these beyond second nature, each hand,
left hand, right hand, you have to be able to do
them without seeing your fingers.’”
7. https://www.ted.com/talks/ed_gavagan_a_story_about_knots_and_surgeons/transcript?language=en
“So he starts to tell them, and he's like, ’No, this is
very important here. You know, when you're
needing these knots, it's going to be, you know,
everything's going to be happening at the same
time, it's going to be -- you're going to have all this
information coming at you, there's going to be
organs getting in the way, it's going to be
slippery, and it's just very important that you be
able to do these beyond second nature, each hand,
left hand, right hand, you have to be able to do
them without seeing your fingers.’”
Practice and skill —
professionalism — matter
in every profession.
And so does luck.
“Chance favors the
prepared mind” (more on
that later)
18. • 1994: Unix Wizard Web
• 2000: The web of HTML (and CSS)
• 2004: The dynamic web (Separate content and design. Coldfusion!)
• 2006: Ajax
• 2010: The web as an application that you program
• 2011: The web as a platform (Drupal! LAMP!)
• 2011: Mobile
• 3rd party Social Media
• The corporate walled garden (“The Frightful Five” — F. Manjoo)
• ...Next?! The splinternet? Skynet? The Web We Want?
Each jump required
different skills. New
people came, (some)
existing people left.
19. • 1994: Unix Wizard Web
• 2000: The web of HTML (and CSS)
• 2004: The dynamic web (Separate content and design. Coldfusion!)
• 2006: Ajax
• 2010: The web as an application that you program
• 2011: The web as a platform (Drupal! LAMP!)
• 2011: Mobile
• 3rd party Social Media
• The corporate walled garden (“The Frightful Five” — F. Manjoo)
• ...Next?! The splinternet? Skynet? The Web We Want?
Also, somewhere in
here… “executives”
started to buy in, hire
staff.
20. • 1994: Unix Wizard Web
• 2000: The web of HTML (and CSS)
• 2004: The dynamic web (Separate content and design. Coldfusion!)
• 2006: Ajax
• 2010: The web as an application that you program
• 2011: The web as a platform (Drupal! LAMP!)
• 2011: Mobile
• 3rd party Social Media
• The corporate walled garden (“The Frightful Five” — F. Manjoo)
• ...Next?! The splinternet? Skynet? The Web We Want?
Also, somewhere in
here… “executives”
started to buy in, hire
staff.
The tech was more
recognizable to them
(because they used it
too), and the people,
employees, were more
recognizable (less
technical, more social)
21. (Our s**t has changed)
And a lot has changed
very recently, exactly in
the epicenter of our
current, most important
skillset: community and
the social web.
…Therefore, we need to know
what’s going on (Anil Dash)
and we need a new set of
sensibilities, knowledge and
skills. We’ve got to get *good*
at this (like Ed Gavagan’s
surgeons.)
22.
23. Book Research / UN Live / Partner stories
(Through personal experience,
making the case for the impact
of “the dark side” on our
institutions and the public)
25. Book Research
Over 2,000 articles reviewed in 2019
About 1,000 pages of notes
Re-living a descent into hell…
26. The Dark Side emerges
“Nutsville”, 2012-2019, from the Sony Hack to
Cambridge Analytica to election interference
2000’s: Worms and viruses
2013: Snowden
2014: Sony Pictures Hack
2016: Election interference
2017–2018: Elections, bots, Facebook, YouTube
(recommendations, conspiracy theorists…)
2018: Cambridge Analytica
29. Some of what’s screwed in our Social Media environment
1. Aggressive manipulation of civic messages by 3rd parties
Example: Russia in US elections; YouTube and Brazilian elections; Facebook & Indian elections
2. Aggressive promotion of incendiary content; conspiracy theories
Example: Anti-vaccination content
3. Predatory advertising to the vulnerable
Example: Offer payday loans to the financially vulnerable
4. Targeted advertising designed to exclude people
Example: hiding apartment rentals from minority populations; hiding elections information from those likely
to vote for a political opponent
5. Undermining regulatory scrutiny
Example: ensure lawmakers/regulators don’t get illegal ads/messages/products; real example = Uber’s
“operation greyball”
6. Undermining legitimate groups
Example: fake accounts undermine legitimate First Nations groups
7. Tolerating hate speech and harassment — Example: Twitter bots and harassment
8. Wanton disregard of viral, but destructive, content — Example: YouTube’s recommendation engine
9. Data collection, aggregation, and sale — Example: Adtech brokering
10. Anti-democratic behavior — Example: everything
30. Some of what’s screwed in our Social Media environment
1. Aggressive manipulation of civic messages by 3rd parties
Example: Russia in US elections; YouTube and Brazilian elections; Facebook & Indian elections
2. Aggressive promotion of incendiary content; conspiracy theories
Example: Anti-vaccination content
3. Predatory advertising to the vulnerable
Example: Offer payday loans to the financially vulnerable
4. Targeted advertising designed to exclude people
Example: hiding apartment rentals from minority populations; hiding elections information from those likely
to vote for a political opponent
5. Undermining regulatory scrutiny
Example: ensure lawmakers/regulators don’t get illegal ads/messages/products; real example = Uber’s
“operation greyball”
6. Undermining legitimate groups
Example: fake accounts undermine legitimate First Nations groups
7. Tolerating hate speech and harassment — Example: Twitter bots and harassment
8. Wanton disregard of viral, but destructive, content — Example: YouTube’s recommendation engine
9. Data collection, aggregation, and sale — Example: Adtech brokering
10. Anti-democratic behavior — Example: everything
Drawn from my own thinking,
and, 6 ways social media has
become a direct threat to
democracy By Pierre Omidyar;
“information fiduciaries” by J.
Zittrain; Jason Koebler, Zeynep
Tufekci,
33. 1. Aggressive manipulation of civic messages by 3rd parties
Examples: Russia in US elections
YouTube and Brazilian elections
Facebook & Indian elections
35. https://www.nytimes.com/2019/03/06/opinion/india-pakistan-news.html
The internet truly is super-duper fake, and thanks to the malleability of digital
media and the jet fuel of network virality, a digital lie can spread more quickly, and
cause more damage, than an analog one. […]
In India, Pakistan and everywhere else, addressing digital mendacity will require a
complete social overhaul. … The information war is a forever war. We’re just getting
started.
38. “This isn’t the first time real-
life violence has followed a
viral Facebook storm and it
certainly won’t be the last.
Much has already been
written about the anti-
Muslim Facebook riots in
Myanmar and Sri Lanka and
the WhatsApp lynchings in
Brazil and India. Well, the
same process is happening in
Europe now, on a massive
scale. Here’s how Facebook
tore France apart.”
https://www.buzzfeednews.com/article/ryanhatesthis/france-paris-yellow-jackets-facebook
41. 3. Predatory advertising to the vulnerable
Example: Offer payday loans to the financially vulnerable
4. Targeted advertising designed to exclude
people
Example: hiding apartment rentals from minority populations; hiding
elections information from those likely to vote for a political opponent
These 2 are mostly from
“information fiduciaries” by J.
Zittrain. Not decisively proven
at this point, as far as I can tell,
but freaky and likely in my
judgment
46. “Our human faculties for sense-making, and evaluating and validating
information, are being challenged and in some ways destroyed in this
new information ecosystem. We are all getting false signals. This affects
our ability to construct and apply trust. #trust
“It also creates an opportunity for bad actors who understand how to
exploit this ecosystem.”
https://www.niemanlab.org/2018/03/living-in-a-sea-of-false-signals-are-we-being-pushed-from-trust-but-verify-to-verify-then-trust/
47. “The fundamental issue with the bogus Native American pages is
that they mislead the public to believe that they are coming
from Native American people. They allow problematic ideas to
go unanswered and worse yet - they are frequently the source of
dissemination of such toxic mindsets.
They do not build communities, but destroy them.”
https://www.facebook.com/notes/exploiting-the-niche/part-i-warning-signs/416598235447814/
— Sarah Thompson
48. 7. Tolerating hate speech and harassment
Example: Twitter bots and harassment
50. “TikTok’s efforts to provide locally sensitive moderation
have resulted in it banning any content that could be
seen as positive to gay people or gay rights, down to
same-sex couples holding hands, even in countries
where homosexuality has never been illegal, the
Guardian can reveal.”
https://www.theguardian.com/technology/2019/sep/26/tiktoks-local-moderation-guidelines-ban-pro-lgbt-content
51. 8. Wanton disregard of viral, but destructive,
content
Example: YouTube’s recommendation engine
65. Moxie Marlinspike on Expanding Choice Scope
https://youtu.be/DoeNbZlxfUM?t=778
The decision to
use Facebook
today is a
different decision
than it was 10
years ago
69. “When Facebook users learned last
spring that the company had
compromised their privacy in its rush
to expand, allowing access to the
personal information of tens of
millions of people to a political data
firm linked to President Trump,
Facebook sought to deflect blame and
mask the extent of the problem.
“And when that failed […] Facebook
went on the attack.”
https://www.nytimes.com/2018/11/14/technology/facebook-data-russia-election-racism.html
Corporate
self-interest
70. The “handoff” between different sectors of society
(e.g. journalism, courts, lawmakers) aren’t working
now, so everyone has to do more than they would in
normal times.
Mixture of good and bad is confusing…
As is “chance” — you don’t always know if what you
do, the risks you take, will help, and that uncertainty
can be hard.
71. We have a dilemma
All of this presents a dilemma for small/medium sized
enterprises like most of ours
1. The “no new network” problem
New networks, with no users, are not an attractive option
2. Few resources/depth with which to react
Most in our network are Small/Medium Enterprises run on shoestring
budgets; lack political clout; work in relative isolation (though note
libraries as possible exception)
3. 3rd party social media is efficient for us
Where our audiences are, and good still happens there.
4. SO….
73. Back to our framing questions
Are we compromising the safety of our audiences if we invite them to engage with us on
3rd party social media?
● Are we complicit?
● Do we have an obligation to protect our audiences?
● Do we have an obligation to protect/shepherd technology platforms (Internet, web,
mobile, etc)?
Hypothesis:
I say yes, we have an obligation here. There are few perfect choices in front of us,
but consequential short-term action is possible, and necessary, to mitigate the
harms and establish clearer paths forward for ourselves and our communities.
74. What to do #1: Know your s**t
If you use these platforms professionally you should become
conversant with the social/civic/ethical realities of 3rd party social
media use.
75. What to do #2: Take responsibility for informing your
community
Inform your community through privacy policies, notices, blogging, social media
profile statements, events announcements and signage, etc.
Make sure you have educated your audience.
76. What to do #3: Don’t put your eggs in 1 basket
Continue to use social media, but also invest in the development of your own digital
properties (i.e., your core website, newsletters, mailing lists).
Use social media as a pointer to more robust content on your own site.
Build your mailing lists, and use newsletters and other content to create value around
these.
Provide alternate means of accessing your content/community, for example, RSS, and
email subscriptions.
These methods won’t replace 3rd party social media platforms, but they will help to
undermine its inordinate power and influence.
77. What to do #4: Have a halves and doubles mindset
It’s not necessarily realistic to completely eliminate the use of 3rd
party social media, but think about halving your use — cutting it in
half…and doubling the speed at which you would normally do so.
Amazon —> other merchants
Google —> DuckDuckGo search engine
Chrome —> Brave browser, Firefox
Gmail —> paid mail service
Mobile device —> put down the phone
78. What to do #5, Evaluate the platforms you use
1. Analyze what platforms we use (e.g., Facebook, YouTube, Twitter)
a. What do you do there? What does your audience do?
i. Create “Write only” content; minimal interaction with the audience
ii. Interact with comments and users
iii. Develop apps, features, surveys, other activities that generate personalized data
b. The ethical implications of each (a moving target)
2. Tactics for mitigating harm (a spectrum of choices, for example); Each has pros
and cons to be weighed
a. Withdraw altogether
b. Inform/educate participants
c. Substitutions (Vimeo for YouTube?)
d. Minimize content/interaction and direct the public to other properties (like your own
website)
e. Eliminate the use of 3rd party cookies
f. Eliminate the use of micro-targeted advertising
g. Choose vendors/platforms carefully
79. What to do #6, become an “information fiduciary”
Concept invented by Jack Balkin, Yale law school.
“‘Fiduciary’ has a legalese ring to it, but it’s a long-standing, commonsense notion. The key
characteristic of fiduciaries is loyalty: They must act in their charges’ best interests, and when
conflicts arise, must put their charges’ interests above their own. That makes them trustworthy. Like
doctors, lawyers, and financial advisers, social media platforms and their concierges are given
sensitive information by their users, and those users expect a fair shake — whether they’re trying to
find out what’s going on in the world or how to get somewhere or do something.”
…A fiduciary duty wouldn’t broadly rule out targeted advertising — dog owners would still get dog
food ads — but it would preclude predatory advertising, like promotions for payday loans. It would
also prevent data from being used for purposes unrelated to the expectations of the people who
shared it…
(Quotes from How To Exercise The Power You Didn’t Ask For, Jonathan Zittrain, Harvard Business
Review, September 19, 2018.)
https://blogs.harvard.edu/jzwrites/2018/10/29/how-to-exercise-the-power-you-didnt-ask-for/
80. A thought: Using a human rights standard
Pretty macro, but a constructive
and necessary perspective on the
“discretionary and vague” policy
decisions by platforms. From
David Kaye, UN Special
Rapporteur on freedom of
opinion and expression.
https://twitter.com/davidakaye/status/1099107647763054594
81. What to do #7, “model” the behaviors of civic discourse
“Find a well-moderated corner of the internet.
It can sometimes seem as if all the internet is deep fakes and culture wars, Trump tweets and
influencer scams. It’s not, of course. The internet still abounds in lovely, wholesome niches — the
fantasy sports circles, the YouTube and Instagram communities devoted to any kind of craft, the
many subreddits where strangers come together to help one another out of real problems in life.
"What distinguishes the productive online communities from the disturbing ones? Often it’s
something simple: content moderation. The best places online are bounded by clear, well-enforced
community guidelines for participation. Twitter and Facebook are toxic because there are few rules
and few penalties for flouting them. A Reddit community like r/relationships, meanwhile, is a haven
of incredible, empathetic discussion because its hosts spend a lot of effort policing the discussion
toward productive dialogue. This gets at the plain truth of the internet: A better digital world takes
work. It’s work all of us should do.
From Farhad Manjoo, NY Times Opinion, 1 January 2020, Only You Can Prevent dystopia.
https://www.nytimes.com/2020/01/01/opinion/social-media-2020.html]
82. What to do #8, use “POLP” at work and home
POLP = Principle Of Least Privilege, from IT Security, means to use the minimum
permissions you need to do any given task (so you don’t accidentally delete your own
hard drive or give root permissions to a virus)
I.e., Give/leak as little information to 3rd parties as possible. Use The Big Platforms when
you need to, but when you don’t, don’t.
● Switch to more private browsers (Brave, Firefox, Opera)
● Switch to more private email, documents
● Disable location tracking when you don’t need it; turn off your phone; use a Faraday
(signal blocking) case; use a “dumb phone”
● Don’t install apps that “leak” data to back to aggregators
https://en.wikipedia.org/wiki/Principle_of_least_privilege
83. Sidebar: Popular (& obscure) apps pump data to 3rd parties
83
When you have a problem like this,
You Give Apps Sensitive Personal Information. Then They Tell Facebook.
Wall Street Journal testing reveals how the social-media giant collects a wide range of
private data from developers; ‘This is a big mess’
By Sam Schechner and Mark Secada
Feb. 22, 2019 11:07 a.m. ET
Article, paywalled, summarized on twitter by Mark Schoofs, USC Annenberg School
“Facebook sweeps up sensitive data — including
heart rate and when a woman is having her period
— from top phone apps.
And users have no way to opt out.”
https://www.wsj.com/articles/you-give-apps-sensitive-personal-information-then-they-tell-facebook-11550851636
, https://twitter.com/SchoofsFeed/status/1098999479141752832
84. What to do #9: Exit or Voice (or Loyalty)
You have a choice: be loyal, leave, or use your voice.
The Sleeping Giants movement, started with a single
individual, and has had enormous influence by draining
advertisers away from toxic platforms like Fox News and
Breitbart.
The Amnesty International model is straightforward,
effective, and achievable.
The Greenpeace playbook works: write a letter; get 3
friends to write letters; sign petitions…
You just have to act. You have to know your s**t, and do.
84https://en.wikipedia.org/wiki/Exit,_Voice,_and_Loyalty
85. What to do #10: Be like RPG and Ravelry
RPG, a venerable role-playing community, and Ravelry, a community and marketplace for knitters
and fiber artists, both banned pro-Trump speech from their sites in 2018.
“We cannot provide a space that is
inclusive of all and also allow support
for open white supremacy.”
https://www.ravelry.com/content/no-trump
https://www.youtube.com/watch?v=6ValJMOpt7s
https://www.vice.com/en_us/article/bj4wkq/one-of-the-oldest-online-
rpg-communities-banned-pro-trump-speech
86. What to do #10: Be like RPG and Ravelry
https://twitter.com/yehudi_eyif/status/1145263347568467969
87. What to do about the dark side of social media
1. Know your s**t
2. Take responsibility for informing your community
3. Don’t put your eggs in 1 basket
4. Have a halves and doubles mindset
5. Evaluate the platforms you use
6. Become an “information fiduciary”
7. “model” the behaviors of civic discourse
8. Use “POLP” at work and home
9. Exit or Voice (or Loyalty)
10. Be like RPG and Ravelry
87
89. https://www.ted.com/talks/ed_gavagan_a_story_about_knots_and_surgeons/transcript?language=en
“And so I just think, they got their
lecture to go to. I step off, I'm
standing on the platform, and I
feel my index finger in the first
scar that I ever got, from my
umbilical cord, and then around
that, is traced the last scar that I
got from my surgeon, and I think
that, that chance encounter with
those kids on the street with their
knives led me to my surgical
team, and their training and their
skill and, always, a little bit of luck
pushed back against chaos. “