SlideShare a Scribd company logo
#ThisIsNotNormal
How a Moment Created a Movement
What is #ThisIsNotNormal?
• Stemmed from the shock of events which followed the inauguration of DT.
⚫Themes evident in word cloud
• Movement to denounce DT’s presidency and remind people that the changes
occurring should concern them.
⚫Sexism and Islamophobia in the White House
⚫Ties to Russia excused
⚫Inexperience of people being put in important positions
• Stemmed from moments of shock when different stories broke; has turned
into a catchphrase used in resistance.
Word Cloud
#Bannon
#StopPresidentBannon
#Resist
#TheResistance
#Putin
#NSC
These different events and pieces
have been linked by the hashtag,
which has become part of the
terminology of this “resistance.”
Social Network Analysis
Ran for 10 minutes Ran for 1 hour
Locating #ThisIsNotNormal Within the
Context of Algorithm & Biopolitics
“Algorithm ultimately exercises control over us...the processes of soft
biopower work in a similar fashion… New cybernetic category
constructions are the consequence of this modularity and ultimately
allow for a ‘free,’ but constantly conditioned, user.” (Cheney Lippold,
2011, 178)
• Algorithm places users in “categories of identity” and persuades
users toward normalized behaviors. (Cheney Lippold, 2011, 177)
• Impact of algorithm on the #ThisIsNotNormal movement?
• Filter Bubble can provide insight on disconnect between networks.
Conclusion & Future Implications
• #ThisIsNotNormal turned a moment into a movement.
• Is the data useful?
⚫Not big data (Kate Crawford), and not very useful on its own.
⚫Should combine this data with data about other hashtags to tell a better story.
⚫Look to word cloud and SNA to determine which hashtags and networks to look at.
• Future questions:
⚫Will DT’s presidency be normalized?
⚫Is this “resistance” sustainable?
⚫How will algorithm affect the online movement?
Works Cited
boyd, danah and Kate Crawford. 2012. “Critical Questions for Big Data.”
Information,
Communication & Society 15 (2): 662-79.
Baer, Drake. ‘The ‘Filter Bubble’ Explains Why Trump Won and You Didn’t See
It Coming.” Science
of US. NY Mag, 2017.
http://nymag.com/scienceofus/2016/11/how-facebook-and-the-filter-bubble-
pushed-trump-to-victory.html
Cheney-Lippold, John. “A New Algorithmic Identity: Soft Biopolitics and the
Modulation of control.” Theory, Culture and Society, 2011: 177-178.

More Related Content

Similar to #ThisIsNotNormal: How a Moment Created a Movement

An Invisible Woman - Lynn Conway
An Invisible Woman - Lynn ConwayAn Invisible Woman - Lynn Conway
An Invisible Woman - Lynn Conway
UNICORNS IN TECH
 
Actor-Network Theory
Actor-Network TheoryActor-Network Theory
Actor-Network Theory
Media & Culture
 
ALSO BYDon TapscottParadigm Shift The New Promise.docx
ALSO BYDon TapscottParadigm Shift The New Promise.docxALSO BYDon TapscottParadigm Shift The New Promise.docx
ALSO BYDon TapscottParadigm Shift The New Promise.docx
daniahendric
 
Seeing and talking about Big Data, Farida Vis, AHRC Subject Assocations
Seeing and talking about Big Data, Farida Vis, AHRC Subject AssocationsSeeing and talking about Big Data, Farida Vis, AHRC Subject Assocations
Seeing and talking about Big Data, Farida Vis, AHRC Subject Assocations
Arts and Humanities Research Council (AHRC)
 
Evgeny Morozov
Evgeny MorozovEvgeny Morozov
Evgeny Morozov
soren-knudsen.dk
 
What-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
What-Do-We-Do-with-All-This-Big-Data-Altimeter-GroupWhat-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
What-Do-We-Do-with-All-This-Big-Data-Altimeter-GroupSusan Etlinger
 
Globalization Essay Introduction
Globalization Essay IntroductionGlobalization Essay Introduction
Globalization Essay Introduction
Julie Songy
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
Hinne Hettema
 
Bitcoin 101 - Bitcoin For Beginners by World Bitcoin Network
Bitcoin 101 - Bitcoin For Beginners by World Bitcoin NetworkBitcoin 101 - Bitcoin For Beginners by World Bitcoin Network
Bitcoin 101 - Bitcoin For Beginners by World Bitcoin Network
James DAngelo
 
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa
 
Tim Estes - Generating dynamic social networks from large scale unstructured ...
Tim Estes - Generating dynamic social networks from large scale unstructured ...Tim Estes - Generating dynamic social networks from large scale unstructured ...
Tim Estes - Generating dynamic social networks from large scale unstructured ...
Digital Reasoning
 
FOSS and activism
FOSS and activismFOSS and activism
FOSS and activism
sky croeser
 
Why Everyone Needs DevOps Now: My Fourteen Year Journey Studying High Perform...
Why Everyone Needs DevOps Now: My Fourteen Year Journey Studying High Perform...Why Everyone Needs DevOps Now: My Fourteen Year Journey Studying High Perform...
Why Everyone Needs DevOps Now: My Fourteen Year Journey Studying High Perform...
Akamai Technologies
 
Citizen Voices in a Networked Age of #BigData
Citizen Voices in a Networked Age of #BigDataCitizen Voices in a Networked Age of #BigData
Citizen Voices in a Networked Age of #BigData
Stuart Shulman
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
Steve Mckee
 
Networks, swarms and policy: what collective intelligence means for policy ma...
Networks, swarms and policy: what collective intelligence means for policy ma...Networks, swarms and policy: what collective intelligence means for policy ma...
Networks, swarms and policy: what collective intelligence means for policy ma...
Alberto Cottica
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.
Phil Wolff
 
Change Management - History and Future
Change Management - History and FutureChange Management - History and Future
Change Management - History and Future
Holger Nauheimer
 
Printable Fairy Tale Writing Paper
Printable Fairy Tale Writing PaperPrintable Fairy Tale Writing Paper
Printable Fairy Tale Writing Paper
Rhonda Cetnar
 

Similar to #ThisIsNotNormal: How a Moment Created a Movement (20)

Lightningtalk: Peter Parycek
Lightningtalk: Peter ParycekLightningtalk: Peter Parycek
Lightningtalk: Peter Parycek
 
An Invisible Woman - Lynn Conway
An Invisible Woman - Lynn ConwayAn Invisible Woman - Lynn Conway
An Invisible Woman - Lynn Conway
 
Actor-Network Theory
Actor-Network TheoryActor-Network Theory
Actor-Network Theory
 
ALSO BYDon TapscottParadigm Shift The New Promise.docx
ALSO BYDon TapscottParadigm Shift The New Promise.docxALSO BYDon TapscottParadigm Shift The New Promise.docx
ALSO BYDon TapscottParadigm Shift The New Promise.docx
 
Seeing and talking about Big Data, Farida Vis, AHRC Subject Assocations
Seeing and talking about Big Data, Farida Vis, AHRC Subject AssocationsSeeing and talking about Big Data, Farida Vis, AHRC Subject Assocations
Seeing and talking about Big Data, Farida Vis, AHRC Subject Assocations
 
Evgeny Morozov
Evgeny MorozovEvgeny Morozov
Evgeny Morozov
 
What-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
What-Do-We-Do-with-All-This-Big-Data-Altimeter-GroupWhat-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
What-Do-We-Do-with-All-This-Big-Data-Altimeter-Group
 
Globalization Essay Introduction
Globalization Essay IntroductionGlobalization Essay Introduction
Globalization Essay Introduction
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
Bitcoin 101 - Bitcoin For Beginners by World Bitcoin Network
Bitcoin 101 - Bitcoin For Beginners by World Bitcoin NetworkBitcoin 101 - Bitcoin For Beginners by World Bitcoin Network
Bitcoin 101 - Bitcoin For Beginners by World Bitcoin Network
 
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)
 
Tim Estes - Generating dynamic social networks from large scale unstructured ...
Tim Estes - Generating dynamic social networks from large scale unstructured ...Tim Estes - Generating dynamic social networks from large scale unstructured ...
Tim Estes - Generating dynamic social networks from large scale unstructured ...
 
FOSS and activism
FOSS and activismFOSS and activism
FOSS and activism
 
Why Everyone Needs DevOps Now: My Fourteen Year Journey Studying High Perform...
Why Everyone Needs DevOps Now: My Fourteen Year Journey Studying High Perform...Why Everyone Needs DevOps Now: My Fourteen Year Journey Studying High Perform...
Why Everyone Needs DevOps Now: My Fourteen Year Journey Studying High Perform...
 
Citizen Voices in a Networked Age of #BigData
Citizen Voices in a Networked Age of #BigDataCitizen Voices in a Networked Age of #BigData
Citizen Voices in a Networked Age of #BigData
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Networks, swarms and policy: what collective intelligence means for policy ma...
Networks, swarms and policy: what collective intelligence means for policy ma...Networks, swarms and policy: what collective intelligence means for policy ma...
Networks, swarms and policy: what collective intelligence means for policy ma...
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.
 
Change Management - History and Future
Change Management - History and FutureChange Management - History and Future
Change Management - History and Future
 
Printable Fairy Tale Writing Paper
Printable Fairy Tale Writing PaperPrintable Fairy Tale Writing Paper
Printable Fairy Tale Writing Paper
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 

#ThisIsNotNormal: How a Moment Created a Movement

  • 1. #ThisIsNotNormal How a Moment Created a Movement
  • 2. What is #ThisIsNotNormal? • Stemmed from the shock of events which followed the inauguration of DT. ⚫Themes evident in word cloud • Movement to denounce DT’s presidency and remind people that the changes occurring should concern them. ⚫Sexism and Islamophobia in the White House ⚫Ties to Russia excused ⚫Inexperience of people being put in important positions • Stemmed from moments of shock when different stories broke; has turned into a catchphrase used in resistance.
  • 3.
  • 4. Word Cloud #Bannon #StopPresidentBannon #Resist #TheResistance #Putin #NSC These different events and pieces have been linked by the hashtag, which has become part of the terminology of this “resistance.”
  • 5. Social Network Analysis Ran for 10 minutes Ran for 1 hour
  • 6. Locating #ThisIsNotNormal Within the Context of Algorithm & Biopolitics “Algorithm ultimately exercises control over us...the processes of soft biopower work in a similar fashion… New cybernetic category constructions are the consequence of this modularity and ultimately allow for a ‘free,’ but constantly conditioned, user.” (Cheney Lippold, 2011, 178) • Algorithm places users in “categories of identity” and persuades users toward normalized behaviors. (Cheney Lippold, 2011, 177) • Impact of algorithm on the #ThisIsNotNormal movement? • Filter Bubble can provide insight on disconnect between networks.
  • 7. Conclusion & Future Implications • #ThisIsNotNormal turned a moment into a movement. • Is the data useful? ⚫Not big data (Kate Crawford), and not very useful on its own. ⚫Should combine this data with data about other hashtags to tell a better story. ⚫Look to word cloud and SNA to determine which hashtags and networks to look at. • Future questions: ⚫Will DT’s presidency be normalized? ⚫Is this “resistance” sustainable? ⚫How will algorithm affect the online movement?
  • 8. Works Cited boyd, danah and Kate Crawford. 2012. “Critical Questions for Big Data.” Information, Communication & Society 15 (2): 662-79. Baer, Drake. ‘The ‘Filter Bubble’ Explains Why Trump Won and You Didn’t See It Coming.” Science of US. NY Mag, 2017. http://nymag.com/scienceofus/2016/11/how-facebook-and-the-filter-bubble- pushed-trump-to-victory.html Cheney-Lippold, John. “A New Algorithmic Identity: Soft Biopolitics and the Modulation of control.” Theory, Culture and Society, 2011: 177-178.