August 23, 2024
This article written by Laura Gurak begins to describe cyberliteracy and its impact. New technologies are shaping how individuals experience and view the world around them, so it is important that individuals are aware of changes in technology. Cyberliteracy goes a step further, entailing that it is necessary to be able to critique these changes in technology when they become a danger to the lives of individuals and their privacy. Technology can be a powerful tool when used correctly with correct motives, but when these are not in place, it also can lead to many issues. Modern technology will never go away; in fact, it will continue to evolve both naturally and at the hands of capitalists, so it is the duty of the public to become cyberliterate in order to protect the rest of society from any negative effects.
Gurak’s article describes the dichotomy of the internet and its many resources; on one hand, the internet is useful to spread information, research quickly, and increase communication across great distances. However, there is also a dangerous side of the internet that makes money at the expense of users, breaks privacy, encourages capitalistic endeavors, and creates unhealthy work expectations of always being within reach of communication. One draw with technology is that if an individual is not buying a product, then they are the product to these internet and technology companies. There are many ethical debates with this, as many believe that humans should not be viewed as products to be bought and sold, to be thrown in the wind by any company looking to earn some money. It is essential to remain cyberliterate to stand firm in individualism and against capitalism.
August 30, 2024
Both articles describe the essence of cybersecurity, giving a clear overview of the issue. While cybersecurity can be demonstrated on a corporate or individual level, both levels involve protecting and safeguarding cyber systems. Cybersecurity is more than just tools or safeguards, though; a large part of cybersecurity is being proactive and preventative to defend a company or organization against cyberattacks before they occur, instead of constantly managing cyber crises. If these cybersecurity systems are in place, there are three main ways—referred to as the CIA triad—that hackers attempt to undermine existing security systems: breaching confidentiality, undermining integrity, and affecting availability.
Veale’s article included the following quote that stuck with me: “politicians talk of keeping the internet safe; dealing with privacy breaches and defending democracies against information warfare.” This quote was intriguing to me because of the use of warfare terminology in regard to cybersecurity. In fact, even the idea of security itself or cyber-attacks also lend themselves to this genre of terminology. When people hear loaded phrases such as privacy breaches, information warfare, cyber-attack, keep the internet safe, or increase security, vivid imagery is brought to mind of dangerous war zones. This use of warfare terminology seems to help make the issues revolving cybersecurity a central issue of concern for the public; however, it also seems to contribute to fear mongering around technology in general. With a field like technology that is quick paced and filled with frequent changes, it is important to make sure society follows new trends regarding safety, but in doing so, it is essential to be diligent in communicating so as not to unnecessarily spread fear or worry.
September 6, 2024
As described in this article, digital citizenship is how to navigate digital environments safely. Just like being a citizen of a physical government, there are rules and behavioral expectations for users of digital spaces. There are nine core elements of digital citizenship—that fit into three categories—to help users responsibly use the internet. The first category is respect for self and others, which encompasses the elements of law (copyright and fair use), access (for all), and digital etiquette (netiquette, conduct, and responsibility). The next category is educating self and others; this includes digital literacy (critical thinking and validity of content), communication (organization and correct use), and commerce (purchase and finance). The last category is protecting self and others which includes security (precautions and safety), rights and responsibilities (reporting), and health and wellness (balance and cyberbullying). These nine elements serve as a guide on how to explain digital citizenship to others.
In this article, it described how students have gone through their entire education with technology at their side—growing comfortable using it—and that sometimes educators assume that students are fully proficient digitally due to their ease and skill. However, it makes an interesting point that skill and comfort do not translate to appropriate use; students still need to be taught how to be digital citizens. After reading this, I wonder how this can be taught clearly to students, who may assume that they are fully proficient and do not need to know how to be safe digital citizens. Digital spaces can be dangerous places, so it is important that these ideas are taught regardless.
September 13, 2024
This podcast covered aspects of media literacy and how they are especially applicable now in the current political climate. It is important to be disciplined in reading news and researching current events, instead of allowing someone else to just tell you the key points, as they may unintentionally be including their own bias of the situation which may not be entirely truthful. In fact, upon hearing any news it is important to do further research to develop one’s own opinion on the matter, as news nowadays has turned into a lot of opinions by newscasters both intentionally (to create a story) or unintentionally. The article mentioned that even when individuals specifically boycott receiving news from social media, everyone is still susceptible to consuming content just by being around others who are on social media, like in a group chat or a work project. Media literacy boils down to the idea of critically analyzing the messages one receives.
In the podcast, there was mention of how media literacy is taught to children in the sense of Wikipedia, but not in the sense of anything else. Children are taught to turn a critical eye toward Wikipedia as it can be edited by anyone at any time. Yet are children taught to have that same critical eye while browsing the internet or are adults taught to have that critical eye while viewing the news? I thought this was interesting as the news is place that bias can be planted in every aspect of sharing what is happening around the country and the world, so it should be held in a similar light to Wikipedia as a place where misinformation could exist.
September 20, 2024
This text spoke about the advantages and disadvantages to online dating, which was originally created by people who were exploiting the need for human connection. The main advantages to online dating are the efficiency and convenience, and the exposure and network aspect of it. First, people are busy and dating apps are portable. Next, they are intuitive and easy to set up. In regard to the exposure and networking aspects, the dating apps function as geo social network apps, pairing people with those in their own community; furthermore, there is an algorithm that pairs like-minded people together. The last advantage is the increase sense of control over the entire dating process. While there are many advantages, the disadvantages are also numerous. First, there is a large amount of lies and deceit through the form of catfishing; since there are no pre-existing social ties, it is easy for individuals to like and conceal their true identity on dating apps. Next, mental health struggles might increase do the stress, and there also could be an increase in sexual violence due to meeting up with complete strangers in person after speaking with them over a dating app. There are a few strategies to help protect individuals including, providing limited personal info, blocking inappropriate accounts, and meeting in a public place for the first meeting.
The most interesting point in the article was that 80% of people lie on their online dating profile, yet still so many people continue to use dating apps, despite the risks. When a tool is unsafe to continue using, usually it is discontinued and put out of commission. But if anything, online dating seems to be getting more popular—despite being rooted in deception—because of the ease. It is almost as if people are putting their convenience above their safety, their pride of being in a relationship over their ability to stay unharmed.
September 27, 2024
This article describes how companies, brands, and organizations can leverage and use influencers to increase their online marketing. Since influencers build their own personal brand and have their own distinct following, influencers are a unique way to market products to individualized crowds and target consumers. Specifically, by leveraging influencers’ position, there is a high market acceptance, distinctiveness, and high feedback reflectivity. Market acceptance refers to a product being accepted by the target consumers via the influencer. Distinctiveness refers to the particular area and demographic that the influencer targets; this could include a mommy blogger for a family product or a Gen Z influencer for a trendy product. High feedback reflectivity refers to the idea that there is a quick turn around on where a specific advertisement is effective through the endorsement for the product of the brand. All three of these entities work together so that brands can effectively market their products through the use of influencers and their following.
One thing that I find interesting is the concept of feedback reflectivity. I wonder how brands can accurately determine if audiences are responding positively to the brand or product, or if they are just responding positively to the influencer themself. I understand that people are more likely to buy or use a product if someone that they trust recommends it and actually uses it; however, it seems as if many influencers only endorse a product for the advertisement—they don’t actually use the product for any length of time longer than a 60 second video on tiktok. Thus, I wonder how this data could be accurate.
October 2, 2024
This article describes the mindsets within the “Big Data economy” and how companies and organizations use algorithms and mathematics in their daily functions. Specifically, it spoke of how these technologies are used to “save time,” increase output, and be more “fair and objective” in contrast to a tradition human resources or human affairs department. However, the article describes how it is in fact these models themselves that have human bias and prejudices incorporated into the very fabrics of their programing. The author describes these as Weapons of Math Destruction—WMD—and takes a close look at a teacher assessment tool called IMPACT. In trying to fairly evaluate teachers without bias or prejudice, these programs mainly analyzed student scores in math or reading, instead of taking references into account. The article goes on to state that WMDs tend to justify their results—instead of accurately analyzing the situation—and tend to unjustly punish poor people.
One particular quote stood out to me: “human victims of WMDs…are held to a far higher standard of evidence than the algorithms themselves.” This is due in part to WMDs having an inherent feedback loop due to their structure. Traditionally, programs receive feedback from participants or employees if there are any discrepancies in decisions; however, decisions made by WMDs are completely accepted without critique. Employers have complete trust in WMDs and the fact that they have no faults; this causes unfairly discriminated employees to not have any advocacy in this process and thus, they are held to a higher standard of perfection than the faulty algorithms.
October 11, 2024
This article spoke about the light and dark side of social media. There are many advantages for companies or individuals who use social media to market their brands, but there are also a significant number of disadvantages. Overall, there are seven budling blocks that can have light or dark purposes: sharing, presence, conversations, identity, relationships, groups, and reputation. While there are positive notions about being able to converse with one another and interact with posts, there is a dark side where people engage in aggressive conversations. While consumers can easily distribute and receive content, there also is an opportunity for inappropriate distribution of content that could infringe on intellectual rights. While it is helpful to know if and when others are accessible, there is a possibility that users’ locations are tracked without consent by stalkers. For each of those seven building blocks, there are a significant number of dark shadows behind every bright light.
One thing I found interesting is how the building blocks can be used to explore the multidimensionality of dark social media, like the topic of fake news. The most influential building block to the dark phenomenon of fake news is groups. Other significant building blocks are sharing, conversations, and reputation; presence, identity, and relationships did not hold a significant importance in the observation of fake news. I thought this concept was interesting as it shows that the “negatives” of social media are not just one dimensional, but instead are multi-faceted and impact a wide variety of different groups.