Blacked out Twitter image from my post last week
Netiquette. I seriously hate that word. BUT an issue of internet-based-etiquette (blogger etiquette, specifically) recently came to my attention, and I’m interested in others’ practices and thoughts.
As a blogger, I often analyze content from Facebook and Twitter. In doing so, I usually post images of actual tweets, comments, and status updates. These are forms of data, and are useful in delineating the public tenor with regard to a particular issue, the arguments on opposing sides of a debate, and the ‘voice’ with which people articulate their relevant thoughts and sentiments.
As a common practice, I black out all identifying information when reposting this content. Last week, I posted some tweets with the names and images redacted. A reader commented on my post to ask why I did so, given that the tweets were public. We had a quick discussion, but, as I mentioned in that discussion, this issue deserves independent treatment. (more…)
Can a gift be a data breach? Lots of Apple product users think so, as evidenced by the strong reaction against the company for their unsolicited syncing of U2’s latest album songs of innocence to 500 million iCloud accounts. Although part of the negative reaction stems from differences of musical taste, what Apple shared with customers seems less important than the fact that they put content on user accounts at all.
With a proverbial expectant smile, Apple gifted the album’s 11 songs to unsuspecting users. A promotional move, this was timed with the launch of the iPhone6 and Apple iWatch. And much like teenagers who find that their parents spent the day reorganizing their bedrooms, some customers found the move invasive rather than generous.
Sarah Wanenchack has done some great work on this blog with regards to device ownership—or more precisely, our increasing lack of ownership over the devices that we buy. That Apple can, without user permission, add content to our devices, highlights this lack of ownership. Music is personal. Devices are personal. And they should be. We bought them with our own money. And yet, these devices remain accessible to the company from which they came; they remain alterable; they remain—despite a monetary transaction that generally implies buyer ownership—nonetheless shared. And this, for some people, is offensive. (more…)
Today, Facebook announced some significant changes in its approach to privacy: New users now start with “friends only” as their default share setting and a new “Privacy Checkup” will remind users to select audiences for their posts (if they don’t, it will also default to “friends only”).
This announcement is significant in that it is the first time that Facebook has ever stepped back its privacy settings to be less open by default. This appears to contradict a widely held assumption that Facebook is on a linear trajectory to encourage ever more sharing with ever more people. Media reports have pitched this as a victory for users, who are supposed to have forced the company to “respond to business pressures and longstanding concerns” or “bow to pressure.” (more…)
ZunZuneo was named for the slang term used to describe a Cuban Hummingbird’s tweet
The Internet seems both excited and generally confused by the U.S. government’s failed entre into Cuban Social media via its version of a bare-bones Twitter, called ZunZuneo. The confusion is not unwarranted, as the operation includes the United States government, two separate for-profit contractors, (and eventually, a management team who didn’t know they were part of an International government sponsored ruse), key players and various bases of operation which span the globe, from Spain to the UK to the Cayman Islands and Nicaragua, and, of course, tens of thousands of Cuban citizens who gratefully began using a new mysterious messaging service that made instantaneous text-based mobile communications financially accessible in 2010, and then inexplicably disappeared in September 2012.
This long form article from the Washington Post does a nice job disentangling the ins and outs of the story, based on documents leaked to the Associated Press. I highly suggest you take the time to read the piece, but in very short summation, the United States Agency for International Development (USAID) collaborated with Creative Associates and eventually, Mobile Accord, to distribute a Twitter-like service (ZunZeneo) to Cuban citizens, with the hope of eventually utilizing the service to incite political mobilization against communist regimes. Mostly, though, the operation never went beyond gaining users through shared news stories and sports commentary. They ran out of money in 2012, Cuban users lost the service, and no revolutions were incited. It’s all general buffoon-like and harmless (except, of course, for all of the money), begging for cynical commentary and smart jokes about a deeply ineffective U.S. government. Except, something very serious happened in the process, something that should make us all—both Cubans and Americans—pretty ticked off. (more…)
Three articles came out this week that help me develop my concept of droning as a general type of surveilance that differs in important ways from the more traditional concept of “the gaze” or, more academically, “panopticism.” There’s Molly Crabapple’s post on Rizome, the NYTimes article about consumer surveillance, and my colleague Gordon Hull’s post about the recent NSA legal rulings over on NewAPPS. Thinking with and through these three articles helps me clarify a few things about the difference between droning and gazing: (1) droning is more like visualization than like “the gaze”–that is, droning “watches” patterns and relationships among individual “gazes,” patterns that are emergent properties of algorithmic number-crunching; and (2) though the metaphor of “the gaze” works because the micro- and macro-levels are parallel/homologous, droning exists only at the macro-level; individual people can run droning processes, but only if they’re plugged into crowds (data streams or sets aggregating multiple micro- or individual perspectives).
A longer, more academic version of this post appears at Its Her Factory.
This post follows up on my earlier post about a culture of moderation. Here I want to consider one aspect of this contemporary focus on moderation: the idea of “balance.” We talk about work/life balance, the “balance” between individual freedom and national security, and, as Jenny notes, the “balance” between tech use and abstention.
Like many Burners (and non-Burners), I was outraged when, yesterday, an image with variations of the title “Grabbing 100+ Boobs at Burning Man 2013″ went viral. In light of the public distribution of these photos, I think it’s imperative for the public in general, and Burners in particular, to have a focused conversation about a range of important social issues including the meaning of consent, rape culture, and slut shaming.
I do not know what each woman in the photos consented to and what problems may arise if they are recognized by people they know from contexts other than Burning Man, so I am reluctant to link to or share the image. However, because it is difficult to discuss the issues in question here without making specific references to the content of the photographs and because most of the harm from distributing the image has probably already been done, I have cropped and anonymized a small portion of the long gridded image here.
The philosopher Michel Foucault taught that sexual repression and taboos aren’t so much the repression of sex but instead evidence of obsession. I’m reminded of this lesson after reading about a terrible story wherein a Georgia high-school decides to make a presentation to hundreds of students and parents on what not to do on social media. In doing so, they project a photo of one student in her bikini, an image taken from her Facebook page [she says shared with ‘friends of friends’] without her permission. Her face is not blurred; in fact, her full name is printed below the image. Her photo, indeed, her body itself, is being projected to all these people as ‘what not to do’, her image and body construed as a problem, how one should not present themselves in 2013. Humiliated by the school’s disrespectful and irresponsible behavior, the woman is suing. In trying to warn students of the dangers of posting online, the Georgia high-school acted in exactly the dangerous way students—everyone—shouldn’t act. (more…)
There’s A LOT more to (self-)tracking than Quantified Self
When people ask me what it is that I’m studying for my PhD research, my answer usually begins with, “Have you ever heard of the group Quantified Self?” I ask this question because, if the person says yes, it’s a lot easier for me to explain my project (which is looking at different forms of mood tracking, primarily within the context of Quantified Self). But sometimes asking this return question makes my explanation more difficult, too, because a lot of people have heard the word “quantified” cozy up to the word “self” in ways that make them feel angry, uncomfortable, or threatened. They don’t at all like what those four syllables sometimes seem to represent, and with good reason: the idea of a “quantified self” can stir images of big data, data mining, surveillance, loss of privacy, loss of agency, mindless fetishization of technology, even utter dehumanization.
But this is not the Quantified Self that I have come to know. (more…)
Note to readers: This article and its corresponding links discuss rape, victim blaming, “slut” shaming, and rape culture generally.
The disturbing events in Steubenville, Ohio have spurred some insightful reporting and analysis (collected by Lisa Wade at Sociological Images) that, one would hope, raise awareness about rape culture. As a social scientist that studies social media, I am particularly interested in how privacy and connectivity have been framed within the context of the case. I cannot help but notice the sloppiness with which many reporters write about the “dangerous mix of alcohol, sex and social media that many teens navigate nowadays.” Studying the role of social media in everyday life may appear as trivial or superficial: something fun or novel to study. But Steubenville shows us exactly why writers and scholars need to understand social media better. (more…)