Facebook

I like Ellen DeGeneres. Lots of people respect what she does and she has a reputation of treating people right. However, I was surprised when I came across a clip from her popular daytime television show where she unsuspectingly broadcasts compromising Facebook photos of random audience members, a sketch I saw for the first time yesterday, and there seems to be at least a few more of these on YouTube.

I get it, it’s a gag on context collapse: photos taken in and for one time and place are dislocated onto broadcast television, to unexpected and hilarious results. Cute. However, the reality of this is not so funny, and The Ellen DeGeneres Show should know better.

The problem here is that Ellen is setting a precedent that it is okay and fun to share each others information to a larger audience than was initially intended; that blasting compromising photos from someone’s Facebook profile to other audiences, large or small, is a funny joke. For many, it isn’t.

Ellen’s lighthearted joke takes the form of much modern bullying; especially what is often called “cyberbullying” more...

 


I have mentioned previously on this blog that I am engaged in an ongoing, qualitative, Facebook-based project looking at the experiences of social media users. None of the work from this most recent project is yet published, though I did use the data for my TtW2012 presentation. As I move into manuscript preparation, there are several theoretical and empirical trends that I need to flesh out.  I hope that readers will indulge me today as I work through one such trend. I especially hope that readers will offer critiques and literature suggestions, as the end product will inevitably be strengthened through collaborative input from this academic community.

Specifically, I hope to flesh out the notion of reality curation. Much of the work on social network sites focuses on self-presentation, or the ways in which people curate images of themselves.  These strategies of image-curation include friending practices, selective photographic and textual displays, and careful utilization of privacy settings—among other practices. Users are careful about their self-images, diligent in their upkeep, and protective against identity threats. Undeniably, I see these laborious practices of protection, maintenance, and care in the participants of my study. I also, however, see a second kind of labor; I see a diligent upkeep not only of outgoing data, but also incoming data. In particular, participants report careful curation of their Facebook News Feeds and (when applicable) Twitter networks.

This second type of curation—the curation of data coming in—is empirically and theoretically interesting. Work that focus on self-presentation (data going out) understands social network sites as both window and mirror—spaces for both voyeurism and self-reflection. This implicitly neglects, however, the idea that windows work two ways: they offer a view from outside in, but also a view from inside out. Social network sites, as opposed to non-social websites, are spaces of simultaneous projection, reflection, and, as I argue here, observation by the prosumer of the Profile.

more...

This is part of a series of posts highlighting the Theorizing the Web conference, April 14th, 2012 at the University of Maryland (inside the D.C. beltway). See the conference website for information as well as event registration.

Experiencing global events through social media has become increasingly common. For those in the West, the uprisings over the past few years in the Middle East, North Africa and elsewhere were especially striking because social media filled an information void created by the lack of traditional journalists to cover the dramatic events. By simply following a hashtag on Twitter, we tuned into those on the scene, shouting messages of revolution, hope, despair, carnage, persistence, misinformation, debate, sadness, terror, shock, togetherness; text and photos bring us seemingly closer to the events themselves.

But of course the Twitter medium is not neutral. It has shaped what we see and what we do not. Where is the truth in all of this? The intersection of knowledge, power, struggle and the radically new and transformative power of social media begs for intense theorizing. How we conceptualize, understand, define and talk about this new reality lays the path forward to better utilizing social media for journalistic and political purposes.

This is why the keynote for Theorizing the Web 2012 conference (College Park, MD, April 14th) features Andy Carvin (NPR News) and Zeynep Tufekci (UNC) in conversation. Carvin (@acarvin) has become well known for his innovative use of Twitter as a journalistic tool. Tufekci (@techsoc) has emerged as one of the strongest academic voices on social movements and social media and brings a theoretical lens to help us understand this new reality. Together, insights will be made that have impact beyond just journalism but to all researchers of technology as well as those outside of academic circles.

Who is Andy Carvin; and What Do We Call Him?

Without a deep background in professional journalism, Carvin’s actual title at NPR is “Senior Strategist.” However,  more...

Michael Rogers, Republican Congressional Representative of Michigan's 8th district and sponsor of CISPA

House representative Mike Rogers (R-MI) introduced a bill back in November called the Cyber Intelligence Sharing and Protection Act (H.R. 3523) or CISPA. It has since been referred to and reported by the appropriate committees. Since then, according to Representative Rogers’ own web site, over 100 members of congress have already announced their support for the bill:

The 105 co-sponsors of the bill include 10 committee chairmen.  Additionally, a wide range of major industry and cyber associations, such as Facebook, Microsoft, the US Chamber Commerce, the Business Roundtable, the Internet Security Alliance, TechAmerica, and many others have sent letters of support for the bill.  A list of major industry and association supporters can be found at http://intelligence.house.gov/bill/cyber-intelligence-sharing-and-protection-act-2011

Unlike SOPA and PIPA, CISPA is all about collecting and sharing “cyber threat intelligence” and has less to do with copyright infringement concerns. This bill does not directly threaten the business interests of web companies, which means we should not expect their help in fighting the bill. In fact Facebook, IBM, Intel, Oracle, and Microsoft (among others) have already sent letters in support. more...

Let’s start with a simple question: Would you use Facebook the same way if you knew others were notified when you viewed their page? Certainly, Facebook collect this sort of data on your viewing habits, and the decision not to share information about who has visited you profile is an intentional one. In fact, many sites—perhaps, most notably, dating sites like OkCupid—make the ability to track visitors a central part of their site design. OkCupid regularly sends emails to users when a good match views their profiles. The idea is to turn passive lurking into active interaction. Of course, the purpose of a dating site is to connect strangers.

Lurking, however, has become a definitive part of the Facebook experience. As we now know, most Facebook friends are people we have meet in person. Facebook doesn’t need to break the ice. Yet, users rarely interact with many, if not most, of their Facebook friends. So, why be friends at all? Of course, the answer is that we love to stalk the people in our social networks, especially those weak links on the margins whose live we aren’t keyed into through regular interaction. Today, Facebook stalking plays the same role (albeit more efficiently) that gossip chains played in generations past: It keeps us connected through heavily-mediated and indirect forms of interaction. And, both gossip and Facebook share the unique property of making us more visible to each other. more...

"For Trayvon Martin" mural by "Israel" in Third Ward Houston. Photo taken by Jenni Mueller.

 

On February 26, 2012 Trayvon Martin, a Black, 17 a year old, unarmed, high school student, was shot and killed by George Zimmerman, a White Hispanic man acting in the self-appointed position of neighborhood watch captain (click here for more details).

The case has become a symbolic battle ground for two important issues: gun laws and racism. Although both of these issues are inextricably entwined, for purposes of simplicity, I will focus here only on the issue of race.

As Jessie Daniels importantly points out on Racism Review, battles over racism have shifted into the realm of social media, where digital and physical race relations persist in an augmented relationship. We see this in both the progressive anti-racist discourses, and the racial smear campaigns surrounding the Martin/Zimmerman case.

Although it is important to expose the overtly racist tactics utilized by some of Zimmerman’s defenders—of which there are plenty—I want to talk here about a more subtle, and so perhaps more problematic form of racial discourse. Specifically, I will talk about how a prominent strategy of protest—coming out of the liberal left—may inadvertently perpetuate, rather than challenge, racial hierarchies in their most dehumanizing form. more...

This is the full Augmented Activism essay. The two parts provide prescriptive tactics for how to incorporate technology in activist work. Part 1 was originally posted here and part 2 was here.

Part 1

Academics usually do not talk about “tactics.” There are theories, methods, critiques, but we -as professionals-rarely feel comfortable advocating for something as unstable or open to interpretation as a tactic. In the latest edition of the Science, Technology, and Human Values (The flagship journal for Society for Social Studies of Science) three authors threw caution to the wind and published the paper “Postcolonial Computing: A Tactical Survey” [over-priced subscription required]. While the content of the paper is excellent, what excited me the most was their decision to describe their new “bag of tools” as a set of tactics. Kavita Philip, Lilly Irani, and Paul Dourish take a moment in their conclusion to reflect on their decision:

We call our results tactics, rather than methodologies, strategies, or universal guarantors of truth. Tactics lead not to the true or final design solution but to the contingent and collaborative construction of other narratives. These other narratives remain partial and approximate, but they are irrevocably opened up to problematization. more...

By now, we have all heard the warning: potential employers will look at your Facebook page. We have been sufficiently terrified by the cautionary tale about the keg-stand profile pic (why is it always a keg stand?) that kept some otherwise capable candidate from getting hired. Indeed, we have taken note, with increased utilization of privacy settings and a collective awareness by job candidates about the visibility of social network sites.

Now, with the quickly spreading news of Justin Bassett, the warnings (and inevitable cautionary tales) become more epic. Bassett is a statistician out of New York, who, while on a job interview, was asked to log in to his social network profile. Bassett not only refused, but shared his story widely, sparking debates about privacy, employee rights, and the blurring line between personal and professional.   more...

Every Saturday morning I set up cages and tables at a retail outlet where a local animal rescue agency holds adoptions. On a recent Saturday morning, I was talking with an employee who had to cancel her internet service due to financial constraints. The hardest thing about this, she said, was her absence from Facebook. Not only was she outside of the social communication loop, but talked about a weekend trip with friends where she found herself socially marginalized. She wound up in the kitchen making fruit salad as people popped in to grab strawberries before returning to conversations from which she was excluded.

Technically, Social media is optional. No laws or formal rules require that we participate. As seen in the example above, however, there is a strong social cost to abstention. As an integral aspect of everyday life, social media is increasingly difficult to opt out of. P.J. Rey points this out in his recent discussion of Facebook exploitation. Here, I want to explore why and how this is the case. more...

On constructing a lesson plan to teach Pinterest and feminism

I teach sociology; usually theoretical and centered on identity. I pepper in examples from social media to illustrate these issues because it is what I know and tends to stimulate class discussion. It struck me while reading arguments about Pinterest that we can use this “new thing” social media site to demonstrate some of the debates about women, technology and feminist theory.

We can view Pinterest from “dominance feminist” and “difference feminist” perspectives to both highlight this major division within feminist theory as well as frame the debate about Pinterest itself. Secondly, the story being told about Pinterest in general demonstrates the “othering” of women. Last, I’d like to ask for more examples to improve this as a lesson plan to teach technology and feminist theories. I should also state out front that what is missing in this analysis is much of any consideration to the problematic male-female binary or an intersectional approach to discussing women and Pinterest while also taking into account race, class, sexual orientation, ability and the whole spectrum of issues necessary to do this topic justice.

“What’s a Pinterest?”

Before we begin, let me very briefly explain what Pinterest is [or read a better summary here]. Likely, more...