Skip to main content

Home/ Writing about Literature in the Digital Age/ Group items tagged social

Rss Feed Group items tagged

Bri Zabriskie

We Are Visible - SIGN UP SPEAK OUT BE SEEN - helping you connect to the social world - 0 views

  •  
    more about our discussion about the anonymity of presence online: This site is a diving board for people who are homeless to begin using social media. It advocates the use of social media to give these people a voice in a community that is more apt to ignore them. People don't often listen to people who "look" homeless, but because with social media they can blog/tweet/status update from their hearts and be judged only on the basis of what they say without being preempted by something else, people listen.
jardinejn

The Impact of Community Computer Networks on Social Capital and Community Involvement - 0 views

  • Putnam defined social capital as the "features of social organization, such as trust, norms and networks, that can improve the efficiency of society by facilitating coordinated actions
  • , civic engagement is a function of communication among members via their social networks, and as civic engagement increases, so does quality of life in the community. Thus, communities with vibrant communication networks are likely to have a preferable quality of life.
  • . Dimmick, Patterson, and Sikand (1996) argued for the role of the traditional telephone in developing and maintaining strong interpersonal communication patterns in the local community.
  • ...2 more annotations...
  • examination of the role of interactive media in building social capital.
  • Several scholars viewed the computer network of the Internet as especially well suited to communication activities that lead to community building, virtual or otherwise (Jones, 1994; Rheingold, 2000; Wellman, 1997).
  •  
    How networking can influence social causes
  •  
    This study found how group efficacy improves with networking.
Audrey B

Social Networks Spread Defiance Online - 1 views

  •  
    As the embattled government of President Mahmoud Ahmadinejad appears to be trying to limit Internet access and communications in Iran, new kinds of social media are challenging those traditional levers of state media control and allowing Iranians to find novel ways around the restrictions.
  •  
    Interestingly, Pakistan is having these same issues right now: http://news.bbc.co.uk/2/hi/world/south_asia/10130195.stm What I think is interesting is the clashing conceptions of what free speech constitutes and how these social media is forcing those who are used to a more totalitarian view to think about the overarching issue
Krista S

Motivations for Play in Online Games - 0 views

  •  
    While these results seem to confirm stereotypical assumptions of gendered play styles, the variation in the achievement component is in fact better explained by age than gender. Also worth noting is that there is a gender difference in the relationship subcomponent but not in the socializing subcomponent, although these two subcomponents are highly related. In other words, male players socialize just as much as female players, but are looking for very different things in those relationships.
Amanda Giles

Executive Summary | Pew Internet & American Life Project - 0 views

  • Only 6% of the adult population has no one with whom they can discuss important matters or who they consider to be “especially significant” in their life.
  • contrary to the considerable concern that people’s use of the internet and cell phones could be tied to the trend towards smaller networks, we find that ownership of a mobile phone and participation in a variety of internet activities are associated with larger and more diverse core discussion networks. (Discussion networks are a key measure of people’s most important social ties.)
  •  
    Social networking decreases social isolation.
Audrey B

Electronic Civil Disobedience and the World Wide Web of Hacktivism: - 1 views

  • In the spring of 1998, a young British hacker known as "JF" accessed about 300 web sites and placed anti-nuclear text and imagery. He entered, changed and added HTML code. At that point it was the biggest political hack of its kind. Since then, and increasingly over the course of the year, there were numerous reports of web sites being accessed and altered with political content.
  • By no means was 1998 the first year of the browser wars, but it was the year when electronic civil disobedience and hacktivism came to the fore, evidenced by a front page New York Times article on the subject by the end of October. Since then the subject has continued to move through the media sphere.
  • computerized activism, grassroots infowar, electronic civil disobedience, politicized hacking, and resistance to future war
  • ...47 more annotations...
  • these five portals seem to provide a useful starting point for a more in-depth, yet to come, examination of the convergence of activism, art, and computer-based communication and media.
  • PeaceNet enabled - really for the first time - political activists to communicate with one another across international borders with relative ease and speed.
  • The international role of email communication, coupled to varying degrees with the use of the Fax machine, was highlighted in both the struggles of pro-democracy Chinese students and in broader trans-national movements that lead to the dissolution of the Soviet Union.
  • the role of international email communication in linking together the world.
  • an overarching dominant paradigm that privileges discourse, dialogue, discussion and open and free access.
  • So the first portal of Computerized Activism is important for understanding the roots of today’s extraparliamentarian,
  • Computerized activism, defined more purely as the use of the Internet infrastructure as a means for activists to communicate with one another, across international borders or not, is less threatening to power than the other types of uses we see emerging in which the Internet infrastructure is not only a means toward or a site for communication, but the Internet infrastructure itself becomes an object or site for action.
    • Audrey B
       
      Twitter, YouTube, other forms of social networking that provide communication within the Internet infrastructure to become an "object or site for action"...
  • Infowar here refers to a war of words, a propaganda war. Grassroots infowar is the first step, the first move away from the Internet as just a site for communication and the beginning of the transformation from word to deed.
  • emerge fully cognizant they are on a global stage, telepresent across borders, in many locations simultaneously.
  • a desire to push words towards action. Internet media forms become vehicles for inciting action as opposed to simply describing or reporting.
  • war of words
  • war of words
  • war of words
  • lists, newsgroups, discussion lists, and web sites
  • A primary distinction, then, between earlier forms of computerized activism and forms of grassroots infowar is in the degree of intensity. Coupled with that is the degree to which the participants are noticed and seen as a force.
  • in grassroots infowar comes the desire to incite action and the ability to do so at a global scale.
  • Within a matter of days there were protests and actions at Mexican consulates and embassies all over the world
  • At the end of 1997, news of the Acteal massacre in Chiapas, in which 45 indigenous people were killed, quickly spread through global pro-Zapatista Internet networks.
  • following there has been a shift, the beginning of the move toward accepting the Internet infrastructure as both a channel for communication and a site for action.
    • Audrey B
       
      channel for communication=computerized activism. a Site for action= grassroots infowar...Combining the two leads to Electronic Civil Disobedience
  • tactics of trespass and blockade from these earlier social movements and are experimentally applying them to the Internet.
  • A typical civil disobedience tactic has been for a group of people to physically blockade, with their bodies, the entranceways of an opponent's office or building or to physically occupy an opponent's office -- to have a sit-in.
  • utilizes virtual blockades and virtual sit-ins
  • an ECD actor can participate in virtual blockades and sit-ins from home, from work, from the university, or from other points of access to the Net.
  • a theoretical exploration of how to move protests from the streets onto the Internet.
  • street protest, on-the-ground disruptions and disturbance of urban infrastructure and they hypothesize how such practices can be applied to the Internet infrastructure
  • after the 1997 Acteal Massacre in Chiapas, there was a shift toward a more hybrid position that views the Internet infrastructure as both a means for communication and a site for direct action.
  • Electronic Civil Disobedience is the first transgression, making Politicized Hacking the second transgression and Resistance to Future War the third.
  • The realization and legitimization of the Internet infrastructure as a site for word and deed opens up new possibilities for Net politics, especially for those already predisposed to extraparliamentarian and direct action social movement tactics.
  • In early 1998 a small group calling themselves the Electronic Disturbance Theater had been watching other people experimenting with early forms of virtual sit-ins. The group then created software called FloodNet and on a number of occasions has invited mass participation in its virtual sit-ins against the Mexican government.
  • FloodNet to direct a "symbolic gesture" against an opponent's web site.
  • it launched a three-pronged FloodNet disturbance against web sites of the Mexican presidency, the Frankfurt Stock Exchange, and the Pentagon, to demonstrate international support for the Zapatistas, against the Mexican government, against the U.S. military, and against a symbol of international capital.
  • hacks into Mexican government web sites where political messages have been added to those sites.
  • the young British hacker named "JF" who hacked into around 300 web sites world wide and placed anti-nuclear imagery and text. This method has been tried by a number of groups.
  • while ECD actors don’t hide their names, operating freely and above board, most political hacks are done by people who wish to remain anonymous. It is also likely political hacks are done by individuals rather than by specific groups.
  • As already stated there are critiques aimed at the effectiveness and the appropriateness of cyber-protests. In terms of effectiveness, three closely related types of questions have appeared regarding political, tactical, and technical effectiveness. Concerning appropriateness there are ethical questions, that may be also considered as political questions, and of course there are legal questions. Some of the legal concerns raise issues of enforceability and prosecuteability.
  • Are these methods of computerized activism effective?
  • If the desired goal of hacktivism is to draw attention to particular issues by engaging in actions that are unusual and will attract some degree of media coverage, then effectiveness can be seen as being high.
  • Rather hacktivism appears to be a means to augment or supplement existing organizing efforts, a way to make some noise and focus attention.
  • a period of expansion, rather than contraction.
  • To judge blocking a web site, or clogging the pipelines leading up to a web site, is to take an ethical position. If the judgement goes against such activity, such an ethical position is likely to be derived from an ethical code that values free and open access to information.
  • While it is true that some forms of hacktivity are fairly easy to see as being outside the bounds of law - such as entering into systems to destroy data - there are other forms that are more ambiguous and hover much closer to the boundary between the legal and the illegal. Coupled with this ambiguity are other factors that tend to cloud the enforceability or prosecuteability of particular hacktivist offenses. Jurisdictional factors are key here. The nature of cyberspace is extraterritorial. People can easily act across geographic political borders, as those borders do not show themselves in the terrain. Law enforcement is still bound to particular geographic zones. So there is a conflict between the new capabilities of political actors and the old system to which the law is still attached. This is already beginning to change and legal frameworks, at the international level, will be mapped on to cyberspace.
  • It seems that hacktivity has met and will meet resistance from many quarters. It doesn't seem as if opposition to hacktivist ideas and practices falls along particular ideological lines either.
  • hacktivism represents a spectrum of possibilities that exists in some combination of word and deed.
  • What remains unclear about hacktivism emerges when we start to ask questions like: what does this mean and where is this going?
    • Audrey B
       
      Twitter. At 3:30 people log/hack on to Twitter and form blockades so that Iranians can voice their beliefs and feelings towards the government in 140 characters. People are also hacking and creating proxy sites that allow Iranians to get online.
  • Theorizing about grassroots or bottom-up Information Warfare doesn't nearly get as much attention as the dominant models and as a consequence there is not much written on the subject. 11 The case of the global pro-Zapatista networks of solidarity and resistance offers a point of departure for further examination of grassroots infowar. One feature of Zapatista experience over the course of the last 5 years is that it has been a war of words, as opposed to a prolonged military conflict. This is not to say there isn't a strong Mexican military presence in the state of Chiapas. Quite the contrary is true. But fighting technically ended on January 12, 1994 and since then there has been a ceasefire and numerous attempts at negotiation.12 What scholars, activists, and journalists, on both the left and the right, have said is that the Zapatistas owe their survival at this point largely to a war of words. This war of words, in part, is the propaganda war that has been successfully unleashed by Zapatista leaders like Subcommandante Marcos as well as non-Zapatista supporters throughout Mexico and the world. Such propaganda and rhetoric has, of course, been transmitted through more traditional mass communication means, like through the newspaper La Jornada. 13 But quite a substantial component of this war of words has taken place on the Internet. Since January 1, 1994 there has been an explosion of the Zapatista Internet presence in the forms of email Cc:
  • Because of the more secret, private, low key, and anonymous nature of the politicized hacks, this type of activity expresses a different kind of politics. It is not the politics of mobilization, nor the politics that requires mass participation. This is said not to pass judgement, but to illuminate that there are several important forms of direct action Net politics already being shaped.
  • hackers' desires to make information free.
  •  
    Concrete article for paper
Krista S

Project Massive : The Social and Psychological Impact of Online Gaming - 0 views

  • Further, the re- sults indicate that participation in online gaming can lead to decreased isolation and en- hanced social integration for those players who use online gaming as a medium in which to spend time and interact with real life friends and relatives.
  • The average adult spends 4 hours per day (or 28 hours weekly) watching television (A.C. Neilsen, 2001). Average weekly video game play is estimated at 7.6 hours (ESA, 2004). It is reported that people who play massively multi- player online games do so for an average of 15 hours per week; however, weekly usage of 30 hours or more is not uncommon
  • It is assumed that 10% of online game players are addicted to the activ- ity, an extrapolation from the ABCNEWS.com survey finding that 10% of all users of the internet are addicted to it
  • ...2 more annotations...
  • Killers are characterized by what Bartle refers to as a desire to impose themselves on the play experience of others. Most often this is done by killing other players for the joy of
  • “knowing that a real person, somewhere, is very upset by what you've just done, yet can themselves do nothing about it.” Killers are commonly referred to as “griefers” and their actions as “grief play” given their orientation toward annoying and aggravating others.
Amanda Giles

I'm So Totally, Digitally Close to You - Clive Thompson - NYTimes.com - 2 views

  • Facebook and Twitter may have pushed things into overdrive, but the idea of using communication tools as a form of “co-presence” has been around for a while. The Japanese sociologist Mizuko Ito first noticed it with mobile phones: lovers who were working in different cities would send text messages back and forth all night — tiny updates like “enjoying a glass of wine now” or “watching TV while lying on the couch.” They were doing it partly because talking for hours on mobile phones isn’t very comfortable (or affordable). But they also discovered that the little Ping-Ponging messages felt even more intimate than a phone call.
  • capable
  • A lot of this is just social norms catching up with what technology is capable of.”
  • ...18 more annotations...
  • ambient awareness
  • very much like being physically near someone
  • paradox of ambient awareness
  • insignificant on its own
  • he little snippets coalesce into a surprisingly sophisticated portrait of your friends’ and family members’ lives
  • Facebook and Twitter may have pushed things into overdrive, but the idea of using communication tools as a form of “co-presence” has been around for a while. The Japanese sociologist Mizuko Ito first noticed it with mobile phones: lovers who were working in different cities would send text messages back and forth all night — tiny updates like “enjoying a glass of wine now” or “watching TV while lying on the couch.” They were doing it partly because talking for hours on mobile phones isn’t very comfortable (or affordable). But they also discovered that the little Ping-Ponging messages felt even more intimate than a phone call.
  • the growing popularity of online awareness as a reaction to social isolation
  • human groupings naturally tail off at around 150 people: the “Dunbar number,” as it is known. Are people who use Facebook and Twitter increasing their Dunbar number, because they can so easily keep track of so many more people?
  • Constant online contact had made those ties immeasurably richer, but it hadn’t actually increased the number of them; deep relationships are still predicated on face time, and there are only so many hours in the day for that.
  • If you’re reading daily updates from hundreds of people about whom they’re dating and whether they’re happy, it might, some critics worry, spread your emotional energy too thin, leaving less for true intimate relationships.
  • Parasocial relationships can use up some of the emotional space in our Dunbar number, crowding out real-life people.
  • hey can observe you, but it’s not the same as knowing you.”
  • people in their 20s who were in college when Facebook appeared and have never lived as adults without online awareness. For them, participation isn’t optional. If you don’t dive in, other people will define who you are.
  • if only to ensure the virtual version of you is accurate, or at least the one you want to present to the world.
  • he dynamics of small-town life,
  • If anything, it’s identity-constraining now
  • result of all this incessant updating: a culture of people who know much more about themselves
  • t’s like the Greek dictum to “know thyself,” or the therapeutic concept of mindfulness.
Amanda Giles

The will to technology and the ... - Google Books - 0 views

  •  
    Heidegger, Nietzche, and Marx seem to be the best psychological/philosophical sources for defining identity in the light of social media advances. I haven't worked through this whole article, but it seems like a good source for quotes on identity that can say whatever you want them to mean, you know?
Gideon Burton

Tour: Research | Diigo - 1 views

  •  
    A good introductory video to Diigo, the social bookmarking tool
Gideon Burton

Diigo Tutorials - 1 views

  •  
    A good set of links for educational uses of Diigo social bookmarks. Includes suggestions for teachers on how to employ Diigo for pedagogical purposes
Audrey B

Iran Elections: A Twitter Revolution? - washingtonpost.com - 0 views

  •  
    Evgeny Morozov, a blogger for Foreign Policy magazine and a fellow with the Open Society Institute, discusses the role of Twitter and other social-networking services during the Iranian elections.
becca_hay

Sexual Identity Online - M/Cyclopedia of New Media - 1 views

  • Specifically, the opportunity for exaggerated, unreal portrayals of self lead many to question the validity of substantial, and truthful online interaction. As Jordan (1999: 88) argues, “…identity fluidity supports the masquerades and experiments of avatars…the ability to change gender, the ability to contact experts…â€?. In the physical world, such social experiments as playing with the alternation of gender or creating a completely different social background for the purpose of research, become far more complex and are less likely to occur. Alternatively, the Internet offers its users the potential to explore identity more easily and often most importantly, the ability to do so, anonymously.
    • becca_hay
       
      This digital masking can be compared with the actual costuming of actors in the transvestite theater. This is a test run using diigo
Gideon Burton

Delicious - 0 views

  •  
    One of the earliest and still most popular social bookmarking services
Gideon Burton

BibSonomy :: home - 0 views

  •  
    An academic social bookmarking system
Heather D

Berkman Center - 1 views

shared by Heather D on 03 Jun 10 - Cached
  •  
    This is the page for the Berkman Center for Internet and Society. Has info about digital natives, social media and journalism, and internet and democracy.
Krista S

6 Maps of Digital Desires: Exploring the Topography of Gender and Play in Online Games - 1 views

  • Women in many MMOs perceive the game culture rather than the game mechanics to be the primary deterrent to poten-­ tial female gamers
  • On average, respondents spend twenty-­two hours each week in an MMO. The median was twenty hours per week—the equivalent of half a workweek. There were no significant gender or age differences in usage patterns; players over the age of forty play on average just as much as players under the age of twenty
  • While about 27 percent of female players were introduced to the game by a romantic partner, only 1 percent of male players were introduced in this way.
  • ...7 more annotations...
  • Overall, about 25 percent of players play an MMO with their romantic partner. Female players are more likely to be playing with a romantic partner than male players (see figure 6.1). About two-­ thirds of female gamers are playing with a romantic partner, while less than one-­fifth of male gamers are
  • Men are allowed relatively free access to online games, but a woman’s presence in an online game is seen as legitimate only if it occurs via a relationship with a man.
  • It isn’t the case that women play only for socializing or that men play only to kill monsters. On the other hand, there are gender differences in these self-­identified motivations. Male players score higher in the Advancement, Mechanics, and Competition motivations, while female players score higher in the Relationship and Customization motivations. There were very small or no gender differences in the other five motivations—Socializing, Teamwork, Discovery, Role-­Playing, and Escapism.
  • In a recent survey, I asked female gamers about what they saw as potential deterrents to female gamers in the MMO they played. Almost every respondent cited the proportions and clothing options of the female avatars as problematic.
  • To a certain extent, this encourages players to think about women as token spectacles rather than actual players.
  • More important, many female players have learned that it is danger-­ ous to reveal your real-­life gender in MMOs because they will be branded as incompetent and constantly propositioned; In other words, they must either accept the male-­subject position silently, or risk constant discrimination and harassment if they reveal that they are female
  • Also, there are very few other places (in physical or virtual worlds) where high-­school students are collaborating with professors, retired war veterans, and stay-­at-­home moms
Heather D

Digital Natives » Identity - 0 views

  •  
    Blog about social media and identity. Comments on trend toward unifying identity and the related problems. Also talks about online anonymity.
Gideon Burton

Walter Benjamin's Aura: Open Bookmarks and the future eBook | booktwo.org - 3 views

  •  
    Fascinating exploration of "social reading" and the prospect of open bookmarks.
Derrick Clements

MUBI - 0 views

  •  
    A while back I blogged about wanting to find sites like Goodreads for movies and music.  I have discovered that FLIXSTER IS EVIL and should be avoided at all costs.  Mubi is kind of  a cool alternative.  It has a great design, which is fun, but its main focus is NOT the social aspect of it; it basically seems that it is trying to be a Netflix-like business plan.  But you can make reviews and lists, and it doesn't spam all your friends and coworkers. 
1 - 20 of 40 Next ›
Showing 20 items per page