From Usernames to Profiles: the Development of Pseudonymity in Internet Communication
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
'Context Collapse'
Social Media as Practices: an Ethnographic Critique of ‘Affordances’ and ‘Context Collapse’. Elisabetta Costa, Assistant professor, Department of Media and Journalism, University of Groningen, the Netherlands. Honorary Research Fellow at UCL Department of Anthropology, London, UK. Working papers for the EASA Media Anthropology Network’s 60th e- Seminar. http://www.media-anthropology.net/ Abstract Drawing on data gathered during ethnographic fieldwork in Mardin, a medium-sized town in southeast Turkey, this paper examines people’s production of different online social spaces. The paper shows that social media users actively appropriate online platforms and change privacy settings in order to keep different social spheres and social groups apart. Social media users actively mould online social environments that largely resemble those existing in the offline world. Keeping different online social contexts divided from one another is the taken for granted way of using social media in Mardin. By contrast, social media scholars have extensively discussed the effects of social media in terms of context collapse (among others see Marvin 2013; Marwick and Boyd 2011; Marwick and Ellison 2012; Vitak 2012; Wesch 2008, 2009). This in turn has been described as a consequence of platform’s architecture and affordances. This paper shows that the theory of context collapse does not account for the uses of social media in Mardin. It demonstrates that the concept of affordance has been largely used to describe “intrinsic” properties of a platform and its architecture, which are instead the results of pattern of usage within Anglo-American contexts. The paper concludes by suggesting the importance of considering social media as an open set of situated practices, rather than architectures provided with unchangeable and intrinsic properties. -
From Global Village to Identity Tribes: Context Collapse and the Darkest Timeline
Media and Communication (ISSN: 2183–2439) 2021, Volume 9, Issue 3, Pages 16–24 https://doi.org/10.17645/mac.v9i3.3930 Article From Global Village to Identity Tribes: Context Collapse and the Darkest Timeline Marco Bastos School of Information and Communication Studies, University College Dublin, Ireland; E‐Mail: [email protected] Submitted: 15 December 2020 | Accepted: 2 May 2021 | Published: 23 July 2021 Abstract In this article we trace the development of two narratives describing social media that informed much of internet schol‐ arship. One draws from McLuhan’s axiom positing that communication networks would bring forth a ‘global village,’ a deliberate contradiction in terms to foreground the seamless integration of villages into a global community. Social media would shrink the world and reshape it into a village by moving information instantaneously from any location at any time. By leveraging network technology, it would further increase the density of connections within and across social commu‐ nities, thereby integrating geographic and cultural areas into a village stretching across the globe. The second narrative comprises a set of metaphors equally inspired by geography but emphasizing instead identity and tribalism as opposed to integration and cooperation. Both narratives are spatially inspired and foreground real‐world consequences, either by supporting cooperation or by ripping apart the fabric of society. They nonetheless offer opposing accounts of commu‐ nication networks: the first is centered on communication and collaboration, and the second highlights polarization and division. The article traces the theoretical and technological developments driving these competing narratives and argues that a digitally enabled global society may in fact reinforce intergroup boundaries and outgroup stereotyping typical of geographically situated communities. -
A Method to Analyze Multiple Social Identities in Twitter Bios
A Method to Analyze Multiple Social Identities in Twitter Bios ARJUNIL PATHAK, University at Buffalo, USA NAVID MADANI, University at Buffalo, USA KENNETH JOSEPH, University at Buffalo, USA Twitter users signal social identity in their profile descriptions, or bios, in a number of important but complex ways that are not well-captured by existing characterizations of how identity is expressed in language. Better ways of defining and measuring these expressions may therefore be useful both in understanding howsocial identity is expressed in text, and how the self is presented on Twitter. To this end, the present work makes three contributions. First, using qualitative methods, we identify and define the concept of a personal identifier, which is more representative of the ways in which identity is signaled in Twitter bios. Second, we propose a method to extract all personal identifiers expressed in a given bio. Finally, we present a series of validation analyses that explore the strengths and limitations of our proposed method. Our work opens up exciting new opportunities at the intersection between the social psychological study of social identity and the study of how we compose the self through markers of identity on Twitter and in social media more generally. CCS Concepts: • Applied computing Sociology; Additional Key Words and Phrases: Twitter, self-presentation, social identity, computational social science ACM Reference Format: Arjunil Pathak, Navid Madani, and Kenneth Joseph. 2018. A Method to Analyze Multiple Social Identities in Twitter Bios. J. ACM 37, 4, Article 111 (August 2018), 35 pages. https://doi.org/10.1145/1122445.1122456 1 INTRODUCTION A social identity is a word or phrase that refers to a particular social group (e.g. -
A Review of MS-DOS Bulletin Board Software Suitable for Long Distance
DOCUMENT RESUME ED 353 977 IR 015 940 AUTHOR Sessa, Anneliese TITLE A Review of MS-DOS Bulletin Board Software Sui:able for Long Distance Learning. PUB DATE 89 NOTE 7p.; For a related paper, see IR 015 939. PUB TYPE Information Analyses (070) Viewpoints (Opinion/Position Papers, Essays, etc.)(120) EDRS PRICE MFO1 /PCO1 Plus Postage. DESCRIPTORS 'Computer Networks; *Computer Software; Databases; Distance Education; *Electronic Mail; Online Systems; *Telecommunications IDENTIFIERS *MS DOS; NYCENET ABSTRACT This paper describes the advantages of using computer bulletin boards systems (BBS) for distance learning, including the use of the New York City Education Network (NYCENET) to access various databases and to communica1. with individuals or the public. Questions to be answered in order to determine the most appropriate software for running a BBS are listed; and the following public domain and shareware BBS software packages suitable for setting up a BBS for long distance learning are reviewed: Magpie, QBBS, PC Board, RBBS, and Opus. One commercial program--The Bread Board System (TBBS)--is also considered. A 1992 update of the information presented in this paper is appended. (ALF) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document. *********************************************************************** U.S DEPARTMENT OF FOUCATION Orfice of Educahonal Research and inproernent EDUCATIONAL RESOURCES INFORMATION CENTER IERICI This aoc umeni has oeen ,ecnoau, ea as I ece.ved I,Or- the person or organ catn, ortglnabng CM.otc-haflgesnel.ebetn,a0elc,,,rlo A Review of MS-DOS Bulletin Board Software reproduchondeahly Po.nts of v.e. or of:Pn'OnS Staled do.cu Suitable for Long distance Learning men! do r,01 necessanly epresent nIlor oil Reviewed By Anneliese Sessa (1989) OERI poshon The idea of using a computer for long distance learningis not very new. -
Co-Constructing a Participatory Brand: the Affordances of Live
CO-CONSTRUCTING A PARTICIPATORY BRAND: THE AFFORDANCES OF LIVE STREAMING FOR SOCIAL MEDIA ENTREPRENEURSHIP by COLTEN MEISNER Bachelor of Science, 2017 Texas Christian University Fort Worth, TX Submitted to the Graduate Faculty of the Bob Schieffer College of Communication Texas Christian University in partial fulfillment of the requirements for the degree of Master of Science May 2019 ACKNOWLEDGMENTS Any gratitude I could express here would be inadequate for the six years of mentorship I have been afforded at TCU. These acknowledgments reach far beyond my thesis project, albeit the capstone experience of a master’s student. First, I must thank my tremendously gifted advisor, Dr. Andrew Ledbetter. From the moment I asked you to serve as my chair, you have provided boundless support for this project, despite it resting outside of your methodological expertise. Your steadfast commitment propelled me through the more difficult parts of this process. I can only hope to be the advisor and scholar that you are; thank you for providing that example in these early years of my academic career. Next, I want to thank my committee members, Dr. Amorette Hinderaker and Dr. Chip Stewart. Amorette, you are undoubtedly the reason I am in graduate school and pursuing academic research. Thank you for being my superstar collaborator, ally, and friend. Chip, I am truly indebted to you for joining a project outside of your department and contributing insights that have shaped it in meaningful ways. I also wish to thank some other members of the Department of Communication Studies at TCU who have been essential to my success in graduate school. -
Recognizing Legal Differences in Computer Bulletin Board Functions Eric Goldman Santa Clara University School of Law, [email protected]
Santa Clara Law Santa Clara Law Digital Commons Faculty Publications Faculty Scholarship 1-1-1993 Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differences in Computer Bulletin Board Functions Eric Goldman Santa Clara University School of Law, [email protected] Follow this and additional works at: http://digitalcommons.law.scu.edu/facpubs Part of the Law Commons Recommended Citation 16 Hastings Comm. & Ent. L.J. 87 This Article is brought to you for free and open access by the Faculty Scholarship at Santa Clara Law Digital Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differences in Computer Bulletin Board Functions by ERIC SCHLACHTER* Table of Contents I. Difficult Issues Resulting from Changing Technologies.. 89 A. The Emergence of BBSs as a Communication M edium ............................................. 91 B. The Need for a Law of Cyberspace ................. 97 C. The Quest for the Appropriate Legal Analogy Applicable to Sysops ................................ 98 II. Breaking Down Computer Bulletin Board Systems Into Their Key Characteristics ................................ 101 A. Who is the Sysop? ......... 101 B. The Sysop's Control ................................. 106 C. BBS Functions ...................................... 107 1. Message Functions .............................. -
Context Collapse!
https://doi.org/10.48009/4_iis_2016_167-177 Issues in Information Systems Volume 17, Issue IV, pp. 167-177, 2016 SOCIAL MEDIA IMPLOSION: CONTEXT COLLAPSE! Debra J. Borkovich, Robert Morris University, [email protected] Jennifer Breese, Middle GA State University, [email protected] ABSTRACT According to Facebook (2016), “context collapse,” the decline of personal and original content sharing on its social media site, is on the rise. “Context collapse” refers to an infinitely possible online audience contrasted to the limited groups a person normally interacts with face-to-face. This paper explores the construct of “context collapse,” its historical underpinnings, and its current influence and application to the implosion of social media. Through the interpretation of pre-existing literature and interviews with adult Facebook users, we argue that “context collapse” is not merely a new concept introduced by Facebook to justify its current dilemma, but has existed in popular parlance since 2008. We further learned that other social-cultural factors contributed to Facebook’s “context collapse,” such as the decline of traditional anthropological kinship relationships of family and close friends; rapid acceleration of online (and often anonymous) virtual relationships; and exacerbated privacy and security concerns regarding social media platforms. Keywords: Context Collapse, Facebook, Social Media, Privacy, Trust, Naïveté, Skepticism INTRODUCTION In the Spring of 2016, Facebook announced that the construct of “context collapse” was the cause of a decline in people sharing original, personal content, the fuel that helps power the money machine at the heart of its social network (Frier, 2016). According to Facebook (Sunstein, 2016), overall sharing remains strong; however, as users’ lists of “friends” grows exponentially, people are less willing to post updates about their lives. -
Performance of Linear-Type Mobile Data Transmission
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 8, AUGUST 2011 2451 Performance of Linear-Type Mobile Data Transmission Chen-Yuan Chuang, Yi-Bing Lin, Fellow, IEEE, and Yu-Tien Yeh Abstract—In Next Generation Network (NGN), IP Multimedia Subsystem (IMS) plays an important role to offer IP-based multimedia services. Based on Chunghwa Telecom’s NGN/IMS, we develop linear-type data transmission applications such as Bulletin Board System (BBS) or forum-based websites to deliver new articles to the mobile users. We propose the push-N method that pushes every N articles from the BBS server to the user. When the user actually connects to the BBS, the not-yet-pushed messages are pulled by the user. Our study indicates that by selecting appropriate N values, push-N can balance against the push and the pull operations, and therefore improves the user access experience without wasting too much network resources. Index Terms—Forum-based website applications, mobile data transmission, IP multimedia subsystem (IMS). I. INTRODUCTION N Next Generation Network (NGN), IP Multimedia Sub- I system (IMS) supports IP-based broadband multimedia services through mobile devices [1], [2]. Chunghwa Telecom Fig. 1. A simplified NGN/IMS architecture. (CHT), Taiwan, has deployed one of the largest commer- cial NGN/IMS in Asia to provision enhanced voice, video, Based on CHT’s NGN/IMS, we have developed mobile and Internet-based multimedia services. The current CHT data transmission applications that allow pull or push of NGN/IMS capacity can accommodate commercial operation information from an application server (Figure 1 (4)) to a UE for about five hundred thousand subscribers. -
Twitter Users, Context Collapse, and the Imagined Audience
Article new media & society 13(1) 114–133 I tweet honestly, I tweet © The Author(s) 2010 Reprints and permission: passionately: Twitter users, sagepub.co.uk/journalsPermissions.nav DOI: 10.1177/1461444810365313 context collapse, and the nms.sagepub.com imagined audience Alice E. Marwick New York University, USA danah boyd Microsoft Research, USA Abstract Social media technologies collapse multiple audiences into single contexts, making it difficult for people to use the same techniques online that they do to handle multiplicity in face-to-face conversation. This article investigates how content producers navigate ‘imagined audiences’ on Twitter. We talked with participants who have different types of followings to understand their techniques, including targeting different audiences, concealing subjects, and maintaining authenticity. Some techniques of audience management resemble the practices of ‘micro-celebrity’ and personal branding, both strategic self-commodification. Our model of the networked audience assumes a many- to-many communication through which individuals conceptualize an imagined audience evoked through their tweets. Key words audience, context, identity, micro-celebrity, self-presentation, social media, Twitter Introduction We present ourselves differently based on who we are talking to and where the conversa- tion takes place – social contexts like a job interview, trivia night at a bar, or dinner with a partner differ in their norms and expectations. The same goes for socializing online. Corresponding author: Alice E. Marwick, 239 Greene Street 7th Floor, New York, NY 10003, USA. Email: [email protected] Downloaded from nms.sagepub.com at FORDHAM UNIV LIBRARY on September 15, 2013 Marwick and boyd 115 Participants have a sense of audience in every mediated conversation, whether on instant messenger or through blog comments. -
Bulletin Board System (BBS) for a VAX/VMS Multi-User Environment
- Bulletin Board System (BBS) for a VAX/VMS Multi-User Environment An Honors Thesis (HONRS 499) by J. Kevin Cooper Advisor: Dr. Earl H. McKinney Ball State University Muncie, Indiana May 1995 Graduation Date: May 6, 1995 - Abstract Overview The BBS (Bulletin Board System) software is a client/server model running on a VAX/VMS com puter system, which allows both interactive, user-friendly access to file bases and online discussion groups, and a versatile database environment with comprehensive security features. This system has been tailored to be platform-independent in its information transfer protocol, while using the specifics of the operating system to benefit both the appearance of the user interface and the efficiency of database m anagem ent. I have attempted to interweave as much functionality as feasibly possible into this project, as to demonstrate what I have learned through the Computer Science program here at Ball State University, as well as through my internship position as a VAX system technician and programmer S.t University Computing Services. Tools Used This project was written using the following software on University-owned VAX machines: DEC Pascal v4.2 for VMS DEC set Module M anagem ent System v2.5 MultiNet -v3.2 shareable TCPIIP network library Open VMS VAX Operating System v6.0, v6.1 This system makes use of system resources such as the VMS Command Language Interpreter (CLI), VMS Message Utility, Run-time Screen Manager Library (SMG), Record Management Services (RM8), and MultiNet's linkable TCP/IP socket library. Acknowledgem ents I would like to thank Dr. -
The Copyright Crusade
The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time. -
Exploring the Rights, Preferences, and Experiences of Child Participants in Research in Digital Environments
Privacy on their terms: Exploring the rights, preferences, and experiences of child participants in research in digital environments. Julian Burton Independent Scholar Abstract Respecting participants' privacy rights is a vital component of research ethics, but conventional practices in this area may falter when research focuses on groups whose experiences and concerns diverge from those deemed normative, or when the experiences take place in novel environments where information flows and functions in unexpected ways. This article examines the specific example of research with young people in digital social spaces, discussing how online youth communities construct and maintain privacy and arguing that choices regarding research practices should be made in response to contextualized understandings of the perspectives, practices, and experiences at play in specific digital spaces. Keywords: research ethics, digital research, methodology, youth research, childhood studies 2018 Canadian Journal of Children’s Rights Background Ethical guidelines in research exist to protect the well-being of participants and the integrity of research observations and conclusions. Privacy figures on both sides of this equation: on one hand, breaches of participants' privacy may cause serious harm to individual participants; on the other, the perceived danger of such breaches can shape people's responses and willingness to participate in research at all, potentially creating blind spots in research and skewing results. What is demanded by good research ethics often depends on how the subjects of research are fundamentally constructed and understood. Historically, children and young people have been viewed by academia (as by society) as vulnerable, incompetent, irrational, and unreliable. Framings of research ethics in the context of childhood have reflected such prejudices.