From Noobguides to #Opkkk: Ethics of Anonymous' Tactical Technical Communication

Total Page:16

File Type:pdf, Size:1020Kb

From Noobguides to #Opkkk: Ethics of Anonymous' Tactical Technical Communication Technical Communication Quarterly ISSN: 1057-2252 (Print) 1542-7625 (Online) Journal homepage: https://www.tandfonline.com/loi/htcq20 From NoobGuides to #OpKKK: Ethics of Anonymous’ Tactical Technical Communication Jared S. Colton, Steve Holmes & Josephine Walwema To cite this article: Jared S. Colton, Steve Holmes & Josephine Walwema (2017) From NoobGuides to #OpKKK: Ethics of Anonymous’ Tactical Technical Communication, Technical Communication Quarterly, 26:1, 59-75, DOI: 10.1080/10572252.2016.1257743 To link to this article: https://doi.org/10.1080/10572252.2016.1257743 Published online: 07 Dec 2016. Submit your article to this journal Article views: 1288 View related articles View Crossmark data Citing articles: 12 View citing articles Full Terms & Conditions of access and use can be found at https://www.tandfonline.com/action/journalInformation?journalCode=htcq20 TECHNICAL COMMUNICATION QUARTERLY 2017, VOL. 26, NO. 1, 59–75 http://dx.doi.org/10.1080/10572252.2016.1257743 From NoobGuides to #OpKKK: Ethics of Anonymous’ Tactical Technical Communication Jared S. Coltona, Steve Holmesb, and Josephine Walwemac aUtah State University; bGeorge Mason University; cOakland University ABSTRACT KEYWORDS Tactical technical communication research suggests its application to social Anonymous; care; Cavarero; justice. However, beyond a general advocacy of anti-institutional activity, de ethics; tactical technical Certeau’s notion of tactics provides no detailed ethical framework for communication ethically justifying tactics. In acknowledgement of this gap, this article foregrounds the ethical thought of feminist philosopher Adriana Cavarero, particularly her concept of vulnerability, as a supplement for those employ- ing tactics for social justice causes. The authors examine the technical documents produced by the hacktivist collective Anonymous. Introduction A growing number of technical communicators have engaged de Certeau’s(1984) “tactics” via Kimball’s(2006) definition of tactical technical communication (Ding, 2009; Rice, 2009; Seigel, 2013; Towner, 2013). In brief, tactics describe the various ways in which often individuals who are marginalized can appropriate strategies of control to suit their own ends. In employing tactics, consumers who were once passive of dominant or mass culture shift to active producers, thereby blurring the lines for technical communicators between the composition of formal technical docu- ments and informal or do-it-yourself (DIY) modes, genres, and styles. Although such inroads represent excellent starting places, the use of de Certeau (1984) by technical communicators is complicated by several factors, including the need to consider the ways in which we evaluate the ethics of a given set of tactical practices. Building on Kimball’s research, Ding (2009) notes that de Certeau ideally hopes that tactics will be a kairotic “art of the weak” in which technical commu- nicators learn to observe when “the precise instant of an intervention is transform[ed] into a favorable situation”, p. 39). Tactics “vigilantly make use of the cracks that particular conjunctions open in the surveillance of” dominant power structures (p. 37). Nevertheless, as we demonstrate below, de Certeau’s writing (1980, 1984) does not offer a fully developed ethical framework beyond a generalized defense of autonomous initiatives. As an example, consider his definition of an ethic of tenacity as “refusing to accord the established order the status of law, a meaning, or a fatality” (p. 26). In an observation we in no way mean as dismissive of his important contributions, de Certeau (1980, 1984) does not clarify in detail how individuals might employ the ethic of tenacity to differentiate ethical from unethical established orders beyond echoing his general dislike of capitalist institutions. Furthermore, the ethics of tactics as an art of the weak is made even more complicated by the increasing interconnection of tactical technical communication with social justice, social media, and hacking practices. The hacktivist collective Anonymous, for instance, circulates many forms of tactical technical communication on behalf of the weak such as a Self-Defense Handbook (Anonymous [Defense Front], 2014), which recently surfaced in the 2015 Ferguson, Missouri, protests (OpFerguson). Among other practices, the Self-Defense Handbook instructs users how to CONTACT Jared S. Colton [email protected] Department of English, Utah State University, 3200 Old Main Hill, Logan, UT 84322. © 2017 Association of Teachers of Technical Writing 60 J. S. COLTON ET AL. create DIY gas masks out of 2 liter soda bottles to protect themselves against police tear gas. Anonymous also has created a large number of hybrid technical documents that “doxx” (short for “dropping documents”), or publicize the private information of individuals associated with a targeted groups. As part of their 2015 OpKKK initiative that followed OpFerguson, Anonymous released an informational memo that offered users a brief rationale for the purpose of the document as well as the addresses and phone numbers of the White supremacist groups such as the Ku Klux Klan and Stormfront. In a confirmation of the ethical ambiguity of doxxing as a tactical practice, Anonymous previously threatenedtodoxxtheschoolscheduleoftheteenagedaughterofJohnBelmar,thepolicechiefof Ferguson, Missouri. Anonymous’ goal was to force Belmar to release the names of the officers who had shot Michael Brown, the African American victim whose death was the catalyst for the 2014 protests, by potentially exposing a tangentially related target to the threat of physical harm, stalking, or other forms of online and offline harassment. Simply put, we suggest that there is nothing inherent in a given technical document that supports tactical practices or that functions tactically in itself that makes a tactic ethical or unethical in all scenarios. To be clear, de Certeau (1980, 1984) does not explicitly make this claim even if the largely leftist political bent that animates his thinking strongly implies it. As a result, technical commu- nicators’ interests in de Certeau (1984) can benefit from further considerations of when a given set of tactical technical communicationpracticessuchasAnonymous’ are ethical, even when they claim to be operating in the name of “the weak.” This article suggests that one helpful starting place lies in a body of thought called the “ethics of care,” and, in particular, the thinking of the feminist philosopher Cavarero (2011). Rather than looking for a correct universal ethical principle through the categorical imperative, such as Kant’s (1969) absolute prohibition against lying, an ethics of care recognizes moral value in the reciprocal and singular relations of caring between individuals that ensures one another’s well-being. Cavarero’s unique approach to care ethics is through her development of the concept of “vulner- ability.” She posits that vulnerability is an ontological characteristic of being human, which, for Cavarero, makes human relationality—one human’s existence exposed to another’s—already per- meated with ethicality. Because no individual can escape vulnerability, each human body is “irre- mediably open” to relations of “caring or wounding” (p. 20). Each and every living human being is always in a vulnerable relation to others, but the degree to which that relation is one of caring or wounding depends upon on localized and concrete factors, such as materiality, age, time, space, and power. For Cavarero, wounding and caring do not correspond to a basic binary (e.g., wounding = bad, caring = good). Rather, these terms offer a set of fluid ratios to allow us to characterize the totality of relations of those affected by a given tactical action, and, in turn, to attribute ethical behavior which, in some cases, will involve wounding certain individuals to help ensure our collective ability to ensure an ethics of care for the most vulnerable. To illustrate this extension of de Certeau (1984), we analyze the ethics of three of Anonymous’ recent technical communication genres that demonstrate an ambiguous ethical status. First, we examine two instructional guides for hacking, the NoobGuide (Anonymous, 2015b) and the Twatter Reporter Guide (Anonymous, 2015c), and, secondly, we examine the OpKKK doxx memo (Anonymous [Defense Front], 2014) that released the private information of alleged White suprema- cists. We have selected these three examples because they are representative of the types of technical documents that Anonymous has employed over the past decade. Anonymous has circulated multiple versions of the NoobGuide (Anonymous, 2015b) and Twatter Reporter Guide (Anonymous, 2015c)on the Internet alongside various “Ops” (operations). In fact, the particular documents that we examine in this article surfaced in OpISIS and OpParis to encourage users to initiate tactical forms of resistance against The Islamic State of Iraq’s (ISIS) online presence. Similarly, doxxing represents a pervasive tactic. Anonymous has released or has threatened to publish memos that doxx various groups or individuals as part of countless past Ops. Furthermore, unlike some early Anonymous trolling practices, such as ordering pizzas for someone without his or her knowledge, signing up a targeted individual to receive junk mail, or Rickrolling, all three tactical technical documents share some TECHNICAL COMMUNICATION QUARTERLY 61 relationship to exigencies of social justice (e.g., securing a voice for the unrepresented).
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations
    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
    [Show full text]
  • Hard-Coded Censorship in Open Source Mastodon Clients — How Free Is Open Source?
    Proceedings of the Conference on Technology Ethics 2020 - Tethics 2020 Hard-coded censorship in Open Source Mastodon clients — How Free is Open Source? Long paper Juhani Naskali 0000-0002-7559-2595 Information Systems Science, Turku School of Economics, University of Turku Turku, Finland juhani.naskali@utu.fi Abstract. This article analyses hard-coded domain blocking in open source soft- ware, using the GPL3-licensed Mastodon client Tusky as a case example. First, the question of whether such action is censorship is analysed. Second, the licensing compliance of such action is examined using the applicable open-source software and distribution licenses. Domain blocking is found to be censorship in the literal definition of the word, as well as possibly against some the used Google distribu- tion licenses — though some ambiguity remains, which calls for clarifications in the agreement terms. GPL allows for functionalities that limit the use of the software, as long as end-users are free to edit the source code and use a version of the appli- cation without such limitations. Such software is still open source, but no longer free (as in freedom). A multi-disciplinary ethical examination of domain blocking will be needed to ascertain whether such censorship is ethical, as all censorship is not necessarily wrong. Keywords: open source, FOSS, censorship, domain blocking, licensing terms 1 Introduction New technologies constantly create new challenges. Old laws and policies cannot al- ways predict future possibilities, and sometimes need to be re-examined. Open source software is a licensing method to freely distribute software code, but also an ideology of openness and inclusiveness, especially when it comes to FOSS (Free and Open-source software).
    [Show full text]
  • Deciphering L33tspeak
    Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ...............................................................................................................................
    [Show full text]
  • Pivot to Coronavirus: How Meme Factories Are Crafting Public Health Messaging 28 July 2020, by Crystal Abidin
    Pivot to coronavirus: How meme factories are crafting public health messaging 28 July 2020, by Crystal Abidin Through this, they can have a huge influence in shaping social media. And—using the language of internet visual pop culture—meme factories can shift public opinion. When meme factories were born The first mention of meme factories seems to have been a slide in a 2010 TED talk by Christopher Poole, the founder of the controversial uncensored internet forum 4chan. 4chan, said Poole, was "completely raw, completely unfiltered." He introduced his audience to the new internet phenomenon of "memes" coming out of the forum, including LOLcats and Rickrolling – the largest memes to have emerged in the 2000s. ‘LOLcats’ were one of the meme forms of the 2000s. Credit: Clancy Ratliff/Wikimedia Commons, CC BY-SA Today, corporate meme factories systematically churn out posts to hundreds of millions of followers. Memes might seem like they emerge "naturally," They commissioned artists to "live-GIF" the 2012 circulated by like-minded social media users and US Presidential Election debates in an assembly independently generating momentum. But line of soft political content. They congregated on a successful memes often don't happen by accident. closed Facebook group to decide who could "take credit" for a school shooting. They created I've spent the past two years studying the history sponsored political posts for Michael Bloomberg's and culture of "meme factories," especially in Presidential campaign. Singapore and Malaysia. On reddit's gaming communities, activating a meme Meme factories are a coordinated network of factory (sincerely or in jest) requires willing creators or accounts who produce and host members to react with coordinated (and at times, memes.
    [Show full text]
  • From Symbolic Values to Symbolic Innovations
    Paper to be presented at DRUID15, Rome, June 15-17, 2015 (Coorganized with LUISS) FROM SYMBOLIC VALUES TO SYMBOLIC INNOVATIONS EVIDENCE BASED ON INTERNET-MEMES Mickael Benaim University of Manchester/MBS Manchester Institute of Innovation Research [email protected] Abstract Technological assets capture the attention of many scholars in innovation studies, while leaving other sources and forms of innovation less tackled. Among this neglected corpus, this article stresses the important role played by symbolic value in the production and consumption processes of innovative goods and services. We focus more especially on Internet-memes - such as lolcats - that represent iconic productions of the Internet ?lead culture? i.e. embed significant symbolic values. Therefore, this article refers to the economic sociology and strategic management literature to emphasis the force of the symbolic values? creation by new culture-lead communities, through their not so trivial productions: the Internet-memes. We especially aim to contribute to innovation studies and to refine the concept of symbolic innovation, by applying it to both physical and digital goods and services. We argue that Internet-memes are symbolic innovations per-se, but we also emphasise that they represent an almost boundless source of innovative goods and services in various sectors from cultural industries to less expected ones like finance. Jelcodes:O31,O33 ** Please do not cite without permission ** FROM SYMBOLIC VALUES TO SYMBOLIC INNOVATIONS EVIDENCE BASED ON INTERNET-MEMES Abstract: Many innovation scholars focused on technological assets, while leaving other sources and forms of innovation less tackled. Among this neglected corpus, this article stresses the important role plays by symbolic value in the production and consumption processes of innovative goods and services.
    [Show full text]
  • 3.5 Years of Augmented 4Chan Posts from the Politically Incorrect Board
    Proceedings of the Fourteenth International AAAI Conference on Web and Social Media (ICWSM 2020) Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board Antonis Papasavva,*,§ Savvas Zannettou,†,§ Emiliano De Cristofaro,*,§ Gianluca Stringhini,‡,§ Jeremy Blackburn#,§ *University College London, †Max-Planck-Institut fur¨ Informatik, ‡Boston University, #Binghamton University, §iDRAMA Lab {antonis.papasavva.19, e.decristofaro}@ucl.ac.uk, [email protected], [email protected], [email protected] Abstract tion of users who committed mass shootings (Austin 2019; Ali Breland 2019; Evans 2018). This paper presents a dataset with over 3.3M threads and 4chan is an imageboard where users (aka Original Posters, 134.5M posts from the Politically Incorrect board (/pol/) of or OPs) can create a thread by posting an image and a mes- the imageboard forum 4chan, posted over a period of al- most 3.5 years (June 2016-November 2019). To the best of sage to a board; others can post in the OP’s thread, with a our knowledge, this represents the largest publicly available message and/or an image. Among 4chan’s key features are 4chan dataset, providing the community with an archive of anonymity and ephemerality; users do not need to register to posts that have been permanently deleted from 4chan and are post content, and in fact the overwhelming majority of posts otherwise inaccessible. We augment the data with a set of ad- are anonymous. At most, threads are archived after they be- ditional labels, including toxicity scores and the named enti- come inactive and deleted within 7 days.
    [Show full text]
  • Cybershaming: the Shallowing Hypothesis in Action
    https://doi.org/10.48009/2_iis_2016_65-75 Issues in Information Systems Volume 17, Issue II, pp. 65-75, 2016 CYBERSHAMING: THE SHALLOWING HYPOTHESIS IN ACTION William Stanley Pendergrass, American Public University System, [email protected] Carrie A. Payne, Penn State University, [email protected] Gregory R. Buretz, Liberated Syndication, [email protected] ABSTRACT Once confined to the classroom, playground, or the walk home, bullying has become immediate, constant, and unrelenting through the use of social media and mobile devices. Cybershaming is both perceived social justice and sport to a growing part of the public. Information sharers and gatherers have become more impulsive and reactive; and less introspective, empathetic, and kind, thus feeding the voracious cybershaming trend. In an attempt to understand why and how the cybershaming trend is growing, the researchers examine three recent cases of cybershaming and their fit within Nicholas Carr’s Shallowing Hypothesis. Keywords: Cybershaming, Cyberbullying, Shallowing Hypothesis, Shame, Bullying INTRODUCTION The once powerful communication barriers of space and distance are gone. Information is instantly available online; communication is immediate and global. One can easily make connections with perfect strangers and long-lost friends through social media and wireless devices. People hide behind a perceived force field—the computer or mobile device screen. Responses and reactions, based on impulsivity and ethnocentrism rather than sound judgment and compassion, have become common and accepted forms of online communication. This greater access, opportunity for instant gratification, and perceived force field are enabling, and perhaps encouraging bullying.as, society has become faster, quicker, less introspective, less empathetic, and less nice Once confined to the classroom, playground, or the walk home, bullying has become immediate, constant, and unrelenting.
    [Show full text]
  • Why “Hacktivism” Can and Should Influence Cybersecurity Reform
    INVESTING IN A CENTRALIZED CYBERSECURITY INFRASTRUCTURE: WHY “HACKTIVISM” CAN AND SHOULD INFLUENCE CYBERSECURITY REFORM Brian B. Kelly INTRODUCTION ........................................................................................ 1664 I. CYBERCRIME, HACKTIVISM, AND THE LAW ......................... 1671 A. The Current State of Cybercrime ............................................... 1671 B. Defining Hacktivism and Anonymous’s Place Within the Movement .................................................................................. 1676 1. Hacking and Hacktivism ..................................................... 1676 2. Anonymous ......................................................................... 1678 C. Current Cybersecurity Law ....................................................... 1683 1. Federal Statutes ................................................................... 1683 2. National Defense Systems ................................................... 1684 3. State Monitoring Systems .................................................... 1685 4. International Coalitions ....................................................... 1686 II. CURRENT REFORM PROPOSALS ............................................... 1687 A. Obama Proposal ........................................................................ 1687 B. Republican Task Force Proposal .............................................. 1689 III. THE CYBERSECURITY REFORM SOLUTION ........................... 1692 A. Similarities in the Reform Models ............................................
    [Show full text]
  • Life-Cycle of Internet Trolls
    Terho Jussinoja LIFE-CYCLE OF INTERNET TROLLS UNIVERSITY OF JYVÄSKYLÄ FACULTY OF INFORMATION TECHNOLOGY 2018 ABSTRACT Jussinoja, Terho Life-cycle of Internet Trolls Jyväskylä: University of Jyväskylä, 2018, 107 p. Information Systems, Master’s Thesis This paper is a master’s thesis about internet trolls and trolling with the main goal of finding what is the life-cycle of internet trolls. In other words, how a person becomes a troll, how their trolling evolves, and how does trolling stop. Trolling definitions are also examined to see whether they are adequate. This thesis also covers the current state of research done on trolling, with the empha- sis on literature that is relevant to the life-cycle of a troll. The literature will also be evaluated against the results from this study. Past research on trolling is quite scarce when comparing to the multiple topics it holds, suggesting that the scientific understanding of internet trolls is still less than ideal. Most of the pre- vious studies have not been able to utilize trolls’ views, whereas this study only uses commentary from trolls. This study was conducted using a qualitative re- search method, thematic analysis, and used three different methods for data collection. Trolling has become more commonplace in recent years and it has been claimed to be a formidable problem for civil discourse on the internet and there- fore deserves better insight on the matter. Media accounts, literature, and public opinions rarely match when it comes to trolling. This shows that there is plenty of confusion and misunderstandings on the topic. By discovering the reasons why an individual decides to troll, and how they decide to stop, there can be better technological solutions developed that might discourage people to start trolling or encourage them to stop.
    [Show full text]
  • Dynasty Academic Competition Questions
    DACQ January 2008 Packet 3: Dynasty Academic Competition Tossups Questions © 2007 Dynasty Academic Competition Questions. All rights reserved. This work may not be reproduced or redistributed, in whole or in part, without express prior written permission solely by DACQ. Please note that non-authorized distribution of DACQ materials that involves no monetary exchange is in violation of this copyright. For permission, contact Chris Ray at [email protected]. 1. This language contributed the term for the taste sensation triggered by glutamate proteins, as well as a word that appears in F. Scott Fitzgerald's final work, the word “tycoon.” It can be transliterated via Hepburn Romanization, and consists of two major (*) scripts. Words like “futon” come from this language, whose scripts are hiragana and katagana. Also contributing poetry styles like renga and haiku, FTP, identify this language that may help you order sushi and which is spoken in Kobe, Yokohama, Osaka, Kyoto, and Tokyo. ANSWER: Japanese 2. Henry Gates identified an African mythological archetype revolving around the “Signifying” example of this animal, which usually interacts with a lion. A famous one accompanies Xuanzang on a quest to retrieve the sutra from India and has a magical staff in (*) Journey to the West. In the Ramayana, Ravana faces an army of Vanara led by Hanuman, all of whom are this kind of animal. The Mizaru motif in Japanese spirituality consist of three of these creatures, traditionally called “see no evil, hear no evil, speak no evil.” FTP, identify this primate, whose best-known cultural depiction might be Curious George. ANSWER: Monkeys (grudgingly accept Ape or Primate, though not specific terms like “gorillas”) 3.
    [Show full text]
  • Social Media Governance: Platforms in Conflict — the Strategies of Operators and the Tactics of Users
    SOCIAL MEDIA GOVERNANCE: PLATFORMS IN CONFLICT — THE STRATEGIES OF OPERATORS AND THE TACTICS OF USERS. Andrew Quodling B Creative Industries (Honours I) Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy Digital Media Research Centre Creative Industries Faculty Queensland University of Technology 2019 Keywords Platform Governance Social Media Platform Politics User Tactics Content Moderation Online Harassment Facebook Twitter Google+ Social Media Governance: Platforms in Conflict — The strategies of operators and the tactics of users. i Abstract The growth in availability, affordability and accessibility of internet services in recent years has seen a dramatic increase in the use of social media platforms like Facebook and Twitter. The political conflict and activism both on and against social media platforms have become a more frequent occurrence as their user bases grow and diversify. Conflicts between users and platform operators have involved their attitudes and policies towards issues as diverse as censorship, privacy and surveillance, images depicting breastfeeding, images depicting nudity, pornography, hateful speech and threats of physical harm — with many conflicts garnering coverage in mainstream media. This project investigates conflicts in which users of social media platforms have dramatically different political views and expectations than the operators and designers of their platforms by analysing the different ways in which users have negotiated differences of power and political disputes on social media platforms in several case studies. It has highlighted regular areas of conflict or tension, the strategies that platforms use and the tactics that users deploy to negotiate these conflicts. By interrogating the power structures and political conflicts of social media platforms, this research has discovered how platform operators attempt to govern users through policy and enforcement strategies, and how users interact with platforms during conflict and by identifying themes in user actions during conflicts.
    [Show full text]
  • Characterizing Social Music Sharing on Reddit
    Imagine All the People: Characterizing Social Music Sharing on Reddit Veniamin Veselovsky, Isaac Waller, Ashton Anderson University of Toronto [email protected], [email protected], [email protected] Abstract munities or pieces of music, in order to deeply understand the social and cultural contexts they are embedded in. Music shapes our individual and collective identities, and in turn is shaped by the social and cultural contexts it occurs Computational approaches to the study of music, on in. Qualitative approaches to the study of music have uncov- the other hand, have largely been dedicated to process- ered rich connections between music and social context but ing musical data. Millions of songs can be categorized are limited in scale, while computational approaches process into fine-grained musical genres using automated and semi- large amounts of musical data but lack information on the so- automated techniques, signal processing methods can per- cial contexts music is embedded in. In this work, we develop form complex tasks on acoustic data, and higher-level se- a set of neural embedding methods to understand the social mantic qualities of songs can be extracted from the music contexts of online music sharing, and apply them to a novel alone. However, the social contexts in which music is in- dataset containing 1.3M instances of music sharing in Reddit voked has not been subject to the same level of analysis. communities. We find that the patterns of how people share music in public are related to, but often differ from, how they Detailed audio signals corresponding to millions of pieces listen to music in private.
    [Show full text]