Stevenson the Cybercultural Moment and the New Media Field Final
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Social Media Job Expectations
Social Media Job Expectations Twitter @FHNtoday User 1Push all new content from FHNtoday.com and FHNgameday.com ● Push miscellaneous announcements ● User will focus on tagging people/groups when possible. ● Promote other social accounts weekly ● Push breaking news ● Check on Medium daily. ● Have at least 3 updates per week day ● Maintain look/profile of @FHNtoday ● Research this and brainstorm ways to make medium even stronger. Twitter @FHNtoday User 2 Push all new content from FHNgameday.com ● Push miscellaneous sports announcements ● User will focus on tagging people/groups when possible. ● Promote other social accounts weekly ● Push breaking sports news ● Check on Medium daily. ● Have at least 3 updates per week day ● Research this and brainstorm ways to make medium even stronger. Twitter @FHNtoday User 3: ● Maintain weekly analytics report ● User will focus on tagging people/groups when possible. ● Follow back accounts ● Follow new accounts ● Maintain lists ● Check on Medium daily. ● RT appropriate members of the community. 1 or 2 per day ● Reply to @mentions ● Utilize: https://analytics.twitter.com OK -- Pinterest User 1: Focus on school-related topics like Homecoming, Pep Assembly's, etc. ● Focus on at least one board per week with multiple postings per day ● Work to maintain and update previous related boards when appropriate ● Share information at least once per week with Facebook and Twitter User #1 to promote ● Work to maintain/increase followers/board followed ● Check on Medium daily. ● Maintain overall look/profile of account OK -- Pinterest User 2: ● Focusing on trending topics or things that are going viral. ● Focus on at least one board per week with multiple postings per day ● Work to maintain and update previous related boards when appropriate ● Share information at least once per week with Facebook and Twitter User #1 to promote ● Maintain weekly analytics of Pinterest ● Check on Medium daily. -
Security Analysis of Tumblr
Security Analysis of Tumblr 6.857 Spring 2017 Team Hackerman Remi Mir, Shruti Banda, Stephen Li, José Zúñiga Table of Contents Abstract 2 Introduction 2 What is Tumblr? 2 Motivation 2 Past Security Incidents 2 Principals and Actions 3 Guests 3 Users with Accounts 3 Group Users 4 Third Party Developers 4 Tumblr Corporation 4 Testing Methodology 4 Web Application 5 Burp Suite 6 Overview 6 Tests 6 Results 8 API 9 Overview 9 Tests 10 Invalid Inputs 10 Basic Scripting 11 Script Injection Attacks 12 Results 14 Conclusion 14 Summary 14 Recommendations 15 Further Work 15 Acknowledgements 16 References 16 1 Abstract Our project was to perform the security analysis of a popular microblogging site called Tumblr. The objective was to explore the different ways Tumblr ensures the protection of the information it collects from its users, and identify which areas it fails to secure. We especially focused on how Tumblr handles the security as per its privacy policy, including all relevant account information, e.g. username, password, age, and email address. We constructed a security analysis document summarizing our attempts to detect flaws in both the web application and the API. Our group identified strengths and weaknesses of the web application and the API, and drafted recommendations for solutions that Tumblr can implement to make the platform more secure for its users. Introduction What is Tumblr? Tumblr is a popular microblogging platform with more than 20 million users from the United States [1] and over 300 million blogs in total [2]. It is also among the top ten social networking sites worldwide in 2017 [3]. -
Effectiveness of Dismantling Strategies on Moderated Vs. Unmoderated
www.nature.com/scientificreports OPEN Efectiveness of dismantling strategies on moderated vs. unmoderated online social platforms Oriol Artime1*, Valeria d’Andrea1, Riccardo Gallotti1, Pier Luigi Sacco2,3,4 & Manlio De Domenico 1 Online social networks are the perfect test bed to better understand large-scale human behavior in interacting contexts. Although they are broadly used and studied, little is known about how their terms of service and posting rules afect the way users interact and information spreads. Acknowledging the relation between network connectivity and functionality, we compare the robustness of two diferent online social platforms, Twitter and Gab, with respect to banning, or dismantling, strategies based on the recursive censor of users characterized by social prominence (degree) or intensity of infammatory content (sentiment). We fnd that the moderated (Twitter) vs. unmoderated (Gab) character of the network is not a discriminating factor for intervention efectiveness. We fnd, however, that more complex strategies based upon the combination of topological and content features may be efective for network dismantling. Our results provide useful indications to design better strategies for countervailing the production and dissemination of anti- social content in online social platforms. Online social networks provide a rich laboratory for the analysis of large-scale social interaction and of their social efects1–4. Tey facilitate the inclusive engagement of new actors by removing most barriers to participate in content-sharing platforms characteristic of the pre-digital era5. For this reason, they can be regarded as a social arena for public debate and opinion formation, with potentially positive efects on individual and collective empowerment6. -
What Is Gab? a Bastion of Free Speech Or an Alt-Right Echo Chamber?
What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? Savvas Zannettou Barry Bradlyn Emiliano De Cristofaro Cyprus University of Technology Princeton Center for Theoretical Science University College London [email protected] [email protected] [email protected] Haewoon Kwak Michael Sirivianos Gianluca Stringhini Qatar Computing Research Institute Cyprus University of Technology University College London & Hamad Bin Khalifa University [email protected] [email protected] [email protected] Jeremy Blackburn University of Alabama at Birmingham [email protected] ABSTRACT ACM Reference Format: Over the past few years, a number of new “fringe” communities, Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, like 4chan or certain subreddits, have gained traction on the Web Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?. In WWW at a rapid pace. However, more often than not, little is known about ’18 Companion: The 2018 Web Conference Companion, April 23–27, 2018, Lyon, how they evolve or what kind of activities they attract, despite France. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3184558. recent research has shown that they influence how false informa- 3191531 tion reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web’s information ecosystem. 1 INTRODUCTION In August 2016, a new social network called Gab was created The Web’s information ecosystem is composed of multiple com- as an alternative to Twitter. -
Riots: a Comparative Study of Twitter and Parler
111 Capitol (Pat)riots: A comparative study of Twitter and Parler HITKUL, IIIT - Delhi, India AVINASH PRABHU∗, DIPANWITA GUHATHAKURTA∗, JIVITESH JAIN∗, MALLIKA SUBRA- MANIAN∗, MANVITH REDDY∗, SHRADHA SEHGAL∗, and TANVI KARANDIKAR∗, IIIT - Hy- derabad, India AMOGH GULATI∗ and UDIT ARORA∗, IIIT - Delhi, India RAJIV RATN SHAH, IIIT - Delhi, India PONNURANGAM KUMARAGURU, IIIT - Delhi, India On 6 January 2021, a mob of right-wing conservatives stormed the USA Capitol Hill interrupting the session of congress certifying 2020 Presidential election results. Immediately after the start of the event, posts related to the riots started to trend on social media. A social media platform which stood out was a free speech endorsing social media platform Parler; it is being claimed as the platform on which the riots were planned and talked about. Our report presents a contrast between the trending content on Parler and Twitter around the time of riots. We collected data from both platforms based on the trending hashtags and draw comparisons based on what are the topics being talked about, who are the people active on the platforms and how organic is the content generated on the two platforms. While the content trending on Twitter had strong resentments towards the event and called for action against rioters and inciters, Parler content had a strong conservative narrative echoing the ideas of voter fraud similar to the attacking mob. We also find a disproportionately high manipulation of traffic on Parler when compared to Twitter. Additional Key Words and Phrases: Social Computing, Data Mining, Social Media Analysis, Capitol Riots, Parler, Twitter 1 INTRODUCTION Misinformation of the United States of America’s presidential election results being fraudulent has been spreading across the world since the elections in November 2020.1 Public protests and legal cases were taking place across the states against the allegation of voter fraud and manhandling of mail-in ballots.2 This movement took a violent height when a mob attacked the Capitol Hill building to stop certification of Mr. -
Paradise Lost , Book III, Line 18
_Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted. -
Healthcare Blogging-A Review S Sethi
The Internet Journal of Radiology ISPUB.COM Volume 10 Number 2 Healthcare Blogging-A review S Sethi Citation S Sethi. Healthcare Blogging-A review. The Internet Journal of Radiology. 2008 Volume 10 Number 2. Abstract The Internet is changing medicine and web 2.0 is the current buzz word in the world wide web dictionary. According to Dean Giustini in British Medical Journal, web 2.0 means “the web as platform” and “architecture of participation”. It is the web or internet information which is created by the users themselves. Web 2.0 is primarily about the benefits of easy to use and free internet software. For example, blogs and wikis facilitate participation and conversations across a vast geographical expanse. Information pushing devices, like RSS feeds, permit continuous instant alerting to the latest ideas in medicine. Multimedia tools like podcasts and videocasts are increasingly popular in medical schools and medical journals. Recently, there has been no escaping the mention of blogs in the media. Blogging has emerged as a social phenomenon, which has impacted politics, business, and communication. Medical field or healthcare is also not immune to this global phenomenon. Hence this chapter will deal with this phenomenon of blogging, with emphasis on what is a blog, historical significance, various software platforms available, blogging for a physician, pros and cons of blogging in healthcare, examples from popular healthcare blogs and prediction for future trends. This chapter will familiarize the reader about healthcare blogs and their impact on healthcare. INTRODUCTION participating in these small communities with fellow A blog or weblog (derived from web+log) is a web based ‘‘techies.’‘ Because of the skills and understanding required publication consisting primarily of periodic articles to create blogs, they were not nearly as widespread as they (normally, but not always, in reverse chronological order). -
Rethinking the Participatory Web: a History of Hotwired's “New Publishing Paradigm,” 1994–1997
University of Groningen Rethinking the participatory web Stevenson, Michael Published in: New Media and Society DOI: 10.1177/1461444814555950 IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document version below. Document Version Publisher's PDF, also known as Version of record Publication date: 2016 Link to publication in University of Groningen/UMCG research database Citation for published version (APA): Stevenson, M. (2016). Rethinking the participatory web: A history of HotWired's 'new publishing paradigm,' 1994-1997. New Media and Society, 18(7), 1331-1346. https://doi.org/10.1177/1461444814555950 Copyright Other than for strictly personal use, it is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license (like Creative Commons). The publication may also be distributed here under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license. More information can be found on the University of Groningen website: https://www.rug.nl/library/open-access/self-archiving-pure/taverne- amendment. Take-down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Downloaded from the University of Groningen/UMCG research database (Pure): http://www.rug.nl/research/portal. For technical reasons the number of authors shown on this cover page is limited to 10 maximum. -
2. Mondo 2000'S New Media Cool, 1989-1993
UvA-DARE (Digital Academic Repository) The web as exception: The rise of new media publishing cultures Stevenson, M.P. Publication date 2013 Link to publication Citation for published version (APA): Stevenson, M. P. (2013). The web as exception: The rise of new media publishing cultures. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:02 Oct 2021 2. Mondo 2000’s new media cool, 1989-1993 To understand how it was possible for the web to be articulated as an exceptional medium when it surfaced in the 1990s - that is, as a medium that would displace its mass and mainstream predecessors while producing web-native culture - one must see the historical and conceptual ties between web exceptionalism and cyberculture. -
DEAD CHANNEL SURFING: Cyberpunk and Industrial Music
DEAD CHANNEL SURFING: Cyberpunk and industrial music In the early 1980s from out of Vancouver, home of cyberpunk writer William Gibson and science fiction film-maker David Cronenberg, came a series of pioneering bands with a similar style and outlook. The popular synth-pop band Images in Vogue, after touring with Duran Duran and Roxy Music, split into several influential factions. Don Gordon went on to found Numb, Kevin Crompton to found Skinny Puppy, and Ric Arboit to form Nettwerk Records, which would later release Skinny Puppy, Severed Heads, Moev, Delerium and more. Controversial band Numb ended up receiving less attention than the seminal Skinny Puppy. Kevin Crompton (now called Cevin Key) joined forces with Kevin Ogilvie (Nivek Ogre) and began their career by playing in art galleries. After their friend Bill Leeb quit citing ‘creative freedom’ disputes, they embarked on a new style along with the help of newly recruited Dwayne Goettel. Leeb would go on to found Front Line Assembly with Rhys Fulber in 1986. The style of music created by these bands, as well as many similar others, has since been dubbed ‘cyberpunk’ by some journalists. Cyberpunk represents an interesting coupling of concepts. It can be dissected, as Istvan Csiscery-Ronay has shown, into its two distinct parts, ‘cyber’ and ‘punk’. Cyber refers to cybernet- ics, the study of information and control in man and machine, which was created by U.S. American mathematician Norbert Wiener fifty years ago. Wiener fabricated the word from the Greek kyber- netes, meaning ‘governor’, ‘steersman’ or ‘pilot’ (Leary, 1994: 66). The second concept, punk, in the sense commonly used since 1976, is a style of music incorporating do-it-yourself (d.i.y) techniques, centred on independence and touting anarchist attitudes. -
Colonizing Virtual Reality
Colonizing Virtual Reality http://eserver.org/cultronix/chesher/ Colonizing Virtual Reality Construction of the Discourse of Virtual Reality, 1984-1992 Chris Chesher Introduction New technologies do not appear from nowhere as a mystical spark of inspiration from the mind of one individual. Nor are they inevitably accepted for their self-evident benefits. A technology emerges through a process involving broader cultural, linguistic, institutional and technological contexts. One clear illustration of this process can be drawn with the appearance of "virtual reality" in 1989, and the subsequent popularization of the idea through the media. On June 7, 1989 the computer-aided design software company Autodesk and the eclectic computer company VPL announced a new technology called "virtual reality."1 In marketing this new technology (which represented a major shift in thinking about the nature of computers), the developers and promoters drew on a range of tropes: VR is shared and objectively present like the physical world, composable like a work of art, and as unlimited and harmless as a dream. When VR becomes widely available, around the turn of the century, it will not be seen as a medium used within physical reality, but rather as an additional reality. VR opens up a new continent of ideas and possibilities. At Texpo 89 we set foot on the shore of this continent for the first time. --VPL Research at Texpo 89, in Rheingold, p.154. The above quote draws several analogies to introduce Virtual Reality. The statements do not describe the nature or features of an actual product--they introduce the new idea by comparison to familiar, comfortable cultural icons. -
L-G-0004998833-0007910864.Pdf
Grahams HD:Users:Graham:Public:GRAHAM'S IMAC JOBS:14238 - POLITY - WALKER RETTBERG:WALKER-RETTBERG 9780745663647 PRINT Blogging Second Edition Grahams HD:Users:Graham:Public:GRAHAM'S IMAC JOBS:14238 - POLITY - WALKER RETTBERG:WALKER-RETTBERG 9780745663647 PRINT Digital Media and Society Series Nancy Baym: Personal Connections in the Digital Age Jean Burgess and Joshua Green: YouTube Mark Deuze: Media Work Charles Ess: Digital Media Ethics, 2nd edition Alexander Halavais: Search Engine Society Graeme Kirkpatrick: Computer Games and the Social Imaginary Martin Hand: Ubiquitous Photography Robert Hassan: The Information Society Tim Jordan: Hacking Leah A. Lievrouw: Alternative and Activist New Media Rich Ling and Jonathan Donner: Mobile Communication Donald Matheson and Stuart Allan: Digital War Reporting Dhiraj Murthy: Twitter Zizi A. Papacharissi: A Private Sphere Jill Walker Rettberg: Blogging, 2nd edition Patrik Wikström: The Music Industry, 2nd edition Blogging Second edition Jill Walker Rettberg polity Grahams HD:Users:Graham:Public:GRAHAM'S IMAC JOBS:14238 - POLITY - WALKER RETTBERG:WALKER-RETTBERG 9780745663647 PRINT Copyright © Jill Walker Rettberg 2014 The right of Jill Walker Rettberg to be identified as Author of this Work has been asserted in accordance with the UK Copyright, Designs and Patents Act 1988. First edition published in 2008 by Polity Press This second edition first published in 2014 by Polity Press Polity Press 65 Bridge Street Cambridge CB2 1UR, UK Polity Press 350 Main Street Malden, MA 02148, USA All rights reserved. Except for the quotation of short passages for the purpose of criticism and review, no part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the publisher.