Webtechnologie

Total Page:16

File Type:pdf, Size:1020Kb

Webtechnologie Standort Hagen Fachbereich Technische Betriebswirtschaft Webtechnologie Die Lehre von den Techniken des World Wide Web und von ihren Auswirkungen auf Wirtschaft und Gesellschaft — Teil II: Fortgeschrittene Webtechniken und digitale Ökonomie — Vorlesungsskript für das sechste Semester Wirtschaftsinformatik Andreas de Vries Version: 21. September 2021 Dieses Skript unterliegt der Creative Commons License CC BY 4.0 (http://creativecommons.org/licenses/by/4.0/deed.de) Inhaltsverzeichnis IV Fortgeschrittene Webtechniken und Konzepte 6 17 jQuery 7 17.1 Entstehungsgeschichte, Lizenz, Dokumentation . .7 17.2 Einbindung der Bibliothek . .8 17.3 Syntax . .8 17.4 DOM-Manipulation mit jQuery . .9 17.5 CSS-Formatierungen . 11 17.6 AJAX mit jQuery . 12 17.7 jQuery Mobile . 13 18 AngularJS 16 18.1 Grundlegende Konzepte . 16 18.2 Erste Beispiele: HTML wird (fast) eine Programmiersprache . 20 18.3 Grundelemente von AngularJS . 22 18.4 Erste Datenbankzugriffe mit AngularJS . 23 18.5 Single Page App mit Components und Datenbankzugriffen . 25 18.6 Angular . 30 18.7 Bewertung und Ausblick . 30 19 WebSockets 32 19.1 Das WebSocket Protokoll . 33 19.2 Die WebSocket API . 34 19.3 Programmierung eines WebSocket-Clients . 35 19.4 Anwendungsfälle . 38 19.5 Webkonferenzen mit WebRTC . 40 20 Webservices versus REST 44 20.1 SOA: automatisierte Dienste . 44 20.2 REST . 53 21 NoSQL: Big Data und verteilte Datenbanken 57 21.1 Das CAP-Theorem . 59 21.2 Typen von NoSQL-Datenbanken . 62 21.3 MapReduce . 63 21.4 Konsistentes Hashing . 66 21.5 Vektoruhren . 67 2 Webtechnologie 3 V Digitale Ökonomie 72 22 Die digitale Revolution 73 22.1 Drei Entwicklungen . 74 22.2 Kurze Wirtschaftsgeschichte . 75 22.3 Ökonomische Mechanik: Das Coase’sche Gesetz . 77 22.4 Web 2.0, vernetzte Mobilität und Big Data . 78 22.5 Die Generation Y . 80 22.6 Begriffsdefinition Digitale Ökonomie ...................... 81 22.7 Geschäftsmodelle . 82 23 Google und seine Kerntechnologien 85 23.1 Wirtschaftliche Kennzahlen . 85 23.2 Suchmaschinen . 87 23.3 Der PageRank-Algorithmus . 87 23.4 Googleware und Cloud Computing . 91 23.5 Maschinelles Lernen mit TensorFlow . 95 24 Facebook 97 24.1 Geschäftsmodell . 98 24.2 WhatsApp und die Internet.org Vision . 99 24.3 Wirtschaftliche Kennzahlen . 101 24.4 Informationstechnik . 101 25 Mathematik sozialer Netzwerke 103 25.1 Definition elektronischer sozialer Netzwerke . 103 25.2 Netzwerkstrukturen . 104 25.3 Wachstum von Netzen . 111 25.4 Netzwerkeffekte . 112 25.5 Systemische Risiken in Netzen . 120 25.6 * Ramsey-Zahlen . 124 26 Künstliche Intelligenz 129 26.1 Überblick, Einordnung und Begriffe . 130 26.2 Was ist Intelligenz? . 130 26.3 Rechenleistung von Mensch und Computer . 133 26.4 IBMs Ansatz mit Daten und Algorithmen . 135 26.5 Neuronale Netze und Deep Learning . 137 26.6 Sind KI-Systeme intelligent? . 142 26.7 Die Singularität . 144 26.8 Big Data: Korrelationen statt Kausalität . 144 26.9 Kybernetik: Messen, Steuern und Regeln von Verhalten . 145 26.10Ethik künstlicher intelligenter Systeme . 146 26.11Was müssen wir tun? . 149 27 Digitales Geld 151 27.1 Definition und Geschichte des Geldes . 151 27.2 Geld als Währung . 156 27.3 Spezifische Eigenschaften digitalen Geldes . 160 27.4 Bitcoin . 161 4 Andreas de Vries 28 Computer und Finanzmärkte 167 28.1 Geschichte . 167 28.2 Algorithmischer Handel . 172 Literatur 184 Index 185 Vorwort Das vorliegende Skript führt das Skript Webtechnologie 1 – Grundlagen fort. Es werden zunächst fortgeschrittene Webtechniken behandelt, bevor Begriffe und Konzepte zum Grundverständnis der digitalen Ökonomie untersucht werden. Einen Schwerpunkt der fortgeschrittenen Webtechniken bilden die sogenannten Webframe- works, also Programmbibliotheken, die die Programmierung von Webanwendungen auf Server- und Clientseite vereinfachen, aber auch CSS-Bibliotheken. Es hat sich in den letzten Jahren ein wahrer „Zoo“ solcher Bibliotheken gebildet, basierend auf ganz verschiedenen Programmier- sprachen wie JavaScript, PHP, Java, ASP oder C++. Eine aktuelle Liste der meist verbreiteten findet man unter https://de.wikipedia.org/wiki/Liste_von_Webframeworks. In diesem Skript werden z.B. den wichtigen JavaScript-Bibliotheken jQuery und Angular jeweils ein Kapitel gewidmet. Die hier behandelten Themen sind Teil der in letzter Zeit aktuell gewordenen „Fullstack- Entwicklung“, die genau die integrative Sicht auf die verschiedenen Techniken zur Erstellung von Webauftritten teilt wie das vorliegende Skript. Als deutschsprachiges Darstellung dazu ist Ackermann (2021) sehr zu empfehlen. Hagen, im September 2021 Andreas de Vries 5 Teil IV Fortgeschrittene Webtechniken und Konzepte 6 17 jQuery Kapitelübersicht 17.1 Entstehungsgeschichte, Lizenz, Dokumentation . .7 17.2 Einbindung der Bibliothek . .8 17.3 Syntax . .8 17.4 DOM-Manipulation mit jQuery . .9 17.5 CSS-Formatierungen . 11 17.6 AJAX mit jQuery . 12 17.7 jQuery Mobile . 13 JavaScript spielt in der professionellen Webprogrammierung eine ganz zentrale Rolle, insbe- sondere aufgrund seiner Fähigkeiten, DOM-Manipulationen und asynchrone HTTP-Requests dynamisch auszulösen. Da allerdings die dazu notwendigen Anweisungen in JavaScript recht aufwendig sind — mit Funktionen wie getElementById zur DOM-Manipulation oder dem im we- sentlichen immer gleichen Dreischritt zur Implementierung eines asynchronen HTTP-Requests — wurden immer wieder spezielle JavaScript-Bibliotheken entwickelt, um die Programmie- rung zu vereinfachen. Eine der wichtigsten und verbreitesten dieser Bibliotheken ist jQue- ry, das zu einem De-Facto-Standard der Webprogrammierung geworden ist: Nach W3Techs (http://w3techs.com/) wird jQuery auf fast 70 % aller Webauftritte eingesetzt. 17.1 Entstehungsgeschichte, Lizenz, Dokumentation jQuery wurde 2006 von John Resig veröffentlicht und ist seit April 2013 in der Version 2 verfügbar. Da diese Version nur noch mit modernen Browserversionen kompatibel ist (also insbesondere nicht mit dem Internet Explorer bis einschließlich Version 8), wird die Ver- sion 1 parallel weitergeführt. jQuery ist als freie Software unter der MIT-Lizenz (https: //tldrlegal.com/license/mit-license) verfügbar, darf also auch für kommerzielle Zwecke verwendet werden, wobei jede Kopie ihr Copyright beinhalten muss. Die API-Dokumentation von jQuery ist unter http://api.jquery.com/ verfügbar, ein sehr gutes Tutorial unter http://www.w3schools.com/jquery/. 7 8 Andreas de Vries: Webtechnologie 17.2 Einbindung der Bibliothek Da jQuery eine JavaScript-Bibliothek ist, benötigt man zur dessen Verwendung keine beson- dere Installation, sondern bindet es per Hyperlink in das HTML-Dokument ein. Die aktuellste Variante findet man unter http://code.jquery.com/ Dort ist jede Version in einer „unkomprimierten“ und einer „minifizierten“ Fassung verfügbar. Die erste ist kommentiert und formatiert und somit gut lesbar, die andere ist unformatiert und ohne Kommentare, aber mit deutlich weniger Speicherbedarf. Die minifizierte Fassung eignet sich also zur reinen Nutzung besser als die unkomprimierte. Man kann nun die gewünschte Version der Bibliothek einfach auf den eigenen Server herunterladen und sie dann per Link einbinden, man kann aber auch die Originalbibliothek einfach verlinken. Die minifizierte Version 3.3.1 beispielsweise kann man im Head des HTML-Dokuments mit <script src="http://code.jquery.com/jquery-3.3.1.min.js"></script> einbinden. Empfohlen ist die Einbindung mit einer Überbrüfung der „Subresource Integrity“ des W3C: <script src="http://code.jquery.com/jquery-3.3.1.min.js" integrity="sha256-FgpCb/KJQlLNfOu91ta32o/NMZxltwRo8QtmkMRdAu8=" crossorigin="anonymous" ></script> 17.3 Syntax Basis einer jQuery-Anweisung ist der Aufruf der Funktion $, oder synonym jQuery, mit einem Selektor und einer Aktion: $(Selektor).Aktion(...); oder synonym jQuery(Selektor).Aktion(...); (Gebräuchlicher ist die Verwendung von $.) Der Selektor ist hierbei ein CSS-Selektor zur Auswahl eines oder mehrerer HTML-Elemente, die Aktion ist eine auszuführende Funktion aus der jQuery-Bibliothek. Für den Selektor gibt es im Wesentlichen vier Varianten, beispielhaft mit der Aktion hide() aufgelistet, die die ausgewählten HTML-Elemente per CSS verstecken lässt: $("#test").hide() versteckt alle HTML-Elemente mit der ID "test". $(".test").hide() versteckt alle HTML-Elemente der Klasse "test". $("p").hide() versteckt alle <p>-Elemente. $(this).hide() versteckt das aktuelle Element (funktioniert normaler- weise nur innerhalb eines selektierten Elements); Diese Anweisungen müssen in eine anonyme Funktion (auch „Callback-Funktion“ oder „Lambda- Ausdruck“ genannt) eingepackt werden: $(function(){ $(document).ready(function(){ ... oder äquivalent ... }); }); §17 jQuery 9 und sollten im <head> des HTML-Dokuments programmiert (bzw. als externe JS-Datei dort eingelesen) werden. Auf diese Weise wird garantiert, dass das gesamte Dokument vollständig geladen ist, bevor jQuery-Code ausgeführt wird. Ein Aufruf dieser Art entspricht dem in JavaS- cript oft verwendeten Programmiermuster IIFE (immediatley invoked function expression). Neben diesen „Selektor-Aktion“-Anweisungen kann man in jQuery auch direkt vordefinierte Nutzfunktionen durch $.Nutzfunktion(...); oder synonym jQuery.Nutzfunktion(...); aufrufen. In der API-Dokumention (http://api.jquery.com/) sind die vorhandenen Nutzfunk- tionen mit jQuery.Nutzfunktion (...) aufgeführt. Die auf selektierte Elemente möglichen Aktionen sind dagegen einfach mit .Aktion (...) beschrieben. 17.4 DOM-Manipulation mit jQuery Als erstes Programmbeispiel mit jQuery betrachten wir eine Version des Programms aus Kapitel 16 (Listing 16.2), das
Recommended publications
  • Deepfakes and Cheap Fakes
    DEEPFAKES AND CHEAP FAKES THE MANIPULATION OF AUDIO AND VISUAL EVIDENCE Britt Paris Joan Donovan DEEPFAKES AND CHEAP FAKES - 1 - CONTENTS 02 Executive Summary 05 Introduction 10 Cheap Fakes/Deepfakes: A Spectrum 17 The Politics of Evidence 23 Cheap Fakes on Social Media 25 Photoshopping 27 Lookalikes 28 Recontextualizing 30 Speeding and Slowing 33 Deepfakes Present and Future 35 Virtual Performances 35 Face Swapping 38 Lip-synching and Voice Synthesis 40 Conclusion 47 Acknowledgments Author: Britt Paris, assistant professor of Library and Information Science, Rutgers University; PhD, 2018,Information Studies, University of California, Los Angeles. Author: Joan Donovan, director of the Technology and Social Change Research Project, Harvard Kennedy School; PhD, 2015, Sociology and Science Studies, University of California San Diego. This report is published under Data & Society’s Media Manipulation research initiative; for more information on the initiative, including focus areas, researchers, and funders, please visit https://datasociety.net/research/ media-manipulation DATA & SOCIETY - 2 - EXECUTIVE SUMMARY Do deepfakes signal an information apocalypse? Are they the end of evidence as we know it? The answers to these questions require us to understand what is truly new about contemporary AV manipulation and what is simply an old struggle for power in a new guise. The first widely-known examples of amateur, AI-manipulated, face swap videos appeared in November 2017. Since then, the news media, and therefore the general public, have begun to use the term “deepfakes” to refer to this larger genre of videos—videos that use some form of deep or machine learning to hybridize or generate human bodies and faces.
    [Show full text]
  • Transcript of Proceedings Held on 06/23/08, Before Judge Ware. Court
    The Facebook, Inc. v. Connectu, LLC et al Doc. 474 1 IN THE UNITED STATES DISTRICT COURT 2 FOR THE NORTHERN DISTRICT OF CALIFORNIA 3 SAN JOSE DIVISION 4 5 THE FACEBOOK, INC., ) C-07-01389-JW ) 6 PLAINTIFF, ) JUNE 23, 2008 ) UNSEALED AND REDACTED BY 7 V. ) SEALED ) THE COURT 8 CONNECTU, LLC, ET AL., ) PAGES 1-79 ) 9 DEFENDANTS. ) _______________________ ) 10 11 THE PROCEEDINGS WERE HELD BEFORE 12 THE HONORABLE UNITED STATES DISTRICT 13 JUDGE JAMES WARE 14 A P P E A R A N C E S: 15 FOR THE PLAINTIFF: ORRICK, HERRINGTON & SUTCLIFFE BY: I. NEEL CHATTERJEE 16 MONTE M.F. COOPER SUSAN D. RESLEY 17 1000 MARSH ROAD MENLO PARK, CALIFORNIA 94025 18 19 FOR THE DEFENDANTS: BOIES, SCHILLER & FLEXNER BY: DAVID A. BARRETT 20 EVAN ANDREW PARKE STEVEN C. HOLTZMAN 21 575 LEXINGTON AVENUE 7TH FLOOR 22 NEW YORK, NEW YORK 10022 23 (APPEARANCES CONTINUED ON THE NEXT PAGE.) 24 OFFICIAL COURT REPORTER: IRENE RODRIGUEZ, CSR, CRR 25 CERTIFICATE NUMBER 8074 1 U.S. COURT REPORTERS Dockets.Justia.com 1 A P P E A R A N C E S: (CONT'D) 2 3 FOR THE DEFENDANTS: FINNEGAN, HENDERSON, FARABOW, GARRETT & DUNNER 4 BY: SCOTT R. MOSKO JOHN F. HORNICK 5 STANFORD RESEARCH PARK 3300 HILLVIEW AVENUE 6 PALO ALTO, CALIFORNIA 94304 7 FENWICK & WEST BY: KALAMA LUI-KWAN 8 555 CALIFORNIA STREET 12TH FLOOR 9 SAN FRANCISCO, CALIFORNIA 94104 10 11 ALSO PRESENT: BLOOMBERG NEWS BY: JOEL ROSENBLATT 12 PIER 3 SUITE 101 13 SAN FRANCISCO, CALIFORNIA 94111 14 THE MERCURY NEWS 15 BY: CHRIS O'BRIEN SCOTT DUKE HARRIS 16 750 RIDDER PARK DRIVE SAN JOSE, CALIFORNIA 94190 17 18 THE RECORDER BY: ZUSHA ELINSON 19 10 UNITED NATIONS PLAZA SUITE 300 20 SAN FRANCISCO, CALIFORNIA 94102 21 CNET NEWS 22 BY: DECLAN MCCULLAGH 1935 CALVERT STREET, NW #1 23 WASHINGTON, DC 20009 24 25 2 U.S.
    [Show full text]
  • Digital Platform As a Double-Edged Sword: How to Interpret Cultural Flows in the Platform Era
    International Journal of Communication 11(2017), 3880–3898 1932–8036/20170005 Digital Platform as a Double-Edged Sword: How to Interpret Cultural Flows in the Platform Era DAL YONG JIN Simon Fraser University, Canada This article critically examines the main characteristics of cultural flows in the era of digital platforms. By focusing on the increasing role of digital platforms during the Korean Wave (referring to the rapid growth of local popular culture and its global penetration starting in the late 1990s), it first analyzes whether digital platforms as new outlets for popular culture have changed traditional notions of cultural flows—the forms of the export and import of popular culture mainly from Western countries to non-Western countries. Second, it maps out whether platform-driven cultural flows have resolved existing global imbalances in cultural flows. Third, it analyzes whether digital platforms themselves have intensified disparities between Western and non- Western countries. In other words, it interprets whether digital platforms have deepened asymmetrical power relations between a few Western countries (in particular, the United States) and non-Western countries. Keywords: digital platforms, cultural flows, globalization, social media, asymmetrical power relations Cultural flows have been some of the most significant issues in globalization and media studies since the early 20th century. From television programs to films, and from popular music to video games, cultural flows as a form of the export and import of cultural materials have been increasing. Global fans of popular culture used to enjoy films, television programs, and music by either purchasing DVDs and CDs or watching them on traditional media, including television and on the big screen.
    [Show full text]
  • Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook
    University of Pennsylvania ScholarlyCommons Marketing Papers Wharton Faculty Research 1-2018 Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook Dokyun Lee Kartik Hosanagar University of Pennsylvania Harikesh Nair Follow this and additional works at: https://repository.upenn.edu/marketing_papers Part of the Advertising and Promotion Management Commons, Business Administration, Management, and Operations Commons, Business Analytics Commons, Business and Corporate Communications Commons, Communication Technology and New Media Commons, Marketing Commons, Mass Communication Commons, Social Media Commons, and the Technology and Innovation Commons Recommended Citation Lee, D., Hosanagar, K., & Nair, H. (2018). Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook. Management Science, http://dx.doi.org/10.1287/mnsc.2017.2902 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/marketing_papers/339 For more information, please contact [email protected]. Advertising Content and Consumer Engagement on Social Media: Evidence from Facebook Abstract We describe the effect of social media advertising content on customer engagement using data from Facebook. We content-code 106,316 Facebook messages across 782 companies, using a combination of Amazon Mechanical Turk and natural language processing algorithms. We use this data set to study the association of various kinds of social media marketing content with user engagement—defined as Likes, comments, shares, and click-throughs—with the messages. We find that inclusion of widely used content related to brand personality—like humor and emotion—is associated with higher levels of consumer engagement (Likes, comments, shares) with a message. We find that directly informative content—like mentions of price and deals—is associated with lower levels of engagement when included in messages in isolation, but higher engagement levels when provided in combination with brand personality–related attributes.
    [Show full text]
  • Social Network
    DEADLINE.com FROM THE BLACK WE HEAR-- MARK (V.O.) Did you know there are more people with genius IQ’s living in China than there are people of any kind living in the United States? ERICA (V.O.) That can’t possibly be true. MARK (V.O.) It is. ERICA (V.O.) What would account for that? MARK (V.O.) Well, first, an awful lot of people live in China. But here’s my question: FADE IN: INT. CAMPUS BAR - NIGHT MARK ZUCKERBERG is a sweet looking 19 year old whose lack of any physically intimidating attributes masks a very complicated and dangerous anger. He has trouble making eye contact and sometimes it’s hard to tell if he’s talking to you or to himself. ERICA, also 19, is Mark’s date. She has a girl-next-door face that makes her easy to fall for. At this point in the conversation she already knows that she’d rather not be there and her politeness is about to be tested. The scene is stark and simple. MARK How do you distinguish yourself in a population of people who all got 1600 on theirDEADLINE.com SAT’s? ERICA I didn’t know they take SAT’s in China. MARK They don’t. I wasn’t talking about China anymore, I was talking about me. ERICA You got 1600? MARK Yes. I could sing in an a Capella group, but I can’t sing. 2. ERICA Does that mean you actually got nothing wrong? MARK I can row crew or invent a 25 dollar PC.
    [Show full text]
  • La Protección De La Intimidad Y Vida Privada En Internet La Integridad
    XIX Edición del Premio Protección de Datos Personales de Investigación de la Agencia Española de Protección de Datos PREMIO 2015 Las redes sociales se han convertido en una herramienta de comu- nicación y contacto habitual para millones de personas en todo el La protección de la intimidad mundo. De hecho, se calcula que más de un 75% de las personas Amaya Noain Sánchez que se conectan habitualmente a Internet cuentan con al menos un y vida privada en internet: la perfil en una red social. La autora plantea en el texto si las empre- sas propietarias de estos servicios ofrecen una información sufi- integridad contextual y los flujos de ciente a los usuarios sobre qué datos recogen, para qué los van a información en las redes sociales utilizar y si van a ser cedidos a terceros. En una reflexión posterior, propone como posibles soluciones el hecho de que estas empresas (2004-2014) pudieran implantar directrices técnicas compartidas y una adapta- ción normativa, fundamentalmente con la privacidad desde el di- seño, la privacidad por defecto y el consentimiento informado. Así, Amaya Noain Sánchez el resultado sería un sistema de información por capas, en el que el usuario fuera conociendo gradualmente las condiciones del trata- miento de su información personal. Este libro explica el funcionamiento de una red social, comenzan- do por la creación del perfil de usuario en el que se suministran datos, y analiza cómo la estructura del negocio está basada en la monetización de los datos personales, con sistemas como el targe- ting (catalogando al usuario según sus intereses, características y predilecciones) y el tracking down (cruzando información dentro y fuera de la red).
    [Show full text]
  • About-Asana.Pdf
    About Asana Asana is a leading work management platform that helps teams orchestrate their work, from daily tasks to strategic initiatives. Asana ​adds structure to unstructured work, creating clarity, transparency and accountability to everyone within an organization—individuals, team leads and executives—so they understand exactly who is doing what, by when. Our co-founders started Asana because they experienced firsthand the growing problem of work about work, or internal coordination. Instead of spending time on work that generated results, they were spending time in status meetings and long email threads trying to figure out who was doing what. They recognized this pain was universal to teams that need to coordinate their work effectively to achieve their objectives. As a result of that frustration, they were inspired to create Asana to solve this problem for the world’s teams. Leadership Team ​https://asana.com/leadership ● Dustin Moskovitz, Co-Founder and CEO ● Anna Binder, Head of People Operations ● Chris Farinacci, Head of Business ● Alex Hood, Head of Product ● Oliver Jay, Head of Sales & Customer Success ● Dave King, Head of Marketing ● Eleanor Lacey, General Counsel ● Prashant Pandey, Head of Engineering ● Tim Wan, Head of Finance Board of Directors ● Sydney Carey, CFO, Sumologic ● Matt Cohler, General Partner, Benchmark Capital ● Adam D’Angelo, CEO, Quora ● Dustin Moskovitz, CEO, Asana ● Lorrie Norrington, Operating Partner, Lead Edge Capital ● Anne Raimondi, Chief Customer Officer, Guru ● Justin Rosenstein, Board Member
    [Show full text]
  • Deepfakes and Cheap Fakes
    DEEPFAKES AND CHEAP FAKES THE MANIPULATION OF AUDIO AND VISUAL EVIDENCE Britt Paris Joan Donovan DEEPFAKES AND CHEAP FAKES - 1 - CONTENTS 02 Executive Summary 05 Introduction 10 Cheap Fakes/Deepfakes: A Spectrum 17 The Politics of Evidence 23 Cheap Fakes on Social Media 25 Photoshopping 27 Lookalikes 28 Recontextualizing 30 Speeding and Slowing 33 Deepfakes Present and Future 35 Virtual Performances 35 Face Swapping 38 Lip-synching and Voice Synthesis 40 Conclusion 47 Acknowledgments Author: Britt Paris, assistant professor of Library and Information Science, Rutgers University; PhD, 2018,Information Studies, University of California, Los Angeles. Author: Joan Donovan, director of the Technology and Social Change Research Project, Harvard Kennedy School; PhD, 2015, Sociology and Science Studies, University of California San Diego. This report is published under Data & Society’s Media Manipulation research initiative; for more information on the initiative, including focus areas, researchers, and funders, please visit https://datasociety.net/research/ media-manipulation DATA & SOCIETY - 2 - EXECUTIVE SUMMARY Do deepfakes signal an information apocalypse? Are they the end of evidence as we know it? The answers to these questions require us to understand what is truly new about contemporary AV manipulation and what is simply an old struggle for power in a new guise. The first widely-known examples of amateur, AI-manipulated, face swap videos appeared in November 2017. Since then, the news media, and therefore the general public, have begun to use the term “deepfakes” to refer to this larger genre of videos—videos that use some form of deep or machine learning to hybridize or generate human bodies and faces.
    [Show full text]
  • Content Social Media
    content & social media CONTENT & SOCIAL MEDIA / 1 Introduction A couple of years ago, people were more insistent on keeping content marketing and social media marketing divided as clearly separate entities. However, as social media platforms have evolved and the ways in which brands communicate have changed to reflect such changes, the concepts of content vs social have started to blur. Ultimately, it doesn’t really matter if you’re writing a blog or you’re writing a social media post - both are content and both have the potential of helping you generate traffic, leads and sales. In the realm of social media, content is simply approached in a different way. You’re not writing an 800-word blog (at least not typically), rather you’re publishing shorter, easier- to-digest posts. Some may be text, others may be photos or videos, some may be a combination of these types. Depending on the platform, the kind of content you can craft also changes drastically. A simple example is Twitter’s restrictive 140-character limit per tweet - a parameter that essentially makes it a social microblog. CONTENT & SOCIAL MEDIA / 2 In this eBook, we will be looking at some of the most important points to remember when it comes to creating content on social media. These include: • IDENTIFYING AND UNDERSTANDING THE QUIRKS OF DIFFERENT SOCIAL MEDIA PLATFORMS - Facebook - Twitter - LinkedIn - Instagram - Google+ • CONSIDERING YOUR CONTENT - Text posts - Media / Photos & Videos - External links • THE IMPORTANCE OF CONSISTENCY CONTENT & SOCIAL MEDIA / 3 understanding thE Quirks of your social media platform Here’s a list of just some of the SOCIAL MEDIA PLATFORMS out there: Facebook Tumblr Twitter Snapchat LinkedIn Pinterest Instagram Myspace (yes, it still exists) Vine YouTube Google+ And potentially hundreds of other, smaller and lesser-known social networks The number is overwhelming, but the good news is that you can cut this list down to some of its key players.
    [Show full text]
  • Facebook Timeline
    Facebook Timeline 2003 October • Mark Zuckerberg releases Facemash, the predecessor to Facebook. It was described as a Harvard University version of Hot or Not. 2004 January • Zuckerberg begins writing Facebook. • Zuckerberg registers thefacebook.com domain. February • Zuckerberg launches Facebook on February 4. 650 Harvard students joined thefacebook.com in the first week of launch. March • Facebook expands to MIT, Boston University, Boston College, Northeastern University, Stanford University, Dartmouth College, Columbia University, and Yale University. April • Zuckerberg, Dustin Moskovitz, and Eduardo Saverin form Thefacebook.com LLC, a partnership. June • Facebook receives its first investment from PayPal co-founder Peter Thiel for US$500,000. • Facebook incorporates into a new company, and Napster co-founder Sean Parker becomes its president. • Facebook moves its base of operations to Palo Alto, California. N. Lee, Facebook Nation, DOI: 10.1007/978-1-4614-5308-6, 211 Ó Springer Science+Business Media New York 2013 212 Facebook Timeline August • To compete with growing campus-only service i2hub, Zuckerberg launches Wirehog. It is a precursor to Facebook Platform applications. September • ConnectU files a lawsuit against Zuckerberg and other Facebook founders, resulting in a $65 million settlement. October • Maurice Werdegar of WTI Partner provides Facebook a $300,000 three-year credit line. December • Facebook achieves its one millionth registered user. 2005 February • Maurice Werdegar of WTI Partner provides Facebook a second $300,000 credit line and a $25,000 equity investment. April • Venture capital firm Accel Partners invests $12.7 million into Facebook. Accel’s partner and President Jim Breyer also puts up $1 million of his own money.
    [Show full text]
  • Estimating Age and Gender in Instagram Using Face Recognition: Advantages, Bias and Issues. / Diego Couto De Las Casas
    ESTIMATING AGE AND GENDER IN INSTAGRAM USING FACE RECOGNITION: ADVANTAGES, BIAS AND ISSUES. DIEGO COUTO DE. LAS CASAS ESTIMATING AGE AND GENDER IN INSTAGRAM USING FACE RECOGNITION: ADVANTAGES, BIAS AND ISSUES. Dissertação apresentada ao Programa de Pós-Graduação em Ciência da Computação do Instituto de Ciências Exatas da Univer- sidade Federal de Minas Gerais – Depar- tamento de Ciência da Computação como requisito parcial para a obtenção do grau de Mestre em Ciência da Computação. Orientador: Virgílio Augusto Fernandes de Almeida Belo Horizonte Fevereiro de 2016 DIEGO COUTO DE. LAS CASAS ESTIMATING AGE AND GENDER IN INSTAGRAM USING FACE RECOGNITION: ADVANTAGES, BIAS AND ISSUES. Dissertation presented to the Graduate Program in Ciência da Computação of the Universidade Federal de Minas Gerais – De- partamento de Ciência da Computação in partial fulfillment of the requirements for the degree of Master in Ciência da Com- putação. Advisor: Virgílio Augusto Fernandes de Almeida Belo Horizonte February 2016 © 2016, Diego Couto de Las Casas. Todos os direitos reservados Ficha catalográfica elaborada pela Biblioteca do ICEx - UFMG Las Casas, Diego Couto de. L337e Estimating age and gender in Instagram using face recognition: advantages, bias and issues. / Diego Couto de Las Casas. – Belo Horizonte, 2016. xx, 80 f. : il.; 29 cm. Dissertação (mestrado) - Universidade Federal de Minas Gerais – Departamento de Ciência da Computação. Orientador: Virgílio Augusto Fernandes de Almeida. 1. Computação - Teses. 2. Redes sociais on-line. 3. Computação social. 4. Instagram. I. Orientador. II. Título. CDU 519.6*04(043) Acknowledgments Gostaria de agradecer a todos que me fizeram chegar até aqui. Àminhafamília,pelosconselhos,pitacoseportodoosuporteaolongodesses anos. Aos meus colegas do CAMPS(-Élysées),pelascolaborações,pelasrisadasepelo companheirismo.
    [Show full text]
  • Artificial Intelligence: Risks to Privacy and Democracy
    Artificial Intelligence: Risks to Privacy and Democracy Karl Manheim* and Lyric Kaplan** 21 Yale J.L. & Tech. 106 (2019) A “Democracy Index” is published annually by the Economist. For 2017, it reported that half of the world’s countries scored lower than the previous year. This included the United States, which was de- moted from “full democracy” to “flawed democracy.” The princi- pal factor was “erosion of confidence in government and public in- stitutions.” Interference by Russia and voter manipulation by Cam- bridge Analytica in the 2016 presidential election played a large part in that public disaffection. Threats of these kinds will continue, fueled by growing deployment of artificial intelligence (AI) tools to manipulate the preconditions and levers of democracy. Equally destructive is AI’s threat to deci- sional and informational privacy. AI is the engine behind Big Data Analytics and the Internet of Things. While conferring some con- sumer benefit, their principal function at present is to capture per- sonal information, create detailed behavioral profiles and sell us goods and agendas. Privacy, anonymity and autonomy are the main casualties of AI’s ability to manipulate choices in economic and po- litical decisions. The way forward requires greater attention to these risks at the na- tional level, and attendant regulation. In its absence, technology gi- ants, all of whom are heavily investing in and profiting from AI, will dominate not only the public discourse, but also the future of our core values and democratic institutions. * Professor of Law, Loyola Law School, Los Angeles. This article was inspired by a lecture given in April 2018 at Kansai University, Osaka, Japan.
    [Show full text]