Home » social media (Page 12)

Category Archives: social media

Digital Culture Links: October 3rd 2011

Links for September 27th 2011 through October 3rd 2011:

  • How Social Networking Is Reviving Communal TV Viewing [The Next Web] – Real-time TV viewing is on the rise once more thanks to cleverly design related apps and strategic use of related #hashtags: “There are some signs that TV’s re-engaging its most coveted viewers. According to Nielsen, tech-savvy 12-24 year-olds are more connected and therefore more adept at using mobile devices to watch shows. This doesn’t bode well for the networks or for advertisers since, sometimes, the ads can be skipped. However, by turning TV programming into a true two-screen experience, it changes the equation. It makes the live experience more valuable, especially for the younger set. The data show that 18-34 year-olds are the most active demographic on social networks.”
  • Facebook sued over claims it tracks users’ activity [The Age] – “Facebook is being sued by a group of users over claims it tracks their online activity after they log off. […] On Friday, 10 public interest groups asked the US Federal Trade Commission to investigate Facebook’s tracking of internet users after they log off. They urged the commission to examine whether Facebook’s new ticker and timeline features increased privacy risks for users by combining biographical information in an easily accessible format. The lawsuit – filed by Perrin Aikens Davis, of Illinois – seeks class status on behalf of other Facebook users in the US. Davis seeks unspecified damages and a court order blocking the tracking based on violations of federal laws, including restrictions on wiretapping, as well as computer fraud and abuse statutes.”
  • Peers, review your actions [Times Higher Education ] – Interesting proposition: academics should boycott doing peer review (for free) for journals which aren’t open access (ie charge a lot to be viewed).
  • Princeton goes open access to stop staff handing all copyright to journals – unless waiver granted [The Conversation] – Princeton University policy prevents their academics from publishing in journals which demand full copyright over their work (unless explicit permission is sought from the institution). A bold move to try and reign in the big copyright holders and publishers who currently have a strangle-hold over a great deal of academic work!
  • BBC iPlayer launches on iPad in Australia [TV Tonight] – The BBC iPlayer comes to Australia, for a fee. For $10 a month you can access more than 1000 hours of BBC archives (at launch, growing regularly) but NOT current TV shows. In part this is probably due to existing contracts with local networks (why would the ABC bother to screen Doctor Who if it was available via iPlayer before broadcast), but this really doesn’t then address the problem of the tyranny of digital distance. This is a clever commercial move, but is unlikely to address the issue of unauthroised downloading of UK TV shows in Australia.
  • A New Flavor…Still Delicious [AVOS] – AVOS launch the re-imagined Delicious. Being a long-term Delicious user, I’ve got to admit I find the new version a bit confronting, especially the changes to tag clouds and so forth. And I really don’t want “stacks” – that’s what something like Pinterest is for (and I don’t use that much, either). However, I’m delighted Delicious lives on, so I’ll give it a go!

The Ends of Online Identity?

In just over a week I hop on the first of three planes and head to Seattle for Internet Research 12. I’m looking forward to seeing many colleagues I rarely get to see in the flesh, and indeed adding flesh to many folks who I only really know as Twitter or Facebook profile pictures.

The paper I’m presenting is called “The Ends of Online Identity” and is the first step in a larger research project which looks at online identities before or after they are really owned by the person to which they refer. Indeed, the many varied responses to Facebook’s upcoming shift to the new Timeline which replace profiles with a curated historical story fits in perfectly with the terrain I’m exploring, which focuses on what happens to identity online when other people are responsible for shaping it (such as parents, before someone is old enough to really manage their online self, or post-mortem when someone’s profiles and digital shadow become the memorialised self).  The project itself is only in the initial stages and this paper is more about establishing the parameters and scoping out the field, but I think there’s enough in there to make it an interesting conversation.

For those of you who might be interested, here’s the abstract:

The Ends of Online Identity?

FB_BornWhile the early years of online interaction were often framed by notions of identity play, anonymity, pseudonymity and multiplicity, the last five years have seen many of these playful boundaries collapsing with online and offline identity no longer presumed to be easily separable. The dominance of Facebook as the social networking service, and their firm insistence on ‘real’ names and identities has been one of the clearest causes and indicators of this shift. However, once online and offline identity are more firmly attached to real names, an individual’s web presence becomes harder and harder to escape. Moreover, while notions like ‘Identity 2.0’ (Helmond, 2010), ‘the networked self’ (Papacharissi, 2010) and others tend to emphasise at least some degree of agency, the persistence of digital information and the permanence of names suggests it is timely to revisit the ends of identity where the agency of the named individual is less, if at all, applicable.

At one end, identity fragments can be created even before an individual is born, from Facebook updates, blogs and photos detailing attempts to get pregnant, through to ultrasounds images and the like. Early childhood too, can often be documented online by parents who embrace every recording technology possible, both capturing and often sharing online every smile, every outfit and all those initial milestones of development. While most parents consider some degree of security when posting information about children, many of these digital traces persist and can often be easily (re-)attached to the children in question later in life. This initial digital contextualisation and the power of parents and others to ‘set up’ the initial web presence of individuals before they are active participants online deserves greater attention. Victor Mayer-Schonberger (2009), for example, has proposed that information online, including social information, should come with an expiry date, after which digital identity fragments are automatically erased. While an admirable strategy, implementation of such a proposal in a widespread enough manner to be useful would be very challenging.

At the other end of identity, the question of what happens to our digital selves when we die is also increasingly important. While our corporeal forms are subject to entropy and decay, the same is not necessarily true of online identities. From blog posts and social networking profiles to photographs and more personal files, the need to ‘do something’ with digital identity fragments is increasingly pressing. In some instances the keys to digital identities (our passwords) are being left in wills as part of individuals’ estates, but far more often this question is left unasked until an individual has died. Facebook, for example, had to institute the possibility to allow family members to memorialise or delete the Facebook profiles of deceased loved ones after many people reported Facebook suggesting they ‘reconnected’ with recently deceased relatives and friends.

FB_LostALovedOneThis paper will outline some initial ways that our ‘ends of identity’ might be conceptualised, including a brief review of current approaches, with the intention of outlining an emerging research project which examines the impact of digital identity creation which is not readily controlled by the individual whose identity is being created or transformed.

References

Helmond, A. (2010). Identity 2.0: Constructing identity with cultural software. www.annehelmond.nl , PDF: http://www.annehelmond.nl/wordpress/wp-content/uploads//2010/01/helmond_identity20_dmiconference.pdf.

Mayer-Schonberger, V. (2009). Delete: The Virtue of Forgetting in the Digital Age . Princeton University Press.

Papacharissi, Z. (Ed.). (2010). A Networked Self: Identity, Community, and Culture on Social Network Sites . Routledge.

My presentation is part of a four-paper panel entitled “Coherency, Authenticity, Plurality and the Trace” which also features papers by Erika Pearson / @erikapearson (University of Otago), Stephanie Tuszynski (Bethany College) and Brady Robards / @bradyjay (Griffith University). Our panel is currently scheduled for Tuesday, 11/Oct/2011: 4:00pm – 5:30pm in “South” if you’ll be at IR12. I hope to post the slides before our panel session and, if I get the chance, I’ll try and capture the audio and post it some time shortly thereafter.

Any comments, thoughts or questions are most welcome! 🙂

Digital Culture Links: August 30th 2011

Links for August 25th 2011 through August 30th 2011:

  • Academic publishers make Murdoch look like a socialist [The Guardian] – George Monbiot looks at the monopolistic world of academic publishing and finds a world where profits are soaring while the broader media landscape around them is crumbling. On the ethical side, the important question: should publicly funded reseach end up in journals that cost $20+ an article to read if you’re not attached to a university? Open access might be one answer to the problem!
  • Teen hacks ex-mate’s Facebook [Toowoomba Chronicle] – “Bad blood between former teenage mates had driven one to hack into the other’s Facebook page and leave a posting that he was gay and wanted to come out of the closet, Toowoomba Magistrates Court heard yesterday. […] Woodside then hacked into the victim’s Facebook page and posted that the victim was gay and wanted to “come out of the closet”, a posting which anyone accessing the page could have read, the court heard.”
  • “Does This Technology Serve Human Purposes?”: A “Necessary Conversation” with Sherry Turkle (Part Three) [Confessions of an Aca/Fan: Archives] – Sherry Turkle interviewed by Henry Jenkins, clarifying many important points from Alone Together: “My earlier enthusiasm for identity play on the Internet, […] relied heavily on the work of psychologist and psychoanalyst Erik Erikson. Erikson wrote about the developmental need for a moratorium or “time out” during adolescence, a kind of play space in which one had a chance to experiment with identity. In the mid-1990s, I wrote about the Internet as a space where anonymity was possible and where one could experiment with aspects of self in a safe environment. Today, adolescents grow up with a sense of wearing their online selves on their backs “like a turtle” for the rest of their lives. The internet is forever. And anonymity on the Internet seems a dream of another century, another technology.” [Part 1] [Part 2]
  • Apple cancels iTunes TV rentals [GigaOM] – “Despite its role as a major selling point of the revamped Apple TV last fall, Apple has done away with TV show rentals. Several bloggers noticed the option to rent individual episodes missing from iTunes and Apple TV Friday, and Apple later confirmed the decision was based on lack of interest. “iTunes customers have shown they overwhelmingly prefer buying TV shows,” Apple spokesman Tom Neumayr told AllThingsD Friday. “iTunes in the Cloud lets customers download and watch their past TV purchases from their iOS devices, Apple TV, Mac or PC allowing them to enjoy their programming whenever and however they choose.” Very few TV studios were on board with the idea in the first place–only Fox and ABC–so this isn’t a huge change. But now the only option in iTunes when it comes to TV shows is to buy. You can buy a full season or “Season Pass,” or if you want to cherry pick a season, you can still buy individual episodes.”
  • Case History Of A Wikipedia Page: Nabokov’s ‘Lolita’ [The Awl] – Fascinating: “Entries such as the one on Lolita demonstrate why perfection on Wikipedia remains an “unattainable” goal—when the topic is contentious, perfection will always butt heads against “is completely neutral and unbiased.” One man’s undeniable literary masterpiece is another man’s abominable pedophilic trash, and they’re both editors on Wikipedia. The edits to the Lolita page (and any Wikipedia page) can seem tedious and petty, and many of them are. But the users’ vigilance in keeping some words and changing others, and debating over content and style, does have a purpose: it keeps critical thinking alive and well. The writing, editing, rewriting and re-editing process of a Wikipedia page creates a new entity—the Lolita Wikipedia page, which is not Nabokov’s Lolita, but a work in its own right. In the collaborative editing process, any reader can use the Lolita page to challenge its meaning. In fact, he can reach right in and edit it himself, until someone else edits it again.”

Digital Culture Links: August 25th 2011

Links for August 16th 2011 through August 25th 2011:

  • OK Go and The Muppets – Muppet Show Theme Song [YouTube] – OK Go and the Muppets, doing The Muppets Theme. I’m pretty sure this is what teh interwebz were built for! (Also, the new Muppets: The Green Album looks great [iTunes link]).
  • Compare the new CGI Yoda from the Blu-Ray Star Wars Episode One with the original puppet [io9] – George Lucas goes back to Star Wars Episode 1 (The Phantom Menace) and replaces the scenes of Yoda that still used some puppetry with completely CGI ones. I guess Lucas is now fully postmodern: there is no original.
  • Samsung uses 2001: A Space Odyssey as prior art in Apple’s iPad lawsuit [io9] – “Did Apple invent the iPad? Or did Stanley Kubrick and Arthur C. Clarke? Samsung is using the above clip as a piece of evidence in its defense against Apple’s patent lawsuit over the Galaxy S and similar tablet computers. Samsung notes that “the tablet disclosed in the clip has an overall rectangular shape with a dominant display screen, narrow borders, a predominately flat front surface, a flat back surface (which is evident because the tablets are lying flat on the table’s surface), and a thin form factor.” You don’t actually see the actor interacting with the tablet’s user interface, but plenty of other science fiction movies and TV shows have depicted tablets, including Star Trek’s PADD.”
  • Copyright: Forever Less One Day – YouTube – Concise, clear and well-argued video decrying the current length (and beneficiaries) of copyright law.
  • On Pseudonymity, Privacy and Responsibility on Google+ [TechnoSocial] – Superb post by Kee Hinckley looking at the many challenges and issues raised by the ‘nymwars’ (Google+ forcing users to have ‘real names’, not pseudonyms).
  • Youth in the dark about sexting [ABC News (Australian Broadcasting Corporation)] – “Australia’s leading cyber-safety expert has told a women and policing conference young people do not understand the consequences of sending sexually explicit images via mobile phones. […] Susan McLean from Cyber Safety Solutions Victoria says many people under 18 do not realise taking and sending sexual images of themselves can be child pornography. […] Ms McLean is calling for child pornography law reform to address the growing number of young people exchanging sexual photos. She says while some people under 18 send explicit pictures through coercion, others are just expressing themselves and child pornography laws are not designed for that. […] “What I think we need to look at is the consensual sexting if you like, the image that might go from A to B and no further. Should these people be charged with manufacturing child pornography and should they risk being placed on the sex offenders register and of course the answer is no.””
  • Fox’s 8-Day Delay on Hulu Triggers Piracy Surge [TorrentFreak] – Despite having had streaming versions of man of their shows legally available online immediately after broadcast via Hulu and their own websites, Fox in the US have now added a 7-day delay to all streaming releases (ostensibly to drive viewers back to scheduled TV). And the result of increasing the tyranny of digital distance? More TV show piracy: “Over the last week TorrentFreak tracked two Fox shows on BitTorrent to see if there was an upturn in the number of downloads compared to the previous weeks, and the results are as expected. For both Gordon Ramsay’s Hell’s Kitchen and MasterChef the download numbers have surged. During the first 5 days, the number of downloads from the U.S. for the latest episode of Hell’s Kitchen increased by 114% compared to the previous 3 episodes. For MasterChef the upturn was even higher with 189% more downloads from the U.S. For MasterChef; the extra high demand may in part have been facilitated by the fact that it was the season finale.”
  • Facebook tribute site for Ayen Chol ruined by racists [Courier Mail] – “Vulgar photographs and racist posts have ruined a Facebook tribute site dedicated to the little girl mauled to death by a dog last week. The State Government and police will try to erase the posts. The two pages have 35,000 followers, several of whom have contacted Crimestoppers. Some vile comments and images already have been removed. But others remain on the sites dedicated to four-year-old Ayen Chol. One post on a page described the pit bull-cross linked to the girl’s death last Wednesday as a legend. […] A Victoria Police spokeswoman said police would work with Facebook to try to have any offensive content removed. A Facebook spokeswoman said the site wanted to express its sympathies to Ayen’s family and friends.”
  • Inquiry ordered as law lags behind teen sexting [The Age] – The Victorian government will launch an inquiry into sexting to investigate whether the law needs an overhaul […] Victorian Attorney-General Robert Clark said sexting raised serious issues for victims and offenders and the law needed to catch up with changes in behaviour and technology […] The inquiry is to report back by mid-next year. In America, some states have changed their laws to decriminalise the consensual exchange of sexts between teenagers. But forwarding the pictures to others without permission remains an offence. In the cases of youths who were registered as sex offenders after sexting offences, Mr Clark said: ”The implications of the sex offender register are a key part of what we would expect the inquiry to look at. This seems to be an example of where the law can apply in a context which was not in mind at the time the law was enacted and which may well be having consequences that the community would not think were appropriate or intended.””
  • Warning: Those Facebook rants can get you sacked [News.com.au] – “Fair Work Australia has upheld the right of an employer to sack a worker over an expletive-filled Facebook rant against a manager that was posted out of hours on his home computer. In a case that highlights the hazy line between work and private lives, computer technician Damian O’Keefe was dismissed after posting on Facebook last year that he “wonders how the f *** work can be so f***ing useless and mess up my pay again. C***s are going down tomorrow.” Mr O’Keefe’s employer, a Townsville franchise of the retail electrical goods business, The Good Guys, believed the post constituted a threat to Kelly Taylor, an operations manager responsible for processing the pay of employees. […] The tribunal’s deputy president, Deidre Swan, said “common sense would dictate” that a worker could not publish insulting and threatening comments about another employee. “The fact that the comments were made on the applicant’s home computer, out of work hours, does not make any difference,” she said.”
  • England riots: pair jailed for four years for using Facebook to incite disorder [guardian.co.uk] – “Two men have been jailed for four years for using Facebook to incite disorder. Jordan Blackshaw, 20, from Marston near Northwich, and Perry Sutcliffe-Keenan, 22, from Warrington, appeared at Chester crown court on Tuesday. They were arrested last week following incidents of violent disorder in London and other cities across the UK. Neither of their Facebook posts resulted in a riot-related event. During the sentencing, the recorder of Chester, Elgin Edwards, praised the swift actions of Cheshire police and said he hoped the sentences would act as a deterrent to others. Assistant Chief Constable Phil Thompson said: “If we cast our minds back just a few days to last week and recall the way in which technology was used to spread incitement and bring people together to commit acts of criminality, it is easy to understand the four year sentences that were handed down in court today.”
  • Study finds third of teachers have been bullied online [BBC News] – “More than a third of teachers have been subject to online abuse, according to a survey conducted by Plymouth University. The majority of the abuse – 72% – came via pupils but over a quarter was initiated by parents. The majority of teachers claiming online abuse were women. Much of the abuse is via chat on social networks but the study also found that many were setting up Facebook groups specifically to abuse teachers. In some cases, people posted videos of teachers in action on YouTube while others put abusive comments on ratemyteacher.com. In total, 35% of teachers questioned said they had been the victim of some form of online abuse. Of these, 60% were women.”

Digital Culture Links: August 15th 2011

Links for August 13th 2011 through August 15th 2011:

  • Google looks to ‘supercharge’ Android with Motorola Mobility [guardian.co.uk] – Wow, Google take their ball and head straight onto Apple’s turf (and Microsoft’s by way of Nokia): “Google is to acquire Motorola Mobility, the US mobile company’s smartphone business, in a $12.5bn (£7.6bn) cash deal. The takeover will boost Google’s increasing dominance in the nascent smartphone and tablet computer market. The $40 a share deal is a 63% premium on Motorola Mobility’s closing price on the New York Stock Exchange on Friday. Larry Page, Google chief executive, said: “Motorola Mobility’s total commitment to Android has created a natural fit for our two companies. Together, we will create amazing user experiences that supercharge the entire Android ecosystem for the benefit of consumers, partners and developers. I look forward to welcoming Motorolans to our family of Googlers.””
  • Schools employ company to monitor students online [ABC News (Australian Broadcasting Corporation)] – Inevitable, but deeply troubling: “Independent schools are using private companies to monitor what their students say and do online on sites such as Facebook. An internet monitoring company, SR7, says it is been employed by some private high schools around Australia to keep track of students’ social media activity. Privacy advocates have expressed concerns, but the “social media intelligence” company says its work will help prevent cyber bullying. S7R partner James Griffin says the company identifies and “attempts to stop” cyber bullying that is increasingly occurring on Facebook and another social media platform, Formspring. Mr Griffin says the increasing number of fake profiles is “striking”.”
  • “If you don’t like it, don’t use it. It’s that simple.” ORLY? [Social Media Collective] – Great post by Alice Marwick looking at the problems with the idea that you can simply stop using social media and other technologies due to issues or challenges they pose. Refuting (easy) opting out, or technology refusal, is important is showing how much people actually have to give up if they do opt out, and why it’s a decision many people can’t (or won’t) readily make.
  • Sexting punishment is unjust says magistrate [SMH] – “A senior Victorian magistrate who presided over a case in which a youth pleaded guilty to teenage sexting offences has condemned as ”so unjust” the mandatory laws that meant the young man was registered as a sex offender. The magistrate, who works in country Victoria, said the lack of judicial discretion in such cases meant severe consequences for young people who posed no threat to society and were often guilty of little more than naivety. The magistrate, who spoke on condition of anonymity, said he had made the unusual decision to speak out because he was troubled by cases recently identified by Fairfax. He presided over the case of the country youth, then aged 18, who was sent four uninvited text message pictures of girls, aged between 15 and 17 years, topless or in their underwear. Police found the pictures on his mobile phone and laptop and charged him with child pornography offences.”
  • Don’t shoot the instant messenger: David Cameron’s social media shutdown plan won’t stop UK riots [The Conversation] – Axel Bruns refutes the logic of social media control or blocking in times of crisis (regarding the UK riots): “David Cameron’s thought bubble (let’s be charitable and call it that) in the UK parliament on Thursday, in which he said it might be a good idea to shut down social networking services if there were to be a repeat of the riots that have rocked Britain, is one such moment. It is, to be blunt, just staggeringly dumb. Where do we even begin? Consider, for example, the fact that Cameron, along with just about all the other leaders of the Western world – you know, we who claim to believe in freedom of expression – lauded the role of social media in the “Arab spring” uprisings in Tunisia, Libya, Egypt, Yemen and elsewhere. But now he wants to shut Twitter and Facebook down, just because someone, somewhere might use them to plan criminal activities? You must be joking. By the same reasoning, why not take out the entire Internet and phone network as well?”
  • Panicked over social media, Mr. Cameron joins company of autocrats [The Globe and Mail] – “Eight months ago, as Egyptians flooded the streets of Cairo in protest, the government tried to stem the tide by cutting off access to Twitter and Facebook – social networks that had been so associated with democratic uprisings that labels such as “the Twitter Revolution” were being bandied about. On Wednesday, British Prime Minister David Cameron addressed the rioting that swept his country and declared that he was looking into blocking unspecified troublemakers’ access to Twitter and another network, BlackBerry Messenger. With the speed of a looter on the make, social networks have gone from heroes of the Arab Spring to the newly-anointed villains of the British riots. One day, implement of utopia; the next, yob’s best friend. Throwing his digital lot in with Hosni Mubarak is hardly a flattering comparison for Mr. Cameron. But his choice of target reflects a very real public unease with the way social networks seem to inspire people to action.”
  • London riot social media blocks ‘totalitarian’ [The Age] – “Social media and legal experts have ridiculed a proposal by British Prime Minister David Cameron to restrict the use of services like Facebook, Twitter and BlackBerry Messenger to prevent riots. The services were used by rioters to organise looting and vandalism across London and beyond, prompting Cameron to demand the companies take more responsibility for content posted on their networks. Home secretary Theresa May is due to hold meetings with Facebook, Twitter and BlackBerry-maker Research in Motion this week. But social media experts and free speech campaigners have rejected the idea, saying it is an impractical knee-jerk response that is akin to moves by Arab rulers to block online communications during this year’s pro-democracy uprisings.”

Digital Culture Links: August 10th 2011

Links for August 6th 2011 through August 10th 2011:

  • Gamification is Bullshit [Ian Bogost] – Bogost gets straight to the point: “In his short treatise On Bullshit, the moral philosopher Harry Frankfurt gives us a useful theory of bullshit. We normally think of bullshit as a synonym—albeit a somewhat vulgar one—for lies or deceit. But Frankfurt argues that bullshit has nothing to do with truth. Rather, bullshit is used to conceal, to impress or to coerce. Unlike liars, bullshitters have no use for the truth. All that matters to them is hiding their ignorance or bringing about their own benefit. Gamification is bullshit. I’m not being flip or glib or provocative. I’m speaking philosophically. More specifically, gamification is marketing bullshit, invented by consultants as a means to capture the wild, coveted beast that is videogames and to domesticate it for use in the grey, hopeless wasteland of big business, where bullshit already reigns anyway.”
  • London Police Use Flickr to Identify Looters [NYTimes.com] – “As rioting continues to roil the streets of London, local police forces are turning to the Web to help unmask those involved in the torching and looting. On Tuesday, the Metropolitan Police of London posted a set of photos on Flickr showing people they believed to be participants in the riots. Right now the images are primarily from the Croydon and West Norwood neighborhoods in south London, although the site says that more will be posted soon. With the initiative, called Operation Withern, the police are asking the public to identify anyone they recognize from photographs captured by CCTV surveillance cameras in areas where stores were looted. They say on the Flickr page that they hope to “bring to justice those who have committed violent and criminal acts.””
  • Real name sites are necessarily inadequate for free speech [Bernie Hogan] – Important take on real names: “Offline people say things appropriate to the group they are in. That doesn’t mean they are two-faced, insincere or liars. It means people are context aware. People observe walls, clocks, furniture, fashion and music. These things guide us as to the appropriate way of acting. The guy writing his novel at the bar on Friday night is out-of-place. The guy who shows up to work drunk on Monday morning has a problem. Offline people don’t have to worry about their real name, because their behavior is tied to the context and the impressions the foster in that context. In fact, I’ll say that even more strongly – if your speech is not confined to the context you are in – but available to a potentially unknowable audience – you are online. This is why real name sites are necessarily inadequate. They deny individuals the right to be context-specific. They turn the performance of impression management into the process of curation.”
  • How Blackberry, not Twitter, fuelled the fire under London’s riots [Tech Crunch] – All ‘social media caused it’ reports are exaggerated, but it is noteworthy that Blackberries are popular for communication in this context specificially because they are encrupted and not open: “Over the weekend parts of London descended into chaos as riots and looting spread after a protest organised around the yet unexplained shooting of a man by Police. Of course, there was huge amounts of chatter on social networks like Facebook and Twitter, with the latter coming under enormous amounts of criticism from the UK press for fuelling the fire. But while Twitter has largely been the venue of spectators to violence and is a handy public venue for journalists to observe, it would appear the non-public BlackBerry BBM messaging network has been the method of choice for organising it.”
  • Facebook’s Photo Archive Can Be Used for Face Recognition in Real Life – “Facebook has had its share of problems over face recognition — a feature that connects a photo of a person’s face with their Facebook profile, making it easier to tag people in photos — but researchers from Heinz College, Carnegie Mellon University recently proved that Facebook’s vast photo archive can be used to identify people on the street, too. […] They used publicly available data — photos from Facebook profiles of students — and then used face recognition technology to recognize these students as they look into a web camera. The results? Using a database of 25,000 photos taken from Facebook profiles, the authors’ face recognition software correctly identified 31 percent of the students after fewer than three (on average) quick comparisons. In another test, the authors took photos from 277,978 Facebook profiles and compared them to nearly 6,000 profiles from an unnamed dating Web site, managing to identify approximately 10 percent of the site’s members.”

Archives

Categories