SlideShare une entreprise Scribd logo
1  sur  103
Télécharger pour lire hors ligne
Week Four
Hanging OutHanging Out
1. Getting Together and Being Together – socializing
on line and off for identity construction – it is often
online first to set up getting together.
a) Sharing, Posting, Linking, and Forwarding
b) Music first, then videos – youtube watched offline together
2. Hanging out through back channels – text,
Facebook, Myspace, blogs..under no special
control from home or school.
Messing AroundMessing Around
• More intense engagement – looking around,
“lurking” – chat roulette
““Messing Around”Messing Around”
• Experimental play – photo-tools, media
creation, techie monitoring (e.g. free ringtone
creation)
• Messing around involves a more open-ended
genre of participation
““Geeking Out”Geeking Out”
• Intense commitment or engagement with media or technology, often one
particular media property, genre, or a type of technology
• involves learning to navigate esoteric domains of knowledge and practice and
being able to participate in communities that traffic in these forms of expertise.
Blogs, remizes, games, podscasts
• Participate in closed IRC groups or specialized forums rather than general fan
discussion forums, which they see as catering to less knowledgeable fans. –Second
Life
• Rewriting the rules - code hacking, creating and exploiting cheats, and making
derivative works such as machinima (real time animated movie techniques – using
game engines) and game modifications – Limewire – avoiding copyright rules
Why Does it Matter?Why Does it Matter?
understanding the new digital
generationThe following video and slides are my edited remix of Michael Wesch’s
presentation done on Slideshare.com and YouTube. Dr. Wesch is a pioneer in
social media education and was recently named Professor of the Year
Week 3 summer hum 140  - hanging out and messing around
“What we are encountering is a
panicky, an almost hysterical,
attempt to escape from the
deadly anonymity of modern
life ... and the prime cause is
not vanity ... but the craving of
people who feel their
personality sinking lower and
lower into the whirl of
indistinguishable atoms to be
lost in a mass civilization."
“What we are encountering is a
panicky, an almost hysterical,
attempt to escape from the
deadly anonymity of modern
life ... and the prime cause is
not vanity ... but the craving of
people who feel their
personality sinking lower and
lower into the whirl of
indistinguishable atoms to be
lost in a mass civilization."
- Henry Seidel Canby 1926
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
It's a one-wayIt's a one-way
conversationconversation
You have to be on TVYou have to be on TV
to have a voiceto have a voice
You have to be on TVYou have to be on TV
to be significantto be significant
Week 3 summer hum 140  - hanging out and messing around
The MTV Generation
•Short attention spans
•Materialistic
•Narcissistic
•Not easily impressed
Week 3 summer hum 140  - hanging out and messing around
“in the midst of a fabulous array of
historically unprecedented and
utterly mind-boggling stimuli ...
the search for identity and recognitionthe search for identity and recognition
the search for the authentic selfthe search for the authentic self
the search for the authentic selfthe search for the authentic self
Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
Two Slides:Two Slides:
Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
Two Slides:Two Slides: towards ...towards ...
Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
Two Slides:Two Slides: towards ...towards ...
1. “self-centered modes of self-fulfilment”1. “self-centered modes of self-fulfilment”
Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
Two Slides:Two Slides: towards ...towards ...
1. “self-centered modes of self-fulfilment”1. “self-centered modes of self-fulfilment”
2. “negation of all horizons of2. “negation of all horizons of
significance”significance”
Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
Two Slides:Two Slides: towards ...towards ...
1. “self-centered modes of self-fulfilment”1. “self-centered modes of self-fulfilment”
disengagementdisengagement
2. “negation of all horizons of2. “negation of all horizons of
significance”significance”
Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
Two Slides:Two Slides: towards ...towards ...
1. “self-centered modes of self-fulfilment”1. “self-centered modes of self-fulfilment”
disengagementdisengagement
2. “negation of all horizons of2. “negation of all horizons of
significance”significance”
fragmentationfragmentationCharles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
Two Slides:Two Slides: towards ...towards ...
1. “self-centered modes of self-fulfilment”1. “self-centered modes of self-fulfilment”
disengagementdisengagement
2. “negation of all horizons of2. “negation of all horizons of
significance”significance”
fragmentationfragmentation
special interest sound bite politicsspecial interest sound bite politics
Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
If the conversations of our cultureIf the conversations of our culture
now happen here ...now happen here ...
Why this matters ...Why this matters ...
not controlled by the fewnot controlled by the few
not one-waynot one-way
created by, for, and around networks, not massescreated by, for, and around networks, not masses
transform individual pursuits into collective actiontransform individual pursuits into collective action
makes “group” formation “ridiculously easy”makes “group” formation “ridiculously easy”
(Paquet/Shirky)(Paquet/Shirky)
Why this mightWhy this might deeplydeeply matter ...matter ...
We know ourselvesWe know ourselves
through our relations with others.through our relations with others.
New media create new ways of relating to others.New media create new ways of relating to others.
New media create new ways of knowingNew media create new ways of knowing
ourselves.ourselves.
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
1,728,000 minutes/day
Over 1,000x faster than you can watch
493,714 videos/day
493,714 videos/day
(just on YouTube)
1,000,000+ online videos per day
over 99.9% irrelevant to you
(estimated)
Who is on YouTube
(percentage of videos featuring people of different ages)
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing around
viewed by less than 1% of Americansviewed by less than 1% of Americans
Week 3 summer hum 140  - hanging out and messing around
What are the Components ofWhat are the Components of
Digital CitizenshipDigital Citizenship
1. Digital Etiquette:   rules and policy
2. Digital Communication:  electronic exchange of information
3. Digital Literacy: process of learning about technology and the use of technology
4. Digital Access:   full electronic participation in society. 
5. Digital Commerce:   electronic buying and selling of goods. 
6. Digital Law & Ethics:   electronic responsibility for actions and deeds
7. Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world.
8. Digital Health & Wellness:   physical and psychological well-being in a digital world.
9. Digital Security (self-protection):   electronic precautions to guarantee safety.
Society & Citizenship- Twitter
 http://www.thedailyshow.com/watch/mon-march-2-2009/twitter-frenzy
http://www.cnn.com/video/#/video/world/2009/06/18/dcl.barnett.iran.social.networks.cnn?iref=videosearch
Week 3 summer hum 140  - hanging out and messing around
Can 140 Characters Make a Difference?Can 140 Characters Make a Difference?
http://www.splashmedia.com/resources/blog/changing-the-world-in-140-characters-or-less/
““Hanging Out”Hanging Out”
digital health and safetydigital health and safety
WhatWhat
WeWe
AreAre
DoingDoing
NowNow
Social media and information overloadSocial media and information overload
 Americans now consume three times the information  they did in 1960. 
 
The Societal ConsequencesThe Societal Consequences
Protecting Your Digital HealthProtecting Your Digital Health
• Critical thinking
• Career and reputation
• Emotional & physical 
health
• Personal safety
Critical ThinkingCritical Thinking
Developing Healthy Internet SkepticismDeveloping Healthy Internet Skepticism
Baloney Detection KitBaloney Detection Kit
http://www.michaelshermer.com/2001/11/baloney-detection/
In December of 2009, Microsoft released statistics from 
a survey that they commissioned which drastically 
topped those numbers, stating that 79% of hiring 
managers and job recruiters in the United States 
reviewed online information about job applicants, 
while 70% of those surveyed said that they’ve 
rejected applicants based on their findings.
Your Image MattersYour Image Matters
How Social Media ‘Mistakes’How Social Media ‘Mistakes’
Impact Getting Hired or FiredImpact Getting Hired or Fired
Many employers use social networking sites along with personal blogs to look for
what they call “digital dirt” We wondered what types of online content would
actually affect an employer’s decision on either hiring or firing an employee.
Here’s a breakdown of what Microsoft found in the same aforementioned study:
1. Concerns about the candidate’s lifestyle 58%
2. Inappropriate comments and text written by the candidate 56%
3. Unsuitable photos, videos and information 55%
4. Inappropriate comments or text written by friends and relatives 43%
5. Comments criticizing previous employers, coworkers or clients 40%
6. Inappropriate comments or text written by colleagues or work acquaintances 40%
7. Membership in certain groups and networks 35%
8. Discovered that information the candidate shared was false 30%
9. Poor communication skills displayed online 27%
10. Concern about the candidate’s financial background 16%
SOURCE:
http://www.safetyweb.com/online-reputation-guide-for-college-students#mistakes
Personal SafetyPersonal Safety
Visit these sites at your own risk!Visit these sites at your own risk!
A Gateway for Dangerous Behavior?A Gateway for Dangerous Behavior?
http://omegle.com/
http://www.chatroulette.com/
Chat RouletteChat Roulette
Get around it with Snap Chat?
http://www.youtube.com/watch?v=7oD0lrp_bBE
Cyber Bullying and Social IsolationCyber Bullying and Social Isolation
A Father’s Emotional Plea
How Social Media Is HelpingHow Social Media Is Helping
Defeat Cyber BullyingDefeat Cyber Bullying
      With MTV launching Draw Your Line, a visualization tool that encourages 
young people to take action against digital abuse and share these actions 
and tips with others. The tool is part of A Thin Line, an organization 
dedicated to decreasing digital abuse and bullying, and protecting 
children and young adults from the dangers of an increasingly online 
world.
Visit:   http://www.athinline.org/drawyourline
Week 3 summer hum 140  - hanging out and messing around
“It's important to note that blaming technology for horrendous, violent displays of homophobia or
racism or simple meanness lets adults like parents and teachers absolve themselves of the
responsibility to raise kids free from these evils. “ ~ Anil Dash
“There is a statistically significant weak positive relationship between home access to a computer
or time spent online and whether or not students tease others.”
Barbara Lacey, “Social aggression: A study of Internet harassment”
“The authorsfail to adequately summarize and analyze the data from the various studies, many of
which appear on Internet web sites rather thanin peer-reviewed journals. The few tables of data
are uninformativeand presented without statistical analysis.”
The American Journal of Psychiatry Book Review of:  Cyber Bullying: Bullying in the Digital Age
“The results show that almost 54% of the students were victims of traditional bullying and over a
quarter of them had been cyber-bullied. Almost one in three students had bullied others in the
traditional form, and almost 15% had bullied others using electronic communication tools. ”
Qing L i, “New bottle but old wine: A research of cyberbullying in schools”
Does Social Media Cause Bullying?Does Social Media Cause Bullying?
Can Anonymity Breed IrresponsibilityCan Anonymity Breed Irresponsibility
The problem, say Formspring's critics, is the site offers a perfect haven for 
cyberbulllying. 
The recent suicide of 15-year-old Pheobe Prince has drawn attention to the 
problem of bullying in cyberspace because victims often have no idea who is 
tormenting them. A Boycott Formspring Group on Facebook claims almost 
7,300 members.
 http://www.dailyfinance.com/story/media/do-you-know-who-your-children-
are-online-formsprings-raunchy-f/19452194/?a_dgi=aolshare_email 
http://www.twloha.com/blog/some-thoughts-boycotting-formspring-in-1/
A Thoughtful ResponseA Thoughtful Response
 http://www.facebook.com/notes/to-write-love-on-her-arms/some-thoughts-on-boycotting-
formspring-in-response-to-the-suicide-of-alexis-pilk/373781774657 
Cyberbullying
What the research is telling us…
Amanda Lenhart
Youth Online Safety Working Group
May 6, 2010
Washington, DC
May 2010 80
Teen internet use basics
• 93% of teens 12-17 go online
• 63% of online teens go online daily
• 89% of online teens go online from home, and
most of them go online from home most often
• 77% of teen go online at school
• 71% go online from friends or relatives house
• 60% go online from a library
• 27% go online on their mobile phone
• 76% of households with teens go online via
broadband, 10% via dial up, and 12% do not have
access at home.
May 2010 81
What are teens doing online?
• 94% go online to do research for school assignments; 48% do so on
a typical day.
• 81% go to websites about movies, TV shows, music groups, or sports
stars
• 64% of online teens have created some kind of content online
• 62% go online to get news
• 57% have watched a video on a video-sharing site like YouTube or
GoogleVideo
• 55% go online to get information about a college, university or other
school that they are thinking about attending.
• 48% have bought something online like books, clothes or music
• 31% have looked online for health, dieting or physical fitness
information; 17% have looked online for sensitive health
information
May 2010 82
How else are teens connecting?
• 75% of teens have a cell phone
– No gender or race/ethnic differences in ownership
– 50% of teens with phones talk to friends daily
– 54% of teens send text messages daily
– 27% use their phone to go online
• 73% of teens use an online social network site
– 37% of SNS users send messages through social networks daily
• 80% of teens have a game console
• 51% of teens have a portable gaming device
– Teens connect and interact with others online through games
May 2010 83
Concerns in Online Safety Sphere
• Inappropriate contact
– Strangers
– Bullies
• Inappropriate content
– Accidental Exposure
– Deliberate Exposure
May 2010 84
Bullying
Olweus (1993)
“A person is bullied when he or she is exposed, repeatedly and over time, to
negative actions on the part of one or more other persons, and he or she has
difficulty defending himself or herself."
This definition includes three important components:
1. Bullying is aggressive behavior that involves unwanted, negative actions.
2. Bullying involves a pattern of behavior repeated over time
3. Bullying involves an imbalance of power or strength.”
Bullying
– Physical
– Relational/Verbal
-Internet
May 2010 85
Online Harassment &
Cyberbullying
• Online harassment: aggressive
behavior, “harm doing,” insults,
denigration, impersonation, exclusion,
outing, activities associated with
hacking – stealing information, breaking
into accounts, damaging websites,
profiles etc. (Willard, 2006)
• Cyberbullying: online harassment that is
– repeated over time
May 2010 86
What makes online harassment &
bullying different?
• Technology is vehicle
• Persistence of content
– Editable, alterable
• Distributability of content
– Speed
– Breadth
• Dis-inhibition over computer-mediated communication
• Invasive
May 2010 87
Pew Internet: Online Harassment
• 32% of online teens have experienced one of the
following forms of online harassment:
– 15% of teens reported having private material (IM,
txt, email) forwarded without permission
– 13% had received threatening messages
– 13% said someone had spread a rumor about them
online
– 6% had someone post an embarrassing picture of
them online without permission
(Lenhart,
2007)
• 26% of teens have been harassed via their cell phones
either by voice or text
(Lenhart,
06/22/13 88
May 2010 89
Cyberbullying
• Other research shows prevalence of cyberbullying or online harassment
between 9% and 33% of youth ages 10-18. (Wolak et al, 2007, Ybarra et
al, 2007)
• Much of the difference is definitional and depends on how the question
was asked. Specific activities often yield higher levels of response than
blanket definitions.
• Mid-teens (ages 14-17) is the age of greatest prevalence of online
harassment & bullying (Pew, 2007, Hinduja & Patchin, 2008)
• Perpetrators of online bullying (similar to offline bullying) are generally
the same age as their victim. (Wolak, 2007)
May 2010 90
Frequency of bullying victimization among 11-16 year
olds
62%
27%
5%
3% 3%
Never
Less often than monthly
Once or twice a month
Once or twice a week
Everyday
(n=1,193)
(Ybarra, 2009)
May 2010 91
Online Harassment (2)
• Girls, particularly older girls, report more online
harassment; 38% of all online girls reported
experiencing some type of harassment (Pew, 2007)
• Social network users are also more likely to report
online harassment – 39% of SNS users have
experience it. (Pew, 2007)
• But most teens (67%) think bullying & harassment
happens more OFFLINE. (Pew, 2007)
May 2010 92
Frequency of bullying victimization among 11-
16 year olds by environment
(n=1,193)
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
School Internet Cell phone text
messaging
To and from school Some other place
Everyday
Once or twice a week
Once or twice a month
Less often than monthly
Never
(Ybarra, 2009)
May 2010 93
Online (or not) Harassment
• School is by far the most common place youth report being
bullied (31%) versus elsewhere (e.g., 13% online)
• The prevalence rate of Internet harassment (both perpetration
and victimization) appears to be stable (2006-2008).
• The majority (59%) of Internet harassment comes from other
minors
• Youth who report being harassed online report a myriad of
concurrent psychosocial problems offline, too
Source: Michele Ybarra & colleagues work
on the 2005 Youth Internet Safety
Survey fielded by UNH CCRC & 2007-
2008 Growing up with Media research
May 2010 94
Why should we worry?
• Bullying is broadly associated with:
– School violence
– Delinquency
– Suicidal ideation
• Bullied teens (and often bullies
themselves) have higher levels of:
– Depression and other psychological
problems
May 2010 95
Why should we worry (2)?
• Some research suggests that significant portions of
teens aren’t bothered by online harassment or
bullying
• Research suggests that 1/3 of teens (34%) are
distressed by online harassment. (Wolak et al, 2007)
– Distressed = “Extremely or very upset or afraid”
• Teens who are high internet users are more likely to
be distressed (Wolak, 2007)
May 2010 96
Overlap of cyberbullying & internet
victimization
(Ybarra, 2010)
May 2010 97
Differences between cyberbullying
& internet harassment
Cyberbullying is not more common than Internet
harassment
• On average (between 2007-2008): 37% were harassed,
14% were bullied online in the past year
Cyberbullying is not more damaging than Internet
harassment
• Among those cyberbullied, 15% report being very /
extremely upset
• Among those harassed, between 17-34% report being
very / extremely upset
May 2010 98
Cell phone-based harassment
• 75% of teens have cell phones
• 54% of all teens text message daily
• 26% have been harassed through their cell phone by voice
calls or text messages
• 47% have sent a text message they regretted sending
• And then there’s sexting – which is
generally not a form of harassment
itself, but when the images are shared,
can lead to harassment and bullying.
06/22/13 99
May 2010 100
Sending Sexts
• No difference by gender
• Oldest teens most likely to have sent
– 8% of 17 year olds
– 4% of 12 year olds
• 17% who pay for all the costs of the phone send
sexts vs. 3% of others
May 2010 101
Receiving Sexts
• Again, no gender differences and increases by age
– 4% of 12 year olds
– 20% of 16 year olds
– 30% of 17 year olds
May 2010 102
Sexting Scenarios
1. Between two romantic partners, as a part of,
instead of, or as a prelude to sex – never
leaves couple
2. Between two romantic partners – but shared
with others
3. Between two people where at least one would
like to be in a relationship – shows interest
May 2010 103
Element of coercion for some sexting
“When I was about 14-15 years old, I received/sent these types
of pictures. Boys usually ask for them or start that type of
conversation. My boyfriend, or someone I really liked asked
for them. And I felt like if I didn’t do it, they wouldn’t continue
to talk to me. At the time, it was no big deal. But now looking
back it was definitely inappropriate and over the line.”
17 year old girl

Contenu connexe

Similaire à Week 3 summer hum 140 - hanging out and messing around

Philosophy and Social Media 2: The Origins of Social Media
Philosophy and Social Media 2: The Origins of Social MediaPhilosophy and Social Media 2: The Origins of Social Media
Philosophy and Social Media 2: The Origins of Social MediaTimothy Rayner
 
G325 - Collective identity:youth
G325 - Collective identity:youthG325 - Collective identity:youth
G325 - Collective identity:youthCat Davies
 
Collective identity youth
Collective identity   youthCollective identity   youth
Collective identity youthCat Davies
 
Collective identity youth
Collective identity   youthCollective identity   youth
Collective identity youthCat Davies
 
Collective identity youth
Collective identity   youthCollective identity   youth
Collective identity youthCat Davies
 
019 Nursing Personal Essay Statement Mental Health
019 Nursing Personal Essay Statement Mental Health019 Nursing Personal Essay Statement Mental Health
019 Nursing Personal Essay Statement Mental HealthJennifer Strong
 
Susan Cain Ted Talk Analysis
Susan Cain Ted Talk AnalysisSusan Cain Ted Talk Analysis
Susan Cain Ted Talk AnalysisJill Crawford
 
Commercial Recuperation Essay
Commercial Recuperation EssayCommercial Recuperation Essay
Commercial Recuperation EssayKimberly Thomas
 
Joakim Jardenberg's presentation
Joakim Jardenberg's presentationJoakim Jardenberg's presentation
Joakim Jardenberg's presentationdxfswe
 
Module1 cultural awareness en-4_topic
Module1 cultural awareness en-4_topicModule1 cultural awareness en-4_topic
Module1 cultural awareness en-4_topicEDUNET
 
Module1 cultural awareness en-4_topic_2
Module1 cultural awareness en-4_topic_2Module1 cultural awareness en-4_topic_2
Module1 cultural awareness en-4_topic_2EDUNET
 
The unbearable emptiness of being - a reflection
The unbearable emptiness of being -  a reflectionThe unbearable emptiness of being -  a reflection
The unbearable emptiness of being - a reflectionAtelier 007 - Marit Otto
 
Eq Is More Important Than Iq
Eq Is More Important Than IqEq Is More Important Than Iq
Eq Is More Important Than IqTracy Richards
 
The perfect storm of narcissism and social media
The perfect storm of narcissism and social mediaThe perfect storm of narcissism and social media
The perfect storm of narcissism and social mediaWilliam Sharp
 

Similaire à Week 3 summer hum 140 - hanging out and messing around (20)

Philosophy and Social Media 2: The Origins of Social Media
Philosophy and Social Media 2: The Origins of Social MediaPhilosophy and Social Media 2: The Origins of Social Media
Philosophy and Social Media 2: The Origins of Social Media
 
talking about escape
talking about escapetalking about escape
talking about escape
 
Maintaining Individuality
Maintaining IndividualityMaintaining Individuality
Maintaining Individuality
 
Secr 6000
Secr 6000Secr 6000
Secr 6000
 
G325 - Collective identity:youth
G325 - Collective identity:youthG325 - Collective identity:youth
G325 - Collective identity:youth
 
Collective identity youth
Collective identity   youthCollective identity   youth
Collective identity youth
 
Collective identity youth
Collective identity   youthCollective identity   youth
Collective identity youth
 
Collectiveidentity youth
Collectiveidentity youthCollectiveidentity youth
Collectiveidentity youth
 
Collective identity youth
Collective identity   youthCollective identity   youth
Collective identity youth
 
019 Nursing Personal Essay Statement Mental Health
019 Nursing Personal Essay Statement Mental Health019 Nursing Personal Essay Statement Mental Health
019 Nursing Personal Essay Statement Mental Health
 
Susan Cain Ted Talk Analysis
Susan Cain Ted Talk AnalysisSusan Cain Ted Talk Analysis
Susan Cain Ted Talk Analysis
 
Commercial Recuperation Essay
Commercial Recuperation EssayCommercial Recuperation Essay
Commercial Recuperation Essay
 
Theory cads
Theory cadsTheory cads
Theory cads
 
Joakim Jardenberg's presentation
Joakim Jardenberg's presentationJoakim Jardenberg's presentation
Joakim Jardenberg's presentation
 
Millennials and the Church
Millennials and the ChurchMillennials and the Church
Millennials and the Church
 
Module1 cultural awareness en-4_topic
Module1 cultural awareness en-4_topicModule1 cultural awareness en-4_topic
Module1 cultural awareness en-4_topic
 
Module1 cultural awareness en-4_topic_2
Module1 cultural awareness en-4_topic_2Module1 cultural awareness en-4_topic_2
Module1 cultural awareness en-4_topic_2
 
The unbearable emptiness of being - a reflection
The unbearable emptiness of being -  a reflectionThe unbearable emptiness of being -  a reflection
The unbearable emptiness of being - a reflection
 
Eq Is More Important Than Iq
Eq Is More Important Than IqEq Is More Important Than Iq
Eq Is More Important Than Iq
 
The perfect storm of narcissism and social media
The perfect storm of narcissism and social mediaThe perfect storm of narcissism and social media
The perfect storm of narcissism and social media
 

Plus de Ray Brannon

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedRay Brannon
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociologyRay Brannon
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Ray Brannon
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics Ray Brannon
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Ray Brannon
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to thinkRay Brannon
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Ray Brannon
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Ray Brannon
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story RevisedRay Brannon
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.Ray Brannon
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speechesRay Brannon
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body languageRay Brannon
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsRay Brannon
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsRay Brannon
 
Research methods wccc 9 14-15
Research methods wccc 9 14-15Research methods wccc 9 14-15
Research methods wccc 9 14-15Ray Brannon
 
Sociological Perspective part two
Sociological Perspective part twoSociological Perspective part two
Sociological Perspective part twoRay Brannon
 
Sociological perspectives wccc rev8 31
Sociological perspectives wccc rev8 31Sociological perspectives wccc rev8 31
Sociological perspectives wccc rev8 31Ray Brannon
 

Plus de Ray Brannon (20)

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revised
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociology
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18
 
Stratification
Stratification Stratification
Stratification
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to think
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story Revised
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speeches
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body language
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your Presentations
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tips
 
Research methods wccc 9 14-15
Research methods wccc 9 14-15Research methods wccc 9 14-15
Research methods wccc 9 14-15
 
Sociological Perspective part two
Sociological Perspective part twoSociological Perspective part two
Sociological Perspective part two
 
Sociological perspectives wccc rev8 31
Sociological perspectives wccc rev8 31Sociological perspectives wccc rev8 31
Sociological perspectives wccc rev8 31
 

Dernier

Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptxraviapr7
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17Celine George
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and stepobaje godwin sunday
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 

Dernier (20)

Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and step
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 

Week 3 summer hum 140 - hanging out and messing around

  • 2. Hanging OutHanging Out 1. Getting Together and Being Together – socializing on line and off for identity construction – it is often online first to set up getting together. a) Sharing, Posting, Linking, and Forwarding b) Music first, then videos – youtube watched offline together 2. Hanging out through back channels – text, Facebook, Myspace, blogs..under no special control from home or school.
  • 3. Messing AroundMessing Around • More intense engagement – looking around, “lurking” – chat roulette
  • 4. ““Messing Around”Messing Around” • Experimental play – photo-tools, media creation, techie monitoring (e.g. free ringtone creation) • Messing around involves a more open-ended genre of participation
  • 5. ““Geeking Out”Geeking Out” • Intense commitment or engagement with media or technology, often one particular media property, genre, or a type of technology • involves learning to navigate esoteric domains of knowledge and practice and being able to participate in communities that traffic in these forms of expertise. Blogs, remizes, games, podscasts • Participate in closed IRC groups or specialized forums rather than general fan discussion forums, which they see as catering to less knowledgeable fans. –Second Life • Rewriting the rules - code hacking, creating and exploiting cheats, and making derivative works such as machinima (real time animated movie techniques – using game engines) and game modifications – Limewire – avoiding copyright rules
  • 6. Why Does it Matter?Why Does it Matter? understanding the new digital generationThe following video and slides are my edited remix of Michael Wesch’s presentation done on Slideshare.com and YouTube. Dr. Wesch is a pioneer in social media education and was recently named Professor of the Year
  • 8. “What we are encountering is a panicky, an almost hysterical, attempt to escape from the deadly anonymity of modern life ... and the prime cause is not vanity ... but the craving of people who feel their personality sinking lower and lower into the whirl of indistinguishable atoms to be lost in a mass civilization."
  • 9. “What we are encountering is a panicky, an almost hysterical, attempt to escape from the deadly anonymity of modern life ... and the prime cause is not vanity ... but the craving of people who feel their personality sinking lower and lower into the whirl of indistinguishable atoms to be lost in a mass civilization." - Henry Seidel Canby 1926
  • 12. It's a one-wayIt's a one-way conversationconversation
  • 13. You have to be on TVYou have to be on TV to have a voiceto have a voice
  • 14. You have to be on TVYou have to be on TV to be significantto be significant
  • 16. The MTV Generation •Short attention spans •Materialistic •Narcissistic •Not easily impressed
  • 18. “in the midst of a fabulous array of historically unprecedented and utterly mind-boggling stimuli ...
  • 19. the search for identity and recognitionthe search for identity and recognition
  • 20. the search for the authentic selfthe search for the authentic self
  • 21. the search for the authentic selfthe search for the authentic self Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
  • 22. Two Slides:Two Slides: Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
  • 23. Two Slides:Two Slides: towards ...towards ... Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
  • 24. Two Slides:Two Slides: towards ...towards ... 1. “self-centered modes of self-fulfilment”1. “self-centered modes of self-fulfilment” Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
  • 25. Two Slides:Two Slides: towards ...towards ... 1. “self-centered modes of self-fulfilment”1. “self-centered modes of self-fulfilment” 2. “negation of all horizons of2. “negation of all horizons of significance”significance” Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
  • 26. Two Slides:Two Slides: towards ...towards ... 1. “self-centered modes of self-fulfilment”1. “self-centered modes of self-fulfilment” disengagementdisengagement 2. “negation of all horizons of2. “negation of all horizons of significance”significance” Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
  • 27. Two Slides:Two Slides: towards ...towards ... 1. “self-centered modes of self-fulfilment”1. “self-centered modes of self-fulfilment” disengagementdisengagement 2. “negation of all horizons of2. “negation of all horizons of significance”significance” fragmentationfragmentationCharles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
  • 28. Two Slides:Two Slides: towards ...towards ... 1. “self-centered modes of self-fulfilment”1. “self-centered modes of self-fulfilment” disengagementdisengagement 2. “negation of all horizons of2. “negation of all horizons of significance”significance” fragmentationfragmentation special interest sound bite politicsspecial interest sound bite politics Charles Taylor's “Ethics of Authenticity” (1991)Charles Taylor's “Ethics of Authenticity” (1991)
  • 29. If the conversations of our cultureIf the conversations of our culture now happen here ...now happen here ...
  • 30. Why this matters ...Why this matters ... not controlled by the fewnot controlled by the few not one-waynot one-way created by, for, and around networks, not massescreated by, for, and around networks, not masses transform individual pursuits into collective actiontransform individual pursuits into collective action makes “group” formation “ridiculously easy”makes “group” formation “ridiculously easy” (Paquet/Shirky)(Paquet/Shirky)
  • 31. Why this mightWhy this might deeplydeeply matter ...matter ... We know ourselvesWe know ourselves through our relations with others.through our relations with others. New media create new ways of relating to others.New media create new ways of relating to others. New media create new ways of knowingNew media create new ways of knowing ourselves.ourselves.
  • 36. Over 1,000x faster than you can watch
  • 40. over 99.9% irrelevant to you (estimated)
  • 41. Who is on YouTube (percentage of videos featuring people of different ages)
  • 54. viewed by less than 1% of Americansviewed by less than 1% of Americans
  • 56. What are the Components ofWhat are the Components of Digital CitizenshipDigital Citizenship 1. Digital Etiquette:   rules and policy 2. Digital Communication:  electronic exchange of information 3. Digital Literacy: process of learning about technology and the use of technology 4. Digital Access:   full electronic participation in society.  5. Digital Commerce:   electronic buying and selling of goods.  6. Digital Law & Ethics:   electronic responsibility for actions and deeds 7. Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world. 8. Digital Health & Wellness:   physical and psychological well-being in a digital world. 9. Digital Security (self-protection):   electronic precautions to guarantee safety.
  • 59. Can 140 Characters Make a Difference?Can 140 Characters Make a Difference? http://www.splashmedia.com/resources/blog/changing-the-world-in-140-characters-or-less/
  • 60. ““Hanging Out”Hanging Out” digital health and safetydigital health and safety
  • 62. Social media and information overloadSocial media and information overload  Americans now consume three times the information  they did in 1960.   
  • 63. The Societal ConsequencesThe Societal Consequences Protecting Your Digital HealthProtecting Your Digital Health • Critical thinking • Career and reputation • Emotional & physical  health • Personal safety
  • 64. Critical ThinkingCritical Thinking Developing Healthy Internet SkepticismDeveloping Healthy Internet Skepticism Baloney Detection KitBaloney Detection Kit http://www.michaelshermer.com/2001/11/baloney-detection/
  • 66. How Social Media ‘Mistakes’How Social Media ‘Mistakes’ Impact Getting Hired or FiredImpact Getting Hired or Fired Many employers use social networking sites along with personal blogs to look for what they call “digital dirt” We wondered what types of online content would actually affect an employer’s decision on either hiring or firing an employee. Here’s a breakdown of what Microsoft found in the same aforementioned study: 1. Concerns about the candidate’s lifestyle 58% 2. Inappropriate comments and text written by the candidate 56% 3. Unsuitable photos, videos and information 55% 4. Inappropriate comments or text written by friends and relatives 43% 5. Comments criticizing previous employers, coworkers or clients 40% 6. Inappropriate comments or text written by colleagues or work acquaintances 40% 7. Membership in certain groups and networks 35% 8. Discovered that information the candidate shared was false 30% 9. Poor communication skills displayed online 27% 10. Concern about the candidate’s financial background 16% SOURCE: http://www.safetyweb.com/online-reputation-guide-for-college-students#mistakes
  • 67. Personal SafetyPersonal Safety Visit these sites at your own risk!Visit these sites at your own risk!
  • 68. A Gateway for Dangerous Behavior?A Gateway for Dangerous Behavior?
  • 72. Cyber Bullying and Social IsolationCyber Bullying and Social Isolation
  • 74. How Social Media Is HelpingHow Social Media Is Helping Defeat Cyber BullyingDefeat Cyber Bullying       With MTV launching Draw Your Line, a visualization tool that encourages  young people to take action against digital abuse and share these actions  and tips with others. The tool is part of A Thin Line, an organization  dedicated to decreasing digital abuse and bullying, and protecting  children and young adults from the dangers of an increasingly online  world. Visit:   http://www.athinline.org/drawyourline
  • 76. “It's important to note that blaming technology for horrendous, violent displays of homophobia or racism or simple meanness lets adults like parents and teachers absolve themselves of the responsibility to raise kids free from these evils. “ ~ Anil Dash “There is a statistically significant weak positive relationship between home access to a computer or time spent online and whether or not students tease others.” Barbara Lacey, “Social aggression: A study of Internet harassment” “The authorsfail to adequately summarize and analyze the data from the various studies, many of which appear on Internet web sites rather thanin peer-reviewed journals. The few tables of data are uninformativeand presented without statistical analysis.” The American Journal of Psychiatry Book Review of:  Cyber Bullying: Bullying in the Digital Age “The results show that almost 54% of the students were victims of traditional bullying and over a quarter of them had been cyber-bullied. Almost one in three students had bullied others in the traditional form, and almost 15% had bullied others using electronic communication tools. ” Qing L i, “New bottle but old wine: A research of cyberbullying in schools” Does Social Media Cause Bullying?Does Social Media Cause Bullying?
  • 77. Can Anonymity Breed IrresponsibilityCan Anonymity Breed Irresponsibility The problem, say Formspring's critics, is the site offers a perfect haven for  cyberbulllying.  The recent suicide of 15-year-old Pheobe Prince has drawn attention to the  problem of bullying in cyberspace because victims often have no idea who is  tormenting them. A Boycott Formspring Group on Facebook claims almost  7,300 members.  http://www.dailyfinance.com/story/media/do-you-know-who-your-children- are-online-formsprings-raunchy-f/19452194/?a_dgi=aolshare_email  http://www.twloha.com/blog/some-thoughts-boycotting-formspring-in-1/
  • 78. A Thoughtful ResponseA Thoughtful Response  http://www.facebook.com/notes/to-write-love-on-her-arms/some-thoughts-on-boycotting- formspring-in-response-to-the-suicide-of-alexis-pilk/373781774657 
  • 79. Cyberbullying What the research is telling us… Amanda Lenhart Youth Online Safety Working Group May 6, 2010 Washington, DC
  • 80. May 2010 80 Teen internet use basics • 93% of teens 12-17 go online • 63% of online teens go online daily • 89% of online teens go online from home, and most of them go online from home most often • 77% of teen go online at school • 71% go online from friends or relatives house • 60% go online from a library • 27% go online on their mobile phone • 76% of households with teens go online via broadband, 10% via dial up, and 12% do not have access at home.
  • 81. May 2010 81 What are teens doing online? • 94% go online to do research for school assignments; 48% do so on a typical day. • 81% go to websites about movies, TV shows, music groups, or sports stars • 64% of online teens have created some kind of content online • 62% go online to get news • 57% have watched a video on a video-sharing site like YouTube or GoogleVideo • 55% go online to get information about a college, university or other school that they are thinking about attending. • 48% have bought something online like books, clothes or music • 31% have looked online for health, dieting or physical fitness information; 17% have looked online for sensitive health information
  • 82. May 2010 82 How else are teens connecting? • 75% of teens have a cell phone – No gender or race/ethnic differences in ownership – 50% of teens with phones talk to friends daily – 54% of teens send text messages daily – 27% use their phone to go online • 73% of teens use an online social network site – 37% of SNS users send messages through social networks daily • 80% of teens have a game console • 51% of teens have a portable gaming device – Teens connect and interact with others online through games
  • 83. May 2010 83 Concerns in Online Safety Sphere • Inappropriate contact – Strangers – Bullies • Inappropriate content – Accidental Exposure – Deliberate Exposure
  • 84. May 2010 84 Bullying Olweus (1993) “A person is bullied when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other persons, and he or she has difficulty defending himself or herself." This definition includes three important components: 1. Bullying is aggressive behavior that involves unwanted, negative actions. 2. Bullying involves a pattern of behavior repeated over time 3. Bullying involves an imbalance of power or strength.” Bullying – Physical – Relational/Verbal -Internet
  • 85. May 2010 85 Online Harassment & Cyberbullying • Online harassment: aggressive behavior, “harm doing,” insults, denigration, impersonation, exclusion, outing, activities associated with hacking – stealing information, breaking into accounts, damaging websites, profiles etc. (Willard, 2006) • Cyberbullying: online harassment that is – repeated over time
  • 86. May 2010 86 What makes online harassment & bullying different? • Technology is vehicle • Persistence of content – Editable, alterable • Distributability of content – Speed – Breadth • Dis-inhibition over computer-mediated communication • Invasive
  • 87. May 2010 87 Pew Internet: Online Harassment • 32% of online teens have experienced one of the following forms of online harassment: – 15% of teens reported having private material (IM, txt, email) forwarded without permission – 13% had received threatening messages – 13% said someone had spread a rumor about them online – 6% had someone post an embarrassing picture of them online without permission (Lenhart, 2007) • 26% of teens have been harassed via their cell phones either by voice or text (Lenhart,
  • 89. May 2010 89 Cyberbullying • Other research shows prevalence of cyberbullying or online harassment between 9% and 33% of youth ages 10-18. (Wolak et al, 2007, Ybarra et al, 2007) • Much of the difference is definitional and depends on how the question was asked. Specific activities often yield higher levels of response than blanket definitions. • Mid-teens (ages 14-17) is the age of greatest prevalence of online harassment & bullying (Pew, 2007, Hinduja & Patchin, 2008) • Perpetrators of online bullying (similar to offline bullying) are generally the same age as their victim. (Wolak, 2007)
  • 90. May 2010 90 Frequency of bullying victimization among 11-16 year olds 62% 27% 5% 3% 3% Never Less often than monthly Once or twice a month Once or twice a week Everyday (n=1,193) (Ybarra, 2009)
  • 91. May 2010 91 Online Harassment (2) • Girls, particularly older girls, report more online harassment; 38% of all online girls reported experiencing some type of harassment (Pew, 2007) • Social network users are also more likely to report online harassment – 39% of SNS users have experience it. (Pew, 2007) • But most teens (67%) think bullying & harassment happens more OFFLINE. (Pew, 2007)
  • 92. May 2010 92 Frequency of bullying victimization among 11- 16 year olds by environment (n=1,193) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% School Internet Cell phone text messaging To and from school Some other place Everyday Once or twice a week Once or twice a month Less often than monthly Never (Ybarra, 2009)
  • 93. May 2010 93 Online (or not) Harassment • School is by far the most common place youth report being bullied (31%) versus elsewhere (e.g., 13% online) • The prevalence rate of Internet harassment (both perpetration and victimization) appears to be stable (2006-2008). • The majority (59%) of Internet harassment comes from other minors • Youth who report being harassed online report a myriad of concurrent psychosocial problems offline, too Source: Michele Ybarra & colleagues work on the 2005 Youth Internet Safety Survey fielded by UNH CCRC & 2007- 2008 Growing up with Media research
  • 94. May 2010 94 Why should we worry? • Bullying is broadly associated with: – School violence – Delinquency – Suicidal ideation • Bullied teens (and often bullies themselves) have higher levels of: – Depression and other psychological problems
  • 95. May 2010 95 Why should we worry (2)? • Some research suggests that significant portions of teens aren’t bothered by online harassment or bullying • Research suggests that 1/3 of teens (34%) are distressed by online harassment. (Wolak et al, 2007) – Distressed = “Extremely or very upset or afraid” • Teens who are high internet users are more likely to be distressed (Wolak, 2007)
  • 96. May 2010 96 Overlap of cyberbullying & internet victimization (Ybarra, 2010)
  • 97. May 2010 97 Differences between cyberbullying & internet harassment Cyberbullying is not more common than Internet harassment • On average (between 2007-2008): 37% were harassed, 14% were bullied online in the past year Cyberbullying is not more damaging than Internet harassment • Among those cyberbullied, 15% report being very / extremely upset • Among those harassed, between 17-34% report being very / extremely upset
  • 98. May 2010 98 Cell phone-based harassment • 75% of teens have cell phones • 54% of all teens text message daily • 26% have been harassed through their cell phone by voice calls or text messages • 47% have sent a text message they regretted sending • And then there’s sexting – which is generally not a form of harassment itself, but when the images are shared, can lead to harassment and bullying.
  • 100. May 2010 100 Sending Sexts • No difference by gender • Oldest teens most likely to have sent – 8% of 17 year olds – 4% of 12 year olds • 17% who pay for all the costs of the phone send sexts vs. 3% of others
  • 101. May 2010 101 Receiving Sexts • Again, no gender differences and increases by age – 4% of 12 year olds – 20% of 16 year olds – 30% of 17 year olds
  • 102. May 2010 102 Sexting Scenarios 1. Between two romantic partners, as a part of, instead of, or as a prelude to sex – never leaves couple 2. Between two romantic partners – but shared with others 3. Between two people where at least one would like to be in a relationship – shows interest
  • 103. May 2010 103 Element of coercion for some sexting “When I was about 14-15 years old, I received/sent these types of pictures. Boys usually ask for them or start that type of conversation. My boyfriend, or someone I really liked asked for them. And I felt like if I didn’t do it, they wouldn’t continue to talk to me. At the time, it was no big deal. But now looking back it was definitely inappropriate and over the line.” 17 year old girl

Notes de l'éditeur

  1.   sockpuppet  is an online identity used for purposes of deception within an online community. In its earliest usage, a sockpuppet was a false identity through which a member of anInternet community speaks with or about himself or herself, pretending to be a different person, [1]  like a ventriloquist manipulating a hand puppet. Trolling - an internet term for a person who willfully, through obscene, offensive or hateful actions (a.k.a. "trolling"), attempts to disrupt a community or garner reactions, attention and controversy. -
  2. ACCOUNT INFORMATION. TO DOWNLOAD AND INSTALL Paltalk YOU MUST BE AT LEAST EIGHTEEN (18) YEARS OF AGE. THERE ARE CERTAIN AREAS ON Paltalk THAT CONTAIN ADULT OR MATURE CONTENT. ACCORDINGLY, YOU REPRESENT THAT YOU ARE AT LEAST EIGHTEEN (18) YEARS OF AGE TO USE THOSE AREAS. NO ONE UNDER THE AGE OF THIRTEEN (13) IS PERMITTED TO USE Paltalk. NO ONE BETWEEN THE AGES OF THIRTEEN (13) AND EIGHTEEN (18) MAY USE Paltalk WITHOUT ADULT SUPERVISION. PARENTS AND GUARDIANS ASSUME ALL LIABILITY AND RESPONSIBILITY FOR THE USE OF THEIR ACCOUNTS BY OTHER PERSONS, INLCLUDING BUT NOT LIMITED TO USE OF THEIR ACCOUNTS BY PERSONS UNDER EIGHTEEN (18) YEARS OF AGE. ANY USER FOUND TO BE UNDER THE AGE OF THIRTEEN (13) OR PERMITTING USE OF Paltalk BY A PERSON UNDER THE AGE OF THIRTEEN (13), MAY HAVE HIS OR HER ACCOUNT SUSPENDED OR TERMINATED WITH OR WITHOUT NOTICE AND OTHER ACTIONS MAY ALSO BE TAKEN. IF A CHILD UNDER THIRTEEN (13) HAS ACCESS TO YOUR COMPUTER, DO NOT SAVE YOUR Paltalk PASSWORD; THIS WILL RESTRICT THE CHILD AND ANY UNAUTHORIZED USER FROM USING YOUR ACCOUNT. IN ADDITION, WE STRONGLY RECOMMEND THAT YOU CHECK REGULARLY TO SEE IF ANY NEW, UNAUTHORIZED ACCOUNTS HAVE BEEN CREATED UNDER YOUR Paltalk ACCOUNT. TO DELETE ANY * Profile We store information that we collect through cookies, log files, clear gifs, to create a “profile” of your preferences. We tie your personally identifiable information, and your purchasing history, to information in the profile, in order to provide tailored promotions and marketing offers and to improve the content of the site for you. We do not share your profile with other third parties without your consent. Paltalk is the sole owner of the information collected on Paltalk.com. Paltalk collects personally identifiable information from our users at several different points on our Web site or through our downloaded software.
  3. In order for us to create the most effective and targeted solutions, we have to know the exact nature of the problem.
  4. Library access and CELL PHONE ACCESS is particularly important to African American, and to a lesser extent English-Speaking Hispanic students. One quarter of low income teens (HHI under $30K) and 25% of African American teens say they go online most often from school, compared to 15% of online teens overall. Fewer low SES and African American teens go online daily 53% of af-am, vs 67% of white teens 75% of high income teens go online daily, compared to 39% of low SES teens. Slight decrease in teens going online from home since we first asked – broader use/access and also wide variety of access points/mobile access.
  5. Not just email, IM, but social networks, mobile devices and gaming platforms are all used to connect, talk and interact with others. And thus also may become platforms for bullying, too. This is where teens are - particularly outside of school - online, connected to each other by various means at all times.
  6. Online safety concerns breakdown roughly into two parts – concerns over harmful contact and concern over harmful content. What we’re focusing on here today is online CONTACT, rather than content and specifically, online bullying aka cyberbullying.
  7. Definition of bullying downloaded from http://olweus.org/public/bullying.page on May 12, 2009 and is also contained in Dan Olweus’ 1993 book “Bullying at School”: Olweus D. Bullying at School: What We Know and What We Can Do. Blackwell Publishing: Hoboken, NJ, 1993
  8. Source: Willard, N. Cyberbullying & Cyberthreats: Responding to the Challenge of Electronic Aggression. Center for Safe and Responsible Internet use: Eugene, OR. 2006. Retrieved from http://www.csriu.org on May 11, 2009. Online – identity can be shrouded. Youth who are physically bullied can/do retaliate online. Can be hard to determine who instigated and where. These are the “bully-victims” and the “instigator-victims.” Other definitions of cyberbullying used in major research projects on the topic: “ willful use of the Internet as a technological medium through which harm or discomfort is intentionally and repeatedly inflicted through indirect aggression that targets a specific person or group of persons.” (Williams and Guerra, 2007) “ an overt, intentional act of aggression towards another person online” (19% of young and regular internet users reported experiencing this) (Ybarra, & Mitchell, 2004) “ Willful and repeated harm inflicted through the medium of electronic text.” (Patchin & Hinduja, 2006)
  9. Invasive – computer and the internet bring the bullying into the sphere of the home, and cell phones, which are generally personal devices carried everywhere, mean that the bullying never stops.
  10. Pew data is measuring online harassment, as our questions did not ask about repetition or power imbalance. 15% had private comm forwarded with out permission 13% had a rumor spread about them 13% received a threatening message or comm 6% had embarrassing picture posted w/out permission Limitations: we missed a big one Missing spoofed/faked profile But Teens are also endlessly creative when it comes to bullying (and many other things) e.g., Text bombing=when a person sends 1000 of texts to one number… can be difficult to block, must pay for each text – can run up $100s in bills & makes it impossible to receive communication from others. Bullying in games – e.g., killing a player’s character quickly and repeatedly so gamer can’t play the game. Sources in this slide: Lenhart, A. (2007) Cyberbullying. Pew Internet & American Life Project, Washington, DC. http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Lenhart, A., et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
  11. Lenhart, A et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx p. 86
  12. 9% data point is from: Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 33% data point is from: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation] Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Hinduja S and Patchin JW. Cyberbullying: an exploratory analysis of factors related to offending and victimization. J Deviant Behavior 2008;29: 129-156. Data unclear on likelihood of victims knowing perpetrator – 45-89% say they know who is harassing them. No major differences in SES, race/ethnicity, parent education in likelihood of being harassed online. (Pew 2007 data)
  13. Slide source: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation]
  14. Lenhart, A. Cyberbullying. Pew Internet & American Life Project:Washington, DC. 2007. Available from http://www.pewinternet.org/Reports/2007/Cyberbullying.aspx Worth noting: Journal of Adolescent Health December 2007 issue has a special issue entirely devoted to research on Cyberbullying. Other research points to girls as more likely victims, or to boys and girls experiencing online bullying and harassment equally. (Wolak et al, 2007) – answers here not 100% conclusive. Ybarra data suggests that bullying does happen more at school than online. See following slide…
  15. Source: Ybarra M, Mitchell KJ, Espelage D. A comparison of bullying online and offline: Findings from a national survey. Presented to AERA Annual Meeting, April 16, 2009. [presentation]
  16. Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177. Ybarra ML, Diener-West M, Leaf PJ. Examining the overlap in internet harassment and school bullying: implications for school intervention. J Adolescent Health. 2007 Dec;41(6 Suppl 1):S42-50. Ybarra ML. Linkages between depressive symptomatology and Internet harassment among young regular Internet users. Cyberpsychol Behav. 2004 Apr;7(2):247-57.
  17. These are the “concurrent psychosocial problems” from Ybarra’s work. Source info for statements above: (see previous slides or bibliography for full cites) Bullying is broadly associated with: School violence – (Olweus, 2009 website ) Delinquency – (Hinduja & Patchin, 2007) Suicidal ideation (Hinduja & Patchin, in press @ Archives of Suicide Research) Depression and other psychological problems (Ybarra, 2007, Wolak, 2007) Substance abuse (Ybarra, 2007, Wolak, 2007) Delinquency / School avoidance (Hinduja & Patchin, 2007) Weapon-carrying (Nansel, 2003) Poor parent/caregiver relationships/offline victimization (Ybarra, 2007, Wolak, 2006)
  18. Wolak J, Mitchell KJ and Finkelhor D. Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-Only Contacts. J Adolescent Health. 2007 Dec: 41 S51-S58 Ybarra M, Mitchell KJ, Wolak J, Finkelhor D. Examining characteristics and associated distress related to Internet harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics. 2006. 118A(4):e1169-1177.
  19. Ybarra, Michele. (2010) “ Youth Internet Victimization: Myths and Truths,” [Presentation] NASPAG conference, Las Vegas, April 15, 2010 http://is4k.com/wp-content/uploads/2010/04/NASPAG_2010_Las-Vegas-NV2.pdf
  20. Ybarra, Michele. (2010) “ Youth Internet Victimization: Myths and Truths,” [Presentation] NASPAG conference, Las Vegas, April 15, 2010 http://is4k.com/wp-content/uploads/2010/04/NASPAG_2010_Las-Vegas-NV2.pdf
  21. Lenhart, A et al. (2010) Teens and Mobile Phones. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx
  22. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  23. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  24. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  25. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx
  26. Lenhart, A. (2009) Teens and Sexting. Pew Research Center’s Internet & American Life Project. Washington, DC. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting.aspx