SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
hiding
exploring
the use of
social media
as a shield
by Bryn Berry
friend:
a person
whom one
knows and
with whom
one has a
bond of
mutual
affection
we are making
and maintaining
friendships BEHIND A MASK
insecure
self-conscious
dependent
shy
lonely
a typical
teen
and therefore REINFORCING
the weaknesses of the
MODERN TEENAGER
the reasoning is quite simple.the reasoning is quite simple.
1It’s unavoidable.
if teens aren’t
online, they’re
segregated
from their peers
[Facebook]’s integrated in to everyday event planning,
networking, and decision making... They’re on
Facebook, you sort of have to be.
Carys Mills, ‘Facebook fatigue’ and the aging social network
2It’s addictive.
once you grow accustomed to existing
online, it’s hard to go back
When people are alone, even for a few moments, they
fidget and reach for a device. Here connection works
like a symptom, not a cure, and our constant, reflexive
impulse to connect shapes a new way of being.
Sherry Turkle, The Flight from Conversation
3It’s everywhere.
where teens go, social media
follows
But now, thanks to our smartphones, it is never OK to be
unavailable. Ever. Not for a minute. This expectation of
constant connectivity is making some of us crazy with
insecurity.
Elizabeth Bernstein, He Texts, She Tweets - Are they E-Compatible?
4It’s
deceiving.
teens can
mould their
online
identities to
be who they
want
to be
...Posting let[s] us present the self we want to be. This
means we can edit. And if we wish to, we can delete.
Or retouch: the voice, the flesh, the face, the body.
Sherry Turkle, The Flight from Conversation
5It’s fun.
many teens suffer from the fear
of missing out
We think constant connection will make us feel less
lonely. The opposite is true... If we don’t teach our
children to be alone, they will only know how to be
lonely.
Sherry Turkle, The Flight from Conversation
So here
are THE
reasons
why this
thumbs up
IS A
THUMBS
DOWN
insecure
self-conscious
dependent
shy
lonely
a typical
teen
remember
this
guy?
insecure
self-conscious
dependent
shy
lonely
a typical
teen
The world of social media has allowed platforms like Facebook
and Twitter to play on the human need for reinforcement and
validation. Its game mechanics for “Likes” and “Comments” are
those bits of validation that satisfies.
Hessie Jones, Teaching Our Kids Not to Treat the Internet as a Private Diary
insecure
self-conscious
dependent
shy
lonely
a typical
teen
Studies have shown that the comments on your Facebook profile
picture strongly affect your level of perceived physical, social, and
professional attractiveness.
Christine Erickson, The Social Psychology of the Selfie
insecure
self-conscious
dependent
shy
lonely
a typical
teen
The thought of that tiny splintering red heart spreading across
hundreds of news feeds and everyone you know commenting,
“ohmygod WHAT happened?” can sometimes prolong the
inevitable...
Allison McCann, How Facebook Ruined Dating (And Breaking Up Too)
insecure
self-conscious
dependent
shy
lonely
a typical
teen
There are forums - like the subreddit amiugly, which has more
than 22 000 subscribers - that allow users to give constructive
criticism on self-submitted portraits.
Christine Erickson,The Social Psychology of the Selfie
insecure
self-conscious
dependent
shy
lonely
a typical
teen
...Disclosing more about ourselves online actually lessens
intimacy and satisfaction among romantic couples.
From bullying to relationships: Mapping our online communications
Houston, we have
a problem.
Photo	
 Credits
Slide 1 (girl): Andy Morales
Slide 2 (boys): Gaurav Kandal
Slide 3 (mask): Mo Riza
Slide 4 (Facebook): Michael Brashier
Slide 5 (web): photophilde
Slide 6 (me): Bryn Berry
Slide 8 (trapped man): Aditya Doshi
Slide 10 (cell phone): Louis Volant
Slide 12 (book face): Massimo Barbieri
Slide 14 (kids): Archives of Florida
Slide 16 (thumbs up): Owen W. Brown
Slide 24 (rocket ship): Emilie Hardman
Slide 25 (cameras): See Wah

Contenu connexe

Tendances (10)

Flipbook-Social Media: The Isolated Social World
Flipbook-Social Media: The Isolated Social WorldFlipbook-Social Media: The Isolated Social World
Flipbook-Social Media: The Isolated Social World
 
The End of Business as Usual
The End of Business as Usual The End of Business as Usual
The End of Business as Usual
 
Social Media
Social MediaSocial Media
Social Media
 
Generation Me- Film260
Generation Me- Film260Generation Me- Film260
Generation Me- Film260
 
SocialNetworking
SocialNetworkingSocialNetworking
SocialNetworking
 
Inside out-of-social-media-an-emotional-journey-to-social-network
Inside out-of-social-media-an-emotional-journey-to-social-networkInside out-of-social-media-an-emotional-journey-to-social-network
Inside out-of-social-media-an-emotional-journey-to-social-network
 
Social media,the breath of life
Social media,the breath of lifeSocial media,the breath of life
Social media,the breath of life
 
Block Chapter 2
Block Chapter 2Block Chapter 2
Block Chapter 2
 
Chapter 3 presentation
Chapter 3 presentationChapter 3 presentation
Chapter 3 presentation
 
American Fundraising Professionals Sierra NV Chapter
American Fundraising Professionals Sierra NV ChapterAmerican Fundraising Professionals Sierra NV Chapter
American Fundraising Professionals Sierra NV Chapter
 

En vedette

Social networking 2
Social networking 2Social networking 2
Social networking 2
sunheejune
 

En vedette (8)

Keeping empathy alive: New media and storytelling on disasters
Keeping empathy alive: New media and storytelling on disastersKeeping empathy alive: New media and storytelling on disasters
Keeping empathy alive: New media and storytelling on disasters
 
Sonal Kapoor -- Empathy & Design in Social Entrepreneurship
Sonal Kapoor -- Empathy & Design in Social EntrepreneurshipSonal Kapoor -- Empathy & Design in Social Entrepreneurship
Sonal Kapoor -- Empathy & Design in Social Entrepreneurship
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
Peter Flaschner - Bridging the Online/Offline Gap: How to Build, Engage, and ...
Peter Flaschner - Bridging the Online/Offline Gap: How to Build, Engage, and ...Peter Flaschner - Bridging the Online/Offline Gap: How to Build, Engage, and ...
Peter Flaschner - Bridging the Online/Offline Gap: How to Build, Engage, and ...
 
Social networking 2
Social networking 2Social networking 2
Social networking 2
 
Media processing in the cloud- what, where and how
Media processing in the cloud-  what, where and howMedia processing in the cloud-  what, where and how
Media processing in the cloud- what, where and how
 
How teenagers are using technology in their social lives? - ConsumerLab Ericsson
How teenagers are using technology in their social lives? - ConsumerLab EricssonHow teenagers are using technology in their social lives? - ConsumerLab Ericsson
How teenagers are using technology in their social lives? - ConsumerLab Ericsson
 
Next generation video compression
Next generation video compressionNext generation video compression
Next generation video compression
 

Similaire à Hiding: Exploring the Use of Social Media as a Shield (11)

Fys social media explosion1
Fys social media explosion1Fys social media explosion1
Fys social media explosion1
 
Socialmedia from a psychological perspective
Socialmedia from a psychological perspectiveSocialmedia from a psychological perspective
Socialmedia from a psychological perspective
 
Social Isolation & Neurosis
Social Isolation & NeurosisSocial Isolation & Neurosis
Social Isolation & Neurosis
 
St. Thomas Aquinas - Keep it Sweet
St. Thomas Aquinas - Keep it SweetSt. Thomas Aquinas - Keep it Sweet
St. Thomas Aquinas - Keep it Sweet
 
Social Anxiety Disorder ( Sad )
Social Anxiety Disorder ( Sad )Social Anxiety Disorder ( Sad )
Social Anxiety Disorder ( Sad )
 
Formal - APA Writing Sample
Formal - APA Writing Sample Formal - APA Writing Sample
Formal - APA Writing Sample
 
Krsh.pptx
Krsh.pptxKrsh.pptx
Krsh.pptx
 
Psychological and long-term effects of social media
Psychological and long-term effects of social mediaPsychological and long-term effects of social media
Psychological and long-term effects of social media
 
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptxDIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
DIGITAL-SELFWHO-AM-I-IN-THE-CYBERWORLD.pptxfinal.pptx
 
Theory research
Theory researchTheory research
Theory research
 
Social media dangers
Social media dangersSocial media dangers
Social media dangers
 

Dernier

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Dernier (20)

Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 

Hiding: Exploring the Use of Social Media as a Shield