industryterm:social media sites

  • Neo-Nazis on DeviantArt Radicalized a Woman Who Planned a Mass Shooting - VICE
    https://www.vice.com/en_us/article/zmp5y3/neo-nazis-on-deviantart-radicalized-a-woman-who-planned-a-mass-shooting

    DeviantArt, founded in 2000, is home to millions of users and hundreds of millions of pieces of art. It’s offered a home for marginalized artists and communities to create and share work. If you can visualize it, odds are DeviantArt has it.

    But like many large social media platforms, there exists a small but thriving hive of extremists on DeviantArt, similar to the ones Souvannarath came across. These extremists have created a network of far-right user groups where they create and share far-right propaganda, talk and write about fascism, and recruit vulnerable users.

    The far-right propaganda posted on DeviantArt is then disseminated across the web, which experts say works as a gateway drug to recruitment to neo-Nazi groups.

    Jeremy Blackburn, a professor at the University of Alabama at Birmingham, studies memes and the online spaces of the far-right. Blackburn said that in the far-right ecosystem like 4Chan’s /pol/ board or Gab, images like the ones created and stored on DeviantArt are immensely important.

    "Essentially what is happening is that people’s brains are being hacked, especially in terms of imagery—it’s very digestible, it’s super-duper easy to share,” said Blackburn. “It takes like 15 to 20 seconds, at most, to look at a meme and that’s where I think the danger is. You can become inundated with them and basically read the equivalent of reams of propaganda.”

    When VICE provided spokespeople for DeviantArt with evidence of neo-Nazi content on the site, they referenced the site’s commitment to freedom of artistic expression and its zero tolerance policy for “hate propaganda.”

    “As an art-centric social network, the DeviantArt community has traditionally been allowed a wide range of expression both in comments and in artistic themes,” spokespeople said in an emailed statement. “This is important for a site that aims to represent all artists. However, we draw a hard line when it comes to hate speech that aims to purposely cause pain to others in a hateful way. DeviantArt’s Etiquette Policy clearly states that ‘hate propaganda is met with zero tolerance.’”

    eviantArt was founded at the turn of the millennium by three friends. In 2017, the site was bought by the web development company Wix for $36 million. At the time of purchase, Techcrunch reported that the site had over 40 million members and over 325 million pieces of individual art online.

    While the vast majority of the site is innocuous, if you stumble across the wrong keyword, the website will feed you content ranging from graphic art of neo-Nazis gunning people down to Hitler drawn as an anime girl.

    Fascist groups on DeviantArt have hundreds of members and hundreds of thousands of views. All of the pages are pretty similar, but have a flavour that couldn’t be found anywhere but DeviantArt.

    “We are a group of Fascist, National Socialists, Phalangist, Intergalists, Civic Nationalists, and others who also happen to like anime,” reads the description of one page called Fascist Anime. “The main purpose of the group is to combine fascist propaganda with anime, usually with cute anime girls. Why? Because the internet needed something like this!”

    Souvannarath’s case is one amplified to an extreme degree, but it is an outsized reflection of the way the content economy works. DeviantArt has long been a core source of artwork that powers the rest of the internet’s image and meme-based economy, with original work from DeviantArt spreading throughout the message boards and the rest of the social web. So it goes with DeviantArt’s fascist repositories, with images first posted there later spreading among white supremacist groups on Twitter, Gab, 4Chan, and Reddit.

    Non-hierarchical, but predictable, behaviour from neo-Nazi propagandists is exactly what Blackburn found when researching 4Chan. There, he found that the best art or memes would be curated and shared through a pipeline by power users to other social media sites.

    One propagandist, who goes by the alias “Dark Foreigner” and has been connected to Atomwaffen and its sister groups, has been uploading his propaganda to DeviantArt and cross-linking it to his other accounts for over a year. Dark Foreigner uses the automated DeviantArt system to sell his prints for $4.79 USD a pop. DeviantArt controls the prints section of its website and takes upwards of an 80 percent cut, meaning that if someone buys neo-Nazi propaganda on DeviantArt, the company not only ships it to them, but makes a profit.

    VICE asked DeviantArt questions regarding Dark Foreigner’s business selling propaganda but did not receive any responses. His work remains for sale on the website.

    #Faschosphère #DeviantArt #Wix #Economie_numérique

  • Long untouchable, web giants now know what it feels like to be hunted
    https://www.theguardian.com/commentisfree/2019/feb/10/long-untouchable-web-giants-know-now-what-it-feels-like-to-be-hunted

    Governments, after years of indulgence, are rightly getting tough on social media sites The key question to ask when a shocking tragedy comes to light is this : does it signify a scandal or a crisis ? Scandals happen all the time in societies. They generate a lot of heat, outrage and public angst. But, eventually, the media caravan moves on and nothing much changes. When in 2011, for example, the Guardian printed shocking revelations of tabloid phone-hacking and, particularly, the news (...)

    #Google #Facebook #algorithme #manipulation #domination #écoutes #publicité #hacking (...)

    ##publicité ##profiling
    https://i.guim.co.uk/img/media/931d280d109339807c379f206489366f130862c4/0_343_3500_2100/master/3500.jpg

  • When Was the Las Time You Googled Yourself?
    https://hackernoon.com/when-was-the-las-time-you-googled-yourself-828f024f0a55?source=rss----3a

    By 2025, the world will create 163 zettabytes of data — nearly 55 gigabytes of new data every single day per person. In just under a decade, this information explosion could be more personal than we realize. Today, #google already handles over 3.5 billion searches on a daily basis and it may be surprising how much of that data accounts for our own information.Half of Americans believe that their personal information online is less secure than it was just five years ago — and yet we are sharing more information about ourselves than ever. Social media sites like Facebook and Instagram make it easy to overshare, a bad habit most of us have fallen into at least once. Aside from the TMI factor, oversharing can lead to more sinister outcomes; namely the smart scammers that know how to put two and (...)

    #infographics #cybersecurity #phishing #social-media

  • Trump claims Twitter is stopping him from getting more followers | The Independent
    https://www.independent.co.uk/news/world/americas/us-politics/trump-twitter-followers-tweets-today-facebook-google-democrats-accoun

    Donald Trump has accused Twitter of blocking followers from his account, despite lacking any evidence to support such a claim, in his latest complaint about how he is treated by social media companies.

    The president wrote on Twitter that the site had “made it much more difficult for people to join @realDonaldTrump,” despite his account featuring the same, one-click follow button as any other profile. He also claimed the platform had “removed many names & greatly slowed the level and speed of increase,” suggesting Twitter had targeted him and other Republicans by reducing following counts. 

    Facebook, Twitter and Google are so biased toward the Dems it is ridiculous!” Mr Trump said Tuesday during a series of angry morning tweets. “_They have acknowledged-done NOTHING!

    Twitter and other major social media sites have spent the year purging millions of fake accounts and bots, with countless celebrities — including the president — and regular users alike seeing slight reductions in their followings due to the loss of false profiles.

    The effort has been part of a response to criticism from Congress that companies have not been doing enough to combat efforts at election meddling such as those seen during the 2016 presidential race. In October, Twitter announced it had removed at least nine million accounts as part of an effort that had been underway since July. 

    Facebook has also been steadily purging fake accounts throughout the year, and executives from all three platforms the president attacked on Twitter have testified before Congress in 2018 about their company’s responses to the spread of disinformation, Russian interference in the 2016 election and other issues. 

    It was previously reported the president’s personal Twitter handle, @realDonaldTrump, was followed by millions of fake accounts and bots. During one purge in July, Mr Trump lost at least 300,000 followers.

    Gallup conducted a survey in May that found nearly 15m — 29 per cent — of Mr Trump’s Twitter followings appeared to be fake accounts. 

    The president has a Twitter following of 56.3m as of Tuesday, compared to his predecessor, Barack Obama, who has a following of 104m. 

    The same Gallup survey found Mr Obama’s following to have a fake following of nearly 15 per cent. 

    The tweets from the president come a day after a pair of reports were released by the Senate Intelligence Committee said Moscow’s interference in the 2016 election was more widespread than previously thought and aimed at dividing Americans.

  • Amazon is investigating claims that employees deleted reviews and sold sales data to sellers
    https://www.theverge.com/2018/9/16/17867358/amazon-investigation-employee-seller-bribery-internal-data-deleting-negati

    Employees have reportedly turned over proprietary sales information, deleted negative reviews, turned over reviewer e-mail addresses, or unbanned banned accounts On Sunday, The Wall Street Journal published a report that revealed that sellers have bribed Amazon employees to get access to internal sales data or to delete negative reviews, and that the company has launched an investigation into the practice. According to the report, middlemen use social media sites like WeChat to track down (...)

    #Amazon #corruption

  • Stepping Back From Technology #addiction
    https://hackernoon.com/stepping-back-from-technology-addiction-a97fc3a1b9bb?source=rss----3a814

    “Nearly everyone I know is addicted in some measure to the Internet,” wrote Tony Schwartz in an essay in The New York Times. It’s a common complaint these days. A steady stream of similar headlines accuse the Net and its offspring apps, social media sites and online games of addicting us to distraction.There’s little doubt that nearly everyone who comes in contact with the Net has difficulty disconnecting. Just look around. People everywhere are glued to their devices. Many of us, like Schwartz, struggle to stay focused on tasks that require more concentration than it takes to post a status update. As one person ironically put it in the comments section of Schwartz’s online article, “As I was reading this very excellent article, I stopped at least half a dozen times to check my (...)

    #startup #tech #technology-addiction #tech-addiction

  • Can #blockchain Stop The Mass Social Media Exit?
    https://hackernoon.com/can-blockchain-stop-the-mass-social-media-exit-479fb4239c44?source=rss--

    https://medium.com/media/33ab014606c1b2519fe6b5850914b4f9/hrefPeople are starting to get tired of social media. In fact, according to recent findings, 4 in 10 people have deleted a social media account in the past year. The key reasons given for the mass exodus are privacy issues and the rapid circulation of violent content and fake news.With top social media sites such as Facebook and Twitter in the limelight for misusing users’ data, the public trust in social media is on a downward spiral. As traditional social media continue to lose popularity, a new and more advanced way of connecting people is gaining traction.The main goal of the blockchain based social media approach is to prioritize connecting high-level data security while also connecting people. For security, the distributed (...)

    #social-media #social-media-exit #social-media-blockchain

  • How #blockchain Can Help SMBs Compete with the Big Dogs
    https://hackernoon.com/how-blockchain-can-help-smbs-compete-with-the-big-dogs-865dc2c06528?sour

    image source: UnsplashA few days ago, Mark Zuckerberg, the founder of Facebook, testified before Congress about the measures taken by the social media giant to protect users’ data. And if there is a theme that emerged in the testimony, it is the significant role that big data analytics play in business success.It is no wonder that a good number of the world largest corporations including Facebook, Google, and Twitter are in the business of selling marketing insights. One area of big data analytics that has recently attracted a lot of attention from corporations, politicians, and government agencies in sentiment analysis.This method involves analyzing comments and suggestions left on social media sites and identifying their attitude towards a brand by using variables such as emotion, (...)

    #smb #smb-blockchain #small-business #blockchain-for-smbs

  • The Laborers Who Keep Dick Pics and Beheadings Out of Your Facebook Feed | WIRED
    https://www.wired.com/2014/10/content-moderation

    Les travailleurs et travailleuses sous-payées du nettoyage dans le cyberespace. Un article ancien, pourtant toujours d’actualité. Et ce ne sont pas les intelligences artificielles qui résoudront ce problème.

    Baybayan is part of a massive labor force that handles “content moderation”—the removal of offensive material—for US social-networking sites. As social media connects more people more intimately than ever before, companies have been confronted with the Grandma Problem: Now that grandparents routinely use services like Facebook to connect with their kids and grandkids, they are potentially exposed to the Internet’s panoply of jerks, racists, creeps, criminals, and bullies. They won’t continue to log on if they find their family photos sandwiched between a gruesome Russian highway accident and a hardcore porn video. Social media’s growth into a multibillion-dollar industry, and its lasting mainstream appeal, has depended in large part on companies’ ability to police the borders of their user-generated content—to ensure that Grandma never has to see images like the one Baybayan just nuked.

    “EVERYBODY HITS THE WALL. YOU JUST THINK, ‘HOLY SHIT, WHAT AM I SPENDING MY DAY DOING?’”

    So companies like Facebook and Twitter rely on an army of workers employed to soak up the worst of humanity in order to protect the rest of us. And there are legions of them—a vast, invisible pool of human labor. Hemanshu Nigam, the former chief security officer of MySpace who now runs online safety consultancy SSP Blue, estimates that the number of content moderators scrubbing the world’s social media sites, mobile apps, and cloud storage services runs to “well over 100,000”—that is, about twice the total head count of Google and nearly 14 times that of Facebook.

    This work is increasingly done in the Philippines.

    #Fake_news #Modération #Hébergeurs

  • Twitter Followers Vanish Amid Inquiries Into Fake Accounts - The New York Times
    https://www.nytimes.com/interactive/2018/01/31/technology/social-media-bots-investigations.html

    More than a million followers have disappeared from the accounts of dozens of prominent Twitter users in recent days as the company faces growing criticism over the proliferation of fake accounts and scrutiny from federal and state inquiries into the shadowy firms that sell fake followers.

    The people losing followers include an array of entertainers, entrepreneurs, athletes and media figures, many of whom bought Twitter followers or artificial engagement from a company called Devumi. Its business practices were detailed in a New York Times article on Saturday describing a vast trade in fake followers and fraudulent engagement on Twitter and other social media sites, often using personal information taken from real users. Twitter said on Saturday that it would take action against Devumi’s practices. A Twitter spokeswoman on Tuesday declined to comment about whether the company was purging fake accounts.

    “I don’t think your user handle or profile has to reflect your actual name or picture,” Mr. Cuban said. “I do think Twitter would benefit from requiring every account(s) being tied back to an individual. If someone wants to run a bot account, great, but identify a person behind it.”

    Some federal and state lawmakers have called for more stringent laws regulating social media companies, in part to combat the epidemic of fake accounts. Many fake accounts are deployed by Russia and other countries seeking to influence American politics, but others are used by marketing companies to influence consumers and even policymakers.

    Marc Levine, a California state assemblyman from outside San Francisco, introduced legislation on Monday that would require social media companies doing business in California to link every account to a human being. The legislation would also require that social media companies allow only human account holders to place advertisements on their platforms.

    #Twitter #Faux_comptes #Followers

  • Hashtag | WP

    #Hashtag, #Metadata_tag
    https://en.wikipedia.org/wiki/Hashtag

    #Mot-dièse, marqueur de #métadonnées
    https://fr.wikipedia.org/wiki/Hashtag

    #Meta-Kommentierung
    https://de.wikipedia.org/wiki/Hashtag

    [...]

    The pound sign [hashtag /oAnth] was adopted for use within IRC networks circa 1988 to label groups and topics.[9] Channels or topics that are available across an entire IRC network are prefixed with a hash symbol # (as opposed to those local to a server, which use an ampersand ‘&’).[10]

    The use of the pound sign in IRC inspired[11] Chris Messina to propose a similar system to be used on Twitter to tag topics of interest on the #microblogging network.[12] He posted the first hashtag on Twitter:

    How do you feel about using # (pound) for groups. As in #barcamp [msg]?
    — Chris Messina, ("factoryjoe"), August 23, 2007[13]

    Messina’s suggestion to use the hashtag was not adopted by Twitter, but the practice took off after hashtags were widely used in tweets relating to the 2007 San Diego forest fires in Southern California.[14][15]

    According to Messina, he suggested use of the hashtag to make it easy for “lay” users to search for content and find specific relevant updates; they are for people who do not have the technological knowledge to navigate the site. Therefore, the hashtag “was created organically by Twitter users as a way to categorize messages." [16]

    Internationally, the hashtag became a practice of writing style for Twitter posts during the 2009–2010 Iranian election protests; Twitter users inside and outside Iran used both English- and Persian-language hashtags in communications during the events.[17]

    The first published use of the term “hash tag” was in a blog post by Stowe Boyd, “Hash Tags = Twitter Groupings,”[18] on August 26, 2007, according to lexicographer Ben Zimmer, chair of the American Dialect Society’s New Words Committee.

    Beginning July 2, 2009,[19] Twitter began to #hyperlink all hashtags in tweets to Twitter search results for the hashtagged word (and for the standard spelling of commonly misspelled words). In 2010, Twitter introduced “Trending Topics” on the Twitter front page, displaying hashtags that are rapidly becoming popular. Twitter has an algorithm to tackle attempts to spam the trending list and ensure that hashtags trend naturally.[20]

    Although the hashtag started out most popularly on Twitter as the main social media platform for this use, the use has extended to other social media sites including Instagram, Facebook, Flickr, Tumblr, and Google+.[21]

    […]

    #Style

    On #microblogging or #social_networking sites, hashtags can be inserted anywhere within a sentence, either preceding it, following it as a postscript, or being included as a word within the sentence (e.g. “It is [hushtag]sunny today”).

    The quantity of hashtags used in a post or tweet is just as important as the types of hashtags used. It is currently considered acceptable to tag a post once when contributing to a specific conversation. Two hashtags are considered acceptable when adding a location to the conversation. Three hashtags are seen by some as the “absolute maximum”, and any contribution exceeding this risks “raising the ire of the community.”[24]

    As well as frustrating other users, the misuse of hashtags can lead to account suspensions. Twitter warns that adding hashtags to unrelated tweets, or repeated use of the same hashtag without adding to a conversation, could cause an account to be filtered from search, or even suspended.

    […]

    via https://diasp.eu/p/5930657

    #histoire_numérique #signe_fonctionel #fonction_formatique #usage #réseaux_sociaux #métadonnées

  • WaPo: UAE Hacked Qatar to Invent Pretense for Retaliation – Mother Jones

    http://www.motherjones.com/kevin-drum/2017/07/wapo-uae-hacked-qatar-to-invent-pretense-for-retaliation

    As you know, Saudi Arabia and other Gulf countries have imposed a blockade on Qatar, allegedly due to concerns over Qatar’s support for various and sundry terrorist groups. The blockade began in May, after Qatar’s official news agency published incendiary remarks from Qatar’s leader, and then claimed they had been hacked:

    The fake article quoted Qatar emir Sheikh Tamim bin Hamad Al Thani as calling Iran an “Islamic power” and saying Qatar’s relations with Israel were “good” during a military ceremony.

    The Qatari state television’s nightly newscast…scrolling ticker…included calling Hamas “the legitimate representative of the Palestinian people,” as well as saying Qatar had “strong relations” with Iran and the United States. “Iran represents a regional and Islamic power that cannot be ignored and it is unwise to face up against it,” the ticker read at one point. “It is a big power in the stabilization of the region.”

    Hacked? Get serious. Does anyone seriously believe that—

    The United Arab Emirates orchestrated the hacking of Qatari government news and social media sites in order to post incendiary false quotes attributed to Qatar’s emir, Sheikh Tamim Bin Hamad al-Thani, in late May that sparked the ongoing upheaval between Qatar and its neighbors, according to U.S. intelligence officials.

    Officials became aware last week that newly analyzed information gathered by U.S. intelligence agencies confirmed that on May 23, senior members of the UAE government discussed the plan and its implementation. The officials said it remains unclear whether the UAE carried out the hacks itself or contracted to have them done.

    That’s from the Washington Post. The UAE denies everything, of course.

    This is a very big deal. For starters, what are the odds that the UAE did this alone? Pretty slim, I think. Saudi Arabia was almost certainly involved too. And what does President Trump do now? He’s taken the Saudi side of this dispute, but now his own intelligence agencies are telling him that other Arab countries conducted the hack as a deliberate way of giving themselves an excuse to create the blockade. In fact, he probably learned this a week ago.

    Someone in the intelligence community apparently decided that (a) Trump was never going to go public with this, and (b) it really needed to become public. But who? And why?

  • Alleged Mosul phosphorus attack ‘smoke screen’ to protect civilians : Army
    http://www.kurdistan24.net/en/news/750ba96d-69ae-4175-91bb-71f5682bc044

    ERBIL, Kurdistan Region (Kurdistan24) – The Iraqi army on Sunday denied using white phosphorus while shelling Islamic State (IS) positions in western Mosul.

    In a statement, the Iraqi Joint Operations Command in Mosul rejected reports of the use of white phosphorus by Iraqi and coalition warplanes in Mosul.

    The report stated the alleged chemical attack was an “intentional smoke screen to protect civilian lives.”

    The statement said some news and social media sites published inaccurate reports on the use of phosphorus during the military operations against IS in Mosul.

    On June 3, several civilians were fleeing IS-held areas toward the Iraqi security forces near Jimhuri hospital in western Mosul, and there was the danger of being targeted by IS snipers, the statement added.

    “We relied on the international coalition to launch smoke screen attacks to hide the movement of the civilians from the IS extremists’ line of sight,” the report continued.

    “[We wanted] to give the civilians a chance to flee toward the Iraqi forces,” the statement informed, stating the forces “succeeded in rescuing the civilians and protecting their lives.”

    The Iraqi command explained that such smoke screen attacks were previously used in several areas in eastern and western Mosul for the purpose of protecting civilians from enemy fire.

    Iraqi air forces on Saturday heavily shelled IS insurgents in the al-Zinjili neighborhood located in western Mosul.

    While Kurdistan24 was streaming live from the region, Iraqi forces repeatedly struck the militant group’s positions in the area.

    The shelling seen in the footage shows white smoke rising from air raids.

    #Irak images #EI de bombardements au phosphore blanc du centre hospitalier #Mossoul ouest datées d’aujourd’hui
    https://twitter.com/SimNasr/status/871295988023136256

  • Unlike Us | About
    http://networkcultures.org/unlikeus/about

    Invitation to join the network (a series of events, reader, workshops, online debates, campaigns etc.)

    Concept: Geert Lovink (Institute of Network Cultures/HvA, Amsterdam) and Korinna Patelis (Cyprus University of Technology, Limassol)

    Thanks to Marc Stumpel, Sabine Niederer, Vito Campanelli, Ned Rossiter, Michael Dieter, Oliver Leistert, Taina Bucher, Gabriella Coleman, Ulises Mejias, Anne Helmond, Lonneke van der Velden, Morgan Currie and Eric Kluitenberg for their input.

    Summary
    The aim of Unlike Us is to establish a research network of artists, designers, scholars, activists and programmers who work on ‘alternatives in social media’. Through workshops, conferences, online dialogues and publications, Unlike Us intends to both analyze the economic and cultural aspects of dominant social media platforms and to propagate the further development and proliferation of alternative, decentralized social media software.

    Whether or not we are in the midst of internet bubble 2.0, we can all agree that social media dominate internet and mobile use. The emergence of web-based user to user services, driven by an explosion of informal dialogues, continuous uploads and user generated content have greatly empowered the rise of participatory culture. At the same time, monopoly power, commercialization and commodification are also on the rise with just a handful of social media platforms dominating the social web. These two contradictory processes – both the facilitation of free exchanges and the commercial exploitation of social relationships – seem to lie at the heart of contemporary capitalism.

    On the one hand new media create and expand the social spaces through which we interact, play and even politicize ourselves; on the other hand they are literally owned by three or four companies that have phenomenal power to shape such interaction. Whereas the hegemonic Internet ideology promises open, decentralized systems, why do we, time and again, find ourselves locked into closed corporate environments? Why are individual users so easily charmed by these ‘walled gardens’? Do we understand the long-term costs that society will pay for the ease of use and simple interfaces of their beloved ‘free’ services?

    The accelerated growth and scope of Facebook’s social space, for example, is unheard of. Facebook claims to have 700 million users, ranks in the top two or three first destination sites on the Web worldwide and is valued at 50 billion US dollars. Its users willingly deposit a myriad of snippets of their social life and relationships on a site that invests in an accelerated play of sharing and exchanging information. We all befriend, rank, recommend, create circles, upload photos, videos and update our status. A myriad of (mobile) applications orchestrate this offer of private moments in a virtual public, seamlessly embedding the online world in users’ everyday life.

    Yet despite its massive user base, the phenomena of online social networking remains fragile. Just think of the fate of the majority of social networking sites. Who has ever heard of Friendster? The death of Myspace has been looming on the horizon for quite some time. The disappearance of Twitter and Facebook – and Google, for that matter – is only a masterpiece of software away. This means that the protocological future is not stationary but allows space for us to carve out a variety of techno-political interventions. Unlike Us is developed in the spirit of RSS-inventor and uberblogger Dave Winer whose recent Blork project is presented as an alternative for ‘corporate blogging silos’. But instead of repeating the entrepreneurial-start-up-transforming-into-corporate-behemoth formula, isn’t it time to reinvent the internet as a truly independent public infrastructure that can effectively defend itself against corporate domination and state control?

    Agenda
    Going beyond the culture of complaint about our ignorance and loss of privacy, the proposed network of artists, scholars, activists and media folks will ask fundamental and overarching questions about how to tackle these fast-emerging monopoly powers. Situated within the existing oligopoly of ownership and use, this inquiry will include the support of software alternatives and related artistic practices and the development of a common alternative vision of how the techno-social world might be mediated.

    Without falling into the romantic trap of some harmonious offline life, Unlike Us asks what sort of network architectures could be designed that contribute to ‘the common’, understood as a shared resource and system of collective production that supports new forms of social organizations (such as organized networks) without mining for data to sell. What aesthetic tactics could effectively end the expropriation of subjective and private dimensions that we experience daily in social networks? Why do we ignore networks that refuse the (hyper)growth model and instead seek to strengthen forms of free cooperation? Turning the tables, let’s code and develop other ‘network cultures’ whose protocols are no longer related to the logic of ‘weak ties’. What type of social relations do we want to foster and discover in the 21st century? Imagine dense, diverse networked exchanges between billions of people, outside corporate and state control. Imagine discourses returning subjectivities to their ‘natural’ status as open nodes based on dialogue and an ethics of free exchange.

    To a large degree social media research is still dominated by quantitative and social scientific endeavors. So far the focus has been on moral panics, privacy and security, identity theft, self-representation from Goffman to Foucault and graph-based network theory that focuses on influencers and (news) hubs. What is curiously missing from the discourse is a rigorous discussion of the political economy of these social media monopolies. There is also a substantial research gap in understanding the power relations between the social and the technical in what are essentially software systems and platforms. With this initiative, we want to shift focus away from the obsession with youth and usage to the economic, political, artistic and technical aspects of these online platforms. What we first need to acknowledge is social media’s double nature.

    Dismissing social media as neutral platforms with no power is as implausible as considering social media the bad boys of capitalism. The beauty and depth of social media is that they call for a new understanding of classic dichotomies such as commercial/political, private/public, users/producers, artistic/standardised, original/copy, democratising/ disempowering. Instead of taking these dichotomies as a point of departure, we want to scrutinise the social networking logic. Even if Twitter and Facebook implode overnight, the social networking logic of befriending, liking and ranking will further spread across all aspects of life.

    The proposed research agenda is at once a philosophical, epistemological and theoretical investigation of knowledge artifacts, cultural production and social relations and an empirical investigation of the specific phenomenon of monopoly social media. Methodologically we will use the lessons learned from theoretical research activities to inform practice-oriented research, and vice-versa. Unlike Us is a common initiative of the Institute of Network Cultures (Amsterdam University of Applied Science HvA) and the Cyprus University of Technology in Limassol.

    An online network and a reader connected to a series of events initially in Amsterdam and Cyprus (early 2012) are already in planning. We would explicitly like to invite other partners to come on board who identify with the spirit of this proposal, to organize related conferences, festivals, workshops, temporary media labs and barcamps (where coders come together) with us. The reader (tentatively planned as number 8 in the Reader series published by the INC) will be produced mid-late 2012. The call for contributions to the network, the reader and the event series goes out in July 2011, followed by the publicity for the first events and other initiatives by possible new partners.

    Topics of Investigation
    The events, online platform, reader and other outlets may include the following topics inviting theoretical, empirical, practical and art-based contributions, though not every event or publication might deal with all issues. We anticipate the need for specialized workshops and barcamps.

    1. Political Economy: Social Media Monopolies
    Social media culture is belied in American corporate capitalism, dominated by the logic of start-ups and venture capital, management buyouts, IPOs etc. Three to four companies literally own the Western social media landscape and capitalize on the content produced by millions of people around the world. One thing is evident about the market structure of social media: one-to-many is not giving way to many-to-many without first going through many-to-one. What power do these companies actually have? Is there any evidence that such ownership influences user-generated content? How does this ownership express itself structurally and in technical terms?

    What conflicts arise when a platform like Facebook is appropriated for public or political purposes, while access to the medium can easily be denied by the company? Facebook is worth billions, does that really mean something for the average user? How does data-mining work and what is its economy? What is the role of discourse (PR) in creating and sustaining an image of credibility and trustworthiness, and in which forms does it manifest to oppose that image? The bigger social media platforms form central nodes, such as image upload services and short ulr services. This ecology was once fairly open, with a variety of new Twitter-related services coming into being, but now Twitter takes up these services itself, favoring their own product through default settings; on top of that it is increasingly shutting down access to developers, which shrinks the ecology and makes it less diverse.

    2. The Private in the Public
    The advent of social media has eroded privacy as we know it, giving rise to a culture of self-surveillance made up of myriad voluntary, everyday disclosures. New understandings of private and public are needed to address this phenomenon. What does owning all this user data actually mean? Why are people willing to give up their personal data, and that of others? How should software platforms be regulated?

    Is software like a movie to be given parental guidance? What does it mean that there are different levels of access to data, from partner info brokers and third-party developers to the users? Why is education in social media not in the curriculum of secondary schools? Can social media companies truly adopt a Social Network Users’ Bill of Rights?

    3. Visiting the Belly of the Beast
    The exuberance and joy that defined the dotcom era is cliché by now. IT use is occurring across the board, and new labour conditions can be found everywhere. But this should not keep our eyes away from the power relations inside internet companies. What are the geopolitical lines of distribution that define the organization and outsourcing taking place in global IT companies these days? How is the industry structured and how does its economy work?

    Is there a broader connection to be made with the politics of land expropriation and peasant labour in countries like India, for instance, and how does this analytically converge with the experiences of social media users? How do monopolies deal with their employees’ use of the platforms? What can we learn from other market sectors and perspectives that (critically) reflect on, for example, techniques of sustainability or fair trade?

    4. Artistic Responses to Social Media
    Artists are playing a crucial role in visualizing power relationships and disrupting subliminal daily routines of social media usage. Artistic practice provides an important analytical site in the context of the proposed research agenda, as artists are often first to deconstruct the familiar and to facilitate an alternative lens to understand and critique these media. Is there such a thing as a social ‘web aesthetics’? It is one thing to criticize Twitter and Facebook for their primitive and bland interface designs. How can we imagine the social in different ways? And how can we design and implement new interfaces to provide more creative freedom to cater to our multiple identities? Also, what is the scope of interventions with social media, such as, for example, the ‘dislike button’ add-on for Facebook? And what practices are really needed? Isn’t it time, for example, for a Facebook ‘identity correction’?

    5. Designing culture: representation and software
    Social media offer us the virtual worlds we use every day. From Facebook’s ‘like’ button to blogs’ user interface, these tools empower and delimit our interactions. How do we theorize the plethora of social media features? Are they to be understood as mere technical functions, cultural texts, signifiers, affordances, or all these at once? In what ways do design and functionalities influence the content and expressions produced? And how can we map and critique this influence? What are the cultural assumptions embedded in the design of social media sites and what type of users or communities do they produce?

    To answer the question of structure and design, one route is to trace the genealogy of functionalities, to historicize them and look for discursive silences. How can we make sense of the constant changes occurring both on and beyond the interface? How can we theorize the production and configuration of an ever-increasing algorithmic and protocological culture more generally?

    6. Software Matters: Sociotechnical and Algorithmic Cultures
    One of the important components of social media is software. For all the discourse on sociopolitical power relations governed by corporations such as Facebook and related platforms, one must not forget that social media platforms are thoroughly defined and powered by software. We need critical engagement with Facebook as software. That is, what is the role of software in reconfiguring contemporary social spaces? In what ways does code make a difference in how identities are formed and social relationships performed? How does the software function to interpellate users to its logic? What are the discourses surrounding software?

    One of the core features of Facebook for instance is its news feed, which is algorithmically driven and sorted in its default mode. The EdgeRank algorithm of the news feed governs the logic by which content becomes visible, acting as a modern gatekeeper and editorial voice. Given its 700 million users, it has become imperative to understand the power of EdgeRank and its cultural implications. Another important analytical site for investigation are the ‘application programming interfaces’ (APIs) that to a large extent made the phenomenal growth of social media platforms possible in the first place. How have APIs contributed to the business logic of social media? How can we theorize social media use from the perspective of the programmer?

    7. Genealogies of Social Networking Sites
    Feedback in a closed system is a core characteristic of Facebook; even the most basic and important features, such as ‘friending’, traces back to early cybernetics’ ideas of control. While the word itself became lost in various transitions, the ideas of cybernetics have remained stable in fields such as artificial intelligence, robotics and the biopolitical arena. Both communication and information theories shaped this discourse. How does Facebook relate to such an algorithmic shape of social life? What can Facebook teach us about the powers of systems theory? Would Norbert Wiener and Niklas Luhmann be friends on Facebook?

    8. Is Research Doomed?
    The design of Facebook excludes the third person perspective, as the only way in is through ones own profile. What does this inbuilt ‘me-centricity’ imply for social media research? Does it require us to rethink the so-called objectivity of researchers and the detached view of current social research? Why is it that there are more than 200 papers about the way people use Facebook, but the site is ‘closed’ to true quantitative inquiry? Is the state of art in social media research exemplary of the ‘quantitative turn’ in new media research? Or is there a need to expand and rethink methods of inquiry in social media research? Going beyond the usual methodological approaches of the quantitative and qualitative, we seek to broaden the scope of investigating these media. How can we make sense of the political economy and the socio-technical elements, and with what means? Indeed, what are our toolkits for collective, transdisciplinary modes of knowledge and the politics of refusal?

    9. Researching Unstable Ontologies
    Software destabilizes Facebook as a solid ontology. Software is always in becoming and so by nature ontogenetic. It grows and grows, living off of constant input. Logging on one never encounters the same content, as it changes on an algorithmic level and in terms of the platform itself. What does Facebook’s fluid nature imply for how we make sense of and study it? Facebook for instance willingly complicates research: 1. It is always personalized (see Eli Pariser). Even when creating ‘empty’ research accounts it never gives the same results compared to other people’s empty research accounts. 2. One must often be ‘inside’ social media to study it. Access from the outside is limited, which reinforces the first problem. 3. Outside access is ideally (for Facebook and Twitter) arranged through carefully regulated protocols of APIs and can easily be restricted. Next to social media as a problem for research, there is also the question of social research methods as intervention.

    10. Making Sense of Data: Visualization and Critique
    Data representation is one of the most important battlefields nowadays. Indeed, global corporations build their visions of the world increasingly based on and structured around complex data flows. What is the role of data today and what are the appropriate ways in which to make sense of the burgeoning datasets? As data visualization is becoming a powerful buzzword and social research increasingly uses digital tools to make ‘beautiful’ graphs and visualizations, there is a need to take a step back and question the usefulness of current data visualization tools and to develop novel analytical frameworks through which to critically grasp these often simplified and nontransparent ways of representing data.

    Not only is it important to develop new interpretative and visual methods to engage with data flows, data itself needs to be questioned. We need to ask about data’s ontological and epistemological nature. What is it, who is the producer, for whom, where is it stored? In what ways do social media companies’ terms of service regulate data? Whether alternative social media or monopolistic platforms, how are our data-bodies exactly affected by changes in the software?

    11. Pitfalls of Building Social Media Alternatives
    It is not only important to critique and question existing design and socio-political realities but also to engage with possible futures. The central aim of this project is therefore to contribute and support ‘alternatives in social media’. What would the collective design of alternative protocols and interfaces look like? We should find some comfort in the small explosion of alternative options currently available, but also ask how usable these options are and how real is the danger of fragmentation. How have developers from different initiatives so far collaborated and what might we learn from their successes and failures? Understanding any early failures and successes of these attempts seems crucial.

    A related issue concerns funding difficulties faced by projects. Finally, in what ways does regionalism (United States, Europe, Asia) feed into the way people search for alternatives and use social media.

    12. Showcasing Alternatives in Social Media
    The best way to criticize platform monopolies is to support alternative free and open source software that can be locally installed. There are currently a multitude of decentralized social networks in the making that aspire to facilitate users with greater power to define for themselves with whom share their data. Let us look into the wildly different initiatives from Crabgrass, Appleseed, Diaspora, NoseRub, BuddyCloud, Protonet, StatusNet, GNU Social, Lorea and OneSocialWeb to the distributed Twitter alternative Thimbl.

    In which settings are these initiative developed and what choices are made for their design? Let’s hear from the Spanish activists who have recently made experiences with the n-1.cc platform developed by Lorea. What community does this platform enable? While traditional software focuses on the individual profile and its relation to the network and a public (share with friends, share with friends of friends, share with public), the Lorea software for instance asks you with whom to share an update, picture or video. It finegrains the idea of privacy and sharing settings at the content level, not the user’s profile. At the same time, it requires constant decision making, or else a high level of trust in the community you share your data with. And how do we experience the transition from, or interoperability with, other platforms? Is it useful to make a distinction between corporate competitors and grassroots initiatives? How can these beta alternatives best be supported, both economically and socially? Aren’t we overstating the importance of software and isn’t the availability of capital much bigger in determining the adoption of a platform?

    13. Social Media Activism and the Critique of Liberation Technology
    While the tendency to label any emergent social movement as the latest ‘Twitter revolution’ has passed, a liberal discourse of ‘liberation technology’ (information and communication technologies that empower grassroots movements) continues to influence our ideas about networked participation. This discourse tends to obscure power relations and obstruct critical questioning about the capitalist institutions and superstructures in which these technologies operate. What are the assumptions behind this neo-liberal discourse? What role do ‘developed’ nations play when they promote and subsidize the development of technologies of circumvention and hacktivism for use in ‘underdeveloped’ states, while at the same time allowing social media companies at home to operate in increasingly deregulated environments and collaborating with them in the surveillance of citizens at home and abroad? What role do companies play in determining how their products are used by dissidents or governments abroad? How have their policies and Terms of Use changed as a result?

    14. Social Media in the Middle East and Beyond
    The justified response to downplay the role of Facebook in early 2011 events in Tunisia and Egypt by putting social media in a larger perspective has not taken off the table the question of how to organize social mobilizations. Which specific software do the ‘movements of squares’ need? What happens to social movements when the internet and ICT networks are shut down? How does the interruption of internet services shift the nature of activism? How have repressive and democratic governments responded to the use of ‘liberation technologies’? How do these technologies change the relationship between the state and its citizens? How are governments using the same social media tools for surveillance and propaganda or highjacking Facebook identities, such as happened in Syria? What is Facebook’s own policy when deleting or censoring accounts of its users?

    How can technical infrastructures be supported which are not shutdown upon request? How much does our agency depend on communication technology nowadays? And whom do we exclude with every click? How can we envision ‘organized networks’ that are based on ’strong ties’ yet open enough to grow quickly if the time is right? Which software platforms are best suited for the ‘tactical camping’ movements that occupy squares all over the world?

    15. Data storage: social media and legal cultures
    Data that is voluntarily shared by social media users is not only used for commercial purposes, but is also of interest to governments. This data is stored on servers of companies that are bound to the specific legal culture and country. This material-legal complex is often overlooked. Fore instance, the servers of Facebook and Twitter are located in the US and therefore fall under the US jurisdiction. One famous example is the request for the Twitter accounts of several activists (Gonggrijp, Jónsdóttir, Applebaum) affiliated with Wikileaks projects by the US government. How do activists respond and how do alternative social media platforms deal with this issue?

  • ACLU finds social media sites gave data to company tracking black protesters
    https://www.theguardian.com/technology/2016/oct/11/aclu-geofeedia-facebook-twitter-instagram-black-lives-matter

    Facebook, Twitter and Instagram have previously provided users’ data to a software company that aids police surveillance programs and targets protesters of color, according to government records obtained by the American Civil Liberties Union. The ACLU revealed on Tuesday that the technology corporations gave “special access” to Geofeedia, a controversial social media monitoring company that partners with law enforcement and has marketed its services as a tool to track Black Lives Matter (...)

    #Facebook #Twitter #Instagram #profiling #web #activisme #surveillance #ACLU #Geofeedia

  • How Internet censorship protects Iranian businesses - Al-Monitor : the Pulse of the Middle East
    http://www.al-monitor.com/pulse/originals/2015/11/iran-filtering-policies.html#

    Passionnant, à tous points de vue.

    Fear of political unrest has long been stated as the main reason for the government’s Internet censorship policy. Yet, while political concerns remain significant, they no longer constitute the main motivation for restricting access to some websites. Tech-savvy young Iranians bypass censorship on a daily basis using a variety of anti-filtering technologies. Indeed, the key motivation for the Iranian authorities’ restrictive Internet policy is economic in nature. These days, social media sites and the Internet in general are increasingly being looked at through an economic lens in Iran. This shift is the result of two main developments: first; the government’s relative success with containing security risks presented by the web, and second, an increasing realization of the business potential of the Internet — including social media.

    #iran #tic_arabes

  • Israelis Who Are Lost to Democracy - Opinion - Israel News - Haaretz Israeli News Source
    http://www.haaretz.com/opinion/.premium-1.683421

    Israel is perpetrating horrors in the territories at a frequency and degree never seen before. Not that most Israelis seem to care.
    Gideon Levy Oct 31, 2015 8:15 PM

    The Palestinians did not win (and presumably never will win), but Israel lost once again. The remnants of its humanity are being erased with frightening and unprecedented speed. Horrors are being perpetrated in the occupied territories at a frequency and degree never seen before.

    The stones or stabbings that could justify such crimes have not yet been created – and are greeted with a shrug of the shoulder by the Israeli public. Its exposure to the behavior of its soldiers and police officers is always mediated by the Israeli media, which can be counted upon to blur, polish and hide as much as possible. But social media sites spit out the images, horror after horror. One glance and you are embarrassed; one more and a sense of nausea mixed with anger overwhelms you.

    What didn’t happen this weekend (apart from the stabbings, which resulted in minor Israeli injuries): An 8-month-old Palestinian baby died, allegedly from inhaling tear gas at Beit Fajjar, south of Bethlehem. “We’ll fire tear gas at you until you die. Children, adults, old people, everyone, everything – we won’t leave a single one of you,” barked a Border Police officer into the speaker of his armored jeep in the Al-Aida refugee camp, in the name of all Israelis.

    A different Border Police jeep deliberately ran over a Palestinian who was throwing stones near Beit El. What happened next is difficult to watch: The badly injured Palestinian lies on the ground, Border Police troops kick him and rudely repel the Palestinian rescue teams before they can treat him.

    Another Border Police officer, in a different place, hits a gas mask-wearing journalist who dared to take pictures. Somewhere else, pepper spray is spritzed directly into the face of a photographer, who falls down, his face contorted in pain.
    Ahmed Manasra, the 13-year-old boy who allegedly stabbed two Israelis, wounding them seriously, was brought to a remand hearing in handcuffs. He is being charged with attempted murder, but prosecutors will try to drag out the proceedings for more than two months, until he turns 14. Then he will face decades in prison if convicted – and that is all but guaranteed. The demure prosecutor has promised to pursue “terrorists” of “any age.”

    Israel graciously deigned to return the bodies of seven Palestinians after a sickening delay that led to outbursts of rage in the territories. The bodies of assailants who were shot to death are stripped by soldiers and police officers in public, the images of their naked bodies shared on social media. The lust for demolishing the homes of terrorists – quickly and in large quantity – cannot be satisfied. A civilian, Mashiah Ben Ami, boasts that he fired no fewer than 15 bullets at a Palestinian who tried to stab him and tore his shirt.

    The debate over a shoot-to-kill policy, using live bullets, toward any person who stabs or wields a knife, regardless of dangerousness, has not even begun in Israel. It never will. Over 70 Palestinians have been killed in this manner since the beginning of the uprising.
    It is tumultuous, this uprising, and it’s the most predictable thing that ever happened here. It cannot be suppressed through the use of force, and the soldiers and policemen who face the raging crowd and try to do so can only be pitied.

    But when this wave diminishes, on hiatus until the next one, we will be left with the real disaster: Look at the soldiers, and especially the Border Police, observe their storm trooper-like barbaric behavior toward anyone in their path, and you’ll understand what awaits us and what character the country will have, if it doesn’t already have it.

    Those who maliciously run over a teenager and then viciously kick him; who threaten mass killing with gas and assault medical teams and journalists – knowing they won’t be punished and will only be praised – are citizens who are lost to democracy. They are kalgasim, as we say in Hebrew (“vicious invaders”). And those who cover for them, who look on with apathy and indifference – these are their partners. Full partners.

  • Social Media Site Usage 2014 | Pew Research Center’s Internet & American Life Project
    http://www.pewinternet.org/2015/01/09/social-media-update-2014

    The results in this report are based on the 81% of American adults who use the internet. Other key findings:

    Multi-platform use is on the rise: 52% of online adults now use two or more social media sites, a significant increase from 2013, when it stood at 42% of internet users.
    For the first time, more than half of all online adults 65 and older (56%) use Facebook. This represents 31% of all seniors.
    For the first time, roughly half of internet-using young adults ages 18-29 (53%) use Instagram. And half 0f all Instagram users (49%) use the site daily.
    For the first time, the share of internet users with college educations using LinkedIn reached 50%.
    Women dominate Pinterest: 42% of online women now use the platform, compared with 13% of online men.

    #médias_sociaux #démographie #chiffres via @opironet

  • The head of Saudi Arabia’s religious police has warned citizens against using Twitter, which is rising in popularity among Saudis. Sheikh Abdul Latif Abdul Aziz al-Sheikh said anyone using social media sites, and especially Twitter, “has lost this world and his afterlife”.

    https://www.techdirt.com/articles/20130516/07281823105/saudi-religious-police-anyone-using-twitter-has-lost-this-world-his-afterl #religion #censorship #twitter

    I’m on the Hiiiighway to Hell !

  • Beautiful gay marriage video goes viral | Gay Star News
    http://www.gaystarnews.com/article/beautiful-gay-marriage-video-goes-viral101012

    Beautiful gay marriage video goes viral
    A wedding video featuring a couple from Kentucky has been seen over 80,000 times on YouTube
    10 October 2012 | By Joe Morgan
    Robert and Nathanial, who got married last month in Kentucky, released a video last week which went viral on Twitter and social media sites.

    A gay marriage video has gone viral, and it is gorgeous.

    The wedding of Robert and Nathanial, which took place last month in Kentucky, is a good reminder of what a wedding between two loving people should be like without political arguments getting in the way.

    Featuring photography by Todd Pellowe, the video shows the wedding day from getting dressed, to the ceremony, to the celebration with friends and family at the end.

    The video is sound-tracked by R&B artist Jennifer Hudson’s ‘If This Isn’t Love’, it brought a tear to our eye.

    One viewer commented on the YouTube video, saying: ‘This is the most beautiful thing I’ve ever seen. Thank you both for sharing.

    ‘My heart is bursting open with happiness for you both!’

    Speaking to Robert, a digital marketing expert, a Twitter user said: ‘Your video is simply amazing. Thanks for showing us true love exists.’ The loving husband responded by saying, ‘Glad we could be an inspiration.’

    Check out the video here:

  • Exposed: Military contractors hired to create fake Facebook accounts, infiltrate opposing groups
    http://www.naturalnews.com/033490_Facebook_infiltration.html

    According to reports, USCC hired HBGary, Federal and several other defense contractors to create fake accounts on social media sites like Facebook and Twitter in order to sabotage progressive groups critical of the organization’s platform.

    On dirait que HBGary a bel et bien développé son logiciel de persona management, dont le coût de développement initial était estimé à $100.000 en octobre 2010.

    #persona_management #hbgary #us #usa #états-unis #facebook #twitter #espionnage #infiltration #réseaux_sociaux

  • Blocking Twitter During Riots A Bad Idea, Study Proves - AllTwitter
    http://www.mediabistro.com/alltwitter/blocking-twitter-during-riots-a-bad-idea-study-proves_b13091

    In the aftermath of the UK riots earlier this month, government officials had floated around the idea of blocking access to Twitter and other social media sites next time something similar occurred. The official reasoning was that this would prevent people from using Twitter to incite violence and plan the riots themselves.

    An analysis of the tweets actually sent during the riot, however, would suggest that banning people from social networks is a terrible idea.

    #ukriots #twitter #censure