Issue 16: April 2014 - Haigazian University
Transcription
Issue 16: April 2014 - Haigazian University
2014 QUOTE of the Issue April “You are what you share.” Charles Leadbeater *Innovation Expert and Associate+ Issue 16 Editorials Beware, Social Media? Social media, the fad of the decade, facilitates our daily communication and exposes us to new businesses and job opportunities, but we should be cautious while using it in order to avoid catastrophes in our future life. Social Networks, Bookmarking sites, Social news, Media sharing, Micro blogging, and blog comments and forums are the six types of social media that we tend to use on daily basis. The most popular of these are Facebook, LinkedIn, Delicious, StumbleUpon, Digg, Reddit, YouTube, Flickr, and Twitter. Of course, social networks put us in contact with our friends and colleagues at anytime and anywhere. For our professional life, for example, instead of browsing through business cards to remember a certain person we met at a conference or lecture, we can easily find him/her via LinkedIn. LinkedIn also introduces us to companies and other individuals who are in the same field. Our online résumé, career history, recommendations from others and creative portfolios can be shown on our LinkedIn profile. Meanwhile, business owners can advertise their products via Facebook and Twitter. However, we should always be careful when and how and with whom we use social networks. We should be careful while posting pictures or profile pictures. Some pictures and discussions might harm us not only socially but many times professionally also. The groups that we join, events that we attend and the posts that we write on Facebook can greatly reflect our beliefs, interests and concerns. On the other hand, if we overuse social networks, face-to-face interaction will be endangered; in fact, a student could not identify a classmate’s face although he knew her online. If we don’t set a goal for our websurfing, we will drown in floods of information. If we do not pay attention to the small print before clicking “accept” to a certain application or a website, we only jeopardize our privacy, and perhaps our social life and careers. Ms. Sahar Hamzeh, Instructor of Communication Skills An e-publication for a better university life OR Dialog Letter HAIGAZIAN UNIVERSITY ADVICE of the Issue ANSWER of the Issue What is Cyber-bullying? Slonje and Smith (2008) define Cyber-bullying as “an aggressive, intentional act or behavior that is carried out, repeatedly and over time,” through modern technological devices, such as, mobile phones or the internet (e.g., picture/video clip, phone call, text message, email, chat-room), against a cyber-victim who is cannot defend him or herself. It has several features: it is not a face-to-face experience, it is difficult to get away from it, it can reach a large audiences, and it provides the cyber-bully with some degree of ‘invisibility’ and ‘anonymity’. Burns (2012) lists the most important tactics that Cyber-bullies use: “1) social exclusion; 2) flaming (by posting hostile messages); 3) outing (by posting and displaying sensitive personal information); 4) email threats and dissemination (by inspiring fear); 5) harassment (by sending hurtful messages); 6) phishing (by tricking, persuading or manipulating the victim to reveal personal information); 7) impersonation (with the veil of ‘anonymity’); 8) denigration (by posting cruel rumors, gossip and untrue statements in order to damage the victim’s reputation); 9) e-mail and cell phone image dissemination; and 10) images and videos.” Slonje, R., and Smith, P. K. (2008). “Cyberbullying: Another main type of bullying?”. In Scandinavian Journal of Psychology, 49, 147-154. Burns, J. H. (January 17, 2012). “10 Most Common Cyber Bullying Tactics”. Retrieved on March 12, 2014 from http://bullyproofclassroom.com/10-most-common-cyber-bullying-tactics WEBSITE of the Issue http://www.saferinternetday.org/web/lebanon/home APPLICATION of the Issue TED © HAIGAZIAN UNIVERSITY — Orientation Office OPINION of the Issue Social Media – The Apocalypse By Alexander Heneine On Facebook, a teenager, going through puberty ever-so-proudly, posts a halfnaked picture of herself, takes perverted comments as compliments, and starts conversations, with middle-aged men looking to stay in touch with their expired youth. Is this what we have become? Technology, although facilitating our daily lives, does not necessarily make it better. Just like a chocolate bar might be easier to devour than resist, social media often provides the self-satisfaction teenagers seek nowadays. Who wouldn’t want that? The answer to that question is this: the educated and informed… Apart from studies that show social media can literally make you dumber (CNN, 2009)1, rarely do we see the younger generation use platforms as a source for information and knowledge. Social media is portrayed as a way to bring the whole world together, connecting those of both common and conflicting beliefs in order to bring out the best of all. Is this why girls talk about their breakups, make a fool of themselves, and judge based on the number of “likes” they get? Is this why guys bully each other just to portray a status that exists only behind screens? The integrity of our belief systems is put to the test. Our failures as individuals reflect our societies’ failures as instructors to future generations. Teenagers develop a need to do whatever it takes to be socially accepted, and often fall and will continue to fall into the trap that has been set up by companies and governments to control our mindsets and ideologies. To “Twit”, commonly known as to “tweet”, is, as a verb, “to mock… to talk in a chattering fashion as if a fool being mocked.”2 Brainless and random uploading of photos and information contribute to the dangers children face. Stalked and spied on, while parents remain unaware of what their children are doing online, children are exposed to manipulative strangers who blaspheme, disrupt, and destroy our children’s cultures. Throughout the ages, teenagers have been in need of guidance in every step they take as they nourish, and just like in every other aspect, they are in dire need of supervision in whatever they choose to perform on the internet. We must insure our children’s safety, as they are prone to many dangers, from shifts in beliefs to complete brainwash, as social media incessantly hypnotize the poor and mislead peoples of the future. “Is social network platform hypnotization the new clinical therapy or is it the new decade’s plague?”3 The disease has been spreading for a long time now, and is targeting the people who are most vulnerable. Make sure it doesn’t happen to you or your loved ones. References: 1. 2. 3. http://edition.cnn.com/2009/TECH/ptech/04/14/twitter.study/index.html http://revellian.com/2008/06/28/the-twitter-conspiracy/ http://blog.thoughtpick.com/2009/04/social-network-brainwashing-be-vewy.html ACKNOWLEDGMENT of the Issue THANK YOU FOR YOUR HARD WORK Ibrahim Al Sakhle | Fidaa Bouzeineddine | Makram Masri | Taimour Shamseddine | Shant Kupjian | Tsolag Ossepian | Harout Agopian | Emile El Ghoul | Najah Saoud | Robert Mesrob Der Mesrobian | Armen Bakkalian | Nour Kabbara | Sandy Fahed | Sarah Mashoumishi | Lori Agopian | Manar Hammoud | Bianca Hout | Ghinwa Monzer | Mirna Ghimrawi| | Jacqueline Tamar Boyadjian | Tsoler Sayegh | Marwa Sinji | Patil Dedeyan | Sirvart Bardakjian | Nairi Bodroumian | Mona Ramadan | Eman Saleh | Talar Estepan | Christine Simidyan PROVERB of the Issue Was du allein wissen willst, das sage niemand. What you want to keep a secret, tell no one. *German Proverb+ MISTAKE of the Issue I look forward to meet you. I look forward to meeting you. BOOK of the Issue YOUTUBE of the Issue James Lyne: Everyday cybercrime -- and what you can do about it “How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account?” http://www.youtube.com/watch?v=fSErHToV8IU The Culture of Connectivity: A Critical History of Social Media Author: “José van Dijck is a professor of Comparative Media Studies at the University of Amsterdam. Van Dijck's research areas include media and science, media technologies, digital culture, popularisation of science and medicine, and television and culture. Her latest book, titled The Culture of Connectivity. A Critical History of Social Media, was published by Oxford University Press (2013)”. H AI G A Z I AN U N I V E R S I T Y Table of Contents O R I E N T AT I O N O F F I C E PHONE: (01) 353010/11/12 [ext. 245] HU Box: 1020 WEB www.haigazian.edu.lb EMAIL orientation@haigazian.edu.lb MAIL MEXIQUE STREET BEIRUT 11-1748, RIAD EL SOLH 1107 2090 Chapter 1: Engineering Sociality in a Culture of Connectivity 1.1 Introduction 1.2 From Networked Communication to Platformed Sociality 1.3 Making the Web Social: Coding Human Connections. 1.4 Making Sociality Saleable: Connectivity as a Resource 1.5 The Ecosystem of Connective Media in a Culture of Connectivity Chapter 2: Disassembling Platforms, Reassembling Sociality 2.1 Introduction 2.2 Combining Two Approaches 2.3 Platforms as Techno-cultural Constructs 2.4 Platforms as Socio-economic Structures 2.5 Connecting Platforms, Reassembling Sociality Chapter 3: Facebook and the Imperative of Sharing 3.1 Introduction 3.2 Coding Facebook: The Devil is in the Default 3.3 Branding Facebook: What You Share Is What You Get 3.4 Shared norms in the Ecosystem of Connective Media Chapter 4: Twitter and the Paradox of Following and Trending 4.1 Introduction 4.2 Asking the Existential Question: What is Twitter? 4.3 Asking the Strategic Question: What Does Twitter Want? 4.4 Asking the Ecological Question: What Will Twitter Be? Chapter 5: Flickr between Communities and Commerce 5.1 Introduction 5.2 Flickr Between Connectedness and Connectivity 5.3 Flickr Between Commons and Commerce 5.4 Flickr Between Participatory and Connective Culture Chapter 6: YouTube: The Intimate Connection between Television and Videosharing 6.1 Introduction 6.2 Out of the Box: Video-sharing Challenges Television 6.3 Boxed In: Channeling Television into the Connective Flow 6.4 YouTube as A Gateway to Connective Culture Chapter 7: Wikipedia and the Principle of Neutrality 7.1 Introduction 7.2 The Techno-cultural Construction of Consensus 7.3 A Consensual Apparatus between Democracy and Bureaucracy 7.4 A Nonmarket Space in the Ecosystem? Chapter 8: The Ecosystem of Connective Media: Locked In, Fenced Off, Opt Out? 8.1 Introduction 8.2 Locked In: The Algorithmic Basis of Sociality 8.3 Fenced Off: Vertical Integration and Interoperability 8.4 Opt Out? Connectivity as Ideology © HAIGAZIAN UNIVERSITY — Orientation Office