During class, we talked about the ideas and concepts of Smart Mobs. Interestingly, I might have found an example of a company who plays on the idea of using the tactics of Smart Mobs. Take for example the company AT&T wireless. An advertisement that has been running on TV for the last year or so pleads for mobile phone users to use their service instead. The commercial depicts a man in a flash mob group without his other group members. The flash mob sends messages via text message but the catch is that the man in the commercial receives it too late because any service other than AT&T is too slow. This results in the man dancing hilariously by himself without his other members.
AT&T Advertisement
These cell phone companies have played a great deal into the success of Smart Mobs. Over the last ten years, these companies have given its customers a cheaper product making cell phones a viable tool. They have given us accessibility to the internet in addition to voice calls and SMS. Furthermore, they have given us more coverage across the world. It is becoming increasingly difficult to find space where coverage is not available.
In our first week of class, we discussed Sherry Turkle’s “Life on the Screen.” This reading discussed MUDs or “Multi-User Domains” and the types of interactions that occur. So when our class was assigned to make an AIM account and anonymously interact with each other, I was naturally intrigued. First of all, I had never communicated with someone else with a totally different identity. Additionally, I did not realize how valid this type of communication could be. Turkle argues that virtual worlds provide people with an experience that is not possible or even acceptable in the real world. After the few discussions that I had on AIM, I learned a few things. I feel as though MUDs can establish a few positive benefits for its users. Firstly, I would say that this form of communication allows for people to communicate with anonymity. Someone who is shy or not very out going can seek advice or say whatever they want to say without being in fear or face real-life repercussions. I also believe that speaking anonymously to one another prevents anxiety for people who have trouble with social skills. Even if someone feels they are being judged, the other user still does not know who they are. Furthermore, I enjoyed the conversations that I had on AIM. Much of the discussions that took place on AIM would be considered highly controversial if they took place in a real-life interaction. It is easy to see that MUDs can also serve as form of entertainment.
On the other hand, as much fun as I had playing on AIM, one can see the negative attributes in using this form of communication. I was frustrated because I could not figure out who I was talking with. The other problem that I pondered concerns the idea of relationships. Turkle mentions that online romantic relationships exceed quickly online because both parties can be fairly open to one another. Encouraging a fake identity can also cause problems too if someone believes that they are real. Many sex offenders impersonate being another person. However, all in all, I believe MUDs should be used for entertainment purposes.
This week we read about Howard Rheingold’s thoughts regarding “smart mobs.” Smart Mobs rely on mobile technology to perform the tactics that make Smart Mobs so successful. These mobs became prevalent once SMS technology was developed. SMS is an acronym for “short messaging system.” One of the reasons why SMS is so advantageous in the methods of smart mobs is because of its ability to relay simple messages briefly, quickly, and maybe most importantly, SMS is a very cheap form of communication. Because everyone has mobile devices either in phone form or other, Smart Mobs are most likely here to stay. After reading Rheingold’s work and having our discussion in class, these smart mobs can motivate and produce political and social changes. These mobs are self-regulating and often have no hierarchy in terms of dictating messages across to an organization, government or group of people. However, the big worry here is that smart mobs with the power that they have could prove to be dangerous for millions of people across the planet. Criminal organizations and the spread of Terrorism are two examples of groups that have the ability and the means to use smart mobs in a negative fashion. What could make the tactics of Smart Mobs so dangerous is the privacy that is involved. Nations, especially the U.S., do not have the ability to examine private messages without a warrant. Furthermore, even if the U.S. could surpass these laws, the scale in which they would have to stop these messages would be next to impossible. The only tactic that is available is solid prevention. The spread of false information to many people could prove to be lethal in the future.
Although some smart mobs have been strictly used for political purposes, other smart mobs have been used in entertainment as well. In 2005, a group of U2 fans at a concert in Poland used the schemes of other smart mobs to create their own effect. 70,000 fans at the concert waved the colors red and white representing the Polish flag. The idea to perform these acts of national pride on such a big scale was spread from the internet. Additionally, the band member Bono, who is known around the world for his anti-poverty efforts, was even influenced by the Polish act of honor and made it clear to his audience that he too was in on the act by showing the red lining on the inside of his jacket.
Googlization is a phenomenon described by Siva Vaidhynathan that has impacted and changed how we know and use the internet. What started as a small search engine, Google is now a vital component in making the online world go round. Google is made up of several sub sites like YouTube, GMail, and Google+ that runs the world we live in. In class we discussed what googlization is and how it represents surveillance and privacy with regards to Google’s dominance online. Vaidhynathan argues that privacy interface is made up of five domains: person to peer, person to power, person to firm, person to state, and person to public. Person to peer relates to communication with family and friends. Person to power relates to privacy with teachers, employment authority figures. Person to firm involves privacy with other businesses and companies. Person to state concerns privacy with one’s government, which can be seen on the federal, state, and local levels in the U.S. And lastly, person to public involves privacy with the public domain. Google’s expansion from a search engine and advertisement company to a general media company has affected each of these privacy domains. Vaidhynathan argues that our understanding of knowledge of what’s on the web and our own privacy online is threatened with the type of surveillance policies seen through each of these domains. He argues, “If Google is the dominant way we navigate the Internet, and thus the primary lens through which we experience both the local and the global, then is has remarkable power to set agendas and alter perceptions. Its biases (valuing popularity over accuracy, established sites over new, and rough rankings over more fluid or multidimensional models of presentations) are built into its algorithms.” Google’s recent advertisement supports the idea that googlization is happening.
Dear Sophie commercial
If someone were willing to perform each task in the advertisement for his or her child, their son or daughter would be totally entrapped in Google’s regime.
While Google on the whole might have privacy issues, compared to other companies and websites I believe Google+ exceeds popular social networks in privacy. For example, Google+ surpasses Facebook in terms of its privacy settings. Google+’s interface establishes communication divisions between family, friends, co-workers, business associates, and the public. Facebook, which is obviously at this point the more popular social network, does not contain these distinctions. In addition, Twitter, which is popular for its widely public and open communication, does not even separate the five privacy domains what so ever. A An issue that many face now (that I will face in the future) is the privacy of social networks regarding relationships with employers. Many people are fired for a post they make or an offensive picture tagged by someone else. Google+ combats these issues with its separation of communication between parties with what it calls “circles.” People can now filter between friends and even one’s parents (I definitely have this issue).
A focal point of our Intro to Digital Cultures class is our discussions on how the world has progressed in terms of technology and our daily interactions with it, both positive and negative.This week we discussed the aspects of cyber-bullying on the Internet in our society.“Bullying” has existed in our culture on many levels for a long time and it is no surprise that tormenters and their tactics have found their way on the Internet.We discussed that cyber-bullying takes place partially because its face-to-face interactions are limited and makes it more likely to happen.Nowadays, we often here about multiple cases of cyber-bullying that occur, which leads to horrible incidents such as suicide.What others display online can lead to arguably worse repercussions than face-to-face human interactions.Take for example Tyler Clementi, a Rutgers University student who jumped to his death after his roommate posted video footage of Clementi and another male performing sexual acts.Today with the simple ability to post videos, he wrongly took advantage of Clementi’s privacy.What’s more, Clementi even eerily posted his last words on facebook for all of his friends to see.
Danah Boyd specializes in studying cyber-bullying and its repercussions.She believes that one of the reasons that bullying continues is because tormenters and the tormented have difficulty in admitting the acts themselves because they feel victimized.She writes, "Antibullying efforts cannot be successful if they make teenagers feel victimized without providing them the support to go from a position of victimization to one of empowerment. When teenagers acknowledge that they're being bullied, adults need to provide programs similar to those that help victims of abuse. And they must recognize that emotional recovery is a long and difficult process." Last time in class we talked about Googlization. Ironically, Google released a commercial recently how homosexual people can gain support through Google and its many outlets.
This video can prove to show some of the tactics that are being taken in order to stop cyber-bullying.
Another issue brought about from cyber-bullying is false identity and identity theft. The death of Megan Meier is a clear example of how easy it is for someone to fake and identity. While there is this perception that creating a new identity in a MUD for example might be fun and harmless, it can also create harmful affects to others associating with those who create a false identity. This further brings into question about possible future regulations regarding identity online. Should an outside party examine the honesty of online users? Many people would probably disagree with it because it would inhibit the privacy of safe and responsible users. In my own experience, facebook among other platforms is a good example of communication that is conveyed quickly and effectively but not always in the best manner. I feel as though a lot of private communication that takes place is represented publicly making it an avenue for cyber-bullying to exist in the manner that it does.