Tuesday, November 13, 2012

EXTRA BLOG: Athlete Accountability on Twitter: Does it Really Matter?

Twitter is now an extremely useful and informative application. Any celebrity or popular personality has their own account and they tweet to thousands of followers everyday. In a very politically sensitive world where every word, whether spoken or written, is repeatedly scrutinized, everyone must be careful about what they are tweeting. While this is important for all users, it is especially critical for public figures. Politicians, journalists, and other authoritative figures have their credibility on the line. However, when it comes to athletes, they are held to the same high standard. To me, this is certainly puzzling. Why do their tweets really matter? Athletes do not inherit the responsibility of being role models to little children. In a world where everything is available online, numerous police records and other personal information are accessible. Twitter is an application that allows users to share their everyday thoughts. Most athletes do care about their image, but some of them certainly do not and that only jeopardizes their marketability, not their ability to perform on the field or court.

Some athletes choose to be funny on Twitter. Other choose to be extremely opinionated and voice their thoughts on everything. In the end, isn't this what their followers want? Twitter users follow particular athletes because they want to pretend they are their personal friend. This application is a way casually to tell your users what you are thinking or doing. If athletes choose to be that revealing on Twitter, good for them. There are always consequences but in today's world, can you really hide anything? A particular example is this Fox Sports Ohio article describing a backup quarterback from Ohio State and his recent scrutinized tweet. He tweeted about how school does not matter to him and he was brought to the school to play football. This enraged many supporters and administrators of college athletics. While this is certainly not a flattering view on college athletics, why is this such a big deal? Those who really care about what Cardale Jones thinks are following him. They are getting what they asked for. I do not see why any action should be taken by the football team coaches or university. Professional sports organizations certainly encourage their players to be active on Twitter and engage with their fans. The whole point is to make the players seem like everyday people. Everyday people say stupid things and are not punished for them every time. Punishing athletes for stupid tweets is placing them on a pedestal. Athletes only have better physical abilities than ordinary people. They are not paid to think; they are paid to run fast and catch the ball.

I certainly understand why journalists and politicians are heavily scrutinized. They are in the business of being responsible to the public. In no way is it excusable for them to post something stupid or ignorant. Their job is to be careful and considerate. Athletes do not belong in this same category of respect and responsibility. If the argument is that young kids need someone to look up to, they should stay off Twitter. To punish a backup quarterback for his tweet showcases that athletes are held to a higher standard and are, therefore, supposed to be looked up to. In today's world, that is most definitely not the case. Drug scandals, arrest records, and other factors are abundant in today's professional sports arena. We all must be selective in who we follow and look up to. Athletes are people; they will make mistakes. No matter how racist or ignorant an athlete's tweet may be, they are just an athlete. It does not cause anything substantial. It just makes them look stupid. That is all it does. All in all, we should not care what these guys are tweeting.

EXTRA BLOG: Another Rebecca Black?

In my blog post on September 30, I explained the media company behind Rebecca Black. In short, Ark Music Factory, founded by Nigerian artist Patrice Wilson, is approached by aspiring young singers and Ark offers to write and produce a song and music video for them for a fee. While Rebecca Black is the most popular of the artists, several of their other customers have millions of views on their music videos as well. After establishing Ark Music Factory, Wilson then went on to create another production company called Pato Music World, or PMW Live. As explained on his Wikipedia page, Pato is his stage name and he is certainly the mastermind behind all these YouTube videos. The extremely simplistic themes, lyrics, and content of the videos are all due to him. "Friday" by Black took the internet world by storm and that time period seemed to last forever.

Just when it all seemed that this YouTube trend was decreasing just a little bit, another video pops up of a 12 year old named Nicole Westbrook singing about an upcoming holiday.


After being posted a week ago, the video has accumulated over five million views. Despite all the negative comments and reviews it is receiving (over 90,000 dislikes compared to just over 10,000 likes), Wilson and PMW Live are accomplishing exactly what they described they would to their customers. However bad and ridiculous this song may be, this 12 year old girl has more of a singing career and fame than millions of young adult aspiring artists. Wilson's previous artists, such as Black, have received record deals, tour deals, and interview opportunities after using his services.

Of course the song is absolutely atrocious. She certainly does not move around very much in terms of choreography and the lyrics are not difficult by any means. Wilson himself makes an appearance in the video as he is ridiculously dressed as a turkey and he enjoys a Thanksgiving meal with a table occupied by 12 year olds. Videos like these receive a lot of laughter and ridicule from most of their viewers with a few taking it way across the line and submitting death threats.

This is just another example of the great relationship between YouTube and aspiring young artists. These young people are indeed exposing themselves to a great deal of criticism and harrassment, but Wilson's track record has proved that his method of exposing these singers is successful. Westbrook is only 12 years old and the video is only a week old. There is no telling what television, tour, or record opportunities she may receive because of this. Critics who are uneasy of YouTube are silenced yet again. There is no viewer who sees this video as professional entertainment. This is simply a foot in the door for a young singer. Consumers know that publicized concerts and reputable CDs are their way to obtain professional quality content. YouTube is the arena for amateurs. Viewers laugh and cry at the errors and shortcomings of the people in the posted videos. People will continue to laugh for a while at Westbrook, but we'll see who is laughing last when she probably ends up hosting her own show on Nickelodeon or the Disney Channel in a few months.

BLOG RE-WRITE: The Normalcy of Facebook Hacking

Everyone has received a suspicious looking email from a friend's email address. The subject line usually consists of phrases like "Check this out!" or "Urgent Employment Information." In the body of the email, an awkward looking URL address is hyper-linked. A savvy internet user notices all these things and simply deletes the email and notifies their friend, rather than clicking on the link. This happens all too frequently in today's world. It has spread to social networking sites such as Facebook, in particular. Random and awkward looking posts emerge onto users timelines with the same wordings as the spam emails. As explained on weekendPicture's corkboard website, Toby Miller gives specifics to his recent experience when it comes to Facebook hacking. He talks about how the post was sent to all his Facebook friends. While he describes how his friends noticed that the post indeed looked strange and not like something he would write, he is one of, probably, millions of people who have had this done to their Facebook page. Hackers continue to find ways to spam accounts.

With today's technology landscape, forums of all varieties exist and people from all over the world can join in on discussions about pretty much anything. Obviously, some of these discussions are not about good and beneficial things to society. As pointed out in this Bloomberg article, hackers are creating and joining forums together to discuss new ways of hacking. Most of their focus is aimed at Facebook. With all the applications available on the social networking site, the opportunities for hacking and spamming are endless. Before being able to use any of these applications, the user has to allow the application to view all the information they have on Facebook. This forum that the Bloomberg article is showcasing is a great tool and resource for hackers. They want to lure the user's Facebook friends to visit the website they've hyper-linked in the post. Facebook is the main focus of these hackers because of the large amount of users they have. The ability to reach a billion people is an offer too good to refuse for hackers. Having these forums will continue the appearance of these awkward and computer harming posts.

Despite all these annoying and troublesome hacking and spamming, it definitely will not be coming to an end anytime soon. While spam filters and internet users become more sophisticated, forums such as the one mentioned above will allow hackers to keep up to speed. There will always be someone who is one more step ahead than the rest. Legitimate websites of corporations and television networks still get hacked to this day. Experiences similar to Toby Miller will become all too frequent. Social implications come into play as employers and family members will have access to an individual's profile. Miller was very worried about how these posts made him look. As hacking continues and becomes a shared experience among users, people on Facebook must know what is a genuine post and what is a hacked post.
 
Privacy concerns also come into play. As consumers continually use their credit cards online for shopping and allowing social media applications to access their personal information, hackers will have more ways to infiltrate users' personal files. There are only so many passwords an individual can remember. When a recipient of these spam emails and posts actually clicks on the link, their personal and computer data are retrieved by the spam site as well. Users of the internet will ultimately have to enter their personal information on a website at some point in their lives if they want to access media content, e-mail, shopping, and other applications. While there are certain symbols, such as the logo of the Better Business Bureau, to showcase that a website is legitimate, not all users know this information. The downside, once again, is that no matter how educated users become, hackers will continue to find new ways to access personal information. It almost seems to be a right of passage for an online user to be spammed or hacked.

BLOG RE-WRITE: Hiding Behind the Screen: Relationships Ending Without Face to Face Interaction

In Sherry Turkle's book Alone Together, one of her main points concerns how people now feel protected by the screens of their phones and computers. With phone calls no longer being essential to communication, text messages are sent. The recipient can take as long as her or she wants to respond. As Turkle explains, "at a screen you feel protected and less burdened by expectations...Alone with your thoughts, yet in contact with an almost tangible fantasy of the other, you feel free to play. At the screen, you have a chance to write yourself into the person you want to be..a telephone call can seem fearsome because it reveals too much" (188). Responses on the computer and text messages are often well thought out and prepared because there is no pressure or sense of urgency. Naturally as communication changes between friends, dating relationships will follow. Break-ups now rarely occur in person. Text messages and Facebook posts now seem to be the norm when it comes to ending a relationship.

To expand on Turkle's observations of hiding behind the screen, a new break-up technique has people literally hiding behind their screen. Instead of formally breaking up, some people now "disappear." They do not respond to text messages, phone calls, or emails. This new trend is called "ghosting." As explained in this Yahoo! relationships article, the person just cuts off all contact with their boyfriend/girlfriend. The emergence of this new trend highlights how the screen is impacting daily lives. While these screens do prove to be convenient and helpful, they are providing ways for people to avoid face to face interactions and create a new identity. Common courtesies are now being thrown out the window. If someone is ever confronted about their "ghosting" behavior, the excuse will always be "my phone was broken" or "I never got those messages." It is a lame excuse but is difficult to refute because there is always the possibility of messages not being sent successfully.

It is difficult to fathom that in an era where essentially everything in our lives is becoming public, disappearing is still possible. The screen has indeed provided protection and the ability to avoid conversing in a way where you have to hear the other person's voice. People can change how they are perceived through online profiles and text message responses. The words they use are carefully thought out. This is exactly what Turkle is referring to in her book. Not only have telephone calls become fearsome, but so has texting a message that will probably not cause a good response. The screen is now also protecting people from revealing bad news at all. Of course it is difficult to share something that may hurt the other person's feelings. The screens now have great power. It seems as though we will never know what someone's first reaction is anymore. People are now, in fact, hiding behind their screens. As the face-to-face contact continues to diminish, people will be extremely dependent on their screens. No one will take the time to visit that person's house or place of work to confront an issue. However the person identifies themself through these screens will ultimately define their reputation. If they disappear, or "ghost," from the screen, it is safe to assume they have disappeared from our life.

Sunday, November 11, 2012

Censorship in China: Everyone is Fair Game

In Rebecca MacKinnon's book Consent of the Networked, specifically in the "Copywars" chapter, she describes how certain internet sites are blocked by a country to their citizens. Using China as an example, MacKinnon talks about how this censorship is used to favor the government. Websites that have unflattering material or content that the government does not want their citizens to see are blocked. She goes on to say, "Politicians throughout the democratic world are pushing for stronger censorship and surveillance by Internet companies to stop the theft of intellectual property. They are doing so in response to aggressive lobbying by powerful corporate constituents" (101). Even though that occurs in the democratic world, it also happens in governments such as China. The strong lobbying by the government to limit their citizens' access to content on the internet goes along with the lobbying of corporations. The government is the "powerful corporate constituent" in this case. Up rises such as what occurred in the Arab Spring concern governments like China and they want to limit internet access to prevent the people from viewing anything that expresses displeasure in their views.

China's censorship knows no limits as any website is fair game to get blocked. A very surprising platform was blocked for a few days. As reported in this Wall Street Journal article, citizens of China were unable to access Google this past weekend. Google confirmed that it was not due to any failure of their own equipment. While the reason is unknown, this recent occurrence highlights China's ability to censor and restrict anything they want. The article also points out that The New York Times and Bloomberg News were blocked in China after they both released articles that documented how much Chinese government officials are paid. The conclusion of the article sparks intriguing debate about how doing business with China may be more difficult now because of Beijing's strict censorship laws. It is almost unfathomable that a service like Google, with all its applications, can be blocked to an entire population. Once again, this article reports just the most recent occurrence of the Chinese government using their power. 

This article highlights MacKinnon's claims and descriptions about governments like China and the censorship power they take advantage of. No matter what the website is, even a powerful service such as Google, if there is anything that the government takes objection to, it will be blocked. Google is a part of many individual's daily lives whether it is checking e-mail, looking up directions, or just simply entering a search for information. Perhaps Google's ability to do anything is something that concerns China. The search engine's privacy laws are minimal and much of the internet can be found by starting off with a Google search. This kind of freedom is something that governments such as China will definitely continue to be concerned about as more people around the world gain access to the internet. Certainly, discussions about whether it is morally correct to censor citizens from worldwide material and the implications of these restrictions on global business are caused by this recent occurrence. In addition to those discussions, the most obvious takeaway from the article is that all websites are fair game. No service, however big and popular it may be, is too important to be censored by China.

Sunday, November 4, 2012

The Normalcy of Facebook Hacking

Everyone has received a suspicious looking email from a friend's email address. The subject line usually consists of phrases like "Check this out!" or "Urgent Employment Information." In the body of the email, an awkward looking URL address is hyper-linked. A savvy internet user notices all these things and simply deletes the email and notifies their friend, rather than clicking on the link. This happens all too frequently in today's world. It has spread to social networking sites such as Facebook, in particular. Random and awkward looking posts emerge onto users timelines with the same wordings as the spam emails. As explained on weekendPicture's corkboard website, Toby Miller gives specifics to his recent experience when it comes to Facebook hacking. He talks about how the post was sent to all his Facebook friends. While he describes how his friends noticed that the post indeed looked strange and not like something he would write, he is one of, probably, millions of people who have had this done to their Facebook page. Hackers continue to find ways to spam accounts.

With today's technology landscape, forums of all varieties exist and people from all over the world can join in on discussions about pretty much anything. Obviously, some of these discussions are not about good and beneficial things to society. As pointed out in this Bloomberg article, hackers are creating and joining forums together to discuss new ways of hacking. Most of their focus is aimed at Facebook. With all the applications available on the social networking site, the opportunities for hacking and spamming are endless. Before being able to use any of these applications, the user has to allow the application to view all the information they have on Facebook. This forum that the Bloomberg article is showcasing is a great tool and resource for hackers. They want to lure the user's Facebook friends to visit the website they've hyper-linked in the post. Facebook is the main focus of these hackers because of the large amount of users they have. The ability to reach a billion people is an offer too good to refuse for hackers. Having these forums will continue the appearance of these awkward and computer harming posts.

Despite all these annoying and troublesome hacking and spamming, it does not look like it will be coming to an end anytime soon. While spam filters and internet users become more sophisticated, forums such as the one mentioned above will allow hackers to keep up to speed. There will always be someone who is one more step ahead than the rest. Legitimate websites of corporations and television networks still get hacked to this day. Experiences similar to Toby Miller will become all too frequent. Social implications come into play as employers and family members will have access to an individual's profile. Miller was very worried about how these posts made him look. As hacking continues and becomes a shared experience among users, people on Facebook must know what is a genuine post and what is a hacked post. 

Sunday, October 28, 2012

Google Maps and the Continued Expansion

I could never imagine trying to drive to an unfamiliar location without Google Maps. Everywhere I go, I am continually dependent on the sheet of paper I printed out with turn by turn directions. If I feel I'm a little lost while on the road, I use my smartphone to help me out. Listening to parents and older adults talk about how they used actual maps seems like rocket science to me. Indeed, this new technology assists drivers tremendously in addition to GPS devices. With other applications available, why is Google the default service that the majority of consumers use? As explained in Siva Vaidhynathan's book Googlization of Everything, specifically the chapter entitled "Googlization of Us," internet users are becoming more and more dependent on Google. Whether or not this is a positive step for society culturally and morally, Google is simply the best and most comprehensive product to use. Personal experiences with Yahoo! maps and MapQuest have not been positive and the preference for Google showcases that other consumers share my sentiment. The new maps application for the iPhone 5 has been under heavy scrutiny for leading drivers in the wrong direction and for not including some streets that do exist. Regardless of the larger issue at hand, the better product always win. The better product is Google.

Google Maps and its Street View has set the bar extremely high for navigation applications. In this recent eWeek article, Google Maps and Street View are expanding even further. Pictures of the Grand Canyon will be included and Google Maps will include information about the terrain and vegetation of the land. The goal Google is trying to accomplish with all this new information is to present an accurate and easy to understand picture of the entire world right to the consumers' fingertips. MapQuest, Yahoo!, and Apple are no where close to achieving this type of product. The fact that those competitors struggle with giving accurate and up-to-date directions showcases what a difficult concept navigation can be. With construction, weather conditions, and traffic information all contributing factors, there is never one way to get to a destination. The amount of options available to the consumer and that the application should present is quite perplexing. The article also describes that Street View is looking to have 150 college campuses on file within the next year. Not only will this serve as a good tool to compare and contrast how different campuses look, it may eliminate college visits all together and totally change the game when it comes to college admissions. Endless possibilities are presented as Google continues its expansion.

Vaidhynathan presents an argument that today's internet user will not have a broad scope of the world because it will only trust what Google presents to them. While many cultural and moral issues arise from this "internet monopoly," Google has the best product. Attempts such as the Bing vs. Google challenge will need to increase if consumers are expected use any other type of internet platform. We see the same in the smartphone business as Samsung and Motorola want customers to know that the Apple iPhone is not the only smartphone on the market. Consumers will always gravitate towards the better product. As bad as it may sound, issues such as dependency and limited perspective are not the forefront of concerns for a typical internet user. The consequences of "Googlization" are unknown and so are the long-term effects. As of right now, my choice for searching content and directions would be Google because the consumer always wants to use the best.