12.1 Notes on ONE Research Article You’ve Found and Read

For Tuesday: pleaseĀ print, read, and take notes on ONE article YOU’VE found while researching your Essay 2 topic.Ā  Below, please post notes on three points in the article. Ā Also, please write out one quotation and include the page # where it appears.

Also, please finish reading Carrie Rentschler’s “Rape Culture and the Feminist Politics of Social Media.” Ā For those of you interested in reading more about the case of sexual assault in Steubenville, OH mentioned by Rentschler, you can access an article on this case here. Ā Just a note: this article contains somewhat graphic descriptions of sexual assault and may be disturbing to read about. Ā (It is optional reading.) Ā For those of you interested in recent feminist responses to the high-profile cases of sexual assault currently in the media (e.g., Harvey Weinstein, Kevin Spacey, Knight Landesman, etc.), you can access a manifesto by a group of feminist artists called “Not Surprised” here.

11 thoughts on “12.1 Notes on ONE Research Article You’ve Found and Read”

  1. Topic: social media’s impact on romance and self esteem
    First, I googled “why do people tend to find romance online?”Then, I Selected “How Is Technology Shaping Romance” from Greater Good Magazine by Jill Suttie, posted on August 12,2015. This article mentions that people might not find the right person without real communication, because people sometimes text differently that they might never say in person as Suttie states,”There’s not a dating service on this planet that can do what the human brain can do in terms of finding the right person.” In addition, online dating provide copious opportunities dating choices based on their likes through apps like tinder, match.com and etc, because in the past SINGLE people normally have met dates mostly through their families, friends, or others. This service of online dating has increase the chance of meeting someone that you like or click with online then just having a date through your families or friends.

  2. My topic is Online Relationships, both romantic and platonic as both can be dangerous.
    Title: Love 2.0: A Quantitative Exploration of Sex and Relationships in the Virtual World Second Life
    Date: August 2012, Volume 41, Issue 4, pp 939ā€“947
    Author: Ashley John Craft
    Quote one: ” Amy Taylor, who met her husband David Pollard in an Internet chat room and until recently lived with him in a flat in Cornwall, in the United Kingdom, decided to file for divorce when she found that her husband was ā€œchatting and hanging outā€ with an American woman in the online virtual world of Second Life (Morris, 2008). ” This displays how people can be unfaithful to their real life lovers and nearly get away with it because they are online.

    Quote two: ” Technological changes bring with them changes in the patterns of society, and even love is not impervious to its effects. ”

    Quote Three: ” Bauman (2003) wrote, ā€œthe advent of virtual proximity renders human connections simultaneously more frequent and more shallow, more intense and more briefā€ (p. 61). “

  3. My topic is the correlation between Our Online Identities and our online security and privacy. I searched on Google Scholar and my first result was “Anonymity, Privacy, and Security Online,” by Lee Rainie. Exactly what I wanted.
    In the article, it states that “59% of internet users do not believe it is possible to be completely anonymous online, while 37% of them believe it is possible.” Although 37% is a lot less than 59%, it is still a significant amount of people that believe you are able to be completely anonymous online, which in my opinion is incredibly hard to achieve.
    “21% of internet users have had an email or social networking account compromised or taken over by someone else without permission” I believe that is absolutely true, as I have “taken” over someones email account before, twice to be exact.
    “Most internet users know that key pieces of personal information about them are available online ā€“ such as photos and videos of them, their email addresses, birth dates, phone numbers, home addresses, and the groups to which they belong.” Pg 2
    This proves that most people online are willingly to put their information out for the public to see, furthermore, they are willingly to put themselves in danger.

  4. Topic question: Undecided.
    — Broad description: Internet gaming addiction

    Steps:
    1. Google “internet gaming addiction”
    2.Feel dumb
    3.recall the article I emailed to myself the day I learned of databases.
    4.Uses that article.

    Article: Decision-Making for Risky Gains and Losses among College Students with Internet Gaming Disorder.

    Point 1: A factor that comes into play often when it comes to internet gaming addiction is that it effects decision-making. More often then not because of it some people tend to make worse decisions rather than positive ones.

    Point 2: There was a study involving college students but the criteria in order to be a subject was to never have a past experience with drugs or have any psychiatric or neurological diseases.

    point 3:Subjects were tested using a program of something called cup tasks was used to determine the level of how favorable a risky decision was over a safe one with each subject.

    Quote: “Decision-making is a
    complex multifaceted function and different cognitive processes are involved in decisionmaking
    for gains and losses. However, the relationship between impaired decision-making
    and gain versus loss processing in the context of IGD is poorly understood.” I have to agree with the fact since many people everyday go through life making decisions. More often than not people including myself end up making poor choices not only due to understanding but understanding of the weight behind my decision. Or at least that’s what I acquired from this statement.

    Things to do:
    1. Read up on more articles of the like.
    2. Fact check this within those other articles
    3.Stop being lazy and get this done.

  5. Topic question: Virtual life in the millennial era

    About: The virtual life we all carry in social media, emotional attachments and addictions.

    Title: Generation We
    Eric Greenberg
    2008

    Point 1: The benefits of technology.
    Milenials are smart and driven by technology.

    Point 2: Many believe that millennial youth are taking over America
    and changing our world forever.

    Point 3: ā€œ Wired generation; optimistic about the social and ecumenic impact of new technologies.ā€

    Overall, I am gathering interesting information. I am utilizing my own articles as well as Monroes.

  6. My topic is Cyberbully and how adolescents play apart in it.
    Title: “The Internet Made Me Do It”: Social Media and Potential for Violence in Adolescents.
    Authors: Gansner, Meredith E.1
    Source: Psychiatric Times. Sep2017, Vol. 34 Issue 9, p32-33. 2p.
    Subject Terms: *CRIME *INTERNET *PSYCHIATRISTS
    *SOCIAL networks *VIDEO games *VIOLENCE
    *INTERNET addiction *SOCIAL media
    In this article it talks about how:
    Point 1- Two Wisconsin preteens who had lured their best friend into the woods and stabbed her 19 times. When asked why, these girls reported that the internet meme ā€œSlendermanā€ drove them to do it
    Slenderman is a fictional supernatural character that originated as a creepypasta Internet meme created by Something Awful forums user Eric Knudsen (also known as “Victor Surge”) in 2009. The Slender Man commonly feature him stalking, abducting or traumatizing people, particularly children.
    Point 2: There is limited research to indicate that an increased number of hours on social media correlates directly with aggressive behavior, but there is literature that connects certain types of internet use to increased aggressive behavior.
    Point 3: Teenagers who spend hours ā€œlikingā€ their friendsā€™ pictures on social networking sites may be significantly more likely to have other traits associated with violent behavior aside from their internet habits.

  7. Iā€™ googled ā€œsocial mediaā€™s impact on self esteemā€ and found an article that had the exact name of what Iļø typed in on google ā€œsocial mediaā€™s impact on self esteemā€ by
    Clarissa Silva. Iā€™ve read that after she interviewed men and women, ranging from ages 28-73, that are active social media, she found that: 60% of people using social media reported thatā€ it has impacted their self-esteem in a negative wayā€
    50% reported ā€œsocial media having negative effects on their relationshipsā€. 80% reported that ā€œis easier to be deceived by others through their sharings on social mediaā€.

  8. My topic is about how people interact online in the time surrounding death.

    Article: Beyond the Grave: Facebook as a Site for the Expansion of Death and Mourning
    by Jed R. Brubaker, Gillian R. Hayes, and Paul Dourish

    THREE POINTS:
    ā€¢The way an individual grief and respond to death is connected to their values.
    ā€¢The bereaved expression of grief is special because of their relationship while the “survivors” such as friends/acquaintance are constructed or express their own relationship to the deceased.
    ā€¢social network sites allow one to see how individuals belief system impact the way they interact with the deceased.
    QUOTE : “On SNSs, we can see the influence of belief systems in the ways users incorporate ideas of the afterlife in their use of postmortem profiles and the content they contribute.”

  9. 3 points from the article I’ve found and read // +1 quotation

    “Discrimination and Privacy in the Information Society” was a book I found on Google Scholar. “What is Data-mining and how does it work?” is a chapter of the book I found interesting.

    -Data-mining recently became a field

    -machine learning, artificial intelligence,
    visualization, statistics, and analytics allowed research communities grow for data-mining

    -developments in technology paved a way to create and store more data for the increasing databases

    “Unlike in statistics, where the data is collected specially with the
    purpose of testing a particular hypothesis, or estimating the parameters of a model,
    in data mining one usually starts with historical data that was not necessarily
    collected with the purpose of analysis, but rather as a by-product of an operational
    system.”

  10. Preying on Lonely Hearts: A Systematic Deconstruction of an Internet Romance Scammerā€™s Online Lover Persona by Tan Hooi Koon & David Yoong.

    1. This paper says that a scammer scouts for their preys and strike for the weak ones.

    2. Scammers use religion against their preys.

    3. People often fall for the scams.

    A personā€™s credibility plays an important factor in gaining the trust of others and consequently influencing them to accept oneā€™s propositions (Mayer et al., 1995). Clifton and Van de Mieroop (2010)elaborate Aristotleā€™s concept of ā€˜ethosā€™and suggest that oneā€™s credibility can be demonstrated by the following means:ā€¢good sense-relates to ā€œthe ability to display that one is intelligentā€ā€¢good characterā€“referring to an identity that displays ā€œpositive values such as honesty, sincerity and so onā€ ā€¢good willā€“referring to the identity that ā€œhas the interlocutorā€™s concerns at heartā€.

    this quote explains how far scammers go to manipulate their victims.

Leave a Reply

Your email address will not be published. Required fields are marked *