In last weeks tutorial we were asked to create and share a survey onto Facebook for our friends to answer. I chose the topic of “Social Media” and how it affects peoples lives. Here are the results taken from 32 people who did the survey.
I found these answers interesting because majority of people would agree that sometimes social media is interfering with their quality of life.
This answer was also interesting because while majority said no a lot of people admitted that yes it does make them feel jealous or insecure about their relationship.
In hindsight I wish I had given the option for 0-2 hours to break up the majority. However, even though majority answered that they spend 0-5 hours per day on social media some said 5-10 hours and one person answered 15-24 hours. I feel like this is in direct correlation with the people who answered that social media is interfering with their quality of life and they feel jealous in their relationships.
This was the question I was most excited for people to answer because social media is such a huge part of our daily lives now. Majority admitted that they could do it or that they would consider doing it.
Survey Monkey 2017, viewed 11 August 2017, <www.surveymonkey.com>
This photograph is by Chris Garcia and has CC rights attached to it. Therefore, it is free to use and share by his permission under the licence agreement.
Creative Commons 2017, viewed 11 August 2017, <www.creativecommons.org.au>
In this weeks lecture we learnt about cyberactivism which is a form of activism online. We watched a BBC documentary on the founder of WikiLeaks, Julian Assange. Who is an Australian hacktivist notorious for releasing private documents and data to the public that would otherwise be kept secret by the government.
In the lecture it was explained that a hacker is a person who users a computer to gain unauthorised access to data whilst a hackivist is a person who hacks a computer system to bring attention to a political group or cause.
A group of hackivists could therefore be Anonymous. They famously wear the Guy Faulkes mask that represents freedom and are described as “digital Robin Hoods or CyberTerrorists” by some people.
This has also been described as electronic warfare. After the lecture I began to think about my own experience with cyberactivism and remembered the viral video of Kony 2012.
This video was hugely successful and went viral by itself because of its powerful message, call to action and effective use of primary rhetorical tools pathos, logos and ethos.
However, the campaign was soon questioned as a fake and fraudulent because of the low action taken after it’s initial launch.
It seemed to have failed because people couldn’t witness the result or where their money from donations were going to. Were they going to the children in need or just to the organisation?
While this was a call to arms for action it seemed to have failed when it went viral and people became frustrated as a result.
But many people failed to see that the organisation just wasn’t ready for such traffic. 120 million views in 5 days with a working staff of under ten people. That’s a lot of work and Public Relations to handle.
Many charities and non-for-profit organisations use cyberactivism in this form. PETA and RSPCA fight against animal cruelty and encourage users to hashtag, share and donate when they see a shocking image or something outrageous that is cruel and unfair.
It seems the algorithm now works solely on outrage and plunges deeper and deeper into these shocking images to move something within us to take action and press that share button.
“I share therefore I am.”
However, these people are not hackers or involved in hacktivism.
Hacktivism involves the hacking of computer systems, for a politically or socially motivated purpose (SearchSecurity, 2017).
A hacktivist uses the same tools and techniques that a hacker would use, but they do so in order to bring attention to a greater political or social cause (Denning, 2017).
The main differences between hackers and hacktivists is that hacktivists use illegal and unethical procedures to collect and distribute classified information. Such is the case with Julian Assange.
Biography.com. (2017). Julian Assange. (Accessed 7 August 2017). https://www.biography.com/people/julian-assange-20688499
Denning, D. (2017). The Rise of Hacktivism. (Accessed 7 August 2017). http://journal.georgetown.edu/the-rise-of-hacktivism/
Kony 2012, (2012), viewed on 7 August 2017, https://www.youtube.com/watch?v=Y4MnpzG5Sqc
Pangburn, D. (2011) “Digital Activism From Anonymous to Occupy Wall Street: a Conversation With Gabriella Coleman”. http://www.deathandtaxesmag.com/157192/digital-activism-from-anonymous-to-occupy-wall-street-a-conversation-with-gabriella-coleman/
SearchSecurity. (2017). What is hacktivism? – Definition from WhatIs.com. (Accessed 7 Aug. 2017). http://searchsecurity.techtarget.com/definition/hacktivism
I have chosen to do a timeline on Microsoft’s Xbox for something different and because I am a lover of video games. I am very excited for the future of gaming and think it has a lot of amazing potential in education and skillsets for the future as well as good ole fashioned entertainment.