136 lines
9.7 KiB
HTML
136 lines
9.7 KiB
HTML
<html lang="en">
|
|
<head>
|
|
<title>Books about the evils of social media</title>
|
|
<link href="./style.css" rel="stylesheet" type="text/css" media="all">
|
|
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
|
</head>
|
|
<body>
|
|
<h1>Books about the evils of social media</h1>
|
|
<table class="f">
|
|
<tr class="info">
|
|
<td><a href="https://libgen.is/book/index.php?md5=7E480476514340F174D938ECBD46499F">The Influencer Industry</a></td>
|
|
<td><a href="http://127.0.0.1:8888/CHK@3G5SksRBN6jbKIgOuzLWRh2nnVrExBxp4VxoPI18FzI,Mn5-EULoh-US0XGlUXBmjugCo1OCr9Oyvb1vY7PswB0,AAMC--8/The%20Influencer%20Industry_%20The%20Quest%20for%20Aut%20-%20Emily%20Hund.epub">Emily Hund</a></td>
|
|
<td>Academic</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="snippet">While individual participants looked for a route to autonomy, stability, and professional fulfillment that seemed impossible elsewhere, they ended up creating a value system that advanced the erosion of boundaries between individuals' inner lives and commercialism, asking us to view ourselves as products perpetually ready for market, our relationships as monetizable, and our daily activities as potential shopping experiences.</td>
|
|
</tr>
|
|
</table>
|
|
<br>
|
|
<table class="f">
|
|
<tr class="info">
|
|
<td><a href="http://libgen.is/book/index.php?md5=30D219FBBBEB39A96325486284C29475">Cybersexism</a></td>
|
|
<td><a href="http://127.0.0.1:8888/CHK@2XueTzZBSviuXCPgkxXsvVSk7gHZ6qN~EjpxJaKhQzc,9uJex-T2H3fM~zZ0hiqt15-ARrn5QTg59R3jTl4q~yI,AAMC--8/Cybersexism_%20Sex%2C%20Gender%20and%20Power%20on%20the%20-%20Laurie%20Penny.epub">Laurie Penny</a></td>
|
|
<td>Casual</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="snippet">To claim that there's some sort of equivalence between the coordinated attack on Net neutrality and digital freedom going on across the world and the uninterrupted misogyny of comment-thread mouth-breathers doesn't just take the biscuit, it pinches the packet and dribbles ugly, bile-flecked crumbs into the keyboard. It is deeply offensive to the many, many activists, hackers and developers who have given their time, imperilled their jobs and sometimes risked their lives to keep governments like the United States' from clamping down on free Internet usage to describe women speaking about feminism online as a threat to 'Freedom of Speech'.</td>
|
|
</tr>
|
|
</table>
|
|
<br>
|
|
<table class="f">
|
|
<tr class="info">
|
|
<td><a href="http://libgen.is/book/index.php?md5=78CCA89C583181FF8EC72F9EA59424C7">The Internet Of Garbage</a></td>
|
|
<td><a href="http://127.0.0.1:8888/freenet:CHK@5yywnhjbk7fHd8QVeJPNuCKRrXhCvMyyMenB3g2MMHY,pah79Ss0zmXEEE5FiyubrFHZBuXpC-sK4pmeAqBZoks,AAMC--8/The%20Internet%20of%20Garbage%20-%20Sarah%20Jeong.epub">Sarah Jeong</a></td>
|
|
<td>Casual</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="snippet">For persecuted individuals, there is no eternal frontier to flee to. Certainly one could retreat by deleting one's entire online presence, but this is not the promise of a boundlessly big internet. For targets of sustained online harassment, the internet is a one-room house full of speakers blaring obscenities at them.<br>Anti-harassment can take the form of smashing the speakers or turning off the electricity. Or it could take the form of turning down the volume, throwing a blanket over the speakers, giving people noise-canceling headphones, or even building new rooms in the house. Anti-harassment is about giving the harassed space on the internet, and keeping the electronic frontier open for them.</td>
|
|
</tr>
|
|
</table>
|
|
<br>
|
|
<table class="f">
|
|
<tr class="info">
|
|
<td>Haters</td>
|
|
<td><a href="http://127.0.0.1:8888/freenet:CHK@bRnDPGvvYF7Po-JB83xYMANTOuSz4nZdF42oh0Ory9Y,l8uoJ1Ia8i0ZtkK~1O9vfFYO0RhwgjmG31lViYKuJmo,AAMC--8/Haters%20-%20Bailey%20Poland.epub">Bailey Poland</a></td>
|
|
<td>Academic</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="snippet">Reshaping a woman's argument to make it seem as though she said or implied something damaging to freedom of speech is one of the fastest ways to gain support for harassing her, as cybersexists frequently use their own interpretation of free speech as a way to demand that women refrain from criticizing their sexist statements. That is, sexists assume that free speech also includes the ability to be free from criticism or social repercussions. This line of reasoning ignores the reality that, in the United States, the First Amendment is related to government censorship and has nothing to do with whether women approve or disapprove of sexist statements.</td>
|
|
</tr>
|
|
</table>
|
|
<br>
|
|
<table class="m">
|
|
<tr class="info">
|
|
<td><a href="https://libgen.is/book/index.php?md5=6E090938C66CF360D1FD2C927D930A55">The Stars in our Pockets</a></td>
|
|
<td><a href="http://127.0.0.1:8888/CHK@ZR6VyYcZD3nBaEXl8u2SJVe-Kq3tXVurxhu6NkavV6U,PcJUtuPm7BbQOnj5H~Oey110uagEQJR1E3y6JsG9gCA,AAMC--8/The%20Stars%20in%20Our%20Pockets_%20Getting%20Lost%20and%20-%20Howard%20Axelrod.epub">Howard Axelrod</a></td>
|
|
<td>Casual</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="snippet">Curiosity as an approach to the world, as a means of orientation, is becoming obsolete. I don't just mean Google curiosity - with questions that can be instantly searched, instantly answered - or online news curiosity - with questions that get asked for you - but the kind of curiosity that originates with negative capability, with following your deepest affinities...</td>
|
|
</tr>
|
|
</table>
|
|
<br>
|
|
<table class="m">
|
|
<tr class="info">
|
|
<td><a href="http://libgen.is/book/index.php?md5=A0191A20751CAC72C954FD3F6BD55B96">Digital Madness</a></td>
|
|
<td><a href="http://127.0.0.1:8888/freenet:CHK@YT16EaFnWOXyTFmHEiDV0-pEXPVXMQ6L~cdzXcCZh9g,eLZa~5Ie3XcY4752xjd0SArKbMvc6e~PvaEIKEd4vb8,AAMC--8/Digital%20Madness_%20How%20Social%20Media%20Is%20Drivi%20-%20Nicholas%20Kardaras.epub">Nicholas Kardaras</a></td>
|
|
<td>Casual</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="snippet">Internal emails showed that there was a discussion at Facebook about modifying their harmful algorithm, but that was firmly rejected by the decision-makers. The company's response to the data indicating that their product was killing teens? Cost of doing business... Facebook was apparently willing to accept that some teenage girls may have to die and be collateral damage in the quest for obscene profitability.</td>
|
|
</tr>
|
|
</table>
|
|
<br>
|
|
<table class="m">
|
|
<tr class="info">
|
|
<td><a href="https://libgen.is/book/index.php?md5=7520C8C486D712BF6AE0B1EB0857CB56">The Net Delusion</a></td>
|
|
<td><a href="http://127.0.0.1:8888/CHK@k5pHnt7rsKAnuM5~ShtzjAB4I2fDILFtcGzefRjkbPk,nGceywU5DHl2Qt9L2AM1txx2vM0PKbHxbjgUD192SDQ,AAMC--8/The%20Net%20Delusion_%20The%20Dark%20Side%20of%20Interne%20-%20Evgeny%20Morozov.epub">Evgeny Morozov</a></td>
|
|
<td>Academic</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="snippet">Apparently, nothing bad ever happens on the Internet frequented by the editors of <i>Wired</i>; even spam could be viewed as the ultimate form of modern poetry.</td>
|
|
</tr>
|
|
</table>
|
|
<br>
|
|
<table class="m">
|
|
<tr class="info">
|
|
<td><a href="http://libgen.is/book/index.php?md5=882F38D473A71CDD842E86F4617AB9DE">The Death Of Truth</a></td>
|
|
<td><a href="http://127.0.0.1:8888/CHK@uMh1UuaSPFsiYGQT15FwobySk~YWk0-Tp7HgYwnV54U,SWEMcHiOMgWhK1JFXikcfnSm1j8DI6uvZwtUKEPCsnw,AAMC--8/The%20Death%20of%20Truth_%20How%20Social%20Media%20and%20t%20-%20Steven%20Brill.epub">Steven Brill</a></td>
|
|
<td>Casual</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="snippet"><i>As with building codes requiring adequate exit access in a crowded theater, the FTC rule would include a requirement that the platform demonstrate that it has the capability to adhere to these terms of service - in this case to screen the volume of its content in a way that actually ensures that while the screening process meant to achieve its terms of service may not be perfect, it is designed to be near perfect.</i> If this means that a platform has to cut its profit margins to hire thousands of people to screen all content before it is posted, or that it has to drastically lower the volume of users or the amount of content that it can post, so be it.</td>
|
|
</tr>
|
|
</table>
|
|
<br>
|
|
<table class="m">
|
|
<tr class="info">
|
|
<td>Facebook Society</td>
|
|
<td>Roberto Simanowski</td>
|
|
<td>Academic</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="snippet">A main thesis of this book is that social networks and diary apps prompt their users to engage in more or less unconscious and unreflective self-narration of a kind that favors implicit over explicit self-revelation and that prefers mechanical presentation (via photography or automated sharing) to mindful representation (via textual statements or the creation of a narrative structure).</td>
|
|
</tr>
|
|
</table>
|
|
<br>
|
|
<table class="m">
|
|
<tr class="info">
|
|
<td>You Are Not A Gadget</td>
|
|
<td>Jaron Lanier</td>
|
|
<td>Casual</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="snippet">So a better portrait of the troll-evoking design is effortless, consequence-free, transient anonymity in the service of a goal, such as promoting a point of view, that stands entirely apart from one's identity or personality. Call it drive-by anonymity.</td>
|
|
</tr>
|
|
</table>
|
|
<br>
|
|
<table class="m">
|
|
<tr class="info">
|
|
<td>Ten Arguments for Deleting Your Social Media Accounts Right Now</td>
|
|
<td>Jaron Lanier</td>
|
|
<td>Casual</td>
|
|
</tr>
|
|
<tr>
|
|
<td class="snippet">...women and girls who attempt to express themselves online find that their words and images are sexualized or incorporated into a violent or manipulative framework. Women's online presences have often been grotesquely transformed for the purposes of humiliation, shame, and harassment.</td>
|
|
</tr>
|
|
</table>
|
|
<hr>
|
|
<p>Other relevant writings on the Internet:</p>
|
|
<ul>
|
|
<li><a href="https://web.archive.org/web/20241111020040/https://starbreaker.org/blog/misc/re-finding-authentic-web/index.html">RE: Finding the Authentic Web</a></li>
|
|
</ul>
|
|
</body>
|
|
</html>
|