Nov 2nd Lecture Notes/summary

The class began with a guest lecturer and PhD student discussing her research with the class. She examined the types of photos individuals chose to display on Tinder. The sample size was 80 participants, between the ages of 18-34 years old. Among these 80 selected she had over 300 photos to analyze. The radius was set to 20 km since it offered a comfortable distance for sample size and included a realistic area. Among the findings she discovered gender roles to be a strong predicted of the chosen images by users. Females often included camera angles that were high (looking down) on the individual, and males chose either eye level or low angles (to look up at the subject). In addition to this, pets and babies are included in photos to appeal to viewers and show their softer, trustworthy side. Since the profiles are linked to Facebook, the aspect of trust that the user is a real person is much higher than other dating sites where the profile stands alone.

Two presentations followed the research discussion. Ubiquitous media was the topic of the first presentation. Here we learned about how media is everywhere with us and influences daily life, such a show we vote, the things we buy, how we date, where we work, how we protect ourselves, RFIDs, and how media is like a virus and is present in every part of life.

The second presentation was about how adolescents establish privacy onine. The main topics were things like adolescent disregard for privacy online, legal limitations, platform specific privacy settings, innovation to get around privacy measures or establish new ones and the social constructs around trust. Overall the responsibility of privacy lies with the user, and the lowest levels of privacy responsibility lies with the social media platform. I briefly talked about Social Learning Theory which was my way of discussing how our context provides the learning environment for how to use social media platforms, especially with our own peers and extended circle of communities. I created a two by two model to illustrate the risks and motivations towards posting hit or low level risk content online.

We ran out of time during class to actually have a lecture, so the next class we will be discussing privacy further.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s