Category : –Social Networking
(Bloomberg) In Seinfeld Nation, Millennials Delay Marriage for Selfie
Kelly Wood, 29, and her husband Ethan Bushman married last month, waiting seven years after they met in order to further their education and careers.
“I felt if I had gotten married at an earlier age, it would have been too young,” said Wood, a nurse in San Francisco whose husband is 30 and finishing a graduate degree. “Just being older and more established in our careers and our goals in life, that groundwork is letting us enter into marriage as strong as we can.”
Couples in the U.S. are increasingly postponing marriage, a decades-long pattern exacerbated by financial struggles still facing young adults five years after the end of the deepest recession since the 1930s. The delays are contributing to a lower birth rate and less homeownership, limiting consumer spending.
(HP) Christian Piatt–Is the Internet Killing Christianity?
No one reasonably disputes that attendance in Christian churches is in sharp decline. The real lingering question is “why?” which is one of the most important questions I take on in my new book, postChristian: What’s left? Can we fix it? Do we care?
Though it’s not solely responsible, the Internet — along with the way it changes the way we interrelate, communicate, seek and consume information — is certainly doing its part to contribute to the decline. And it’s not just Church that is feeling the pinch; any hierarchic system in which the institution traditionally has played the role of guard, gatekeeper or mediator is finding their authority challenged.
As for why now, the answer is more complex than any single factor. On the one hand, changing domestic, social and economic systems have caused us to spread out and move around far more than before. The churches, as a result, are no longer social hubs of neighborhoods any more. And along with being social hubs, churches also served as economic engines, as businesspeople networked after worship or over a potluck meal. Now we just use LinkedIn.
(CC) Carol Merritt–8 things you can do to get the word out about your church
Often we want our churches to grow, but we’re not sure what sort of tools to use. We don’t have any sort of action plan to get the word out about our congregations. Of course, word of mouth is still the best way to get people to church, but there are things we can do to make that message sharable. Here are a few steps we can take.
Clarify our message””Think about who your church is and what they aspire to be. Can you think of a story in your history that reflects who you are? Can you think of a metaphor or some sort of physical object to reflect that message? Can you boil the message down to three to five words?
Google Maps””Find your church on Google maps and fill out the details. Make sure the contact information is good. Put your website there.
(Guardian) Schoolgirl jihadis: the female Islamists leaving home to join Isis fighters
Hundreds of young women and girls are leaving their homes in western countries to join Islamic fighters in the Middle East, causing increasing concern among counter-terrorism investigators.
Girls as young as 14 or 15 are travelling mainly to Syria to marry jihadis, bear their children and join communities of fighters, with a small number taking up arms. Many are recruited via social media.
Women and girls appear to make up about 10% of those leaving Europe, North America and Australia to link up with jihadi groups, including Islamic State (Isis). France has the highest number of female jihadi recruits, with 63 in the region ”“ about 25% of the total ”“ and at least another 60 believed to be considering the move.
(Bloomberg) U.S. Outgunned by Extremists on New YouTube, Twitter Battlefield
Even with their technological head start, the U.S. and its allies are coming late to this battle for hearts and minds. Social media’s volume, velocity and verisimilitude have left the U.S. struggling to counter it and mine the communication for reliable information.
By the end of this year, the Geneva-based International Telecommunications Union projects that 55 percent of the world’s 2.3 billion mobile broadband subscriptions will be in developing countries, where unemployed youth can use them to access messages from Islamic State and other extremists.
(Wash. Post) After eight years with Facebook’s News Feed, there’s no such thing as ”˜TMI’
In the eight years since, Facebook’s News Feed ”” that LED-lit window through which we glimpse news, memes and snatches of other people’s lives ”” has not exactly gotten less controversial. But the nature of that controversy has fundamentally changed. Where early college users raged against sharing, and seeing, too much information ”” of being subsumed, in effect, by the social media noise ”” our anxieties today frequently involve getting too little of it. Facebook’s latest changes to the News Feed, announced just last week, are essentially tooled to give users more content, more quickly.
Both concerns relate to control. Whether we see too much content or too little, everything we see in Facebook’s News Feed is determined by an algorithm ”” an invented mathematical formula that guesses what you want to see based on who posted it, where it came from, and a string of other mysterious factors known only to the programmers and project managers who work on it.
(Commonweal) Unaccountable–The CIA's Troubling Violations of Trust
The story of how the Central Intelligence Agency came to operate a secretive program of rendition, detention, and interrogation under President George W. Bush has been made public by a number of investigations into the abuses that resulted. In 2007, the Red Cross detailed the methods used to interrogate suspects at CIA-run “black sites.” In 2010, the Justice Department’s Office of Professional Responsibility strongly criticized the Bush administration lawyers who wrote the legal memos permitting the CIA to use torture. And last year, the Constitution Project Task Force on Detainee Treatment””a nonpartisan group that included a number of former military and intelligence personnel””analyzed what is known about mistreatment of detainees and the policy decisions that led to such ugly consequences.
Now a new report is expected from the Senate Select Committee on Intelligence, which is charged with overseeing the activities of the CIA.
(Time) Wendy Shalit on The Private Self(ie), Girls, Women, and Shame and Modesty
Since the Jennifer Lawrence photo hack, Internet security has come under scrutiny. But why do many young women feel the need to take and share nude selfies in the first place? Don’t get me wrong: I think hackers are morally reprehensible and should be prosecuted to the fullest extent of the law. But I also think that we need to build an alternative to the dogma “If you’ve got it, flaunt it.” Young women are told that it’s a sign of being proud of your sexuality to “sext” young men””a philosophy that has turned girls into so many flashing beacons, frantic to keep the attention of the males in their lives by striking porn-inspired poses.
Today if you watch the famous Algerian-French singer Enrico Macias singing to his late wife, Suzy, about how he “won her love,” their dynamic seems as if it’s from another planet. Some might watch this decades-old video and imagine her passivity indicates that she wasn’t empowered. But I see something else in her shy manner and dancing eyes: a drama between them that was not for the public to see. The words of his song are certainly moving””“In the exile’s nights, we were together/ My son and my daughter are truly from you/ I spent my life ”¦ waiting for you”””and yet there was even more than what those beautiful lyrics revealed.
The pressure on girls today to take sexy selfies comes out of a culture that routinely equates modesty with shame, instead of recognizing it for what it really is: an impulse that protects what is precious and intimate.
(Wired) Ex-Googler Shares His Big-Data Secrets With the Masses
Google’s search engine makes it wonderfully easy to locate stuff on the web, whether it’s in a news article, a corporate website, or a video on YouTube. But that only begins to describe Google’s ability to find information. Inside the company, engineers use several uniquely powerful tools for searching and analyzing its own massive trove of data.
One of those is Dremel, a tool that helps Google’s employees analyze data stored across thousands of machines, at unusually fast speeds. What’s more, Dremel lets the Google team to manipulate all of this data using a language very similar to SQL, short for Structured Query Language, the standard way of grabbing information from databases.
Like most of its custom-built tools, Dremel is only available inside Google. But now, the rest of the world can hack data a little more like Google does, thanks to Quest, a Dremel-like query engine created by Theo Vassilakis, one of the lead developers of Dremel at Google, and Toli Lerios, a former engineer at Facebook. The tool is one of a growing number of that seek to mimic the way web giants like Google and Facebook rapidly analyze enormous amounts of online information stored across hundreds or even thousands of machines. This includes everything from a project called Drill, from a company called MapR, to a sweeping open source platform called Spark.
(Time) How the Islamic State of Iraq and Greater Syria recruits female converts, and why
Even as the world expressed its horror at the beheadings of American journalists James Foley and Steven Sotloff by the radical militant group the Islamic State of Iraq and Greater Syria (ISIS), there were those who exulted on social media. Self-proclaimed Western jihadists and ISIS supporters in Syria, these people proclaimed victory and promised more killings to come. “I wish I did it,” noted one on a Tumblr blog. Another asked for links to any videos of Foley’s execution and cackled, in a slang-filled Twitter post, that the “UK must b shaking up ha ha.”
They were both women. The Twitter personality, Khadijah Dare, whose handle Muhajirah fi Sham means “female immigrant to Syria,” declared her desire to replicate the execution: “I wna b da 1st UK woman 2 kill a UK or US terorrist!” Her statement may be pure jingoism, but as ISIS attracts more female adherents, the likelihood of seeing a woman brandishing a knife in the terrorist group’s name only increases.
(FT) Evgeny Morozov–Facebook invades your personality, not your privacy
As usual with Facebook, this is not the whole story. For one, it has begun tracking users’ browsing history to identify their interests better. Its latest mobile app can identify songs and films playing nearby, nudging users to write about them. It has acquired the Moves app, which does something similar with physical activity, using sensors to recognise whether users are walking, driving or cycling.
Still, if Facebook is so quick to embrace ”“ and profit from ”“ the language of privacy, should privacy advocates not fear they are the latest group to be “disrupted”? Yes, they should: as Facebook’s modus operandi mutates, their vocabulary ceases to match the magnitude of the task at hand. Fortunately, the “happiness” experiment also shows us where the true dangers lie.
For example, many commentators have attacked Facebook’s experiment for making some users feel sadder; yet the company’s happiness fetish is just as troubling. Facebook’s “obligation to be happy” is the converse of the “right to be forgotten” that Google was accused of trampling over. Both rely on filters. But, while Google has begun to hide negative results because it has been told to do so by European authorities, Facebook hides negative results because it is good for business. Yet since unhappy people make the best dissidents in most dystopian novels, should we not also be concerned with all those happy, all too happy, users?
(NYT) Russian Gang Amasses Over a stolen Billion Internet Passwords
A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion username and password combinations and more than 500 million email addresses, security researchers say.
The records, discovered by Hold Security, a firm in Milwaukee, include confidential material gathered from 420,000 websites, ranging from household names to small Internet sites. Hold Security has a history of uncovering significant hacks, including the theft last year of tens of millions of records from Adobe Systems.
Hold Security would not name the victims, citing nondisclosure agreements and a reluctance to name companies whose sites remained vulnerable. At the request of The New York Times, a security expert not affiliated with Hold Security analyzed the database of stolen credentials and confirmed it was authentic. Another computer crime expert who had reviewed the data, but was not allowed to discuss it publicly, said some big companies were aware that their records were among the stolen information.
Two Primates of the Anglican Communion Issue a Warning over fake Facebook accounts
The warnings come amid concern that fraudsters are targeting Anglicans by creating false social media profiles and then using them to build up a following before asking for financial assistance or support.
Last month, the Anglican Church in Hong Kong, the Hong Kong Sheng Kung Hui, reported that “several fraudulent Facebook accounts bearing the name and picture of [Primate] Paul Kwong who claimed to the Bishop of Anglican Diocese of Hong Kong Island” had been created.
The church said that its Archbishop, the Most Revd Dr Paul Kwong, “has no connection with the fraudulent website” and that members of the public should “be alert to internet scams and not to provide any personal information or conduct any financial transactions through the website concerned;” and it urged anybody who had given any personal information or conducted any financial transactions through the fake profiles to report it to the Police.
A similar warning has been issued by the Church of Nigeria.
Weekend Quiz–Canadian Bullying statistics
You need to fill in all three blanks first:
At least ______ % [of] adolescent students in Canada have reported being bullied recently
Among adult Canadians, _____% of males and _____% of females reported having experienced occasional or frequent bullying during their school years
_____% of Canadian workers experience bullying on a weekly basis
Now, see how you did and read it all.
(Faithstreet) Bob Smietana–You Might Want to Fact-Check Your Pastor’s Sermon
[This illustration I heard is a…] great story about the power of a good deed. There’s just one problem: Almost nothing about this story is true. It’s one of the most popular myths about Churchill, according Snopes.com and the Downers Grove, Illinois-based Churchill Centre.
How do I know this?
During the sermon, I stopped listening to the pastor and instead turned my eyes on my cell phone. Something about the story just didn’t sit right ”” it was too good to be true. So whatever spiritual lesson I was supposed to learn in the sermon was soon overshadowed by the wisdom of a Google search.
Things get even worse when a pastor starts quoting statistics.
(Telegraph) Google's most popular questions
Like many people, I trust Google to find me answers to everything from the mundane to the medical. Now, after a decade in which our increasing obsession with social media brought our computers out of the study and into the living-room, more of us are turning to the internet even when our question is emotional or irrational. The result: two decades after the birth of the web, our search histories have become a mirror to every aspect of our lives.
“Someone once said that what you look for is way more telling than information about yourself ”“ this is something Google and other search engines understood a long time ago,” says Luciano Floridi, the Professor of Philosophy and Ethics of Information at the Oxford Internet Institute.
“Future generations will be able to trace our interests as a society just by looking at what we were looking for. Even if we don’t find the information, it doesn’t matter. Who we are, how we represent ourselves, how the world feeding back a mirror image of ourselves shapes our idea of ourselves ”“ this is as old as philosophy, but today has a completely new twist. The online and offline are becoming more and more blurred, and that feeds back into our self-perception.” (If that sounds pseudy, then think of the example of a recruiter Googling someone who’s applied for a job: does the person on Twitter better represent who they really are, or the person on their best behaviour in the interview room?)
(W. Post) Buzzfeed fires Benny Johnson for plagiarism
Buzzfeed, the cheeky Web site that has soared in popularity with a mix of throwaway lists and hard-news reporting, has owned up to an ethical breach as old as journalism itself.
In an apology published late Friday night, editor Ben Smith acknowledged that one of the site’s most prolific writers, Benny Johnson, had plagiarized the work of others 40 times in some 500 articles and posts. Johnson has been fired, Smith said.
Johnson’s plagiarism began coming to light on Wednesday after Twitter users and a blog called “Our Bad Media” began reporting instances in which he took other’s work without crediting his sources.
(LA Times) Megan Daum–When cellphones and social media become the enemy
As long as that phone is acting as a kind of electronic umbilical cord, parents can tell themselves their children are safe.
But increasingly the smartphone itself is an instrument of harm. Such is the case with a 16-year-old Houston girl named Jada, who entered the spotlight as she publicly confronted the evidence that she had been raped at a party by at least one other teenager. She says she passed out after drinking a beverage that was spiked and only learned of the crime after her classmates began tweeting photos and videos taken of her unconscious, partly nude body. (Houston police are investigating; no one has been charged.)
What happened next is remarkable in ways that instill faith in the human spirit and at the same time provoke disgust at the depravity and lemming-like behavior that teenagers with smartphones are capable of.
([London] Times) Challenge Launched on the legality of government intelligence-gathering in the UK
Mass surveillance of UK citizens is taking place without proper safeguards and in breach of people’s rights to privacy, it was claimed this week.
The British intelligence services share personal communications data collected by the US authorities on a “vast scale” ”” including on “a very substantial number of people located in the UK,” lawyers claimed at a hearing in London.
The claims came at the start of a landmark challenge to the legality of government intelligence-gathering before the normally secret Investigatory Powers Tribunal, which investigates complaints about the conduct of the security and intelligence services, often behind closed doors.
Read it all (subscription required).
(W Post) In NSA-intercepted data, those not targeted far outnumber the foreigners who are
Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post.
Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else.
Many of them were Americans. Nearly half of the surveillance files, a strikingly high proportion, contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but The Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S.residents.
(Bloomberg View) Leonid Bershidsky–We're All Facebook's Lab Rats
How shocking: Facebook had the temerity to conduct an experiment on its users without telling them and now the results have been published in the Proceedings of the U.S. National Academy of Sciences. Actually, no one should be surprised.
For a week in 2012, the social network’s staff scientist Adam Kramer and two collaborators used algorithms to doctor the news feeds of 689,003 English-speaking Facebook users. They reduced the number of posts containing “positive” and “negative” words, tracked their lab rat users’ own posts, and found that their mood was influenced by that of the news feed. The term, well-known to psychologists studying real-world communications, is “emotional contagion.”
(Wired) The Smart Home of the Future Will Be Realized by ”¦ Pandora?
Nowadays, just about everyone says that everything in our homes will soon be connected to the internet. And some companies, including Google, Apple, and Amazon, are actually making it happen, offering internet-connected televisions, smoke alarms, and thermostats.
But Pandora has been actively pushing this idea even longer than most. Since at least 2006, the company has been working on ways to expand its free online streaming radio service beyond the personal computer. It started with mobile phones, and before long, Pandora was in the car, on the television, and even in the kitchen. In 2011, thanks to a partnership with Samsung, it became the first music service you could use via the refrigerator”“for better or for worse, the abiding symbol of the “smart home.”
(ABC Nightline) TaskRabbit Allows People to Rent Themselves Out for Odd Jobs
Justin Prim isn’t just a bike messenger. He’s part of a new wave of self-employed go-getters, some making six figures, who are capitalizing on something called “the sharing economy.”
“For two years, this has been my main source of income — just riding my bikes around, seeing the sights, picking up random stuff,” Justin said.
Online marketplaces where you rent out things you own have become booming businesses. You can rent out your home with AirBnb, Roomorama, Wimdu and BedyCasa, or your car with Buzzcar, Getawround and RelayRides, or even random stuff lying around with SnapGoods, Rentoid and Parking Panda.
(FT) ISIS (Islamic State of Iraq and the Levant) unleashes digital offensive
In the first day of the assault on Mosul, 40,000 pro-Isis tweets were unleashed, according to analysis by JM Berger, an author who researches extremism and social media, in a co-ordinated campaign of Twitter hashtags and digitally manipulated imagery.
Mr Berger this week discovered that Isis has its own web app, catchily named the Dawn of Glad Tidings. Downloadable by its digital footsoldiers, it allows Isis’ social media command to beam co-ordinated messages into their Twitter feeds, allowing a diffuse, but co-ordinated, mass messaging programme.
“They have used social media to great effect,” says Nigel Inkster, former assistant chief of MI6, the UK intelligence service, and now director of transnational threats at the International Institute for Strategic Studies think-tank. “And its success was undeniably one of the factors in the collapse of the Iraqi army ”“ they have been comprehensively psychologically bested.”
(USA Today) Analysis– Iraq’s Sunni insurgents listed their crimes in annual report
The militant group that exploded on to the scene in Iraq this year has been carefully cataloging its list of brutalities over recent years in an annual report published online, according to a think tank that has analyzed the latest publication.
The report from the Islamic State of Iraq and the Levant ”” known as ISIL or ISIS ”” records in explicit detail the number of assassinations, suicide bombings, knifings and even “apostates run over,” according to the analysis by the Institute for the Study of War.
The report doesn’t trace violence only. It also tracks “apostates repented,” a reference to winning over fellow Sunnis in areas that the group has seized.
(FT) John Gapper–Advertisers have lost the attention of a generation
In a generation, we have shifted from parents trying to stop teenagers slumping in front of the TV to young people losing all interest in the box. US teens are so occupied with social networks and mobile video that they watch only about 21 hours of broadcast TV a week.
The ad industry is suffering from attention deficit disorder ”“ the audience that once sat obediently in front of TV spots lovingly devised by its creatives is hard to pin down. Millennials are out there, on their phones and tablets, but they are as likely to be tweeting angrily about a brand as noticing its ads in the content stream.
“I am nervous about us all being out of a job a year from now if Reed Hastings [chief executive of Netflix] takes over the world,” Laura Desmond, chief executive of Starcom MediaVest, one of the largest advertising buying agencies, told a Cannes gathering. Netflix, the video streaming service, and cable TV network HBO rely on subscription fees alone and do not carry ads.
([London] Times) Isis Jihadists create app to flood Twitter with tide of hatred
Isis is using a sophisticated strategy to spread its bloodcurdling message on social media sites.
Belying its ideology and rejection of Western values, the group has embraced modern technology and built its own computer app, which has been available since April.
The Dawn of Glad Tidings app is designed to circumvent spam filters on Twitter and stagger the release of identical tweets and hashtags through the accounts of those who have downloaded it.
The resulting “Tweetskrieg” has ensured that in recent days, Isis tweets have reached an unusually wide audience ”” a strategy echoing those used by marketing companies to build a “buzz” around a product.
Read it all (subscription required).
Influential Blogger Peter Ould to Step Aside from the Internet/Blog/Twitter World
…perhaps more importantly, it’s become too emotionally exhausting to try to give myself to an institution and a constituency leadership that doesn’t want to resource the ministry that it claims it so much admires.
Read it all. I wish him Godspeed–KSH.