210 likes | 339 Vues
This compilation examines the complex interplay of identity and anonymity in online spaces, drawing insights from seminal works in digital culture, society, and social media. Key discussions arise from Dibbell’s exploration of virtual violence, Turkle's reflections on identity, and the implications of anonymity on community from various perspectives. It also highlights the evolution of digital interaction through photographs documenting civil rights and gaming, as well as academic critiques of social media's influence on privacy and community, guiding readers through the changing landscape of human connection in digital environments.
E N D
Works Cited • Dibbell, J. (Dec. 1993). A rape in cyberspace; Or, how an evil clown, a Haitian trickster spirit, two wizzards, and a cast of dozens turned a database into a society. Village Voice. • Turkle, S. (Jan 1996). Who Am We? Wired. • Highland, M. (2006). As real as your life. Presented in D. Perry Are games better than real life? TED (2013). Staying Anonymous Online. What Is My IP Address. • (1963). Civil Rights March on Washington, D.C. [Photograph]. Retrieved from The National Archives Database. • McDonald, D. (1983). Sailing At Sunset. [Photograph]. Key West, Florida. Retrieved from the Florida Memory Online Database. • (1940). Door Lock. [Photograph]. Florida. Retrieved from the Florida Memory Online Database. • Collier, J. (1943). Sailor and Girl at the Tomb of the Unknown Soldier, Washington, D.C. [Photograph]. Washington, D.C. Retrieved from the Library of Congress Online Database. • Hardt, D. (2005). Identity 2.0. OSCON • (n.d.).Retrieved from http://www.wpclipart.com/smiley/best_smiley_set/smiley_5/smiley_question.jpg • (n.d.). Retrieved from http://www.wpclipart.com/computer/PCs/more_computers/computer_on_internet_2.jpg • (n.d.). Retrieved from http://www.wpclipart.com/computer/people_on_computers/computer_users/social_newtworking.jpg • (n.d.). Retrieved from http://www.wpclipart.com/toys/game/controllers/gamepad.jpg • (n.d.). Retrieved from http://www.wpclipart.com/tools/miscellaneous/ladder/step_ladder.jpg • Gee, J. P. (2007). Semiotic domains: Is playing video games a "waste of time"?. New York: Palgrave Macmillan. Retrieved from http://williamwolff.org/wp-content/uploads/2008/02/gee-video-games-2007.pdf • Rettberg, J. (2009). What is a blog?. Malden, MA: Polity Press. Retrieved fromhttp://williamwolff.org/wp-content/uploads/2009/08/rettberg-blogging-ch1.pdf • Rooney, B. (2013, January 13). The debate over online anonymity. The Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424127887323468604578245841828280344.html • Rosen, R. J. (2013, January 19). The viral-media prof whose kids got 1 million facebook likes (and a puppy). Retrieved fromhttp://www.theatlantic.com/technology/archive/2013/01/the-viral-media-prof-whose-kids-got-1-million-facebook-likes-and-a-puppy/267338/ • Atwood, M. (2010, March 19). Atwood in the Twittersphere. New York Review of Books. • Kelly, K. (Aug 2005). We Are the Web. Wired. • Aase, L. (2012, December 27). Anonymity is the Enemy of Community. Social Media University, Global. Retrieved April 27, 2013, from http://social-media-university-global.org/2012/12/anonymity-is-the-enemy-of-community/ • Basma, G. (2011, May 26). PRIVACY IN SOCIAL MEDIA – CAN IT EXIST? [Web log post]. Retrieved April 27, 2013, from http://www.pr-media-blog.co.uk/privacy-social-media/ • Brand Security. (2011, June 27). The greatest hacks in history – Pocket. Cyber Crimes Unit. Retrieved April 27, 2013, from http://www.cybercrimesunit.com/the-greatest-hacks-in-history-pocket/ • Hare, B. (2013, January 29). The social network where no one knows your name. CNN.Retrieved April 27, 2013, from http://www.cnn.com/2013/01/29/tech/social-media/social-number-anonymous • Maxon, K. (2012, November 5). Social Media and the Elections: What the Voters Are Doing[Web log post]. Retrieved April 27, 2013, from http://www.advertisingblender.com/social-media-and-the-elections-what-the-voters-are-doing/