{"id":95,"date":"2017-09-04T22:56:50","date_gmt":"2017-09-04T22:56:50","guid":{"rendered":"http:\/\/wordpress.cs.vt.edu\/cs4984fall17\/?p=95"},"modified":"2017-09-04T22:56:50","modified_gmt":"2017-09-04T22:56:50","slug":"reading-response-95","status":"publish","type":"post","link":"https:\/\/wordpress.cs.vt.edu\/cs4984fall17\/2017\/09\/04\/reading-response-95\/","title":{"rendered":"Reading Response 9\/5"},"content":{"rendered":"<p>Reading Response September 5th\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 James Brothers<\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>The paper \u201cIdentity and Deception in the Virtual Community\u201d begins by waxing very philosophical, mostly on whether or not you are you, or if by having multiple online personas you can become something different. The paper is primarily a study into \u2018Usenets\u2019 and why or how people use them, and specifically how identify plays a role in their use or communities. The paper then dives into just <em>how <\/em>you can use various clues to help identify people based on what they say online, and to see if it lends them a measure of credibility. A user who has an obviously free email may be suspect, while someone who has a domain belonging to their business is much more likely to be asking questions or qualified to be answering questions related to their business. Other ways to identify someone can also be their style of writing, the words they use, or the content of their message. Someone talking about their fish hobby, who writes both well and eloquently, is probably not a 9-year-old who got his parent\u2019s computer to mess with people on the internet. However, deception is rife on the internet, as many of us know. The paper talks about various forms of online deception and its uses, many of which are a part of our common knowledge or vernacular today (Trolling for example).<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Reflection<\/strong><\/p>\n<p>It is interesting that Identity plays an inherent role in whether or not we believe things people say or write. The article mentions that articles from the Wall Street Journal are seen as inherently more believable than a tabloid. That said, its something we don\u2019t often give much thought to. How many pictures of \u201cfacts\u201d online have you seen and believed? How many \u201cquotes\u201d do you see or hear on a regular basis? We give incredible scrutiny to these aspects in some cases, but not in others. It is perhaps telling that I already recognize and understand a fair amount of what the paper is talking about, as these issues have become a regular part of much of what we do on computers. Trolling, the assumption that I should take everything online with a grain of salt, etc. These are all things I understand and unconsciously do on a daily basis. There are extremely few things I look at online and assume they\u2019re true, I suppose mostly online profiles which involve detailed storied pasts and a large number of pictures. Even so, people have been faking things like Facebook profiles for quite some time. Some form of easy identification (such as Twitter\u2019s verified accounts) is important these days.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Questions<\/strong><\/p>\n<p>-What \u201csignals\u201d (assessment or conventional) do you see or use in everyday social media?<\/p>\n<p>-What information could we glean from an analysis of various social medias\u2019s writing styles? Moreover, what does your say about you?<\/p>\n<p>-Have new forms of deception arisen since this paper was written, or what new forms of online identity deception exist now?<\/p>\n<p>-Have any of you ever had issues with deception in online media? What did you do after you realized this? What could you do again in the future to combat it?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reading Response September 5th\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 James Brothers Summary The paper \u201cIdentity and Deception in the Virtual Community\u201d begins by waxing very philosophical, mostly on whether or not you are you, or if by having multiple online personas you can become something different. The paper is primarily a study into \u2018Usenets\u2019 and why or how people use [&hellip;]<\/p>\n","protected":false},"author":72,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-95","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/wordpress.cs.vt.edu\/cs4984fall17\/wp-json\/wp\/v2\/posts\/95","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wordpress.cs.vt.edu\/cs4984fall17\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wordpress.cs.vt.edu\/cs4984fall17\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.cs.vt.edu\/cs4984fall17\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.cs.vt.edu\/cs4984fall17\/wp-json\/wp\/v2\/comments?post=95"}],"version-history":[{"count":1,"href":"https:\/\/wordpress.cs.vt.edu\/cs4984fall17\/wp-json\/wp\/v2\/posts\/95\/revisions"}],"predecessor-version":[{"id":96,"href":"https:\/\/wordpress.cs.vt.edu\/cs4984fall17\/wp-json\/wp\/v2\/posts\/95\/revisions\/96"}],"wp:attachment":[{"href":"https:\/\/wordpress.cs.vt.edu\/cs4984fall17\/wp-json\/wp\/v2\/media?parent=95"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wordpress.cs.vt.edu\/cs4984fall17\/wp-json\/wp\/v2\/categories?post=95"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wordpress.cs.vt.edu\/cs4984fall17\/wp-json\/wp\/v2\/tags?post=95"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}