Is Facebook ‘Like’-able?

Joe Lipari, a well-known American comedian took to the extremely common social media site Facebook to share the frustrating experience he had at the Apple Store. Lipari, using Facebook as it was intended, responded to the prompt ‘What’s on your mind?’ and updated his status accordingly. Lipari posted an aggressive quote from the movie Fight Club targeted towards the Apple Store, in an attempt to de-stress from his unsatisfying experience. Moments later an NYPD Swat team occupied his apartment, “their guns drawn” already starting to “tear the place apart”(Hoback, Terms and Conditions May Apply). Only after the fact did Lipari realize that this was in response to his aggressive Facebook status. The authorities flagged the status and Lipari’s address was immediately retrieved prompting the instantaneous search of his apartment. This begs the question of personal privacy on the Internet. While Facebook users believe the information they post is private, and only accessible according to their personal privacy settings, in reality it seems that no information put on the Internet is private at all.

 

Mark Zuckerberg founded Facebook, the popular social media site, in 2004. Since then, the site has grown exponentially to be the world’s most popular social media site, used as a database for people’s personal information. Initially a benign web database for exclusive users with Harvard.edu email addresses, the site opened to the public and “people [began] willingly publiciz[ing] where they live, their religious and political views, an alphabetized list of all their friends, personal email addresses, phone numbers, hundreds of photos of themselves, and even status updates about what they were doing moment to moment” (Hoback, Terms and Conditions May Apply). Christopher Startinsky, the Deputy Director of the CIA claims this “is truly a dream come true for the CIA… after years of secretly monitoring the public”; this information is voluntarily made accessible. This begs the question of personal privacy. Taking a closer look at Facebook’s Terms and Agreements, users seem to not realize their diminishing privacy when they use Facebook as it was intended.

Is the CIA really behind Facebook? It wouldn't be hard to believe if it were true...
Is the CIA really behind Facebook? It wouldn’t be hard to believe if it were true…

 

While we brainlessly click through privacy settings and privacy policy agreements when we sign up for Facebook, users are missing the very important fine print. After years of operation, it is clear that Facebook now has the largest database of collected information on any given person. Trudy Howels, a professor of Computer Science at the Rochester Institute of Technology cautions “privacy considerations become an issue as soon as any data are made public; one could argue that simply the collection and storage of the data presents some level of risk” (Data, Data Quality, and Ethical Use, 8). Howels poses a very important point that once data is public, the modes that this information could be used are unforeseeable to the common Facebook user. Howels also points out that the mere storage of such data implies a desire to use this information for ulterior reasons to why it was put online in the first place. Derek S. Witte, a commercial litigator and eDiscovery lawyer, writes in Journal of Internet Law: Privacy Deleted, “once an individual posts information on Facebook, neither the courts, nor Facebook itself, can promise that the information will remain private and confidential” (19). In its current Privacy Policy, Facebook promises law enforcement that they would respond to requests seeking information on any given profile in its database. Facebook’s current privacy policy details that they “[do] not actually require any particular criminal subpoena or warrant simply provided that ‘we review each request for records individually’” (Witte, 18). Facebook could not essentially deny the NSA or CIA a request to access a profile as Julian Assange, the founder of WikiLeaks notes, “US Intelligence is able to bring legal and political pressure to Facebook” (Facebook, Google, Yahoo are Spying Tools). The ease at which a person’s information from Facebook can be accessed is eye opening and should pose a red flag to all Facebook users.

 

 

Most users are under the assumption that they can altar their Facebook privacy settings giving them a greater sense of control on their privacy. Each aspect of the profile can be adjusted to the users comfort level, which is presumably totally private. In 2009 Facebook changed their privacy settings, and changed the defaults of sharing, without notifying its users in advance. Facebook “turned what was once private information into totally public information” overnight (Hoback, Terms and Conditions May Apply). The default setting was changed so that ‘everyone’ could view and search a given users information. Zuckerberg explained, “the way we’ve designed the site is that it’s a community thing. So people want to share with just there friends but a lot of people also want to share with the community around them”. However, Dana Boyd, Senior Research Manager rightfully states “the problem with defaults is that you get comfortable with whatever the default is” and “as time passed, more and more information was being shared by default”(Hoback, Terms and Conditions May Apply). This desensitizes Facebook users on the whole notion of privacy and makes it acceptable to publicize this information so freely without understanding the consequences, later described in this article.

 

Do you want "Everyone" to be able to see your Facebook posts? Didn't think so.
Do you want “Everyone” to be able to see your Facebook posts? Didn’t think so.

While it is understood that the mere collection of data posses a threat to personal privacy and security, more troubling is the way this data is used. Users should pay attention “not that data are collected and stored, often without knowledge or permission, but how the data stored and collected are used” (Howels, 7). Julian Assange sat down with Russia Today and explained that there is a blurred line between the interest of the state and the interest of commercial business in the West (Facebook, Google, Yahoo are Spying Tools). Assange believes that “Facebook in particular is the most appalling spying machine that has ever been invented” with “the worlds most comprehensive database about people… all sitting within the United States, all accessible to US intelligence” (Facebook, Google, Yahoo are Spying Tools).

 

This would only be an issue if US intelligence wanted to use this type of data, however it is a fact that they do. With this large amount of data, “according to the department of homeland security, Facebook has replaced almost every other CIA information gathering program since it was launched in 2004” (Hoback, Terms and Conditions May Apply). Derek S. Witte, a commercial litigator and eDiscovery lawyer, writes in Privacy Deleted, a Journal of Internet Law, “it is difficult to understand how Justices of the US Supreme Court can openly oppose the creation of an American “Big Brother” when “Big Brother” already exists in the guise of Google, Facebook and, now it seems, the NSA” (13). Whistle blower, Edward Snowden was the first to bring the NSA’s spying database to light, to which “the government responded to Snowden’s allegations by contending that Section 215 of the Patriot Act allows for this indiscriminate collection of data because it could be relevant to a terrorism investigation at some point in time” (Witte, 13). This preventative clause that gives the NSA cause to continuously monitor web and cell traffic, including Facebook activity, is not only a violation of privacy but is strongly misleading as seen in the Joe Lipari case.

 

As anxieties about the constant collection of data arise, “the NSA continues to justify its massive data collections by stressing that the majority of the data is only collected and never used” (Witte, 14). What Facebook users might do upon reading this information is delete all the information they find on their profile they no longer want accessible to the public or government organization. However, information put on Facebook stays in their database even after it has been deleted. Countries other than the US have laws that allow citizens to access any information a given company has on them, including Facebook (Hoback, Terms and Conditions May Apply). An Austrian law student delved deeper into his own Facebook catalogue and found that “if you hit the remove button, it just means it’s flagged as deleted. So you hide it, actually, from yourself. But anyone, like Facebook or any Government Agency that wants to look at it later can still retrieve it and get it back” (Hoback, Terms and Conditions May Apply). Data and information put online lingers behind a screen that the general public can’t see. It waits for the opportunity to be used against you, otherwise why would government agencies feel the need to retain it? The consequences for trusting Mark Zuckerberg with, in essence, your whole life may be extremely detrimental, that is if you have something to hide.

 

"Zuck" or Mark Zuckerber: The man that you are "trusting" very personal information with.
“Zuck” or Mark Zuckerber: The man that you are “trusting” very personal information with.

Most could argue that they do not care their information is being harbored as they have nothing to hide. Zeynep Tufeki, Professor of Sociology at the University of Baltimore responds to this question saying, “You have nothing to hide, until you do. And you are not necessarily going to know what you have to hide or not” (Hoback, Terms and Conditions May Apply).

 

What Facebook really does, to the educated user, is manifest a sense of anxiety within society about never knowing what will be used against you. The information that is put on Facebook is etched in stone the moment you press Agree and Publish. The notion that there is a shred of privacy online contradicts Facebook’s whole purpose, to share information with others. Even now this technology has been valued as the most important database of information for the sole purpose of violating privacy in return for safety. But is this constant fear and anxiety really safe? It seems now that Facebook’s opaque privacy policy has turned transparent, displaying is complete lack of privacy for users.

 

Your personal information is up for grabs.
Your personal information is up for grabs.

 

 

Works Cited:

 

Willis, Lauren E.1, lauren.willis@lls.edu. “Why Not Privacy by Default?” Berkeley Technology Law Journal 29, no. 1 (Spring 2014): 61–134.

 

Witte, Derek S.1. “Privacy Deleted: Is It Too Late to Protect Our Privacy Online?” Journal of Internet Law 17, no. 7 (January 2014): 1–28.

 

Howles, Trudy, tmh@cs.rit.edu. “Data, Data Quality, and Ethical Use.” Software Quality Professional 16, no. 2 (March 2014): 4–12.

 

Facebook, Google, Yahoo Are Spying Tools. Interview. Accessed October 13, 2014. http://topdocumentaryfilms.com/assange-facebook-google-yahoo-spying-tools/.

 

Hoback, Cullen. Terms and Conditions May Apply. Documentary, 2013. http://www.netflix.com/WiMovie/70279201?trkid=13462100.

Privacy and Gender within Tumblr and Modern Blogging (Revised)

Privacy and Gender within Tumblr and Modern Blogging

In the 7 years that Tumblr has existed, it has evolved into quite the site for social activism and recording; it was a location for people to feel comfortable and secure partly due to the originally ad free environment.  Although I’ve come across a variety of discussions of social issues during my Tumblr usage, I’d like to focus on the rise of the LGBTQ community within and throughout the Tumblr-verse, specifically those who are collectively comfortable with admitting openly that they are gender queer, transsexual, or any other disposition that defies the binary gender domain of popular media. It was created for many reasons, but has become a place for interest driven groups of people to coalesce and throw together their vastly different individual backgrounds in one spot. As people find and view things they like (this may range from animated gifs of cats to news articles to transsexual porn and back to cute gifs), they either ‘like’ or ‘reblog’ a post with the click of a button, moving it to display on their dashboards (the homepage) along with the dashboards of any blog that follows them. Though this is the central form of communication, which functions in a fashion similar to a stream of consciousness, there are other ways to privately message blogs or people. The people that make it up have come a long way and the dynamic between them and the new media site becomes even more peculiar when one considers the fact that Tumblr was sold to Yahoo! in 2013, a corporation known for its policies of data collection (a method of advertisement that completely goes against the Tumblr first established in 2007).

Figure 1 – A comedic introduction to the website.

Throughout my high school life, Tumblr very quickly became popular among females around 2011 (my sophomore year), or at least this was when I first noticed its ubiquity. I myself had already created one because of my sister’s influence the year prior, but rarely used it until this time. As the feminist movement and LGBTQ life spread to the site, I started hearing the circulation of terms such as ‘Tumblr feminism(ist)’ and ‘SJW(Social Justice Warrior)’ being used in ways to deride the overt beliefs of avid Tumblr users. I’ve realized that these groups have retreated to this social media website in particular because of the safety and security it harbors from the prevailing society around them, which many of this type deem to be a ‘patriarchy’.  I don’t necessarily think this is true (though I do think males have clearly had the upper hand in society for far too long), and it seems more likely that many Tumblr users resort to generalizing men in society as being misogynistic and patriarchal because these incredibly broad terms provide a simple way to paint a group as the enemy. I think there is clearly truth in the assertion, but it’s much easier to point at the world around you and claim it to be the source of your problems and insecurities than it is to take responsibility for those issues yourself.

In the Tumblr domain, “queer trans tumblrs have facilitated collective departures from cis and trans norms in ways that illuminate the range of possibilities online” (Fink and Miller 621). What these authors meant was that Tumblr provided a place for people to incorporate sexuality, and very individual interpretations of gender, into normal daily life and interests and simultaneously “in the intertextual spaces carved out by the links between tumblrs, genderqueer and queer trans self-representations integrate seamlessly with lesbian, gay, bi, pan, poly, and asexual culture” (Fink and Miller 621). This goes hand in hand with the concept of ‘NSFW’ or ‘Not Safe For Work’, which categorizes mostly sexually explicit content that could be littered within other random images and content. Considering the lack of corporate intrusion upon Tumblr users and the design aesthetic of the site, which promotes intimate yet momentary posting of ones thoughts, ideas, or interests, it only makes sense that this specific community has been built in this specific habitat. They now have a home for content that outsiders (who would otherwise outcast them as sexual miscreants) can no longer find unless they truly want to understand the LGBTQ community and become a helpful part in it.

Another important factor in the construction of a home for trans and gender queers within Tumblr had to do specifically with how the website itself was built and the way people view other people and make a name for themselves. I know from experience with the site that it’s difficult to make an impression unless you really devote time to getting involved in your interest areas (or what you make them seem to be). You cannot become an essential cog in the machine of a Tumblr community by simply reblogging and liking random posts. To delve into gender related groups, or anything for that matter, you must normally post authentic content, which can range from picture sets to videos to (often) short text posts. Depending on who likes or reblogs your post, and what they like and post, and what their followers like and post, it’s a long and intricate map of tangential connections based solely on interest and paying attention to who’s who. As said by Fink and Miller, “these elements make tumblr’s taste-based subcultures different from the profiles on a site like Facebook in that, to thrive within Tumblr’s format, you need to labor and gain credibility according to particularly intense systems of distinction” (615). I believe the secret to Tumblr’s intimacy lies in this delicate mapping of individuals who are hopefully accepting and in similar situations to you. By looking through another blog, you’ll sometimes find deep, insightful knowledge, heartbreaking tales of struggle, or perhaps hilarious internet memes. Whatever it is, there’s often a close bond that forms just by looking through someone’s posts, which happens to be something that’s much harder to find on sites such as Facebook and Twitter. The next step comes with the Ask function, which works on the surface as a private messaging system, yet can be sent anonymously and in order to respond, the blog owner must either choose to ignore it or post a response publicly, and with that the deep web of connections is fertilized even further.

Figure 2 – A commericial blog run by Denny’s and promoting it’s own content

As an essential aspect of the information era, social media and social networking have been labeled by some as “the most revolutionary technological [developments] since the invention of the printing press” (Blakely 343).  As of right now, Tumblr is at the forefront of the social networking scene, along with Facebook and Twitter, being one of the most popular blogging platforms. Robert Scheer states it quite clearly and concisely when he says that the appeal of Tumblr comes from the fact that it is “a six year-old social blogging service that has yet to earn much money because it has shunned advertising, thereby gaining the trust of its users, who willingly share massive amounts of private data”. Although it’s hard to believe that Tumblr strayed away from all forms of advertising, this was true in reference to the design and aesthetics of the actual site. It’s almost never cluttered on the sides except for the main dashboard, which constantly refreshes with posts from blogs that you follow. In my usage of the site, I rarely discovered any ad material except from commercial blogs, but sometimes I will also find content which I doubt is real. “This sneaky fake user-generated content proliferates on other corporate owned sites like Facebook, and issues of where content comes from and in whose interests content grows now comes further to the fore” (Fink and Miller 613). Even so, my generation has been bred to look past this and look past the entirety of demographical data collection as we are so intimately comfortable with the internet and general sharing of what was once private information. We have grown idle and instead of making something like encryption required learning for all, we “readily allow others to trace [our] movements, purchases, reading and viewing practices, as well as contacts with friends and associates” (Scheer). Corporations and web companies like Yahoo! will easily take advantage of this, and as it’s been shown before, “data is at the heart of Yahoo!’s ability to sell online advertising across its sites, based on what it knows about its people’s interests,” (Scheer). Though this sense of false security is the catalyst for Tumblr’s success with groups of individuals who have never had the notion of a collective before they created their tumblr blog, it could also be frighteningly detrimental when keeping in mind what Yahoo!’s been known to do in order for commercial success.

Tumblr as a social media and blogging device provides the perfect combination of privacy for intimate thought and information with interpersonal connection and it is this dynamic duo that so healthily fostered the growth of not only an LGBTQ community in recent years, but specifically the growth of a trans and gender queer population that is no longer afraid to be open about their unique sexualities. Throughout my research, I have discovered the key to this as being the development of the site with the lack of corporate ads, but unfortunately that may not be the case anymore as Yahoo! has taken over in the past year. It was apparent to me the last time I logged on to my Tumblr that not too much had changed, but of course there was no way for me to tell for sure if data harvesting and collection had become more prominent there (as there has been no significant evidence released to point to this fact). No matter what the case, I’ve decided the only information I want to leak about myself will be from messages, and now I rarely post openly on social media sites. I appreciate Tumblr for what it is, but it’s no longer for me and I think it’s time more people stop asking “well why is it a problem if corporations know everything about me as long as I’ve done nothing wrong?” and begin to be more vigilant about protecting their personal freedoms, because there’s no telling what a business or government agency will do with your information.

Sources

Blakley, Johanna. “Media In Our Image.” Women’s Studies Quarterly 40.1/2, VIRAL (2012): 341-50. JSTOR. Web. 18 Oct. 2014. <http://www.jstor.org/stable/10.2307/23333465?ref=no-x-route:9c371754d96262a78a61ef52c61c56fe>.

Fink, Marty, and Quinn Miller. “Trans Media Moments: Tumblr, 2011–2013.” Sage Journals. SAGE, 23 Oct. 2013. Web. 9 Oct. 2014. <http://tvn.sagepub.com/content/15/7/611.full.pdf+html>.

Matteson, Adrienne. “Do You Tumble? Tumblr could Change the Way You Blog.” School Library Monthly 27.5 (2011): 54-6. ProQuest. Web. 18 Oct. 2014.

“Reddit and Tumblr among Websites Protesting NSA Surveillance.” Telegraph.co.ukFeb 11 2014. ProQuest. Web. 18 Oct. 2014 .

Scheer, Robert. “Tumblr’s Exploitative Potential Sells.” Columbia Daily TribuneMay 23 2013. ProQuest. Web. 18 Oct. 2014 .

Figure 1 – https://www.youtube.com/watch?v=2m-e4PgiVfM

Figure 2 – http://cnet3.cbsistatic.com/hub/i/2013/05/30/b4a33040-f07b-11e2-8c7c-d4ae52e62bcc/5694d30097531c5efe85acc68d117933/tumblr_2.png

 

Assault, Anonymity, and Social Media

In this day and age it is unfortunate that the idea of new media, specifically the internet, and sexual assault is not uncommon. This happens far more often than one would think, especially with websites like Chatroulette, YouTube, and Reddit. These websites usually come with screen names, which leads to the idea of anonymity. Anonymous Reddit users are exploiting women without their consent while anonymous girls come out to say they have been raped by popular internet personalities. These sorts of things are happening on a daily basis, and no matter how people try to justify these actions as “okay”, they definitely are not. Sexual harassment has been occurring for hundreds of years and social media has only made it easier for the culprit to attain the means for harassment and assault.

Because of people posting rude and crude things online anonymously, there has been major controversy over the question of people being able to keep their online identity a secret. In 2013 Google decided to link Youtube accounts to Google Plus. This means that instead of a username showing up, whatever name you have linked to your Google Plus or Gmail account will show up on YouTube. This ended in Google getting a ton of backlash and making it so that you can still have a username as opposed to your real name (Humphrey). Why were people so upset at the loss of their anonymity? Anonymity online is used for a plethora of things, some good and some bad. Some people use screen names to make uncomfortable topics more comfortable, like abuse, medical conditions, etc. However some people use screen names to make other people uncomfortable. Bullying, hurtful comments, and other forms of online abuse have become a part of everyday life. It is impossible to click on a YouTube video without seeing multiple negative comments below it. Although they do exist, the positive factors outweigh the negative factors. Anonymity enables basic freedom of speech. When people are behind a screen name, they are more likely to say how they are truly feeling. This is proven beneficial through organizations like Emotional Health Anonymous and many anonymous suicide hotlines. Anonymity allows people to feel more comfortable while expressing their views, whereas if they were not anonymous they might be more hesitant. Many people would refute this argument claiming that online anonymity has led to cyber bullying. However, anonymity is actually not too common in cyber bullying.  A study done by Harvard’s Berkman Center shows that 73% of the participants who were victims of cyber bullying knew the real identity of the person/people bullying them (Collier).

September 22, 2014 was the day Sam Pepper, a popular YouTuber with nearly 2.5 million subscribers, uploaded a video entitled “Fake Hand Ass Pinch Prank” in which he walked around pinching female’s bottoms without their consent.

Screen Shot 2014-10-17 at 5.45.35 PM

This so-called “prank” video left not only the Youtube community in horror and outrage, but became a viral topic. Pepper took the video down, claiming it was a “social experiment”, but it was too late to save his nice-guy facade (McCamley).Though this event was not the first case of popular YouTube personalities committing sexual assault crimes, this particular case began to bring attention to all of the other YouTubers who have been using their status to take advantage of young girls.

After Pepper’s video went viral, many girls came forward to say that his actions did not surprise them. Upwards of ten girls came out to admit that Pepper had either asked them for nude photos, inappropriately touched them, and even raped them. The majority of these girls came out anonymously. One girl, who was raped by Pepper, filmed a video of herself telling her story. She does not give out her name, and does not show her full face. Her Google Plus account is under “I’m Anonymous”. She states that “she is still scared to say her name and show her face, but she is not afraid to tell her story.” If this girl was not able to tell her story, she would be doing the world a disservice. Because the internet is allowing her to be anonymous, she has the courage to share her story with the world. In the video, she claims that she never told anyone about what he did to her because she was scared. She never filed a police report because she was “too scared to file a police report against a celebrity…Scared of backlash, scared of people not believing [her], people telling [her] she was seeking attention, being told [she] was a liar. Scared of never having a career in this industry. Scared that [she] would lose [her] job, scared that [her] friends would take his side because they were all his fans” (I’m Anonymous).

www.youtube.com/watch?v=8vIh2-q0NTs

This statement clearly demonstrates how people put famous YouTubers on a pedestal and make it seem like they can do no wrong. However in this case, we can see the obvious damage that has been done.

After these girls admitted what Pepper did to them, other girls came out to accuse over 15 other YouTubers of sexual assault. When all of these cases came into the public eye, many people were left with the same question: how have these people gotten away with such disgusting acts and for such a long time? YouTube is no longer just a place for viral videos, but functions very similarly to television. Structured programming has become the force of the website (Smith). Because the site has taken a turn from cat videos to mini-series’, many people look at these people with millions of subscribers as a different kind of celebrity. They aren’t big-screen celebrities, they are self-made from filming videos of themselves doing skits in their bedrooms. They are celebrities on a more relatable level.

maxresdefault

Sam Pepper at a fan meet-and-greet in LA.

When watching their videos, they make it seem as if you are actually friends with them. People don’t like to see their friends in bad positions or doing poorly. This is no different with YouTubers. Subscribers put their favorite YouTubers on a pedestal and think that they can do no wrong, so these subscribers just shake off any rumors they have heard. Even though they know the rumors might be true, they don’t want to believe their “friends” could do such horrible things. This is why no one came forward about being abused and assaulted by popular YouTubers until Pepper uploaded a video clearly demonstrating that he was assaulting girls without their consent.

Similarly to Youtube, Reddit has also recently been a part of a cause of assault. The website, another social networking site primarily used for entertainment, has had multiple assault scandals under the anonymous user Violentacrez. Violentacrez created and moderated numerous sub-Reddit sections violating women.“Jailbait” was a sub-Reddit in which people posted pictures of minors in very little clothing. This sub-Reddit became increasingly popular until it ended up on the news and was eventually banned. Another sub-Reddit entitled “Creepshots” was not created by Violentacrez, but once it started gaining attention the user was brought on as a moderator. Creepshots was a section in which users posted secret photos they had taken of women’s private parts. The question here is very similar to the question about the YouTubers: how was he getting away with this? Reddit allows for free speech, and Violentacrez took the idea of free speech to another level. However what was unknown by most is that he had connections to many administrators. He was almost an unpaid employee, helping them work out the early kinks of the website (“Unmasking Reddit’s Violentacrez, The Biggest Troll on the Web”). Although he did not specifically go against anything in Reddit’s official policy, these connections allowed him to seriously push the boundaries of what is actually allowed.

Screen-shot-2012-10-15-at-15.27.041

In 2012, Adrian Chen outed Violentacrez as Michael Brutsch. As a consequence of his disgusting actions, Brutsch lost his job at the programming company he had worked for for almost 10 years (“Reddit’s Biggest Troll Fired From His Real-World Job; Reddit Continues to Censor Gawker Articles”).

Sexual assault through media has become all too common. YouTube and Reddit are just a few of the websites this has been occurring on. Women are exploited on a daily basis and social media has only made it easier for the culprit to obtain the materials used for harassment.

Works Cited

Chen, Adrian. “Reddit’s Biggest Troll Fired From His Real-World Job; Reddit Continues to Censor Gawker Articles.” Gawker. N.p., 15 Oct. 2012. Web. 16 Oct. 2014.

Chen, Adrian. “Unmasking Reddit’s Violentacrez, The Biggest Troll on the Web.” Gawker. N.p., 12 Oct. 2012. Web. 12 Oct. 2014.

Collier, Anne. ”The Pros and Cons of Online Anonymity.” The Christian Science Monitor. The Christian Science Monitor, 21 Aug. 2013. Web. 12 Oct. 2014.

Humphrey, Michael. “You Can Still Be Anonymous on YouTube, But When You Comment…” Forbes. Forbes, 14 Nov. 2013. Web. 12 Oct. 2014.

Jaworski, Michael. “More Women Are Coming Forward to Accuse Sam Pepper of Rape.” The Daily Dot. N.p., 3 Oct. 2014. Web. 7 Oct. 2014.

McCamley, Frankie. “YouTube Star Sam Pepper Faces Sexual Harassment Claims.” BBC News. BBC, 1 Oct. 2014. Web. 7 Oct. 2014.

“Sam Pepper – The Real “Reveal”” YouTube. YouTube, 24 Sept. 2014. Web. 7 Oct. 2014.

Smith, Grady. “How YouTube Is Boldly Becoming More like TV.” EW.com. Entertainment Weekly, 30 Mar. 2013. Web. 11 Oct. 2014.

 

 

Peer review workshop

Peer Workshop

The purpose of this workshop is to improve your writing on both the global, and local levels. This means you are not only correcting grammar and mechanics, but content as well. Read your partner’s paper twice. On the first reading, DO NOT make any corrections. Just read the paper and take in the story in the same way you would as if you were reading an academic article. On the second reading, answer the following questions:

  1. What is the point of this paper? What is the thesis? Does the thesis clearly reflect the point? Is the thesis a claim that argues the author’s opinion on the subject of the paper, or a statement of fact?
  2. Is there evidence of research in this paper? Are the sites reliable? Are the sources clearly cited? Check the works cited page, are the sources listed there as well?
  3. Does the author utilize summary, paraphrase and quotation? Do they over use any particular device? Have the quotations been properly incorporated?
  4. Are the supporting points clear, relevant, and well organized? Would it benefit the reader to re-organize this essay?
  5. Highlight or underline examples of good, compelling details in the paper. Are there any instances where the author could use more detail? Less?
  6. What point(s) in this essay were you most convinced by? Why? What did you learn from reading this essay?
  7. What suggestions for improvement can you offer to the writer? Identify the weaknesses and help consider corrections.
  8. Did the use of multimedia enhance the writer’s argument. Can the author incorporate more/less media in effective ways?
  9. Finally, alert the reader to any spelling, grammar and mechanical errors they made.

Now switch papers! Ask me if you have any questions.

Gender, Sexuality, and Representation in the Fighting Game Community

Josh Melnick

The Fighting Game community (FGC) does not have a great track record as far as the treatment of women goes. Dating back to the earliest days of the first modern fighting game, Street Fighter II, gendered terminology has played a significant role in the language of the community. “Raping someone,” “playing gay,” and specifically gendered insults directed at female characters have always been commonplace. Women who choose to compete are simultaneously subjected to huge amounts of harassment and unwanted attention.

So where do these issues come from? Why are women a minority in an otherwise diverse community? The answer to these questions can be found between cultural norms of competition, in game representation, and the self-fulfilling prophecy of entrenched sexism.

In 2012, the FGC’s gender problem became a public issue when commentator and community leader Aris “Aris” Bakhtanians made a series of remarks about sexism and harassment being as fundamental to fighting games as the use of a basketball is to the NBA. Video game criticism and news publication Giant Bomb posted a lengthy article about Aris’ statements. During the lead up to the release of a fighting game, the game’s developer ran a community challenge called Cross Assault. Players auditioned via reality tv like video clips, and would be split up in to two teams. One player, Miranda “Super_Yan” Pakozdi, was selected for team Tekken, the team led by Aris. Over the course of the training for the tournament, which was live streamed not unlike a reality show, Aris made increasingly invasive and sexual comments to Pakozdi, a few times causing her to forfeit the games and walk away. His actions ranged from aiming the cameras at her chest and thighs to sniffing her while she was playing. Later, the community manager of the livestreaming service hosting Cross Assault interviewed Aris about his actions, and Aris defended them, claiming that the FGC is defined by how it treats women.

Miranda Pakozdi (left) with Aris Bakhtanians (right)

Unsurprisingly, this angered some members of the community, and sparked a discussion around why so many women feel excluded and in danger. After Cross Assault concluded, Pakozdi unregistered for a number of events that she had previously said she would attend. She made statements on twitter about how uncomfortable and unsafe she felt in the community following the incident, and a number of other women echoed her statements. Much of the FGC wrote off Aris’ comments as an extreme example of a sentiment not echoed by the rest of the community, but this is not the only example of women in the FGC being treated this way. While explosive moments like these are few and far between, with Cross Assault being the last time this discussion rose in 2012, micro aggressions and smaller scale harassment happens constantly.

Milktea plays Smash Bros. with other members of the NYC community

Recently, this issue has come back in to the forefront of public thought. Competitive Smash Brothers player, Lilian “Milktea” Chen published an article for the TED website about her experiences in fighting games. She talks about the ways people demeaned her and made he separate from the community. When videos of her play would get posted online, they would receive comments like this.She talks about how she put up with this kind of treatment saying she “came to think it was normal” (Chen). Chen talks about the attention that she received at events. Not sure why she was receiving it, all she knew was that she enjoyed it. At the time, though, she was unaware that attention was part of what made some men around her bitter towards her. She goes on, writing “worse: I started adopting some of these boys’ attitudes toward women, thinking, ‘Why is that girl wearing a skirt to a tournament?’ ‘Why does she have to be so girly?’ ‘Why is she giggling?’ ‘Ew, is she even a real gamer?'” (Chen) She begins to touch on one of the main ideas that makes sexism in fighting games so hard to combat. Sexism and misogyny is so thoroughly embedded in the culture, that women become a part of it too. Without realizing it, they adapt to be able to survive in the system, and that adaptation can require women to think in harmful ways too.

But the lack of gender diversity had to have started somewhere. There have been numerous studies about the kinds of games that men and women tend towards; These studies give us insight in to why there has been a gender imbalance in the FGC since day one. One theory of the root of the imbalance is the idea “that girls like to cooperate in their gameplay, whereas boys like to compete” (Jenson and De Castell).  However, in examining that statement, they discover that the problem actually lies in our notions of competition vs. cooperation. They talk about ideas of benevolent competition, an idea that can also be found prominently in fighting games as well as the folly of placing “benevolent” competition in a dichotomy against “male competition.” They discuss studies showing that “many girls we interviewed (over 80) said that they enjoy the same kinds of competitive gameplay boys do” and specifically listing fighting games as an activity that they enjoy (Jenson and De Castell). 

Another study, conducted with girls aged 9-13, showed that among a selection of 30 odd games, the girls tended towards games with some element of competition in them, specifically a fighting game called Dead or Alive (Carr). Both of these studies show that women enjoy playing and wish to compete, and I was unable to find any studies that showed data to counter this idea. So why then, in the history of Street Fighter, the most popular and longest standing fighting game franchise, has there only ever been one internationally competitive female player?

This is where the issue of representation comes in to play. Dead or Alive is a game with a cast of characters evenly split between men and women. Street Fighter has, at it’s most representative, had about a third as many women as men. While there is a separate discussion to be had about the kinds of representation in Dead or Alive versus Street Fighter, much of the association between Dead or Alive and female competitors comes from the representation in its cast. Street Fighter, in its current incarnation, has 10 female characters to its 34 male characters. Of the 44 characters, two are queer. Featuring a gay man and a trans woman, interestingly, the two largest sexual minorities present in the fighting game community.

The cast of the current edition of Street Fighter, Ultra Street Fighter IV

In small doses, though, representation can serve to reinforce some problems that it can help solve on larger scales. In games with just a few female characters, people who play those characters are subjected to similar kinds of gendered insults as female players. Players of characters like Sheik in Smash Bros. or Morrigan in Marvel vs. Capcom or Poison from Street Fighter are familiar with a small scale of harassment simply due to the characters they pick.

Language plays a large role in how harassment functions in the FGC. While physical abuse does happen, verbal abuse is much more common. Phrases that I listed earlier like “playing gay,” a term used to describe playing defensively and avoiding confrontation, is ubiquitous among all fighting game subcommunities. Similarly, the idea of “raping” someone, meaning to dominate them in the game, can be heard in tournaments and friendly matches alike. Discussion over the use of these terms gets heated, and even those with the best of intentions sometimes miss the problems.

In this clip, a documentarian covering the history of the competitive Smash Brothers scene talks to community members (Including Lilian Chen) about how the language affects them. While many of the statements do help illuminate how harmful the language is, the closing note of the section misunderstands how the issues actually harm people.

Wes, the player who makes the final statement about everyone being raised differently, fails to understand that, in spite of our different upbringings, the way that people use words like rape and gay not only separate those who are impacted by the use of the words, but also solidifies the idea that they are targets. When someone uses the term rape, they are forcing people who have personal histories with the word to deal with that history again. This is a reason why some women who have either been victims or simply know people who have been victims of sexual assault can’t compete. Additionally, while statistically less likely, men can also be victims of sexual assault. Regardless of any specific victims, these words also contribute to a hostile environment that makes people feel like it is an exclusionary space. Community, especially community founded on common interest, does not benefit from this kind of gating, and it is a large reason why we don’t see more high level competitive women. In order to become the best, you have to start local, and when local communities are unwelcoming, people don’t get a chance to grow.

Works Cited
         Beauchamp, Travis. “The Smash Brothers: Episode 8 – The Natural (Remastered).” YouTube. YouTube, Nov.-Dec. 2013. Web. 17 Oct. 2014. <https://www.youtube.com/watch?v=h2mcEHjOrt8&index=8&list=PLoUHkRwnRH-IXbZfwlgiEN8eXmoj6DtKM&t=1011>.
         Carr, Diane. “Contexts, Pleasures and Preferences: Girls Playing Computer Games.” Digital Games Research Association (2005): n. pag. Http://www.digra.org/. DiGRA. Web. Oct.-Nov. 2014. <http://www.digra.org/wp-content/uploads/digital-library/06278.08421.pdf>.
         Chen, Lilian. “What’s It like to Be a Woman in Competitive Gaming? A Female Gamer Explains.” Ideastedcom. TED, 18 Sept. 2014. Web. 16 Oct. 2014.
         Cross Assault Sexual Harassment Controversy Overshadows On-screen Combat. N.d. VentureBeat. By Marcos Valdez. Web. 16 Oct. 2014.
         Jenson, Jennifer, and Suzanne De Castell. “Theorizing Gender and Digital Gameplay: Oversights, Accidents and Surprises.” Jenson. Eludamos, 2008. Web. 16 Oct. 2014.
         Klepek, Patrick. “When Passions Flare, Lines Are Crossed [UPDATED].” Giant Bomb. CBSi, 28 Feb. 2012. Web. 16 Oct. 2014.
         Ultra Street Fighter IV Wallpaper by SBlister on DeviantART. N.d. Ultra Street Fighter IV Wallpaper by SBlister on DeviantART. DeviantART. Web. 17 Oct. 2014. <http://sblister.deviantart.com/art/Ultra-Street-Fighter-IV-Wallpaper-459579779>.

Book Traces in Bobst

After getting very ill on the day of the Columbia book traces event I headed to Bobst to try and trace some books for myself. I was very sad to miss the day anyway but as we all know Bobst is better than any library Columbia could possibly have so I was excited to start exploring the stacks.

To start off I tried to think about the kind of books I normally write in. I highlight lines in a lot of my favourite novels but I’m pretty sure highlighters were not as popular as they are now pre 1920. I then realised that the type of books I write in most in are instructive books. My cookbooks, sewing manuals and knitting patterns are full of my scribbles marking down what ingredients I already have, what row I’m on and little question marks beside things I don’t understand.

I started off in the cookbook section but found very little. There was an old Mrs Beeton cookbook which got me very excited but unfortunately it was empty. So I started to browse the isle of manuals hoping I would find something. I picked up anything that looked a little worn down and potentially old but my first hour was full of pristine, well kept copies.

As I was about to move on I came across six volumes of a book title ‘Modern Buildings – Their Planning, Construction and Equipment’ edited by Gat, Middleton and Ariba. There wasn’t an edition number inside the book but with a bit of research I found out the volume I was holding was published in 1905. I was getting closer… I started to flick through volume one only to find it completely blank.

FullSizeRender

I felt dejected but thought I would check the others just in case. Volume two was empty but as I opened volume three my heart soared. A name was printed in the top right hand corner; ‘HG Leask’ and on the opposite page was a sticker with ‘Ex Libris’ (a Latin phrase meaning ‘from the books of’) and HG Leask printed on it surrounding a picture of what appears to be a Greek architect.

FullSizeRender

This was the only volume that had any sort of inscription in but I was still extremely excited. However this is only the beginning of the story…

When I got home I googled HG Leask. The first thing that comes up is lots of links to Amazon pages where you can buy countless pamphlets that Leask wrote on architecture. I knew I was in the right place. Clearly Leask had been in the architecture field  and this book belonged to him.

Screen Shot 2014-10-13 at 15.40.17

 

I hit gold however when I found a piece written about Leask on a website called The Dictionary of Irish Architects 1720-1940. You can read the full piece here.

It turns out Harold Leask was born in Dublin on the 7th of November 1882. He worked as an architect and antiquarian for many different architecture firms throughout Ireland however is passion was for the study of historical architecture and arhaeology. He wrote many guides and reports for the Office of Public Works (the books I found on Amazon) and wrote dozens of articles for different architecture journals. He also gave numerous lectures on archaeological and architectural topics and guided many excursions to look at Irish antiquities. He received an honorary MA from University College Dublin in 1942 and an honorary D.Litt from Trinity College Dublin in 1951.

Harold seems to have lived an very lovely life however what moved me most about the piece was this passage about Leask’s personality.

Leask is described as very tall and thin, with ‘a sort of crispness’ of manner, generous with his time and knowledge and scrupulously honest. His obituarist in the RIAI Yearbook observed that ‘pretention, inaccuracy and unconscientiousness were so foreign to his nature that they shocked him and aroused his anger and scorn; but otherwise he was kind and tolerant’. His recreations included photography, golf and rifle shooting. Between 1924 and 1935 he exhibited views at the Water Colour Sotiey of Ireland’s annual exhibitions.

Reading this passage almost made me cry. I had no idea who this man was, and he has most likely been forgotten by most of the world. But he sounds like such a lovely person and I’m just so happy that this excercise meant that for at least one day Howard Leask was remembered, appreciated and helped a girl finish her homework.

The Power of Social Media

Through social media and public efforts, Invisible Children raised global awareness about Ugandan dictator, Joseph Kony. Invisible Children was founded in 2003 by three college students who went to Uganda to find and film a story. Instead of finding just a story, they found Joseph Kony’s movement. The three filmmakers realized that there was a war going on for over 20 years, led by warlord Joseph Kony and his rebel army. Befriending an escaped child soldier named Jacob, the trio learned his gut-wrenching story. Jacob and his brother were captured by the army and forced to fight for Kony against their will. The Lord’s Resistance Army (LRA) murdered Jacob’s brother, and scared for his life, Jacob ran away from the LRA. The three filmmakers promised Jacob that they would stop Kony and end the war. Prior to Kony 2012, Invisible Children had already produced 11 films about the war in Uganda and gained a loyal following, which set them up for Kony 2012 to become one of the fastest spreading Internet sensations of all time. The campaign to find Joseph Kony was created to pressure the Ugandan government and United States advisers to find Joseph Kony. Young and in touch with society’s desires, the three filmmakers recognized that social media has the power to illuminate specific political injustices and catalyze global efforts. Through Youtube, Facebook, and Twitter, the Stop Kony movement gained millions of worldwide followers in just a matter of days. Invisible Children’s use of social media to convey their point led to increasing worldwide awareness about Kony and even affected policy. Kony 2012 transformed my view and the world’s view about the power of social media and consequentially led to a global social media movement that eventually led to other campaigns such as the ALS Ice Bucket Challenge.

With the release of Invisible Children’s Kony 2012 video, the power of social media prevailed with the video reaching 100 million views in six days-the fastest campaign yet. As the founder of Invisible Children, Jason Russell, says in the video, “the game has new rules. But in order for it to work, you have to pay attention” (Kony 2012). Through Youtube and Vimeo, the video created it’s own rules and shattered all previous records for 100 million views. Once it gained recognition within the United States and other European nations, Invisible Children tweeted:

Screen Shot 2014-10-11 at 11.18.09 AM

In order to increase their worldwide following, Invisible Children utilized the power of communication and translated their message so millions more people could understand the importance of Kony 2012 movement.

Following the release of the Kony 2012 video, there were millions of shares on Facebook and Twitter. As Russell proclaimed, “our goal is to change the conversation of our culture, and get people to ask ‘Who is Joseph Kony?’” (Kony 2012). Revolutionizing charity campaigns, Invisible Children aimed to raise global awareness about Joseph Kony. By sharing and liking the Kony 2012 video, more and more people become aware of the brutal reality that Joseph Kony is a part of.

Cutting their message down to 140 characters, Invisible Children capitalized on their young following by creating engaging tweets, such as the one below.

Screen Shot 2014-10-13 at 10.21.10 AM

By creating engaging hashtags and provocative points, Invisible Children appealed to their massive fan base and propelled their campaign further than ever before. With young people using social media as the primary means of communication, Twitter was ripe with conversation about Kony. Isaac Hepworth, who works for Twitter, released a graph showing the amount of times Kony was mentioned on Twitter since the beginning of the month. There are nearly 10 million mentions during the month of March 2012.

Screen Shot 2014-10-13 at 10.16.25 AM

In a public call to action, Invisible Children relied on some of the nation’s celebrities with a large base of followers to share the video and get the word out. Celebrities such as Oprah Winfrey, Ryan Seacrest, and Kim Kardashian all tweeted about Kony.

Screen Shot 2014-10-11 at 11.15.51 AM

Screen Shot 2014-10-11 at 11.16.11 AM

Screen Shot 2014-10-13 at 10.38.32 AM

Through the viral movement, people could sign up to receive “action kits” with Joseph Kony posters, stickers, and buttons to participate in “Cover the Night” events on April 20th. Facebook groups were made and then created specific meeting places where groups where go into their town at night and cover it with Kony posters, such as the one shown below.

Invisible Children started Kony 2012 as a social media campaign, but it transformed into a global movement. Eventually the Kony 2012 campaign became such a massive force that the United Nations was forced to confront it. Radhika Coomaraswamy, the UN secretary-general’s special representative for children and armed conflict, thought that the Kony 2012 campaign would have been better off if it had focused its efforts on reintegration of the child soldiers rather than the capturing of Kony (Les Roopanarine). Creating a conversation about the way to handle Joseph Kony, Invisible Children’s social media campaign had launched a full-scale international debate.

Nationally, the Kony 2012 movement gained attention from Congress and the House of Representatives even made a resolution supporting the mission to disband Kony and the LRA (Jim McGovern). Demonstrating the power of a social media movement, Kony 2012 captured the world’s attention and created policy changes, an amazing feat for an internet sensation. One of the first of it’s kind, Kony 2012 was unique in that it became an issue that millions of people cared about and thus Congress and the UN were forced to address it. Going forward, this is what I will use to create campaigns. You want everyone to care about the issue so it has to be addressed because Congress cannot ignore its constituents or the members will not be reelected.

Kony 2012 was successful in that it created an international dialogue about Joseph Kony. However, the Internet led to the collapse of the Kony 2012 movement when Invisible Children was scrutinized for its questionable spending practices. A 19-year-old college student looked into Invisible Children’s spending and found that it only spent 32% of the 8 million raised in 2011 on direct efforts (Chris Roper). Invisible Children still maintains these claims are false, but it does not undo the damage done to their reputation. Millions of people read about the controversy and the nation’s spark to catch Kony diminished with the questioning of Invisible Children. Another downfall of the Kony 2012 campaign was Invisible Children’s oversimplified message to capture Kony. Invisible Children chose to stand by their belief that capturing Kony would stabilize northern Uganda. Once Kony was gone, Invisible Children believed, or rather conveyed to the mass public, that the children soldiers would have no one to follow and then would disband. However, this ignores the engrained, fighting attitude that these children grew up with. You can disband an army, but you cannot undo the mental tendencies towards fighting that these child soldiers learned from such a young age. Joseph Kony is just one person that these children could follow. Who is to say that another Kony could not just come along and use these child soldiers for another war? Additionally, Invisible Children offered support to the Ugandan dictator, Museveni, in order to catch Kony. This tunnel vision of capturing Kony could have ended up strengthening Museveni and creating other problems with an empowered dictator like Museveni. Finally, Invisible Children ignored the fact that Joseph Kony was not in Uganda, nor had he been for six years (Anthony Kosner). His army was dwindling in numbers, and although the LRA was still causing suffering, millions of misinformed people are not able to help with such an engrained and complicated situation. Invisible Children’s oversimplified message was devised to engage people over social media, a platform where one only has 140 characters or a post to convey a point.

Although Invisible Children’s message was oversimplified, the idea of using social media to bring about change is a brilliant one. Sharing a video is simple and many viewers were happy to be helping just by spreading the information. As Allison Fine, a social media and activism writer, said, “[Invisible Children] [is] deputizing all of us to click this guy away” (David J. Goodman). Invisible Children struck a chord with viewers and allowed them to feel like they were making a difference by sharing the video. The success of Kony 2012 was that the campaign utilized social media as a means to present a global issue in a way that the average person can relate to.

As one who does social media for many companies, I found Kony intriguing because it demonstrated the power of social media. Kony proved to the world that the world can listen. Both Kony 2012 and the ALS Ice Bucket Challenge represent the ways in which an organization used social media to generate revenue.Going forward, I can use the techniques that Kony 2012 taught me, such as raising mass awareness, which then generates profit, to grow companies into huge entities. I heard you Kony 2012 and I am listening.

 

Works Cited:

Goodman, J. David, and Jennifer Preston. “How the Kony Video Went Viral.”The Lede How the Kony Video Went Viral Comments. New York Times, 09 Mar. 2012. Web. 11 Oct. 2014.

 

Khan, Belal. Digital image. Leechon. N.p., 19 Mar. 2012. Web. 13 Oct. 2014.

 

 

“KONY 2012.” YouTube. YouTube, 05 Mar. 2012. Web. 12 Oct. 2014.

 

Kosner, Anthony. “12 Lessons from KONY 2012 from Social Media Power Users.” Forbes. Forbes Magazine, 09 Mar. 2012. Web. 12 Oct. 2014.

 

McGovern, Jim. H. RES. Ll (n.d.): 1-7. United States House of Representatives. Web. 13 Oct. 2014.

 

“Our Story | Invisible Children.” Invisible Children Our Story. Invisible Children, 2014. Web. 12 Oct. 2014.

 

Roopanarine, Les. “Kony2012 Funds Would Be Best Spent on Former Child Soldiers, Says UN Official.” The Guardian. Bill & Melinda Gates Foundation, 20 Mar. 2012. Web. 8 Oct. 2014.

 

Roper, Chris. “Kony 2012: Taking A Closer Look At The Social Media Sensation.” Konrad-Adenauer-Stiftung. N.p., 22 Mar. 2012. Web. 9 Oct. 2014.

 

 

Book Traces Reflection

I went to the NYU Bobst Library to look for books that were printed pre-1923. The process was long and the titles were surprisingly challenging to find and once I got to see them I was, to be completely honest, underwhelmed.

The process was an arduous one because the library catalog, BobCat, was difficult to navigate in order to find books that were printed before 1923. One of the reasons for this is that a subject has to be specified for the search to be done. The librarian at the reference desk helped me for an hour looking for titles that were available in the library and most of them could only be seen at Fales’ library. I was going to register for Fales but it was closing 30 minutes, after I arrived, and on Saturday it was closed. So there were some obstacles I had to jump in order to get to the books.

Together with the librarian, I found a book called ‘The Mysteries of Udolpho, published in 1816. So, I went to the section to find the book and all the books around it were pertaining to the same topic and were also printed before 1923. I was expecting to see more marginality inside the books but there were minimal notes on the pages. Besides, the ones that were written on had pen writing that seemed to date after 1923. Thus, I don’t know how valuable my exploration was except for the fact that I got to see the bindings of these books crumpling to pieces. I thought the condition of the books was interesting and some were even put into conservation boxes, because they were so old.  Some of the books had some intelligible annotations on them and some had dedicatory messages on the front, in cursive writing, which you don’t see as often now. Overall, it was a class activity that was different and an endeavor I would have never done, so even though it was hard and not that successful, it was an experience I am glad I had.

Video Game Business Ethics

There is no greater motivation in this world quite like the promise of having a thicker wallet. Entertainment has arguably been at the forefront of this sentiment. Whether someone is a pop diva or an NFL running back, they all belong to something called the entertainment industry. The keyword there is “industry”. Although comparatively young in regards to sports and music, the video game industry has become wildly successful over the past decade. What started off as being nothing more than a specialized hobby has grown into a massive mainstream form of media. With triple-A video game releases even beating out Hollywood in terms of revenue there is clearly something they are doing right. Still, despite all of these impressive sales figures, inevitably greed will come into play. From creative business models to practically stealing from customers, the video game industry has undoubtedly affected modern business ethics both positively and negatively.

Perhaps it would be best to start off with the good. It is common knowledge by now that expanding your target market to be more inclusive will rake in bigger profits. While the console wars rage on between Sony’s Playstation and Microsoft’s Xbox, Steam remains practically unchallenged in the PC gaming market share. While Steam does rely on some exclusives such as Counterstrike and Dota 2, much of its success can be attributed to the large library of games that it provides from a myriad of different developers and publishers. Playstation, and more specifically, Xbox try to stay in the game by providing a number of other services such as Netflix and blue ray players in their machines. The Wii U trails far behind all three platforms due to its lack of third party developer support. Consoles may not necessarily be dead but PC elitism has grown over the past few years due to the number of titles Steam has accumulated over the years. Similar to how the Xbox 360 arguably won the console war several years back due to Playstation’s loss of certain exclusives (Final Fantasy and Grand Theft Auto to name a few), Steam may understandably win this war of platforms as they continue to forge alliances with dozens of other developers in order to cater to the many different kinds of gamers.

1

Speaking of PC gaming, World of Warcraft, although fallen in numbers, still remains the biggest MMORPG of all time. It once was able to claim a whopping 12 million players. How is all of this possible? It relied on subscriptions. Most video games at the time of its release were single products that had a one-time purchase and less reason to revisit the game once you were done. World of Warcraft’s formula offered more than just a product. It was also a service. Constant patches and add-ons convinced players that they were living in an ever-changing and ever-growing online world. Off course server maintenance and constant reworks would cost money, but they made all of it back through subscription fees. Blizzard had successfully created an IP that would last more than a decade and still go strong. Other companies needed to constantly innovate creating new products that could keep the company afloat or destroy them.

Trying to capitalize on Blizzard’s success, a number of other companies tried their stab at a big MMO release. Bioware’s The Old Republic appeared promising at first, but does not appear to have the longevity that World of Warcraft does. However, it still is far from being a failure by including an in-game store. People are quick to nay-say micro-transactions, but it is all about the manner in which they are implemented. The reason why micro-transactions and in-game stores are criticized is because of their encouragement of a pay-to-win model. This essentially means that people can pay to pass levels and not give the time or effort required to progress in the game. The Old Republic relies more on selling in-game items that offer no real gameplay rewards, but you can give your character a cool looking hat. There’s really nothing advantageous about a hat. Small purchases like this keep the game alive and running.

2

Wildstar, a new MMO on the scene, makes money from an even more far-fetched angle. Knowing that entering the MMO market is difficult, they came up with a formula that encourages its current subscribers to keep playing. They believe that there are essentially two different kinds of people that play their games. Person A is fine with paying subscriptions but does not have enough time to play in order to progress in the game. Person B has plenty of time but cannot keep playing because he/she is unable to keep up with the subscription fees. Wildstar allows person A and B to alleviate their problems. Person A can give some of the time purchased through his subscription to pay for some of person B’s hard-earned in-game currency/items. This is basically a trade between money and time. Person A gets the in-game items he/she needs to progress without having to dedicate their life to the game while person B gets the time needed to play longer. Interestingly enough, this is not the first time a video game company has let players trade directly between each other.

Eve Online has more than just a simply trade system. It has an entire living economy in its virtual space that players control and utilize with real money. The market inside this virtual reality is so complex that it has actual inflation and deflation rates for the in-game items being traded. Players themselves set prices and can make auctions at their own will. Very little is monitored in this in-game economy except for any “illegal” trades. Plume, a game journalist, describes the game as being its own “small country” even going into further detail about how players “speculate on commodities” while forming “trade coalitions and banks”. The amount of user power in this game is remarkable. There is virtually no middleman. At no point does the game developer itself step in to moderate trades. They give power to the people, and through this ideology they have secured the loyalty of their players ensuring that their IP will stay relevant in years to come.

3

Unfortunately not all video games are sunshine and rainbows in the way they handle their businesses. Let’s take a look at the most casual of games. Just about everyone with a smartphone has played or at least heard of a little something called Candy Crush saga. The entire game is just swiping candy in four directions trying to match colors. For anyone who has had a phone before the iphone era, this concept sounds a lot like bejeweled doesn’t it? The premise of the game has been around longer than most people believe in various different forms ranging from a Facebook equivalent to classic NES games. Despite being predated, King Digital, the creators of Candy Crush saga, made it their mission to sue every other game that was similar to theirs. Games that simply have the words “Candy” or even “saga” were not safe from the legal attacks by King Digital. Even more outraging is the way they make money off of their game. Players cannot go 1 minute without a shameless plead for more of the user’s money. Smosh Honest Game Trailers puts it best saying that players “are given options like paying to unlock new levels, paying for power-ups, paying to make more moves, paying for more lives and paying for the ability to pay for more lives”.

4

Corporate video game crimes do not end there. DLC, also known as downloadable content, has been greatly panned by fans and critics alike. These digital expansions have been accused of allowing the developers to market games with missing content to consumers and selling that same missing content as an “add-on”. I have to admit that this is a generalization and that some DLC expansions have earned the right to actually call themselves an expansion. The most blatant example of DLC abuse was with a game called Street Fight vs Tekken. This particular game actually came with the content on the disc but could only be accessed through a purchasable code. It’s like selling a book that was fully written but only selling half of it to their customers. Understandably, outrage spread through the community prompting the developer to review their DLC practices although no real action has taken place.

If selling your game in chopped up pieces one at a time to your customers was bad, selling an unfinished game to your customers is downright inexcusable. Steam, along with other publishers, have allowed players to partake in early beta tests to judge games that are still in development. The catch is that some beta tests actually require players to pay a fee. Gamers are not doing themselves a favor by paying to criticize unfinished games. This problem has extended to kickstarters. Games that began as kickstarter projects receive funding from hype that builds as they get closer to their release date. Not every game gets fully developed and some projects eventually get scrapped. While some kickstarters are legitimate, others abuse the mysteriousness of their projects reeling in consumers to sink their money into something that may not even be finished.

Sadly, even one of the most popular series, Halo, cannot escape the lure of becominga corporate sellout. The embarrassing alliance Halo 4 made would forever be the laughing stock of gamers everywhere. Halo 4 was at the forefront of the Doritos and Mountain Dew campaign at the time of its release. By buying Doritos and Mountain Dew gamers could level up faster than those who did not purchase their products. High profile game journalist Geoff Keighley was nothing more than a mere puppet promoting Doritos and Mountain Dew through Halo 4’s popularity. Capitalizing on an IP’s popularity can destroy a company’s integrity, and doing it so blatantly directly insults their customers.

5

More pressing than the Doritos incident is gaming journalism itself. Corruption always finds a way to snare its tendrils into the innocent. There has been great speculation about whether publishers have any power over those that review their games. GMU, a video game awards ceremony came under fire in 2012 when it was revealed that the journalists invited to the ceremony were voted for and sponsored by video game publishers. Journalists were encouraged to tweet positive statements about certain games. In return, they would get a free PS3. Joe Vargas, a youtuber specializing in video game reviews, describes the process as “favors for positive coverage”. Promotion through shady deals have become an increasing problem in the video game industry. Incidents such as this practically destroy the legitimacy of video game journalism all over the internet. It may be too soon to claim that all game journalism is bad, but the tensions between gamers, journalists and the puppet master publishers have not helped its image in the slightest.

It may be wrong to praise all of the business practices of the video game industry over the past years, but the events that have transpired have nonetheless become important lessons in business ethics as a whole. Each success and each folly have become a stepping stone further shaping what it means to be a good business. There is no shame in huge profits as long as they are earned by just means. The tales of the video game industry will undoubtedly transform the corporate world into something that both consumers and businessmen can rally behind.

Works Cited:

“Business Model.” Wildstar, n.d.http://www.wildstar-online.com/en/game/features/business-model/.

Candy Crush Saga (Honest Game Trailers), 2014.https://www.youtube.com/results?search_query=candy+crush+criticism.

William, Volk. “Free-to-Play Games Are Having Their Soupy Sales Moment,” August 6, 2013.http://venturebeat.com/2013/08/16/free-to-play-games-are-having-their-soupy-sales-moment/.

How to Run a Successful Videogame Kickstarter, n.d.http://www.dorkly.com/post/66182/how-to-run-a-successful-videogame-kickstarter.

“League of Legends.” League of Legends, n.d.http://na.leagueoflegends.com/.

Phil, Owen. “No, Game Journalists Are Not Paid by Publishers for Review Scores,” July 28, 2013.http://www.gamefront.com/are-paid-by-game-publishers-for-review-scores-nope/.

“Steam.” Steam, n.d.http://store.steampowered.com/.

Brad, Gallaway. “The Consumer’s Seven Laws of DLC,” April 8, 2010.http://www.gamecritics.com/brad-gallaway/the-consumers-seven-laws-of-dlc.

Brad, Plumer. “The Economics of Video Games.” The Washington Post, September 28, 2012.http://www.washingtonpost.com/blogs/wonkblog/wp/2012/09/28/the-economics-of-video-games/.

“The Old Republic.” The Old Republic, n.d.http://www.starwarstheoldrepublic.com/.

Top 10 Gaming Controversies of 2012!, 2013.https://www.youtube.com/watch?v=54s_jyjMUxY.

“Top 10 Gaming Controversies of 2013!,” n.d.https://www.youtube.com/watch?v=voVpvKlntDM.

Kyle, Orland. “Valve Lets You Pay for the Beta with Steam ‘Early Access’ Program,” March 20, 2013.http://arstechnica.com/gaming/2013/03/valve-lets-you-pay-for-the-beta-with-steam-early-access-program/.

Tom, Chatfield. “Videogames Now Outperform Hollywood Movies.” The Guardian, September 26, 2009.http://www.theguardian.com/technology/gamesblog/2009/sep/27/videogames-hollywood.

“World of Warcraft.” World of Warcraft, n.d.http://us.battle.net/wow/en/.

MY EXPERIENCE AT THE BOOK TRACES EVENT

I thoroughly enjoyed myself at the Book Traces event. This was my first time at Columbia University, which has one of the most beautiful campuses I have ever seen. The library assistants guided us to the book racks focusing on American and British Literature pre-1923 where we were supposed to find books which had old annotations, dedications and so  on. Initially, I had no luck. I searched for the oldest books on the shelves but none of them held any significant markings. I was just beginning to lose my enthusiasm when finally after an hour of searching, I encountered a seemingly plain book that contained a heartwarming dedication:

IMG_0389

Soon, I encountered another interesting book which contained a rather unusual marking:

IMG_0387

This was the highlight of the day. I am unsure whether this illustration is from the 19th century, but apparently I was the only one who discovered a drawing in a book.

The event was quite an enlightening experience for me. These books contain not only stories by the authors but also of the readers themselves. Every marking reveals the thoughts and feelings of the reader and gives us a glimpse into their mind. It felt like I had time traveled to the 19th century. To say I enjoyed the event would be an understatement.

I believe that Book Traces is an essential project that must continue and spread all over the country and even the world because these books need to be protected. They contain so much history and so many memories that it would be cruel to destroy or discard them. I am especially prejudiced to this cause because I am an avid reader who worships books. Nonetheless, these books need to be preserved, studied and admired.

My one suggestion to improve the project would be to expand to other genres of books as well. May be the project could be stretched to include not only American and British literature but also literature from other nations as well. But for this to occur, the cause must be spread internationally.