Big Data Society

Discussing the problems and challenges facing a ‘Big Data Society’


How does the use of location-aware applications change our experience of the world?

E.g Facebook ‘check ins’ or location tags, Foursquare.

Location-aware applications change our experience of the world in many ways. It makes it harder to ‘pull a sickie at work’ withoutramifications as you’re risking one of your friends ‘checking you in’ somewhere on Facebook. Facebook check ins also limit your privacy as you are effectively telling your whole friends list exactly where you are at that point in time. It has also been talked about that burglars  can use this information, to rob people’s houses when the occupants aren’t home. Although you probably need some new Facebook friends if they have robbed your house… or take your profile off Public.

It is definitely making it harder to have privacy and maintain a personal life. I have found in my group of friends it can start fights, if someone in our group wasn’t invited somewhere and then the group checks in.

In teScreen shot 2013-10-16 at 11.36.24 PMrms of whether location awareness being a momentous development or a passing fad I believe it is the former. It has become such a trend to check in whether it be on Facebook, Instagram or Twitter that I believe even more Social Media Platforms and Apps will integrate the ‘check in’ feature. Runkeeper and similar apps now allow you to post the area you covered on your run. I think this is just a sign of things to come as technology continues to develop and location services become even more accurate.

Read here, how a man used to ‘Check In’s’ in a different way.

Tagged , , , , , , , ,

How are mobile phones being used differently in the developing world?

As we learnt in last weeks class mobile phone use is vastly different in the developing world. Mobile phones are oftenused as currency, where someone may not have money they may elect to ‘trade’ their phone instead for the item they are buying. Another difference in poorer countries is a phone may be shared by agroup of people. As mobilephones are in general expensive, and people in poorer countries live on a small income, mobile phone sharing is common. One family may share a mobile or a number of friends may share the same phone.



Screen shot 2013-10-17 at 12.38.22 AM



Tagged , , , ,

Does the walled garden of the Apple App store foster or stifle innovation?

0The Apple App store fosters innovation to a certain extent.  According to Apple they review ‘all apps to ensure they are reliable, perform as expected, and are free of offensive material.’ There are at present over 350,000 apps available in the Apple store for download.

Some of the guidelines Apple have in place include:

– Apps cannot be purely marketing or promotionally based.

-Apps must contain dynamic content, there must be a useful function to the App. With the aim being that someone will open the App more than once.

-Apps cannot have blank sections or broken links.

There are pages and pages of guidelines that the App must follow so the ultimate answer is that Apple does foster innovation- this is visible by purely the amount of apps that are available to download- but within their strict guidelines.

Check out the article on how to break through and make the top 50 App! shot 2013-10-17 at 12.45.26 AM


Tagged , , , ,

Why did Kony 2012 Fail?

The Kony 2012 campaign has demonstrated the powers of social media and advertising. Kony 2012 was a campaign that carried a  story about suffering children in Uganda that were stolen from their homes in the middle of the night and forced to join a renegade children’s army. This story touched the hearts of many and the views on the video continued to grow and grow.

Kony 2012 caused a lot of  confusion, especially for the Ugandan citizens and Northern Africans who saw the video, as they believed that Joseph Kony has not been seen in Uganda for over five years. Criticisms of the members and heads of Invisible Children also showed connections to more controversial aspects of the Ugandan government, like that of the Anti-Homosexual Bill proposed by Julius Oyet and David Bahat, and to conservative Christian groups who have been vocal players in the discrimination of the LGBT community. Even Jason Russel, the co-founder of the Invisible Children has been criticized for the using his son in the video as a marketing tool and for his mental breakdown that caused him to fly into a naked violent rage in public.

Kony 2012 could have failed for many  others reasons, like how short-lived many campaigns are in a now-digital world, or it could have failed due to the problems with Joseph Kony no longer even being in Uganda. It also could have failed due to the good intentions of trying to help children, but by only also supporting a government that proposes laws that deem homosexuals as a danger to Uganda and encourages the elimination of gay and lesbian Ugandans through death or life imprisonment.

How Social Media changed Activism: Kony 2012

Tagged , , , , ,

Can we expect to have privacy if we use social media?

Comments on a website, comments, responses, likes, dislikes, rants, pictures and hashtags are, for better or worse, forever. Because social media feels like a place where people can just be themselves and say things off the cuff, people often say things they wouldn’t typically say in public. But unless all your accounts are private, what you’re saying is most definitely in public. Deleting tweets and updates doesn’t always solve the problem. When in doubt, if you don’t want something coming back to you, don’t say it online.

Each social network has its own petty annoyances. I’m not a huge fan of Facebook in general because I find it so invasive, and I hate how they’re always changing their privacy features — it’s hard to keep up. I dislike being tagged on Facebook with someone’s promotional image or having someone post something on my wall they want to promote. While it would be common sense to think about the information before you decide to share it, social networking sites are actually set up to encourage the user to share as much as possible about themselves. That’s intentional: these sites succeed by increasing the activity within the network. Yes, there are privacy settings, to limit access to some data- but these settings are never the default. Only a tiny minority of users make the effort to opt out. Everyone else shares with the world.

To sum things up, it is up to us, as the individual to protect ourselves using Social Media, be smart and read the guidelines and if you don’t feel comfortable about someone else reading the content of your post, don’t post it at all.Image

Is it fair for bosses to request social media passwords to access your page? Here is an article from the Sunday Morning Herald.


Tagged , , , , , ,

Are we becoming digital narcissists with social media?

Just go to a live event, whether it’s a gig, sporting event or even a weekend out and about and you’ll see hundreds or thousands of smartphone’s held high as their owners click away capturing a chosen “moment” through the frame of a lens. Meanwhile, the bigger picture often gets lost as we snap away select seconds, even inventing exciting, captioned plotlines to go with relatively bland snapshots.

Engaging in social media seems to help uplift the self esteem’s of those who use it: “It feels good when a picture of yours is ‘liked’ by others,” “I like my picture being ‘liked’” and “I like it being ‘tagged’.”

We’re all narcissists now, and that’s a good thing

The same social media tools that make us appear more self-centered also amplify some of our best traits

Screen shot 2013-10-17 at 6.15.21 AM

Tagged , , , , ,

How has creativity changed in the era of social media?

Now more so than ever before we can share things instantly via social media, either posting on Facebook, Instagram or Youtube allows users on the other side of the world to connect and share ideas in real time.
Instagram is a fairly recent new form of social media and photo sharing application which allows users to take photos and apply different filters and post it on their wall, allowing their followers to view them. Now everyone using Instagram can be called an amateur photographer using their smart phones to create beautiful photos and sharing them instantly.
A number of companies now launch competitions for consumers to come up with ideas for their campaigns, an example of thsi is McDonalds new campaign called the ‘Big Mac Chant’ it asks entrants to put together a video in a creative way including ‘the Big Mac’ chant and upload it to the McDonalds website. People can then vote for their favourite videos and the winners can win prizes such as overseas holidays. Everyone who votes for a video receives a free Big Mac.

Tagged , , , , ,

How have you experienced media Convergence?

Media convergence has become a vital element of life for many people, including myself.  With the development of technology in  different  platforms and operations such as television, Internet and mobile communication, I have had a bigger choice of media and a life which media technologies has made easier.

Now that convergence of media platforms and services is a feature of all established media, as well as being a core feature of new media, it allows me to access all the latest news updates and reports from right around the world.  In the case of news media, for example, the top five Australian online news sites—,,, and—all rank among the top 25 Australian websites in terms of traffic, and an estimated 4.35 million users per month visit at least one of these sites.

Convergence is the interlinking of computing and ICTs, communication networks, and media content that has occurred with the development and popularisation of the Internet, and the convergent products, services and activities that have emerged in the digital media space. Media Convergence collaborates all aspects of institutional activity and social life—from art to business, government to journalism, health and education, and beyond—are increasingly conducted in this interactive digital media environment, across a plethora of networked ICT devices.

Tagged , , , , ,