Technology

Placeholder Content Image

Fresh signs that ANOTHER royal pic was manipulated

<p>Ah, the royal family – the gift that keeps on giving, especially when it comes to Photoshop mishaps. It seems like they've developed a knack for stirring up a digital storm every time they release a photo.</p> <p>The latest kerfuffle involves a seemingly innocent snapshot released to celebrate what would have been Queen Elizabeth II's 97th birthday. But oh, what a tangled web of pixels it turned out to be!</p> <p>The photo, featuring a gaggle of royal offspring including the adorable trio of Prince George, Princess Charlotte and Prince Louis, quickly became the centre of attention, and not for the right reasons.</p> <p>According to the eagle-eyed sleuths at <a href="https://www.theguardian.com/uk-news/2024/mar/17/people-question-everything-now-how-kates-photo-scandal-rips-up-the-rules-for-royals-and-the-media" target="_blank" rel="noopener"><em>The Guardian</em></a>, the photo looked more like a game of digital whack-a-mole than a family portrait. Prince Louis apparently decided to play hide-and-seek within the frame, magically teleporting to a new position. And let's not forget the hair-raising revelation that some locks on one of the granddaughters seemed to have been copy-pasted with reckless abandon. Maybe they were going for a stylish asymmetrical look?</p> <p>"The photograph taken by Catherine at Balmoral and released last year to mark what would have been the 97th birthday of the late Queen bears similar signs of digital alteration," reported <em>The Guardian</em>. "Prince Louis appears to have been moved back into the frame, while locks of a great granddaughter’s hair show telltale repetitions. Back then, though, the image was not urgently 'killed' by the leading international photo agencies, like the latest one, because it didn’t matter so much."</p> <p>But the fun didn't stop there. Oh no, Twitter had a field day with this one too. Allegations flew left and right faster than a royal corgi chasing a squirrel. The Queen's skirt? Edited. The green sofa? Definitely edited. Heck, there were probably bets being placed on whether the corgis were even real or just digital creations.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Did the late Queen ever pose with her grandchildren and great-grandchildren? Seems like no. 🤔 This photo, taken by Kate Middleton, was edited at least in 9 places. Now the mass media are reporting about it too.<br />A little thread👇 <a href="https://t.co/Sx9XjOBr1J">pic.twitter.com/Sx9XjOBr1J</a></p> <p>— Katerina 🇺🇦 (@Le__Katerina) <a href="https://twitter.com/Le__Katerina/status/1769399269365088335?ref_src=twsrc%5Etfw">March 17, 2024</a></p></blockquote> <p>"People need to understand that it's not 'just a family photo'," wrote Twitter sleuth Katerina. "It's made for historical record. I don't think you'd want to see doctored photos in your history books."</p> <p><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, 'Open Sans', 'Helvetica Neue', sans-serif;">Meanwhile, in the land of hashtags and filters, speculation about the health of the Princess of Wales, Kate, reached a fever pitch, with </span><a style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, 'Open Sans', 'Helvetica Neue', sans-serif;" href="https://www.oversixty.co.nz/health/caring/princess-kate-s-post-surgery-pic-ignites-even-wilder-conspiracy-theories" target="_blank" rel="noopener">a Mother's Day photo</a><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, 'Open Sans', 'Helvetica Neue', sans-serif;"> that looked like it had been through more edits than a celebrity's Instagram post. Kate, surrounded by her adorable brood, found herself at the centre of yet another digital debacle. Who knew a simple family photo could cause such a stir?</span></p> <p>In a rare move, <a href="https://www.oversixty.co.nz/lifestyle/family-pets/princess-kate-sensationally-speaks-out-over-photo-fiasco" target="_blank" rel="noopener">Kate herself stepped forward</a> to offer an apology, blaming her newfound love for amateur photography. Note to self: stick to selfies, Kate.</p> <p>But fear not, royal watchers, for this tale of Photoshop folly is far from over. With a family as unpredictable as the British weather, who knows what digital delights await us in the next instalment?</p> <p><em>Image: Twitter (X)</em></p>

Technology

Placeholder Content Image

Yes, Kate Middleton’s photo was doctored. But so are a lot of images we see today

<p><a href="https://theconversation.com/profiles/t-j-thomson-503845">T.J. Thomson</a>, <em><a href="https://theconversation.com/institutions/rmit-university-1063">RMIT University</a></em></p> <p>Rumours and conspiracies have been <a href="https://www.nytimes.com/2024/02/28/style/princess-kate-middleton-health.html">swirling</a> following the abdominal surgery and long recovery period of Catherine, Princess of Wales, earlier this year. They intensified on Monday when Kensington Palace released a photo of the princess with her three children.</p> <blockquote class="instagram-media" style="background: #FFF; border: 0; border-radius: 3px; box-shadow: 0 0 1px 0 rgba(0,0,0,0.5),0 1px 10px 0 rgba(0,0,0,0.15); margin: 1px; max-width: 540px; min-width: 326px; padding: 0; width: calc(100% - 2px);" data-instgrm-captioned="" data-instgrm-permalink="https://www.instagram.com/p/C4U_IqTNaqU/?utm_source=ig_embed&amp;utm_campaign=loading" data-instgrm-version="14"> <div style="padding: 16px;"> <div style="display: flex; flex-direction: row; align-items: center;"> <div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 40px; margin-right: 14px; width: 40px;"> </div> <div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center;"> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 100px;"> </div> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 60px;"> </div> </div> </div> <div style="padding: 19% 0;"> </div> <div style="display: block; height: 50px; margin: 0 auto 12px; width: 50px;"> </div> <div style="padding-top: 8px;"> <div style="color: #3897f0; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: 550; line-height: 18px;">View this post on Instagram</div> </div> <div style="padding: 12.5% 0;"> </div> <div style="display: flex; flex-direction: row; margin-bottom: 14px; align-items: center;"> <div> <div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(0px) translateY(7px);"> </div> <div style="background-color: #f4f4f4; height: 12.5px; transform: rotate(-45deg) translateX(3px) translateY(1px); width: 12.5px; flex-grow: 0; margin-right: 14px; margin-left: 2px;"> </div> <div style="background-color: #f4f4f4; border-radius: 50%; height: 12.5px; width: 12.5px; transform: translateX(9px) translateY(-18px);"> </div> </div> <div style="margin-left: 8px;"> <div style="background-color: #f4f4f4; border-radius: 50%; flex-grow: 0; height: 20px; width: 20px;"> </div> <div style="width: 0; height: 0; border-top: 2px solid transparent; border-left: 6px solid #f4f4f4; border-bottom: 2px solid transparent; transform: translateX(16px) translateY(-4px) rotate(30deg);"> </div> </div> <div style="margin-left: auto;"> <div style="width: 0px; border-top: 8px solid #F4F4F4; border-right: 8px solid transparent; transform: translateY(16px);"> </div> <div style="background-color: #f4f4f4; flex-grow: 0; height: 12px; width: 16px; transform: translateY(-4px);"> </div> <div style="width: 0; height: 0; border-top: 8px solid #F4F4F4; border-left: 8px solid transparent; transform: translateY(-4px) translateX(8px);"> </div> </div> </div> <div style="display: flex; flex-direction: column; flex-grow: 1; justify-content: center; margin-bottom: 24px;"> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; margin-bottom: 6px; width: 224px;"> </div> <div style="background-color: #f4f4f4; border-radius: 4px; flex-grow: 0; height: 14px; width: 144px;"> </div> </div> <p style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; line-height: 17px; margin-bottom: 0; margin-top: 8px; overflow: hidden; padding: 8px 0 7px; text-align: center; text-overflow: ellipsis; white-space: nowrap;"><a style="color: #c9c8cd; font-family: Arial,sans-serif; font-size: 14px; font-style: normal; font-weight: normal; line-height: 17px; text-decoration: none;" href="https://www.instagram.com/p/C4U_IqTNaqU/?utm_source=ig_embed&amp;utm_campaign=loading" target="_blank" rel="noopener">A post shared by The Prince and Princess of Wales (@princeandprincessofwales)</a></p> </div> </blockquote> <p>The photo had clear signs of tampering, and international wire services <a href="https://apnews.com/article/kate-princess-photo-surgery-ca91acf667c87c6c70a7838347d6d4fb">withdrew the image</a> amid concerns around manipulation. The princess later <a href="https://twitter.com/KensingtonRoyal/status/1767135566645092616">apologised for any confusion</a> and said she had “experimented with editing” as many amateur photographers do.</p> <p>Image editing is extremely common these days, and not all of it is for nefarious purposes. However, in an age of rampant misinformation, how can we stay vigilant around suspicious images?</p> <h2>What happened with the royal photo?</h2> <p>A close look reveals at least eight inconsistencies with the image.</p> <p>Two of these relate to unnatural blur. Catherine’s right hand is unnaturally blurred, even though her left hand is sharp and at the same distance from the camera. The left side of Catherine’s hair is also unnaturally blurred, while the right side of her hair is sharp.</p> <p>These types of edits are usually made with a blur tool that softens pixels. It is often used to make the background of an image less distracting or to smooth rough patches of texture.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=358&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=358&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=358&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=450&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=450&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/581145/original/file-20240312-26-rhmkk1.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=450&amp;fit=crop&amp;dpr=3 2262w" alt="" /></a><figcaption><span class="caption">At least eight logical inconsistencies exist in the doctored image the Prince and Princess of Wales posted on social media.</span> <span class="attribution"><a class="source" href="https://www.instagram.com/p/C4U_IqTNaqU/">Photo by the Prince of Wales/Chart by T.J. Thomson</a></span></figcaption></figure> <p>Five of the edits appear to use the “clone stamp” tool. This is a Photoshop tool that takes part of the same or a different image and “stamps” it onto another part.</p> <p>You can see this with the repeated pattern on Louis’s (on the left) sweater and the tile on the ground. You can also see it with the step behind Louis’s legs and on Charlotte’s hair and sleeve. The zipper on Catherine’s jacket also doesn’t line up.</p> <p>The most charitable interpretation is that the princess was trying to remove distracting or unflattering elements. But the artefacts could also point to multiple images being blended together. This could either be to try to show the best version of each person (for example, with a smiling face and open eyes), or for another purpose.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Like many amateur photographers, I do occasionally experiment with editing. I wanted to express my apologies for any confusion the family photograph we shared yesterday caused. I hope everyone celebrating had a very happy Mother’s Day. C</p> <p>— The Prince and Princess of Wales (@KensingtonRoyal) <a href="https://twitter.com/KensingtonRoyal/status/1767135566645092616?ref_src=twsrc%5Etfw">March 11, 2024</a></p></blockquote> <h2>How common are image edits?</h2> <p>Image editing is increasingly common as both photography and editing are increasingly becoming more automated.</p> <p>This sometimes happens without you even knowing.</p> <p>Take HDR (high dynamic range) images, for example. Point your iPhone or equivalent at a beautiful sunset and watch it capture the scene from the brightest highlights to the darkest shadows. What happens here is your camera makes multiple images and automatically stitches them together to make an image <a href="https://www.adobe.com/creativecloud/photography/hub/guides/what-is-hdr-photography.html">with a wider range of contrast</a>.</p> <p>While face-smoothing or teeth-whitening filters are nothing new, some smartphone camera apps apply them without being prompted. Newer technology like Google’s “Best Take” <a href="https://blog.google/products/photos/how-google-photos-best-take-works/">feature</a> can even combine the best attributes of multiple images to ensure everyone’s eyes are open and faces are smiling in group shots.</p> <p>On social media, it seems everyone tries to show themselves in their best light, which is partially why so few of the photos on our <a href="https://www.tandfonline.com/doi/abs/10.1080/15551393.2020.1862663">camera rolls</a> make it onto our social media feeds. It is also why we often edit our photos to show our best sides.</p> <p>But in other contexts, such as press photography, the <a href="https://www.ap.org/about/news-values-and-principles/telling-the-story/visuals">rules are much stricter</a>. The Associated Press, for example, bans all edits beyond simple crops, colour adjustments, and “minor adjustments” that “restore the authentic nature of the photograph”.</p> <p>Professional photojournalists haven’t always gotten it right, though. While the majority of lens-based news workers adhere to ethical guidelines like those published by the <a href="https://nppa.org/resources/code-ethics">National Press Photographers Association</a>, others have let deadline pressures, competition and the desire for exceptional imagery cloud their judgement.</p> <p>One such example was in 2017, when British photojournalist Souvid Datta admitted to <a href="https://time.com/4766312/souvid-datta/">visually plagiarising</a> another photographer’s work within his own composition.</p> <blockquote class="twitter-tweet"> <p dir="ltr" lang="en">Photographer Souvid Datta appears to have plagiarized Mary Ellen Mark: <a href="https://t.co/iO1Lm8CowU">https://t.co/iO1Lm8CowU</a> <a href="https://t.co/jswHyApGNj">pic.twitter.com/jswHyApGNj</a></p> <p>— PetaPixel (@petapixel) <a href="https://twitter.com/petapixel/status/859824132258537472?ref_src=twsrc%5Etfw">May 3, 2017</a></p></blockquote> <p>Concerns around false or misleading visual information are at an all-time high, given advances in <a href="https://theconversation.com/nine-was-slammed-for-ai-editing-a-victorian-mps-dress-how-can-news-media-use-ai-responsibly-222382">generative artificial intelligence (AI)</a>. In fact, this year the World Economic Forum named the risk of misinformation and disinformation as the world’s greatest <a href="https://www.weforum.org/agenda/2024/01/ai-disinformation-global-risks/">short-term threat</a>. It placed this above armed conflict and natural disasters.</p> <h2>What to do if you’re unsure about an image you’ve found online</h2> <p>It can be hard to keep up with the more than <a href="https://theconversation.com/3-2-billion-images-and-720-000-hours-of-video-are-shared-online-daily-can-you-sort-real-from-fake-148630">3 billion photos</a> that are shared each day.</p> <p>But, for the ones that matter, we owe it to ourselves to slow down, zoom in and ask ourselves a few simple <a href="https://www.aap.com.au/factcheck-resources/how-we-check-the-facts/">questions</a>:</p> <p>1. Who made or shared the image? This can give clues about reliability and the purpose of making or sharing the image.</p> <p>2. What’s the evidence? Can you find another version of the image, for example, using a <a href="https://tineye.com/">reverse-image search engine</a>?</p> <p>3. What do trusted sources say? Consult resources like <a href="https://www.aap.com.au/factcheck/">AAP FactCheck</a> or <a href="https://factcheck.afp.com/">AFP Fact Check</a> to see if authoritative sources have already weighed in.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/225553/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><a href="https://theconversation.com/profiles/t-j-thomson-503845">T.J. Thomson</a>, Senior Lecturer in Visual Communication &amp; Digital Media, <em><a href="https://theconversation.com/institutions/rmit-university-1063">RMIT University</a></em></p> <p>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/yes-kate-middletons-photo-was-doctored-but-so-are-a-lot-of-images-we-see-today-225553">original article</a>.</p> <p><em>Hero image: The Conversation / X / Instagram</em></p>

Technology

Placeholder Content Image

Leap of imagination: how February 29 reminds us of our mysterious relationship with time and space

<p><em><a href="https://theconversation.com/profiles/emily-ohara-874665">Emily O'Hara</a>, <a href="https://theconversation.com/institutions/auckland-university-of-technology-1137">Auckland University of Technology</a></em></p> <p>If you find it intriguing that February 28 will be followed this week by February 29, rather than March 1 as it usually is, spare a thought for those alive in 1582. Back then, Thursday October 4 was followed by Friday October 15.</p> <p>Ten whole days were snatched from the present when Pope Gregory XIII issued a papal bull to “restore” the calendar from discrepancies that had crept into the Julian calendar, introduced by Julius Caesar in 45 BCE.</p> <p>The new Gregorian calendar returned the northern hemisphere’s vernal equinox to its “proper” place, around March 21. (The equinox is when the Earth’s axis is tilted neither toward nor away from the sun, and is used to determine the date of Easter.)</p> <p>The Julian calendar had observed a leap year every four years, but this meant time had drifted out of alignment with the dates of celestial events and astronomical seasons.</p> <p>In the Gregorian calendar, leap days were added only to years that were a multiple of four – like 2024 – with an exception for years that were evenly divisible by 100, but not 400 – like 1700.</p> <p>Simply put, leap days exist because it doesn’t take a neat 365 days for Earth to orbit the Sun. It takes 365.2422 days. Tracking the movement of celestial objects through space in an orderly pattern doesn’t quite work, which is why we have February – time’s great mop.</p> <h2>Time and space</h2> <p>This is just part of the history of how February – the shortest month, and originally the last month in the Roman calendar – came to have the job of absorbing those inconsistencies in the temporal calculations of the world’s most commonly used calendar.</p> <p>There is plenty of <a href="https://theconversation.com/leap-day-fixing-the-faults-in-our-stars-54032">science</a>, <a href="https://theconversation.com/explainer-the-science-behind-leap-years-and-how-they-work-54788">maths</a> and <a href="https://theconversation.com/how-a-seasonal-snarl-up-in-the-mid-1500s-gave-us-our-strange-rules-for-leap-years-132659">astrophysics</a> explaining the relationship between time and the planet we live on. But I like to think leap years and days offer something even more interesting to consider: why do we have calendars anyway?</p> <p>And what have they got to do with how we understand the wonder and strangeness of our existence in the universe? Because calendars tell a story, not just about time, but also about space.</p> <p>Our reckoning of time on Earth is through our spatial relationship to the Sun, Moon and stars. Time, and its place in our lives, sits somewhere between the scientific, the celestial and the spiritual.</p> <p>It is <a href="https://shop.whitechapelgallery.org/products/time">notoriously slippery, subjective and experiential</a>. It is also marked, tracked and determined in myriad ways across different cultures, from tropical to solar to <a href="https://www.stuff.co.nz/pou-tiaki/300062097/matariki-and-the-maramataka-the-mori-lunar-calendar">lunar</a> calendars.</p> <p>It is the Sun that measures a day and gives us our first reference point for understanding time. But it is the <a href="https://librarysearch.aut.ac.nz/vufind/Record/1145999?sid=25214690">Moon</a>, as a major celestial body, that extends our perception of time. By stretching a span of one day into something longer, it offers us a chance for philosophical reflection.</p> <p>The Sun (or its effect at least) is either present or not present. The Moon, however, goes through phases of transformation. It appears and disappears, changing shape and hinting that one night is not exactly like the one before or after.</p> <p>The Moon also has a distinct rhythm that can be tracked and understood as a pattern, giving us another sense of duration. Time is just that – overlapping durations: instants, seconds, minutes, hours, days, weeks, months, years, decades, lifetimes, centuries, ages.</p> <h2>The elusive Moon</h2> <p>It is almost impossible to imagine how time might feel in the absence of all the tools and gadgets we use to track, control and corral it. But it’s also hard to know what we might do in the absence of time as a unit of productivity – a measurable, dispensable resource.</p> <p>The closest we might come is simply to imagine what life might feel like in the absence of the Moon. Each day would rise and fall, in a rhythm of its own, but without visible reference to anything else. Just endless shifts from light to dark.</p> <p>Nights would be almost completely dark without the light of the Moon. Only stars at a much further distance would puncture the inky sky. The world around us would change – trees would grow, mammals would age and die, land masses would shift and change – but all would happen in an endless cycle of sunrise to sunset.</p> <p>The light from the Sun takes <a href="https://www.skyatnightmagazine.com/space-science/how-take-light-from-sun-reach-earth">eight minutes</a> to reach Earth, so the sunlight we see is always eight minutes in the past.</p> <p>I remember sitting outside when I first learned this, and wondering what the temporal delay might be between me and other objects: a plum tree, trees at the end of the street, hills in the distance, light on the horizon when looking out over the ocean, stars in the night sky.</p> <p>Moonlight, for reference, takes about <a href="https://www.pbs.org/seeinginthedark/astronomy-topics/light-as-a-cosmic-time-machine.html">1.3 seconds</a> to get to Earth. Light always travels at the same speed, it is entirely constant. The differing duration between how long it takes for sunlight or moonlight to reach the Earth is determined by the space in between.</p> <p>Time on the other hand, is anything but constant. There are countless ways we characterise it. The mere fact we have so many calendars and ways of describing perceptual time hints at our inability to pin it down.</p> <p>Calendars give us the impression we can, and have, made time predictable and understandable. Leap years, days and seconds serve as a periodic reminder that we haven’t.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/224503/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><a href="https://theconversation.com/profiles/emily-ohara-874665"><em>Emily O'Hara</em></a><em>, Senior Lecturer, Spatial Design + Temporary Practices, <a href="https://theconversation.com/institutions/auckland-university-of-technology-1137">Auckland University of Technology</a></em></p> <p><em>Image credits: Shutterstock </em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/leap-of-imagination-how-february-29-reminds-us-of-our-mysterious-relationship-with-time-and-space-224503">original article</a>.</em></p>

Technology

Placeholder Content Image

8 places you should never keep your phone

<p><strong>In your pocket</strong></p> <p>Keeping your phone in your pocket seems logical, but you could be doing more harm than good. According to Dr Lilly Friedman, this is actually the worst place to store your phone. “When phones are on, connected to a wireless network, and placed in a pocket, the radiation is two to seven times higher than if it were placed in a purse or holster,” she says. </p> <p>There is a correlation between radiation from a mobile phone and tumour growth, she adds. Plus, radiation can change the structure of DNA and affect male fertility, according to Dr Friedman. The World Health Organization’s International Agency for Research on Cancer also found that mobile phone radiation is additionally carcinogenic to humans. Merely sitting on your phone could cause health issues such as sciatica or back problems.</p> <p><strong>In your bra</strong></p> <p>Some research and case studies show that keeping your phone in your bra could be linked to breast cancer due to the radiations and vibrations from the phone. That said, there is not enough evidence to establish a definite relationship between the two. Still, keeping your phone in your bra, especially a sports bra, is a bad idea due to the skin-irritating bacteria it could harbour, Muscle &amp; Fitness reports.</p> <p><strong>In your bed or under your pillow</strong></p> <p>Sleeping with your phone is a bad idea for a few reasons. First, keeping your phone under your pillow could build up heat and present a potential fire hazard, especially if your phone is charging or has a defect. It’s also known that the LED light from phone screens can disrupt melatonin production and circadian rhythms, hurting your sleep quality, according to the National Sleep Foundation.</p> <p>And, of course, there’s also radiation to consider. The amounts of radio frequency radiation mobile phones give off are the same ones emitted from microwaves. There is also concern about the safety of mobile phone use with respect to cancer and brain tumours, per the American Cancer Society.</p> <p><strong>Plugged in</strong></p> <p>Keeping your phone plugged in when it has a full battery causes damage to the battery itself, according to pcmag.com. It’s not that your phone ‘overloads’ with power, but heat build-ups from stacking things on top of your phone or keeping it under your pillow, making your phone hotter and damaging your battery.</p> <p><strong>Close to your face</strong></p> <p>Keeping your phone close to your face means bacteria transfers to and from your phone, making your skin and phone dirtier. This combination leads to more acne, skin irritation and even wrinkles, according to Allure. Try using ear pods instead to keep the surface of your phone at a distance from your face.</p> <p><strong>In your glovebox</strong></p> <p>Extreme temperatures are the worst conditions for your phone. So keeping your device in your car’s glovebox during the extremely hot or cold months of the year could lead to problems. According to Time, excess heat can cause everything from data loss or corruption to battery leakage. The cold weather presents just as many issues for your device. In cold temperatures, many smartphones shut off, have display problems, shortened battery life and in rare cases screen shattering.</p> <p><strong>On your beach towel </strong></p> <p>Notice a theme here? The extreme sun and heat at the beach is a recipe for phone disaster. Protect your device after you finish taking beautiful beach pictures. Hot and sunny conditions could, again, cause your phone to overheat – and getting sand in your phone won’t help either.</p> <p><strong>Anywhere in the bathroom</strong></p> <p>Although phones could arguably be the new newspaper, it’s not a good idea to take yours into the bathroom. Even if you keep your device on a counter or away from the toilet, anything within a metre of a flushing toilet could mean bacteria or viruses in the air end up on your phone, according to a study published in Applied and Environmental Microbiology. </p> <p>“The detection of bacteria and viruses falling out onto surfaces in bathrooms after flushing indicated that they remain airborne long enough to settle on surfaces throughout the bathroom,” wrote the study authors.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/healthsmart/8-places-you-should-never-keep-your-phone" target="_blank" rel="noopener">Reader's Digest</a>. </em></p>

Technology

Placeholder Content Image

Why do I get so much spam and unwanted email in my inbox? And how can I get rid of it?

<p><em><a href="https://theconversation.com/profiles/kayleen-manwaring-8735">Kayleen Manwaring</a>, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p>Spam might not have brought an end to the internet or email, as some dire predictions <a href="https://www.zdnet.com/article/why-spam-could-destroy-the-internet/">in the early 2000s</a> claimed it could – but it’s still a massive pain.</p> <p>Despite all the spam being removed by spam-filtering technologies, most people still receive spam every day. How do these messages end up flooding our inboxes? And are there any legal consequences for the senders?</p> <h2>What is spam?</h2> <p>The Organisation for Economic Co-operation and Development (OECD) noted in 2004 “there does not appear to be a widely agreed and workable definition for spam” across jurisdictions – and this remains true today.</p> <p>That said, “spam” generally <a href="https://www.oecd-ilibrary.org/docserver/232784860063.pdf?expires=1693541947&amp;id=id&amp;accname=ocid177499&amp;checksum=D0C5BDAC49951DF353618B8E38483253">refers to</a> unsolicited electronic messages. These are often sent in bulk and frequently advertise goods or services. It also includes scamming and phishing messages, according to the OECD.</p> <p>Most people think of spam in the form of emails or SMS messages. However, what we now call spam actually predates the internet. In 1854, a spam telegram was sent to British politicians advertising the opening hours of dentists who <a href="https://www.theguardian.com/technology/2013/aug/09/why-spammers-are-winning-junk-mail">sold tooth-whitening powder</a>.</p> <p>The first spam email came more than 100 years later. It was reportedly sent to 600 people on May 3 1978 <a href="https://web.archive.org/web/20080628205216/http://www.latimes.com/technology/la-fi-spam11may11001420,1,5168218,full.story">through ARPAnet</a> – a precursor to the modern internet.</p> <p>As for how much spam is out there, the figures vary, possibly due to the various <a href="https://www.spamhaus.org/consumer/definition/">definitions of “spam”</a>. One source reports the average number of spam emails sent daily in 2022 was about <a href="https://dataprot.net/statistics/spam-statistics/">122.33 billion</a> (which would mean more than half of all emails were spam). As for text messages, another source reports a daily average of 1.6 billion <a href="https://thesmallbusinessblog.net/spam-text-statistics/">spam texts</a>.</p> <h2>Where do spammers get my details?</h2> <p>Each time you enter your email address or phone number into an e-commerce website, you may be handing it to spammers.</p> <p>But sometimes you may even receive spam from entities you don’t recognise. That’s because businesses will often transfer customers’ contact information to related companies, or sell their data to third parties such as data brokers.</p> <p>Australia’s Privacy Act 1988 somewhat limits the transfer of personal information to third parties. However, these laws <a href="https://theconversation.com/accc-says-consumers-need-more-choices-about-what-online-marketplaces-are-doing-with-their-data-182134">are weak</a> – and <a href="http://handle.unsw.edu.au/1959.4/unsworks_75600">weakly enforced</a>.</p> <p>Some entities also use “address-harvesting” software to search the internet for electronic addresses that are captured in a database. The collector then uses these addresses directly, or sells them to others looking to send spam.</p> <p>Many jurisdictions (including <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s19.html">Australia</a>) prohibit these harvesting activities, but they are still <a href="https://www.projecthoneypot.org/statistics.php">common</a>.</p> <h2>Is spamming against the law?</h2> <p>Australia has had legislation regulating spam messaging since 2003. But the <a href="https://www.legislation.gov.au/Details/C2016C00614">Spam Act</a> surprisingly does not define the word “spam”. It tackles spam by prohibiting the sending of <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s15.html">unsolicited commercial electronic messages</a> containing offers, ads or other promotions of goods, services or land.</p> <p>However, if the receiver <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/sch2.html">consented</a> to these types of messages, the prohibition does not apply. When you buy goods or services from a company, you will often see a request to click on a “yes” button to receive marketing promotions. Doing so means you have consented.</p> <p>On the other hand, if your phone or inbox are hit by commercial messages you haven’t agreed to receive, that is a breach of the <a href="https://austlii.edu.au/cgi-bin/viewdb/au/legis/cth/consol_act/sa200366/">Spam Act</a> by the sender. If you originally signed up to receive the messages, but then unsubscribed and the messages kept coming after <a href="https://austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/sch2.html">five business days</a>, that is also illegal. Senders must also include a <a href="https://austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s18.html">functioning unsubscribe facility</a> in every commercial message they send.</p> <p>Spammers can be penalised for breaches of the Spam Act. In the past few months alone, <a href="https://www.acma.gov.au/articles/2023-06/commonwealth-bank-penalised-355-million-spam-breaches">Commonwealth Bank</a>, <a href="https://www.acma.gov.au/articles/2023-08/doordash-penalised-2-million-spam-breaches">DoorDash</a> and <a href="https://www.acma.gov.au/articles/2023-06/mycar-tyre-auto-penalised-1m-spam-breaches">mycar Tyre &amp; Auto</a> were fined more than A$6 million in total for breaches.</p> <p>However, most spam comes from outside Australia where the laws aren’t the same. In the United States spam is legal under the <a href="https://www.ftc.gov/business-guidance/resources/can-spam-act-compliance-guide-business">CAN-SPAM Act</a> until you opt out. Unsurprisingly, the US <a href="https://talosintelligence.com/reputation_center/email_rep#spam-country-senders">tops the list</a> of countries where the most spam originates.</p> <p>Although spam sent to Australia from overseas <a href="https://austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/s16.html">can still breach</a> the Spam Act – and the Australian Communications and Media Authority (ACMA) co-operates with overseas regulators – overseas enforcement actions are difficult and expensive, especially if the spammer has disguised their true identity and location.</p> <p>It’s worth noting that messages from political parties, registered charities and government bodies aren’t prohibited – nor are messages from educational institutions to students and former students. So while you might consider these messages as “spam”, they can legally be <a href="http://www8.austlii.edu.au/cgi-bin/viewdoc/au/legis/cth/consol_act/sa200366/sch1.html">sent freely without consent</a>. Factual messages (without marketing content) from businesses are also legal as long as they include accurate sender details and contact information.</p> <p>Moreover, the Spam Act generally only covers spam sent via email, SMS/MMS or instant messaging services, such as WhatsApp. Voice calls and faxes aren’t covered (although you can use the <a href="https://www.donotcall.gov.au/">Do Not Call Register</a> to block some commercial calls).</p> <h2>Staying safe from spam (and cyberattacks)</h2> <p>Spam isn’t only annoying, it can also be dangerous. Spam messages can contain indecent images, scams and <a href="https://www.cyber.gov.au/learn-basics/explore-basics/watch-out-threats/phishing-emails-and-texts">phishing attempts</a>. Some have <a href="https://www.cyber.gov.au/threats/types-threats/malware">malware</a> (malicious software) designed to break into computer networks and cause harm, such as by stealing data or money, or shutting down systems.</p> <p>The <a href="https://www.cyber.gov.au/protect-yourself/securing-your-email/email-security/protect-yourself-malicious-email">Australian Cyber Security Centre</a> and <a href="https://www.acma.gov.au/dealing-with-spam">ACMA</a> provide useful tips for reducing the spam you get and your risk of being hit by cyberattacks. They suggest to:</p> <ol> <li> <p>use a spam filter and block spammers – email and telecommunications providers often supply useful tools as part of their services</p> </li> <li> <p>unsubscribe from any emails you no longer want to receive – even if you originally agreed to receive them</p> </li> <li> <p>remove as much of your contact details from websites as you can and always restrict the sharing of your personal information (such as name, birth date, email address and mobile number) when you can – beware of pre-ticked boxes asking for your consent to receive marketing emails</p> </li> <li> <p>install cybersecurity updates for your devices and software as you get them</p> </li> <li> <p>always think twice about opening emails or clicking on links, especially for messages promising rewards or asking for personal information – if it looks too good to be true, it probably is</p> </li> <li> <p>use <a href="https://theconversation.com/what-is-multi-factor-authentication-and-how-should-i-be-using-it-191591">multi-factor authentication</a> to access online services so even if a scam compromises your login details, it will still be difficult for hackers to break into your accounts</p> </li> <li> <p>report spam to your email and telecommunications providers, and to <a href="https://www.acma.gov.au/dealing-with-spam#complain-or-forward-spam-to-the-acma">ACMA</a>. <img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/208665/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> </li> </ol> <p><a href="https://theconversation.com/profiles/kayleen-manwaring-8735"><em>Kayleen Manwaring</em></a><em>, Senior Research Fellow, UNSW Allens Hub for Technology, Law &amp; Innovation and Senior Lecturer, School of Private &amp; Commercial Law, UNSW Law &amp; Justice, <a href="https://theconversation.com/institutions/unsw-sydney-1414">UNSW Sydney</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/why-do-i-get-so-much-spam-and-unwanted-email-in-my-inbox-and-how-can-i-get-rid-of-it-208665">original article</a>.</em></p>

Technology

Placeholder Content Image

Why you need to stop charging your phone overnight

<p><strong>You charge your phone all night </strong></p> <p>Waking up to a fully charged phone may seem like a great way to start the day, but leaving your device plugged in overnight is a bad idea. When a phone has reached 100 per cent charge, it will continue to get trickle charges to keep it topped up at 100 percent. </p> <p>These extra charges keep the battery working non-stop. In fact, it’s better not to fully charge lithium-ion batteries because high voltage stresses the battery and wears it out over time, according to technology company Cadex.</p> <p><strong>You use vibrations for notifications</strong></p> <p>Your phone, like any other tool or device, ages and loses effectiveness the more you use it, says David Steele, the Director of Business Development for EverydayPhone. So little extras, like vibrating notifications, are habits that make your phone’s job harder. </p> <p>“The issue with these habits essentially boils down to having your phone constantly running at full capacity when it’s unnecessary,” Steele says. “Just like us, a phone needs a break to avoid burning out.”</p> <p><strong>You keep apps open that you're not using</strong></p> <p>Unused apps can eat up the battery life of smartphones, according to Andrew Moore-Crispin, the Director of Content at Ting Mobile. “If you open an app once and never use it again, the app might still run in the background,” he says.</p> <p>Swiping out of apps you aren’t using or no longer need is an easy solution. Moore-Crispin says doing so extends the battery life of your phone while also freeing up valuable storage space, too.</p> <p><strong>You allow unnecessary permissions</strong></p> <p>Ride-sharing apps need your location to pick you up, but other apps might not need this permission. Moore-Crispin suggests you be picky about which apps you grant such permissions to and take away permissions you deem unnecessary.</p> <p><strong>You have one of these apps</strong></p> <p>The apps that drain your battery the most are Snapchat, Google Maps, Netflix, Amazon, and Facebook, according to AdWeek. The Guardian found that uninstalling the Facebook mobile app from Android phones saves people up to 20 percent of their battery life. </p> <p>If you also get rid of the FB Messenger app, other app load times could speed up by 15 per cent, per the Guardian. The reason Facebook particularly kills battery life is because it keeps running in the background – even when you’re not using it, Business Insider reports.</p> <p><strong>Your screen is always extremely bright </strong></p> <p>Gone are the days of tiny phone screens, but before you give the thumbs up emoji, understand how the bigger screens of today can be a phone battery’s worst enemy, according to Moore-Crispin. Make sure you turn on adaptive brightness in the display menu. </p> <p>This change means your phone will automatically adjust the screen brightness to match your environment. As a bonus, set the brightness level to the lowest possible and lower your screen’s timeout, which is what determines how long it stays lit before fading when it goes idle.</p> <p><strong>You keep your phone out at the beach</strong></p> <p>Extreme heat or extreme cold temperatures and other weather conditions can shorten the life of your phone. According to Time, excess heat can cause everything from data loss or corruption to battery leakage. Cold weather presents just as many issues. In cold temperatures, some smartphones shut off, have display problems, or run out of battery; in rare cases screens may shatter.</p> <p><strong>You keep your phone in your bed or under your pillow </strong></p> <p>Tucking your phone under your pillow when you sleep is another way to shorten its life, thanks to heat build-up.</p> <p><strong>You don't keep your software up to date</strong></p> <p>utting off device updates does more harm than good for your phone. iPhone and Android makers push updates to make your user experience better and so that your phone functions properly. These updates come with extra benefits, too. In fact, if your device has a weak battery or other issues, these software updates could remedy them, Popular Science reports. Make sure to keep up with app-specific updates as well.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/home-tipsscience-technology/why-you-need-to-stop-charging-your-phone-overnight" target="_blank" rel="noopener">Reader's Digest</a>. </em></p>

Technology

Placeholder Content Image

Why am I online? Research shows it’s often about managing emotions

<p><em><a href="https://theconversation.com/profiles/wally-smith-1450210">Wally Smith</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/greg-wadley-203663">Greg Wadley</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p>Most of us <a href="https://wearesocial.com/au/blog/2022/02/digital-2022-australia-online-like-never-before/">go online</a> multiple times a day. About half of 18–29 year olds surveyed in a 2021 <a href="https://www.pewresearch.org/short-reads/2021/03/26/about-three-in-ten-u-s-adults-say-they-are-almost-constantly-online/">Pew Research Study</a> said they are “almost constantly” connected.</p> <p>How are we to make sense of this significant digital dimension of modern life?</p> <p>Many questions have rightly been asked about its broader consequences for society and the economy. But there remains a simpler question about what motivates people across a range of ages, occupations and cultures to be so absorbed in digital connection.</p> <p>And we can turn this question on ourselves: <em>why am I online?</em></p> <h2>What are we doing when we go online?</h2> <p>As the American sociologist Erving Goffman <a href="https://www.nytimes.com/1975/02/16/archives/frame-analysis.html">pointed out</a>, asking “What is it that’s going on here?” about human behaviour can yield answers framed at different levels. These range from our superficial motives to a deeper understanding of what we are “really” doing.</p> <p>Sometimes we might be content to explain our online behaviour in purely practical terms, like checking traffic routes or paying a bill. Other times we might struggle to articulate our reasons for going or remaining online.</p> <p>Why are we continually looking at our phones or computers, when we could be getting on with physical tasks, or exercising, or meditating, or engaging more fully with the people who are physically around us?</p> <h2>The ever-present need to manage our emotions</h2> <p>As researchers of human-computer interaction, we are exploring answers in terms of the ever-present need to manage our emotions. Psychologists refer to this activity as <a href="https://www.guilford.com/books/Handbook-of-Emotion-Regulation/James-Gross/9781462520732">emotion regulation</a>.</p> <p>Theories of the nature and function of emotions are complex and contested. However, it is safe to say they are expressions of felt needs and motivations that arise in us through some fusion of physiology and culture.</p> <p>During a typical day, we often feel a need to <a href="https://journals.sagepub.com/doi/abs/10.1037/1089-2680.2.3.271">alter our emotional state</a>. We may wish to feel more serious about a competitive task or more sad at a funeral. Perhaps we would like to be less sad about events of the past, less angry when meeting an errant family member, or more angry about something we know in our heart is wrong.</p> <figure><iframe src="https://www.youtube.com/embed/PQkNb4CLjJ8?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen"></iframe><figcaption><span class="caption">Digital emotion regulation is becoming increasingly common in our everyday lives.</span></figcaption></figure> <p>One way to understand our frequent immersions into online experience is to see them as acts within a broader scheme of managing such daily emotional demands. Indeed, in <a href="https://www.sciencedirect.com/science/article/abs/pii/S1071581922001732">earlier research</a> we found up to half of all smartphone use may be for the purpose of emotional regulation.</p> <h2>Digital technologies are becoming key tools of emotion regulation</h2> <p>Over the pandemic lockdowns of 2020–21 in Melbourne, Australia, we investigated how digital technologies are becoming <a href="https://dl.acm.org/doi/10.1145/3491102.3517573">key tools of emotion regulation</a>. We were surprised to find that people readily talked of their technology use in these emotion-managing terms.</p> <p>Occasionally, this involved specially designed apps, for mindfulness and so on. But more often people relied on mundane tools, such as using social media alongside Zoom to combat feelings of boredom or isolation, browsing for “retail therapy”, playing phone games to de-stress, and searching online to alleviate anxiety about world events.</p> <p>To some extent, these uses of digital technology can be seen as re-packaging <a href="https://www.tandfonline.com/doi/abs/10.1080/026999399379285">traditional methods</a> of emotion management, such as listening to music, strengthening social connections, or enjoying the company of adorable animals. Indeed, people in our study used digital technologies to enact familiar strategies, such as immersion in selected situations, seeking distractions, and reappraising what a situation means.</p> <p>However, we also found indications that digital tools are changing the intensity and nature of how we regulate emotions. They provide emotional resources that are <a href="https://en.wikipedia.org/wiki/Ubiquitous_computing">nearly always available</a>, and virtual situations can be accessed, juxtaposed and navigated more deftly than their physical counterparts.</p> <p>Some participants in our study described how they built what we called “emotional toolkits”. These are collections of digital resources ready to be deployed when needed, each for a particular emotional effect.</p> <h2>A new kind of digital emotional intelligence</h2> <p>None of this is to say emotion regulation is automatically and always a good thing. It can be a means of avoiding important and meaningful endeavours and it can itself become dysfunctional.</p> <p>In our study of a small sample of Melburnians, we found that although digital applications appeared to be generally effective in this role, they are volatile and can lead to <a href="https://www.theguardian.com/commentisfree/2020/sep/27/social-dilemma-media-facebook-twitter-society">unpredictable emotional outcomes</a>. A search for energising music or reassuring social contact, for example, can produce random or unwanted results.</p> <p>A new kind of <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10187756/">digital emotional intelligence</a> might be needed to effectively navigate digital emotional landscapes.</p> <h2>An historic shift in everyday life</h2> <p>Returning to the question: <em>what am I doing online?</em> Emotion regulation may well be the part of the answer.</p> <p>You may be online for valid instrumental reasons. But equally, you are likely to be enacting your own strategies of <a href="https://cis.unimelb.edu.au/hci/projects/digitalemotionregulation">emotion regulation through digital means</a>.</p> <p>It is part of an historic shift playing out in how people negotiate the demands of everyday life. <img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/208483/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/wally-smith-1450210">Wally Smith</a>, Professor, School of Computing and Information Systems, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a> and <a href="https://theconversation.com/profiles/greg-wadley-203663">Greg Wadley</a>, Senior Lecturer, Computing and Information Systems, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/why-am-i-online-research-shows-its-often-about-managing-emotions-208483">original article</a>.</em></p>

Technology

Placeholder Content Image

Facebook Messenger scams are on the rise – here’s how to protect yourself

<p><strong>Facebook Messenger scams prey on our vulnerabilities</strong></p> <p>Scams through Facebook’s Messenger platform are being reported at higher rates than ever before, according to AARP, citing its own data as well as that of the government. Since Facebook’s early days, cybercriminals have been mining Facebook’s direct-messaging capabilities to scam unsuspecting victims out of money. One of the earliest Facebook Messenger scams involved a message, purportedly from a friend, claiming they were stuck in a foreign country and in desperate need of immediate financial assistance to get out. It wasn’t really the friend, however, but rather a scammer who had hacked into the friend’s account. </p> <p>Imposter scams such as “the friend in a foreign country” have evolved and proliferated over the years. The common thread is the scammer either creates an account impersonating an actual Facebook account or hacks into an existing Facebook account. In either case, the scammer then uses the fake/hacked account to send private messages to the account holder’s friends that elicit either money or personal information. The messages vary, but all are designed to prey on our human vulnerabilities, including:</p> <ul> <li>the desire to be a “hero”</li> <li>the desire to appear “generous”</li> <li>the desire to win “free money”</li> <li>the desire to be loved and admired</li> <li>the desire to avoid shame or punishment</li> </ul> <p>If a scammer tries to message you, report them, Facebook advises, but that begs the larger question of how does one recognise a Facebook Messenger scam?</p> <p><strong>Current Messenger Facebook scams</strong></p> <p>According to Facebook and our cybersecurity experts, here are the most common Facebook Messenger scams today:</p> <p><span style="text-decoration: underline;"><em>Romance scams</em></span>. Preying on our desire to be loved and admired, romance scammers appear as attractive strangers with sad stories and a desire to love and be loved. The most effective romance scammers will friend a number of mutual friends before reaching out to any of them, in an attempt to make themselves seem less like strangers and more like people in the same social network. Many use photos they’ve stolen off the Internet and many pose as members of the military or as doctors, in an attempt to inspire trust, admiration, and even authority. What they all have in common is they can’t meet you just yet because they’re somewhere far away, and although it may take a bit of time, even as much as several weeks, they will eventually ask you to send money so that they can come to see you.</p> <p><span style="text-decoration: underline;"><em>Lottery scams</em></span>. Preying on our desire for “free money,” lottery scammers appear as friends or organisations who are thrilled to tell you you’ve won money in some lottery or contest. The common thread? It’s a contest you have no recollection of having entered and to get the prize, you’ll have to either pay a fee or “refundable” advance or provide personal information.</p> <p><span style="text-decoration: underline;"><em>Inheritance scams</em></span>. Also preying on our desire for free money, inheritance scammers claim to be lawyers or others who represent someone who has died and supposedly left you their estate or some portion of it – but first, you’ll have to fork over some money or personal information.</p> <p><span style="text-decoration: underline;"><em>Loan scams</em></span>. Another variation on the “free money” theme is the loan scam, whereby the scammer promises low-interest loans with no money down – except for a “refundable” application fee. Facebook points out that loan scammers may send messages via Messenger and also leave posts and comments on Pages and in Groups to legitimise themselves. However, legitimate lenders wouldn’t offer loans via Facebook Messenger, nor would they ask you for money to proceed with a loan application.</p> <p><span style="text-decoration: underline;"><em>Donation scams</em></span>. Facebook specifically warns users to watch out for “famous people” or people claiming to represent a charity hitting them up for a donation. Donation scams, which are easy money for a scammer because they are a direct request for payment, prey on our desire to be perceived, or to perceive ourselves, as generous.</p> <p><span style="text-decoration: underline;"><em>“Hey, is this you?” scams</em></span>. Consumer Affairs warns of this “phishing scam” that uses the threat of shame to goad you into giving up personal information. The scammer hacks into one of your Facebook friend’s Messenger accounts and sends you a video, asking if it’s really you in the video, and implying there’s something in the video that could embarrass you. If you ever get a message like this, Consumer Affairs urges you to ignore and delete it to avoid giving away personal information or introducing a virus onto your computer.</p> <p><strong>Red flags to watch out for</strong></p> <p>Unfortunately, Facebook Messenger scams evolve rapidly (as soon as we suss them out, there are several more to replace them). So, it’s a good idea to be aware of these warning signs that we culled from our experts:</p> <p><span style="text-decoration: underline;"><em>Someone is asking you for money</em></span>. While Facebook warns specifically against strangers asking for money, Rachel Wilson, investigative coordinator for The Smith Investigation Agency, points out to Reader’s Digest that any time anyone asks you for money over Messenger, it’s immediately suspect. “If friends or family ask you to help them in an emergency, always call to speak with them personally to confirm that the message originated with them.”</p> <p><span style="text-decoration: underline;"><em>Someone is getting a little too personal</em></span>. When someone sends you a message requesting personal information, especially financial information, it should be considered suspicious, advises Sean Messier, credit industry analyst for Credit Card Insider. Messier suggests not revealing any such information until you’re certain the message-sender is who they claim to be, but it’s probably also a good idea to never reveal any such information over Messenger at all.</p> <p><span style="text-decoration: underline;"><em>Someone is offering something for free</em></span>. You know how they say there’s no such thing as a free lunch? Well, there’s no such thing as free money on Facebook, points out Robert Siciliano, security expert. This is true for any kind of “free money” Messenger message, including those involving lotteries, loans, contest winnings, inheritances, lost bank accounts, and reimbursements of money owed.</p> <p><span style="text-decoration: underline;"><em>Someone who wants to take the conversation off Facebook (to text or email, etc)</em></span>. Facebook warns against taking conversations off Facebook unless you’re absolutely certain, beyond a shadow of a doubt, the message sender is who they say they are.</p> <p><span style="text-decoration: underline;"><em>Messages that seem out of character for the sender</em></span>. If a message seems “out of the norm” for the sender, trust your instincts and ignore it. This is doubly true if the message includes an attachment. Be very wary of opening attachments in general, and particularly if something seems “off” about the message or the sender.</p> <p><span style="text-decoration: underline;"><em>Messages rife with spelling and grammatical errors</em></span>. Facebook points out that when a message is filled with typos and grammatical errors, you should have your guard up. A single typo is one thing, but things like the misspelling of names and places are a big red flag.</p> <p><span style="text-decoration: underline;"><em>Messages from new accounts with few friends</em></span>. Roger Thompson, CEO of Thompson Cybersecurity Labs, points out that new accounts with few friends should always be considered suspicious until confirmed otherwise. Friend requests from such accounts and from duplicate friend accounts should be considered suspect as well.</p> <p>To avoid getting hacked (and used by a cybercriminal in an imposter scam), Wilson recommends updating your social media passwords regularly and always use two-factor authentication. She also notes that with Facebook use increasing among seniors, it would be a good deed to speak to older family members about Messenger scams and how to avoid them.</p> <p><em>Image credits: Getty Images </em></p> <p><em>This article originally appeared on <a href="https://www.readersdigest.co.nz/true-stories-lifestyle/science-technology/facebook-messenger-scams-are-on-the-rise-heres-how-to-protect-yourself" target="_blank" rel="noopener">Reader's Digest</a>.</em></p>

Technology

Placeholder Content Image

How scammers use psychology to create some of the most convincing internet cons – and what to watch out for

<p><a href="https://theconversation.com/profiles/stacey-wood-473147"><em>Stacey Wood</em></a><em>, <a href="https://theconversation.com/institutions/scripps-college-2153">Scripps College</a> and <a href="https://theconversation.com/profiles/yaniv-hanoch-1341108">Yaniv Hanoch</a>, <a href="https://theconversation.com/institutions/university-of-southampton-1093">University of Southampton</a></em></p> <p><a href="https://www.experian.co.uk/blogs/latest-thinking/fraud-prevention/cybercrime-fraud-most-common-crime-uk/">Online fraud is today’s most common crime</a>. Victims are often told they are foolish for falling for it, but fraudsters use psychological mechanisms to infiltrate the defences of their targets, regardless of how intelligent they are.</p> <p>So it’s important to keep up with the latest scams and understand how they work.</p> <p>Recently, consumer protection magazine Which? <a href="https://www.which.co.uk/news/article/the-4-most-convincing-scams-weve-seen-in-2023-so-far-a7bRP9s0KJvG">identified some of the most convincing scams of 2023</a>. These scams all have one thing in common – they insidiously take advantage of people’s cognitive biases and psychological blind spots.</p> <p>They included “pig butchering” a way of fattening up victims with affection, the missing person scam which involves posting fake content on social media pages, the traditional PayPal scam, and a new scam called the “fake app alert” in which malware is hidden on apps that look legitimate.</p> <h2>Pig butchering</h2> <p>In our work as fraud psychology researchers we have noticed a trend towards hybrid scams, which combine different types of fraud. Hybrid scams often involve crypto investments and <a href="https://www.psychologytoday.com/us/blog/the-fraud-crisis/202210/new-scams-committed-forced-trafficked-labor">sometimes use trafficked labour</a> In the US alone, <a href="https://www.fbi.gov/contact-us/field-offices/springfield/news/internet-crime-complaint-center-releases-2022-statistics">the FBI recently reported</a> that people lost US $3.3 billion (£2.6 billion) in 2023 to investment fraud.</p> <p>Pig butchering is a long-term deception. <a href="https://www.cnbc.com/2023/05/02/pig-butchering-scammers-make-billions-convincing-victims-of-love.html">This type of scam</a> combines elements of <a href="https://www.actionfraud.police.uk/a-z-of-fraud/romance-scams">romance scams</a> with an investment con. The name comes from the strategy of <a href="https://www.theguardian.com/money/2023/may/22/dating-cons-and-dodgy-apps-among-most-common-scams-says-uk-watchdog">“fattening up” a victim with affection before slaughter</a>.</p> <p>It will usually begin with <a href="https://www.which.co.uk/policy-and-insight/article/pig-butchering-among-most-convincing-scams-of-2023-so-far-which-warns-aDRtr4I1UT1R">standard scam approach like a text</a>, social media message, or an introduction at a job board site.</p> <p>Victims may have their guard up at first. However, these scams can unfold over months, with the scammer slowly gaining the victims’ trust and initiating a romantic relationship all the while learning about their vulnerabilities.</p> <p>For example, details of their financial situation, job stresses, and dreams about the life they want. Romance scammers often saturate their targets with affection and almost constant contact. Pig butchering sometimes involves several trafficked people working as a team to create a single persona.</p> <p>Once the victim depends on the scammer for their emotional connection, the scammer introduces the idea of making an investment and uses fake crypto platforms to demonstrate returns. The scammers may use legitimate sounding cryptocoins and platforms. Victims can invest and “see” strong returns online. In reality, their money is going directly to the scammer.</p> <p>Once a victim transfers a substantial amount of money to the con artist, they are less likely to pull out. This phenomenon is known as the <a href="https://www.sciencedirect.com/science/article/abs/pii/0749597885900494">“sunk cost fallacy”</a>. Research has shown people are likely to carry on investing money, time and effort in activities they have already invested in and ignore signs the endeavour isn’t in their best interests.</p> <p>When the victim runs out of money or tries to withdraw funds, they are blocked.</p> <p>The victim is left with not only financial devastation, but also the loss of what they may imagine to be their most intimate partnership. They are often <a href="https://cloud-platform-e218f50a4812967ba1215eaecede923f.s3.amazonaws.com/uploads/sites/6/2021/12/VC-Who-Suffers-Fraud-Report-1.pdf">too embarrassed to discuss the experience</a> with friends and family or to report to the police.</p> <h2>PayPal scams</h2> <p>Fake payment requests are a common attack that works by volume rather than playing the long game. Payment requests appear to come from a genuine PayPal address. Fraudulent messages typically begin with a generic greeting, an urgent request and a fake link.</p> <p>For example, Dear User: You’ve received a payment, or you have paid too much. Please click link below for details. Users are directed to a spoofed website with a legitimate sounding name such as www.paypal.com/SpecialOffers and asked to enter their account information and password.</p> <p>Both of us have received these scam requests – and even we found them difficult to discern from legitimate PayPal request emails. These scams work through mimicry and play on the human tendency to trust authority. Legitimate PayPal correspondence is usually automatic bot language, so it is not difficult to imitate.</p> <p>But remember, genuine messages from PayPal <a href="https://www.paypal.com/ca/for-you/account/security/fraud-dangers#:%7E:text=Any%20email%20from%20PayPal%20will,bank%20account%2C%20or%20credit%20card.">will use your first and last name</a>.</p> <h2>The missing person scam</h2> <p>This seems to be a new scam that exploits a person’s kindness. In the past, charity scams involved posing as charitable organisation responding to a <a href="https://www.aarp.org/money/scams-fraud/info-2019/charity.html">recent, real calamity</a>.</p> <p>The new missing person scam is more sophisticated. The initial plea is a <a href="https://www.thesun.co.uk/tech/20875699/facebook-fake-missing-child-scam-warning/">fake missing person post</a> that generates likes and shares, increasing its credibility and exposure. Then the fraudster edits the content to create an investment scheme which now has the veneer of legitimacy.</p> <p>This scam may work because the initial consumers are unaware that the content is fraudulent, and there is no obvious request. In psychology, this type of persuasion is known as “<a href="https://thedecisionlab.com/reference-guide/psychology/social-proof">social proof</a>” – the tendency of individuals to follow and copy behaviour of others.</p> <h2>Fake app alerts</h2> <p>People post mobile apps, designed to steal users’ personal information, on the Google Play or Apple app store.</p> <p>The app often has a <a href="https://www.edinburghnews.scotsman.com/news/crime/another-person-comes-forward-after-banking-app-scam-3584340">legitimate function</a>, which gives it a cover. Consumers unknowingly jeopardise their private information by downloading these apps which use malware to access additional information.</p> <p>Although there has been <a href="https://tech.co/news/fake-android-apps-delete">media coverage of Android security issues</a>, many users assume malware <a href="https://www.ben-evans.com/benedictevans/2020/8/18/app-stores">cannot bypass app store screening</a>. Again, this scam plays on people’s <a href="https://psycnet.apa.org/doiLanding?doi=10.1037%2F0021-9010.92.3.639">trust in authority figures</a> to keep tjem safe.</p> <p>Discuss any investment opportunities with friends, family members or professionals. It’s much easier said than done, but exercising caution one of the best strategies to reduce the chance of becoming a fraud victim.</p> <p>Scammers count on people paying little to no attention to their emails or messages before clicking on them or providing valuable information. When it comes to scams, the devil is in the missing details.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/207759/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/stacey-wood-473147">Stacey Wood</a>, Professor of Psychology, <a href="https://theconversation.com/institutions/scripps-college-2153">Scripps College</a> and <a href="https://theconversation.com/profiles/yaniv-hanoch-1341108">Yaniv Hanoch</a>, Professor in Decision Science, <a href="https://theconversation.com/institutions/university-of-southampton-1093">University of Southampton</a></em></p> <p><em>Image credits: Shutterstock</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/how-scammers-use-psychology-to-create-some-of-the-most-convincing-internet-cons-and-what-to-watch-out-for-207759">original article</a>.</em></p>

Technology

Placeholder Content Image

Missing Titanic sub: what are submersibles, how do they communicate, and what may have gone wrong?

<p><a href="https://theconversation.com/profiles/stefan-b-williams-1448728">Stefan B. Williams</a>, <em><a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a></em></p> <p>An extensive <a href="https://www.bbc.com/news/world-us-canada-65953872">search and rescue operation</a> is underway to locate a commercial submersible that went missing during a dive to the Titanic shipwreck.</p> <p>According to the US Coast Guard, contact with the submersible was lost about one hour and 45 minutes into the dive, with five people onboard. The vessel was <a href="https://www.9news.com.au/world/titanic-submersible-search-oceangate-expeditions-vessel-missing-as-us-coast-guard-launches-search/9d7352d8-6a6d-4dc1-afac-ce07dc63cea3">reported overdue</a> at 9.13pm local time on Sunday (12.13pm AEST, Monday).</p> <p>The expedition was being run by US company OceanGate as part of an eight-day trip with guests paying US$250,000 per head to visit the wreck site. As of <a href="https://edition.cnn.com/americas/live-news/titanic-submersible-missing-search-06-19-23/h_c2b5400daf8538d8717f50c619d762ac">Monday afternoon</a> (Tuesday morning in Australia), US Coast Guard Rear Admiral John Mauger said the watercraft likely had somewhere between 70 and the full 96 hours of oxygen available to the passengers.</p> <p>The Titanic’s wreck sits some 3,800 metres deep in the Atlantic, about 700km south of St John’s, Newfoundland. Finding an underwater vehicle the size of a small bus in this vast and remote expanse of ocean will be no small feat. Here’s what the search and rescue teams are up against.</p> <h2>OceanGate’s Titan submersible goes missing</h2> <p>Submersibles are manned watercraft that move in a similar fashion to submarines, but within a much more limited range. They’re often used for research and exploration purposes, including to search for shipwrecks and to document underwater environments. Unlike submarines, they usually have a viewport to allow passengers look outside, and outside cameras that provide a broader view around the submersible.</p> <p>The missing submersible in question is an OceanGate <a href="https://oceangate.com/our-subs/titan-submersible.html">Titan</a> watercraft, which can take five people to depths of up to 4,000m. The Titan is about 22 feet (6.7m) in length, with speeds of about 3 knots (or 5.5km per hour). Although submersibles are often connected to a surface vessel by a tether, video and photos suggest the Titan was likely operating independently of the surface ship.</p> <p>According to OceanGate’s website, the Titan is used “for site survey and inspection, research and data collection, film and media production, and deep-sea testing of hardware and software”.</p> <p>It also has a “real-time hull health monitoring (RTM) system”. This would likely include strain gauges to monitor the health of the Titan’s carbon fibre hull. A strain gauge is a kind of sensor that can measure applied force and small deformations in material resulting from changes in pressure, tension and weight.</p> <p>The Titan’s carbon fibre hull connects two domes made of composite titanium – a material that can withstand deep-sea pressures. At 3,800m below sea level (the depth of the Titanic) you can expect pressures about 380 times greater than the atmospheric pressure we’re used to on the surface of the earth.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=413&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=413&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=413&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=518&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=518&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/532840/original/file-20230620-23-c6k9lo.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=518&amp;fit=crop&amp;dpr=3 2262w" alt="Several tube like shapes on a rectangular concrete platform underwater" /></a><figcaption><span class="caption">Titan on the launch platform underwater, awaiting a signal to commence the dive.</span> <span class="attribution"><a class="source" href="https://oceangate.com/gallery/gallery-titan.html#nanogallery/titangallery/0/4">OceanGate</a></span></figcaption></figure> <h2>Communication and rescue efforts</h2> <p>The Titan would have had an acoustic link with its surface vessel, set up through a transponder (a device for receiving a sonar signal) on its end, and a transceiver (a device that can both transmit and receive communications) on the surface vessel.</p> <p>This link allows for underwater acoustic positioning, as well as for short text messages to be sent back and forth to the surface vessel – but the amount of data that can be shared is limited and usually includes basic telemetry and status information.</p> <p>The Titan is a battery-operated watercraft. Given it has lost all contact with its surface vessel, it may have suffered a power failure. Ideally, there would be an emergency backup power source (such as an independent battery) to maintain emergency and life support equipment – but it’s unclear if the missing vessel had any power backup on hand.</p> <p>According to reports, at least two aircraft, a submarine and sonar buoys were being used to search for the vessel. The sonar buoys will be listening for underwater noise, including any emergency distress beacons that may have gone off.</p> <p>One of the major challenges in the rescue effort will be contending with weather conditions, which will further shrink an already narrow search window.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=413&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=413&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=413&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=518&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=518&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/532842/original/file-20230620-49349-cnzdk6.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=518&amp;fit=crop&amp;dpr=3 2262w" alt="A dark blue image with a tube like shape floating in the lower third" /></a><figcaption><span class="caption">Titan commencing a dive to 4,000m underwater.</span> <span class="attribution"><a class="source" href="https://oceangate.com/gallery/gallery-titan.html#nanogallery/titangallery/0/1">OceanGate</a></span></figcaption></figure> <h2>What might have happened?</h2> <p>In a best case scenario, the Titan may have lost power and will have an inbuilt safety system that will help it return to the surface. For instance, it may be equipped with additional weights that can be dropped to instantly increase its buoyancy and bring it back to the surface.</p> <p>Alternatively, the vessel may have lost power and ended up at the bottom of the ocean. This would be a more problematic outcome.</p> <p>The worst case scenario is that it has suffered a catastrophic failure to its pressure housing. Although the Titan’s composite hull is built to withstand intense deep-sea pressures, any defect in its shape or build could compromise its integrity – in which case there’s a risk of implosion.</p> <p>Another possibility is that there may have been a fire onboard, such as from an electrical short circuit. This could compromise the vehicle’s electronic systems which are used for navigation and control of the vessel. Fires are a disastrous event in enclosed underwater environments, and can potentially incapacitate the crew and passengers.</p> <p>Time is of the essence. The search and rescue teams will need to find the vessel before its <a href="https://web.archive.org/web/20230331121053/https://oceangateexpeditions.com/tour/titanic-expedition/">limited supplies</a> of oxygen and water run out.</p> <p>There’s an ongoing debate in scientific circles regarding the relative merit of manned submersibles, wherein each deployment incurs a safety risk – and the safety of the crew and passengers is paramount.</p> <p>Currently, most underwater research and offshore industrial work is conducted using unmanned and robotic vehicles. A loss to one of these vehicles might compromise the work being done, but at least lives aren’t at stake. In light of these events, there will likely be intense discussion about the risks associated with using these systems to support deep-sea tourism.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/208100/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/stefan-b-williams-1448728">Stefan B. Williams</a>, Professor, Australian Centre for Field Robotics, <em><a href="https://theconversation.com/institutions/university-of-sydney-841">University of Sydney</a></em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/missing-titanic-sub-what-are-submersibles-how-do-they-communicate-and-what-may-have-gone-wrong-208100">original article</a>.</em></p> <p><em>Images: Getty</em></p>

Technology

Placeholder Content Image

Social media snaps map the sweep of Japan’s cherry blossom season in unprecedented detail

<p><a href="https://theconversation.com/profiles/adrian-dyer-387798">Adrian Dyer</a>, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em>; <a href="https://theconversation.com/profiles/alan-dorin-12573">Alan Dorin</a>, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em>; <a href="https://theconversation.com/profiles/carolyn-vlasveld-1442834">Carolyn Vlasveld</a>, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em>, and <a href="https://theconversation.com/profiles/moataz-elqadi-1442833">Moataz ElQadi</a>, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em></p> <p>Social media contains enormous amounts of data about people, our everyday lives, and our interactions with our surroundings. As a byproduct, it also contains a vast trove of information about the natural world.</p> <p>In a <a href="https://www.sciencedirect.com/science/article/abs/pii/S0367253023001019#sec0024a">new study published in Flora</a>, we show how social media can be used for “incidental citizen science”. From photos posted to a social site, we mapped countrywide patterns in nature over a decade in relatively fine detail.</p> <p>Our case study was the annual spread of cherry blossom flowering across Japan, where millions of people view the blooming each year in a cultural event called “hanami”. The flowering spreads across Japan in a wave (“<a href="https://en.wikipedia.org/wiki/Cherry_blossom_front">sakura zensen</a>” or 桜前線) following the warmth of the arriving spring season.</p> <figure class="align-center "><img src="https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=399&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=399&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=399&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=501&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=501&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/529000/original/file-20230530-15-mix84k.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=501&amp;fit=crop&amp;dpr=3 2262w" alt="ALT TEXT" /><figcaption><span class="caption">Celebrating the cherry blossom is a centuries-old tradition in Japan.</span> <span class="attribution"><span class="source">Shutterstock</span></span></figcaption></figure> <p>The <a href="https://en.wikipedia.org/wiki/Hanami">hanami festival</a> has been documented for centuries, and research shows climate change is making <a href="https://iopscience.iop.org/article/10.1088/1748-9326/ac6bb4">early blossoming more likely</a>. The advent of mobile phones – and social network sites that allow people to <a href="https://www.sciencedirect.com/science/article/abs/pii/S1574954116302321">upload photos tagged with time and location data</a> – presents a new opportunity to study how Japan’s flowering events are affected by seasonal climate.</p> <h2>Why are flowers useful to understand how nature is being altered by climate change?</h2> <p>Many flowering plants, including the cherry blossoms of Japan (<em>Prunus</em> subgenus <em>Cerasus</em>), require insect pollination. To reproduce, plant flowers bloom at optimal times to receive visits from insects like bees.</p> <p>Temperature is <a href="https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0200549">an important mechanism</a> for plants to trigger this flowering. <a href="https://onlinelibrary.wiley.com/doi/epdf/10.1111/j.1461-0248.2008.01269.x">Previous research</a> has highlighted how climate change may create mismatches in space or time between the blooming of plants and the emergence of pollinating insects.</p> <p><iframe id="rtiQ0" class="tc-infographic-datawrapper" style="border: none;" src="https://datawrapper.dwcdn.net/rtiQ0/2/" width="100%" height="400px" frameborder="0"></iframe></p> <p>It has been difficult for researchers to map the extent of this problem in detail, as its study requires simultaneous data collection over large areas. The use of citizen science images deliberately, or incidentally, uploaded to social network sites enables <a href="https://en.wikipedia.org/wiki/Big_data">big data</a> solutions.</p> <h2>How did we conduct our study?</h2> <p>We collected images from Japan uploaded to <a href="https://www.flickr.com/">Flickr</a> between 2008 and 2018 that were tagged by users as “cherry blossoms”. We used computer vision techniques to analyse these images, and to provide sets of keywords describing their image content.</p> <p>Next, we automatically filtered out images appearing to contain content that the computer vision algorithms determined didn’t match our targeted cherry blossoms. For instance, many contained images of autumn leaves, another popular ecological event to view in Japan.</p> <p>The locations and timestamps of the remaining cherry blossom images were then used to generate marks on a map of Japan showing the seasonal wave of sakura blossoms, and to estimate peak bloom times each year in different cities.</p> <h2>Checking the data</h2> <p>An important component of any scientific investigation is validation – how well does a proposed solution or data set represent the real-world phenomenon under study?</p> <figure class="align-right zoomable"><a href="https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=591&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=591&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=591&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=743&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=743&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/528702/original/file-20230528-21-4fxpkv.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=743&amp;fit=crop&amp;dpr=3 2262w" alt="" /></a><figcaption><span class="caption">Blossom dates calculated from social media images compare well with official data.</span> <span class="attribution"><span class="source">ElQadi et al.</span>, <span class="license">Author provided</span></span></figcaption></figure> <p>Our study using social network site images was validated against the detailed information published by the <a href="https://www.japan.travel/en/see-and-do/cherry-blossom-forecast-2023/">Japan National Tourism Organization</a>.</p> <p>We also manually examined a subset of images to confirm the presence of cherry flowers.</p> <p>Plum flowers (<em>Prunus mume</em>) look very similar to cherry blossoms, especially to tourists, and they are frequently mistaken and mislabelled as cherry blossoms. We used visible “notches” at the end of cherry petals, and other characteristics, to distinguish cherries from plums.</p> <p>Taken together, the data let us map the flowering event as it unfolds across Japan.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=619&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=619&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=619&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=777&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=777&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/528769/original/file-20230529-17-wmgf5g.gif?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=777&amp;fit=crop&amp;dpr=3 2262w" alt="An animated map showing cherry blossom flowering across Japan" /></a><figcaption><span class="caption">Images uploaded to social media over a ten year period 2008-2018, let us map the cherry blossom front as it sweeps across Japan.</span> <span class="attribution"><span class="source">ElQadi et al.</span>, <span class="license">Author provided</span></span></figcaption></figure> <h2>Out-of-season blooms</h2> <p>Our social network site analysis was sufficiently detailed to accurately pinpoint the annual peak spring bloom in the major cities of <a href="https://en.wikipedia.org/wiki/Tokyo">Tokyo</a> and <a href="https://en.wikipedia.org/wiki/Kyoto">Kyoto</a>, to within a few days of official records.</p> <p>Our data also revealed the presence of a consistent, and persistent, out-of-season cherry bloom in autumn. Upon further searching, we discovered that this “unexpected” seasonal bloom had also been noted in <a href="https://www.bbc.com/news/world-asia-45898333">mainstream media</a> in recent years. We thus confirmed that this is a real event, not an artefact of our study.</p> <figure class="align-center zoomable"><a href="https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/528832/original/file-20230529-25-wonef0.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=3 2262w" alt="" /></a><figcaption><span class="caption">Cherry blossom photographs from Flickr taken within Japan from 2008 to 2018 show an April peak as well as an unexpected smaller peak in November.</span> <span class="attribution"><span class="source">ElQadi et al.</span>, <span class="license">Author provided</span></span></figcaption></figure> <p>So, even without knowing it, many of us are already helping to understand how climate change influences our environment, simply by posting online photographs we capture. Dedicated sites like <a href="https://wildpollinatorcount.com/">Wild Pollinator Count</a> are excellent resources to contribute to the growing knowledge base.</p> <p>The complex issues of climate change are still being mapped. Citizen science allows our daily observations to improve our understanding, and so better manage our relationship with the natural world.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/206574/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></p> <p><a href="https://theconversation.com/profiles/adrian-dyer-387798">Adrian Dyer</a>, Associate Professor, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em>; <a href="https://theconversation.com/profiles/alan-dorin-12573">Alan Dorin</a>, Associate Professor, Faculty of Information Technology, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em>; <a href="https://theconversation.com/profiles/carolyn-vlasveld-1442834">Carolyn Vlasveld</a>, PhD candidate, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em>, and <a href="https://theconversation.com/profiles/moataz-elqadi-1442833">Moataz ElQadi</a>, Adjunct Researcher, Faculty of Information Technology, <em><a href="https://theconversation.com/institutions/monash-university-1065">Monash University</a></em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/social-media-snaps-map-the-sweep-of-japans-cherry-blossom-season-in-unprecedented-detail-206574">original article</a>.</em></p> <p><em>Images: Getty</em></p>

Technology

Placeholder Content Image

What are the long-term effects of quitting social media? Almost nobody can log off long enough to find out

<p><a href="https://theconversation.com/profiles/john-malouff-313652">John Malouff</a>, <em><a href="https://theconversation.com/institutions/university-of-new-england-919">University of New England</a></em></p> <p>Being on social media has become synonymous with living in the 21st century. Year after year, we see new platforms and smarter algorithms roping us into highly addictive online worlds.</p> <p>Now, a growing number of people have noticed this trend and are actively making an effort to resist it.</p> <p>Anecdotally, a case can be made for quitting social media, and there are myriad reasons why someone might want to. But is there evidence that doing so is good for you in the long term?</p> <h2>Drivers for quitting</h2> <p>Although there are too many social media platforms to name, most people tend to think of the “big five”: Facebook, Twitter, Instagram, YouTube and TikTok.</p> <p>Research has found people have various reasons for quitting one or more of these apps. Many quit over concerns about negative impacts on their mental and physical health. For example, studies have shown adolescent girls in particular can experience negative body image as a result of viewing manipulated <a href="https://theconversation.com/we-have-all-heard-social-media-can-impact-womens-body-image-but-it-isnt-all-bad-205214">selfies on Instagram</a>.</p> <p>People also <a href="https://www.qscience.com/content/journals/10.5339/connect.2023.spt.3?crawler=true">choose to quit</a> due to disliking ads, feeling like they’re wasting time, or if they’re worried about their privacy. The question then is: does quitting social media resolve these concerns?</p> <h2>Mixed research outcomes</h2> <p>It’s difficult to determine whether there are clear and lasting benefits to quitting social media – and a look at the research explains why.</p> <p><a href="https://www.tandfonline.com/doi/full/10.1080/17459435.2020.1817140">One 2020 study</a> found people who had quit social media saw improvements in their close relationships, and were pleased to be free of comparison with others. But some also said they <a href="https://www.tandfonline.com/doi/full/10.1080/17459435.2020.1817140">missed</a> the informational and entertainment aspects of it.</p> <p>In a <a href="https://www.researchgate.net/publication/328838624_No_More_FOMO_Limiting_Social_Media_Decreases_Loneliness_and_Depression">2018 study</a>, researchers assessed the psychological state of 143 American undergraduates before randomly assigning one group a daily ten-minute limit for Facebook, Instagram and Snapchat, per platform. Three weeks later, those who limited their social media use showed significantly lower levels of loneliness and depression. However, there was no significant effect on anxiety, self-esteem or wellbeing.</p> <p>And in <a href="https://journals.plos.org/plosone/article?id=10.1371%2Fjournal.pone.0217743&amp;fbclid=IwAR1oLvPyeJDwMhD4WlODKU1A360ttIcaV_tManJs1_qEr-VAVZPsD0xQjq0">one 2019 study</a> with 78 participants, half were asked to take a one-week break from Facebook and Instagram. To the researchers’ surprise, the users in this group who were generally active on social media experienced <em>less</em> positive psychological effects than those in the control group.</p> <p>With research findings painting several different pictures, it’s safe to say our relationship with social media – and how it affects us – is very complex.</p> <h2>Research constraints</h2> <p>There appear to be no published studies that have assessed the long-term impacts of permanently quitting social media. This is probably because it’s difficult to find participants who will agree to be randomly assigned the task of dropping social media forever.</p> <p>One important consideration is that a percentage of individuals who quit social media will eventually <a href="https://cyberleninka.org/article/n/992039/viewer">go back</a>. Reasons for returning include feeling left out, fearing loss of connections, wanting to regain access to interesting or useful information, feeling social pressure to rejoin, or simply feeling that quitting wasn’t the right choice.</p> <p>Even if researchers do find a large enough group of people willing to quit social media for good, conducting long-term follow-ups would be highly resource-intensive. Beyond that, it would be difficult to figure out how much of a participant’s increase (or decrease) in life satisfaction is due to quitting social media, and not other factors.</p> <p>As such, there’s currently no evidence that quitting social media comes with concrete long-term benefits. And in the short term, results are mixed.</p> <h2>To quit, or not to quit?</h2> <p>However, that doesn’t mean quitting (for a short or long period) wouldn’t be beneficial for some people. It’s likely that any potential benefits will depend on the individual doing the quitting, and why they’re doing it.</p> <p>For instance, consensus that does emerge from the research is that <a href="https://theconversation.com/does-social-media-make-us-more-or-less-lonely-depends-on-how-you-use-it-128468">the <em>way</em> you use</a> social media plays a significant role in how negative or positive your experience is. By <a href="https://journals.sagepub.com/doi/pdf/10.1177/2056305120919105">using social media mindfully</a>, users can minimise potential harms while retaining the benefits.</p> <p>For some, it may only be one platform causing unease. If you strongly dislike Instagram’s tendency to be hyper-focused on people’s private lives, then you could simply stop using Instagram.</p> <p>Another technique is to curate your social media feeds by engaging only with content you find useful and positive. For instance, many young women take steps to avoid seeing <a href="https://theconversation.com/we-have-all-heard-social-media-can-impact-womens-body-image-but-it-isnt-all-bad-205214?fbclid=IwAR3cX7l116GAj0nnKDAk16x6GP6iRCxH_VutjIbxOiCij1yCqWmeOK0s0f0">perfect bodies all day</a> on their social media.</p> <p>If you’re still wondering whether quitting might be good for you, the simplest way to find out is to <a href="https://hbr.org/2018/10/i-ran-4-experiments-to-break-my-social-media-addiction-heres-what-worked">experiment</a> and do it.</p> <p>Take a break from one or more types of social media. After some time ask yourself whether the benefits seem worth it to you. If the answer is “yes”, make the break permanent.</p> <p><em><a href="https://theconversation.com/profiles/john-malouff-313652">John Malouff</a>, Associate Professor, School of Behavioural, Cognitive and Social Sciences, <a href="https://theconversation.com/institutions/university-of-new-england-919">University of New England</a></em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/what-are-the-long-term-effects-of-quitting-social-media-almost-nobody-can-log-off-long-enough-to-find-out-205478">original article</a>.</em></p> <p><em>Images: Getty</em></p>

Technology

Placeholder Content Image

6 amazing things you didn’t know your phone could do

<p>Nobody ever bought a shiny brand new smartphone and then studiously read the manual! Maybe it’s just us but unfortunately it means we’ve missed out on the secret but amazing things your smartphone can do. You don't even need to download any apps to do these nifty tricks. Here are some of our favourite ones that we’re sure will impress next time you need them.</p> <p><strong>Taking a screenshot</strong></p> <p>A great trick if you want to share a hilarious text, picture or Facebook post with friends or family.</p> <p><span style="text-decoration: underline;">iPhones</span> – SImultaneously press (but not hold) the Home button and the Sleep/Wake button (top right of phone). You should hear a shutter click as well as see a white flash. The screenshot will be located on your Camera Roll in photos.</p> <p><span style="text-decoration: underline;">Androids</span> - Hold down the Power button and Volume -down button at the same time for a couple of seconds. Or hold down power button and home icon at the same time. If this doesn’t work, you can hold down the power button until the option to take a screen shot appears.</p> <p><strong>Taking multiple photos at once</strong></p> <p>A life-saver if you are taking pictures of wriggling kids or people who blink exactly when you take the picture (there’s always someone in the group isn’t there?). This little trick lets you take multiple pictures with a single click.</p> <p><span style="text-decoration: underline;">iPhones</span> – In the camera app, rather than tapping capture button to take photos, hold it down. Your camera will automatically take multiple picture (around 10 pictures a second) until you release the button.</p> <p><span style="text-decoration: underline;">Androids</span> - In the camera app, tap the gear icon and turn on “Burst Shot” settings. Return to your camera app and hold onto the capture button. Or go to camera, select mode, auto and click on burst shots.</p> <p><strong>Change text size</strong></p> <p>If the tiny text on the smartphone is giving you a headache, there’s an easily solution. You can change the settings so all text on your phone is large.</p> <p><span style="text-decoration: underline;">iPhones</span> - Go to Settings > General > Accessibility and turn on “Larger Text.”</p> <p><span style="text-decoration: underline;">Androids</span> - Go to Settings > Accessibility > Vision and tap font size and set it to Large.</p> <p><strong>Read to you</strong></p> <p>It really seems like technology can do anything, including programming your smartphone to read to you.</p> <p><span style="text-decoration: underline;">iPhones</span> - Go to Settings > General > Accessibility and turn on “Speak Selection.” You can even customise the voice that speaks to you choosing from a wide range of accent including Australian. To get your phone to speak to you, highlight text (double-tapping or tapping and holding on to it) and then tap Speak button in the pop-up menu.</p> <p><strong>Turn off music automatically</strong></p> <p>If you are one to listen to music or audiobooks as you drift off to sleep, you can use a timer to turn it off so it doesn’t drain your battery life.  </p> <p><span style="text-decoration: underline;">iPhones</span> - Go to the Clock app and tap on "Timer," then "When Timer Ends." From here, scroll all the way down to the bottom of the screen and select "Stop Playing."</p> <p><span style="text-decoration: underline;">Androids</span> - Open the music player and go to Settings. Look for "Music auto off" and set it to however long you want the music to play.</p> <p><strong>Search text messages</strong></p> <p>Searching for messages is handy if you are looking for a specific text containing details like addresses, emails or dates.</p> <p><span style="text-decoration: underline;">iPhones</span> – When you open your Message app, scroll up and a search bar should pop up at the top of all your messages. Type in the phrase you are looking for.</p> <p><span style="text-decoration: underline;">Androids</span> – Open the Message app and then tap on the Menu. A few options will appear and click search. </p> <p><em>Image: Shutterstock</em></p>

Technology

Placeholder Content Image

ChatGPT and other generative AI could foster science denial and misunderstanding – here’s how you can be on alert

<p><em><a href="https://theconversation.com/profiles/gale-sinatra-1234776">Gale Sinatra</a>, <a href="https://theconversation.com/institutions/university-of-southern-california-1265">University of Southern California</a> and <a href="https://theconversation.com/profiles/barbara-k-hofer-1231530">Barbara K. Hofer</a>, <a href="https://theconversation.com/institutions/middlebury-1247">Middlebury</a></em></p> <p>Until very recently, if you wanted to know more about a controversial scientific topic – stem cell research, the safety of nuclear energy, climate change – you probably did a Google search. Presented with multiple sources, you chose what to read, selecting which sites or authorities to trust.</p> <p>Now you have another option: You can pose your question to ChatGPT or another generative artificial intelligence platform and quickly receive a succinct response in paragraph form.</p> <p>ChatGPT does not search the internet the way Google does. Instead, it generates responses to queries by <a href="https://www.washingtonpost.com/technology/2023/05/07/ai-beginners-guide/">predicting likely word combinations</a> from a massive amalgam of available online information.</p> <p>Although it has the potential for <a href="https://hbr.org/podcast/2023/05/how-generative-ai-changes-productivity">enhancing productivity</a>, generative AI has been shown to have some major faults. It can <a href="https://www.scientificamerican.com/article/ai-platforms-like-chatgpt-are-easy-to-use-but-also-potentially-dangerous/">produce misinformation</a>. It can create “<a href="https://www.nytimes.com/2023/05/01/business/ai-chatbots-hallucination.html">hallucinations</a>” – a benign term for making things up. And it doesn’t always accurately solve reasoning problems. For example, when asked if both a car and a tank can fit through a doorway, it <a href="https://www.nytimes.com/2023/03/14/technology/openai-new-gpt4.html">failed to consider both width and height</a>. Nevertheless, it is already being used to <a href="https://www.washingtonpost.com/media/2023/01/17/cnet-ai-articles-journalism-corrections/">produce articles</a> and <a href="https://www.nytimes.com/2023/05/19/technology/ai-generated-content-discovered-on-news-sites-content-farms-and-product-reviews.html">website content</a> you may have encountered, or <a href="https://www.nytimes.com/2023/04/21/opinion/chatgpt-journalism.html">as a tool</a> in the writing process. Yet you are unlikely to know if what you’re reading was created by AI.</p> <p>As the authors of “<a href="https://global.oup.com/academic/product/science-denial-9780197683330">Science Denial: Why It Happens and What to Do About It</a>,” we are concerned about how generative AI may blur the boundaries between truth and fiction for those seeking authoritative scientific information.</p> <p>Every media consumer needs to be more vigilant than ever in verifying scientific accuracy in what they read. Here’s how you can stay on your toes in this new information landscape.</p> <h2>How generative AI could promote science denial</h2> <p><strong>Erosion of epistemic trust</strong>. All consumers of science information depend on judgments of scientific and medical experts. <a href="https://doi.org/10.1080/02691728.2014.971907">Epistemic trust</a> is the process of trusting knowledge you get from others. It is fundamental to the understanding and use of scientific information. Whether someone is seeking information about a health concern or trying to understand solutions to climate change, they often have limited scientific understanding and little access to firsthand evidence. With a rapidly growing body of information online, people must make frequent decisions about what and whom to trust. With the increased use of generative AI and the potential for manipulation, we believe trust is likely to erode further than <a href="https://www.pewresearch.org/science/2022/02/15/americans-trust-in-scientists-other-groups-declines/">it already has</a>.</p> <p><strong>Misleading or just plain wrong</strong>. If there are errors or biases in the data on which AI platforms are trained, that <a href="https://theconversation.com/ai-information-retrieval-a-search-engine-researcher-explains-the-promise-and-peril-of-letting-chatgpt-and-its-cousins-search-the-web-for-you-200875">can be reflected in the results</a>. In our own searches, when we have asked ChatGPT to regenerate multiple answers to the same question, we have gotten conflicting answers. Asked why, it responded, “Sometimes I make mistakes.” Perhaps the trickiest issue with AI-generated content is knowing when it is wrong.</p> <p><strong>Disinformation spread intentionally</strong>. AI can be used to generate compelling disinformation as text as well as deepfake images and videos. When we asked ChatGPT to “<a href="https://www.scientificamerican.com/article/ai-platforms-like-chatgpt-are-easy-to-use-but-also-potentially-dangerous/">write about vaccines in the style of disinformation</a>,” it produced a nonexistent citation with fake data. Geoffrey Hinton, former head of AI development at Google, quit to be free to sound the alarm, saying, “It is hard to see how you can prevent the bad actors from <a href="https://www.nytimes.com/2023/05/01/technology/ai-google-chatbot-engineer-quits-hinton.html">using it for bad things</a>.” The potential to create and spread deliberately incorrect information about science already existed, but it is now dangerously easy.</p> <p><strong>Fabricated sources</strong>. ChatGPT provides responses with no sources at all, or if asked for sources, may present <a href="https://economistwritingeveryday.com/2023/01/21/chatgpt-cites-economics-papers-that-do-not-exist/">ones it made up</a>. We both asked ChatGPT to generate a list of our own publications. We each identified a few correct sources. More were hallucinations, yet seemingly reputable and mostly plausible, with actual previous co-authors, in similar sounding journals. This inventiveness is a big problem if a list of a scholar’s publications conveys authority to a reader who doesn’t take time to verify them.</p> <p><strong>Dated knowledge</strong>. ChatGPT doesn’t know what happened in the world after its training concluded. A query on what percentage of the world has had COVID-19 returned an answer prefaced by “as of my knowledge cutoff date of September 2021.” Given how rapidly knowledge advances in some areas, this limitation could mean readers get erroneous outdated information. If you’re seeking recent research on a personal health issue, for instance, beware.</p> <p><strong>Rapid advancement and poor transparency</strong>. AI systems continue to become <a href="https://www.nytimes.com/2023/05/01/technology/ai-google-chatbot-engineer-quits-hinton.html">more powerful and learn faster</a>, and they may learn more science misinformation along the way. Google recently announced <a href="https://www.nytimes.com/2023/05/10/technology/google-ai-products.html">25 new embedded uses of AI in its services</a>. At this point, <a href="https://theconversation.com/regulating-ai-3-experts-explain-why-its-difficult-to-do-and-important-to-get-right-198868">insufficient guardrails are in place</a> to assure that generative AI will become a more accurate purveyor of scientific information over time.</p> <h2>What can you do?</h2> <p>If you use ChatGPT or other AI platforms, recognize that they might not be completely accurate. The burden falls to the user to discern accuracy.</p> <p><strong>Increase your vigilance</strong>. <a href="https://www.niemanlab.org/2022/12/ai-will-start-fact-checking-we-may-not-like-the-results/">AI fact-checking apps may be available soon</a>, but for now, users must serve as their own fact-checkers. <a href="https://www.nsta.org/science-teacher/science-teacher-januaryfebruary-2023/plausible">There are steps we recommend</a>. The first is: Be vigilant. People often reflexively share information found from searches on social media with little or no vetting. Know when to become more deliberately thoughtful and when it’s worth identifying and evaluating sources of information. If you’re trying to decide how to manage a serious illness or to understand the best steps for addressing climate change, take time to vet the sources.</p> <p><strong>Improve your fact-checking</strong>. A second step is <a href="https://doi.org/10.1037/edu0000740">lateral reading</a>, a process professional fact-checkers use. Open a new window and search for <a href="https://www.nsta.org/science-teacher/science-teacher-mayjune-2023/marginalizing-misinformation">information about the sources</a>, if provided. Is the source credible? Does the author have relevant expertise? And what is the consensus of experts? If no sources are provided or you don’t know if they are valid, use a traditional search engine to find and evaluate experts on the topic.</p> <p><strong>Evaluate the evidence</strong>. Next, take a look at the evidence and its connection to the claim. Is there evidence that genetically modified foods are safe? Is there evidence that they are not? What is the scientific consensus? Evaluating the claims will take effort beyond a quick query to ChatGPT.</p> <p><strong>If you begin with AI, don’t stop there</strong>. Exercise caution in using it as the sole authority on any scientific issue. You might see what ChatGPT has to say about genetically modified organisms or vaccine safety, but also follow up with a more diligent search using traditional search engines before you draw conclusions.</p> <p><strong>Assess plausibility</strong>. Judge whether the claim is plausible. <a href="https://doi.org/10.1016/j.learninstruc.2013.03.001">Is it likely to be true</a>? If AI makes an implausible (and inaccurate) statement like “<a href="https://www.usatoday.com/story/news/factcheck/2022/12/23/fact-check-false-claim-covid-19-vaccines-caused-1-1-million-deaths/10929679002/">1 million deaths were caused by vaccines, not COVID-19</a>,” consider if it even makes sense. Make a tentative judgment and then be open to revising your thinking once you have checked the evidence.</p> <p><strong>Promote digital literacy in yourself and others</strong>. Everyone needs to up their game. <a href="https://theconversation.com/how-to-be-a-good-digital-citizen-during-the-election-and-its-aftermath-148974">Improve your own digital literacy</a>, and if you are a parent, teacher, mentor or community leader, promote digital literacy in others. The American Psychological Association provides guidance on <a href="https://www.apa.org/topics/social-media-internet/social-media-literacy-teens">fact-checking online information</a> and recommends teens be <a href="https://www.apa.org/topics/social-media-internet/health-advisory-adolescent-social-media-use">trained in social media skills</a> to minimize risks to health and well-being. <a href="https://newslit.org/">The News Literacy Project</a> provides helpful tools for improving and supporting digital literacy.</p> <p>Arm yourself with the skills you need to navigate the new AI information landscape. Even if you don’t use generative AI, it is likely you have already read articles created by it or developed from it. It can take time and effort to find and evaluate reliable information about science online – but it is worth it.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/204897/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/gale-sinatra-1234776">Gale Sinatra</a>, Professor of Education and Psychology, <a href="https://theconversation.com/institutions/university-of-southern-california-1265">University of Southern California</a> and <a href="https://theconversation.com/profiles/barbara-k-hofer-1231530">Barbara K. Hofer</a>, Professor of Psychology Emerita, <a href="https://theconversation.com/institutions/middlebury-1247">Middlebury</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/chatgpt-and-other-generative-ai-could-foster-science-denial-and-misunderstanding-heres-how-you-can-be-on-alert-204897">original article</a>.</em></p>

Technology

Placeholder Content Image

Five ways to manage your doomscrolling habit

<p><em><a href="https://theconversation.com/profiles/christian-van-nieuwerburgh-1157439">Christian van Nieuwerburgh</a>, <a href="https://theconversation.com/institutions/rcsi-university-of-medicine-and-health-sciences-788">RCSI University of Medicine and Health Sciences</a></em></p> <p>Doomscrolling, according to <a href="https://www.merriam-webster.com/words-at-play/doomsurfing-doomscrolling-words-were-watching">Merriam-Webster</a>, is “the tendency to continue to surf or scroll through bad news, even though that news is saddening, disheartening, or depressing”. For many it’s a habit born of the pandemic – and one that is likely to stay.</p> <p>Some health experts recommend limiting access to social media to <a href="https://www.health.com/mind-body/what-is-doomscrolling">reduce the negative effects of doomscrolling</a>, and popular magazines <a href="https://www.wired.com/story/how-to-stop-doomscrolling-psychology-social-media-fomo/">highlight the risks</a> of social media addiction. According to the BBC, the barrage of negative coverage of doomscrolling has led to some people <a href="https://www.bbc.com/news/business-60067032">ditching their smartphones</a> altogether.</p> <p>Although research showing the negative effects of doomscrolling is convincing and the <a href="https://www.tandfonline.com/doi/full/10.1080/1461670X.2021.2021105">recommendations are clear</a>, few of us seem to be following this well-intentioned advice. There are a few reasons for this.</p> <p>First, blocking out news during times of crisis may not be such a good idea. Second, many of us <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4675534/">don’t respond well</a> to being told what we can and cannot do.</p> <p>Finally, being asked not to do something can make matters worse. It can push us into a negative frame of mind and make us <a href="https://www.psychologytoday.com/us/blog/words-can-change-your-brain/201208/why-word-is-so-dangerous-say-or-hear">less likely to change our behaviour</a>.</p> <p>Rather than quitting doomscrolling, what if we simply got better at managing it?</p> <p>It is helpful to start by acknowledging that seeking news and information during times of crisis is perfectly normal. In fact, this response is hard-wired in us humans.</p> <p>Staying alert to danger is part of our survival mechanism. Gathering information and being prepared to face threats have been key to our survival for millennia.</p> <p>Right now, there are many threats facing us: a war in Europe that could escalate to nuclear conflict, a pandemic that has already killed millions of people and predictions of a climate catastrophe, alongside many other natural disasters and human conflicts across the world.</p> <p>In this context, it is not surprising that we want to be alert to danger. Wanting to learn more about what is happening and equipping ourselves with the latest information is perfectly reasonable.</p> <p>Rather than avoiding the news altogether, let’s make sure that we are getting what we need from our interactions with the news. Here are five suggestions to achieve this.</p> <h2>1. Choose how much time you’re going to invest in consuming the news</h2> <p>Why not include all the ways you access the news? What amount of time each day seems reasonable to you? Once you have a time window, try sticking to it.</p> <h2>2. Be aware of confirmation bias when choosing what to consume</h2> <p>Remember, you are the consumer and you can choose what to learn about. However, we need to be aware of a tendency that psychologists call “<a href="https://www.simplypsychology.org/confirmation-bias.html">confirmation bias</a>”. This is when we favour information that supports our existing beliefs or viewpoints.</p> <p>In other words, we sometimes seek news that confirms what we already believe. This may have been one reason you clicked on this article. So just be aware of this tendency and be aware of what you’re not choosing to read.</p> <h2>3. Check the source</h2> <p>Any time you consume anything, it is helpful to know its source. Who has posted this information? Why are they sharing it with you? Are they trying to convince you of something? Are they trying to manipulate you to think or behave in a particular way?</p> <p>Knowing the answers to these questions will support you to stay in control of how you use the information that you have gathered.</p> <h2>4. Remember that things are not always black or white</h2> <p>We live in an increasingly polarised world. According to psychologists, “polarised thinking” is a <a href="https://exploringyourmind.com/polarized-thinking-cognitive-distortion/">cognitive distortion</a> (thinking error) that can occur when we’re under pressure. It is the tendency to see things as black or white, rather than recognising that we live in a world with many colours and shades of grey.</p> <p>Find ways to hold strong views while remaining curious about other opinions. Selecting and consuming articles that represent differing opinions may support this.</p> <h2>5. Be biased towards the positive</h2> <p>One reason that doomscrolling can be so detrimental is that many of us are drawn to negative information. Psychologists call this the “<a href="https://positivepsychology.com/3-steps-negativity-bias/">negativity bias</a>”. From an evolutionary perspective, it has been important for us to prioritise negative stimuli (threats such as predators) over positive stimuli (enjoying the warmth of a summer’s day).</p> <p>To counterbalance this tendency, we can adopt a bias towards the positive as we consume news. In practical terms, this means seeking positive news stories to balance out our experience of staying updated.</p> <p>Managed properly, keeping on top of the latest news can support you to feel better informed and able to respond in case it becomes necessary. If we’re going to doomscroll, let’s do it right.<img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/183265/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /></p> <p><em><a href="https://theconversation.com/profiles/christian-van-nieuwerburgh-1157439">Christian van Nieuwerburgh</a>, Professor of Coaching and Positive Psychology, <a href="https://theconversation.com/institutions/rcsi-university-of-medicine-and-health-sciences-788">RCSI University of Medicine and Health Sciences</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/five-ways-to-manage-your-doomscrolling-habit-183265">original article</a>.</em></p>

Technology

Placeholder Content Image

10 things we sort of miss because of technological advances

<p>The world has certainly changed in the last few decades – great technological advancements has meant many things we did in the past are all but a memory (or they are on their way out.) Let’s look back on ten things we sort of miss even though they’ve been replaced by new technology.</p> <p>1. Buying disposable cameras, only taking picture that were worth the cost of film and having to go all the way to the chemist to develop and print photographs. Then you had to decide how to arrange them in an album.</p> <p>2. Recording your favourite television programs using a video tape. Nowadays people are downloading movies and TV shows straight to their computer.</p> <p>3. Saving all your loose change just in case you needed to use the pay phone when you were out. And having to remember numbers.</p> <p>4. Spending hours over a road map and writing down your own directions so you wouldn’t get lost before a holiday road trip or just going somewhere new. Nobody needs to remember how to get anywhere now because most have GPS.</p> <p>5. Physically visiting institutions like banks, post office and the newsagents. We don’t miss the long lines but at least it was personal.</p> <p>6. Hand-writing essays, letters and notes, which meant knowing how to hand-write. Now it’s about how fast you type not how legible your handwriting is!</p> <p>7. Looking up information in big encyclopaedias and definitions in the dictionary. Not just consulting the internet.</p> <p>8. Receiving mail in your letterbox not your inbox. Unluckily, there is more “junk mail” and spam now than ever.</p> <p>9. Advertising or looking for finds in classified section of the newspaper.</p> <p>10. Packing your friends in the backseats of the car to go to the drive-in movies because it was the only one around. While we do love the comfy seats in air-conditioned cinemas, you can’t beat the fun and romantic possibilities of drive-in cinemas. </p> <p><em>Images: Getty</em></p>

Technology

Placeholder Content Image

Feed me: 4 ways to take control of social media algorithms and get the content you actually want

<p><em><a href="https://theconversation.com/profiles/marc-cheong-998488">Marc Cheong</a>, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p>Whether it’s Facebook’s News Feed or TikTok’s For You page, social media algorithms are constantly making behind-the-scenes decisions to boost certain content – giving rise to the “curated” feeds we’ve all become accustomed to.</p> <p>But does anyone actually know how these algorithms work? And, more importantly, is there a way to “game” them to see more of the content you want?</p> <h2>Optimising for engagement</h2> <p>In broader computing terms, an algorithm is simply a set of rules that specifies a particular computational procedure.</p> <p>In a social media context, algorithms (specifically “recommender algorithms”) determine everything from what you’re likely to read, to whom you’re likely to follow, to whether a specific post appears in front of you.</p> <p>Their main goal is to <a href="https://arxiv.org/abs/2304.14679">sustain your attention</a> for as long as possible, in a process called “optimising for engagement”. The more you engage with content on a platform, the more effectively that platform can commodify your attention and target you with ads: its main revenue source.</p> <p>One of the earliest social media <a href="https://mashable.com/archive/facebook-news-feed-evolution">feed algorithms</a> came from Facebook in the mid-2000s. It can be summarised in one sentence "Sort all of the user’s friend updates – including photos, statuses and more – in reverse chronological order (newer posts first)."</p> <p>Since then, algorithms have become much more powerful and nuanced. They now take myriad factors into consideration to determine how content is promoted. For instance, Twitter’s “For You” recommendation algorithm is based on a neural network that uses <a href="https://blog.twitter.com/engineering/en_us/topics/open-source/2023/twitter-recommendation-algorithm">about 48 million parameters</a>!</p> <h2>A black box</h2> <p>Imagine a hypothetical user named Basil who follows users and pages that primarily discuss <em>space</em>, <em>dog memes</em> and <em>cooking</em>. Social media algorithms might give Basil recommendations for T-shirts featuring puppies dressed as astronauts.</p> <p>Although this might seem simple, algorithms are typically “black boxes” that have their inner workings hidden. It’s in the interests of tech companies to keep the recipe for their “secret sauce”, well, a secret.</p> <p>Trying to “game” an algorithm is like trying to solve a 3D box puzzle without any instructions and without being able to peer inside. You can only use trial-and-error – manipulating the pieces you see on the outside, and gauging the effects on the overall state of the box.</p> <figure class="align-center zoomable"><em><a href="https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip"><img src="https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=400&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=400&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=400&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=503&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=503&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/525271/original/file-20230510-27-qte7k8.jpeg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=503&amp;fit=crop&amp;dpr=3 2262w" alt="" /></a></em><figcaption><em><span class="caption">Manipulating social media algorithms isn’t impossible, but it’s still tricky due to how opaque they are.</span> <span class="attribution"><span class="source">Shutterstock</span></span></em></figcaption></figure> <p>Even when an algorithm’s code is revealed to the public – such as <a href="https://blog.twitter.com/en_us/topics/company/2023/a-new-era-of-transparency-for-twitter">when Twitter released</a> the source code for its recommender algorithm in March – it’s not enough to bend them to one’s will.</p> <p>Between the sheer complexity of the code, constant tweaks by developers, and the presence of arbitrary design choices (such as <a href="https://mashable.com/article/twitter-releases-algorithm-showing-it-tracks-elon-musk-tweets">explicitly tracking</a> Elon Musk’s tweets), any claims of being able to perfectly “game” an algorithm should be taken with a pinch of salt.</p> <p>TikTok’s algorithm, in particular, is notoriously powerful yet opaque. A Wall Street Journal investigation found it uses “subtle cues, such as how long you linger on a video” to predict what you’re <a href="https://www.wsj.com/articles/tiktok-algorithm-video-investigation-11626877477">likely to engage with</a>.</p> <h2>So what <em>can</em> you do?</h2> <p>That said, there are some ways you can try to curate your social media to serve you better.</p> <p>Since algorithms are powered by your data and social media habits, a good first step is to change these habits and data – or at least understand how they may be shaping your online experience.</p> <h1>1. Engage with content you trust and want more of</h1> <p>Regardless of the kind of feed you want to create, it’s important to follow reliable sources. Basil, who is fascinated by space, knows they would do well to follow NASA and steer clear of users who believe the Moon is made of cheese.</p> <p>Think critically about the accounts and pages you follow, asking <a href="https://guides.lib.uw.edu/research/faq/reliable">questions such as</a> <em>Who is the author of this content? Do they have authority in this topic? Might they have a bias, or an agenda?</em></p> <p>The higher the quality of the content you engage with, the more likely it is that you’ll be recommended similarly valuable content (rather than fake news or nonsense).</p> <p>Also, you can play to the ethos of “optimising for engagement” by engaging more (and for longer) with the kind of content you want to be recommended. That means liking and sharing it, and actively seeking out similar posts.</p> <h1>2. Be stingy with your information</h1> <p>Secondly, you can be parsimonious in providing your data to platforms. Social media companies know more about you than you think – from your location, to your perceived interests, to your activities outside the app, and even the activities and interests of your social circle!</p> <p>If you limit the information you provide about yourself, you limit the extent to which the algorithm can target you. It helps to keep your different social media accounts unlinked, and to avoid using the “Login with Facebook” or “Login with Google” options when signing up for a new account.</p> <h1>3. Use your settings</h1> <p>Adjusting your <a href="https://www.consumerreports.org/privacy/facebook-privacy-settings-a1775535782/">privacy and personalisation settings</a> will further help you avoid being microtargeted through your feed.</p> <p>The “Off-Facebook Activity” <a href="https://www.kaspersky.com.au/blog/what-is-off-facebook-activity/28925/">setting</a> allows you to break the link between your Facebook account and your activities outside of Facebook. Similar options exist for <a href="https://support.tiktok.com/en/account-and-privacy/account-privacy-settings">TikTok</a> and <a href="https://help.twitter.com/en/resources/how-you-can-control-your-privacy">Twitter</a>.</p> <p>Ad blockers and privacy-enhancing browser add-ons can also help. These tools, such as the open-source <a href="https://ublockorigin.com/">uBlock Origin</a> and <a href="https://privacybadger.org/">Privacy Badger</a>, help prevent cookies and marketing pixels from “following” your browsing habits as you move between social media and other websites.</p> <h1>4. Get (dis)engaged</h1> <p>A final piece of advice is to simply disengage with content you don’t want in your feed. This means:</p> <ul> <li>ignoring any posts you aren’t a fan of, or “hiding” them if possible</li> <li>taking mindful breaks to avoid “<a href="https://theconversation.com/doomscrolling-is-literally-bad-for-your-health-here-are-4-tips-to-help-you-stop-190059">doomscrolling</a>”</li> <li>regularly revising who you follow, and making sure this list coincides with what you want from your feed.</li> </ul> <p>So, hypothetically, could Basil unfollow all users and pages unrelated to <em>space</em>, <em>dog memes</em> and <em>cooking</em> to ultimately starve the recommender algorithm of potential ways to distract them?</p> <p>Well, not exactly. Even if they do this, the algorithm won’t necessarily “forget” all their data: it might still exist in caches or backups. Because of how complex and pervasive algorithms are, you can’t guarantee control over them.</p> <p>Nonetheless, you shouldn’t let tech giants’ bottom line dictate how you engage with social media. By being aware of how algorithms work, what they’re capable of and what their purpose is, you can make the shift from being a sitting duck for advertisers to an active curator of your own feeds.</p> <figure class="align-center "><em><img src="https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px" srcset="https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=115&amp;fit=crop&amp;dpr=1 600w, https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=115&amp;fit=crop&amp;dpr=2 1200w, https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=115&amp;fit=crop&amp;dpr=3 1800w, https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=144&amp;fit=crop&amp;dpr=1 754w, https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=144&amp;fit=crop&amp;dpr=2 1508w, https://images.theconversation.com/files/498128/original/file-20221129-22-imtnz0.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=144&amp;fit=crop&amp;dpr=3 2262w" alt="" /></em><figcaption></figcaption></figure> <p><em>The Conversation is commissioning articles by academics across the world who are researching how society is being shaped by our digital interactions with each other. <a href="https://theconversation.com/uk/topics/social-media-and-society-125586">Read more here</a><!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img style="border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important;" src="https://counter.theconversation.com/content/204374/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" /><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https://theconversation.com/republishing-guidelines --></em></p> <p><em><a href="https://theconversation.com/profiles/marc-cheong-998488">Marc Cheong</a>, Senior Lecturer of Information Systems, School of Computing and Information Systems; and (Honorary) Senior Fellow, Melbourne Law School, <a href="https://theconversation.com/institutions/the-university-of-melbourne-722">The University of Melbourne</a></em></p> <p><em>Image credits: Getty Images</em></p> <p><em>This article is republished from <a href="https://theconversation.com">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/feed-me-4-ways-to-take-control-of-social-media-algorithms-and-get-the-content-you-actually-want-204374">original article</a>.</em></p>

Technology

Placeholder Content Image

Social media good for older people’s health

<p>Older people should use Facebook and other social media to help prevent their health declining, a study has found.</p> <p>Researchers at the University of Exeter in England carried out the research among 65 to 95-year-olds and found that people who spent time online did not feel as lonely as others their age, which helps stop declining physical and mental health.</p> <p>The study followed seniors from 31 residential care homes across the United Kingdom. Researchers noted those trained to use technology felt more self-competent, were more sociable and demonstrated improved cognitive abilities.</p> <p>The project's leader, Dr Thomas Morton, said the findings highlighted how loneliness among older people can contribute to their poor health.</p> <p>“Human beings are social animals, and it’s no surprise that we tend to do better when we have the capacity to connect with others.</p> <p>“But what can be surprising is just how important social connections are to cognitive and physical health.</p> <p>“People who are socially isolated or who experience loneliness are more vulnerable to disease and decline.”</p> <p>Margaret Keohone, a participant of the study, said learning to navigate the internet “changed her life”.</p> <p>“Having this training changes people's lives and opens up their worlds, invigorates their minds and for lots of us gives us a completely different way of recognising our worth as we age,” said Margaret Keohone. </p> <p>“I was just slipping away into a slower way of life.”</p> <p><em>Images: Getty</em></p>

Technology

Placeholder Content Image

Use these 10 passwords at your own peril

<p dir="ltr">With cyberattacks increasing by the month, it’s crucial to have a strong grasp or what is - or isn’t - a strong enough password to hopefully deter hackers.</p> <p dir="ltr">And with the cybercriminals capable of unveiling 921 passwords each second, people all over have become easy targets with their choices - whether that’s from including easy-to-guess terms like the word “password” itself or common sequences like “123456” and “qwerty” - as reported by <em>9News</em>.</p> <p dir="ltr">And as analysis by <em>CyberNews</em> has revealed, just 13 per cent of leaked passwords - from a review of almost 15 billion - were actually unique. </p> <p dir="ltr">According to them, two of the most popular names to appear in the selection were “Eva” and “Alex”, with a total of seven million respective uses. “Food” and “pie” were regulars, as well as the season “summer”.</p> <p dir="ltr">While these might be easy for users to remember, and appealing for that, My Business general manager Phil Parisis had a clear warning in store when he explained that “if it’s easy for you to remember, chances are it’s also easy for cybercriminals to guess.</p> <p dir="ltr">“That's not only putting you at risk but also exposing the businesses and corporations that you work for.</p> <p dir="ltr">"Another common inclusion is a year - often their birth year or another significant year in their life."</p> <p dir="ltr">Having the right information and advice at your disposal is crucial when it comes to protecting yourself, so with all of this in mind, the 10 passwords that you should avoid at all costs the next time you’re asked to come to up with one are the following: </p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">123456</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">123456789</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">qwerty</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">password</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">12345</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">qwerty123</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">1q2w3e</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">12345678</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">111111</p> </li> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation">1234567890</p> </li> </ul> <p dir="ltr">To further protect yourself, it can be of great benefit to mix your upper and lowercase letters in your passwords, as well as throwing in a range of symbols and numbers to further disguise your intended terms. </p> <p dir="ltr">For example, and as <em>9News</em> noted, the likes of “password123” is considered a weak password, while something like “MySecurePa$$word785!” is considered much stronger, and much more protected.</p> <p dir="ltr">And the Australian Cyber Security Centre have further suggested that internet users consider using passphrases - a number of random words put together in a string -, as they’re “harder to guess but easier to remember” than common passwords. But most of all, they recommend avoiding obvious, significant, and easy-to-guess words, like the names of children and beloved family pets. </p> <p dir="ltr"><em>Images: 9News </em></p>

Technology

Placeholder Content Image

AI to Z: all the terms you need to know to keep up in the AI hype age

<p>Artificial intelligence (AI) is becoming ever more prevalent in our lives. It’s no longer confined to certain industries or research institutions; AI is now for everyone.</p> <p>It’s hard to dodge the deluge of AI content being produced, and harder yet to make sense of the many terms being thrown around. But we can’t have conversations about AI without understanding the concepts behind it.</p> <p>We’ve compiled a glossary of terms we think everyone should know, if they want to keep up.</p> <h2>Algorithm</h2> <p><a href="https://theconversation.com/what-is-an-algorithm-how-computers-know-what-to-do-with-data-146665">An algorithm</a> is a set of instructions given to a computer to solve a problem or to perform calculations that transform data into useful information. </p> <h2>Alignment problem</h2> <p>The alignment problem refers to the discrepancy between our intended objectives for an AI system and the output it produces. A misaligned system can be advanced in performance, yet behave in a way that’s against human values. We saw an example of this <a href="https://www.theguardian.com/technology/2018/jan/12/google-racism-ban-gorilla-black-people">in 2015</a> when an image-recognition algorithm used by Google Photos was found auto-tagging pictures of black people as “gorillas”. </p> <h2>Artificial General Intelligence (AGI)</h2> <p><a href="https://theconversation.com/not-everything-we-call-ai-is-actually-artificial-intelligence-heres-what-you-need-to-know-196732">Artificial general intelligence</a> refers to a hypothetical point in the future where AI is expected to match (or surpass) the cognitive capabilities of humans. Most AI experts agree this will happen, but disagree on specific details such as when it will happen, and whether or not it will result in AI systems that are fully autonomous.</p> <h2>Artificial Neural Network (ANN)</h2> <p>Artificial neural networks are computer algorithms used within a branch of AI called <a href="https://aws.amazon.com/what-is/deep-learning/">deep learning</a>. They’re made up of layers of interconnected nodes in a way that mimics the <a href="https://www.ibm.com/topics/neural-networks">neural circuitry</a> of the human brain. </p> <h2>Big data</h2> <p>Big data refers to datasets that are much more massive and complex than traditional data. These datasets, which greatly exceed the storage capacity of household computers, have helped current AI models perform with high levels of accuracy.</p> <p>Big data can be characterised by four Vs: “volume” refers to the overall amount of data, “velocity” refers to how quickly the data grow, “veracity” refers to how complex the data are, and “variety” refers to the different formats the data come in.</p> <h2>Chinese Room</h2> <p>The <a href="https://ethics.org.au/thought-experiment-chinese-room-argument/">Chinese Room</a> thought experiment was first proposed by American philosopher John Searle in 1980. It argues a computer program, no matter how seemingly intelligent in its design, will never be conscious and will remain unable to truly understand its behaviour as a human does. </p> <p>This concept often comes up in conversations about AI tools such as ChatGPT, which seem to exhibit the traits of a self-aware entity – but are actually just presenting outputs based on predictions made by the underlying model.</p> <h2>Deep learning</h2> <p>Deep learning is a category within the machine-learning branch of AI. Deep-learning systems use advanced neural networks and can process large amounts of complex data to achieve higher accuracy.</p> <p>These systems perform well on relatively complex tasks and can even exhibit human-like intelligent behaviour.</p> <h2>Diffusion model</h2> <p>A diffusion model is an AI model that learns by adding random “noise” to a set of training data before removing it, and then assessing the differences. The objective is to learn about the underlying patterns or relationships in data that are not immediately obvious. </p> <p>These models are designed to self-correct as they encounter new data and are therefore particularly useful in situations where there is uncertainty, or if the problem is very complex.</p> <h2>Explainable AI</h2> <p>Explainable AI is an emerging, interdisciplinary field concerned with creating methods that will <a href="https://theconversation.com/how-explainable-artificial-intelligence-can-help-humans-innovate-151737">increase</a> users’ trust in the processes of AI systems. </p> <p>Due to the inherent complexity of certain AI models, their internal workings are often opaque, and we can’t say with certainty why they produce the outputs they do. Explainable AI aims to make these “black box” systems more transparent.</p> <h2>Generative AI</h2> <p>These are AI systems that generate new content – including text, image, audio and video content – in response to prompts. Popular examples include ChatGPT, DALL-E 2 and Midjourney. </p> <h2>Labelling</h2> <p>Data labelling is the process through which data points are categorised to help an AI model make sense of the data. This involves identifying data structures (such as image, text, audio or video) and adding labels (such as tags and classes) to the data.</p> <p>Humans do the labelling before machine learning begins. The labelled data are split into distinct datasets for training, validation and testing.</p> <p>The training set is fed to the system for learning. The validation set is used to verify whether the model is performing as expected and when parameter tuning and training can stop. The testing set is used to evaluate the finished model’s performance. </p> <h2>Large Language Model (LLM)</h2> <p>Large language models (LLM) are trained on massive quantities of unlabelled text. They analyse data, learn the patterns between words and can produce human-like responses. Some examples of AI systems that use large language models are OpenAI’s GPT series and Google’s BERT and LaMDA series.</p> <h2>Machine learning</h2> <p>Machine learning is a branch of AI that involves training AI systems to be able to analyse data, learn patterns and make predictions without specific human instruction.</p> <h2>Natural language processing (NLP)</h2> <p>While large language models are a specific type of AI model used for language-related tasks, natural language processing is the broader AI field that focuses on machines’ ability to learn, understand and produce human language.</p> <h2>Parameters</h2> <p>Parameters are the settings used to tune machine-learning models. You can think of them as the programmed weights and biases a model uses when making a prediction or performing a task.</p> <p>Since parameters determine how the model will process and analyse data, they also determine how it will perform. An example of a parameter is the number of neurons in a given layer of the neural network. Increasing the number of neurons will allow the neural network to tackle more complex tasks – but the trade-off will be higher computation time and costs. </p> <h2>Responsible AI</h2> <p>The responsible AI movement advocates for developing and deploying AI systems in a human-centred way.</p> <p>One aspect of this is to embed AI systems with rules that will have them adhere to ethical principles. This would (ideally) prevent them from producing outputs that are biased, discriminatory or could otherwise lead to harmful outcomes. </p> <h2>Sentiment analysis</h2> <p>Sentiment analysis is a technique in natural language processing used to identify and interpret the <a href="https://aws.amazon.com/what-is/sentiment-analysis/">emotions behind a text</a>. It captures implicit information such as, for example, the author’s tone and the extent of positive or negative expression.</p> <h2>Supervised learning</h2> <p>Supervised learning is a machine-learning approach in which labelled data are used to train an algorithm to make predictions. The algorithm learns to match the labelled input data to the correct output. After learning from a large number of examples, it can continue to make predictions when presented with new data.</p> <h2>Training data</h2> <p>Training data are the (usually labelled) data used to teach AI systems how to make predictions. The accuracy and representativeness of training data have a major impact on a model’s effectiveness.</p> <h2>Transformer</h2> <p>A transformer is a type of deep-learning model used primarily in natural language processing tasks.</p> <p>The transformer is designed to process sequential data, such as natural language text, and figure out how the different parts relate to one another. This can be compared to how a person reading a sentence pays attention to the order of the words to understand the meaning of the sentence as a whole. </p> <p>One example is the generative pre-trained transformer (GPT), which the ChatGPT chatbot runs on. The GPT model uses a transformer to learn from a large corpus of unlabelled text. </p> <h2>Turing Test</h2> <p>The Turing test is a machine intelligence concept first introduced by computer scientist Alan Turing in 1950.</p> <p>It’s framed as a way to determine whether a computer can exhibit human intelligence. In the test, computer and human outputs are compared by a human evaluator. If the outputs are deemed indistinguishable, the computer has passed the test.</p> <p>Google’s <a href="https://www.washingtonpost.com/technology/2022/06/17/google-ai-lamda-turing-test/">LaMDA</a> and OpenAI’s <a href="https://mpost.io/chatgpt-passes-the-turing-test/">ChatGPT</a> have been reported to have passed the Turing test – although <a href="https://www.thenewatlantis.com/publications/the-trouble-with-the-turing-test">critics say</a> the results reveal the limitations of using the test to compare computer and human intelligence.</p> <h2>Unsupervised learning</h2> <p>Unsupervised learning is a machine-learning approach in which algorithms are trained on unlabelled data. Without human intervention, the system explores patterns in the data, with the goal of discovering unidentified patterns that could be used for further analysis.</p> <p><em>Image credits: Getty Images</em></p> <p><em>This article originally appeared on <a href="https://theconversation.com/ai-to-z-all-the-terms-you-need-to-know-to-keep-up-in-the-ai-hype-age-203917" target="_blank" rel="noopener">The Conversation</a>. </em></p>

Technology