ALC201 Module 2
I aimed to creatively stimulate and argue points that online dating is yet another application that we use to stimulate online functionality. In particular, exploring the boundaries of Tinder and how the application is used, explored and whether or not it has the capabilities of other online dating sites. I also place it against traditional dating. Asking contradictory questions and exploring how Tinder is generally used, I asked Author and Editor Nicole Haddow on her opinion on the uses of how Tinder is used and how to use Tinder effectively. I felt that the appearance of my talking head wouldn’t be an effective way to portray my message, so avoiding being on camera in an informative measure, I only appeared to create fillers to footage and voiceover. If I were somebody of expertise of the issue, such as a professor of social media; perhaps then I’d feel comfortably giving a talking head opinion. My aim behind this video was to creatively eliminate myths and beliefs behind the use of the online dating app Tinder. The concept of swiping left or right after looking at a selected image of somebody is a lot like the “don’t judge a book by its cover” belief. Something which a lot of people also struggle to maintain within traditional styled offline dating. I drew upon the “Introducing the New Sexuality Studies” (DeMasi, 2011) reading, particularly exploring the ideas that shopping for a relationship is very similar to traditional dating, only now with online dating, do you have the ability to do this from a device with an internet connection. The online dating scene has not changed our ethical values and beliefs to dating. Although it has challenged them, especially through Tinder. Tackling the creative commons issue was not difficult for me. Upon discovering music for creative commons through a Soundcloud user, I found a fitting backing soundtrack to fill the blank noise between dialogue and footage. I contacted a friend who created a stop-motion photography piece on the city of Melbourne, which fitted well exploring the use of online dating and its commonality throughout. Additionally, I heard an interview on Triple J Hack with Tom Tilley with Nicole Haddow exploring how Tinder works. I archived the interview from November, and tracked down Nicole’s details; from there I explored some of Nicole’s works on her website and then attempted contacting her via her email. Although the email account was down, so I desperately attempted to contact Nicole through Twitter, then I recorded her with her permission granted (all upon recording) and conducted a twenty minute interview that I recorded using my laptop and Audacity. I honestly couldn’t be more thankful that we explored using Twitter for this unit, or else there’s no way I would’ve contacted Nicole and gained some really interesting information that will remain within my archive. Issues that I face with my project included struggling to contact Nicole, with both of us working very late hours and struggling to find free time, I finally after three attempts to create an appropriate time for interview, was able to conduct the twenty minute long interview. I had recorded the interview at 10PM on my laptop through my phone in the car park of my gym. Although this was the only time that worked for both of us. Additionally, my editing software crashed, and with a slight glitch, I was not able to recover my work. Luckily I am familiar with the software and pieced the footage together within a few hours.
DeMasi, S 2011, ‘Shopping for love: online dating and the making of a cyber
culture of romance’, in Seidman, S and Meeks, C (eds.), Introducing the New
Sexuality Studies, Routledge, Abingdon and New York, pp. 206-13
ALC201 Module 1
Likes to party, gym junkie, funny. – Upon asking a newly acquainted Instagram follower (and personal friend), as a personal experiment I asked them to sum up what they perceived me as from looking at my Instagram account. Upon which, I have 312 followers and I’m following less than half the amount (149). Each image that I post is strategically posted, at certain times that I have experienced a higher traffic of interactivity and interest between my followers. Similarly, a site that I am newly in charge of the social network marketing side of has effectively created a stronger brand and fan-base by simply posting images, memes, videos and statuses that will attract the most attention and appeal to a certain demographic. Questions about my social identity and privacy and the “brand” that I’m portraying have evoked serious thought behind every post, tweet, like, hashtag, and view that I have contributed to new media. Online privacy and the ability to personalise groups and posts on social networking has been an important part of my social media persona.
The social media platform Instagram allows users to personalise captioned images to create a restricted persona, through the use of annecdotes, links and searchable hashtags. Abilities to privatise your account so only your “followers” can see your posts or on the other hand, publicise your posts so that users can search for hashtags attached to images in order to create a stronger following are features that are used by myself and fellow users. I use Instagram on a personal level, my content is controlled and posted to perceive a certain desired image about myself, that only my accepted followers may view. The core reason behind this is to limit peoples perspective on me, I aim to portray very different brands through the uses of my Instagram and Facebook accounts.
“..In order to effectively market and position a brand an organization must understand and actively develop their brand personality (Braunstein & Ross, 2010).” (Walsh, p.214). Paraphrasing Walsh, the importance of creating an active online personality is crucial for it to stay socially active and trending within social media. This can be seen through a page that I’ve recently helped market. UFF (United Froth Fermenters) is a society which is all about partying and active uni socialising. The events group had a high success in marketing for its last party through the use of posting videos, memes, links and statuses at what would be considered high trafficking times on Facebook. Facebook gives the ability to delay posts from pages, additionally you can also pay for posts to generate more views or for it to be “reached”. Facebook will post your page links that you’ve paid for, for specific time limits and for audiences that it believes would target (through the gathering of cookies and views from page followers), resulting in a larger viewing from the social network.
Statistics generated through Visual.ly of how UFF has delivered its media. High viewing numbers are due to a recently held event.
As of recently, I’ve become more aware of the security and privacy that my online persona contributes. Upon conducting a Google search of myself, I found some internet ghosts on outdated sites such as Myspace which perceived a unprofessional portrayal.
As Liu et al states, “Overcoming privacy concerns online is crucial in order for trust
to develop, which in turn prompts online activity including purchases, repeat purchases
and positive word-of-mouth (Liu et al., 2005).” (O’Bien, p.66) it is important to maintain a certain level of trust witha social networking site, but also maintain the fact that you can be found online and that your online persona leaves a trail of information that sometimes you don’t even know you’ve left.
Erasing David is a documentary about the surveillance society in Britain.
The documentary Erasing David raises an important issue about how I perceive my privacy online. The documentary explores issues around the British government granting their internet service providers the ability to hold onto their users metadata. After viewing the film, I took steps into privatising my internet use. The steps were taken so that in the possible case of my personal information that I wish not to disclose; cannot be disclosed. Additional reasoning behind my personal information being limited to the internet is due to higher risks of internet hacking and phishing of accounts. Internet scamming in Australia is short of one billion dollars in revenue, and is rapidly growing.
“When constructing personal web pages or the like, users themselves often imagine that they are revealing their “real” or “true essence, a person or “me” who is unique, singulare, and outside social constructions and constraints.” (Madison, p.71) Madison’s belief can be reflected throughout my social networking personality, which is carefully adjusted through the use of the groups feature on Facebook. I have multiple groups which are labelled and privatised to different levels for family members, fellow employees, and university friends. This is so these different demographics can’t see information that I don’t elicit to them offline. My Instagram account is used as a device to show off personality traits that I would like for my followers to perceive.
A screenshot of my Instagram account.
It’s becoming very common that before posting images on Instagram to use different applications to modify and stylise the original image.On my phone I have the apps InstaVideoCollage, InstaFollow, InstaPicFrame, and InstaSquareMaker. All of which potentially benefit the content that I post by making it more unique and stylised. Even before embedding this image into my post, I have processed the image through InstaSquareMaker and stylised it using Instagrams blur filter and contrast and saturation features.
So whether it be my pretentious Instagram fame of only following close to a half of those who follow me, or my limiting of information I contribute to social media networking, as a general sake of internet use, I believe that it’s important to understand what you’re posting can be, and will be seen. I will continue to be socially active, though with a more dynamic approach to whom sees what I post upon the internet.
883 words excluding anecdotes and references.
Poletti, A. and Rak, J.
In-text: (Poletti and Rak, n.d.)
Bibliography: Poletti, A. and Rak, J. (n.d.). Identity technologies. 1st ed.Website
Global scams hit Australians’ pockets – Losses at 1 Billion dollars
In-text: (Scamwatch.gov.au, 2014)
Bibliography: Scamwatch.gov.au, (2014). Global scams hit Australians’ pockets – Losses at 1 Billion dollars. [online] Available at: http://www.scamwatch.gov.au/content/index.phtml/itemId/737612 [Accessed 7 Aug. 2014].
Torres, A. M.
Social networking and online privacy: Facebook users’ perceptions
In-text: (Torres, 2012)
Bibliography: Torres, A. (2012). Social networking and online privacy: Facebook users’ perceptions. Irish Journal of Management.
Walsh, P., Clavio, G., Lovell, M. D. and Blaszka, M.
Differences in event brand personality between social media users and non-users
In-text: (Walsh et al., 2013)
Bibliography: Walsh, P., Clavio, G., Lovell, M. and Blaszka, M. (2013). Differences in event brand personality between social media users and non-users. Sport Marketing Quarterly, 22(4), pp.214–223.