Digital Culture Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Which term is cyborg referred to as?

A

Organism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whatsapp groups are elements of social networks

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identities are being networked

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Warfare revolves around five targets

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

: When did cyberwar become part of academic, military, and popular media
discourse?

A

Late 1900s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

: Can Algorithms be easily copied and transferable

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is algorithmic software?

A

Social Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is happening in our society with communities?

A

They are breaking down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an avatar?

A

An avatar can be defined as ‘an interactive social representation of a user’
(Meadows, 2008: 13) or an instrument of co-presence or a mediated encounter between
networked subjects (Miller, 2012; Apperley and Clemens, 2017).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

are avatars on social media, and gaming devices?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In Digital Identity the case study “Selfies- More Than Just The Self” really highlights the
importance of self-representation and how we are affected by it

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

“Illustrative of this is Giddens (1991), who suggested that late-modern social life is characterized
by three aspects:”

A

A. Separation of Time and Space
B. Disembedding of social relationships
C. Reflexive ordering of social relationships
D. ALL OF THE ABOVE (correct)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the book about virtual communities it states have material limits.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

“the network has replaced the group as the basic socio-economic unit of contemporary society.
This shift was based on a number of changes in the economic structure of later-modern
societies, the most important (for our current purposes) being:

A

A.Transition to a economic model
B. Economic pressure for change in spatial order
C. Worldwide communication infrastructure for development
D.ALL OF THE ABOVE (correct)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wellman in 2002 argued _______ individualism has been advanced because of the Liberation
community.

A

Networked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is not associated with populism

A

It does not display an attack on transnational or global organizations and agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The three categories for cybercrime are computer integrity crime,
computer

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An __________ between player and avatar, where the avatar is
seen in terms of its capacity as a game tool. This is most common among adult players

A

Independent Status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The difference between Gemeinschaft and Gesellschaft is that
Gemeinschaft refers to a context of individualized social action and Gesellschaft is characterized
as ‘organic’ or ‘natural’ in that such interdependence

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the Internet of Things refer to

A

Increasing automated connections between everyday physical objects to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is NOT an example of a new social movement

A

Governmental organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Like viruses and worms, Trojans replicate themselves

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

According to Wynn and Katz, personal home pages resulted in the
‘re-centering’ of the self

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the correct order of the interrelated features of social networks?

A

Instrumental/Specialized > Tenuous > Open-ended > A-spatial > Chosen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In her essay, ‘A Manifesto for Cyborgs,’ Donna Haraway suggests that
cyborgs are powerful images in fiction and they are becoming an increasing fact of life

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

According to Wilson and Dreyfus, virtual communities “increase individualism” and give
people a “God’s eye” POV.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A couple examples of virtues of virtual communities is that they are limitless and have
freedom of engagement.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The way our communities live and interact with each other is an example of
gemeinschaft

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The profiling procedure involves six steps; and an example of one is, “Define a class of
person”

A

True

30
Q

Most countries in the world have reliable official statistics on cybercrime.

A

False

31
Q

Which of the following is not an interrelated feature of social networks in the informational
age?

A

Networked

32
Q

Networks don’t have a goal, point or purpose for their existence

A

False

33
Q

Online communities do not have material limits

A

True

34
Q

What is true about networks?

A

A. They are spatial.
B. They are based on a choice.
C. They are a product of instrumentalism
ALL ABOVE ARE TRUE

35
Q

Which one is false about new social movements?

A

Focusing on material or economic issues

36
Q

According to Cronin and Crawford there are three targets which the information warfare is
revolving around. Which one is not one of the three targets?

A

Mental assets

37
Q

“cyberwarfare” is a form of conflict which both utilizes and targets digital
infrastructures to achieve military objectives.`

A

True

38
Q

Cybercrime isn’t ambiguous

A

False

39
Q

Which of the following isn’t a type of cybercrime?

A

Computer-Generated Crime

40
Q

Ervin Goffman believed that we “perform” our identities, and this can be
applied to an online context

A

True

41
Q

Which of the following isn’t an example of an identity relationship between a player and
an avatar?

A

Avatar as a Friend of the player

42
Q

Which of the following isn’t a type of online community?

A

Communities of avatars

43
Q

Attachments towards avatars are real, although avatars do not reflect the self,
but rather reflects a character that one grows close with

A

True

44
Q

Which is NOT one of three aspects that Social theorist, Anthony Giddens (1991) suggests that
late modern social life is characterized by?

A

The changing constitution of space

45
Q

What does globalization do to help transform our community to become online or virtual?

A

Exposes us to a variety of cultural resources and experiences

46
Q

Identity and body are predetermined rather than socially constructed

A

False

47
Q

What does posthumanism explore?

A

the concept of technological embodiment, emphasizing the integration of technology into
the human form

48
Q

Gillespie suggests that ‘cybercrime is an overarching term that
covers a wide range of crimes and behaviors’

A

True

49
Q

Hall explains that the term ‘identity’ is problematic and should be
described as ‘identification.’

A

True

50
Q

MUDs were inspired by what face to face role-playing game?

A

Dungeons and Dragons

51
Q

Which early sociologist(s) felt that the move to urban life had profound effects on
people’s sense of belonging and their interactions with each other?

A

A. Engels
B. Durkheim
C. Weber
D. Simmel
E. Wirth
F. ALL OF THE ABOVE

52
Q

Sherry Turkle argues people are increasingly using networking
technology to maintain useful instrumental connections with others

A

True

53
Q

Virtual communities increase individualism

A

True

54
Q

We preform our identities both online and in person

A

True

55
Q

Online communities have material limits

A

False

56
Q

There are 5 central targets to warfare

A

False

57
Q

All networks are based on a choice

A

True

58
Q

_______ is the process of using an algorithm to transform or code
information into something unreadable to everyone other than those authorized to view it.

A

Encryption

59
Q

Which of the following is NOT an aspect of Giddens (1991) idea of late-modern
social life?

A

The digital identity of an individual

60
Q

ICT (Information and Communications Technology) enhanced social
networks have no limits in terms of size and are therefor open-ended

A

True

61
Q

: Which of the following was a foundational step towards posthumanism?

A

Cybernetics

62
Q

Public settings are moving away from targeted advertising based on
the qualities of individuals present, as assessed by ambient intelligence and smart objects.

A

False

63
Q

there are three approaches to post humanism.

A

True

64
Q

Identity is originates in language and is maintained internally and externally
through discourse

A

True

65
Q

Identities are not historically contingent

A

False

66
Q

What is one of the aspects of an online environment

A

That identities can be created are impossible in offline environments

67
Q

What do you need to create in the context of blogging

A

The need to create and sustain a narrative to others

68
Q

One of the major problems of cybercrime is that it is full of ambiguities.
Whether it is defining cybercrime, separating cybercrime out as a distinct field of crime,
or even measuring the problem itself

A

True

69
Q

There are 3 types of cybercrime: Computer integrity crime, property crime and crimes
against the person

A

False

70
Q

Information warfare has been defined as “actions intended to protect, exploit, corrupt,
deny or destroy information or information resources to achieve a significant advantage,
objective, or victory over an adversary

A

True

71
Q

Any crime is a combination of several factors: motivation of an individual or group,
opportunity for a crime and some form of technology that helps to enable a crime to take
place

A

True

72
Q

The internet is a bad instrument for a world in which community is understood as a
network

A

False