Assessments, Networked Media

Tagging and taxonomy

There are two main taxonomies used in blogging: categories and tags. Categories are what they sound like: top-level, broad categorisations usually referring to the type of content. Categories are arbitrarily named and differ from blog to blog. For example, a political blog might have categories like “News”, “Opinion”, “Investigative Reporting”, etc., while a sports blog could have categories like “Football”, “Basketball”, “Hockey”, etc.

At a more granular level are tags. Tags are arbitrarily named keywords that are generally used to indicate that a certain topic, person, company or thing has been mentioned or referenced in a post. This aids readers and researchers looking for information on a particular topic find posts that match. The sports blog, for example, might tag a particular player or coach in every post mentioning their name, and then readers could find all posts relating to that player or coach in the one place.

While typically a post will belong to one or very few categories (because content generally only has one type), conventionally tags are much more liberally used and a single post could potentially have dozens of tags depending on how many things are referred to in the post.

Categories and tags became extensively used on the internet with the rise of blogs (and in particular the Web 2.0 era of the early 2000s), because they provide a handy way to categorise and search large volumes of information without having to perform a resource intensive full-text search. The general idea of categorising and tagging has existed in bibliographies for centuries, but its particular digital form has only come into widespread use in the last decade or two.

The WordPress knowledge base has a more detailed explanation of the difference between tagging and categorising.

Tagging isn’t necessarily limited to blogs. On the film diary service Letterboxd, where I often post short reviews of films I watch, tags are used extensively by users of the site in a number of ways. Tags like watched-at-the-cinema or watched-on-netflix indicate the circumstances in which a film was watched, and tags like 52-films-by-women are used by people participating in group-watching marathons and challenges. This particular tag helps bring together all of the people participating in a challenge to watch one film directed by a woman each week of the year, enabling them to meet and engage with each other through Letterboxd.

I use categories and tags extensively on this blog. I use categories to split up my posts according to the subject for which they’re created, such as the Networked Media category. I also have tags like blog-checklist, which collects all of the posts that constitute the first Networked Media assessment task.

Standard
Assessments, Networked Media

Audio post

This is a track I found on Soundcloud published under a Creative Commons license. The song is “Sock It To Them” by Paul Flint.

There are many ways to post music online. I’ve chosen to post a Soundcloud track because of the ease of embedding it into a WordPress post, but I could have just as easily used music from Bandcamp or even uploaded an audio file directly and presented it to the reader using a media player plugin.

Embedding media poses some interesting questions around ownership and copyright. For example, if the track I posted was a copyright track instead of Creative Commons, am I legally responsible for infringing copyright by posting it to my blog, or is Soundcloud responsible because they made it available in the first place and are hosting the audio file? Or is the person who originally uploaded the infringing track to Soundcloud?

This is another case where it’s best to stick to the public domain, Creative Commons or work I’ve created myself.

Standard
Assessments, Networked Media

Video post

I was recently on holiday in Japan, and I took this video out the window of a Shinkansen travelling from Tokyo to Hiroshima. I wasn’t expecting to share this online so I didn’t think much about its technical qualities (I should have taken it in landscape and not portrait), but the result is a pretty nice little view of the Japanese countryside.

I’ve posted this to Vimeo for a couple of reasons:

  • My phone (which is what I used to record the video) can upload to Vimeo natively
  • Vimeo makes embedding videos in a blog ridiculously easy
  • I prefer it to the overcrowded, low-quality nature of YouTube

Anyway, here it is:

Standard
Assessments, Networked Media

Anatomy of a blog

Blogging grew out of early publishing on the web, a mix of personal and news websites. A lot of this legacy still defines how blogs look and how they work. The header is like a newspaper masthead, the footer is similarly influenced by print publishing, and the column layout (including a sidebar and a main content area) is reminiscent of newspaper layouts. One major affordance of blogs is that they present posts in a kind of endless and ongoing timeline, in reverse chronological order, with pagination to limit the number of posts per page (like books).

The internet and the web are the other major influence on the blog format, such as the use of hypertext to including rich media and hyperlinks to other websites, or the use of widgets which bring content from other locations into the blog’s context. This is a result of the fact that the web is dynamic, with content stored in databases and presented to the user through the use of a content management system, with the look and feel controlled by templates. Authors don’t have to manually build every single page they publish, a lot of the code can be re-used or embedded from elsewhere. This turns the author’s focus to the content itself, rather than the context in which it sits.

This dynamism also enables rich metadata and posting properties (back-dating or forward-dating, viewing/editing permissions, drafting, etc.), none of which was possible in print media.

Standard
Assessments, Networked Media

Blogging ethics

The defining characteristic of blogs is that they are online, therefore public and accessible to people of all kinds from anywhere in the world. Though they share some characteristics with journals (chronological posting order, often filled with personal thoughts), it’s important to remember that they’re anything but private.

Online communication has allowed all kinds of voices to flourish and find their own space on the internet, including those usually suppressed or drowned out. This is good in many cases, but it can also shed light on undesirable groups and opinions that the world really doesn’t need to boost, such as hate groups. My own use of the internet has enabled me to find scenes and subcultures aligned to my interests (particularly in the art and culture space), but I’ve also witnessed some truly horrible things online. The overall effect is in my case a net positive, but for some people the internet can be a huge, unfriendly, frightening and unwelcoming place.

Today, social media websites are increasingly good at allowing users to control their privacy settings and decide who can see what they post, which is good in that it gives users control over their content, but it can also condition people to think they’re operating in a bubble away from the prying eyes of the world. It only takes one incident to shatter that illusion. The author Jon Ronson wrote a book about people whose careless posting on social media had a huge negative impact on their lives, called So You’ve Been Publicly Shamed, which does a great job of exploring the strange public-private dynamic of online spaces.

I’ve honed my online public persona for a number of years (on personal social media, on professional networks like LinkedIn, and on my own websites) and this blog is just another extension of it. I’m quite comfortable with the “voice” I’ve developed, though I’m sure that if someone Googled my name or trawled through my Facebook timeline they could find something I would consider embarrassing.

Standard
Assessments, Networked Media

Blogging and copyright

I posted an extensive set of notes on copyright last year — it’s still a pretty handy overview of copyright law in Australia and I’ve referred to it a few times since I posted it.

The basics are:

  • Copyright is automatic and doesn’t need to be registered, and even unpublished works are subject to copyright
  • Ownership of content can be shared/assigned to another (e.g. employer, or through licensing)
  • Copyright comes with moral rights of attribution and integrity
  • There are exceptions:
    • Fair dealing (research, study, criticism, news reporting, parody), though there are restrictions to what is allowed under fair dealing
    • Education
    • Libraries / archives
    • Cultural institutions and museums

These guidelines are particularly pertinent to bloggers who might use non-free media like images and videos in their posts, or for example critics who quote from works of literature or cinema in order to criticise it. Bloggers have to be careful not to use infringing material in their posts or they may be liable to prosecution.

I’m going to aim to stick to public domain or Creative Commons media in posts where I can’t use my own work.

Standard
Assessments, Networked Media

Blog security, spam and plugins

Security

Any responsible digital citizen needs to be aware of the threat posed by hacking, not just to them but to everyone in their contact list. Hacking can lead to two major issues: identity theft and loss of data, which depending on the victim and the severity of the hacking can lead to serious consequences for the company or individual hacked.

I’m lucky enough to have never fallen victim to hacking in any form yet – emphasis on yet. Ever since I read about Mat Honan’s digital life being destroyed by hackers – which they did for no other reason than they wanted to exploit his valuable three-letter Twitter handle for spam purposes – I’ve been meticulous about my security habits. I generate random passwords with high entropy, save them in a password manager so they don’t have to be easy enough for me to memorise, protect my password manager with a very strong master password, and never use the same password twice so that if I were ever hacked, the hacker wouldn’t be able to compromise my entire digital identity. I also lock down my phone – in a previous life I had the contact details of a number of prominent Australian film industry figures on my phone, and didn’t want to be the one responsible for losing control of them.

Based on all of the above, if this blog were to be hacked by someone all that would be lost is the content I’ve posted here. (And depending on your opinion of my work, that’s not much of a loss.)

The hacker wouldn’t be able to use my password from this blog to access my email, internet banking, or social media profiles. They couldn’t send phishing emails to my friends, send themselves money from my bank account, or post spam links on my Facebook profile. (Also, they wouldn’t be able to send themselves money from my bank account because I don’t have any.)

The last line of defence to data loss is back-ups, which restore a website to a previous state. In most cases regular back-ups are handled by the web hosting provider, in my case edublogs, but I can manually export my content through the WordPress control panel as well.

Spam

I’m old enough to remember the web before spam, and let me tell you: it was paradise. Now, spam is literally everywhere. It is embedded into the very fabric of the internet, and no website is launched without serious time being put into spam prevention. It poses serious threats for online publishers. Not only does it take a lot of moderators’ time to delete spam comments (or manually approve acceptable comments, depending on the comment system), when comments get through they can place some truly objectionable material on innocent websites. Spam can even get you struck off Google’s search results, which is a death sentence for a commercial website.

Ultimately, though, the arms race over spam is a losing battle. Botnets are too large and powerful, there is too much money to be made with shady medications and pornography online, too many people who will fall for extortion rackets. Spam has won, and all we can do is try to minimise its impact. I’ve chosen to disable comments on this blog, which was originally motivated by my belief that they actually add nothing to whatever discourse I’m engaged in, but it’s also a very effective spam prevention method. Spam bots can’t advertise on my blog if they can’t post comments. But for a lot of publishers, disabling comments is not an option for various reasons.

Plugins

One way to fight blog spam on a WordPress blog is to install the Akismet plugin. A plugin is a piece of code that modifies a piece of software so as to change how it works or add new capabilities not available in the default configuration. Today, most publishing software includes a formally supported plugin system that allows people who need specific or niche features to have them without requiring everyone who installs the software to have those features. The two primary sources of plugins are:

  • Officially released and supported plugins written by the first-party software developer (generally for niche features, e.g. Jetpack by the developers of WordPress)
  • Third-party plugins written by independent developers and made available in repositories or as internet downloads (e.g. Akismet)

Since this blog is hosted on RMIT’s Media Factory platform I can’t install Akismet, so I’ve taken a screenshot of another plugin I’ve installed just to show that I can do it:

Standard