PART 1 - INTERNET TERMINOLOGY
Part 1 is an in-depth analysis of key modern internet and cybersecurity concepts, organized into distinct topic areas.
At present, Part 1 have 11 entries. Each topic in turn have various
podcasts, infographics, and, documentation that includes the full thesis and other documents that is intended for novice users, experts, professionals and policy makers.
Internet History
Visit Page
Overview:
This section covers the evolution of the internet, the perceived "clear and present danger" of its current state, and the ethical concerns of its creator. It also introduces essential online safety tools and terms like "Enshittification" and "Planned Obsolescence" as part of a series outline.
IT Experts, Friends and Foes
Visit Page
Overview:
The primary focus is an "Acceptable Use Policy: IT Consultation and Support." It mandates the exclusive use of company-certified IT professionals for all support to mitigate significant security and operational risks associated with unqualified or informal IT advice.
Enshittification
Visit Page
Overview:
Documents define this as the gradual degradation of online platforms (social media, search engines, e-commerce) from high-quality services to low-quality, profit-driven entities, prioritizing corporate interests over the original user experience.
Planned Obsolescence
Visit Page
Overview:
This topic is defined as a business strategy where manufacturers deliberately design products to become outdated or unusable within a predetermined timeframe to encourage continuous consumer purchase.
Echo Chambers
Visit Page
Overview:
This topic, mentioned in promotional material, refers to the theory or belief that a significant portion of internet activity (especially social media) is generated by bots and algorithms rather than real people, suggesting a decline in genuine human interaction online.
Dead Internet Theory
Visit Page
Overview:
This topic, mentioned in promotional material, refers to the theory or belief that a significant portion of internet activity (especially social media) is generated by bots and algorithms rather than real people, suggesting a decline in genuine human interaction online.
Infodemic
Visit Page
Overview:
The content defines an "Infodemic" as an overabundance of accurate and inaccurate information that makes it difficult for people to find trustworthy guidance, especially during a crisis. It details the "Three Faces of Falsehood" (Misinformation, Disinformation, and Malinformation) and the "4 i FACT Framework" for combating it.
Dark Patterns
Visit Page
Overview:
This section focuses on "Deceptive Digital Design & Regulation," which are user interface tricks employed by websites and apps to secretly manipulate users into clicking, buying, or giving away data in ways they may not have intended.
Shadow Banning
Visit Page
Overview:
Documents here discuss "Stealth Content Moderation & Visibility Filtering," or "Algorithmic Throttling," which is the covert practice of an online platform restricting the visibility of a user's posts or content without notifying the user.
Gamification
Visit Page
Overview:
This topic analyzes the use of game-like elements (points, badges, streaks, leaderboards) in non-game contexts to enhance user engagement and motivation. It explores its "Good" use for learning/health, its "Bad" psychological pitfalls, and the "Ugly" ethical issues of manipulation.
Internet Censorship
Visit Page
Overview:
This is a detailed analysis of internet censorship, exploring the tension between protecting society from harmful content and safeguarding freedom of expression. It introduces the information theory concepts of Entropy (disorder) and Complexity (structure) in online systems, with a specific focus on South Africa's Films and Publications Regulations, 2022.