###### tags: `CDA`
# Reading Responses (Set 1)
- Checklist for a [good reading response](https://reagle.org/joseph/zwiki/Teaching/Best_Practices/Learning/Writing_Responses.html) of 250-350 words
- [ ] Begin with a punchy start.
- [ ] Mention specific ideas, details, and examples from the text and earlier classes.
- [ ] Offer something novel that you can offer towards class participation.
- [ ] Check for writing for clarity, concision, cohesion, and coherence.
- [ ] Send to professor with “hackmd” in the subject, with URL of this page and markdown of today’s response.
## Reading responses 5 out of 5
***Sep 20 Tue - How the web works***
"How does HTTPS actually work?" Is the central question being explored in the article "How HTTPS Secures Connections: What Every Web Dev Should Know" by Hartly Brody. It is evident how the author highlights the importance of security and precautions within a web page due to how sensitive information such as passwords and credit card data can go over a simple connection and can be easily accessed by unwanted people if these don't exist. And to me, it is very interesting how the article explains the different terms and features used to secure a website and ensure malicious users won't access critical information. I wasn't aware that this process is more complex and doesn't happen by default since many organizations must transfer a single web request to ensure information safety. I never knew that things like Transport Layer Security (Cryptography, the practice of protecting communication against adversaries), Public Key Encryption (Cryptographic system where parties have a public and private key linked), Symmetric Key Encryption, Authentication, and Certificates came into play to prevent a web page's essential information from falling into the wrong person's hands.
Moreover, before reading this article, I never knew all the steps and methods used to seek a website's safety. My entire life, I noticed how most sites on the internet had that HTTPS abbreviation at the start of the link, but I never gained the curiosity to understand what that meant or what it did until now. However, after this reading, I gained an understanding of the function this simple HTTPS abbreviation plays in the security of internet websites.
***Oct 04 Tue - Cooperation***
* Why do we cooperate, and when and why do we fail to do so? How might the concepts you read about apply to what we see online?
"Reward leads to more creative forms of cooperation than punishment," If you think about it, this makes perfect sense. In a world where you seek benefits/rewards and find them accessible by contributing, it should be human nature to go for that. *Super Cooperators* by Nowak describes how cooperation can be driven by different reasons and explains how it can be caused or motivated by self-interest. Humans act selfishly, seeking the best outcome possible for themselves, which is, for instance, supported by the Prisoner's Dilemma and the Punish and Perish. However, by cooperating, someone could enjoy the best outcome, which is highly evident in the Prisoner's Dilemma explanation. In this dilemma, self-interest and avoiding contribution can lead to both sides obtaining the bare minimum. However, if both sides were smart and decided to contribute, it would mean at least one person would get a better outcome instead of both receiving the same but the worst by acting selfishly and defecting. This is interesting to think about since cooperating would make at least one of the two get a better outcome, yet both sides still choose to defect and remain with less than if they were to cooperate and avoid acting selfishly. Therefore, to answer the question above, we cooperate when we see the quickest method to a possible reward. And a way we can apply this to what we see online is by avoiding the spread of fake news. For instance, we might come across a post that matches our beliefs and sense the urge to repost it, but it is always best to fact-check the source and investigate if the information is correct before misinforming others. This way, we are helping ourselves be aware of what is truly happening and helping other people online know the reality, creating trust.
***October 11th Tue - Haters:***
- Why does digital communication give rise to such toxic behavior, including that of haters and that seen in “bully battles”?
One of the reasons digital communication gives rise to hate is because, most of the time, people feel more comfortable commenting on things behind their phone screens rather than in person. It is much more convenient and easier to say something negative to someone you can’t physically see because the logistics immediately think, “There is no way this individual will get to me. Therefore, the consequences won’t be as bad”. And relevantly, being anonymous adds to this hatred and toxic behavior since these comments can be easily spread by someone who chooses to be anonymous and not display their identity. This occurs because regardless of their unethical actions, these won’t be linked to that person’s name. For instance, this can connect with Nogami’s conclusion of suggesting that asking individuals to identify themselves could have made them more aware of their ethical standards even when they were not linked to unethical behavior. This makes perfect sense because, for Haters, it can be easier to state their negative argument when their name is nowhere to be found.
Lastly, it is important to note how this kind of hate, cyberbullying, or negative commentary can easily damage someone’s hard work. Similar to what was stated in the reading, posting malicious reviews on an author’s book can easily damage their hard work. These bullies sometimes don’t even consider reading books posted by authors on Goodreads they claim to hate, and yet they still feel the freedom to comment something negative on that book, making it hard for authors to profit off of their hard work. Therefore, it is due to this easy access that haters or bullies can obtain such toxic behavior through today’s technology and digital communication.
***Oct 14 Fri- Exam Review***
* #### Two multiple choice questions:
##### What is NOT an example of a growth mindset?
a) Embracing new challenges every day.
b) Avoiding obstacles, to make sure things go your way.
c) Learning from people’s criticism.
d) Putting in the effort because you need to.
Answer/explanation: Option B is correct. A person with a growth mindset is always looking to improve and move forward. Therefore, obstacles are not something they avoid, instead these individuals persist through these.
#### People with a ______ mindset are more likely to view critical feedback as a personal attack.
a) Fixed
b) Growth
c) Beginner’s
d) Performance
Answer/explanation: Option A is correct. Those with a fixed mindset view critical feedback as an attack instead of seeing these comments as an opportunity to grow and become better in the future.
* #### Two short/essay questions:
#### What is the tragedy of commons (TOC), explain some examples viewed in class.
The tragedy of the commons is known as both non-exclusive and rivalrous. So, for instance, in class, we viewed a video explaining how many farmers brought their cows to the commons so they could eat grass, but as more farmers brought more cows, there wasn't enough food/grass for all cows. We can also apply this to Northeastern accepting more people than expected since student resources became harder to take advantage of, and there was a lack of dorm space for students in the university.
#### What characteristics make a public good a public good? What’s the importance of this concept?
The two things that categorize a public good are that they are non-exclusive and non-rivalrous. Therefore, a public good would be something any individual could use while not affecting someone else. One example could be a lighthouse. This consumption wouldn't impact someone else, and regardless of who paid for this lighthouse, it is still out there for anyone's benefit.
***Oct 21 Fri - Gender, communication, & contribution***
- How does gender figure into digital communication, participation, and contribution?
It is certainly interesting how these readings highlight the difference in ways of thinking between men and women and how these perspectives influence their engagement in Social Network Services. Research has shared results that indicate men and women engage differently in SNS and how many factors influence their participation and contribution across different media platforms. For instance, findings indicated how women feel the desire to contribute and engage in SNS to maintain close ties with close relationships and gain information regarding the lives of these individuals. As a female, I resonated with this because one of my primary reasons for engaging in media platforms such as Instagram and WhatsApp are to stay connected with my family and friends from back home in the Dominican Republic. I'm always interested in learning more about the people I'm already close to, but I'm also very open to making new connections, which is why I couldn't fully link with all of the research that was stated in this reading. On the other hand, it is interesting how findings revealed that men are likely to engage in SNS to collect information and be more informed on topics of interest that might transmit some benefit to them, whether it is for enhancing their position in a more extensive network or another reason.
It is more than evident how gender plays a significant role in digital communication and individuals' participation in it. Therefore, it is amusing how from birth, we find different reasons for our contribution to the digital communication world depending on where our priorities lay.