{"id":23639,"date":"2024-04-30T13:24:37","date_gmt":"2024-04-30T13:24:37","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/surveillance-culture-exploring-the-integration-of-surveillance-practices-in-everyday-life-through-the-lens-of-small-red-book-platform\/"},"modified":"2024-04-30T13:24:37","modified_gmt":"2024-04-30T13:24:37","slug":"surveillance-culture-exploring-the-integration-of-surveillance-practices-in-everyday-life-through-the-lens-of-small-red-book-platform","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/surveillance-culture-exploring-the-integration-of-surveillance-practices-in-everyday-life-through-the-lens-of-small-red-book-platform\/","title":{"rendered":"Surveillance Culture: Exploring the Integration of Surveillance Practices in Everyday Life through the Lens of Small Red Book Platform"},"content":{"rendered":"<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Indicative essay structure<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">:<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Introduction:<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Background and significance of social media surveillance<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Rationale for selecting the Small Red Book <\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">platform as the study subject<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Objectives and methodology overview<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">1<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">: Theoretical Framework of Social Media Surveillance<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">1.1<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Definition and classification of social media surveillance<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">1.2<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Application of surveillance practices on social media platforms<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">1.3<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Relationship between social media surveillance, individual privacy, and societal control<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">2<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">: Surveillance Practices on Small Red Book Platform<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">2.1<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Overview and characteristics of the Small Red Book platform<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">2.2<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Data collection and personal information management mechanisms<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">2.3<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">User behavior analysis and personalized recommendation algorithms<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">2.4<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Targeted advertising and social influence assessment<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">3 Case study: Influencer analysis on the Xiaohongshu platform:<\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">3.1 Select an influencer in the beauty and lifestyle segments on the Little Red Book platform<\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">&nbsp;3.2 Describe the influencer&#8217;s profile, content style and audience engagement<\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">&nbsp;3.3 Examine the monitoring methods used by the influencer and the platform&nbsp;<\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">&nbsp;Results and Analysis:<\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">&nbsp;3.4 Identify monitoring behaviours observed from the influencer&#8217;s content and interactions&nbsp;<\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">3.5 Analyse user attitudes towards surveillance behaviours, including perceptions of privacy and autonomy&nbsp;<\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">3.6 Discuss the impact of surveillance behaviours on user experience and the digital culture of the Little Red Book platform<br \/><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">4<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">: Ethical and Legal Implications of Social Media Surveillance<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">4.1<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Challenges and impacts of surveillance practices on individual privacy rights<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">4.2<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Effects of surveillance practices on social equity and justice<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Conclusion:<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Summarize surveillance practices on the Small Red Book platform and their impact on everyday life<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Discuss the significance and challenges of surveillance practices for individuals and society<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">&nbsp;<\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><br \/><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Use the concepts:<\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Foucault:<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">1<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">.<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">The uses of social media can be viewed as a quest for emotional intensity that manifests itself in brief focused moments of attention. Within the framework of the attention economy, attention is discussed as a valuable commodity, whereas distraction involves pleasurable entertainment and a disconcerting sense of disorientation, associated with cognitive overload and lack of concentration.Attention and distraction should not be understood as opposites, but rather as two sides of the same coin.<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">2.In a widely watched society, people will self-watch because they know they can be observed at any time. Social media reinforces this.<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">3.Defining what is the ideal body shape through health and beauty standards, which in turn leads people to follow a certain lifestyle and consumption pattern<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">\u3002<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">&nbsp;<\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Feminist\uff1a<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n<p style=\"padding: 1pt 4pt; cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">1.<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">Through social media, women are able to redefine their image and thus move away from the (mis)representation that has long been criticised by the advertising and entertainment industries. In addition, social media have created alternative spaces for women to explore their identities, build shared experiences, and engage in political discourse. These women&#8217;s spaces often place the issue of the &#8216;body&#8217; at the centre of their feminist practices through social media, based on the idea that the &#8216;personal is political&#8217;. Through social media, women have been able to challenge the traditionally clear distinction between the &#8216;public&#8217; and the &#8216;private&#8217; and to situate their personal experiences within the wider context of women&#8217;s shared experiences.&nbsp;<\/span><\/b><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 11pt; cursor: auto; color: inherit;\"><\/span><\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Indicative essay structure: Introduction: Background and significance of social media surveillance Rationale for selecting the Small Red Book platform as the study subject Objectives and methodology overview 1: Theoretical Framework of Social Media Surveillance 1.1Definition and classification of social media surveillance 1.2Application of surveillance practices on social media platforms 1.3Relationship between social media surveillance, individual [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/23639"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=23639"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/23639\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=23639"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=23639"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=23639"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=23639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}