SESSION 17 (1) Pew Internet and American Life Project – explore this resource (2) Deception, Reputation, Community.

Slides:



Advertisements
Similar presentations
Group-awareness for Mobile Cooperative Learning
Advertisements

Connect Nevada Residential Technology Assessment Results.
The benefits and pitfalls of using social media to inform learning and teaching Crowd-sourcing, blogging and blagging Martin Webber 6 th Excellence in.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Managing Online Identity References: Prepared for Trustworthy Computing Group, Microsoft by Cross-Tab Marketing Services.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Transfer of Training Instructor’s notes: This module consists of three 50-minute class sessions (which could be covered in two 75 minute class sessions.
SESSION 20 (1) Peer Production in Online Communities – How are communities like Wikipedia and slashdot collectively run? (2) Theorizing peer production.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Digital Footprints Where have you been? Where are you going?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
Danah boyd IS208BApril 12, 2004 Identity and Deception April 12, 2004 IS 208B.
Qualitative Methods Lisa Harrison: Chapter 5. Qualitative and Quantitative (74) Quantitative: Focuses on the analysis of numerical data (statistics, polling),
Info 203: Social and Organizational Issues of Information Course Introduction: Social Science Perspectives on Information and Information Technology.
Web Pedagogies: Systems Wrap-up and Presentation of Self online.
Computer-Mediated Communication
Coye Cheshire & Andrew Fiore June 23, 2015 // Computer-Mediated Communication CMC in Society.
6 October Impact of Computers (Really). Discussion: Computers in the Arts We’ve seen good and bad androids and robots, programs that take over the world,
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
Coye Cheshire & Andrew Fiore June 26, 2015 // Computer-Mediated Communication CMC & Society.
Coye Cheshire & Andrew Fiore June 28, 2015 // Computer-Mediated Communication Social Presentation.
Chapter 3 Preparing and Evaluating a Research Plan Gay and Airasian
AMHO Conference May 26 The State of Peer Support Work in Ontario: Summary of Findings and Next Steps Toward a Community of Practice.
Equity in Education: From Theory to Practice OECD/Norway Conference June 4, 2007 Ben Levin OISE – University of Toronto.
Wildfire in Colorado: Understanding the role of social interactions and risk perceptions in shaping households’ mitigation behaviors Katie Dickinson Working.
SIMAD University Research Process Ali Yassin Sheikh.
1 Using Technology in ELI Emerging Leaders Institute 2000.
Dr. Gankam Tambo Erick United Nations University - Institute for Environment and Human Security (UNU-EHS) e/merge 2012 Open to Change Framework for virtual.
ITGS Standard Level Mr Gavin Johnson. ITGS The Diploma Programme information technology in a global society (ITGS) course is the study and evaluation.
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
Uichin Lee, Jihyoung Kim *, Eunhee Yi **, Juyup Sung, Mario Gerla * KAIST Knowledge Service Engineering * UCLA Computer Science ** LG UX R&D Lab
Objective 5.02 Understand ethics and ethical decision-making.
ONLINE VS. FACE-TO-FACE: EDUCATOR OPINIONS ON PROFESSIONAL DEVELOPMENT DELIVERY METHODS BY TERESA SCRUGGS THOMAS Tamar AvineriEMS 792x.
SESSION 16 (1) Networked Sociability – an introduction to some themes and concerns of section 3 (2) Pew Internet and American Life Project – explore this.
CHI 2006 Workshop Investigating new user experience challenges in iTV: mobility & sociability Dr. David Geerts Dr. Anxo Cereijo Roibàs Dr. Licia Calvi.
Political Beliefs and Behaviors I Chapter 5 Public Opinion and Political Socialization.
1 MANAGING THE DIGITAL FIRM: CANADA AND BEYOND CANADA AND BEYOND CHAPTER 1.
Is Your Company Security Aware? Presented By: Brian Picard GSEC.
International Conference on Enhancement and Innovation in Higher Education Crowne Plaza Hotel, Glasgow 9-11 June 2015 Welcome.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY
(ITGS) INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY Group 3.
Amanda Lenhart, Senior Researcher, Director of Teens & Technology Mary Madden, Senior Researcher Pew Research Center Family Online Safety Institute November.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
DECONSTRUCTING THE USER: INFORMATION SHARING AND MANAGING IDENTITY I203 Social and Organizational Issues of Information.
Coye Cheshire & Andrew Fiore November 15, 2015 // Computer-Mediated Communication Community, Science, and CMC.
Re-Visioning the Future of University Libraries and Archives through LIBQUAL+ Cynthia Akers Associate Professor and Assessment Coordinator ESU Libraries.
Objectives Describe the challenges involved in measuring public opinion. Explain why scientific opinion polls are the best way to measure public opinion.
Shaping a Health Statistics Vision for the 21 st Century 2002 NCHS Data Users Conference 16 July 2002 Daniel J. Friedman, PhD Massachusetts Department.
Computer Supported Cooperative Work. Informatics 153 – Fall 2008 – Gillian Hayes Agenda Introductions and course information CSCW overview.
Proposed Privacy Taxonomy for IOT Scott Shorter, Electrosoft, These slides are based on work contributed to the IDESG Use Case AHG in January.
SESSION 2 The Sociotechnical Gap, Do Artifacts Have Politics?
CSE 303 – Software Design and Architecture
Janis L. Whitlock Cornell University.   Previous research show that human beings develop in multiple social ecologies but school connectedness and the.
Uncovering Critical Thinking in Social Studies Developed by ERLC/ARPDC as a result of a grant from Alberta Education to support implementation with Wally.
Type author names here Social Research Methods Chapter 28: E-research: Internet research methods Alan Bryman Slides authored by Tom Owens.
“2014 Benchmark Survey Results” 2015 Quality Management Best Practice Series Friday, March 27, 2015.
Public Policy Process and Public Administration
Research Design in Education Research Methods. Describe your research topic What is the nature of the problem and your research question? To answer the.
INTRODUCTION TO THE WIDA FRAMEWORK Presenter Affiliation Date.
Chapter 29 Conducting Market Research. Objectives  Explain the steps in designing and conducting market research  Compare primary and secondary data.
[Presentation location] [Presentation date] (Confirm ABT logo) Building Bridges and Bonds (B3): An introduction.
Implementing the Professional Growth Process Session 3 Observing Teaching and Professional Conversations American International School-Riyadh Saturday,
Presentation Pro © 2001 by Prentice Hall, Inc. Magruder’s American Government C H A P T E R 8 Mass Media and Public Opinion.
They Say, I Say: The Moves That Matter in Academic Writing
Examining the Effect of Crime Prevention Signage Through Social Normative Theory and Attitude Structures Bruce Biggs and Meghan E. Norris Results  Neighborhood.
Trends in Teen Communication: Opportunities and Challenges for Public Health Campaigns Kristen Purcell, Associate Director for Research Amanda Lenhart,
Unit 3- Introduction to Computer Ethics
Understand ethics and ethical decision-making.
Objective 5.02 Understand ethics and ethical decision-making.
Understand ethics and ethical decision-making.
Presentation transcript:

SESSION 17 (1) Pew Internet and American Life Project – explore this resource (2) Deception, Reputation, Community

CONTEXT The current state of national technology adoption – Introduction to the Pew Internet and American Life Project

Ongoing research by non-partisan, non-profit “fact tank” on all matters connected to the Internet Based upon national surveys (in US only) using probability sampling (random digit dialing) Data available (import into SPSS, other statistical analysis packages) Tracking technology adoption trends Topics: health, politics, shopping, religion, etc.

XXXXXX

IDENTITY, DECEPTION, REPUTATION, COMMUNITY the Internet present

Focus of Section 3 Is sociability online different from face to face sociability? What are the, “fundamental architectural differences that affect social interaction?” – boyd How might the answers to the above questions shine some light on distinct challenges we face in designing or managing online social environments and (broadly) networked systems, services, applications that have a social, interactive component?

Platforms for Theory Exploration These people are part of an unfolding role-playing game (circa 1991) Same thing here (circa 2011)

How Social Interaction is Shaped Online Architectural Elements: Kill-files (block, ban function) Anonymity/Pseudonymity configurations etc Social Conventions: Administrative, Policy Level, Moderators Peer to peer social enforcement – “plonk!”

Identity (Donath) Sparseness(?) of identity cues online Assessment signals - costly but reliable Conventional signals – employed in deception Resources for self-presentation online are different Expressions given vs. expressions given off (Goffman) No automatic bodily self-presentation What signals are given by an address?

Reputation and Review Systems Business considerations - security and predictability of transactions online: Online buyers and sellers Crowdsourcing vs. expert / professional evaluations: Professionals – doctors, lawyers, etc. Sex offenders Restaurants, hotels Movies

Consequences of a damaged reputation

Deception Trolls (online behavior intended to generate social discord conflict) Sockpuppets Impersonation Concealment? When is an online ‘deception’ regarded as a violation, a problem? When isn’t it? Examples?

4chan and /b/ Anonymity (not just available but widely used – 90.07% of posts) Ephemerality (contributions disappear quickly, no archive – 3.9 min avg lifespan of post) Yet somehow users manage to do community- like things including signaling status and membership, invite ongoing participation, and inciting coordinated actions

Summary anonymity vs. pseudonymity (not the same!) vs. authenticatable identity – When you say ‘anonymous’ do you really mean ‘psuedonymous?’ Architectural elements vs. social conventions (formal moderators, emergent user practices) Deception – definition depends on the platform/context

For Thursday Pick one… Ackerman, The Intellectual Challenge of CSCW… ‘Do Artifacts Have Politics?’ Vineyard Computing 4chan and /b/ To prepare, revisit the reading, bring a copy of the reading to class: What is the problem space this reading addresses? What is its argument (or arguments)?