SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
Auto-biography, Mobile Social
Life-Logging, and the transition
   from ephemeral to archival
            society

                  Marc A. Smith
               Chief Social Scientist
                     Telligent
             Marc.Smith@telligent.com
    Studying Society in a Digital World – Princeton University
                         April 24th, 2009
Patterns are left behind
                     2
Many organizations are
adopting social media


• Use of these tools creates data sets that map their
  internal social network structure as an accidental by-
  product.
• Studying these data is sets is a focus of growing
  interest.
• Research projects like SenseCam are now becoming
  products and services like nTag, Spotme, Fire Eagle,
  and Google Latitude while devices like iPhone and
  G1 are weaving location into every application.
Information wants to be copied
Bits exist along a gradient
        from private to public.

But in practice they only move in one direction.
Strong links
 between
people and
 content…
…are as str
as the weakest
Cryptography weakens over time
      •     Eventually, private
             bits, even when
           encrypted, become
           public because the
          march of computing
           power makes their
                encryption
          increasingly trivial to
                   break.
No one expects
privacy to be
perfect in the
physical world.
Unintended cascades
Taking a photo or updating a status message can
now set off a series of unpredictable events.
Additional sensors will collect medical data to
improve our health and safety, as early adopters
in the quot;Quantified Selfquot; movement make clear.
Continuous data collection

               Microsoft Research,
               Cambridge, UK:
               “SenseCam”
When my phone notices your phone

              a new set of
  mobile social software applications
         become possible that
   capture data about other people
            as they beacon
    their identifies to one another.
Interactionist
  Sociology

• Central tenet
   – Focus on the active effort of
     accomplishing interaction
• Phenomena of interest
   –   Presentation of self
   –   Claims to membership
   –   Juggling multiple (conflicting) roles
   –   Frontstage/Backstage
   –   Strategic interaction
   –   Managing one’s own and others’ “face”
• Methods
   – Ethnography and participant observation

   (Goffman, 1959; Hall, 1990)
Innovations in the interaction order:

45,000 years ago: Speech, body adornment
10,000 years ago: Amphitheater
 5,000 years ago: Maps
   150 years ago: Clock time

    -2 years from now: machines with
                       social awareness
17
Sensors, Routes, Community
     Community Aspects: A Sociological Revolution?

   SpotMe: Wireless device for meetings and events
19
Trace Encounters: http://www.traceencounters.org/
21
Social Network
 Theory
• Central tenet
    – Social structure emerges from
      the aggregate of relationships (ties)
      among members of a population
• Phenomena of interest
    – Emergence of cliques and clusters
      from patterns of relationships
    – Centrality (core), periphery (isolates),      Source: Richards,
      betweenness                                   W. (1986). The
                                                    NEGOPY network
• Methods                                           analysis program.
                                                    Burnaby, BC:
    – Surveys, interviews, observations, log file   Department of
      analysis, computational analysis of           Communication,
      matrices                                      Simon Fraser
                                                    University. pp.7-16
  (Hampton &Wellman, 1999; Paolillo,
  2001; Wellman, 2001)
24
Patterns of connection
               may uniquely identify

De-anonymizing Social Networks
Arvind Narayanan & Vitaly Shmatikov
http://33bits.org/2009/03/19/de-anonymizing-social-networks/

Abstract:
Operators of online social networks are increasingly sharing potentially sensitive information
about users and their relationships with advertisers, application developers, and data-mining
researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.
We present a framework for analyzing privacy and anonymity in social networks and develop a
new re-identification algorithm targeting anonymized social-network graphs. To demonstrate its
effectiveness on real-world networks, we show that a third of the users who can be verified to
have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo-
sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate. Our
de-anonymization algorithm is based purely on the network topology, does not require creation
of a large number of dummy “sybil” nodes, is robust to noise and all existing defenses, and works
even when the overlap between the target network and the adversary’s auxiliary information is
small.
Distinguishing attributes:
        • Answer person
          – Outward ties to local isolates
          – Relative absence of triangles
          – Few intense ties


        • Reply Magnet
          – Ties from local isolates often
            inward only
          – Sparse, few triangles
          – Few intense ties


                                             26
Distinguishing attributes:
        • Answer person
          – Outward ties to local isolates
          – Relative absence of triangles
          – Few intense ties


        • Discussion person
          – Ties from local isolates often
            inward only
          – Dense, many triangles
          – Numerous intense ties


                                             27
http://w


NodeXL

Network
Overview
Discovery
Exploration
Tag Ecologies I




       Adamic et al. WWW 2008
Result: lives that are more publicly
    displayed than ever before.

 Add potential improvements in audio and facial
   recognition and a new world of continuous
      observation and publication emerges.

Some benefits, like those displayed by the Google
  Flu tracking system, illustrate the potential for
       insight from aggregated sensor data.

  More exploitative applications are also likely.
Auto-biography, Mobile Social
Life-Logging, and the transition
   from ephemeral to archival
            society

                  Marc A. Smith
               Chief Social Scientist
                     Telligent
             Marc.Smith@telligent.com
    Studying Society in a Digital World – Princeton University
                         April 24th, 2009

Weitere ähnliche Inhalte

Was ist angesagt?

2000 - CSCW - Conversation Trees and Threaded Chats
2000  - CSCW - Conversation Trees and Threaded Chats2000  - CSCW - Conversation Trees and Threaded Chats
2000 - CSCW - Conversation Trees and Threaded Chats
Marc Smith
 
2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks
Marc Smith
 
Suazo, martínez & elgueta english version
Suazo, martínez & elgueta english versionSuazo, martínez & elgueta english version
Suazo, martínez & elgueta english version
2011990
 
Internet Not So Isolating, Study Finds
Internet Not So Isolating, Study FindsInternet Not So Isolating, Study Finds
Internet Not So Isolating, Study Finds
David Ricker
 
Suazo%2c martínez & elgueta english version
Suazo%2c martínez & elgueta english versionSuazo%2c martínez & elgueta english version
Suazo%2c martínez & elgueta english version
2011990
 
Social_Networking_lab_10_30a
Social_Networking_lab_10_30aSocial_Networking_lab_10_30a
Social_Networking_lab_10_30a
webuploader
 
Final thesis preso april 2013
Final thesis preso april 2013Final thesis preso april 2013
Final thesis preso april 2013
Molly Sauter
 
SkinnerJ_FinalPaper
SkinnerJ_FinalPaperSkinnerJ_FinalPaper
SkinnerJ_FinalPaper
Jake Skinner
 

Was ist angesagt? (20)

Network Structure For Social Network
Network Structure For Social NetworkNetwork Structure For Social Network
Network Structure For Social Network
 
2000 - CSCW - Conversation Trees and Threaded Chats
2000  - CSCW - Conversation Trees and Threaded Chats2000  - CSCW - Conversation Trees and Threaded Chats
2000 - CSCW - Conversation Trees and Threaded Chats
 
2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks2009-Social computing-Analyzing social media networks
2009-Social computing-Analyzing social media networks
 
Suazo, martínez & elgueta english version
Suazo, martínez & elgueta english versionSuazo, martínez & elgueta english version
Suazo, martínez & elgueta english version
 
Internet Not So Isolating, Study Finds
Internet Not So Isolating, Study FindsInternet Not So Isolating, Study Finds
Internet Not So Isolating, Study Finds
 
The Internet is a magnifying glass
The Internet is a magnifying glassThe Internet is a magnifying glass
The Internet is a magnifying glass
 
Overview of Social Networks
Overview of Social NetworksOverview of Social Networks
Overview of Social Networks
 
Simplifying Social Network Diagrams
Simplifying Social Network Diagrams Simplifying Social Network Diagrams
Simplifying Social Network Diagrams
 
2009 - Node XL v.84+ - Social Media Network Visualization Tools For Excel 2007
2009 - Node XL v.84+ - Social Media Network Visualization Tools For Excel 20072009 - Node XL v.84+ - Social Media Network Visualization Tools For Excel 2007
2009 - Node XL v.84+ - Social Media Network Visualization Tools For Excel 2007
 
AAPOR - comparing found data from social media and made data from surveys
AAPOR - comparing found data from social media and made data from surveysAAPOR - comparing found data from social media and made data from surveys
AAPOR - comparing found data from social media and made data from surveys
 
Suazo%2c martínez & elgueta english version
Suazo%2c martínez & elgueta english versionSuazo%2c martínez & elgueta english version
Suazo%2c martínez & elgueta english version
 
Social_Networking_lab_10_30a
Social_Networking_lab_10_30aSocial_Networking_lab_10_30a
Social_Networking_lab_10_30a
 
Online social network mining current trends and research issues
Online social network mining current trends and research issuesOnline social network mining current trends and research issues
Online social network mining current trends and research issues
 
Horizon_INACAP
Horizon_INACAPHorizon_INACAP
Horizon_INACAP
 
Civil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedCivil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods Upgraded
 
Making the invisible visible through SNA
Making the invisible visible through SNAMaking the invisible visible through SNA
Making the invisible visible through SNA
 
Final thesis preso april 2013
Final thesis preso april 2013Final thesis preso april 2013
Final thesis preso april 2013
 
Making More Sense Out of Social Data
Making More Sense Out of Social DataMaking More Sense Out of Social Data
Making More Sense Out of Social Data
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
 
SkinnerJ_FinalPaper
SkinnerJ_FinalPaperSkinnerJ_FinalPaper
SkinnerJ_FinalPaper
 

Ähnlich wie Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral to Archival Society

Future of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP ReportFuture of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP Report
Vasily Ryzhonkov
 
COSMOS
COSMOSCOSMOS
COSMOS
NSMNSS
 
Cyberculture Lecture2.Key
Cyberculture Lecture2.KeyCyberculture Lecture2.Key
Cyberculture Lecture2.Key
Jude Yew
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
IAEME Publication
 

Ähnlich wie Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral to Archival Society (20)

2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis2009 - Connected Action - Marc Smith - Social Media Network Analysis
2009 - Connected Action - Marc Smith - Social Media Network Analysis
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
Digital Life in 2025
Digital Life in 2025Digital Life in 2025
Digital Life in 2025
 
Future of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP ReportFuture of the Internet Predictions March 2014 PIP Report
Future of the Internet Predictions March 2014 PIP Report
 
DIGITAL LIFE IN 2025
DIGITAL LIFE IN 2025DIGITAL LIFE IN 2025
DIGITAL LIFE IN 2025
 
Ties
TiesTies
Ties
 
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and WebOpen Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
 
E223539
E223539E223539
E223539
 
COSMOS
COSMOSCOSMOS
COSMOS
 
Cyberculture Lecture2.Key
Cyberculture Lecture2.KeyCyberculture Lecture2.Key
Cyberculture Lecture2.Key
 
Social networks in schools
Social networks in schoolsSocial networks in schools
Social networks in schools
 
Frontiers of Computational Journalism week 8 - Visualization and Network Anal...
Frontiers of Computational Journalism week 8 - Visualization and Network Anal...Frontiers of Computational Journalism week 8 - Visualization and Network Anal...
Frontiers of Computational Journalism week 8 - Visualization and Network Anal...
 
Simulating online privacy. Ethno-computational insights
Simulating online privacy. Ethno-computational insightsSimulating online privacy. Ethno-computational insights
Simulating online privacy. Ethno-computational insights
 
Attitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremAttitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measurem
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures
 
01 Introduction to Networks Methods and Measures (2016)
01 Introduction to Networks Methods and Measures (2016)01 Introduction to Networks Methods and Measures (2016)
01 Introduction to Networks Methods and Measures (2016)
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...
 
10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)
 

Mehr von Marc Smith

20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …
Marc Smith
 
2011 IEEE Social Computing Nodexl: Group-In-A-Box
2011 IEEE Social Computing Nodexl: Group-In-A-Box2011 IEEE Social Computing Nodexl: Group-In-A-Box
2011 IEEE Social Computing Nodexl: Group-In-A-Box
Marc Smith
 

Mehr von Marc Smith (20)

How to use social media network analysis for amplification
How to use social media network analysis for amplificationHow to use social media network analysis for amplification
How to use social media network analysis for amplification
 
Think link what is an edge - NodeXL
Think link   what is an edge - NodeXLThink link   what is an edge - NodeXL
Think link what is an edge - NodeXL
 
2017 05-26 NodeXL Twitter search #shakeupshow
2017 05-26 NodeXL Twitter search #shakeupshow2017 05-26 NodeXL Twitter search #shakeupshow
2017 05-26 NodeXL Twitter search #shakeupshow
 
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
 
20151001 charles university prague - marc smith - node xl-picturing political...
20151001 charles university prague - marc smith - node xl-picturing political...20151001 charles university prague - marc smith - node xl-picturing political...
20151001 charles university prague - marc smith - node xl-picturing political...
 
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
 
2015 pdf-marc smith-node xl-social media sna
2015 pdf-marc smith-node xl-social media sna2015 pdf-marc smith-node xl-social media sna
2015 pdf-marc smith-node xl-social media sna
 
2014 TheNextWeb-Mapping connections with NodeXL
2014 TheNextWeb-Mapping connections with NodeXL2014 TheNextWeb-Mapping connections with NodeXL
2014 TheNextWeb-Mapping connections with NodeXL
 
Think Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming SkillsThink Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming Skills
 
20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion20130724 ted x-marc smith-digital health futures empowerment or coercion
20130724 ted x-marc smith-digital health futures empowerment or coercion
 
2013 passbac-marc smith-node xl-sna-social media-formatted
2013 passbac-marc smith-node xl-sna-social media-formatted2013 passbac-marc smith-node xl-sna-social media-formatted
2013 passbac-marc smith-node xl-sna-social media-formatted
 
2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis
 
20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...
 
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
 
2012 ona practitioner-courseflyer
2012 ona practitioner-courseflyer2012 ona practitioner-courseflyer
2012 ona practitioner-courseflyer
 
20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …
 
20120301 strata-marc smith-mapping social media networks with no coding using...
20120301 strata-marc smith-mapping social media networks with no coding using...20120301 strata-marc smith-mapping social media networks with no coding using...
20120301 strata-marc smith-mapping social media networks with no coding using...
 
20111123 mwa2011-marc smith
20111123 mwa2011-marc smith20111123 mwa2011-marc smith
20111123 mwa2011-marc smith
 
20111103 con tech2011-marc smith
20111103 con tech2011-marc smith20111103 con tech2011-marc smith
20111103 con tech2011-marc smith
 
2011 IEEE Social Computing Nodexl: Group-In-A-Box
2011 IEEE Social Computing Nodexl: Group-In-A-Box2011 IEEE Social Computing Nodexl: Group-In-A-Box
2011 IEEE Social Computing Nodexl: Group-In-A-Box
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral to Archival Society

  • 1. Auto-biography, Mobile Social Life-Logging, and the transition from ephemeral to archival society Marc A. Smith Chief Social Scientist Telligent Marc.Smith@telligent.com Studying Society in a Digital World – Princeton University April 24th, 2009
  • 2. Patterns are left behind 2
  • 3. Many organizations are adopting social media • Use of these tools creates data sets that map their internal social network structure as an accidental by- product. • Studying these data is sets is a focus of growing interest. • Research projects like SenseCam are now becoming products and services like nTag, Spotme, Fire Eagle, and Google Latitude while devices like iPhone and G1 are weaving location into every application.
  • 5. Bits exist along a gradient from private to public. But in practice they only move in one direction.
  • 7. …are as str as the weakest
  • 8. Cryptography weakens over time • Eventually, private bits, even when encrypted, become public because the march of computing power makes their encryption increasingly trivial to break.
  • 9. No one expects privacy to be perfect in the physical world.
  • 10. Unintended cascades Taking a photo or updating a status message can now set off a series of unpredictable events.
  • 11. Additional sensors will collect medical data to improve our health and safety, as early adopters in the quot;Quantified Selfquot; movement make clear.
  • 12.
  • 13. Continuous data collection Microsoft Research, Cambridge, UK: “SenseCam”
  • 14. When my phone notices your phone a new set of mobile social software applications become possible that capture data about other people as they beacon their identifies to one another.
  • 15. Interactionist Sociology • Central tenet – Focus on the active effort of accomplishing interaction • Phenomena of interest – Presentation of self – Claims to membership – Juggling multiple (conflicting) roles – Frontstage/Backstage – Strategic interaction – Managing one’s own and others’ “face” • Methods – Ethnography and participant observation (Goffman, 1959; Hall, 1990)
  • 16. Innovations in the interaction order: 45,000 years ago: Speech, body adornment 10,000 years ago: Amphitheater 5,000 years ago: Maps 150 years ago: Clock time -2 years from now: machines with social awareness
  • 17. 17
  • 18. Sensors, Routes, Community Community Aspects: A Sociological Revolution? SpotMe: Wireless device for meetings and events
  • 19. 19
  • 21. 21
  • 22.
  • 23. Social Network Theory • Central tenet – Social structure emerges from the aggregate of relationships (ties) among members of a population • Phenomena of interest – Emergence of cliques and clusters from patterns of relationships – Centrality (core), periphery (isolates), Source: Richards, betweenness W. (1986). The NEGOPY network • Methods analysis program. Burnaby, BC: – Surveys, interviews, observations, log file Department of analysis, computational analysis of Communication, matrices Simon Fraser University. pp.7-16 (Hampton &Wellman, 1999; Paolillo, 2001; Wellman, 2001)
  • 24. 24
  • 25. Patterns of connection may uniquely identify De-anonymizing Social Networks Arvind Narayanan & Vitaly Shmatikov http://33bits.org/2009/03/19/de-anonymizing-social-networks/ Abstract: Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc. We present a framework for analyzing privacy and anonymity in social networks and develop a new re-identification algorithm targeting anonymized social-network graphs. To demonstrate its effectiveness on real-world networks, we show that a third of the users who can be verified to have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo- sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate. Our de-anonymization algorithm is based purely on the network topology, does not require creation of a large number of dummy “sybil” nodes, is robust to noise and all existing defenses, and works even when the overlap between the target network and the adversary’s auxiliary information is small.
  • 26. Distinguishing attributes: • Answer person – Outward ties to local isolates – Relative absence of triangles – Few intense ties • Reply Magnet – Ties from local isolates often inward only – Sparse, few triangles – Few intense ties 26
  • 27. Distinguishing attributes: • Answer person – Outward ties to local isolates – Relative absence of triangles – Few intense ties • Discussion person – Ties from local isolates often inward only – Dense, many triangles – Numerous intense ties 27
  • 29.
  • 30. Tag Ecologies I Adamic et al. WWW 2008
  • 31.
  • 32. Result: lives that are more publicly displayed than ever before. Add potential improvements in audio and facial recognition and a new world of continuous observation and publication emerges. Some benefits, like those displayed by the Google Flu tracking system, illustrate the potential for insight from aggregated sensor data. More exploitative applications are also likely.
  • 33. Auto-biography, Mobile Social Life-Logging, and the transition from ephemeral to archival society Marc A. Smith Chief Social Scientist Telligent Marc.Smith@telligent.com Studying Society in a Digital World – Princeton University April 24th, 2009