SlideShare a Scribd company logo
1 of 18
Citizen centric approaches to
Social Media analysis (CaSMa)
Ansgar Koene
Derek McAuley, Tom Rodden, Claire O’Malley, Svenja Adolphs,
Elvira Perez Vellejos, Ramona Statache, Christopher Carter
Social Media Analysis
• Understanding the ways people use social media and what
this means for individuals and society.
• Understanding social phenomena and events expressed in
social media by drawing upon social media as a critical, and
timely, source of information.
Citizen centric approaches
• The development of facilities and approaches that are
sensitive to the personal nature of human data;
• The promotion of responsible innovation in the capture,
analysis and use of human data.
Citizen centric approaches to Social Media
Analysis – what does this mean?
• Social Media analytics is experiencing explosive growth
Why citizen centric approaches to
Social Media analysis?
Social media-related research in tourism and hospitality
Zeng & Gerritsen, 2014
• We do Social Media analysis for:
– Scientific curiosity, to gain insight into the ‘human condition’
and ‘how society works’
– To help people live better lives by increasing the efficiency of
cities, health services etc.
• We follow the ethics guidelines and avoid linking of data/results
to specific individuals.
• However:
– The results from our research can/are used outside of the
scientific community (corporations, intelligence agencies etc.)
Why should this raise concerns?
• Facebook – “our algorithms decide what you see
and how you feel”
Social Medial research with
questionable ethics
• OkCupid – “our algorithms manipulate your love
life”
Social Medial research with
questionable ethics
• NSA/GCHQ, etc.
– Michele Catalano household web-search for pressure cooker
and backpack resulted in being raided by the ‘joint terrorism
task force’ (Sharwood, 2013)
• Google and other advertisers use Social Media analysis to
target advertising
– the 100 most widely used websites are monitored by more
than 1,300 firms (TRUSTe, cited in the Economist Sept 13, 2014)
• Growing distrust by the public who fear being manipulated
Non-research applications of SMa
• There is a need for greater transparency in the research use
of new forms of data, maximising the gains in knowledge
derived from such data while minimising the risks to
individuals’ privacy, seeking to retain public confidence in
scientific research which makes use of new forms of data.
- OECD New Data for Understanding the Human Condition: International
Perspectives
Implications for research
• The importance of “Small Data”
– Human data is intimate and personal, not big and
aggregated
• The need to be “Ethical by Design”
– Responsible innovation should be built into the tools
and approaches
• Putting people at the centre of human data
– Move from a transactional model where people are
severed from their data to a model where people
hold their data
a Citizen Centric approach
Problems:
• Balance of power
– Participants loose all control once data is submitted to the
central database
• Security
– high profile target containing more data than necessary
Redesigning – data ownership
Standard Approach
Central
Database
(held by
researchers)
Participant 1
Participant 2
Participant n
Third party
(researcher)
query results
data query
Redesigning – data ownership
Decentralized ‘ethics by design’ approach
P1
Personal
container
Participant 1
data
Participant 2
Participant 3
P3
Personal
container
P2
Personal
container
data
data
Request
distributor
data request
data request
data request
Third party
(researcher)
Reply
integration
confirmation
confirmation
confirmation
Advantages:
• Privacy – responses to data requests can be ID-free/use-and-
dispose-IDs (sent via through TOR network)
• Transparency – Confidence – Trust
– Data cross-referencing requires posting of combined
information request, allowing participant side check of risk
of de-anonymization.
• Security
– Distributed data storage reduces value of individual
targets.
Redesigning – data ownership
• Dataware (Horizon, UoN)
– Personal Containers
• Ma3tch (FIU.net, EU)
Existing implementations
Udo Kroon, 2013
Financial Investigation Unit
• Open Data agenda by government and research councils
– Concerns regarding privacy when large databases are
merged  de-anonymization
– Third-party re-use of data related to an (anonymized)
individual, via an Open Data repository, is almost
guaranteed to violate the Code of EU Online Rights.
• Responsibility of academics to provide an example to
industry concerning possibility of doing ethical Social Media
analysis that is useful but also respects people’s privacy.
Further reasons for citizen centric
“ethical by design”
Citizen centric approaches to Social Media analysis that
• pro-actively considers ethical and privacy implications by
• employing “ethical by design” methods, can
• provide transparency of the research use of social media data
• minimize the risks to individuals’ privacy, thus
• safeguarding the trust and cooperation of the public and
• maximising the gains in knowledge derived from such data.
Conclusion
http://www.horizon.ac.uk/Projects/casma-citizen-centric-
approaches-to-social-media-analaysis
http://casmaresearch.wordpress.com/
https://twitter.com/CaSMaResearch
https://www.facebook.com/CaSMaResearch
https://www.linkedin.com/groups/CaSMa-Citizen-Centric-
Approaches-Social-8185094
Ansgar.Koene@nottingham.ac.uk
1. …. The data that individuals provide directly or indirectly must not be used
for purposes other than originally intended. Nor can such data be passed
on indiscriminately to entities that the individual has not chosen to be
involved with. ….
2. Individuals have the right to receive information from people and
companies holding some of their personal data in their files, such as
websites, data bases, service providers etc. (“data controllers”), and they
have the right to correct or erase this data if it is incomplete or
inaccurate:
– Data controllers are required to inform consumers when they collect
personal data about them;
– Individuals have the right to know the name of the controller, the
intended use of the data processing, and to whom the data may be
transferred;
– Individuals are entitled to ask the data controller whether he is
processing personal data about them;
– Individuals have the right to receive a copy of the data that relates to
them in intelligible form;
– Individuals have the right to ask for the deletion, blocking or erasing of
the data if it is incomplete, inaccurate or obtained unlawfully.
Individuals have the right to object to the processing of personal data.
Code of EU Online Rights

More Related Content

What's hot

Smart Data - How you and I will exploit Big Data for personalized digital hea...
Smart Data - How you and I will exploit Big Data for personalized digital hea...Smart Data - How you and I will exploit Big Data for personalized digital hea...
Smart Data - How you and I will exploit Big Data for personalized digital hea...
Amit Sheth
 
A Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine PerceptionA Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine Perception
Cory Andrew Henson
 
Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...
ijtsrd
 
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...
Amit Sheth
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker Notes
KrisKasianovitz
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
Anil Dhami
 
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Katie Whipkey
 
WSI Stimulus Project: Centre for longitudinal studies of online citizen parti...
WSI Stimulus Project: Centre for longitudinal studies of online citizen parti...WSI Stimulus Project: Centre for longitudinal studies of online citizen parti...
WSI Stimulus Project: Centre for longitudinal studies of online citizen parti...
Ramine Tinati
 
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Amit Sheth
 

What's hot (20)

Smart Data - How you and I will exploit Big Data for personalized digital hea...
Smart Data - How you and I will exploit Big Data for personalized digital hea...Smart Data - How you and I will exploit Big Data for personalized digital hea...
Smart Data - How you and I will exploit Big Data for personalized digital hea...
 
How big data and analytics will help the world of charities
How big data and analytics will help the world of charitiesHow big data and analytics will help the world of charities
How big data and analytics will help the world of charities
 
TRANSFORMING BIG DATA INTO SMART DATA: Deriving Value via Harnessing Volume, ...
TRANSFORMING BIG DATA INTO SMART DATA: Deriving Value via Harnessing Volume, ...TRANSFORMING BIG DATA INTO SMART DATA: Deriving Value via Harnessing Volume, ...
TRANSFORMING BIG DATA INTO SMART DATA: Deriving Value via Harnessing Volume, ...
 
When Students Go Mobile: The Effects of Smartphones on Information Literacy a...
When Students Go Mobile: The Effects of Smartphones on Information Literacy a...When Students Go Mobile: The Effects of Smartphones on Information Literacy a...
When Students Go Mobile: The Effects of Smartphones on Information Literacy a...
 
Data stories
Data storiesData stories
Data stories
 
Graeme Baxter, Rita Marcella – Bravehearts or tim’rous beasties?
Graeme Baxter, Rita Marcella – Bravehearts or tim’rous beasties?Graeme Baxter, Rita Marcella – Bravehearts or tim’rous beasties?
Graeme Baxter, Rita Marcella – Bravehearts or tim’rous beasties?
 
A Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine PerceptionA Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine Perception
 
Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...Expelling Information of Events from Critical Public Space using Social Senso...
Expelling Information of Events from Critical Public Space using Social Senso...
 
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...
Transforming Big Data into Smart Data for Smart Energy: Deriving Value via ha...
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker Notes
 
Mapping the 'Search Agenda' in Elections - ECREA Comms & Democracy 2013 Confe...
Mapping the 'Search Agenda' in Elections - ECREA Comms & Democracy 2013 Confe...Mapping the 'Search Agenda' in Elections - ECREA Comms & Democracy 2013 Confe...
Mapping the 'Search Agenda' in Elections - ECREA Comms & Democracy 2013 Confe...
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science Knowledge
 
exploring internet governance implications of an expanded open data agenda: c...
exploring internet governance implications of an expanded open data agenda: c...exploring internet governance implications of an expanded open data agenda: c...
exploring internet governance implications of an expanded open data agenda: c...
 
NCSU invited talk: Leveraging Social Media for Tourism Marketplace Coordination
NCSU invited talk: Leveraging Social Media for Tourism Marketplace CoordinationNCSU invited talk: Leveraging Social Media for Tourism Marketplace Coordination
NCSU invited talk: Leveraging Social Media for Tourism Marketplace Coordination
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
Guidance for Incorporating Big Data into Humanitarian Operations - 2015 - web...
 
WSI Stimulus Project: Centre for longitudinal studies of online citizen parti...
WSI Stimulus Project: Centre for longitudinal studies of online citizen parti...WSI Stimulus Project: Centre for longitudinal studies of online citizen parti...
WSI Stimulus Project: Centre for longitudinal studies of online citizen parti...
 
The data we want
The data we wantThe data we want
The data we want
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
Semantic, Cognitive, and Perceptual Computing – three intertwined strands of ...
 

Viewers also liked

Developmentproformanofeedbackppd 150116175037-conversion-gate01
Developmentproformanofeedbackppd 150116175037-conversion-gate01Developmentproformanofeedbackppd 150116175037-conversion-gate01
Developmentproformanofeedbackppd 150116175037-conversion-gate01
James Wood
 
Developmentproformanofeedbackppd
DevelopmentproformanofeedbackppdDevelopmentproformanofeedbackppd
Developmentproformanofeedbackppd
James Wood
 
Developmentproformanofeedbackppd 150116175037-conversion-gate01
Developmentproformanofeedbackppd 150116175037-conversion-gate01Developmentproformanofeedbackppd 150116175037-conversion-gate01
Developmentproformanofeedbackppd 150116175037-conversion-gate01
James Wood
 
Development pro forma (no feedback)
Development pro forma (no feedback)Development pro forma (no feedback)
Development pro forma (no feedback)
James Wood
 

Viewers also liked (19)

Childrens book research pow
Childrens book research powChildrens book research pow
Childrens book research pow
 
Developmentproformanofeedbackppd 150116175037-conversion-gate01
Developmentproformanofeedbackppd 150116175037-conversion-gate01Developmentproformanofeedbackppd 150116175037-conversion-gate01
Developmentproformanofeedbackppd 150116175037-conversion-gate01
 
File types pro forma
File types pro formaFile types pro forma
File types pro forma
 
Developmentproformanofeedbackppd
DevelopmentproformanofeedbackppdDevelopmentproformanofeedbackppd
Developmentproformanofeedbackppd
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 
Gada CaSMa oxford connected life oxcl16
Gada CaSMa oxford connected life oxcl16Gada CaSMa oxford connected life oxcl16
Gada CaSMa oxford connected life oxcl16
 
Ass a koene_ca_sma
Ass a koene_ca_smaAss a koene_ca_sma
Ass a koene_ca_sma
 
WORK
WORK WORK
WORK
 
Digital graphics evaluation
Digital graphics evaluationDigital graphics evaluation
Digital graphics evaluation
 
Development pro forma (no feedback) ppd
Development pro forma (no feedback) ppdDevelopment pro forma (no feedback) ppd
Development pro forma (no feedback) ppd
 
Developmentproformanofeedbackppd 150116175037-conversion-gate01
Developmentproformanofeedbackppd 150116175037-conversion-gate01Developmentproformanofeedbackppd 150116175037-conversion-gate01
Developmentproformanofeedbackppd 150116175037-conversion-gate01
 
JAYAGOPAL CARD
JAYAGOPAL CARDJAYAGOPAL CARD
JAYAGOPAL CARD
 
final piece
final piecefinal piece
final piece
 
Development pro forma (no feedback)
Development pro forma (no feedback)Development pro forma (no feedback)
Development pro forma (no feedback)
 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
 
Development pro forma
Development pro formaDevelopment pro forma
Development pro forma
 
Dasts16 a koene_un_bias
Dasts16 a koene_un_biasDasts16 a koene_un_bias
Dasts16 a koene_un_bias
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
Ethics of personalized information filtering
Ethics of personalized information filteringEthics of personalized information filtering
Ethics of personalized information filtering
 

Similar to Citizen centric approaches to Social Media analysis (CaSMa)

ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
Pranav Godse
 
Injustice_Harm_Digital_Infrastructures.pptx
Injustice_Harm_Digital_Infrastructures.pptxInjustice_Harm_Digital_Infrastructures.pptx
Injustice_Harm_Digital_Infrastructures.pptx
MusfiqJony
 
dataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnndataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnn
jainutkarsh078
 
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Toronto Metropolitan University
 

Similar to Citizen centric approaches to Social Media analysis (CaSMa) (20)

ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
Applications of Big Data
Applications of Big DataApplications of Big Data
Applications of Big Data
 
Injustice_Harm_Digital_Infrastructures.pptx
Injustice_Harm_Digital_Infrastructures.pptxInjustice_Harm_Digital_Infrastructures.pptx
Injustice_Harm_Digital_Infrastructures.pptx
 
Module 3 - Improving Current Business with External Data- Online
Module 3 - Improving Current Business with External Data- Online Module 3 - Improving Current Business with External Data- Online
Module 3 - Improving Current Business with External Data- Online
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Data Ethics Framework 2.pptx
Data Ethics Framework 2.pptxData Ethics Framework 2.pptx
Data Ethics Framework 2.pptx
 
3rd Socio-Cultural Data Summit
3rd Socio-Cultural Data Summit3rd Socio-Cultural Data Summit
3rd Socio-Cultural Data Summit
 
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
 
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
 
‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_def
 
Data mining
Data mining Data mining
Data mining
 
dataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnndataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnn
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
CS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IVCS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IV
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...
 
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
 

More from Ansgar Koene

More from Ansgar Koene (20)

AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Industry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challengesIndustry Standards as vehicle to address socio-technical AI challenges
Industry Standards as vehicle to address socio-technical AI challenges
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
 
What is AI?
What is AI?What is AI?
What is AI?
 
Algorithms of Online Platforms and Networks
Algorithms of Online Platforms and NetworksAlgorithms of Online Platforms and Networks
Algorithms of Online Platforms and Networks
 
A koene governance_framework_algorithmicaccountabilitytransparency_october2018
A koene governance_framework_algorithmicaccountabilitytransparency_october2018A koene governance_framework_algorithmicaccountabilitytransparency_october2018
A koene governance_framework_algorithmicaccountabilitytransparency_october2018
 
AI and us communicating for algorithmic bias awareness
AI and us communicating for algorithmic bias awarenessAI and us communicating for algorithmic bias awareness
AI and us communicating for algorithmic bias awareness
 
Taming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyTaming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and Policy
 
IEEE P7003 Algorithmic Bias Considerations
IEEE P7003 Algorithmic Bias ConsiderationsIEEE P7003 Algorithmic Bias Considerations
IEEE P7003 Algorithmic Bias Considerations
 
IEEE P7003 at ICSE Fairware 2018
IEEE P7003 at ICSE Fairware 2018IEEE P7003 at ICSE Fairware 2018
IEEE P7003 at ICSE Fairware 2018
 
iConference 2018 BIAS workshop keynote
iConference 2018 BIAS workshop keynoteiConference 2018 BIAS workshop keynote
iConference 2018 BIAS workshop keynote
 
A koene humaint_march2018
A koene humaint_march2018A koene humaint_march2018
A koene humaint_march2018
 
A koene intersectionality_algorithmic_discrimination_dec2017
A koene intersectionality_algorithmic_discrimination_dec2017A koene intersectionality_algorithmic_discrimination_dec2017
A koene intersectionality_algorithmic_discrimination_dec2017
 
A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017A koene un_bias_ieee_ebdvf_nov2017
A koene un_bias_ieee_ebdvf_nov2017
 
A koene ai_in_command_control
A koene ai_in_command_controlA koene ai_in_command_control
A koene ai_in_command_control
 
Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018Ansgar rcep algorithmic_bias_july2018
Ansgar rcep algorithmic_bias_july2018
 
Algorithmically Mediated Online Inforamtion Access at MozFest17
Algorithmically Mediated Online Inforamtion Access at MozFest17Algorithmically Mediated Online Inforamtion Access at MozFest17
Algorithmically Mediated Online Inforamtion Access at MozFest17
 
The Age of Algorithms
The Age of AlgorithmsThe Age of Algorithms
The Age of Algorithms
 
Human Agency on Algorithmic Systems
Human Agency on Algorithmic SystemsHuman Agency on Algorithmic Systems
Human Agency on Algorithmic Systems
 
Editorial responsibilities arising from personalisation algorithms
Editorial responsibilities arising from personalisation algorithmsEditorial responsibilities arising from personalisation algorithms
Editorial responsibilities arising from personalisation algorithms
 

Recently uploaded

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 

Recently uploaded (20)

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 

Citizen centric approaches to Social Media analysis (CaSMa)

  • 1. Citizen centric approaches to Social Media analysis (CaSMa) Ansgar Koene Derek McAuley, Tom Rodden, Claire O’Malley, Svenja Adolphs, Elvira Perez Vellejos, Ramona Statache, Christopher Carter
  • 2. Social Media Analysis • Understanding the ways people use social media and what this means for individuals and society. • Understanding social phenomena and events expressed in social media by drawing upon social media as a critical, and timely, source of information. Citizen centric approaches • The development of facilities and approaches that are sensitive to the personal nature of human data; • The promotion of responsible innovation in the capture, analysis and use of human data. Citizen centric approaches to Social Media Analysis – what does this mean?
  • 3. • Social Media analytics is experiencing explosive growth Why citizen centric approaches to Social Media analysis? Social media-related research in tourism and hospitality Zeng & Gerritsen, 2014
  • 4. • We do Social Media analysis for: – Scientific curiosity, to gain insight into the ‘human condition’ and ‘how society works’ – To help people live better lives by increasing the efficiency of cities, health services etc. • We follow the ethics guidelines and avoid linking of data/results to specific individuals. • However: – The results from our research can/are used outside of the scientific community (corporations, intelligence agencies etc.) Why should this raise concerns?
  • 5. • Facebook – “our algorithms decide what you see and how you feel” Social Medial research with questionable ethics
  • 6. • OkCupid – “our algorithms manipulate your love life” Social Medial research with questionable ethics
  • 7. • NSA/GCHQ, etc. – Michele Catalano household web-search for pressure cooker and backpack resulted in being raided by the ‘joint terrorism task force’ (Sharwood, 2013) • Google and other advertisers use Social Media analysis to target advertising – the 100 most widely used websites are monitored by more than 1,300 firms (TRUSTe, cited in the Economist Sept 13, 2014) • Growing distrust by the public who fear being manipulated Non-research applications of SMa
  • 8. • There is a need for greater transparency in the research use of new forms of data, maximising the gains in knowledge derived from such data while minimising the risks to individuals’ privacy, seeking to retain public confidence in scientific research which makes use of new forms of data. - OECD New Data for Understanding the Human Condition: International Perspectives Implications for research
  • 9. • The importance of “Small Data” – Human data is intimate and personal, not big and aggregated • The need to be “Ethical by Design” – Responsible innovation should be built into the tools and approaches • Putting people at the centre of human data – Move from a transactional model where people are severed from their data to a model where people hold their data a Citizen Centric approach
  • 10. Problems: • Balance of power – Participants loose all control once data is submitted to the central database • Security – high profile target containing more data than necessary Redesigning – data ownership Standard Approach Central Database (held by researchers) Participant 1 Participant 2 Participant n Third party (researcher) query results data query
  • 11. Redesigning – data ownership Decentralized ‘ethics by design’ approach P1 Personal container Participant 1 data Participant 2 Participant 3 P3 Personal container P2 Personal container data data Request distributor data request data request data request Third party (researcher) Reply integration confirmation confirmation confirmation
  • 12. Advantages: • Privacy – responses to data requests can be ID-free/use-and- dispose-IDs (sent via through TOR network) • Transparency – Confidence – Trust – Data cross-referencing requires posting of combined information request, allowing participant side check of risk of de-anonymization. • Security – Distributed data storage reduces value of individual targets. Redesigning – data ownership
  • 13. • Dataware (Horizon, UoN) – Personal Containers • Ma3tch (FIU.net, EU) Existing implementations Udo Kroon, 2013 Financial Investigation Unit
  • 14. • Open Data agenda by government and research councils – Concerns regarding privacy when large databases are merged  de-anonymization – Third-party re-use of data related to an (anonymized) individual, via an Open Data repository, is almost guaranteed to violate the Code of EU Online Rights. • Responsibility of academics to provide an example to industry concerning possibility of doing ethical Social Media analysis that is useful but also respects people’s privacy. Further reasons for citizen centric “ethical by design”
  • 15. Citizen centric approaches to Social Media analysis that • pro-actively considers ethical and privacy implications by • employing “ethical by design” methods, can • provide transparency of the research use of social media data • minimize the risks to individuals’ privacy, thus • safeguarding the trust and cooperation of the public and • maximising the gains in knowledge derived from such data. Conclusion
  • 17.
  • 18. 1. …. The data that individuals provide directly or indirectly must not be used for purposes other than originally intended. Nor can such data be passed on indiscriminately to entities that the individual has not chosen to be involved with. …. 2. Individuals have the right to receive information from people and companies holding some of their personal data in their files, such as websites, data bases, service providers etc. (“data controllers”), and they have the right to correct or erase this data if it is incomplete or inaccurate: – Data controllers are required to inform consumers when they collect personal data about them; – Individuals have the right to know the name of the controller, the intended use of the data processing, and to whom the data may be transferred; – Individuals are entitled to ask the data controller whether he is processing personal data about them; – Individuals have the right to receive a copy of the data that relates to them in intelligible form; – Individuals have the right to ask for the deletion, blocking or erasing of the data if it is incomplete, inaccurate or obtained unlawfully. Individuals have the right to object to the processing of personal data. Code of EU Online Rights