SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Simulating online privacy




                             Simulating online privacy
                               Ethno-computational insights


                            Paola Tubaro1         Antonio A. Casilli2
                                1 University   of Greenwich, London
                             2 TELECOM   ParisTech and EHESS, Paris


                              Sunbelt XXXII, 18 March 2012
Simulating online privacy
   Introduction




The privacy challenge in social media


       Periodic privacy incidents on FB;
       Alleged tendency to renounce
       privacy for an open, connected
       existence;
       Mark Zuckerberg: ”Public is the
       new social norm”;
       Are we approaching the “End of
       Privacy” as we know it?
       The notion of publicness from
       Jürgen Habermas. . . to Jeff Jarvis.
Simulating online privacy
   Introduction
     Preliminary ethnographic evidence


FB ethnography

       Small data approach;
       Experiment: create two profiles;
       Invite 100 contacts to become
       friends;
       One of the two profiles discloses,
       the other is a control profile;
       FB friends provide feedback on how
       to enrich and develop profile
       (comments, messages, likes, shares,
       etc.);
       Compare the two profiles over 50
       days.                                 A.A. Casilli (2010) Les liaisons numériques. Vers une nouvelle sociabilité ? Paris, Seuil.
Simulating online privacy
   Introduction
     Preliminary ethnographic evidence


The importance of disclosure on FB


       Compare social graphs of two
       profiles;
       Personal network of actual profile
       continues to grow in size and
       displays a distinctive balance
       between social cohesion (bonding)
       and social connectedness
       (bridging);
       Disclosure is crucial: does this
       necessarily validate the
       ‘End-of-privacy’ hypothesis?
                                           A.A. Casilli (2010) Les liaisons numériques. Vers une nouvelle sociabilité ? Paris, Seuil.
Simulating online privacy
   Introduction
     Theoretical framework


Problematizing privacy
       In fact, online interactions complexify
       the very notion of privacy;

       Traditional notion based on metaphor
       of concentric circles of intimacy;
       Mono-directional notion (Brandeis): a
       core of sensitive data to be protected.


    ⇒ This notion no longer seems well
   adapted to interactions in a networked
                  society.
Simulating online privacy
   Introduction
     Theoretical framework


Privacy as a multi-directional, dynamic process

         Online privacy better described
         through multi-directional notion
         of privacy as regulation
         (Altman);
         Brunswik’s lens model:
         Individuals send signals to, and
         receive feedback from, the
         environment.


      ⇒ Self-disclosure accompanies
       adaptation to signals from the
      (social) environment over time.
Simulating online privacy
   Introduction
     Research question


Research question


                  In a social system with:
                         Formation of personal networks through bonding and bridging;
                         Disclosure needed to form ties;
                         Adaptation to signals from the environment through a
                         feedback process;


                  What will be the final configuration of the system, in terms of
                  degree of disclosure?
Simulating online privacy
   Methods




Agent-based computer simulation


           Generate socially consistent scenarios
           on a computer;
           Compare their outcomes;
           To detect and assess variables coming
           into play within specific social
           processes;
           To identify sufficient conditions for a
           macro phenomenon to emerge from
           the interaction of micro behaviours.
           An aid to perform a thought
           experiment.
Simulating online privacy
   Methods




The logic of an agent-based model

     Generate an artificial population of
     agents in an environment;

     Endow them with basic rules of
     behaviour;

     Let them interact for a certain time
     and step aside;

     Observe outcomes at the system
     level at the end.
Simulating online privacy
   Methods




Our Simulation model

               Programmed and run on NetLogo (Wilensky 1999);

               Tie formation rules allowing for both bonding and bridging;
               Two embedded notions of privacy:
                       Gradual self-disclosure and adaptation to one’s personal
                       network, through a feedback process;
                       Binary on/off visibility settings.
Simulating online privacy
   Methods




Model Interface
Simulating online privacy
   Results




Resulting system configurations




                       Figure: Stable configurations (20,000 time steps): (1) Small subnets, (2) Supernet.
Simulating online privacy
   Results




Two solutions emerge

               Many small subnets where contents are locked to contexts
                                      ⇒ “Elective communities” scenario.

               Supernet where all contents are shared by all individuals,
               regardless of context
                                     ⇒ Is this the “End-of-Privacy” scenario?
Simulating online privacy
   Results




Effects of varying parameters




                     Figure: Number and size of nets, varying with connectedness and openness to diversity.
Simulating online privacy
   Results




Evolution of privacy on/off settings




       Figure: Average privacy settings, varying with connectedness and openness to diversity over time. It is when
       individuals grow more and more connected, and share more and more contents, that privacy becomes relevant again.
Simulating online privacy
   Results




For further reflection

        The supposed “End of Privacy”
        scenario is in fact more complex
        than expected;

        Tendency to greater openness is
        not linear and may give rise to
        counter-tendencies;

        Possibility of cyclical patterns:
        FB zeroes out privacy settings,
        users retune them.                  Bakshy E., I. Rosenn, C. Marlow, L. Adamic (2012) The Role of Social Networks in Information Diffusion,
                                            http://arxiv.org/abs/1201.4145.
Simulating online privacy
   Results
     Acknowledgements




       We acknowledge Fondation CIGREF (ISD Programme 2011) for support.



                                 Paola Tubaro, p.tubaro@gre.ac.uk
                            Antonio A. Casilli, casilli@telecom-paristech.fr

Weitere ähnliche Inhalte

Was ist angesagt?

Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social CapitalGiorgos Cheliotis
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspaceFabrice Epelboin
 
Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)Jan Sifra
 
Our Future of Data-Driven, Connected Cities
Our Future of Data-Driven, Connected CitiesOur Future of Data-Driven, Connected Cities
Our Future of Data-Driven, Connected CitiesJonathan Reichental
 
Network Theory: A Brief Introduction june 2012
Network Theory: A Brief Introduction june 2012Network Theory: A Brief Introduction june 2012
Network Theory: A Brief Introduction june 2012Michael Netzley, Ph.D.
 
Collaborative Innovation Networks, Virtual Communities, and Geographical Clus...
Collaborative Innovation Networks, Virtual Communities, and Geographical Clus...Collaborative Innovation Networks, Virtual Communities, and Geographical Clus...
Collaborative Innovation Networks, Virtual Communities, and Geographical Clus...COINs2010
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...summersocialwebshop
 
Participatory surveillance and privacy negotiation in social media
Participatory surveillance and privacy negotiation in social mediaParticipatory surveillance and privacy negotiation in social media
Participatory surveillance and privacy negotiation in social mediaBodyspacesociety Blog
 
Reality Mining
Reality MiningReality Mining
Reality MiningCI&T
 
Virality & Network Effect
Virality & Network EffectVirality & Network Effect
Virality & Network EffectPiyush Gupta
 
Multidimensional Analysis of Complex Networks
Multidimensional Analysis of Complex NetworksMultidimensional Analysis of Complex Networks
Multidimensional Analysis of Complex NetworksLino Possamai
 
Social computing and knowledge creation
Social computing and knowledge creationSocial computing and knowledge creation
Social computing and knowledge creationMiia Kosonen
 
Social Computing Jenny Williams
Social Computing Jenny WilliamsSocial Computing Jenny Williams
Social Computing Jenny WilliamsJenny Williams
 
A knowledge ecology for museums
A knowledge ecology for museumsA knowledge ecology for museums
A knowledge ecology for museumsErfgoed 2.0
 
Social Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceSocial Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceTeklu_U
 
Norman Sadeh's Presentation
Norman Sadeh's PresentationNorman Sadeh's Presentation
Norman Sadeh's PresentationMediabistro
 

Was ist angesagt? (19)

Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social Capital
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
Privacy as identity territoriality  re-conceptualising behaviour in cyberspacePrivacy as identity territoriality  re-conceptualising behaviour in cyberspace
Privacy as identity territoriality re-conceptualising behaviour in cyberspace
 
Posterv2
Posterv2Posterv2
Posterv2
 
Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)
 
Our Future of Data-Driven, Connected Cities
Our Future of Data-Driven, Connected CitiesOur Future of Data-Driven, Connected Cities
Our Future of Data-Driven, Connected Cities
 
Network Theory: A Brief Introduction june 2012
Network Theory: A Brief Introduction june 2012Network Theory: A Brief Introduction june 2012
Network Theory: A Brief Introduction june 2012
 
Collaborative Innovation Networks, Virtual Communities, and Geographical Clus...
Collaborative Innovation Networks, Virtual Communities, and Geographical Clus...Collaborative Innovation Networks, Virtual Communities, and Geographical Clus...
Collaborative Innovation Networks, Virtual Communities, and Geographical Clus...
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
 
Participatory surveillance and privacy negotiation in social media
Participatory surveillance and privacy negotiation in social mediaParticipatory surveillance and privacy negotiation in social media
Participatory surveillance and privacy negotiation in social media
 
Reality Mining
Reality MiningReality Mining
Reality Mining
 
Virality & Network Effect
Virality & Network EffectVirality & Network Effect
Virality & Network Effect
 
Multidimensional Analysis of Complex Networks
Multidimensional Analysis of Complex NetworksMultidimensional Analysis of Complex Networks
Multidimensional Analysis of Complex Networks
 
Social computing and knowledge creation
Social computing and knowledge creationSocial computing and knowledge creation
Social computing and knowledge creation
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Social Computing Jenny Williams
Social Computing Jenny WilliamsSocial Computing Jenny Williams
Social Computing Jenny Williams
 
A knowledge ecology for museums
A knowledge ecology for museumsA knowledge ecology for museums
A knowledge ecology for museums
 
Social Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceSocial Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social Intelligence
 
Norman Sadeh's Presentation
Norman Sadeh's PresentationNorman Sadeh's Presentation
Norman Sadeh's Presentation
 

Ähnlich wie Simulating online privacy. Ethno-computational insights

Social networks in schools
Social networks in schoolsSocial networks in schools
Social networks in schoolsMichael Young
 
Searching for patterns in crowdsourced information
Searching for patterns in crowdsourced informationSearching for patterns in crowdsourced information
Searching for patterns in crowdsourced informationSilvia Puglisi
 
01 Introduction to Networks Methods and Measures (2016)
01 Introduction to Networks Methods and Measures (2016)01 Introduction to Networks Methods and Measures (2016)
01 Introduction to Networks Methods and Measures (2016)Duke Network Analysis Center
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measuresdnac
 
IIT+Research+Report+(1).compressed
IIT+Research+Report+(1).compressedIIT+Research+Report+(1).compressed
IIT+Research+Report+(1).compressedVikramank Singh
 
Knowledge Sharing over social networking systems
Knowledge Sharing over social networking systemsKnowledge Sharing over social networking systems
Knowledge Sharing over social networking systemstanguy
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorIAEME Publication
 
Chapter 2
Chapter 2Chapter 2
Chapter 2jfurey
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
 
Recommender systems in the scope of opinion formation: a model
Recommender systems in the scope of opinion formation: a modelRecommender systems in the scope of opinion formation: a model
Recommender systems in the scope of opinion formation: a modelMarcel Blattner, PhD
 
Network Structure For Social Network
Network Structure For Social NetworkNetwork Structure For Social Network
Network Structure For Social NetworkVaibhav Sathe
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
 
Community Evolution in the Digital Space and Creation of Social Information C...
Community Evolution in the Digital Space and Creation of SocialInformation C...Community Evolution in the Digital Space and Creation of SocialInformation C...
Community Evolution in the Digital Space and Creation of Social Information C...Saptarshi Ghosh
 
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesJessica Vitak
 
Community detection in complex social networks
Community detection in complex social networksCommunity detection in complex social networks
Community detection in complex social networksAboul Ella Hassanien
 
Information technology capabilities for digital social networks
Information technology capabilities for digital social networksInformation technology capabilities for digital social networks
Information technology capabilities for digital social networkscamillegrange
 
The Connected Republic 2.0: New Possibilities & New Value for the Public Sector
The Connected Republic 2.0: New Possibilities & New Value for the Public SectorThe Connected Republic 2.0: New Possibilities & New Value for the Public Sector
The Connected Republic 2.0: New Possibilities & New Value for the Public Sectortheconnectedrepublic
 

Ähnlich wie Simulating online privacy. Ethno-computational insights (20)

The End of Privacy Hypothesis
The End of Privacy HypothesisThe End of Privacy Hypothesis
The End of Privacy Hypothesis
 
Social networks in schools
Social networks in schoolsSocial networks in schools
Social networks in schools
 
Searching for patterns in crowdsourced information
Searching for patterns in crowdsourced informationSearching for patterns in crowdsourced information
Searching for patterns in crowdsourced information
 
01 Introduction to Networks Methods and Measures (2016)
01 Introduction to Networks Methods and Measures (2016)01 Introduction to Networks Methods and Measures (2016)
01 Introduction to Networks Methods and Measures (2016)
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures
 
IIT+Research+Report+(1).compressed
IIT+Research+Report+(1).compressedIIT+Research+Report+(1).compressed
IIT+Research+Report+(1).compressed
 
Knowledge Sharing over social networking systems
Knowledge Sharing over social networking systemsKnowledge Sharing over social networking systems
Knowledge Sharing over social networking systems
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...
 
Recommender systems in the scope of opinion formation: a model
Recommender systems in the scope of opinion formation: a modelRecommender systems in the scope of opinion formation: a model
Recommender systems in the scope of opinion formation: a model
 
Network Structure For Social Network
Network Structure For Social NetworkNetwork Structure For Social Network
Network Structure For Social Network
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
Community Evolution in the Digital Space and Creation of Social Information C...
Community Evolution in the Digital Space and Creation of SocialInformation C...Community Evolution in the Digital Space and Creation of SocialInformation C...
Community Evolution in the Digital Space and Creation of Social Information C...
 
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
 
Community detection in complex social networks
Community detection in complex social networksCommunity detection in complex social networks
Community detection in complex social networks
 
Information technology capabilities for digital social networks
Information technology capabilities for digital social networksInformation technology capabilities for digital social networks
Information technology capabilities for digital social networks
 
The Connected Republic 2.0: New Possibilities & New Value for the Public Sector
The Connected Republic 2.0: New Possibilities & New Value for the Public SectorThe Connected Republic 2.0: New Possibilities & New Value for the Public Sector
The Connected Republic 2.0: New Possibilities & New Value for the Public Sector
 

Mehr von Bodyspacesociety Blog

Elinor Wahal - Amazon Mechanical Turk: Structure et fonctionnement de la plat...
Elinor Wahal - Amazon Mechanical Turk: Structure et fonctionnement de la plat...Elinor Wahal - Amazon Mechanical Turk: Structure et fonctionnement de la plat...
Elinor Wahal - Amazon Mechanical Turk: Structure et fonctionnement de la plat...Bodyspacesociety Blog
 
Jérôme Denis - Avant le déluge : le travail invisible des données
Jérôme Denis - Avant le déluge : le travail invisible des donnéesJérôme Denis - Avant le déluge : le travail invisible des données
Jérôme Denis - Avant le déluge : le travail invisible des donnéesBodyspacesociety Blog
 
Enchères en temps réel et données personnelles : une expérimentation
Enchères en temps réel et données personnelles : une expérimentationEnchères en temps réel et données personnelles : une expérimentation
Enchères en temps réel et données personnelles : une expérimentationBodyspacesociety Blog
 
“Combien vaut un clic ? Données, industries culturelles, plateformes”
“Combien vaut un clic ? Données, industries culturelles, plateformes”“Combien vaut un clic ? Données, industries culturelles, plateformes”
“Combien vaut un clic ? Données, industries culturelles, plateformes”Bodyspacesociety Blog
 
Antonio Casilli -- Digital labor studies : Antécédents théoriques et nouvelle...
Antonio Casilli -- Digital labor studies : Antécédents théoriques et nouvelle...Antonio Casilli -- Digital labor studies : Antécédents théoriques et nouvelle...
Antonio Casilli -- Digital labor studies : Antécédents théoriques et nouvelle...Bodyspacesociety Blog
 
Sébastien Broca - De l'open source au digital labour : deux critiques du capi...
Sébastien Broca - De l'open source au digital labour : deux critiques du capi...Sébastien Broca - De l'open source au digital labour : deux critiques du capi...
Sébastien Broca - De l'open source au digital labour : deux critiques du capi...Bodyspacesociety Blog
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Bodyspacesociety Blog
 
Ksenia Ermoshina - Code warriors et civic apps Russes (#ecnEHESS 16 mars 2015)
Ksenia Ermoshina - Code warriors et civic apps Russes (#ecnEHESS 16 mars 2015)Ksenia Ermoshina - Code warriors et civic apps Russes (#ecnEHESS 16 mars 2015)
Ksenia Ermoshina - Code warriors et civic apps Russes (#ecnEHESS 16 mars 2015)Bodyspacesociety Blog
 
L'Economie collaborative - Séminaire EHESS Benjamin Tincq, Arthur de Grave
L'Economie collaborative - Séminaire EHESS Benjamin Tincq, Arthur de GraveL'Economie collaborative - Séminaire EHESS Benjamin Tincq, Arthur de Grave
L'Economie collaborative - Séminaire EHESS Benjamin Tincq, Arthur de GraveBodyspacesociety Blog
 
Algopol : une expérimentation sociologique sur Facebook
Algopol : une expérimentation sociologique sur FacebookAlgopol : une expérimentation sociologique sur Facebook
Algopol : une expérimentation sociologique sur FacebookBodyspacesociety Blog
 
Antonio A. CASILLI -- Web et privacy : Sur le prétendu renoncement à la vie p...
Antonio A. CASILLI -- Web et privacy : Sur le prétendu renoncement à la vie p...Antonio A. CASILLI -- Web et privacy : Sur le prétendu renoncement à la vie p...
Antonio A. CASILLI -- Web et privacy : Sur le prétendu renoncement à la vie p...Bodyspacesociety Blog
 
Paola TUBARO - Web et Privacy : sur le prétendu renoncement à la vie privée d...
Paola TUBARO - Web et Privacy : sur le prétendu renoncement à la vie privée d...Paola TUBARO - Web et Privacy : sur le prétendu renoncement à la vie privée d...
Paola TUBARO - Web et Privacy : sur le prétendu renoncement à la vie privée d...Bodyspacesociety Blog
 
Anne Dalsuet "Y a-t-il une philia numérique ?" (notes 16 déc. 2013)
Anne Dalsuet "Y a-t-il une philia numérique ?" (notes 16 déc. 2013)Anne Dalsuet "Y a-t-il une philia numérique ?" (notes 16 déc. 2013)
Anne Dalsuet "Y a-t-il une philia numérique ?" (notes 16 déc. 2013)Bodyspacesociety Blog
 
Paola Tubaro ANAMIA INSNA Sunbelt2014 St. Pete's Beach FL 22.02.2014
Paola Tubaro ANAMIA INSNA Sunbelt2014 St. Pete's Beach FL 22.02.2014Paola Tubaro ANAMIA INSNA Sunbelt2014 St. Pete's Beach FL 22.02.2014
Paola Tubaro ANAMIA INSNA Sunbelt2014 St. Pete's Beach FL 22.02.2014Bodyspacesociety Blog
 
Fred Pailler ANAMIA ESAD Reims 20.02.2014
Fred Pailler ANAMIA ESAD Reims 20.02.2014Fred Pailler ANAMIA ESAD Reims 20.02.2014
Fred Pailler ANAMIA ESAD Reims 20.02.2014Bodyspacesociety Blog
 
Antonio A. Casilli ANAMIA IFAC CHU Nantes 18.02.2014
Antonio A. Casilli ANAMIA IFAC CHU Nantes 18.02.2014Antonio A. Casilli ANAMIA IFAC CHU Nantes 18.02.2014
Antonio A. Casilli ANAMIA IFAC CHU Nantes 18.02.2014Bodyspacesociety Blog
 
Antonio CASILLI - EUROCOS - Désintermédiation médicale et communautés pro-ana
Antonio CASILLI - EUROCOS - Désintermédiation médicale et communautés pro-anaAntonio CASILLI - EUROCOS - Désintermédiation médicale et communautés pro-ana
Antonio CASILLI - EUROCOS - Désintermédiation médicale et communautés pro-anaBodyspacesociety Blog
 
Antonio A. Casilli - Networks, complexity, and privacy
Antonio A. Casilli - Networks, complexity, and privacyAntonio A. Casilli - Networks, complexity, and privacy
Antonio A. Casilli - Networks, complexity, and privacyBodyspacesociety Blog
 
Antonio CASILLI - Le rôle des visualisations de données dans la recherche sur...
Antonio CASILLI - Le rôle des visualisations de données dans la recherche sur...Antonio CASILLI - Le rôle des visualisations de données dans la recherche sur...
Antonio CASILLI - Le rôle des visualisations de données dans la recherche sur...Bodyspacesociety Blog
 
Visualizing personal network data. Examples from a study on EDs websites
Visualizing personal network data. Examples from a study on EDs websitesVisualizing personal network data. Examples from a study on EDs websites
Visualizing personal network data. Examples from a study on EDs websitesBodyspacesociety Blog
 

Mehr von Bodyspacesociety Blog (20)

Elinor Wahal - Amazon Mechanical Turk: Structure et fonctionnement de la plat...
Elinor Wahal - Amazon Mechanical Turk: Structure et fonctionnement de la plat...Elinor Wahal - Amazon Mechanical Turk: Structure et fonctionnement de la plat...
Elinor Wahal - Amazon Mechanical Turk: Structure et fonctionnement de la plat...
 
Jérôme Denis - Avant le déluge : le travail invisible des données
Jérôme Denis - Avant le déluge : le travail invisible des donnéesJérôme Denis - Avant le déluge : le travail invisible des données
Jérôme Denis - Avant le déluge : le travail invisible des données
 
Enchères en temps réel et données personnelles : une expérimentation
Enchères en temps réel et données personnelles : une expérimentationEnchères en temps réel et données personnelles : une expérimentation
Enchères en temps réel et données personnelles : une expérimentation
 
“Combien vaut un clic ? Données, industries culturelles, plateformes”
“Combien vaut un clic ? Données, industries culturelles, plateformes”“Combien vaut un clic ? Données, industries culturelles, plateformes”
“Combien vaut un clic ? Données, industries culturelles, plateformes”
 
Antonio Casilli -- Digital labor studies : Antécédents théoriques et nouvelle...
Antonio Casilli -- Digital labor studies : Antécédents théoriques et nouvelle...Antonio Casilli -- Digital labor studies : Antécédents théoriques et nouvelle...
Antonio Casilli -- Digital labor studies : Antécédents théoriques et nouvelle...
 
Sébastien Broca - De l'open source au digital labour : deux critiques du capi...
Sébastien Broca - De l'open source au digital labour : deux critiques du capi...Sébastien Broca - De l'open source au digital labour : deux critiques du capi...
Sébastien Broca - De l'open source au digital labour : deux critiques du capi...
 
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
 
Ksenia Ermoshina - Code warriors et civic apps Russes (#ecnEHESS 16 mars 2015)
Ksenia Ermoshina - Code warriors et civic apps Russes (#ecnEHESS 16 mars 2015)Ksenia Ermoshina - Code warriors et civic apps Russes (#ecnEHESS 16 mars 2015)
Ksenia Ermoshina - Code warriors et civic apps Russes (#ecnEHESS 16 mars 2015)
 
L'Economie collaborative - Séminaire EHESS Benjamin Tincq, Arthur de Grave
L'Economie collaborative - Séminaire EHESS Benjamin Tincq, Arthur de GraveL'Economie collaborative - Séminaire EHESS Benjamin Tincq, Arthur de Grave
L'Economie collaborative - Séminaire EHESS Benjamin Tincq, Arthur de Grave
 
Algopol : une expérimentation sociologique sur Facebook
Algopol : une expérimentation sociologique sur FacebookAlgopol : une expérimentation sociologique sur Facebook
Algopol : une expérimentation sociologique sur Facebook
 
Antonio A. CASILLI -- Web et privacy : Sur le prétendu renoncement à la vie p...
Antonio A. CASILLI -- Web et privacy : Sur le prétendu renoncement à la vie p...Antonio A. CASILLI -- Web et privacy : Sur le prétendu renoncement à la vie p...
Antonio A. CASILLI -- Web et privacy : Sur le prétendu renoncement à la vie p...
 
Paola TUBARO - Web et Privacy : sur le prétendu renoncement à la vie privée d...
Paola TUBARO - Web et Privacy : sur le prétendu renoncement à la vie privée d...Paola TUBARO - Web et Privacy : sur le prétendu renoncement à la vie privée d...
Paola TUBARO - Web et Privacy : sur le prétendu renoncement à la vie privée d...
 
Anne Dalsuet "Y a-t-il une philia numérique ?" (notes 16 déc. 2013)
Anne Dalsuet "Y a-t-il une philia numérique ?" (notes 16 déc. 2013)Anne Dalsuet "Y a-t-il une philia numérique ?" (notes 16 déc. 2013)
Anne Dalsuet "Y a-t-il une philia numérique ?" (notes 16 déc. 2013)
 
Paola Tubaro ANAMIA INSNA Sunbelt2014 St. Pete's Beach FL 22.02.2014
Paola Tubaro ANAMIA INSNA Sunbelt2014 St. Pete's Beach FL 22.02.2014Paola Tubaro ANAMIA INSNA Sunbelt2014 St. Pete's Beach FL 22.02.2014
Paola Tubaro ANAMIA INSNA Sunbelt2014 St. Pete's Beach FL 22.02.2014
 
Fred Pailler ANAMIA ESAD Reims 20.02.2014
Fred Pailler ANAMIA ESAD Reims 20.02.2014Fred Pailler ANAMIA ESAD Reims 20.02.2014
Fred Pailler ANAMIA ESAD Reims 20.02.2014
 
Antonio A. Casilli ANAMIA IFAC CHU Nantes 18.02.2014
Antonio A. Casilli ANAMIA IFAC CHU Nantes 18.02.2014Antonio A. Casilli ANAMIA IFAC CHU Nantes 18.02.2014
Antonio A. Casilli ANAMIA IFAC CHU Nantes 18.02.2014
 
Antonio CASILLI - EUROCOS - Désintermédiation médicale et communautés pro-ana
Antonio CASILLI - EUROCOS - Désintermédiation médicale et communautés pro-anaAntonio CASILLI - EUROCOS - Désintermédiation médicale et communautés pro-ana
Antonio CASILLI - EUROCOS - Désintermédiation médicale et communautés pro-ana
 
Antonio A. Casilli - Networks, complexity, and privacy
Antonio A. Casilli - Networks, complexity, and privacyAntonio A. Casilli - Networks, complexity, and privacy
Antonio A. Casilli - Networks, complexity, and privacy
 
Antonio CASILLI - Le rôle des visualisations de données dans la recherche sur...
Antonio CASILLI - Le rôle des visualisations de données dans la recherche sur...Antonio CASILLI - Le rôle des visualisations de données dans la recherche sur...
Antonio CASILLI - Le rôle des visualisations de données dans la recherche sur...
 
Visualizing personal network data. Examples from a study on EDs websites
Visualizing personal network data. Examples from a study on EDs websitesVisualizing personal network data. Examples from a study on EDs websites
Visualizing personal network data. Examples from a study on EDs websites
 

Kürzlich hochgeladen

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 

Kürzlich hochgeladen (20)

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 

Simulating online privacy. Ethno-computational insights

  • 1. Simulating online privacy Simulating online privacy Ethno-computational insights Paola Tubaro1 Antonio A. Casilli2 1 University of Greenwich, London 2 TELECOM ParisTech and EHESS, Paris Sunbelt XXXII, 18 March 2012
  • 2. Simulating online privacy Introduction The privacy challenge in social media Periodic privacy incidents on FB; Alleged tendency to renounce privacy for an open, connected existence; Mark Zuckerberg: ”Public is the new social norm”; Are we approaching the “End of Privacy” as we know it? The notion of publicness from Jürgen Habermas. . . to Jeff Jarvis.
  • 3. Simulating online privacy Introduction Preliminary ethnographic evidence FB ethnography Small data approach; Experiment: create two profiles; Invite 100 contacts to become friends; One of the two profiles discloses, the other is a control profile; FB friends provide feedback on how to enrich and develop profile (comments, messages, likes, shares, etc.); Compare the two profiles over 50 days. A.A. Casilli (2010) Les liaisons numériques. Vers une nouvelle sociabilité ? Paris, Seuil.
  • 4. Simulating online privacy Introduction Preliminary ethnographic evidence The importance of disclosure on FB Compare social graphs of two profiles; Personal network of actual profile continues to grow in size and displays a distinctive balance between social cohesion (bonding) and social connectedness (bridging); Disclosure is crucial: does this necessarily validate the ‘End-of-privacy’ hypothesis? A.A. Casilli (2010) Les liaisons numériques. Vers une nouvelle sociabilité ? Paris, Seuil.
  • 5. Simulating online privacy Introduction Theoretical framework Problematizing privacy In fact, online interactions complexify the very notion of privacy; Traditional notion based on metaphor of concentric circles of intimacy; Mono-directional notion (Brandeis): a core of sensitive data to be protected. ⇒ This notion no longer seems well adapted to interactions in a networked society.
  • 6. Simulating online privacy Introduction Theoretical framework Privacy as a multi-directional, dynamic process Online privacy better described through multi-directional notion of privacy as regulation (Altman); Brunswik’s lens model: Individuals send signals to, and receive feedback from, the environment. ⇒ Self-disclosure accompanies adaptation to signals from the (social) environment over time.
  • 7. Simulating online privacy Introduction Research question Research question In a social system with: Formation of personal networks through bonding and bridging; Disclosure needed to form ties; Adaptation to signals from the environment through a feedback process; What will be the final configuration of the system, in terms of degree of disclosure?
  • 8. Simulating online privacy Methods Agent-based computer simulation Generate socially consistent scenarios on a computer; Compare their outcomes; To detect and assess variables coming into play within specific social processes; To identify sufficient conditions for a macro phenomenon to emerge from the interaction of micro behaviours. An aid to perform a thought experiment.
  • 9. Simulating online privacy Methods The logic of an agent-based model Generate an artificial population of agents in an environment; Endow them with basic rules of behaviour; Let them interact for a certain time and step aside; Observe outcomes at the system level at the end.
  • 10. Simulating online privacy Methods Our Simulation model Programmed and run on NetLogo (Wilensky 1999); Tie formation rules allowing for both bonding and bridging; Two embedded notions of privacy: Gradual self-disclosure and adaptation to one’s personal network, through a feedback process; Binary on/off visibility settings.
  • 11. Simulating online privacy Methods Model Interface
  • 12. Simulating online privacy Results Resulting system configurations Figure: Stable configurations (20,000 time steps): (1) Small subnets, (2) Supernet.
  • 13. Simulating online privacy Results Two solutions emerge Many small subnets where contents are locked to contexts ⇒ “Elective communities” scenario. Supernet where all contents are shared by all individuals, regardless of context ⇒ Is this the “End-of-Privacy” scenario?
  • 14. Simulating online privacy Results Effects of varying parameters Figure: Number and size of nets, varying with connectedness and openness to diversity.
  • 15. Simulating online privacy Results Evolution of privacy on/off settings Figure: Average privacy settings, varying with connectedness and openness to diversity over time. It is when individuals grow more and more connected, and share more and more contents, that privacy becomes relevant again.
  • 16. Simulating online privacy Results For further reflection The supposed “End of Privacy” scenario is in fact more complex than expected; Tendency to greater openness is not linear and may give rise to counter-tendencies; Possibility of cyclical patterns: FB zeroes out privacy settings, users retune them. Bakshy E., I. Rosenn, C. Marlow, L. Adamic (2012) The Role of Social Networks in Information Diffusion, http://arxiv.org/abs/1201.4145.
  • 17. Simulating online privacy Results Acknowledgements We acknowledge Fondation CIGREF (ISD Programme 2011) for support. Paola Tubaro, p.tubaro@gre.ac.uk Antonio A. Casilli, casilli@telecom-paristech.fr