SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Going viral
Using social
networking
analysis to
influence
behaviours
FRSA Noel Hatch
@noelito
www.slideshare.net/localinnovation/social-contagion
Social networks
by design…
friends
communities
groups
…by default
neighbours
family
classmates
Understand
Support
Influence
Understand the context
Observe the interactions
Analyse the influences
Train people to influence behaviours
Understand the context
Teacher
Analyst
Trainer Young people
Neighbourhood
Experience of social networks & anti social behaviour
Observe the interactions
Train people to influence behaviours
Storyboard Uncover Analyse Share
Help people better understand their
behaviours
Empathy
Reconciliation
Collaboration

Weitere ähnliche Inhalte

Mehr von Noel Hatch

How do we shift to community-led research
How do we shift to community-led researchHow do we shift to community-led research
How do we shift to community-led researchNoel Hatch
 
Future of Participation - Shaping the Levers.pptx
Future of Participation - Shaping the Levers.pptxFuture of Participation - Shaping the Levers.pptx
Future of Participation - Shaping the Levers.pptxNoel Hatch
 
Survey of Londoners 2
Survey of Londoners 2Survey of Londoners 2
Survey of Londoners 2Noel Hatch
 
Survey of Londoners - 1
Survey of Londoners - 1Survey of Londoners - 1
Survey of Londoners - 1Noel Hatch
 
How can humanities research contribute to policy 2
How can humanities research contribute to policy 2How can humanities research contribute to policy 2
How can humanities research contribute to policy 2Noel Hatch
 
How can humanities research contribute to policy 1
How can humanities research contribute to policy 1How can humanities research contribute to policy 1
How can humanities research contribute to policy 1Noel Hatch
 
Universal Work Service for London Policy & Strategy Network
Universal Work Service for London Policy & Strategy Network Universal Work Service for London Policy & Strategy Network
Universal Work Service for London Policy & Strategy Network Noel Hatch
 
Skills for Policy Making Discussion
Skills for Policy Making DiscussionSkills for Policy Making Discussion
Skills for Policy Making DiscussionNoel Hatch
 
Equalities Diversity Inclusion Engagement
Equalities Diversity Inclusion EngagementEqualities Diversity Inclusion Engagement
Equalities Diversity Inclusion EngagementNoel Hatch
 
Engaging Young People and LGBTQ+
Engaging Young People and LGBTQ+Engaging Young People and LGBTQ+
Engaging Young People and LGBTQ+Noel Hatch
 
Citizens Assembly - 15 Minute Neighbourhood
Citizens Assembly - 15 Minute NeighbourhoodCitizens Assembly - 15 Minute Neighbourhood
Citizens Assembly - 15 Minute NeighbourhoodNoel Hatch
 
Governance beyond Government
Governance beyond GovernmentGovernance beyond Government
Governance beyond GovernmentNoel Hatch
 
London Research & Policy Partnership
London Research & Policy PartnershipLondon Research & Policy Partnership
London Research & Policy PartnershipNoel Hatch
 
UCL Local research & policy collaboration
UCL Local research & policy collaborationUCL Local research & policy collaboration
UCL Local research & policy collaborationNoel Hatch
 
How can we support innovation to help people on low incomes?
How can we support innovation to help people on low incomes?How can we support innovation to help people on low incomes?
How can we support innovation to help people on low incomes?Noel Hatch
 
Applying Community Insights into Policy
Applying Community Insights into PolicyApplying Community Insights into Policy
Applying Community Insights into PolicyNoel Hatch
 
Civic Strengths Index
Civic Strengths IndexCivic Strengths Index
Civic Strengths IndexNoel Hatch
 
Local Government Commission 2030
Local Government Commission 2030Local Government Commission 2030
Local Government Commission 2030Noel Hatch
 
15 Minute Neighbourhoods - University of the Arts - Group 3
15 Minute Neighbourhoods - University of the Arts - Group 315 Minute Neighbourhoods - University of the Arts - Group 3
15 Minute Neighbourhoods - University of the Arts - Group 3Noel Hatch
 
Neighbourhood Facilities
Neighbourhood FacilitiesNeighbourhood Facilities
Neighbourhood FacilitiesNoel Hatch
 

Mehr von Noel Hatch (20)

How do we shift to community-led research
How do we shift to community-led researchHow do we shift to community-led research
How do we shift to community-led research
 
Future of Participation - Shaping the Levers.pptx
Future of Participation - Shaping the Levers.pptxFuture of Participation - Shaping the Levers.pptx
Future of Participation - Shaping the Levers.pptx
 
Survey of Londoners 2
Survey of Londoners 2Survey of Londoners 2
Survey of Londoners 2
 
Survey of Londoners - 1
Survey of Londoners - 1Survey of Londoners - 1
Survey of Londoners - 1
 
How can humanities research contribute to policy 2
How can humanities research contribute to policy 2How can humanities research contribute to policy 2
How can humanities research contribute to policy 2
 
How can humanities research contribute to policy 1
How can humanities research contribute to policy 1How can humanities research contribute to policy 1
How can humanities research contribute to policy 1
 
Universal Work Service for London Policy & Strategy Network
Universal Work Service for London Policy & Strategy Network Universal Work Service for London Policy & Strategy Network
Universal Work Service for London Policy & Strategy Network
 
Skills for Policy Making Discussion
Skills for Policy Making DiscussionSkills for Policy Making Discussion
Skills for Policy Making Discussion
 
Equalities Diversity Inclusion Engagement
Equalities Diversity Inclusion EngagementEqualities Diversity Inclusion Engagement
Equalities Diversity Inclusion Engagement
 
Engaging Young People and LGBTQ+
Engaging Young People and LGBTQ+Engaging Young People and LGBTQ+
Engaging Young People and LGBTQ+
 
Citizens Assembly - 15 Minute Neighbourhood
Citizens Assembly - 15 Minute NeighbourhoodCitizens Assembly - 15 Minute Neighbourhood
Citizens Assembly - 15 Minute Neighbourhood
 
Governance beyond Government
Governance beyond GovernmentGovernance beyond Government
Governance beyond Government
 
London Research & Policy Partnership
London Research & Policy PartnershipLondon Research & Policy Partnership
London Research & Policy Partnership
 
UCL Local research & policy collaboration
UCL Local research & policy collaborationUCL Local research & policy collaboration
UCL Local research & policy collaboration
 
How can we support innovation to help people on low incomes?
How can we support innovation to help people on low incomes?How can we support innovation to help people on low incomes?
How can we support innovation to help people on low incomes?
 
Applying Community Insights into Policy
Applying Community Insights into PolicyApplying Community Insights into Policy
Applying Community Insights into Policy
 
Civic Strengths Index
Civic Strengths IndexCivic Strengths Index
Civic Strengths Index
 
Local Government Commission 2030
Local Government Commission 2030Local Government Commission 2030
Local Government Commission 2030
 
15 Minute Neighbourhoods - University of the Arts - Group 3
15 Minute Neighbourhoods - University of the Arts - Group 315 Minute Neighbourhoods - University of the Arts - Group 3
15 Minute Neighbourhoods - University of the Arts - Group 3
 
Neighbourhood Facilities
Neighbourhood FacilitiesNeighbourhood Facilities
Neighbourhood Facilities
 

Kürzlich hochgeladen

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Social Contagion

Hinweis der Redaktion

  1. It has always been difficult for us to extract ourselves from the social networks which we are in “by default”, whether that’s where we come from (our family), where we live (our neighbours), where we study (classmates) or where we work (colleagues). At least we could escape from one of these, whether that was leaving the house to meet friends, joining groups to take part in a hobby or even communities with whom we have a shared interest. But now all of these social networks by design and by default are online, from your teacher to your boss. Imagine you’re being bullied at school. You look for places you can escape from them. But with young people being virtually born into digital technology, they have nowhere to hide from their social networks – whether it’s their friends or those who bully them. Additionally, it’s much easier for bullies to bully people online – by sending a nasty message or spreading vicious rumours.
  2. To understand how anti-social behaviours such as cyber bullying spread across young people’s social networks and how young people could spread pro-social behaviours across their networks To help young people understand these network dynamics and how they can use these to address concerns their local communities have about anti-social behaviour
  3. Identify the types of stakeholders in the social network of your target group, in particular those who have an influence on this group Identify trusted people within your service and within the target group who can help you engage with the target group and so they feel ownership of changing their behaviour Identify experts in social network analysis to carry out the research and ensure that the analysis produces findings that can inform practical solutions Identify trainers to help support the group to use the techniques to influence behaviours across their social networks
  4. We designed an online questionnaire which we provided to the students to understand 76.19 per cent use online social networks59.18 per cent reported being the victim of ASB (with females being considerably higher than males)53.74 per cent admitted participating in ASB (females being slightly higher than males)48.3 per cent reported being the victim of bullying with 8.45 per cent of these reporting being bullied several times a week43 per cent admitted that they may have orhad definitely acted as a bully23.13 per cent reported being a victim of cyber bullying (more female than male) with text messaging being the main format Of those bullied (by any means) 40.51 per cent did not seek any help, 36.71 per cent spoke to a friend, 29.11 per cent spoke to a family member, 25 per cent spoke to a teacher but only 2.53 per cent used a helpline
  5. We analysed how the patterns of social networking use are linked to various anti-social behaviour. We carried out a study of social network analysis on a small group of students to identify their social network structures and how networks are linked to anti-social behaviour. This process included a conference which allowed pupils from the three schools to explore cyber bullying and to identify possible means of intervention. This was followed by pilots in each of the schools. A total of 147 students took part in the project. During these pilots a hypothetical scenario was given to pairs of students in sessions lasting one hour. Students were asked to arrive at an agreed solution to resolve the conflict by using social networks.St Anselm’s School, CanterburyAt one of the sessions at St Anselm’s School two pupils had arrived at the start of the session with a form of unresolved conflict between them. After the session finished, they left chatting to each other and far more open and relaxed about their own conflict. What had been an awkward stalemate between them gradually melted away through working on the tasks together, with an increasingly open manner between them.The Archbishop’s School, CanterburyA clear benefit to the school situation at Archbishop’s was the active involvement of sixth form psychology students in the experiments. In most sessions conducted there were four or more students observing. They asked good questions and often,after the pupils had finished the study, were keen to engage in discussion of why the project leaders did certain things during the sessions and how they dealt with unexpected rudiments during the study. This gave these sixth formers valuable insight into research studies and the sort of research possible in this field.Borden Grammar School for Boys, SittingbourneOne of the key benefits to the way this school used the sessions was the focus on the topic of bullying and the way this was fitted in as part of the wider school education on the realities and dangers of bullying. The project team were asked to participate in a morning assembly for the boys on bullying, where a good discussion, on cyber bullying in particular, took place.
  6. We trained young people up to become ‘social reporters’ to uncover stories in the neighbourhoods in which the schools were based to be able to share and disseminate insights across neighbourhood networks. This helped them understand people’s concerns about their own behaviour (such as about the vandalism of the school bus), spread stories of pro-social behaviour (such as organising a Christmas party for older people at the school) and understand how to get involved in pro-social activities in the neighbourhood (such as a book club in a community café). This helps develop the capacity for them to be more involved in neighbourhood networks to develop resilience through spotting and tackling issues together.These included how to shoot on DV (digital video), interview techniques, storyboarding, scripting and social networking. Other learning objectives were to develop an ongoing dialogue between young people and the local communities, with particular reference to anti-social behaviour.  We created a shared site for the students to work on and this was to be shared with the school. Since the training, the students have reported on other local stories and many are keen to continue their roles as ‘social reporters’ for the Academy.  
  7. Key findings include the revelation that students using social networks with gesture and facial recognition technology feel more positive towards other students. Specifically, students like and trust their partner significantly more. They are also able to produce better ideas to alleviate bullying issues.Prior to the study, avatar-mediated communication was believed to be less effective than video-mediated communication. However, newer technologies, which respond to facial & gesture cues, improve social interaction. Avatar technology is of particular interest for tackling bullying issues because of its ability to protect users' anonymity.