Danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Fragmentation of identity through structural holes in.

Slides:



Advertisements
Similar presentations
Education Bradford Curriculum ICT E-safety and Communication Technologies May 2009 Presented by Paul Scott.
Advertisements

1 Linked In and Networking Debra Kurtz Vice President, HBA Chicago Chapter Founder and President Kurtz Consulting Inc.
Seeing and Organizing Identity Online thoughts on digital context, perception of self and identity management.
Social Networking: Facebook, Google+, and Pinterest (and maybe one or two others) Mary Rotman Publicist, OReilly Media.
Keele Management School
M-learning thru M-devices- Is it real learning?. Real challenges? Mobility – a fad, trend or a culture? Learning – have we change our learning behaviour?
Infinite Campus Elementary Parent Portal
Bridging Research, Information and Culture An Initiative of the Research and Planning Group for California Community Colleges Your Name Your Institution.
Cyberbullying When good technology goes bad…….. Stay safe in cyberspace.
SOSTAC ANALYSIS Tuli Hotel Group.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP DITA Overview Video.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Yusuf Simonson Title Suggesting Friends Using the Implicit Social Graph.
2 4. But first  A bit more from Tuesday about Privacy Social Media Marketing, 2e© 2-2.
Social Networks Visualization Who’s the popular kid?
Chapter 13 Relational Uses and Understanding of Media.
Blending the Real and Virtual in Games: The Model of Fantasy Sports Frank Shipman Department of Computer Science & Center for the Study of Digital Libraries.
Washington State Prevention Summit Analyzing and Preparing Data for Outcome-Based Evaluation Using the Assigned Measures and the PBPS Outcomes Report.
By Daragh Social Media Strategy for a Political Campaign.
Section VI: Comprehension Teaching Reading Sourcebook 2 nd edition.
Using the Engaging Networks tools Ghazal Vaghedi Toronto February 21, 2012 #12ENCONF.
Examining the Partnership for the 21 st Century with a Spotlight on Technology and Humor Copyright [Peter M. Jonas] [2008]. This work is the intellectual.
Models of Influence in Online Social Networks
CALIFORNIA STATE BOARD OF EDUCATION Common Core Standards: Messaging the Opposition Nancy S. Brownell, Senior Fellow, Local Control and Accountability.
Social Network Fragments danah boyd :: V-Day/UC-Berkeley Jeff Potter :: Atof Inc. An Interactive Tool for Exploring Digital Social Connections.
Social Media Facebook, Twitter, Google+, etc.. What is Social Technology?  Communication tools  Interactive tools  Examples?
Interstate New Teacher Assessment and Support Consortium (INTASC)
What is Social Networking ? What is Social Networking ?
Digital Citizenship and Media Literacy
Managing Your Social Capital Priscilla Arling University of Minnesota, Carlson School of Management – AWCTC March 2005.
OSN Research As If Sociology Mattered Krishna P. Gummadi Networked Systems Research Group MPI-SWS.
Guided tours and on-line presentations: how authors make existing hypertext intelligible for readers C. C. Marshall, P. M. Irish, Guided tours and on-line.
` Tangible Interaction with the R Software Environment Using the Meuse Dataset Rachel Bradford, Landon Rogge, Dr. Brygg Ullmer, Dr. Christopher White `
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
Delivering Your Messages in Today’s Online Environment American Library Association, PR Forum Kevin T. Kirkpatrick Executive Vice President Sunday, July.
Vizster: Visualizing Online Social Networks Authors: Jeffrey Heer and Danah Boyd Presented by: Jeanne Kramer-Smyth Machon Gregory.
1 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Social Media 101 An Overview of Social Media Basics.
NTU Natural Language Processing Lab. 1 Investment and Attention in the Weblog Community Advisor: Hsin-Hsi Chen Speaker: Sheng-Chung Yen.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Digital artifacts for remebering and storytelling: PostHistory and Social Network Fragments F. B. Viegas, D boyd, D. H. Nguyen, J. Potter, and J. Donath.
SHARING SOCIAL MEDIA academic and professional information through.
The Art of Linking The Art of Linking Joanne Jacobs Technology Strategist and Interaction Designer Image source:
OD is Diversity: Differences Are at the Heart of the Field Organization Development Network July 12, 2007 Heather Berthoud & Bob Greene Berthoud/Greene.
Improving the Social Nature of OnLine Learning Tap into what students are already doing Tap into what students are already doing Educause SWRC07 Copyright.
Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.
Interpersonal Communication on the Internet Chapter 8 Human Communication on the Internet Shedletsky & Aitken.
Building a Campaign with Online and Visual Media.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
A Connectivity-Based Popularity Prediction Approach for Social Networks Huangmao Quan, Ana Milicic, Slobodan Vucetic, and Jie Wu Department of Computer.
By Matt Bogard, M.S. Coordinator, Market Research Instructor, Department of Economics Western Kentucky University.
Propel Your Stories - and More - to the Next Level With Content Curation Melony Shemberger, Ed.D. Assistant Professor of Journalism and Mass Communication.
Guide By Phoebi Stewart. has changed the way we communicate with each other. Being able to send information quickly across the internet.
Springfield’s Community Health Network. Study Objective Objective Describe the network of organizations that has emerged in each Blueprint HSA to support.
PERSONAL BRANDING WORKBOOK FOR ACCOUNT MANAGERS Supporting the book: BRAND AID Taking Control Of Your Reputation – Before Everyone Else Does Product of.
Lesson Development Seven Elements
3.06 Understand the use of direct marketing to attract attention and to build brand.
Technologies curriculum
3.06 Understand the use of direct marketing to attract attention and to build brand.
3.06 Understand the use of direct marketing to attract attention and to build brand.
3.06 Understand the use of direct marketing to attract attention and to build brand.
Mining Social Networks. Contents  What are Social Networks  Why Analyse Them?  Analysis Techniques.
:: SecureId :: Security of Identity Through Knowledge
LAN switching and Bridges
3.06 Understand the use of direct marketing to attract attention and to build brand.
Rhetorical Genre Analysis
Presentation transcript:

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Fragmentation of identity through structural holes in contacts danah boyd, Jeff Potter, Fernanda Viegas (Sociable Media, MIT Media Lab)

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Research Questions How does social network structure impact individual construction of identity? How is this behavior made explicit online? How can this be observed within the context of ?

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Construction of Individual Identity Interrelated ideas of identity –Social identity: public presentation of self –Internal identity: private view of self Fragmentation vs. Multi-Faceted Identity –Fragmentation: conflicting internal identity –Multi-faceted: coherent internal identity, fragmented social identity

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Managing Faceted Selves Differentiated presentation changed according to context –How? Fashion, language, location/context, people –Why? Privacy, social appropriateness, reputation differentiation –Who? Dependent on self-monitoring habits, marginalization, fear of retribution Fragmented social network (e.g., work, clubs, family, …) –Separate social circles provide for segmentation of presentation

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Identity online Confusion of context –Ease of moving between multiple contexts –Data aggregated across “locations” address serves as context –Allows for privacy and faceted behavior

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Relating Network Structure Structural holes & bridges (Burt) –Maximize & control information flow Simmelian ties (Krackhardt) –In public settings, personally constraining by restricting appropriate behavior – aggregate of all associations Control of network structure –Minimize uncontrolled personal information flow

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Structuring social networks via Recognizing the power of multiple recipients –Copy/paste phenomenon to appear personal or contextual –Slight content alternations for context –Making others aware of audience

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Ego-Centric Visualization Visualization tool to observe social networks embedded in –Focused on structure Analyzed “Mike’s” habits –5 years worth of complete data –Maintains multiple addresses for different contexts –(Dis)advantages of using one person’s behaviors

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Introducing Mike Social characteristics: –24-year old, gay-identified, white male –Born in northern CA, attended Yale (art & computer science) –Friends & jobs in: Boston, SF, Chicago, NYC –Uses many forms of media to stay connected Mike’s primary social communities: –Family, high school friends –Undergraduate friends –Gay men in/outside Boston, in NYC –Boston, Texas, California work colleagues

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Mike’s dataset 80,941 messages –1.03 average recipients per msg 15,537 unique people –7,250 people w/ 2,618 knowledge ties (excluding listservs) –662,078 ties between all respondents (using only messages with <50 recipients; otherwise, 11.7 million) –226 trusted ties; 23 reciprocal

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Defining Connectivity Knowledge ties –If A sends a message to B, A ‘knows’ B –B does not necessarily know A Awareness ties –If B receives a message from A -> B is ‘aware’ of A –If B and C both receive a message from A -> B and C are ‘aware’ of each other Trusted ties –If A sends a message to B and blind carbon copies (BCC’s) D -> A ‘knows’ and ‘trusts’ D –(D has the ability to respond and reveal that A included people without B’s awareness)

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Visualizations

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Visualizations: Overview Goal is to allow one to quickly see how Mike’s network is connected and view structural holes -Methodology -Spring/Wire explanation -View of entire world -Close-up views of network

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Visualizations: Methodology Basic spring/node algorithm used to place nodes in optimal location - annealing algorithms don’t work with 15,000 nodes Colors are used to indicate the relationship to the person - based on which of Mike’s address the person uses - most common address used

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Visualizations: Spring/Node (1/2) Basic spring algorithm used to place nodes -Ties act as springs, pulling connected nodes closer together -Nodes act like magnets and repel each other

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Visualizations: Spring/Node (2/2) All nodes start out at random location, spring algorithm is run several hundred iterations This (eventually) results in connected nodes being nearby and non-connected being far away

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002

Visualization: Entire World (1/2) Color key for all images

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002

Social Implications Using one person’s , we can observe the social networks of hundreds of people - what are the implications of this?

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February 2002 Thoughts moving forward More detailed analysis –Use visualizations to have ethnographic conversation with Mike Extend to multiple users –Visual comparison valuable Allow for interactivity –More detailed analysis of ego-centric graphs Learn more from social network analysts

danah boyd, Jeff Potter, Fernanda Viegas. Sociable Media, MIT Media Lab. Sunbelt. 17 February