social_software

What is Web 2.0?

From Bruce Sterling’s “Viridian Note 00459: Emerging Technology 2006” (The Viridian Design Movement: March 2006):

Here we’ve got the canonical Tim O’Reilly definition of Web 2.0:

“Web 2.0 is the network as platform, spanning all connected devices; Web 2.0 applications are those that make the most of the intrinsic advantages of that platform: delivering software as a continually-updated service that gets better the more people use it, consuming and remixing data from multiple sources, including individual users, while providing their own data and services in a form that allows remixing by others, creating network effects through an ‘architecture of participation,’ and going beyond the page metaphor of Web 1.0 to deliver rich user experiences.”

What is Web 2.0? Read More »

Examples of tweaking old technologies to add social aspects

From Clay Shirky’s “Group as User: Flaming and the Design of Social Software” (Clay Shirky’s Writings About the Internet: 5 November 2004):

This possibility of adding novel social components to old tools presents an enormous opportunity. To take the most famous example, the Slashdot moderation system puts the ability to rate comments into the hands of the users themselves. The designers took the traditional bulletin board format — threaded posts, sorted by time — and added a quality filter. And instead of assuming that all users are alike, the Slashdot designers created a karma system, to allow them to discriminate in favor of users likely to rate comments in ways that would benefit the community. And, to police that system, they created a meta-moderation system, to solve the ‘Who will guard the guardians’ problem. …

Likewise, Craigslist took the mailing list, and added a handful of simple features with profound social effects. First, all of Craigslist is an enclosure, owned by Craig … Because he has a business incentive to make his list work, he and his staff remove posts if enough readers flag them as inappropriate. …

And, on the positive side, the addition of a “Nominate for ‘Best of Craigslist'” button in every email creates a social incentive for users to post amusing or engaging material. … The only reason you would nominate a post for ‘Best of’ is if you wanted other users to see it — if you were acting in a group context, in other words. …

Jonah Brucker-Cohen’s Bumplist stands out as an experiment in experimenting the social aspect of mailing lists. Bumplist, whose motto is “an email community for the determined”, is a mailing list for 6 people, which anyone can join. When the 7th user joins, the first is bumped and, if they want to be back on, must re-join, bumping the second user, ad infinitum. … However, it is a vivid illustration of the ways simple changes to well-understood software can produce radically different social effects.

You could easily imagine many such experiments. What would it take, for example, to design a mailing list that was flame-retardant? Once you stop regarding all users as isolated actors, a number of possibilities appear. You could institute induced lag, where, once a user contributed 5 posts in the space of an hour, a cumulative 10 minute delay would be added to each subsequent post. Every post would be delivered eventually, but it would retard the rapid-reply nature of flame wars, introducing a cooling off period for the most vociferous participants.

You could institute a kind of thread jail, where every post would include a ‘Worst of’ button, in the manner of Craigslist. Interminable, pointless threads (e.g. Which Operating System Is Objectively Best?) could be sent to thread jail if enough users voted them down. (Though users could obviously change subject headers and evade this restriction, the surprise, first noted by Julian Dibbell, is how often users respect negative communal judgment, even when they don’t respect the negative judgment of individuals. [ See Rape in Cyberspace — search for “aggressively antisocial vibes.”])

You could institute a ‘Get a room!’ feature, where any conversation that involved two users ping-ponging six or more posts (substitute other numbers to taste) would be automatically re-directed to a sub-list, limited to that pair. The material could still be archived, and so accessible to interested lurkers, but the conversation would continue without the attraction of an audience.

You could imagine a similar exercise, working on signal/noise ratios generally, and keying off the fact that there is always a most active poster on mailing lists, who posts much more often than even the second most active, and much much more often than the median poster. Oddly, the most active poster is often not even aware that they occupy this position (seeing ourselves as others see us is difficult in mediated spaces as well,) but making them aware of it often causes them to self-moderate. You can imagine flagging all posts by the most active poster, whoever that happened to be, or throttling the maximum number of posts by any user to some multiple of average posting tempo.

Examples of tweaking old technologies to add social aspects Read More »

Clay Shirky on flaming & how to combat it

From Clay Shirky’s “Group as User: Flaming and the Design of Social Software” (Clay Shirky’s Writings About the Internet: 5 November 2004):

Learning From Flame Wars

Mailing lists were the first widely available piece of social software. … Mailing lists were also the first widely analyzed virtual communities. …

Flame wars are not surprising; they are one of the most reliable features of mailing list practice. If you assume a piece of software is for what it does, rather than what its designer’s stated goals were, then mailing list software is, among other things, a tool for creating and sustaining heated argument. …

… although the environment in which a mailing list runs is computers, the environment in which a flame war runs is people. …

The user’s mental model of a word processor is of limited importance — if a word processor supports multiple columns, users can create multiple columns; if not, then not. The users’ mental model of social software, on the other hand, matters enormously. For example, ‘personal home pages’ and weblogs are very similar technically — both involve local editing and global hosting. The difference between them was mainly in the user’s conception of the activity. …

… The cumulative effect is to make maximizing individual flexibility a priority, even when that may produce conflict with the group goals.

Netiquette and Kill Files

The first general response to flaming was netiquette. Netiquette was a proposed set of behaviors that assumed that flaming was caused by (who else?) individual users. If you could explain to each user what was wrong with flaming, all users would stop.

This mostly didn’t work. The problem was simple — the people who didn’t know netiquette needed it most. They were also the people least likely to care about the opinion of others …

… Addressing the flamer directly works not because he realizes the error of his ways, but because it deprives him of an audience. Flaming is not just personal expression, it is a kind of performance, brought on in a social context.

… People behave differently in groups, and while momentarily engaging them one-on-one can have a calming effect, that is a change in social context, rather than some kind of personal conversion. …

Another standard answer to flaming has been the kill file, sometimes called a bozo filter, which is a list of posters whose comments you want filtered by the software before you see them. …

… And although people have continually observed (for thirty years now) that “if everyone just ignores user X, he will go away,” the logic of collective action makes that outcome almost impossible to orchestrate — it only takes a couple of people rising to bait to trigger a flame war, and the larger the group, the more difficult it is to enforce the discipline required of all members.

The Tragedy of the Conversational Commons

Briefly stated, the tragedy of the commons occurs when a group holds a resource, but each of the individual members has an incentive to overuse it. …

In the case of mailing lists (and, again, other shared conversational spaces), the commonly held resource is communal attention. The group as a whole has an incentive to keep the signal-to-noise ratio high and the conversation informative, even when contentious. Individual users, though, have an incentive to maximize expression of their point of view, as well as maximizing the amount of communal attention they receive. It is a deep curiosity of the human condition that people often find negative attention more satisfying than inattention, and the larger the group, the likelier someone is to act out to get that sort of attention.

However, proposed responses to flaming have consistently steered away from group-oriented solutions and towards personal ones. …

Weblog and Wiki Responses

… Weblogs are relatively flame-free because they provide little communal space. In economic parlance, weblogs solve the tragedy of the commons through enclosure, the subdividing and privatizing of common space. …

Like weblogs, wikis also avoid the tragedy of the commons, but they do so by going to the other extreme. Instead of everything being owned, nothing is. Whereas a mailing list has individual and inviolable posts but communal conversational space, in wikis, even the writing is communal. … it is actually easier to restore damage than cause it. …

Weblogs and wikis are proof that you can have broadly open discourse without suffering from hijacking by flamers, by creating a social structure that encourages or deflects certain behaviors.

Clay Shirky on flaming & how to combat it Read More »

1% create, 10% comment, 89% just use

From Charles Arthur’s “What is the 1% rule?” (Guardian Unlimited: 20 July 2006):

It’s an emerging rule of thumb that suggests that if you get a group of 100 people online then one will create content, 10 will “interact” with it (commenting or offering improvements) and the other 89 will just view it.

It’s a meme that emerges strongly in statistics from YouTube, which in just 18 months has gone from zero to 60% of all online video viewing.

The numbers are revealing: each day there are 100 million downloads and 65,000 uploads – which as Antony Mayfield (at http://open.typepad.com/open) points out, is 1,538 downloads per upload – and 20m unique users per month.

That puts the “creator to consumer” ratio at just 0.5%, but it’s early days yet …

50% of all Wikipedia article edits are done by 0.7% of users, and more than 70% of all articles have been written by just 1.8% of all users, according to the Church of the Customer blog (http://customerevangelists.typepad.com/blog/).

Earlier metrics garnered from community sites suggested that about 80% of content was produced by 20% of the users, but the growing number of data points is creating a clearer picture of how Web 2.0 groups need to think. For instance, a site that demands too much interaction and content generation from users will see nine out of 10 people just pass by.

Bradley Horowitz of Yahoo points out that much the same applies at Yahoo: in Yahoo Groups, the discussion lists, “1% of the user population might start a group; 10% of the user population might participate actively, and actually author content, whether starting a thread or responding to a thread-in-progress; 100% of the user population benefits from the activities of the above groups,” he noted on his blog (www.elatable.com/blog/?p=5) in February.

1% create, 10% comment, 89% just use Read More »

Just how big is YouTube?

From Reuters’s “YouTube serves up 100 mln videos a day” (16 July 2006):

YouTube, the leader in Internet video search, said on Sunday viewers have are now watching more than 100 million videos per day on its site, marking the surge in demand for its “snack-sized” video fare.

Since springing from out of nowhere late last year, YouTube has come to hold the leading position in online video with 29 percent of the U.S. multimedia entertainment market, according to the latest weekly data from Web measurement site Hitwise.

YouTube videos account for 60 percent of all videos watched online, the company said. …

In June, 2.5 billion videos were watched on YouTube, which is based in San Mateo, California and has just over 30 employees. More than 65,000 videos are now uploaded daily to YouTube, up from around 50,000 in May, the company said.

YouTube boasts nearly 20 million unique users per month, according to Nielsen//NetRatings, another Internet audience measurement firm.

Just how big is YouTube? Read More »

How to get 1 million MySpace friends

From Nate Mook’s “Cross-Site Scripting Worm Hits MySpace” (Beta News: 13 October 2005):

One clever MySpace user looking to expand his buddy list recently figured out how to force others to become his friend, and ended up creating the first self-propagating cross-site scripting (XSS) worm. In less than 24 hours, “Samy” had amassed over 1 million friends on the popular online community.

How did Samy transcend his humble beginnings of only 73 friends to become a veritable global celebrity? The answer is a combination of XSS tricks and lax security in certain Web browsers.

First, by examining the restrictions put into place by MySpace, Samy discovered how to insert raw HTML into his user profile page. But MySpace stripped out the word “javascript” from any text, which would be needed to execute code.

With the help of Internet Explorer, Samy was able to break the word JavaScript into two lines and place script code within a Cascading Style Sheet tag.

The next step was to simply instruct the Web browser to load a MySpace URL that would automatically invite Samy as a friend, and later add him as a “hero” to the visitor’s own profile page. To do this without a user’s knowledge, the code utilized XMLHTTPRequest – a JavaScript object used in AJAX, or Web 2.0, applications such as Google Maps.

Taking the hack even further, Samy realized that he could simply insert the entire script into the visiting user’s profile, creating a replicating worm. “So if 5 people viewed my profile, that’s 5 new friends. If 5 people viewed each of their profiles, that’s 25 more new friends,” Samy explained.

It didn’t take long for friend requests to start rolling in – first in the hundreds, then thousands. By 9:30pm that night, requests topped one million and continued arriving at a rate of 1,000 every few seconds. Less than an hour later, MySpace was taken offline while the worm was removed from all user profiles.

How to get 1 million MySpace friends Read More »

Friendster doesn’t get security

From Annalee Newitz’s Cracking the Code to Romance (Wired: June 2004):

Moore’s buddy Matt Chisholm chimes in to tell me about a similar hack, a JavaScript app he wrote with Moore that works on Friendster. It mines for information about anyone who looks at his profile and clicks through to his Web site. “I get their user ID, email address, age, plus their full name. Neither their full name nor their email is ever supposed to be revealed,” he says.

Notified of the security holes Moore and Chisholm exploit, Friendster rep Lisa Kopp insists, “We have a policy that we are not being hacked.”

Friendster doesn’t get security Read More »

Social network analysis by the NSA

From John Diamond and Leslie Cauley’s “Pre-9/11 records help flag suspicious calling” (USA TODAY: 22 May 2006):

Armed with details of billions of telephone calls, the National Security Agency used phone records linked to the Sept. 11, 2001 attacks to create a template of how phone activity among terrorists looks, say current and former intelligence officials who were briefed about the program. …

The “call detail records” are the electronic information that is logged automatically each time a call is initiated. For more than 20 years, local and long-distance companies have used call detail records to figure out how much to charge each other for handling calls and to determine problems with equipment.

In addition to the number from which a call is made, the detail records are packed with information. Also included: the number called; the route a call took to reach its final destination; the time, date and place where a call started and ended; and the duration of the call. The records also note whether the call was placed from a cellphone or from a traditional “land line.” …

Calls coming into the country from Pakistan, Afghanistan or the Middle East, for example, are flagged by NSA computers if they are followed by a flood of calls from the number that received the call to other U.S. numbers.

The spy agency then checks the numbers against databases of phone numbers linked to terrorism, the officials say. Those include numbers found during searches of computers or cellphones that belonged to terrorists.

It is not clear how much terrorist activity, if any, the data collection has helped to find.

Social network analysis by the NSA Read More »

Notes on The Strength of Weak Ties revisited

From Mark Granovetter’s “The Strength Of Weak Ties: A Network Theory Revisited” [Sociological Theory, Volume 1 (1983), 201-233.]:

The argument asserts that our acquaintances (weak ties) are less likely to be socially involved with one another than are our close friends (strong ties).Thus the set of people made up of any individual and his or her acquaintances comprises a low-density network (one in which many of the possible relational lines are absent) whereas the set consisting of the same individual and his or her close friends will be densely knit (many of the possible lines are present). …

The weak tie between Ego and his acquaintance, therefore, becomes not merely a trivial acquaintance tie but rather a crucial bridge between the two densely knit clumps of close friends. To the extent that the assertion of the previous paragraph is correct, these clumps would not, in fact, be connected to one another at all were it not for the existence of weak ties (SWT, p. 1363).

It follows, then, that individuals with few weak ties will be deprived of information from distant parts of the social system and will be confined to the provincial news and views of their close friends. This deprivation will not only insulate them from the latest ideas and fashions but may put them in a disadvantaged position in the labor market, where advancement can depend, as I have documented elsewhere (1974), on knowing about appropriate job openings at just the right time. …

The macroscopic side of this communications argument is that social systems lacking in weak ties will be fragmented and incoherent. New ideas will spread slowly, scientific endeavors will be handicapped, and subgroups separated by race, ethnicity, geography, or other characteristics will have difficulty reaching a modus vivendi. …

In the evolution of social systems, perhaps the most important source of weak ties is the division of labor, since increasing specialization and interdependence result in a wide variety of specialized role relationships in which one knows only a small segment of the other’s personality. … the exposure to a wide variety of different viewpoints and activities is the essential prerequisite for the social construction of individualism. …

She relates this difference to Basil Bernstein’s dis- tinction between restricted and elaborated codes of communication. Restricted codes are simpler-more meanings are implicit and taken for granted as the speakers are so familiar with one another. Elaborated codes are complex and universal – more reflection is needed in organizing one’s communication “when there is more difference between those to whom the speech is addressed” (p. 256). …

At a more mundane level, I argued (SWT, pp. 1369-1373; 1974, pp. 51-62) that weak ties have a special role in a person’s opportunity for mobility-that there is a “structural tendency for those to whom one is only weakly tied to have better access to job information one does not already have. Acquaintances, as compared to close friends, are more prone to move in different circles than oneself. Those to whom one is closest are likely to have the greatest overlap in contact with those one already knows, so that the information to which they are privy is likely to be much the same as that which one already has” (1974, pp. 52-53). …

Administrative or managerial employees had a pattern very much like the one I reported: 35.5 percent using weak ties, 15.8 percent strong ones, and 48.7 percent intermediate. Professionals and office workers also were heavy users of weak ties (30.8 percent and 25.8 percent but, unlike managers, used strong ties even more frequently (51.0 and 44.4 percent). Semiprofessionals found only 13.1 percent of jobs through weak ties and blue-collar workers 19.1 percent; the former found 44.9 percent of jobs through strong ties, the latter only 19.1 percent. …

One set of results is of special interest, however. Ericksen and Yancey found that less-well-educated respondents were those most likely to use strong ties for jobs …

The argument of SWT implies that only bridging weak ties are of special value to individuals; the significance of weak ties is that they are far more likely to be bridges than are strong ties. It should follow, then, that the occupational groups making the greatest use of weak ties are those whose weak ties do connect to social circles different from one’s own. …

Consistent with this interpretation is the finding of Lin and col- leagues (1981) that weak ties have positive effects on occupational status only when they connect one to high-status individuals. For those of lower status, weak ties to those of similar low status were not especially useful, whereas those to high-status contacts were. In the latter case the status difference alone strongly suggests that the ties bridged substan- tial social distance. …

Weak ties provide people with access to information and resources beyond those available in their own social circle; but strong ties have greater motivation to be of assistance and are typically more easily available. …

Pool argues, for example, that the number of weak ties is increased by the development of the communications system, by bureaucratization, population density, and the spread of market mechanisms. Further, he suggests that average family size affects the number of weak ties, since where “primary families are large, more of the total contacts of an individual are likely to be absorbed in them” (p. 5). …

In my study of job finding, for example, I found that those whose job was found through strong ties were far more likely to have had a period of unemployment between jobs than those using weak ties (1974, p. 54). …

A number of studies indicate that poor people rely more on strong ties than do others. Ericksen and Yancey, in a study of Philadel- phia, conclude that the “structure of modern society is such that some people typically find it advantageous to maintain strong networks and we have shown that these people are more likely to be young, less well educated, and black” (1977, p. 23). …

Stack (1974) studied a black, urban American, midwestern ghetto … Stack: “Black families living in the Flats need a steady source of cooperative support to survive. They share with one another because of the urgency of their needs. . . . They trade food stamps, rent money, a TV, hats, dice, a car, a nickel here, a cigarette there, food, milk, grits, and children. . . . Kin and close friends who fall into similar economic crises know that they may share the food, dwelling, and even the few scarce luxuries of those individuals in their kin network. . . . Non-kin who live up to one another’s expectations express elaborate vows of friendship and conduct their social relations within the idiom of kinship” (1974, pp. 32-33, 40). …

At the same time, I would suggest that the heavy concentration of social energy in strong ties has the impact of fragmenting communities of the poor into encapsulated networks with poor connections between these units; individuals so encapsulated may then lose some of the advantages associated with the outreach of weak ties. This may be one more reason why poverty is self-perpetuating. Certainly programs meant to provide social services to the poor have frequently had trouble in their outreach efforts. From the network arguments advanced here, one can see that the trouble is to be expected. …

Furthermore, many cultural items never transmitted by the media are known throughout an extensive network: “Youth cultures offer excellent examples of subcultures which provide a set of communication channels external to the media. Much material which is common knowledge among young people – dirty jokes, sexual lore, aggressive humor . . . is not communicated by the adult-controlled media” (p. 9). …

What makes cultural diffusion possible, then, is the fact that small cohesive groups who are liable to share a culture are not so cohesive that they are entirely closed; rather, ideas may penetrate from other such groups via the connecting medium of weak ties. It is a seeming paradox that the effect of weak ties, in this case, is homogenization, since my emphasis has been the ability of weak ties to reach out to groups with ideas and information different from one’s own. The paradox dissolves, however, when the process is understood to occur over a period of time. The ideas that initially flow from another setting are, given regional and other variations, probably new. Homogeneous subcultures do not happen instantly but are the endpoint of diffusion processes. … Fine and Kleinman note that “culture usage consists of chosen behaviors. . . . Culture can be employed strategically and should not be conceptualized as a conditioned response. Usage of culture requires motivation and, in particular, identification with those who use the cultural items. Thus, values, norms, behaviors, and artifacts constitute a subculture only insofar as individuals see themselves as part of a collectivity whose members attribute particular meanings to these ‘objects'” (1979, pp. 12-13). …

The importance of this notion is clear. If “the innovativeness of central units is shackled by vested intellectual interests (or perspectives) then new ideas must emanate from the margins of the network” (p. 460). Furthermore, as I suggested in SWT for the case of high-risk innovations (p. 1367), Chubin points out that marginals, in science, can better afford to innovate; the innovations, if useful, are seized on by the center. …

Weimann finds also, however, that strong ties are not irrelevant in information flow-the speed of flow, credibility, and especially influence are all greater through strong ties and, in fact, “most of the influence is carried through strong ties” (1980, p. 12). He suggests a division of labor between weak and strong ties: Weak ties provide the bridges over which innovations cross the boundaries of social groups; the decision making, however, is influenced mainly by the strong-ties network in each group (p. 21). …

In the bureaucratic solution, the ties are hierarchical; in the democratic clinics, many of which have reacted against the formal model, “tena- cious ties provide a matrix of close primary group relations unifying the entire structure. These strong ties strikingly resemble patterns observed in small communities, summer camps, and Jesuit monastic orders” (p. 20). …

In their analysis Breiger and Pattison studied three types of ties in the two communities-social, community affairs, and business- professional-and found that social ties function as strong ties, that business-professional ties are weak, and that community-affairs ties are strong in relation to business ties but weak in relation to social ones (1978, pp. 222-224). …

I have not argued that all weak ties serve the functions described in SWT-only those acting as bridges between network segments. Weak ties are asserted to be important because their likelihood of being bridges is greater than (and that of strong ties less than) would be expected from their numbers alone. This does not preclude the possibility that most weak ties have no such function.

Notes on The Strength of Weak Ties revisited Read More »

From P2P to social sharing

From Clay Shirky’s “File-sharing Goes Social“:

The RIAA has taken us on a tour of networking strategies in the last few years, by constantly changing the environment file-sharing systems operate in. In hostile environments, organisms often adapt to become less energetic but harder to kill, and so it is now. With the RIAA’s waves of legal attacks driving experimentation with decentralized file-sharing tools, file-sharing networks have progressively traded efficiency for resistance to legal attack. …

There are several activities that are both illegal and popular, and these suffer from what economists call high transaction costs. Buying marijuana involves considerably more work than buying roses, in part because every transaction involves risk for both parties, and in part because neither party can rely on the courts for redress from unfair transactions. As a result, the market for marijuana today (or NYC tattoo artists in the 1980s, or gin in the 1920s, etc) involves trusted intermediaries who broker introductions.

These intermediaries act as a kind of social Visa system; in the same way a credit card issuer has a relationship with both buyer and seller, and an incentive to see that transactions go well, an introducer in an illegal transaction has an incentive to make sure that neither side defects from the transaction. And all parties, of course, have an incentive to avoid detection. …

There are many ways to move to such membrane-bounded systems, of course, including retrofitting existing networks to allow sub-groups with controlled membership (possibly using email white-list or IM buddy-list tools); adopting any of the current peer-to-peer tools designed for secure collaboration (e.g. Groove, Shinkuro, WASTE etc); or even going to physical distribution. As Andrew Odlyzko has pointed out, sending disks through the mail can move enough bits in a 24 hour period to qualify as broadband, and there are now file-sharing networks whose members simply snail mail one another mountable drives of music. …

The disadvantage of social sharing is simple — limited membership means fewer files. The advantage is equally simple — a socially bounded system is more effective than nothing, and safer than Kazaa. …

From P2P to social sharing Read More »

The value of Group-Forming Networks

From David P. Reed’s “That Sneaky Exponential – Beyond Metcalfe’s Law to the Power of Community Building“:

Bob Metcalfe, inventor of the Ethernet, is known for pointing out that the total value of a communications network grows with the square of the number of devices or people it connects. This scaling law, along with Moore’s Law, is widely credited as the stimulus that has driven the stunning growth of Internet connectivity. Because Metcalfe’s law implies value grows faster than does the (linear) number of a network’s access points, merely interconnecting two independent networks creates value that substantially exceeds the original value of the unconnected networks. …

But many kinds of value are created within networks. While many kinds of value grow proportionally to network size and some grow proportionally to the square of network size, I’ve discovered that some network structures create total value that can scale even faster than that. Networks that support the construction of communicating groups create value that scales exponentially with network size, i.e. much more rapidly than Metcalfe’s square law. I will call such networks Group-Forming Networks, or GFNs. …

What kind of value are we talking about, when we say the value of a network scales as some function of size? The answer is the value of potential connectivity for transactions. That is, for any particular access point (user), what is the number of different access points (users) that can be connected or reached for a transaction when the need arises. …

The value of potential connectivity is the value of the set of optional transactions that are afforded by the system or network. …

Metcalfe’s law, simply derived, says that if you build a network so that any customer can choose to transact with any other customer, the number of potential connections each of the N customers can make is (N-1), giving a total number of potential connections as N(N-1) or N2-N. Assuming each potential connection is worth as much as any other, the value to each user depends on the total size of the network, and the total value of potential connectivity scales much faster than the size of the network, proportional to N2. …

In networks like the Internet, Group Forming Networks (GFNs) are an important additional kind of network capability. A GFN has functionality that directly enables and supports affiliations (such as interest groups, clubs, meetings, communities) among subsets of its customers. Group tools and technologies (also called community tools) such as user-defined mailing lists, chat rooms, discussion groups, buddy lists, team rooms, trading rooms, user groups, market makers, and auction hosts, all have a common theme—they allow small or large groups of network users to coalesce and to organize their communications around a common interest, issue, or goal. Sadly, the traditional telephone and broadcast/cable network frameworks provide no support for groups. …

What we see, then, is that there are really at least three categories of value that networks can provide: the linear value of services that are aimed at individual users, the “square” value from facilitating transactions, and exponential value from facilitating group affiliations. What’s important is that the dominant value in a typical network tends to shift from one category to another as the scale of the network increases. Whether the growth is by incremental customer additions, or by transparent interconnection, scale growth tends to support new categories of killer apps, and thus new competitive games. …

What’s important in a network changes as the network scale shifts. In a network dominated by linear connectivity value growth, “content is king.” That is, in such networks, there is a small number of sources (publishers or makers) of content that every user selects from. The sources compete for users based on the value of their content (published stories, published images, standardized consumer goods). Where Metcalfe’s Law dominates, transactions become central. The stuff that is traded in transactions (be it email or voice mail, money, securities, contracted services, or whatnot) are king. And where the GFN law dominates, the central role is filled by jointly constructed value (such as specialized newsgroups, joint responses to RFPs, gossip, etc.). …

I’d like to close with a speculative thought. As Francis Fukuyama argues in his book Trust, there is a strong correlation between the prosperity of national economies and social capital, which he defines culturally as the ease with which people in a particular culture can form new associations. There is a clear synergy between the sociability that Fukuyama discusses and the technology and tools that support GFNs-both are structural supports for association. As the scale of interaction grows more global via the Internet, isn’t it possible that a combination of social capital and GFN capital will drive prosperity to those who recognize the value of network structures that support free and responsible association for common purposes?

The value of Group-Forming Networks Read More »

What’s a socio-technical system?

From Ulises Ali Mejias’ “A del.icio.us study: Bookmark, Classify and Share: A mini-ethnography of social practices in a distributed classification community“:

A socio-technical system is conformed of hardware, software, physical surroundings, people, procedures, laws and regulations, and data and data structures.

What’s a socio-technical system? Read More »

Thoughts on tagging/folksonomy

From Ulises Ali Mejias’ “A del.icio.us study: Bookmark, Classify and Share: A mini-ethnography of social practices in a distributed classification community“:

This principle of distribution is at work in socio-technical systems that allow users to collaboratively organize a shared set of resources by assigning classifiers, or tags, to each item. The practice is coming to be known as free tagging, open tagging, ethnoclassification, folksonomy, or faceted hierarchy (henceforth referred to in this study as distributed classification) …

One important feature of systems such as these is that they do not impose a rigid taxonomy. Instead, they allow users to assign whatever classifiers they choose. Although this might sound counter-productive to the ultimate goal of organizing content, in practice it seems to work rather well, although it does present some drawbacks. For example, most people will probably classify pictures of cats by using the tag ‘cats.’ But what happens when some individuals use ‘cat’ or ‘feline’ or ‘meowmeow’ …

It seems that while most people might not be motivated to contribute to a pre-established system of classification that may not meet their needs, or to devise new and complex taxonomies of their own, they are quite happy to use distributed systems of classification that are quick and able to accommodate their personal (and ever changing) systems of classification. …

But distributed classification does not accrue benefits only to the individual. It is a very social endeavor in which the community as a whole can benefit. Jon Udell describes some of the individual and social possibilities of this method of classification:

These systems offer lots of ways to visualize and refine the tag space. It’s easy to know whether a tag you’ve used is unique or, conversely, popular. It’s easy to rename a tag across a set of items. It’s easy to perform queries that combine tags. Armed with such powerful tools, people can collectively enrich shared data. (Udell 2004) …

Set this [an imposed taxonomy] against the idea of allowing a user to add tags to any given document in the corpus. Like Del.icio.us, there needn’t be a pre-defined hierarchy or lexicon of terms to use; one can simply lean on the power of ethnoclassification to build that lexicon dynamically. As such, it will dynamically evolve as usages change and shift, even as needs change and shift. (Williams, 2004)

The primary benefit of free tagging is that we know the classification makes sense to users… For a content creator who is uploading information into such a system, being able to freely list subjects, instead of choosing from a pre-approved “pick list,” makes tagging content much easier. This, in turn, makes it more likely that users will take time to classify their contributions. (Merholz, 2004)

Folksonomies work best when a number of users all describe the same piece of information. For instance, on del.icio.us, many people have bookmarked wikipedia (http://del.icio.us/url/bca8b85b54a7e6c01a1bcfaf15be1df5), each with a different set of words to describe it. Among the various tags used, del.icio.us shows that reference, wiki, and encyclopedia are the most popular. (Wikipedia entry for folksonomy, retrieved December 15, 2004 from http://en.wikipedia.org/wiki/Folksonomy)

Of course, this approach is not without its potential problems:

With no one controlling the vocabulary, users develop multiple terms for identical concepts. For example, if you want to find all references to New York City on Del.icio.us, you’ll have to look through “nyc,” “newyork,” and “newyorkcity.” You may also encounter the inverse problem — users employing the same term for disparate concepts. (Merholz, 2004) …

But as Clay Shirky remarks, this solution might diminish some of the benefits that we can derive from folksonomies:

Synonym control is not as wonderful as is often supposed, because synonyms often aren’t. Even closely related terms like movies, films, flicks, and cinema cannot be trivially collapsed into a single word without loss of meaning, and of social context … (Shirky, 2004) …

The choice of tags [in the entire del.icio.us system] follows something resembling the Zipf or power law curve often seen in web-related traffic. Just six tags (python, delicious/del.icio.us, programming, hacks, tools, and web) account for 80% of all the tags chosen, and a long tail of 58 other tags make up the remaining 20%, with most occurring just once or twice … In the del.icio.us community, the rich get richer and the poor stay poor via http://del.icio.us/popular. Links noted by enough users within a short space of time get listed here, and many del.icio.us users use it to keep up with the zeitgeist. (Biddulph, 2004) …

Thoughts on tagging/folksonomy Read More »

A game completely controlled by the players

From Ron Dulin’s “A Tale in the Desert“:

A Tale in the Desert is set in ancient Egypt. Very ancient Egypt: The only society to be found is that which has been created by the existing players. Your mentor will show you how to gather materials and show you the basics of learning and construction. These are the primary goals in the game–you learn from academies and universities, and then you use what you’ve learned to build things, such as structures and tools. As your character learns new skills, you can advance. …

Higher-level tests are much more complex and require you to enlist lower-level characters to help you complete them. Players are directly involved in almost all aspects of the game, from the introduction of new technologies to the game’s rules to the landscape itself. With a few exceptions, almost every structure you see in the game was built by a player or group of players. New technologies are introduced through research at universities, which is aided by players’ donations to these institutions. Most interestingly, though, the game rules themselves can be changed through the legal system. If you don’t like a certain aspect of the game, within reason, you can introduce a petition to have it changed. If you get enough signatures on your petition, it will be subject to a general vote. If it passes, it becomes a new law. This system is also used for permanently banning players who have, for some reason or another, made other players’ in-game lives difficult. …

The designers themselves have stated that A Tale in the Desert is about creating a society, and watching the experiment in action is almost as enjoyable as taking part.

A game completely controlled by the players Read More »

Computer commands as incantations

From Julian Dibbell’s “A Rape in Cyberspace: How an Evil Clown, a Haitian Trickster Spirit, Two Wizards, and a Cast of Dozens Turned a Database Into a Society“:

After all, anyone the least bit familiar with the workings of the new era’s definitive technology, the computer, knows that it operates on a principle impracticably difficult to distinguish from the pre-Enlightenment principle of the magic word: the commands you type into a computer are a kind of speech that doesn’t so much communicate as make things happen, directly and ineluctably, the same way pulling a trigger does. They are incantations, in other words, and anyone at all attuned to the technosocial megatrends of the moment — from the growing dependence of economies on the global flow of intensely fetishized words and numbers to the burgeoning ability of bioengineers to speak the spells written in the four-letter text of DNA — knows that the logic of the incantation is rapidly permeating the fabric of our lives.

Computer commands as incantations Read More »

Terrorist social networks

From Technology Review‘s “Terror’s Server“:

For example, research suggests that people with nefarious intent tend to exhibit distinct patterns in their use of e-mails or online forums like chat rooms. Whereas most people establish a wide variety of contacts over time, those engaged in plotting a crime tend to keep in touch only with a very tight circle of people, says William Wallace, an operations researcher at Rensselaer Polytechnic Institute.

This phenomenon is quite predictable. “Very few groups of people communicate repeatedly only among themselves,” says Wallace. “It’s very rare; they don’t trust people outside the group to communicate. When 80 percent of communications is within a regular group, this is where we think we will find the groups who are planning activities that are malicious.” Of course, not all such groups will prove to be malicious; the odd high-school reunion will crop up. But Wallace’s group is developing an algorithm that will narrow down the field of so-called social networks to those that warrant the scrutiny of intelligence officials. The algorithm is scheduled for completion and delivery to intelligence agencies this summer. …

Terrorist social networks Read More »

Cameraphones are different cameras & different phones

From David Pescovitz’s “The Big Picture“:

Mobile researcher John Poisson, CEO of the Fours Initiative, focuses on how cameraphones could revolutionize photography and communication — if people would only start using them more.

As the leader of Sony Corporation’s mobile media research and design groups in Tokyo, John Poisson spent two years focused on how people use cameraphones, and why they don’t use them more often.

TheFeature: What have you learned over the course of your research?

Poisson: People think of the cameraphone as a more convenient tool for digital photography, an extension of the digital camera. That’s missing the mark. The mobile phone is a communications device. The minute you attach a camera to that, and give people the ability to share the content that they’re creating in real time, the dynamic changes significantly.

TheFeature: Aren’t providers already developing applications to take advantage of that shift?

Poisson: Well, we have things like the ability to moblog, to publish pictures to a blog, which is not necessarily the most relevant model to consumers. Those tools are developed by people who understand blogging and apply it in their daily lives. But it ignores the trend that we and Mimi Ito and others are seeing as part of the evolution of photography. If you look at the way people have (historically) used cameras, it started off with portraiture and photographs of record — formalized photographs with a capital “P.” Then as the technology evolved, we had this notion of something called a snapshot, which is much more informal. People could take a higher number of pictures with not so much concern over composition. It was more about capturing an experience than photographing something. The limit of that path was the Polaroid. It was about taking the picture and sharing it instantly. What we have today is the ability to create today is a kind of distributed digital manifestation of that process.

Cameraphones are different cameras & different phones Read More »

30 seconds to impress

From The Scotsman‘s “Men, you have 30 seconds to impress women“:

HALF of all women make their minds up within 30 seconds of meeting a man about whether he is potential boyfriend material, according to a study on speed-dating.

The women were on average far quicker at making a decision than the men during some 500 speed dates at an event organised as part of Edinburgh Science Festival.

The scientists behind the research said this showed just how important chat-up lines were in dating. They found that those who were “highly skilled in seduction” used chat-up lines that encouraged their dates to talk about themselves in “an unusual, quirky way”.

The top-rated male’s best line was “If you were on Stars In Their Eyes, who would you be?”, while the top-rated female asked bizarrely: “What’s your favourite pizza topping?”

Failed Casanovas were those who offered up hackneyed comments like “Do you come here often?”, or clumsy attempts to impress, such as “I have a PhD in computing”.

About a third of the speed dates were actually over within the first 30 seconds, but there was a marked difference between the sexes with 45 per cent of women coming to a decision within 30 seconds, compared with only 22 per cent of men.

… Conversation topics were also assessed. Only 9 per cent of pairs who talked about films agreed to meet again, compared with 18 per cent who spoke about the subject found to be the most suitable for dating: travel.

It is thought women’s taste for musicals clashed with the male liking for action films, while talking about “great holidays and dream destinations” made people feel good and appear more attractive to each other.

30 seconds to impress Read More »

Some thoughts on strong & weak social ties

From Ross Mayfield’s “The Weakening of Strong Ties“:

Mark Granovetter’s seminal paper, The Strength of Weak Ties (summary), revealed the difference between friends and acquaintances and how useful acquaintances can be for certain tasks like finding a job. The difference between a strong tie and weak tie can generally be revealed by time commitment underpinning the relationship. Strong ties are better for action, weak ties for new information.

But time has changed with new tools and social networking models at our disposal. For the first time many social networks are being made explicit, often without the knowledge of participants, at an accelerating pace and dramatically lowered search costs. This newfound transparency may very well make strong ties weaker. …

Top-down models, or weak tie systems, are particularly good at the breadth of sample and search. …

That said, weak tie systems provide real insight we didn’t have before. They have vast potential for revealing structural holes and other methods of enhancing social capital. So long as participation is voluntary, information flows monitored is public and constraints keep in check how people act upon intelligence these systems will become a critical competitive advantage for any company.

By contrast, bottom-up systems are built for people instead of companies. Within Friendster, Ryze, Tribe.net and LinkedIn connections are made through individual decisions upon of invitations, requests and confirmations. The network grows organically, decision by voluntary decision.

Some thoughts on strong & weak social ties Read More »