Boston blasts show two sides of social media


Zach Miners in ComputerWorld: “Twitter users reacted fast to the explosions that ripped through the Boston Marathon Monday, but the incident also revealed how social media can only be so reliable in such situations. Twitter spread news of the blasts quickly and was a useful communications tool for public authorities such as the Boston police and the marathon organizers. But information on social media sites can also be questionable or just plain inaccurate, noted Greg Sterling, senior analyst with Opus Research…
The Boston Police Department’s Twitter log showed a positive side of social media. It was updated minute by minute in the aftermath of the bombings, often with instructions about which areas to avoid, or information about where the most police officers might be stationed.
There was also misinformation, however. A report was circulated quickly on Twitter that police had shut down cellphone service in Boston to prevent detonation of further blasts, though it ultimately turned out to be inaccurate, according to network operators.
Others had nefarious intentions. At one point, a Twitter account with the handle @_BostonMarathon was promising to donate US$1 to victims of the blast for every one of its tweets that was retweeted. Users soon called it out as a fake, noting the real Twitter account for the Boston Marathon was @BostonMarathon.”
See also: Google’s Person Finder

New OECD paper on Machine-to-Machine Communications


Machine-to-Machine Communications – Connecting Billions of Devices: “This document examines the future of machine-to-machine communication (M2M), with a particular focus on mobile wireless networks. M2M devices are defined, in this paper, as those that are actively communicating using wired and wireless networks, are not computers in the traditional sense and are using the Internet in some form or another. While, at the global level, there are currently around five billion devices connected to mobile networks, this may by some estimates increase to 50 billion by the end of the decade. The report provides examples of some of the uses to which M2M is being put today and its potential to enhance economic and social development. It concludes that to achieve these benefits, however, changes to telecommunication policy and regulatory frameworks may be required. Some of the main areas that will need to be evaluated, and implications of M2M assessed, include: opening access to mobile wholesale markets for firms not providing public telecommunication services; numbering policy; frequency policy; privacy and security; and access to public sector information.”

Big Data can help keep the peace


NextGov story: “Some of the same social media analyses that have helped Google and the Centers for Disease Control and Prevention spot warning signs of a flu outbreak could be used to detect the rumblings of violent conflict before it begins, scholars said in a paper released this week.
Kenyan officials used essentially this system to track hate speech on Facebook, blogs and Twitter in advance of that nation’s 2013 presidential election, which brought Uhuru Kenyatta to power.
Similar efforts to track Syrian social media have been able to identify ceasefire violations within 15 minutes of when they occur, according to the paper on New Technology and the Prevention of Violence and Conflict prepared by the United States Agency for International Development, the United Nations Development Programme and the International Peace Institute and presented at the United States Institute of Peace Friday.”

Medical Care, Aided by the Crowd


New York Times profile of a new crowdsourced service: “Watsi, which started last August, lets people donate as little as $5 toward low-cost, high-impact medical treatment for patients in third-world countries. The procedures range from relatively simple ones like fixing a broken limb to more complicated surgery — say, to remove an eye tumor. But the treatments generally have a high likelihood of success and don’t involve multiple operations or long-term care… Watsi represents the next generation of charities dependent on online donors, evolving the model started by sites like Kiva. With just a few mouse clicks, Kiva users, say, are able to lend money to a restaurant owner in the Philippines — and to examine her loan proposal and repayment schedule, to read about her and see her photograph.”

Translating public health into media


Jina Moore in the Columbia Journalism Review on the fifth “Envision” conference, convened by the UN’s Department of Public Information, the Independent Film Project, and Social Good Summit Partners: “These days, there’s lots of interest among the do-gooding world—nonprofits or NGOs, private foundations and public agencies—in how to use media. Partners in Health, to name just one big public health player, regularly uses videos and storytelling in its fundraising campaigns and on its website. So Envision’s focus on getting storytellers to understand and raise awareness about public health issues isn’t exactly new. The question is, is it useful?”

America’s problem is not political gridlock


Larry Summers in the Financial Times: “The great mistake of the gridlock theorists is to suppose that all progress comes from legislation and that more legislation consistently represents more progress. While these are seen as years of gridlock, consider what has happened in the past five years…None of this is to say that the US does not face huge challenges. But these are not due to structural obstacles. They are about finding solutions to problems such as rising inequality and climate change – where we do not quite know the way forward. This is not a problem of gridlock – it is a problem of vision.”

Internet Security and Networked Governance in International Relations


Paper by M Mueller, A Schmidt, B Kuerbis in International Studies Review: “This paper asks whether the Internet’s heavy reliance on nonhierarchical, networked forms of governance is compatible with growing concerns about cyber-security from traditional state actors. Networked governance is defined as a semipermanent, voluntary negotiation system that allows interdependent actors to opt for collaboration or unilateral action in the absence of an overarching authority. Two case studies—Internet routing security and the response to a large-scale botnet known as Conficker—show the prevalence of networked governance on the Internet and provide insight into its strengths and limitations. The paper concludes that both cases raise doubts about the claim that introducing security concerns into Internet governance necessarily leads to more hierarchy and/or a greater role for governments.”

Interpretative Communities


Communities to sense locally of open government data.

A new paper on “Local governance in the new information ecology” in the journal Public Money & Management calls for the creation of “interpretative communities” to make sense locally of open government data. In particular, they argue that:

“The availability of this open government data… solves nothing: as many writers have pointed out, such data needs to be interpreted and interpretation is always a function of a collective—what has been called an ‘interpretative’ or ‘epistemic’ community.”

The call mirrors the emerging view that the next stage regarding open data is to focus on making sense of the data and using it to serve the public good.

The authors identify “three different models of ‘interpretative communities’ that have emerged over the last few decades, drawing on, respectively, literary theory, science and technology studies and international politics”—including reference groups, epistemic communities, and expert networks. As to developing these communities locally, the paper states that it will require us…

“to rethink the resources and institutions that could support a local use of OGD and other resources. Such institutional support for local interpretation cannot be wholly local but needs to draw, in a critical and interactive manner, on wider knowledge bases. In the end, the model of the local that needs to be mobilized is not one based on spatial propinquity alone, or on a bounded sense of local, but one in which the local is seen as relational, connected and dynamic…we might look to the new technologies, and the newly-emerged social networks or Web 2.0 in particular, for such a balance of the local and the extra local”.

The paper ultimately is a critique of the current movement to provide open data that is presented as objective knowledge but is based on a “view from nowhere”…

“To make it into the view from somewhere will require the construction of powerful, yet open, interpretative communities to enact local governance with all of the subsequent questions arising about current modes of democratic representation, sectional interests in the third and private sector and centrallocal government dynamics. The prospects of such an information ecology to support interpretative community building emerging in the current environment in anything other than a piecemeal and reactive way do not appear promising.”

Crowdscaling


“Crowdscaling taps into the energy of people around the world that want to contribute. […] It grows and scales its impact outward by empowering the success of others.”

Let’s consider these numbers that were shared in February of this year:

  • 3,190 TEDx events have happened around the world (since 2009)
  • 800 cities around the world have hosted one or more TEDx event
  • 126 countries have hosted one or more TEDx events
  • 12,900 TEDxTalks have been delivered

The first TEDx organizer, Krisztina “Z” Holly, explains these numbers of  growth in the Huffington Post as resulting from “crowdscaling”:

“Like crowdsourcing, crowdscaling taps into the energy of people around the world that want to contribute. But while crowdsourcing pulls in ideas and content from outside the organization, crowdscaling grows and scales its impact outward by empowering the success of others.”

Krisztina identifies two critical success factors behind “crowdscaling”:

  • Adopting a “platform” model of institutional organization

“It is a business strategy that, instead of using a top-down, command-and-control approach for growth, builds on the nature of today’s hyper-connected, open, and globalized world to leverage customers, partners, even competitors. Organizations can achieve enormous scale and influence by creating the platform on which others can build, and aligning stakeholders so they feel partial ownership of the movement.”

  • Strong commitment from the top

“While the approach requires only modest investment, it does need a large commitment from the top. It can make typical leaders very uneasy, because they are no longer in complete control. (Imagine having over a thousand volunteer teams, who aren’t employed by you and can’t be fired by you, creating events around the world in your name! That’s enough to give a typical corporate executive night sweats.)”

Seeing is believing


Christopher Caldwell in the Financial Times , reviewing the new book of film academic Stephen Apkon called The Age of the Image , argues that “The written word is becoming the language of a scholarly establishment”:
“Until recently, it was the essence of statesmanship, scholarship and justice to purge strong emotion from our deliberations. Images today, though, are so plentiful and sharp that they dominate our thought processes. Although Mr Apkon relishes the immediacy of YouTube, he fears that political advertisers will soon be able to craft stories around “hidden mental hungers”, easily manipulating voters.
Citizens tend to think about voting in one of two ways. First, you base your vote on your identity. You are a farmer, so you choose the candidate best disposed towards farmers. The second theory is that you vote on arguments, independent of identity. You believe a sales tax should replace income tax, so you vote for the candidate who shares that opinion. But today’s image-based communication has little to do with identity or arguments. It has to do with the lowest-common-denominator traits that mark you as a human animal.”