Digital storytelling has become a popular method for curating community, organisational, and individual narratives. Since its beginnings over 20 years ago, projects have sprung up across the globe, where authentic voice is found in the narration of lived experiences. Contributing to a Collective Intelligence for the Common Good, the authors of this paper ask how shared stories can bring impetus to community groups to help identify what they seek to change, and how digital storytelling can be effectively implemented in community partnership projects to enable authentic voices to be carried to other stakeholders in society. The Community Digital Storytelling (CDST) method is introduced as a means for addressing community-of-place issues. There are five stages to this method: preparation, story telling, story digitisation, digital story sense-making, and digital story sharing. Additionally, a Storytelling Cycle of Trust framework is proposed. We identify four trust dimensions as being imperative foundations in implementing community digital media interventions for the common good: legitimacy, authenticity, synergy, and commons. This framework is concerned with increasing the impact that everyday stories can have on society; it is an engine driving prolonged storytelling. From this perspective, we consider the ability to scale up the scope and benefit of stories in civic contexts. To illustrate this framework, we use experiences from the CDST workshop in northern Britain and compare this with a social innovation project in the southern Netherlands….(More)”.
The Nudging Divide in the Digital Big Data Era
Julia M. Puaschunder in the International Robotics & Automation Journal: “Since the end of the 1970ies a wide range of psychological, economic and sociological laboratory and field experiments proved human beings deviating from rational choices and standard neo-classical profit maximization axioms to fail to explain how human actually behave. Behavioral economists proposed to nudge and wink citizens to make better choices for them with many different applications. While the motivation behind nudging appears as a noble endeavor to foster peoples’ lives around the world in very many different applications, the nudging approach raises questions of social hierarchy and class division. The motivating force of the nudgital society may open a gate of exploitation of the populace and – based on privacy infringements – stripping them involuntarily from their own decision power in the shadow of legally-permitted libertarian paternalism and under the cloak of the noble goal of welfare-improving global governance. Nudging enables nudgers to plunder the simple uneducated citizen, who is neither aware of the nudging strategies nor able to oversee the tactics used by the nudgers.
The nudgers are thereby legally protected by democratically assigned positions they hold or by outsourcing strategies used, in which social media plays a crucial rule. Social media forces are captured as unfolding a class dividing nudgital society, in which the provider of social communication tools can reap surplus value from the information shared of social media users. The social media provider thereby becomes a capitalist-industrialist, who benefits from the information shared by social media users, or so-called consumer-workers, who share private information in their wish to interact with friends and communicate to public. The social media capitalist-industrialist reaps surplus value from the social media consumer-workers’ information sharing, which stems from nudging social media users. For one, social media space can be sold to marketers who can constantly penetrate the consumer-worker in a subliminal way with advertisements. But also nudging occurs as the big data compiled about the social media consumer-worker can be resold to marketers and technocrats to draw inferences about consumer choices, contemporary market trends or individual personality cues used for governance control, such as, for instance, border protection and tax compliance purposes.
The law of motion of the nudging societies holds an unequal concentration of power of those who have access to compiled data and who abuse their position under the cloak of hidden persuasion and in the shadow of paternalism. In the nudgital society, information, education and differing social classes determine who the nudgers and who the nudged are. Humans end in different silos or bubbles that differ in who has power and control and who is deceived and being ruled. The owners of the means of governance are able to reap a surplus value in a hidden persuasion, protected by the legal vacuum to curb libertarian paternalism, in the moral shadow of the unnoticeable guidance and under the cloak of the presumption that some know what is more rational than others. All these features lead to an unprecedented contemporary class struggle between the nudgers (those who nudge) and the nudged (those who are nudged), who are divided by the implicit means of governance in the digital scenery. In this light, governing our common welfare through deceptive means and outsourced governance on social media appears critical. In combination with the underlying assumption of the nudgers knowing better what is right, just and fair within society, the digital age and social media tools hold potential unprecedented ethical challenges….(More)”
Using Social Media To Predict the Future: A Systematic Literature Review
Review by Lawrence Phillips, Chase Dowling, Kyle Shaffer, Nathan Hodas and Svitlana Volkov: “Social media (SM) data provides a vast record of humanity’s everyday thoughts, feelings, and actions at a resolution previously unimaginable. Because user behavior on SM is a reflection of events in the real world, researchers have realized they can use SM in order to forecast, making predictions about the future. The advantage of SM data is its relative ease of acquisition, large quantity, and ability to capture socially relevant information, which may be difficult to gather from other data sources. Promising results exist across a wide variety of domains, but one will find little consensus regarding best practices in either methodology or evaluation. In this systematic review, we examine relevant literature over the past decade, tabulate mixed results across a number of scientific disciplines, and identify common pitfalls and best practices. We find that SM forecasting is limited by data biases, noisy data, lack of generalizable results, a lack of domain-specific theory, and underlying complexity in many prediction tasks. But despite these shortcomings, recurring findings and promising results continue to galvanize researchers and demand continued investigation. Based on the existing literature, we identify research practices which lead to success, citing specific examples in each case and making recommendations for best practices. These recommendations will help researchers take advantage of the exciting possibilities offered by SM platforms….(More)”
#WhereIsMyName ?
Mujb Mashal the New York Times: “These are some of the terms Afghan men use to refer to their wives in public instead of their names, the sharing of which they see as a grave dishonor worthy of violence: Mother of Children, My Household, My Weak One or sometimes, in far corners, My Goat or My Chicken.
Women also may be called Milk-sharer or Black-headed. The go-to word for Afghans to call a woman in public, no matter her status, is Aunt.
But a social media campaign to change this custom has been percolating in recent weeks, initiated by young women. The campaign comes with a hashtag in local languages that addresses the core of the issue and translates as #WhereIsMyName.
The activists’ aim is both to challenge women to reclaim their most basic identity, and to break the deep-rooted taboo that prevents men from mentioning their female relatives’ names in public….
Like many social media efforts, this one began small, with several posts out of Herat Province in the west. Since then, more activists have tried to turn it into a topic of conversation by challenging celebrities and government officials to share the names of their wives and mothers.
The discussion has now made it to the regular media, with articles in newspapers and conversations on television and radio talk shows.
Members of the Parliament, senior government officials and artists have come forward in support, publicly declaring the identities of the female members of their families….(More)”
Charities are underestimating the importance of trust. That’s a problem.
Jill Halford & Neil Sherlock at NPC: “A growing mistrust and scepticism of organisations, experts and leaders has become a defining feature of recent times, causing many to question established truths that they’ve traditionally held dear. Against a backdrop of increasing volumes of data and commentary, amplified by social media, and the rise of ‘fake news’, it has become much harder for the public to both know who the experts are and to trust them to get things right. This directly impacts many charities who are themselves experts in their field and rely on the public to listen to and respond to their advice. In an increasingly digitalised world, there’s a sense that it is harder to gain and retain trust. There are growing concerns among CEOs about the impact of social media on the level of trust in their industry.
A growing mistrust and scepticism of organisations, experts and leaders has become a defining feature of recent times.
The questioning of experts is underpinned by a pervading sense that many actors are driven by hidden or ulterior motives, perhaps making some people less willing to trust organisations and their leaders. The Edelman Trust Barometer 2017 finds that 60% of the UK public think ‘the system’ is failing. This is defined as feeling a sense of injustice, a lack of hope and confidence and a desire for change. There is an emerging view that everyone from politicians, to businesses to charities need to do more to explain what they do and how it benefits both individuals and wider society….Public polling for the Charity Commission showed that the overall level of trust and confidence in charities fell from 6.7 out of 10 in 2012 and 2014 to 5.7 in 2016. This is a trend that is also reflected in the Edelman Trust Barometer 2017. Meanwhile other studies suggest that trust is bouncing back.
…Trust is often an overlooked asset for charities. For many organisations, trust can typically only come on the agenda when things are going wrong. NPC’s State of the Sector research report Charities taking charge shows that nearly a third of charity leaders think a loss of trust in the sector would have no effect on their organisation. The research also finds a narrow association between trust and fundraising rather than taking a more holistic view to trust.
Trust is a fundamental prerequisite of effective human interaction and meaningful, constructive relationships.
But trust matters deeply to people, and so it should matter to the organisations that serve them. Trust is considered a fundamental prerequisite of effective human interaction and meaningful, constructive relationships. It is the ‘glue’ that binds society and the economy together. There is a clear need for all organisations to take a broader view of trust. While those charities that rely on fundraising may feel that they need to be more concerned with public trust than a philanthropic foundation, for example, trust impacts a charity in many ways. For example, people’s trust in an organisation can fundamentally shape their behaviour and actions towards it. This can include trusting an organisation with your data and personal information, being more willing to collaborate and engage, and listening and acting on advice and expertise.
Trust is a powerful asset for organisations in four specific ways:
- trust drives performance;
- trust allows organisations to be true to themselves;
- trust can help win round stakeholder scepticism; and
- trust can put organisations on the front foot in a crisis that will inevitably happen at some point, positioning them in a better place to recover.
All four of these should resonate with charities as they seek to deliver greater impact in line with their values and ethos….(More).
China seeks glimpse of citizens’ future with crime-predicting AI
Yuan Yang, Yingzhi Yang and Sherry Fei Ju in the Financial Times: “China, a surveillance state where authorities have unchecked access to citizens’ histories, is seeking to look into their future with technology designed to predict and prevent crime. Companies are helping police develop artificial intelligence they say will help them identify and apprehend suspects before criminal acts are committed. “If we use our smart systems and smart facilities well, we can know beforehand . . . who might be a terrorist, who might do something bad,” Li Meng, vice-minister of science and technology, said on Friday.
Facial recognition company Cloud Walk has been trialling a system that uses data on individuals’ movements and behaviour — for instance visits to shops where weapons are sold — to assess their chances of committing a crime. Its software warns police when a citizen’s crime risk becomes dangerously high, allowing the police to intervene. “The police are using a big-data rating system to rate highly suspicious groups of people based on where they go and what they do,” a company spokesperson told the Financial Times. Risks rise if the individual “frequently visits transport hubs and goes to suspicious places like a knife store”, the spokesperson added. China’s authoritarian government has always amassed personal data to monitor and control its citizens — whether they are criminals or suspected of politically sensitive activity. But new technology, from phones and computers to fast-developing AI software, is amplifying its capabilities. These are being used to crack down on even the most minor of infractions — facial recognition cameras, for instance, are also being used to identify and shame jaywalkers, according to state media. Mr Li said crime prediction would become an important use for AI technology in the government sphere.
China’s crime-prediction technology relies on several AI techniques, including facial recognition and gait analysis, to identify people from surveillance footage. In addition, “crowd analysis” can be used to detect “suspicious” patterns of behaviour in crowds, for example to single out thieves from normal passengers at a train stations. As well as tracking people with a criminal history, Cloud Walk’s technology is being used to monitor “high-risk” places such as hardware stores…(More)”
Crowdsourcing Expertise to Increase Congressional Capacity
Austin Seaborn at Beeck Center: “Members of Congress have close connections with their districts, and information arising from local organizations, such as professional groups, academia, industry as well as constituents with relevant expertise (like retirees, veterans or students) is highly valuable to them. Today, congressional staff capacity is at a historic low, while at the same time, constituents in districts are often well equipped to address the underlying policy questions that Congress seeks to solve….
In meetings we have had with House and Senate staffers, they repeatedly express both the difficulty managing their substantial area-specific work loads and their interest in finding ways to substantively engage constituents to find good nuggets of information to help them in their roles as policymakers. At the same time, constituents are demanding more transparency and dialogue from their elected representatives. In many cases, our project brings these two together. It allows Members to tap the expertise in their districts while at the same time creating an avenue for constituents to contribute their knowledge and area expertise to the legislative process. It’s a win for constituents and a win for Member of Congress and their staffs.
It is important to note that the United States lags behind other democracies in experimenting with more inclusive methods during the policymaking process. In the United Kingdom, for example, the UK Parliament has experimented with a variety of new digital tools to engage with constituents. These methods range from Twitter hashtags, which are now quite common given the rise in social media use by governments and elected officials, to a variety of web forums on a variety of platforms. Since June of 2015, they have also been doing digital debates, where questions from the general public are crowdsourced and later integrated into a parliamentary debate by the Member of Parliament leading the debate. Estonia, South Africa, Taiwan, France also…notable examples.
One promising new development we hope to explore more thoroughly is the U.S. Library of Congress’s recently announced legislative data App Challenge. This competition is distinct from the many hackathons that have been held on behalf of Congress in the past, in that this challenge seeks new methods not only to innovate, but also to integrate and legislate. In his announcement, the Library’s Chief Information Officer, Bernard A. Barton, Jr., stated, “An informed citizenry is better able to participate in our democracy, and this is a very real opportunity to contribute to a better understanding of the work being done in Washington. It may even provide insights for the people doing the work around the clock, both on the Hill, and in state and district offices. Your innovation and integration may ultimately benefit the way our elected officials legislate for our future.” We believe these sorts of new methods will play a crucial role in the future of engaging citizens in their democracies….(More)”.
Global network of ‘hunters’ aim to take down terrorists on the internet
Olivia Solon at The Guardian: “Colonel Kurtz used to spend hours playing social games like Farmville. Now he hunts terrorists on the internet.
The pseudonymous 41-year-old, who runs his own construction company, is one of dozens of volunteer “hunters” to dedicate hours each day trying to identify and infiltrate terror groups online and block the spread of their propaganda.
“We’re trying to save lives and get this crap off the net to keep the next vulnerable kid from seeing propaganda and thinking it’s cool,” said Kurtz.
These hunters plug a gap in social media companies’ ability to keep terrorists off their networks by obsessively tracking and reporting Isis’s most prominent recruiters and propagandists across private messaging apps like Telegram and WhatsApp and public networks like Twitter, Facebook and YouTube. Some of them also provide valuable tip-offs of credible threats to law enforcement.
This type of hunting originated in 2014, when hacktivist collective Anonymous declared “war” on Islamic State with the #OpIsis campaign. The loosely affiliated army of digital activists set out to expose and report Isis supporters on social media, and hack or take down their websites.
Kurtz became a hunter following the November 2015 Paris attack. He had been watching the France-Germany friendly football match online when it was disrupted by loud explosions. That day seven attackers carried out mass shootings and suicide bombings that killed 129 people in France’s capital.
After writing an angry Facebook post about the attack, Kurtz was contacted by a friend and member of Anonymous asking if he’d like to help out with #OpIsis. “It took me a few days to figure things out and after a few weeks I was dropping accounts like flies,” he said.
Out of Anonymous’ #OpIsis there have emerged more considered, organized groups including Ghost Security Group, KDK and a “drama and ego-free” group that Kurtz formed in 2016 after getting tired of the Islamophobia and inaccuracy within the operation…(More).
Troops, Trolls and Troublemakers: A Global Inventory of Organized Social Media Manipulation
Report by Samantha Bradshaw and Philip N. Howard: “Cyber troops are government, military or political party teams committed to manipulating public opinion over social media. In this working paper, we report on specific organizations created, often with public money, to help define and manage what is in the best interest of the public. We compare such organizations across 28 countries, and inventory them according to the kinds of messages, valences and communication strategies used. We catalogue their organizationalforms and evaluate their capacities in terms of budgets and staffing. This working paper summarizes the findings of the first comprehensive inventory of the major organizations behind social media manipulation. We find that cyber troops are a pervasive and global phenomenon. Many different countries employ significant numbers of people and resources to manage and manipulate public opinion online, sometimes targeting domestic audiences and sometimes targeting foreign publics.
- The earliest reports of organized social media manipulation emerged in 2010, and by 2017 there are details on such organizations in 28 countries.
- Looking across the 28 countries, every authoritarian regime has social media campaigns targeting their own populations, while only a few of them target foreign publics. In contrast, almost every democracy in this sample has organized social media campaigns that target foreign publics, while political‐party‐supported campaigns target domestic voters.
- Authoritarian regimes are not the only or even the best at organized social media manipulation. The earliest reports of government involvement in nudging public opinion involve democracies, and new innovations in political communication technologies often come from political parties and arise during high‐profile elections.
- Over time, the primary mode for organizing cyber troops has gone from involving military units that experiment with manipulating public opinion over social media networks to strategic communication firms that take contracts from governments for social media campaigns….(More)”
Civil society and online connectivity: controlling corruption on the net?
Over the past years, an increasing number of studies have looked at the use of internet and communications technology (ICT) in the fight against corruption. While there is broad agreement that ICT tools can be effective in controlling corruption, the mechanisms by which they are doing this are much less clear. This paper attempts to shine some light on this relationship. It focusses on the role of ICT in empowering citizens and supporting civil society. It argues that enlightened citizens can use internet access and social media to inform themselves on corruption, mobilise support for anti-corruption movements and gather information in order to shine a light on particularistic practices. Defining corruption as a collective action problem, the paper provides quantitative evidence to support its claim that ICT can support collective action of an informed citizenry and thus contribute to the control of corruption….(more)”