Participation in Public and Social Media Interactions


New Book edited by Marta Dynel and Jan Chovanec: “This book deals with participation frameworks in modern social and public media. It brings together several cutting-edge research studies that offer exciting new insights into the nature and formats of interpersonal communication in diverse technology-mediated contexts. Some papers introduce new theoretical extensions to participation formats, while others present case studies in various discourse domains spanning public and private genres. Adopting the perspective of the pragmatics of interaction, these contributions discuss data ranging from public, mass-mediated and quasi-authentic texts, fully staged and scripted textual productions, to authentic, non-scripted private messages and comments, both of a permanent and ephemeral nature. The analyses include news interviews, online sports reporting, sitcoms, comedy shows, stand-up comedies, drama series, institutional and personal blogs, tweets, follow-up YouTube video commentaries, and Facebook status updates. All the authors emphasize the role of context and pay attention to how meaning is constructed by participants in interactions in increasingly complex participation frameworks existing in traditional as well as novel technologically mediated interactions….(Table of Contents)”.

Cultures of Code


Brian Hayes in the American Scientist: “Kim studies parallel algorithms, designed for computers with thousands of processors. Chris builds computer simulations of fluids in motion, such as ocean currents. Dana creates software for visualizing geographic data. These three people have much in common. Computing is an essential part of their professional lives; they all spend time writing, testing, and debugging computer programs. They probably rely on many of the same tools, such as software for editing program text. If you were to look over their shoulders as they worked on their code, you might not be able to tell who was who.
Despite the similarities, however, Kim, Chris, and Dana were trained in different disciplines, and they belong to  different intellectual traditions and communities. Kim, the parallel algorithms specialist, is a professor in a university department of computer science. Chris, the fluids modeler, also lives in the academic world, but she is a physicist by training; sometimes she describes herself as a computational scientist (which is not the same thing as a computer scientist). Dana has been programming since junior high school but didn’t study computing in college; at the startup company where he works, his title is software developer.
These factional divisions run deeper than mere specializations. Kim, Chris, and Dana belong to different professional societies, go to different conferences, read different publications; their paths seldom cross. They represent different cultures. The resulting Balkanization of computing seems unwise and unhealthy, a recipe for reinventing wheels and making the same mistake three times over. Calls for unification go back at least 45 years, but the estrangement continues. As a student and admirer of all three fields, I find the standoff deeply frustrating.
Certain areas of computation are going through a period of extraordinary vigor and innovation. Machine learning, data analysis, and programming for the web have all made huge strides. Problems that stumped earlier generations, such as image recognition, finally seem to be yielding to new efforts. The successes have drawn more young people into the field; suddenly, everyone is “learning to code.” I am cheered by (and I cheer for) all these events, but I also want to whisper a question: Will the wave of excitement ever reach other corners of the computing universe?…
What’s the difference between computer science, computational science, and software development?…(More)”

The Royal Statistical Society Data Manifesto


ePSiplatform: “A Data Manifesto released by the Royal Statistical Society describes ten recommendations that focus on how the next UK government can improve data for policymaking, democracy and for prosperity…..the Society calls for official statistics to be at the heart of policy debate and recommends that the Office for National Statistics and the wider Government Statistical Service be given adequate resources, as well as calling for greater investment in research, science and innovation.
The document shows that the Society is broadly supportive of the open data agenda; in particular the opening up of government data and giving citizens greater access to quality local data.
It calls for greater data sharing between government departments for statistics and research purposes and believes the private sector should be encouraged to share data with researchers for the same purpose. It also calls for an end to pre-release access to official statistics….Download the Data Manifesto in PDF format.”

Have a smartphone? This start-up will turn you into a lobbyist.


in the Washington Post: “…We needed a solution; some way to turn that passion into action right there in the moment.”
So she built one – but not on her own. In late 2012, Hartsock lured two entrepreneurs, Jeb Ory and Patrick Stoddart, away from tech start-ups they were already running to launch a new venture called Phone2Action. The company now provides an online and mobile platform that helps private companies, nonprofits and trade associations connect their customers and supporters with local and federal policymakers.
In short, the company’s clients – which include the Consumer Electronics Association, the American Heart Association, Ford and ridesharing company Lyft – pay a subscription for access to Phone2Action’s software tools, which allows them to build digital campaign pages featuring stories or information that illustrate the importance of, say, patent reform legislation (for CEA) or eased transportation regulations (for Lyft). On the side of the page, visitors can input their name, Zip code and e-mail address, and the site will automatically populate an e-mail, tweet and Facebook post (authored by, in this case, CEA or Lyft) expressing support and urging policymakers to vote in favor of the cause or legislation.
One more click, and those messages are automatically sent to the inboxes and social media feeds of the proper elected officials, based on the individual’s Zip code.
The idea, Ory said, is two-fold: One, to give individuals an easier way to connect with elected officials, and two, to give Phone2Action’s clients a more effective way to harness the lobbying power of their supporters. What made that possible, he explained, was really the proliferation of smartphones….While Phone2Action’s campaign model has proven viable, several hurdles still stand in the company’s way – not the least of which is the sense of powerlessness felt by many Americans when it comes to public policy and today’s legislative process…(More).”

The Precision Medicine Initiative: Data-Driven Treatments as Unique as Your Own Body


White House Press Release: “…the Precision Medicine Initiative will pioneer a new model of patient-powered research that promises to accelerate biomedical discoveries and provide clinicians with new tools, knowledge, and therapies to select which treatments will work best for which patients.

Most medical treatments have been designed for the “average patient.” As a result of this “one-size-fits-all-approach,” treatments can be very successful for some patients but not for others.  This is changing with the emergence of precision medicine, an innovative approach to disease prevention and treatment that takes into account individual differences in people’s genes, environments, and lifestyles.  Precision medicine gives clinicians tools to better understand the complex mechanisms underlying a patient’s health, disease, or condition, and to better predict which treatments will be most effective….

Objectives of the Precision Medicine Initiative:

  • More and better treatments for cancer: NCI will accelerate the design and testing of effective, tailored treatments for cancer by expanding genetically based clinical cancer trials, exploring fundamental aspects of cancer biology, and establishing a national “cancer knowledge network” that will generate and share new knowledge to fuel scientific discovery and guide treatment decisions.
  • Creation of a voluntary national research cohort: NIH, in collaboration with other agencies and stakeholders, will launch a national, patient-powered research cohort of one million or more Americans who volunteer to participate in research.  Participants will be involved in the design of the Initiative and will have the opportunity to contribute diverse sources of data—including medical records; profiles of the patient’s genes, metabolites (chemical makeup), and microorganisms in and on the body; environmental and lifestyle data; patient-generated information; and personal device and sensor data.  Privacy will be rigorously protected.  This ambitious project will leverage existing research and clinical networks and build on innovative research models that enable patients to be active participants and partners.  The cohort will be broadly accessible to qualified researchers and will have the potential to inspire scientists from multiple disciplines to join the effort and apply their creative thinking to generate new insights. The ONC will develop interoperability standards and requirements to ensure secure data exchange with patients’ consent, to empower patients and clinicians and advance individual, community, and population health.
  • Commitment to protecting privacy: To ensure from the start that this Initiative adheres to rigorous privacy protections, the White House will launch a multi-stakeholder process with HHS and other Federal agencies to solicit input from patient groups, bioethicists, privacy, and civil liberties advocates, technologists, and other experts in order to identify and address any legal and technical issues related to the privacy and security of data in the context of precision medicine.
  • Regulatory modernization: The Initiative will include reviewing the current regulatory landscape to determine whether changes are needed to support the development of this new research and care model, including its critical privacy and participant protection framework.  As part of this effort, the FDA will develop a new approach for evaluating Next Generation Sequencing technologies — tests that rapidly sequence large segments of a person’s DNA, or even their entire genome. The new approach will facilitate the generation of knowledge about which genetic changes are important to patient care and foster innovation in genetic sequencing technology, while ensuring that the tests are accurate and reliable.
  • Public-private partnerships: The Obama Administration will forge strong partnerships with existing research cohorts, patient groups, and the private sector to develop the infrastructure that will be needed to expand cancer genomics, and to launch a voluntary million-person cohort.  The Administration will call on academic medical centers, researchers, foundations, privacy experts, medical ethicists, and medical product innovators to lay the foundation for this effort, including developing new approaches to patient participation and empowerment.  The Administration will carefully consider and develop an approach to precision medicine, including appropriate regulatory frameworks, that ensures consumers have access to their own health data – and to the applications and services that can safely and accurately analyze it – so that in addition to treating disease, we can empower individuals and families to invest in and manage their health.”

(More).

Digital Enlightenment Yearbook 2014


Book edited O’Hara, K. , Nguyen, M-H.C., Haynes, P.: “Tracking the evolution of digital technology is no easy task; changes happen so fast that keeping pace presents quite a challenge. This is, nevertheless, the aim of the Digital Enlightenment Yearbook.
This book is the third in the series which began in 2012 under the auspices of the Digital Enlightenment Forum. This year, the focus is on the relationship of individuals with their networks, and explores “Social networks and social machines, surveillance and empowerment”. In what is now the well-established tradition of the yearbook, different stakeholders in society and various disciplinary communities (technology, law, philosophy, sociology, economics, policymaking) bring their very different opinions and perspectives to bear on this topic.
The book is divided into four parts: the individual as data manager; the individual, society and the market; big data and open data; and new approaches. These are bookended by a Prologue and an Epilogue, which provide illuminating perspectives on the discussions in between. The division of the book is not definitive; it suggests one narrative, but others are clearly possible.
The 2014 Digital Enlightenment Yearbook gathers together the science, social science, law and politics of the digital environment in order to help us reformulate and address the timely and pressing questions which this new environment raises. We are all of us affected by digital technology, and the subjects covered here are consequently of importance to us all. (Contents)”

Millions of LinkedIn Members Want to Volunteer Their Skills for Good [INFOGRAPHIC]


LinkedIn: “What do 140,000 marketers, 4,000 Googlers, and 170,000 C-level executives have in common?
Answer: They all want to use their skills for good!
More than 4 million professionals like them have expressed interest in joining a nonprofit board or doing skills-based volunteering – or both.
GreatNonprofits, an organization that helps people find and rate other nonprofits, recently found two of these professionals on LinkedIn. Both are product managers who are spending 6 months to develop critical web-based tools to help the organization expand its reach.
“Both volunteers are creative, analytical, and really engaging deeply with staff,” says GreatNonprofits Founder and CEO Perla Ni. “We’re encouraged by how many talented, passionate people there are on LinkedIn who are willing to commit time to help nonprofits.”
As a professional, you can signal you want to use your skills for good on your LinkedIn profile by checking the boxes for “Joining a nonprofit board” and/or “Skills-based volunteering” in the Volunteer Experience & Causes section. If you’ve already done that, try searching for volunteer opportunities in your area.
For nonprofit organizations, we’ve made it quick and easy to find professionals who are eager to help. Use our free Advanced Search tool to find these talented needles in the haystack.
We took a closer look at the millions of LinkedIn members who’ve raised their hands for volunteer or board service, and found some interesting insights. For starters, the stereotype that millennials are hungry for purpose actually rings true. Also, the highest concentration of would-be volunteers are in the Midwest. And they have a ton of valuable skills – from strategic planning to marketing – for nonprofits to leverage.
Check out the infographic below for more, or visit nonprofit.linkedin.com.”

With a Few Bits of Data, Researchers Identify ‘Anonymous’ People


in the New York Times: “Even when real names and other personal information are stripped from big data sets, it is often possible to use just a few pieces of the information to identify a specific person, according to a study to be published Friday in the journal Science.

In the study, titled “Unique in the Shopping Mall: On the Reidentifiability of Credit Card Metadata,” a group of data scientists analyzed credit card transactions made by 1.1 million people in 10,000 stores over a three-month period. The data set contained details including the date of each transaction, amount charged and name of the store.

Although the information had been “anonymized” by removing personal details like names and account numbers, the uniqueness of people’s behavior made it easy to single them out.

In fact, knowing just four random pieces of information was enough to reidentify 90 percent of the shoppers as unique individuals and to uncover their records, researchers calculated. And that uniqueness of behavior — or “unicity,” as the researchers termed it — combined with publicly available information, like Instagram or Twitter posts, could make it possible to reidentify people’s records by name.

“The message is that we ought to rethink and reformulate the way we think about data protection,” said Yves-Alexandre de Montjoye, a graduate student in computational privacy at the M.I.T. Media Lab who was the lead author of the study. “The old model of anonymity doesn’t seem to be the right model when we are talking about large-scale metadata.”

The analysis of large data sets containing details on people’s behavior holds great potential to improve public health, city planning and education.

But the study calls into question the standard methods many companies, hospitals and government agencies currently use to anonymize their records. It may also give ammunition to some technologists and privacy advocates who have challenged the consumer-tracking processes used by advertising software and analytics companies to tailor ads to so-called anonymous users online….(More).”

Waze a danger to cops? Police reveal their own location on social media


The Architecture of Privacy


Book by “Technology’s influence on privacy has become a matter of everyday concern for millions of people, from software architects designing new products to political leaders and consumer groups. This book explores the issue from the perspective of technology itself: how privacy-protective features can become a core part of product functionality, rather than added on late in the development process.
The Architecture of Privacy will not only help empower software engineers, but also show policymakers, academics, and advocates that, through an arsenal of technical tools, engineers can form the building blocks of nuanced policies that maximize privacy protection and utility—a menu of what to demand in new technology.
Topics include:

  • How technology and privacy policy interact and influence one another
  • Privacy concerns about government and corporate data collection practices
  • Approaches to federated systems as a component of privacy-protecting architecture
  • Alternative approaches to compartmentalized access to data
  • Methods to limit the amount of data revealed in searches, sidestepping all-or-nothing choices
  • Techniques for data purging and responsible data retention
  • Keeping and analyzing audit logs as part of a program of comprehensive system oversight
  • … (More)